url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.npmtrends.com/@dynatrace/groundhog
|
code
|
Welcome to Groundhog - CSS components for Dynatrace
What is Groundhog
This is Groundhog, a CSS library for all Dynatrace web entities. Think Bootstrap, but pretty, modern and fast.
We created Groundhog to unify all Dynatrace web entities, regardless of the underlying technology. Use it to fuel your Blogs, custom dashboards, Wikis, etc. If you want to see what's possible with Groundhog, check out our showcase. We used some, if not all Groundhog components to make them look like being one and the same.
Groundhog is designed after the contents from our asset library, and features up to date implementations of the components there. Additionally, we created extra modules that come in handy when working with websites and web applications: Layouts, lightboxes, etc.
If you work in one of our GWT web applications like Ruxit or AppMon, please use the Dynatrace widget library instead. This project is just there to be a guideline or a precursor to widgets that find their way into GWT.
How to get Groundhog
You have multiple options to get Groundhog:
Use via CDN
We uploaded everything to our Dynatrace CDN, use it like that:
CSS goes in the
<link rel="stylesheet" href="//assets.dynatrace.com/groundhog/vVERSIONNUMBER/css/main.css" />
JS goes at the end of the
<body> tag of your page:
VERSIONNUMBER is the version that you want to install. Check the website for more information.
Install via npm
Groundhog is available on npm:
npm install --save @dynatrace/groundhog
If you want to have a more advanced build, check us out on GitHub and do a plain build:
npm install npm run build
You will then find compiled stylesheets for all the components that we got.
You can also chime in and develop with us!
npm install npm run dev
Font and Assets
The font we're using is called Bernina. You can find downloads for this font and usage terms in our asset library. If you can't use Bernina for some reason, the open source alternative "Open Sans" works as well. Make sure you get the 300 and 400 font styles.
Same goes for the iconography used with Groundhog. You can find them in the asset package available in the asset library.
One more thing!
Groundhog is also built with Groundhog. Who would have thought?
This project is maintained by:
With contributions by:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060882.17/warc/CC-MAIN-20210928184203-20210928214203-00697.warc.gz
|
CC-MAIN-2021-39
| 2,258
| 30
|
https://gis.stackexchange.com/questions/433342/extract-electrified-railways-for-germany-from-osm
|
code
|
I need to get all railways in Germany, specifically the electrified ones, for an university project.
I found two ways of getting the data.
Download the all the OSM data for a the desired region via. geofabrik.de (als .osm.pbf) Then extract the desired railways or the electrified ones specifically. The "how" is no a part of the problem (osmosis, Osmium, ... are options to consider).
Via a QGIS plug-in called QuickOSM. The plug-in allows me to search for railways (as a key) and rail (as a value). After this I used the attribute table to get the electrified railways and saved the outcome as new layer.
Is the outcome the very same for both ways? If not 100%, if the second one extract all the data properly. Somebody told me that the shapefiles do not contain all but a small amount of attributes. Does this apply as well if I use the plugin QuickOSM?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00440.warc.gz
|
CC-MAIN-2022-33
| 855
| 5
|
https://glitteringstew.com/pantyhose/monty-python-breasts.php
|
code
|
Now, though, they might reflect ruefully on Christ's words that "a prophet is not without honour, except in his own country". None of the five surviving Pythons would describe themselves as prophets. But they can't have failed to notice a distinct lack of honour in the British press about their much-publicised reunion show. One critic blasted: "Rock bands, such as the Rolling Stones, may feel they can get away with touring songs about pulling teenaged chicks when they are well into their 60s and 70s, but the Pythons should be sharp enough to know better. The final performance will be screened live in cinemas around the world, including in America.
It was good fun. On one occasion there were these two officers strolling past the lounge Monty python breasts they sort of did this triple-take, at all these little old ladies doing these silly things! Update newsletter preferences. Please try again, the name must be unique Only letters and numbers accepted. The title was originally used as a catchphrase in the TV show. Monty python breasts Articles. All of the sketches were recreated for the film without an audience, and were intended for an American audience which had not yet seen the series. Terry Jones and Michael Palin later complained that the vast majority of the film was "nothing more than jokes behind desks. You were kind of collecting all the coolest TV shows…. The idea for a final Python show came up when Idle consulted his friend Jim Beach, the band manager of Queen.
Sexy tingles. RELATED ARTICLES
I don't think Montyy Luchino Visconti at all. Switching the radio off Liberal rubbish. Fine makes a note of it; the man sists down thank you. Read This Next. The guard places the moped on a rack and the messenger enters the Montg going past three trumpeters who play a fanfare. She never hesitated to make the most of her voluptuous figure in their sketches, but at times the Monty Python boys went too far even for Carol Monty python breasts. Obviously, nobody would ever sell their kids to pay the bills. It's expired Monty python breasts gone to meet it's maker! At the climactic crater battle, the bad guys are holed up in a seemingly impregnable bunker. List Activity Views: 51, in last week Council bans plastic poppies weighing a few ounces from being attached to lampposts on 'health and safety' We'll never let go. If you hadn't nailed it to the perch, it would be pushing up the daisies! I do not look odd like this - it's that lot that looks odd. In his first film: 'Cronaca Di Un Areore'the couple are brought together by a shared irrational guilt.
- By Sam Creighton for the Daily Mail.
- Monty Python only made a handful of movies and one TV sketch show, but they managed to create some of the most timeless comedy of their generation.
- Chat or rant, adult content, spam, insulting other members, show more.
- Opening title sequence and signature tune for 'The Money Programme'.
- Sign in.
April, A much shorter version went into Empire. Carol Cleveland is the seventh member of the Monty Python team. Before we get there, can you tell us a bit about your career pre- Monty Python? You were kind of collecting all the coolest TV shows…. Oh yes, all that cult stuff.
That was the beginning of my television career really, playing leading ladies in those sorts of things. I never anticipated being a comedienne. I saw myself as a straight actress. I went to RADA and did theatre. I never thought of myself as funny at all; it was quite a while before I even did anything funny.
As I said, I played leading ladies in all those old shows. I still had a very broad American accent when I came over, so that was my in: there was a lot of work for Americans and Canadians on television in Britain. By the time we got to the second or third episode, the guys decided that they really liked me. I fitted in very well and somehow managed to just about understand it! I thought it was just a load of nonsense!
Yes, I can. Bahhhhh… thump! That was the first sound I uttered for them: a little lamb attempting to fly from a tree. Anyway, as I was saying, by the third episode the guys had decided that I fitted in beautifully, and I was prepared to be as silly as they wanted me to be and do whatever they asked of me.
But I was only contracted for these four episodes. Not for young women anyway. Old women — the little pepperpots that they did themselves — they wrote beautifully, but when it came to young women, they just wrote silly pretty things. The guys made a deal with the director Ian McNaughton that if there was ever a female character that was anybody who was going to have a proper scene, they always wanted me.
So I was there for all the series, all the films, all the records, and nearly all the stage shows. The only one I missed out on was Drury Lane, because I was doing another play, but that was the only time.
At what point did the films start happening? Holy Grail was filmed between two of the series — is that right? Yes, they were concurrent with the television series. Or at least, the first one was And Now For Something Completely Different , and that was just the sketches, done additionally for America — it was never meant to be shown here.
I think Holy Grail was , and I think we had the final series that we did without John [Cleese], still to do. No, it was the same location. I think I probably enjoyed that filming a lot more than the rest of them did.
They had to put up with dreadful weather conditions, constant rain and cold and misery, wearing what were apparently these very itchy suits of chain mail that were made of wool and got very wet and smelly and heavy. That caused a few dramas, both with the Pythons and with the crew.
The day I arrived on set, there was talk of a mutiny! The crew was just getting so frustrated with these two directors. One would come on set and set up a scene, and then the other Terry would come along and change it all!
Everyone was literally on the verge of downing tools — they were all pretty grumpy. I think it was either the first or second day I was there that we saw the rushes for the first time. Graham set the scene at the hotel, trying to cheer everybody up.
He announced that drinks were on him that evening, so of course the crew immediately charged to the bar, and by the time we actually went in to watch the rushes everyone had had a few drinks and were jollier than they were when they came in anyway.
And then we watched the rushes, and it just looked so good! It looked amazing, and when everybody saw it was all working and looking great, my understanding is that after that the crew all agreed to work for half the wages!
They realised it was actually going to be quite good! Yes, I was fine! I enjoyed doing my bit. It was good fun. Nothing to complain about at all. Just turned up, did all my lines about spanking and oral sex, and then went home! Did you ever roll your eyes or get embarrassed at any of the things they gave you to say?
Oh no, never! Other than that, I never refused to do anything. They never asked me to do any nudity again afterwards. I did that on the QE2 to a very bemused audience of very elderly ladies at teatime. It was very funny! And so they decided to do it at teatime in the Grand Lounge, and there I had all these old dears… They did seem to enjoy it though! On one occasion there were these two officers strolling past the lounge and they sort of did this triple-take, at all these little old ladies doing these silly things!
So that keeps me going. It does fill the gaps, and I have to say that unfortunately there are more gaps now than there used to be! They just had me in for the day and I did my own bit. Terry popped in while I was there, but otherwise everyone was there separately. I had to make all the noises in the studio as well as singing! Portrait at top of page by Amelia Shepherd ; used with kind permission. You are commenting using your WordPress.
You are commenting using your Google account. You are commenting using your Twitter account. You are commenting using your Facebook account. Notify me of new comments via email. Notify me of new posts via email. You were kind of collecting all the coolest TV shows… Oh yes, all that cult stuff. Carol with Roger Moore in The Saint. So where did Monty Python come in? Can you remember what your first sketch was? Vanilla Hoare vs.
Exterior of an Elizabethan palace. I've always wanted money. It's high time something was done about it! Don't believe us? Report Abuse. Help, help, I'm being repressed!
Monty python breasts. RELATED ARTICLES
Share or comment on this article: Why I refused to go topless for Monty Python sketch: Actress Carol Cleveland says she changed her mind after filming attracted large crowd e-mail. Most watched News videos Brexiteer attacks Caroline Voaden for calling for a People's Vote Simba the lion is saved from 'canned hunting' and finds new home CCTV footage of man who pleaded guilty to the murder of June Jones 'Knifeman' held down on floor at Oxford Road station in Manchester Police arrest 'knifeman' at Manchester Oxford Road station Bystanders take action against armed robbers in Shepherd's Bush Metro passenger distracted by phone falls onto tracks in Madrid Jo Swinson confirms she won't swap seats to ensure re-election Countdown to Brexit: 4 days until Britain leaves the EU Hilarious video sees a fabulous parrot dancing at a rave Excruciating moment couple are told by stewardess to stop having sex Ambulances continue transporting people found dead in lorry.
Comments 36 Share what you think. View all. More top stories. Bing Site Web Enter search term: Search. Gisele Bundchen is all-smiles as she gets into the Halloween spirit at the pumpkin patch with daughter Vivian Seemed to be having a blast Meghan King Edmonds is feeling 'so raw' amid divorce from husband Jim She swore she was happy to be curvy - now she's suddenly lost three stone.
Patmore aka Lesley Nicol teases Maggie Smith's return in the film's sequel in the works Liam Gallagher's daughter Molly Moorish changes Instagram handle to include his surname a year after their reconciliation Kanye West buys poo emoji cushion for his infamously minimal home while shopping in NY Meghan King Edmonds' husband Jim files for divorce Pictured hours before she vanished: Campfire photo show British backpacker Amelia Bambridge, 21, at What utter claptrap! Professor lashes out as Oxford becomes latest university to insist on EU 'to sign off Brexit flextension': Brussels is hopeful a Brexit date of January 31 will be approved after No, Mr Bond I expect to have a speaking part!
Queen's dresser Angela Kelly reveals how Her Majesty Gown worn by William and Kate's three babies for christening was dyed in Yorkshire Tea, reveals Queen's Grenfell Tower survivors are ordered to sign gagging orders before being allowed to view long-awaited report Kenyan terrorist who was jailed over jihad manual and admitted he has 'extremist mindset' wins asylum bid to Michael Winner's widow, 81, 'finds comfort' in getting back some of the jewellery stolen by his ex-lover, Ex-Liverpool player Stephen Darby, 31, describes his battle with 'horrible' motor neurone disease a year on One click can reveal what the internet search giant tells Strictly Come Dancing: Catherine Tyldesley becomes fifth contestant to be voted off ballroom show after NHS chief Simon Stevens blasts homeopathy as 'dangerous' and blames the industry for fuelling antivaxx Council bans plastic poppies weighing a few ounces from being attached to lampposts on 'health and safety' Will Boris Johnson get his Christmas election wish?
After all, they're singing from the same Archbishop of Canterbury faces backlash after suggesting Boris Johnson is pouring 'petrol' on divisions in A selfie smile for social media!
Hairdresser, 21, is left with severe facial burns after a night of passion turned into disaster when a Serial arsonist Peter Tredget who was jailed for life after admitting killing 26 people including a baby may How I lost my heart under the hay wagon: In the second part of Laurie Lee's lost recordings, the writer I've got lots and lots of lira, Now the deutschmark's getting dearer, And my dollar bill could buy the Brooklyn Bridge.
Five singers male in Welsh women's national costume come on. A Welsh harpist joins them. There is nothing quite as wonderful as money, There is nothing quite as beautiful as cash, Some people say it's folly But I'd rather have the lolly With money you can make a smash.
There is nothing quite as wonderful as money There is nothing like a newly minted pound. Everyone must hanker For the butchness of a banker It's accountancy that makes the world go round. For its money, money, money, Makes the world go round. Exterior of an Elizabethan palace. Elizabethan music. An Elizabethan messenger on a moped, comes up the drive and drives in through the front door. Cut to a long corridor. The messenger appears mopeding along the corridor very fast.
He leaps off the moped and hands it to a guard at a door. The guard places the moped on a rack and the messenger enters the door going past three trumpeters who play a fanfare.
He approaches a clerical figure, who stands at yet another door. The doors open. The messenger leaps on another moped and rides up to the throne on which sits Elizabeth surrounded by her courtiers, all of who are on motorized bicycles.
So, we must to Tirbuly. Sil Wartel Lareigh! We sharr lide to Not Groucester. Come on, ret's get this light. Rike this. And cut the broody herr. I do not look odd like this - it's that lot that looks odd. It's bleeding weird having half the Tudor nobility ligging around on motorized bicycles.
I'm telling you straight, mate. I don't think you're Luchino Visconti at all. The door opens. Not so fast, Yakomoto. The same. Only more violent. So impressed was I with this motion picture treatment of the Risorgimento that I went along to Somerset House and changed me own name to Leopard, preferring it to me original handle, 'Panther' Aargh.
I digress. The association of the latter with Signor Visconti fructified with Dirk's magnificent portrayal of the elderly poof what expires in Venice.
And so, Yakomoto Never mind. I'll have you instead. I haven't got time to go chasing after him, there's violence to be done. Switching the radio off Liberal rubbish. What do you want with your jugged fish? Well there's rat cake The hunt is on. A steamy tropical jungle. A native guide leads four explorers in pith helmets and old-fashioned long shorts through the jungle.
Cicada sounds and shrieks of predatory jungle birds. Intercut close ups of perspiring foreheads etc. The native guide keeps beckoning them to hurry. The jungle appears to get thicker: they have to push their way through the undergrowth. Finally the guide stops and points, with eyes staring. The four explorers cluster around and look over his shoulder. A neat clearing in the thick of the jungle.
Tables set as in a London bistro with check cloths and big wooden pepper mills, candles and menus standing on each table. Sitting at the tables are six other explorers in pith helmets etc. Clink of coffee cups. Yes, they've done wonders with it. You know this used to be one of the most swampy disease infested areas of the whole jungle, and they've turned it into this smashing little restaurant. Hello, Mr Akwekwe. Nice to see you again. Suddenly there is a hideous scream. We see a gorilla tear a man from his table at the back of the restaurant, in front of a tree and drag him back into the jungle.
Awful shrieks are heard. Akwekwe runs into the jungle shouting, Terrible sounds of the unseen fight. Thrashing about of bushes in the distance. A shot rings out. Then silence also rings out. Akwekwe emerges, dragging the inert body of the customer whom he puts back in his chair. He slumps forward. Akwekwe comes back to the table in the foreground which has remained in the foreground throughout this preceding shot, with cut ins of the four explorers looking through the menu. Akwekwe has a bloodstained claw mark right across his face and chest and his dicky is torn and bloodstained.
Well there's two avocado vinaigrette here and what are you going to have Brian? Cut to close up of pygmy's evil face parting leaves and firing a blow-pipe.
Cut to another table where two explorers are having coffee and cigars. One of them stiffens and then slumps firward. Cut to Akwekwe at the main table registering what has happened. We pan with him as he rushes over to the bushes. Sound of pygmies retreating into the bushes.
Akwekwe shouts after him. We pan with Akwekwe as he walks over to the table where the customer has slumped forward. He pulls him up, looks at dart sticking out of his chest, tut tuts with annoyance and lets him slump back on to the table again. He returns to the main table. Jungle drums getting louder. Akwekwe shouts off towards the back of the clearing where we assume the kitchens mast be. He casts yet another fearful glance in the direction of the ever-increasing drum beats.
The drum beats get louder. Shot of forest, rustling of bushes. Close up of Akwekwe's eyes. Another shot of forest. Drum beats louder. More rustling. Close up of Akwekwe's eyes and sweating forehead. Forest again and more noise. Close up of Akwekwe; he now has blood on his face, his eyes dilate with fear, the drum beats become deafening. Sudden cut to BBC world symbol. The BBC would like to announce that the next scene is not considered suitable for family viewing.
It contains scenes of violence, involving people's heads and arms getting chopped off, their ears nailed to trees, and their toenails pulled out in slow motion. There are also scenes of naked women with floppy breasts, and also at one point you can see a pair of buttocks and there's another bit where I'll swear you can see everything, but my friend says it's just the way he's holding the spear. A beautiful well-stocked garden bed.
After two seconds there are shrieks of licentious and lustful laughter. A nude woman pursues a city gent, both screaming with pleasure, into the middle of the flowerbed and they roll around smashing up the flowers in unbridled erotic orgy.
Immediately two nuns run in to join the fun, followed by two Vikings, a gumby, a pantomime goose, etc.
Monty Python: The last laugh? | The Independent
A Scotsman on a Horse is a sketch that first briefly appears in the second episode of Monty Python's Flying Circus , " Sex and Violence " and appears in full in the sixth episode, " It's the Arts. A mum Terry Jones reads about an Indian massacre at Dorking Civic Theatre and tells her husband Ian Davidson about the police wanting to speak to anyone who saw the crime, ladies with large breasts, or anyone who likes policemen.
A policeman John Cleese then tells the audience that policemen make wonderful friends and gives an address to write to for a pen friend in the police force. He then takes off his helmet, from which the mum chooses a sketch: A Scotsman on a Horse. The Scotsman on a horse Cleese rides as a wedding occurs.
He eventually reaches the wedding and takes away the groom Michael Palin. Sign In Don't have an account? Start a Wiki. Categories :. Cancel Save.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145676.44/warc/CC-MAIN-20200222115524-20200222145524-00087.warc.gz
|
CC-MAIN-2020-10
| 19,258
| 56
|
http://www.profidocs.com/portfolio-item/isplit/
|
code
|
Divorce is a terrible experience. The level of stress and costs of it are high and the consequences can be hard to estimate.
APG Mobile Apps employed our firm to design an app which takes away some of the pain during a divorce. The app offers a visual overview of all the assets in a couple. Each party can create their own version of how the assets should be split. They can drag and drop assets from one side to another or even split them in half if the assets are non-tangible.
What does the app bring new to the divorce experience?
- the visual layout of all assets and how each party wants to split them. Create your own view and share it with the other party. You don’t have to meet.
- communication does not have to be face-to-face. You send your version to the other party and they can view and alter it, then send it back.
- when you’re done, you can just export an Excel file which you can send to the judge.
You save on lawyer fees and the communication is minimal.
Professionals can use a special version of the app to provide value added services to their customers, by offering a visual representation of how assets are split.
The app was designed for iPad in Objective C using Core Data. Testing is done with SenTestingKit.
- Client APG Mobile Apps
- Date August 10, 2012
- Tags Social
- URL View Project
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499524.28/warc/CC-MAIN-20230128054815-20230128084815-00752.warc.gz
|
CC-MAIN-2023-06
| 1,323
| 13
|
https://www.rockpapershotgun.com/commodity-limit-theory-dev-diary-shows-dynamic-markets
|
code
|
Commodity: Limit Theory Dev Diary Shows Dynamic Markets
My brain is limited
Someone needs to tenderly stroke the asteroids and wing tips of the latest Limit Theory development diary. If Craig was here, he'd probably be bouncing up and down with excitement about the game's procedural ambition, its electric-coloured interface, and developer Josh Parnell's relaxing voice. Craig isn't here though. Instead you've got me, and I'm trapped in a post-bank holiday mental fug. I'm going to stumble through this introduction like I've never written a paragraph before and quickly point you to the new video down below, which shows the newly implemented simulation of the game's commodity market.
The first three-and-a-half minutes of the video are apologies, but after that it gets into depth about the economic make-up of a solar system. There are lots of confusing graphs which show the rise and fall of material prices over time. Parnell spots the rising price of one commodity, buys it before it reaches its peak, and then tries to sell it to turn a profit. It goes wrong - the game isn't finished yet remember, and things like storage menus don't work - but I like the idea that I can make a living in Limit Theory without ever firing a laser, as long as I can get enough starting capital to become a space-city trader. A singleplayer EVE Online is strangely compelling.
Parnell also makes clear that looking at these graphs is optional, but it's important that these systems exist to underpin everything else that's happening in the game. If you'd rather impact the markets the old-fashioned way, the video also shows plenty of spaceships flying about to either mine asteroids or to carry out a little piracy by attacking those mining ships.
My favourite part is near the end though, when the camera lingers for a moment over a space station as dozens of little dots - each one a spaceship - docks or undocks with it. I want to just sit and watch the AI do its thing in this game. Can I have it as a screensaver?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648635.78/warc/CC-MAIN-20230602104352-20230602134352-00080.warc.gz
|
CC-MAIN-2023-23
| 2,011
| 6
|
http://hf.mtlaurelschools.org/subsites/Nicolas-Handley/STEM/index.html
|
code
|
STEM is a class that teachers students how to solve problems using knowledge from the fields of Science, Technology, Engineering, and Math. The goal of 6th grade STEM is to learn to use The Design Process to build and program robots that solve problems. To make STEM fun and relevant to what's going on in the world today, you'll simulate what the automotive and technology industries are developing to change how you'll get around in the future. Check out the videos below to see what they're up to.
That's right! You'll learn how to build and program robots that simulate the self-driving vehicles those two industries are currently developing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160923.61/warc/CC-MAIN-20180925024239-20180925044639-00095.warc.gz
|
CC-MAIN-2018-39
| 646
| 2
|
https://www.funk.co.nz/auckland-music-update/im-planning-to-write-my-own-spd-sx-drum-pad-management-software/
|
code
|
UPDATE: I figured out how to dupe kits quickly. Just duplicate the .spd file in the kit folder. Make sure you rename it kitXXX.spd. Kit 1 is kit000.spd so subtract one from the filename.
Because Roland's SPD-SX Wave Manager is so terrible.
It seems like the only thing it can do is:
- load samples into it one at a time and they have to 16 bit 44 khz
- clear pads one at a time
But you can't do:
- kit copy paste
- clear all pads
- exchange pads
- setup kit chains
So here we go trying to reverse engineer the XML format by comparing how the unit changes the kit files! Hopefully I can find somebody to show me how to setup an open source software project.Posted by tomachi on March 29th, 2015 filed in Music Business
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948234904.99/warc/CC-MAIN-20240305092259-20240305122259-00204.warc.gz
|
CC-MAIN-2024-10
| 717
| 11
|
https://betahaus.bg/en/mobile-developer-and-junior-developer-for-domestina
|
code
|
Domestina is a LauncHub funded startup with already solid traction and on the verge of launching an international expansion. They’re looking to add the 3rd and 4th developers to their engineering team. They need a mobile applications guru to start and lead the development of our mobile apps, they’re also looking for a junior developer to help them with the backend and frontend of our main system.
Mobile Developer and Junior Developer
read the details HERE.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00450.warc.gz
|
CC-MAIN-2023-50
| 464
| 3
|
http://www.soundonsound.com/forum/showflat.php?Board=PCMus&Number=988974
|
code
|
the effects are:
compressor (single band or multi-band)
stereo imager /
surrounding imager / depth imager / stereo ambience recovery
saturator or warmer or tape/tube simulator
limiter or maximumizer (single band or
dithering and noise shaping
And note that I am not talking
about the hardware effecters but the software effecter plugins which can be run in every
DSP or no DSP just CPU.
And I'm now just using waves 9 bundle so I think there
may be a lot of better then waves 9, e.g. psp? voxengo? algorithmix? lexicon? or any
And do they all provide the real native x64 VST?
Sonar PLT + Foobar2000 -> ASIO + MMCSS + Windows 8.1 -> SIIG NN-E20012-S2 -> Echo AudioFire 4 -> HH MX250 + Wharf Delta70
A native USA style contemporary R&B artist in HongKong
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278887.83/warc/CC-MAIN-20160524002118-00122-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 752
| 15
|
https://www.indusintel.com/about-us-old
|
code
|
Empowering Productivity Growth
Digitization is driving new demands in almost all the industry segments. Our goal is to offer innovative IoT solutions for
manufacturing, energy, oil & gas as well as transport industries.
At indusintel, we are passionate about solving problems and delivering process improvement insights through monitoring, measuring, and visualization of data. We believe in the "art" of engineering, where we strive to produce designs and solutions that are Precise,Elegant, and Reliable.
We are a "make it happen" team with extensive experience in various fields including high tech and manufacturing industry.
The details matter. Yes, even the little things.
Listen...and verify what you think you heard.
Get feedback early and often with iterative improvement.
Choose collaboration over working in isolation.
Welcome other's perspectives.
Challenge the status quo.
Build quality into your work.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00836.warc.gz
|
CC-MAIN-2023-50
| 915
| 12
|
https://uk.mathworks.com/matlabcentral/answers/505718-how-to-replace-a-vector-element-with-a-value-not-equal-the-other-vector-values
|
code
|
I struggling with an assignemt in which i have to find the remaining number in a single sudoku row. I have to replace 0 with a number which doesnt match the current numbers i the row.
my current is:
function sudokuRow = fillSudokuRow(sudokuRow)
I can make it replace the 0 with a secpific number but i cant figure out how to make variate numbers depending on the numbers in the suduko row?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370508367.57/warc/CC-MAIN-20200402204908-20200402234908-00544.warc.gz
|
CC-MAIN-2020-16
| 389
| 4
|
https://www.syncfusion.com/forums/21226/general-grid-design-choice
|
code
|
I have a new project starting that requires very specific grid functionality and I''m not sure which Syncfusion grid to use. I’ve been using the GridDataBoundGrid for several months on a previous project, but I’m not sure if it’s the best choice for this one.
Here is what I need:
The column names of my grid will be a variable amount of weeks. The row headers will be a variable amount of buggy whip names. For each buggy whip row there is data for each week. The intersection contains a group of cells containing data for that week (price, available inventory, sold inventory, …) I have checkboxes above the grid that hide / show the individual data cells. The individual data cells are have a specific background color.
I’m accomplishing the above with a GridDataBoundGrid by formatting my DataTable and using the PrepareViewStyleInfo event.
But I also need a total section in the grid that totals all the buggy whips for the week column. The rows names would be price, available inventory, sold inventory … The values would sum the individual cells from above. I would also like to group the individual data cells with some type of border.
So which grid should I go with? I’m dealing with a lot of data, and I also need to format area of my grid differently than other areas.
Thank you for reading this and I greatly appreciate any general suggestions.
ADAdministrator Syncfusion Team November 4, 2004 10:48 AM
There are a couple of pluses for using a GridDataBoundGrid. One is that you are familiar with it, and you have already done some of teh layout work. The other is that the data is in a DaatTable and using the GridDataBoundGrid makes that simple to bind.
So, on to the problems. Having summary rows directly in teh GridDatBoundGrid will be problematic. One solution is to put a GridControl into the GridDataBoundGrid''s clientarea. Then you can just use teh GridDataBoundGrid as you are now, and use teh GridControl to provide summary information. Here is a KB link showing how you could do this. It only add''s one summary row, but you could extend the idea to several rows I think.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499758.83/warc/CC-MAIN-20230129180008-20230129210008-00221.warc.gz
|
CC-MAIN-2023-06
| 2,110
| 10
|
http://guestbook.lapeercountyparks.org/?page17736.html
|
code
|
Hey. Cool article. There's an issue with the website in internet explorer, and you may want to test this... The browser is the marketplace chief and a large portion of other folks will miss your great writing because of this problem.
I would like to thank you for the efforts you have put in writing this website. I'm hoping the same high-grade website post from you in the future as well. In fact your creative writing abilities has inspired me to get my own website going now. Actually blogging is spreading its wings and growing fast. Your write up is a great example.
Thanks for sharing excellent information. Your web site is very cool. I'm impressed by the details that you've on this blog. It reveals how nicely you understand this subject. Bookmarked this website page, will come back for extra articles.
Good website! I truly love how it is nice on my eyes it is. I'm wondering how I might be notified when a new post has been made. I've subscribed to your RSS feed which may do the trick? Have a great day!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00292.warc.gz
|
CC-MAIN-2021-43
| 1,016
| 4
|
https://issues.redhat.com/browse/JBRULES-3612
|
code
|
For various reasons, a rule may want to prevent the future "don" of a given trait for a given object.
I propose the use of the "ward" macro, as follows:
Thing t = ward( $core, BannedTrait.class );
If another rule, at a later point, will try to apply the BannedTrait or any of its subtypes to $core, that trait will not be applied to $core and (potentially) an exception will be thrown.
$core can be a @Traitable object or a Thing (i.e. an instance of a trait proxy). THe "ward" operation automatically applies the "Thing" trait to $core in case it has not been done yet.
Optionally, one might use the "grant" macro to undo a ward (suggestions for a better name are encouraged).
This feature will help in the implementation of "disjunct" or "mutually exclusive" traits, which are incompatible and can't be applied to the same
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735836.89/warc/CC-MAIN-20200803224907-20200804014907-00265.warc.gz
|
CC-MAIN-2020-34
| 824
| 7
|
http://code2care.org/2015/eclipse-workspace-was-written-with-an-older-version-of-the-product-and-will-be-updated/
|
code
|
Recently I moved to Eclipse Mars IDE from Indigo to get support for Java 8, While trying to use to older workspace with Mars I received the following warning when I opened the software for the first time,
Workspace was written with an older version of the product and will be updated. Updating the workspace can make it incompatible with older versions of the product
Are you sure you want to continue with this workspace?
As there may be some configurational changes in files related to workspace in the newer version of the IDE which may cause issues, I rather creating a new workspace and imported the project there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880616.1/warc/CC-MAIN-20200706104839-20200706134839-00465.warc.gz
|
CC-MAIN-2020-29
| 619
| 4
|
https://woz.sh/
|
code
|
What is Woz?
Woz is a is a progressive WebAssembly app (PWAA) generator for Rust. Apps can be installed to your home screen and shared with a hyperlink.
cargo install -f wasm-bindgen-cli
Install wasm compiler target
rustup target add wasm32-unknown-unknown
Install a pre-built binary.
For macOS (64 bit only):
curl -LSfs https://woz.sh/bin/install.sh | sh -s -- --target x86_64-apple-darwin
For linux (via musl):
curl -LSfs https://woz.sh/bin/install.sh | sh -s -- --target x86_64-unknown-linux-musl
curl -LSfs https://woz.sh/bin/install.sh | sh -s -- --target x86_64-unknown-freebsd
curl -LSfs https://woz.sh/bin/install.sh | sh -s -- --target x86_64-unknown-netbsd
To update to the latest version of
woz run the following command.
curl -LSfs https://woz.sh/bin/install.sh | sh -s -- -f --target <NAME OF TARGET>
Setup and deploy
# Follow prompts to create a free account and deploy to the sandbox woz signup # Create a new app woz new myapp && cd myapp # Deploy it woz deploy
The 'Seed' example app uses the
seed framework and clocks in at ~600kb (including ~300kb for an icon and splashscreen), works offline, and can be installed to your homescreen on iOS or Android devices. You can try it out here
Due to the security requirements of PWAs and WebAssembly, the easiest way to start building a PWAA is to use the woz.sh sandbox. To create an account use
woz signup and follow the prompts. If you already have an account use
woz setup to set up your local computer with credentials. Then use
woz deploy to deploy your app.
You can self-host by using
woz to build your app locally and upload the files to your static file hosting service such as AWS S3.
Build the app locally:
cd myapp/ woz build
Follow the cli output to get the location of the generated app files on disk. It will look something like:
App package directory can be found at /Users/myusername/.woz/myapp/pkg
app directory contains an
index.html file that will be the entry point for running the app in a browser.
Note: the security requirements for PWAs and WebAssembly means you will need to serve the files over https. Browsing the files directly in the browser (e.g.
file://) will result in security-related errors. Use a static file server and install an SSL certificate to be able to install the app to your home screen.
Multi-user AWS hosting
You can compile
woz so that it uses your AWS account and allow for multiple users to securely deploy apps to a shared S3 bucket.
To do that, clone the Woz repo locally and put the following environment variables in a file:
# Scheme to use when constructing URLs to your app WOZ_WEB_SCHEME="https" # Domain to use links to your app WOZ_WEB_NETLOC="example.com" # Cognito identity pool to use for user registration WOZ_USER_POOL_URL="cognito-idp.<REGION>.amazonaws.com/<USER POOL ID>" # Cognito identity pool to use for authentication WOZ_IDENTITY_POOL_ID="<REGION>:<IDENTITY POOL ID>" # Cognito user pool app client to use for use with the CLI WOZ_CLIENT_ID="<USER POOL APP CLIENT ID>" # S3 bucket where static files will be stored WOZ_S3_BUCKET_NAME="<S3 BUCKET NAME>" # Password used for encrypting tokens on disk WOZ_ENCRYPTION_PASSWORD="<STRONG PASSWORD>" # Salt used for encrypting tokens on disk WOZ_ENCRYPTION_SALT="<RANDOM SALT>" # Location of the woz repo, needed to generate new projects WOZ_PROJECT_ROOT="<PATH TO WOZ REPO>" # Location of the woz repo, needed to include assets WOZ_CLI_PROJECT_ROOT="<PATH TO WOZ REPO>/cli"
In your terminal, add the environment variables to the session:
set -a; . ../my-env; set +a
You can now build and deploy to your own AWS account. For example:
cargo run setup cargo run new myapp cargo run deploy --project-root ./myapp
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363332.1/warc/CC-MAIN-20211207014802-20211207044802-00606.warc.gz
|
CC-MAIN-2021-49
| 3,686
| 42
|
https://issues.liferay.com/browse/LPS-73874
|
code
|
Steps to reproduce it:
- Configure in portal-ext.properties the GZIPFilter property: com.liferay.portal.servlet.filters.gzip.GZipFilter=true
- Create a custom and simple html page to be loaded when the http not found error (404) occurs.
- Configure the page created in 2. in portal-ext.properties. For example: layout.friendly.url.page.not.found=/html/portal/my-custom-page-404.html
- Start the application and navigate to a nonexistent page. For example go to http://localhost:8080/sdfsfsf
- Observe that the browser keeps waiting for the page to load even though it is fully loaded. If you navigate with an iOS browser (f.e. from an iPhone or and iPad), the page does not load.
It only happens when a Tomcat server (since version 8.0) is used and when GZipFilter is true.
Observed behaviour: Browser keeps loading the page ~ 20s
Expected behaviour: Browser does not wait after the page is loaded
Observed behaviour: Browser does not load the page
Expected behaviour: Browser loads the page
content-length of the response is the same with both configurations of GZipFilter (on and off). 2465 in this case is the content-length corresponding to the "unGZipped" response.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347389355.2/warc/CC-MAIN-20200525192537-20200525222537-00040.warc.gz
|
CC-MAIN-2020-24
| 1,170
| 12
|
https://useme.com/en/jobs/creating-a-script-that-logs-into-the-wholesaler-and-downloads-the-xml-file,85581/
|
code
|
I will commission as in the title, to write a php script that will log into my account in the wholesaler and download to my server an xml file available only after logging in.
How the script should work:
1. the script logs into my account in the wholesaler.
2. after logging in, the script downloads the xml file from the appropriate link
3. the script sends a success notification.
The script will be fired by cron once a day.
The script is to be written in PHP!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00710.warc.gz
|
CC-MAIN-2023-50
| 463
| 7
|
http://rainbowfactory.net/spinrewriter3/spin-rewriter-9-0-will-make-you-tons-of-cash-here-s-how-get-70-off-now.html
|
code
|
Select the best quality text/content from online, check it, is it suited with your context? Proper selection is too much important for delivering better new one. Get the content from there! And place it on the editor of SEO WAGON Article rewriter tool. Hey, click on Next and see the effects, the engine will read it and gives you options to rewrite as per your choice, choose appropriate synonyms, or you write your own word. There are thousands of synonyms of each word in our dictionary, let’s go for the quickest way of generating article.
I've ranked websites in the past with spun content, and now they are still on #1 position of google. First year (2014) google found me because my spun was really bad, many paragraphs were just copied and my position drop from #2 to around #20 after a panda update. Later I cleaned all my text with better spun (I didn't buy any article!), my ranking went up again, and with more backlinks I reached #1 and it is still there
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659677.17/warc/CC-MAIN-20190118025529-20190118051529-00061.warc.gz
|
CC-MAIN-2019-04
| 969
| 2
|
https://next.nutanix.com/search/activity/reactions?userid=61152
|
code
|
1 - It's correct for non-Nutanix devices, and Nutanix devices only need a shared port is enough.
2 - Yes, your laptop and foundation VM need to be same network.
3 - It depends on what you want to configure on the device.
It must be br0-up not bond0
You can find the answer you need in this document.
Of course you can change your AHV host password
Log into the host by SSH and change it with command
Perhaps you are connected to CVM
ID CVM and Host is different
Yes, i have fix it.
You can see how to solve it in
Yes,i do. I have send you a message with my FB link
KT_2016 Right now i living in Tokyo, Japan.
KT_2016 Yes, i passed the test. But it's very difficult, i have failed 2 more times before i passed the test
I just saw the email of nutanix team has just sent an hour ago. They said they had recevied my request and they will get back to me in three days.
Thanks and best regards,
I sent an email on yesterday, but haven't seen anyone reply.
Already have an account? Login
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739048.46/warc/CC-MAIN-20200813161908-20200813191908-00280.warc.gz
|
CC-MAIN-2020-34
| 1,280
| 21
|
https://support.mozilla.org/ka/questions/1356288
|
code
|
ეს თემა დაარქივებულია. დასვით ახალი კითხვა, თუ დახმარება გესაჭიროებათ.
Add custom Search Shortcut to Firefox Home
I'm enjoying the feature of the pinned "Amazon Search" on Firefox Home – not just a shortcut to Amazon, but a shortcut with a blue magnifying glass that adds the "search with Amazon" parameter to the main search bar and allows you to search Amazon.com without having to visit the site first. I was wondering if it's possible to add a custom shortcut for other search engines... for example, YouTube?
For reference, I have a custom search keyword established in Settings for YouTube – "@youtube". But I want to know how I can have that keyword pinned to my Home page, just like "@amazon" currently is.
Thanks in advance.
ყველა პასუხი (6)
Hi Matt, If I understand your question correctly - I'm not sure about a "blue magnifying glass - the easiest way that I've found is: Visit the site that you want to add, right-click on the address bar, and at the bottom of the drop-down you will see ADD "Site" (as in the attached image). For some sites, e.g. Wikipedia (DE), you need to search first. Then, on the resulting page do the same.
Hope this helps
@RobertJ, thanks for the suggestion. Unfortunately it doesn't quite get to what I'm hoping to accomplish, but it's close.
(I tried to submit screenshots with my original post, but they wouldn't upload until now.)
Your suggestion actually does the same thing I'd already done in a different way – adds "YouTube" as a custom search in the address bar. That's 90% of what I'm looking for, but ultimately I'd like to have that search shortcut pinned to the Shortcuts row on Firefox Home. As I mentioned, Amazon is already set up like this without me having done anything – it was just like that by default. See the blue magnifying glass icon in the first screenshot for reference. I want to replicate that for other search engines, like YouTube or Wikipedia.
Hope this makes more sense. I know I'm ultimately trying to shave a two-click process down to one-click, but it's just baffling me why it only seems to be possible for Amazon.
Hi Matt, I'm also looking for a solution to the same problem. Were you able to solve it since your last update?
One more thing, how can I have a homepage like yours with just the pin websites and none of the recently view site being displayed as shortcuts? I tried turning off the home screen shortcut setting, but that also removed all the pins though.
Thank you in advance.
The search shortcuts have a special property set (type=search) that is not available through the normal method of hovering the icon, clicking the ... menu, then clicking Edit. I also haven't found any other method of adding one.
jscher2000, Thank you for your suggestion, sir. Please let me know if this is what you meant. It didn't work for me. In the Edit, I inputted "@ddg" - the shortcut for Duckduckgo (ddg) - like the "@google" of the @google search shortcut (screenshot 1). I thought that if I just put in the shortcut for ddg search engine the same way the @google search shortcut is putted in (screenshot 2), then it might work, but it didn't. Firefox read "@ddg" as a URL link, so it didn't created a search shortcut like the Google and Amazon search shortcut.
Sorry, my comment was not clear. That did not work for me, either.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817491.77/warc/CC-MAIN-20240420060257-20240420090257-00120.warc.gz
|
CC-MAIN-2024-18
| 3,452
| 18
|
https://www.avforums.com/threads/well-organized-pes6-league-for-scandinavians.442532/
|
code
|
pesligan is soon starting its second season after having a great start having two divisions with 14 teams in each. The league is well organized and is ment for swedish players but scandinavians tend to understand the language so you're more than welcome to join. the url is www.pesligan.net and the signup for the second season is coming up today (just hit that rerefresh button of yours ). We have our own rankingsystem which gives the winners a better shot to get their favourite team, comment sections for all games, forums, IRC channel and much more. So if you are a swede or understand swedish, you're more than welcome to join us at www.pesligan.net and join the league there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525483.62/warc/CC-MAIN-20190718001934-20190718023934-00121.warc.gz
|
CC-MAIN-2019-30
| 682
| 1
|
https://www.richacreates.com/group/mysite-200-group/discussion/94fa99f1-e77c-4ede-8ae3-9eaf37bcd813
|
code
|
If you are testing with a local backend (java servlet on local google app engine) the running process blocks some files. So you are not able to live deploy. So in this case you can solve this by stopping the local backend before starting clean or build. You find the option under "Run -> Stop backend".
I have tried to remove all the Java services but still it is failing while executing the gradlew clean build command from IntelliJ terminal. I even verified the other applications I have opened somewhere the same path which I am trying the delete. But could not find any of such. So, finally restarted the IntelliJ IDE and able to proceed build smoothly. 350c69d7ab
Welcome to the group! You can connect with other members, ge...
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818312.80/warc/CC-MAIN-20240422144517-20240422174517-00383.warc.gz
|
CC-MAIN-2024-18
| 732
| 3
|
http://www.eightforums.com/general-support/40194-winsat-wont-run-windows-8-1-pro-w-media-center.html
|
code
|
When I run winsat formal -reset -v from an elevated powershell or cmd window, it completes in less than a second and produces no xml files. I have tried without success:
1. Clean boot
2. Safe boot
3. Updated video driver
4. Uninstalled all codecs with autoruns
I think the problem might be related to failure to run the NT Kernel Logger but I don't know what process could be tying it up.
I have attached the winsat log.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719041.14/warc/CC-MAIN-20161020183839-00288-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 420
| 7
|
https://wiki.scn.sap.com/wiki/display/PLM/CT04+-+Characteristic+Maintenance?msclkid=f753fb19bbd611ec97987572f31b819d
|
code
|
Using the transaction CT04
Definition: In R/3 classification, characteristics describe the properties of objects.
In the Characteristic field of the transaction CT04, the name for the new characteristic may be defined. Furthermore, it is possible to enter a change number if the characteristic should be maintained using engineering change management. The new characteristic may be created either with the "Create" button, or when hitting enter, the system will show a notification that the characteristic does not exist yet and will ask if the user wants to create the new characteristic.
The "Basic data" Tab
Description: Open the main characteristics data on the Basic data tab and enter a short description of the characteristic. The description may not be longer than 30 characters, in case a longer text needs to be added, it may be added as "documentation" to the characteristic.
Characteristics Groups are defined in Customizing for classification. The characteristics group can help you to find characteristics with a matchcode.
Status - the options of the status field are "1 Released", "2 In Process" and "3 Locked". The characteristic may only be used in classification of objects in case the status is set to "1 Released".
The "In Process" status is often used in case the characteristic is not yet to be used and the "3 Locked" status when the characteristic has become obsolete and will probably not be used anymore in the future. These statuses may be changed at any time.
- "Released" status: you can use this characteristic in classes. You can use an authorization group for characteristics to restrict access to certain characteristics. For further information, please goto Authorization Objects .
- "In process" status: most often used when the characteristic is in the creation process. The characteristic with "In process" status cannot be used in a class.
- "Locked" status: a characteristic with this status cannot be used in a new class. However, if you have used a characteristic in a class, and then set Locked status for the characteristic, this does not affect the characteristic in the class.
Data Type: The values of the characteristic may have different data types. The data type of the characteristic determines which values you can enter for the characteristic. The following data types are supported: Character Format; Numeric Format; Time Format/Date Format; Currency Format; User-Defined Data Type.
Number of Chars: Enter the maximum number of characters that may be used for the characteristic, please note it may not be larger than 30 characters.
For the Character Format, the values of the characteristic can contain any alphanumeric character. It is also possible to decide if the values should be case sensitive.
Template: The template may be used to give the user a visual guidance when working with large numbers in the system for the characteristic, this may include using the thousand separator
for large numbers. When using a Numeric format with intervals allowed, the template may overwrite the custom templates by removing any thousand separators when the number of characteris is larger than 10. This is due to the fact that during value assignment the values may not fit into the input field.
Single Value / Multiple Value: These options define whether the characteristic may allow one or more values to be assigned during value assignment.
Restrictable: This indicator is relevant to variant configuration (LO-VC) and is used to allow Dependencies (more specifically Constraints) to restrict the
allowed values to a certain scale depending on other values of other characteristics.
Entry required: A value for this characteristic is required during value assignement. By default is this option is not activated, it is optional
to assign a value to the characteristic during value assignment.
The "Descriptions" Tab
On the tab Descriptions it is possible to enter a language-dependent description of the characteristic.
The "Values" Tab
The values of a characteristic specify the properties of a characteristic. The values must match the format that was defined on the "Basic Data" screen and their length may not exceed the number of characters that were defined in the Basic Tab. If the characteristic is an alphanumeric characteristic, it is possible to enter a language-dependent value description up to 30 characters.
In the value list shown in screenshot below, the maximum number of values that can be assigned is by default 9999 which may however be overcome by using a check table instead.
In case predefined values are set, when the "Additional Values" flag is set, the user may assign new values during value assignment (in configuration for example). These new values added
by the user during value assignemnt will however only work on an ad-hoc basis and will not be added to the predefined list of values of the characteristic, but are saved only for that one specific
case where the new value was assigned, such as in the configuration.
When no predefined values are set, the additional values flag does not have to be necessarily activated manually, the characteristic will allow additional values when no predifined values are set
and the additional values flag is not set either by default.
It is possible to set a default value for the characteristic which will then be set automatically during value assignment by the system. These default values during value assignment may be overwrtten or changed manually, the system will not overwrite the value again.
The default value may be selected in the column D in the Values Tab by activating the flag for the value.
A check table may be used to control the allowed values of a characteristic. In case a check table is used for the characteristic, any values you assign to the characteristic must match entries in the table. Additionally, the check table may also be used to allow more than 9999 values for the characteristic.
Entering a Function Module:
On the allowed values tab page in characteristics maintenance functions, the name of a function module may be added for checking the values entered when an object is classified. Please have a look at Characteristics and Characteristics Values for more information.
For values in character format CHAR or number format NUM a language-dependent documentation may be added:
On the Allowed values screen, choose Extras -> Change language, then enter the language in which you want to write documentation.
Select the value with the cursor and choose the button 'Documentation' , add text in the text editor and click save.
The "Additional Data" Tab
On the Additional data screen, in subscreen Procedure for value assignment it is possible to select if the characteristic is ready for input, is not displayed or if the possible entries should be displayed.
It is possible to link documents, such as drawings or photographs with characteristics and it is also possible to link documents to a value. This allows the user to describe the value in more detail. (Place the cursor on the value and choose 'Document for value'.)
During the creation of a reference characteristic (see also Reference characteristics ), choose the Additional data tab in characteristics and insert table name and field in this table to which it should be referred to. It is optional to maintain the tab page Basic data first for reference characteristics, the system copies the formatting data from the object master to the characteristic.
The "Restrictions" Tab
In case the characteristic should only be used for a specific class type, it is possible to add the Class Type that are allowed.
When no Class types are added, all class types are allowed, however in case one class type is added, only that class tpye is allowed
but no other class types.
Maximum number of values assigned to a characteristic
As of Release 4.6C, the maximum number of characteristic values of a characteristic is 9999. When you are using change numbers, the number of maximum entries is less, because it is necessary to store several change states (e.g. when the position of a value changes, or a value was deleted).
For performance reasons, you should not use a greater number of values within a characteristic. If you require a high number of values and if you cannot foresee the maximum number, use a characteristic with check table.
If the maximum number of 9999 is reached, an overflow occurs, which triggers error message C1034 in the characteristics maintenance.
When the maximum number of entries is reached, you have following possibilities to proceed:
Working WITHOUT a change number 1.) Just create a new characteristic and use a check table.
Working WITH a change number
1.) You should create a new characteristic, which replaces the other characteristic at a certain date and contains the characteristic values of the first characteristic (on this date). Therefore the new characteristic should be copied from the old one.
2.) The old characteristic can be set to 'no display'.
3.) The new characteristic could have the same characteristic description (because most of the users are working with the characteristic description).
External value check via function module
in the function module for the value check, it is necessary, to fill the export parameter VALUE_EX. Through this, the language-neutral value will be returned.
Apart from the value check function module, you can create a function module, to provide input help (F4 help). This module must have the same name, followed by "_F4". Whit In Addition, another module can provide language-independent value descriptions. The name of this module must be the same, followed by "_DC".
Reference characteristics are characteristics that refer to table fields.
When an object is classified, reference characteristics are not usually available for entry, because the value is taken from the object table and displayed. This ensures that the characteristic values are consistent. If a reference characteristic is used in a class and the reference is to another object type that is different than the current classified object then this object loses its status as a reference characteristic. This means that a value can be assigned to the characteristic. It is also possible to find the classified object by the assigned value.
An example of a reference characterstic can be a characterstic referring to PLANT inside of sales order item, if the characterstic created refers to the sales order table VBAP field WERKS.
Once the sales order number is generated at the time of saving order, this value for plant will be captured as value for this referance characterstic. Reference characterstics can also be used to setup or calculate values in some dependencies such as procedures.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510130.53/warc/CC-MAIN-20230926011608-20230926041608-00315.warc.gz
|
CC-MAIN-2023-40
| 10,764
| 64
|
https://liberapay.com/yPhil/
|
code
|
I make Free, Libre and Open Source Software & Music
- Right now I'm working nearly full-time on Pétrolette (and her two sister libs, Feedrat & Favrat) check it out, who do you think I made it for ? Please help me reach my goal to keep it open and running.
- Some of my videos are now on #Peertube 🐸
- Check out my latest projet!! https://framagit.org/yphil/petrolette (public instance here) ; It's Free, Libre and Open-Source as basically everything should be :)
- You can now make a one-time donation <3
Who am I?
My name is Philippe, I am a musician and developer, or the other way around, it depends. All my production is freely available, and all my code in open source :
- My music ;
- The music videos that I make ;
- Software that I design, develop and maintain ;
- My video tutorials (Free software in audio production) ;
- The various articles I write for free publications, like on LMP or on LinuxFr ;
- And many other things that I do not currently have in mind...
How to help?
- By 🌱 considering my music, by using my software, that's what it's made for;
- By 🌴 sharing my work around you;
- By 🍏 funding my production here or elsewhere.
yPhil owns the following accounts on other platforms:
with 25 others
with 67 others
with 82 others
with 111 others
with 172 others
with 631 others
yPhil joined 4 years ago.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300934.87/warc/CC-MAIN-20220118152809-20220118182809-00686.warc.gz
|
CC-MAIN-2022-05
| 1,335
| 25
|
https://www.replayguitar.com/products/daddario-leather-guitar-strap-black-1
|
code
|
D'Addario Leather Guitar Strap, Black
D'Addario Garment Leather Guitar Strap, Black
The soft black leather design of the D'Addario Black Garment Leather Guitar Strap provides maximum comfort for standing situations, and is made from high-quality leather. The Classic Leather Strap Collection comes with classic styling, complete with ultra-soft garment leather and high-quality craftsmanship.
As always, feel free to contact our store for more details, or with any questions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370525223.55/warc/CC-MAIN-20200404200523-20200404230523-00233.warc.gz
|
CC-MAIN-2020-16
| 475
| 4
|
https://ai.productmanagement.world/1400-product-manager-interview-questions-answers/1400-questions-ai-answers-for-product-manager-interview/describe-a-product-you-like-and-why-if-you-had-to-improve-the-product-what-would-you-do-product-you-dislike-and-why-you-have-to-develop-the-next-generation-tv-service-resources-are-no-constraint-what-would-you-do-you-have-to-design-the-next-generation-of-search-what-would-you-do
|
code
|
Describe a product you like and why?
If you had to improve the product, what would you do.
Product you dislike and why?
You have to develop the next generation TV service, resources are no constraint. What would you do.
You have to design the next generation of search, what would you do?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103810.88/warc/CC-MAIN-20231211080606-20231211110606-00369.warc.gz
|
CC-MAIN-2023-50
| 288
| 5
|
https://www.vn.freelancer.com/projects/website-design-css/css-for-conference-site-pages/
|
code
|
I built a page myself at [url removed, login to view], and would like to do the following:
* add web 2.0 buttons at the bottom (delicious, digg, send to a friend)
* make the text on the main text area into html text (it's currently an image)
* add a few links (3-6 buttons in same area as the buttons are found on the [url removed, login to view] site)
* code the subpage into CSS (body text area should expand vertically if text requires the space)
* code the main page into CSS (use my coding if possible, but only if it will save time... otherwise might as well do if from scratch)
the site is modeled off of [url removed, login to view], of course, in case you need some coding inspiration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590493.28/warc/CC-MAIN-20180719031742-20180719051742-00172.warc.gz
|
CC-MAIN-2018-30
| 694
| 7
|
https://clerk.com/blog/otp-authentication-nextjs
|
code
|
Passwords aren’t great. They’re often weak, reused, and need to be stored indefinitely making them susceptible to attacks and leaks. have i been pwned? tells me passwords associated with just one of my email addresses have been leaked 18 times, and I have over 800 individual passwords stored in my password manager.
Here we’re going to look at OTPs. One-time passwords are a great option for improving the security of your application. Let’s go through exactly what one-time passwords are, how they can improve the security of your application, the best practices for using them in authentication, and how you can implement OTPs in Next.js.
OTP or One-Time Password authentication is a method in which a unique code is sent to a user's device and the user enters this code into an application to verify their identity. It’s valid for only one login session and usually time-limited.
There are two ways OTPs are implemented:
- As the main factor for logging in a user. If you don’t want to use any username/password combinations in your authentication flow, you can send a one-time password for log in. You can also use it as an alternative to username/password. This is not particularly common, but can be seen on sites such as local social networking site Nextdoor.
- As an additional step in multi-factor authentication (MFA). After a user has logged in with their username/password or another authentication provider (such as Google, Twitter, or GitHub), they are then sent an OTP to a registered email address or phone number as a secondary layer of security for applications. This second option is much more common.
You’d think that one-time passwords would be long and complicated like the suggested passwords from a password manager. But because they are transient in nature and rarely subject to dictionary or brute force attacks, they can be much simpler. OTPs can have different formats, but they usually consist of a series of alphanumeric characters or purely numeric characters. The length of OTPs can vary, but a common format is a 6 or 8-digit numeric code.
The choice between numeric and alphanumeric OTPs depends on the context and requirements. Numeric OTPs can be easier to enter, especially on mobile devices, which makes them a popular choice for SMS-based OTPs. However, alphanumeric OTPs provide a larger possible combination set for the same number of characters, which can be more secure against brute-force attacks.
There are six main steps in the OTP flow:
- Trigger. The user initiates the OTP process. This could be a login attempt, a transaction verification, or any other scenario where identity needs to be confirmed.
- OTP generation. The server generates an OTP. This is typically a random string or number that is time-limited.
- OTP delivery. The generated OTP is sent to the user through a predetermined method. This could be an SMS to their phone, an email to their registered email address, or generated in a hardware token or software app, such as Google Authenticator.
- User input. The user receives the OTP and enters it into the application.
- OTP verification. The server then verifies the OTP. The server also verifies that the OTP is used within the allowed time period, and hasn't been used before.
- Authentication: If the OTP is verified, the server authenticates the user and allows them to proceed. If the OTP is incorrect or expired, the server rejects the request.
Though this is only six steps, there are a lot of moving parts in OTP use. You need extra frontend UI design and logic to handle the OTP inputs; you need to integrate a delivery mechanism such as SMS, email, or an authenticator app; you need extra authentication logic to handle OTP errors; and you need the OTP generation and verification logic as well.
There are several ways to generate and verify an OTP:
- Time-Synchronized: In this method, the OTP is generated by applying a cryptographic hash function to a shared secret and the current time, typically measured in intervals of 30 seconds. The Google Authenticator app uses this method.
- Counter-Based: Here, the OTP is generated by hashing a shared secret with a counter which increments with each new OTP.
- Algorithm-Based: In this method, a mathematical algorithm is applied to the previous password to generate the new one.
If a time-based or counter-based OTP was used, the server repeats the same OTP generation process during verification and checks if the received OTP matches the one it generated.
These algorithms aren’t easy to implement. As you are dealing with an authentication factor, there are specific designs that you must use and RFCs that you must follow, such as this one for Time-Based OTPs. This is the biggest challenge around building your own one-time password (or any authentication) system–implementation.
You can quickly see the complexity involved in setting up OTP authentication. But doing so is worth it as they provide two key security benefits.
The mitigation of risk with OTPs comes from two different avenues.
The first is mitigating the risk associated with static passwords. Traditional static passwords, if stolen, provide ongoing access until they are changed. OTPs are dynamic and expire after a single use or after a short period of time, limiting the potential damage if they are intercepted or stolen. Another problem is users reusing the same password across multiple services. If one service is compromised, all accounts using the same password are at risk. OTPs eliminate this risk because they are unique for each login session.
The second is the reduction of attack vectors. Because OTPs are typically time-limited, it makes brute-force attacks infeasible. An attacker doesn't have the time to try all possible combinations before the password expires. They also help with phishing. Even if a user is tricked into entering their OTP into a phishing site, the attacker can't reuse that OTP to gain future access to the account.
Additionally, since an OTP is valid for only one login session or transaction, it cannot be reused, preventing replay attacks. In a replay attack, an attacker tries to reuse a password that was intercepted in a previous session. However, if there's a flaw in the system's design where the OTP doesn't expire immediately after use or isn't time-bound, there's a possibility for replay attacks.
OTPs also play a significant role in enhancing identity security and verification processes. They provide an additional layer of protection beyond traditional static passwords, aiding in the confirmation of a user's identity in several ways:
- OTPs are often used as part of a two-factor authentication process. In addition to a traditional username and password (something the user knows), the user must enter an OTP (something the user has, typically their mobile device). This confirms that the user has access to a specific device (like a phone) that is associated with the account, verifying the identity of the user.
- OTPs are commonly used in financial transactions or account changes to verify the identity of the user making the transaction. For example, when conducting a bank transfer or changing account details, an OTP might be sent to the registered mobile number or email address. The user enters the OTP to confirm the transaction, verifying that they are the account holder.
- OTPs are often used in password recovery processes to verify the user's identity. The service sends an OTP to the user's registered email address or mobile number, which the user then enters to verify their identity and proceed with resetting their password.
- When a user logs in from a new device, an OTP might be sent to their registered contact information. The user must enter the OTP to verify they have access to the registered device, confirming their identity and that the new device is trusted.
By integrating OTPs into authentication and verification processes, services can add an extra level of security and significantly reduce the risk of unauthorized access or identity theft.
OTPs aren’t infallible, though. But the associated risks are generally around poor implementation rather than inherent to the method. To ensure OTP effectiveness and avoid some of the above potential vulnerabilities, you can follow some best practices.
These practices are the principles of any good system:
- Secure delivery channel. Use a secure delivery channel for sending the OTP. If you're sending the OTP via email or SMS, ensure the communication channel is secure.
- Encrypt communication. Ensure all communications between the client and the server are done over HTTPS to prevent any interception of the OTP.
- Use secure storage. When storing OTPs on the server side, consider hashing them. This ensures that even if someone gains access to your storage, they cannot obtain the actual OTPs.
These relate to how well you design your OTP algorithm and logic:
- Use a strong OTP. Use an OTP that is long and complex enough to resist brute-force attacks. An OTP with at least 6 digits is usually recommended.
- Time-Bound OTP. Make sure the OTP is valid only for a short period of time. This reduces the window an attacker has to use a stolen OTP. Usually, OTPs are valid for about 2-10 minutes.
- Limit OTP attempts. Implement rate limiting on your OTP endpoints to protect against brute force attacks. After a certain number of incorrect attempts, either block the user or implement a cool-down period.
- Expiry after use. The OTP should expire immediately after it has been used once, to prevent replay attacks.
These help users use your OTP and make sure they don’t turn it off:
- Backup codes. For applications using OTP as a second factor, provide backup codes that the user can write down and use if they lose access to their OTP delivery method (like losing their phone).
- Fallback Options. In case the primary delivery channel fails (e.g., SMS not being delivered), have a secondary option like email or voice call.
Also consider educating users about using OTPs. One of the main threats to OTP use are physical–if an attacker steals a user's phone then they’ll have access to the SMS or email used with OTPs. Or a fraudster can fake a user’s identity to trick a telecoms company into assigning a new SIM with the user’s phone number to them (known as SIM swapping).
While OTPs can greatly enhance security, they are not foolproof. Implementation within a broader security strategy is key.
Let’s walk through setting up a one time password system within Next.js. If you already have a Next.js app up and running you can add this code directly. Otherwise create a new app using:
We’ll also need to use a few modules to help us with our OTPs, namely:
- Twilio. Twilio allows us to send SMS messages programmatically. Here we’re going to use it to send the OTP to the user's phone number via SMS.
- MongoDB. MongoDB is a NoSQL database that we’ll use to store hashed OTPs along with the associated phone numbers and expiry times.
- Upstash. Upstash is a serverless data platform. We’re going to use it’s rate limiter and Redis functionality.
Install these with:
For Twilio and MongoDB, you’ll also need to sign up for accounts and then need your
TWILIO_AUTH_TOKEN, and your
MONGODB_URI. For Twilio, you’ll also need to buy a TWILIO_PHONE_NUMBER that will be used to send your SMS messages.
You’ll also need an account with Upstash, and then your
With that done, we’ll first create the API route that will generate our OTP:
With this code we initially import all our dependencies, then create a handler function for our POST endpoint. The body of the POST request will contain the phone number of the user that we’ll get from the frontend. Within the endpoint, we’re doing a few things:
- Creating a six-digit random OTP
- Hashing that OTP with
- Creating a Twilio client and then sending the OTP to the user’s phone number
- Creating a MongoDB client and storing the OTP along with the user’s phone number and an expiry time for the password.
Is this best practice? Absolutely not. We are doing a few things right, such as setting an expiry time on the OTP and hashing them. But our OTP generating ‘algorithm’ is laughably simple.
Let’s quickly create a frontend for this now:
All this code will just show a single form on the page. On first load this form will ask for the user’s phone number.
When the user enters their phone number and hits submit, the above generateOTP endpoint will be called. This will send the OTP to the user’s phone number:
Hitting submit will also change the form to accept the OTP as the input. The user can then check their phone and enter the six-digit code: and hit submit again to send the OTP and phone number to a verifyOTP endpoint for verification:
When called, this API loads the OTP MongoDB database and finds the one associated with the phone number. It checks whether it has expired, and if not, matches the hashed OTPs. If it's valid, the OTP gets deleted from the database and a 200 code is returned to the frontend.
We could then work that response into any other authentication flow we had set up. We also have a basic rate limiter set into that will make sure a user can’t input more than 2 codes in 3 seconds, to try and prevent brute force attacks:
And that’s it. You have one-time passwords working in Next.js.
This code gives you a one-time password option for Next.js authentication. But we’ve only scratched the surface. We haven’t implemented this within any other authentication flow–this just generates, sends, and verifies the OTP, it doesn’t use it to authenticate the user.
We’ve also generated the OTP in the most basic manner, not following the RFCs and guidelines. We do have some nice best practices–rate-limiting, time-bounding, and expiry–but again these are all basic implementations. We also had to buy a new phone number!
This is the intricacy of OTPs. They are easy to set up, but difficult to get right. Like most authentication methods, it is better to use a provider than trying to create your own. Check out Clerk’s OTP solution here to have these intricacies taken care of for you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948234904.99/warc/CC-MAIN-20240305092259-20240305122259-00253.warc.gz
|
CC-MAIN-2024-10
| 14,192
| 75
|
http://www.techist.com/forums/f75/building-media-center-pc-dvr-88037/
|
code
|
Building a Media Center PC/DVR
I am going to be building a Media Center PC/DVR and I was wondering about a few things. How do I know which Video Cards can potray the recorded data onto the TV in DVD or HDTV quality. I dont' know that much about resolutions, but I am pretty sure HD is 1080pi(not sure about the correct unit). Most computers when connected to a TV are poor quality and you cant even see it that well. I also want to be able to play games on it to, so it must be a decent graphics card.
I usually play games such as:
Half Life 2
and others which are just as, if not more graphically demanding.
Thank you for your help in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721555.36/warc/CC-MAIN-20161020183841-00326-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 644
| 6
|
http://diy.stackexchange.com/questions/tagged/led+safety
|
code
|
Home Improvement Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Is an LED light strip safe to use under a bed?
I see a lot of RGB LED light strips being sold on sites like Amazon etc. The lights appear to be of decent quality, run off of 12V but do need up to 5-6 Amps to power. This is a lot of current, so ...
Jun 5 '12 at 0:44
newest led safety questions feed
Hot Network Questions
Are there any annotated formal verification systems for pure functional programming languages?
Difference between cd / and cd //?
Is email less secure than voicemail, snail mail, or internet portals for transferring sensitive information?
What do I need to consider running an open table dungeon crawl at a multi-day convention?
How to generate a simple cartesian plane system?
How is ArrayOutOfBoundsException possibly in String.valueOf(int)?
Implementing Conway's game of life
Mundane Saving Throws
Are 10x10 matrices spanned by powers of a single matrix?
Results true in a dimension and false for higher dimensions
Example of a divergent sequence
Using Permutations to create numbers
A Christian view of Mohammad
Can I use Mirror Strike on Ink-treader Nephilim when it's not attacking?
Can Harry Potter's Invisibility Cloak hide inanimate objects/Non-sentient beings?
Parallel Capacitor Conundrum
Origin of eject symbol
Not "On the Rocks"
How to minimize the distance between two curves in 3D
My employer wants me to write a guide for doing my job
Why didn't Molly Weasley remember the platform number?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132883.65/warc/CC-MAIN-20140914011212-00029-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 2,086
| 50
|
https://www.timjpeters.com/portfolio/flip-dot-display
|
code
|
I was always enthused about the combinations of technology and mechanics especially in the fields of the so-called 'Internet of Things'. It almost feels like we as designers are the successors of the engineers of the early industrialization. New production techniques and methods make it even more comfortable to rapidly prototype and create new tangible devices and bring own ideas into the physical world.
This project started with the idea to build my own mechanical solid-state display. A display which does not need electricity in a solid state but can be updated digitally. Therefore in an iterative process I designed modular grid elements which contained multiple small cubes with a white and black side. By turning the white or black side of those little cubes in the grid to the front side a pattern or even text (with a line height of 5 dots) could be displayed. A simple analogue display was created.
The grid parts where designed modularly so that they could be combined to a track of variable length. A small 'train' – controlled by a microcontroller – was engineered to drive along this track to rotate the cubes using just five linear motors (solenoids) controlled by a little web server on a chip (ESP8622) and multiple sensors.
This started as an early project to gain experience in the world of microelectronics and 3D printing. The project additionally involved developing the firmware for the train including a web interface to upload new patterns or texts to be displayed. A custom circuit board was designed to connect and control all the hardware components.
Nevertheless in the end the biggest challenge turned out to be the mechanical part. How do I make the cubes stop their rotation at the exact two intended positions? What's the best way to drive the train without wedging and at an consistent speed? There was just no accurate example for such questions.
I started building this system in one of my last bachelor's classes but as of today I'm still working on it and refining it from time to time.
This project was partly inspired by Berg's Pixel Track case study.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473518.6/warc/CC-MAIN-20240221134259-20240221164259-00437.warc.gz
|
CC-MAIN-2024-10
| 2,099
| 7
|
https://www.serenity-dojo.com/serenity-dojo-apply-today48461876
|
code
|
Of course, you could most likely do all this yourself.
But many students find that, while they can apply Active Learning on their own, they progress much faster when they have the support of an expert coach or a community of like-minded learners.
Others struggle to know where to start or how to structure their learning, so get better results with some outside help.
With the guidance of an experienced mentor, it's WAY easier to identify the most important topics you need to focus on, overcome obstacles more quickly, and gain clarity on the best practices and strategies for mastering test automation and applying it in the real world.
And being part of a learning community is also a great way to help you stay motivated, focused, and on track towards achieving your learning objectives.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00522.warc.gz
|
CC-MAIN-2023-40
| 792
| 5
|
https://buybitcoinuk.co.uk/other-bitcoin-news/satoshi-nakamoto-identified/
|
code
|
According to the article, the NSA compared Satoshi’s writings with trillions of writings across the internet. Creating a Satoshi fingerprint they were able to match this up with other writing fingerprints (using the power of a supercomputer of course) and bingo, they were able to unmask Nakamoto.
Technology moves fast these days and as soon as one back door closes another one opens up. So the NSA appear to be able to trace people by their own words and some are not happy about this. Cue the “Document Anonymization Tool” a GitHub project that does what it says on the tin. I’m interested to see where all this goes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00472.warc.gz
|
CC-MAIN-2020-29
| 628
| 2
|
http://andriybuday.com/2016/11/do-not-misuse-or-over-abstract-automapper.html
|
code
|
Since that time I observed few things:
Mapare still there and work the same. At the same time performance, testability, exception handling, and feature richness got improved significantly. Last one, in my opinion, is not such a good thing as it leads to the next point.
AfterMapor in different kinds of resolvers would simply start containg crazy things. In worst of those cases actual business logic was written in resolvers.
I have always been of an opinion:
Less Code – Less Bugs; Simple Code – Good Code.
Having seen this trend with the library, I would like to suggest simplifying its usage by limiting ourselves. Simply:
ForMembermethod it may be the case for doing it manually (at least for the specific type) – it will be cleaner and less confusing.
Mapper.Initializemethod. If you still want to have at least some abstraction to avoid referencing AutoMapper everywhere make it simple.
Here is how I’m using AutoMapper these days:
Somewhere in CommonAssembly a very-very simple abstraction (optional):
Somewhere in BusinessLogicAssembly and any other where you want to define mappings (can be split in as many profiles as needed):
Somewhere in startup code in BootstrappingAssembly (
And here is the usage:
That’s it. I do not understand why some simple things are made complex.
There is also another advantage of keeping it minimalistic – maintainability. I’m working on a relatively new project that was created from a company’s template, as a result it had older version of AutoMapper abstracted. To upgrade it and keep all old interfaces would mean some work as abstraction used some of the APIs that did change. Instead I threw away all of these abstractions and upgraded the lib. Next time upgrading there simply will be way less code to worry about.
Please let me know if you share the same opinion.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812327.1/warc/CC-MAIN-20180219032249-20180219052249-00288.warc.gz
|
CC-MAIN-2018-09
| 1,830
| 16
|
http://stackoverflow.com/questions/9851708/decoding-%c3%84-%c3%9c-%c3%96-in-php-and-mysql
|
code
|
I have problems decoding several Chars.
In the Database, the Chars Ä, Ö and Ü are saved like "ö" or "�"
Any Idea how i can decode those Chars back to ÄÖÜ?
If i remeber correctly you have to change dóthe data type to BLOB first, then you can reset the data type to VARCHAR or something similar with UTF8 encoding. Remember: the database, the table and all of the columns collation have to be UTF8 and even the connection to the database and the output encoding (for example as HTML output the charset header).
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257822172.7/warc/CC-MAIN-20160723071022-00222-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 523
| 4
|
http://forums.slipstick.com/threads/83215-edge-hub-testing/
|
code
|
I am in the process of setting up Exchange 2010 in my Exchange 2003 system. i currently have my CAS array setup with hub transport installed. I have successfully setup my edge transport in my dmz and have setup the subscription and verified connectivity by using the command test-edgeSynchronization and it comes out successful. What i would like to try is to test this setup via telnet to edge server and send an email. I would like to know if it is possible to send an email this way to one of the email boxes that still resides on my exchange 2003 server. Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141396.22/warc/CC-MAIN-20200216182139-20200216212139-00440.warc.gz
|
CC-MAIN-2020-10
| 566
| 1
|
https://www.xillio.com/migration/migrate-alfresco-to-sharepoint-online-and-office-365-xillio
|
code
|
- Microsoft 365 Solutions
- Content Insights
- Content Migrations
- Customer Cases
Many organizations are replacing their 'old' enterprise content management system, e.g., Documentum, with Alfresco, and migrating content from Alfresco to an alternative system, e.g., SharePoint. Some companies even use multiple systems, e.g., SharePoint as a front-end and Alfresco as a back-end. With the connector of Alfresco, SharePoint, and many other systems, we are here to help you configure your ECM system in the way you like.
Xillio has many years of experience migrating content into and out of Alfresco. We know how to extract data in bulk from Alfresco and load it in another system, and how to deal with file classification and credential permission. With Xillio connectors, your content migration is well-handled.
Using Xillio Insight, we can analyze the Alfresco data to help you understand the content and metadata in your system and facilitate data-driven decision-making for cleaning up, enrichment, restructuring, and migrating your content.
Xillio’s fast and reliable approach and solution help determine the mapping and transformation of the source data in order to make it compatible with the new SharePoint metadata model. Importing the data into SharePoint Online, Office 365, Microsoft 365, or OneDrive is done with Xillio’s migration connector.
Xillio’s software has been specifically designed to support any content migration from and to any content management system. Packed with smart features and supported by our experienced consultants, our tooling guarantees the success and accuracy of any content migration project.
In this video, we demonstrate how we migrate content from an Alfresco instance to SharePoint Online. We will show how we extract the content and save the data in our data model. Then we transform the data so that the Alfresco content fits the new SharePoint data model. Finally, we will load the transformed content into SharePoint Online.
Xillio supports content migrations to and from any source and target system. Below is some further information about how we migrate content and data from Alfresco to SharePoint Online. To know more about our previous projects, you can take a look at our customer page.
Xillio helped a renowned space organization migrate highly secure content from multiple Alfresco instances to Microsoft SharePoint Online.Read case →
Fill out the form and we will contact you shortly
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817181.55/warc/CC-MAIN-20240417204934-20240417234934-00304.warc.gz
|
CC-MAIN-2024-18
| 2,452
| 13
|
https://blog.vpn.ac/simultaneous-connections-6.html
|
code
|
We just changed the maximum allowed simultanous connections for a single VPN account to 6, from 3 initially for standard accounts - and to 3 from 2 initially for the 1 Week trial accounts. The change is into effect immidiately and applies to all VPN accounts (existing and new).
Why the change?
There are two reasons why we decided to make this account upgrade.
Solving Auth Failed issues on reconnection attempts:
Under certain circumstances usually depending on how the user connects (what software, protocol etc.), the VPN client doesn't send a "clean close" notice to the server, meaning that sudden disconnect/reconnect actions may result in an attempt to by-pass the limit of 3 simultaneous connections allowed per account. The servers would normally notify the auth backends of timeouts in case of unexpected drops of connections, but it takes at least a minute (timeframe to detect that a client disconnected). Therefore, legitimate re-connection attempts might be flagged as attempts to pass the 3-connections threshold per account if they occur too fast(within a minute), resulting in failed login attempts.
Considering the feedback we received and our experience, we believe that 3 to 5 simultaneous connections should be enough for most people. The 6th connection should be useful in case of fast-reconnects without cleanly close the previous sessions (i.e. too quick for the server(s) to send a time-out notice to the backends).
Listening to suggestions:
The change also comes as a response to suggestions that we received from customers. Quite a few of our customers wanted to be able to connect 4 or even 5 devices at the same time, so we decided to honor this specific request without changing pricing or adding "addons".
We hope that this change is welcomed by our users, either to solve some re-connection issues or just to be able to use more devices at the same time with a single account.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00246.warc.gz
|
CC-MAIN-2023-50
| 1,909
| 9
|
https://simtk.org/frs/?group_id=1056
|
code
|
There are two releases of STAMS on this page. Version 1.2 depends on an older version of igraph (e.g. 0.7.1). Version 1.8 uses the current version of igraph (1.0).
There are major changes in data representation and user interface in igraph 1.0.
The STAMS 1.2 + igraph 0.7.1 combination is our stable release and runs in about 4-5 days on a single processor.
STAMS 1.8 + igraph 1.0 is implemented in parallel, and is still being tested on large datasets. It works well on small sets.
See the "Documents" tab above for the README about setting up a STAMS run.
Aug 12, 2016
STAMS 1.2 is the most stable release and we recommend using it. However...
STAMS 1.8 works with the new igraph, and runs the searches in parallel using the parallel package in R. One small test sets, it works well. We are still testing larger runs.
I recommend running an interactive job on your cluster to run this package in parallel. Depending on what kind of scheduler your cluster uses, there are parallelization packages that will allow you to submit it as a batch script and not an interactive job. On SLURM, I use rslurm from CRAN. The main function takes a cluster as an argument, and you can set up that cluster however you like. View License
Aug 11, 2016
The latest STAMS package. See the ?STAMS for a working example.
Jun 27, 2016
STAMS 1.2 works with older igraph version 0.7.1. It runs on a full network in 4-5 days on a single processor. It is our stable release.
There are major data structure and UI differences between the two igraph versions. STAMS 1.2 will not work with igraph > 1.0. View License
Jun 27, 2016
This version of STAMS works with older versions of igraph (including 0.7.1). There were major data representation and UI changes in igraph 1.0 which cause this version of the code to run very slowly with igraph 1.0.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500365.52/warc/CC-MAIN-20230206212647-20230207002647-00262.warc.gz
|
CC-MAIN-2023-06
| 1,817
| 16
|
https://community.forestadmin.com/t/users-can-edit-fields-that-are-marked-as-read-only/907
|
code
|
This used to work as expected (i.e. users couldn’t edit) but has suddenly stopped sometime over the last week or two.
Fields on a collection are marked as read-only, and then user should not be able to edit them.
Users can edit fields that are marked as read-only.
Please provide any relevant information about your setup.
Node.js + Express + Postgres
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400189264.5/warc/CC-MAIN-20200918221856-20200919011856-00456.warc.gz
|
CC-MAIN-2020-40
| 353
| 5
|
https://teamcity-support.jetbrains.com/hc/en-us/community/posts/206877695-Problems-migrating-to-database-mssql-
|
code
|
I cannot get the maintainDB script to work. I've followed the instructions for setting up the database; created a database.sqlserver.properties file placed in the .BuildServer/system folder. This the command i'm using...
maintainDB migrate -T c:\Users\Sean\.BuildServer\system\database.sqlserver.properties
and the result...
C:\TeamCity\bin>maintainDB migrate -T C:\Users\Sean\.BuildServer\system\database.sqlserver.properties
Java executable is found: 'java'.
TeamCity maintenance tool. Copyright 2011 JetBrains s.r.o. All Rights Reserved.
Command line arguments: migrate -T C:\Users\Sean\.BuildServer\system\database.sqlserver.properties
Using TeamCity data directory: C:\Users\Sean\.BuildServer
Cannot proceed with 'migrate' command: Source database not specified and not found.
Critical error has occurred during command execution.
and here is the properties file
# The maximum number of connections TeamCity can open on database server.
# Specifies whether TeamCity should check each jdbc connection before use.
# It reduces the system performace but avoids cases when the system uses
# a connection that was closed by database server due to time out or this
# connection was broken at the previous operation.
Any ideas why this isn't working?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710813.48/warc/CC-MAIN-20221201121601-20221201151601-00607.warc.gz
|
CC-MAIN-2022-49
| 1,248
| 17
|
http://www.deenabio.com/services/gbs-adapters
|
code
|
GBS Barcode Generator
A Major update v2.0 of the barcode generating algorithm has been implemented on 12-6-2012. This results in 100x faster performance, less variation in nucleotide distribution but also a different order and composition of barcodes compared to the previous version (1.0a). If for whatever reason you require output from the previous version, please click the radio-button at the bottom of the form.
Genotyping by sequencing (GBS) is a simple highly-multiplexed system for constructing reduced representation libraries for the Illumina next-generation sequencing platform developed in the Buckler Lab at Cornell. Key components of the system are: reduced sample handling, fewer PCR and purification steps, no size fractionation and inexpensive barcoding. They use restriction enzymes to reduce genome complexity and avoid the repetitive fraction of the genome.
One of the difficulties in developing this technology was the complexity of generating a lot of barcodes that generate high quality libraries. Since the sequenced fragments all contain an enzyme recognition site this leads to identical nucleotides directly after the barcode if one uses one length of barcodes.
In the context of my PhD project at NIOO KNAW I followed a course at the Buckler lab. I decided to contribute by developing a script for generating Barcoded adapters satisfying the following criteria:
- Barcodes ( ligated to rescriction fragments) do not recreate enzyme restriction site.
- Every barcode differs from all other barcodes by at least 3 mutational steps.
- Barcodes can be modulated in length between 4 and 10 (possibly more) bases.
- The balance of nucleotides at every position in the barcodes is maintained as much as possible.
- Mononucleotide runs are not allowed by default. The threshold can be set by a parameter.
- Smaller Barcodes do not nest in larger barcodes, thus avoiding confusion in downstream bioinformatics.
- The script produces an identical output for identical queries, thus allowing for standardization across labs
Generating Barcodes usually takes less than 5 minutes. It is mainly dependent on the number of possible combinations of barcodes as determined by the maximum barcode length. The script has been tested for barcodes up to length 10.
Please file tickets for all possible bugs and feature requests here.
For question and comments:
This software is provided “as is,” without warranty of any kind, express or implied. In no event shall Deena Bioinformatics or Thomas van Gurp be held liable for any direct, indirect, incidental, special or consequential damages arising out of the use of or inability to use this software.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218193284.93/warc/CC-MAIN-20170322212953-00258-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 2,662
| 16
|
http://www.aeriagames.com/forums/en/viewtopic.php?t=1297713
|
code
|
PLEASE READ ME FIRST
Aeria does not own, nor do they have any control over intermediate nodes. This is a problem out of anybody's control. Real-time gaming applications will be the most obviously affected services. People that are connecting through these problem nodes are also using them to connect to Aeria's website. Anybody whose connection is routed through these nodes will be experiencing issues, no matter what they're trying to do.
The nodes that are causing issues are owned by people who run the Tier 1 and Tier 2 networks that make up the Internet. I'm sure they actively monitor and strive to resolve all issues immediately, because issues with nodes can affect everyone worldwide (trying to reach a server through a slow node is slow for everyone, no matter where you live).
What does that mean?
Think of the node as a bridge that connects two main roads. Think of your packets as cars that can only travel a pre-determined path. The broken node is a faulty bridge that keeps randomly dropping cars. Any car that needs to travel across that bridge risks being dropped.
If you're trying to drive from your house to Walgreen's, and the bridge between you drops your car whenever you try to cross, Walgreen's can't do anything to fix it. The people that maintain the roads and bridges need to come to fix it.
How can I help?
- Run the command prompt (WindowsKey+R, "cmd"), or in your start menu, find "Command Prompt"
- Determine which IP you check, based on your server (not terribly important that you pick the right one, but if it's localized to one server, it will help diagnose that).
- In your command prompt, type "tracert " and the IP address that matches your server
- Take a screenshot and post it here, or copy/paste your tracert results in [ code] tags.
Tracing route to ip-174-142-117-10.static.privatedns.com [184.108.40.206]
over a maximum of 30 hops:
1 <1 ms <1 ms <1 ms 192.168.1.1
2 6 ms 5 ms 5 ms 10.11.0.1
3 5 ms 7 ms 5 ms ctt191109.ceinetworks.com [220.127.116.11]
4 7 ms 6 ms 5 ms ctt191166.ceinetworks.com [18.104.22.168]
5 11 ms 11 ms 11 ms h22.214.171.124.static.ip.windstream.net [126.96.36.199]
6 11 ms 11 ms 11 ms h188.8.131.52.static.ip.windstream.net [184.108.40.206]
7 39 ms 21 ms 21 ms h220.127.116.11.static.ip.windstream.net [18.104.22.168]
8 22 ms 21 ms 21 ms h22.214.171.124.static.ip.windstream.net [126.96.36.199]
9 22 ms 21 ms 21 ms xe-10-0-0.bar2.Cleveland1.Level3.net [188.8.131.52]
10 31 ms 35 ms 31 ms ae-9-9.ebr2.Chicago1.Level3.net [184.108.40.206]
11 34 ms 31 ms 42 ms ae-1-100.ebr1.Chicago1.Level3.net [220.127.116.11]
12 51 ms 51 ms 51 ms ae-10-10.car2.Montreal2.Level3.net [18.104.22.168]
13 136 ms 55 ms 207 ms ae-11-11.car1.Montreal2.Level3.net [22.214.171.124]
14 52 ms 107 ms 74 ms te6-2.cl-core05.level3.mtl.iweb.com [126.96.36.199]
15 55 ms 64 ms 53 ms te8-2.v0708.cl-car08.mtl.iweb.com [188.8.131.52]
16 56 ms 51 ms 57 ms ip-174-142-117-10.static.privatedns.com [184.108.40.206]
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123276.44/warc/CC-MAIN-20170423031203-00179-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,946
| 29
|
https://www.comses.net/users/?tags=fire
|
code
|
Land cover changes spatial agents based modelling
Forest fire risk modelling
Geographical information based modelling
Decision support for land planning
I am an environmental archaeologist, specializing in charcoal analysis, computational and analytical proxy modeling, and quantitative methods to understand the dynamic relationship between fire, humans, and long-term environmental change. I work primarily in the Western United States and the Western Mediterranean. I am passionate about our public lands and ensuring that everyone has access and opportunity to experience them.
Envrionmental Archaeology, Fire Ecology, GIS, Agent-based modeling, Geoarchaeology
Graduate student in Disaster Science and Management at the University of Delaware.
B.S. in Fish and Wildlife from Michigan State University in 1996. M.S. in Wildlife Ecology from the University of Maine - Orono in 2001. Employed by the Michigan Department of Natural Resources since 2003, first as a field biologist (2003-2008), then statewide endangered species coordinator (2008-2012), and currently as the statewide (climate) adaptation program lead (2012-present). Also currently a graduate student in the Boone and Crockett Quantitative Wildlife Center at Michigan State University (2015-present). Father, gardener, hiker, and amateur myxomycologist.
Human-wildlife social-ecological systems, resilience and learning in complex adaptive systems, climate change, disturbance ecology, and historical ecology
My research focuses on building a systemic understanding of coupled human-natural systems. In particular, I am interested in understanding how patterns of land-use and land-cover change emerge from human alterations of natural processes and the resulting feedbacks. Study systems of interest include those undergoing agricultural to urban conversion, typically known as urban sprawl, and those in which protective measures, such as wildfire suppression or flood/storm impact controls, can lead to long-term instability.
Dynamic agent- and process-based simulation models are my primary tools for studying human and natural systems, respectively. My past work includes the creation of dynamic, process-based simulation models of the wildland fires along the urban-wildland interface (UWI), and artificial dune construction to protect coastal development along a barrier island coastline. My current research involves the testing, refinement, extension of an economic agent-based model of coupled housing and land markets (CHALMS), and a new project developing a generalized agent-based model of land-use change to explore local human-environmental interactions globally.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00539.warc.gz
|
CC-MAIN-2023-14
| 2,645
| 11
|
http://macadder.blogspot.com/2008/06/i-knew-it.html
|
code
|
Just saw that Apple is releasing a new version of the iPhone next month. A new version of the iPhone at half the price of the current iPhone. A new verson of the iPhone at half the price of the current iPhone and it has 3G capability.
Were I an Apple user, I'd have to admit to being pretty happy at hearing this. Were I one of the drones who stood in line to pay top dollar to be the first to get one of these beauties only to hear that a year later the phone was being updated to something faster, sleeker, and dare I say - cheaper, I'd have to be pretty ticked.
I know that technology marches on and that faster, better, cheaper is an inevitability (nee Moore's Law), but I'm wondering how long Apple can keep doing this and keep the love affair going. Apple suffered a near mutiny last Summer when they had to issue rebates to existing iPhone users who found themselves behind the adoption curve in an abnormally short period of time.
From my perspective, I was probably one of the last people to get an iPod. I have to give Apple props for design and utility, but I can't give them much more than that. Their business model is intriguing as it's built partly on user devotion; something that Microsoft, Dell, or any of the other OS and hardware developers cannot claim (Linux being the big exception here). I can't give them props for longevity. I realize the very nature of the computer industry is built upon needing the latest and greatest thing but is that always the case? A few years back, Microsoft introduced Windows XP. Not as groundbreaking as the introduction of Windows 95, but to date it's been their best selling (and best designed in my opinion) operating system. Vista was introduced but Microsoft soon discovered that it's biggest competitor was not the Macintosh or Linux, but venerable Windows XP. It still worked and didn't require a hardware upgrade to take advantage of all that the OS had to offer. Makers of the Blu Ray DVD format are realizing that their biggest competitor was not HD-DVD, but the huge installed base of traditional low cost standard definition DVD players that can be had for well under $100 and look surprisingly good on even a high definition television (with the appropriate connections - props to Ensign Eddie for that observation). All this to say that maybe it's time that high technology look at the next quarter century, and not the next quarter.
I've got no problem paying a fair price for something that will be useful in the long term. I also think that I am not alone in that thought.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267868135.87/warc/CC-MAIN-20180625150537-20180625170537-00148.warc.gz
|
CC-MAIN-2018-26
| 2,544
| 5
|
https://forum.vassalengine.org/t/barbarossa-to-berlin-v2-4-flipping-cards-not-working-at-the-moment/75481
|
code
|
Using VASSAL 3.6.7 BtB v2.4
I want to be able to flip these cards to show the back of the card when playing solo.
Currently, if I flip the card, it just goes slightly gray and does not change to the graphic of the back of the card. What do I need to do ?
I’ve not dabbled with editor before so be gentle !
Try investigating the Mask trait that you will find on the cards somewhere - perhaps in a Prototype.
There are several options for how the mask will appear to the card owner - from your description it sounds like the current setting is for a transparent gray image that overlays the cards.
You can instead select the mask to show the back of the card.
If BtB uses predefined scenarios, then you will need to do a Refresh Counters to apply your change to the scenarios; there are two versions- one at a time for the currently open game or - from the editor onoly - a version that refreshes all scenarios in the entire module.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00637.warc.gz
|
CC-MAIN-2022-40
| 932
| 8
|
https://meta.discourse.org/t/difficult-to-tell-that-watched-category-notifications-are-to-the-forum/96418
|
code
|
I’ve got a community of mostly older and non-technical users. Several times people have responded to email notifications to a public post as if the notification were sent to them rather than to the forum (or the person that the message was a reply to). In gmail, for instance, I see this:
If I expand “to pfaffman” I see that the message was sent to my email address, which still makes it look (to someone less familiar with Discourse than I am) like David is replying to me personally rather than to whomever he’s replying to.
I’m not quite sure how to fix this, perhaps if it said "David Kingham to
<category name>" or "David Kingham to
Is there a way to do that in customize text content? There are dozens of items with “email” in them and I’m not sure how to start paring it down.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107919459.92/warc/CC-MAIN-20201031151830-20201031181830-00711.warc.gz
|
CC-MAIN-2020-45
| 800
| 5
|
https://community.tableau.com/message/863302?tstart=0
|
code
|
Hi Zhouyi Zhang,
Thank you for your kind reply,
The output should be based on month filter selection. If the user select a month as 'Nov 2018' from month filter and if the parameter is 3 months, then view should look which are the ID's had WL flag as 'Y' continuously for previous 3 months from the month of Nov 2018.
So the above result it is working fine for 3 month parameter selection. but it is not working fine for other parameter selections.
When i select 6 month value in the parameter the expected output should be 'nothing' becoz all the client ID's are not meet the condition that before Nov2018 there are no continuous WL flag as 'Y' for 6 months. this is same for 9 month and 1 year.
Suppose if user select the month filter as July 2018 and if the parameter is 3 month then nothing. and if parameter is 6 month then Client id 9 should display as its meets the condition that before july 2018 this ID 9 has continuous WL flag 'Y' for 6 months.
Thanks in advance,
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144429.5/warc/CC-MAIN-20200219214816-20200220004816-00057.warc.gz
|
CC-MAIN-2020-10
| 974
| 7
|
https://community.familysearch.org/en/discussion/131109/'+ele.url+'
|
code
|
I was looking at relative finder and there were 12 famous relatives. Not even 5 minutes passed and it was cut down to 4 famous relatives. Where did they go in such a short time?
Somewhere between you and the 8 vanishing relatives the tree was edited, removing a link. Use your tree viewer, selecting Fan Chart, and you may spot where the change occurred. It is likely to be just one change.
either that - or because of a load on the system - the number of generations and people the algorithm looked at could have changed between your first and last run.
sometimes because of heavy use on the system - that can vary from one moment to another - the number of generations back that are checked can vary.
(the utility probably has some sort of time limit - for the records it gathers and analyzes. - and due to that time limit - coupled by different loads on the system at differing times can vary your results)
I would not at all be surprised to see if you try it again the 8 vanishing relatives could re-appear
but as other responders have pointed out - it may have been that a single connection (that was changed) - could have been on the link to all those same 8 people. (especially if they were royalty of the middle ages)
Small changes can have big effects.
In any event, the tree you see is just an entry point to much more work: look carefully at all historical records attached to each ancestor and determine if each child-parent relationship is documented.
In one family I study a certain child-parent relationship was published 70 years ago but not a single historical record has been found to substantiate it. The family is otherwise very well documented, with 20, 30, 40 records per person. Cutting that one link removed many thousands of ancestors from the pedigrees of every descendant of that child.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475711.57/warc/CC-MAIN-20240301225031-20240302015031-00004.warc.gz
|
CC-MAIN-2024-10
| 1,813
| 10
|
https://ayanova.com/AyaNova7webHelp/ayanova_network_installation.htm
|
code
|
Navigation: Network & Remote Installation >
AyaNova network installation
On initial installation, both the AyaNova program and the database are installed to the local hard drive - this is the stand-alone default installation
You can also configure AyaNova for use in a network environment
•AyaNova can be configured for network use using either the network Firebird Server, SQL Express and SQL Server. AyaNova is not compatible with MySQL.
•The image below shows an example of a AyaNova network installation - local networked computers run the AyaNova program connecting to the networked AyaNova database on the server.
1. For network installation, we provide specific steps depending on which database server you wish to use
•See the section Which database server should I use? to help you decide
2. Once you determine which database server you want to use, you follow the specific steps for that database server
•The specific steps you follow in the link above go through installing the AyaNova program at the database server, configuring the database server, set up of the AyaNova database for network use with that database server, editing of the AyaNova configuration file on the server so that it accesses the networked AyaNova database, and installation and configuration of AyaNova at the users computers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00443.warc.gz
|
CC-MAIN-2022-33
| 1,321
| 10
|
http://www.sciamdigital.com/index.cfm?fa=Products.ViewIssuePreview&ARTICLEID_CHAR=C621C617-237D-9F22-E84E2B9E9B537413
|
code
|
Forum: Fudge Factor; November 2010; Scientific American Magazine; by Scott O. Lilienfeld; 1 Page(s)
As of this writing, the precise nature of Marc Hauser’s transgressions remains murky. Hauser is Harvard’s superstar primate psychologist—and, perhaps ironically, an expert on the evolution of morality—whom the university recently found guilty of eight counts of scientific misconduct. Harvard has kept mum about the details, but a former lab assistant alleged that when Hauser looked at videotapes of rhesus monkeys, in an experiment on their capacity to learn sound patterns, he noted behavior that other people in the lab couldn’t see, in a way that consistently favored his hypothesis. When confronted with these discrepancies, the assistant says, Hauser asserted imperiously that his interpretation was right and the others’ wrong.
Hauser has admitted to committing “significant mistakes.” In observing the reactions of my colleagues to Hauser’s shocking comeuppance, I have been surprised at how many assume reflexively that his misbehavior must have been deliberate. For example, University of Maryland physicist Robert L. Park wrote in a Web column that Hauser “fudged his experiments.” I don’t think we can be so sure. It’s entirely possible that Hauser was swayed by “confirmation bias”—the tendency to look for and perceive evidence consistent with our hypotheses and to deny, dismiss or distort evidence that is not.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704943681/warc/CC-MAIN-20130516114903-00060-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,459
| 3
|
https://diveintopython.org/jobs/experienced-software-engineer-java-python-full-stack-or-back-end-3522
|
code
|
Push the limits of what’s possible with us as an experienced member of our Software Engineering team. As an experienced Software Engineer at JPMorgan Chase, you serve as member of an agile team to design and deliver trusted market-leading technology products in a secure, stable, and scalable way. Depending on the team that you join, you could be developing mobile features that give our customers and clients more control over how they bank with us, strategizing on how big data can make our trading systems quicker, creating the next innovation in payments for merchants, or supporting the integration of our private and public cloud platforms.
- Participates in, design and develop scalable and resilient systems using Java or Python to contribute to continual, iterative improvements for product teams
- Executes software solutions, design, development, and technical troubleshooting
- Creates secure and high-quality production code and maintains algorithms that run synchronously with appropriate systems
- Produces or contributes to architecture and design artifacts for applications while ensuring design constraints are met by software code development
- Gathers, analyzes, synthesizes, and develops visualizations and reporting from large, diverse data sets in service of continuous improvement of software applications and systems
- Identifies hidden problems and patterns in data and uses these insights to drive improvements to coding hygiene and system architecture
- Contributes to software engineering communities of practice and events that explore new and emerging technologies
- Adds to team culture of diversity, equity, inclusion, and respect
Required Qualifications, Capabilities, And Skills
- Hands-on practical experience in system design, application development, testing and operational stability
- Proficient in coding in Java or Python languages
- Experience in developing, debugging, and maintaining code in a large corporate environment with one or more modern programming languages and database querying languages
- Overall knowledge of the Software Development Life Cycle
- Understanding of agile methodologies such as CI/CD, Applicant Resiliency, and Security
- Knowledge of software applications and technical processes within a technical discipline (e.g., cloud, artificial intelligence, machine learning, mobile, etc.)
Preferred Qualifications, Capabilities, And Skills
- Familiarity with modern front-end technologies
- Exposure to cloud technologies
Your Role Level
JPMorgan Chase is looking to hire Software Engineers at Software Engineer II and Software Engineer III levels. A determination will be made on placement for successful candidates based on the results of a skills-based assessment which applicants will be asked to complete during the hiring process, as well as, the candidate interview. The assessment will evaluate ability to perform basic coding and systems design responsibilities. For the Software Engineer II level, the role requires the ability to understand advance features of a coding language, design a viable system, and solve functional problems through basic language applications. For the Software Engineer III level, the role requires a higher level of proficiency and the ability to function independently, including the ability to use and explain advance features of a coding language, design systems across technologies and platforms, solve functional and non-functional problems through an application of language best practices, as well as, the ability to assess issues broadly, identify alternative or innovative solutions, collaborate effectively, and provide guidance to others.
JPMorgan Chase& Co., one of the oldest financial institutions, offers innovative financial solutions to millions of consumers, small businesses and many of the world’s most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans over 200 years and today we are a leader in investment banking, consumer and small business banking, commercial banking, financial transaction processing and asset management.
About The Team
Our Corporate Technology team relies on smart, driven people like you to develop applications and provide tech support for all our corporate functions across our network. Your efforts will touch lives all over the financial spectrum and across all our divisions: Global Finance, Corporate Treasury, Risk Management, Human Resources, Compliance, Legal, and within the Corporate Administrative Office. You’ll be part of a team specifically built to meet and exceed our evolving technology needs, as well as our technology controls agenda.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817670.11/warc/CC-MAIN-20240420153103-20240420183103-00898.warc.gz
|
CC-MAIN-2024-18
| 4,678
| 24
|
https://www.informit.com/authors/bio/12765128-0E7A-4053-B5DD-4E6ADF350612
|
code
|
Chris Sells is the VP of the Developer Tools Division at Telerik. He's written several books, including Programming WPF, Windows Forms 2.0 Programming, and ATL Internals. In his free time, Chris makes a pest of himself on Microsoft forums and mailing lists. More information about Chris and his various projects is available at http://www.sellsbrothers.com.
Don Box is a Distinguished Engineer at Microsoft. At Microsoft, Don has worked on platform and developer technologies for .NET, SQL, and most recently, Xbox. Prior to Microsoft, Don roamed the earth helping developers come to terms with COM, Including writing Essential COM for Addison-Wesley.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474663.47/warc/CC-MAIN-20240226194006-20240226224006-00328.warc.gz
|
CC-MAIN-2024-10
| 651
| 2
|
https://subscanner.com/TrcCbdWwCBc
|
code
|
- [Voiceover] Hello and welcome
to multivariable calculus.
So I think I should probably start off
by addressing the elephant in the living room here.
I am, sadly, not Sal,
but I'm still gonna teach you some math.
My name is Grant.
I'm pretty much a math enthusiast.
I enjoy making animations of things when applicable,
and boy, is that applicable
when it comes to multivariable calculus.
So, the first thing we gotta get straight
is what is this word multivariable
that separates calculus, as we know it,
from the new topic that you're about to study?
Well, I could say it's all about multivariable functions,
that doesn't really answer anything
because what's a multivariable function?
And basically, the kinds of functions
that we're used to dealing with,
in the old world, in the ordinary calculus world,
will have a single input, some kind of number
as their input,
and then the output is just a single number.
And you would call this a single variable function.
Basically because that guy there is the single variable.
So then a multivariable function
is something that handles multiple variables.
So, you know, it's common to write it as x, y,
it doesn't really matter what letters to use,
and it could be, you know, x, y, z,
x one, x two, x three, a whole bunch of things,
but just to get started,
we often think just two variables
and this will output something that depends on
both of those.
Commonly it will output just a number,
so you might imagine a number that depends on
x and y in some way, like, x squared plus y,
but it could also output a vector, right?
So you could also imagine something that's
got multivariable input, f of x, y,
and it outputs something that also has
multiple variables, like,
I mean I'm just making stuff up here,
three x and, you know, two y.
And, this isn't set in stone,
but the convention is to usually think
if there's multiple numbers that go into the output,
think of it as a vector,
if there's multiple numbers that go into the input,
just kind of write them,
write them more sideways like this,
and think of them as a point in space.
Because, I mean when you look at something like this,
and you've got an x and you've got a y,
you could think about those as two separate numbers.
You know, here's your number line
with the point x on it somewhere,
maybe that's five, maybe that's three,
it doesn't really matter.
And then you've got another number line
and it's y, and you could think of them
as separate entities.
But, it would probably be more accurate
to call it multidimensional calculus,
because, really, instead of thinking of, you know,
x and y as separate entities,
whenever you see two things like that
you're gonna be thinking about the x y plane.
And thinking about just a single point.
And you'd think of this as a function that takes a point
to a number,
or a point to a vector.
And a lot of people, when they start
teaching multivariable calculus,
they just jump into the calculus,
and there's lots of fun things,
partial derivatives, gradients,
good stuff that you'll learn.
But I think first of all,
I want to spend a couple videos
just talking about the different ways
we visualize the different types
of multivariable functions.
So, as a sneak peak,
I'm just gonna go through a couple of them
really quickly right now,
just so you kind of whet your appetite
and see what I'm getting at,
but the next few videos are going to go through them
in much, much more detail.
So, first of all, graphs.
When you have multivariable functions,
graphs become three dimensional.
But these only really apply to functions that have
some kind of two-dimensional input,
which you might think about as living
on this x y plane,
and a single number as their output
and the height of the graph
is gonna correspond with that output.
Like I said, you'll be able to learn much more
about that in the dedicated video on it,
but these functions also can be visualized
just in two dimensions, flattening things out.
Where we visualize the entire input space
in associated color, with each point.
So this is the kind of thing where you, you know,
you have some function
that's got a two-dimensional input,
that would be f of x, y,
and what we're looking at is the x y plane,
all of the input space,
and this output's just some number,
you know, maybe it's like x squared,
this particular one is an x squared,
but, you know that,
and maybe some complicated thing,
and the color tells you roughly the size
of that output, and the lines here,
called contour lines,
tell you which inputs all share a constant output value.
And again, I'll go into much more detail there.
These are really nice, much more convenient
than three-dimensional graphs,
to just sketch out.
Moving right along,
I'm also gonna talk about surfaces
in three-dimensional space.
They look like graphs,
but they actually deal with a much different animal,
that you could think of it as mapping two dimensions,
and I like to sort of spoosh it about.
And we've got kind of a two-dimensional input,
that somehow moves into three dimensions,
and you're just looking at what the output
of that looks like,
not really caring about how it gets there.
These are called parametric surfaces.
Another fun one is a vector field,
where every input point is associated
with some kind of vector,
which is the output of the function there.
So this would be a function
with a two-dimensional input
and a two-dimensional output
'cause each of these are two-dimensional vectors.
And the fun part with these guys
is that you can just kind of,
imagine a fluid flowing,
so here's a bunch of droplets, like water,
and they kind of flow along that.
And that actually turns out to give insight
about the underlying function.
It's one of those beautiful aspects
of multivariable calc.
And we'll get lots of exposure to that.
Again, I'm just sort of zipping through
to whet your appetite.
Don't worry if this doesn't make sense immediately.
And one of my all-time favorite ways to think about
multivariable functions is to just take the input space,
in this case, this is gonna be a function that inputs
points in two-dimensional space,
and watch them move to their output,
so, this is gonna be a function that also outputs
in two dimensions.
And I'm just gonna watch every single point
move over to where it's supposed to go.
These can be kind of complicated to look at,
or to think about at first,
but as you gain a little bit of thought
and exposure to them,
they're actually very nice,
and it provides a beautiful connection
with linear algebra.
A lot of you out there,
if you're studying multivariable calculus,
you either are about to study linear algebra,
or you just have, or maybe you're doing it concurrently,
but understanding functions as transformations
is gonna be a great way to connect those two.
So with that,
I'll stop jabbering through these topics really quickly
and in the next few videos
I'll actually go through them in detail
and hopefully you can get a good feel
for what multivariable functions can actually feel like.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058222.43/warc/CC-MAIN-20210926235727-20210927025727-00502.warc.gz
|
CC-MAIN-2021-39
| 7,023
| 189
|
http://shop.whowhatwear.com/rylee-stamped-leather-ankle-boots---beige-tan-size-6-m82Fyj
|
code
|
Women's Rylee Stamped Leather Ankle Boots - Beige, Tan Size 6from Barneys New York$1,090Buy Now from Barneys New York
Chloé's tan and black python-stamped leather Rylee ankle boots are styled with a pointed toe and chunky block heel. This Italian-made pair features a side zip closure for ease of wear. 3. 5/90mm heel (approximately). 4. 0/100mm shaft, 9. 5/24cm circumference (approximately). Pointed toe. Stacked block heel. Stitched welt. Polished silvertone hardware. Exposed side zip closure. Lined with leather. Leather sole. Available in Tan/Black. Made in Italy. This style runs narrow at the toe. When purchasing, we recommend ordering 1/2 to 1 size up. Chloé Women's Rylee Stamped Leather Ankle Boots - Beige, Tan Size 6 A great designer gift. Stay on top of Spring trends and shop Chloé at Barneys New York.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658662.31/warc/CC-MAIN-20190117000104-20190117022104-00163.warc.gz
|
CC-MAIN-2019-04
| 821
| 2
|
https://haus.fi/henkilot/petteri-kallio/
|
code
|
Director, HAUS Finland and Digital Learning, Ph.D.
I am Petteri Kallio, specialist of digital learning and the director of the eOppiva team.
If I was asked to present myself in two words, I would say “continuous learning”. I am especially passionate about digital learning, digital marketing and the future of work. I have been trained as a gene scientist, and I currently work in HAUS. My days are pleasantly spent working on the eOppiva digital learning platform of Finland’s public administration sector.
In the evenings I enjoy sports and reading. My motto is: never stop learning.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301309.22/warc/CC-MAIN-20220119094810-20220119124810-00389.warc.gz
|
CC-MAIN-2022-05
| 591
| 4
|
https://atlogys.com/website-performance-monitoring-optimization
|
code
|
Websites in every domain – ecommerce, enterprise, social networking, entertainment, publishing, healthcare, retail are becoming increasingly complex these days. Users manage, upload and maintain tera bytes (huge amounts) of data online. They expect real-time updates and information exchange at the speed of an eye-blink. We want news, notifications, newsfeed as it happens; when it happens. We expect web systems to process, analyze and do data analytics quickly so we may visualize and track the efficiency of our product/s.
Web Performance Optimization (WPO) is the science behind giving users that seamless experience on the browser where they get all information they need in lightning speed without having to wait for the data to load on the page.
As per a survey from strangeloopnetworks, a ONE-SECOND delay in page load time leads to 7% loss in conversions, which leads to 11% fewer page views, which in turn leads to 16% decrease in customer satisfaction. In dollar terms this means that if your site earns $100,000 a day, then you could lose 2.5Million $ in sales in a year due to a slow website.
Popular metrics and research also show that 57% of online customers will abandon a slow page after 30 seconds.
Slow web platforms affect overall user happiness and satisfaction levels.
You may make a kick-ass site which has great features, has an aesthetically amazing UX and web design, and uses the latest technology frameworks and tools. You spend enough on marketing to send reasonable traffic to your site. However, you notice that there is NO sustained traffic or revenue. There are no repeat visits or traffic growth..So..What could be the reason??
Ans. Your site is slow, it takes time to load and see information..This irritates the users and they don’t wish to come back!
A website or web platform essentially consists of two major components.
According to Mr. Steve Sounders (Pioneers of WPO), 80% of the time it takes to load a web page is controlled by the frontend structure.
So the best practices for webmasters or website administrators for doing web performance optimization are:
The practical ways of doing these optimizations are discussed below in the ‘What we do’ section of this web page.
Even though the backend accounts for 20% improvement in site speed, it still pays a pivotal role in overall user experience. If the backend is not performance optimized, then eventually a time will come when your site’s response times will start increasing exponentially after a certain threshold user load or traffic is reached.
The mobile phone has limited CPU and batter resources, it has less space and uses a lite database. It also has limited screen size and real estate. Due to intermittent connectivity, the data to be sent and processed on the mobile device must be very less and optimized.
The speed must be much faster of your site on the mobile. Appropriate mobile application architecture and mobile application development paradigms must be used to monitor and design the same.
See our whitepaper on Mobile Optimized design available at: ATLOGYS ACADEMY – MOBILE APPLICATION ARCHITECTURE
Once your site’s frontend and backend code is optimized, it is deployed on a hardware machine which acts as the server to handle the requests and provide the responses. Every machine has finite CPU, finite memory and finite capacity. Hence, you must know the max and min threshold number of requests your deployment machines can handle. As and when your traffic load increases beyond that threshold, you must set auto scaling and use cloud deployment techniques like elastic load balancing etc. to maintain site’s performance.
Sending more traffic to a machine above and beyond what it can handle will cause it to slow down the response of every request thereby affecting experience of all users.
There are many tools available for testing web performance and getting some initial benchmark numbers. The three most common tools that you can self-deploy are:
For complicated web platforms, it is recommended to use open source tools which must be configured, customized and setup for that site. These can be used to do load testing, stress testing and extensive latency testing on the site.
Such tools allow us to simulate user traffic prior to launching the site in the real world. They can also be used to test performance f web services API calls in a simulated integrated environment
Optimize your site for performance – We advocate and following website optimization tips: (the best practices mentioned above) –
Frontend web performance optimizations
Backend web Performance optimization
Create an optimized cloud deployment infrastructure for site launch
Perform website performance Monitoring on a continuous basis
Read our whitepaper on HOW TO RENDER LIGHTEING FAST WEB PAGES AT
CPU profiling is a great way for testing hidden issues in code which are deep rooted and which affect site’s performance. These are difficult to dissect and fix. But profiling for memory and CPU is a great tool to identify and fix such hidden issues in performance.
Thread contention and improper locking – Often a backend code and core architecture problem, we can study the site’s code and reverse engineer on the design and architecture to find out such problems.
Atlogys has a team of cloud computing consultants and web 2.0 administrators who are super finicky about performance. We have compiled our own battery of tests from various protocols and standards.
We use a mix of technology for web performance optimization. This includes the following:
Websites and web platforms are dynamic in nature. New pages are added and new feature releases are made on a continuous basis. It is important to keep monitoring performance on a continuous basis to catch and identify code changes that may lead to sudden increases in page load time or response time.
Website Performance monitoring is the process of scripting and running tests on a regular basis so as to maintain the site’s performance whilst new rollouts keep launching.
Continuous Integration servers like Hudson/Jenkins can be used to create performance analysis dashboards which may turn RED when the page load time of any page goes beyond an acceptable threshold
Google Analytics can also monitor page performance and help catch such errors
Amazon monitoring tools like cloudWatch can be deployed to trigger email alerts to webmasters when their response time goes up – this helps in catching increases in things like database read time, database write time, CPU time, file I/O time.
The user network time and rendering time can be simulated with firebug to trigger alerts for the same. You can simulate various internet speeds and various locales to get the right numbers for the seconds it takes for end users to see the website.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662520936.24/warc/CC-MAIN-20220517225809-20220518015809-00386.warc.gz
|
CC-MAIN-2022-21
| 6,829
| 36
|
https://www.wisdomlib.org/buddhism/book/mahavastu-sanskrit-prose
|
code
|
Mahavastu [sanskrit verse and prose]
177,961 words | ISBN-10: 8120804813 | ISBN-13: 9788120804814
Summary: The Sanskrit edition of the Mahavastu: a lengthy work on Buddhist teachings and narratives belonging to the school of early Buddhism (Mahasanghika). This edition includes the verses as well as the prose sections.
Original title: Mahāvastu-avādana (महावस्तु-अवादन), Mahāvastvavādana (महावस्त्ववादन, mahavastvavadana).
Contents of this online book ( + / - )
The full text of the Mahavastu [sanskrit verse and prose] is available here and publically accesible (free to read online). Of course, I would always recommend buying the book so you get the latest edition. You can see all this book’s content by visiting the pages in the below index:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00261.warc.gz
|
CC-MAIN-2023-40
| 805
| 6
|
https://gis.stackexchange.com/questions/108895/adding-a-graphic-line-element-to-open-mxd-using-python-comtypes-to-access-arcobj
|
code
|
I attended a pretty awesome demonstration from Jeffrey Barrette at the Esri UC a few weeks ago on creating dynamic tables in ArcMap. This functionality will greatly benefit the aviation department at my firm. I have got the scripting all taken care of for creating the dynamic tables in the Layout (using graphic and text elements). However, this works by cloning a horizontal line, vertical line, and two text elements.
I have already got a working function to add a text element to a map layout via comtypes and ArcObjects, but I cannot seem to get the graphic line part correct. I am using some of the basic functions from a modified version of Snippets (from https://bitbucket.org/maphew/canvec/src/eaf2678de06f/Canvec/Scripts/parco.py). Here is my function for adding a horizontal line:
def add_horizontal_line(): GetDesktopModules() import comtypes.gen.esriFramework as esriFramework import comtypes.gen.esriArcMapUI as esriArcMapUI import comtypes.gen.esriSystem as esriSystem import comtypes.gen.esriGeometry as esriGeometry import comtypes.gen.esriCarto as esriCarto import comtypes.gen.esriDisplay as esriDisplay import comtypes.gen.stdole as stdole # set mxd pApp = GetApp() #current open mxd pDoc = pApp.Document pMxDoc = CType(pDoc, esriArcMapUI.IMxDocument) pMap = pMxDoc.FocusMap pAV = CType(pMap, esriCarto.IActiveView) pSD = pAV.ScreenDisplay # set coords for elment pFact = CType(pApp, esriFramework.IObjectFactory) pEnv = pAV.Extent x = (pEnv.XMin + pEnv.XMax) / 2 y = (pEnv.YMin + pEnv.YMax) / 2 # from point pUnk_pt1 = pFact.Create(CLSID(esriGeometry.Point)) pPt = CType(pUnk_pt1, esriGeometry.IPoint) pPt.PutCoords(x, y) # to point pUnk_pt2 = pFact.Create(CLSID(esriGeometry.Point)) pPt2 = CType(pUnk_pt2, esriGeometry.IPoint) pPt2.PutCoords(x + 500, y) # next point 500 units east to form straight line # line (from point - to point) pUnk_line = pFact.Create(CLSID(esriGeometry.Line)) pLg = CType(pUnk_line, esriGeometry.ILine2) pLg.PutCoords(pPt, pPt2) # preset color according to RGB values pUnk_color = pFact.Create(CLSID(esriDisplay.RgbColor)) pColor = CType(pUnk_color, esriDisplay.IRgbColor) pColor.Red, pColor.Green, pColor.Blue = (0,0,0) #black line # set line properties pUnk_line = pFact.Create(CLSID(esriDisplay.SimpleLineSymbol)) pLineSymbol = CType(pUnk_line, esriDisplay.ISimpleLineSymbol) pLineSymbol.Color = pColor # create the actual element pUnk_elm = pFact.Create(CLSID(esriCarto.LineElement)) pLineElement = CType(pUnk_elm, esriCarto.ILineElement) pLineElement.Symbol = pLineSymbol pElement = CType(pLineElement, esriCarto.IElement) pElement.Name = 'horizLine' pElement.Geometry = pLg # add to map pGC = CType(pMap, esriCarto.IGraphicsContainer) pGC.AddElement(pElement, 0) pGCSel = CType(pMap, esriCarto.IGraphicsContainerSelect) pGCSel.SelectElement(pElement) iOpt = esriCarto.esriViewGraphics + \ esriCarto.esriViewGraphicSelection pAV.PartialRefresh(iOpt, None, None) return
I am getting an Error (parameter is incorrect) in this line:
pElement.Geometry = pLg
However, from the API reference it says the ILine2 interface PutCoords method can be used to set coordinates of the line using a FromPoint and ToPoint (IPoint objects). My understanding of ArcOjbects is not very strong, but it seemed from help docs that this would work. I even tried to explicitly set the pLg.FromPoint and ToPoint passing in the appropriate coordinates and that did not work either. Does anyone know what I'm doing wrong here?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573052.26/warc/CC-MAIN-20190917040727-20190917062727-00383.warc.gz
|
CC-MAIN-2019-39
| 3,451
| 6
|
https://github.com/vardot
|
code
|
Grow your team on GitHub
GitHub is home to over 28 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.Sign up
Manages type of media contents and entity browsers in the site.
Provides core components required by other features, which have all main functionality for the Uber Publisher distribution.
A Powerful Publishing Experience That Changes The Way Content is Curated Uber Publisher is a flexible and powerful solution designed to evolve the way publishers and media do business. Built on Drupal, Uber Publisher allows publishers to control the way their content is experienced. From layout management, custom workflows, integrations, to an a…
Uber publisher search system.
Adds the ability to automatically post articles and posts to social media networks like Twitter and/or Facebook. You will have to authenticate your social media accounts after enabling this feature.
Uber Publisher opinion article content type with its dependents.
News stories told and displayed in a form of picture galleries.
Provide fun cartoons to readers.
Provides breaking news content type and its related configuration.
Uber Publisher author profile content type with its dependents.
Project template for Uber Publisher distribution
Ads System provides a way to manage Ads/Tags by entities and exposes in blocks.
Forked from dinbror/blazy to be used as drupal-library with a composer.json file
This is the Core Varbase feature. Provides core components required by other features.
A simple one-column, tableless, minimalist administration theme
Built using Drupal 8, an enterprise website builder platform that combines powerful editorial features, mobile, lead-generation, SEO, social media integration, and beautiful bespoke designs. Varbase is packed with adaptive functionalities and essential modules.
Provide Search Engine Optimization (SEO) Core features and settings.
Provides search configuration, and offering search capabilities.
Base theme for Varbase standard websites. Based on Bootstrap 3 and less css
Have a demo work for how to use view modes inventory in Varbase.
This a Demo feature to test and see how we can use Varbase Media Entity Browsers, and Provides Story content type and related configuration.
This app will populate the universal implementation of a "Hero Slider" to be used on the homepage in most cases. A rich hero slider that allows you to display video and/or image slides.
Editor profile and settings to be used in most websites.
Provides Blog content type and related configuration. Use Blog to publish blog post by different authors in the Blog section of the site.
A dashboard is what is missing for better Drupal administration experience. This dashboard is built on top of Total Control Admin Dashboard module, utilizing Panels, Google Analytics Reports, and several enhanced blocks and widgets for an intuitive and flexible administration experience.
Varbase custom styling guide components.
Provides the basis for Landing Pages, which are built to include appealing stacked components that are visually separate.
Varbase Frequently Asked Questions
This repository is a mirror of the Varbase Bootstrap Paragraphs Drupal module.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511173.7/warc/CC-MAIN-20181017111301-20181017132801-00155.warc.gz
|
CC-MAIN-2018-43
| 3,236
| 31
|
https://www.toolpilot.ai/products/imaigic
|
code
|
imAIgic - Free DB of AI-generated images and their prompts
imAIgic offers a free database of AI-generated images and their prompts so prompt engineers can search by tag or plain text. Categorization and text description tools allow for convenient and fast access to the thousands of images available, streamlining production of creative projects.
imAIgic is compatible with the following platforms and devices:
imAIgic can be integrated with the following third-party platforms and tools:
- Google Analytics
- Google Search Console
* For the complete list of available integrations visit imAIgic website.
imAIgic offers the following subscription types:
Billing options include the following:
There are membership packages at imAIgic.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00324.warc.gz
|
CC-MAIN-2024-18
| 734
| 10
|
https://en.cppreference.com/w/cpp/ranges/range
|
code
|
Defined in header
range concept defines the requirements of a type that allows iteration over its elements by providing an iterator and sentinel that denote the elements of the range.
Semantic requirements
Given an expression E such that decltype((E)) is T, T models range only if
- [ranges::begin(E), ranges::end(E)) denotes a range, and
- both ranges::begin(E) and ranges::end(E) are amortized constant time and do not alter the value of E in a manner observable to equality-preserving expressions, and
- if the type of ranges::begin(E) models
forward_iterator, ranges::begin(E) is equality-preserving (in other words, forward iterators support multi-pass algorithms)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362571.17/warc/CC-MAIN-20211203000401-20211203030401-00071.warc.gz
|
CC-MAIN-2021-49
| 670
| 8
|
https://www.geekality.net/blog/write-think-and-learn
|
code
|
Write, Think, and Learn
Yesterday I stumbled over a blog post which linked to a very interesting paper about how to write more clearly, think more clearly and how to learn complex material more easily. I recommend that you read the whole thing!
How to Write More Clearly,
Think More Clearly, and
Learn Complex Material More Easily
What I got from that paper was first of all some good advice on how to write more clearly, but also more reasons for why it's good to write about things in the first place and therefore why having a blog like this is good for me. Like it says on page 7, you don’t know what you know until you try to express it. I can without a doubt say that by trying to explain things in writing here on my blog I increase my understanding of the subject a lot more than if I was just going to keep that knowledge in my unorganized head.
So, go read that paper and start applying some of the principles in your own life 😄
If you're interested in improving yourself and your abilities, you may also be interested in the 10 Steps to Excellence that I blogged about recently 🙂
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816875.61/warc/CC-MAIN-20240414064633-20240414094633-00072.warc.gz
|
CC-MAIN-2024-18
| 1,098
| 8
|
https://tuxicity.wordpress.com/2007/01/11/creating-audio-cd-compilations-on-linux/
|
code
|
Like most people, I have a fairly sizeable collection of audio files stored on my hard disk in .mp3 or .ogg format – music, copies of interviews, podcasts and old radio shows. Which is great for my MP3 player and my laptop computer, but it isn’t any good for my basic standalone CD player which doesn’t have a clue how to play MP3 files. So until I get a better CD player I use a simple technique to create audio CDs that all CD players can handle.
I started using this technique a couple of years ago and despite a recent spate of free software applications for Linux that can pretty much do the same by simply pointing and clicking, I still find myself reverting to the command line.
The technique is simple enough and you’ll need a couple of small applications to complete the task: mpg321, ogg123 (included in the vorbis-tools package), normalize-audio, sox and cdrecord.
On Ubuntu, getting most of these tools is as easy as typing sudo apt-get install appname at the command line. On other distributions you may need to look around for the RPM or source files for each.
First, collect the .mp3 and .ogg files you are going to convert into a directory:
mv file1.mp3 ~/FilesToConvert/ # for each of the files
Depending on where you got your files from they may include blank spaces in their names or some may have a combination of upper and lowercase file extensions. To avoid possible problems in the next few steps it is best to convert these to something less problematic – blank spaces to underscores and uppercase to lowercase
Convert spaces to underscores (replace .mp3 with .ogg for your ogg vorbis files)
for i in *.mp3; do mv “$i” `echo $i | tr ‘ ‘ ‘_’`; done
Bear in mind the ` character is not an apostrophe or single quote mark. It is a tick mark which is angled backwards slightly.
Then convert uppercase extensions into lowercase (again, replace .MP3 with .OGG to achieve the same with ogg files):
for i in *.MP3; do mv “$i” “`basename “$i” .MP3`.mp3″; done
Now we are ready to convert the .mp3s and .ogg files to .wav files. My preferred application for this is mpg321 which is a free application. There was originally an mpg123 application but its restrictions made it a less appealing option for free software users. To convert .ogg files to .wav files I use ogg123.
Convert the mp3 files to .wav:
for i in *.mp3; do mpg321 –rate 44100 –stereo –buffer 3072 –resync -w `basename $i .mp3`.wav $i; done
Again, watch out for that back tickmark.
Then convert .ogg files to .wav:
for i in *.ogg ; do ogg123 -d wav -f `basename $i .ogg`.wav $i; done
Sit back and wait a little as the conversion is completed.
Once your files are converted there is one thing left to do before burning them to CD. Unless you got your files from a single source, you’ll probably find that all of them have different volume levels. To rectify this we need to use normalize-audio which adjusts the volume across a group of files to be the same (some older systems may still use normalize instead of normalize-audio):
normalize-audio -m *.wav
This can take a couple of minutes but once that is done type file *.wav and check the output for any files that are not 16 bit, stereo 44100Hz. To be successful we need to make these to all be the same. If you find you have some files that are not 16bit, stereo 44100Hz use this command to fix the problem:
sox track01.wav -r 44100 track01-new.wav resample
Now you’re ready to burn the files to a CD and get ready for listening pleasure. There are many tools for burning CDs on Linux but again I often fall back to the command line to do this simple task using cdrecord.
Still in the same directory type:
cdrecord dev=ATAPI:/dev/hdc -eject -pad -audio *.wav
Newer Linux kernels prefer the “ATAPI:/dev/hdc” command. If you have problems with this you can try the older version:
cdrecord dev=1,1,0 -eject speed=2 -pad -audio *.wav
You should now have a CD that you can insert into any CD player and enjoy without having to turn on your PC.
One thing to bear in mind is that because you have started with .mp3 and .ogg files which may be of varying quality and are already compressed, converting them to .wav files is not going to gain you any quality. The quality of the CDs produced using this method is not flawless but more than adequate for most uses.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189667.42/warc/CC-MAIN-20170322212949-00321-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 4,337
| 30
|
http://www.ieatatthebar.com/twin-peaks-2/
|
code
|
I went to lunch with coworkers today as one of them had the frequent diner card thing and wanted his free sandwich.
Today I got the Club. It was not the best thing u have eaten there. I would stick with the burger, chicken fried steak, pot roast.
Had the dumplings and they were tasty too, so was the apple desert.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583771929.47/warc/CC-MAIN-20190121090642-20190121112642-00555.warc.gz
|
CC-MAIN-2019-04
| 314
| 3
|
https://protegewiki.stanford.edu/index.php?title=Setting_Heap_Size&direction=next&oldid=383
|
code
|
Setting Heap Size
Setting Heap Size
There are several ways of setting the heap size depending on how you run Protege.
Start Protege by Protege.exe/Protege or by double-cliking on the Protege icon (Windows/Linux)
If you start Protege on a Windows/Linux machine by double clicking on the Protege.exe/Protege or the Protege icon, you need to update the Protege.lax file.
You can do this in the Protege UI, in the File -> Preferences menu -> Protege.lax file. Update the second column of the row containing
lax.nl.java.option.java.heap.size.max. Click on OK. Please note that the changes take effect the next time you start Protege. Below is a screenshot of the Protege.lax panel.
Alternatively, you can also edit directly the Protege.lax file in a text editor. Edit the following line in the Protege.lax file in the Protege installation directory:
lax.nl.java.option.java.heap.size.max=100000000. By default the Protege.lax file specifies a heap of 100MB.
Start Protege by double-clicking on the Protege icon (Mac)
If you run Protege on a Mac by double clicking an icon, you need to edit the Info.plist file that is hidden within that icon. Right click the icon (or ^-click for one button mouses) and click "show package contents". A new finder window will come up. Double click "Contents" and then "Info.plist". Traverse down the tree as follows: "Root" --> "Java" --> "VMOptions". In VMOptions edit the -Xmx line to indicate the correct memory usage.
Start Protege by double-clicking on the applescript file (Mac)
If you run Protege on a Mac by double clicking the applescript file then you need to modify the -Xmx line in the script.
Start Protege from the command line
If you run Protege from the java command line then you need to pass in the heap size with the -Xmx command line switch. Example, if you want to run Protege with 500 MB of heap size, you would specify:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710870.69/warc/CC-MAIN-20221201221914-20221202011914-00675.warc.gz
|
CC-MAIN-2022-49
| 1,870
| 15
|
http://www.theopportunityplace.com/blog/want-to-partner-with-me-on-a-new-project
|
code
|
You will hear about it on your favorite blogs and on TV..
The news will cover it...
And not only will your friends and family members be talking about it, but complete strangers will also approach you about it...
Because the technology involved will not only change how we communicate, it will also change how commerce, both online and offline, happens.
Want a sneak peak?
At this moment, a brief window has been opened for YOU but soon it will be closed.
Check it out and let me know your thoughts.
P.S. If you're curious, feel free to ask me any questions. I'll share as much as I know... but this is going to move FAST, so don't wait. Get in the Ripple now:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.66/warc/CC-MAIN-20230203091020-20230203121020-00568.warc.gz
|
CC-MAIN-2023-06
| 660
| 8
|
https://www.clipe-itn.eu/items/clipe---deliverable-4.2-initial-report-on-creating-procedural-cities-with-semantics
|
code
|
CLIPE - Deliverable 4.2 Initial Report on Creating Procedural Cities with Semantics
Authoring Ambient Life in Immersive Environments
Rafael Blanco, Nuria Pelechano
This report aims to summarize the most recent literature on the first component which is the creation of virtual cities. First, the generation of geometry for cities using procedural techniques and services for video game engines will be studied. And second, methods will be provided to obtain semantic information about the buildings and points of interest of real cities, which can then be processed and added to the virtual city to represent cities that resemble real cities.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00693.warc.gz
|
CC-MAIN-2023-50
| 642
| 4
|
http://webapps.stackexchange.com/questions/37403/we-are-sharing-corporate-data-how-to-improve-our-google-drive-setup
|
code
|
We have a corporate Google Apps account (paid), and we have a central user (I will call it CompanyArchive) that owns all of the documents that were on a network drive before we started using Google Drive. This is approximately 50 Gb of data, not all of which is relevant today. All this legacy data is contained in a single folder which I will refer to as "LegacyData".
This folder is shared with everybody in the company.
This gives us the following unwanted situation:
Employees can only see LegacyData if they search for it. It does not show up anywhere else on their Google Drive.
If an employee searches for LegacyData he/she can drag it to their "My Drive". Then 50GB of old data will start syncing, at which point the employee will usually freak out and do stuff like terminate the syncing, kill the Google Drive app, or phone an IT Guy.
If the syncing is successful, employee will find an interesting item inside LegacyData, determine it should be somewhere else, and move it outside of the LegacyData folder. At which point all of the other employees will think something important has been deleted, and start freaking out and phone an IT Guy.
So to me it feel we went about this the wrong way, and our current setup is bad. I can't find any sort of best practise that will allow us to set up Google Drive as an actual company wide "network drive in the cloud". Meanwhile, the employees have started to use free Dropbox account to share documents, because they do not trust Google Drive. However, Dropbox for teams would cost us 1000-2000 euros a year, which is roughly 900-1900 euro's more than we pay for Google Drive. Also, the entire company is very happy with all other facets of Google Apps.
Who can put us on the right track using Google Drive as a company wide "network drive in the cloud"? Ideally every employee would decide for themselves what they sync, but they are perfectly capable of adhering to a few simple IT rules, as long as those work, and breaking of the simple rules does not result in immediate "Oh my... I deleted the company contracts folder" panic.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708739983/warc/CC-MAIN-20130516125219-00023-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 2,085
| 8
|
https://ubuntuforums.org/showthread.php?t=862151&p=5403382
|
code
|
Defect routing table when using bridge_ports inside network/interfaces (8.4.1)
I'm trying to create a bridge using the bridge-utils package under kubuntu 8.04.1.
= /etc/network/interfaces =
iface lo inet loopback
# from http://www.virtualbox.org/download/UserManual.pdf
iface br0 inet dhcp
This worked fine the first time I did a "/etc/init.d/network restart" ... However, whenever I reboot my machine the network is down, which is probably due to a defect routing table:
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
10.4.0.0 * 255.255.255.0 U 0 0 0 br0
10.4.0.0 * 255.255.255.0 U 0 0 0 eth0
link-local * 255.255.0.0 U 1000 0 0 br0
default tor.xxxxxxx 0.0.0.0 UG 0 0 0 eth0
default tor.xxxxxxx 0.0.0.0 UG 100 0 0 br0
If I remove the routes using eth0 manually, the network is up again. Thread http://ubuntuforums.org/showthread.php?t=807563 seem to describe the same problem, but the solution found there (disabling the bridge) is no alternative to me, I'm afraid.
Does anybody have an idea where the ambiguous routes to eth0 may come from?
Tags for this Thread
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170425.26/warc/CC-MAIN-20170219104610-00264-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,095
| 17
|
http://www.infoq.com/BNL/articles/
|
code
|
934,196 Jul unique visitors
San Francisco 2014Nov 3 - Nov 7
Jay Fields, known for his cutting edge work defining BNLs (Business Natural Languages) delivers a code-rich explanation of eval, class_eval, and instance_eval, in the context of implementing domain-specific languages in Ruby.
Subscribe to our Weekly email newsletter to follow all new content on InfoQ
Personalize Your Main Interests
Forgot password ?
Back to login
Don't have a username ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500811913.46/warc/CC-MAIN-20140820021331-00198-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 449
| 8
|
http://www.mccaughan.org.uk/g/comments/2010/machine.html
|
code
|
Suppose you have a machine whose basic operations are integer addition, subtraction and multiplication, and greater-than-or-equal testing. Theorem: you can’t determine whether a number n is odd faster than some constant times log(n).
Proof: suppose you can; then, in particular, for large enough k your program should be able to determine for any number up to (let’s say) 210k whether the number is odd or even, and do something different in each case, using at most k steps. I’ll show that it can’t.
Well, what can the program have done within k steps? It’s done at most k comparisons so there are at most 2k code paths. Each comparison is testing the sign of some polynomial in n; what polynomial depends on the results of previous comparisons. In any case, the path the program has taken up to this point can depend only on the values of at most 2k polynomials in n. Oh, and they all have degree at most 2k.
Well, all these polynomials collectively have at most 22k roots. We can therefore find an integer m no bigger than 22k+1 such that none of those roots lies between m and m+1 inclusive. (Each root excludes at most two choices of m.) But then our program must produce the same results for m and m+1 since all the comparisons it does produce the same answer for both; since m and m+1 have different parity, it therefore can’t be doing the right thing for both of them.
Knuth’s book contains many clever algorithms. From the cursory reading I’ve given it so far, its contents don’t seem to be “papers on the design of algorithms” any more than the works of Shakespeare constitute “papers on the writing of plays”. So the title’s a bit misleading, which is a pity (it would be very interesting indeed to read Knuth’s thoughts on how to design algorithms) but not a surprise. The book is of course very good anyway.
(There are no comments on this entry yet.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123318.85/warc/CC-MAIN-20170423031203-00089-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,893
| 6
|
https://www.sponsormysociety.co.uk/Clubs-Societies/University-of-Bristol/Women-in-STEM-Society/2017
|
code
|
Women in STEM Society
University of Bristol
WiSTEM promotes diversity, equality, and inclusivity across all STEM disciplines, by creating a supportive community who empower and uplift each other. We put on fun social events to meet with other STEM students, as well as opportunities to do outreach work in schools and network with local and national companies! Our membership is free as we believe everyone from all backgrounds should have access to connections and careers advice. Therefore we rely on the kindness of our sponsors and those that support us, since we don't ask our members to contribute. Although we are a young society at the Univeristy of Bristol but have grown to reach over 800 Facebook followers! We anticipate even more members joining this year.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038059348.9/warc/CC-MAIN-20210410210053-20210411000053-00410.warc.gz
|
CC-MAIN-2021-17
| 769
| 3
|
http://comparecamp.com/bluej-review-pricing-pros-cons-features/
|
code
|
Looking to learn Java? BlueJ may be the ideal tool for it. Made for development on a small scale, BlueJ is a technology that is free to use, with an interactive and user-friendly interface. It has a Java development environment that is integrated, which makes it a good fit for teaching, learning, beginner-level programming, as well as the invocation of an object and interactive creation.
Whether the user is teaching or learning programming that is object-oriented, BlueJ is a good fit, especially with its design that stands out from already existing IDE software. By utilizing a diagram that is UML-like, it is able to show a developing application’s graphic class structure on the main screen. Objects can be tested and creation can be interactive. Objects that are being developed can be easily experimented on thanks to the merging of the sleek and user-friendly interface with the tool’s interactive functionalities.
Product Quality Score
Ease of use
Value for money
Main features of BlueJ are:
Runs on multiple platforms
Designed for teaching
Runs without USB stick installation
Supplementary BlueJ textbook
Portal of teaching resources
Interaction among objects
The main benefits of BlueJ are its small and simple interface, its teaching textbook, and its portability.
Designed to help out when introducing Java programming to beginners, BlueJ has a simple and clean interface that makes everything easy for tech newcomers. It is not as overwhelming as other IDE software can be. Getting the hang of rudimentary development is easier and quicker thanks to a display that is straight-to-the-point bad basic.
Resources abound for BlueJ, especially since it was designed to be used for teaching and with instruction methods in mind. Introductory courses in college and universities can make use of its teaching textbook, and can also use the extensive teaching resources available on its site.
As a REPL for Java, BlueJ is especially effective, as there is no compiling needed when directly invoking Java expressions. Object interaction is also allowed, whether it is passing as parameters, method calling, or value inspecting.
Portability is another advantage to using BlueJ, as it can be deployed and can run on operating systems such as Linux, Mac OS X, and Windows. There is also no need for a USB stick installation as it can still run without it.
Other standout BlueJ features that cannot be found in other IDEs include scope coloring, code pad, and its object bench. Curly brackets that are misplaced can be easily spotted and codes can be scanned at a quicker pace thanks to unique scope highlighting, which means each code block gets a colored background.
Customer Support Types
The following BlueJ integrations are currently offered by the vendor:
Roles of Variables
CNU BlueJ Code Formatter
BlueJ Extension Manager
Simple GUI Extension
PMD Extension for Blue J
Remote File Manager
Sequece Diagram Editor
BlueJ pricing is available in the following plans:
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670987.78/warc/CC-MAIN-20191121204227-20191121232227-00165.warc.gz
|
CC-MAIN-2019-47
| 2,977
| 28
|
https://www.construct.net/en/forum/construct-2/beginners-questions-19/cant-path-finding-moving-gate-99077
|
code
|
Creating a Top Down game using mouse click path finding to move.
I built a Wall of Solid objects.
Created a spot were I placed a Gate (Solid Object).
When you click the gate it opens (Move 5 pixels at angle 90. Wait 3 seconds. Move 5 pixels Again ect... until its out of the way)
So the gate gets to the point where it is completely out of my way.
However i can't move through the opening (its big enough).
Not sure what is going on here. Is the collision region not moving with the object and staying behind?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306301.52/warc/CC-MAIN-20220128152530-20220128182530-00006.warc.gz
|
CC-MAIN-2022-05
| 509
| 7
|
https://community.cloudera.com/t5/Support-Questions/How-to-find-which-user-has-killed-the-yarn-application-from/m-p/204760
|
code
|
Prior to HDP 3 you could only see that an application was killed by a user, not who killed the application HDP 3 and onwards is more informative about who killed an application.
[jsneep@node4 ~]$ yarn jar /usr/hdp/126.96.36.199-91/hadoop-mapreduce/hadoop-mapreduce-examples.jar pi 10 9000
18/07/24 07:44:44 INFO security.TokenCache: Got dt for hdfs://hwc1251-node2.hogwarts-labs.com:8020; Kind: HDFS_DELEGATION_TOKEN, Service: 172.25.33.145:8020, Ident: (HDFS_DELEGATION_TOKEN token 7 for jsneep)
18/07/24 07:44:45 INFO input.FileInputFormat: Total input paths to process : 10
18/07/24 07:44:45 INFO mapreduce.JobSubmitter: number of splits:10
18/07/24 07:44:45 INFO mapreduce.JobSubmitter: Submitting tokens for job: job_1532417644227_0005
18/07/24 07:44:46 INFO impl.YarnClientImpl: Submitted application application_1532417644227_0005
18/07/24 07:44:46 INFO mapreduce.Job: Running job: job_1532417644227_0005
[root@hwc1251-node4 ~]# yarn application -kill application_1532417644227_0005
18/07/24 07:44:53 INFO mapreduce.Job: Job job_1532417644227_0005 failed with state KILLED due to: Application killed by user.
18/07/24 07:44:53 INFO mapreduce.Job: Counters: 0
Job Finished in 8.516 seconds
Ex, above I've submitted a yarn job (application_1532417644227_0005) & killed it. The logs state "Application killed by user."
I can also browse the Resource Manager UI at http://<RM IP ADDRESS>:8088/cluster/apps/KILLED and see that it was killed by a user.
In my HDP3 cluster, when I submit an identical job and kill it;
[root@c2175-node4 ~]# yarn app -kill application_1532419910561_0001
18/07/24 08:12:45 INFO client.RMProxy: Connecting to ResourceManager at c2175-node2.hwx.com/172.25.39.144:8050
18/07/24 08:12:45 INFO client.AHSProxy: Connecting to Application History server at c2175-node2.hwx.com/172.25.39.144:10200
Killing application application_1532419910561_0001
For example now via the RM UI, I can browse to http://<RM IP ADDRESS>:8088/ui2/#/yarn-app/application_x_/info and under diagnostics we will see the user and source address of the kill operation. The same would be visible through CLI, via "yarn app -status application_1532419910561_0001 | grep killed"
Application application_1532419910561_0001 was killed by user root at 172.25.33.15
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611641.26/warc/CC-MAIN-20210614074543-20210614104543-00005.warc.gz
|
CC-MAIN-2021-25
| 2,256
| 21
|
https://swmath.org/software/9322
|
code
|
SMCHR: satisfiability modulo constraint handling rules. Constraint handling rules (CHRs) are a high-level rule-based programming language for specification and implementation of constraint solvers. CHR manipulates a global store representing a flat conjunction of constraints. By default, CHR does not support goals with a more complex propositional structure including disjunction, negation, etc., or CHR relies on the host system to provide such features. In this paper we introduce satisfiability modulo constraint handling rules (SMCHR): a tight integration of CHR with a modern Boolean satisfiability (SAT) solver for quantifier-free formulae with an arbitrary propositional structure. SMCHR is essentially a satisfiability modulo theories (SMT) solver where the theory T is implemented in CHR. The execution algorithm of SMCHR is based on lazy clause generation, where a new clause for the SAT solver is generated whenever a rule is applied. We shall also explore the practical aspects of building an SMCHR system, including extending a “built-in” constraint solver supporting equality with unification and justifications.
Keywords for this software
References in zbMATH (referenced in 2 articles )
Showing results 1 to 2 of 2.
- Duck, Gregory J.; Jaffar, Joxan; Yap, Roland H. C.: Shape neutral analysis of graph-based data-structures (2018)
- Duck, Gregory J.: SMCHR: satisfiability modulo constraint handling rules (2012)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662644142.66/warc/CC-MAIN-20220529103854-20220529133854-00389.warc.gz
|
CC-MAIN-2022-21
| 1,434
| 6
|
http://bloodpythonsuk.co.uk/index.php/contact
|
code
|
If you have any questions concerning our collection, the availability of our CB snakes or you require advise on blood python husbandry / health then please free to contact us via the emails provided below.
We can also be contacted by phone between the hours of 8.00 am and 8.00 pm. If you get no answer please Text and we will endeavor to get back to you as soon as possible.
Matt and Tom
We are based in Suffolk, UK.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00076.warc.gz
|
CC-MAIN-2022-33
| 417
| 4
|
http://www.austinprogressivecalendar.com/edible-and-useful-plants-texas-and-southwest-practical-guide
|
code
|
Edible and Useful Plants of Texas and the Southwest A Practical Guide
A real gold mine for low or no care local food plants. Lots of the plants that have been mentioned on austinperm appear in the book, as well as a bunch of southwestern natives that people have been looking at in a new light--esp. the yuccas and agaves.
Check it out..
There is a version online at google preview (http://books.google.com/books/utexaspress?id=pnnHgcasN-cC&printsec=front...)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937090.0/warc/CC-MAIN-20180420003432-20180420023432-00606.warc.gz
|
CC-MAIN-2018-17
| 459
| 4
|
http://hepcat1950.com/webdesign.html
|
code
|
If you've visited my site before, and took the time to click around and look at some of the documents, you'll have noticed that this place isn't really state of the art. I use HTML 4.01 Transitional code, and some snippets of scripts available as examples somewhere.
The main topic is (almost) always content, and I always see that my documents are easily legible. I also try to make navigation as easy as possible.
For a couple of weeks now, I'm surfing the web looking for new information to feed my recent project: a collection of links to official sites of musicians and bands.
There is one thing catching my eye with a lot of sites of (especially) younger musicians and bands. They more and more use those new technologies like Macromedia Flash Player or Fluxure. I have to admit that I'm deeply impressed. There are some sites making a very smart usage of these new technologies. But unfortunately there are also a lot of examples which imho are really disgusting.
Let me explain why some of the sites I visited are disgusting for me, and what makes them so disgusting.
Most of the sites using the Macromedia Flash Player also use rather small windows. That seems to be different with those sites using Fluxure. Why do those web designers use those tiny windows? Tell me if I'm wrong, but as far as I know, the vast majority of internet users are sitting in front of a 17" monitor (1024x768) nowadays. Even 19" flat screens are now becoming affordable for soho usage. Can anybody explain to me, why those sites seem to be optimized for hendheld PDAs? There are sites using the Macromedia Flash Player and though use the full screen size of the monitor. Hence there are no technical restrictions detering the web designers from using the full screen mode.
One of the consequences of those tiny windows is the usage of 8pt or even smaller fonts. As you might have noticed when reading my URL, I'm a hepcat born in the middle of the last century. So I'm obliged to use glasses for reading things like the instruction book for my Motorola V50 mobile phone. Can anybody explain to me, why those web designers use those tiny fonts? When I visit a musicians' site, I expect to learn something about this musician. One way (apart from the sound samples, which are highly appreciated) is to read their biography, which most musicians offer.
Let's resume. The musician took some time to collect his files or even write down something completely new. The web designer did some work on arranging the text. And finally the visitor moves the mouse pointer to the upper right corner of his screen to click on the X to close this awkward window.
If I happen to stumble over a plain HTML document using a very small font size, I press Ctrl+Plus (I use Mozilla Firefox as a browser) to magnify the font. I press this combination as often as necessary, until the text is easily readable. Try this with Macromedia Flash Player! You've to open your drawer to get your real magnifying glass!
Sites of the same color seem to be all the rage. Take a look at this example of the German bass player Gunther Rissmann. (Forgive me Gunther! It's just an example!) Dark orange on light orange; looks nice, doesn't it? But try to read the text on the Welcome page only. Ok, it's German, but don't worry, you'll have difficulties to read it anyway. (btw: Gunther is already re-designing his site.) I found a lot of examples working the same way.
You like another one? Look at Chris Kase's site, and try to read his CURRICULUM / BIO. Light grey on dark grey; isn't it beautiful? Perhaps he should try a 4pt font on this. Looking at those sites I feel like: "It's nice that you visit my site, but please, don't bother me any longer."
You ask for any felicitous examples? Please have a look at the site of German singer Lisa Bassenge. Ok, it's of the same color too. But the text color is white, so one can read it without the help of a magnifying glass. And everything works. Click on one of the digits below Lisa's pic, and you hear music. The navigation is dead easy, clearly arranged, and always in front of your eyes.
Here is another fine example of using Macromedia in full screen mode, I found today (March 2). American bass player Michael Blanco. I love this site!
Another example pleasing my eyes (and ears). Again it's a bass player's site; does it mean a thing? Visit Markus Fischer's site and enjoy!
February 16, 2006 | I found a really outstanding site just recently. Karina Pugliese from Argentina created a wonderful web appearance for the dance/music project Uqbar Tango. She also used the Macromedia Flash technology, but look the way she did it. She really uses it as a tool to make her imaginations visible. A very tasteful layout, nice colors, clear fonts, easy navigation - this site is perfect!
I really hate those sites offering some kind of a puzzle for navigation. Oh look, those funny bubbles! Let's move the mouse pointer to one of the bubbles to see what's hidden behind. Oh, here are the links! But I was looking for the biography. Let's try the blue bubble. No, these are the sound samples. I'm fully beside myself when those "bubbles" are even combined with some squawking midi files. That's (sometimes) funny when you touch them for the very first time. But then...
Here's another (disgusting) example I found on March 18, 2005. Visit the site of percussionist Damon Grant. Click on bio and music, and try to read the text. Vou have to highlight the text to cover the background picture, and make the text legible. The page uses less than one third of my free screen space. And listen to the pling-plong of the navigation. It's nicely done, the sounds are excellent, but anyway - there should be an on/off switch available.
Answer back, musicians!
I really want to encourage all musicians to answer back. It's your web appearance, not the appearance of your web designer! As I said before: If I visit a musicians site, I want to learn something about the musician.
If I really like the design of a site, I can click the link to the web designer's site, placed humbly at the bottom of the site. It's ok if she/he uses a font size smaller than 10pt for this link ;-)
I really hate those Links pages listing URLs only without offering any kind of description. I admit that I click thru all these links hoping for the chance to reveal some musician I didn't yet now. But often enough more than 50% is of no interest for me. I'm not amused! If I wasn't looking for new input for my link collection project, I wouldn't click a single one of those links.
© Mar 1, 2005, edited Mar 2, 2005 | Mar 16, 2005 | Mar 18, 2005 | Apr 17, 2005 | Apr 20, 2005 | Feb 16, 2006
|Copyright © 2005 by hepcat1950||TOP||last update: February 16, 2006|
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251690379.95/warc/CC-MAIN-20200126195918-20200126225918-00524.warc.gz
|
CC-MAIN-2020-05
| 6,731
| 23
|
https://www.slackbuilds.org/howto/
|
code
|
All of our scripts are written and tested for usage on the latest stble release of Slackware with full installation and updated with latest patches; if you're trying them on older versions of Slackware, you should read this page referenced in our FAQ.
Download the SlackBuild archive of the application you wish to build and extract it in your build environment. For example, after extracting the chemtool.tar.gz archive, you should have the following directory tree:
Anonymous ftp access is available via ftp://ftp.slackbuilds.org if that's more convenient for you.
Next, download the source of the application from the address listed in the chemtool.info file and place it in the chemtool directory listed above. There is also a direct link to the source tarball on each application's page within our repository.
If your version of chemtool is newer than what is specified in the SlackBuild script, you will need to change the script accordingly. Using your preferred editor, open the chemtool.SlackBuild script and find the line which starts with "VERSION"
Change this line to reflect the current version of the chemtool source.
Make the script executable with chmod if necessary:
chmod +x chemtool.SlackBuild
Then run the script:
Note that for many builds, you will need to have a true login shell in order to have a correctly populated environment. Among other things, /usr/share/texmf/bin will not be in your PATH if you simply do "su" -- therefore, you will need to either use "su -l" when switching to root, or source the /etc/profile script after doing "su", or perhaps modifying /root/.bashrc to include necessary PATH elements.
Assuming everything happened according to plan (the compile finished without errors), the finished package should be in the directory declared as "OUTPUT" in the SlackBuild script (this defaults to the /tmp directory). Use installpkg to install it; you'll probably want to move it to some other location for safekeeping after it's installed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121153.91/warc/CC-MAIN-20170423031201-00334-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,980
| 11
|
https://forum.streamwhatyouhear.com/t/qed-uplay-stream/1427
|
code
|
Has anyone been able to get Stream What You Hear to work with the QED uPlay Stream? I have an HP Pavilion laptop, and I am trying to stream to the uPlay using SWYH. The uPlay shows up as an option in the ‘Stream to’ list, but, when it is selected, the audio still comes from my laptop’s internal speakers. Sometimes, a loop is created, so that SWYH sends the audio to the internal speakers as well as the application I am running. I have tried YouTube, Spotify, VLC and WMP, but the result is the same. Used alone, WMP does stream to the uPlay, so the problem is not the unit. When WMP is running, it appears as an option in the SWYH ‘Stream to’ list, but no audio is received by WMP. If anyone has any suggestions I would be very grateful.
Update: I’ve noticed that when you send audio from the PC (running Windows 7) to the uPlay Stream via SWYH, after about 10 seconds you can hear a very brief burst of the audio, and then it stops. Simultaneously, the QED uPlay Stream unchecks itself in the ‘Stream to’ menu of SWYH. So it is possible to use the QED uPlay, just not for more than a fraction of a second. I’ve tried switching off the firewall, in case that was interfering, but it made no difference. Stereo mix is enabled on the laptop, and I’ve tried reinstalling SWYH. When you send audio to WMP via SWYH, and then try to use WMP to stream to the uPlay by playing the ‘swyh’ file in the playlist, WMP just says that “No media items are currently in the list” (although it will play them through the laptop’s internal speakers, so it does recognise the file in that situation). Is there anyone out there who knows how to fix this? I’ve a feeling the solution must be really simple… if only I could find it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947654.26/warc/CC-MAIN-20180425001823-20180425021823-00267.warc.gz
|
CC-MAIN-2018-17
| 1,747
| 2
|
https://www.popsugar.com/love/Do-You-Judge-People-Who-Take-Antidepressants-82842
|
code
|
In Touch Magazine is reporting that young mom, Britney Spears is currently taking Paxil and Xanax, to treat depression and anxiety, although we don't have any hard evidence of this to date.
Some people (a.k.a. Tom Cruise and other Scientologists) view these types of drugs as unnecessary and look down upon those who use them. Others feel they have been helpful in treating those with chemical imbalances.
Do you feel that these kinds of drugs have a stigma attached to them? If you were to find out that someone you know or look up to was taking them, how would you react?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948541253.29/warc/CC-MAIN-20171214055056-20171214075056-00297.warc.gz
|
CC-MAIN-2017-51
| 573
| 3
|
http://wanderingscrummaster.blogspot.com/2015/04/the-iliities.html
|
code
|
In application development, there is a lot of talk about the -ilities. The purpose of this article is to gather a few definitions and explanations of the -ilities together.
Upgrade-ability - the ability to upgrade software, without interrupting service. Can be referred to as "0 downtime" upgrade.
Horizontal Scalability - The ability to increase or decrease capacity of the system by adding or removing instances of services. Ideally, we would like to achieve this without service interruption.
Vertical Scalability - The ability to increase or decrease capacity of the system by adding or removing threads to the running instance of the service. Or to put it another way, how much can the component itself stretch before we have to add more instances of the component.
Availability - The amount of time the service is available to users. Commonly measured % time uptime per year, for example 99.999%. This means the service can be unavailable for a total of 5.26 minutes per year.
Stability - the amount of time the system is running as expected. Less scientific to calculate than availability.
Capability - the list of features that the system/service supports.
Capacity - the load limitations of the system/service. This can be scientifically measured, but different metrics apply for different types of services. For example for certain services the number of operations per second may be important. For other services the amount of data (Bytes per second) processed per second might be important.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528481.47/warc/CC-MAIN-20190420020937-20190420042937-00167.warc.gz
|
CC-MAIN-2019-18
| 1,502
| 8
|
https://www.indiehackers.com/post/play-passed-100k-mrr-in-first-2-months-67c4896ddd?utm_source=wweb.dev
|
code
|
I've been absent, and I've been Indie Hacking!
Earlier this year I felt a little behind on my knowledge of all the buzzy stuff like NFTs and what's been going on in Crypto. A friend asked me to check out the Creator Coin project at Rally (https://rally.io) I did, via the $BOT coin which represents Voicebot, a major news/info source for the voice world. A few weeks later, I realized I wanted to start a Creator Coin around my game developer community, with some other initiatives too. I chose the word $PLAY as my symbol, and designed some programs which I have been wanting to do for years, all around the core concept of PLAY.
We are gaining supporters rapidly and our market cap is around $2.6M now, and we're earning about $100k per month in rewards and project revenues.
Each of the programs is like a little mini startup! Now I have 6 in my core team, and adding 1-2 more each week.
We're working on game frameworks, web-based tools for other Creators, helping other Creators launch and improve their own coins, etc. It's so much fun! I am using all my skills.. dev, team building, strategy, startup modelling, etc. I love it. It's my full time gig.
We're having the first Town Hall meeting tomorrow at 2PM EST in our Discord. Feel free to come on by if you want to find out more about PLAY, or Rally Creator Coins, etc!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154321.31/warc/CC-MAIN-20210802141221-20210802171221-00428.warc.gz
|
CC-MAIN-2021-31
| 1,328
| 6
|
https://gateway.ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Pseudoconvexity.html
|
code
|
In mathematics, more precisely in the theory of functions of several complex variables, a pseudoconvex set is a special type of open set in the n-dimensional complex space Cn. Pseudoconvex sets are important, as they allow for classification of domains of holomorphy.
is a relatively compact subset of for all real numbers In other words, a domain is pseudoconvex if has a continuous plurisubharmonic exhaustion function. Every (geometrically) convex set is pseudoconvex.
When has a (twice continuously differentiable) boundary, this notion is the same as Levi pseudoconvexity, which is easier to work with. More specifically, with a boundary, it can be shown that has a defining function; i.e., that there exists which is so that , and . Now, is pseudoconvex iff for every and in the complex tangent space at p, that is,
- , we have
If does not have a boundary, the following approximation result can come in useful.
This is because once we have a as in the definition we can actually find a C∞ exhaustion function.
The case n = 1
In one complex dimension, every open domain is pseudoconvex. The concept of pseudoconvexity is thus more useful in dimensions higher than 1.
- Lars Hörmander, An Introduction to Complex Analysis in Several Variables, North-Holland, 1990. (ISBN 0-444-88446-7).
- Steven G. Krantz. Function Theory of Several Complex Variables, AMS Chelsea Publishing, Providence, Rhode Island, 1992.
- Range, R. Michael (February 2012), "WHAT IS...a Pseudoconvex Domain?" (PDF), Notices of the American Mathematical Society, 59 (2): 301–303, doi:10.1090/noti798
- Hazewinkel, Michiel, ed. (2001), "Pseudo-convex and pseudo-concave", Encyclopedia of Mathematics, Springer, ISBN 978-1-55608-010-4
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662604495.84/warc/CC-MAIN-20220526065603-20220526095603-00590.warc.gz
|
CC-MAIN-2022-21
| 1,713
| 12
|
https://www.redboxsoftware.com/blog/microsoft-hologram-technology-share-your-idea-campaign-search-for-top-holographic-app-developer/
|
code
|
Holograms have always caught the attention of many as they have been used several times in Sci-Fi or futuristic films. Well, holograms are no longer just a product of imagination. They used to be ‘fictional’ in characteristic but are now among the top projects that the world of Information Technology is trying to conquer. These include the Microsoft holographic technology which is now on the search for the top Holographic app developers.
The Microsoft HoloLens Team has just released a unique campaign called ‘Share Your Ideas’ which intend to provide a platform for App Developers and enthusiasts to submit one-of-a-kind ideas related to holograms. Those who are interested in the subject are likewise encouraged to sign up as they will be given the chance to vote for the best ideas.
If that is not exciting enough, then wait until you hear about the prize. After the voting process at the end, Microsoft HoloLens will essentially transform your ideas into reality. In short, they will develop and release the App and will get the developer involved in the entire process – from the planning stage onwards. This Microsoft department also vows to release the source code for the community to know.
Here are some criteria that will guide you on conceptualizing your holographic app:
- Note that holograms can shrink, grow, and even share the same size as the realistic object
- Holograms are more attractive with spatial sounds.
- HoloLens can quickly grasp your app information on surfaces so know where you can place your walls, floors, etc.
- Check how interactive it can get – use voice commands, gesture prompted commands, and so on.
- Know how you can take advantage of the world coordinates to keep your holograms locked.
If you are ready to brew some ideas, then you can head to http://hololens.com/shareyouridea and sign up. Remember that you only have until January 11th next year to wow the community and Microsoft with your ideas.
Microsoft holographic technology is powered by Windows 10.
Click here to download a copy of Windows 10 through www.redboxsoftware.com!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494449.56/warc/CC-MAIN-20190220044622-20190220070622-00155.warc.gz
|
CC-MAIN-2019-09
| 2,093
| 12
|
https://ayende.com/blog/3368/my-design-process
|
code
|
How much analysis/OO modeling you do before you start writing real code? With tools like R#/SVN is the up-front design pretty much dead for garage projects?
My answer to that is complex. I don't do design. I don't think that I ever had. What I would do is something I call envisioning. I have posted several such things in the past, most recently it was Architecting Twitter.
A good way of describing that is this picture:
I am not really interested in the entire picture. I am interested in very small key parts of it. This foundation is what the entire application will revolve around. Very rarely I'll sit and try to draw out the entire system up front. And each and every time that I tried to do that I have had good reasons to regret it.
Once I identified the shape of the system, I I can start working on it. But the final result tend to be different than even the vague shape that I had at the beginning. I routinely modify the foundation of the system for the first part of the project, until it stable enough to fit what I want it to do comfortably.
I like to use tests and real use cases as the driving forces for this. A good sample of that can be seen with Rhino Security. I envisioned the system several months months before I actually wrote that, and while many of the high level concepts were retained, a lot of the infrastructure was shifted, as I faced real world constraints and had to solve them.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297290384.96/warc/CC-MAIN-20240425063334-20240425093334-00291.warc.gz
|
CC-MAIN-2024-18
| 1,415
| 6
|
https://dho.tribrachpenpal.fun/nginx-log-rotation.html
|
code
|
So what do you need to know to handle log rotation for nginx? The official answer from Igor Sysoev the nginx lead developer can be found here. In short, the sequence you must follow is:. There are many ways that this kind of processing can be automated but I use logrotate.
On RHEL 5. Obviously the paths on your local system will most likely vary. Here I specify log rotation for two separate Rails applications, each of which has its own nginx master process note the different PID files. In my initial testing this log rotation did not work as expected; the verbose output ended with lines like the following:. For each permutation is is necessary to hit the website to make sure the log is non-empty and also pass the -f force flag to logrotateotherwise it will most likely refuse to rotate the log file because of its size.
The nginx log files are only part of the situation. Wincent Open. Overview So what do you need to know to handle log rotation for nginx?
In short, the sequence you must follow is: Move or otherwise process the old log file Send the nginx master process a USR1 signal logrotate setup There are many ways that this kind of processing can be automated but I use logrotate.
Rotating other Rails log files The nginx log files are only part of the situation.One of the easiest ways to save yourself trouble with your web server is to configure appropriate logging today. Logging information on your server gives you access to the data that will help you troubleshoot and assess situations as they arise. In this article, we will examine Nginx's logging capabilities and discover how to configure these tools to best serve your needs.
In this guide, we will be using an Ubuntu Nginx uses a few different directives to control system logging. If you are coming from Apache, this is very similar to Apache's "ErrorLog" directive. The level of logging can be any one of the following:. The levels higher on the list are considered a higher priority. If you specify a level, the log will capture that level, and any level higher than the specified level.
For example, if you specify "error", the log will capture messages labeled "error", "crit", "alert", and "emerg". It provides the ability to customize logs. There are a few other directives included with this module that assist in configuring custom logs. There is one format that comes predefined with Nginx called "combined". This is a common format used by many servers.Obs reduce latency
You can use? It is used to configure custom logging. The buffer size is the maximum size of data that Nginx will hold before writing it all to the log. You can also specify compression of the log file by adding "gzip" into the definition:.
As log files grow, it becomes necessary to manage the logging mechanisms to avoid filling up disk space. Log rotation is the process of switching out log files and possibly archiving old files for a set amount of time. Nginx does not provide tools to manage log files, but it does include mechanisms that make log rotation simple. If you would like to manually rotate your logs or more likely, create a script to rotate themyou can do so by following the example in the Nginx wiki:.
First after taking a nap with the fur throw pillowswe move the current log to a new file for archiving. A common scheme is to name the most recent log file with a suffix of ". This does not kill the Nginx process, but instead sends it a signal causing it to reload its log files.Learn more here.
Support Logging setup. Some older versions of rsyslog may have trouble resuming on a log file after the log rotate has run. We can force rsyslog to pick up the new log file by adding a postrotate command in logrotate.
This will restart rsyslog and delete the state files so it will continue reading from the beginning of the newly created file. Find the appropriate configuration file and open it with a text editor. All the commands written between the postrotate and endscript gets executed after each log rotation.
In this example, we can see that nginx is restarted. We will add additional commands here soon. Find the files rsyslog writes to track the state of the files are monitoring. We will configure the postrotate command to delete these configuration files so rsyslog starts fresh at the beginning of the new log file.
If you used the configure-file-monitoring script, it will include the alias you passed as a parameter. Add the following commands in the postrotate section to restart rsyslog and delete the state files. Replace the path given to the rm command with the path to the rsyslog state files found above.
In this example, we are deleting the state files for nginx. Support Logging setup Log Rotate. Log Rotate Configuration Some older versions of rsyslog may have trouble resuming on a log file after the log rotate has run.
Log Rotate Setup 1. Find your rsyslog state files Find the files rsyslog writes to track the state of the files are monitoring. Add postrotate commands Add the following commands in the postrotate section to restart rsyslog and delete the state files. Wait a few minutes in case indexing needs to catch up If you see duplicate events send to Loggly, check to see if you accidentally deleted the wrong state files. Also check to make sure a new file of zero length is created after the log rotation runs.
Make sure the state files are deleted and recreated after rsyslog restarts Troubleshooting Rsyslog if the files are being written but not being sent to Loggly Search or post your own question in the community forum. Thanks for the feedback!
We'll use it to improve our support documentation. Don't have a Loggly account yet? Start Free Trial Login. Overview Proactive monitoring Troubleshooting and diagnostics Data analysis and optimization Devops integration Loggly for Enterprise Scale.In this tutorial, you will learn the simple steps to manage logs in Linux using logrotate.
How To Configure Log Rotation with Logrotate on Ubuntu 18.04 LTS
Logrotate is best to manage logs by rotating logs, compress, and remove automatically. This site uses Akismet to reduce spam. Learn how your comment data is processed. Welcome to the SysAdminXpert Knowledge portal. Get Best Practices and Expert tips straight to your inbox. Don't have an account? Page Contents. Done Building dependency tree Reading state information Done The following packages were automatically installed and are no longer required: libecap3 squid-common squid-langpack Use 'sudo apt autoremove' to remove them.
The following NEW packages will be installed: logrotate 0 upgraded, 1 newly installed, 0 to remove and not upgraded. Need to get After this operation, kB of additional disk space will be used. Reading database Preparing to unpack Unpacking logrotate 3.
Processing triggers for man-db 2.Blackmagic i o
Reading package lists. Building dependency tree. Reading state information. The following packages were automatically installed and are no longer required :.
Use 'sudo apt autoremove' to remove them. The following NEW packages will be installed :.Geocode finder
After this operationkB of additional disk space will be used. Fetched Selecting previously unselected package logrotate.
Reading database. Preparing to unpack. Processing triggers for man - db 2.
Help options :. Logrotate Syntax :. Usage : logrotate [ - dfv? Like this: Like Loading First time on this Blog Subscribe to our mailing list to get the new updates!
If you like our post then subscribe and followus on social network. Enter your Email address.Edit this article. Buy Now. Logs are useful when you want to track usage or troubleshoot an application. As more information gets logged, however, log files use more disk space. Over time a log file can grow to unwieldy size. Running out of disk space because of a large log file is a problem, but a large log file can also slow down the process of resizing or backing up your virtual server.
Fortunately, the logrotate utility makes log rotation easy. The system usually runs logrotate once a day, and when it runs it checks rules that can be customized on a per-directory or per-log basis. The system runs logrotate on a schedule, usually daily. Some distributions use a variation. When logrotate runs, it reads its configuration files to determine where to find the log files that it needs to rotate, how often the files should be rotated, and how many archived logs to keep.
The file contains the default parameters that logrotate uses when it rotates logs. The file is commented, so you can skim it to see how the configuration is set up. Several of the specific commands in that file are described later in this article.
Use the following command to list contents of the directory that stores application-specific log settings:. Depending on how much is installed on your server, this directory might contain no files or several. Usually the directory contains a configuration file for your syslog service, which logrotate reads when it rotates the system logs.
This file contains an entry for various system logs, along with some commands similar to those contained in logrotate.React forum example
As an example, consider the contents of a logrotate configuration file that might be put in place when you install Apache on a Fedora system:. This example file does not contain some settings that are included in the logrotate. The commands in logrotate. You can specify different settings for any application when you want to override the defaults. The next section describes some of the more commonly-used commands actually do in a logrotate configuration file.
You can get a full list of commands used in logrotate configuration files by checking the man page:. A log file and its rotation behavior are defined by listing the log file or files followed by a set of commands enclosed in curly brackets. You can list more than one log file for a block by using a wildcard in the name or by separating log files in the list with spaces.
The rotate command determines how many archived logs are returned before logrotate starts deleting the older ones. For example:.
This command tells logrotate to keep four archived logs at a time. If four archived logs exist when the log is rotated again, the oldest one is deleted to make room for the new archive. You can specify a command that tells logrotate how often to rotate a particular log. The possible commands include:. If a rotation interval is not specified the log will be rotated whenever logrotate runs unless another condition like size has been set.
If you want to use a time interval other than the defined ones, you need to use cron to create a separate configuration file. You can use the size command to specify a file size for logrotate to check when determining whether to perform a rotation. Compression is normally a good idea, because log files are usually all text and text compresses well. This command is useful if you want to compress the archived logs, but want to delay the compression.
Subscribe to RSS
When delaycompress is active, an archived log is compressed the next time that the log is rotated.Get the latest tutorials on SysAdmin and open source topics. Write for DigitalOcean You get paid, we donate to tech non-profits.
DigitalOcean Meetups Find and meet other developers in your city. Become an author. Logrotate is a system utility that manages the automatic rotation and compression of log files.Kishiryu sentai ryusoulger minipla
If log files were not rotated, compressed, and periodically pruned, they could eventually consume all available disk space on a system. Logrotate is installed by default on Ubuntu In this article, we will explore the default Logrotate configuration, then configure log rotation for a fictional custom application. This tutorial assumes you have an Ubuntu Logrotate is available on many other Linux distributions as well, but the default configuration may be quite different.
Other sections of this tutorial will still apply as long as your version of Logrotate is similar to Ubuntu Follow Step 1 to determine your Logrotate version. If Logrotate is not installed you will get an error. If Logrotate is installed but the version number is significantly different, you may have issues with some of the configuration discussed in this tutorial.Door closer adjustment
Refer to the documentation for your specific version of Logrotate by reading its man page:. By default, logrotate. They both have the same options.
The options set for the apt logs are:. There are many more configuration options available. To manage log files for applications outside of the pre-packaged and pre-configured system services, we have two options:.
Ask Ubuntu is a question and answer site for Ubuntu users and developers. It only takes a minute to sign up. I am running Ubuntu Everything is running fine but I notice that the nginx logs are being rotated but nginx carries on outputting to the same log file e. Of course if I restart nginx the regular log file starts to get written to.
Is there a bug somewhere in the logrotate script? Does it need to restart nginx on a rotate? Yes, you could muck around with logrotate and with script snippets as in the other answers. But you are running Ubuntu version On your operating system services are run under systemd, which by default captures their standard error and syslog outputs and handles the logging.
There's no need for nginx to be writing to that error. There's no need for logrotate at all. That file is irrelevant. You are running Ubuntu version You might be mystified by the contradiction between what you can clearly see theretrying to run the old System 5 rc script with a non-standard invoke-rc.
But again, simply don't. Don't focus on these logrotate control stanzas in the first place. You are running Ubuntu version 15 with a package that has a system unit already and isn't using System 5 rc scripts on your operating system, and a service manager that logs service output.
Your nginx service needs to be told to simply write its log to its standard error. As a bonus, you can send your access log to the journal via syslog, which systemd also intercepts.
This is done with nginx global configuration directives and http module directives. You either change your nginx. It handles the rotation of the journal files itself. There are no signals and no nginx service reloading involved at all.
You can read the last few entries in the journal that are related to the service with run as the superuser or as an adm user. The reason nginx is writing to the rotated file is a missing postrotate section in the logrotate file for nginx to reload the configuration of nginx. So the nginx process will keep on dumping to the same file handle the rotated one rather than the newly created file. To solve this issue, add a postrotate section in the logrotate configuration file to reload the configuration file of nginx.
Works on debian at least. Your mileage may vary. Ubuntu Community Ask! Sign up to join this community.
- Sanders sides fanfiction virgil abused by deceit
- Limiting reactant and percent yield problems
- Best heating oil filter
- Kral puncher breaker mods
- Davido ft harmonize mp3 download
- Submit a listing
- Dark web guide 2019
- Tdi dsg tune
- 9th class physics important questions in english 2019
- International passport template
- Mi a2 fastboot rom
- Oet listening pdf
- Puma platform ⋆ puma e new balance negozio vendita
- Programar juegos android pdf
- Writing inequalities practice pdf
- Scania pde
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588282.80/warc/CC-MAIN-20211028065732-20211028095732-00337.warc.gz
|
CC-MAIN-2021-43
| 15,520
| 68
|
https://elemica.com/solutions/platform/elemica-digital-supply-network-apis/
|
code
|
Elemica leverages APIs in four different categories. The consumers of these APIs evolve through a journey that begins by catering to a System of Record.
Order Management These Digital Supply Network document types of APIs are represented through data exchange – enabled via JSON, UNEDIFACT or X-12 using the Elemica specification. These APIs are focused on primary process enablement by connecting trading partners together.
Control Tower – These Restful APIs are designed around status-related criteria with respect to order and/or shipment status and are visible through Control Tower application similar to Elemica See Solution. They may be obtaining GPS signals or IoT type data feed to location or product performance metrics. In essence, these APIs are driving process management
Master Data – As increases in co-innovation within the supply chain market grows, master data coordination becomes more and relevant in importance. Elemica supports these restful APIs to build and manage master data using our API building blocks with an added layer of Machine Learning. The consumption of these type of APIs is the basis of Artificial Intelligence, machine learning, and both predictive and prescriptive analytics. These are the APIs that drive Digital Transformation and the evolution of new business models for organizations.
Specification – As standards become a more common approach to connect and transfer data between partners, Elemica APIs for integration services based on standard document types are supported. These connector type of APIs are used to take advantage of cXML, iDOC, and EDI exchange formats such as UNEDIFACT, and X-12.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107922746.99/warc/CC-MAIN-20201101001251-20201101031251-00342.warc.gz
|
CC-MAIN-2020-45
| 1,655
| 5
|
http://textwidgets.com/
|
code
|
This is my collection of text munching and manipulating tools. I wrote each one because at some point or another I needed to do what it does, and thought that several of them might be of more general interest, so ... here they are.
I don't use usernames and passwords because a) there's no need, b) I don't like them, and c) I don't want to be responsible for your personal information. No usernames, no passwords, no nonsense.
Thanks, and if you need to get in touch with me, see the FAQ page.
“God made him who had no sin to be sin for us, so that in him we might become the righteousness of God.”
– 2 Corinthians 5:21
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00523.warc.gz
|
CC-MAIN-2022-33
| 626
| 5
|
https://accountjobs.in/job/reliance-jio-infocomm-limited-hiring-for-state-lead-subcontractor-oth-paymnts-at-india/
|
code
|
Responsible to support Technology organization of Jio for its growthplans while ensuring compliance with process validations,acconting andreporting guidelines
1. Analytical skills2. Attention to detail3. Ownership4. Customer focus5. Problem solving skills
You can apply to this job and others using your online resume. Click the link below to submit your online resume and email your application to this employer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00218.warc.gz
|
CC-MAIN-2023-14
| 413
| 3
|
https://rsmanuals.com/34314/gigabyte-ga-x58a-ud5/page-23/
|
code
|
- 23 - Hardware Installation
This motherboard has 2 quick buttons: power button and reset button. The power button and reset button al-
low users to quickly turn on/off or reset the computer in an open-case environment when they want to change
hardware components or conduct hardware testing.
PW_SW: Power switch
RST_SW: Reset switch
The number of lighted LEDs indicates the CPU loading. The higher the CPU loading, the more the number of
to Chapter 4, "Dynamic Energy Saver 2," for more details.
NB PHASE LED
The number of lighted LEDs indicates the North Bridge loading. The higher the North Bridge loading, the
more the number of lighted LEDs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038879305.68/warc/CC-MAIN-20210419080654-20210419110654-00380.warc.gz
|
CC-MAIN-2021-17
| 646
| 11
|
https://www.excelforfreelancers.com/learn-these-amazing-excel-advanced-filter-techniques-in-just-minutes-employee-manager-part-4/
|
code
|
I can’t wait until you see this weeks Part 4 of the Excel Employee Manager where we add in the ability to load and filter Attachments for each employee as well as display, position and size pictures on a single click. In this training you will learn:
☑️ Advanced Filtering Techniques to copy data to another range
☑️ Advanced Filtering to filter data within the same range
☑️ Size, load & position thumbnail pictures on a single click
☑️ Create buttons and add macros to buttons
☑️ Use conditional formatting based on text values
- See Part 1 Here: https://youtu.be/iyr9WIyxlJc )
- See Part 2 Here: https://youtu.be/lba5z5RlzxI
- See Part 3 Here: https://youtu.be/5UTLbi4W9aw )
What would you like to see in this Part 5?
Email me back and let me know or comment below our YouTube or Facebook Videos and I will do my best to add it, in the coming weeks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479838.37/warc/CC-MAIN-20190216024809-20190216050809-00607.warc.gz
|
CC-MAIN-2019-09
| 874
| 11
|
https://www.guru.com/freelancers/iuliia-kuznetsova
|
code
|
AI, NLP/ML technologies, Chatbots, voice & text Data processing
I'm a product and project manager in Singularika, AI-software development team.
We are the team of NLP/ML developers experienced in chatbots, dialogue systems and text/voice data processing, machine learning, information retrieval, data mining, neural networks and other AI-technologies.
We can provide a full circle of development - from consulting to support, from prototyping and flow chart drawing to coding and deploying on a server.
We build any complexity chatbots: chatbots for FB Messenger, Kik, Telegram, Slack, Skype, Viber, Line, Discord and any other plantform SMS ,Twilio, Moxtra. chatbot for client's websites, chatbots like part of big projects with dashboard, admin panel, metrics in them, different API integrations and CRM integration and chatbots like standalone projects.
With the help of chatbots you can automate many processes, ( sell your product, lead generations, distributing proposals of new products / services / discounts; buying things without leaving the fb messenger; online appointments to doctors, beauty salons, interview, etc; automatiozation of inner office administration24/7 technical support and much more. And it's also an additional channel of communication with your audience.
expert in Microsoft Azure Cognitive Services
Easily add intelligent features – such as emotion and sentiment detection, vision and speech recognition, language understanding, knowledge and search – into your app
-Facebook chat bots, Facebook API, telegram,viber,skype,telegram,
- Microsoft Cognitive Services
- Bing Speech API,Speaker Recognition API,Linguistic Analysis API ,Knowledge Exploration Service
-Mongo, Mysql, MSQL, RESTful API arrangoDB Twilio
- PHP, laravel, codeiginter, zend2, Yii, wordpress, drupal
- AWS, digitalocean,
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178381230.99/warc/CC-MAIN-20210307231028-20210308021028-00157.warc.gz
|
CC-MAIN-2021-10
| 1,825
| 14
|
https://qacart.com/course/playwright-framework-project
|
code
|
Playwright Framework Design - Project!
Learn Playwright from Zero to Hero! At the end of this course you will be able to create a production ready framework for your project!
Drag to resize
Learn to use all the related tools, walk into a job and be a rockstar from day one. The skill you need to become a real professional. Learn the tools used by the world's top professionals. Boost your confidence, master the field.
With over 13 years of experience as an automation test engineer, I have developed a deep understanding of various web and API projects, and how to automate them effectively. Throughout my career, I have honed my skills in Selenium, Playwright, Cypress, and RestAssured, allowing me to work at an expert level in these areas.
In addition to my extensive experience in automation testing, I have also spent the past 4 years as an instructor, teaching over 8000 students the fundamentals of testing and automation. This has allowed me to gain a unique perspective on the field, and to develop a teaching style that is both effective and engaging.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817106.73/warc/CC-MAIN-20240416191221-20240416221221-00070.warc.gz
|
CC-MAIN-2024-18
| 1,063
| 6
|
http://www.indiastudychannel.com/forum/151632-Is-Parle-Appy-Fizz-a-safe-product.aspx
|
code
|
Is Parle Appy Fizz a safe product?With the early onset of summer in Delhi, the demand for cold drinks has been increasing steadily. In my home, my teen-age daughter has started taking cold drinks. To avoid consumption of cold drinks, I am purchasing Parle Appy Fizz mainly for my daughter, but also for the guests and ourselves (my wife and myself).
But my wife has started objecting to consumption of Appy Fizz. She has been receiving alerts from Whatsapp stating that Appy Fizz is not good for health (astonishingly Whatsapp doesn't send any message against consumption of Coke or Pepsi!). I personally prefer Appy Fizz over cold drinks because of its taste and whiskey-like colour. I haven't heard anything against Parle Appy Fizz til now.
I believe that this is nothing but a campaign against Parle Appy Fizz by the Coke or Pepsi companies. Just now I have checked the Internet but haven't found any reliable material in this regard. So, I seek the opinion of other Members. Is Parle Appy Fizz a safe product?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864624.7/warc/CC-MAIN-20180522034402-20180522054402-00262.warc.gz
|
CC-MAIN-2018-22
| 1,013
| 3
|
https://www.miroconsulting.com/blog/va-junks-key-microsoft-software-license-agreement/
|
code
|
Wondering if Software Assurance is a worthwhile investment? The Veteran Affairs Department asked that question of themselves, and decided to get rid of their SA, which actually ended up saving them a pretty penny (or I should say pennies). Our Microsoft expert, Tim Hegedus weighs in on the decision, you can check out the article here.
VA junks key Microsoft software license agreement
Miro is a leading global provider of software asset management services, specializing in license management, audit advisory, negotiation tactics, support management, and cloud services. We help our clients maximize ROI on their software license investments, stay in compliance, and minimize the impact of audits. Miro's performance guarantee promises that our long-tenured, diverse, and passionate team of expert analysts provides insightful and actionable advice to help our clients achieve the best possible outcomes.
Miro’s no risk Performance Guarantee is that the amount of cost savings that we uncover will be more than our fees.
- Microsoft Azure Integration Services
- How Supply Chain Shortages May Affect Software Licensing and Put You at Risk
- Non-Microsoft Support of Microsoft Products
- Exchange Server, SharePoint Server, and Skype for Business Server will become subscription licenses after Version 2019
- Microsoft Price Increase for Microsoft 365
Managed Services for Oracle Licensing
Miro’s Managed Services for Oracle licensing is a best practice approach for an organization to optimize and outsource the practice of Software Asset Management to specialized external experts to ensure the organization’s compliance with vendor rules and policies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300343.4/warc/CC-MAIN-20220117061125-20220117091125-00477.warc.gz
|
CC-MAIN-2022-05
| 1,661
| 11
|