url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://packages-pkgmirror-csail.debian.org/bullseye/vcfanno-examples
|
code
|
Package: vcfanno-examples (0.3.2+ds-2)
Links for vcfanno-examples
Download Source Package vcfanno:
- Homepage [github.com]
examples for vcfanno: annotate a VCF with other VCFs/BEDs/tabixed files
Vcfanno allows you to quickly annotate your VCF with any number of INFO fields from any number of VCFs or BED files. It uses a simple conf file to allow the user to specify the source annotation files and fields and how they will be added to the info of the query VCF.
* For VCF, values are pulled by name from the INFO field with special cases of ID and FILTER to pull from those VCF columns. * For BED, values are pulled from (1-based) column number. * For BAM, depth (count), "mapq" and "seq" are currently supported.
This package contains a test data set as well as sample scripts running some test suite provided by Debian also as autopkgtest.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500758.20/warc/CC-MAIN-20230208092053-20230208122053-00389.warc.gz
|
CC-MAIN-2023-06
| 843
| 8
|
https://news.hamlethub.com/trumbull/archive/1-trumbulls-hamlethub-team
|
code
|
Aaron Leo has been a journalist (at heart) since he was a freshman at St. Joseph High School in 1992. Since graduating from Northeastern University in 1999, he has worked all over Southern Connecticut, most recently covering Trumbull and Shelton for Patch. He also spent nearly 10 years at the Connecticut Post newspaper.
Aaron lives in Trumbull with his wife and two children. He enjoys running, bicycling, reading, horror movies and watching Mystery Science Theater 3000 and Monty Python.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100258.29/warc/CC-MAIN-20231130225634-20231201015634-00545.warc.gz
|
CC-MAIN-2023-50
| 490
| 2
|
http://shinai.blogspot.com/2007/07/tying-tenugui.html
|
code
|
About this blog..
This is a blog that I started in April 2006, just after I first put on my bogu (kendo armour). It collects the advices given by more experienced kendo practitioners as well as those from my own experiences. Both technical and the mental aspects of kendo are written in the blog. I hope someone will find them useful or interesting at least!
Wednesday, July 04, 2007
Today I tried to used another way of binding tenugui or the head towel. Instead of the cap style, what normally kids use in Japan, I used this way - see here for a video demonstration. It's definitely for me the best one as it covers the ears (unlike another common method which leaves the ears exposed) and at the back it covers the lower part sufficiently so that the himo does not tangle up the hair. It also has the most of the material around the forehead, where the impact is the strongest, therefore offers a good protection. Moreover, it's fast, at least not slower.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125936914.5/warc/CC-MAIN-20180419110948-20180419130948-00481.warc.gz
|
CC-MAIN-2018-17
| 958
| 4
|
https://pod.co/i-still-learning/confession-session-1
|
code
|
I still learning about my period
my last mistake
“Learn from the mistakes of others. You can't live long enough to make them all yourself.”
The trick is sharing the things we’ve learned with others.
What you learn from someone might be
what not to do,
what to do more of,
what to change,
what to try..
Care to share your last mistake?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155188.79/warc/CC-MAIN-20210804205700-20210804235700-00162.warc.gz
|
CC-MAIN-2021-31
| 340
| 10
|
http://slideplayer.com/slide/7323141/
|
code
|
Presentation on theme: "The UNIX Shell. The Shell Program that constantly runs at terminal after a user has logged in. Prompts the user and waits for user input. Interprets command."— Presentation transcript:
The Shell Program that constantly runs at terminal after a user has logged in. Prompts the user and waits for user input. Interprets command line and makes arrangements for its execution. Generally waits for command to complete execution (locking the terminal). A variety of shells to choose from: Bourne, Korn, C, Bash, Tcsh Killed on logging out.
The Shell Metacharacters Wildcard characters such as *, ?, [, ], ! Redirection characters such as >, < The pipe character, | Command substitution characters ` ` The $ as a variable prefix
cat chap* Shell expands * to match all filenames in the current directory that begin with chap. date > foo Shell sees the > first, opens the file foo and connects the date output to it. who | sort Shell understands the strings on either side of the | as two separate programs and connects them. ls`cat foo` Shell first runs cat and supplies the output as arguments to ls. echo $HOME Evaluates $HOME as a variable before running echo. Examples of Shell Behavior
Wildcards Set of metacharacters used in an expression to match multiple but similar filenames. * means any sequence of characters (including none) ? means a single character [ ] means any characters specified in the bracket ! means not - means a range of characters or numbers Shell creates list of filenames before allowing command to run. Expansion can be prevented by quoting and escaping. Filenames must not contain wild-card characters.
Some Wildcard Examples ls *.lst Lists all files with extension.lst. rm ??* Removes all files with at least 2 characters. cp *.[ch] cprogs Copies all files with.c or.h extension into cprogs. rm *[!a-zA-Z]* Removes files not containing at least one letter. cat note[0-1][0-9] Displays files note00, … note19 rm *.o Removes all files then removes all files with.o extension (an error). Watch out!
Escaping (Using a \ Before a Character) Escaping reverses the usual meaning of metacharacter following it. Example: rm \* removes a file named * Can also protect itself. Example: echo \\ displays a \ Protects space and [Enter]. Example: cd My\ Documents changes to the directory named My Documents Inconvenient to use when command line contains too many metacharacters that need to be escaped.
Quoting Quoting protects most metacharacters from interpretation by the shell. Example: echo “*” prints a * More convenient than escaping when protecting a group of metacharacters. Quoted string understood as a single argument by shell and C programs. (a.out foo “My Documents” has 2 arguments and not 3.) Double quotes and single quotes are not equivalent. Example: echo “$SHELL” is not the same as echo ‘$SHELL’ Quoting doesn’t protect the \ metacharacter. Escaping is required. Quoting
Be Careful Quoting Special Characters Like “, ‘ and \ Try these: echo ‘ ‘ ‘ echo “ “ “ echo ‘ “ ‘ echo “ ‘ “ echo ‘ \ ‘ echo “ \ “
File Handling in the Shell A file is opened by accessing it by its pathname. Opening returns a file descriptor (an integer). Subsequent read/write operations on the file use the descriptor. Kernel allocates lowest available number as descriptor. First three descriptors (0, 1 and 2) are always allocated : 0 is standard input, 1 is standard output, 2 is standard error
Standard Input Uses file descriptor 0. By default, assigned to the user’s terminal keyboard. Can also be obtained from standard output of another program (redirection). Commands using redirection continue to read descriptor 0 and have no knowledge of this manipulation.
Standard Output Uses file descriptor 1. By default, assigned to the user’s display terminal. Can also be used as input to another program (redirection). Commands using redirection continue to write to descriptor 1 and have no knowledge of this manipulation.
Standard Error Uses file descriptor 2. By default, file is assigned to the user’s display terminal. Standard error output can’t be used as input to another program but error output can be redirected to a file (redirection). Commands using redirection continue to write error messages to descriptor 2 and have no knowledge of this manipulation.
Redirection Using, and >> Redirection is a shell feature for manipulating command input and output. Most commands designed to write output to standard output. Most commands designed to take input from standard input when used without a filename as argument. Shell can assign these files to disk files through redirection: wc prog.c > countfile wc prog.c >> countfile wc < prog.c wc prog.c > countfile 2> errorfile Commands themselves have no knowledge of the reassignment.
Redirection Using a Pipe | Connects standard output on one command to standard input of another Example: who | wc –l Displays # users on system No temporary file is created. Used to solve many text manipulation problems. Commands have no knowledge that they are reading from or writing to a pipe. tee command duplicates its input and sends to both file and standard out Example : ls | tee filelist List files on screen and in a file.
Two More Special Files to Redirect Output /dev/null basically sends out nowhere. File size is always zero. Examples: cat myfile > /dev/null Command does nothing! find / -name myfile –print 2> /dev/null This command hunts for file named myfile starting at root and lists it. Send all error messages nowhere. /dev/tty is the file indicating your terminal (not the same file as standard output or standard error!) Example: who > /dev/tty Lists users at your terminal.
Command Substitution Allows command arguments to be obtained from standard output of another command. In command1 `command2`, command2 is run first and its standard output used as arguments to command1. Example: echo Today is `date` Command enclosed by ` ` (backquotes) must write to standard output. Convenient mechanism for running commands whose arguments are known only at runtime. Example: echo “There are `ls | wc –l` files in this directory.” (Use double quotes around echo, not single quotes.)
Shell Variables Users define shell variables as variable=value. Referenced with $. Environment variables such as SHELL, HOME, and PATH are shell variables. Example: echo $HOME Variables have no type and need no declaration before being used. All shell variables initialized to null ( x=“” or x=‘’ or x= ). To remove a shell variable, use unset. Example: unset x To prevent changes to a shell variable, use readonly. Example: readonly pi
Using Shell Variables Set a variable x to 5 and display the value: x=5 ; echo $x (no whitespace on either side of =) x = 5 is illegal; x is interpreted as a command to run. Can be set from command substitution: Example: directory=`pwd` Useful for storing pathnames that are repeatedly used in a shell script: Example: addressbook=$HOME/data/addressbook
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494331.42/warc/CC-MAIN-20200329105248-20200329135248-00183.warc.gz
|
CC-MAIN-2020-16
| 7,045
| 19
|
https://peb.gov.sg/apply_ppe.aspx
|
code
|
Apply for PPE 2022
Application to sit for the Practice of Professional Engineering Examination has closed.
Examination dates are scheduled on 19 May 2022 (Part 1) and 20 May 2022 (Part 2).
The next examination is scheduled in May 2023. Application to sit for examination will start in Dec 2022.
For more information on PPE 2022, please refer to Information on Practice of Professional Engineering Examination
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711278.74/warc/CC-MAIN-20221208050236-20221208080236-00318.warc.gz
|
CC-MAIN-2022-49
| 408
| 5
|
https://blueridgeblues.org/how-to-connect-bluehost-domain-to-squarespace/
|
code
|
How To Connect Bluehost Domain To Squarespace
Finding a high-quality economical webhosting provider isn’t simple. Every internet site will certainly have various needs from a host. Plus, you need to contrast all the functions of a holding firm, all while looking for the best bargain feasible.
This can be a great deal to sort through, especially if this is your first time acquiring hosting, or building a web site.
The majority of hosts will supply incredibly inexpensive initial pricing, just to increase those rates 2 or 3 times greater once your preliminary call is up. Some hosts will certainly give cost-free rewards when you register, such as a complimentary domain name, or a cost-free SSL certificate.
While some hosts will certainly have the ability to offer better performance and also high levels of protection. How To Connect Bluehost Domain To Squarespace
Below we dive deep right into the best economical host plan there. You’ll discover what core hosting features are essential in a host and also just how to analyze your very own holding demands to ensure that you can choose from among the very best low-cost organizing companies listed below.
Disclosure: When you purchase a webhosting package through web links on this page, we gain some payment. This assists us to maintain this website running. There are no added prices to you in any way by using our links. The listed here is of the very best low-cost web hosting packages that I’ve personally made use of and checked.
What We Think about To Be Inexpensive Host
When we explain a host package as being “Affordable” or “Budget plan” what we indicate is hosting that falls into the price brace in between $0.80 to $4 each month. Whilst researching affordable holding companies for this guide, we looked at over 100 different hosts that came under that cost array. We then analyzed the top quality of their least expensive hosting bundle, worth for money as well as customer support.
In this post, I’ll be going over this world-class web site organizing company and also stick in as much relevant info as feasible.
I’ll review the functions, the pricing choices, as well as anything else I can consider that I think could be of advantage, if you’re choosing to join to Bluhost as well as obtain your websites up and running.
So without additional trouble, allow’s check it out.
Bluehost is among the greatest webhosting companies in the world, getting both huge marketing support from the firm itself as well as associate online marketers who promote it.
It truly is a massive business, that has been around for a very long time, has a large credibility, and also is most definitely one of the top choices when it concerns webhosting (absolutely within the leading 3, a minimum of in my publication).
But what is it specifically, and also should you get its services?
Today, I will answer all there is you need to understand, provided that you are a blog writer or a business owner who is trying to find a web host, and does not understand where to get started, because it’s a terrific service for that audience in general.
Let’s imagine, you wish to hold your sites as well as make them noticeable. Okay?
You currently have your domain (which is your site location or LINK) now you want to “turn the lights on”. How To Connect Bluehost Domain To Squarespace
You require some hosting…
To accomplish every one of this, and to make your site noticeable, you need what is called a “server”. A server is a black box, or tool, that keeps all your site data (files such as photos, messages, videos, web links, plugins, and also other info).
Currently, this web server, has to be on all the time and also it needs to be attached to the internet 100% of the moment (I’ll be mentioning something called “downtime” in the future).
In addition, it additionally needs (without getting too elegant and also right into information) a file transfer protocol generally called FTP, so it can reveal internet internet browsers your internet site in its designated form.
All these points are either expensive, or call for a high degree of technological skill (or both), to produce and maintain. And also you can totally head out there and also learn these points on your own as well as established them up … yet what concerning as opposed to you acquiring and also preserving one … why not simply “renting holding” instead?
This is where Bluehost is available in. You lease their web servers (called Shared Hosting) as well as you release an internet site making use of those web servers.
Given that Bluehost maintains all your documents, the firm also enables you to set up your content monitoring systems (CMS, for short) such as WordPress for you. WordPress is an incredibly preferred CMS … so it simply makes good sense to have that option readily available (nearly every organizing firm now has this alternative also).
In short, you no longer need to set-up a server and afterwards integrate a software program where you can develop your material, individually. It is currently rolled into one package.
Well … picture if your web server remains in your residence. If anything were to take place to it in any way, all your data are gone. If something goes wrong with its inner processes, you require a service technician to fix it. If something overheats, or breaks down or obtains damaged … that’s no good!
Bluehost takes all these inconveniences away, and cares for whatever technological: Pay your web server “rental fee”, and also they will care for every little thing. And once you get the service, you can after that begin focusing on adding content to your site, or you can put your effort right into your advertising campaigns.
What Provider Do You Obtain From Bluehost?
Bluehost offers a myriad of different solutions, but the key one is hosting naturally.
The organizing itself, is of various kinds incidentally. You can lease a common server, have a dedicated web server, or also a virtual exclusive server.
For the objective of this Bluehost evaluation, we will certainly focus on organizing services and also other services, that a blog writer or an on the internet entrepreneur would need, as opposed to go too deep into the bunny hole and also talk about the various other solutions, that are targeted at more experienced individuals.
- WordPress, WordPress PRO, and shopping— these hosting services are the plans that allow you to organize a site using WordPress as well as WooCommerce (the latter of which enables you to do e-commerce). After purchasing any of these bundles, you can start developing your web site with WordPress as your CMS.
- Domain Market— you can additionally buy your domain from Bluehost rather than other domain registrars. Doing so will certainly make it less complicated to point your domain to your host’s name web servers, given that you’re using the exact same industry.
- Email— when you have acquired your domain, it makes good sense to likewise get an email address linked to it. As a blog writer or online entrepreneur, you must practically never ever use a free e-mail solution, like Yahoo! or Gmail. An email similar to this makes you look unprofessional. Luckily, Bluehost gives you one totally free with your domain name.
Bluehost likewise suppliescommitted servers.
And you may be asking …” What is a specialized web server anyhow?”.
Well, the important things is, the standard host bundles of Bluehost can just a lot website traffic for your site, after which you’ll require to upgrade your hosting. The reason being is that the typical web servers, are shared.
What this suggests is that server can be servicing 2 or more sites, at the same time, among which can be yours.
What does this mean for you?
It suggests that the single web server’s resources are shared, as well as it is doing multiple tasks at any offered time. When your internet site begins to strike 100,000 website brows through every month, you are mosting likely to require a dedicated web server which you can additionally receive from Bluehost for a minimum of $79.99 each month.
This is not something yous ought to stress over when you’re starting out yet you need to maintain it in mind for sure.
Bluehost Rates: How Much Does It Expense?
In this Bluehost testimonial, I’ll be concentrating my focus primarily on the Bluehost WordPress Hosting plans, because it’s the most prominent one, and also most likely the one that you’re searching for and that will certainly match you the very best (unless you’re a big brand, firm or website).
The 3 available strategies, are as complies with:
- Standard Plan– $2.95 per month/ $7.99 routine cost
- Plus Strategy– $5.45 per month/ $10.99 normal price
- Option Plus Strategy– $5.45 per month/ $14.99 routine rate
The initial price you see is the rate you pay upon sign up, and the 2nd price is what the cost is, after the first year of being with the business.
So primarily, Bluehost is mosting likely to bill you on a yearly basis. And you can additionally choose the amount of years you intend to hold your website on them with. How To Connect Bluehost Domain To Squarespace
If you pick the Standard plan, you will pay $2.95 x 12 = $35.40 starting today and also by the time you enter your 13th month, you will currently pay $7.99 monthly, which is likewise billed annually. If that makes any kind of feeling.
If you are serious about your internet site, you need to 100% get the three-year option. This implies that for the fundamental strategy, you will certainly pay $2.95 x 36 months = $106.2.
By the time you hit your fourth year, that is the only time you will certainly pay $7.99 monthly. If you consider it, this technique will conserve you $120 in the course of 3 years. It’s not much, but it’s still something.
If you intend to obtain greater than one internet site (which I extremely recommend, and if you’re major, you’ll possibly be obtaining even more at some point in time) you’ll intend to make use of the choice plus strategy. It’ll allow you to host limitless internet sites.
What Does Each Plan Offer?
So, when it comes to WordPress hosting plans (which are similar to the shared organizing plans, but are more tailored in the direction of WordPress, which is what we’ll be concentrating on) the features are as follows:
For the Standard strategy, you get:
- One site just
- Safe internet site by means of SSL certification
- Optimum of 50GB of storage
- Free domain for a year
- $ 200 advertising and marketing credit score
Keep in mind that the domain names are bought separately from the hosting. You can obtain a complimentary domain name with Bluehost right here.
For both the Bluehost Plus hosting as well as Choice Plus, you obtain the following:
- Limitless variety of web sites
- Free SSL Certificate. How To Connect Bluehost Domain To Squarespace
- No storage space or bandwidth limit
- Totally free domain name for one year
- $ 200 advertising and marketing credit scores
- 1 Office 365 Mailbox that is free for thirty days
The Choice Plus plan has an included advantage of Code Guard Basic Back-up, a back-up system where your documents is saved and also duplicated. If any type of collision occurs as well as your site information disappears, you can restore it to its initial type with this feature.
Notification that despite the fact that both strategies cost the very same, the Option Plan then defaults to $14.99 monthly, routine rate, after the collection amount of years you’ve picked.
What Are The Conveniences Of Using Bluehost
So, why choose Bluehost over other webhosting services? There are numerous host, many of which are resellers, yet Bluehost is one pick few that have stood the test of time, and it’s possibly one of the most popular around (as well as forever factors).
Right here are the 3 main advantages of selecting Bluehost as your web hosting service provider:
- Web server uptime— your site will not be visible if your host is down; Bluehost has greater than 99% uptime. This is extremely important when it pertains to Google SEO and also rankings. The greater the better.
- Bluehost rate— just how your web server response figures out how fast your site reveals on a web browser; Bluehost is lighting fast, which implies you will certainly decrease your bounce rate. Albeit not the very best when it involves filling speed it’s still extremely crucial to have a fast rate, to make customer experience far better and also far better your ranking.
- Unlimited storage— if you get the And also plan, you need not bother with the number of files you store such as videos– your storage space ability is limitless. This is really important, due to the fact that you’ll possibly encounter some storage concerns in the future down the tracks, and also you don’t want this to be an inconvenience … ever.
Last but not least, customer assistance is 24/7, which suggests despite where you are in the globe, you can get in touch with the assistance team to repair your site concerns. Pretty standard nowadays, yet we’re taking this for granted … it’s likewise really essential. How To Connect Bluehost Domain To Squarespace
Likewise, if you have actually gotten a complimentary domain name with them, after that there will certainly be a $15.99 cost that will be subtracted from the quantity you originally purchased (I envision this is because it sort of takes the “domain out of the marketplace”, not sure about this, but there most likely is a hard-cost for registering it).
Last but not least, any requests after one month for a refund … are void (although in all honesty … they must probably be rigorous here).
So as you see, this isn’t necessarily a “no questions asked” policy, like with several of the various other holding choices out there, so make certain you’re alright with the plans before proceeding with the hosting.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038464146.56/warc/CC-MAIN-20210418013444-20210418043444-00611.warc.gz
|
CC-MAIN-2021-17
| 13,961
| 82
|
https://thecryptocandle.com/tradeblock
|
code
|
TradeBlock offers blockchain enterprise services, backed by investors Andreessen Horowitz and Y-Combinator. Established in 2013, they focus on servicing financial institutions with execution and analysis tools from their New York headquarters. TradeBlock offers publicly available indices for Bitcoin, Ethereum, Litecoin, and more, with live market information and analysis tools. Users can easily compare prices and access data through an API, and custom reports are available. TradeBlock's blog and Twitter account keep users updated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00690.warc.gz
|
CC-MAIN-2023-40
| 536
| 1
|
https://forum.fiverr.com/t/fiverr-is-down/288474
|
code
|
When I tried to take a test I immediately got the message “Fiverr is down” and that I failed the test. (without the test even having started). I could not retake the test. I received the message I can only take a test once per 24 hours.
Waiting 24 hours is not going to help. You are only allowed to take a test twice every three months. I want another opportunity to take the test.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178367183.21/warc/CC-MAIN-20210303165500-20210303195500-00028.warc.gz
|
CC-MAIN-2021-10
| 386
| 2
|
http://cse.hust.edu.cn/info/1072/1165.htm
|
code
|
Bin Yuan, Deqing Zou, Hai Jin, Shui Yu, Laurence T. Yang. HostWatcher: Protecting Hosts in Cloud Data Centers through Software-Defined Networking. Future Generation Computer Systems. 2017.
Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan, Weiqi Dai. Deployment Of Robust Security Scheme In SDN Based 5G Network Over NFV Enabled Cloud Environment. IEEE Transactions on Emerging Topics in Computing, 2018.
Hai Jin, Zhi Li, Deqing Zou, Bin Yuan. DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-based Cloud. IEEE Transactions on Dependable and Secure Computing, 2019.
Bin Yuan, Deqing Zou, Shui Yu, Hai Jin, Weizhong Qiang, Jinan Shen. Defending against Flow Table Overloading Attack in Software-Defined Networks. IEEE Transactions on Services Computing, vol. 12, no. 2, pp. 231-246, 2019.
Bin Yuan, Deqing Zou, Hai Jin, Laurence T. Yang, Shui Yu. A Practical Byzantine based Approach for Faulty Switch Tolerance in Software-Defined Networks. IEEE Transactions on Network and Service Management, vol. 15, no. 2, pp. 825-839, 2018.
袁斌,邹德清,金海. 网络安全可视化综述,信息安全学报,2016, 1(3):10-20.
Deqing Zou, Yu Lu, Bin Yuan*, Haoyu Chen, Hai Jin. A Fine-Grained Multi-Tenant Permission Management Framework for SDN and NFV. IEEE Access, vol. 6, pp. 25562-25572, 2018.
Deqing Zou, Zirong Huang, Bin Yuan*, Haoyu Chen, Hai Jin. Solving Anomalies in NFV-SDN Based Service Function Chaining Composition for IoT Network. IEEE Access, vol. 6, pp. 62286-62295, 2018.
Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan. Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network. In proceedings of the 27th International Conference on Computer Communications and Networks, 2018.
Ihsan H Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan, Weiming Li. SecSDN-Cloud: Defeating Vulnerable Attacks through Secure Software-Defined Networks. IEEE Access, vol. 6, pp. 8292-8301, 2018.
Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan. Validating User Flows to Protect Software Defined Network Environments. Security and Communication Networks, 1308678:1-1308678:14, 2018.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540481281.1/warc/CC-MAIN-20191205164243-20191205192243-00140.warc.gz
|
CC-MAIN-2019-51
| 2,185
| 11
|
https://mail.gnome.org/archives/dashboard-hackers/2007-August/msg00052.html
|
code
|
Re: Dashboard Dbus Frontend
- From: "kim wroblewski" <kimwroblewski gmail com>
- To: dashboard-hackers gnome org
- Subject: Re: Dashboard Dbus Frontend
- Date: Wed, 15 Aug 2007 06:26:45 -0400
>Neat. The idea is that all of this information would come up as a
>notification on the side?
Yes, each tile is its own notification popup on the side.
It's nice how the dashboard popups integrate and inter-mix with other notifications like logins and warnings.
I think it is interesting that the layout is completely based on the quality of the information sent.
Dashboard presents prioritized information.
Notify has logic that displays information.
There is one visual field, but there are many sources of information.
Even if the visual field is multi-dimensional, complex or changing:
Dashboard can concentrate on following the task at hand as clued by the user's apps.
Notify can concetrate on displaying priority information.
The dashboard currently states when the tile should be shown and taken down.
What information is shown.
What priority it is.
What type it is.
A popup is a stackable block that can contain widgets tailored to displaying 'types' of information.
Current types are:
* url, with an application "chooser"
* button, that executes a callback function
Is there an application which would be impossible to make with popups?
Could a text editor be made where each dialogue box was a specified popup box to appear at a given location in a given context? And for the file dialogue box to appear when it was appropriate? The easiest set of rules is to say the box should be shown at all times in all cases.
>(a)unobtrusive to the user
>(b)a dedicated Dashboard UI is pretty useful on its own as well.
The easy answer is, 'dedicated' means stable across space and time. And dashboard currently says when a popup-tile goes up and comes down.
The hard answer is, Dashboard need not be a second class citizen.
A Beagle-Filter for scoring how we view images is the same as a set of rules that lays-out graphical information popups, only running in the other direction.
image -> priority list
prioritized list -> image
The rules I am using in my Image Filter are taken from classical image composition. Constraint rules such as:
1)The most important element takes up the greatest area.
2)The most important element has the greatest value contrast.
3)The most important element has the most saturation.
4)The most important element has complimentary colors at it's boarder.
5)The circle has a higher visual attention score than a square.
6)pop-art icons score higher than foreign shapes.
7)progressions of space divisions, or gradients have an attention gradient
8)symmetry develops visual tension.
9)golden ratios develops visual relaxation.
10)tangency develops visual tension.
11)a subsection of color is relative to it's context
*For pictures you look at day-in and day-out, you can add rules of reinforcement-association, as your autonomic reactions learn instinctual responses for locations and behaviors. Thresholds above which increases attention scores.
From what I have seen, previous tries at dynamic UI layout were unable to apply such constraint rules effectively because it did not 'know' the task at hand, and the priority of interest for that task.
Or if it was given the task priority, the constraint-rules were lacking any real expert knowledge and it was more of an academic exercise. Maybe a system dedicated to collecting such contextual task information is prime to drive such a layout machine.
Circuit board layout seems no more complicated than plotting information-layouts.
If it sees that your going to put your glass down, it pops up a coaster.
If it sees that your typing C# code, it alerts you the food store closes in 30 minutes.
If it sees that your watching a movie, it takes down the clock popup.
The intrusion is the priority.
The human body has both more thoughtful motives and autonomic reactions. They compete for your attention.
Right now we have 95% app/5% toolbar ratio.
The 95% is used to show search engine results, and web-design layouts.
When Dashboard starts firing notifications of more interest than going to a public search engine, or website directly, it will command more screen realestate.
For example, I'm sick of checking my bank account with the human web-interface. It's a terrible interface to return a single integer. Can we put in a Beagle Filter for 'web screen-scrapers'?
] [Thread Prev
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122996.52/warc/CC-MAIN-20170423031202-00557-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 4,450
| 59
|
https://glints.com/my/opportunities/jobs/system-analyst/6e2131e3-ba69-46b3-a1b2-ddafadf8979b
|
code
|
Make sure you’re applying to a legit company by checking their website and job posts.
Job description System Analyst VhiWEB
- Responsible for the business flow of every feature in a project.
- Learn business process with stakeholders.
- Maintain technical and business requirement documentation.
- Collaborate with designer, developer, tester, other members in dev team, and stakeholders.
- Responsible for managing team members.
- Bachelor’s degree in Information Technology, Computer Science, or Information System.
- Have experience in database and web/app development process.
- Able to design and analyze system requirements from business needs, also implement them in documentations.
- Have knowledge in programming is a plus.
- Able to work in a fast-paced environment, attention to detail, passion in analysis, have critical thinking, leadership, and problem-solving skill.
- Good teamwork and self-management skills.
- Cozy, fun, love to share & learn new things
- Work from anywhere program every Wednesday
- Performance Bonus every 3 months
- International & Domestic Outing every year
- MacBook to boost your productivity
- BPJS Kesehatan & BPJS Ketenagakerjaan
- Extra allowance for wellness
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487637721.34/warc/CC-MAIN-20210618134943-20210618164943-00412.warc.gz
|
CC-MAIN-2021-25
| 1,208
| 20
|
https://wiki.metacentrum.cz/wiki/CuDNN_library
|
code
|
The NVIDIA CUDA® Deep Neural Network library (cuDNN) is a GPU-accelerated library of primitives for deep neural networks. cuDNN provides highly tuned implementations for standard routines such as forward and backward convolution, pooling, normalization, and activation layers. cuDNN is part of the NVIDIA Deep Learning SDK.
Development tools and environments
Versions and modules:
cudnn-7.0 (for CUDA 8.0 and later) cudnn-6.0 (for CUDA 7.5 and later) cudnn-5.1 (for CUDA 7.5 and later) cudnn-5.0 (for CUDA 7.5 and later) cudnn-4.0 (for CUDA 7.0 and later)
You have to be registered in NVIDIA Accelerated Computing Developer Program and agree with their licence.
module load cudnn-7.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688926.38/warc/CC-MAIN-20170922074554-20170922094554-00104.warc.gz
|
CC-MAIN-2017-39
| 684
| 6
|
http://woolfcamp2006.blogspot.com/2006/02/home-again.html
|
code
|
Oh, and I'm home now. I'm sure Debbie is too! We never found the bag or her car keys. Her partner and his other partner valiantly drove down from the East Bay to give us duplicate keys. I hope someone finds the bookbag. Probably it got loaded up into the wrong car!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174124.9/warc/CC-MAIN-20170219104614-00150-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 265
| 1
|
https://forums.adobe.com/thread/930616
|
code
|
I have a large project that I want to use the multi-camera feature with. All totaled I have three video sources. Using the numbered markers to align the various segments based on clapboard sound, I go double click on the video segment as I've placed it in the time line. This opens the source monitor. I navigate to the beginning of the video use the Jump to next marker in the monitor and then jog the video forward a frame or two to expose the numbered marker (PS Why doesn't it center it in the Source Marker and not place it in the right hand side of my screen .... GERRRR). I try and drag the numbered marker and it doesn't want to move. I try and move it a little more and CRASH... GERRRRR.... Now after working on this for the last hour I haven't been able to drag the marker reliably.
Well thanks to some debugging skills I find a work around. Thank goodness.... If I go to the Project Window and open the video clip from there, into the very same source monitor (Actually I closed the Source Monitor and then let the double click open it ) Now I can reliably move the marker!!!!
Why, oh why me!!!
Is this a known issue?
I've never use numbered markers for this myself. I just get the clips close using the waveform and then nudge things into precise alignment manually.
OMG!I such abuse!
Just kidding... I have three video cams one of which has a noisy mic, so the wave form is not as distinct as to make it easy as a good mic would..
The Markers just make the chore so much easier when they WORK! I can always come back and just realign them if I should bump them the wrong way or if I take a shot out and want to put it back in at a later date.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889798.67/warc/CC-MAIN-20180121001412-20180121021412-00049.warc.gz
|
CC-MAIN-2018-05
| 1,655
| 8
|
http://www.google.com/patents/US20040109453?ie=ISO-8859-1&dq=5,870,513
|
code
|
US 20040109453 A1
A graphical system and method for creating and editing packets of data is disclosed, which displays on a first pane of a computer window a hierarchical order of all of the protocol layers and protocol fields of a data packets, and displays on a second pane of the same window the entire encoded data packet in standard hexadecimal notation. In the first pane, a user can select a field of data pertaining to any of the protocol layers from the hierarchical order, and change any of the protocol field values, change options within a protocol, or add additional protocol layers to the packet, and the portion of the encoded data pertaining to the changed data will be updated in the second pane.
1. A method for creating and editing an encoded data packet, said method comprising:
displaying on a first pane of a computer window a hierarchical order of all of the protocol layers and protocol fields of said encoded data packet; and
displaying on a second pane of said window the entire encoded data packet.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
10. The method of
11. The method of
12. The method of
13. The method of
14. The method of
15. The method of
16. The method of
17. The method of
18. The method of
19. The method of
20. The method of
21. The method of
22. The method of
23. A system for displaying packets of encoded data whose content and format is defined by communications protocols, said data packets including encoded data transportable over a communication network, said system comprising:
a processor for calculating said encoded data packets based upon one or more user selected network protocols, such protocols encapsulated in layers in a user selected order;
a display for presenting in a first window pane said user selected protocols with their header fields and payload, and for presenting in a second window pane the encoded data associated with said selected protocols; and
an input for receiving changes to said protocols, header fields and payload, said changes resulting in new encoded data, with said processor receiving said input and changing said presentation of said encoded data packet in said second window pane.
24. The system of
25. The system of
26. The system of
27. The system of
28. The system of
29. The system of
30. A system for creating and displaying PDUs, said system comprising:
means for receiving the identities of protocols desired as well as their layering, and
means for displaying received ones of said protocols in the layered ordered desired on a single window of a display without regard to the number of layers desired.
31. The system of
32. The system of
33. The system of
34. The system of
35. A computer product, including software, for controlling a processor, said computer product comprising code for creating data packets in accordance with user input of protocols and layering thereof, and code for controlling the display of said protocols in the layered order desired by said user, said display being on a single window without regard to the number of layers selected.
36. The computer product of
37. The computer product of
38. The computer product of
39. The computer product of
40. The computer product of
41. The computer product of
42. The computer product of
43. The computer product of
44. The computer product of
45. The computer product of
46. The computer product of
47. The computer product of
48. The computer product of
49. The computer of
This invention relates to communications networks and, more specifically, to systems and methods for constructing and editing multi-layer packets of data, as defined by communications protocols.
In certain applications of communications systems, for example, communications testing products, it is necessary to generate simulated network traffic. As part of this simulation, users will need to construct and modify data packets, often called Protocol Data Units (PDUs) which are then transmitted as the simulated traffic. The format and content of each PDU is based on previously-defined communications protocols. A protocol defines the format, length and meaning of the fields or data elements which a PDU contains. Some protocols define optional fields, which may or may not be included in a PDU. Also, in order to build a complete PDU, users will generally need to encapsulate several different protocols in layers, in both standard and non-standard sequences. Each protocol may be industry standard or proprietary to a particular network equipment vendor.
A software tool used to construct and edit PDUs is called a PDU Builder, and is typically accessed by a user through a Graphical User Interface (GUI). One such tool is used in a communications testing product called “Router Tester” and is available from Agilent Technologies, Inc. of Palo Alto, Calif., USA, which tool is hereby incorporated by reference herein.
The GUIs for current PDU Builders have a similar look and feel. Typically, the protocol fields in a PDU are displayed in a window using standard GUI controls, such as Edit Boxes, Check Boxes, etc. In most cases, each protocol is displayed in a separate window, and to edit a multi-layer PDU the user must switch back and forth between several windows. In some cases, more than one protocol is displayed in a single window, but only a small number—usually no more than two. And in these cases, not all the fields in the protocols can be displayed in the window, because of the limitations of screen space.
There are several disadvantages of this approach. One such disadvantage is that users must switch between several different windows to construct and edit a multi-layer PDU, because each protocol layer of the PDU is displayed in its associated window. Thus, it is not possible to see the entire PDU at once. A further problem with existing systems is that the number of protocol layers that can be supported is small, in the order of about 3-4 layers. The design of such systems has intrinsically limited scalability, because adding more protocol layers means adding more and more windows, thereby making the GUI increasingly more complex and less usable.
Further problems with existing systems are that protocol layering can only be done in one of a few fixed and well-known sequences, and that the size of protocols and PDUs that can be displayed is limited by the size of the windows. Also the choice of protocols is limited to a relatively small list of well-known standard protocols. In addition, optional fields are only supported in a very limited and indirect way.
The present invention is directed to a scrollable, dynamic system and method which enables a user to interactively construct and modify an entire multi-layer PDU in one place. This system and method allows the user to create arbitrarily large and complex PDUs, with protocols layered in any order and to any depth, all in a single view.
In one embodiment, a system and method of creating PDUs displays on a first pane of a GUI window a tree-structured hierarchical order of all the protocol layers, header fields and payload of a PDU, and displays on a second pane of the same window the entire encoded PDU data in standard hexadecimal notation. The tree display is dynamic, in that each node of the tree can be interactively opened or closed by the user to hide or reveal the data fields in the next level down of the hierarchy.
In a further embodiment, a user can select a field of data pertaining to any of the protocol layers from the hierarchical order and change any of the protocol field values, or change options within a protocol, and the portion of encoded PDU data pertaining to the changed data will be changed and displayed in the second pane of the window. In addition, any derived protocol fields are automatically re-calculated by the system and re-displayed in both parts of the window.
In a still further embodiment in response to a user adding or removing a selected protocol layer in a first pane of a window, the proper protocol fields are added or removed at the proper location within the existing PDU's hierarchical order of layers. The revised PDU encoding is then displayed in hexadecimal notation in a second pane of the existing window.
In a still further embodiment in response to a user adding or removing selected optional protocol fields to a first pane of a window and the PDU header is appropriately extended or reduced, at the proper location within the existing PDU. The revised PDU encoding is then displayed in hexadecimal notation in a second pane of the existing window.
In a still further embodiment, a user can over-ride automatic calculation of derived protocol fields in a first pane of a window and the derived field's value is not automatically recalculated when other parts of the PDU are changed, but rather the fixed value manually entered by the user is retained. The revised PDU encoding is then displayed in hexadecimal notation in a second pane of the existing window.
The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.
For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawing, in which:
FIG. 1 is a screen view of one embodiment of the system and method of the invention;
FIGS. 2A and 2B show screen views of the method of adding a protocol layer to a PDU;
FIG. 3 is a screen view of a PDU with all its hierarchical layers after the new protocol has been added;
FIG. 4 is a screen view of just the primary data fields of a PDU;
FIGS. 5, 6 AND 7 are screen views of one method of adding optional protocol fields to a PDU;
FIG. 8 is a screen view of another method of adding optional protocol fields to a PDU;
FIG. 9 is a screen view of the manual override of the value of an automatically-derived field;
FIGS. 10A, 10B, 11A and 11B show diagrams of system operation showing one embodiment of the teachings of the invention; and
FIGS. 12, 13 and 14 are screen views of a prior art PDU builder.
Before beginning a discussion of the inventive concepts and the embodiments thereof, it may be helpful to review existing tools for the construction of PDUs. This will be under taken with respect to FIGS. 12, 13 and 14, of the prior art.
Beginning with FIG. 12, window 1200 allows the user to define payload data 1201, its packet size 1202 and protocols 1203, 1204 in the PDU. The layering is limited to the fixed options, chosen from set 1203, 1204. The above example shows a 3-layer (TCP/IP/Ethernet pronounced “TCP over IP over Ethernet”) PDU being selected 1206, 1207, 1208. TCP, IP and Ethernet are three well-known Internet protocols and the layering means that each protocol is encapsulated inside the payload of the next one.
To edit the IP layer header, the user clicks Edit button 1209, and a second window 1300 opens, as shown in FIG. 13. Screen 1300 allows the user to edit the IP protocol fields, and to see a hexadecimal encoding 1301 of the IP header—i.e. the actual bytes of data that will be transmitted. Options & Padding box 1302 allows the user to type in the hexadecimal bytes of optional field data. However, the user must know the format, length and encoding of the optional fields and must calculate the hexadecimal encoding first—i.e. there is no direct support for the actual protocol fields. Note that window 1200, FIG. 12, did not show any of the encoded PDU data.
To edit the TCP layer, the user clicks on Edit TCP 1303 and a third window 1400, shown in FIG. 14, opens on top of IP window 1300. Window 1400 allows the user to edit the TCP protocol fields, and to see the hexadecimal encoding of the TCP header in box 1401. Note that the PDU encoding shown in field 1401 is just for the TCP healer—i.e. only a portion of the full PDU encoding—and is different from the encoding shown in window 1300, FIG. 13.
In the above-mentioned system, no single window contains all the PDU information, so the user must refer to several windows to understand the complete picture, and must remember the contents of each window because they can only see them one at a time. It is also not a very extensible system, because as more protocol layers are added, more windows must be added, and the UI complexity and memory load on the user grows accordingly.
FIG. 1 shows one embodiment of the present invention showing window 10 having two panes 11 and 12. Pane 11 shows the protocols and their fields, arranged by the order they are to be encapsulated in the PDU, while pane 12 shows the full hexadecimal encoding for the entire PDU. This example shows a 2-layer IPv4/Ethernet PDU, where the Internet Protocol Version 4 (IPv4) packet 101 is encapsulated inside Ethernet II packet 102. (That is, the Ethernet II Payload 103 contains the IPv4 packet 101.) The PDU thus consists of 3 main parts: Ethernet II Header 104, IP Header 105, and IP Payload 106. The encoding for Ethernet II Header 104 is shown in pane 12 at 107, the encoding for IP Header 105 is shown at 108, and the encoding for the IP Payload 106 is shown at 109. The user works in pane 11 and the encoding is updated, by the system, in pane 12.
For example, the “Source Address” field is shown selected in box 110, where the user can enter or modify the source address value. When the user enters (or changes) the address value, and hits the Enter key, the proper hexadecimal encoding is updated in pane 12 at the proper location 111. In addition, any “automatic” protocol fields, for example the Header Checksum field 112, will be automatically re-calculated by the system and re-displayed, both in field 112 and in the encoding in pane 12 at position 113, unless the user has selected to override an automatic value, as explained later.
To add another protocol layer to the PDU (for example, a TCP layer), the user places the computer cursor at the desired location for the new protocol by selecting IP Payload field 106, and then pops up menu 201, FIG. 2A. The user then selects “Add Protocol” command 202, and then selects “TCP” from popup list 203, FIG. 2B.
FIG. 3 shows the added Transmission Control Protocol (TCP) 301, which has replaced the previously-editable contents of IP Payload 106, creating a 3-layer TCP/IPv4/Ethernet PDU, similar to the one discussed above with respect to existing systems. That is, new TCP packet 301 is encapsulated inside IPv4 packet 101, and in turn IPv4 packet 101 is encapsulated inside Ethernet II packet 102. Thus, the PDU now consists of 4 main parts: Ethernet II Header 104, IP Header 105, TCP Header 302, and TCP Payload 303. Note that the added protocol layer does not necessarily make the PDU longer—in this case the TCP packet simply replaces the payload of the IP packet which encapsulates it.
In pane 12, the hexadecimal encoding for new TCP Header 302 is shown at 304, and the encoding for TCP Payload 303 is shown at 305. TCP encoding 304/305 replaces the previous encoding for IP Payload 109 FIG. 1. The system has also automatically set the IP Header Protocol field 114, changing the value from “0” (FIG. 1) to “TCP” (FIG. 3), as required by the IP protocol. In addition, Header Checksum field 112 has been automatically re-calculated by the system and re-displayed, both in field 112 and in encoding 113 in pane 12.
In FIG. 3 window 10, the complete 3-layer TCP/IP/Ethernet PDU can be modified and/or edited in a single scrollable view, since all fields of all layers are presented in the interactive tree control (in pane 11), with the complete hexadecimal encoding of the whole PDU displayed next to it (in pane 12). The displayed PDU encoding in pane 12 is at all times automatically synchronized with the protocol fields values in pane 11, such that when the user makes a change, or an addition in pane 11, the proper corresponding change is made in pane 12. For example, IP Source Address field 110 has the value “184.108.40.206”, and the corresponding hexadecimal encoding “01 02 03 04” is shown at 111. If the user were to change the value at 110 to “220.127.116.11”, then after Enter is pressed, the hexadecimal encoding at 111 would automatically change to “05 06 07 08”. To make this relationship between the fields in pane 11 and pane 12 clearer to the user, the encoding for the selected field in pane 11 could be highlighted in pane 12 for example, or could be shaded or color-coded. The process of adding protocol layers can be continued indefinitely in pane 11, with the only added complexity being the need to scroll up and down in pane 11, (and possibly in pane 12) as the PDU grows. Thus, the present invention provides a flexible, dynamic display of any number of protocol layers, which is easily manipulated and edited by the user. The number of layers which it could handle is theoretically unlimited (except perhaps by computer memory), but in practice no more than 7 layers would be required of a PDU Builder, since the ISO standard network model has 7 protocol layers.
If many protocol layers are added to a PDU, the tree display will become larger, and will thus require more scrolling of the window. However, in many cases, the user does not need to see or edit all the fields of each protocol header, and only the most important or frequently used ones need be viewed. In this case, the user may simplify the display by selecting a viewing option that shows only fields designated as being “important”, i.e. of primary interest to the user. This is shown in FIG. 4, where window 40 has replaced window 10, and is accomplished by the user selecting the appropriate viewing option via button 401. With this option turned on, in pane 11 only a select sub-set of the full PDU is displayed, consisting of the “primary” protocol fields for each layer. This will be more compact and convenient for editing large PDUs. The user can at any time turn this option off, and the entire PDU would again be displayed, as before. Another option would be to again show only the sub-set of important PDU fields, as in FIG. 4 pane 11, but also highlight the corresponding fields in the PDU encoding in pane 12, as shown at 402 and 403.
Most fields defined by a protocol are “mandatory”, that is, they must always be included in any PDU that conforms to the given protocol. By contrast, “optional” fields are special fields defined by the protocol that may or may not be included in a particular PDU, at the user's discretion. In this embodiment, optional fields are not initially displayed in the interactive tree control. However, if and when the user wishes to see or edit such fields, the user may select a viewing option that adds them to the display. This is shown in FIG. 5 window 50, and is achieved by the user selecting the appropriate viewing option via button 501.
For example, with this option turned on, in pane 1 the additional fields “IP Options” are shown at 502. Such fields are specially marked with a selectable “Check Box” icon 503 overlaid on the normal icon, to indicate to the user that they are optional, and may be selectively added to or removed from the PDU. When unselected, the fields are also displayed with a different font or color (e.g. gray) to indicate to the user that they are not currently included in the PDU, but are fields which may be potentially added if desired. (In addition, because the fields are not included in the PDU, no values are displayed for the fields, and the user is not able to edit them.) If the user wishes to add an optional field to the PDU, the user does so by clicking on check-box icon 503 next to the desired optional field, and it changes appearance to indicate that it is now included in the PDU.
FIG. 6 shows window 50 after field IP Options 503, Security Option 601 and Record Route Option 602 have been selected by the user and added to the PDU. The font and/or color of these fields have been changed to the normal font/color of mandatory fields (e.g. black instead of gray), to indicate to the user that these fields are now included in the PDU. (The other optional fields remain in the special font/color.) FIG. 6 also shows the tree node for Record Route Option 602 expanded to reveal the sub-fields it contains. As these sub-fields are now included in the PDU they are also shown in the normal font/color, and the values are displayed and the user may now edit them.
The PDU encoding in pane 12 has also been automatically updated by the system to reflect the addition of the selected optional fields. The new fields have been inserted at the end of the IP Header, just before the IP Payload, with the IP Payload being moved down accordingly within the PDU, to fit in the new fields. In addition, in order to keep the overall length of the PDU the same as before, the IP Payload has been shortened by the same number of bytes as were inserted for the optional fields. The data pertaining to field 601 in pane 11 is shown at 603 in pane 12, while field 602 in pane 11 is shown at 604 in pane 12, and the shortened IP Payload (as compared to 109 in FIG. 1) is shown at 605.
FIG. 7 shows window 50 in which the viewing option for optional fields at button 501 has been turned off, and after the optional fields in the previous example have been added to the PDU, as shown in pane 12. Optional fields 503, 601 and 602 are now included in the PDU, and so are still displayed in the tree control, even though the other (non-selected) optional fields are now hidden. Optional fields that have been added to a PDU may be later removed from the PDU by simply clicking on the Check Box icon again to deselect the field. The corresponding encoded data bytes in pane 12 would then be removed, and the Payload extended to its previous length. (Note that some information in pane 11 is below the window bottom edge and the window must be scrolled to view this portion. The scrolling feature allows the entire PDU to be displayed in a single window. The same would be true for pane 12 if the data grew longer than one window length.)
FIG. 8 shows screen 80 in which the Optional Field viewing option at button 501 is turned back on again. FIG. 8 also shows the tree node for TOS/DS field 801 expanded to reveal its sub-fields, which are Type Of Service 802 and Differentiated Services Codepoint 803. This demonstrates a second type of optional field, in which only one of the available optional sub-fields in a group may be selected at a time. Such fields are selected in a similar way to the first type of optional field (as discussed above), but when an optional field in a group is selected by the user, the previously selected field is automatically deselected by the system. To indicate this different behavior, the square “Check Box” icon is replaced with a rounded “Radio Button” icon, similar to standard GUI controls. For example, the Radio Button icon at 804 is filled to indicate that it is the selected option and thus included in the PDU, and icon at 805 is unfilled to indicate that it is not selected.
Most fields in a PDU must have a meaningful value specified for them by the user. However, certain fields are defined as being “automatic” fields, which means that the value of the field is pre-set to a special value, or derived by the system from the state of the PDU, rather than being specified by the user. An example of such a field is Header Checksum 112, shown in FIG. 1. The value of this field is automatically calculated by the system, based on a mathematical algorithm whose inputs are the value of the other fields in the IP Header (in the manner specified by the standard IP protocol). This calculated value is automatically updated and re-displayed by the system whenever other fields in the header are changed by the user, as described above. If desired, automatically derived fields can be indicated to the user by displaying a modified icon, or by displaying the field's value in a different color (e.g. black instead of blue), or by appending the phrase “(Auto)” after the value, or by a combination (or all) of the above. By default, the user is not able to edit the values of such fields, because the system needs to set them.
In some cases the user may wish to override the automatic field behavior described in the previous paragraph, and manually enter a fixed value for a given field. If the user does this, the PDU would in general no longer be a valid PDU according to the rules of the protocol. However, such PDUs are useful in certain applications, for example testing the error-handling properties of network devices.
As an example, FIG. 9 shows window 90, where Header Checksum field 112 has been over-ridden by the user. The user achieves this by clicking on the field's icon, and then the field value becomes editable by the user, so the user can enter any value, e.g. “0”×1234”, whether it be valid or invalid. To indicate to the user that the field value is no longer automatically calculated by the system, the icon changes color, and the phrase “(Auto)” is removed from the field. To further indicate that the field's value is no longer valid (as defined by the protocol), the color of the value text could change, e.g. to red. In addition, the encoding shown at 113 in pane 12 will now reflect the value entered by the user, e.g. “12 34”, and not the automatically calculated value, e.g. “6a ab” as shown in FIG. 1. At any time, the user may revert back to the automatic behavior by clicking on the field's icon again. The field's icon, text and coloring will then return to their normal state and the field's value will be automatically re-calculated and updated to show its correct value, in both pane 11 and pane 12.
For one embodiment, the invention may be implemented in software running on a general-purpose computing device. For example, FIG. 10A shows a typical implementation based on the Microsoft Windows NT operating system 1008, running on an Intel Pentium III processor 1009 with 256 Mb of memory, and with a video screen 1010, keyboard 1011 and mouse 1012 attached. In this example, the software embodying the invention is implemented using an object oriented software architecture and the C++ programming language. The main objects in the software are:
Window Component 1001, which provides the GUI frame window, menubar and toolbar, and processes user command selections from the menubar and toolbar; Pane Components 1002 and 1005, which each provide graphics area, with facilities for drawing graphics and text, and processing user input in the form of mouse and keyboard events sent by the Operating System 1008;
Packet Tree 1003, which is a special-purpose “Tree Control” that displays a hierarchical arrangement of nodes, similar to the standard Tree Control used in the Microsoft Windows User Interface, but with additional features required for implementing the inventive concepts described herein;
Tree Node 1004, which displays the icons, lines and text for a single node in the Packet Tree, and processes user mouse and keyboard input, to allow the user to enter fields values, pop up menus, etc; and
Encode List 1006, which provides facilities to lay out and display a given PDU in standard hexadecimal notation.
The example implementation also uses services provided by Protocol Engine 1007, which is essentially a database providing protocol information in a generic format, together with facilities to create, store and modify PDU data. Note that Protocol Engine 1007 is an external software component used by the embodiment to help implement the Graphical User Interface described herein. The Protocol Engine used in the example implementation is described in the patent application titled “Building Packets of Data”, Ser. No. 10/266,507 filed on Oct. 8, 2000 in the name of Geoff Smith and assigned to Agilent Technologies, Inc., which application is hereby incorporated by reference herein. Using Protocol Engine 1007 substantially simplifies the implementation of the system, because no detailed protocol knowledge needs to be embedded in the software code, but instead this information is gathered at run-time from an external source. This offers the advantage that the GUI can be easily extended with additional protocols without needing to design additional GUI screens or make any change to the design or implementation of the GUI code. Thus, the size and complexity of the GUI code does not grow as new protocols are added to the Protocol Engine over time. Users may add additional protocols to the engine, including proprietary and custom protocols, which will then appear in the GUI without modification of the underlying GUI software.
It should be noted that the system and method described herein are not dependent on the embodiment shown. The system could also be implemented with any other protocol engine that provided similar services or indeed without any such engine at all. That is, the inventive concepts could be implemented by hard-coding the protocol knowledge in the GUI software itself, with no loss of usability or the other advantages described herein. However, without a protocol engine, the GUI software code would be much larger and more complex. Most prior art PDU builder GUI's have used the hard coding approach over protocol engines, due to the unavailability of such an engine, and the difficulty of their successful implementation.
Referring again to FIG. 10A, in order to display a complete PDU, Packet Tree 1003 creates many instances of Tree Node objects, one for each protocol field in the PDU. The software code in Packet Tree 1003 creates and manages its contained Tree Nodes 1004, and lays them out on the computer screen in the hierarchical display. It also processes user input to interactively hide or reveal the sub-nodes at each hierarchical node. To display a particular PDU, Packet Tree 1003 needs information about the protocols used, in order to create appropriate Tree Nodes to display the protocol fields, their state and values. Packet Tree 1003 gets this information at runtime, by querying Protocol Engine 1007, which provides the list of available protocols and their constituent data fields and properties. Packet Tree 1003 then uses the facilities provided by Protocol Engine 1007 to create instances of PDUs, to query the values and state of their fields, and to modify said values and state, in response to user input. Protocol Engine 1007 also implements the rules of each protocol, and does the calculation of field values, which are displayed by the relevant Tree Nodes.
FIG. 10B shows the Tree Node objects created in a typical instantiation of an IPv4 PDU, whereby each node corresponds to one field in the PDU. Each Tree Node stores reference information (e.g. an index) for the corresponding field in the PDU stored in the Protocol Engine. The Packet Tree then uses this reference information to retrieve and modify field value and state information in the protocol engine, as directed by the user.
FIG. 11A shows an example of the implementation of the method for editing a protocol field value in an existing PDU displayed by the GUI. User 1101 selects a Tree Node 1004 in Packet Tree 1003, by clicking the mouse button when the screen cursor is displayed over the Tree Node on the screen. The Tree Node then becomes available for editing, and User 1101 types in a new value using the keyboard. As the user types, Tree Node 1004 responds by displaying the characters entered by the user, and responding to editing commands such as Backspace, Delete, Copy, Paste, etc. When the user finishes entering the value, the user presses the Enter key, and Tree Node 1005 responds by sending the new value to Protocol Engine 1007. The system then retrieves updated information about the value and state of every protocol field in the PDU. Lastly, Encode List 1006 retrieves from Protocol Engine 1007 the updated encoded PDU data and displays it on the screen. Note that at this point all PDU information displayed on the screen has been updated, even though the user has modified only one protocol field. This is because of the possibility that other fields may have changed as a result of the user's change, such as checksum re-calculations and so on, so it is necessary to ensure that all displayed information is up to date and correct.
FIG. 11B shows an example of the implementation of the method for adding a protocol layer to an existing PDU displayed by the GUI. User 1101 selects the “Add Protocol” command from the menubar in Window Component 1001 FIG. 10A, and selects the desired protocol. Packet Tree 1003 responds by requesting Protocol Engine 1007 to add the given protocol layer to the existing PDU stored therein. After retrieving protocol information for the new layer from Protocol Engine 1007, Packet Tree 1003 creates new Tree Nodes corresponding to all the data fields present in the new protocol layer, for example New Node 1102. Then the tree nodes and encode list are fully updated again, as in the previous example.
The inventive concepts described herein can be advantageously practiced on any computer having capabilities similar to the Microsoft Windows NT operating system, an Intel Pentium III processor with 256 Mb of memory and a standard graphics processor providing at least 1024×768 pixel resolution and at least 256 colors, and with a video screen, keyboard and mouse attached.
Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375091925.14/warc/CC-MAIN-20150627031811-00240-ip-10-179-60-89.ec2.internal.warc.gz
|
CC-MAIN-2015-27
| 35,825
| 115
|
https://www.cioreview.com/news/vmware-s-new-solutions-fuel-unified-services-delivery-across-cloud-platforms-nid-9704-cid-71.html
|
code
|
VMware's New Solutions Fuel Unified Services Delivery across Cloud Platforms
FREMONT, CA: VMware rolls out major updates to its hybrid cloud platform to strengthen digital business transformation initiatives through new capabilities for delivering applications with increased transparency.
The latest updates, VMware vRealize Automation 7 and VMware vRealize Business Standard 7, boost IT teams’ capabilities to accelerate digital business transformation within their organizations.
VMware vRealize Automation 7
VMware vRealize Automation facilitates IT teams to accelerate the delivery and ongoing management of personalized, business-relevant infrastructure, and application and custom services while improving overall IT efficiency.
The latest update brings unified service blueprint capabilities that enable IT and DevOps teams to fuel the delivery of integrated multi-tier applications with application-centric networking and security across clouds. It is integrated with VMware NSX 6.2 to dynamically configure networks and micro-segmentation unique to each application modeled in the blueprint designer. The unified service blueprints can be accessed through APIs and CLIs (Command line interfaces) as code for textual and human readable authoring of blueprints by DevOps team.
VMware vRealize Automation 7 integrates with VMware Identity manager to render enhanced identity services such as multi-factor authentication, SmartCard support and the ability to integrate with federated external authorization services.
VMware vRealize Business Standard 7
The latest VMware vRealize Business Standard 7 delivers enhanced functionalities to facilitate IT with increased transparency and control over the costs and quality of IT services. It supports Microsoft Azure for comprehensive private and public cloud comparisons. New planning and cost optimization capabilities will provide a complete view of datacenter capacity making inroads for modeling of new workloads, and quantify potential savings from reclamation opportunities.
"IT is under constant pressure to help get applications into production faster, and to drive down costs without sacrificing governance," says Ajay Singh, SVP and GM, Management Suite Business Unit, VMware. "VMware's hybrid cloud management platform is uniquely positioned to help IT organizations navigate the choppy waters of the digital business transformation. Today's updates will further help IT to deliver service agility across the public and private cloud while achieving service cost benefits. Our cloud management platform advancements in the second half of 2015 are another big step toward delivering on our vision of a next-generation, platform that is application-aware and self-optimizing."
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824338.6/warc/CC-MAIN-20181213010653-20181213032153-00153.warc.gz
|
CC-MAIN-2018-51
| 2,739
| 10
|
http://www.psc.isr.umich.edu/dis/data/kb/answer/1153
|
code
|
search across all the following databases:
Data and documentation
Common questions and answers.
Entire collection of data resources.
Where can I find data on exact dates of death?
Here is a source of mortality, weather, and air pollution data for selected metropolitan areas in the United States. The time period covered is 1987-2000:
I am not certain how they created these files as exact dates of death are not available in public use files after 1989:
If a single state will work for you, data for North Carolina are publicly available. Files from states do not have the confidentiality restrictions:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122933.39/warc/CC-MAIN-20170423031202-00385-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 603
| 8
|
http://www.padgadget.com/category/ipad-news/page/32/
|
code
|
Welcome back to our weekly music column, Sound Stage. Each week, we search out the coolest and most shredable apps for the iPad that related to music. Last time, we told you about the dubstep synthesizer CRUD. Industrial noise has never been so easy to create.
This week, we wanted to tell you about another synthesizer app from the same company that created CRUD. Twisted Electronics also has a fancy digital drum synthesizer that includes more than 200 possible beats that can be controlled in the app or with a MIDI instrument.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164043900/warc/CC-MAIN-20131204133403-00017-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 530
| 2
|
http://phukethotelreservation.com/about.html
|
code
|
Ural was originally founded in 1941, tasked with building sidecar motorcycles to help aid the military in WWII. After the war ended, motorcyclists fell in love with the practicality of our sidecars and their off-road capabilities
Today, Ural Motorcycles is led by a small team in Redmond, WA.
We help coordinate worldwide distribution and work directly with our factory in Irbit, Russia to develop and refine the best adventure ready sidecar motorcycles available.
Where will you explore?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494974.98/warc/CC-MAIN-20230127065356-20230127095356-00706.warc.gz
|
CC-MAIN-2023-06
| 488
| 4
|
https://www.intel.com/content/www/us/en/docs/programmable/683618/current/775419-pmu-event-0x0a-might-count-twice.html
|
code
|
126.96.36.199. 775419: PMU Event 0x0A Might Count Twice the LDM PC ^ Instruction with Base Address Register Write-Back
The LDM PC ^ instructions with base address register write-back might be counted twice in the PMU event 0x0A, which is counting the number of exception returns. The associated PMUEVENT signal is also affected by this erratum and might be asserted twice by a single LDM PC ^ with base address register write-back.
Because of this erratum, the count of exception returns is imprecise. The error rate depends on the ratio between exception returns of the form LDM PC ^ with base address register write-back and the total number of exceptions returns
There is no workaround to this erratum.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817014.15/warc/CC-MAIN-20240415174104-20240415204104-00764.warc.gz
|
CC-MAIN-2024-18
| 705
| 4
|
https://property360degree.com/Hybrid-App-for-Property-Management.html
|
code
|
Hybrid App for Property Management
Problem Statement : Property360degree.com being a property management product had to be a solution which would be accessible on any device (based on use cases of on-field and in office usage), supporting all time zone, different currencies and different kind of stakeholders like Property Manager, Owner, Tenant and Vendors to carry out end-to-end operations collaboratively.
In short, it had to be a start-up building a SaaS product with zero cash-flows. We wanted to create a solution:
- which could provide reasonably good user experience, without having to set up dedicated Native app development teams;
- Performance of the solution had to be good;
- Reduces the cost of development by adopting a single code base, working for multiple mobile operating systems;
- Solution scalable to progressive web app;
- Optimum team size and quick to deliver.
Solution: Be it a startup or any size business, technology is the key enabler and indeed it can make a big difference when we think on Digital solution lines as discussed in my previous post. Companies are always on a lookout for a technological solution which will reduce the budget on IT spending and which would enable it to be ready to market. With similar thought process, we started exploring Hybrid App space and we as a team narrowed down on Ionic framework with Spring Boot as backend built on AWS, which looked very promising as it met the checklist listed above.
In short, the exploration and the needs identified by our internal technology and business teams have been met with the solution which is out there in the market accessible on Android, iOS and web app. In this journey, we as a team came up with a solution which we are done for the first time ever! We indeed have innovated the way this complete technology stack has been put together. Today, property360degree.com is a cross-platform solution which is running smooth and making life easy for the stakeholders (Property Manager, Owner, Tenant, and Vendors) and is being used in different geographies, with major users adopting from US, Canada, Australia, and India.
The Secret sauce in making this happen is our awesome technology team which when blended with an understanding of business helped us to deliver Software as a Solution (SaaS) for Property Management businesses.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474893.90/warc/CC-MAIN-20240229234355-20240301024355-00891.warc.gz
|
CC-MAIN-2024-10
| 2,337
| 11
|
https://complexity-society.com/free-download/warden-dimension-free-download.php
|
code
|
warden dimension free download
Warden Dimension is a cutting-edge PC program that allows users to explore vast virtual worlds, unleash their creativity, and embark on thrilling adventures. With its free download, you can experience an immersive gameplay experience, discover hidden treasures, and connect with fellow players. Get ready to step into a captivating digital realm where endless possibilities await!
Ready to beyond the starter template? Check out these open source projects that you can quickly duplicate to a new GitHub repository.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00469.warc.gz
|
CC-MAIN-2024-18
| 545
| 3
|
http://www.learningaboutelectronics.com/Articles/Rectangular-to-polar-form-conversion-calculator.php
|
code
|
Rectangular to Polar Form Conversion Calculator
This rectangular to polar form conversion calculator converts a number in rectangular form to its equivalent value in polar form.
Rectangular forms of numbers take on the format, rectangular number= x + jy, where x and y are numbers. The x is the real number of the expression and the y represents the imaginary number of the expression.
Polar, or phasor, forms of numbers take on the format, amplitude < phase. The phase is specified in degrees.
Rectangular forms of numbers can be converted into their polar form equivalents by the formula,
Polar amplitude= √
To find the phase of the polar form, the formula to do so is, phase= arctan(y/x), where y is the imaginary number and x is the real number. This calculator computes the phase in degrees, not in radians.
So, for example, let's take the expression in rectangular form, 31 + 75j. We want to convert this into its equivalent polar form.
So, to do this, we take the formula and plug in the values, giving us for the amplitude,
amplitude = √
And that's all that's required in order to convert from rectangular form to polar form.
Usually, in electronics, polar forms are used in express components in AC circuit analysis. For example, if you are doing AC circuit analysis, one of the things that is required to do this is to convert the circuit from the time domain to the frequency domain, so that the circuit can be analyzed in the frequency domain. Therefore, the power source of the circuit is converted from the expression in the time domain to its expression in the frequency domain. In the frequency domain, the power source is expressed in polar form. So in situations like these, you will need to convert numbers into their polar forms.
Since the only 2 components of a number expressed in rectangular form are the real number and the imaginary number, these are the only
2 inputs required for the calculator to compute the equivalent number in polar form.
Rectangular to Exponential Form Conversion Calculator
Polar to Rectangular Form Conversion Calculator
Polar to Exponential Form Conversion Calculator
Exponential to Rectangular Form Conversion Calculator
Exponential to Polar Form Conversion Calculator
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00554-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 2,225
| 19
|
https://www.microsoft.com/en-us/p/graph-touch/9wzdncrfhxd8?rtc=1
|
code
|
Graph Touch is a scientific calculator with a powerful numeric solver and graph plotter. The numeric solver can be used to calculate numeric solutions for equations as well as maxima, minima and zero crossing. The graph can be paned and zoomed by two-fingers. A history list shows the last used equations and results. Graph Touch is designed to feel go to the user. It's fast to use, only a minimum of manual inputs are required to finish a task. It is fee and without adds.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103989282.58/warc/CC-MAIN-20220702071223-20220702101223-00795.warc.gz
|
CC-MAIN-2022-27
| 474
| 1
|
https://techcommunity.microsoft.com/t5/sharepoint/groups-quot-shared-with-quot-tab/td-p/2118153
|
code
|
I am working to streamline our permissions in SharePoint Online. I have several groups created and everybody (as far as I am aware are in their respective folders). I have been running across an issue where several people have permissions they shouldn't because they have the group "Shared With" them. I would like to remove this sharing so that they display properly in the group view. I have included a screenshot of what I am seeing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053759.24/warc/CC-MAIN-20210916204111-20210916234111-00040.warc.gz
|
CC-MAIN-2021-39
| 436
| 1
|
https://healthquestions.medhelp.org/blood-glucose-monitor-diabetes
|
code
|
To sum up, I had never had a fasting blood glucose
, have diabetes
in my family, so decided to get a home monitor
, see where I stood (given I am still in my 20's but not in good shape - getting there, exercising now, but wanted a baseline). So I hadn't been getting goog night sleep due to work, but checked it a few times in a week (in morning, after a 10-14 hour fast fort those morning tests) and generally got 103, 104 for most. Mornings.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.9/warc/CC-MAIN-20240414192536-20240414222536-00713.warc.gz
|
CC-MAIN-2024-18
| 443
| 4
|
https://q2a.cs.uni-kl.de/2522/do-we-proceed-with-or-operator-or
|
code
|
There is a comma in between the two (sub-)formulas. A comma on the left is like an and. That means that the or and the equality wouldn't be interlocked. Thus, the precedence isn't applied here. You can process any of the available formulas in any order.
Also, I don't see the difference in the result.If I first process the or, I get a split. One side with a b on the right and the other one with a d on the left. They both have the same equality on the left. If I process that, I get a split like the one in the example you showed and the result is the same. (the order or the nodes might be different though)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00723.warc.gz
|
CC-MAIN-2023-50
| 610
| 2
|
https://adtmag.com/articles/2001/07/06/test-suite-targets-web-apps-and-treats-elements-as-objects.aspx
|
code
|
Test suite targets Web apps and treats elements as objects
- By Dan Romanchik
- July 6, 2001
Web sites have quickly evolved from simple pages of text to full-blown computer
applications. Many of the more interesting and useful sites serve their pages directly from a database or allow
users to access data from a database. And as businesses become familiar with the Web and its possibilities, they
will move important business applications to the Web.
The more critical an application is to your business, the more rigorously you need to test that application. You
can do this with a new suite of test tools from Segue Software, Newton, Mass. The suite includes three tools: SilkTest
for functionality tests, SilkPerformer for performance tests, and Surf! to automatically validate all of the links
on your Web site.
OBJECTS OF DESIRE
One of the features that makes this suite so effective in testing Web applications is that it treats each of
the components on a Web page as an object. SilkTest analyzes a Web page and generates a description -- called a
test frame -- that contains all of the elements on the page.
The ability to treat components of a Web page as objects is an important feature for Web applications. The reason
for this, as most Web developers unfortunately know, is that Web pages often appear differently on different browsers.
The page may look one way for a user running Netscape Navigator and another way for a user running Internet Explorer.
Since SilkTest treats Web page elements as objects, the appearance of the Web page does not matter, making it easier
to test a Web application with multiple browsers. The test script will run properly no matter how the browser displays
GENERATING A TEST CASE
Once the test frames are made, you generate a test script using the scripting language 4Test, a proprietary
language. You could write your entire test script in this language, but you'll find it much easier to use SilkTest's
recording feature to automatically generate portions of the script.
This feature works much like the recording feature found in client-server test tools. You command SilkTest to
begin recording, and it records your actions as you move around a Web site and enter values into forms. SilkTest
also records what happens as a result of your actions. That is, it records new pages that are displayed when you
click on a link or text strings the application may display as a result of some data processing.
For example, I maintain Quality Online, an online magazine for quality-control professionals. This Web site
has a search function, which allows users to search the site for articles on a particular topic. From the home
page, users click on a link to go to the search page, then fill in a form field with keywords relating to the information
they want to find. Finally, they click a pushbutton to start the search engine, which searches an index file and
then returns a series of links to articles that may be of interest. To generate a test case for this application,
all I had to do was begin recording, then go through the steps as outlined above. SilkTest recorded all of these
actions and generated 4Test statements for them. After the results were displayed, I clicked the "Back"
button to return to the home page and stopped recording and saved the test case to disk.
To run the test case, all I did was select the Run/Testcase menu and pick the appropriate test case from the
dialogue box. While SilkTest allows you to run individual test cases to do extensive automated testing, you will
want to use SilkTest with Segue's QA Organizer. QA Organizer allows you to define test plans and organize the test
cases to implement those test plans more easily.
Should a test fail, SilkTest reports it and allows you to open the Difference Viewer, which lets you see the
differences between the actual result and the expected result. With this information, you can debug your Web application
more easily. SilkTest also has a built-in recovery system that makes unattended testing possible. Before running
tests, you specify a main window, which is usually the home page of your Web application. You can also specify
a base state to set that window to a known state. SilkTest returns to the main window and base state and is ready
to execute the next test case.
Finally, let me mention the two other products in the test suite, Surf! and SilkPerformer. Surf! checks your
Web application for broken links, but will also tell you if a link produces a different page or document than what
it did originally. SilkPerformer allows you to test the performance of your Web application. With SilkPerformer,
you can use one computer to simulate hundreds of users to perform concurrent testing and load testing of your application.
SilkTest pricing begins at $3,995 per license, SilkPerformer starts at $10,000 per license, and Surf! costs
$495. Volume discounts and all products are available now.
Dan Romanchik is an engineering manager turned writer and Web developer. His current passion is amateur radio. You can read his amateur radio blog at www.blurty.com/~kb6nu.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00123.warc.gz
|
CC-MAIN-2023-50
| 5,111
| 53
|
http://orana.info/category/dba/page/4/
|
code
|
If you are running Oracle EE, there are many books on Data Guard. However, for Oracle SE and manual standby, have fun searching.
I wanted to get a better understanding of registering logfile.
Depending on how the standby environment is monitored, not registering logfile may yield incorrect results when checking standby lag.
When logfile is not registered, v$archived_log is not updated.
STANDBY: check status
$ sqlplus / as sysdba @stby.sql
SQL*Plus: Release 11. (more...)
This is the fourth article of a series that focuses on database security. In my introduction, I provide an overview of the database protection process and what is to be discussed in future installments. In last month’s article, we finished our discussion of the most common threats and vulnerabilities. In this latest installment, we’ll review the database vulnerability assessment process. We’ll begin by learning how to perform an initial database vulnerability (more...)
There are a few user group meetings coming up in the UK over the next week or two.
Note, you need to register to attend any of these, follow the links.
First is Club Oracle London, which are evening sessions held in London with 3 talks plus free beer and pizza. The next meeting is Thursday Feb 26th at 103a Oxford Street, kicking off at 18:30. You can register for this free event here and (more...)
In the second part of this post (go to part 1
) I want to focus on the hybrid distribution
2. Hybrid Distribution For Skewed Join Expressions
The HYBRID HASH distribution allows to some degree addressing data distribution skew in case of HASH distributions, which I've described in detail already in the past. A summary post that links to all other relevant articles regarding Parallel Execution Skew can be found here (more...)
When a session needs to read data from disk into the Oracle buffer cache, it may have to wait for another session to finish doing the same thing. Time spent doing this is recorded as a read by other session event. I decided to reproduce this in an Oracle 12 database. First, in session 1, in red, I set up a user called Fred to create a table:
SQL> conn / as sysdba
This is a small article telling how to move a innoDB table from one MySQL server to another.
Moving MyISAM table from one server to another is very straight forward process. MyISAM table generates 3 files at file system level.
- .frm file contains table structure/definition
- .MYD file contains table data
- .MYI file contains index data
We can simply copy these 3 files to another MySQL server installation under desired database and it will show up (more...)
I noticed the error message when running lsinventory against a 18.104.22.168 Oracle_Home. As the command worked I didn’t think anymore of it until on the same server against an 22.214.171.124 home I got the same error message.
tr: extra operand `y'
Try `tr --help' for more information.
/app/oracle/product/126.96.36.199/dbhome_1/OPatch/opatch: line 384: [: =: unary operator expected
There is a Mos note which provides a solution (more...)
Here’s a quick note, written and some strange time in (my) morning in Hpng Kong airport as I wait for my next flight – all spelling, grammar, and factual errors will be attributed to jet-lag or something.
And a happy new year to my Chinese readers.
You all know that having more than 255 columns in a table is a Bad Thing ™ – and surprisingly you don’t even have to get to 255 to (more...)
This post is about the latest updates to PerfSheet4
v3.7 (February 2015). PerfSheet4 is a tool aimed at DBAs and Oracle performance analysts. It provides a simplified interface to extract and visualize AWR
time series data using Excel pivot charts.
PerfSheet4 is aimed at querying and displaying time-series data from AWR repository tables. This is very a rich source of information to analyze database workloads and trends in the context of performance analysis or (more...)
There are many articles explaining how to migrate database from file system into ASM. You could use RMAN to create an image copy of the database into ASM and switch to the database copy, restore database from backup sets into ASM or create duplicate database.
All of these RMAN features are available on Oracle versions before 12c.
In this post I will use slightly different approach - using online relocation of data files into ASM. (more...)
Except a few special cases, optimizing SQL is about minimizing I/O. And by “I/O” we normally mean “physical I/O”, because everybody knows that logical I/O (LIO) is much, much faster. But how much faster exactly? For a long time, this question has been bothering me. It looks like there has been little research in this area. Basically the only thorough investigation I managed to find on the subject was one by Cary Millsap and co-authors. (more...)
The typical EM agent upgrade leaves the old Oracle Homes in place on your hosts. That includes the old home for the agent binaries and also the homes for each upgraded plug-in.
You can clean all of them up through the same Agent Upgrade Console that you used to push new agent out. Select the same Upgrade Agents from the drop-down.
Select the Post Agent Upgrade Tasks tab to expose the Clean-up Agents functionality
Search for (more...)
Semiconductor Fabrication Plant (picture courtesy of SemiWiki.com)
Before I draw this series on Understanding Flash to a close, I wanted to briefly touch on the subject of manufacturing. Don’t worry, I’ve taken heed of the kind feedback I had after my floating gate transistor blog post (“Please stop talking about electrons!“) and will instead focus on the commercial aspects, because ultimately they affect the price you will be paying for your flash-based (more...)
It’s that time of the year again, when one of the best grass roots Oracle user group conferences takes place, the Rocky Mountain Oracle User Group Training Days in Denver Colorado. I’ve been privileged enough to present at this conference several times in the past, and always have an absolute blast at it, so I try to submit a few papers each year. This year, I had three papers accepted. Two of them were designed (more...)
A few weeks back on the weekend just before I went on call we got a complaint about slowness on an important set of reports. I worried that the slowness of these reports would continue during my support week so I tried to figure out why they were slow. I reviewed an AWR report for the 24 hours when the reports were running and found a simple query against a tiny table at (more...)
In this blog post I want to cover some aspects of the the new HYBRID HASH adaptive distribution method that I haven't covered yet in my other posts.As far as I know it serves two purposes for parallel HASH and MERGE JOINs, adaptive broadcast distribution
and hybrid distribution
join expressions. In the first part of this post I want to focus on former one.
1. Adaptive Broadcast Distribution For Small Left Row (more...)
You may be thinking, why clone Goldengate and why now just download it?
The exact version and patch level might not be available.
Too lazy to search for it and many other reasons you can come up with.
Why use rsync and not tar – scp? I wanted to refresh memory of using rsync.
local source /u01/app/ggs01/ and remote target arrow:/u01/app/ggs03/
rsync -avh --delete --dry-run --exclude 'dirdatold' /u01/app/ggs01/ arrow:/u01/app/ggs03/
rsync -avh --delete --exclude (more...)
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936470419.73/warc/CC-MAIN-20150226074110-00055-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 7,463
| 58
|
https://forum.step-project.com/topic/9069-skse-ini-settings-not-working/page-2
|
code
|
Well I found something. I found a page on the steam forums where a user reported his similar issues were fixed when he ran SSME - Skyrim Startup Memory Editor. I downloaded and dropped the two necessary files in the my Skyrim folder and launched Skyrim. Upon exiting to an exterior cell, it loaded for about...two seconds longer(?) before CTD. So that's progress I guess. MemoryBlocksLog, however, does finally show my Default Heap set to 768! Joy! Doesn't fix the CTDs, but I'll take what I can get. I noted that the game loaded up to 360MB before crashing for whatever reason, so at this point I can only assume that it's probably not a memory issue, or at least not entirely. More than likely it's some texture conflict or whatever that I may have caused when I first realized something was wrong and tried reinstalling lighter versions of some of the more memory-dependent mods.
So, I've decided that I'll just make a separate Skyrim install and start over, this time being a bit more mindful of what I install and how I do it. I'll keep the older install as-is in case someone has another suggestion to the culprit and might know how I can salvage my current setup.
EDIT: Forgot to mention, I also tried loading Dragonsreach on a whim, since it's one of the larger interior spaces with decent amount of clutter and people, and also got an immediate CTD upon attempting to load. So that screams "mod conflict/error" to me, particularly since I'm able to load the Abandoned Prison (the starting location in Alternate Start - Live Another Life) just fine. Probably SMIM or some such, which leads me to think I'm better off scrapping this build and starting over with a bit more discretion.
EDIT 2: In the process of reinstalling SKSE, as well as other mods, I think I might've found out what was causing my initial memory issues. As other posters above said, this issue is usually caused by SKSE being improperly installed, which I think was the issue in my case as well. I downloaded the pre-made .ini file of the nexus, (the one referenced in the STEP 2.10.0 guide, and while installing the archive I noticed that the STEP guide seems to suggest that the file path should be \mods\skse_1_07_03\SKSE\skse.ini, while the filepath that comes with the premade .ini is \mods\skse_1_07_03\Data\SKSE\skse.ini. My guess is that since I downloaded this pre-made .ini off the skyrim nexus, it was packaged like a standard mod, with the file contents stored within a Data folder so it could be installed through MO. My guess is this discrepancy in file paths kept SKSE from locating the custom .ini file, so it just ran on its default settings, leading to my CTDs. There was a link to an image of the appropriate file structure in the STEP 2.10.0 skse install guide that probably would've tipped me off to this on the first time around, but the link is dead. Kek.
Modding sure is an adventure.
FINAL EDIT: Final update for anyone interested. I tested my earlier theory regarding the skse.ini file structure through MemoryBlocksLog and it seems to have confirmed what I thought: The addition of the \Data\ folder in my SKSE installation was what was causing the .ini settings to not manifest in-game. Removing the \Data\ header resulted in the settings functioning as intended (I edited the Heap memory allocation just to verify, and the MemoryBlocksLog.log reflected those changes). So yeah. Don't install things like a dingus. EZ.
Edited by Cbode1, 01 June 2020 - 11:16 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703557462.87/warc/CC-MAIN-20210124204052-20210124234052-00406.warc.gz
|
CC-MAIN-2021-04
| 3,467
| 7
|
https://developer.community.boschrexroth.com/t5/SDK/CtrlX-Core-SDK-build-sample-snap-failed-with-GCC-7-5-0-aarch64/td-p/23504
|
code
|
I'm trying to create the sample-snap "datalayer.register.node" for CtrlX Core. But it fails.
After switching cmake compiler to GCC 7.5.0 aarch64-linux-gnu message "Loading kit GCC 7.5.0 aarch64-linux-gnu" didn't disappears and building process failed.
Also this message didn't disappears.
If I create the snap for CtrlX virtual Core (GCC 7.5.0. x86_64-linux-gnu), building process works fine and the snap(app) is running without any problems on a virtual Core.
I think there is something wrong with the cmake cross compiler?!
WSL Ubuntu 18.04
SDK V1.6.1 - RM20.11
Solved! Go to Solution.
Did you follow the installation step by step that can be found in the SDK (SDK1.6.1RM20.11/public/site/setup_windows_wsl_ubuntu.html)? Especially the "Setup Packages" and "Dependencies for Crossbuild (Multiarch)" part?
Please clean up your programming environment when changing from one target to another. E.g. do a CMake clean all or at least delete the folders set up by the process (like build, generated, ...). Probably you could have some artifacts left over.
While setup the SDK via WSL I obviously missed sudo apt-get install libssl-dev:arm64 🙈.
Now build process and snap is running without problems.
I have deleted the folders ( build, generated, ...).
But the messages still do not want to disappear.
How can I start a Cmake clean all in VScode?
Thanks for your suggestion.
Just click on the CMAKE extension on the left and then use the settings (three dots):
After starting this command same message pops up.
but for now it does not seem to affect me further.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00755.warc.gz
|
CC-MAIN-2023-14
| 1,561
| 19
|
https://zhareiv.com/item/58/vidown-videos-thumbnails-downloader-youtube
|
code
|
buy this script to download video thumbnails from most
social networks facebook,youtube,vk,vimeo and dailymotion using
this high quality and best of its kind script
-easy content editing for better seo and positioning within
the main search engines.
-code easy to understand and modify.
-requires minimal server processing expense.
-compatible with mobile devices and easy interface.
-support in your language.
php version 7.3 or higher.
the following php extensions should be installed and
enabled: intl, mbstring, php-json, php-mysqlnd, and
detailed instructions on how to run the app
locally or on the server are included in the
|Category||Scripts & Code / PHP Script / Image|
|Launch||22 Aug 2022|
Share this publication so you have more reach.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00363.warc.gz
|
CC-MAIN-2023-23
| 748
| 17
|
https://hubpages.com/business/answer/127526/which-specialization-is-better-in-mba---marketing-or-hr
|
code
|
You need to think about what you like to do. If you love HR issues, go for that. If you love to grow a business, go for Marketing. Both are valuable to an organization. However, having said that, depending on the organization, higher value may be placed on marketing - all companies look for ways to grow revenues.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695066.99/warc/CC-MAIN-20170926051558-20170926071558-00067.warc.gz
|
CC-MAIN-2017-39
| 314
| 1
|
https://pyxeledit.com/forum/discussion/357/double-click-to-select-a-tile-the-time-between-clicks-needs-tweaking-to-avoid-mistakes
|
code
|
Double-click to select a Tile (The time between clicks needs tweaking to avoid mistakes.)
I draw and move pixels pretty fast and I use the selection tool a lot.
I end up double-clicking a lot when I select, move and deselect my drawings and end up selecting a Tile by mistake hundreds of times a day.
Right now the double clicking function has a maximum delay of almost 0.4 secs to activate the Tile selection... I think it needs to be in the order of maximum 0.1 secs between clicks to avoid punishment for working fast.
In Windows, when opening a file you need to double click fast to open it... and double click very slowly to change its name. Right now Pyxel Edit has a time similar to the later and it messes a lot with my workflow
Please Danik, maybe it's just a variable somewhere in the code? I've tried to live with it for months but it's really driving me crazy
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00555.warc.gz
|
CC-MAIN-2022-33
| 871
| 6
|
https://meta.wikimedia.org/wiki/Wikimedia_Northern_Europe/Workspace
|
code
|
Wikimedia Northern Europe/Workspace
The Wikimedia Northern Europe Workspace is meant as a place for working on projects that benefit from a wiki-based system of collaboration without necessarily fitting on any specific Wikimedia site, either because of subject area or because the project is multi-lingual. It can also be used for storing documentation or other notes related to projects.
The various projects are listed by subject area (feel free to add a new one if none of them fit). Each project should contain a short summary, as well as the people currently working on it. Please note that not all projects are listed here, and that there might be more initiatives to contribute to listed in the repository.
|Documentation from the 2018 Northern Europe Meeting||Overview of the documentation from the 2018 Northern Europe Meeting||N/A|
|Minutes from the Wikimania 2019 lunch meetup||Minutes of the Wikimania 2019 Northern European lunch meetup, which primarily focused on the coming meeting in Estonia.||N/A|
|Documentation from the 2018 Northern Europe Meeting||Overview of the documentation from the 2019 Northern Europe Meeting||N/A|
|Monthly meeting minutes||Minutes from the monthly meetings.||N/A|
Minority & indigenous languages
|Model templates, policy and help pages||Discussing how to help minority language Wikipedias at WikiNEM 2018, one of the issues raised was that many minority language wikis are lacking with regards to documentation (policy & help pages) as well as tools (templates etc.) As an example, the Greenlandic Wikipedia is currently a mishmash of Danish and Greenlandic. Starting to edit Wikipedia can already be intimidating, but if new editors are met with inadequate or poor documentation, it's even worse.
The plan is to create model versions of the most important policy and help pages, as well as the most important templates for creating articles with the intent of having them translated, either by language-proficient community members or professionally.
|Education collaboration to share resources based on initial work during Wikimedia Northern Europe Meeting 2018.||List of international resources for education
||Education coordinators in NEM region:|
Tools developed in the region (not required to be region specific).
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141163411.0/warc/CC-MAIN-20201123153826-20201123183826-00063.warc.gz
|
CC-MAIN-2020-50
| 2,266
| 13
|
http://www.inf.unibz.it/~calvanese/teaching/09-10-fl/
|
code
|
Course presentation form (available also as a pdf file)
Objectives. The main objective of the Formal Languages course is to introduce the fundamental notions about formal languages and the mechanisms for representing them. The course will focus on the formal languages that find most applications in computer science, namely regular and context-free languages. Students should become familiar with the fundamental representation mechanism for such languages, which span machine-based models (finite state machines for regular languages), algebraic models (regular expressions), and generation-based models (formal grammars). The aim is to exploit such representation mechanisms to study the properties of the different types of formal languages and the main algorithms for processing languages, which help to solve problems that are of practical relevance. A second objective of the course is to get students acquainted to a formal, rigorous approach in computer science.
Prerequisites. There are no prerequisites in terms of courses to attend. Students should be familiar with notions of mathematics and set theory, as taught in the mathematics courses of the first year.
[M1] Introduction to Automata Theory, Languages, and Computation (3rd edition). J.E. Hopcroft, R. Motwani, J.D. Ullman. Addison Wesley, 2007.Further reading material for interested students
[M2] Lecture Notes for Formal Languages. Diego Calvanese. 2009. Available on the course web page as scanned pages in pdf.
See also RIS
calendar for changes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509690.35/warc/CC-MAIN-20181015184452-20181015205952-00351.warc.gz
|
CC-MAIN-2018-43
| 1,519
| 7
|
http://www.linuxquestions.org/questions/linux-software-2/minimizing-gaim-148194/
|
code
|
Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
u know how on windows, when u close MSN, it goes to an icon beside your volume button at the bottom right of your screen? how do i do that with gaim on mandrake ?
i tried everything i can, but it just won't go there, when i minimize, it only goes to the tool bar at the bottom of my screen (the center part), but doesn't become a small icon and stays on the right side like the volume button does.
Is there a Gaim tray icon, or docklet, or gnome applet, or panel icon, or something?
Yeah, Gaim supports what is called a system tray icon that conforms to the standards at http://www.freedesktop.org. This tray icon is supported by Windows, KDE 3.1, Gnome 2.2, and Red Hat Gnome 2.0. All you have to do is load the "System Tray Icon" plugin by going to Preferences and then Plugins.
If you're using Gnome you need to make sure that your panel has a Notification Area on it. To add one, right click on the panel, select Add To Panel->Utility->Notification Area. Gaim will insert the tray icon in any System Tray implementation that conforms to these standards, so feel free to write one for your window manager of choice.
yea, it more depends on what window manager you got (if it suports it i mean), or some other program that hanels the minimizing when the app want or is told to minimize (or iconify, same thing i think )
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123048.37/warc/CC-MAIN-20170423031203-00327-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,935
| 17
|
http://www.techist.com/forums/f77/lightning-damage-pc-249545/
|
code
|
Re: Lightning Damage to PC
My first thought (hope!) was the PSU, but you already tried another with no luck. With all you did, it does sound like the motherboard is gone.
Surge and spike protectors are little more than fancy and expensive extension cords that do NOTHING for abnormal low voltage events, and merely chop off the tops (clamp) of the sinewaves for abnormal high voltage events - providing not-so-pretty (dirty) power for your PSU and motherboard regulator circuits to clean up. For these reasons, I recommend ALL computers be on a "good" UPS with AVR - automatic voltage regulation. I emphasize "good" UPS because like power supplies, there are cheap ones you should make every effort to avoid.
Note that power during a power outage is only the icing on the cake. It is the AVR of a "good" UPS that saves your hardware. I recommend all big screen TVs and home theater audio equipment be on a good UPS with AVR too. The downside is UPS batteries need to be replaced about every 3 years.
FTR, I have a 1500VA UPS with AVR that protects my fairly power hungry computer all my network gear (router, modem, switch) and two 22" widescreen LCD monitors. And it provides over 30 minutes of battery power in the event the grid goes down. If I shut down my computer and turn off my monitors, it will hold my network up (and all my IP assignments) for over 12 hours. Nice!
Freedom is NOT Free!
MS MVP Windows Expert-IT Pro, Engineering 2007 - 2014
Heat is the bane of all electronics!
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00314-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,487
| 8
|
https://community.cloudera.com/t5/Support-Questions/Where-does-reducer-keeps-the-temporary-data/m-p/232888
|
code
|
In one of my jobs, one of the reducer tasks is taking longer time that has impacted the whole job execution time.
When I checked the reducer logs, I found that at shuffling phase it took 4 hours to fetch the data from one mapper task and keep it in the disk. (As attached). Could any one help me in identifying the property which defines the path where the reducer the keeps the data fetched from map task.
1. Mapper output, reduce shuffle/short(If data is less it will be inmemory) output is saved on to localfile system .
2. mapreduce.cluster.local.dir provides a list of dir where the temp data will be saved . Search for jobid inside dir to know exact location of the temp data at runtime
but you will not benefit anything in terms of debugging . What you should be actually looking for 1. Are your reducer starting after all mappers have finished. mapreduce.slow.start => 1 2. how many groups are being processed per reducer. try increasing number of reducer to increase parallelism 3. Is your job shuffering from skewed key problem ie for a given key one has lot of values. 4. disk failures where mappers and reducers are running. run dmessage to know about disk failure where the job is running
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104676086.90/warc/CC-MAIN-20220706182237-20220706212237-00203.warc.gz
|
CC-MAIN-2022-27
| 1,201
| 5
|
https://www.artstation.com/marketplace/p/5olK/animbp-for-polyart-wolf
|
code
|
UE4 Root Motion based Anim Blueprint, Player Character and AI Controller for PolyArt Wolf.
This project contains blueprints pretty similar to those I create in this tutorial, plus couple of other things like simple jump, sprint and slow walk controls. Check the tutorial and the little video below to see the overview of the movement capabilities.
The zip file contains a UE4 project folder with the following
Root motion AnimBP suitable for player and bot
Player Character Blueprint
AI Controller and a simple follower behavour tree
Root-motion based Blend Space with sprint/run/walk/turn in place animations
Installation instructions and a setup script
As stated above, the poly art wolf mesh and animations are third party assets (not mine). They are required but NOT INCLUDED in the download, you need to get them from the marketplace otherwise nothing will work.
Compatibility: UE4.22 or later
Extract the downloaded zip file and open the project
Use Epic Games Launcher to add PolyArt Wolf pack to the project
Run the setup script as explained
Detailed install instructions are presented in the default startup map.
Contact:Fell free to send your feedback @games_inu
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662525507.54/warc/CC-MAIN-20220519042059-20220519072059-00619.warc.gz
|
CC-MAIN-2022-21
| 1,172
| 15
|
http://people.cs.clemson.edu/~malloy/courses/xna-2008b/assign/2/paper/paper/index.html
|
code
|
In order to receive credit for this milestone, your solution must be submitted, using the handin command, by 8 AM Monday, October 6th, 2008. I will zip your files and move them to my directory at that time. You may submit your solution before the deadline as many times as you like; only your final submission will be considered.
Your assignment is to build a sprite animation that uses parallax scrolling, frames of animation, sound, Menus, and user input to control a player sprite. You can pick any 2D sprites off of the web. We discussed sound in XNA, using XACT, during lecture. We will discuss Menu Systems on Monday, September 29th.
Also, if you choose, you may form groups of size 1 to 3 people to build this second milestone. You should try to work with a modeler to build sprites for your second milestone. This will add a large measure of originality, color and enthusiasm to your project.
Thus, for this second milestone, your submission should include:
http://creators.xna.com/en-us/samples/gamestatemanagementWe will discuss this sample during lecture on Sept 29th. You should begin to become familiar with the sample and incorporate it into your second milestone.
You will have to zip your solution directory and submit the whole directory using the handin command. To submit, using the handin command, you will need a CS account.
Here is the handin command:
handin.481.1 2 *
The grading rubric will be guided by this milestone specification. For example, if you don't have time or the creativity to write a README file, you will lose 10 points. If you only have one ``background'' or your backgrounds don't scroll, you will lose 20 points. Also, and more importantly, for those of you working in groups of 2 or 3, you will be graded individually, based on your contribution to the project.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698238192/warc/CC-MAIN-20130516095718-00097-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,805
| 9
|
https://www.bath.ac.uk/guides/using-the-multicolumn-component-in-typecase/
|
code
|
When to use the Multicolumn component
Use the Multicolumn component to add short bits of text to a Campaign page, arranged into two, three, or four columns.
Finding the Multicolumn component
To find the component:
- Open the drop-down menu under 'Drag and drop components'.
- Select 'Multicolumn'.
- Click 'Add component'.
The Multicolumn will appear beneath 'Component(s) currently in use'.
You can only add one Multicolumn component to a page.
Adding content to the Multicolumn component
You can add two, three, or four columns to a Multicolumn component. Each column can have up to 1,000 characters, including Markdown formatting and spaces.
Setting up the component
- In the 'Title' field, write a short heading to explain what the text in the columns is about.
- In the 'Summary' field, give some more information about the section so users know what they'll gain from it.
Choose whether you want the Multicolumn to display as dark text on a light background or light text on a dark background.
You should look at the other sections on your page to help you decide which appearance works best. Try not to have two dark sections together on the page.
Adding a column
Click 'Add a column' to create a text field for each column.
To add copy, you can type directly into the 'Column content' field or paste it from somewhere else, like a Word document.
Use Markdown to format your text to make it more accessible and easier to read. Check how your text appears on the page by clicking 'View preview page' at the top of the Typecase template. Some formating, like tables, makes information harder to read if you use it in a column.
Try to use a similar amount of copy in each column so they're all about the same length when displayed on the website.
Related content button
You can add a Related content button at the bottom of the Multicolumn component to direct users to a relevant webpage.
To do this, add some short, descriptive link text to the 'Related content button text' field, then add the page URL to the 'Related content button web address (URL)' field.
Things to avoid
Don't add one continuous piece of text across multiple columns, like in a newspaper. This could make things confusing for people using screen readers and other assistive technology. Instead, use a Text and image block component to add longer copy.
Avoid adding Markdown tables to Multicolumn sections. Use a Text and image block component instead.
Moving your content around the page
You can drag and drop each column to change the position they appear in the section.
You can drag and drop the Multicolumn component to reorder the components on a page.
Click 'Collapse this section' to minise a Multicolumn component while you work on other areas of the page. The component will still appear on the preview and published pages if you collapse part of the template.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.3/warc/CC-MAIN-20230923194908-20230923224908-00667.warc.gz
|
CC-MAIN-2023-40
| 2,847
| 31
|
https://docs.vmware.com/en/VMware-vSphere/6.0/com.vmware.vsphere.hostclient.doc/GUID-4AC55463-275E-4021-87C8-924181CC623E.html
|
code
|
When you connect the vSphere Client directly to a host, you have access to a limited number of resource management settings, including hyperthreading settings, power management configuration, and swapfile properties.
Configuring Resource Allocation Settings When available resource capacity does not meet the demands of the resource consumers (and virtualization overhead), administrators might need to customize the amount of resources that are allocated to virtual machines or to the resource pools in which they reside.
Administering CPU Resources You can configure virtual machines with one or more virtual processors, each with its own set of registers and control structures.
Administering Memory Resources Using the vSphere Client you can view information about and make changes to memory allocation settings. To administer your memory resources effectively, you must also be familiar with memory overhead, idle memory tax, and how ESXi hosts reclaim memory.
Managing Storage I/O Resources vSphere Storage I/O Control allows cluster-wide storage I/O prioritization, which allows better workload consolidation and helps reduce extra costs associated with over provisioning.
Managing Resource Pools A resource pool is a logical abstraction for flexible management of resources. Resource pools can be grouped into hierarchies and used to hierarchically partition available CPU and memory resources.
Using DRS Clusters to Manage Resources After you create a DRS cluster, you can customize it and use it to manage resources.
Creating a Datastore Cluster A datastore cluster is a collection of datastores with shared resources and a shared management interface. Datastore clusters are to datastores what clusters are to hosts. When you create a datastore cluster, you can use vSphere Storage DRS to manage storage resources.
Using Datastore Clusters to Manage Storage Resources After you create a datastore cluster, you can customize it and use it to manage storage I/O and space utilization resources.
Using NUMA Systems with ESXi ESXi supports memory access optimization for Intel and AMD Opteron processors in server architectures that support NUMA (non-uniform memory access).
Advanced Attributes You can set advanced attributes for hosts or individual virtual machines to help you customize resource management.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195656.78/warc/CC-MAIN-20201128125557-20201128155557-00528.warc.gz
|
CC-MAIN-2020-50
| 2,317
| 11
|
https://discussion.fedoraproject.org/t/why-is-cpu-intensive-dnf-info-running-several-times-per-day/77962
|
code
|
Several times per day, somehow a bunch of processes start running and consuming large amounts of CPU and battery. Many (different) processes are run sequentially, each of which looks something like the following (gotten through htop), but with different packages replacing kmod.x86_64.
/usr/bin/python3 /usr/bin/dnf info kmod.x86_64
It cycles through many different packages in alphabetical order. The whole process takes about 30 minutes, utilizing a lot of CPU and eating about 10% of my laptop battery (which isn’t great).
Killing each individual process doesn’t really work because each one happens too quickly to stop. I can stop it overall with
sudo killall dnf but the whole thing just starts again a few hours later (and I have no idea if killall-ing dnf is a bad idea for other reasons).
- Why is this happening?
- Is there some way I can proactively stop this rather than killing it when I notice it?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00031.warc.gz
|
CC-MAIN-2023-40
| 914
| 7
|
http://pyx.sourceforge.net/examples/bitmap/pil.html
|
code
|
PyX — Example: bitmap/pil.py
Using image instances from the PIL
from pyx import * from PIL import Image im = Image.new("RGB", (3, 1)) im.putpixel((0, 0), (255, 0, 0)) im.putpixel((1, 0), (0, 255, 0)) im.putpixel((2, 0), (0, 0, 255)) c = canvas.canvas() c.insert(bitmap.bitmap(0, 0, im, height=0.8)) c.writeEPSfile("pil") c.writePDFfile("pil")
You can use image instances from the Python Image Library to create bitmaps. You then have an easy access to all the bitmap formats available in PIL, you may also use PIL features to create/load/modify bitmaps etc. In order to create an image pixel by pixel, the PIL is not necessary (by the way, it is slow to use putpixel for that).
Using PIL image instances you can also pass indexed images to PyX's
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246640550.27/warc/CC-MAIN-20150417045720-00105-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 747
| 5
|
http://www.keywordissimo.com/domain/www.aaronsaray.com/
|
code
|
Milwaukee PHP Web Developer
open source programmer, web developer
entrepreneur, author and musician
Things I've said lately...
PHPStorm Project Launchers for Ubuntu
Zend Framework 1 Form Captcha Idea
Idea: Extra Analytics Information
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122865.36/warc/CC-MAIN-20170423031202-00383-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 233
| 7
|
https://support.itead.cc/support/discussions/topics/11000033299
|
code
|
This seems basic so I must be just searching for the wrong thing.
I want to command one relay for "On" and another for "Off". I.e. when I speak to Alexa I want to say "Turn on garage" or "Turn off garage" and have one relay activate for the first and another for the second.
What am I missing?
Thanks in advance
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703497681.4/warc/CC-MAIN-20210115224908-20210116014908-00442.warc.gz
|
CC-MAIN-2021-04
| 311
| 4
|
https://www.rdx.com/resources/resume/microsoft-bi-team-resume
|
code
|
Experience in supporting tens of thousands of SQL Server Business Intelligence environments, architectures and solutions running on versions 2000 to 2016 for hundreds of organizations on a 24x7 basis. Very strong in Business Intelligence administration, development, and architecture, including but not limited to DTS, SSIS, SSAS, SSRS, T-SQL, data warehousing, logical and physical partitioning, database schema design, ERD diagramming and cloud/virtual services. Perform a variety of SQL Server BI tasks related to problem resolution and monitoring, administration, development, design, performance analysis, security, data mining and corporate strategy.
|SQL Server Versions||SQL Server 2000, 2005, 2008, 2008R2, 2012, 2014, 2016|
|BI Features||SSIS Package Configurations, Dynamic SSIS Task Building, Third Party Tasks, SSRS Scale Out Deployment, Time and Data Driven Subscriptions, Standard and Dynamic Cube Partitioning, MOLAP, ROLAP and HOLAP Cube Processing, XMLA Scripting, Attribute Hierarchies, KPIs, Calculated Measures, MDX, DAX|
|Applications||Visio, E/R Studio, Powerbuilder, Cognos (Additional expertise in Crystal Reports, Tableau, and Qlikview, although not officially supported)|
|Tools||Microsoft Database Migration Tools, SQL Server Management Studio, SQL Server Agent, Microsoft Database Tuning Advisor, Microsoft Visual Studio, Quest Benchmarking/Toad/SQL Navigator, Ingress, BMC Patrol, Quest Central, DB Artisan, ERwin Data Modeler, ER/Studio, Rational ClearCase, AutoSys, ITSM, PowerPivot,PowerView, QlikView, RSScripter, Master Data Services, Data Quality Services|
|Cloud Services||Azure Data Warehouse, Analysis Services, Power BI, Machine Learning, Data Factory|
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250615407.46/warc/CC-MAIN-20200124040939-20200124065939-00433.warc.gz
|
CC-MAIN-2020-05
| 1,692
| 6
|
https://github.com/reactjs/core-notes/blob/master/2016-04/april-21.md
|
code
|
- Ben (React)
- Dan (React)
- Jim (React)
- Paul (React)
- Sebastian (React)
- Shayne (React Native)
- Tom (React)
15.0 Post Mortem
Release was pretty rocky
- We didn’t have a cohesive enough story around what was to be included in the release.
- Now that we have more dependants (RN, many teams internally and externally) it’s becoming an issue.
- Examples of changes that we should have planned better:
- SVG attributes were passed through without a whitelist in RC1, then we reverted this in RC2.
- We switched to using attributes by default but haven’t tested this as thoroughly as we should have, and it caused a few regressions, plus later it turned out that we didn’t all agree on this change (Sebastian was out of the loop).
- Our default in the past has been to just work on everything individually.
- Ben created a special GitHub group so that we can auto-subscribe all of us to some big picture issues.
- We should have shipped an RC3.
- We should make the release process easier.
- Right now there’s too much manual work involved.
- If it was just one command, maybe we would have been more open to releasing RC3.
- Either this Friday or early next week.
- We merged some changes to bring the
react-native-rendererinto the React repo so we can change React internals more freely without breaking RN.
- What else should get into 15.0.2?
- Right now we just run master on Facebook.
- In six months, master and 15.x can diverge significantly.
- We need to figure out a better story around syncing React with:
- The Facebook website.
- React Native.
- Paul will write up how we’re going to do releases moving forward.
- Nicolas from Twitter created React Native Web.
- Leland from Airbnb maintains a fork.
- It is not clear how to create universal components.
- For example, if you depend on
react-native, you pull in the whole
- How do you create a component that is renderable both in React Native and React Native Web?
- Some registration system?
- Injectable components?
- No conclusion, lots to think about.
Adding Flow to React
- Flow has helped engineers at Facebook immensely, and it might help us here:
- We’d like to be more confident in the changes we want to make.
- Might help newcomers be more comfortable making changes in the codebase.
- Ben might experiment with adding it in some places, but we might want to hold off.
- Sebastian’s concerns:
- The work on incremental reconciler is going to be very invasive.
- Forcing addition of Flow in places where it’s very hard to type should be a non-goal as there’s a lot of meta-programming.
Who’s Working on What
- Ben: Working on some education material for React that could end up in the docs.
- Dan: After a chat with Sebastian, submitted another PR for the future ReactPerf and DevTools revamp.
- Jim: Mostly still fixing regressions.
- Paul: Flat bundles, modernizing our build process, thinking about the new release process.
- Sebastian: Bug fixes to make React Native to work with React 15.
- Shayne: React Native relies on npm, so we need a better way of consuming npm modules internally at Facebook.
Please feel free to discuss these notes in the corresponding pull request.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155676.21/warc/CC-MAIN-20180918185612-20180918205612-00151.warc.gz
|
CC-MAIN-2018-39
| 3,176
| 55
|
http://hpux.connect.org.uk/hppd/hpux/Text/latex2rtf-1.9.19/readme.html
|
code
|
latex2rtf is a translator program that translates LaTeX text into the RTF format used by various text processors, most notably Word. For the Copyright of the Program see the file Copyright. As of version 1.9.13, latex2rtf supports converting equations to bitmaps. This requires TeX and ImageMagick. See scripts/README. To install (on a UNIX system) - Edit Makefile for your local configuration. The default install is reasonable, but if you do not have root access, then you might need to set $PREFIX to be your home directory. - make - If this is not your first-time installation, you may want to preserve your old configuration (*.cfg) files. Copy them to a safe place before installing. - make check (expect warnings but no errors) - make install Reporting bugs to the homepage at Sourceforge http://sourceforge.net/projects/latex2rtf/ * Please verify your bug with the most recent version of the program. * Please provide the version of the program you are using * Please provide your operating system and version number * Provide a short latex file that exhibits the bug. It is imperative that you spend time isolating the problem into a small latex file. This shows that you actually care enough about the problem to spend some of your time trying to help isolate the bug. * Be patient. Provide patches. Enjoy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104277498.71/warc/CC-MAIN-20220703225409-20220704015409-00695.warc.gz
|
CC-MAIN-2022-27
| 1,316
| 1
|
http://assignment-writing-servic06048.xzblogs.com/3115436/the-smart-trick-of-programming-project-help-that-nobody-is-discussing
|
code
|
In that way you can recognize more quickly what has actually been finished and approach your next major measures. It’s our mission to help For each student at the ideal costs. That’s why college students really like our provider.
Nearly any on the web programming project help is available and you only must fill within a type to obtain your problem solved.
The power to book cinema tickets although sitting down in Business office or back garden will help people today help save time, energy and income. This method will include things like place-centered plugins for locating the nearest cinema hall before booking a ticket.
Just about the most groundbreaking java project Concepts to operate on. If you're able to entire it productively, then your teachers might be shower marks on you. This technique will make you the star between faculties and marks will cease to matter.
So, I've published this short article from my personalized activities i.e how I see object-oriented programming. If you're thinking that by looking through the content material of desk that: "Yeahh.
Scripting Language: It's really a programming language that is definitely accustomed to hire a superior degree build to interpret and execute a command at 1 time inside a Particular runtime ecosystem.
Should you be observing this concept, it means we're having issues loading exterior sources on our Internet site.
you will find him as greatest programmer on your programming assignments and Experienced computer software enhancement He'll help you within your programming projects
‘Out approach’ is a very important part. Since as a way to obtain anything even larger each and every item as part of your software program code should talk to each other.
Exploration of your impact of genetic determinants on early programming results and on subsequent final result (Theme three).
The gurus linked to us are highly skilled and proficient in each of the domains. Our writers make certain to match the premium quality criteria and guide you with any academic job.
Deal with your luggage when touring with great ease. Go ahead and ship your luggage with the absolute best technique.
Governments can now retain a tab to the entrepreneurs news as well as their startups applying This technique. The most effective java project ideas to undertake mainly because entrepreneurship is Probably the most heated subjects from the modern planet.
In this way your course identify, variable names and function names will convey the reader within your code in regards to the moment depth and will help him understand the code greater.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512434.71/warc/CC-MAIN-20181019191802-20181019213302-00482.warc.gz
|
CC-MAIN-2018-43
| 2,603
| 14
|
https://community.jitsi.org/t/meeting-compromised-by-gigantic-chat-3-5m-characters/62506
|
code
|
I am a school IT manager.
We are currently using the API of Jitsi on meet.jit.si for our classrooms.
Some students are filling the chat with a hude amount of text:
As the API must manage nearly 3.5 millions characters in 12.5 thousands lines, other functionalities are failing, like voice, cam, screen sharing, etc…
Is there a way to set a maximum chat size in the API ?
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897707.23/warc/CC-MAIN-20200708211828-20200709001828-00550.warc.gz
|
CC-MAIN-2020-29
| 391
| 6
|
http://advancedcomputech.com/windows-xp
|
code
|
loading xp sp1 stops my computer restarting
WXP lost video
Fresh installed copy of XP
XP boot failure says missing or corrupt hal.dll file
Hal.dll problem in NT
Clean installation of windows xp sp3
Windows XP Not Installing!
xp windows firewall
Bootleg version of Windows XP Pro
WinXP Crashes On Startup
windows xp trouble
No drivers after installing Windows XP. What now?
Cant reload WinXP
Windows Xp Repair
New Hardware not recognized by Windows XP Pro
No Harddisk drive found while installing XP
Windows Xp Slowing Down
Windows XP Will Boot but then Hang (Some Programs Won't Run)
Windows XP Set-Up Language Problem
Windows XP Automatic Mute Problem
XP Pro SP2
Odd XP reinstallation problem (w/pics)
Changing mobo: preserving WinXP
installation of xp2
Windows XP Doesn't Boot
complete XP reload question.
Xp cd key question
How to order Windows XP Service Pack 3?
Selling computer with genuine XP disk.
XP will not allow login
installing xp pro
Changing Windows XP Boot Screen
how to install xp in a pendrive
WinXP wont boot up.
windows xp showing error message lssas.exe and samlib.dll
unable to find hard drive while installing XP
A Few Problems With XP
xp hang up
My Computer will not boot to Windows XP
Troubleshoot winxp startup error message
Win XP installation stuck in a loop
Norton360 and XP Pro?
Reinstalling XP using only the hard drive?
Windows XP stuck When installing it
Windows xp freezes on load
Windows XP Taskbar Problem
Windows XP Cannot Shutdown
slow start windows XP
Problem after installing SP3
low performing winXP sp3 system files
Doing repair using Windows XP disc
XP boot up problem data recovery needed
Windows XP Sound problem
Can't Install my WIN Service Pack 3 Update
Installing Windows XP on Windows XP?
XP hangs on updates at shutdown
install linux after installing xp
Windows XP Hard Drive Transplant
XP locks up randomly
Stand By Not On
XP install now which drivers?
Windows Xp wont start (blue death)
A few XP Problems
Problems installing xp on formatted drive
USB Potential error in Service Pack 2 XP Home
Rebooting Windows xp from hard disk
how to install win xp with usb flash deirve
Replace XP Pro with Home
Can't Bootup Windows XP
Slow Windows XP response
unable to activate windows xp sp2
install windows xp pro
Windows XP Russian Language Problem
anyway i could do this on xp sp3
Problems after sp2
XP SP3 Installation Doesn't Recognize HardDrive
Raid Installation on an Existing XP Pro SP3
Need Windows XP boot disk
Update to Windows XP SP2. too slow
missing software after install new window xp
windows xp running slow.
Some PC issues with Windows XP
SP2 Changed Everything
Windows XP slowing down after a few hours; CPU usage mis-match in task manager
repairing XP PRO with bad CD key
xp won't fully install help please
blinking xp pro
XP Password removal
xp freezing after loading!(i have 2 antivirus s-ware)
win xp repair install: used to load sata ahci driver
Win XP log in problem
Windows XP freezes.
xp slow reacting
Win XP startup problem.
XP running really slow HJT log posted
My XP Install Fails at Graphical User Interface Point
Windows XP Reinstallation Problem
slow not responding windows xp
CQ60-214DX audio doesn't work after standby with XP SP2
Help! XP In another language
Reinstalling Windows XP with no disc drive
upgrading from win-xp
Windows XP Pro Wont Boot From Disk
XP Professional Installation
windows xp login screen
How do I recover XP
XP Home Networking - Missig Machine in Workgroup
Windows XP Installation Disks
Freecell from XP to Windows 7 home
xp sp3 i installed and ouch
XP Pro trying to setup after 1st load
No sound on WIndows XP after installation;Need urgent help
problem w/ xp install
XP home problems
Major computer problems[moved from xp]
Problems loading windows xp
Windows XP CD boot hang up
No internet after XP install
xp pro not shutting down
XP SP3 all kinds of problems
WindowsXP computer running VERY slow.
Trouble booting XP past chkdsk
Play Bluetooth Audio in windows xp?
Cannot Update XP Pro SP3 with XP2 CD
xp desktop freezes
Please help me repair windows XP
when to do a full backup of xp?
Very slow bootup and access to programs in WinXP
Full System Restore on XP
XP still running slow
Slow Windows XP Splash Screen
Keyboard and Windows XP
Having problems installing xp
reinstall win xp
Windows XP Start Menu Freezes
How to grant privilege to users in Win xp
Reinstall Windows XP Home From Disk
Help! XP Only Boots in Safe Mode after XP Reinstall
Performance of Apps on Windows XP Home Edition
Windows XP can't see HD but Windows 98 can
[MOVED FROM MICROSOFT SUPPORT] Windows XP Performance problems
XP re-installation help.
Windows XP won't boot up when started
Windows XP places the wrong task pane in a folder
WIN XP new install new hd - issues
email set-up in outlook in windows xp
receive fax by XP
Windows XP - Media Centre Edition 2005
Cannot re-install XP PRO
Can't log onto windows xp! Please Help!
asms on Windows XP Home Edition Service Pack 1 not found
Windows Xp Help - Service Pack 3
Windows XP SP2 SlipStreaming Help
Problem "Opening" files on Win XP SP2
Windows XP Starting Problem
will XP run on this motherboard
Sound Problem in Windows XP
Should I dump Vista for XP?
2 XP problems :S
system hanging-windows xp
w7 VIRTUAL XPMODE- Cant See TOOLS in MENU
Windows XP Startup Theme Problems?
Windows XP Product Key
Having Trouble With Virtual Drives
Re-install Win XP issue
How To Change Driver Versions In Windows XP
Reinstalling Win XP
Screwed-up windows xp password
Computer does not boot past XP splash screen
xp loading trouble
Problems downloading programs on Windows XP
Internet connection dies in XP.
Instaling WIn Xp Home: Hangs @ 33 mins left (Device Installation)
Need help reinstalling XP.
Installing Windows XP SP2 fresh
how can i be part of Windows XP Support team
URGENT! XP slow boot up
Virus wont let my comp boot even with xp cd help
OS (XP) installation problems
Installing Win xp stuck at 60%
Games and Programs - Vista vs XP
Problem Upgrading XP Home --> Pro
winXP won't boot
Trouble Reformatting xp home
norton ghost and windows xp
Windows XP totally freezes up randomly
Why has my XP Welcome Screen Changed?
Weird XP Pro Problem: Invisible User Account
Please help. Windows XP wont boot after touching sharing settings
Xp crashes at boot up status bar
When Windows XP fails to Restore from 3rd party backup files
Windows XP not getting installed.plss help
Microsoft retiring Windows XP
XP System Slow and Crashes
Reinstalled XP Pro
ReInstall Windows XP Licence Issue
install xp without disk?
Windows xp slows down
Chkdsk>Reboot Endless Cycle
Windows XP SP3 Keeps Rebooting
Windows XP Activation Problem
windows xp professional will not boot
Windows xp cannot access wireless
XP won't shut down properly
Windows Xp Theme loss
PC Hangs Up on Windows XP Splash Screen
XP hangs on shutdown/standby
xp sp2 crash causing restart
Windows XP Pro SP 3 Resetting Account After Boot
Windows XP professional x64 edition & WINHTTP.dll
Install windows xp on a borked netbook
Upgraded XP runs Slow and Badly - Need Tweak
Windows XP - No Audio ?!?!?
loss of mouse and keyboard on xp setup
xp reinstall hp pavilion
xp slows down after playing media files
Windows XP Add/Remove Programs
Windows XP Live Problem
win xp setup hangs after reboot
Slipstreaming and patching XP Pro
windows xp administrative rights question.
Downloading WINXP updates to USB
reinstall xp troubles
xp bootup failure
Windows XP LEFT Start menu Pinned Folders
No disk drive message is coming while installing windows XP
XP Pro not recognised in new hard disc
XP PRO RECOVERY SOUGHT! - Seeking XP expert to assist in recovery!
Windows XP issue
errors in xp
windows xp service pack 3 won't install on my vaio pcg-k33
OS - windows XP - Shockwave Installation
HELP PLEASE?!?!? BSOD while installing windows xp pro sp2
Windows XP home edition crash
XP hangs on startup
Xp Activation Problem
Xp cd broken?
Safe Way to Turn Xp in to Vista Suite
[resolved] Windows XP Pro Installation Problem
Assign Password to access FTP in XP
Dual Monitors with a Projector on Win XP SP3
WinXP login screen
Windows XP Service Pack 3 Black Moon Edition
Cant install WinXP PRO due to a sata HD
xp is it a new computer
install new hard drive win xp pro
Windows Xp Media Centre 2002
Windows Xp pro internet drivers problem.
Update to windows XP
Complete Re-install Of Factory Fitted Xp
WINDOWS XP PROBLEMS. help me please
Try again: Can I repair/reinstall XP?
Windows XP Pro 64
Help with XP install
Windows XP Loading Screen doesn't even show!
win xp sound problem
Administrator Acct not accessible [Moved from XP by chauffeur2]
XP won't install-logon error
WIN ME USB drivers installed on WIN XP
Trying to install upgrade verson of WinXP on Fresh HDD
Please help with my Windows XP computer!
Windows XP Splash Screen
Clean Install WinXP
Stuck at Windows XP logo when starting
Windows xp stalling (moved back to WinXP )
Problem with XP
xp x64 sp2 reinstallation help needed
No login box eventho windows xp splash screen loads
Windows XP Networking Problems
WinXP hangs on starting up screen
XP SP2 fresh install
Windows XP boots up to blue screen and then restarts. THis process is repeating.
Problems re-installing XP from CD on Partition1 [New
Need Help Installing XP (MK2035GSS Hard Drive)
XP Pro installed but will not run!
windows xp wireless internet problem
lookin for Microsoft Windows XP Hot Fix (KB929338)
Xp Boot Halts after POST
My XP laptop freezes when it starts up.
Service Pack 3 and MSN messenger issue?
XP Loading Time/Startup Problem
help me for window xp
Windows XP Vs. Windows Vista
How to change the User interface language of Window XP(IS MUI the only answer)
Xp Doesnt Load (no loading screen)
XP wont start up! help :(
Is WinXP SP3 Necessary - Answer
Computer won't boot after botched Windows XP Pro installation
XP Freezes at "Windows is starting up" screen
change position xp logon screen
Vista vs. XP
xp stuck at loading screen
XP Pro and Raid 0
Windows XP BCCode 24
Windows XP Pro Installation Problems
installing windows XP on a computer running window 98
windows xp reboot during installation
Upgrading to XP Pro
Windows XP Hour glass is flashing on and off without end.- 1
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886126017.3/warc/CC-MAIN-20170824004740-20170824024740-00325.warc.gz
|
CC-MAIN-2017-34
| 10,173
| 299
|
https://www.convolutedwritings.com/2011/01/sounds/
|
code
|
There was a time when through these eyes,
The world was full of magic, of possibilities
as endless as a summer day.
There was a time when it all seemed possible,
but not today, not this time,
its no longer clear.
The colors of yesterday have all but disappeared
Days no longer full of laughter, instead
Converted into endless years
That just seem to keep repeating
Sounds of voices no longer near
That I hold dear……..
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570730.59/warc/CC-MAIN-20220807211157-20220808001157-00159.warc.gz
|
CC-MAIN-2022-33
| 421
| 12
|
https://discuss.emberjs.com/t/ember-app-modules-namespacing/7495
|
code
|
The company I’m working for is building an emberjs app, which constitutes of different modules. We’re using Ember CLI to handle the project structure and build (at least for now).
For the modules, I mean very different pieces of functionality, not just some separation of data. Also, I want to add that these models have table names in common, but different data, so that’s one reason we needed to separate things. We will want to load these modules as required, so the app size gets reduced.
For the namespacing, we used an approach where we create a folder following the module name for controllers, models, adapters, views etc…
So the structure ended up like this:
You get the point.
This is working fine for us, although we had to customise and tweak a lot of ember things for this to work properly, we wanted to know if there’s an easier way to modularize an Ember app, using ember cli or not.
This is not something the guides and this very site talk about, but for some large projects, this becomes essential.
One solution we discussed as well was to have multiple ember apps. We decided to not do that on this moment because of some common data, so having one app would simplify, but the namespacing into folders brought its own issues we had to solve, like serializers, adapters, controller names, dependencies, etc.
Do you guys have any experience doing something like this? If yes, could you share what was the approach of doing so? Was the approach we took somewhat against the ember way?
Thanks in advance,
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249595829.93/warc/CC-MAIN-20190224044113-20190224070113-00525.warc.gz
|
CC-MAIN-2019-09
| 1,528
| 10
|
https://www.aenor.com/normas-y-libros/buscador-de-normas/bsi?c=000000000030388662
|
code
|
BS ISO 20819. Plastics. Wood-plastic recycled composites (WPRC). Specification
83.140.99 - Other rubber and plastics products
This document specifies the types and proportions of raw materials to be used for wood-plastic recycled composites (hereafter referred to as WPRC). It also specifies the health and safety requirements for WPRC and the methods to test these properties.
This document is applicable to WPRC which are primarily used as building materials.
Nota: Precios sin IVA ni gastos de envío
Añadir a la cesta
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988923.22/warc/CC-MAIN-20210508181551-20210508211551-00405.warc.gz
|
CC-MAIN-2021-21
| 522
| 6
|
https://www.sencha.com/forum/archive/index.php/t-102002.html?s=5bf83f0721c4ad5e3c692f7c4e479065
|
code
|
View Full Version : Simple Licensing Inquiry
18 Jun 2010, 7:31 AM
Which licensing model is Touch using MIT, or the same dual licensing as ExtJS?
18 Jun 2010, 7:47 AM
So are you currently not allowed to create closed source applications? for use on a commercial site?
18 Jun 2010, 10:02 AM
We do plan on having a dual license available at the time of release.
18 Jun 2010, 10:12 AM
So what about using the current beta release on a commercial site, is it allowed?
18 Jun 2010, 3:39 PM
Commercial is not an issue provided you comply with GPL, which includes releasing your source. At this time, only a GPL license is available for Sencha Touch (or you can use our FLOSS exceptions in combination with many other open source licenses). If you'd like to discuss further, you can reach us at firstname.lastname@example.org.
Powered by vBulletin® Version 4.2.3 Copyright © 2017 vBulletin Solutions, Inc. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119838.12/warc/CC-MAIN-20170423031159-00502-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 920
| 12
|
https://www.kalzumeus.com/tweetstorms/
|
code
|
This page is very work-in-progress but, hey, better the Internet than my hard drive. It currently covers ~5% of my tweetstorms and has terrible design.
- An ML algorithm encounters 原宿
- If we call him illiterate in writing he can't read it.
- No word in Japanese for overkill (except オーバーキル, probably)
What are these?!
Tweetstorms are mini-essays originally posted on Twitter. I find that it is (annoyingly!) easier and more fulfilling to write them in my between-doing-things moments than it is to clear a day for writing, so they make up an (annoyingly!) high portion of my public written output these days. Since I think writers should own their work, I'm mirroring the better ones to my site (semi-manually at the moment while I hack about on design). If for some reason you'd rather just follow me on Twitter, you could do that, too.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361253.38/warc/CC-MAIN-20211202084644-20211202114644-00336.warc.gz
|
CC-MAIN-2021-49
| 854
| 6
|
https://help.liferay.com/hc/ja/articles/360028833892-Liferay-Dev-Studio
|
code
|
Liferay Dev Studio is an extension for the Eclipse platform for developing Liferay DXP plugins. It works with build tools such as Gradle and Maven and configuration tools like BndTools.
Dev Studio makes Liferay development easier by providing an intuitive GUI. It contains
- Liferay-specific wizards for creating/developing Liferay DXP projects.
- Liferay server management and project testing capabilities.
- Editors for Service Builder files, workflow definitions, POM files, and more.
- Snippets for tag libraries
Here you’ll learn how to
- Install Dev Studio
- Set Proxy Requirements
- Install a Liferay server
- Import a Liferay project
- Use the Gogo Shell
- Search Liferay DXP source
- Debug Liferay DXP source
- Update Dev Studio
Let Dev Studio aid in your conquest for Liferay DXP development. Continue on to learn how!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00069.warc.gz
|
CC-MAIN-2023-50
| 830
| 16
|
https://firstlastandonly.com/2016/01/28/traditional-thursday-174/
|
code
|
One if the interesting things about living in the middle part of the country is interacting with businesses that are based upon the east or west coast. Many have no idea what things are like and what would be useful to people who do NOT live in large metropolitan areas. Storage in “the cloud”, for example, isn’t particularly useful for us. Downloading files are fine. Uploading files is painfully slow. So advertisements and promotions for cloud-based services that we can’t easily use are worthless. Yet we get a lot of them. Of course the server for our blog which happens to be in the cloud has uber bandwidth. So we can post as many photos and videos as we want (as long as we don’t mind waiting for them to upload).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499744.74/warc/CC-MAIN-20230129144110-20230129174110-00006.warc.gz
|
CC-MAIN-2023-06
| 732
| 1
|
https://www.ing.uc.cl/publicaciones/effective-dissolved-oxygen-control-strategy-for-high-cell-density-cultures/
|
code
|
Effective Dissolved Oxygen Control Strategy for High-Cell-Density CulturesRevista : IEEE Latin America Transactions
Volumen : 12
Número : 3
Páginas : 389-394
Tipo de publicación : ISI
Dissolved oxygen control is critical to ensure microorganisms’ growth in high-cell-density cultures. Sincebiological oxygen consumption strongly depends on biomass concentration, high-cell-density cultures demand an increasing and continuous oxygen supply. This is a challenging control problem and one of the major limitations of this type of cultures. The aim of this paper is to provide a simple dissolved oxygen control strategy capable of achieving high biomass levels by manipulating three process variables: agitation, aeration and oxygenation. This strategy was developed using a split-rangecontrol scheme specially designed so that the controller action is linear with respect to the maximum transfer rate (kLa·DO*). The controller parameters were tuned through simulation and later implemented and validated in Escherichia coli fed-batch cultivations. The strategy presented here allowed reaching high biomass concentrations while maintaining oxygen concentration at an appropriate level. The implementation of this strategy in high-cell-density cultures will help improve the productivity of aerobic cultures.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500035.14/warc/CC-MAIN-20230202165041-20230202195041-00295.warc.gz
|
CC-MAIN-2023-06
| 1,310
| 6
|
https://www.elance.com/d/p/dhtml/51
|
code
|
We have 4+ year experience in web development using PHP , Java, .Net , Android and IPhone. We have sound knowledge in E-Commerce development using Magento, WordPress and Facebook app development. We have a team of very good professionals. We believe to work in a with honesty and professional way. We believe in 100 % client satisfaction with good quality of work in timely manner. We are committed to our customers and have a passion for technology. We take on big challenges, and we pride ourselves on seeing them through until meeting our goals.
I am professional web developer / designer. Started developing websites from year 1996. Currently have own company for developing and designing websites and unique web systems. My notable partners are: Nikon, ADM and Isover My latest remarkable job was to make online picture voting system for Nikon. It was for Baltic Photo Contest 2012. System was designed so that, jury director and jury members used iPads for voting and voting was watchable online from website. http://wppb.eu. Also used this system at BALTIC NATURE PHOTO CONTEST 2011 http://balticnature.eu/ Jury members told, that it was best voting system they have ever used. We had two main categories at WPPB. 1st Wedding and 2nd Portrait, one jury director for each main category and totally 10 jury members. http://wppb.iamphotographer.eu/EN/jury It was fun. Looking forward for new challenges.
I am a web and software developer. I provide expert solutions to your problems at a good price, quickly. If you want you're job done correctly, with fast turn around, and great communication, work with me.
Working with web development, programming web pages, web systems, web apps and other web based things. I know Yii framework very well.
Hi, this is a draft.
Minimum Hourly Rate $9 Overall 8 years of Experience in Web based programming using PHP, Mysql, and Oracle. Good Exposure in Implementation of Web based applications in Apache Server. Possess Analytical, Excellent communication and inter personal skills and Good Interaction with individuals at all levels. Involved in Analysis, Application/Database Design, Development, Testing and Implementation of various applications. My balanced understanding of these technologies and their specific roles in web development qualify me for a variety of front and back-end programming tasks. In fact, I have worked on more than 150 web projects including web applications so far. I have extensive experience with many of the open-source PHP scripts such as Wordpress, Drupal, Zend, and many more.
* Ability to achieve project goals within project constraints such as scope, timing and budget * Drive complex design from scratch for large enterprise scale applications * Deliver complex enterprise applications using MS Technologies with end-to-end ownership * Ensure application design is aligned to the Future State Architecture * Bring technical expertise based on development experience, and make sound technical decisions to deliver high quality projects * Convert complex design into solid implementations that scale and perform * Designs and implement proof of concept as needed for solutions . * Experience in multi-tier architecture like ÂCSLA, dotnet Tiers, MVCÂ and SOA. * Experience includes in various domain like Marina Industry, Financial sector, Real Estate Management, COPC standards and Engineering Construction domains. * Able to work in fast paced, results oriented environment consistently delivering high quality work
I am expert Programmer. having 4 year experience in Dot net Technologies.
Since 2007 our small but solid team is providing an excellent web development quality. We have been working with differents technologies and platforms through these years and we specialize on: Platforms: Joomla - Wordpress, NETSUITE, presta shop and magento. Technologies: HTML5, CSS3 , JQUERY, PHP, ACTIONSCRIPT, Mobile development, responsive web desing, c# If you are looking for a long term and professionalism relationship. Please contact to us.
I'm Hitendra Jain, a freelance web developer who loves beautiful code, interesting architecture, great design and functional applications. I'm based in the Delhi city of India, but I'm willing to travel anywhere in the world.
CLIENT SATISFACTIONS OR WORK IN TIME THAT OUR PRIZE
Expert in .Net, MVC 3.0, Asp.net, Sql Server 2008
I am an enthusiastic technology follower having more than 5 years of rich and enormous experience in Web Development with a wide array of skills and a broad knowledge base to draw from. To serve global customers with quality software services in the field of web design and web development and to create long term and mutually beneficial business relationship. As a web developer, I am proud of strong analytical and debugging skills. I strive to write code of the highest standard, clean, well-documented, efficient and extensible. I focus on results and user experience, keeping in mind business goals as the guiding principle. I have terrific experience in development of web based applications especially with jQuery/JS/HTML5/CSS3/Ajax/PHP/Mysql/J2EE.
I am the professional Web developer with complete relevant 6+ Years of experience in the given profile of "PHP, Wordpress, Ajax, Jquery, Joomla, .Net". I have excellent command over "Graphic design,Flash,Logo Design, Animation(2D,3D) Web Design, HTML,Photoshop, Corel draw".
I provide a better quality for less money.
Group of Engineer
I am one stop center, where you will get designing, coding, programming, and many more...
I've 6 years experience in web development (programming)
I have plenty of web development stuffs to build your high scalable web. I am always use best technology but easy solution stuffs to fulfill customer's requirements. Always motivated to take challenges and play with new technologies. Developing apps with Ruby & Ruby on rails and java is my next destination.
My motto: "If I have a billion dollars in my bank account I would still do programming, at least for my personal research." Programming is my hobby which I was lucky enough to make it my job. Oh, I may be new to elance but I have +5000 hours in oDesk, check me there: https://www.odesk.com/users/~01e8e8501e6079804e (make sure to have an oDesk account to see full details!!)
More than 10 years of experience in software development in various roles: Architect, Developer, Technical Leader
JMG Software specializes in Custom Web Design, Development, Brand Marketing, eCommerce, Social Media Management, and Search Engine Optimization (SEO) solutions by utilizing ASP.NET, C#.NET, VB.NET, SQL Server and Microsoft Visual Studio running on Windows Server Platforms. We are located in Fairlawn near Akron, Cleveland and Canton, Ohio.
Graduate in Computer Science Hons. Post Graduation in MCA Now, Pursuing job as software engineer.
I have good 6 years experience Magento ,facebook devolopment,IOS, PHP,DHTMLincluding sites for startup companies and small businesses. My core competency lies in complete end-end management of a new website development project, and I am seeking opportunities to build. websites from the ground up for you or your business.I also have some experience in the following areas: Wordpress, joomla,CMS,Ajax, and Photoshop,illustration,corel,flash.
I have many years of experience working in various facets like Android, Articles and CSS. I have earned a good reputation through working as a Articles Content Writer and a CSS Designer for many companies world wide. I also have talent and expertise in Data Entry and Graphic Design. You can count on me for your profitability as I will substantially contribute to your company's growth if employed.
logo is your brand image,so get it proper. hire me if you want a custom made design in fast turnaround time with fair price. i have experience of several years (abt 3 yrs) in graphics designing, specially logo designing.therefore i can provide you the logos you want. i am sure you will not get disappointed hiring me. not only logos, i also work in stationery designs like business card, letterhead, envelop design,complementary slip ant many more illustration and designs.
Multi skilled software engineer. Specialized in C++, C#, ASP.NET and SQL Server.
I am running seo tech support company and satisfied my client to money and time limit.
Small Business And Enterprise Level Development and Infrastructure For The Drupal CMS Platform. I design, develop, test, and implement Drupal enterprise solutions. 'idrupalize' is your one-stop, comprehensive solution to managing your Web projects from inception to implementation.
Experienced software developer professional capable of designing technology projects and artifacts with advanced degree in Java programming skils with more than nine years of experiense. Java Programming Language skils: Servlet, JSP, Struts, Hibernate, Castor, Wicket, Spring, EJB, Jasper Reports, Maven 2, Ant, Android; Deep knowledge in data base Oracle, SQLServer, DB2, PostgreSql, MySql and Cach; Fluent in English and Portuguese. Experience of one year and four months on requirements survey using Rational Unified Process methods; Applied tools: Rational RequisitePro, Rational Rose, Jude, PowerDesigner, Rational ClearCase, Oracle Designer, SQLNavigator, Eclipse, JDeveloper, Jbuilder.
A team of young and experienced designers & developers, outstanding and ever-evolving in the world of design.we have 5+years experience in web development and designing,Expert in CSS Conversions,LOGO Designing,Mobile App UI, Templete Design, HTML Conversion,Pure css Conversation,web2.0 standards, banner designing,Graphic Design ,Website Design, psd to html.We are a company focused exclusively on trade in web hosting, web design & development, e-commerce. We focus exclusively on PHP projects and have expertise in CMS & Ecommerce solutions for : Magento (Community, Professional & Enterprise editon), Drupal Web & Mobile Applications, Wordpress, Code Ignitor, Joomla, Oscommerce, MVC frameworks, Zend etc.
I am Vikram. I am founder & Web designer at Boomerang Technologies. I do work on PHP, HTML, ASP.NET & my SQL. I am happy to create Websites for your new venture/existing one.
6 Years software developer Computer Systems Technology Diploma Development Portfolio: http://18.104.22.168
Software designer/developer with excellent problem solving skills
Expert in php developing in full stack frameworks and pure php. Development of sites, ecommerce, websystems (e-learning, e-business, e-doctor, social networks, chat support, api's and others) Software testing and server configuration, varnish proxy, apache2, nginx, php Databases postgres, mysql, mariadb, percona, mongodb and mssql
all web design
Working as a php developer since 4 year and know alot like i had worked in many projects and Google api like Google analytics Api:It fetcehes all the graphs and values by both method simple login method and Oauth method . some are above http://22.214.171.124:8080/igreen1/ http://www.byronbrand.com/byron/ http://www.evol1.com http://cespak.com/igreen1/ http://cespak.com/igreentv22/ Integrate phpfox community with wordpress Artist website cespak.com/gamarec greenassortments.com (magento) http://www.givaclic.com http://mastyari.com/gge (under construction). : Social Networking http://mastyari.com/collectionderobe/ http://reteachit.com/ http://www.mysweepstackes.com Google map Api Retrive Gmail mails on your local Computer(Gmail) Xml jQuery
User Experience Design, Technical Illustration, Technical Writing, Web Apps, Windows Apps. Excellent visual communication skills. Experienced independent contractor. Due to the public indexing of Portfolio items, many of my work samples are available by request only.
I am a Filipino PHP Developer that enjoy developing websites and always up for the challenge!
Developing & Implementing Web Application, System Software,Desktop Application, ERP etc. depending on Client's Requirement.
I have over 3+ years of experience in various areas in PHP based Web Development. Excellent in Web Application using PHP5, CakePHP, Codeigniter, Yii framework, Laravel, X-Cart,CorePHP, jQuery, JSON,CSS, Ajax, MySQL,Amazon EC2 Webservices & RDS Instance, MVC, SVN, GIT, CVS, cURL, OOP Concepts, and Bootstrap Design Pattern Experience.
We are one of those companies who oriented always on success. We are newly created company but we have strong high skilled developers stuff. The principles at the heart of our work allow us to be the best in a wide area We appreciate the quality - it is important for us and our customers We sure in the next day We appreciate the speed and live in the rhythm of modern technology Success creates successful software products to solve problems in different business areas (finance, medicine, high technology). Our customers are located in different parts of the world: USA, Australia, Europe, Russia. We all hit it off.
Software Engineer in .NET environment for almost 5 years also the good Designer
I am a new programmer, who love to code and learn new things. I was studying computer science and i have some experience on open source projects.
I'm a passionate professional specially in Microsoft Technologies.
Dajen Group aims to assist companies/indivials by providing software-based solutions that improve efficiency. We possess skills across a wide array of the industry backed by years of professional experience.
I can guarantee you for a satisfaction with my service. I follow the following steps for a new site. STEP: 1 - WEBSITE ANALYSIS -------------------------------------- Â WEBSITE PAGE ANALYSIS Â KEYWORD COMPETITION ANALYSIS Â KEYWORD ANALYSIS / POPULARITY FOR TARGETED VISITORS STEP: 2 Â WEBSITE OPTIMIZATION --------------------------------------------- Â ON-PAGE OPTIMISATION Â TITLE TAG OPTIMISATION Â META TAGS OPTIMISATION Â SEO CONTENT OPTIMIZATION STEP: 3 Â WEBSITE PROMOTION /LINK BUILDING --------------------------------------------------------------- Â CREATING ARTICLE DIRECTORY ACCOUNTS Â ARTICLE SUBMISSIONS Â SOCIAL BOOKMARKING Â ONE WAY LINKS STEP: 4 Â SEO REPORTS -------------------------------- Â KEYWORDS RANKING REPORTS Â SEO ANALYTICS Â GOOGLE STEP: 5 Â SEO MAINTENANCE -------------------------------------- Â MONTHLY RANKING REPORTS Â OPTIMISATION REPORTS Â FURTHER OPTIMIZATION Md.Rashedul Islam
I feel very glad and its great joy to be a member of Elance family. I have Graduate in Computer Science & Engineering and post Graduate degree in Master of Business Administration (MBA) in Marketing from United Kingdom. I am expert IT professional having 15+ years (previous full time jobs) practical experience in  Website Trafficking & SEO, Programming (Android, iPhone & Desktop), Website Design & Developing, Graphics, Advertisement & Commercials Designing, Computer, Network & Technical Supporting, Online Product Branding & E-Marketing. I am confident that given the opportunity of an hourly contract employment for the post applied for I would be able to discharge the responsibilities along with other responsibilities if assigned at your utmost satisfaction.
I am a PHP web developer and iam working at Spectrum Y&R in karachi pakistan
I have over 30 years experience in IT - from software development through systems admin to web sites either by hand or using Wordpress or Drupal. Bring me your problems in website hosting, systems administration, Wordpress and Drupal and let me solve them for you.
I'm a global lead mobile app developer and team manager who worked in Hualong Mobile Ltd. I've started to work as a developer in Goldenpack IT Company from 2008, after I possess a bachelor's degree in English and Computer Science when graduated from the Beijing University of Science and Technology. In Goldenpack IT Ltd, I've learnt how to write a program and I could achieve the solid knowledge in iOS / Android, PHP / MySQL and Webframeworks. From 2011, I have been working as an independent mobile app developer on freelancer because I've got a great impression from freelancer work. With the technical background and enthusiasm for mobile, I could build several awesome iOS & Android applications and could acquire more knowledge in iOS / Android app development. I have many high-skilled developers and I am a main developer as well as team manager. My company site : http://www.strongwinter3.com Thank you.
Looking to work as a freelancer where my work ability satisfy your needs... Satisfied client is my assets..!!
Honix Technology is a IT solution company providing customers with integrated end-to-end solutions and services to improve their business performance in real-time. Realizing that businesses face significant challenges and need reliable solutions to manage diverse tasks in different processes, we assist our customers in not just gauging their exact requirements, but also in recommending and implementing complete, robust and reliable solutions.
We, Iravat Infosoft Solutions Pvt. Ltd, a committed team of IT Professional with proven track record assures our each valuable customer feel preferred and to rely on us. We have an experience of more than one year and having to our credit about 100 websites and different industries software solutions. These websites and softwareÂs are complete in every respect and the minutest details have been taken care of. These sites can be visited to see the competency and expertise of our professionals.
Softezy Web solutions is a result oriented organization and it assures it by delivering quality products and the best customer support to its clients in the various purviews of web application development like product based web designing, web development and its digital marketing over the internet. We are based in New Delhi, India and providing our services worldwide and constantly aiming to expand our services beyond the world to uncover every aspect of life with the power of information technology. One of the important and notable features of our company is our obligation towards our customer service and their satisfaction. Our main objective is upholding long-lasting associations with our clients. We have an enthusiastic team of employees that comprises experienced and skilful managers, engineers, designers, developers and many more who enable Softezy to provide reliable and efficient services at rapid pace.
I'm experienced software developer. Totally I have almost 10 years of the experience and have been working in web and desktop development.
We offer a wide range of IT services ranging from website development, android and iPhone application development. We believe in client satisfaction so provide quality of work and on time.
Having more than 2 years Experience in Web Application, Web Designing and Desktop Applications. Deals also in Kalp InfoSys Kalp InfoSys. is India based Custom Website Development Company providing IT services since the year 2012. We have achieved the status of reputed Software Development Company by implementing wide range of projects for reputed organization in following different sectors. Our strength is maintaining good quality, client satisfaction supported by a talented pool of experienced professionals. We offer dedicated service at all stages of the project right from the initial stage to final delivery and maintenance. Our ultimate goal is to ensure that our clients derive maximum returns on their investments and remain competitive by implementing the best fit solutions. We establish lasting relationship
High Quality, Low Coast, Fast Speed, This is my work style. I have 6 year's mobile game development experience and made,reskinned a lot of mobile games of Android and IOS using cocos2d-x. I believe my capacity and experience in the game field. So if you work with me, I can satisfy you and provide some good suggestions. Hope to work for you. Thanks.
Amplodis is a professional web services company. We design and build websites, provide internet marketing solutions and help businesses create their brand. Our Team works closely with your organization to develop a web site that is consistent with the history of your company and at the same time competent with today's technology. Speed - Because of an expansive team in all domains, we have the ability to deliver within 7-45 days. After finalizing the design and the content we work expeditiously to get your site online. Knowledge and Experience - We study, practice, develop, and continuously educate ourselves on all of the latest technologies to stay current and up to date. After all we are smart working people and love what we do! End to end Solution - Our work doesn't complete after developing the website. We provide ongoing support to determine strengths, analyze weaknesses and strategize for improvements.
We have dedicated team of different group such has PHP ,android,Wordpress,SEO. No chance of project failure. Regular interaction with client in between project completion.
 Having 8 years of rich experience in development of complex financial business enterprise applications and processes using JAVA/J2EE/JSF/WEBLOGIC PORTAL/CMS and Databases such as Oracle 9i, 10g.  Proficient knowledge of Object Oriented Design (OOD) and Object Oriented Analysis (OOA)
ready to face any challenging tasks with scala and java.
I would like to be hired by your company for any of your Open Source Technologies or CSS projects as well as the Unity Development . I have worked for the same Developer a CSS Programmer and have received high praise. I have sound knowledge in HTML and can work proficiently in this area. I can also handle your tasks of iPhone Developer. I have experience working as a freelancer in these areas for many employers worldwide. I am ready to be hired by you for your jobs today.
Providing web based solutions to clients in PHP/ MYSQL environment since past 6 years. Have good experience and strong cammand in CORE PHP, code Igniter, cake php, Smarty, wordpress, Custom framework, open source and API creation. Providing client 100 % work satisfaction and a great support.
Hi, I can do all the IT related work.If U hire me I shouldn't made you hopeless.
im new user
IÂm a highly resourceful, innovative, and competent PHP developer with extensive experience in backend coding of websites specifically in PHP. I possess considerable knowledge of the development of web applications and scripts using PHP programming language and MySQL & SQL databases. IÂm experienced in developing applications and solutions for a wide range of corporate and public sector clients and having the enthusiasm and ambition to complete projects to the highest standard. I can manage  as an MBA economist  full project life cycle from inception to completion.
Experienced GAS developer
I am qualified experienced computer engineer and have been working for the software industry since 2003 in Bangladesh and also in England. I have also worked for international companies developing softwareÂs on basis of clientÂs business requirements. Focus on business requirement analysis and designing logical business solutions to integrate IT and business and improve business processes for the organization. I have done this by using my own initiative as well as in a team. Furthermore, I am client oriented, a good communicator and an excellent team player.
Hi, We have gone through your project description and would be glad to assist you in the project. Please share the project details so that we may analyze your requirements and present a proposal with fixed cost and timeline. We have master expertise in PHP development with in-depth knowledge of website security. Please take sometime to check our Work - http://www.freakin-out.com http://www.toptennewhomecommunities.com http://www.ribbontrees.com http://departedclassmates.com http://diyglasspoolfencingperth.com.au/ Meanwhile you can add me through Skype. About : We're a team of 5 and are extremely process driven and transparent, you'll enjoy working with our people. We take pride in excellent communication, well thought out solutions, tight/clean code, daily, weekly monthly reports with precise time input and a proactive approach. I'll be happy to answer any questions you may have. Looking forward to your kind response. Regards, Anuj Kamboj skype:anujdattana
My name is Vishnu Ruhela and I am a Web Application Developer cum Graphic Designer who specializes in creating dynamic and beautiful web pages. I have been in the field for nearly 3 years, and have been loving every minute of it. I am a blogger, designer, developer, and overall thinker.
Esatel Code Private Limited is a leading software development company in India providing Offshore Software Development Services & solutions with services such as outsourcing software development India, Web Development India, Product Development, E-strategy Consulting, Offshore software development, Web-Enablement Designing, Offshore Application development, Salesforce CRM Customization, .Net Development India,PHP Development, Software Development, Multimedia and Design Solutions, WAP Development and ERP.
Seeking Web Developer with a reputed organization to utilize my Technical / Development skills and abilities in the industry that offers me professional growth and enrich my knowledge, at the same time contributing to the development of organization.
I am a professional website developer expert in developing dynamic website like Ecommerce, web applications etc.
We are providing, best services by the best IT proffesionals. And Over the last 3 year, we have developed a wide range of websites using HTML, CSS,PHOTOSHOP, PHP, ANDROID, IPHONE like Wordpress with MySQL. We have designed and developed sites for established companies and small businesses. Areas Of Our Expertise: PHP Frameworks & Technologies: - ADODB - eMember - CakePHP - Drupal - osCommerce - WordPress - xAJAX - xCart Web Technologies: - AJAX - Blogs - CSS - HTML / DHTML - JavaScr
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447266.73/warc/CC-MAIN-20151124205407-00252-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 25,930
| 76
|
https://support.greenhouse.io/hc/en-us/articles/10844246899995-Select-recipients-for-the-new-pending-hire-email
|
code
|
The new pending hire email is a core email that notifies Owners and Coordinators when a candidate accepts an offer and is converted to a pending hire in Greenhouse Onboarding.
Owners can also configure this email to alert specific recipients when a pending hire joins your organization.
Add new pending hire notification recipients
Navigate to Settings > Onboarding Plan > Emails. Scroll to the Greenhouse Onboarding core emails section.
Hover over the New pending hire row and click the Pencil icon.
Type the desired recipient's email address in the search box, then click Add "[email address]" from the dropdown.
Once you've added all the recipients you'd like to notify, click Save.
The Send to column will change to Specified employees, indicating the recipients were added successfully.
Remove new pending hire notification recipients
To remove a recipient, hover over the New pending hire row and click the Pencil icon.
Click X next to their email address, then click Save.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00801.warc.gz
|
CC-MAIN-2023-40
| 979
| 11
|
https://forum.qubes-os.org/t/multiple-network-connections-over-multiple-network-cards-on-qubes-os/13741
|
code
|
Is it possible to have groups of VMs to connect to Internet through multiple internet connections, let’s say, for example, group1 VMs will connect via ethernet, and group2 via WiFi-1 and so on? A kind of physical isolation on the same machine.
Definitely possible. It’s one of the things that makes Qubes OS so versatile.
Qubes OS in a nutshell.
I’d also create separate disposable sys-net/usb based on minimals for each network interface, each containing only packages and firmware for a dedicated device (meaning, no iwlwifi in a sys-net for ethernet connection and so on…)
Thanks, but it is virtual isolation on a physical machine…
Any hints on how to achieve it please?
Actually I was looking for a solution to combine bandwidth on my linux/windows OS (figured out both physical&virtual load balancing), and that’s where this idea came for QOS, since combining network bandwidth defeats the purpose of QOS.
I was thinking on these lines, but was skeptical about its possibility. Supposing that creating sys-net1/sys-usb1/sys-whonix-1 (say sysnuw1 group) for additional interfaces is possible, where to start with, when trying to create a NetworkManager Applet for the sysnuw1 group? Am I in the right direction here?
I hope this is possible.
Qubes’ possibilities are virtually endless. You’re on the right place, don’t give up.
Remember, when creating/organizing you basically always start from templates untouched (minimal, preferably, as I said)->cloning templates to Template1->installing software in Template1 for intended use (in the way from above link, for example)->creatingAppVMs1/dvm-templates1->creating-dispVMs1/sysVMs1
not the other way
There’s no applet for the group. Only for the sys-net1, but essentially you probably wanted to ask that, so basically I believe you are
I mentioned sys-usb in case of USB network devices. If you don’t have them, you don need sys-usb. What you need is sys-firewall, so basically, sysnuw1 group would be
and you’d chain your AppVM or dispVm to at least to a sys-firewall1 for clear net, or to a sys-whatever1 for non-clear or vpn net.
Excellent info, thanks a lot!!
I actually missed out mentioning firewall in the group, and yes, the applet was for sys-net* of the group. Now I understand that the network connections of each interface can be locked to the ssid via the NM Applet. Have one last question: the applet shows the title “[sys-net] Network Connections” as for now. So will there be two applets or only one with two sections if I created a sys-net1?
I guess I will figure it out. lol.
You are welcome.
As many as created/running sys-nets are.
There’s no reason not to. Arm yourself with patience, repeat no mistake I did not to start with minimals from the very beginning and beside it’ll be immensely rewarding, you’ll spare tremendous amount of time to do other nice things with your life, beside this nice one too - Qubes OS.
If you’re serious with Qubes, you’ll conclude earlier or sooner minimals are the point.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335444.58/warc/CC-MAIN-20220930051717-20220930081717-00167.warc.gz
|
CC-MAIN-2022-40
| 3,017
| 22
|
https://wildlifebycyrene.wordpress.com/about/
|
code
|
Hello! I’m Cyrene Krey, the photographer and wildlife nerd behind Wildlife by Cyrene. Wandering around the woods behind my house growing up snapping photos of everything that moved (and some things that didn’t) was where I first became passionate about photography. After several years of professional portrait photography, I made the decision to return to my true passion: wildlife.
Nature and wildlife dominates my life! In addition to my photographic pursuits, I am also working towards a career in wildlife biology/conservation. I have a Bachelor of Science in Environmental Science with a concentration in Fish and Wildlife Management from American Public University and a Master of Science in Biology from the University of Saint Joseph.
I live in northern Illinois with my husband and our ten furry and scaly babies: two big dogs, five crazy cats, one little lizard, and two stubborn ball pythons.
In my free time (when I have any ;D), I volunteer at “Hoo” Haven Wildlife Rehabilitation and as a trail steward for the Forest Preserve District of Winnebago County. With or without a camera, I enjoy hiking, camping, scuba diving, and anything that gets me outside!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865081.23/warc/CC-MAIN-20180623132619-20180623152619-00294.warc.gz
|
CC-MAIN-2018-26
| 1,178
| 4
|
https://confidentialcomputing.io/2023/07/24/ccc-newsletter-june-july-2023/
|
code
|
Welcome to the June/July 2023 edition of the Confidential Computing Consortium newsletter! We look forward to sharing every month news about projects underway, new members, industry events and other useful information to keep you updated with what’s happening at the consortium.
Confidential Computing Summit: Broad industry representation
On Thursday, 29th June 2023, the first Confidential Computing Summit was held at the Marriott Marquis in San Francisco. Organized by Opaque Systems and the Confidential Computing Consortium, it comprised 38 sessions delivered by 44 speakers and panelists, with 244 attendees – over twice the expected number. Although initially planned as a single track event, the number of responses to the Call for Papers was so large that the agenda was split into three tracks, with keynotes starting and ending the event.
Sessions covered a broad range of topics, from state of the industry and outlook, to deep-dive technical discussions. One of the key themes of the Summit, however, was the application of Confidential Computing to real-life use cases, with presentations by end users as well as suppliers of Confidential Computing technologies. The relevance of Confidential Computing to AI was a recurring topic as data and model privacy is emerging as a major concern for many users, particularly those with requirements to share data with untrusted parties whether partners or even competitors for multi-party collaboration. Other use cases included private messaging, anti-money laundering, Edge computing, regulatory compliance, Big Data, examination security and data sovereignty. Use cases for Confidential Computing ranged across multiple sectors, including telecommunications, banking, insurance, healthcare and AdTech. Sessions ranged from high-level commercial use case discussions to low-level technical considerations.
There was an exhibitor hall which doubled as meeting space and included booths from the CCC and Opaque Systems plus the Summit’s premier sponsors (Microsoft, Intel, VMware, Arm, Anjuna, Fortanix, Edgeless Systems, Cosmian). The venue also had sufficient space (and seating with branded cushions!) for a busy “hallway track”. For many attendees, the ability to meet other industry professionals in person for the first time was as valuable a reason to attend the Summit as the session – while virtual conferences can have value, the conversations held face-to-face at the conference provided opportunities for networking that would have been impossible without real-world interactions.
The Confidential Computing Consortium would like to thank Opaque Systems and the program committee for their hard work in organizing this event. Given the success of the Summit, plans are already underway for a larger instance next year. Please keep an eye on this blog and other news outlets for information. We look forward to seeing you there!
– Mike Bursell, Executive Director of the CCC
- The Diana Initiative, Las Vegas, August 7
- DEFCON, Las Vegas, August 10-13
- Confidential Computing Mini Summit, Bilbao, September 18
- Open Source Summit Europe, Bilbao, September 19-21
- Open Source Summit China, Shanghai, September 26-28
The Confidential Computing Consortium
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816939.51/warc/CC-MAIN-20240415014252-20240415044252-00398.warc.gz
|
CC-MAIN-2024-18
| 3,238
| 13
|
http://compositewpf.codeplex.com/discussions/255407
|
code
|
Apr 27, 2011 at 9:55 AM
Edited Apr 27, 2011 at 9:56 AM
I'm new to Prism and I'm building a sample application using Silverlight4, Prism 4 with MEF.
In the Shell have a TabControl defined as a region where I load my Main Content. Since it's a Tab control I want to load multiple views in it and be able to navigate between them.
I have a View that Lists the "Customers" from my database. By selecting one Customer and click the Details button, I navigate to the "Edit Customer Details" View that opens in a new tab.
So far, so good.
The problem is when I try to Edit 2 Customers: I choose the customer, Edit, and a new tab is created. I choose another Customer, Edit and nothing happens.
In the CustomersList ViewModel I have the following code:
UriQuery uriQuery = new UriQuery();
var _customer = customersList.CurrentItem as Customer;
if (_customer != null)
Uri EditCustomerViewUri = new Uri(EditCustomerViewName + uriQuery.ToString(), UriKind.Relative);
I saw some solutions but it involved that the ViewModel inserted directly the View into the region, but I saw somewhere that the ViewModel should be "View Independent".
Anyone knows how can I load multiple instances of the same View from the ViewModel?
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122041.70/warc/CC-MAIN-20170423031202-00547-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,227
| 15
|
https://hu.indeed.com/cmp/FedEx/reviews?fjobtitle=Supervisor
|
code
|
Everyone is respectful, kind, and hard working. There were some down times where people had to leave because the work was too much, but other than that it was extremely worth every bit of time I put into it. If the company didn't shut down, I would've worked there until the day I retired, easily.
Reliable co-workers and associates.
Any day with spills or late trucks were pretty bad.
Hasznos volt ez az értékelés?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00414.warc.gz
|
CC-MAIN-2020-29
| 418
| 4
|
http://www.debian-news.net/2006/10/14/how-to-install-vmware-server-on-debian-sarge-2/
|
code
|
Falko Timme has provided yet another howto at HowtoForge – this time about WMware
Read the article for yourself
I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701146600.56/warc/CC-MAIN-20160205193906-00104-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 321
| 3
|
https://cloudposse.com/books/infrastructure-code-managing-servers-cloud/
|
code
|
This book explains how to take advantage of technologies like cloud, virtualization, and configuration automation to manage IT infrastructure using tools and practices from software development. These technologies have decoupled infrastructure from the underlying hardware, turning it into data and code. "Infrastructure as Code" has emerged alongside the DevOps movement as a label for approaches that merge concepts like source control systems, Test Driven Development (TDD) and Continuous Integration (CI) with infrastructure management.
Virtualization and cloud make it easy to rapidly expand the size of infrastructure, but the habits and practices we used in the past with hardware-based infrastructure don't keep up. Teams end up with hundreds of servers, all a bit different, and find themselves unable to fully automate their infrastructure.
The book will go through the challenges and problems created by all these wonderful new tools, and the principles and mindset changes that a team needs to make to use them effectively. It describes patterns, practices, and ideas that have been adopted from software development, especially Agile concepts, and brought into the IT Ops world as part of the DevOps movement. These ways of working have been proven in many organizations, including well known names like Netflix, Amazon, and Etsy, and also in more established organizations including publishers, banks, and even the British government.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819067.85/warc/CC-MAIN-20240424045636-20240424075636-00752.warc.gz
|
CC-MAIN-2024-18
| 1,448
| 3
|
https://www.superprof.com.my/blog/maths-help-graphs-functions/
|
code
|
With this type of maths problem, you are going to have a polynomial, exponential, logarithmic or trigonometric equation.
Studying a function consists of studying its changes and limits; finding extremes and asymptotes (if there are any!), and finally graphing the equation.
So with that in mind, and all the skills you can practice, it's a question that comes up pretty much every year as far as exams are concerned. As you can imagine, mastering these skills will also serve you well when you learn maths.
Take this example of a function:
Differentiating a Function
The function f(x) is a polynomial function formed of 3 terms. Here's a crash course in differentiation for you...
With this in mind, here's how our equation would look once it's been differentiated:
Factorising a Derivative
The aim of this step is to try and make our derivative as simple as possible - but factorising it isn't always possible. Don't forget to factorise where you can, as it helps you massively later.
You may be familiar with factorisation from our previous articles on solving equations!
If you take a look at the derivative above, you should see that each term has a factor of three within it. With this in mind, let's simplify our expression:
If you look at what's inside the brackets on the right hand side, you might notice the familiar form of a quadratic equation! If you're a keen reader of our blog posts, you'll remember a previous article on solving quadratic equations.
Here's a handy trick. Substitute your values for the quadratic equation into its discriminant. If the value you calculate is greater than 0, then the equation has two distinct solutions. If it's equal to 0 then there is one solution:
As you can see, in our case 16 is greater than 0, so there are two solutions. Feel free to try and work out which two numbers you need to sub into (x+a)(x-b) to generate the equation above, but we've got the answer below to make it a little easier:
So, the solution to our factorisation was (x+3)(x-1), and the 3 on the outside is from where we factorised out 3 earlier on.
Studying Graphs of Derivatives
We can figure out some properties of the graph before drawing it, just by analysing the equation itself.
One of our parentheses is (x+3). From this, we know that if our value of y is 0, then our graph will intersect the x axis at -3. If x is greater than -3, the y intercept is negative. If x is less than -3, the y intercept is positive.
Conversely, the other set of parentheses is (x-1). So the opposite applies: if x is greater than 1, then the y intercept is positive. If x is less than 1, then the y intercept is negative.
Returning to our original equation, for a moment, there's a theorem that states the following...
A local minimum or maximum point exists for a function where the derivative of that function is equal to 0.
We've just identified that our derivative is equal to 0 at x = -3 and x = 1. To find the point where a maximum or minimum point exists on our function, sub these values into the original function to find their equivalent y coordinates.
That gives you: (-3, 33) and (1, 1).
So now the question is: which point is a maximum point, and which is a minimum point? One way is to just sketch out the graph, and it should quickly become obvious, another is to look at the coordinates themselves: 33 is clearly greater than 1, so this would be the maximum point.
Drawing a Graph
Great! So now we've used the derivative to calculate the maximum and minimum points of our function.
The final step is to sketch out the graph. To do so, first mark your maximum and minimum points on the graph. We know the line must pass through both of these points, although we may be a little unsure of its shape.
You may already know the general shape for a trinomial equation, but either way, the safest method is to pick some other points before, inbetween, and after, your minimum and maximum points, and then essentially connect the dots up.
We chose the following values:
- x -> f(x)
- -5 -> 1
- -2 -> 28
- -1 -> 17
- 0 -> 6
- 5 -> 161
Now we have some dots to connect up between the maximum and minimum points, we can sketch the graph itself:
This was basic maths help for studying functions to draw graphs. There are some "gotchas" we didn't cover here, although they're unlikely to come up too often in an exam. One such example would be if there are breaks in the function itself.
If you had some trouble following this post, panic not! This is a topic covered at AS and A Level, and isn't too applicable to GCSE students - although it can't hurt to have some extra knowledge! In fact there are many unsolved maths equations.
You could also consider looking into a private tutor to solidify your knowledge of maths problems. You can find one right now on SuperProf!
The platform that connects tutors and students
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500076.87/warc/CC-MAIN-20230203221113-20230204011113-00666.warc.gz
|
CC-MAIN-2023-06
| 4,834
| 40
|
http://china.befdata.biow.uni-leipzig.de/keywords/204
|
code
|
Datasets tagged with 'basal area'
- Allometries: Basal area increment of harvested trees
- CSPs: basal area before and after the snowbreak event in 2008
- CSPs: Tree growth of trees >10cm dbh in the CSPs (2008-2010)
- CSPs: Tree growth of trees with dbh of 3 to 10cm dbh in the CSPs (2008-2010)
- CSPs: Tree size measures and corrected tree tags in the CSPs - 2010
- CSP total tree basal area without the snowbreak trees
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123318.85/warc/CC-MAIN-20170423031203-00607-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 420
| 7
|
https://archive.arisuchan.jp/tech/res/702.html
|
code
|
I just got and idea, where I would use the laptop to torrent stuff, it would then send the downloaded stuff to my main PC through SSH, so the disk won't fill up. Essentialy the 50GB disk it has would act as a "cache".>>704>>703
Thanks for the ideas, I think I'm gonna also setup a private website + git server for my repos. Maybe even some constant integration software.
Too bad I can't host anything to outside, I'm behing a NAT and I don't have a static IP, I guess there isn't anything to do about it?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621273.31/warc/CC-MAIN-20210615114909-20210615144909-00637.warc.gz
|
CC-MAIN-2021-25
| 504
| 3
|
https://markmail.org/message/jg5kwamikiwyer7s
|
code
|
Now with :
- xserver 1.7.4
- 2.6.33rc7 with KMS
- libdrm, mesa, xf86-video-ati from git
2D and 3D are back OK on an R700 (HD4650 mobility (M98))
However I see 2 performance issues :
- glxgears tops at 1450fps (compared to ~2500fps without KMS)
- GL vsync is broken, ie visual tearing especially at playing large videos
(XV or OGL) with Kwin compositing enabled
Any thoughts on this ?
On Sat, 30 Jan 2010 15:35:44 +0100 (CET)
"Damien Mir" <mail...@mirabel-sil.com> wrote:
I just tried KMS with "radeon" driver, and 2D seems notably slow.
Widgets takes time to draw, scrolling in Dolphin or Firefox lags, as
if some 2D acceleration was not working alright.
I use radeon KMS on an R600 (HD 3870) and all works really well. 2D as
well as 3D (glxgear, tuxracer, nexuiz). Kernel is 2.6.32 and
drm, mesa, xf86-video-ati are latest git HEAD. Maybe you need a newer
version of the ati driver.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648000.93/warc/CC-MAIN-20180322190333-20180322210333-00783.warc.gz
|
CC-MAIN-2018-13
| 883
| 19
|
https://mail.haskell.org/pipermail/haskell/2004-November/014742.html
|
code
|
[Haskell] Re: Global Variables and IO initializers
Jon.Fairbairn at cl.cam.ac.uk
Thu Nov 4 11:59:29 EST 2004
On 2004-11-04 at 16:16+0100 Koen Claessen wrote:
> Benjamin Franksen wrote:
> | 1) I strongly disagree with ideas to execute IO actions
> | implicitly in whatever defined or undefined sequence
> | before or during main for whatever reasons.
> I agree with the objections you make. Having full IO actions
> as initialization actions might be a bit too much.
I agree with that too. Let me propose what I think may be a
simpler (though at present the dough is barely risen, let
alone baked) alternative: external "constant" modules.
First, I'd like to point out that having initialisation data
that changes between runs of a programme is already
possible: a programme could do IO to its own loadmodule. I
mention this not as a serious suggestion, but to forestall
objections about changing the content of a "constant"
The idea is simply that we should provide a mechanism of
saying to a compiler "this file (of data) is a module that
exports only the variable v". Given the way IO and
filesystems stand at the moment, this probably means that
we'd have to restrict v to be a String (or [Word8]?), but
the correct solution to that would be typed IO, and it's too
early to talk about that.
So we tell the compilation system that file
/somewhere/contains-v contains the value of the variable
v::String, and that it lives in the imaginary module
Home.Of.V, and when the resulting programme is loaded, so is
the content of /somewhere/contains-v, and v is bound to it.
OS permitting the loading of the file should only be
virtual. Now IO to /somewhere/contains-v should have no
effect on the value of v, but next time the programme starts
it can use the new value.
Jón Fairbairn Jon.Fairbairn at cl.cam.ac.uk
More information about the Haskell
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891485.97/warc/CC-MAIN-20180122153557-20180122173557-00298.warc.gz
|
CC-MAIN-2018-05
| 1,844
| 36
|
https://boards.greenhouse.io/twilio/jobs/1835003
|
code
|
Because you belong at Twilio
The Who, What, Why and Where
Twilio has over 20 products enabling developers to build communications into their apps. But communications are hard and complicated behind the magic of the Twilio API, so errors can happen in weird ways that try/catch blocks won't detect. Add on top of that a contact center product like Flex, which is built on top of all of the Twilio primitives like SMS, Voice, and TaskRouter, and you have a dependency map that makes it incredibly hard to debug when something goes wrong. And with 20+ products and an "always be deploying" mindset, our customers need to know when we're going to change things that might affect them. The Transparency team at Twilio exists to provide customers a best-in-class developer experience when debugging distributed systems and flawless communications about our ever-evolving product lineup.
Twilio is looking for a product-oriented engineer who is just as passionate about API design as they are an obsessive advocate for their customers. This is the right job for you if you have:
- A passion for Developer Experience. You provide feedback when you find incorrect docs and aren't afraid to open issues and PRs against public SDKs.
- Deep knowledge of at least one object-oriented, compiled programming language and one interpreted language.
- Experience owning, operating, deploying, and monitoring cloud-based RESTful microservices at scale; and have worked with technologies like Chef, Docker, or Terraform.
- A roll-up-the-sleeves mentality for digging into multiple codebases to get to the root of a problem.
- Front-end experience with React, Redux, Typescript, or related technologies.
- A preference for collaboration -- you find success in learning from others and helping them be successful.
- Opinions and a high bar for software quality and availability, and connect the dots between those metrics and your customers' success.
- Bachelor’s degree in Computer Science or similar experience
As a Senior Software Engineer, you are a top contributor to the team, and also provide mentorship and leadership to the rest of the team through daily PR reviews, daily standups, and architectural discussions. We operate services that process millions of records per day and provide customers with interfaces on top of that data to help them understand how their application is performing.
- Partner with Product to develop product specs and convert them to technical specs.
- Collaborate with other teams that integrate with the platform-level services we provide.
- Be hands-on and leave every code base better off than when you opened it.
- Hold yourself and the team accountable to a high bar of availability and quality of service, and forecast future growth of our services and its impact on our scale.
- Represent our engineering team to the rest of Twilio, both technically and culturally.
- Drive a culture of testing, from unit tests all the way up the stack to end-to-end testing.
- Ensure compliance with Twelve-Factor App methodology.
Transparency is a unique type of team: we are both a product team that builds tools for our external customers and a platform team that ingesting data from other product teams that we then analyze and present to customers. And we do this at a massive scale. Joining this team will challenge you to think outside the box about technologies like data streaming and event-driven programming. Internally, we empower and educate product teams with opinions on what good Developer Experience is. Externally, we push the envelope of how customers find out about issues and changes to their Twilio account.
Twilio is a company that is empowering the world’s developers with modern communication in order to build better applications. Twilio is truly unique; we are a company committed to your growth, your learning, your development, and your entire employee experience. We only win when our employees succeed and we're dedicated to helping you develop your strengths. We invest in weeks dedicated to tackling hard problems and creating your own ideas. We have a cultural foundation built on diversity, inclusion, and innovation and we want you and your ideas to thrive at Twilio.
This position will be located in our office at 1801 California St. in Denver. You will enjoy our office perks: catered meals, snacks, game room, ergonomic desks, massages, Wednesday dinners, monthly All Hands and more. What you will also get to experience is a company that believes in small teams for maximum impact; seeks well-rounded talent to ensure a full perspective on our customers’ experience, understands that this is a marathon, not a sprint; that continuously and purposefully builds an inclusive culture where everyone is able to do and be the best version of themselves.
Founded in 2008, Twilio has over 2,000 employees, with headquarters in San Francisco and other offices in Bogotá, Dublin, Hong Kong, London, Madrid, Mountain View, Munich, New York City, Prague, Singapore, Sydney, and Tallinn.
Millions of developers around the world have used Twilio to unlock the magic of communications to improve any human experience. Twilio has democratized communications channels like voice, text, chat, video and email by virtualizing the world’s communications infrastructure through APIs that are simple enough for any developer to use, yet robust enough to power the world’s most demanding applications. By making communications a part of every software developer's toolkit, Twilio is enabling innovators across every industry — from emerging leaders to the world’s largest organizations — to reinvent how companies engage with their customers.
Twilio is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal opportunity regardless of race, color, ancestry, religion, gender, gender identity, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or Veteran status and operate in compliance with the San Francisco Fair Chance Ordinance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250595282.35/warc/CC-MAIN-20200119205448-20200119233448-00091.warc.gz
|
CC-MAIN-2020-05
| 6,090
| 26
|
https://omictools.com/alternative-splicing-category
|
code
|
Unlock your biological data
Alternative splicing (AS) is a post-transcriptional regulatory mechanism for gene expression regulation. Splicing decisions are affected by the combinatorial behavior of different splicing factors that bind to multiple binding sites in exons and introns.
(Badr and Heath, 2015) CoSREM: a graph mining algorithm for the discovery of combinatorial splicing regulatory elements. BMC Bioinformatics.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156857.16/warc/CC-MAIN-20180921053049-20180921073252-00025.warc.gz
|
CC-MAIN-2018-39
| 423
| 3
|
http://demo.az-themes.com/alice/documentation/spec/02_theme_customizer.html
|
code
|
02. Theme Options - Customizer
After activating the theme, you will notice that a new submenu item appeared, under "Appearance -> Customize".
If you click on it you will be taken to the WordPress customizer, a tool which will allow you to modify the look and feel of your website.
Unfortunately not all theme options features are present. You can select only the colors and the social profiles.
When you change the colors, you need re-load the page for see the changes
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741660.40/warc/CC-MAIN-20181114062005-20181114084005-00399.warc.gz
|
CC-MAIN-2018-47
| 468
| 5
|
https://www.re-soft.com/teams-call-quality-monitoring
|
code
|
Monitoring Call Quality for Hybrid Meetings
Teams and Zoom have become ubiquitous in the meeting environment, and now we see many hybrid meetings where some people attend in person and others remotely.
Although complete outages are rare, there are a number of moving parts that can affect the performance of a virtual call between the user's client computer and the Teams/Zoom Service – WiFi, Bluetooth, Network, etc.
OmniContext is a Utilization and Performance Monitor for these components, providing:
Teams Call Quality monitoring (as well as Zoom) – to answer the question - is the problem your end or ours?
VIP focused – explicitly monitor the Teams experience of your key employees
Alert admins to take action on slowdowns in the user experience before they become outages
Capture data to build utilization and optimization strategies for bookable spaces
Teams and Zoom Call Quality Monitoring
Availability of service can be monitored in multiple ways:
Uptime of the service itself is the application running and does it appear healthy on the system where the service is deployed? Such measurement would usually be produced by cloud service providers and published for everybody’s reference. It confirms that the service itself is operational, however does not verify the ability of end users to consume it.
Health of underlying system resources such as networks and hardware. Whereas it does not ensure the service works as such, it can be used to troubleshoot the root causes of failures and to proactively detect resources shortage that leads to the degradation of service.
End-user experience monitoring which confirms that a user can actually work with the application and execute normal actions as expected. This type of monitoring is not available from cloud service providers and can only be performed by customers from their networks.
The principal objectives of service monitoring are:
Know in real time when a service is down, so users can be alerted and the outage can be mitigated immediately
Analyze and understand longer-term performance in order to identify recurring patterns, find root causes of failures, and improve deployments to prevent known problems from happening in the future
Measurements are usually collected from multiple selected locations, which can be at different locations within the customer’s environment, or even directly on users’ workstations. These locations are presented as “sources” in the monitoring status and reports, and the measured services are listed as “targets”.
Alerts and Notifications
OmniContext allows for configuring conditions that trigger alerts such as a total outage, or a level of latency that makes user actions take longer than expected.
Alerts can be configured for a combination of several conditions, or for repeated failures within a certain time period.
Once an alert condition happens, a notification can be sent to an email address, or to the OmniContext mobile app. OmniContext can also post alert notifications into event logs, or automatically create and modify incidents in trouble ticket applications such as ServiceNow.
Out-of-the-Box Monitoring Actions and Parameters
OmniContext Agent is able to run various monitoring tests – from the simplest server pings to sophisticated end user experience simulations in Office365 applications. A number of tests scenarios are available out of the box. When there is a need to monitor a scenario which is not covered by predefined configurations, it is possible to create new scenarios combining atomic transactions into meaningful action sets to simulate end user activities. OmniContext Agent provides user interface to choose a test scenario from predefined ones and to set final configuration for the test.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816535.76/warc/CC-MAIN-20240413021024-20240413051024-00571.warc.gz
|
CC-MAIN-2024-18
| 3,758
| 23
|
https://empireminecraft.com/threads/just-noticed-something.21415/
|
code
|
While in wild i did /entc, and for some reason i am being charged with 384 animals when i only have 4 cows and 10 chickens, and nothing on my property in town. Somehow/someway we are being charged for wild animal spawns, This is maxing out are animal list and is deleting my villagers. This is not the 3rd time this is happened. Thinking the only fix my be if the animal is tamed then it should be charged to animal /entc. But wild Cats and other animals are being generalized in to that group somehow.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118963.4/warc/CC-MAIN-20170423031158-00340-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 502
| 1
|
https://www.sunmiao.name/
|
code
|
Plant Evolution and Biodiversity (PEB) Group
Department of Bioscience – Ecoinformatics and Biodiversity, Aarhus University
Ny Munkegade 116, Building 1535, Room 227, 8000 Aarhus C, Denmark
Email: firstname.lastname@example.org; email@example.com
A phylogenetic tree is a pivotal framework for solving fundamental issues in biology.
My long-term research goal is to use a robust phylogeny to elucidate patterns of evolutionary radiations in angiosperms and to address the causes of plant
diversification using the tools of comparative biology.
- 2009 ~ 2014, PhD in Botany, Institute of Botany, Chinese Academy of Sciences
- 2006 ~ 2009, Master of Botany, Institute of Botany, Chinese Academy of Sciences
- 2002 ~ 2006, Bachelor of Environmental Science, College of Resources and Environment, Beijing Forestry University
Able to identify most seed plants at genera level or at least family level and expert in Elaeagnus (Elaeagnaceae), familiar with International Code of Botanical Nomenclature and mastering the process of compressing specimens
Molecular biology skills:
DNA extraction, clone, PCR, sequencing, genome assembling, and genome size measurement
Experienced in Target Enrichment data analyses using aTRAM and HybPiper, and gene tree congruence visulizaion using Phyparts and Pycharts.
- Experienced with standard biological software and genome dataset analysis (e.g., probe design, genome assembly)
- Proficient in Shell, R, git, Perl, and Python programming languages, familiar with SQL, version control (git), experienced in applied programming for biological data analysis and reproducible data science.
Fluent spoken and written Chinese and English
Honors & Awards
- 2017: Certified Instructor of Software Carpentry, and qualified to teach Software Carpentry’s core curriculum.
- 2006 ~ 2014: First-class Scholarship for Graduate Student of Chinese Academy of Sciences
- 2008: Honored as a science popularization volunteer
- 2004 ~ 2005: Second Scholarships for Excellent Academic Score BFU and National Grants.
- 2003: Third Scholarships for Excellent Academic Score and National second-class scholarship.
- 2002: Chinese scholarship.
*equally contributing author; 26 publications, h-index 9; 422 total citations according to Google Scholar
- Shimai H, Setoguchi P, Roberts D, Sun M. (In prep.) Phylogeny and biogeography of the genus Pinguicula L. (Lentibulariaceae) based on nuclear ribosomal DNA and chloroplast DNA.
- Sun M, Folk FA, Gitzendanner MA, Smith SA, Germain-Aubrey C, Guralnick RP, Soltis PS, Chen ZD, Soltis DE. Exploring the phylogeny and diversification of rosids with a five-locus supermatrix. bioRxiv 694950. doi: 10.1101⁄694950.
- Sun M, Folk FA, Gitzendanner MA, Soltis PS, Chen ZD, Soltis DE, Guralnick RP. (2020). Recent, accelerated diversification in rosids occurred outside the tropics. Nature Communications (Accepted).
- Sun M, Folk FA, Gitzendanner MA, Soltis PS, Chen ZD, Soltis DE, Guralnick RP. (2020). Estimating rates and patterns of diversification with incomplete sampling: A case study in the rosids. American Journal of Botany doi: 10.1002/ajb2.1479 (Accepted; also see bioRxiv 749325).
- Lichman BR, Godden GT, Hamilton JP, Lira Palmer L, Kamileen MO, Zhao D, Vaillancourt B, Wood J, Sun M, Henry LK, Lopez CR, Dudareva N, Soltis DE, Soltis PS, Buell CR, O’Connor SE. (2020). The evolutionary origins of the cat attractant nepetalactone in catnip. Science Advances 6: eaba0721. doi: 10.1126/sciadv.aba0721.
- Mu XY, Tong L, Sun M, Zhu YX, Wen J, Lin QW, Liu B. (2020). Phylogeny and divergence time estimation of the walnut family (Juglandaceae) based on nuclear RAD-Seq and chloroplast genome data. Molecular Phylogenetics and Evolution 147: 106802. doi: 10.1016/j.ympev.2020.106802.
- Xue B, Guo X, Landis JB, Sun M, Tang CC, Soltis PS, Soltis DE, R.M.K. Saunders RMK. (2019). Accelerated diversification correlated with functional traits shapes extant diversity of the early divergent angiosperm family Annonaceae. Molecular Phylogenetics and Evolution 142: 106659. doi: 10.1016/j.ympev.2019.106659.
- Li DJ, Lauren Trotta L, Marx HE, Allen JM, Sun M, Soltis DE, Soltis PS, Guralnick RP, Baiser BH. (2019). For comparing phylogenetic diversity among communities, go ahead and use synthesis phylogenies. Ecology. doi: 10.1002/ecy.2788.
- Yang T, Tedersoo L, Soltis PS, Soltis DE, Gilbert JA, Sun M, Shi Y, Wang HF, Li YT, Zhang J, Chen ZD, Lin HY, Zhao YP, Fu CX, Chu HY. (2018). Phylogenetic imprint of woody plants on the soil mycobiome in natural mountain forests of eastern China. The ISME Journal 13: 686–697.
- Marodiev EV, Sun M, Schroder L, Steadman DW, Ebach MC. (2018). Moving from modern toward post-modern science: comment on “An integrated assessment of the vascular plants of the Americas.” Phytotaxa 351: 96–98.
- Folk RA, Sun M, Soltis PS, Smith SA, Soltis DE, and Robert P. Guralnick. (2018). Challenges of comprehensive taxon sampling in comparative biology: Wrestling with Rosids. American Journal of Botany 105(3): 433–445.
- Lu LM, Mao L, Yang T, Ye JF, Liu B, Li HL, Sun M*, Miller JT, Mathews S, Hu HH, Niu YT, Peng DX, Chen YH, Smith SA, Chen M, Xiang KL, Le CT, Dang VC, Lu AM, Soltis PS, Soltis DE, Li JH, Chen ZD. (2018). Evolutionary history of the angiosperm flora of China. Nature 554: 234–238. doi: 10.1038/nature25485.
- Mu XY, Sun M, Yang PF, Lin QW. (2017). Unveiling the identity of Wenwan walnuts and phylogenetic relationships of Asian Juglans species using restriction site-associated DNA-sequencing. Frontiers in Plant Science (8): 1708. doi: 10.3389/fpls.2017.01708
- Hodel RG, Gitzendanner MA, Germain-Aubrey CC, Liu X, Crowl AA, Sun M, Landis JB, Segovia-Salcedo MC, Douglas NA, Chen SC, Soltis DE, Soltis PS. (2016). A new resource for the development of SSR markers: Millions of loci from a thousand plant transcriptomes. Applications in Plant Sciences 4(6): 1600024.
- Hodel RG, Segovia-Salcedo MC, Landis JB, Crowl AA, Sun M, Liu XX, Gitzendanner MA, Douglas NA, Germain-Aubrey CC, Chen SC, Soltis DE, Soltis PS. (2016). The report of my death was an exaggeration: A review for researchers using microsatellites in the 21st century. Applications in Plant Sciences 4(6): 1600025.
- Chen ZD, Yang T, Li Lin, Lu LM, Li HL, Sun M, Liu B, Chen M, Niu YT, Ye JF, Cao ZY, Liu HM, Wang XM, Wang W, Zhang JB, Meng Z, Cao W, Li JH, Wu SD, Zhao HL, Liu ZJ, Du ZY, Wang QF, Guo J, Tan XX, Su JX, Zhang LJ, Yang LL, Liao YY, Li MH, Zhang GQ, Chung SW, Zhang J, Xiang KL, Li RQ, Soltis DE, Soltis PS, Zhou SL, Ran JH, Wang XQ, Jin XH, Chen YS, Gao TG, Li JH, Zhang SZ, Lu AM. (2016). Tree of life for the genera of Chinese vascular plants. Journal of Systematics and Evolution 54(4): 227-306.
- Li HL, Wang W, Li RQ, Zhang JB, Sun M, Naeem R, Su JX, Xiang XG, Mortimer PE, Li DZ, Hyde KD, Xu JC, Soltis DE, Soltis PS, Li JH, Zhang SZ, Wu H, Chen ZD, Lu AM. (2016). Global versus Chinese perspectives on the phylogeny of the N-fixing clade. Journal of Systematics and Evolution 54(4): 392-399.
- Sun M, Naeem R, Su JX, Burleigh GJ, Solits DE, Soltis PS, Chen ZD. (2016). Phylogeny of the Rosidae: A dense taxon sampling analysis. Journal of Systematics and Evolution 54(4): 363-391.
- Sun M, Solits DE, Soltis PS, Zhu XY, Burleigh GJ, Chen ZD. (2015). Deep phylogenetic incongruence in the angiosperm clade Rosidae. Molecular Phylogenetics and Evolution 83: 156-166.
- Wang B, Zhang Y, Wei P, Sun M, Ma X, Zhu X. (2015). Identification of nuclear low-copy genes and their phylogenetic utility in rosids. Genome 57(10): 150203143525007.
- Lu LM, Sun M, Zhang JB, Li HL, Lin L, Yang T, Chen M, Chen ZD. (2014). Tree of life and its applications. Biodiversity Science 22: 3-20.
- Sun M, Lin Q. (2010). A revision of Elaeagnus L. (Elaeagnaceae) in mainland China. Journal of Systematics and Evolution 48(5): 356-390.
- Sun M, Lin Q, Sun Q, Bei SQ, Li HL, Yang ZR. (2008). Validation of eight names of Chinese taxa in Ranunculaceae, Rosaceae and Scrophulariaceae. Kew Bulletin 64: 573-575.
- Sun M, Lin Q. (2008). Lectotypification of five scientific names in Rosaceae. Guihaia 28: 295-297. (In Chinese)
- Lin Q, Bei SQ, Li HL, Cao ZY, Sun Q, Sun M, Yang ZR. (2008). Lectotypification of twenty names of Chinese taxa in Angiospermae. Bulletin of Botanical Research 5: 534-539.
- Lin Q, Sun Q, Sun M, Bei SQ, Li HL. (2007). Lectotypification of twenty-eight names of Chinese taxa in Angiospermae. Acta Botanica Boreali-occidentalia Sinica, 27: 1247-1255.
- Sun M et al. (2018). Malvaceae, Malpighiaceae, Celastraceae. In: Li DZ, Chen ZD, Wnag H, Lu AM eds. Flora of Genera and Families of China Vascular Plants, Science Press, Beijing
- Sun M et al. (2018). Malvaceae, Malpighiaceae, Celastraceae. In: Li DZ, Chen ZD, Wnag H, Lu AM eds. Dictionary of Genera and Families of China Vascular Plants, Science Press, Beijing
- Sun M, Peng H. (2016). Elaeagnaceae. In: Liu B, Lin QW eds. Higher Plants of China in Color, Volume 5, Angiosperms: Euphorbiaceae — Cornaceae, Science Press, Beijing, China
- Sun M et al. (2015). In: Lin Q, Yang ZR eds. Types Specimens in China National Herbarium (PE), Volume 6, Angiospermae, Henan Science and Technology Press, Henan, China
- Sun M et al. (2015). In: Lin Q, Yang Y, Yang ZR eds. Types Specimens in China National Herbarium (PE), Volume 7, Angiospermae, Henan Science and Technology Press, Henan, China
- Sun M et al. (2015). In: Lin Q, Yang ZR, Lin Y eds. Types Specimens in China National Herbarium (PE), Volume 10, Angiospermae, Henan Science and Technology Press, Henan, China
- Sun M. (2014). Exploring deep phylogenetic incongruence of the COM clade in Rosidae: Phylogenomics approach. [PhD dissertation], Institute of Botany, the Chinese Academy of Sciences, Beijing, China
- Simpson M. (2012). Plant Systematics (2nd Edition) (Chen ZD, Lu AM, Sun M Trans.), Science Press, Beijing, China (Original publisher Academic Press)
- Sun M. (2009). Primary Taxonomic Study of Elaeagnus (Elaeagnaceae) in Mainland China. [Master thesis], Institute of Botany, the Chinese Academy of Sciences, Beijing, China
- Sun M. (2019). Build and use large-scale phylogenetic trees. IBCAS Youth Forum. (Presentation)
- Sun M. (2018). Building, Using, and Tending the Tree of Life. Chinese Genomics Meet-up. (Presentation)
- Sun M, Germain-Aubrey CC, Smith SA, Soltis PS, Chen ZD, Soltis DE. (2018). Exploring the phylogeny and diversification of rosids with a five-locus supermatrix. The 1st AsiaEvo Conference 2018 (Shenzhen, China). Abstract ID: S38. (Poster)
- Millar J, Collins M, Picardi S, Riemer K, Stucky B, Sun M, Ye H. (2018). A Carpentries Culture at the University of Florida. CarpentryCon 2018 (Dublin, Ireland), Abstract ID: 13. (Poster)
- Sun M, Whitten WM, Gitzendanner MA, Soltis DE, Soltis PS. (2017). Exploring the Applicability of Fluidigm Amplification and NGS Sequencing Using Samples From Multiple Families. The XIX International Botanical Congress 2017 (Shenzhen, China), Abstract ID: T2-12-19. (Poster)
- Sun M, Germain-Aubrey CC, Smith SA, Soltis PS, Chen ZD, Soltis DE. (2017). Exploring the phylogeny and diversification of rosids through a five-gene supermatrix approach. The XIX International Botanical Congress 2017 (Shenzhen, China), Abstract ID: T2-44-15. (Poster)
- Zhang T, Lichstein JW, Sun M. (2017). Functional traits and population dynamics of North American tree species in a phylogenetic and biogeographic context. Annual Meeting of Ecological Society of America (ESA), August 10, 2017 (Portland, USA). Abstract ID: COS135-5. (Poster)
- Lichstein J, Zhang T, Sun M, Mack M, Graves S, Whitten M, Jantzen J, Park J, Bohlman S, Gitzendanner M, Soltis D, Soltis P. (2017). Ecological traits and recent populationdynamics of eastern Asian-eastern North American disjunct tree species in North America. The XIX International Botanical Congress 2017 (Shenzhen, China), Abstract ID: T2-12-05. (Presentation)
- Sun M, Germain-Aubrey CC, Gitzendanner MA, Smith SA, Soltis PS, Chen ZD, Soltis DE. (2016). Wrestling with the Rosids I: progress and challenges for phylogenetics of a large, hyper-diverse angiosperm clade. Botany Conference 2016 (Savannah, Georgia), Abstract ID: 404. (Presentation)
- RSSIG - R Social Sciences Interest Group
- Phylogenetics Systematics ( BOT6935/ZOO6927 )
- Computational Tools for Research ( ZOO6927/ZOO4926 )
- the Origin of Species Reading Group ( BOT6935/ZOO6927 )
- Grant Writing Seminar ( ZOO6927/BOT6935 )
- Principles of Systematic Biology ( BOT6726/ZOO6927 )
- Niche Modelling ( ZOO6927 )
- Data & Analysis in Natural Sciences ( ZOO6927/ZOO4926||GLY6932/GLY4930 )
- Phylogenomics ( BOT6935/ZOO6927 )
- Practical Computational Biology ( ZOO4926/ZOO6927 )
- Taxonomy of Vascular Plants ( BOT5725C )
- Principles of Systematic Biology ( BOT6726/ZOO6927 )
- Worked in Mountain Lake Biological Station (Virginia State) with Jeremy Lichstein (Department of Biology, University of Florida) and other ecologists collecting DNA, metabolites, RNA materials from canopy trees and understory communities, soil samples, and other microbial materials for Dimensions US-China Project ( Collaborative Research: How historical constraints, local adaptation, and species interactions shape biodiversity across an ancient floristic disjunction Dimensions).
- Participated in Talladega National Forest (Alabama State) with Doug Soltis and Pam Soltis (Florida Museum of Natural History, University of Florida) and other ecologists for material collection and first hand data generation for Dimensions US-China Project.
- Worked in Ordway Biological Station (Florida State) with Mark Whitten, Eric Tripplets, and other ecologists for material collection and first hand data generation for Dimensions US-China Project.
- Trip to southern Yunnan along Myanmar border with Pam S. Soltis and Doug E. Soltis, collecting materials for Tree of life — China Project.
- Trip to Hainan tropical rain forest with Doug E. Soltis, collecting materials of Tree for life — China Project.
- 2006 ~ 2011
- Joined in the expedition team of national herbarium (PE) for collection many times, successively visited a series of biodiversity hotspots, such as Hubei, Chongqing, Guangxi, Sichuan, Xizang, etc.
- PSC Bioinformatics Workshop - Snakemake Workflows
Workflow management, version control via Git and Bitbucket, build a reproducible and adaptable pipeline using Snakemake - Wendell Pereira
- Vitual senimar: Modern Systematics and Illuminating Hidden Relationships of Plants - Tony Reznicek
Description: This will be a review and update of the impact on Michigan Flora (and plant classification generally) of recent work in molecular systematics. This meeting is being held jointly with Matthaei Botanical Gardens Herb Study Group.
- Co-organizer and member of the COVID-19 HPC Consortium
- Visiting Scholar at on Ecology and Evolutionary Biology (EEB) Dept., University of Michigan (UM) [March 2020 – August 2020; Ann Arbor, Michigan, USA]
- Co-organizer and co-translator of The Great Tree of Life
- Co-organizer of Research Bazaar event
- Instructor and Helper of a serial of “Software and Data Carpentry Workshops” events
- Instructor for Precollegiate Education and Training event
- co-translated TreeTender movie into Chinese languague for public education
- Digital outreach with 4th and 5th graders from Bunker Hill Elementary School in D.C
- Board member of UF Carpentries Club
- Organizer of several Tree of Life pop-up tent events (UF campus, FLMNH public museum, local brew-pub)
- Helper of Research Computing Training at UF Information Technology, Research Computing (University of Florida)
- Coordinated with the 100-year anniversary exhibit celebration of FLMNH
- Organizer of One Tree one Planet Encore
- Judge for Graduate Student Research Day
- Instructor and Helper in several “Software Carpentry Workshop” events
- Instructor for the 54th Florida Regional Junior Science, Engineering, and Humanities Symposium
- Volunteer Tree of Life Pop-Up Science! Florida Museum of Natural History
- Member of Botanical Society of America
- Oral Talk “Wrestling with the Rosids I: progress and challenges for phylogenetics of a large, hyper-diverse angiosperm clade.” in the annual Botany Conference (Savannah, Georgia)
- Table volunteer for iDigBio at BSA meeting
- Organizing volunteer, iDigBio workshop: Using Digitized Herbarium Data in Research: A Crash Course
2015 ~ 2010
- Training college students for taxonomic skills
- Speaker of the conference about dioecious plants in Angiosperm in Peking University
- Participate in the evaluation of “Red List of China Higher Plants” as a taxonomy expert
- Contributed to develop a “Molecular Data and Application Environment” website and a winner for the best of website name and domain name, “Darwin Tree” and “http://www.darwintree.cn/”, respectively
- Peer reviews for: South African Journal of Botany, Evolutionary Bioinformatics, Journal of Systematics and Evolution, International Journal of Tropical Biology and Conservation, Plant Physiology and Biochemistry, Taxon, Scientific Reports, Botany, PeerJ, Journal of Agriculture and Rural Development in the Tropics and Subtropics, and Phytotaxa.
- Certified Instructor of Software Carpentry (The Carpentries; taught classes of >400 students)
- Board member of UF Carpentries Club (a workshop series to teach informatics skills)
- Judge for Graduate Student Research Day at University of Florida
- Judge Graduate Student Research Grant proposals for American Society of Plant Taxonomists
- Educator Summer Science Institute Tree of Life for high school teacher
- Volunteer Tree of Life Pop-Up Science
- Member of Botanical Society of America
- Table volunteer for iDigBio events
- Taxonomic instructor for training college students
- Board member of “Red List of China Higher Plants” evaluation committee
Pamela S. Soltis (Postdoc advisor)
Florida Museum of Natural History
University of Florida
Gainesville, FL 32611, USA
Phone: +1 (352) 273-1964
Douglas E. Soltis (Postdoc advisor)
Department of Biology
University of Florida
Gainesville, FL 32611, USA
Phone: +1 (352) 273-1963
Wolf Eiserhardt (Postdoc advisor)
Department of Bioscience
Ny Munkegade 116
building 1535, 225
8000 Aarhus C, Denmark
Zhiduan Chen (PhD advisor)
State Key Laboratory of Systematic and Evolutionary Botany
Institute of Botany
Chinese Academy of Sciences
Phone: +86 010-62836434
Matthew A. Gitzendanner (Bioinformatics Mentor)
Scientist, Department of Biology
Collection Manager, Florida Museum of Natural History
Training Coordinator and Bioinformatics Specialist, UF Research Computing
Tel.: +1 (352) 273-1960
FAX: +1 (352) 846-2154
Last modification: 2020-05-15
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348511950.89/warc/CC-MAIN-20200606062649-20200606092649-00221.warc.gz
|
CC-MAIN-2020-24
| 18,656
| 156
|
https://discourse.vvvv.org/t/polygonal-button-for-touch-interface-from-set-of-coordinates/6286
|
code
|
I am currently working on a project that has a touch interface, where the user can zoom in on predefined regions on a map by touching them. I want to make neat buttons that cover exactly the area of the selected region, not a bunch of squares scattered all over them, this would be a lot of work, since a great number of regions must be mapped.
Thus, my problem is, is there a way to create a touchable region, somthing like a button, i.e., an irregular polygon, from a set of xy coordinates?
I searched very quickly through the new site and find nothing that can solve my problem. I know I can create a mesh over this set of coordinates and use it with Button (3d Mesh) module, but this would still be a lot of work. I don’t want to create a mesh out of every region on the map that is touchable.
My idea would be to use 2 ConvexHull (2d) nodes. One is fed with the x/y of your polygon, the other is fed with the same points + your touch point(s) (node:Cons (Spreads). If both hulls match (i.e. a = (Value) comparison of the convex hull vertices returns true in every slice) your point is inside the area, otherwise it’s not.
As the name suggests this would only work for convex polygons.
I ended up implementing the ray casting algorithm. It’s two subpatches, one that detects if two segments actually intersect each other, and also one that sums up all of the intersections between the casted ray (to the point) and all segments that form up a polygon.
I was curious, though, with the HitTest node. It might be useful for future projects. But I couldn’t use it. Still not using vvv45, I’m still in vvvv40beta24, but I downloaded the latest addon pack. Still it didn’t show up in the node list. How do I do it? It only works in vvvv45?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00368.warc.gz
|
CC-MAIN-2023-23
| 1,749
| 7
|
https://aitopics.org/mlt?cdid=jair%3A2E87E7D1&dimension=concept-tags
|
code
|
In this pap er w e describ e ho w to mo dify GSA T so that it can b e applied to non-clausal form ulas. The idea is to use a particular \score" function whic h giv es the n um b er of clauses of the CNF con v ersion of a form ula whic h are false under a giv en truth assignmen t. Its v alue is computed in linear time, without constructing the CNF con v ersion itself. The prop osed metho dology applies to most of the v arian ts of GSA T prop osed so far. 1. GSA T has b een sho wn to solv e man y \hard" problems m uc h more e cien tly than other traditional algorithms lik e, e.g., DP (Da vis & Putnam, 1960). Since GSA T applies only to clausal form ulas, using it to nd mo dels for ordinary prop ositional form ulas requires some previous clausal-form con v ersion.
We address the problem of propositional logic-based abduction, i.e., the problem of searching for a best explanation for a given propositional observation according to a given propositional knowledge base. We give a general algorithm, based on the notion of projection; then we study restrictions over the representations of the knowledge base and of the query, and find new polynomial classes of abduction problems.
Given an argumentation framework AF, we introduce a mapping function that constructs a disjunctive logic program P, such that the preferred extensions of AF correspond to the stable models of P, after intersecting each stable model with the relevant atoms. The given mapping function is of polynomial size w.r.t. AF. In particular, we identify that there is a direct relationship between the minimal models of a propositional formula and the preferred extensions of an argumentation framework by working on representing the defeated arguments. Then we show how to infer the preferred extensions of an argumentation framework by using UNSAT algorithms and disjunctive stable model solvers. The relevance of this result is that we define a direct relationship between one of the most satisfactory argumentation semantics and one of the most successful approach of non-monotonic reasoning i.e., logic programming with the stable model semantics.
Independence -- the study of what is relevant to a given problem of reasoning -- has received an increasing attention from the AI community. In this paper, we consider two basic forms of independence, namely, a syntactic one and a semantic one. We show features and drawbacks of them. In particular, while the syntactic form of independence is computationally easy to check, there are cases in which things that intuitively are not relevant are not recognized as such. We also consider the problem of forgetting, i.e., distilling from a knowledge base only the part that is relevant to the set of queries constructed from a subset of the alphabet. While such process is computationally hard, it allows for a simplification of subsequent reasoning, and can thus be viewed as a form of compilation: once the relevant part of a knowledge base has been extracted, all reasoning tasks to be performed can be simplified.
Data streams occur widely in various real world applications. The research on streaming data mainly focuses on the data management, query evaluation and optimization on these data, however the work on reasoning procedures for streaming knowledge bases on both the assertional and terminological levels is very limited. Typically reasoning services on large knowledge bases are very expensive, and need to be applied continuously when the data is received as a stream. Hence new techniques for optimizing this continuous process is needed for developing efficient reasoners on streaming data. In this paper, we survey the related research on reasoning on expressive logics that can be applied to this setting, and point to further research directions in this area.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147054.34/warc/CC-MAIN-20200228043124-20200228073124-00289.warc.gz
|
CC-MAIN-2020-10
| 3,810
| 5
|
https://armaell-library.net/blog/article/2017/01/mushoku-tensei-14-everyday-chapter-illustrations
|
code
|
Hi all !
I've been way too lazy recently, and only today I'm making it. Dang, you can bash me. So like usual, I want to thank akarai115 which searched and found where to correctly place all the illustrations. (because I'm too lazy to do it).
We also need to thank https://kotebrasil.wordpress.com/ for the actual illustrations files.
There is a some really good ones in it, I let you discover them ;)
Also a slight fix on volume 4, Chapter 7 Part 4 was mislabelled, thank to Edwin for finding this.
Wasn't it vol 13 illustrations??
Illustrations from LN13, matches the content of the WN14
Volume 4 is now missing the first illustration on the PDF (after the cover) please fix. Thanks for the update.
Yeah... No idea why but Calibre keep removing it. I found a way to keep it, but it then remove the cover... So I had to choose between keeping the cover or the first illustration >< I hope to find a fix.
Since I have been learning about Calibre conversion recently, I think your issue is that you're using "--remove-first-image", which would usually affect the cover but you probably have the cover well set so it removes the first illustration instead. Not sure how you're converting them but either remove that parameter if you're using the command line or look for it in the options in the GUI conversion menu.
Also, more info here: https://manual.calibre-ebook.com/generated/en/ebook-convert.html
^ Noticed the same with the PDF for volume 13.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00230.warc.gz
|
CC-MAIN-2023-14
| 1,447
| 12
|
https://community.sinefa.com/hc/en-us/articles/217960037
|
code
|
Invite a User
To invite others into your Sinefa Account, follow the steps outlined below:
- Go to Settings > System Users.
- Click on Invite User to bring up the New User window.
- Enter the user's email address and select permission level
Permission Level None Read Only Full Access Administrator View Reports - Yes Yes Yes Configuration Changes - - Yes Yes Invite Users - - Yes Yes User Management - - - Yes Billing Contact
A user with any permission level can be set to Billing Contact,
it's limited to one per account
Note: There must be one (and only one) Billing Contact per account. The Billing Contact is the person who is charged by Sinefa for the subscription service and is the only user who can see the Billing section.
- To limit the Probes that a User has access to, enter the Probe(s) or Tag(s) which the user will be limited to. All other Probes will not be visible to this user.
- When you're done filling out these fields, click on the 'Invite' button and an email will be sent to the user with instructions to access the Account.
Please invite email@example.com by clicking on System Users --> Invite Support button.
You can then change the permissions to "Read Only" or "Full Control" depending on the troubleshooting scenario.
Changing the Billing Contact
The Billing Contact by default is set to the account creator and appears in Settings > System Users table as Administrator (Billing Contact).
ONLY the user listed as the Billing Contact will be able to see the Billing section.
To change the Billing Contact, the 'Outgoing Billing Contact' should:
- Go into Settings > Billing
- Select the Billing Details tab
- Under Assign Billing Contact there is a drop-down menu, select the User you want to set as the 'Incoming Billing Contact' and then select Assign.
Note: Only users who have been invited into the account will appear on the drop down list. If the user does not appear in the list, please invite them first
The 'Incoming Billing Contact' will receive an e-mail which contains a link that will take them directly to their User Profile to accept the change. The Billing Contact setting will not change until the Incoming Billing Contact accepts the change. Once accepted, the 'Outgoing Billing Contact' will receive an e-mail notification of the change. They can either click on the link within the e-mail or go straight to Settings > Profile to locate the billing contact request notification at the bottom to accept as per below
Please reach out to firstname.lastname@example.org or contact our support team via chat to let us know of the Billing Contact change which will help us update the new billing contact on our internal billing system.
Once this has been accepted, the original Billing Contact will receive an confirmation e-mail.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00329.warc.gz
|
CC-MAIN-2022-40
| 2,772
| 24
|
http://www.whatsmypass.com/category/linux
|
code
|
A bug was found that allows you to bypass the lockscreen on the latest version of Ubuntu. Seems all you need to do is hold down the Enter key until the screen freezes and the lock screen crashes. After that the computer is fully unlocked. It has been patched so make sure you upgrade.
It can be extremely frustrating when you’ve forgotten the pattern you use to lock your smartphone, and even more so if someone has managed to prank you by changing it. Luckily, there’s an easy fix if you know the username and password for the Gmail account you used to set up the lock.
If you’ve somehow forgotten your Gmail info, it’s a bit trickier to bypass the lock screen. As a last resort, there’s always resetting your phone to factory settings, but no one wants that hassle. So, here are a couple of ways to avoid starting from scratch, if you can.
The WiFi Protected Setup (WPS) protocol is vulnerable to a brute force attack that allows an attacker to recover an access point’s WPS pin, and subsequently the WPA/WPA2 passphrase, in just a matter of hours, using the open source tool called Reaver. Think your 32 character alpha-numeric password is uncrackable? If your wireless router is using WPS then your router may be spit back your password in plain-text to the attacker in less than 10 hrs. WPS allows users to enter an 8 digit PIN to connect to a secured network without having to enter a passphrase. When a user supplies the correct PIN the access point essentially gives the user the WPA/WPA2 PSK that is needed to connect to the network. Reaver will determine an access point’s PIN and then extract the PSK and give it to the attacker. When we tested Reaver in our labs we were able to recovery the WPA password in 1.5hrs and the longest run was 7.5hrs
Programmable embedded devices have the capability of being detected as a HID device , just like a keyboard or mouse. So if you have physical access and a minute alone you can compromise a system with something the size of your thumb. The possibilities are endless, HTTP/FTP download, injecting binaries into debug or Powershell etc.. Also this device is cross platform which means Windows,Linux,UNIX and Apple are all vulnerable.
Here’s an example project we made for a Windows7 box that adds a new Admin user to the system and hides that user from the logon screen. the whole process takes about 16 seconds , with most of the time taken by the device being detected as a keyboard and the driver installed. The device costs about $20 and can be found here
MAPDAV is designed to use what is known about a user or users (ex, username, first name, middle name, last name, etc) on a unix/linux system from a /etc/passwd file and tries to come up with probable combinations that could be the user’s password. An administrator could run the output through a cracker and see if their user’s passwords are anything easy to guess.
For example, if we had a passwd file entery such as:
We could have MAPDAV derrive some possible passwords, such as chrisa, chrisanderson, andersonchris, canderson, ChrisAnderson, Anderson Chris, CHRIS, plus any other combinations you entered. It has quite a few other features you can use to modify the output to have arbitrary characters, be in reverse, and other useful things.
Out of a sample of 30192 users, MAPDAV 1.0p8 cracked 4.7% of the passwords on the default settings, 1.2% of which were NOT the same user/pass. This combind with a good conventional wordlist could give good crack results.
More info: http://mapdav.sourceforge.net
Darth Null had a nice writeup on how to make crypt(3) rainbow tables. After being told that the salt made it impossible to generate Rainbow Tables, unless you went through the trouble to create 4096 different tables (one for each salt) the reason cited was the presence of the two-character salt at the beginning of the hash. He went out and devised a solution couple of nights later, it was able to actually read, write, and process crypt(3) hashes in their native form (as opposed to a flat hexadecimal dump of the hash). He wanted to submit it for schmoocon but didnt get accepted , so rather than sit on the information, he decided to release it on his blog.
- Instead of generating 4096 tables of 1-8 character passwords, just create 1 table of 3-10 character passwords, and use the 1st two characters of the plaintext passwords as the salt. (That part will make more sense if you read the paper.)
- It’s still kind of slow: 9x slower than LM hashes, for example. But CPUs are much faster than they were in 2003, when people first started building tables for LM hashes.
- It also takes a lot of storage. But storage, likewise, is much cheaper than it was seven years ago.
The whitepaper can be found here: http://bit.ly/ij8hQU
Lifehacker.com had an article the other day that pretty much held your hand on steps to crack a WEP password using BackTrack3. Check it out ::HERE::
A good password has the problem of being difficult to remember. And sometimes you might need to get in to a system where the root password is long forgotten (or left with the system administrator before you).
Luckily there are ways of getting access to systems without having the password. This is of course in a sense also a security risk. That’s why you should always be aware that having unattended physical access to a computer system means the same as having root access to the operating system. Unless the information on a system is encrypted, it’s only as save as the room it’s in.
The method to use to reset the password if you lost the root (or only) password depends on the configuration of your system. But it mostly comes down to two separate tasks:
– get write access to the root partition
– change the password/circumvent control
Here are some things you can try from easy to more complicated. (more…)
An unknown organization is systematically checking for open SIP ports and then trying common extension usernames and passwords. If they find weak passwords, they are then into the PBX and can make thousands of calls in a matter of minutes. Protect yourself. Some were Asterisk and some were SIP-based VoIP PBX. Itappears that the hack has nothing to do with any sort of Asterisk vulnerability, but with insecure passwords set for extensions.
I had a chance to review the Keycarbon USB Home Mini this week. I’ve been wanting to try one of these to see how they would compare to a PS/2 keyboard logger, PS/2 is still pretty popular as far as cheaper keyboards but the shift in technology is going more towards USB keyboards. I was pretty impressed by the quality of the keylogger and its simple installation.
Who would need a device like this?
- Business owners needing to monitor employees
- Parents needing to monitor children
- People who might need backups of things they type (writers etc)
- Private investigators, law enforcement, hackers, James Bond 🙂
Why would someone want a hardware keylogger as opposed to a software based one? Well this question has it’s pros and cons:
The pros are:
- It’s dead simple to install , just unplug the keyboard,plug this device in , and plug the keyboard into the device ,that’s it!
- No need for root/admin level permissions to install
- It can be installed on any system that has a USB port (Windows,Mac,Linux etc)
- Since it’s hardware-based it wont be detected by antivirus/malware programs ever
- It picks up EVERYTHING typed, even bios password passwords and log-ons
The cons are:
- Since it doesn’t interact with the operating system it can’t get the name of windows where the text was typed so it makes it a chore to scan the logs for the juicy information
- Easy to prevent logging by just removing the logger form the computer (which most people won’t be aware of anyhow, who actually crawls behind their computer everyday?)
- Recovery of logs might be more difficult because they are stored physically on the device and not sent to a remote location. But if you were able to install it in the first place , then recovering it shouldn’t that much harder.
- If the person has a PS/2 keyboard you can’t use an adapter because the device needs power from the USB port to work
Recovering the logs from the device can be done on any computer even though they offer the software to recover the logs faster, it’s not needed which makes this device a good tool to have in your arsenal. To recover the logs alls you you need to do is open any text editor (notepad etc…) and type in the password (default password is phxlog) and the device goes into menu mode, where you have a few options to choose
you have open so it’s best to open notepad or wordpad or any *nix/MAC equivalent before typing this. This menu will give you various options for the device ,which are:
- Partial/Full Log download
- Erase logs (quick or thorough)
- Setting the default password (alphanumeric only,under 17 chars)
- Firmware upgrade
- Speed (that the logs are typed)
Once you choose read the logs it starts auto typing the logs onto whatever window is open has the main focus (which is why you need to open a text editor). If you don’t like to wait for it to auto-type (you might have days of saved logs) you can get the software to download it in one swoop. The only problem with the software that as of now it’s only compatible with windows.
Detection of the Device:
Because the device doesnt install into the operating system its pretty much insvisible to the normal user. Only a trained computer expert would notice the device it because the only sign it’s there is that it is seen as a USB hub by the OS. It shows up as a “generic 4 port hub Vid_0451&Pid_2046” Vendor id of 0451 and a product id of 2046, which comes up as a generic Texas instruments device which wont raise many eyebrows. Because it’s a USB 1.1 hub it is possible that it may be discovered if someone plugs a USB 2.0 keyboard inline with it. (They might get a warning message telling them that their device can perform at a higher speed if they use a different port.) But the chances are slim of someone needing to replace their keyboard.
All in all this device is a stable tool to use, it logged with no problems at all with every keyboard/OS i used with it. Although the price is a little high for most people, it’s well priceless for businesses who need to keep an eye on employees, or a parent who needs to monitor their children’s internet activity. I want to thank Keycarbon for giving me the opportunity to review and test this device. Check out their site for other devices they offer that I didn’t get to review , but are another great alternative to stealth hardware logging.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189031.88/warc/CC-MAIN-20170322212949-00478-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 10,679
| 53
|
https://www.todaytix.com/seattle/category/fifth-avenue-theatre
|
code
|
Check out the shows playing at The 5th Avenue Theatre in Seattle.
The 5th Avenue Theatre is a major musical theatre company located in Seattle, Washington. Founded in 1926 as a movie house and vaudeville theatre, it operated as such until 1978, when it went out of business. It was revived and renovated in 1980 as a home for Broadway touring productions, beginning with the national tour of Annie. Now, 5th Avenue Theatre is also known for presenting the world premieres of future Broadway hit musicals like Hairspray, Jekyll & Hyde, and Aladdin.
Apple, the Apple logo, iPhone, and iPad are trademarks of Apple Inc., registered in the U.S. and other countries and regions. App Store is a service mark of Apple Inc. Google Play and the Google Play logo are trademarks of Google LLC.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00865.warc.gz
|
CC-MAIN-2023-40
| 782
| 3
|
https://www.checkwebsite.com/resources/static-site-generators-as-a-wordPress-alternative/
|
code
|
WordPress, while being a blogging platform at its core, has become a standard tool for building a wide variety of websites over the years. People are using it for just about everything you can imagine these days; business sites, online portfolio for a photographer, online stores, real estate database, online community, and so on. Many third-party vendors are selling all kinds of premium themes for all sorts of niches. Most often, premium themes include a drag & drop builder, which allows anyone to create a professional looking layouts without manually writing HTML and CSS code.
WordPress has a Long History
WordPress has played a significant role in making website creation far more accessible to the masses. It’s easy to get started with the base WordPress installation. Many shared hosting companies offer an automated tool that allows users to install a WordPress site with just a few clicks. Many interesting and useful websites emerged, and more people started selling a variety of products, both physical and digital in the past ten years, partly because WordPress offered an easy-to-use solution for non-technical people.
Engineering is often about trade-offs and WordPress is not without exception. Although WordPress revolutionalized online publishing in many ways, the trade-offs also became more apparent as people tried to use WordPress for everything, even for the type of sites that would be better off without WordPress on the backend. WordPress is a database-driven system, so it naturally takes longer to load than a lean, static HTML site due to database queries WordPress needs to make every time someone accesses it.
More and more sites became slow and troublesome when they didn’t need to be. Users added plug-ins for the type of features they could manually add with relative ease without resorting to plug-ins. Themes did the same thing, resulting in slow rendering speed. It is much like stuffing a light-weight small car with hundred kilos of solid rocks and a large-size trailer in the back. A reasonably quick car became a cumbersome and slow car.
This trend is not good, because Website load time matters. We should carefully consider various trade-offs when we build a site for business. It’s worth considering some alternatives to WordPress if they offer most of what you need for your business site without adding extra weight.
Static Site Generators to the Rescue
Fortunately, there are many alternatives to WordPress if you need a leaner website. One of the most popular options is a static site generator.
Static site generators are often open source and driven from the command-line. They can be quick to install and run, especially for those technically inclined. It doesn’t depend on admin privileges, databases, runtimes, and other technical dependencies. It can run just about anywhere; A generated site is just a bundle of static HTML files and resource files (JPEG, CSS, etc.). You can deploy it on Amazon S3, GitHub Pages, Dropbox or any web host out there. You do not need PHP and MySQL.
The lack of PHP and MySQL does not mean lack of database-like features. In fact, most site generators are blog-aware; they can host a blog, assign tags, and slugs. Their template system is flexible enough to accommodate any URL structure, content types and metadata.
Adding new static pages and blog posts is easy. Save a Markdown file (a plain text file with .md extension, written in Markdown syntax) in a right directory inside a site structure, and your site generator will convert it to an HTML page for you.
A static website can handle a huge number of people accessing the website at the same time, compared to WordPress or any other database driven website.
Here are a couple of static site generators to start off with:
Hugo is a lean and efficient static site generator written in Go. It is open source and completely free. Its template system is relatively easy to understand if you are already familiar with HTML and CSS. If not, you can always use one of their pre-designed themes. It can import a WordPress blog, so migration is smooth if you run a WordPress blog and want to migrate to a faster-loading website.
Jekyll is a popular choice written in Ruby and many well-known bloggers and developers use it for their website. It has excellent support for importing existing contents from a variety of platforms including WordPress, Joomla, Tumblr and many others. Jekyll is also what powers the github.io websites that you can use from your github account.
What about clients?
Not everyone is comfortable running a Terminal command and manually upload a generated site via FTP. Fortunately, Forestry.io is available for both Hugo and Jekyll sites. It can parse your Hugo or Jekyll project and automatically build a CMS on top of it. It’s a hosted service, so you still don’t need to worry about running a complex dynamic site system.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823817.62/warc/CC-MAIN-20181212091014-20181212112514-00099.warc.gz
|
CC-MAIN-2018-51
| 4,897
| 17
|
https://www.dragonflydb.io/faq/gamemaker-get-variable-from-another-object
|
code
|
In GameMaker, you can access variables from other instances (objects) using the dot operator or with specific functions like
instance_find. Here’s how you do it:
If you know the instance ID of the object from which you want to get a variable, you can use the dot operator to access its variables. The instance ID is often obtained when you create an object using
instance_create_depth. For example:
In this code,
obj_Enemy has a variable named
health, and we are accessing it using the instance ID stored in
If you don’t have the instance ID but know that there is only one instance of the object in the room, you can use
instance_find to get the instance ID:
This finds the first instance of
obj_Enemy in the room.
When there are multiple instances of an object and you want any one of them, you could use the object index directly:
This will get the
health variable from the first instance of
obj_Enemy that was created.
You can also use the
with statement to perform operations on all instances of an object. If you just want to retrieve a value once, you should assign it to a variable outside of the
instance_exists before trying to access a variable from another instance to avoid runtime errors.
These are some of the ways you can get a variable from another object in GameMaker. Choose the method that best fits your situation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474594.56/warc/CC-MAIN-20240225071740-20240225101740-00008.warc.gz
|
CC-MAIN-2024-10
| 1,339
| 19
|
http://surfo.xyz/archives/2331
|
code
|
Novel–Hellbound With You–Hellbound With You
Hellbound With You
Chapter 278 Tug-of-war horrible consist
“And that means you really are likely to defy me now, Alex?” Zeke’s eyeballs begun to melt off red-colored. Abi acquired seen this arena just before. His view searched exactly like Xavier’s, although Zeke’s ended up richer than blood vessels. He was definitely far more robust than Xavier. Abi could sense his toughness emanating from him and it manufactured her s.h.i.+ver a little bit. Her entire body reacted instinctively towards the nearly hazard, though she knew she was safe and sound – properly, as safe as one can be in the actual existence of vampires who weren’t seeking to destroy her.
“So you’re not supplying her if you ask me, huh? That’s unusual of yourself, Zeke. You typically used to produce all the things I wanted.” Alex smirk curved on his wonderful face, but the feeling still didn’t get to his eye.
Nevertheless, prior to anything could abandon her mouth area, Zeke drawn her away from Alex and he packaged his arms around her shoulder muscles, possessively, like what just Alex do to her.
“Let me know, why do you insist on possessing her? Did you fall in love with her to begin with appearance or something?”
Nervous, Abi obtained her courage to talk and split this tighten atmosphere.
“Certainly, I’m not giving this particular one for you so rid yourself of her.” Zeke said firmly.
Abi’s eye widened in impact as to what Zeke just explained. She considered him but Zeke’s vision were actually concentrated on Alex, deceased serious. She was momentarily bewildered however she believed that Zeke should be up to his outdated ‘tricks’ again.
I am just so amazed discovering our get ranked at the moment. I’m like, ‘what the h.e.l.l does my subscribers do?’
Chapter 278 Tug-of-conflict
“Alex, you denied her, try to remember?”
“Found you,” Alex whispered from behind. His sharp inhalation handled her ear making her neural system instantly jolt alert. He sounded so provocative at that moment that Abi’s knees wobbled slightly.
“Gal, you will simply expire should you choose him,” Alex reported, tugging Abi’s gaze back in him and Zeke suddenly laughed out noisy. A menacing, taunting laugh which sent s.h.i.+vers down Abi’s backbone.
“Where do you reckon you take her?” Zeke stepped out, not allowing go of Abi. His unfathomable gaze secured on him.
“And why not?”
Even though way he handled her created her tonsils burn off, Abi was not disheartened as well as a imagined stumbled on her head. Possibly she ought to go with Zeke’s strategy? Can you imagine if going after him wouldn’t operate on him anymore? Could this way be much better? “Imagine if I would like to stay with Zeke?” she boldly required him.
“Appear, let’s check out my space,” he explained to her when he grabbed her wrist, intending to have her out. Nonetheless, Abi’s other arm was grabbed by Zeke, doing Alex stop. It looked similar to a tug-of-warfare was about to start out between these two men, with Abi since the prize.
Section 278 Tug-of-combat
“Isn’t what you need clear enough in your case? She’s one I selected to get along with me today,” he replied, emotionless. He said those terms as though he was stating an undeniable fact which could not be debated to protect against.
Abi’s eye widened in impact as to what Zeke just mentioned. She looked over him but Zeke’s eyeballs have been concentrated on Alex, deceased severe. She was momentarily puzzled but she believed that Zeke needs to be as much as his older ‘tricks’ just as before.
“Because she’ll be with me tonight.”
Her pulse started to thud loudly in the torso. Performed Zeke really should work like this? Imagine if these finished up combating? It will not do them a bit of good if these two suddenly grew to be opponents with this critical time.
“Where by do you reckon you are taking her?” Zeke stepped out, not allowing go of Abi. His unfathomable gaze locked on him.
“Just where do you think you take her?” Zeke stepped out, not making go of Abi. His unfathomable gaze shut on him.
Zeke’s eyeballs sharpened. Alex was still donning his authoritative smirk. He sounded like he was difficult Zeke along with the natural environment began to switch hefty.
I still fight to think. *sweating droplets*
“Alex, you refused her, recall?”
Worried, Abi obtained her bravery to talk and split this tense setting.
“Inform me, why is it that you insist on having her? Would you fall in love with her initially eyesight or something?”
However, well before anything could abandon her lips, Zeke drawn her clear of Alex in which he packaged his arms around her shoulder area, possessively, like what just Alex does to her.
Novel–Hellbound With You–Hellbound With You
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499888.62/warc/CC-MAIN-20230131154832-20230131184832-00689.warc.gz
|
CC-MAIN-2023-06
| 4,865
| 33
|
http://stackoverflow.com/questions/20074327/what-is-the-purpose-of-a-dijit-layoutcontainer
|
code
|
I would definitely start by reading the docs on both
dijit/layout/LayoutContainer and a popular subclass,
dijit/layout/BorderContainer, and the most commonly-used widget inside of
dijit/layout/ContentPane. From the docs:
This widget is a container partitioned into up to five regions: left (or leading), right (or trailing), top, and bottom with a mandatory center to fill in any remaining space.
LayoutContainer to lay out related widgets. There is a great section on usage in the
ContentPane docs, including the following:
You can use content panes by themselves, but usually you will place content panes inside of a layout container. For example, in a tabbed layout, content pane tags surround each tab of information.
One great use of
LayoutContainers that I take advantage of is the automatic startup and resizing of widgets inside said containers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051002346.10/warc/CC-MAIN-20160524005002-00175-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 853
| 10
|
https://blogs.ubc.ca/dependablesystemslab/2022/04/08/etainter-detecting-gas-related-vulnerabilities-in-smart-contracts/
|
code
|
Asem Ghaleb, Julia Rubin, and Karthik Pattabiraman, ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2022. (Acceptance Rate: 24.5%). [ PDF | Talk ] (Code) Artifacts Available and Reproducible Badge (link)
Abstract: The execution of smart contracts on the Ethereum blockchain consumes gas paid for by users submitting contracts’ invocation requests. A contract execution proceeds as long as the users dedicate enough gas, within the limit set by Ethereum. If insufficient gas is provided, the contract execution halts and changes made during execution get reverted. Unfortunately, contracts may contain code patterns that increase execution cost, causing the contracts to run out of gas. These patterns can be manipulated by malicious attackers to induce unwanted behavior in the targeted victim contracts, e.g., Denial-of-Service (DoS) attacks. We call these gas-related vulnerabilities. We propose eTainter, a static analyzer for detecting gas-related vulnerabilities based on taint tracking in the bytecode of smart contracts. We evaluate eTainter by comparing it with the prior work, MadMax, on a dataset of annotated contracts. The results show that eTainter outperforms MadMax in both precision and recall, and that eTainter has a precision of 90% based on manual inspection. We also use eTainter to perform large-scale analysis of 60,612 real-world contracts on the Ethereum blockchain. We find that gas-related vulnerabilities exist in 2,763 of these contracts, and that eTainter analyzes a contract in eight seconds, on average.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948223038.94/warc/CC-MAIN-20240305060427-20240305090427-00621.warc.gz
|
CC-MAIN-2024-10
| 1,567
| 2
|
https://www.straitstimes.com/asia/se-asia/5m-long-python-that-ate-pet-cat-in-thailand-forced-to-regurgitate-it
|
code
|
A reticulated python that swallowed a pet cat in Thailand was forced to regurgitate the animal after its owner called the authorities.
The cat's owner, Ms Saowarak Charoen, told Thai news site Khaosodenglish.com in a report on Thursday (Sept 7) that the 5m-long python entered her house in Thailand's Pathom Thani province on Wednesday.
It ate her cat Bobo before hiding under the sink. Ms Saowarak called the police and wildlife control officers.
Footage of the capture showed the men trying to get the snake to regurgitate the cat, which it eventually did.
It was shown spitting the dead ginger cat out on the floor.
Ms Saowarak then buried her pet cat, and the python was returned to the wild.
As it was reportedly an annual visitor to the neighbourhood, the authorities urged nearby residents to check around their homes and keep doors and windows closed at night, The Nation reported.
Pythons are common in Thailand. In May last year, a Thai man was bitten in his private parts by a python while he was using a toilet at home.
Reticulated pythons can be found in South-east Asian countries including Thailand, Indonesia, Malaysia and Singapore.
Specimens that are between 5m and 7m long are considered large, and the snakes can grow to a length of more than 10m, according to ecology website ecologyasia.com.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655899209.48/warc/CC-MAIN-20200709065456-20200709095456-00524.warc.gz
|
CC-MAIN-2020-29
| 1,313
| 10
|
http://terabytelibrarian.com/node/56
|
code
|
CURATE: The Game of the Digital Curation Lifecycle
What better way to make digital curation less intimidating than teaching us something about it in a board game! "The Game of the Digital Curation Lifecycle", as presented at the Digital Strategies for Heritage Conference 2011, is supposed to allow participants to distance themselves from their everyday issues by "providing hypothetical digital project scenarios." This encouraged the participants to share without feeling as though they've done something wrong.
You win the game when you advance to the 'Manage' phase (not when you purchase both Boardwalk and Park Place). How cool!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890823.81/warc/CC-MAIN-20180121175418-20180121195418-00529.warc.gz
|
CC-MAIN-2018-05
| 635
| 3
|
https://www.tobaccoreviews.com/community/pipe-brands-and-makers/brazilian-pipe-makers/
|
code
|
Brazilian pipe makers
I would like to introduce you guys the best Brazilians pipe makers i know. I don´t have pipes from all of them yet but for sure i´ll reach this point in the future.
Gustavo Cunha. His job is amazing and well known outside Brazil, i do believe he was the first one to break the Brazilian bubble and start selling abroad. - https://www.instagram.com/martelocunha - https://www.martelopipes.com -
Emiliano pipes. Well known in Brazil, his work is considered one of the best here, such beautiful pieces - https://www.instagram.com/emilianopipes/ - www.facebook.com/emilianopipes/ -
Ludovico Pipes - Full of personality, his work is amazing and focused in free hand art. For sure he is my favorite and i consider him more than just a pipe maker. - https://www.instagram.com/ludovicopipe/ - https://www.ludovicopipe.com -
Rayatty - Another name that has to be mentioned is André Rayatty. I´m big fan of him and the pipe i have from him is my dedicated virginia pipe. - https://www.instagram.com/rayatty.pipe/ -
Bazzanella Family - 2 brothers and 2 brands, Cachimbos Bazzanelli and M.B. Cachimbos. Both of them runs their family business separated. Most of my pipes come from one or another. https://www.instagram.com/cachimbos_bazzanelli/ - https://www.instagram.com/mb.cachimbos/
I have not covered all artisans we have here but for sure those are the ones i like most and keep following their work.
I must look into some of those! As well as some of ypur recomended Brazilian tobacco- whole new world for me!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817200.22/warc/CC-MAIN-20240418061950-20240418091950-00867.warc.gz
|
CC-MAIN-2024-18
| 1,530
| 9
|
http://www.edugeek.net/forums/hardware/print-129140-new-pc-500-budget-what-shall-i-do.html
|
code
|
New PC £500 Budget - What shall I do?!
I'm going to be getting myself a new PC in the new year, however I've never really brought myself a decent PC before, always had laptops. What would be best to do with my budget, build my own or buy a pre-built PC? I'm not after a stupid fast machine. I'd like an i5, decent amount of RAM and a relatively good graphics card though, oh it'll need a wireless card, for now...
As I said never brought a PC like this before, any advice on what parts to buy/websites to use, PC's to buy would be great! I wouldn't mind doing some light gaming on it i.e. DayZ (always wanted to play it), other than that it'll be used for Media(Music/films), Word processing and browsing!
Monitor(s) and peripherals need to be brought within the £500 too.
Any help/advice will be great!
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447555354.63/warc/CC-MAIN-20141224185915-00011-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 805
| 5
|
http://stackoverflow.com/users/507738/mc-emperor
|
code
|
MC Emperor top 10% overall
For as long as I can remember, I have a predilection for software developing. I mainly focus on Java and Android, but I have also knowlegde of PHP and CSS.
18 Can I make an abstract enum in Java? Nov 30 '13
10 Why not used position:fixed for a “sticky” footer? Jun 14 '12
9 What is a private key in Android? May 7 '13
8 Besides seeing, is there any way to know which font is currently applied on an HTML element Sep 6 '11
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824337.54/warc/CC-MAIN-20160723071024-00285-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 452
| 6
|
https://coko.foundation/decision-making-strategy-coko/
|
code
|
At Coko we’re a small but very productive team. On the technical side, there are a lot of decisions to make that can affect everyone. These range from the small, such as what styles to apply to a radio button, to the large, more along the lines of “which software do we use to manage components?”
As much as possible, we aim to keep these discussions informal and pragmatic. This lessens the overhead on the team (no lengthy meetings!) and also makes the process a whole lot more flexible and enjoyable. We don’t make long proposals often and we keep the decision process discussion based. As Charlie Ablett (the lead developer for INK) has said, “software is a conversation.” That’s very true.
For example, we recently made the decision to start breaking pubsweet-components (e.g. a Journal Dashboard) down into smaller components. Alf Eaton brought up the issue of how to manage these smaller components so we could view them as a library in a kind of ‘live style guide.’ It was a good, and timely, question. He had already tried out a few options, namely Storybook and Styleguidist, and so we put this up for general discussion. It was important to do so since we want to establish conventions, a common approach, for developing all parts of our code and so the question needed to be floated to the team. Two days later we met for a quick 25-minute meeting, in which we covered four questions (three ear marked for later) and made a decision on the style guide. Short and sweet. In part, that was because Alf had already tried out the main contenders and had clear arguments as to why Styleguidist would work well. We all gave the thumbs up and the decision was made.
We also try out things occasionally and are not afraid of ‘spikes’ (a fixed time period experiment/trial of approaches). When we went down the path of working out user interfaces for track changes in Editoria, Christos Kokosias volunteered to prototype several approaches. We then blogged about this for input and demonstrated working code for three different approaches to folks at the University of California Press. Feedback came in and we had a clear winner. We’ve also tried spikes on other items, for example, we tried some prototype interfaces for xpub using material-ui. It was an interesting experiment but ultimately the team found material-ui to be too constraining, we prefer to have maximum control over how our user interfaces look and work. So while it was interesting, in the end it validated the approach we’ve already taken.
As you can see, these processes help us establish conventions for how we work and by keeping the decision making process lightweight and discussion-based we can quickly work out if the current ways still make sense or if we want to go in a different direction without getting lost in endless process.
Some decisions, however, warrant a little more consideration. This is especially true now that we are starting to work with a variety of publishers that are building on top of PubSweet, Editoria, xpub, etc. It’s been interesting since it represents a slight bend in the road for us. Until recently, we’ve been a small team with informal but tight communication. However, Coko is now quickly turning into a community and our decisions affect more people and consequently more people need to be involved in those decisions. Community, after all, is not a one-way street “from us to you” but a living, functioning organism. We’re all in it together.
To respect that growth, we’re developing processes that work for a larger group. Our first concerted attempt was the PubSweet 2.0 meeting in San Francisco a few weeks ago. We invited community members to be part of the process to decide what made it into the 2.0 release. To get there, Jure Triglav, PubSweet’s lead developer, wrote an overview document of PubSweet 1.0 that was made open for discussion to anyone interested in what might go into PubSweet 2.0. Being the closest person to the core code, he had some ideas of what this might look like and added these to the document, which was distributed to community partners 10 days before the event and published to the PubSweet repo for anyone to read and comment on. The document and resulting comments became the focus of the two-day meeting. After much discussion, we came out with unanimous community agreement not only about what should go into PubSweet 2.0, but what changes needed to be made to the road map to make it happen. While it sounds almost too kumbayah to be true, the result was multiple publishers working together and agreeing on a common technology that they will build together!
This initial community decision making meeting worked extremely well. Of course, we’ll need to develop other processes as we go along and we’ll have to try not to get too far ahead of ourselves. Ideally, we’ll develop new ways of managing these kinds of decisions from the ground up — even the process of making processes should be lightweight 🙂
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865250.0/warc/CC-MAIN-20180623210406-20180623230406-00196.warc.gz
|
CC-MAIN-2018-26
| 5,014
| 8
|
https://thedailyattitudeemail.com/2021/04/08/daily-attitude-email-04-08-21/
|
code
|
This What if is a little harder to word….but it’s some version of….What if I’m not meant to be in control of this?
What if the world isn’t mine to manage?
What if that person isn’t mine to change?
What if I don’t need to be in control?
What if I don’t need to worry about this?
What if I should focus on what I can control?
Make it a great day.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00352.warc.gz
|
CC-MAIN-2023-14
| 360
| 7
|