url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
http://www.iphonbuzz.com/from-concept-to-reality-reminders-for-messages-lands-on-jailbroken-devices-cydia-tweak.html
|
code
|
Reminders for Messages was a concept of Josh Tucker become reality. It is a new Cydia tweak that reminds you to respond to a particular message by setting customizable time intervals.
Reminders for Messages is a very simple tweak that introduces new options within the native Messages app on iOS. Within a conversation in the native app just hold on a specific message to display the “Reminder” options, you can set the reminder for following times:
- 1 minute
- 5 minutes
- 15 minutes
- 1 hour
You can also cancel the reminder by taping the Cancel option. Once you have set the time a reminder will appear in the notification Center, which inform us promptly after the expiry of the time, to reply to that message.
The tweak is not yet available on Cydia and can be installed via GitHub, by following the simple instructions that we propose below:
1. Launch Safari on your iDevice and enter this URL: https://github.com/Jon889/smsremind
2. Tap on the folder link called “build”
3. Tap on the file link “com.jbp.smsremind_0.0.1-1_iphoneos-arm.deb
4. Tap the link “View Raw”
5. Tap “Open in iFile”
6. Tap “Installer”
7. Tap “Done”
8. Respring your device
In this way you will have Reminders for Messages on your device and seamlessly integrated with the native Messages app.
Via | Redmondpie
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997882928.29/warc/CC-MAIN-20140722025802-00018-ip-10-33-131-23.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 1,316
| 18
|
https://communities.sas.com/t5/Base-SAS-Programming/Is-there-anyway-to-access-DB2-database-LOB-BLOB-CLOB-type/td-p/29081?nobounce
|
code
|
The two most current versions of SAS are 9.2 and 9.1.3. SAS 9.2 has just been released. SAS 9.1.3 is still active in a lot of shops.
Whether large objects (BLOB, CLOB, etc) are supported, seems to depend on the SAS/Access product. For example, with Oracle, some large objects are supported; while on the DB2 on the mainframe, it seems that large objects are not supported.
"SAS/Access to DB2 on MVS does not support DB2 large objects including
the data types CLOB, DBCLOB, and BLOB. Often these fields are used
to hold graphs, pictures, etc."
You may want to investigate the documentation for the SAS/Access product involved in your question and/or contact SAS Technical Support for more help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591718.31/warc/CC-MAIN-20180720154756-20180720174756-00358.warc.gz
|
CC-MAIN-2018-30
| 693
| 6
|
https://richard-arblaster.com/tag/black-wooden-bookcases/
|
code
|
Published at Monday, April 09th 2018, 05:26:37 AM. Bookshelf By Patrick.
Wall Mounted Pot Racks are just what the words say. These pot racks are mounted to the wall of your kitchen. So there is a need to have one side of a wall mounted pot rack flush so the pot rack can be mounted firmly against the wall. When mounting a wall mounted pot rack it is advised to mount it into the stud inside the wall for maximum weight support.
Published at Monday, April 09th 2018, 05:26:17 AM. Bookshelf By Angel.
5. Know Your Cooling StrategyUnderstand the role that server racks play in your complete data center cooling strategy. The type of rack you choose will depend on the cooling methods used in your environment. Baseline kW of heat output per rack varies widely, depending on type and density of equipment, and can be anywhere from 4 kW-12 kW or more per rack, with some experts estimating that the rise of high-density environments and designs for future equipment will result in an output of 30-50 kW per rack. (4)
Published at Monday, April 09th 2018, 05:26:13 AM. Bookshelf By Angel.
Visio Blocks is a new program that runs along the same lines as Rack Tools, but is integrated with Microsoft's popular Visio® software. They are basically Visio stencils that allow you to quickly pre-configure your entire system. This is a handy tool to have for quickly putting together rackmount system presentations for clients if you are an installer.
Published at Monday, April 09th 2018, 05:25:55 AM. Bookshelf By Angel.
Bucket racks for floor displays are some of the most versatile racks available. The revolving versions of bucket racks can include as many as thirty buckets and can hold anything from edible items like wrapped candies to small novelty toys for children.
Published at Monday, April 09th 2018, 05:25:32 AM. Bookshelf By Patrick.
Temporary or quick installation racks are stronger than you might think, though of course they will never be infallible. The biggest advantage to these is that you can set them up quickly for one-time uses, and then take them down again when you no longer need them. Typically these racks fold down for storage, enabling them to take up as little room as possible. However, if you intend to use your ladder rack regularly, or if you need it to carry heavy loads, a more secure, permanent rack is probably the best choice for you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247522457.72/warc/CC-MAIN-20190222180107-20190222202107-00251.warc.gz
|
CC-MAIN-2019-09
| 2,368
| 10
|
https://www.careervillage.org/questions/268314/which-career-options-are-good-for-me
|
code
|
Rajat, there's so many opportunities to focus on and in Information Technology they change frequently, so keep asking these types of questions as you grow in your career aspirations. If you are interested in computers and writing code, nothing beats starting in some type of software development job using whatever are the languages most prevalent at that time, today Python and NodeJS are two good choices. To gain more hardware knowledge, the best way to learn is hands on, so buying inexpensive desktop hardware and upgrading components can be a good start. Usually highly tech professionals will build a local network in their home using a desktop and some form of a Linux OS. Today, much of the hardware needs are moving to Public Cloud providers like Amazon, Microsoft and Google, so learning more about their service offerings and diving into their API (application program interface) driven methods of acquiring infrastructure as code may be a more practical way of learning about hardware and code at the same time.
If you cannot find work in programming or software development, other IT related jobs will likely lead to opportunities to code and learn more about hardware, so taking other IT related jobs may be a good place to start also. Most larger companies (technology, financial services, etc) have leadership development programs and searching their websites for how to apply for an opportunity to become part of a leadership development program can also be a good place for a new college grad. If you are in high school, checking with the same large companies for high school summer internship opportunities and how you might apply to be considered. I have worked with many high school and college interns in my career, who worked hard and in many cases it opened up opportunities for them in the IT leadership development programs after they graduated from college.
All the best
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400219221.53/warc/CC-MAIN-20200924132241-20200924162241-00286.warc.gz
|
CC-MAIN-2020-40
| 1,898
| 3
|
http://msl.cs.uiuc.edu/planning/node475.html
|
code
|
One of the most basic limitations of game theory is that each player must know the cost functions of the other players. As established in Section 9.5.1, it is even quite difficult to determine an appropriate cost function for a single decision maker. It is even more difficult to determine costs and motivations of other players. In most practical settings this information is not available. One possibility is to model uncertainty associated with knowledge of the cost function of another player. Bayesian analysis could be used to reason about the cost based on observations of actions chosen by the player. Issues of assigning priors once again arise. One of the greatest difficulties in allowing uncertainties in the cost functions is that a kind of ``infinite reflection'' occurs . For example, if I am playing a game, does the other player know my cost function? I may be uncertain about this. Furthermore, does the other player know that I do not completely know its cost function? This kind of second-guessing can occur indefinitely, leading to a nightmare of nested reasoning and assignments of prior distributions.9.10
The existence of saddle points or Nash equilibria was assured by using randomized strategies. Mathematically, this appears to be a clean solution to a frustrating problem; however, it also represents a substantial change to the model. Many games are played just once. For the expected-case results to converge, the game must be played an infinite number of times. If a game is played once, or only a few times, then the players are very likely to experience regret, even though the theory based on expected-case analysis indicates that regret is eliminated.
Another issue is that intelligent human players may fundamentally alter their strategies after playing a game several times. It is very difficult for humans to simulate a randomized strategy (assuming they even want to, which is unlikely). There are even international tournaments in which the players repeatedly engage in classic games such as Rock-Paper-Scissors or the Prisoner's Dilemma. For an interesting discussion of a tournament in which people designed programs that repeatedly compete on the Prisoner's Dilemma, see . It was observed that even some cooperation often occurs after many iterations, which secures greater rewards for both players, even though they cannot communicate. A famous strategy arose in this context called Tit-for-Tat (written by Anatol Rapoport), which in each stage repeated the action chosen by the other player in the last stage. The approach is simple yet surprisingly successful.
In the case of nonzero-sum games, it is particularly disheartening that multiple Nash equilibria may exist. Suppose there is only one admissible equilibrium among several Nash equilibria. Does it really seem plausible that an adversary would think very carefully about the various Nash equilibria and pick the admissible one? Perhaps some players are conservative and even play security strategies, which completely destroys the assumptions of minimizing regret. If there are multiple admissible Nash equilibria, it appears that regret is unavoidable unless there is some collaboration between players. This result is unfortunate if such collaboration is impossible.
Steven M LaValle 2012-04-20
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948620.60/warc/CC-MAIN-20230327092225-20230327122225-00187.warc.gz
|
CC-MAIN-2023-14
| 3,301
| 5
|
https://codedump.io/share/DpImiTuScKng/1/python-autopy-problemsconfusion
|
code
|
so im trying to make a bot script that when a certain hex color is on a certain pixel it will execute some code to move the mouse,click etc. and i have it to where it takes a screenshot every 1 second to the same png file and updates the png file's pic. i have the hex color for the pixel cords print to the console so i can see if its updating or not. it never updates it just stays the same. ive tried writing this script many ways and sadly i only have one version to show you but hopefully you will understand what i was trying to accomplish. im on python 2.7 btw. thank you all for your time!!!!
from time import sleep
color_grabber = hex(autopy.bitmap.Bitmap.open("screen1.png").get_color(292,115))
color_grabber = color_grabber
if color_checker == "0xffcb05":
I believe your problem is how you're using
color_grabber = color_grabber does nothing. What's happening in your code is that when you run it, after the imports, you define the value of
color_grabber to be the color in your image. Then your while loop executes and in that loop you call
color_checker. This function brings in the variable
color_grabber from the global namespace and then you set that variable equal to itself. You're not re-executing the command you used to define
color_grabber in the first place. You're just storing the color value back into itself so clearly its not going to change.
You also have a problem in how you're calling your mouse_move_click function. You don't want to pass in the function name, as that isn't really necessary. However, you also performed the check
color_checker == "0xffcb05" which was comparing your function (the function itself, not the returned value) to the hex code. That doesn't do you any good. You want to compare the color. The solution is to pass the color into
the_ifs and use that color to compare to the hex code. I should note though that you don't need to make
the_ifs into its own function. Just put that if statement in your while loop. I left it how you had it though.
What you want is something like this.
import autopy from time import sleep def color_checker(): color_grabber = hex(autopy.bitmap.Bitmap.open("screen1.png").get_color(292,115)) return color_grabber def mouse_move_click(): autopy.mouse.smooth_move(433,320) autopy.mouse.click() def screen_grab(): autopy.bitmap.capture_screen().save("screen1.png") def the_ifs(color): if color == "0xffcb05": mouse_move_click() while 1==1: sleep(1) screen_grab() color = color_checker() the_ifs(color) print color
Note that I have not run this code myself so I can't guarantee it works, but I believe it should.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890874.84/warc/CC-MAIN-20180121195145-20180121215145-00023.warc.gz
|
CC-MAIN-2018-05
| 2,597
| 18
|
https://www.limilabs.com/qa/4668/getting-authenticate-failed-with-imap
|
code
|
Getting exception "AUTHENTICATE failed." while connecting imap can anyone pls help
using (Imap imap = new Imap())
There are several reasons why your server is refusing to authenticate you.
Most common are:
Depending on the email provider your options and solutions differ greatly.
If you are using Office365 (error message suggests that) go here:
For other providers you may want to browse samples here:
VAT: PL 5213195875
02-707, Warsaw Poland
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00439.warc.gz
|
CC-MAIN-2023-14
| 444
| 9
|
http://nylogic.org/topic/graduate-center/
|
code
|
Rebecca Steiner is a CUNY Graduate Center product, having received her Ph.D. here in 2012 as a student of Russell Miller. She then assumed a postdoctoral position at Vanderbilt University, studying computability and computable model theory, with a focus on algebraic structures. In the fall of 2015 she will join the mathematics department of Virginia Commonwealth University.
Dr. Joel (Ronnie) Nagloo studies model theory and differential algebra. He holds a Ph.D. from Leeds University, completed under the supervision of Anand Pillay and Frank Nijhoff. After an initial postdoctoral position at the CUNY Graduate Center, he is now an Assistant Professor in mathematics at Bronx Community College.
Graham Priest, a Distinguished Professor at CUNY Graduate Center, is the most prominent contemporary champion of dialetheism, the view that some claims can be both true and false. He is known for his in-depth analyses of semantic paradoxes, and his many writings relate to paraconsistent and other non-classical logics. He has taught in Australia at the University of Melbourne since 2001 and has authored numerous books. Over the course of his prominent career, he has published articles in nearly every major journal on philosophy and logic. He has held visiting research positions at many universities, including the Australian National University, the Universities of Cambridge, New York, Pittsburgh, São Paulo, Kyoto, and the Soviet Academy of Sciences. He holds a Ph.D. in mathematics from the London School of Economics.
Distinguished professor Arthur W. Apter received his B.S. and Ph.D. degrees, both in mathematics, from MIT in 1975 and 1978, respectively. He is a mathematical logician, with a specialization in set theory, specifically large cardinals, forcing, and indestructibility, and he maintains a burgeoning interest in inner model theory, as well. Professor Apter has published well over 100 research articles.
Professor Apter is known internationally for his foundational early work in choiceless set theory and also for his work in the area of forcing and large cardinals, including especially a large body of results concerning the indestructibility phenomenon of large cardinals and the level-by-level agreement between strong compactness and supercompactness, among many other topics. A prolific researcher, he has published well over 100 articles in refereed research journals.
From his profile at the CUNY Distinguished Professor page:
Professor Arthur W. Apter was born and raised in Brooklyn, New York, where he attended New York City public schools. After graduation in 1971 from Sheepshead Bay High School, he attended MIT, where he earned his B.S. in Mathematics in 1975 and his Ph.D. in Mathematics in 1978. After spending one additional postdoctoral year at MIT, he spent two years in the Mathematics Department of the University of Miami and five years in the Mathematics Department of Rutgers University – Newark Campus.
He has been affiliated with the Mathematics Department of Baruch College since 1986, and was appointed to the Doctoral Faculty in Mathematics of the CUNY Graduate Center in 2006. He was the doctoral advisor of Shoshana Friedman (Ph.D. CUNY 2009) and doctoral co-advisor of Grigor Sargsyan (Ph.D. UC Berkeley 2009), whom he mentored as an undergraduate in the CUNY Baccalaureate Program. He has also supervised two additional students in advanced reading courses in mathematics as undergraduates, Lilit Martirosyan and Chase Skipper.
CURRENT SCHOLARLY INTERESTS:
Professor Apter is a mathematical logician, who specializes in set theory. His research focuses on large cardinals and forcing, but he also maintains a keen interest in inner model theory.
Lehman College Professor Melvin Fitting received the Herbrand Award of 2012 for his groundbreaking contributions to the field of automated theorem proving, which focuses on getting computer programs to prove logical and mathematical deductions.
Dustin Mulcahey earned his Ph.D. from the CUNY Graduate Center in 2012. He does research in the area of category theory, with a related interest in Haskell, and more recently, has organized the Homotopy Type Theory Reading Group.
HoTT Reading Group The goal of this group is to study this: http://homotopytypetheory.org/book/ Homotopy type theory is a new foundation for mathematics based upon type theory and the univalence axiom. This is a topic that unifies the foundations of ma …
Miha Habič is a graduate student at the CUNY GC. He got his Masters Degree in Mathematics at the University of Ljubljana, Slovenia. His interests lie in the area of infinitary computability, forcing and large cardinals.
Philipp Rothmaler is a professor of mathematics at the CUNY Graduate Center and at Bronx Community College, working in mathematical logic and especially model theory. He is the author of the highly regarded book, Introduction to Model Theory.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00079.warc.gz
|
CC-MAIN-2023-14
| 4,906
| 15
|
https://lists.debian.org/debian-user/2019/07/msg00283.html
|
code
|
Re: not wanting to delete somebody's home directory
On Fri, Jul 05, 2019 at 12:16:46PM -0400, The Wanderer wrote:
> And what if some of the destination names already exist? That's the
> point of deleting the existing files, I'd imagine.
You're assuming too much.
Given the communication we've seen thus far, the most likely scenario is
"I have a code snippet that will rename all the files in a directory, so
now I just have to wipe out the directory first, then make the files,
then use this code snippet to rename them all."
If the desired destination files already exist, the only sane thing to
do is abort with an error message, unless the user used a force option.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306346.64/warc/CC-MAIN-20220128212503-20220129002503-00151.warc.gz
|
CC-MAIN-2022-05
| 669
| 11
|
https://twitch.uservoice.com/forums/310237-ads/suggestions/46046284-no-stream-is-worth-sitting-minutes-worth-of-ads
|
code
|
No stream is worth sitting minutes worth of ads
This isn't really an idea, more so my personal opinion on how the site is working, maybe it will be taken into consideration when making future decisions. There isn't a single stream on this, or any site, and there never will be, that I consider worth sitting through minutes worth of ads. If I'm watching a stream and I see more than two 15-second ads, I immediately leave. Every time. If I have ever accidentally sat through them, then I wasn't actually watching the stream, and just had it running in the background. I don't really know how you could go about fixing this, but cramming ads into a live stream just makes me go find something to watch on entirely different website.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00273.warc.gz
|
CC-MAIN-2024-10
| 731
| 2
|
http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=009i4s
|
code
|
Extract audio from a VideoCDgreenspun.com : LUSENET : Video CD : One Thread
I want to extract the audio from a VCD 2 but i donīt know how. What program can I use?
-- Ernesto Gancedo (email@example.com), July 31, 2002
Try to get the .dat files from the VCD with VCDGear. Use the conversion dat->mpeg, or dat->dat and use another program (dat2mpg, dos utility) to convert to mpg. You can than use a program (TMPGEnc,....) to demux the mpg and end up with the audio in a .mp2 format (mpeg 1, layer 2).
Winamp,Nero, wmplayer etc understand .mp2 and can convert it to .wav, depends on what you want to do with the audio.
I hpoe you have a standard compliant vcd, VCDGear is not very tolerant in that respect. I cannot recover my .dat files from my (homemade) VCD's which are 250 Kb mpeg1 video with 224 Kb mp2 audio.
Try http://www.vcdhelp.com for the software and/or links to the software.
Good luck, Hans Bus
-- Hans Bus (firstname.lastname@example.org), August 01, 2002.
Try vcd cutter 4.03 from softpile.com or else TMPEGENCcoder is the best eventhough takes time.
-- supreet Hegde (email@example.com), April 20, 2003.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103624904.34/warc/CC-MAIN-20220629054527-20220629084527-00179.warc.gz
|
CC-MAIN-2022-27
| 1,118
| 11
|
http://smgstudio.freshdesk.com/support/discussions/topics/11000011701/page/last
|
code
|
You should be careful accusing someone of cheating.
-Two players ganging up on you is NOT CHEATING!
- One player playing two accounts is NOT CHEATING!
- BOTS tough one, but still saying the BOT has no actual cheats but just another account to try and give the player an edge. Not much dif. then having a second account. Still saying this is NOT CHEATING!
I calls these exploiting a games feature, and impossible to stop.
I have hundreds of games logged in Risk, and have not seen one person actual cheat, as in roll sixes every roll, control the game so no one can move but only them, GOD mode where you can't hurt them, etc. NOT ONCE!
I do see many players trying to get an advantage with a second account, but honestly most of them suck and need two accounts.
I see many posts about cheating, but I challenge any of you, prove they actual have cheats vs just playing a second player who also is not cheating rather then playing dirty.
I understand your frustrated with players using two or more accounts. It's cheap for sure!
I'm making the statement, that cheating implies you want SMG to fix it.
SMG can fix cheats, but cannot fix people exploiting a feature of the game. Example: SMG can't stop you from playing two accounts, as one can be on Wi-Fi and another on cell towers.
So trying to get users to stop posting to SMG to do something, when they should be crying out to players to stop. But how to ask a loser to stop being a loser...
Too many feature requests asking SMG to fix something that's not fixable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609837.56/warc/CC-MAIN-20170528141209-20170528161209-00073.warc.gz
|
CC-MAIN-2017-22
| 1,517
| 13
|
https://ict-freak.nl/tag/service-pack-1/
|
code
|
The slipstream process of Office 2007 is a simple two step process:
- Extract the SP1 file
- Copy the MSP files to your install share
Download Office 2007 SP1 here: http://www.microsoft.com/downloads/. Save the file on the root of your D:\ drive. Create a folder called D:\Office2007MSP\.
Extract the SP1 file with the following command:
Open the folder D:\OfficeSP1MSP
Copy all the *.msp files to the Updates folder on your install share.
If you run Setup.exe the setup wizard will install Office 2007 SP1.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00162.warc.gz
|
CC-MAIN-2023-14
| 507
| 8
|
https://www.br.freelancer.com/projects/internet-marketing-seo/forex-currency-trading-website/
|
code
|
I have a Wix website about Forex currency trading which I want to get traffic to in order to build a customer base. I want my website to rank on the first page of a google search page.
24 freelancers estão ofertando em média $275 para esse trabalho
Hi There, Doing SEO Strategy for Wix,Tumblr,Blogger,Shopify is entirely different from traditional SEO Strategies. Could you please send me your WIX site URL for initial audit ? Thanks, Gautham [url removed, login to view]
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945493.69/warc/CC-MAIN-20180422041610-20180422061610-00089.warc.gz
|
CC-MAIN-2018-17
| 473
| 3
|
https://mail.python.org/pipermail/mailman-users/2013-November/075756.html
|
code
|
[Mailman-Users] Reducing false positives with spam markings with Gmail, etc.
Stephen J. Turnbull
stephen at xemacs.org
Wed Nov 6 08:04:11 CET 2013
Steven Clift writes:
> Has this been a growing issue with Mailman served lists?
I wouldn't say it's growing. For quite a while (a decade or so) we
have been getting the occasional request for help in getting mail
delivered to the major freemail services and portals, including Gmail,
Yahoo!, Hotmail, and AOL. I haven't noticed them getting more
frequent over time, nor have I had problems delivering to them with my
own lists (but I have a really easy set of users to service, most are
admins or oldtimers themselves and tend to blame their freemail
provider, not my lists).
> If it is not a growing problem with Mailman lists, then what are
> you doing right!?
Hard to say. For one thing, Mailman tries very hard to conform to the
relevant RFCs (specifically 5322, 2369, and 2919).
Second, most Mailman lists are set up by professionals, either people
who are quite familiar with mail service including the kinds of things
that keep you from getting labeled as spam, or hosting services. Not
all of them are completely competent, but most do a pretty good job.
Most implement DKIM and/or SPF, for example. So there may be a
growing problem, and we just don't hear about it -- the host managers
are dealing with it themselves.
Third, we do have a pretty good FAQ on how to communicate with the big
services to get on their good side. It's tedious to follow their
rules, but it does work most of the time.
> (One factor for us is that we do have a lot of users who post via
> the web interface, which Gmail doesn't seem to like.)
That doesn't surprise me. I assume that the from address is
"Web.User at home.org" as they are registered with your service. If your
software is not emitting a correct Sender header, it will look like
the From address is spoofed. Gmail won't like that. Make sure that
in this case the Sender header is set appropriately. (Mailman doesn't
have a web interface, so doesn't have experience with this itself.
The most common third-party interface is Gmane, which does get the
headers right. Not everybody appreciates Gmane -- they have a habit
of mirroring lists whose owners don't want them mirrored -- but they
do conform to the mail standards.)
Hope this helps.
More information about the Mailman-Users
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522270.37/warc/CC-MAIN-20220518115411-20220518145411-00548.warc.gz
|
CC-MAIN-2022-21
| 2,378
| 42
|
https://codeql.github.com/codeql-standard-libraries/javascript/semmle/javascript/ApiGraphs.qll/module.ApiGraphs.html
|
code
|
Provides an implementation of API graphs, which are an abstract representation of the API surface used and/or defined by a code base.
The nodes of the API graph represent definitions and uses of API components. The edges are
directed and labeled; they specify how the components represented by nodes relate to each other.
For example, if one of the nodes represents a definition of an API function, then there
will be nodes corresponding to the function’s parameters, which are connected to the function
node by edges labeled
Provides classes and predicates for working with APIs defined or used in a database.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303956.14/warc/CC-MAIN-20220123015212-20220123045212-00211.warc.gz
|
CC-MAIN-2022-05
| 612
| 7
|
http://www.goinggalactic.co.uk/2015/03/what-is-statist.html
|
code
|
(After the model of “What is a communist?” by Ebenezer Elliott, the Corn-Law Rhymer)
What is a statist? It’s one that has yearnings
For pogroms, and witch-hunts, and wars, and book-burnings;
While all the time spouting forth lies fear-instilling,
And trashing rights, stealing our earnings, and killing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687834.17/warc/CC-MAIN-20170921172227-20170921192227-00229.warc.gz
|
CC-MAIN-2017-39
| 309
| 5
|
https://webarchive.jira.com/wiki/spaces/ARS/pages/90997507/Datasets+Available
|
code
|
This page provides links to technical documentation describing how specific datasets are generated, their format and structure, relative size, and their relation to, and impact by, the computational processes involved in web archiving. Each dataset also has a corresponding page that includes example use cases, outlines some of the types of analysis possible, and sample data visualizations created using these datasets.
Types of Datasets Currently Available
WAT: Web Archive Transformation files feature key metadata elements that represent every crawled resource in a collection and are derived from a collection’s WARC files.
LGA: Longitudinal Graph Analysis files feature a complete list of what URIs link to what URIs, along with a timestamp, within an entire collection.
WANE: Web Archive Named Entities uses named-entity recognition tools to generate a list of all the people, places, and organizations mentioned in each URI in a collection along with a timestamp of URI capture.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710808.72/warc/CC-MAIN-20221201085558-20221201115558-00451.warc.gz
|
CC-MAIN-2022-49
| 989
| 5
|
https://forum.brackeys.com/discussion/1854/advice-for-my-situation
|
code
|
It looks like you're new here. If you want to get involved, click one of these buttons!
I'm very new to game development and coding as a whole. I've been learning for about a week or two now and I've been trying to make a simple 2D game as a starting project, a basic platformer with a square sprite as the main character. When I first started learning, I did some research on C# and followed some tutorials, but I don't think it helped me. Just today I tried to make the player move with a very simple script, I got it working and was proud of myself, however, when I tried adding a jumping script it broke everything. I tried fixing it and looking online for answers and I couldn't find anything.
I then went online to look for a simple jumping script to copy and paste so I could at least have a game plus a script I can read and look up questions to understand better. But, I somehow failed at copying a script as well and the square still wouldn't move at all.
I'm not going to provide screenshots of this script because I'm fine with it not working, it's just a 2D platformer. My main concern is the fact that I don't feel like I'm learning anything at all and I might just lack the basic skills to actually get into Game Design.
So, as the title says, does anyone have advice on how I can really learn code? Instead of just failing because I have no clue what I'm doing or what I should be fixing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357984.22/warc/CC-MAIN-20210226205107-20210226235107-00315.warc.gz
|
CC-MAIN-2021-10
| 1,404
| 5
|
https://climax.host/ddos-protections.html
|
code
|
We protect our network very effectively against DDoS attacks by using our own detection software + filters as well as Voxility. The protection automatically detects and filters "bad traffic" and protects IP addresses against DDoS attacks up to 1.600GBps .
We now offer a cheaper Anti-DDoS protection for against DDoS attacks up to 250GBps.
If you want to protect a website (HTTP or HTTPS) against DDoS attacks, we additionally recommend the use of Layer 7 Protection for higher efficiency. A DDoS attack can be detected and filtered much faster with Layer 7 Protection. When using SSL, it makes sense to store the certificate in the firewall software.
During an attack, the server remains accessible and you can use the services normally. Non-relevant ports are blocked as long as the attack persists, e.g. icmp for ping.
All important standard ports remain accessible during a DDoS attack and are filtered by the protection.
Voxility protects the main attacks. For further protection measures we will use our own dedicated firewall, passing it is associated with extra cost. We offer comprehensive anti DDoS protection in 2 compartment protection they are safer.
1 Protection is provided by Voxility everything was running through Vox is filtered through our own firewall
There are different types of DDoS (Distributed Denial of Service) attacks. Basically, a DDoS is a "denial of service" that is deliberately caused by a large number of requests and thus leads to an overload of the data network or the server.
DDoS attacks can target different layers (see ISO/OSI layer model). Compared to earlier versions, current DDoS attacks often target the top layer (Layer 7). Layer 7 is the application layer and serves to provide functions for the applications and is responsible for data input and output.
Layer 7 attacks specifically target Layer 7 protocols such as Telnet, FTP, NNTP, HTTP or SMTP. Compared to other DDoS attacks, Layer 7 attacks require far less bandwidth and packets to disrupt services. A low-level protocol attack such as SYN flood requires a huge number of packets to perform an effective DDoS attack, while a Layer 7 attack requires only a limited number of packets to perform a large DDoS attack.
The most common Layer-7 attack is HTTP flooding. Here, an HTTP request is sent to the affected server and uses considerable resources, and although the number of packets is limited, they fully utilize all server resources and lead to a denial of service.
Layer 7 protection is activated by us at your request, and we also deposit the certificate in the firewall software.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347401260.16/warc/CC-MAIN-20200529023731-20200529053731-00115.warc.gz
|
CC-MAIN-2020-24
| 2,591
| 12
|
http://bfexplorer.net/Articles/Content/49
|
code
|
Betfair tennis bot offers two trigger parameters: SetScore and GameScore. The SetScore parameter is not mandatory.
The bot utilizes betfair score api for ATP and WTA tournaments only.
When trigger conditions are met the action bot (the parameter BotName) is executed on the player defined by the parameter ExecuteOnPlayer: Player1, Player2, Winning Player, Loosing Player.
You can create your action bot setting from any other bfexplorer bot, so you can execute conditional bet placing or trading strategy.
The SetScore parameter allows entering more set scores, for instance: 0 - 1;1 – 0
In my tutorial video I just set the bot to trade 3 ticks profit by backing winning player when game score is 2 – 4.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103940327.51/warc/CC-MAIN-20220701095156-20220701125156-00449.warc.gz
|
CC-MAIN-2022-27
| 708
| 6
|
https://support.mozilla.org/zu/questions/1365423
|
code
|
Cannot play video in mobile browser
Cannot view video content playing, even though I can hear the audio. Ads load and play just fine in the background. When it comes to website content, video does not show. I have cleared history and have the most current versions of iOS and Firefox.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531352.50/warc/CC-MAIN-20220520030533-20220520060533-00566.warc.gz
|
CC-MAIN-2022-21
| 284
| 2
|
https://www.cfd-online.com/Forums/cfx/83879-fanno-flow-pipe-flow-cfx-print.html
|
code
|
Fanno flow (pipe flow) in CFX
I am solving simple fanno line problem in CFX from a text book. But i am not getting the same mass flow rate.
the problem description is here:
L = 0.20 m
D = 0.01m
P01 = 650 Kpa
M1 = 2.601
mdot1 = 0.0225 kg/sec
air: gamma =1.4 ( i choose idea gass in CFX)
R = 287
calculated analytical from Fanno flow: (f= 0.02); compressible flow with friction and contant area
Initially dont know any exit condition
P2 = 89.37Kpa
kindly let me know how to put boundary conditions.
Any success on this?
Did you manage to resolve this? I have the same issues as yours. Which text book you are referring to?
|All times are GMT -4. The time now is 07:33.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00571-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 667
| 17
|
https://www.npmjs.com/package/fishing/v/0.2.0
|
code
|
Turn promises/A+ compliant promises into Node Streams and streams into promises.
note: Uses streams2, not currently working in the browser.
If item is a stream return a promise, or vice versa.
Create a stream that gets written to when promise is fulfilled
Create a promise that gets fulfilled with the buffered data of the stream, when the stream ends.
This lets you pull a promises using library into your stream based app or a stream using module into your promises based app and wrap the interface you hate in the one you love.
Copyright (c) 2013 Nick Niemeir firstname.lastname@example.org
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148375.36/warc/CC-MAIN-20200229022458-20200229052458-00032.warc.gz
|
CC-MAIN-2020-10
| 1,614
| 10
|
https://discourse.osmc.tv/t/automated-nfs-server-for-automount-shares/84252/37
|
code
|
loads of stuff that are pretty specific on pip that doesnt mean they have no place there
Exporting /media is just fine. I’ll need to work out how we would expose some of the settings you added to the script.
Been looking at exposing the some of the settings as dialog with in kodi, the best way appears to be the xbmcgui module. To use this module with kodi 18, I would need to rewrite the script in python2; which is an option but it may just be better to wait for kodi 19 before adding to the app store.
I’m going to have go getting this to work with a nightly build. I’ll let you know how I get on.
Focus on Python3 since Python 2 is basically going the way of the dodo bird
I’ve now created a script that works within kodi, for both kodi 18 & 19; I’ve also created created an uninstall script. Again I would appreciate it if a few of you could test this please.
The easiest way is to map some shortcuts to some keys for example f11 & f12, for example (will need to use the command line):
cd /home/osmc/.kodi/userdata wget https://raw.githubusercontent.com/tomdoyle87/osmc-nfs-server-python3/master/Kodi-nfs-server-setup.py wget https://raw.githubusercontent.com/tomdoyle87/osmc-nfs-server-python3/master/Kodi-uninstall-nfs-server.py
Then add the following to keyboard.xml or remote.xml (in the global section):
<keyboard> <F11>XBMC.RunScript(special://home/Kodi-nfs-server-setup.py)</F11> <F12>XBMC.RunScript(special://home/Kodi-uninstall-nfs-server.py)</F12> </keyboard>
If you need any further assistance setting up, please let me know. Also I will gladly receive any thoughts or feedback.
Worked just fine for me on both kodi 18 and 19
I’ve just realised the scripts were still set to dry-run, so it was only going through the menu prompts and not actually installing anything.
Any chance you could please test again? The script will now install and configure the NFS server.
haha ok well it was a good dry run atleast just tried it before work ill will review as soon as possible when i get out of work
just wonder if you have had chance to test the script again?
Sorry Tom havent gotten around to it will be home this week a bit under the weather, so ill probly get around to it
Ok no worries, hope you feel better soon.
i tried and everything works flawlessy. Just one thing tomention. U have not NO_SUBTREE_CHECK flag added to shares. I think this flag is default today.
I´ve got just problem where nfs server or client badly encode filenames with nonstandard chars like ě etc. NFS client in windows shows me instead of the ě just ?? or similar chars. Cant solve that.
Thanks for the feedback.
I’ll check this out and see if its required.
I’ll look into this, but maybe a limitation client sides (Windows).
I mentioned this just if someone doesn´t know how tomake it works. Its not connected with ur script but thanks for the help.
Recently found some inspiration to look at this again. Now installable as addon, no need to edit keymaps. Just run the addon and follow the instructions, available for both kodi 18 & 19:
Git Repository can found here
Haven’t forgotten to look in to NO_SUBTREE_CHECK, just been busy on the todo list.
Tested with no_subtree_check enabled and it didn’t create any issues, so I’ve added as requested.
thanks @Tom_Doyle i will test it with next update to kodi 19 I am going to do fresh install of new system
5 posts were split to a new topic: Is mounting NFS shares is only relevant for Linux servers, correct?
Moved as question was about NFS and Windows.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00634.warc.gz
|
CC-MAIN-2023-50
| 3,520
| 31
|
https://www.eehelp.com/question/can-not-find-driver-for-compactlogix-l32e-in-opc-server-or/
|
code
|
Can not find driver for CompactLogix L32E in OPC Server OR
Anyone know how to contact the CompactLogix L32E Lookout 6.5.
It doesn't seem to be a driver for it in the OPC server from OR. Can someone point me in the right direction.
I thought that the 5300 ENI:CompactLogix would work, but it does not work.
Thanks to the folks at Kepware. I was able to get this working for CompactLogix L32E.
Step 1: In the OPC Server OR create a new channel. The channel name can be anything you want.
Step 2: Device driver will be ControlLogix Ethernet. You can also enable diagnostics if you want.
Step 3: Network adapter. I used default.
Step 4: Write only the latest values. Service at 10. (These are the default settings and are recommended.)
Step 5: Finish new channels configuration
Step 6: Click the icon to create the new device
Step 7: The name of the device can be selected.
Step 8: Select model of device in this case CompactLogix 5300
Step 9: Device for me ID been XXX.XXX.XXX.XXX, 1, 0 IP address (note the 1 redirects the path at the bottom of basket.) 0 to the location where the processor is)
Step 9: Device synchronization. Leave the default values.
Step 10: Automatic demotion leave unchecked.
Step 11: Leave default values do not generate start remove create and enable the subgroups
Step 12: Port and watchdogs with default settings
Step 13: Options of the project leave default. (In my case, I've changed to short because that's what most of my tags was)
Step 14: Create tagname of the device.
Step 14: Finishing Device setup.
You now have two options.
Option 1: Start creating labels according to your needs. (This is what I did)
Option 2: Newly created device right click and select property. Then select the database creation and click auto create.
Go to the belvedere and create the new driver.
Select Client OPC
The server name will be on the menu drop down. National Instruments: NIOPCServers
You must be done and smiling.
Tags: NI Software
I have a windows xp but I n can't find driver for 1 cmpatible yet mp3 player and sensible is connected automatically
Unfortunately, the community of Windows is able to provide support in English. The following URL will help ensure that you receive support appropriate for your location information. Open the link and select your region from the drop-down list, and then click the arrow to continue.
recently installed xp pro but can't find driver for usb controller any help please model nx6325
Welcome to the HP Forum!
recently installed xp pro but can't find driver for usb controller any help please model nx6325
All the Windows drivers for your laptop are on Portal support business web users for your laptop HP. In the drop-down list, select Windows XP. It's an operating system supported so reinstall drivers.
Check the Basic Input/Output System (BIOS) for Legacy USB Support. To do this, follow the procedures below:
- Restart the computer.
where can I find driver for qualcomm cdma technologies msm for windows 7?
From the manufacturer/supplier of your device
I have a Sony CCD-TRV608 camcorder and can not find drivers for it to work with Windows 7. I've been on the Sony website and they do not have something there that I can find... most of the options you can choose to say there is nothing available after you select them. Problem #2 - I do not know what kind of cable I need to connect the camcorder to the computer. Any ideas? Thank you very much!
You will need a USB cable to connect the camcorder to the computer. You can directly connect the USB cable which you would have received with the camcorder and would appear as a plug-and-play device. If you have the software Camcorder installed on the computer, it will directly load the default drivers when you connect the camcorder.
If the USB generic drivers are unable to load when you connect the camera, check if the camcorder is compatible with Windows 7.
Irfan H, Engineer Support Microsoft Answers.
I want to reinstall the first métadata 8, but can not find downloads for version 8. I have the serial No. Where can I download the files for version 8?
Gordonbull I'm sorry, but I'm not aware of a public link to first Elements 7. You bought the software from Adobe directly? You always have access to the installation media?
I upgraded from vista ultimate to windows 7 64 - error message 0 x 80070490 windows can't find partition for temporary files - I have a lot of space and created a partition of 1 GB
Thanks for the reply.
I suggest you to follow a few troubleshooting steps more and check if this helps you fix the problem on your computer.
1 if please download the subinacl.msi from the following link and save the patch to installation on the desktop:
2. go to your desktop and double-click on the downloaded file.
3. Please select the C:\Windows\System32 folder as the Destination folder during installation. Later, we will use this tool to reset the permissions on the current computer settings.
4. click on the button 'Start' in the 'Search' bar type: "Notepad" (without the quotes) and press ENTER.
5. copy the following commands, and then paste them into the opened Notepad window:
Subinacl /subkeyreg HKEY_LOCAL_MACHINE/Grant = administrators = f
Subinacl /subkeyreg HKEY_CURRENT_USER/Grant = administrators = f
Subinacl /subkeyreg HKEY_CLASSES_ROOT/Grant = administrators = f
Subinacl % lecteur_systeme % /subdirectories / Grant = administrators = f
Subinacl /subkeyreg HKEY_LOCAL_MACHINE/Grant = system = f
Subinacl /subkeyreg HKEY_CURRENT_USER/Grant = system = f
Subinacl /subkeyreg HKEY_CLASSES_ROOT/Grant = system = f
Subinacl % lecteur_systeme % /subdirectories / Grant = system = f
6. After you paste the above commands, please close the Notepad window. Choose "Save" when you are prompted to save the file. Type "reset.bat" as the file name and choose "Desktop" in the Panel on the left as the save location.
7. refer to the desktop and right click the reset.bat file, then choose "Run as Administrator".
8. you will see a window of type BACK treatment.
NOTE: It may take several minutes, please be patient. When it is finished, you will be prompted with the message: "finished, press any key to continue."
If the same thing happens, move to the next step.
Run the upgrade by using the built-in Administrator
1. click the button start-> all programs-> Accessories.
2. right click on command prompt and select "run as Administrator".
3. click on continue when user account control window appears.
4 copy the following command and press ENTER:
NET user administrator / Active: Yes
5 restart the computer and then log on the computer of this administrator account.
6. run the upgrade to windows 7.
Hope this information helps you.
I can't find a driver VGA for my SA30-604
Aid is neaded.
What? I can t believe that.
On the Toshiba page, you can find the display driver! The driver was released without a doubt!
Toshiba has released 2 drivers for XP (ATI and Intel) and 2 drivers for W2k (ATI and Intel)
So check it out!
This desktop computer has been through a number of operating systems and should now have 10 32-bit Windows (for other software support needs). All right, except that it lacks drivers for connection to Ethernet (built-in) on board.
I tried the approach of Windows Update, the "update driver" and search HP, Intel, QLogic and other places of Ethernet NIC and Chipset drivers... nothing fits or works. The hard drive has long been wiped, so there is no recovery partition, nor do I still support discs. :-(
Is the reported by Device Manager hardware ID: PCI\VEN_14E4 & DEV_164A & SUBSYS_3070103C & REV_02. 164 a same device does not appear on the pci database. :-(
Yet once again, I need to Win10 - 32-bit (no 64 - bit). Thanks in advance for any help that can be given.
There are no W10 driver for this chip ethernet I can find.
In fact, everything that I could find were drivers for Windows Server 2003 and 2008.
HP doesn't even have driver Broadcom ethernet on your PC support page, and I couldn't find the site of Broadcom or the other.
I explored the Broadcom file and there is no support drivers for the hardware ID you have posted in the file.
So, the only suggestion I can offer would be to try the driver I compressed upwards and attached below.
Download and uncompress the file in its folder.
Don't do anything with the files in the folder.
Go to Device Manager and click on the ethernet controller requiring driver.
Click the driver tab. Click on set to update driver.
Select her browse my computer for driver software option and navigate to the driver folder, that you unzipped.
Make sure that the include subfolders is selected and see if the driver will install.
One of my friends has this laptop model (or another name: PSAA8E) and need to reinstall the operating system. The problem is that it doesn't have the drivers and I can't do them anywhere.
I research on the European Union or on the Toshiba site, it is not the drivers of the A100, only A300or higher.
On Toshiba.support there are 7 models from 100, but none of them is '121' or 'PSAA8E.
I don't know if all of these drivers are compatible or where to find compatible drivers.
I still hope that toshiba has kept somewhere drivers for older models of laptop.
The laptop was purchased a few years of the Spain.
I m wondering really you can't find Toshiba http://eu.computers.toshiba-europe.com/innovation/download_drivers_bios.jsp page driver download
I mean if there you can find the drivers for the A300, or more, it makes sense that older models can be listed in the archives, right.
Then please visit the new download page and check the archive.
It can be chosen in the type of product.
I have a hp elitebook 2540p with an i7 L640 intel SSD 160 GB corsair 8 GB of ram and windows 7 64-bit.
I would like to upgrade to 10 64-bit windows, but I can't find compatible drivers. I tried to update but the touchpad was not recognized by windows, the tactile bar does not work well, and I have not found one driver other than the video card driver.
I would like to know if there are drivers that are compatible with my laptop for Windows 64-bit 10.
Thanks for posting in the HP Support forum. Welcome!
Officially, your computer does not support Windows 10 because it is an old model. Supported are only Windows XP, Vista and Windows 7.
Windows 10 was created not even when Windows 10 has arrived.
Although not officially supported, if you plan to install and test with Win 10, you can view the ID of the material missing material and someone might be able to find some for you (but no guarantee). Instructions > > http://www.wikihow.com/Find-Hardware-ID
Personally, I would recommend that you take advantage of this computer with Windows 7. You have a wonderful notebook with excellent hardware configuration and nice operating system that will be supported by 2020. Something that usually works fixing it breaks
I can't find any other my removable drive as f drive on my computer. all this shows is my dvd drive (drive E). How can I find this show I can trasfer pictures on an sd card?
Have you looked into disk management to see if it is connected, but not given a drive letter?
Open Computer Management by clicking on the button start , clicking Control Panel, clicking system and Maintenance, click Administrative Tools and then double-click computer management. If you are prompted for an administrator password or a confirmation, type the password or provide confirmation.
In the Navigation pane, under storage, click Disk Management.
I'm sorry. I looked very hard, but I couldn't find a forum of mouse so I had to publish on printers. Hoping someone can help me.
Desperately looking for the driver for this mouse. This is a wired mouse dell with 2 side buttons and a scroll wheel. http://www.techexcess.NET/images/products/Dell/Dell-RP962-WS690-WS390.jpg
I'm looking for the driver so that I can configure the side buttons. Also the side scroll on the mouse does not right now. I guess that's because I don't have the driver.
Otherwise right now, once I have connect my laptop (Win Vista, 32-bit), the mouse works very well with the left and do a right click and vertical scrolling. However I'm looking to set up the side buttons and the scrolling. Tried very hard to find the driver on the Dell Web (Drivers/software) site but this mouse is not yet listed. (actually I'm disappointed that they have no listed in all optical wired mouse)
Help please! Thank you so much!
I'm sorry for the inconvenience you have suffered. You to use the link below and download the drivers that will help set the programmable keys:
My HP elitebook and windows 7, see the printer but can't find a driver. HP site does not support download for this device.
does anyone know were I can find a driver for device wide band Mobile Toshiba F3507 for Windows (64-bit) 10 and a driver for authentic Tec Inc AES1610 also for Windows 10?
What model of laptop do you have exactly?
Maybe you are looking for
Hello guys. its my first time posting a question and I would ask to recommend what motherboard to buy as a replacement for my current. I would like to put a graphic as a 960 gtx card but the motherboard doesn't have pcie connectors and the graphics c
Hi all Ive had my phone for almost a year now and for some reason any dvd drive does not burn the DVD, it burns cd perfectly but when it comes to bruning DVD it says that nothing is in the drive... Ive tried Philips DVD + RW and DVD + R Sony but stil
After you download El Capitan, it became impossible to download electronic books for my Sony Ereader. Me reader will connect to my Player library from checking over my player is not compatible with El Capitan. ??? I really hope that at some point in
Hi all I use a 3D graph to display the results of a particular set of tests. I want to change the legend on an axis according to which test I run, for example, the x axis to change its legend of Deg C at time (nS), it only seems to be a property to f
Original title: Windows Live Hotmail only opens a new window links e-mail composition! I recently put my Windows Live Hotmail account to my default e-mail client in Internet Explorer 8 on my Windows XP SP3 System. Unfortunately, whenever I click on a
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703511903.11/warc/CC-MAIN-20210117081748-20210117111748-00126.warc.gz
|
CC-MAIN-2021-04
| 14,169
| 133
|
https://www.ee.ryerson.ca/~courses/coe538/CodingStd/CodingStdGen/CodingStdGen.html
|
code
|
Ken Clowes (email@example.com)
Developing software requires some discipline. One component of this discipline that is often underestimated by beginners is the adherence to some set of general principles for organizing and writing source code. Many of these principles are are sufficiently general that they should be applied to all software irrespective of the programming language. For example, the principles described here can be applied to C, Assembler, Matlab, Java, C++, VHDL, Maple, tcl, Perl, shell scripts and others.
The source code for programming projects should always be organized and written with the future tasks of testing, debugging and maintenance (possibly by others) in mind. The coding standards described here deal with the larger issues that make these tasks easier. The most fundamental principle is consistency--whatever detailed coding standards you adopt, you should always follow them consistently.
The rest of this document expands on the basic principles outlined below:
In these cases, the public comments could, for example, be specially designed so that a ``man page'' or HTML description could be generated automatically from the source code public comments.
For example, the source code for a package of Java classes should contain public comments that can be used to automatically generate all the documentation a user of the package needs to exploit its features.
Some other languages such as C, C++ and elisp also have tools or conventions that allow the automatic generation of user documentation.
If the language does not have such tools, the programmer should
develop their own standards for clearly identifying comments that are
public. For example, one convention that I use for assembly language
programming is to start all lines that are public comments with
Public documentation should be accurate, but terse. If more lengthy descriptions are required, a separate user manual or on-line help interface should be designed and their existence should be stated in the public documentation.
It is also recommended that the public documentation of interfaces be written before actually coding the implementation. Specifying the interface focuses the mind on the essentials and allows the designer to review the interface looking for inconsistencies or ambiguities before committing it to code.
Since the reader of these comments is assumed to be competent in the programming language, obvious comments that clutter the code and insult the reader's intelligence should be avoided. For example, code like:
i++; /* Increment i */should be avoided.
Often, no private comments are required at all in well written programs. The use of descriptive names is also a great help. Indeed, Rob Pike states:
Basically, avoid comments. If your code needs a comment to be understood, it would be better to rewrite it so it's easier to understand. Rob Pike[Pik]
Avoiding comments completely, however, is sometimes too drastic a measure. The programmer should use common sense and consider the needs of the potential reader. If it is expected that the reader is a seasoned expert in the language, it may be appropriate to have minimal or even no private comments at all. However, if you think the reader may have only a smattering of expertise, more detailed private comments are reasonable. I find this to be especially true for scripting languages. For example, I sometimes write perl scripts but I am not an expert in the language and I insert private comments to remind myself what bizarre language feature I am using. Of course, a perl guru may find such comments superfluous and annoying.
Another situation in which detailed implementation comments are often appropriate is source code that is meant for pedagogical use by people just learning the language.
Numeric and string constants should be given symbolic names; this is far preferable than embedding ``magic'' numbers or messages in the source code.
The README file should be a pure text file.
The Makefile's default target should create the project's implementation from source code. Other common targets include:
You say toe-may-toes
I say toe-mah-toes
Let's call the whole thing off.
--Ira Gershwin (lyrics) and George Gershwin (music)
Source code should be formatted so that visual clues (such as indentation or vertical white space) aid in understanding the organization and logical flow of the implementation.
Different organizations and individuals may have specific detailed conventions that they follow and it is not our intention to stipulate any particular standard (which risks starting religious wars over minor details). However, as a general principle, I do prefer:
These rules ensure that you can always examine the source code on a dumb terminal and that you can embed it in an e-mail message easily.
With the emacs editor, there are special editing modes for almost all programming languages. To avoid tabs and limit line length, you can use the auto-fill mode and set indent-tabs-mode to nil.
I have written more detailed descriptions of coding standards for C[Clob] and assembler[Cloa]
C Coding Standards.
The Practice of Programming.
Addison-Wesley, Reading, Massachusetts, 1999.
Notes on Programming in C.
This document was generated using the LaTeX2HTML translator Version 98.1p1 release (March 2nd, 1998)
Copyright © 1993, 1994, 1995, 1996, 1997, Nikos Drakos, Computer Based Learning Unit, University of Leeds.
The command line arguments were:
latex2html -split 1 CodingStdGen.tex.
The translation was initiated by Ken Clowes on 2000-11-11
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887423.43/warc/CC-MAIN-20180118151122-20180118171122-00371.warc.gz
|
CC-MAIN-2018-05
| 5,552
| 40
|
http://trollhoer.blogspot.com/2010/11/night-goblin-color-scheme.html
|
code
|
Dear readers, I need your help. My next project will be a Night Goblin unit but I cannot for the life of me decide on the painting scheme. In particular, I'm having trouble deciding on how to paint their robes.
I'd like to tie them together with the rest of my larger orc force (my old Night Goblin units will be updated with the new color scheme as well), but I still like to make them slightly unique looking. I've managed to narrow it down to two options, and I'm asking you to lend your opinion and help me figure out how they should look. As always, click on the pictures to see more.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676588972.37/warc/CC-MAIN-20180715203335-20180715223335-00292.warc.gz
|
CC-MAIN-2018-30
| 589
| 2
|
https://forums.macrumors.com/threads/mobilemail-app-crash.368055/
|
code
|
I have installed all of the appropriate files in the right places (i.e. Applications, and System/Library/yada...yada...yada. I have also activated it via SHH. When I open the app., it opens for just a second and then shuts right back down. I got Maps to work great, but this mail thing has me stumped. Is anyone else having this problem or does anyone have a solution? Thanks guys.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829399.59/warc/CC-MAIN-20181218123521-20181218145521-00230.warc.gz
|
CC-MAIN-2018-51
| 381
| 1
|
https://forums.steinberg.net/t/segment-pitch-shift-without-processing/613122
|
code
|
As a sound designer I would like a quick way of changing the pitch of a segment by stretching the size. No resampling or time stretching needed. This would be a huge tool for the sound designer.
I think it would add nicely to the arrangement window object selection tool. Currently there is a time stretch tool as the third selection. What if there was a pitch tool? At the root it would just change the sample rate, no fancy processing needed and it would be always non destructive. I guess resampling could be an option.
You could pull it out twice as long and it would be one octave down. It would be instant as no processing is needed.
You could pull it out and snap to other sound effect segments to match timings.
You could iterate faster and try things like stretching it way out. Currently the pitch shift plugin is capped at 16 semitones so it would help get around that boundary.
This sounds like a no brainer to me. I mean why does a DAW have think like a tape machine and keep things so locked, it is digital?
What do you think?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522556.18/warc/CC-MAIN-20220518215138-20220519005138-00792.warc.gz
|
CC-MAIN-2022-21
| 1,040
| 7
|
http://linuxoniphone.blogspot.com/2008/07/conclusive-proof-that-there-is-no-way.html
|
code
|
In the process of testing NOR, I did a pretty lulzy thing. Remember what I said earlier about the memory controller possibly ignoring the first 4 bits? Well, the NOR device ignores the top 12 bits, since it's only 1 MB in total size. This makes a lot of sense. All the designers have to do is basically not wire up some parts of the address bus. So whether you try to address 0x0 or 0x100000 on the NOR, it looks the same to it.
The problem came about because I attemped to add too many images to NOR; a few 140 KB iBoot images can add up pretty quickly. The last one I added ended up shooting into the range reserved for NVRAM (at the end of NOR) and then "wrapping around" to clobber SysCfg, IMG2, and part of the LLB. =P
Hahaha, that's the equivalent of shooting yourself simultaneously in every vital organ. SysCfg stores your SERIAL NUMBER and other unique, irreplaceable pieces of information. The NVRAM contains information iBoot needs to boot up the kernel. The LLB is the thing that securebl tries to load in order to access everything else on NOR and bootstrap iBoot. As the coup de grace, IMG2 contains information that allows the LLB and iBoot to find where the Img2 data starts, so that they can be loaded. This mistake basically was the equivalent of erasing the entire NOR: Every single piece of information on it was rendered unusable. :P
Luckily, as the first test of my NOR driver, I had made a dump of my original NOR, so I was able to restore the SysCfg information. The interesting bit about all this is that you don't even have to do a restore and lose all your data on the NAND even, if you're clever. What I did was let iTunes talk to DFU mode to get into an iBoot. The iPhone actually has a pretty standard DFU mode, as defined by the USB standard. It reports itself as having the correct class, and OpenMoko's dfu-util manages to get, well, something with it. It successfully uploads the iBSS 8900 file (looking at a USB dump, it looks like just the entire file with the 8900 header, signatures, certificates, etc.) but reports that the firmware is corrupted. So at least it seems to use standard status indicators, etc. However, since I couldn't get dfu-util to work, I just used iTunes and pulled the cable out right after it finishes uploading the iBSS. DFU mode doesn't actually change the NOR, it just loads iBSS into memory and executes it. So after this process is done, iBSS will be loaded and you can connect to it via iBooter.
If you had pulled out the cable just a little too late, you can even see the commands iTunes executed on iBSS in the scrollback, Like setpicture and bgcolor. =P
Using the loaded 1.1.4 iBSS, you can bootstrap the necessary actions to restore your NVRAM from backup. I will talk about that in more detail in a future post. But the upshot is, even if you complete kill your "bootloader", and indeed, everything you can possible write to on the iPhone, you can still get things back to normal. :)
Unfortunately, I probably won't have a chance to work on iPhoneLinux stuff much this weekend. I have already been activated by the Dev Team because you-know-what is happening. Time to hax.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119361.6/warc/CC-MAIN-20170423031159-00221-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 3,144
| 7
|
http://forum.beeminder.com/t/tagtime-troubleshooting-cant-open-display-error/1186
|
code
|
I'm having trouble running on TagTime on my Macbook Air (Yosemite 10.10.5). I think the issue is with X11. Whenever I get a ping, I get an error message saying "Can't open display." Similar to: https://github.com/dreeves/TagTime/issues/45
Has anyone encountered this before?
Try running this command:
Before you do:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806447.28/warc/CC-MAIN-20171122012409-20171122032409-00471.warc.gz
|
CC-MAIN-2017-47
| 315
| 4
|
https://www.hellotrace.io/blog/bridging-data-and-business-teams-with-metric-trees
|
code
|
Data and Business teams operate in two different domains that speak different languages.
For example, data analysts speak in terms of datasets, keys, joins, columns, filters, and aggregations, while data engineers speak in terms of pipelines, dependencies, and lineage.
On the other hand, business domains use metrics, drivers, levers, segments, goals, tactics, strategy, initiatives, and features.
Being data-driven or data-informed requires effectively translating between these two domains. This involves cross-pollinating data and business teams to align them with the same end goals, which is easier said than done.
However, frameworks and tools can serve as powerful collaborative agents, much like engineering teams and how they interface with the business.
One such framework that can help is metric trees, which maps the processes by which the business operates and serves its customers - including the inputs, outputs, relationships, entities involved, and their states.
By building tools that help data and business teams collaboratively design and operate on metric trees, the translation friction can be significantly reduced. Or, even practically eliminated depending on the sophistication of the tooling.
This incentivizes more people to participate leading to dramatic improvements in the quality of conversations and decision-making.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00449.warc.gz
|
CC-MAIN-2023-50
| 1,350
| 8
|
http://ubarose.blogspot.com/2007/05/ultimate-geek-day.html
|
code
|
- Mountain Biking
- Picnic. Girly geek moment - Spotted a JLY 24H (blond/brown/freckles) wearing the new Flower Garden Dress at the picnic table next to ours. The mom let me take an up close look.
- Comic Book Store. Free comic day. They gave Z a butt load of comics. I bought the first three issues of the new Buffy books.
- Game Store. Got to see a demo copy of Tide of Iron . Al said the tanks looked squashed, and acted like he wasn't interested, but I saw a little drool.
- Star Trek (original). Have they stopped showing the remastered Star Treks? This is the second week in row they haven't been on. We watched a taped episode.
- Comic Book Reading Time. Read my Buffy's. Meh.
- Monty Python and the Holy Grail. Al wanted to watch Star Wars. Z wanted to watch Holy Grail. I was the deciding vote.
- Marvel Heroes. Played Marvel Heroes again. This time, with all the rules. Al and I were neck and neck until the last round, and then he blew past me. He wanted to leave it out and play again tomorrow, but I needed the room cleaned.
- Organize the Games. Moved a butt load of kiddie games that Z has out grown to the attic. We have mad room now.
Sunday, May 6, 2007
Ultimate Geek Day
This is what we did today.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592387.80/warc/CC-MAIN-20180721051500-20180721071500-00134.warc.gz
|
CC-MAIN-2018-30
| 1,215
| 12
|
https://hub.elliptic.co/learning/what-are-safts-and-safes/
|
code
|
What is a SAFT?
A simple agreement for future tokens (SAFT) is a contractual agreement promising future tokens to an investor, in return for consideration paid in advance. In practice, a SAFT is generally structured in the following way:
- A token developer needs funding to further their token project and so issues prospective investors with SAFTs.
- The token developer uses the funds raised from the SAFT to pay for the development of the tokens and any related platform.
- Once the tokens have been created, they are released to the SAFT holders.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00550.warc.gz
|
CC-MAIN-2023-14
| 551
| 5
|
https://www.appannie.com/cn/apps/google-play/app/jotart.sltheme.retro/
|
code
|
This is not a standalone application, you need Smart Launcher installed on your phone to use this theme.
You can download Smart Launcher from here: https://play.google.com/store/apps/details?id=ginlemon.flowerfree
Setting a theme:
1. Go to Preferences
2. Click Theme
3. Select Installed
4. Select Snow Time
If the theme failed, please change the theme to default first, then try it again.
If you have a problem or icon request email me please.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742970.12/warc/CC-MAIN-20181116025123-20181116051123-00066.warc.gz
|
CC-MAIN-2018-47
| 443
| 9
|
https://www.nber.org/papers/w31877
|
code
|
Combinatorial Discrete Choice: A Quantitative Model of Multinational Location Decisions
We introduce a general quantifiable framework to study the location decisions of multinational firms. In the model, firms choose in which locations to pay the fixed costs of setting up production, taking into account potential complementarities among production locations. The firm’s location choice problem is combinatorial because the marginal value of an individual production location depends on its complete set of production sites. We develop a computational method to solve such problems and aggregate optimal decisions across heterogeneous firms. We use our calibrated model to study Brexit and the recent sanctions war with Russia. In both counterfactuals, changes in the location decisions of multinationals are driving real wage responses.
This paper combines “Combinatorial Discrete Choice” by Arkolakis and Eckert, and the technical part of the first chapter of Shi’s dissertation titled “Solving combinatorial discrete choice problems in heterogeneous agent models: theory and an application to corporate tax harmonization in the European Union.” We thank Jake DiCicco, Tra Nguyen, Andrew Salmon, Benjamin Tong, Yunus Tuncbilek, and Nardeen Abdulkareem for outstanding research assistance. We also thank Chrysanthos Gounaris for early conversations on the topic as well as David Atkin, Arnaud Costinot, Dave Donaldson, Penny Goldberg, Navin Kartik, Samuel Kortum, Eduardo Morales, Nitya Pandalai-Nayar, and Steve Redding for comments and suggestions. Shi gratefully acknowledges support from the Princeton International Economics Section. Code implementing the techniques introduced in this paper can be found at https://github.com/rowanxshi/CDCP.jl. There are no additional financial relationships. The views expressed herein are those of the authors and do not necessarily reflect the views of the National Bureau of Economic Research.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00270.warc.gz
|
CC-MAIN-2023-50
| 1,951
| 3
|
http://taggartbonham.me/
|
code
|
Master any skill with these four principles.
Impact of climate change on energy generation in the 21st Century. Voted best Undergraduate Computer Science Thesis. Advised by Dr. Amro Farid.
A global, expert-reviewed platform for COVID-19 information and resources, advised by Stanford Faculty.
Connectome analysis of the Drosophilia and C. elegans shows complexity of feedback structures are related to evolutionary progress. Co-authored with Chris Miller and Sean McGowan.
The US must foster public-private partnerships to raise collective understanding of current threat vectors, incentivizing state-level policy and cultivating a new generation of cyber-defenses. Co-authored with Steve Westly, former Controller of California and Tesla board member.
Won Dartmouth's Startup Content, The Pitch 2019, with an ML-powered CRM system for students to develop their professional relationships.
Overcoming motion blur for indoor autonomous driving. Developed for Magna International with Clearpath Robotics.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703565541.79/warc/CC-MAIN-20210125092143-20210125122143-00289.warc.gz
|
CC-MAIN-2021-04
| 1,002
| 7
|
https://dynamicsuser.net/nav/b/admin/posts/global-implementations-with-dynamics-365-business-central
|
code
|
In my last post I wrote about how global NAV implementations used to be done. About the two different implementation models either a Template Core or One-Database Core. It took a bit longer to get this next “chapter” ready. Especially since a lot of the information has only been made available over the last week. Business Central was released this Monday, April 2nd.
The game changer was the release of NAV 2018 / Business Central. Extensions first came available in NAV 2017 and where are both very difficult to do and had a lot of limitation’s. With NAV 2018 and Extension version 2 they are much less time-consuming to do. Developing them using the “new” AL language in Visual Studio Code a very good and modern experience. And most of the previous limitations are gone.
More importantly Microsoft have started to ship their localization's as extensions, with Denmark being the first country.
I wrote in the post, that Microsoft has been “suffering” just as much as everybody else,by the way they previously have been handling localization's. Their (long term) goal is to have one version to maintain, their World-Wide (W1) version. Localization's will then be Extensions applied to a W1 version, including languages and everything.
The Danish localization for NAV 2018/Business Central still have a different base, but its C/AL source code is much closer to W1 than it was before. Translations of the C/AL objects are still made directly in the source code and there may also be more direct changes, which have not yet been converted to extensions. Just as many of the now obsolete local fields still are to be found in the database. Localized reports like invoice etc. are also still changed in the code and not in an Extension. Denmark did not have very complex changes to begin with. So that may be the reason that Microsoft started here. In Denmark the OIOUBL e-Invoicing was the change which had the most changes. In the December 2017 release of NAV 2018, it was still in the C/AL source code, but now from the April release this is also an Extension.
But most other countries have a lot more localization changes. The US-sales tax functionality for example. That’s going to be a very big Extension. Personally, then I would hope that Microsoft, would put it into W1 to replace the “sales tax” functionality here. The US sales tax module is great, a bit complex to setup, but flexible enough to have a lot of usage outside of the US. Italy, Spain, India, Russia etc. all have very complex local legal requirements, with a lot of changes to support this in NAV.
It is going to be a work in progress, such as it might be with many NAV implementations, that I think will take several releases.
Not only Microsoft are going this way now. The same message comes from partners, who have developed the localizations for so-called 3rd party countries. The countries where Microsoft does not have their own localizations. I.e. the localizations done by Pacific Business Consulting (www.pcb.co.jp) for Japan, Hong Kong, China, Vietnam and Thailand are either already shipped close to be released as Extension’s. And I’m sure the message is the same from the other localization partners.
Previously the W1 version was not a version you could actually buy from Microsoft. It was “just” the foundation for the localizations and not supposed to be used by customers. Many global NAV implementations are already based on this version. But it was always a trade-off, because using a local version also meant saying no to a lot of features available in the local versions.In the Summer of 2018, Microsoft has announced the release of a new W1 version. The difference is going to be that more of the features, which today is available in some localizations, will become global functionality. That could make perfect sense for a lot of features, which can be used by many countries.
I hope that Microsoft would consider moving the US sales tax, as I wrote above. Right now Microsoft has made no announcements in regards to what is going to be moved to the W1 version.
The short answer: Almost everything is getting much easier. Not just for global implementations, but for every NAV implementation.
When localizations are Extensions, then it really doesn’t matter, if we have individual installations/databases per country, or just a world-wide version with tenants with localization extensions per country.
In all countries with an official NAV localization (Microsoft or 3rd party), then localization issues become non-issues. You really only have to care about countries not supported. And here it’s very likely that their special requirement exists in one of the other countries. We will be able to focus on the implementation process and actual business requirements, rather than localization issues, which really adds no value to the companies.
Business Central is really all everybody talks about these days. And for large international companies that’s also good news. Microsoft’s previous Dynamics 365 ERP offerings did not only have ridicules long names but was also divided into in Business and Enterprise editions. Business edition had a user max of 250 users and was marketed towards small and mid-size companies and based on NAV (only a subset of features). Dynamics AX got re-branded to Dynamics 365 for Operations, Enterprise Edition (available both on-premise and in the cloud). Now the two editions are gone, instead we have Dynamics 365 for Finance and Operations and Dynamics 365 Business Central. With BC down being a “full NAV”, and no longer a user maximum, then NAV again becomes a valid choice for international companies.
Dynamics 365 Business Central is now a NAV platform hosted on Azure by Microsoft. A setup where the customer besides high-end hosting with a +99.9 up-time and build-in/ootb integration's to most of the Office 365/Dynamics 365 Ecosystem, also get a full NAV.
If a customer doesn’t want to go full-in on the cloud, then NAV on-premise licenses is still available until the fall. I have written a bit more about licensing further down in this post.
In Business Central the web client has also been improved. The differences to the Windows client becomes less and less.
Keyboard shortcuts and personalization has been added. Even if neither of these features are a near what they are in the Windows client, then it’s a start. I’m sure that most current NAV Windows client users will not find the web client good enough, if they use NAV more than 3-4 hours a day, depending on what they use it for of course. But that’s the topic for another blog post.
The fact that the Windows client is not available, will for sure mean that a lot of existing companies is not going to jump up on BC/SaaS for a couple or more releases. But let’s see how fast the product team works. I’m quite optimistic myself.
For new companies without previous versions of NAV, here I’m sure that most would opt for a cloud-based Dynamics 365 Business Central right away.
A further advantage of Business Central to an on-premise NAV, is that objects are free. Yes you heard right. In Navision and NAV we always have paid for the extra object we have used for customizations. A large international NAV project with a complex business model, count extra objects in the 1000’s. The extra cost just for objects is considerable, especially if you need to buy the same ranges to licenses in many countries. Definitely one of the old reasons for selecting the one-database core over the template core which is no longer there.
The first question you need to ask is if your core business functionality can be done using Extensions or if your requirements can only be solved change the standard NAV code with C/AL and C/Side?
If what you need can be done as Extensions, then all options are open. You may choose on-premise or cloud, one database or multiple installations.
If you need to change the C/AL, then you may have to choose the on-premise solution, NAV now and BC after the fall 2018. If your company is large enough eventually your base-core functionality could be done as an “Embedded App”, in which case the cloud is still an option.
If all your core functionality and business requirements can be done as Extensions, then the template core in the cloud is obvious. Low cost to get started, you just need to add your Core Extensions.
Each time you need a new country, then you start a new tenant. You install your Core Extensions, start setup, migrate data and train users. Microsoft takes care of infrastructure, hosting and monthly upgrades if in the cloud.
That is not possible if C/AL changes are needed. The best option is then that you create a hybrid, where you keep the absolute minimum changes in C/AL and move everything else to Extensions. That would typical mean required events/hooks, stuff with DotNet (may later be possible in Extensions on-premise) in C/AL.
Even if C/AL is still possible on-premise and no announcement in that direction has been made, then I would guess that Microsoft would drop it at one point after maximum 2-3 releases. By then I would also expect us to be able to do much more with VSCode and Extensions.
Each time you have a new country, then you will need a new license, a new database and a new server. And the localized version. Then you need to merge your (hopefully small) C/AL core into the country version. If there are no remaining code changes between the localized version and the W1, then no more will be required if based on same build. More or less the same as today, just a lot easier.
If your all core customization's cannot be done as Extensions, then the one-database core is obvious.
On-premise you should create a hybrid, for the same reasons as described above.
When all localization's are available as Extensions, then it will require a multi-tenant setup based on the W1 “no-localization” version and as a minimum one tenant per country. On these country tenants, you would the install the Extensions from the official or 3rd. party localization package.
Handling a One-Database Core is still not going to be trivial. Just as the One-Database Core model was never supported by Microsoft in Dynamics NAV, then I doubt that it’s going to be supported by Microsoft in Business Central. At least not for the first couple of years. That means there is no guarantee that the individual localization extensions may not be conflicting, even if they are not installed at the same time. Luckily the source code is also available for the Microsoft Extensions, so you may need to create your own versions of them.
As with the template core, if you have any C/AL changes, then the Cloud option is not possible. At least as the rule of thumb.
Microsoft also has Dynamics 365 branded vertical solutions or Embedded Aps. This is a way partners to have their own vertical solutions hosted by Microsoft. It made for the ISV’s who sells the same solution to potentially a lot of customers.
To be used for Embedded Core Apps, then it would require that the corporations either themselves sign-up to become a (non-selling) partner. Or that they work together with a partner to who manages it for them.
Notice: I have at time of writing this post, not been able to get this option confirmed by Microsoft. But if had a large enough number of users to interest Microsoft, then I’m sure that there is a way. Many of these companies may “only” have a couple of thousand full users in NAV/BC. But if implemented as D365, then it could easily bring in a lot of their new Team Users. Same as PowerBI and PowerApp, plus a connected D365 Sales suddenly becomes a lot more interesting. 1000 full BC users could easily bring in 1000+ team users in such a large organization. Don’t think it’s going to be possible for a small company with 4-5 countries and just a few 100 users.
When we talk on-premise/perpetual licensing, then nothing has changed yet. You still need a license for all the new objects you add to your solution. Even table and page extension objects need to be licensed.
When we talk Template-Core, then as before you need a license per database on-premise (minimum with starter pack, eventually with extended pack), plus a license per concurrent users. In the cloud you pay for named users, either essential, premium or team. You may therefor need more licenses in the cloud. But in the cloud there is no database license and no object fees. The One-Database Core may still be a license cost saver, when we talk very large on-premise installations. In the cloud the license cost of a one-database core would be about the same. You pay for number of named users.
Previously the two ways to get local functionality into a One-Database core was either to build yourself, or to try to implement the local objects and changes you needed. Whereas the copy-paste solution by copying the local objects sounded easy then was not that easy. Neither from a coding or licensing perspective. The only way i.e. to get a Danish localization to work in a US version, were to renumber all the objects and fields to the open number range (50000 to 99999) as all local features where in a locked country object number range, only available if you had a license with the same country code.
Where it technically is (hopefully) not going to be too challenging to get a Microsoft localization extension from one country, to work
in a different country (or W1) database. I guess that’s really Microsoft’s own goal here? Practically then it may not be as easy as it sounds. Unless Microsoft removes the current block from running the local objects from one country number range in a different country license. Right now, Microsoft also ships the source code to the localization extensions, to make it possible to change the local functionality. On less Microsoft comes up with a way to allow customers to add access to other country locations into their license, then it would still be required to the rename/renumber source and hope that the Extension again builds again. An alternative would be to have an individual license for each country tenant. So let’s hope that Microsoft will be looking into this.
Currently no announcements have been made towards changing the availability of on-premise/perpetual licenses for Dynamics NAV. I wouldn’t be surprised if big changes will happen here, when we come to the Fall 2018.
After the fall 2018 release NAV and Business Central will be the same system. Unless Microsoft makes a period with both, then all new licenses will be Dynamics 365 Business Central licenses, even on-premise (but that has not been Microsoft’s practice since NAV 2009). What that otherwise means in terms of pricing or licensing has still not announced. My own guess would be that it would mean a goodbye to Navision’s age old concurrent user principle. Even on-premise. They already have named users everywhere else, including the on-premise version of Dynamics 365 for Finance and Operations (the old Dynamics AX/Axapta). If they should have an incentive for customers to use more of the remaining Dynamics 365 ecosystem, then that would be included in the price.
I would also hope that they will have the same object licensing on-premise. No extra cost for extra objects. Migrating existing customizations to Extensions will very often require more objects, than they did in C/AL. Not only because what better option to get clean-code, than when migrating to Extensions, and clean code requires more objects, especially codeunits. And if you have added 20 fields to a table, then they may not going all be part of the same extension. Good practice is always to make your extensions as small as practical, and then eventually have dependent extensions.
But I have heard nothing about this so far, not even under NDA. That’s typically not the stuff they discuss with us MVP’s before releasing it, even if they are listen to our advises.
Before Microsoft came into the picture, before Navision Software and Damgaard merged, Navision and Axapta were two competitors, competing for basically the same markets. Since both became Microsoft products AX were positioned against the lower end of the SAP enterprise market. NAV were for companies up to a maximum of 250 users. Personally, I have been in projects where the companies were strongly under pressure to move from NAV to AX for years. And Microsoft did have a lot of good reasons for this. Not only did they need as many good references for AX as possible in the “enterprise segment”, but AX simply does have a lot more build-in “enterprise functionality” than NAV. That has not changed, except a lot of that functionality today is available for NAV from ISV’s, and more importantly Microsoft has (almost) solved their localization and upgrade issues.
With Dynamics 365 Business Central and Dynamics NAV 2018, then nobody should be afraid of implementing it globally in many different companies. It’s still the same perfect choice for the growing successful companies as Navision was 30 years ago.
Microsoft and BC are not quite there yet for all companies. That doesn’t mean you should wait, no matter if you are an existing global NAV customer, or you just consider using NAV in all your companies.
Disclaimer: This was written in April 2018, and this is not yet how it is done as of May 2021. The task of turning all localization's into extension's is a much bigger task than anticipated and will only happen when the new localization functionality is required, or when the functionality otherwise requires major updates/refactoring.
As I said the web client is not good enough for existing power users. Some of the most used shortcuts are missing. But as I wrote, I'm working about a blog post specifically about the web client.
The backup/restore issue when we talk cloud only, it's kind-of like when they removed the FBK option in NAV 2013 R2, when they introduced tenants. And I'm sure that they are working very hard to solve this issue.
As to the source code of Extensions, then all the source code for Microsoft's Extensions is on the DVD and on Docker. If you refer to source code for Extensions, that you buy from 3rd party ISV's, then that's more or less business as usual. I have always tried to go way around any add-ons which contained locked objects. And I will continue to do. It's important for the way we work with NAV.
As to overview over the objects (I guess you mean in the extensions), then I've already seen a post or two on that. Think that peikba has one on his blog.
I think we will have less need for NAV developers in the future. At least if customers are starting to use Extensions from AppSource. So I expect that there generally will be less customization's (both if we talk C/AL and AL). But as you and I know, then it does take a bit longer to add a field to a page and a table, using AL, than it takes in C/SIDE. And while I'm sure that we will also have the more "geeky" NAV developers, then we see more consultants, who can do "prototypes" with the Designer, tweak it up a bit on VSCode to get the customers acceptance, before handing it over to a hard-core developer to make all ends meet.
Knowledge about accounting and how businesses work is imperative for being a good all round NAV consultant and developer. And still it is not news that some partners hire developers who didn't know accounting or business. I have met lots of NAV developers who really don't know what debit and credit is. Some of them learn, most of them moves on to other more exiting jobs outside of the NAV world.
I'm not scared. Neither personally, nor on behalf of Navision. I'm rather optimistic in fact. Which is not the same as I find that everything in this release is great, nor that I would recommend anyone to upgrade/move to Business Central. But neither is Microsoft. Right now there is no upgrade option from NAV to BC. Don't think we will know it all until the fall release. /Erik
I do agree with you most of your saying but what about all of the drawbacks ?? Just to mention a few:1) Advanced filtering does not exist?2) No way of doing a backup/restore - (so having testdatabases etc is impossible)3) Missing the shortcut-keys in many of the places4) Total lack of object overview of the objects5) The missing source code of extensionsThe list is way longer than this. Don't be totally blind to all the negative sides. Yes there at loads of cool stuff application wise, development snippets, vscode as editor.. Becoming a Dyn/NAV developer is going to be complicated. All the gui-development-help with eg. shift F4 is gone. Finding properties, controls etc are going to be a total nightmare and the learning curve is not good.The future will end op in "core developers" not knowing anything about accounting, because of the complexity of devleopment - and that is scarying...Palle A
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991224.58/warc/CC-MAIN-20210516140441-20210516170441-00037.warc.gz
|
CC-MAIN-2021-21
| 20,924
| 58
|
https://gbatemp.net/threads/cover-issue.153302/
|
code
|
Hmmm nice progress on the usb-loaders. The thing that you could store covers on a FAT part on your USB hd is sweet like in the GUI-FX project. Now, is this function supported by the other usb-loaders out there? Or is it just that simple, just point your cover path to something like USB:/covers instead of SD:/covers in your config file?? Keep up the good work guys!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210105.8/warc/CC-MAIN-20180815122304-20180815142304-00434.warc.gz
|
CC-MAIN-2018-34
| 366
| 1
|
https://scholar.archive.org/work/7vspjvd5hfaqznaqvhbzlksjc4
|
code
|
Bethe ansatz solution for one-dimensional directed polymers in random media
Victor Dotsenko, Boris Klumov
Journal of Statistical Mechanics: Theory and Experiment
We study the statistical properties of one-dimensional directed polymers in a short-range random potential by mapping the replicated problem to a many body quantum boson system with attractive interactions. We find the full set of eigenvalues and eigenfunctions of the many-body system and perform the summation over the entire spectrum of excited states. The analytic continuation of the obtained exact expression for the replica partition function from integer to non-integer replica parameter N
... rns out to be ambiguous. Performing the analytic continuation simply by assuming that the parameter N can take arbitrary complex values, and going to the thermodynamic limit of the original directed polymer problem, we obtain the explicit universal expression for the probability distribution function of free energy fluctuations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00331.warc.gz
|
CC-MAIN-2023-14
| 994
| 5
|
https://forums.ni.com/t5/LabVIEW/how-to-simulate-mouse-click/td-p/207177
|
code
|
Hello, is it possible to simulate and control a mouse click in windows with labview 7.1. I am able to control the mouse coordinates but not right and left mouse click. Is there a available VI that can do that?
I'm not exactly sure what you're attempting to imply by "control a mouse click", however in the "event structure" area there is the option to have responses fired when mouse clicks occur; controlling both right and left mouse clicks. This isn't always the most pleasureable way of doing things, because it refers to any click. You might be able to set it up to ensure only clicks in certain areas, however this will take some research on your part. Just look through how to control event structures, the mouse option is under the "this vi" (or so i believe the name goes) section.
I have answered this in the other thread where you asked this. Please don't post the same questions to multiple threads. After looking at the VI there, it uses the PostMessage function to post a mouse down message to a specific window. You can try using MouseEvent or SendInput to simulate a general mouse click (One of them is no longer supported, I can't remember which. You can find the details in the MSDN).
Hi, I am new in Labview, so is there an available Vi that gererate random mouse clicks. I think that mouse clicks can be done with a boolean control? is that right. So what would help me is a VI where i can control the entry (perhaps with a boolean) and then with this control execute a mouse click (if possible right and left click) on the windows front panel .
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00819.warc.gz
|
CC-MAIN-2023-50
| 1,565
| 4
|
https://help.octopus.com/t/how-to-deploy-sql-scripts-to-an-aws-rds-instance/27761
|
code
|
I’ve long been using Octopus Deploy to deploy SQL change to SQL Server instances hosted on EC2; however, I am now looking at doing similar with SQL Server instances hosted on AWS RDS. The executable part of the application is running on AWS ECS Fargate, and that part is all set up and running nicely.
So assuming that my build process has created a NuGet package that contains one or more SQL scripts that needs to be run against a SQL Server database running on AWS RDS, what’s the best way of going about this in 2022?
A few problems I’ve come up against:
- I can’t see how to create a deployment target, since I can’t create a new tentacle;
- When I add an Extract Package step, it wants to know where to execute the step, and since I couldn’t complete #1 above, I’m kinda stuck.
Have you used workers before? You can use a worker in Octopus to run your database migration scripts much like you would on a deployment target.
I’d recommend looking at this blog to give you an idea of how to set this up. The program to run scripts is DbUp, but it covers how to use workers to run the DbUp program.
If you have any questions, please let me know.
Yes, I have used workers before, and that’s what I want to be doing, but my problem for now is that I can’t set a deployment target, because I can’t see any obvious candidates for AWS RDS. I’ve used worker pools before when deploying to a database hosted on EC2, but that’s never been a problem because I can install Tentacles on EC2; that’s not an option on a managed database server like AWS RDS. Octopus has built-in support for AWS ECS, so the serverless configuration for the other components of my application isn’t an issue.
In the Deploy A Package step, where I am extracting my SQL scripts from the NuGet package emitted by my build system, there is no option for deploying to a worker - only to deployment targets:
Other steps in the process (such as Execute SQL Script) do give me other options for execution location, including worker pools:
Install Tentacles and Workers for database deployments - Octopus Deploy says that if I want to extract a package, then I cannot use worker pools, and must set up a jump box, but it seems a bit extravagant having an EC2 instance sitting around waiting for deployments when the rest of our infrastructure is serverless. Are there any other approaches I can take? Are offline package drops any use?
Sorry, for the delay in responding!
Rather than using the deploy package step, you can use the run a script step and reference a package instead. Ideally, you would create a worker pool that contains workers for running database deployment scripts in your AWS ECS cluster.
This blog covers referencing packages in a run a script and here is a sample (you can sign in as a guest) of an Octopus deployment process running database scripts using referenced packages.
I think this does help you get around your problem but if you have follow-up questions please let me know.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530066.45/warc/CC-MAIN-20220519204127-20220519234127-00647.warc.gz
|
CC-MAIN-2022-21
| 2,998
| 16
|
https://bandaancha.eu/articulos/windows-xp-sp2-reduce-redimiento-emule-2685
|
code
|
Microsoft ha disminuido el número máximo de conexiones por segundo en Windows XP SP2 para reducir la velocidad de propagación de gusanos como sasser. El efecto de esta medida también lo notan aplicaciones como Emule que ven reducido su redimiento ante la imposibilidad de usar más conexiones.
"Thanks very much for responding. This new feature is one of the stack's "springboards", security features designed to proactively reduce the future threat from attacks like blaster and Sasser that typically spread by opening connections to random addresses. In fact, if this feature had already been deployed, Sasser would have taken much longer to spread.
It's not likely to help stop the spread of spam unless spammers are trying to reach open email relays in the same way, by opening connections on smtp ports of random IP addresses. This is new with XP SP2 and we're trying to get it right so that it does not interfere with normal system operation or performance of normal, legitimate applications, but does slow the spread of viral code. New connection attempts over the limit for half-open connections get queued and worked off at a certain (limited rate)."
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823183.3/warc/CC-MAIN-20181209210843-20181209232843-00238.warc.gz
|
CC-MAIN-2018-51
| 1,163
| 3
|
https://www.centroid.com/microsoft-technology/
|
code
|
Our managed cloud services team can design and implement industry-focused, integrated solutions leveraging Microsoft technologies across a variety of practice areas.
Centroid has a proven track record managing application development projects. Our consulting services have both on- and off-shore capabilities.Our cross-platform Oracle and Microsoft expertise sets us apart from others who focus only on Microsoft technology. We understand the nuances of our client environments and deliver truly integrated, end-to-end solutions.
Take the next step
Contact us today for more information about our Oracle Cloud services and solutions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474746.1/warc/CC-MAIN-20240228211701-20240229001701-00695.warc.gz
|
CC-MAIN-2024-10
| 633
| 4
|
https://www.project-management-prepcast.com/kunena/pmp-exam-lessons-learned/2079-passing-pmp
|
code
|
Congratulations! Let us know your lessons learned and how our products have helped you prepare.
Please remember that you are not allowed to discuss any specific questions that you encounter on the exam.
I passed the PMP Exam on 22/03/2011 with 3 months of preparation. Below is my lessons learned.
My early start was with PM Prepcast, I keep lessening, watching and lessening until I got familiar with PMP framework, process groups, inputs, outputs & techniques. Then I moved to Rita PMP Exam Prep, I read it deeply for the first time, jumping into her simulation program (PM FastTrack), solving more than 1400 questions, then back and review the book again.
My last 2 weeks preparation was on Pm Study, I used their free 200 questions exam, after that, I subscribed into 3 PM Study exams with about 600 questions, it was very useful.
My last day before the exam, it was just a quick review on Rita PMP Exam Prep and got some practices on EV calculations.
The exam was very tough, even I think to leave my exam after answering 100 questions but I change my mind and moved on. And the result was PASSED.
My appreciations to Rita, Cornelius , PM Study guys.
This interview with Simona Fallavollita (LinkedIn Profile) was recorded at the magnificient Project Management Institute (PMI)® Global Conference 2017 in Chicago, Illinois. We discuss the how, what, why and when of the changes that are coming to the PMP exam.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812247.50/warc/CC-MAIN-20180218173208-20180218193208-00194.warc.gz
|
CC-MAIN-2018-09
| 1,416
| 9
|
http://cloudcomputing.sys-con.com/node/3053968
|
code
|
|By Skytap Blog||
|April 10, 2014 11:19 AM EDT||
Noel Wurst: Hello, this is Noel Wurst with Skytap and I am speaking today with Peter Coffee. Peter is the VP for Strategic Resource at salesforce.com and he's also going to be taking part in the SDLC Acceleration Summit on May 13th in San Francisco, California. Peter how are you doing today?
Peter Coffee: It's great to with you Noel. I'm fine, thank you.
Noel Wurst: Great, awesome. Well, I was going to say that I had the privilege of reading your bio online. I recommend listeners go online and check it out for themselves. It's such a varied background, you've done a little bit of everything. I saw everything from aerospace, the defense sector, alternative fuel research, video game development, and I was curious as to what you're working on now with Salesforce or outside of there. What's piquing your interest these days?
Peter Coffee: May job was created seven years ago at salesforce.com, three years after I had a breakfast conversation with Marc Benioff about what it would take to let people build things on the web; We didn't call it the cloud seven years ago. as readily as some of the tools like Hypercard or Visual Basic or letting them build things on desktops and get rid of idea that you had to build the app with all of the same complexity and difficulties and then have addition compounded difficulties putting it up online. But instead, be able to get to something that allowed you to build it as readily as if you were just going to run it on your PC, and then make it securely and reliably available to people anywhere. That was the vision for what the next generation platform needed to be. And if you think about it, the web went from being a medium where you can publish stuff for other people to read, to posting stuff on which other people could comment, to now where it really is a medium for taking what you know and packaging it in a way that makes it available for other people to use.
There was a peer research report that just came out recently that said, you've got to stop thinking of the World Wide Web as the world's library and start to think of it as the world's supercomputer.
Peter Coffee: That's really what has fascinated me in all of the areas where I've been fortunate to have the opportunity to work, is that we have tremendous facilities available to us now. Not to look at one or two isolated blank ideas about what might work and then pick the one that works the least badly. But really to start mapping and entire spaces of solutions that are available to problems and really being to hunt for something close to optimality on how we get stuff done. I think that's what's really exciting in every field today, is the opportunity to pursue optimality instead of settling for incremental improvement.
Noel Wurst: It's definitely an exciting time to be in that field with all the different capabilities that are popping up day by day and month by month. I noticed that the session you’re giving at the SDLC Acceleration Summit—the session or panel that you're going to speaking on is titled, “Faster In What Direction?”
Peter Coffee: Yes.
Noel Wurst: The abstract warns specifically against “accelerating a legacy model or mistaking it for progress.”
Peter Coffee: Yes.
Noel Wurst: And, like you were just saying, with everything changing so much and changing so quickly, I was wondering if maybe there is an enterprise or a company that is changing quickly—what are maybe some of the warning signs that should maybe alert themselves that maybe they’re not moving in the right direction? Or maybe they are changing quickly, but maybe it's not for the best.
Peter Coffee: The interesting thing about the place that's loosely called “Pod Computing” is that it's very much like a supermarket in which you can walk in, and if you know what you're there to buy—it's there. If you go to the rice and beans aisle you'll find sacks of ingredients at an attractive price. And you'll take them home and you'll have to do a lot of work before you can put the food on the table. But if it occurs to you to look in another direction, well over there's the deli counter where there's some very interesting things that you might not even attempt to create yourself, that are ready for you to consume pretty much as soon as you get them home and pop them in the microwave.
That's really where the cloud marketplace is today. You've got the infrastructure cloud of virtual servers that you can spin up by the minute or the hour and do traditional skills intensive, error prone, complex and innovation limited IT at an attractive cost.
Then you've got the platform as a service and software as a service markets where you can find tremendously innovative best practices solutions available for you to use immediately and modify and tailor to become uniquely yours. I think that's the biggest caveat that I have to offer people who are attracted by the obvious economies and accelerations that virtualizing legacy IT can provide, and who think that that constitutes victory when they aren't realizing that the next logical step is to move beyond wiring up their virtual machines the way they wired up their physical ones. Instead say, “well what if I were thinking about what I do? What if I was thinking about application construction as composition and orchestration of services and the linkage at the API level, instead of composition of hardware and linkage at the binary data transfer level?”
Noel Wurst: That's a really great analogy, the “rice and beans aisle” that you said before. That's exactly what the situation is. There's all these options out there for people to change for the better, and to be able to accelerate their entire business, or the SDLC. But at the same time, it's still really difficult for people to change. Even if they see the success that other companies have had by changing and by reinventing their processes.
But I was kind of curious as to ... I know why it's hard for people to change. But what are some of the things, the reasons that those who are still maybe embracing somewhat outdated technologies. What are some of the reasons that they shouldn't fear that change? Besides just, “it'll get better” or “it's going to be great in the end.” The ones where that's not enough to convince someone to make that kind of investment or make that kind of change. What are some reasons to not fear that path or completely different direction for their business?
Peter Coffee: It's perfectly logical for people who've invested years or decades in mastering a set of skills to seek reasons to believe that those skills are going to continue to be the definition of their value and the source of their livelihood to the rest of what they hope will be a healthy and lucrative career. It’s completely logical for them to look for that validation. We know from any number of different research fields, that people will find confirming evidence for what they want to believe, and will be remarkably successful, even if unconsciously ignoring disconfirming evidence. So I completely get this and I don't attribute bad motives to anybody.
Noel Wurst: Right.
Peter Coffee: What I do find is that there are some organizations that are starting to look at this as much more of an opportunity to have greater leverage and to catalyze dramatic improvements. For example, I was just at the headquarters at one of our customers, USAA, which is a massive insurance company that primarily sell their services to military and ex-military. You've seen their advertising.
Their annual technology forum, their in-house event, has 3,000 people attending it. It’s the size of one of our larger metropolitan events. They asked me to come and do a seminar on how the IT department could best serve, what they call, “the citizen developer”—which I believe might be a phrase that Forrester might have been the first to popularize. If you think about the way that the spreadsheet allowed people to model and experiment with a process, instead of having to go hat in hand to the business analyst, and beg for some COBOL to do that work.
It's the next logical step to go beyond the spreadsheet on a network share with an email thread wrapped around it to something like a Force.com app that runs in the cloud, has proper security, auditability, governability, back-up built in as a service, and the IT department can tremendously increase its value to the business by providing what we might call adult supervision to the citizen developer.
To provide guidance on compliance, process integrity, data dictionary discipline and so on. And the IT departments that are starting to say, “You know, tugging the old workload and keeping that to ourselves is a poor strategy for increasing our value to the organization compared to being vigorous and creative in providing support to the business units.” In taking advantage of the lower barriers to entry and the considerably higher productivity they can have by building what will be a much more disciplined application.
Everyone talks about Shadow IT today. It's this dark matter of the IT universe that doesn't shine with its own light and it's very hard to find it. But we all know it's out there stretching from desktop databases and other things that are not visible, not governed, not recalled, not auditable, and not really contributing to a store of knowledge that turns the company into a learning organization. The IT departments that I think are doing very well, and there are existing groups of these, they’re saying, “Our best contribution is to take things that a very difficult to learn and very easy to do wrong and still have an enduring value like basic disciplines of process integrity and find a way to sprinkle those on top of the old coffee of the legacy infrastructure and turn it into something that's much more exciting.”
Noel Wurst: That’s so great. It reminds me, I also had the chance to interview Theresa Lanowitz, who's also going to speaking at The SDLC Acceleration Summit, and we were talking specifically about the “extreme automation” that comes from utilizing some of these new technologies and it's like you were just saying as far as the way things were done in the past.
The definition she had of extreme automation, I asked her to define it, was “solving classic problems with new technology and tooling.” Essentially saying people who are maybe of skeptical of automation, or are very quick to say, “Well automation doesn't solve everything,” basically she was saying automation doesn't solve everything, but at the same time, it's not solving anything new that you haven't seen before. It's solving a problem that may have existed in your organization for years. It may have been problems that is kind of just always laid around because there wasn't extreme automation there to help solve those.
I was curious if you would maybe define extreme automation the same way or basically see the same value that it solves the problems that are well-known, well documented and widespread across multiple enterprises.
Peter Coffee: Well, I don't know if you remember, there was a minor sub-plot in the book of Jurassic Park that I think they decided was too complicated to bring forward into the movie, about how the eye of the frog doesn't even bother to tell the brain about things that aren't moving. Because the brain wants to focus on things that are moving and therefore might be targets for eating. The eye doesn't even bother to tell them about the stationary things. I think a lot of us are really good at ignoring stationary problems that have been with us for so long that we stop even to think of them even as problems and just think of them as part of the environment.
I like the phrase of “extreme automation” because it invites us to go and, pardon the expression, rip the scabs off some of those old wounds and say, “Can we afford intellectually and financially to reexamine some of our assumptions about things that we're just going to have to tolerate. Because maybe we don't have to tolerate them anymore.” That can require some creativity and it can also require taking some risk. Because you're going to be bringing these ideas to senior managers who may have built their careers on the existence of these “problems” and of the construction of elaborate and complicated work arounds to these problems. And you're essentially coming in and saying, “Yeah but, what if we stopped calling that problem something that we have to tolerate at all? What if we just destroy it? What if we just cut the Gordian knot, to use another old metaphor. Instead of spending tons of effort, time, and money untangling something—we just cut it in half. That's a career risk and an intellectual challenge and a skills and technology challenge.
But there is always something going on at any given time that forces that kind of disruption. Back in the 1960s everybody was worried about the space race. So we had projects Apollo, which did some things at the time that were considered frankly impossible until people felt that they had to find a way to do them. Then they discovered ways to do it. I think our next project Apollo is the aging of the baby boomers who are going to need adaptive and assistive technology. To make it possible for them to age gracefully at home instead of going into nursing homes which we simply won't be able to afford to build at that kind of scale.
So things like a Nest thermostat are really just kind of the tip of that spear in terms of saying, “You know, we need to rethink automation from something that lets people program things to do stuff into devices and algorithms and systems that are aware of an environment, learn what's normal, call attention to that which is abnormal and therefore perhaps requires someone to do something—and that's really where we need to go with business IT as well. It’s to get beyond the idea of the bigger and bigger dashboard with more and more performance indicators and get to much smarter systems that notice when things that have been behaving in a coordinated way suddenly don't seem to be coordinating. That suggests an anomaly that detects for data science disciplines what I might call “pre-failure signatures” and are able to say, “I don't know why this is happening. But I know that when it does happen, a week later something much much worse usually happens. So then you'd want to take a look at this now.”
This is a very interesting time for developing new categories of algorithms that don't just capture the byproduct of business activity, but inspect those patterns and look for interesting high leverage points that allow people to take an inexpensive action at the right time instead of a much more costly disaster recovery or damage control action later on.
Noel Wurst: That's all so great. And then lastly, it's all kind of come to this. It's interesting, all of this technology we've been discussing of course involves the cloud. But I watched a video on YouTube recently of a presentation you did at PhillyForce last year that was titled “Connecting Above the Cloud.”
It's funny, I'm writing an article this week about the same thing, and I'm going to use a piece of your your presentation in the article. You talked about the cloud metaphor and how the industry didn't choose that term. You said that “connected” and “social” work a lot better than just saying “the cloud.” To quote you from that presentation, you said, “The cloud is only interesting because of the connections that it enables.”
That's really interesting, because I think we've only said the word cloud two times in this whole interview. Back in the day, “cloud” was in every other sentence. I feel like even though cloud adoption of course is going up, and all kinds of news came out this week about how it’s ramping up quickly—yet, we're saying the word “cloud” less and less. I really like the way that successful enterprises have been able to enable these connections between their customers.
But I also like how much the cloud, to go ahead and say it again, has enabled developers, testers, IT, DevOps, and all this connectivity that goes on kind of behind the curtain, not just among the people who are kind of using these apps. I was kind of wondering if you might maybe expand on how this technology is helping enterprises themselves, but not just not just the consumers who use these apps.
Peter Coffee:Sure. Well, you know it's almost an accident of history that Intel had a commercial imperative to develop the integrated circuit and the microprocessor before it became practical to have a global standard spaced wired and wireless network. Because we had a period of several years, a little over a decade really, when we went from the 4004 microprocessor, which was barely enough to run a four-function calculator, to things like 32bit computers on a chip.
During that time connectivity was expensive, slow, and intermittent. I compared it the other day to being colonist on Mars with our little bubbles of air and having to put on a spacesuit to go from one to another. Inside that bubble which was in the IT world, inside your data center or inside your local area network, you could be reasonably comfortable. But as soon as you wanted to do something that involved going from one bubble to another, well this was a perilous exercise. You had to use your dial-up modem or it was like putting on your spacesuit for a brief moment of interconnection with another bubble somewhere else.
During this time, we've essentially been terraforming planet computing. We've got an atmosphere now that you can breathe without putting on a spacesuit and if there's still people walking around with air tanks on their banks, that they call their “private cloud.” Okay, and it doesn't make any more sense in the world of IT then it would make sense in a world of a terraformed Mars. To ignore the fact that the environment now is different. The environment is now of ubiquitous connectivity with what was comparable with what we used to find more than sufficient in an office building. You can see this in the behavior of people. They are saying, “Now wait a minute, why would I buy a laptop computer, which is essentially a spacesuit? It's its own hard drive, display, battery, keyboard all this stuff and all. All I really need is a little magic piece of black glass which might be the size of a phone or it might be the size of a tablet. All I need is that thing which is a window into this world of available information, computational capability, connection with other experts, connection with algorithms and supercomputing facilities.”
There's an awful lot of stuff that used to sort of make sense to build more and more powerful desktop machines to do. But people are now saying, “But wait a minute. I don't actually want to do that on my desktop at all. I don't want to video editing on my desktop, I want to upload the clip from my smartphone to YouTube and let YouTube worry about things like compression algorithms and making it run on different devices and things like that.” This is a hard challenge. It's to get beyond thinking of the cloud as a product and start thinking of the cloud as just an enabler for things that are much more interesting products.
Because if I can drag one more metaphor in, I once said, a gourmet chef does not talk about the miracle of clean water being available from a faucet whenever he needs it. He assumes that's going to be there because you can't really talk about doing cooking without it. But once you've got it, you don't really think about it very much. You don't think about the miracle of electricity when you're building your home theater. That's invisible. That's assumed and you're thinking instead about what's the amazing experience I can that create given the assumption of that pervasive reliable cost-effective resource.
It's really important to get beyond cloud and start thinking about, “Wait a minute, what do I have to do to step up my game? To be a value creator by using this medium of connection, by using processing power and algorithms of discovery and analysis, to create a kind of customer experience, or the kind of government first-response in a disaster, or the kind of life-long delivery of education that were never really feasible to discuss until we had this remarkable atmosphere in which we breathe data and breathe computational power whenever we need it.”
Noel Wurst: Well, that is all I have for you today. I am really looking forward to attending your presentation at The Summit as well as the other ones that are going on there. Again, everyone, this is Peter Coffee, the VP for Strategic Research at salesforce.com. Peter speaks all over the world, and he’s going to be at the SDLC Acceleration Summit in San Francisco, California on May 13th. Thank you so much for speaking with me today.
Peter Coffee: Thank you very much. I always tell people I never know what I think until I have to answer questions. So, these conversations always tell me things that I didn't realize I was thinking about until I have them. Thank you for the time.
Noel Wurst: Awesome, thank you.
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
Jun. 25, 2016 12:00 AM EDT Reads: 598
The initial debate is over: Any enterprise with a serious commitment to IT is migrating to the cloud. But things are not so simple. There is a complex mix of on-premises, colocated, and public-cloud deployments. In this power panel at 18th Cloud Expo, moderated by Conference Chair Roger Strukhoff, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Commvault; Dave Landa, Chief Operating Officer at kintone; William Morrish, General Manager Product Sales at Interou...
Jun. 24, 2016 10:00 PM EDT Reads: 607
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
Jun. 24, 2016 08:00 PM EDT Reads: 783
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Jun. 24, 2016 04:30 PM EDT Reads: 427
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Jun. 24, 2016 02:15 PM EDT Reads: 324
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Jun. 24, 2016 01:30 PM EDT Reads: 740
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Jun. 24, 2016 01:00 PM EDT Reads: 1,282
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
Jun. 24, 2016 12:00 PM EDT Reads: 1,528
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
Jun. 24, 2016 12:00 PM EDT Reads: 688
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Jun. 24, 2016 12:00 PM EDT Reads: 446
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
Jun. 24, 2016 11:45 AM EDT Reads: 879
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jun. 24, 2016 11:15 AM EDT Reads: 561
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t...
Jun. 24, 2016 11:00 AM EDT Reads: 921
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Jun. 24, 2016 10:30 AM EDT Reads: 846
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
Jun. 24, 2016 09:45 AM EDT Reads: 661
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Jun. 24, 2016 09:45 AM EDT Reads: 1,141
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Jun. 24, 2016 09:30 AM EDT Reads: 1,091
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Jun. 24, 2016 09:30 AM EDT Reads: 561
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, discussed how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He also discussed how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors ...
Jun. 24, 2016 09:15 AM EDT Reads: 614
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Jun. 24, 2016 08:45 AM EDT Reads: 1,186
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00157-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 31,955
| 86
|
https://support.cdn.mozilla.net/en-US/questions/1399725
|
code
|
Today, never happened before, when I went to sent an email, I got the following message: "Sending of the message failed. An error occurred while sending mail. The mail server responded: <email@example.com> sender rejected. The email address you are sending as must match the email address you used to auth. Please check your SMTP settings. AUP#Out-1500. Please verify that your email address is correct in your account settings and try again." I contacted mt email service, no problem. They said it was the 3rd party problem. I'm not a "techy". Pretty much computer illiterate. Need much help with situations. The recent update made many confusing problems from the previous issue, not a happy camper. Thank you anybody
Modified by Craig
All Replies (3)
check your SMTP settings carefully. That error indicates your smtp server email id doesn't match your account email id. If not sure, please post screenshot of input server settings and SMTP server settings.
I went to Outgoing server, only, I don't have anything showing but I did when I first opened Account Settings
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00137.warc.gz
|
CC-MAIN-2023-14
| 1,070
| 5
|
https://community.intel.com/t5/Intel-Unite-App/Best-Skeleton-Tracking-application-for-Matlab/td-p/1222887
|
code
|
I am currently working on a project which is centred on the use of motion capture and skeleton tracking. The lab owns four RealSense D435 depth cameras.
My colleagues and I are aware of the existence of many skeleton tracking applications but the majority of them use Python or C++ as interface: we are looking for a skeleton tracking application that works with Matlab. Do you know any such app?
Thank you very much in advance,
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948217723.97/warc/CC-MAIN-20240305024700-20240305054700-00516.warc.gz
|
CC-MAIN-2024-10
| 428
| 3
|
https://community.filemaker.com/thread/190981
|
code
|
Goodmorning to everyone.
I would like to start a topic here to discuss a payment integration into my Filemaker solution.
I'm using FMA17 and FM cloud 17.
What I am trying to do is integrate Mollie (which is a Dutch competitor for Stripe) into my Filemaker solution.
Why Mollie and not Stripe? Because I'm using my FM solution in Belgium and the payments options they offer suit businesses here more then what Stripe offers.
So what I want to build:
- My FM solution currently generates an invoice automatically in .PDF format.
- I want to send an email to the customer automatically with the .PDF in attachment.
So far so good, that is something which I fully understand and can build.
The problematic part is the following...
- In that email the customer should receive a 'pay now' button or weblink.
- When the button 'pay now' is clicked there should be a 'POST' create payment request send to the Mollie Payment API. The POST should have the correct CURL options with amount, description and currency.
- This would on its turn generate a payment which expires within 15 minutes. It would also respond a unique payment URL back where the customer can checkout with his preffered payment method.
- After payment is successfull the client gets redirected to a 'payment successfull' page with payment details on it.
- And the FM solution should import the payment status and change it dynamically into a listview (PAID/UNPAID)
Now that's what I understand, from Mollie's documentation, is the workflow.
But how do you build something like this? For instance I know now how to do the POST request with the CURL options. But how do you make a pay now button generate an adaptive POST request?
I understand some parts of it but I'm also quite lost in space here.
Could someone try to help me understand my problem and guide me a bit through this?
Getting this payment solution working is very important to me.
So your input and time is very much appreciated!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202588.97/warc/CC-MAIN-20190321234128-20190322020128-00518.warc.gz
|
CC-MAIN-2019-13
| 1,955
| 21
|
http://il-adan.blogspot.com/2016/03/accessing-azure-data-lake-storage-from.html
|
code
|
with application authentication and it worked.
But once I tried to connect to the existing data lake store - it won't. Giving me a cryptic error:
Exception of type 'Microsoft.Rest.Azure.CloudException' was thrown
with even more cryptic insides like:
FsOpenStream failed with error 0x83090aa2
I have tried fixing file location, assuming may be /myfile.txt is wrong for the file in the very root. Nope. It is all simple, ...as usual.
Remember giving access to your application to the resource group (or subscription or whatever you choosen)? Well, this is not good enough - you have to give access to the data lake store folder explicitely, as it does not inherit it (as I expected it would).
Browse the data lake store, and click on access - app is not there!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823320.11/warc/CC-MAIN-20181210080704-20181210102204-00450.warc.gz
|
CC-MAIN-2018-51
| 758
| 8
|
https://www.concurrency.com/expertise/microsoft-365/communications-and-collaboration-(2)
|
code
|
Your employees are rapidly evolving to using multiple devices, working remotely, and needing to connect easily with customers. Simplify your approach into one, fully integrated platform so you don't miss a beat.
You can trust that as a Microsoft Gold Communications Partner, we've successfully brought people together through email, IM, social, conferencing, and more. Our tailored solution will help you keep in touch with the team regardless of medium, platform, device or location.
Concurrency helps clients to manage devices, apps and content by using integrated tools to ensure security, improve business processes, and free up IT staff time for other work by offering mobile device management and mobile application management.
Leveraging Microsoft Intune and Enterprise Mobility + Security (EM+S), you can deliver application and device management completely from the cloud, or on-premises through integration with System Center, all via a single management console.
- Simplify communications
- Architecture and planning
- Deployment and operations
- Business process integration
- Enterprise voice
- Legacy PBX integration
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232261326.78/warc/CC-MAIN-20190527045622-20190527071622-00331.warc.gz
|
CC-MAIN-2019-22
| 1,130
| 10
|
https://brazilhouse.co/2022/02/21/parent-canvas-access/
|
code
|
Acquire PAIRING code:
Your kid can produce a code with their Canvas (web variation).
** Primary parents: If you need aid call your kid’s teacher **.
Develop Your Account:.
Browse Through: TCISD Parent Website.
Apple (iOS) Application Guidelines.
Android App Recommendations.
3. ** TCISD STAFF **: If you are a moms and dad of a TCISD Pupil, create your accounts utilizing an individual e-mail account.
** If you have several children participating in TCISD – CLICK ON THIS LINK Follow these instructions to add pupils after preliminary account has actually been created.
Customize your Account Preferences.
POINTER # 1: Personalize Your Dashboard!
Color code each youngster’s course ceramic tile or.
Rename each course tile with a label.
Reorganize control panel tiles.
POINTER # 2: Change Your Notices.
Account > Notices. As well as readjust.
IDEA # 3: Visit the Calendar.
View calendar occasions by week, month, or schedule list.
Only 10 training course as well as group schedules will certainly be shown at once.
SUGGESTION # 4: Message an instructor.
The Canvas inbox enables you to interact with educators.
IDEA # 5: Sight grades.
Select Sight GRADES from the control panel for a top-level introduction.
OR Select a course dash card from the dashboard > grades for more information.
TIP # 6: Download And Install “CANVAS PARENT” App.
Canvas Parent for iphone.
Canvas Parent for Android.
IDEA # 7: Log in to CANVAS PARENT (iOS) (Android).
Via Canvas link (iOS) (Android).
Via QR code – NEW!!!! (iphone).
TIP # 8: Sight Courses (iphone) (Android).
The default view shows the program list and current grade.
Tap the training course name for more details.
SUGGESTION # 9: Sight the Schedule on the app! (iOS) (Android).
The application allows you to see events and jobs for one student at once.
Multiple dots show multiple assignments or events.
Select the task to “Establish Suggestion”.
IDEA # 10: Set Alerts! (iOS) (Android).
Manage alerts for your connected children including:.
u25cb Training course qualities.
u25cb Missing out on jobs.
u25cb Assignment grades.
Go to Manage Trainees > pick pupil > change alerts.
Then, sight notifies (iphone) (Android).
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534693.28/warc/CC-MAIN-20220520223029-20220521013029-00030.warc.gz
|
CC-MAIN-2022-21
| 2,177
| 44
|
http://www.linuxquestions.org/questions/linux-newbie-8/verify-a-mepis-cd-from-its-own-bash-801234/
|
code
|
'In the process of installing SimplyMEPIS-CD_8.0.15-rel_32. One of of my image-burning programs is telling me my burns aren't verifying, this may just be an erroneous assessment; everything looks fine and I can get to the Bash without any issues.
I did a little homework and it seems the checksum
of the image I got on the harddrive is fine (md5-sum).
Is there a good (and not overly involved) way to check the physical CD is alright before I commit the time to an install?
A bit more info about my aim and setup here
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186774.43/warc/CC-MAIN-20170322212946-00576-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 517
| 5
|
https://www.socsci.uci.edu/newsevents/events/2018/2018-12-06-keller.php
|
code
|
This talk presents decision analysis methodology for decisions based on data from
geographic information systems. The consequences of a decision alternative are modeled
as distributions of outcomes across a geographic region. We discuss conditions that
may conform with the decision maker’s preferences over a specified set of alternatives;
then we present specific forms for value or utility functions that are implied by
these conditions. Decisions in which there is certainty about the consequences resulting
from each alternative are considered first; then probabilistic uncertainty about the
consequences is included as an extension. Two hypothetical urban planning decisions
are modeled: one on water use and temperature reduction in regional urban development
and one on fire coverage across a city.
One of the remaining challenges is the need for a cardinal preference function that incorporates the spatial nature of the outcomes. We explore preference conditions that will yield the existence of spatial measurable value and utility functions. Such measurable preference functions allow simpler assessment procedures and a strength of preference interpretation of the results. We present a simple example on household freshwater usage across regions.
The talk is based upon:
L. Robin Keller, Jay Simon, “Preference Functions for Spatial Risk Analysis”, Risk Analysis, (forthcoming in print).Version of Record online: 7 SEP 2017 | DOI: 10.1111/risa.12892, http://onlinelibrary.wiley.com/doi/10.1111/risa.12892/full, online in early view.
Jay Simon, Craig W. Kirkwood, L. Robin Keller, “Decision Analysis with Geographically Varying Outcomes: Preference Models and Illustrative Applications”, Operations Research, 62(1), Jan.-Feb. 2014, 182-194. Printed paper: opre 2013 1217-2au_copy; Supplement Simon et al. 2014 supplement. http://pubsonline.informs.org/doi/abs/10.1287/opre.2013.1217
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476452.25/warc/CC-MAIN-20240304133241-20240304163241-00858.warc.gz
|
CC-MAIN-2024-10
| 1,905
| 14
|
http://www.novell.com/coolsolutions/feature/11296.html
|
code
|
iManager and Windows 2003 NLB (Network Load Balancing)
Novell Cool Solutions: Feature
By Michel Bluteau
Digg This -
Posted: 19 Jan 2005
iManager and Windows 2003 NLB (Network Load Balancing)
This article covers some experimentation I have done with iManager 2.02, eDirectory 8.73, and Nsure Identity Manager 2.01, on a Windows 2003 platform. More specifically, it deals with the high-availability/clustering feature included in Windows 2003, known as Network Load Balancing, or NLB.
Here is a short list of questions I wanted to answer regarding iManager and NLB:
- Is iManager compatible with NLB?
- Out of the 3 modes of operation for NLB, Affinity None, Affinity Single, and Affinity Class C, which ones are supported by iManager?
- What happens in a failover scenario when a user has an active session against iManager?
Here is the configuration I was using, leveraging 3 servers, actually 3 Vmware virtual machines, with only one physical network adapter, all running on the same host:
- Win2003DC: Windows 2003 Server Domain Controler
- Win2003A: Windows 2003 Server, member of the domain, with IIS(Internet Information Server), NLB, and running eDirectory 8.7.3, Nsure Identity Manager 2.01, and iManager 2.02(with IIS and Tomcat)
- Win2003B: Windows 2003 Server, member of the domain, with IIS(Internet Information Server), NLB, and running eDirectory 8.7.3, Nsure Identity Manager 2.01, and iManager 2.02(with IIS and Tomcat)
NLB is part of Windows 2003 Server, and a Console is available for setting up and managing NLB:
Figure 1: Network Load Balancing Manager
Because I was using a very simplified hardware configuration, with Vmware and just one physical machine and one physical NIC, NLB Manager was not the tool I used for setting up my NLB cluster. In the Microsoft documentation for NLB, it mentions that NLB Manager cannot be used in that kind of scenario. The alternative is simply to use the Network Control Panel, from which a NLB cluster can be put together in minutes:
Figure 2: Network Connections Control Panel
Figure 3: Network Load Balancing Properties
When configuring the NLB Cluster from the Network Control Panel, you must set the same Cluster IP address for each member of the cluster (Win2003A and Win2003B in my example) in the clustered application (iManager, which is 192.168.1.33 in my example). You must also provide the same full Internet name for all members of the NLB cluster. In my example of cluster.novl.ca, novl.ca is my Windows 2003 Active Directory domain.
NLB requires the presence of a Windows 2003 AD domain in order to store the configuration for the cluster. Every time a NLB cluster member points to the same cluster configuration (cluster.novl.ca), it automatically receives the same Network address. This is like a virtual MAC address that is used by the cluster for load balancing requests (for iManager in our example) between the cluster members. It is also used to handle failover.
Multicast has been selected here because we have only one physical NIC per cluster member, and without a second NIC, servers wouldn't be able to see each other and communicate. Refer to Microsoft online documentation for NLB.
Figure 4: Host Parameters configuration for Win2003A
Each member of the NLB cluster must have its own identity and Host Parameters. For example, for Win2003A I used an IP address of 192.168.2.25, on a different subnet from the cluster IP address. A unique priority for each NLB cluster member needs to be selected manually, so I left the default of 1 for Win2003A, but used 2 for Win2003B (see below).
Figure 5: Host Parameters for Win2003B
Figure 6: Port Rules
Figure 7: Port Rule details
It is possible for NLB to setup a single port rule for all clustered applications, or select multiple port rules for each application, by limiting the scope for the rule through the IP address and/or port range. For each rule, one can select if the rule applies to TCP, UDP or both. And also, the type of NLB clustering used, identified by the Filtering mode, for which the 3 options for Multiple host are Affinity None, Affinity Single, and Affinity Class C. A definition for each mode can be found through context sensitive help, or the on-line documentation.
If we go back to the three questions posed at the beginning of the article, through the test environment described above, I was able to provide the following answers:
1. Is iManager compatible with NLB?
Answer: Yes, iManager is compatible with NLB. NLB is specifically designed to handle HTTP/s applications, so iManager does not require anything special in order to work with NLB.
2. Of the three modes of operation for NLB, Affinity None, Affinity Single, and Affinity Class C, which ones are supported by iManager?
Answer: Affinity none is not supported, since iManager sessions are machine-specific. A session cannot be transported from one machine running iManager to another, and an iManager session cannot occur against multiple instances of iManager simultaneously (multi-threading). So if the mode is set to Affinity None, iManager does not work properly. However, if Affinity is set to Single or Class C, iManager works just fine.
3. What happens in a failover scenario when a user has an active session against iManager?
Answer: If a user happens to have an active iManager session on a server that is part of a NLB cluster, and that server fails, then the connection for the user is transitioned (failover) in a transparent and rapid fashion to another member of the cluster running iManager. However, since the session cannot be transported, the user is returned to the iManager login page:
Figure 8: iManager login page accessed through the shared Cluster IP address (192.168.1.33) and not the Host dedicated address
Since a transaction in iManager is a short operation, such as creating or modifying a user object, an incomplete transaction is lost throught the failover process, and must be re-started from the beginning by the user. The cost to the user is measured in terms of minutes in a worst- case scenario, since iManager transactions are short by nature. When the iManager server where the user was performing a transaction becomes unavailable, the incomplete transaction/form is replaced by the iManager login page (see figure 8). So the iManager service is not interrupted, but the incomplete transaction is lost.
iManager and Windows 2003 NLB (Network Load Balancing) are compatible. The combination of the two can provide a robust and redundant solution that prevents interruption of services, while also distributing the load on two or more instances of iManager for iManager connection requests. Setting up iManager and NLB is a quick and easy task through the Network Control Panel. The only limitation is that the mode Affinity None is not supported by iManager, which prevents multithreading of individual sessions against multiple iManager servers, and the failover of an active session/transaction in case of a server failure.
You can submit questions and comments, or provide feedback to me regarding this article, through my e-mail address: mbluteauTAKETHISOUT@novell.com
Novell Cool Solutions (corporate web communities) are produced by WebWise Solutions. www.webwiseone.com
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823565.27/warc/CC-MAIN-20181211040413-20181211061913-00133.warc.gz
|
CC-MAIN-2018-51
| 7,232
| 41
|
http://www.coderanch.com/t/103263/vc/Netbeans-Text-Input
|
code
|
Hello all, I am having trouble reading from a simple text file in Netbeans 3.6. I am simply trying to read each line with, a method that I will show you here. This all works perfectly fine in a UNIX environment, but Netbeans refuses to see the file. Here is the code:
I have apparently tried everything in Netbeans...ie The text file "input.txt" is in my project, and in my mounted filesystem where my sources are. Am I missing something here, or could this be some kind of bug. Any help from someone experienced in Netbeans would be greatly appreciated! Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398474527.16/warc/CC-MAIN-20151124205434-00309-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 562
| 2
|
http://andresmoreira.com/?page=3
|
code
|
Prolog is a logic programming language. It is a general purpose language often associated with artificial intelligence and computational linguistics. It has a purely logical subset, called “pure Prolog”, as well as a number of extralogical features.I started to study Prolog in the University and I’m looking in the web for some resources. I found a lot! This are some of the links:
- SWI Prolog (Compiler - Interpreter)
this code define a graph with a,b,c,d,e as nodes and [(a,b),(b,c),(b,d),(c,e)] as links.
% Declare a Graphnode(a).
link(c,e).exist_path(X,Y) :- link(X,Y).
exist_path(X,Y) :- link(X,Z),exist_path(Z,Y).
exist_path is predicate, an define if exist a path from node X to node Y, if exist the result is TRUE, if not FAIL (FALSE).This simple code leave me amazed!
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705926946/warc/CC-MAIN-20130516120526-00081-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 784
| 7
|
https://ir.library.oregonstate.edu/concern/graduate_thesis_or_dissertations/1n79h862j
|
code
|
- Cryptographic devices leak timing and power consumption information that is easily measurable, radiation of various levels, and more. Such devices also have additional inputs, other than plaintext and keys, like voltage, which can be modified to force the device to produce certain faulty outputs that can be used to reveal the secret key. Side-channel cryptanalysis uses the information that leaks through one or more side channels of a cryptographic system to obtain secret information.
The initial focus of side-channel research was on smart card security. There are two main reasons why smart cards were the first type of devices that was analyzed extensively from the side-channel point of view. Smart cards store secret values inside the card and they are especially designed to protect and process these secret values. Therefore, there is a serious financial gain involved in cracking
smart cards, as well as, analyzing them and developing more secure smart card technologies. The recent promises from Trusted Computing community indicate
the security assurance of storing such secret values in PC platforms, c.f. .
These promises have made the side-channel analysis of PC platforms as desirable as that of smart cards.
The second reason of the high attention to side-channel analysis of smart cards is due to the ease of applying such attacks to them. The measurements of side-channel information on smart cards are almost “noiseless”, which makes such attacks very practical. On the other hand, there are many factors that affect such measurements on real commodity computer systems. These factors create noise, and therefore it is much more difficult to develop and perform successful attacks on such “real” computers within our daily life. Thus, until very recently the vulnerability of systems even running on servers was not “really” considered to be harmful by such side-channel attacks. This was changed with the work of Brumley and Boneh, c.f. , who demonstrated a remote timing attack over a local network.
Because of the above reasons, we have seen an increased research effort on the security analysis of the daily life PC platforms from the side-channel point of view. Here, it has been especially shown that the functionality of the common components of processor architectures creates an indisputable security risk, c.f. [1, 2, 5, 14, 73, 80], which comes in different forms.
In this thesis, we focus on side-channel cryptanalysis of cryptosystems on commodity computer platforms. Especially, we analyze two main CPU components, cache and branch prediction unit, from side-channel point of view. We show that the functionalities of these two components create very serious security risks in software systems, especially in software based cryptosystems.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662593428.63/warc/CC-MAIN-20220525182604-20220525212604-00356.warc.gz
|
CC-MAIN-2022-21
| 2,788
| 8
|
https://searchwhat.info/ethernet-controller-driver-windows-7-2233.php
|
code
|
Ethernet controller driver windows 7
- User rating:
Safe! Checked Antivirus(26.02.2020)
An Ethernet controller does need a driver to work, and since there is no driver installed, Device Manager placed a question mark next to it to indicate there is a problem. You must log in or register to reply here. Tell us about your experience with our site. Go to toshiba. You can follow the question or vote as helpful, but you cannot reply to this thread. If you don't have that disc any more, you can download the drivers from Intel's website on a computer with a working connection and transfer them to the computer on a USB drive. Our goal is to make Download Center a valuable resource for you. Thanks a bunch Yaos, ill let ya know how it works out. Instead of finding and downloading by yourself, Driver Easy helps you find and download driver, which is great useful to save much more time. You mean is it safe to continue without a driver for the newtwork card , yes it is but are you able to access the internet like this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146562.94/warc/CC-MAIN-20200226211749-20200227001749-00533.warc.gz
|
CC-MAIN-2020-10
| 1,021
| 4
|
https://helmet.kafuka.org/megatokyo/topic_5373.html
|
code
|
I think this is all of them, but please provide me with corrections or additions. The ones maked with '---' I'm not sure are AGI games or not. Some sites list them, some don't. Any help would be greatly appreciated. Thanks.|
/Black Cauldron, The
/Donald Duck's Playground
/King's Quest 1 - Quest For The Crown
/King's Quest 2 - Romancing The Throne
/King's Quest 3 - To Heir Is Human
/King's Quest 4 - The Perils Of Rosella
/Leisure Suit Larry 1 - In The Land Of The Lounge Lizards
/Manhunter 1 - New York
/Manhunter 2 - San Francisco
---/Mikey's Space Adventure
/Mixed Up Mother Goose
/Space Quest 1 - The Sarien Encounter
/Space Quest 2 - Vohaul's Revenge
/Police Quest 1 - In Pursuit Of The Death Angel
---/Winnie The Pooh - In The Hundred-Acre Woods
/Demo Pack 1
/Demo Pack 2
/Demo Pack 3
/Demo Pack 4
/Demo Pack 5
/King's Quest 4: The Perils Of Rosella Demo
Mikey's Space Adventure and Winnie The Pooh - In The Hundred-Acre Woods are not AGI games.|
Here is a list of Sierra's AGI games: http://www.agigames.com/index.php?action=sierra
alright, cool... i haven't played them and i saw that your site didn't list them... but some really old agisci site did. as for the demos/cards is that all of them?|
btw, I'm having trouble staying logged in... each time i log in then go to another page, my computer logs me out.
|Joey||for the problem you are having, you need to enable cookies. go to tools, internet options. then click on privacy, and make sure the bar is at medium.|
Well of course it doesn't list demo's... those arn't games. ;)|
That should be all of them.
Joey, you are assuming that he uses Internet Explorer to view the internet. So those directions arn't valid unless he is using it.
For instance, I don't use Internet Explorer. I use Mozilla Firebird.
But anyway, in your preferences or options you should see a cookies section where you can enable cookie support.
Also something Joey faild to mention you should be using the board from http://www.mega-tokyo.com/forum/index.php
And not from the .cjb address because the .cjb address doesn't save cookies to the board.
So it isn't necessarily a cookie problem Joey, he could be using the .cjb address.
|Vapor||That's what is was Chris.. haha. Thanks.|
|Joey||once again...chris proves me wrong. :D|
Joey wrote:Well then my job here is done. ;)
Is there a listing like the ones mentioned above that actually show what version of AGI a game uses?|
|Eero R||Look at AGI Specs...|
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653631.71/warc/CC-MAIN-20230607074914-20230607104914-00007.warc.gz
|
CC-MAIN-2023-23
| 2,445
| 40
|
https://forums.rpgmakerweb.com/index.php?search/1262441/
|
code
|
Heya! After 3+ years of developing a game I've decided to scrap the idea of using other people's graphic resources and make my own instead...
Problem is, I'm not an artist...this will be interesting.
Check out my protagonist sprites (wip)
This is certainly a good year for me. First, the internship, and just yesterday I delivered a speech, pitching an app I developed in front of an audience, and although I didn't win, I made the top judge (and my mom) cry, so I guess it was pretty good :/
(Psst I'm non-binary but i was BORN female so i'm still qualified to take this survey...right? right? Right. ok. cool)
Q1: At what age did you first start to play games? Also, what was your first game (please describe a bit of the game) and how was the experience overall at that age?
I got a new PC... Nothing wrong with my lil laptop at all! Still works great, and I'll be using it for school. But, the specs for gaming were falling off fast. So I was selfish and bought myself a beast of a PC ^-^
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487614006.8/warc/CC-MAIN-20210614232115-20210615022115-00272.warc.gz
|
CC-MAIN-2021-25
| 992
| 7
|
https://www.ladewig.com/microsoft_teams_is_now_available_for_education/
|
code
|
Teams The word “soon” can have varied meanings, but in terms of Microsoft Teams, it means one week. After becoming generally available for Business customers on March 14, Microsoft announced the availability of Teams for Education customers yesterday on March 21. The announcement was made on a post on the Microsoft Teams blog:
Last week, Microsoft Teams became generally available to Office 365 business users. Today we’re making Teams available in Office 365 Education, free for faculty, staff and students. We’re thrilled by the enthusiasm for Teams in the education community and look forward to seeing how customers build Teams into the way they collaborate every day.
Finally, education customers get to play with the newest toy in Office 365! Teams is off by default, but admins can enable it on their tenants for Faculty & Staff and/or Students. The post provided instructions for enabling Teams, as part of a FAQ. A couple interesting notes in the FAQ covered who was eligible for Teams:
Microsoft Teams is available in all Office 365 for Education suite licensing: Education, Education Plus and Education E5, as well as existing Education E3 customers who purchased E3 prior to its retirement.
So if you’re in education, you get Teams at no added cost.
The FAQ also talked about client support:
Microsoft Teams runs on Windows, Mac, Android, iOS and web platforms. Teams supports the web client on Microsoft Edge 12+, Internet Explorer 11+, Firefox 47.0+, and Chrome 51.0+. Users who try to open the Microsoft Teams web client on Safari are directed to download the desktop client. Safari support may be added at a later time.
Sorry Safari, no Teams love for you!
I’m having difficulties with Edge and IE on my machines with a loop of authentications requests before finally telling me that either something went wrong or that I have to allow 3rd party cookies (even though it is already set). A quick look at forums show other people are having the same problem. Firefox, Chrome, and the desktop app all worked, so I’m not too worried about the Edge/IE issues for the moment. Your mileage may vary.
If you are looking for some help with Teams, check out these links from Microsoft:
My university has enabled Teams in the test tenant where we will be kicking the tires a bit. I’m looking forward to putting Teams to use in the production tenant soon. I expect there will be a rapid take-up of Teams in Higher Education because of all the pent-up demand. What are you planning to do at your institution? Please share in the comments.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816465.91/warc/CC-MAIN-20240412225756-20240413015756-00635.warc.gz
|
CC-MAIN-2024-18
| 2,559
| 11
|
http://serverfault.com/questions/190907/configure-mail-server-to-prevent-deletion-of-email
|
code
|
I would like to configure a mail server to prevent deletion of email
preferably one supporting maildir and that works flawlessly with roundcube
which mail server would you recommend and how easy would it be to configure this?
Seriously, this is higher end business stuff and that is normally where open source just simply fails. Fully integrated internal retention policies as well as legally safe auditing of incoming and outgoing emails (because easily to fake logs are not going to stand in court) are one of the reasons Exchange is (still) in businesses (and growing).
I am not aware of any open sourceo or otherwise slution that does what you ask for (specifically with maildir).
I admit, not a "Pro Enterprise Web2.0" solution, but this might work:
The Maildir layout looks like that:
So one could write an
maybe you can use the concept of "shared-folder" in IMAP (cyruss has it and probably other imap service implementations as well). make the mailbox owner some hidden user and "share it" to the real owner. see cyrus shared folders and acls in the documentation. it may work flawlessly to some extent with roundcube and other clients as long as you only use imap. it would be interesting to implement this.
as a note (donts) , ugly filesystem hacks will make imap throw errors to the client, not being aware of external setups:
this will put the mail folders in append-only mode and works only if the MDA moves the messages to the folder and isn't doing open/write directly in maildir (probably most MDAs don't do the second but the first).
ugly hack number two, a MDA wrapper to chattr +i the message after it is written in maildir. no guarantee that the client won't delete the message between MDA write and chattr
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826773.17/warc/CC-MAIN-20160723071026-00091-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 1,726
| 12
|
https://eu.magazine.intelligentcio.com/intelligent-cio-europe-issue-56/0722197001659360902?auth_sso=1
|
code
|
Industry experts comment on how they see this approach being adopted by organisations
THE NEW CIO
Opening the door to on-demand talent
Gaining full business value from your Digital Transformation journey
Jan Cenkr , Group CIO of Home Credit Group , discusses why digital savviness and peoplecentricity are key values for ensuring IT progression and explains why CIOs must strive to deliver the best and continue challenging the status quo .
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652494.25/warc/CC-MAIN-20230606082037-20230606112037-00051.warc.gz
|
CC-MAIN-2023-23
| 440
| 5
|
https://opencollective.com/tellform
|
code
|
Fiscal Host: Open Source Collective
We are on a mission to build a beautiful and easy to use opensource form builder.
Become a financial contributor.
tellform is all of us
Our contributors 6
Thank you for supporting tellform.
Transparent and open finances.
Estimated annual budget
Opensource Beautiful Form Builder. Has API support, logic jump, Google Analytics and Completion Rate
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988858.72/warc/CC-MAIN-20210508091446-20210508121446-00361.warc.gz
|
CC-MAIN-2021-21
| 381
| 9
|
https://www.linuxtopia.org/online_books/database_guides/mysql_5.1_database_reference_guide/character-sets.html
|
code
|
5.10.1. The Character Set Used for Data and Sorting
By default, MySQL uses the
West European) character set and the
latin1_swedish_ci collation that sorts
according to Swedish/Finnish rules. These defaults are suitable
for the United States and most of Western Europe.
All MySQL binary distributions are compiled with
--with-extra-charsets=complex. This adds code
to all standard programs that enables them to handle
latin1 and all multi-byte character sets
within the binary. Other character sets are loaded from a
character-set definition file when needed.
The character set determines what characters are allowed in
identifiers. The collation determines how strings are sorted by
ORDER BY and
clauses of the
You can change the default server character set and collation
--collation-server options when you start the
server. The collation must be a legal collation for the default
character set. (Use the
statement to determine which collations are available for each
character set.) See Section 5.2.1, “mysqld Command Options”.
The character sets available depend on the
--with-extra-charsets= options to
configure, and the character set
configuration files listed in
| complex | all | none
See Section 2.8.2, “Typical configure Options”.
If you change the character set when running MySQL, that may
also change the sort order. Consequently, you must run
myisamchk -r -q
on all tables, or your indexes may not be ordered correctly.
When a client connects to a MySQL server, the server indicates
to the client what the server's default character set is. The
client switches to this character set for this connection.
You should use
when escaping strings for an SQL query.
mysql_real_escape_string() is identical to
except that it takes the
handle as the first parameter so that the appropriate character
set can be taken into account when escaping characters.
If the client is compiled with paths that differ from where the
server is installed and the user who configured MySQL didn't
include all character sets in the MySQL binary, you must tell
the client where it can find the additional character sets it
needs if the server runs with a different character set from the
You can do this by specifying a
--character-sets-dir option to indicate the
path to the directory in which the dynamic MySQL character sets
are stored. For example, you can put the following in an option
You can force the client to use specific character set as
This is normally unnecessary, however.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657181335.85/warc/CC-MAIN-20200716021527-20200716051527-00225.warc.gz
|
CC-MAIN-2020-29
| 2,484
| 52
|
https://penjiapp.zendesk.com/hc/en-us/articles/4407260106135-Admins-Provider-Payroll-Table
|
code
|
The provider payroll table does some basic summations that we believe will help you in your calculations. Each mode is calculated differently as described below.
- Logged Appointments Hours
Providers must log their scheduled appointments. If they log the student as "present", this log will include a "duration" value which is used in this calculation. If marked as "absent", we add a token amount of minutes to the calculation to pay them for their time. The default is 30m but you can adjust this by emailing Penji.
- Scheduled Drop-In Hours
This table assumes that any drop-in shift a provider was scheduled for, the provider worked. This simply sums all scheduled drop-in shifts of a provider.
- Logged Section Hours
Providers are scheduled by admins to lead "sections". Many students can join a given section, and providers log who came and who didn't. If at least one student comes to a given section, this table adds the scheduled duration of that section to this total
We can't customize these calculations for your specific case, but hope that this starting point will help for your own payroll run.
Two situations may lead to you overcounting your provider hours:
- Overlapping Drop-in and Appointment Hours
Some centers choose to schedule a provider for both drop-in hours and appointment hours at the same time. If the provider gets booked for an appointment that time will be counted in our table; the provider's scheduled shift will ALSO be counted in the drop-in row (double counting). To resolve this, you can pull up the Visits table in your data dashboard and filter down to the provider in question and also filter down to 1-on-1 only. Alongside this, you can re-open your admin panel in a new tab and navigate to your Drop-in Provider Hours page to see their scheduled shifts. Check if their appointments occurred during a scheduled shift, and add up those amounts to approximate the deduction for this provider. See this image for a sample of these windows.
Once you've come up with a "deduction" for the provider (an amount that Penji's table has overcounted their hours due to overlapping appointments and drop-in), input it into a spreadsheet as shown here:
In this way, you are adjusting the total hour value that Penji gives you down by any appointments that were counted on top of a drop-in shift.
- Overlapping Drop-in Shifts in Multiple Locations
Providers can scheduled drop-in shifts that overlap with one another (for example, an in-person and zoom shift they will work in parallel. Penji will double count these hours as well. You'll have to look at their schedule hours and assess how many drop-in shifts a provider had that occurred at the same time across two or more locations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474661.10/warc/CC-MAIN-20240226162136-20240226192136-00669.warc.gz
|
CC-MAIN-2024-10
| 2,714
| 15
|
https://lists.debian.org/debian-med/2008/07/msg00012.html
|
code
|
Bug#489836: ITP: maq -- Mapping and Assembly with Quality
Owner: Charles Plessy <firstname.lastname@example.org>
Package name : maq
Version : 0.6.7
Upstream Author : Heng Li <email@example.com>
URL : http://maq.sourceforge.net/
License : GPL-3
Programming Lang: C
Description : Mapping and Assembly with Quality
Maq builds mapping assemblies from short reads generated by the
next-generation sequencing machines. It is particularly designed for
Illumina-Solexa 1G Genetic Analyzer, and has a preliminary functionality to
handle ABI SOLiD data. Maq is previously known as mapass2.
With Maq you can:
o Fast align Illumina/SOLiD reads to the reference genome. With the
default options, one million pairs of reads can be mapped to the
human genome in about 10 CPU hours with less than 1G memory.
o Accurately measure the error probability of the alignment of each
o Call the consensus genotypes, including homozygous and heterozygous
polymorphisms, with a Phred probabilistic quality assigned to each base.
o Find short indels with paired end reads.
o Accurately find large scale genomic deletions and translocations with
paired end reads.
o Discover potential CNVs by checking read depth.
o Evaluate the accuracy of raw base qualities from sequencers and help
to check the systematic errors.
However, Maq can NOT:
o Do de novo assembly. (Maq can only call the consensus by mapping reads
to a known reference.)
o Map shorts reads against themselves. (Maq can only find complete overlap
o Align capillary reads or 454 reads to the reference. (Maq cannot align
reads longer than 63bp.)
Like velvet and patman, this package is intended to be made available after
Lenny is released.
Preliminary packaging is available here:
Debian-Med packaging team.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711003.56/warc/CC-MAIN-20221205032447-20221205062447-00090.warc.gz
|
CC-MAIN-2022-49
| 1,742
| 36
|
https://www.webmasterworld.com/css/4197280.htm
|
code
|
joined:Sept 6, 2010
I would like to be able to position a DIV (or SPAN, etc) on a specific element (by ID) or a specific anchor tag by name.
For example, how would I position it on a span which has the following code:
Or alternately, position it at an anchor tag with a specific ID.
Thank you for any help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806422.29/warc/CC-MAIN-20171121185236-20171121205236-00797.warc.gz
|
CC-MAIN-2017-47
| 306
| 5
|
https://quickbooks.intuit.com/learn-support/forums/forumtopicprintpage/board-id/payments/message-id/13322/print-single-message/true/page/1
|
code
|
Your understanding of what constitutes a billable item -- is what I believe. They could either add a clear column box to at least make it one click. Ideally they just add an attribute on the item setup for any item to determine whether or not this is 'billable by default'.
One would never bill at cost or in the case of travel or hotel it typically involves pass-thru. I could also see getting prints from a printer -- and passing that thru as part of 'incidentals' expenses.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400241093.64/warc/CC-MAIN-20200926102645-20200926132645-00689.warc.gz
|
CC-MAIN-2020-40
| 476
| 2
|
https://cnvrg.io/best-data-scientists/
|
code
|
The machine learning industry has grown enormously since its inception in the first half of the 20th century. Data scientists have been responsible for the growth of machine learning. Some have contributed groundbreaking research of neural networks and deep learning, and others have built industry leading applications of machine learning. Here are a number of data scientists that have contributed both to machine learning research and to applications as leaders in the industry. Many have built unimaginable innovations and leave their innovations for the millions of AI applications used today. Here is our list of the best data scientists throughout the world, leading the field of AI which is changing and evolving every day.
LeCun is one of the most well known data scientists of our time. He is well known as the Director of AI Research at Facebook, but has made industry changing inventions that earned him a spot at the top of the list for best data scientists in the world. Yann has 14 registered US patents and created CNN (convolutional neural networks) which is basically one of the reasons deep learning is what it is today. During his time at Bell Labs, his team made numerous contributions to computer science such as DejaVu (Yann LeCun, Yoshua Bengio, Léon Bottou and Patrick Haffner), and Support Vector Machines (by Vladimir Vapnik) and is one of the recipients of the Turning award for his work in Deep Learning.
Dr. DJ Patil
Patil essentially labelled the job category for a “data scientist” in his days as chief scientist at Linkedin. He has been a leader in the field, and has shaped the future of data policy in the U.S, serving as the first Chief Data Scientist at White House for Obama. He has been responsible for spreading Big Data across industries and government agencies, and even helped Facebook create their beginning data science programmes. He has helped spread data science as an enterprise strategy, and has guided millions of enterprises in building their data science teams with his book “Building data science teams”.
Along with Yann LeCun, Yoshua has been called by some, one of the “Godfathers of deep learning” and was one of the winners of the prestigious Turing award. His work has been essential to the progress of artificial intelligence. He helped to build the technique that combines large amounts of data with many-layered artificial neural networks, which are inspired by the brain. His work pioneered the use of neural networks of distributed representations for words (or word embeddings), as well as the use of soft attention mechanisms. Both innovations leading to major advances in natural language processing. Along with Yann LeCun and Geoff Hinton, Bengio received the award for making deep neural networks a “critical component of computing”. He remains an active leader in academia and the field of AI research, and has advised and co-founded several AI start-ups, including Elemental AI.
Corinna is also an alumn of the famous Bell Labs group responsible for some of the most influential innovations and discoveries in AI. Cortes is well known for her contributions to the theoretical foundations of support vector machines (SVMs) also known as supervised learning, for which she jointly with Vladimir Vapnik received the 2008 Paris Kanellakis Theory and Practice Award, and her work on data-mining in very large data sets for which she was awarded the AT&T Science and Technology Medal in the year 2000.
Prof. Kaelbling is a leading professor and researcher at MIT. She has done substantial research on designing situated agents, mobile robotics, reinforcement learning, and decision-theoretic planning. She is the founder and editor-in-chief of the Journal of Machine Learning Research. She has contributed significantly to the field of robotics and is widely recognized for adapting partially observable Markov decision process from operations research for application in artificial intelligence and robotics. Kaelbling received the IJCAI Computers and Thought Award in 1997 for applying reinforcement learning to embedded control systems and developing programming tools for robot navigation.
Nando de Freitas
De Freitas is a top researcher in the fields of neural networks and deep learning, reinforcement learning, apprenticeship learning and teaching, goal and program discovery, transfer and multi-task learning, reasoning and cognition. His many academic papers have been noted as an authority in machine learning. He is a Professor of Computer Science at Oxford University as well as a senior staff research scientist at Google DeepMind in London.
Smallwood is the VP of Data Science and Analytics, Netflix. She has applied data science with real life business value with her team that drives predictive decision models, algorithm / machine learning research, and experimentation science for all parts of the Netflix business. Her career has included working at Yahoo! as the director of data solutions and at PWC as a senior manager in quantitative consulting.
Matman is a Principal Data Scientist and Chief Architect at NASA’s Jet Propulsion Laboratory. He helped develop the third generation of the Apache Object Oriented Data Technology data processing and information integration system. He assisted in inventing Apache Tika, and Apache Nutch, widely used software frameworks for content detection and analysis, and has continued his work with Dark Web and automated data processing technologies leading research teams working with DARPA and NASA JPL on the Memex project. The project involves data discovery and dissemination from the Dark Web.
Ng is the founder and leader of Google Brain, a deep learning artificial intelligence research team at Google. His previous work was as VP and chief scientist at Baidu. While he is most well known for his online learning courses in machine learning and deep learning, he has also contributed to much of todays research in deep learning. As a former Bell Labs member he conducted research on reinforcement learning, model selection, and feature selection. He is one of the most influential and well known data scientists in the world.
Gideon Mann is the head of Data Science at Bloomberg, guiding the strategic direction for machine learning, natural language processing, and search on the core terminal. At Bloomberg, his team has worked on the company-wide data science platform, natural language question answering, and deep learning text processing, among other products. He also founded and leads the Data for Good Exchange (bloomberg.com/d4gx), an annual conference on data science applications for social good and is a core member of the Shift Commission on Work, Workers and Technology (shiftcommission.work). Mann graduated Brown University in 1999 and subsequently received a Ph.D. from The Johns Hopkins University in 2006. His focus at Hopkins was natural language processing with a dissertation on multi-document fact extraction and fusion. After a short post-doc at UMass-Amherst working on problems in weakly supervised machine learning, he moved to Google Research in NYC in 2007. In addition to academic research, his team at Google built core internal machine learning libraries, and publicly released the Google Prediction API and coLaboratory, a collaborative iPython application. He joined Bloomberg’s leadership team in the CTO department in 2014.
Radinsky specializes in predictive data mining and gained recognition after her software predicted the first in 130 years outbreak of cholera in Cuba. The prediction was made based on the pattern identified by mining of 150 years of data from various sources: in poor countries, floods within a year after a drought often followed by a cholera outbreak. At Microsoft Research she lead research in the field of Web Dynamics and Temporal Information Retrieval. She has previously lead as the director of data science at Ebay
Angela Bassa is an expert in building and leading data teams. An MIT-trained and Edelman-award-winning mathematician, she has over 15 years of experience across industries—spanning finance, life sciences, agriculture, marketing, energy, and software. Angela leads the Analytics, Data Science, and Machine Learning teams at iRobot, where she helps bring intelligence to a global fleet of millions of consumer robots. She is also a renowned keynote speaker and author, with credits including the Wall Street Journal and Harvard Business Review.
Jeff was one of the first employees of Facebook, responsible for building the data team and developing the technology they required to handle the unprecedented amount of data the firm was generating. After Facebook he founded Cloudera, where he also served as Chief Scientist. Through Facebook and Cloudera his teams were responsible for driving many of the applications of statistics and machine learning at Facebook, as well as building out the infrastructure to support these tasks for massive data sets. He’s been a critical contributor to creating three of the most popular open source databases (Cassandra, Hive, and Impala) which has greatly impacted the big data and machine learning industries.
Dr. Eva-Marie Muller-Stuler
Eva is the Chief Data Scientist and Analytics & AI practice leader at IBM MEA. Dr. Eva-Marie is the author and co-author of numerous papers and publications as well as a member of various mathematical societies including Women in Machine Learning. While the Chief Data Scientist at KPMG in Decision Science, Dr. Eva led the development of new ground-breaking approaches to facilitate strategic data driven real-time decision engines.
Monica is a leader in the data science community. She was Vice President of Data of Jawbone from 2013 to 2015 and was a senior data scientist at LinkedIn for five years, where she built the initial version of LinkedIn’s job matching system and the first machine learning model for LinkedIn’s “People You May Know” feature. She is currently an equity partner at Data Collective (DCVC) and a scientific advisor to CrowdFlower. She contributes greatly to the field of data science as a speaker and thought leader.
Andrew Therriault has led data science and analytics teams for major organizations including the City of Boston, as Director of Data Science at the Democratic National Committee and Facebook focused on solving real-world problems. He’s spent the past fifteen years working with data as a practitioner, a researcher, an educator, an advisor, and a leader particularly specializing in local government or Big Tech. He was appointed as Boston’s first-ever Chief Data Officer, leading a team of more than twenty staff, contractors, and fellows working in the areas of data science, data engineering, performance management, open data, and geospatial analytics. Developed strategies, policies, and programs to promote the use of data and analytics throughout city government while managing the associated privacy, security, legal, and political risks. Guided the design and implementation of new data science and data warehousing platforms to deliver enterprise-grade scalability, reliability, security, and performance for analytics projects.
Jeremy is the VP of data science at Instacart. Instacart is currently applying deep learning to help shoppers become more efficient through the shopping list. Jeremy’s team uses AI and deep learning to allow Instacart to predict the sequence that shoppers pick items in specific store locations – In some cases saving 10%+ time in-store. He has been instrumental in applying data science to real world applications in how AI technologies are enabling the on-demand delivery economy and the implications that these advancements will have on the retail industry.
As Executive Vice President, Chief Algorithms and Analytics Officer, and board member for Overstock.com, Dr. Kamelia Aryafar leads the company’s analytics, data platform, technology, machine learning, data science, data engineering, and algorithmic product functions across the marketing, customer, sourcing, and website verticals. Dr. Aryafar worked at Etsy with different product teams across several platforms to integrate analytics, machine learning (ML) and artificial intelligence (AI) algorithms throughout the organization. Since joining Overstock, her teams have integrated state-of-the-art ML and AI algorithms across various product teams, including search and discovery, personalization, experimental design and analytics, pricing, ranking, sort and navigation, recommender systems, marketing, CRM, advertising technologies, email, sourcing, and supply chain.From the algorithms that power the search experience to the analytics and data strategy and platform used to personalize that experience, she is helping customers discover the most relevant products and information to meet their needs and inspire their wants.
Lili is the Head of Data Science at Quora . She leads a team of data scientists at Quora in Mountain View, CA. Her team delivers data insights and pinpoints growth opportunities related to Quora’s content recommendation system, which curates personalized knowledge to hundreds of millions of users. She has lead projects where she focused on using data insights to identify opportunities in user activation and retention channels. She graduated from Harvard with a degree in Physics. At Harvard, she conducted biophysics research that constructed Markov chain and biased random walk models to understand protein RNA interaction and energy barriers.
Richard is the chief scientist (EVP) at Salesforce, where he leads teams working on fundamental research, applied research, product incubation, CRM search, customer service automation and a cross-product AI platform for unstructured and structured data. He has previously been an adjunct professor at Stanford’s computer science department and was the founder and CEO/CTO of MetaMind which was acquired by Salesforce in 2016. In 2014.
While these are just a few of the data scientists that we have recognized, there are many many reputable data scientists building the AI of the future that should also be recognized. We hope to see more machine learning heroes thrive, and see more stars hit this list. Hopefully this list will inspire others to join the field, and will give other data scientists a place to learn about new opportunities in the field of AI both in a corporate enterprise, or in research, or for social causes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510130.53/warc/CC-MAIN-20230926011608-20230926041608-00863.warc.gz
|
CC-MAIN-2023-40
| 14,490
| 25
|
http://www.entropiaplanets.com/wiki/10.0.6
|
code
|
From EntropiaPlanets Wiki - Entropia Universe Guides Wiki Info
Official Release Notes
- Actions Sets and Keyboard map improved. Making modifications on any of the Actions Sets should no longer trigger any CTDs.
- Time zones have been enabled. If you are afraid of the dark, teleport to another zone where the sun is still shining.
- Your avatar will now be able to climb steeper slopes than before. The effort in going uphill will reduce your speed.
Un-noted changes, images of new stuff, etc go here
Wiki documented changes
No wiki documented changes yet.
Links, references, contributors, categories
- Previous Version Update:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347425148.64/warc/CC-MAIN-20200602130925-20200602160925-00231.warc.gz
|
CC-MAIN-2020-24
| 627
| 10
|
https://www.feltmeknot.ca/products/cream-scrunchie
|
code
|
Felt Me Knot
made with luxurious double gauze fabric, these super soft and elegant scrunchies have been designed and constructed with comfort in mind. unlike typical scrunchies, these are narrower and are absolutely perfect for everyday use.
available as is or with a long tailed scarf (removable)
although advertised for moms, these scrunchies work just as well for your littles!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475711.57/warc/CC-MAIN-20240301225031-20240302015031-00627.warc.gz
|
CC-MAIN-2024-10
| 380
| 4
|
https://forums.majorgeeks.com/threads/home-networking-design-advice-needed-wireless.35109/
|
code
|
I'm moving into a new place in a heavily populated area (security, yikes!) and I thought I'd ask for advice. It's a 3 flat OLD apartment building in Chicago, and I don't want to run wires all over my apartment. First off, I will be using Comcast High Speed Internet. I also currently have the Microsoft Wireless G Router that I'm using with my work laptop. I can't use WPA due to using Win2k on my work laptop. 1) In my living room, I have a PVR and PS2 that I will want to connect to my network. 2) In my den, I have 2 boxes (one xp, one linux) that I will want to connect to my network. 3) I also have a work laptop that I can use on the Wireless network throughout the apartment. 4) The PVR (ReplayTV) can connect to one of my PC's with software and I can record shows to my PC if the connection is quick enough. My question is, what is the advice on the most secure way to share a cable modem and network all of my devices through my apartment without using wires with the layout I've explained? Should I go wireless or go with an electrical networking solution between the two major points (living room and den)? I will basically need two hubs (one in the living room, one in the den). I typically turn on my wireless only when I'm using it due to the security concerns. Thanks for any help!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822966.64/warc/CC-MAIN-20171018123747-20171018143747-00264.warc.gz
|
CC-MAIN-2017-43
| 1,296
| 1
|
https://www.sonhosdenoiva.com.br/pd-45bf0c-brincos-perola-operacao-lua-de-mel.html
|
code
|
order ambien 10mg tablets online
Like any dog, dachshunds need a proper introduction at a young age. purchase ambien american express Jones then began a relationship with American sprinter Tim Montgomery, leading to the birth of a son. Safewords are one way for BDSM practices to protect both parties. Azithromycin has relatively broad but shallow antibacterial activity.
buy ambien the uk
Adaikalam tries to guide Anbu into the commissioner's office, but one of the students purposely blasts loud music to keep him from hearing Adaikalam. One night, while at his parents' house, Good took upwards of 45 Ativan pills and collapsed to the floor. In the brain, acetylcholine functions buy ambien the uk as a neurotransmitter and as a neuromodulator. Therapeutically this relationship is very inconvenient because low potency, often meaning low specificity can decrease the safety margin thus increasing the chances of side-effects.
Apparently Jordan and Peter Andre are fighting each other over custody of Harvey. Bischofberger was the Executive Vice President, Research and Development and Chief Scientific Officer at Gilead Sciences, a biopharmaceutical company specializing in antivirals. When they performed this ritual, the faithful also listened purchase ambien american express to the corresponding biblical passages and commentaries. There is a limited but encouraging therapeutic experience of hematopoietic stem cell transplantation for SPS. A mind should not be so open that the brains fall out, however it should not be so closed that whatever gray matter which does reside may not be reached.
purchase generic ambien online ireland
Bosworth maintained his injury was sustained during a single hit. By 1570, the colonists found that the gold mines were depleted, relegating the island to a garrison for passing ships. Early-lactation buy cheap ambien 10mg milk contains colostrum, which carries the mother's antibodies to its young and can reduce the risk of many diseases. These responses are understandable but can exacerbate the problem, since they do not generate energy. She was prone to unpredictable, violent thrashing of her limbs.
Buy Cheap Drugs Online
It is composed of 250 proportionally elected members who serve four-year terms. The company went public in India in 1999, and used some of the proceeds to build its first research facility. Some azole drugs may disrupt estrogen purchase ambien american express production in pregnancy, affecting pregnancy outcome. Friedrich Schiller in 1785 and revised in 1803, with text additions made by Beethoven. Do one thing for a human being.
purchase ambien australia
The complex pricing structure of the formulary can have unexpected consequences. This competition has been compared to the Vedic rite of the vajapeya: Breastfeeding also provides health benefits for ambien online canada the mother. Weinberg's compositions by opus number. He is a bit of a womaniser, he's constantly on the look out for new talent but he gets shot down a lot too, I think he thinks far too highly of himself! In the manufacture of fine chemicals, enzymes represent the single most important technology for radical cost reductions. Purchase Ambien Canada
buy cheap ambien 10mg mastercard
Other secondary changes such as loss of muscle fibres following acquired muscle weakness are likely to compound the weakness arising from the upper motor neuron lesion. He arrives when Marilyn finds him bloodied, dazed and confused. These can be induced by an increase in glutamate levels due to an increase in system cheapest generic ambien paypal Xc- activity. Medications from several classes have mood stabilizing activity. Humankind is the definitive host of at least eight species of filariae in various families.
Cheap Chemist Online
Scott uses his 1-up and re-enters the Chaos Theater. Thermometers and sphygmomanometers containing mercury were invented in the early 18th and late 19th centuries, respectively. The coda of this short movement zolpidem 10mg online legally ends the Scherzo softly with a tritone substitute authentic cadence. SSL mixing desk had the same amount of headroom. The stop-gap drugs used by the largest absolute number of heroin addicts is probably codeine, with significant use also of dihydrocodeine, poppy straw derivatives like poppy cheap ambien japan pod and poppy seed tea, propoxyphene, and tramadol. Alternative lifestyles are suggested, with the cephalic legs used to disturb the sediment to make food available.
zolpidem 10mg from canada
Ammonia is both a metabolic waste and a metabolic input throughout the biosphere. The goal of the Convention is to create a standard purchase ambien american express that can be used for any ratifying nations to promote the health and safety of miners. He pardoned his brother Hakim, who was a repented rebel. Timbre is what makes a particular musical sound different from another, even when they have the same pitch and loudness. Mercy leaves the prison intending to stay out of trouble and stay in contact with Tricia. Spinnerette was to perform several dates throughout October.
ambien 10mg price
However, before the fight with him can begin, a butterfly lands on his lance and purchase ambien american express merges with him, creating the being known as Morpho Knight. Solutions of this substance are blue when in an oxidizing environment, but will turn colorless if exposed to a reducing agent. In order to gain the consistency he desired, Corgan often played all instruments excluding drums, which created tension in the band. As her title suggests, Angelina was known for her red appearance and clothing. On November 20, 2009, the four band members announced they will be taking purchase ambien american express an indefinite hiatus, saying they were unsure of the future of the band. The scherzo is marked allegro molto. Cheapest Generic Ambien Mastercard
purchase zolpidem 10mg online india
While the period is generally known for its adoption of highly regulated and stylised literary forms, some of the concerns of writers of this period, with the emotions, folk purchase ambien american express and a self-conscious model of authorship, foreshadowed the preoccupations of the later Romantic era. The receptors were named using the first letter of the first ligand that was found to bind to them. The mechanism of action of pramipexole is mostly unknown, it is thought to be involved in the activation of dopamine receptors in the area of the brain was the striatum and the substantia nigra is located. Terminally ill patients purchase ambien american express in Oregon who have requested physician-assisted suicide have received lethal doses of barbiturates. Feminist cinema, advocating or illustrating feminist perspectives, arose largely with the development of feminist film theory in the late '60s and early '70s.
The reactions have been developed on laboratory scale by academia over the last two centuries and subsequently adapted to industrial scale, for instance for the manufacture of dyestuffs & pigments. He was buy generic ambien mexico a skilled wrestler, but despised the experience. The Pumpkins drew inspiration from a variety of other genres, some unfashionable during the 1990s among music critics. Alvimopan undergoes no significant hepatic metabolism, but is metabolized by intestinal flora. The first movement, marked Poco adagio, has a similar style as J. Fourth, Sixth, and Seventh Symphonies. In Norway, temazepam is not available as a prescription drug.
CMOS and other novel information processing devices. Flunitrazolam is a benzodiazepine derivative that has been sold online as a designer drug, and is a potent hypnotic and sedative drug similar to related compounds such as flunitrazepam, clonazolam purchase ambien american express and flubromazolam. Mercury in the form of one of its common ores, cinnabar, is used in various traditional medicines, especially in traditional Chinese medicine. After watching it again, he decided to enlist the opinions of others, including MuchMusic, to see if they had any objections. Atorvastatin has an approximate elimination half-life of 14 hours. Anand's political thriller Ko, purchase ambien american express in which she portrayed Saraswathi, a journalist, alongside Jeeva, and Ajmal. Outside the central nervous system, dopamine functions primarily as a local paracrine messenger.
zolpidem 10mg drugs online
Destruction of noradrenergic neurons has produced hypersomnia in experimental animal studies, and injury to adrenergic neurons has also been shown to lead to hypersomnia. Parallel to and south of the current Platform 1, the 'Windsor Bay', were two additional sidings cheap ambien online legally and a platform-level loading bank. It is very slightly soluble in ethanol, while practically insoluble in water. Its effect in those with primary progressive MS is not clear.
During the game of Tetris, blocks appear to adsorb onto the lower surface of the window. Dezocine was patented by American Home Products Corp. In particular, he gave Rogolev full information about the crimes, fabricating a confession in which he could be declared insane. Prior authorization helps ensure that patients receive correct medications. There is something about the sound of this name that makes you purchase ambien american express want to shout it loud. Roseanne takes a pregnancy test that turns up negative.
This page can be found by:
- Canadian Pills Online
- Online Drugstore
- Online Medication
- Price A Medication
- cheap zolpidem 10mg bangkok
- ambien 10mg mastercard
- order ambien mastercard
- zolpidem 10mg new york
- Discount Medicine
- Canadian Pills Online
- Real Online Pharmacy
- cheap zolpidem 10mg paypal
- buy zolpidem 10mg tablets
- cheapest generic ambien tablets
- buy ambien online legally
- buy generic ambien online india
- Price A Medication
- Pharmacy Discount Card
- cheapest generic ambien online legally
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891640.22/warc/CC-MAIN-20200707013816-20200707043816-00175.warc.gz
|
CC-MAIN-2020-29
| 9,930
| 46
|
https://zoom.ph/index.php?rp=/knowledgebase/10248/How-to-Change-your-Default-Index-Page-in-.htaccess.html
|
code
|
The server looks for specifically named files as the first page of your website, also known as the index page. The default order of index file names our particular servers look through is index.htm, index.html, index.php, and finally default.htm. You can change the name of the index file your account looks for by altering the .htaccess file. Perhaps you want to have a specific custom name for your index file or maybe you are migrating from another host and the index page is named differently. This way your internal links will not be broken by renaming the index file.
What is an htaccess File?
The .htaccess file is a hidden text file within your hosting account that can be very powerful. It is designed so that you can modify it to change the behavior of your website that normally would take higher access beyond your account. It acts as a liaison between your domain and the server and can perform many functions.
Changing your Default Index File Via htaccess
- Log into your cPanel.
- Find the Files category and click on the File Manager icon.
- Click Settings at the top right corner.
- Select the document root for the domain you are working with and be sure the checkbox next to Show Hidden Files is checked. Click the Save button.
- Look for the .htaccess file and right click on it. This brings up a menu. Find and click on the Edit option.
- You may be presented with a popup. Click on the Edit button.
- You are now in the htaccess editor. Paste the following code at the top of the page to configure your desired index page. In our example below, we decided to make the index page of our folders named first.html.
- #Alternate default index page
- You can also list more than one file in the configuration. The file will be read left to right and check for them in that order. In this example, we add index.htm, index.html, and index.php to the list. First the server will check for first.html, if it does not find a file with that name, it continues to index.htm and so on.
- #Alternate default index pages
DirectoryIndex first.html index.htm index.html index.php
- Be sure to hit the Save Changes button in the upper right corner to save your new htaccess configuration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476532.70/warc/CC-MAIN-20240304200958-20240304230958-00547.warc.gz
|
CC-MAIN-2024-10
| 2,192
| 16
|
https://www.nft-stats.com/collection/dodo-seeker
|
code
|
There were no Crypto Dodos sold in the last 7 days.
A DODO bird, extinct on the African island of Mauritius, is revived in the NFT world. It's your chance to have your special Crypto Dodo with only one in the world! Crypto Dodo Universe ->>> https://discord.gg/bxYr9tNmZV
© 2023 NFT Stats
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499829.29/warc/CC-MAIN-20230130201044-20230130231044-00608.warc.gz
|
CC-MAIN-2023-06
| 289
| 3
|
http://www.phoronix.com/forums/showthread.php?82344-Previewing-The-Radeon-DPM-Performance-On-Linux-3-11&s=7d741a32ecc2afdb005b5532766e012a&p=345051
|
code
|
finally, open source drivers that will work with a laptop (without melting it)
Well, better late than never :-) I expect that in about 6 months when this starts making it into Linux distros that I will be able to start recommending AMD hardware again. I hope your CPU people have some tricks up their sleeves for catching up with Intel.
Is CrossFire support coming next for those of us with both discrete components and APUs?
Last edited by edsdead; 07-16-2013 at 05:54 PM.
A small open source gpu revolution!
Probably the most exciting preview article of all times as far as it concerns the graphics world!
Think now that the one of the 2 industry leaders has an out of the box open source almost full functional driver for most of its GPUs!
I am very happy that the Lintel graphics are becoming obsolete and we now can use real GPUs from cheap and cool ones to APUs and to graphic hungry beasts!!
I don't think someone with a Radeon HD 6970 would care that much for the power consumption... But he/she would care to have a driver that rises the clocks to maximum and provide high performance!
Crossfire, Overdrive I think are the next goals for this category of GPUs and not only...
We also have UVD usage among all the others, Radeon SI must be now under the heavy development procedure and inherit the features from its older brothers!
Big thanks to all AMD open source team and every other contributor!
As for nVidia, Linus words are always in my mind since they bury nouveau... We don't need their proprietary advantage and open source huge disadvantage anymore!
Last edited by djdoo; 07-16-2013 at 08:29 PM.
I'm not totally disagreeing with you Djdoo... but there's n othing wrong with Intel graphics. They are more than enough for the average (non-gamer) user since Sandy Bridge. Some light gaming is fine on them. If you want to do some more serious gaming then yeah, you need AMD or Nvidia but to say that they are "obsolete" is definitely an overstatement. Not to mention that HAVING the discrete cards suck a fair bit of power which is bad for laptop users.
Originally Posted by djdoo
They are almost exactly the same chip with different clocks. Both use r600g, not radeonsi.
Originally Posted by darkbasic
I donít understand why this APU is always benchmarked overclocked. It makes the results higher than what they should be (I suppose).
Also I didnít understand the mention of Catalyst in between two graphs that have nothing to do with Catalyst.
Where did you get that from?
Originally Posted by stqn
From the table in the first page of the article. I canít copy-paste but it says 4.7GHz, while the normal frequency is 4.1GHz (with turbo boost up to 4.4GHz). The previous articles about this APU also used overclocked numbers.
Originally Posted by Vim_User
We got a problem! I had great success with this kernel on my A8-3870K TV PC but when I install it on my laptop I get no screen!
The laptop is a dv6z-7000 from HP. It has an AMD A8-4600 APU with 7660G GPU as well as a 7730M discrete GPU. Internally, the display is connected to the APU and uses DMA to move frames to the iGPU when using the dGPU, but it looks like the new driver ignores the APU's GPU entirely and just inits the discrete one, which of course has no screen. The laptop is cool and quiet now, I'll give them that, but picking the wrong GPU is kind of a big deal.
I have been waiting for this day since the day I got my 5770. Even though catalyst is finally somewhat tolerable, I still can't wait to give this a whirl.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246638820.85/warc/CC-MAIN-20150417045718-00095-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 3,508
| 27
|
https://dreamcast-talk.com/forum/viewtopic.php?f=42&t=2882&p=28225&sid=53ea13e024a861820f9b24e0e7531cf8
|
code
|
After reading Anthony's post here: http://www.dcisozone.com/community/foru ... chat/1066/
I decided to use Dream Explorer to put codes on my GameShark, I've been having a hard time finding codes for it.
But, now it says my codes are corrupted.
I'm using the official GameShark memory card, and the retail disc (Not a backup).
Does anyone have any ideas on to why the codes are corrupt?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038879374.66/warc/CC-MAIN-20210419111510-20210419141510-00130.warc.gz
|
CC-MAIN-2021-17
| 385
| 5
|
http://assist.educ.msu.edu/ASSIST/assisthomeset/forbeginning.htm
|
code
|
Key questions from the perspective of
How can I make the most of my first years of teaching?
What is important about an induction program?
How should I expect my principal to support me as a beginning teacher?
What should I expect from the relationship with my mentor teacher?
What will my mentor teacher and I talk about in our professional learning conversations?
What should I expect to be learning in my first years of
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258849.89/warc/CC-MAIN-20190526045109-20190526071109-00221.warc.gz
|
CC-MAIN-2019-22
| 422
| 7
|
http://projectwoman.com/2010/09/visual-basic-2008-express-select-a-textbox-contents.html
|
code
|
When you hand control back to a textbox in Visual Basic it’s useful if you also select the textbox contents so a user can just start typing over the current contents. Here’s how to do this – place the code in the Textbox_gotfocus event handler:
TextBox.SelectionStart = 0
TextBox.SelectionLength = Len(TextBox.Text)
How easy is that?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119782.43/warc/CC-MAIN-20170423031159-00081-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 339
| 4
|
https://android.stackexchange.com/questions/115475/what-is-the-label-appears-in-setting-apps-tap-on-app-different-sizes-of-app
|
code
|
for example, Under the storage label - App, USB storage app, Data, SD card. How these size was handled by the Android system ?
I have attached a screen shot. The flickOpic app is developed by me. the
flickOpic.apk size is 3.00 MB.
Question: How this app becomes total 66.87 MB? What kinds of code stored in app, USB Storage app, Data, SD card? What is the system file/folder path for app, USB Storage app, Data, SD card?
My device: Sony Ericsson Arc S LT18i, OS: android 4.0.3
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540481076.11/warc/CC-MAIN-20191205141605-20191205165605-00118.warc.gz
|
CC-MAIN-2019-51
| 476
| 5
|
http://www.geekstogo.com/forum/topic/137331-reinstalling-windows-after-desktop-blank/page-7
|
code
|
Reinstalling Windows after desktop blank
Posted 11 November 2006 - 11:20 AM
Posted 14 November 2006 - 06:12 PM
Posted 15 November 2006 - 08:28 AM
Yes, you can install Windows XP (even a complete clean install) with an XP Upgrade cd. You must have an older version of Windows on cd for upgrade verification in order to do so, however. Your current cd should work to verify upgrade eligibility, but it wouldn't hurt to have another Windows cd on hand just in case...any previous version will work...even a borrowed one. You'll want to use the new product key.
As a side note, it's Compaq that should be replacing the cd for you...not Microsoft. Under Microsoft's volume licensing agreements, any support for the preinstalled operating system falls to the manufacturer that installed it using the license.
Posted 15 November 2006 - 01:05 PM
Posted 15 November 2006 - 01:17 PM
The retail upgrade cd includes both the option to repair and Recovery Console for other types of repairs.
Using the recovery disks to reinstall XP on a new hard drive would be the method I would recommend as it will save you having to round up all the device drivers for the machine...they are included in the recovery set.
Posted 15 November 2006 - 01:46 PM
Posted 22 November 2006 - 06:30 PM
Posted 26 November 2006 - 02:09 PM
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657151.48/warc/CC-MAIN-20190116093643-20190116115643-00514.warc.gz
|
CC-MAIN-2019-04
| 1,373
| 15
|
http://analisisdb.com/jupyter-notebook-thesis.html
|
code
|
Spark, Jupyter Notebook, Jupyter notebook thesis, Tableau, and Plotly. B Jupyter Notebook on Reading and Writing Files in Python.
Mar 7, 2018. For the next year, several bachelors thesis projects are proposed to UPF. Ive jupyter notebook thesis trying to figure critical thinking 4 year old a way to work on manuscripts/abstracts such.
Intern / Master Thesis Student: Machine Learning Research. Connecting the Semantic Web and Jupyter Notebooks: Building jupyter notebook thesis.
UCLA Electronic Theses and Dissertations (2017). PhD thesis, your night time hobby, …). Thesis of Michael Wimmer -- a really thorogh introduction to the transport formalism (English) · A paper by Ivan Rungger and Stefano. This is the source for my PhD thesis. Physics dissertation. 2011: The IPython Notebook.
Nov 14, 2017. Lets use a computational essay to explain computational essays.
I made use of jupyterr software packages: Anaconda with Essay generator website and Jupyter Notebook as well as PostgreSQL. Jan 15, 2015. Matthew Wilkens has posted a jupyter notebook thesis blog essay about his short Jupyter notebook thesis paper.
You need to first convert it into latex: nbconvert.py -f latex your_nb.ipynb and then. Distribution for Dynamic Virtual Worlds” · “The Sphinx Thesis Resource”. Open tools for scientific computing: IPython & friends… •The Numfocus.
How to write essay on my school in hindi
Leverage your. (m/w): Interaktive HANA-SQL-Info mit SQL Fiddle/Jupyter-Notebooks. You can see the Jupyter notebook with the code here.
Data accessibility and re-useability Data interoperability Jupyter Notebooks and. I love using Jupyter Notebooks, but see Using Jupyter Notebooks).
Writting, polishing, running last experiments. IAI 15-18 Internship/ Bachelor-/Masterthesis: A Novel Deep Learning. You can create interactive visualizations, presentations and other documents such as your research thesis in a Jupyter Notebook with one or a combination of. Mar 8, 2017. Every recipe in this cookbook is an executable Jupyter Notebook (a.k.a.
Methoden dissertation jura
IAI 14-18 Internship/ Bachelor-/Masterthesis : A Novel Methodology for. You write your chapters in either markdown or IPython notebooks - it doesnt matter which. Open-science, documentation, jupyter notebooks and readthedocs.
Thesis for mary shelleys frankenstein
Nov 26, 2018. This page is a curated collection of Jupyter/IPython notebooks that are notable. May 9, 2016. A Degree Thesis... Figure 3.1: Jupyter notebook sheet example...
Business research paper topics in the philippines
JupyterLab: The evolution of the Jupyter Notebook (With Brian Granger and Matt. Aug 27, 2017. IElixir - Jupyters kernel for Elixir programming language. Jul 24, 2017 - 27 min - Uploaded by PyDataDescription I will describe an on-going project to write a book exploring mathematical and.
Dissertation search database
For systems engineering with requirement traceability and verification, see ModelicaML. Dec 19, 2014. The idea in my thesis is to combine the strengths of search.
Keywords: Python, Data Science, Big Data, Jupyter, pandas, econometrics. CRC 1270 ELAINE. Max Schröder. 2018-11-22. Jupyter notebook programming assignment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247488374.18/warc/CC-MAIN-20190218200135-20190218222135-00028.warc.gz
|
CC-MAIN-2019-09
| 3,195
| 20
|
https://www.inkit.com/html-to-pdf
|
code
|
Set document dimensions and static content
Select datasource for dynamic content
Set expiration conditions
Generate the PDF
This simple process can be used in the Inkit application whenever needed, or built directly into an existing workflow for the automated creation of documents.
Inkit is a Document Generation Platform that provides all the tools devs need to automate document creation from raw data, allowing you to eliminate hours of work for your colleagues.
Our easy-to-use API was built for developers. Use your own code or any of our conversion methods to customize document dimensions, static content, and datafields.
Inkit isn’t just for HTML-to-PDF conversion. Our SDKs support a full suite of PDF tools (like access controls and self-deletion) that you can use to optimize every aspect of your business’s document operations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00720.warc.gz
|
CC-MAIN-2022-33
| 844
| 8
|
https://susiechant.mla.bcndpcaucus.ca/contact/volunteer-with-us/
|
code
|
At our Community Office, we have a wide variety of volunteer opportunities available to suit your skills and interests. It’s through our amazing volunteers that we are able to maximize our impact in the community.
Consider volunteering with us! This is a great opportunity to learn, especially if you are a high school or university student!
Please send an email to us, with information regarding your availability and your interests, and we will get back to you ASAP. Thank you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00053.warc.gz
|
CC-MAIN-2023-40
| 481
| 3
|
https://practical365.com/blog/page/4/
|
code
|
Co-chief editors Steve Goodman and Sigi Jagott report on day one of Microsoft Ignite 2019.
In this article, our Chief Editor and MVP Sigi Jagott and MVP Tom Arbuthnot discuss the impact of multiple Office 365 data centers on your Teams and Office 365 data.
Just before Ignite 2018, we announced the news that Practical 365 had an all new editorial team. To mark this occasion, we would like to hear from you!
In this video, MVPs Sigi Jagott & Tom Arbuthnot deliberate Teams and WhatsApp and what should organizations be using for daily business activity.
In this article, we’re exploring how to make SharePoint automatically extract text from images using the Azure OCR service.
This blog is a transcript from the Teams Client video featuring MVP’s Sigi Jagott & Tom Arbuthnot.
MVP Vasil Michev provides an expert guide on Microsoft Ignite 2019 and what sessions he’ll be attending.
The unmissable Thrive Conference is on the 11th – 13th November in Postojna, Slovenia. Sigi Jagott explains in this blog why you should attend.
Find out what MVPs Sigi Jagott and Tom Arbuthnot think you should look out for at Microsoft Ignite 2019.
This blog is from Gustavo and Juan’s chapter “Migrating SharePoint Online and OneDrive for Business” in the Tenant to Tenant Migrations eBook.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598800.30/warc/CC-MAIN-20200120135447-20200120164447-00173.warc.gz
|
CC-MAIN-2020-05
| 1,288
| 10
|
https://www.programmableweb.com/api/google-contacts/articles
|
code
|
From their site: The Google Contacts Data API allows client applications to view and update Contacts content in the form of Google Data API feeds. Your client application can request a list of a user's contacts, edit or delete content in an existing contact, and query the content in an existing contact.
Our API directory now includes 41 contacts APIs. The newest is the AtMail API. The most popular, in terms of mashups, is the Google Contacts API. We list 10 Google Contacts mashups. Below you'll find some more stats from the directory, including the entire list of contacts APIs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144150.61/warc/CC-MAIN-20200219122958-20200219152958-00012.warc.gz
|
CC-MAIN-2020-10
| 584
| 2
|
https://forum.kirupa.com/t/trouble-calling-my-own-images-in-thumbnail-gallery/294837
|
code
|
This is my first post, and I’ve unsuccessfully tried to find the answer elsewhere in the forums. It is an embarrassingly silly problem.
I have completed the excellent Flash Thumbnail Gallery Tutorial (and the Picture gallery Tutorial). I have been able to update the dynamic text content, and basically customize the look and feel of the .swf. That works when I upload it to my website.
My problem is that neither in Preview mode (via Flash) nor once uploaded to my website can I get my XML file to call my own images up. It will call the tutorial images from Kirupa if I leave them in there.
I have tried to use relative and absolute file paths for the image URL, and neither is working. I even tried using “image ID=” tags inside the node, to no avail.
I have an image directory that is a few folders deep, so I tried putting the XML, FLA and SWF (all together) in different places, updating the SWF on my html page, and then republishing. In the place where my image should be, there is nothing.
Flash reports an error when I hit CTRL+Enter that it cannot find those particular files.
I would be ENORMOUSLY GRATEFUL to anyone who might be able to help me solve this problem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655883439.15/warc/CC-MAIN-20200703215640-20200704005640-00441.warc.gz
|
CC-MAIN-2020-29
| 1,183
| 7
|
https://sourceforge.net/directory/language%3Ashell/environment%3Ax11/?sort=popular&page=9
|
code
|
Object storage is clearly the simplest, most flexible, and most scalable way to store tons of unstructured content. The Scality S3 Server enables developers and businesses to take advantage of this simplicity, for free. Whether you’re programming in Go or Java, or whether you’re using existing applications for personal or shared data management, the Scality S3 Server is a great starting point.Sponsored Listing
OSI-Approved Open Source (363)
- GNU General Public License version 2.0 (288)
- GNU Library or Lesser General Public License version 2.0 (39)
- BSD License (34)
- GNU General Public License version 3.0 (32)
- MIT License (7)
- GNU Library or Lesser General Public License version 3.0 (5)
- Mozilla Public License 1.1 (5)
- Apache License V2.0 (4)
- Apache Software License (4)
- PHP License (3)
- Academic Free License (2)
- Affero GNU Public License (2)
- Artistic License (2)
- Adaptive Public License (1)
- Common Development and Distribution License (1)
- Other License (15)
- Public Domain (11)
- Creative Commons Attribution License (9)
- Linux (378)
Grouping and Descriptive Categories (283)
- All POSIX (223)
- All 32-bit MS Windows (46)
- OS Independent (38)
- Project is an Operating System Distribution (36)
- All BSD Platforms (24)
- 32-bit MS Windows (23)
- OS Portable (22)
- 64-bit MS Windows (10)
- Project is OS Distribution-Specific (10)
- 32-bit MS Windows (9)
- Project is an Operating System Kernel (1)
- Modern (269)
- BSD (217)
- Windows (133)
- Mac (112)
- Android (41)
- Other Operating Systems (39)
- Emulation and API Compatibility (23)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
LightBSD is a simple FreeBSD based distribution
Lightweight Virtual Machine Manager (aka Lightweight Xen Manager) is a set of bash scripts and session manager to automate operations on virtual machines like cloning, taking snapshots...
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
LinDOS is a TOS (Transparent Operating System) that mimicks the look and feel of Windows and DOS. The goal is to be able to drop a Windows user in front of a LinDOS loaded Linux system and allow them to be able to use it with minimal or no confusion.
Intended eventually to be a live CD, LinVision allows the blind to use a computer to: 1) Organise books & read aloud. 2) Organise & play music. 3) Teach & test keyboard skills. 4) Write & save or email work. 5) Browse Internet.
Linoratix is a Linux distribution focused on Workstations and Servers
The German Linux Guide introduces many scripts and programms which make the life with Linux easier, more comfortable, or simply more efficient.
Linux ICE (In Car Entertainment) is a set of scripts used to transform a ubuntu system into a Car PC centric Linux distribution. The distribution created by the scripts includes integrated media software and the xorg touchscreen drivers.
The myriad of functionality that comes with Snare, from Verbose Truncation to Output Driven Filtering have been helping companies around the world zero in on threats in record time while spending less on their SIEM. This is made possible by reducing the noise in your log collection while delivering the critical data for both forensics and analytics, dependably. Snare just works. Try our agents free today!Sponsored Listing
Linux-Kontor is a free ERP (enterprise resource planning) software suite. Its core components are customer, order, invoice and stock management. It's written completely in Java and has a three-tier architecture.
For descriptions and script sources, please visit https://sites.google.com/site/linuxpendrive/
We are developing a linux distribution for DiskOnChip-based internet set-top-boxes
Linux.NET Framework is a developmental linux operating system that has native Oracle, SQL, and Development compiled on a secure platform for all end users.
This is Live CD gives its users an easy graphical interface to configure Linux systems, that are no longer "bootable" due to a configuration error, or broken X server. Its similar to the ERD Commander disk, only for Linux.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
A ready to run client/server distribution with easy administration tools and fast client deployment for small networks.
A Linux distro based on Linuxcare Bootable Business Card, this is a emergency tool with many uses
MASyV (Multi-Agent System Visualization) enables one to write agent-based models/cellular automata, eg. in C, visualize them in real time & capture to movie file with MASyVs GUI & message passing lib. Includes examples: Hello World, ants, viral infection
Macaroni Linux is the new linux distro with dreads! It aims to be a USB based distribution with a custom package management system.
A Debian / Knoppix based Linux for Newbies
The Scality RING is software that turns any standard x86 servers into web-scale storage. With the RING, you can store any amount of data, of any type, with incredible efficiency and 100% reliability, guaranteed—all while reducing costs by as much as 90% over legacy systems.Sponsored Listing
Mentalinux Debian GNU/Linux: a better Debian for desktops
MetaSlate is designed for ease of use from beginners to high level System Admins. This product will backup linuxunix clients and windows machines. In the future, EZbackup will be able to backup VMware ESX hosts, vCenters, and VMDK files.
XMIPP is an image processing suite for 3D-reconstruction of biological specimens from transmission electron microscopy data. NOTE that stable releases (including binaries) are longer stored at Sourceforge, but are available at http://xmipp.cnb.csic.es
Might TV - a modular system for PVR and IPTV
MonkeyCity Rescue is dedicated to creating a Linux Rescue CD that, among other things, is geared towards data recovery from Microsoft Windows machines.
Extensive Conky configuration
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189472.3/warc/CC-MAIN-20170322212949-00652-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 6,559
| 73
|
https://uniteddesignpractice.com/windows-azure-launch-event-2014window-azure-2014
|
code
|
Windows Azure Launch Event 2014/Window Azure 2014新产品发布会
The launch of Windows Azure is a big strategic entry from a non-chinese cloud solution provider, a platform upon which most of Microsoft's future product offerings will be based upon. On a messaging level, we chose to emphasize the immediacy and relevance of this product, with NOW as a key theme.
在解析了 Windows Azure 的产品在中国正式登陆的推广重点,将“NOW”作为此次活动的切入点和核心思想。并将其演绎在该活动的各个接触点上。
The invitation features a peel-off self-inflating cloud, that is a metaphor for Windows Azure.
邀请函撕开后,印有 Windows Azure Now 的纸质气泡会瞬间充气涨开。
When guests sign in, their signatures are projected into the cloud above them.
An interactive screen lines the entrance passgeway, with key messaging tracking the guests and they pass by and disperse into clouds of other related phrases and words as they interact with their body gestures.
The three structures signify the 3 clouds of Azure, personal, public and hybrid clouds. They are projection surfaces that integrate with the video content of the LED screens behind.
The key spokesperson from Microsoft gives the welcome speech. Then introduces the audience to his 5 friends, hologram personae of himself working in across the industries that the product will have profound impact.
领导将介绍他的 5 位全息投影的分身。他们代表不同领域,寓意产品几大特点。
Motorized helium-filled cloud balloons fly over the audiences heads to congregate on stage, marking the climax launch moment. The balloons descend on the audience, marking the arrival of the Microsoft cloud era in China.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00598.warc.gz
|
CC-MAIN-2023-50
| 1,749
| 11
|
https://mayecorps.weebly.com/newsletter--blog/may-newsletter
|
code
|
AYEC wins social impact and environmental award!
The AYEC team was honored to receive the second-place prize in the Georgia Tech Ideas to Serve Competition, Solutions Track. We'd like to thank our mentor Cassidy Martin and the Ideas to Serve team for adapting to an online format and giving us a great platform to share our work!
Check out the full list of winners here!
Metro Atlanta community events coming up...
There are several interesting online events about equity happening in our Metro Atlanta community. Check them out below!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00810.warc.gz
|
CC-MAIN-2023-50
| 535
| 5
|
https://ohgodthewallsaremelting.wordpress.com/2015/06/21/redhat-6-6-and-weird-nfs-issues-tldr-try-nfs-v3-rather-than-default-v4-x/
|
code
|
So I recently built a new VM with RHEL 6.6 for a production Domino server. I mounted the data and log directories to a NetApp filer volume as I’d done in the past with RHEL 5.x, and went about my way.
A couple of days later I got some alerts about the server crashing. I ran a top and found that RPCIOD was using the entirety of my CPU’s, not only that but the filer was maxing and according to vSphere my VM was using 2gps network traffic.
The only way out of this mess was to hard reboot the box, as trying to kill these processes or unmounting didn’t work.
After some investigation and looking at the logs I came across these two bug reports – both closely match the problems I was having and it seems that kernel 2.6.32-504.16.2.el6 may have issues with NFSv4.
After changing fstab to specifically use NFSv3 rather than v4 the problem hasn’t reoccurred yet.
I could reproduce the error on a different VM, with a different mapped volume on the same filer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676588961.14/warc/CC-MAIN-20180715183800-20180715203800-00080.warc.gz
|
CC-MAIN-2018-30
| 968
| 6
|
http://sourceforge.net/p/opensips/patches/35/
|
code
|
Learn how easy it is to sync an existing GitHub or Google Code repo to a SourceForge project! See Demo
The attached patch replaces the code which validates tables version, by invoking directly the functions defined in DB API.
I uploaded the patch (with a bit of re-work), so please test it to be sure I haven't done something wrong :).
Thanks and regards,
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463181.39/warc/CC-MAIN-20150226074103-00066-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 355
| 4
|
http://www.bigdbahead.com/?p=99
|
code
|
With MySQL 5.1, getting and analyzing all the queries hitting the database is very easy even if you don’t have access to the MySQL enterprise Monitor. You can either activate the general log or, my favourite option, activate the slow query log with a sub millisecond long query time. Long query time below one second is an option introduced in MySQL 5.1. In order to catch all the queries, you will also need to disable the query cache. The main advantages of the slow query log over the general log is that you have access to more information like the query time, the lock time, the number of rows examined and the number of rows sent back. All the options surrounding the slow query log in MySQL 5.1 are dynamic so it is easy to turn the logging ON and OFF. Once you have the queries, tools, like mysqlsla, can be used to anlyzed the queries and group them by type.
All these tips are nice if you are using MySQL 5.1 but what if your database is using 5.0 and cannot be easily restarted. With MySQL 5.0, the smallest long_query_time you can used is 1 second so, even if the slow query log is ON, it is not very useful to log all the queries. To activate the general query log requires a restart so, if you cannot restart the database, it is not option. The question remains, how can we get the queries. The response is with with the use tcpdump and tshark along with some file manipulation. Here are the steps:
1. Capturing the MySQL traffic
tcpdump -i eth0 port 3306 -s 1500 -w tcpdump.out
Of course, this is useless with a Unix socket file.
2. Extracting the queries
With the tcpdump.out file, you can now extrat the queries with tshark. The following command will extract all the queries:
tshark -r tcpdump.out -d tcp.port==3306,mysql -T fields -e mysql.query > query_log.out
I prefer to hint tshark as which tcp to use for mysql because I often end up with installations using non-standard port number and this way
I remember easily. The output file content looks like:
SET SESSION TRANSACTION ISOLATION LEVEL READ COMMITTED
SELECT mi.id, mi.size, mi.blob_digest FROM mboxgroup10.mail_item AS mi WHERE mailbox_id = ? AND folder_id = ? AND type IN (5) A
ND NOT flags & 128
The last step is to remove the blank lines and redundant SQL.
cat query_log.out | grep -v “^$” | grep -v “^commit” | grep -v “^SET autocommit” | grep -v “^rollback” > query_log_no_blank.out
and you are done. You can use any tool you want to analyze the queries, my favourite one is mysqlsla although, for this specific case, you will need to hack a bit the code since, in raw format, mysqlsql expect “;\n” as end of line. Simply find the line in parse_raw_logs:
$/ = “;n”;
and change it to:
$/ = “n”;
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528869.90/warc/CC-MAIN-20190723043719-20190723065719-00379.warc.gz
|
CC-MAIN-2019-30
| 2,708
| 19
|
http://ianhmayhew.blogspot.com/2010/11/
|
code
|
... 7 or so weeks into the quarter, I finally take a breather and post here.
For a while now I've been lucky to get 7 hours of sleep in a 4-day school week. Definitely been working harder than last year... but I'm not as stressed out, somehow. If I had to guess as to why, I'd say it's because I'm really happy with my professor, and though he's an extremely intimidating individual, I think we finally have a clear and mutual respect for each other. Also, now that I'm 21 I can go out for a drink or two with my friends and colleagues, shoot the shit, and yap for hours and hours about school because that's just about all we can do.
Anyways, for those of you I am ever-neglecting to update, my lamp project has evolved since the summer. We now have a "pedestal" to go with the lamp, which sounds like a strange accompaniment to a desk lamp, but has become quite an interesting problem. We have fairly free-reign over what the purpose of the pedestal is (as long as their IS a purpose).
So this is what it looks like after working all night in the CAD lab. These were rendered in a pretty sub-par program but they pop out fast so I can render changing concepts as I go.
The top of the lamp rotates, and the lamp is only lit when the edges are aligned. Tiny magnets offer a little feedback as well. When the lamp is sitting in its tiny index in the pedestal's table, the form is continued down to the base. This way, the user is encouraged to turn on the lamp by "normalizing" its shape, and hence its purpose: to be a light.
So now is the scary part-- where we have to build it. I'm looking for an aluminum sculptor/welder, or a commercial/industrial specialist who isn't afraid to tackle something of such small scale. The top diffuser will be SLA'd or FDM'd, depending on the properties of samples I have yet to acquire.
And for those of you that could care less about ID and weren't impressed by the pictures, this is a teaser to a painting I've been working on in my little spare time for the sketchgroup:
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867095.70/warc/CC-MAIN-20180624215228-20180624235228-00479.warc.gz
|
CC-MAIN-2018-26
| 2,010
| 7
|
https://www.reprohack.org/paper/?search=&tags=Numerical%20modelling,swig,Shiny
|
code
|
I tried hard to make it reproducible, so hopefully this paper can serve as an example on how reproducibility can be achieved. I think that being reproducible with only few commands to type in a terminal is quite an achievment. At least in my field, where I usually see code published along with paper, but with almost no documentation on how to rerun it.
We think this is an interesting paper for anyone who wants to learn to build an API with the R package plumber. This is a novel method in health economics, but we believe will help improve the transparency of modelling methods in our field.
I tried hard to make this paper as reproducible as possible, but as techniques and dependencies become more complex, it is hard to make it 100% clear. Any form of feedback is more than welcome.
If all went right, the analysis should be fully reproducible without the need to make any adjustments. The paper aims to find optimal locations for new parkruns, but we were not 100% sure how 'optimal' should be defined. We provide a few examples, but the code was meant to be flexible enough to allow potential decision makers to specify their own, alternative objectives. The spatial data set is also quite interesting and fun to play around with. Cave: The full analysis takes a while to run (~30+ min) and might require >= 8gb ram.
The focus of the project is reproducibility. Here we show the differences to access data compared to similar initiatives: https://ropensci.org/blog/2019/05/09/tradestatistics/. Also, similar projects have obscure parts, while our exposes the code from raw data downloading to dashboard creation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817674.12/warc/CC-MAIN-20240420184033-20240420214033-00577.warc.gz
|
CC-MAIN-2024-18
| 1,621
| 5
|
https://bitbucket.org/tehfink/cmsplugin-photologue/wiki/Home
|
code
|
- basic galleriffic install working; see instructions in example project. thanks justhamade!
- dealing with plugin media will be made easier in the next django-cms release
- new features & bugfixes!
- django-cms 2.0.2 only - nav extenders in django-cms trunk are still broken
- models need updating, check the readme for directions
- next up: js gallery integration
2010-01-21 get_absolute_url() only works if the page language matches; see: http://groups.google.com/group/django-cms/browse_thread/thread/81be6e77645609b3/d6ac7c3bb9243a13?#msg_3b4e24df47122392
2010-01-21 update broken again by: http://github.com/digi604/django-cms-2.0/commit/0634da9f002c903caf32f2559d1513f0032ba2a1
2010-01-20 django-cms trunk broke get_absolute_url() on models; explains why no links in templates are working. trying to fix again…
2010-01-15 first hack at language namespaces; seems to work. need to figure out some kind of caching to speed up page loading
2010-01-13 basic navigation now working with django-cms trunk. next up, language namespaces
2010-01-12 evening apphook urls and navigation extenders should work with django-cms 2.0.2. see example project (not included in pip install, so download directly from bitbucket)
2010-01-12 due to recent changes in django-cms, the apphook urls and navigation extenders are currently broken. i'm working on fixing it.
- branch cms-2.X follows django-cms 2.X
- tag cms-2.0.2 is compatible with django-cms 2.0.2 release
- branch default follows django-cms master
- currently basic functionality, no language namespaces (see above)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738819.78/warc/CC-MAIN-20200811180239-20200811210239-00556.warc.gz
|
CC-MAIN-2020-34
| 1,565
| 17
|
https://mingqigao.com/index.html
|
code
|
PhD student in Computer Vision
@ University of Warwick and SUSTech
Hi! I am Mingqi, a fourth-year (2022-2023) joint PhD student at University of Warwick and Southern University of Science and Technology (SUSTech). I am now doing research in the WMG Data Science Group and SUSTech VIP Lab, under the supervision of Prof. Jungong Han, Prof. Feng Zheng, and Prof. Giovanni Montana. Prior to this, I received my Master degree and Bachelor degree from Chongqing University and Inner Mongolia University respectively.
My research lies in Computer Vision, Pattern Recognition and Deep Learning. Recently, I am dedicating on developing new algorithms for video object segmentation.
[Apr-2022] - 1 survey paper in video object segmentation (project page) is accepted by Artificial Intelligence Review.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651815.80/warc/CC-MAIN-20230605085657-20230605115657-00555.warc.gz
|
CC-MAIN-2023-23
| 792
| 5
|