url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.wheelhousecms.com/documentation
code
Wheelhouse CMS Documentation Site Administrator's GuideVisit Guide Learn about the Wheelhouse admin interface and how to manage a web site using Wheelhouse CMS. An ideal starting point for new users. Installation & Deployment GuideVisit Guide Learn how to setup and deploy Wheelhouse CMS on your own server or to a cloud hosting platform such as Heroku. Theme Developer's GuideVisit Guide Get started building your first Wheelhouse theme and learn how to structure your templates to make content editing easy. Plugin Developer's Guide Coming soon. Until then, visit the Wheelhouse CMS GitHub repository to view the source for some example plugins.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945381.91/warc/CC-MAIN-20230326013652-20230326043652-00219.warc.gz
CC-MAIN-2023-14
647
9
https://www.gpuhackathons.org/about/news
code
Run your favorite HPC applications on record-setting Arm-based HPC kit at a two-day hackathon for HPC developers. Fujitsu A64FX, AWS Graviton 2, and OCI A1 instances with Ampere Altra CPUs will be provided. The Korea Institute of Science and Technology and Information (KISTI) announced today that it has successfully completed 'KISTI-NVIDIA GPU Hackathon' from August 25 to September 1 in association with NVIDIA nd OpenACC. Developing improved materials for things such as energy storage and drug discovery is of interest to researchers and society alike. Although CSCS staff and representatives from their industry partner NVIDIA hosted EuroHack20 online this year due to travel restrictions caused by the COVID-19 pandemic, participants were still able to access the state-of-the-art high-performance computing (HPC) resources at CSCS to run their cod
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304872.21/warc/CC-MAIN-20220125190255-20220125220255-00185.warc.gz
CC-MAIN-2022-05
855
4
https://supportforums.blackberry.com/t5/Java-Development/How-to-leave-a-message-using-BBM-SDK/m-p/1630677
code
03-13-2012 07:33 AM I would like to use the bbm sdk to do the following. 1. Send a message using conn.sendData() 2. Close the app , and let the receiver look at the message when he wants. Now it seems I can send a message to ask the user to join and then when he has joined, send the data. I would like to just send a message and let the receiver look at the message when he wants. Is it possible? 03-16-2012 03:47 PM The BBMPlatformChannel.sendInvitation method allows you to specify a message to be delivered. You could also close the GUI portion of your app, but have the BBM aspect running the background to send the message you wanted once the channel is joined. This wouldn't cover you in the case of someone losing network coverage or turning the phone off, however. 03-20-2012 12:01 PM thanks for your reply, I figured out how to solve the issue. For reference , i am using the following code MessagingService messagingService = getBBMPlatformContext() .getMessagingService(); messagingService.shareContent("description", new BBMPlatformData(content), "Contact Picker", null);
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00123-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,084
11
https://mistershadrack.medium.com/?source=post_internal_links---------1----------------------------
code
Building a new React project can be a little intimidating when styling comes into play. Mostly, when I have a project idea and start a new React project, I don’t want to spend hours writing CSS, making animations, choosing a color theme, etc. as this can consume a huge amount of development time. It’s no surprise many frameworks for styling exist these days. Examples include: Material UI, Bootstrap, React Bootstrap, Semantic UI, React Toolbox, Ant Design, React Foundation, etc. However, If you want an accessible, beautiful and solid component library to start your next React app with speed, Chakra UI… In this article, We will learn about Context API in React and use it to build a very simple project. Context provides a way to pass data through the component tree without having to pass props down manually at every level. — react docs If you’ve used react for some time or have some level of experience with react, you will know that passing data via props becomes very cumbersome when the props are going to be… Software Engineer | Frontend Developer | React Lover
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154385.24/warc/CC-MAIN-20210802203434-20210802233434-00709.warc.gz
CC-MAIN-2021-31
1,087
7
http://blog.retroacorn.net/?tag=GoSDC
code
Installed SD Card Dismantled the Compact and installed the GoSDC into the ROM slot. Tried to power the small TV display from the machine but found it requires 6v. Going to have to add another Step-Up to the power board to provide the 6v it requires. Update: Wired in the extra Step-Up, Adjusted the voltages on the Step-Up boards so that one is 5v and the other 6v. Connected the power board to the BBC externally and checked that everything works ok. Board is powering the screen, Gonbez board and the BBC from the battery. Then tested the TV board, connected to the external video out and got the following. You can just about make out the Acorn MOS and the command prompt. This looks better in real life the camera doesn't do it justice. Next step is to get it to run something on the screen. I currently have a BBC Master setup on the desk in my office. The problem is that its not very portable, if I want to take it anywhere it requires a large CRT monitor or my recently acquired Gonbes VGA convertor board, a modern monitor and a set of power supplies. You then also need to take either a disc drive or the DataCentre to give me access to disc images so that I can actually do anything. I have a spare BBC Master Compact which I intend to make much more portable. To do this I intend to add the following to the machine... 1) As the original BBC Master Compact uses a large desk unit to house the disk drives I need an internal method of storing software to run on the machine. So I bought a GoSDC board which adds an SD card allowing me to store all of the software I need to use. The device plugs into a spare ROM socket internally in the machine. John Kortink who designed the board was kind enough to supply one without the headers as he thinks the Compact may not have enough room inside with them attached. If this is the case I will need to wire a set of switched to the board to enable and disable it for updating the firmware. 2) So that I can run the machine away from any kind of power supply I want to add an internal rechargable battery. Probably a lithium one with a charging circuit to provide a few hours of usage without needing a power supply. Obviously when the power is supplied it should cut off and charge the battery instead. As part of this I will add in a power switch so that the machine can be easily turned off and will allow for charging without the machine being powered up. 3) To provide a VGA output I will fit the Gonbes board internally and provide a VGA socket on the back for connecting an external monitor. This will require the power to the board and the TTL RGB output from the BBC to be wired to the board, 4) So that I can use the machine while on battery and without a VGA monitor or TTL RGB one I intend to provide a small screen built into the machine. This will probably be a 3-5 inch screen added to the top area of the case. Depending on the screen type this will either be wired to the composite out or to the second port on the Gonbes board. This should be a mirror of what is output to the VGA / TTL RGB. I might put a switch in to be able to turn it off as it will display even when connected to an external monitor. If I have time it would be cool if when the external monitor is connected it displayed a cool logo.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00770.warc.gz
CC-MAIN-2023-23
3,275
21
https://www.pcstats.com/articles/294/index.html
code
Ever make a spelling mistake while hunting up a website -- and then land someplace you didn't mean to go? Ever absorbed any of the information you found on that inadvertently-arrived-at site? Better yet, ever clicked on anything on Well, you're not the first. Many e-companies are profiting from people's poor typing skills and bad orthographic habits. The potential for straying off the beaten path of the internet is quite large, given that you need to accurately type a sequence of usually over ten characters in order to arrive safely at your desired destination (indeed, for some people, such accuracy proves next to Some of these misspelled sites are blatantly subversive, in that they're (ahem) pornographic. Type in www.hotmale.com, and see where that gets you. But hotmale.com isn't really a legitimate misspelling of hotmail.com. There are other, wackier domain names you'd never think of -- but might end up punching into your keyboard by mistake. If you're trying to find Yahoo! and hit "g" instead of "h," you'll get to a very, very vague page that tells you to "Click here to start your search." If you still fondly believe you're under the protective wings of the big Y, you'll "click here" and land on the home page of www.goto.com. This is a search engine that touts itself as the best new alternative to search engines. If their search strategies are as wily as their domain-name tactics, they probably are among the best. Because they're not just plagiarizing Yahoo!'s name. If you misspell infoseek.com, replacing the "s" with a "d," you'll get to publicadvertising.com, a search engine that reverts back to goto.com. Sound hopelessly convoluted and virtually inbred? Welcome to the web, my friends, where every spelling mistake counts -- as a page hit, that is.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00484.warc.gz
CC-MAIN-2021-43
1,782
24
https://reanalyses.org/atmosphere/us-summer-regional-climate-variability
code
From: Bosilovich, Michael G., 2013: Regional Climate and Variability of NASA MERRA and Recent Reanalyses: U.S. Summertime Precipitation and Temperature. J. Appl. Meteor. Climatol., 52, 1939–1951. doi: http://dx.doi.org/10.1175/JAMC-D-12-0291.1 The ability of reanalyses to reproduce the seasonal variations of precipitation and temperature over the United States during summer, when model forecasts have characteristically weak forecast skill, is assessed. Precipitation variations are reproduced well over much of the United States, especially in the Northwest, where ENSO contributes to the large-scale circulation. Some significant biases in the seasonal mean do exist. The weakest regions are the Midwest and Southeast, where land–atmosphere interactions strongly affect the physical parameterizations in the forecast model. In particular, the variance of the Modern-Era Retrospective Analysis for Research and Applications (MERRA) is lower than observed (extreme seasonal averages are weak), and the variability of the Interim ECMWF Re-Analysis (ERA-Interim) is affected by spurious low-frequency trends. Surface temperature is generally robust among the reanalyses examined, though; reanalyses that assimilate near-surface observations have distinct advantages. Observations and forecast error from MERRA are used to assess the reanalysis uncertainty across U.S. regions. These data help to show where the reanalysis is realistically replicating physical processes, and they provide guidance on the quality of the data and needs for further development. Figure: MERRA Summer Seasonal mean precipitaiton correlated to CPC Gauge observations. The white contour indicates statistically significant positive correlation at 99%.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297295329.99/warc/CC-MAIN-20240425130216-20240425160216-00176.warc.gz
CC-MAIN-2024-18
1,733
3
https://mail.python.org/pipermail/python-list/2002-September/152002.html
code
bokr at oz.net Fri Sep 27 18:22:22 CEST 2002 On Fri, 27 Sep 2002 07:23:53 GMT, Alex Martelli <aleax at aleax.it> wrote: >Terry Reedy wrote: >> "Alex Martelli" <aleax at aleax.it> wrote in message >> news:7nHk9.172208$pX1.6117207 at news2.tin.it... >>> The reason >>> zz = a and b or c >>> is not the same thing as >>> zz = a ? b : c >>> is that, when a is true and b is false, the former returns c, >>> while the latter returns b. >> In almost all the practical cases where I have thought about using >> this, b is *not* false or cannot become false, in which important and >> real case the two expressions *are* equivalent. >A typical, frequent, practical case is classification, e.g.: >"Append bleep to list truebleeps when bleep is true, append it >to list falsebleeps instead when false". >If we had a ternary operator, a natural way of expression would be: >Of course this would be a disaster with the and/or idiom instead: > (bleep and truebleeps or falsebleeps).append(bleep) >As list truebleeps starts out empty, thus false, this buggy code >would NEVER append anything to it. >In this case, like in most others (but far from all!) we don't >need short-circuiting, so we can perfectly well code: > (truebleeps, falsebleeps)[not bleep].append(bleep) >This is now correct -- but still nowhere as clear as good old: It's correct given that truebleeps and falsebleeps are simple references with no possible side effects from use as above, but I think it's important to note that the side effect restriction makes it not semantically identical to > if bleep: truebleeps.append(bleep) > else: falsebleeps.append(bleep) when there is more to it than simple references. >which to me remains the canonical way to code this in Python. >Yes, it IS fractionally more verbose, but, so what? It's >immediately obvious, simple, and not clever. E.g., if truebleeps and falsebleeps were properties, if bleep: objectHavingProperty.truebleeps.append(bleep) would not trigger potential side effects of respective property getter functions, whereas would. I think it worth repeating that short-circuiting was (ISTM) invented to allow expressions where the terms preceding others in left-right order **prevent evaluation** of succeeding terms as soon as they cannot affect the total boolean value, so we can e.g. avoid exceptions in writing things like if i>0 and i<len(aList) and aList[i] is not None: foo(aList[i]) The ternary expression also has the feature of preventing evaluation of the non-selected term. Someone else brought this aspect up before, but I think it's important enough to repeat. >> I think this is an elegant hack, and so I shared it in response to the >> OP. Others think it ugly. So be it. >It's _dangerous_ -- to use it, one always has to be fully aware >of the risk that subexpression b might be false. I think this >is a pitfall just waiting for the unwary to stumble. Not being >an aesthete, I consider that more important than issues of beauty. I'd like pitfall-free beauty ;-) More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864391.61/warc/CC-MAIN-20180622104200-20180622124200-00116.warc.gz
CC-MAIN-2018-26
3,031
56
https://forums.macrumors.com/threads/constructive-criticism-post-your-artwork-project-concepts-for-feedback.48164/
code
I thought I would initiate the creation of a thread dedicated to the subject, as there have been some off-thread posts of individuals' artwork, website design, etc. with requests for feedback. It's time has come, and why not? I think this is a great place to obtain constructive criticism for those who seek it. Many here are artists, photographers, editors, graphics designers, programmers, educators, etc. and in my experience most are happy to share information and do good unto others. A great opportunity to post your work, and receive some opinion and advice. Please be constructive. I look forward to seeing others work!
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658662.31/warc/CC-MAIN-20190117000104-20190117022104-00018.warc.gz
CC-MAIN-2019-04
627
1
https://knowledge.broadcom.com/external/article/144979/importing-an-agent-using-asset-collector.html
code
Client Automation 14.X The software information of Agents is stored (among others) in 2 tables, first is the "ca_discovered_software", which holds the link between Agent and the software, and also on "ca_software_def", where is stored the detailed information of that specific software. Here is where a limitation is present, looking at the columns called 'name' and 'sw_version_label' (which hold the software name and its version) have a character limit, based to their data type, of 255 and 64: If the software name or version written down in the XIU file have more than 255 or 64 characters respectively, the Agent will be stored correctly, but that specific software won't. Since XIU file is written manually, there is no validation made on the number of characters in each field. The recommendation is to always keep the amount of characters as reduced as possible.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00493.warc.gz
CC-MAIN-2023-50
871
5
https://ollieharperstudio.com/exipure-boulder-colorado/
code
Exipure Boulder Colorado Exipure is an all-natural nutritional mix that sustains healthy weight-loss by converting white fat into brownish fat. This supplement uses an unique means to remove extra fat in the body that is otherwise layered and also makes a person extremely obese.Exipure Boulder Colorado The conversion of white to brownish fat is made possible making use of all-natural active ingredients with tried and tested medical benefits. Absolutely nothing inside Exipure is obtained from untrusted or artificial resources; as a result, it carries no wellness risks. This supplement is currently up for sale at a special discounted cost online. Diet plan tablets are preferred for many reasons, however people prefer making use of diet regimen tablets since they desire an easy weight-loss experience. The common idea of weight-loss entails following a limiting diet regimen and indulging in difficult workout. While these 2 can help for the most part, there are additionally possibilities for them to be inadequate, as weight gain reasons differ in every person. In many cases, even one of the most well-known diet plan plans fall short to work, or it is expensive for individuals to employ an individual trainer or secure time for exercise on a daily basis. On the other hand, making use of diet regimen tablets as well as anticipating the body to slim down on its own noises simple, plus diet regimen pills set you back less than a weight loss surgical procedure, so people favor to use them. Exipure is just one of the current additions in the diet tablets that are chosen nowadays. Regardless of being a new item, it is receiving a cozy welcome, mostly due to the fact that it has actually assisted individuals attain their target weight without triggering a monetary problem. Yet the risk of trying a new item remains the same, especially for a person that has never ever tried a dietary supplement before.Exipure Boulder Colorado Just how to ensure if it is secure to utilize? What are its ingredients and also where to get Exipure? Find out all in this Exipure testimonial. What Exactly Is Exipure? Exipure is a weight loss supplement made from all-natural ingredients with clinically confirmed advantages. It results from years-long study on medicinal plants, wanting to locate the most effective options for all-natural weight reduction. Exipure Boulder Colorado As plants have actually been used for countless years in various treatments, scientists believe several of them can also assist against excessive weight. In this attempt to discover these plants, they created 8 exotic components, each playing a role in shedding unwanted fats. As pointed out on exipure.com, this supplement works similarly well on men, ladies, and also people who determine themselves besides this binary classification. It is a non-prescription formula, but just those that are 18 years and over can utilize them. Exipure can be found in capsule type, and there are 30 of them in each container. This bottle is to be consumed in one month, ideally, and also the best outcomes are observed within a couple of months. Although the supplement market teems with similar items, fat burning with Exipure is distinct. It functions by altering the common white fat to brownish fat, additionally called brown adipose fat. The natural ingredients inside this supplement assistance in this conversion, and also the body loses a great deal of calories during this conversion. The most important and also unique high quality of Exipure is that it goes inside the body and targets the major cause of weight gain. It functions to improve metabolic rate and control stress and also inflammation inside the body. In addition, Exipure is a US-made item prepared in an FDA-approved and also GMP-certified facility. The final product is evaluated with a third-party laboratory for high quality and security. There are least chances of it going wrong and also raising an unwanted result. Continue analysis to know more regarding Exipure action, active ingredients, and pricing. Exipure Contents List The official website of Exipure points out eight special ingredients inside this formula. These components are chosen after experiencing hundreds of research studies on each, showing them a suitable choice for this formula. They are acquired from various locations, and also there is no details information on each component’s place particularly. Below is a checklist of all Exipure ingredients as well as their effects on the body. - Perilla: the first name in Exipure active ingredients is perilla, also called beefsteak plant. There are a lot of researches confirming its impact on cholesterol levels, as it balances the HDL and LDL levels and also help in brownish fat development. Several of its compounds additionally offer cognitive benefits as well as boost brain-to-body sychronisation. - Holy Basil: next is Holy Basil, an active ingredient with tried and tested medicinal benefits. It eases stress, and also swelling, both biggest triggers of a sluggish metabolic process. Exipure Boulder Colorado It likewise clears the body from toxic substances, waste materials, and also mobile wastage, preserving excellent metabolic conditions for the body. - White Oriental Ginseng: Exipure pills also have Panax ginseng or Oriental ginseng, which gives unparalleled energy to the body. This energy assists the body run its functions in spite of slimming down, and also there is no lethargic or weak feeling experienced by the body. - Amur Cork Bark: not as prominent as other components, yet amur cork bark uses metabolic advantages that make weight loss easy. Exipure Boulder Colorado It relieves bloating, diarrhea, pains, nausea, windiness, as well as other conditions that are common in overweight individuals. - Quercetin: Next on this listing is quercetin, an active ingredient offering benefits for high blood pressure, heart health and wellness, and vessel health and wellness. Some research studies likewise confirm its duty in boosting immunity, postponing aging, as well as invigorating body cells, keeping them young for a long period of time. - Oleuropein: in some cases referred to as Olea Europaea, oleuropein shrinks the fat cells, helping them change to brown adipose tissue while losing a great deal of energy utilized to sustain mobile tasks. It further enhances cholesterol levels, high blood pressure, sugar levels, and lipid profile, protecting against several health and wellness problems. - Berberine: one more name in the Exipure active ingredients checklist is berberine, which is loaded with anti-inflammatory antioxidants. It helps clear the body from contaminants, eliminating totally free radicals and cellular wastes that occasionally impede metabolic rate. It sustains healthy food digestion, as well as with quercetin, it thaws extra fat in much less time. - Resveratrol: the surname in Exipure active ingredients is resveratrol, an antioxidant commonly located in grapes. It offers a number of wellness advantages, one of which is to decrease cholesterol levels, avoid plaque formation, as well as clear contaminants. All these ingredients are gotten from pure quality sources, and also nothing among them can trigger any adverse effects in the body. Read what Exipure reviews from customers as well as their stunning discoveries need to say regarding this supplement. Exipure Boulder Colorado Is it truly worth spending money on? Take a look at this thorough report which will impress you. Exactly how Does The Exipure Formula Job? Acquiring weight has ended up being much easier as a result of the changed way of life and also nutritional practices. Not just grownups, yet younger and also older people are additionally victims of excessive weight now, and also these fads are boosting yearly. Exipure Boulder Colorado The wellness specialists are extremely concerned over these obesity fads, recommending individuals change to a much healthier lifestyle. However it is usually not an option, and somehow, people have a tendency to seek faster ways to make it take place. Exipure is a fat burning dietary formula produced with metabolic-boosting herbs. According to the firm, it helps change the white fat cells to brownish fat, making them better and also healthy for the body. There is a great deal of clinical proof recommending BAT is related to excessive weight. The makers of the Exipure weight management supplement have used this info and developed a formula that utilizes all-natural components to raise brownish adipose tissue degrees. For individuals who do not know concerning brownish fats, it is a sort of fat that just activates when the weather is cold. It melts, offering warm to the body, which makes cold temperature tolerable for it. Do not perplex this brown fat with the normal fat, likewise called white fat, as it lugs much more mitochondria in its cells, making this fat thaw more energy release. This process melts a a great deal of calories, keeping the body heated, stimulated, as well as generating weight management. Where To Purchase Exipure? Price, Discount and Refund Policy Exipure is currently in stock and readily available for instant shipments. The only means to get your hands on this supplement is with its main internet site (exipure.com), as it is not readily available anywhere else. You can position the order online, directly, as well as your order will certainly reach your doorstep within a few days. Do not trust any type of online or neighborhood vendor selling Exipure supplement for weight reduction. Exipure Boulder Colorado The firm has no companions, as well as there are high opportunities of other business utilizing its name to sell their fake products. Constantly pick the official web site over the arbitrary online shops to make your purchase. The real rate of the Exipure supplement is virtually $200, yet it has actually reduced it to $59 only, as a part of promotions, to make sure that an increasing number of individuals can learn about it. Here are the full prices details. - Obtain one container of Exipure (1 month supply) for $59.00 just (Plus shipment costs). - Get 3 bottles of Exipure (90 days supply) for $49.00 per bottle (Plus delivery costs) + Benefit items. - Obtain six bottles of Exipure (180 days supply) for $39.00 per bottle (Complimentary distribution) + Incentive items. Get Exipure at a Price Cut: From The Official Web Site Right Here Although it is much better to buy just one container first and order more later on, after utilizing it for a few days. Yet Exipure might not be available constantly, as it is a prominent product with high need. The business can only manufacture a restricted stock, as well as restocking might take a couple of months. For that reason, it is far better to purchase three or 6 containers to start a weight management journey. You can constantly buy even more containers when offered and continue using them for as long as you require. It is likewise crucial to keep in mind that Exipure Australia, NZ, Canada, UK, and clients from various other nations all over the world should also put their orders on the main internet site stated above. Exipure Reimbursement Policy. Exipure features a 100% fulfillment assurance as the business prepares to refund the total order value, if this item falls short to meet your expectations. There is no minimum or maximum to get this deal and all orders acquired with the main internet site will instantly belong of this reimbursement plan. The firm regards customer complete satisfaction as its leading priority as well as is ready to birth a loss, if Exipure stops working to accomplish its guarantees. The moment needed to get this refund is 180 days, or six months, that is enough to evaluate this supplement. The company has an active customer assistance team prepared to help new as well as existing individuals. Call the consumer like understand the process of refunds. Additionally, do not discard your made use of or vacant Exipure containers, as you might be asked to send them back to the business as a receipt. Do not depend on sources aside from the main site to obtain your Exipure order as this reimbursement plan does not use on containers purchased from unauthorized resources. The reimbursement demands gotten after passing this 180-day limit will certainly be turned down by the business, so keep a track of this time. Directions To Use Exipure Supplement. Utilizing Exipure is no various than using multivitamins, and also you only require a glass of water to eat it. The daily dosage is only one pill, and taking a greater dose is strictly prohibited. Exipure Boulder Colorado There is no set time to take this day-to-day dose, and you can take it at any time of the day. Nevertheless, it is better to repair a time to consume it so that you do not fail to remember or avoid the everyday dosage. The outcomes appear within 3 to six months, yet it can be used for longer than six months, too, as it has no negative effects to use. Though private outcomes may vary, Exipure is for everyone, regardless of weight, but incredibly obese clients may take greater than six months to reach their target weight. Absolutely nothing inside Exipure has an addictive possibility or withdrawal impact, as well as you can utilize it over and over without worrying about anything. Others that are just a few pounds over their target weight will only see adjustments in a few weeks. The moment needed to reveal the outcomes depends upon the body’s capacity to respond to different active ingredients, and no 2 bodies share the very same features. Do not make use of Exipure if you are unclear regarding its use, or talk with a medical professional to learn more regarding supplement safety and security. Exipure Reviews – The Verdict. To summarize, Exipure appears to be a potent fat burning supplement, with direct benefits for the metabolism. It utilizes a healthy way to reduce weight, which is why the results of the Exipure supplement are much longer and much better. Actually, they stay the exact same after you stop using the supplement and also maintain the results with standard nutritional adjustments and exercise. All orders are shielded with a 180-day money-back guarantee, during which you can pick to get a refund of your order if it falls short to assist you in weight reduction. Do not take more time since Exipure is offering quickly, as well as there are just minimal containers left. See the official web site to validate your order prior to the stock sells out. Exipure Frequently Asked Questions: What is The Correct Time to Consume Exipure? There is no standard time to use this supplement, and the user can take it according to his comfort. The company guarantees there is no sedative component; therefore, Exipure does not impact the sleeping cycle. Exipure Boulder ColoradoHowever, it is best to take it during the very first fifty percent of the day to make sure that it has throughout the day to activate BAT conversion. Is Exipure Suitable For Everybody? Based on the info shared online, Exipure has a 100% all-natural formulation with no GMO active ingredients, soy, as well as gluten in it. It is also devoid of unneeded chemicals, fillers, binders, and preservatives that might make an item unsuitable for long-term use. The formula is best for people in their midlifes, handling obesity without any time to diet regimen planning or exercise. Just How Much Weight Can One Lose with Exipure? The quantity of fat burning can be different for different individuals, and also there is a criterion for this weight reduction. One can shed even more weight in less time by eating Exipure diet plan pills in a healthy, low-calorie diet plan and also an active way of life. Can You Obtain An Allergic Reaction From Exipure? Exipure has no risk of side effects and also allergies, as well as it is unusual to have allergies with medicinal active ingredients, as a whole. There are no complaints from the customers, and also no user reported an allergic reaction after using this formula. If a person has a background of food-borne allergic reactions, it is far better to speak with a medical professional beforehand for a safe fat burning experience. Just How To Get In Touch With Exipure Company? The firm has an active client assistance line to promote new as well as existing customers. Exipure Boulder Colorado All the orders are secured with a 180-day money-back offer that can be availed by contacting the team. Below is just how to call them. Email: [email protected] Domestic Phone Calls: 1 (800) 390 6035. International Telephone Calls: 1 (208) 345 4245.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662636717.74/warc/CC-MAIN-20220527050925-20220527080925-00736.warc.gz
CC-MAIN-2022-21
16,666
65
https://blog.ipspace.net/2011/01/configuring-ospf-in-phase-2-dmvpn.html
code
Cliffs Notes version (details in DMVPN webinar): - Configure ip nhrp multicast-map for the hub on the spoke routers, otherwise the spokes will not send OSPF hellos to the hub. - Use dynamic NHRP multicast maps on the hub router, otherwise the spokes will not receive its OSPF hellos. - Use broadcast network type on all routers. You could use non-broadcast network type and configure the neighbors manually, but that would just destroy the scalability of the solution. If you use point-to-multipoint network type, all the traffic will flow through the hub router. - Only the NHRP next hop servers (usually the hub router(s)) can send OSPF hellos to everyone. If any other router becomes DR or BDR, you’ll get hard-to-explain partial connectivity. - Set OSPF DR priority to a high value on the hub router (so even if an under-configured spoke joins the network, it won’t preempt the hub). - Set OSPF DR priority to zero on the spoke routers (this ensures they can never become a DR or BDR). - The DMVPN part of your network should be a separate OSPF area; if at all possible, make it a stub or NSSA area.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00016.warc.gz
CC-MAIN-2023-50
1,107
9
https://www.freelancer.com/work/555-timer-traffic-light/
code
...lighting, you must use the normal vectors. Note that assigning colors to vertices is not lighting. You must use light sources and surface materials and implement lighting equations in shaders. b. Add a sun light (also called a directional light) source to the scene. c. Specify surface material properties for the two objects. Each object must have a different I am having a website and someone SEO expert who can help to increase traffic on my website I need someone to do some SEO marketing for my business. This marketing should increase traffic to our website as well as increase our online profile. The marketing should improve our online reputation. I'm using [login to view URL] for my website. Please message me if you have any questions. Hi, I work for a Vape company based in Ireland and we are looking for someone to work together with myself to help bring our website to the next level! We feel like we have a decent foundation to work from but just fall short on some aspects of our website development and SEO etc. We would like someone to maybe take a look at(audit) our website and point us in the right direction of what needs to... Hello! GameSkinny is currently looking for fresh talent to join our freelance team with the sole purpose of creating traffic-driving content. Candidates must be able to: -Research current trends and keywords -Write quality guides based on research and needs of the community. -Bring in new audiences through self-promotion and content marketing. We USA only. Other countries need not apply. I am looking for a USA freelancer to assist me with a small project - around 3 days. Data entry and light management. I am a wealth manager based in California. Will provide instructions and training for the right candidate. Must have a printer available. ...add to basket CTA - Creating a stock look up functionality - show expected shipping date, once the customer has entered their prescription - this is based off our dispatch timer already on the site For contact lens pages only: - Changing our 'enter your prescription' form slightly with the last data field being changed to suit lens quantity per eye ...the flash sale store is simply as following: the store should have only banners in the homepage, every banner have a countdown timer, and inside of the banner there is many product with countdown timer. when the countdown timer is finish the banners should be removed and also the products inside the banners should be removed. please try to understand Reworx Service Group will provide the following resource information/data per package: Existing, marked-up ‘floor plan’ type drawings with applicable notes and measurements photos arranged and sequenced as per Reworx Location maps, address and job codes The AutoCAD Specialist/Operator will then produce, assimulate and package the drawings as per the resource information/data provid... I need a special timer that can keep track of the total time throughout the day in which product is passing in front of a proximity sensor on a conveyor belt. The proximity sensor, or eye of some sort needs to be able to read something passing in front of it up to 4 feet away, and keep track of the total amount of time product is passing in front of ...notification will be sent to the player's cell. This includes the Prize Money for the game. 8) The player can choose to play at their own time. However, once they start the game, the timer is set. 9) Backend admin site will keep record of users accessing the game, playing and scoring. 10) Players will see LIVE how many people so far have accessed the game AND ...2:20 – 2:21 in the video: Tab the button in the Cleaning display in the machine Graphic 8: wait until the machine has completed the process (Graphical watches with Timer Function: 2 Min + 30 Sec)... ...TcpExt: 5687 resets received for embryonic SYN_RECV sockets 40 ICMP packets dropped because they were out-of-window 1143584 TCP sockets finished time wait in fast timer 208 packetes rejected in established connections because of timestamp 20374 delayed acks sent 257 delayed acks further delayed because of locked socket Quick I need a new website. I need you to design and build a website for my small business. ...please offpage seo, outreach for my online shop you have to be experienced in 5 years in SEO you have to reach my keywords, ranking goals, you have to bring enough useful, real traffic to our website we need this guy with below skills: 1, write articles ( blogs), this articles with good content, and with keywords set 2, can promote these articles on relate ...internationalization. - Be able to make a timeline of event with a timer : For example = the player play [CHAT 1] --> 5MIN after [CHAT 2] become available --> 30SEC after the player receive [CALL 1], ... - Make the Shared Preferences so that the player can pick up the game where he left it. - Make a timer that show the player when the next EVENT* is coming up and a. Introduction: here you briefly explain what the essay is about and how you intend to approach the issue - what follows in the essay. b. Main concepts behind the problem and discussion: Here you have the opportunity to present the main theory behind the question, the main ideas, or the whole debate. Then (or along the presentation) you should express your own views, linking them with the other r... ...In the account user must see their purchased boxes ) The main element of this website will be the monthly box. This box must contain: items included, price, box name, and a timer for example for 30 days. The payment systems I need are : PayPal , Bitcoin, Credit Card (optional ) ( You can use any payment gateway ) The registration must contain Username I have some working code that trades on Coinbase. It currently uses th...switching and what price you would be charging for doing the work I attach the ActiveX class module - I pass data to it with Access (allowing that code to continue) and a form timer checks whether there is anything to be done. That, of course, is done in its own process space. I have a few projects but this is one I need to sort out I need on page seo work and off site ackline as well. I only want people that are very expianced no starters. I want to hear what you are going to offer and how much. The money is not a major concern. I have 27 sites that I want a long tern person to work almost full tim for the next month. So hit me up. Need a Traffic Statement for a UK Planning Application. Please apply only if you have experience preparing traffic statements.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158691.56/warc/CC-MAIN-20180922201637-20180922222037-00149.warc.gz
CC-MAIN-2018-39
6,571
21
http://coolthingoftheday.blogspot.com/2013/01/bcp-with-bdr-sqlbulkcopy-idatareader.html
code
"Often large amounts of data need to be quickly loaded into a database. A common approach is to fill a DataTable and use the SqlBulkCopy class to load the data. The problem with this approach is that the data set must be materialized in memory. This is inefficient because the data must be copied and transformed several times and the cache utilization is poor. As well it does not scale because memory is usually a limited resource. But it is far faster than one row at a time inserts. An alternative is to implement an IDataReader and use the SqlBulkCopy class to load the data but the implementation requirements are poorly documented. I have developed the BulkDataReader class that makes the implementation straightforward. With the class, it is possible to stream the data from one source into a database. Since the data has fewer transformations and is streamed from buffer to buffer (and thus utilizes caches better) the performance and resource utilization is much better than other approaches. In practice, the limiting factor with this approach is how fast the data can be read from the data source. In early releases of the .Net Framework, the DataTable approach was much slower than the IDataReader approach but DataTables are now much more efficient and the approaches have comparable performance when memory is not a constraint. Bulk loading data is much faster that loading data with single inserts because the repeated overhead of transferring the data, parsing the insert statement, running the statement and issuing a transaction record is avoided. Instead, a more efficient path is used into the storage engine to stream the data. The setup cost of this path is however much higher than a single insert statement. The break-even point is typically around 10 to 100 rows. Once the data exceeds this size, bulk loading is almost always more efficient. The download has all the code and test code for the BulkDataReader class. To implement an IDataReader using the BulkDataReader, do the following: · Override the SchemaName and TableName properties with meaningful names. These need not match the target schema and table names and are useful for debugging. · Override the AddSchemaTableRows method to declare the schema of the source information. In general, this should match the target schema but some remapping is possible. · Override the GetValue method to return the value of a column for the current row. · Override the Read method to advance to the next row. · If the subclass contains disposable resources, override the dispose method This is SqlBulkCopy is something I've started using recently and I think I've been using the DataTable approach. Now, no more of that!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125654.80/warc/CC-MAIN-20170423031205-00281-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,699
10
https://sites.google.com/site/lchaudha/
code
Latika Chaudhary is an Associate Professor of Economics at the Naval Postgraduate School. Her research focuses on key issues in economic development, business history and public finance, with an emphasis on human capital and infrastructure. She has published articles in American Economic Journal: Economic Policy, Economic Journal, Explorations in Economic History, Journal of Economic History, Journal of Comparative Economics, Journal of Institutional Economics and Economics of Education Review. Her military projects have been funded by the Naval Research Program, Acquisition Research Program and USMEPCOM. She teaches courses in economics, statistics, and cost-benefit analysis at NPS where she has received the Liskin Award for Teaching Excellence and the EMBA Teaching Excellence Award. Before joining NPS, she was an Assistant Professor at Scripps College, a Hoover National Fellow, an Economics Fellow at Stanford University, and a Visiting Fellow at the Institute of Advanced Study at University of Warwick.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00608.warc.gz
CC-MAIN-2023-23
1,019
2
https://docs.typo3.org/p/mask/mask/4.1/en-us/Sponsors/Index.html
code
Mask was supported by great sponsors! Thank you very much! We started Mask for our customers and used it only internally. Creating new fields always had to be done by hand (create SQL/TCA,…). Then we got the idea to create a comfortable wizard to create such things easier and make this public. We searched for financial support and discovered crowdfunding. On startnext we created our project. List of main sponsors¶ List of logo sponsors¶ List of further sponsors¶ Roland Klein Johannes Reß René Carolus Korbinian Kugelmann
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00232.warc.gz
CC-MAIN-2023-50
532
5
https://www.klrforum.com/threads/the-angry-owl.12086/
code
Is it just me, or does the 2008 and later KLR look like an angry owl when viewed from the front? just wish I could figure out how to fit Angry Owl on a custom plate here in AZ It works if you click it though. To post the pic itself you have to copy and paste the image code from photobucket into the message, then it'll show the pic right in the posthttp://i1222.photobucket.com/albums/dd486/19willys51/owl.jpg hmm, thought that would post the pic but I guess not?
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655906934.51/warc/CC-MAIN-20200710082212-20200710112212-00543.warc.gz
CC-MAIN-2020-29
464
3
https://docs.typo3.org/p/derhansen/sf_event_mgt/6.0/en-us/ForEditors/BackendModule/Index.html
code
Open the the backend module “Events” from the TYPO3 backend menu and next select a sysfolder containing your events. To filter in the list of events, use the 3 search-fields title, startdate and enddate. The backend module contains 5 actions in the upper left. - The first 4 actions creates new items (event, location, organisator, speaker) - The last action does the same as the cronjob, it hides/removes expired registrations With the backend module, you can export a list of participants for events, which are enabled with the registration option. If the list of fields exported does’nt fit your needs, you can adjust the fields in the module TypoScript settings as described in the configuration section of this extension. Sending custom notification¶ For events which are enabled with the registration option, you can also send custom email notification to the participants of the event. Press the “+” icon to get to the view, where you can select the custom notification template. If you want to create a custom notification, you just need to add some TypoScript and a Fluid template for the new custom notification. Please refer to the manual in the administration section of this extension.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00165.warc.gz
CC-MAIN-2023-40
1,209
9
http://toshiembalaje.com/information-that-is-passively-gathered-by-unity/
code
Unit Information: including different unique identifiers, such as for instance IDFA, Android os Ad ID, IDFV, MAC target, when, as an example: You access games provided by Developers being developed with Unity computer computer Software; You access games when the Developer employs Unity Analytics to know the application of their games and increase the player experience You get advertisements delivered by Unity Ads; You perform games given by Developers that use Unity’s Multiplayer provider; You access games provided by Developers that provide Unity’s game replay provider; and Hands per hour task and actions: once you perform a game title that utilizes Unity Analytics, certain game tasks such as for example play session information and monetization occasions are gathered. A Developer making use of Unity Analytics might want to collect User information such as for instance name, email, birthdate, sex, application ID or any other data parameters that are developer-defined. Take note that Unity does perhaps perhaps not access or usage this information collected https://besthookupwebsites.org/snapfuck-review pursuant to a Developer’s customized setup. Log information: whenever you access our provider or products that utilize an element of our provider, we might log a number of technical information (“Log Info”), including: Unit information, including unit title and IDs, hardware model, operating-system and variation, and network information that is mobile Date/time of access; Requested page(s); and Consumer unit information: whenever you perform a game title constructed with Unity computer Software, Unity may gather some or most of the information that is following you utilize the overall game: Unique device identifier created through the unit MAC/IMEI/MEID, which we change to restrict the capacity to recognize the device that is relevant the near future; A marketing ID, like the Apple IDFA or the Android os Ad ID; Unit maker and model; The running version and system running on the body or unit; The model of the Central Processing Unit, and number of CPUs current; The layouts card information, such as for example kind, driver and vendor title, variation and graphics API; Quantity of system and video RAM present; Present display screen quality; Unity Player and Unity Editor variations; Os identifier ( e.g., Mac, Windows, etc. ); A checksum of all of the data that gets delivered to confirm so it did send correctly; and App ID associated with the game set up. Developer computer computer Software information: if you use Unity computer computer Software to build up games and apps, We’re going to gather internet protocol address, operating-system, username, hostname, equipment ID, serial quantity, Unity ID, company ID, and project ID through your very first utilization of the computer computer Software. It may automatically make Internet connections to check for updates, validate your license keys, and provide us with aggregated usage statistics when you use Unity Software. We possibly may use third-party analytics solutions to get and analyze Developers’ usage of the Unity computer Software. Snacks and choices concerning Unity Ads: Other information: we might get information that is additional you against 3rd events such as for example marketers, lovers, scientists, yet others. We might combine information we collect away from you with information regarding you that individuals get from such 3rd events and information produced by some other membership, item, or solution we offer.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711360.27/warc/CC-MAIN-20221208183130-20221208213130-00433.warc.gz
CC-MAIN-2022-49
3,547
29
https://www.dynamicpeasap.com/dynamic-pe-plans/9ZvVgZ
code
I can demonstrate chasing and fleeing in a game. I can demonstrate three cardiovascular activities. Music for Walk, Trot, and Jog I can jump a turned long rope more than once demonstrating cues. I can jump a turned long rope and perform a self-selected trick. I can identify long rope jumping activities that are challenging to me. Long jump ropes (two for each group of four children) I can apply simple strategies while fleeing and dodging.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296820065.92/warc/CC-MAIN-20240425000826-20240425030826-00465.warc.gz
CC-MAIN-2024-18
442
8
https://ppb2.gdb.tools/faq
code
Fingerprint is the numerical representation of a molecule. The Fingerprint of a molecule contains set of different numbers, which usually describe the properties of a molecule such as physio-chemical properties, composition, topological features, substructure etc. Once the fingerprints of the molecules are computed they can be used for variety of different calculation such as similarity searching or model building. MQN stands for Molecular Quantum Numbers and is one of the fingerprints we developed in our group. MQN represents the molecule using 42 integer value descriptors of molecular structure, which count different type of atoms, different bond types, polar groups, and topological features. Reference: Classification of Organic Molecules by Molecular Quantum Numbers. K. T. Nguyen, L. C. Blum, R. van Deursen, J.-L. Reymond, ChemMedChem 2009, 4, 1803-1805. Xfp is the topological pharmacophore fingerprint recently developed in our group. Construction of Xfp for the molecule begins with, assignment of the atoms of a molecule to four different groups defined by generalized pharmacophoric atom types, namely Hydrophobic (H), Hydrogen Bond Acceptor (HBA), Hydrogen Bond Donor (HBD) and Sp2 atoms. Following classification of atoms, Xfp counts occurrence of “atom pairs” (formed by five different groups namely H-H, HBA-HBA, HBD-HBD, HBA-HBD and Sp2-Sp2) at topological distances ranging from 0 to 10 which results in 55 (5x11) dimensional Xfp. Reference: Atom Pair 2D-Fingerprints Perceive 3D-Molecular Shape and Pharmacophores for Very Fast Virtual Screening of ZINC and GDB-17. M. Awale, J.-L. Reymond, J. Chem. Inf. Model. 2014, 54, 1892-1907. Extended-Connectivity Fingerprints (ECFPs) are circular topological fingerprints designed for molecular characterization, similarity searching, and structure-activity modeling. It is among the most popular similarity search tools in drug discovery and they are effectively used in a wide variety of applications. ECfp4 encodes substructure patterns from molecules on to the bit string of length 1024 (length is variable). ECFP generate the substructure patterns by considering the atoms into multiple circular layers up to a given diameter. In our browser we have used the ECFP with diameter of 4 (ECfp4). Reference: Extended-Connectivity Fingerprints. Rogers, D.; Hahn, M. J. Chem. Inf. Model. 2010, 50(5), 742-754. Ligand based target prediction is based on fact that similar molecules are most likely to have similar bioactivities and will bind similar target proteins. Thus for any given query molecule the targets can be predicted by comparing the query to known bioactive ligands. In ligand based target prediction approach each of the target proteins is represented by set of known bioactive ligands. Following, the targets for a query molecule is predicted either a) by ranking the targets in database as per similarity of the query to nearest neighbor associated with the target. or b) by using machine learning or statistical model built on the reference database. Nearest neighbors are compounds from database which are most similar to a query compound. It is the compound among many different compounds annotated for the target X. This compound shows the highest similartiy to a query molecule. Given a query molecule and fingerprint of a choice (MQN or Xfp or ECfp4) target prediction involves following steps: a) calculate the similarity between a query molecule and each of the compounds in reference database, b) sort the compounds in reference database as per similarity score, c) extract top 2000 compounds (nearest neighbor of a query) from reference database, d) collect the targets associated with these top 2000 compounds. e) make the list containing unique targets d) sort the targets as per similarity score of the most similar nearest neighbor associated with a target. In our browser we have implemented three different similarity searching based methods namely: NN(ECfp4), NN(Xfp) and NN(MQN). NN + NB methods combine the similarity searching (NN) with the multinomial Naive Bayes machine learning model (NB). Given a query molecule target prediction using NN + NB method involves following steps: a) calculate the similarity (using either ECfp4, Xfp or MQN) between query molecule and each of the compound in reference database, b) sort the compounds in reference database as per similarity score, c) extract top 2000 compounds (nearest neighbor of a query) from reference database, d) build the Naive Bayes machine learning model with 2000 compounds using ECfp4 fingerprint e) predict the targets using NB model and return top 20 predicted targets. In our browser we have implemented three different NN + NB methods namely: i) NN (ECfp4) + NB(ECfp4), ii) NN(Xfp) + NB(ECfp4) and iii) NN(MQN) + NB (ECfp4). NB(ECfp4) stands for multinomial Naive Bayes model built on reference database (~350K compounds and 1720 targets) extracted from ChEMBL using ECfp4 fingerprint. In this case model was built only once and use to predict the targets for any query molecule. DNN(ECfp4) stands for deep neural network model built on reference database (~350K compounds and 1720 targets) extracted from ChEMBL using ECfp4 fingerprint. In this case model was built only once and use to predict the targets for any query molecule. NN(ECfp4), NN(Xfp), NN(MQN) are similarity searching based target predictions methods, using ECfp4, Xfp and MQN fingerprints respectively. In case of Xfp and MQN city block distance is use. In case of ECfp4 Tanimoto coefficient is use. Targets labeled as “single protein” with the source organism being either human or rat. We considered the compounds with IC50, EC50, Ki or Kd value of less than 10 uM.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711108.34/warc/CC-MAIN-20221206124909-20221206154909-00507.warc.gz
CC-MAIN-2022-49
5,713
18
https://larion.com/understanding-cloud-computing/
code
Cloud computing as an idea encapsulates a wide range of business and consumer services. At its most basic, cloud computing refers to using resources over the Internet that are housed somewhere else in the world for specific purposes. Interacting with a cloud service is usually done through a web browser or command line interface. There is usually no software to install, no hardware to set up, and no data center to rent space from. Google and Amazon were two of the earliest to the field of cloud computing, soon followed by Microsoft. The portfolio of products offered by cloud companies has matured and evolved over time, and so has the competition. Firms such as IBM and Rackspace, among others, have joined the fray. The field of cloud computing now includes a myriad of companies all offering services. This card will focus on Google, Amazon, and Microsoft since they are the market leaders at the time of this writing, and have the most mature product sets.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.23/warc/CC-MAIN-20231203125921-20231203155921-00889.warc.gz
CC-MAIN-2023-50
966
3
https://www.iacr.org/news/legacy.php?p=detail&id=4558
code
Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via: To receive your credentials via mail again, please click here. You can also access the full news archive. In this paper, we propose a different approach to outsourcing computational tasks. We are not concerned with hiding the job or the data, but our main task is to ensure that the job is computed correctly. We also observe that not all contractors are malicious; rather, majority are rational. Thus, our approach brings together elements from cryptography, as well as game theory and mechanism design. We achieve the following results: (1) We incentivize all the rational contractors to perform the outsourced job correctly, (2) we guarantee high fraction (e.g., 99.9%) of correct results even in the existence of a relatively large fraction (e.g., 33%) of malicious irrational contractors in the system, (3) and we show that our system achieves these while being almost as efficient as running the job locally (e.g., with only 3% overhead). Such a high correctness guarantee was not known to be achieved with such efficiency. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose two multi-authority key-policy ABE systems. In our first proposal, the authorities may be set up in any moment and without any coordination. A party can simply act as an ABE authority by creating its own public parameters and issuing private keys to the users. A user can thus encrypt data choosing both a set of attributes and a set of trusted authorities, maintaining full control unless all his chosen authorities collude against him. In our second system, the authorities are allowed to collaborate to achieve shorter keys and parameters, enhancing the efficiency of encryption and decryption. We prove our systems secure under algebraic assumptions on the bilinear groups: the bilinear Diffie-Hellmann assumption and an original variation of the former. - We suggest a general new notion of partial garbling which unifies several previous notions from the literature, including standard garbling schemes, secret sharing schemes, and \"conditional disclosure of secrets\". This notion considers garbling schemes in which part of the input is public, in the sense that it can be leaked by F^. - We present constructions of partial garbling schemes for (boolean and arithmetic) formulas and branching programs which take advantage of the public input to gain better efficiency. - We demonstrate the usefulness of the new notion by presenting applications to efficient attribute-based encryption, delegation, and secure computation. In each of these applications, we obtain either new schemes for larger classes of functions or efficiency improvements from quadratic to linear. In particular, we obtain the first ABE scheme in bilinear groups for arithmetic formulas, as well as more efficient delegation schemes for boolean and arithmetic branching programs. Simply by tuning parameters, Ring ORAM matches or exceeds the performance of the best-known small and large client storage schemes and can achieve a constant factor online bandwidth overhead over insecure systems. We evaluate Ring ORAM in theory and in practice. On the theory side, we prove that Ring ORAM matches the asymptotic bandwidth and client storage of Path ORAM, the prior-art scheme for small client storage. Tuning parameters for small client storage, Ring ORAM reduces overall bandwidth relative to Path ORAM by a factor of $2.7\\times$ and reduces online bandwidth to constant (a $57\\times$ improvement over Path ORAM given realistic parameters). Tuning parameters for large client storage, Ring ORAM outperforms Path ORAM (which is given equal storage) by $4.5\\times$ and SSS ORAM, the prior-art scheme for large client storage, by 16-33\\%. Using secure processors as a case study for small client storage, Ring ORAM on average reduces ORAM response time by nearly $5\\times$ and improves workload completion time by $2.75\\times$, relative to Path ORAM. In the large storage setting, running an enterprise file system trace with bursty requests, Ring ORAM adds negligible overhead to response time given a $>100$~Mbps network bandwidth. By comparison, Burst ORAM incurs large overheads in response time unless network bandwidth $>350$~Mbps. These results suggest that Ring ORAM is a compelling construction in both large client storage (e.g., file server) and small client storage (e.g., remote secure processor) settings. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called ``one more\'\' discrete logarithm problem.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689102.37/warc/CC-MAIN-20170922183303-20170922203303-00441.warc.gz
CC-MAIN-2017-39
5,271
25
http://cashwinn.xyz/archives/15681
code
Marvellousfiction Nanomancer Reborn – I’ve Become A Snow Girl?blog – Chapter 880 Information About The Beasts railway person to you-p2 Novel–Nanomancer Reborn – I’ve Become A Snow Girl?–Nanomancer Reborn – I’ve Become A Snow Girl? Chapter 880 Information About The Beasts frantic rare New novel chapters are released on lightnovelpub[.]com “Have you thought about if your spell circle and skill is outside of my human body? I have got a ability which drops down a giant sword in the sky but neither the magical group of friends and the sword arises from me. Would they still have the ability to clone that?” s.h.i.+ro requested. “How about the incorrect motions then? Imagine if the doppelganger executes the completely wrong motions into the spell plus the spell initiates?” s.h.i.+ro expected with narrowed view because she carries a bone to select along with the beasts. Considering that she comprehended that she’ll be get over together with the status effect the second she grows to the surface, so long as she retains specific ideas in mind it wouldn’t subject. “Mn, for starters, how long will they support the duplicated proficiency? I do know you stated that significant comes to an end retain it for an extended stretch of time whilst the normal beasts get it for your short timeframe. I would like to be aware of particular time.” s.h.i.+ro requested. “I do believe they should be able to duplicate that because they might have obtained enough data. Together with the doppelganger carrying out the motions needed and also the spell taking impact, it might be no totally different from viewing you instantly.” Take a look at lightnovelpub[.]com for the greatest book reading practical experience ‘Seems like I will need to go through an a.s.sa.s.sination tactic while doing this dungeon. Chen Yu could have been great for this.’ s.h.i.+ro believed to themselves. Even though she obtained various self cures, revivals and so forth, if her supply computer code is ruined her techniques will probably be useless. “Divine electricity? What’s that?” “I see… how about if a doppelganger executes the decisions of throwing a skill correctly but not cast it as i practice it in the backdrop?” “I don’t know but if they view you cast a berserk ability, they still take a few of the backlash. On the other hand, to them, the backlash is reduced and their regeneration together with their inborn physiques let them get over it in a really limited period of time.” “I didn’t have something to publish with so blood stream was the ideal that we could do.” He revealed. Regardless of whether she experienced various personal mends, revivals for example, if her resource rule is destroyed her skills are going to be unproductive. Take a look at lightnovelpub[.]com for the greatest new looking through encounter “What about an unacceptable motions then? What happens if the doppelganger does the completely wrong motions into the spell and the spell activates?” s.h.i.+ro required with narrowed eyes due to the fact she has a bone fragments to decide on while using beasts. Due to the fact she recognized that she’ll be defeat while using status outcome as soon as she actually reaches the outer lining, given that she helps to keep specified key points in the mind it wouldn’t issue. “It’s simply the G.o.d’s variation of mana. It’s more robust than mana therefore it may fundamentally be reached in case you have divinity within you. I imagine to boil it down it’s level 7 even so the critical issue here is it should not be applied unless you do have a bit of divinity within you or if perhaps you’re closely connected to a G.o.d that’s granted you these added benefits. Can the beasts backup a thing that is supposed to be limited to G.o.ds and demi G.o.ds?” s.h.i.+ro required as Bonne furrowed his brows. “Have you thought about collection? How far do I need to be so that they can not be able to backup my abilities?” “That’s what I get in touch with defensive given that they don’t get the chance to use ice-cubes but, they’re now immune to it. Without having any offensive properties, the duplicated power could be the defensive form. Nonetheless, however, every time they cloned my nan.o.crawlers, it had been natural offensive. But both of the things that they copied may be utilized for both defence and offence so I would like to understand the odds.” s.h.i.+ro questioned. “It’s high-quality.” Examining the map, s.h.i.+ro memorised it entirely and observed that he had circled areas which might be filled up with great comes to an end. janet’s sunshine cafe Take a look at lightnovelpub[.]com for your much better expertise All the best ! mommy. He suggested as s.h.i.+ro hugged him again. Go to lightnovelpub[.]com for the greatest book looking at experience “Essentially, you found the way that they replicated my ice-cubes having a level that is immune proper?” s.h.i.+ro reported as Bonne nodded his head. “I see… In order that means the high conclusion will help keep the an ice pack protection, nan.o.bots and Silvanis version for a couple of days or weeks as the popular types keeps it approximately 50 percent daily give or get.” s.h.i.+ro muttered. “In order that implies the constraint to techniques still occur.” s.h.i.+ro nodded her go as which has been quite of great help for her. ‘True. Though I have to disclose, ever since I do know some of their minimal eccentricities, I’m excited about a revenge match up. I have to pay them again for stabbing me on the tonsils in the end.’ s.h.i.+ro damaged her knuckles as Attie hugged her. However, together with the restrictions in this power, there was clearly a chance they couldn’t version it. “I’m uncertain having said that i imagine it will be a similar case on the giant sword dropping down scenario that you just described. Because they didn’t obtain enough information and facts, I don’t believe they’ll have the capacity to copy it. Primarily given that you fed them the inaccurate info.” Bonne responded as s.h.i.+ro nodded her travel. Pay a visit to lightnovelpub[.]com for a much better working experience “How about should the spell circle and competency is outside of my body system? I have got a ability which lowers down a giant sword from the sky but neither the magic group and the sword comes from me. Would they still be capable of copy that?” s.h.i.+ro inquired. “I’m unclear but I feel it can be an identical circumstance to your massive sword decreasing down situation that you simply mentioned. Simply because didn’t get enough info, I don’t feel they’ll be able to version it. Primarily since you provided them the improper details.” Bonne responded as s.h.i.+ro nodded her go. “Divine vitality? What’s that?”
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00219.warc.gz
CC-MAIN-2023-14
6,871
36
http://123-free-download.com/info/net-tools-components/html-to-rtf-pro-dll-net/308026.html
code
The "HTML-to-RTF Pro DLL" component can convert HTML and ASP files into good-looking RTF with tables or transform tables to text. Output rtf file is smaller than input HTML. HTML-to-RTF Pro DLL .Net, a component for ASP.Net, C#, and VB.Net developers that converts HTML pages into RTF, Word (DOC), Unicode text, ANSI text, and plain text pages. By using HTML-to-RTF Pro DLL .Net and adding three lines of code to your application, you take full control over the look of your output pages. There's no need to have Microsoft Word installed when using the component. The component lets you set the page size, orientation, margins, and page numbering. Easily specify headers and footers, and either preserve images or eliminate them. Set the default font face, color, and size. Easily transform tables into ordinary text. HTML-to-RTF Pro DLL .Net requires only .Net 1.1 or above, and can be used in C#, VB.Net, ColdFusion 8, J#, Delphi.Net, and ASP.Net (including WinForms and Console apps). The software works in shared hosting and Medium Trust level. You can even use it server-side for creating Web apps. These CSS are supported now: This software is not reviewed yet. HTML-to-RTF Pro DLL is designed as a standalone solution, which does not require Microsoft Word or any other word processors to produce RTF conversions RTF-to-HTML DLL COM, Win32 are 100% free components. You can convert HTML and ASP files into good-looking RTF with tables or transform tables to text. Output rtf file is smaller than input HTML. The DLL components does not require Microsoft Word RTF to HTML DLL .Net allows C# and VB.Net developers to export/convert Text, RTF to HTML 3.2, HTML 4.01, HTML5 and XHTML 1.0 HTML to PDF, RTF to PDF with managed C# library - PDF Metamorphosis .Net. PDF Metamorphosis .Net allows to export/convert HTML to PDF, RTF to PDF, merge PDF documents at ASP.Net server-side using C# or VB.Net .Net library to convert Text, RTF documents to HTML 3.2, 4.01, HTML5 with CSS and XHTML using C# and VB.Net
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934808260.61/warc/CC-MAIN-20171124161303-20171124181303-00599.warc.gz
CC-MAIN-2017-47
2,007
11
http://robinjeanney.fr/
code
My name is Robin, my passion is to create new kinds of interactive experiences around websites, tangible objects or installations. Design's aspect is primordial to me but I also enjoy collaborating with programmers in order to make a project grow up. Past 2 years I worked for two different companies, Proximity BBDO and Grouek as an assistant Interactive Designer. Each of them improved my different skills. I'm currently in my last year of Interactive Design study class at e-artsup and I'm looking for a job for September.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00062-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
525
2
http://www.codingforums.com/php/134207-poker-roulette-script.html
code
I'm new to this forum, and i have been looking around at the posts and I'm thinking of starting posting here. Well my first post is about a struggle I'm having. I need to create a poker (texas hold'em) or roulette php script that allows me only the basic functions. I do not want a whole script but a tutorial of some of the code so i know where i am headed and exactly how to actually make this. If anyone can help then your a life saver. I am not looking to buy anything just looking for free coding. Thanks everyone who can help
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257829320.91/warc/CC-MAIN-20160723071029-00003-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
531
7
https://manpages.org/slock
code
SYNOPSISslock [-v | post_lock_command] DESCRIPTIONslock is a screen locker for X. If provided, the post_lock_command will be executed when the screen is locked. - prints version information to stdout, then exits. EXAMPLES$ slock /usr/sbin/s2ram CUSTOMIZATIONslock can be customized by creating a custom config.h and (re)compiling the source code. This keeps it fast, secure and simple. AUTHORSSee the LICENSE file for the authors. LICENSESee the LICENSE file for the terms of redistribution. BUGSPlease report them.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00831.warc.gz
CC-MAIN-2023-40
515
8
https://toot.cat/@FiXato/106648227900727502
code
Gonna let this water colour impression of Vincent van Gogh's The Starry Night dry, and then see if I want to add something else, like the TARDIS that was in my friend's example I have on the wall here. My friend's example lacks quite some of the details of the original, which also helped me keep mine simple, and to not get lost in all the (lovely) details. Van Gogh's original is probably one of my all-time favourite paintings, even though Vincent considered it a failure himself. I guess it was to be expected I had to try to do my own version of it, to see what it could look like in a different medium. Messed up again a couple of times with too much water, and going over parts that hadn't dried enough, so I expect to redo this one further down the road too.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103669266.42/warc/CC-MAIN-20220630062154-20220630092154-00639.warc.gz
CC-MAIN-2022-27
766
3
https://phab.enlightenment.org/w/quality_assurance/
code
THESE ARE JUST SOME NOTES FROM STEFAN RIGHT NOW. NOT A FULL DOCUMENTATION This page should help to explain our ongoing effort to improve the quality assurance within the Enlightenment project. Most of the implementation details can be found at Continuous Integration Setup. On this page we describe the goals of this effort. - We compile our code for different architectures (x86, x86_64 and x32). - Cross builds for Windows with mingw64 are disabled right now due to some problems. - For Linux we compile with gcc as well as with clang - Our two main libraries (EFL and Elementary) contain a test suite with various unit tests. - We are also tracking the code coverage we reach with our unit tests. - New APIs should come with test cases Besides some side effects when running the unit tests we do no real runtime testing yet. Given the nature of a graphical toolkit unit tests for APIs can only go that far. We developed a tool, called exactness, to test various scenarios against a set of known to be fine screenshots. We have a tool, called expedite, to measure performance on various aspects of our libraries. So far this is only used manually by some people. Work is in progress to automate this testing to keep track of potential performance regressions. We use the Coverity Scan service to run static analysers over our code. Builds are submitted every night. Additionally we used the clang static analyser before but are not actively looking at these reports anymore. In the stabilization phase before our release we are also running API/ABI checkers to verify newly added API and check for potential API/ABI regressions. To keep the project members informed and motivated we send out a weekly QA newsletter summarising last weeks highlights and giving statistics. - Enable Windows builds again - Add MacOSX builds - Add ARM builds - Bring graphical testing with exactness into a working state - Bring performance testing with expedite into a working state - Integrate address and thread sanitizers into testing - Measure energy consumption and look for regressions
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710711.7/warc/CC-MAIN-20221129200438-20221129230438-00084.warc.gz
CC-MAIN-2022-49
2,074
21
https://support.microsoft.com/en-us/kb/324268
code
How To Troubleshoot Shutdown Problems in Windows Server 2003 This article was previously published under Q324268 For a Microsoft Windows 2000 version of this article, see 315409. IN THIS TASK - How to Troubleshoot Shutdown Problems in Windows Server 2003 - How to Use Task Manager to Identify the Cause of the Shutdown Behavior - How to Undo Any Recent Changes to the Computer - How to Use Safe Mode to Identify the Cause of the Shutdown Behavior - How to Confirm that the Computer's CMOS/BIOS Settings Are Correct - How to Use a Parallel Installation to Identify the Cause of the Shutdown Behavior - How to Troubleshoot Shutdown Problems in Windows Server 2003 This article describes general procedures that you can use to troubleshoot shutdown problems in Windows Server 2003. When Windows shuts down, messages are sent to the devices, system services, and programs that are installed on the computer. These messages announce that Windows is preparing to shut down. The operating system waits for responses from programs that are running to make sure that the programs save unsaved data to the hard disk and shut down correctly. Each device, service, and program that is running typically responds to the shutdown message with a message that states that the program can be closed. You may experience one or more of the following symptoms when you try to turn off the computer: - The computer stops responding (hangs). When this symptom occurs, a black screen may be displayed. - The computer does not turn off when you receive the message that states that it is safe to turn off your computer. - You receive an error message. - Faulty or incompatible device drivers. - System services that either do not respond correctly or send busy request messages to the system. - Faulty or incompatible programs. How to Troubleshoot Shutdown Problems in Windows Server 2003To troubleshoot shutdown problems and to isolate the cause of the incorrect shutdown behavior, use the following methods: - Use Task Manager to identify the cause of the shutdown behavior. - Undo any recent changes to the computer. - Use safe mode to identify the cause of the shutdown behavior. - Confirm that the computer's complementary metal oxide semiconductor (CMOS) and basic input/output system (BIOS) settings are correct. How to Use Task Manager to Identify the Cause of the Shutdown BehaviorUse Task Manager to determine the programs that are currently running on the computer. For each program that is listed in Task Manager, manually quit the program, and then shut down and restart the computer to test if the shutdown problem is resolved. To do this, follow the procedure that is described in this section. NOTE: It is possible that not all programs that are currently running on the computer are listed on the Applications tab of Task Manager. - Press CTRL+ALT+DELETE, and then click Task Manager. - Click the Applications tab. - In the Task column, click the program that you want to quit, and then click End Task. - Quit Task Manager. - Turn off the computer. How to Undo Any Recent Changes to the ComputerIf the shutdown behavior occurs immediately after you make a change to the computer (for example, you install or upgrade a program, a service, or hardware that has device drivers), undo the last change that you made. For example, remove either the last driver or the last program that you installed, and then shut down and restart the computer to test whether the computer shuts down correctly. back to the top How to Use Safe Mode to Identify the Cause of the Shutdown BehaviorWhen you start your computer in safe mode, only a minimal set of necessary drivers and services is loaded. Safe mode is a useful diagnostic tool to use when you want to identify and resolve problems that are caused by faulty drivers, programs, or services that start automatically. To determine if the computer shuts down correctly in safe mode: - Restart the computer. - When are prompted to select the operating system to start, press F8. - On the Windows Advanced Option menu, use the ARROW keys to select Safe Mode, and then press ENTER. - If you are using a dual-boot computer or a multiple-boot computer, select Microsoft Windows Server 2003 from the list that is displayed, and then press ENTER. - After the computer starts in safe mode, turn off the computer. If the computer shuts down correctly when it is in safe mode, repeat steps 1 through 4 to restart the computer in safe mode, and then go to step 6 and follow the remaining steps of this procedure to troubleshoot and identify the cause of the shutdown problem. - View the boot log file, Ntbtlog.txt, and then make a note of the devices and services that did not load when you started your computer in safe mode. The Ntbtlog.txt file is located in the %SystemRoot% folder (by default, this is the Windows folder). You can use Notepad to open and view the file. The Ntbtlog.txt file lists devices and services that load (and do not load) when you start your computer in safe mode. NOTE: If there are third-party drivers or services that run when your computer is in normal mode but do not run when your computer is in safe mode, the third-party drivers or services may be the cause of the incorrect shutdown behavior. - Restart the computer in normal mode, and then do one of the following: - Remove the drivers for each of the drivers and services that you identified in the Ntbtlog.txt file to be possible causes of the incorrect shutdown behavior. - Stop the services or disable the services one at a time. For additional information about how to manage devices by using Device Manager, click the article numbers below to view the articles in the Microsoft Knowledge Base:199276 How to Manage Devices in Windows244601 How to Troubleshoot Unknown Devices Listed in Device Manager125174 Explanation of Error Codes Generated by Device Manager323423 Configure Devices Using Device Manager in Windows Server 2003 - Turn off the computer to test whether the shutdown problem is resolved. - After you identify the problem service or driver, either reinstall the service or the driver if you suspect that a file is damaged or contact the manufacturer to report the behavior and to obtain information about possible updates that you can use to resolve the shutdown behavior. 266169 How to Troubleshoot Problems with Standby Mode, Hibernate Mode, and Shutting Down Your Computer in Windows 2000back to the top How to Confirm that the Computer's CMOS/BIOS Settings Are CorrectWARNING: This procedure may involve changing your computer's CMOS settings and changing the BIOS. Incorrect changes to the BIOS of your computer can result in serious problems. Change the computer's CMOS settings at your own risk. Incorrect or damaged CMOS and BIOS settings can cause startup and shutdown problems. For information about the correct CMOS and BIOS settings for your computer and how to check and change these settings, see the computer documentation or contact the manufacturer of your computer. To confirm that the computer's BIOS is current, contact the computer manufacturer to inquire about the latest BIOS update available for your computer. back to the top How to Use a Parallel Installation to Identify the Cause of the Shutdown BehaviorTo use a parallel installation to troubleshoot shutdown behavior: - Install a new copy of Windows Server 2003 to a separate partition on the computer (create a parallel installation), and then install drivers and programs one at a time on the parallel installation. - Shut down and restart the computer between each program installation and note if the incorrect shutdown behavior occurs. If the behavior occurs, the last driver or the program that you installed may be the cause of the incorrect shutdown behavior. - Either remove or update the driver or the program from the original installation, and then test Windows for correct shutdown. If the problem is resolved, remove the parallel Windows installation. Article ID: 324268 - Last Review: 12/03/2007 04:18:05 - Revision: 10.3 Microsoft Windows Server 2003, Datacenter Edition (32-bit x86), Microsoft Windows Server 2003, Enterprise Edition (32-bit x86), Microsoft Windows Server 2003, Standard Edition (32-bit x86), Microsoft Windows Server 2003, Web Edition, Microsoft Windows Server 2003, 64-Bit Datacenter Edition, Microsoft Windows Server 2003, Enterprise x64 Edition, Microsoft Windows Small Business Server 2003 Standard Edition, Microsoft Windows Small Business Server 2003 Premium Edition - kbmgmtservices kbhowtomaster KB324268
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542009.32/warc/CC-MAIN-20161202170902-00397-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
8,554
64
https://www.dev4press.com/blog/plugins/2018/gd-webfonts-toolbox-pro-2-9/
code
GD WebFonts Toolbox Pro 2.9 is a new major release of the plugin, with several new features aiming to improve Google fonts loading speed, updated Google fonts list and few more things. Google WebFonts support has new option to enable adding of DNS Prefetch and Preconnect directives. And, WebFont Loader support now can load the loader from the plugin, instead of the Google (it can be cached properly), and two more settings to control HTML tag classes related to fonts loading and session storage fonts cache use. Version 2.9 updates Google Web Fonts list of fonts to 902. The plugin is also updated to latest Dev4Press Shared Code Library, version 2.5. Colour picker library MiniColors used on the admin side is also updated to the latest 2.3.2 version. If you find any issues or problems with the plugin, please report them to the support forum.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00653.warc.gz
CC-MAIN-2024-10
849
4
https://rumble.com/vajhk5-all-things-politics-with-lee-harding.html
code
All Things Politics with Lee Harding Canadian Politics - Federal & Provincial We talk with Saskatchewan's favorite son, Lee Harding about all things Canadian Politics! Become a follower and subscribe! Future shows that contravene the WHO/CDC narrative may be exclusively streamed on DLive, so you don't want to miss that!! Fear is the Virus t-shirts: https://teespring.com/stores/laura-lynns-store-2 All of my content is completely, 100%, viewer supported and funded. Thank you for your kindness to keep information like this coming. Go Get Funding : https://bit.ly/2uZw7cD E-Transfer to Email: email@example.com
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104597905.85/warc/CC-MAIN-20220705174927-20220705204927-00507.warc.gz
CC-MAIN-2022-27
612
8
https://heidloff.net/article/02112015070444AMNHEKPJ.htm/
code
Last weekend the DeveloperWeek Hackathon took place where IBM hosted an IBM Bluemix Challenge. The winner of our challenge was the project “Hedge (Housing Edge)” developed by Evan Pun, Dong-han Yao, Zachary Zeleznick, Emma Marriott, Jae Young Ryoo, Ryan Ma and Emily Le. “Hedge (Housing Edge) is a web application that helps a renter/buyer visualize healthy spaces and housing affordability in your community. Cost of living is easily defined by housing prices, but what is the cost of living on your health for a particular neighborhood? We use heat maps (a choropleth map with 574 blocs) to reveal where problem spots may be in a city, as well as accessibility to what is most important to the user, at a sub-neighborhood resolution. Users can simultaneously select multiple metrics (like asthma rates, proximity to green space, and proximity to a farmer’s market), and the heat map will change to reflect desirability based on the combined values. As the user hovers over each of the 574 blocs, a popup reveals an overall “Livability Index”, as well as individual subscores of each metric, if applicable. Additionally, we use IBM Watson to highlight the top 3 most desirable blocks based on the Livability Index of the user selected metrics. All of our map visualizations are generated from official city and government provided data and streamlined into a clean and intuitive interface. Datasets were normalized and given a corresponding color on the heat index. All datasets were obtained from DataSF, the largest online repository of data published by the City and County of San Francisco, and verified with public available public health information.” The screenshot shows Watson’s recommendations for places with proximity to garden, air quality and affordability in San Francisco. Check out the presentation to find out more.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474852.83/warc/CC-MAIN-20240229170737-20240229200737-00225.warc.gz
CC-MAIN-2024-10
1,850
6
https://wascottishrite.org/index.php/2024/03/12/a-beginners-guide-to-poker-4/
code
Poker is a game of chance and skill that has become very popular around the world. In early poker, cards were dealt randomly with no regard to rank or sequence, but as the game developed it became a game of strategy and odds. Players bet on the probability that they will get a certain hand, and the player with the highest-ranked hand wins the “pot” – all of the money put into the pot by all of the players. During each round of betting, players can choose to check (pass on placing any chips into the pot), raise (put more than the previous player’s bet amount), or fold (drop out of the hand). The best five-card poker hand is called a straight. It consists of five cards of consecutive ranks, each from a different suit. The best possible straight is a full house, consisting of three cards of one rank and two matching cards of another, plus one unmatched card. In addition to understanding the mathematical odds of holding or improving various hands, a good poker player must also be adept at reading the subtle signs other players send out in their behavior, such as eye contact, facial expressions, body language and manner and content of speech. These tells, as they are called, give the other players valuable information about a player’s hand, such as whether they have the nuts (an unbeatable hand). Players must be comfortable taking risks, but not so risky that they lose all of their money.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817073.16/warc/CC-MAIN-20240416062523-20240416092523-00142.warc.gz
CC-MAIN-2024-18
1,416
3
https://support.quest.com/technical-documents/metalogix-content-matrix/8.9/eroom-edition-user-guide/42
code
You can perform Pre-Migration Checks, Nested Contents Reports, and Nested Contents URL Length Reports through the PowerShell command window. In order to create a PowerShell script for a Nested Contents Report or a Pre-Migration Check, Nested Contents URL Report, a report item must first exist in the Job List section. To create a PowerShell script for Nested Content Reports and Pre-Migration Checks: 1.In the Job List section, select the report(s) want to run in PowerShell. §Click the [Generate PowerShell Script] button in the Job List menu options §Right-click and choose Generate PowerShell Script. 3.Choose the appropriate option from the sub-menu to specify the security method that will be used when generating the PowerShell script . Use the information in the following table for guidance. If you want to generate a PowerShell script that can be used only by the currently logged in User Account on the machine it is generated on For Current User and Machine. NOTE: Any PowerShell scripts that are generated for scheduling through this option can only be run by the logged in user on the machine they were generated on. that can be used by any User account on the machine it is generated on For Current Machine. that can be used by any User account on any machine that has the certificate that is specified when the script is created When you save the PowerShell script using this method you will be prompted to select a security certificate that exist on that machine. The selected certificate will be required on any system that attempts to run the script at a later date. Once the applicable option is selected, Metalogix Content Matrix Console will generate a PowerShell script for the selected report, which will be written to a Notepad file. If multiple reports are selected, they will all be included in that single file. 3.To save the file as a PowerShell script: a)In the Job List section toolbar, choose File > Save As.... b)In the Save As dialog box, navigate to the directory in which the script file is to be saved. c)Click the Save as type drop-down menu and select All Files. d)Enter a name for the script and append the .ps1 file extension to the file name to save it as a PowerShell script. To run the PowerShell script: 1.Open the Metalogix Content Matrix Console - eRoom Edition PowerShell Console 2.Change the active directory to the file path in which the script file is saved by using the change directory command ("cd <File path>") and then enter ".\" followed by the script name. For example, if your script is named "ResourceScript.ps1", you would enter .\ResourceScript.ps1 to run the script. NOTE: If the active directory is different than the directory in which the script file is saved, enter the full file path of the script file relative to your current directory, and then the script file name. For example, if your prompt is at "C:\", your script is named "ResourceScript.ps1", and the script is saved on the desktop, you would enter C:\Users\<User>\Desktop\ResourceScript.ps1 to run the script. In some cases, the Execution Policy may prevent you from executing a PowerShell script. In this case, you will likely see the following message: [Script].ps1 cannot be loaded because the execution of scripts is disabled on this system. Please see "get-help about_signing" for more details. In this case, run the following command: set-executionpolicy RemoteSigned. This will change the existing script policy to allow you to run these scripts in the specified location. However, it is advised that you check with your System Administrators before doing so to ensure that no Company Policies are being broken by this action. All Pre-Migration Checks, Nested Contents Reports and Nested Contents URL Reports included in the PowerShell script will run, and any warnings or errors that are encountered while the script runs will be displayed in the PowerShell window. You can configure and customize a number of Metalogix Content Matrix settings, including: In most cases Metalogix Content Matrix can automatically connect to SharePoint and authenticate license keys, through an environment's proxy setting, However, in some cases the proxy may need to be configured within Metalogix Content Matrix. In these cases users can specify the proxy settings though the connecting dialog. There are two basic places where this proxy setting can be configured. The first of these is when activating a license key, and the second when connecting to SharePoint. The dialogs for these options look slightly different, and the when you are using a proxy to connect to SharePoint, you have the additional option to Import Proxy from Internet Explorer. NOTE: For information on setting proxy information when connecting to eRoom, see Connecting to eRoom. To configure proxy settings: 1.In the Proxy server dialog, check the Enable proxy box. 2.Use the information in the following table to determine the appropriate action to take. you want to manually enter proxy information A.Select Enter Manually. B.Enter the Server name (or IP) and Port for the proxy. C.Specify the credentials to be used when connecting to the target server. The Windows authenticated credentials of the current user will be selected by default. You can specify alternate SharePoint credentials by clicking the Different user radio button, and entering an alternate username and password. Internet Explorer has been configured to use a proxy server via a proxy auto-configuration (.PAC) file and you want to connect to SharePoint using this method select Import Proxy from Internet Explorer. NOTE: This option is currently available only when connecting to SharePoint. Refer to the Microsoft article Auto proxy configuration settings for Internet Explorer for more information. 3.If you accessed the dialog from the License Activation dialog, click [Set]. NOTE: If this method does not seem to be working, you can manually configure Metalogix Content Matrix to use a proxy setting. See Manually Configuring Proxy Settings. If, for some reason, Metalogix Content Matrix cannot connect through a proxy, then the proxy settings can be configured through the Metalogix Content Matrix UI. If you are not able to configure the proxy settings through the product's UI for some reason, it can be configured manually. The below directions should help you manually configure some explicit proxy settings, enabling the product to work with your proxy. To manually configure proxy settings: 1.Open the Metalogix Content Matrix Console and add a connection to the desired SharePoint location. 2.After a connection has been added, close Metalogix Content Matrix. 3.Open the ActiveConnections.xml file, which can be found in one of the following locations, in a text editor: §Microsoft Vista/Windows 7/Windows8/Windows 10 based systems - <DRIVE>:\Users\<USER>\AppData\Roaming\Metalogix\Metalogix Content Matrix Console - <Product> Edition §Microsoft Windows XP based systems (Windows 98, Windows Me, Windows 2000, Windows 2003, and Windows XP) - <DRIVE>:\Documents and Settings\<USER>\Application Data\Metalogix\Metalogix Content Matrix Console - <Product> Edition Within the XML file there is a <Connection /> XML element for each added connection. In order for proxy settings to be added to a connection, another element needs to be added inside the connection XML. The added element should be named Proxy, and it should have an attribute named Url. The value for this Url attribute should be the actual URL for the proxy that will be used. For example, if we are trying to add a proxy connection to the following node: <Connection NodeType="Metalogix.SharePoint.SPWeb, Metalogix.SharePoint, Version=184.108.40.206, Culture=neutral, PublicKeyToken=3b240fac3e39fc03" AdapterType="WS" Url=http://SharePoint2010 /> We would add: <Proxy Url="http://metalogixproxy:8000/" />. So the end result would be: <Connection NodeType="Metalogix.SharePoint.SPWeb, Metalogix.SharePoint, Version=220.127.116.11, Culture=neutral, PublicKeyToken=3b240fac3e39fc03" AdapterType="WS" Url="http://SharePoint2010"> <Proxy Url="http://metalogixproxy:8000/" /> If the proxy connection requires a user name and password that differ from your normal logged in Windows credentials, then these can also be specified in the Proxy element. The attribute UserName can be used to enter a user name (in domain\user format), and an attribute named Password can be used to enter the password value. In this case the Proxy value <Proxy Url="http://metalogixproxy:8000/" /> would become: <Proxy Url="http://metalogixproxy:8000/" UserName="DOMAIN\ProxyUser" Password="ProxyPassword" /> 4.After these values have been entered to the desired connection, save and close the ActiveConnections.xml file. 5.Re-launch Metalogix Content Matrix. The connection using the proxy should now be configured, and the connection should be established and working.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141168074.3/warc/CC-MAIN-20201123211528-20201124001528-00352.warc.gz
CC-MAIN-2020-50
8,894
64
https://thinkingelixir.com/course/pattern-matching/module-1/install-elixir/
code
In order to start learning Elixir, you need the ability to play with Elixir. Please make sure you have Elixir installed on your system before you continue. Read here for the Official documentation for installing Elixir. Follow my guide to installing Elixir using Asdf is a version manager tool on MacOS and Linux that installs and manages multiple versions of Elixir and Erlang. I recommend this to ensure you have compatible versions of Elixir and Erlang to give you the best development experience. With Elixir installed your machine, from a command terminal, you should be able to execute the -v or “version” command to see that it is ready to go. $ elixir -v Erlang/OTP 22 [erts-10.5.5] [source] [64-bit] [smp:4:4] [ds:4:4:10] [async-threads:1] [hipe] Elixir 1.9.4 (compiled with Erlang/OTP 22) The exact version isn’t important. Your’s will likely be newer than this one which is awesome! Need a code editor? Do you need an editor to use for writing your new Elixir code? If you don’t already have an editor in mind, check out this post to get you started! Leave a Comment You must be logged in to post a comment. Yes. The Atom Editor is also a text editor option. I don’t directly recommend it because I don’t stay current on how to do Elixir development with it. I’ve written previously about Atom but that information is out of date now. Since both VS Code and Atom are owned by Github, both are Electron based, both are free, and VS Code appears to be getting more focused development, I chose to focus on VS Code. Of course you are free to choose any editor you like! I have friends that use Vim, Emacs, Atom, VS Code, and JetBrains. Options are good! However when someone is coming new to Elixir, too many options are overwhelming. I use VS code with Elixir_ls extension and I wonder if I need to exclude ‘.elixir_ls’ from git in my projects, i.e. to add it to ‘.gitignore’ file?! Yes, ignoring the `.elixir_ls` directory is a good idea! I do that too.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00573.warc.gz
CC-MAIN-2023-23
1,987
15
https://forums.cubebrush.co/t/gabriel-art-school-journey/10588
code
Hello everyone, I'm Gabriel a 21 years old from Brazil. I always tought I was more of a 3D artist (hard surface) until I decided to start to learn digital sculpt as well. As I searched for the basics I saw a lot of people saying how useful would it be to know how to drawn first... I then started to (very randomically) learn the basics of drawing. What I didn't expect was that I ended up enjoying drawing way more than actually modeling, so here I am. By the way I actually started the Art school about 3 weeks ago but as I downloaded all the 1 Term's files I forgot to start a new Topic and am even a little bit lost about how to use it (Is there a way to follow another thread?) Here's what I already did (Gesture Drawing 1min and 30s) (The 'anatomically correct' male and female figure ) Ps: Is this model used only for adults? How do I adapt to a child or a Dwarf? (My Figure Drawing using the pen as a measuring unit) as I'm new in the forum i'm apparently only able to post 3 images but I have kept my progress on Instagram (https://www.instagram.com/digitalartstudent/) I'm planning on post my daily progress here I hope we can all keep helping each other as we grow ^^
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103334753.21/warc/CC-MAIN-20220627134424-20220627164424-00232.warc.gz
CC-MAIN-2022-27
1,178
11
https://domino.ai/data-science-dictionary/shiny-in-r
code
The Shiny web framework fundamentally enables collecting input values from a web page, making those inputs easily available to the application in R, and having the results of the R code written as output values to the web page. In its simplest form, a Shiny application requires a server function to do the calculations and a user interface. Shiny applications have two components, a user-interface definition and a server script. Source: R Studio Shiny comes with a reactive programming library that you use to structure your application logic. By using this library, changing input values will naturally cause the right parts of your R code to be re-executed, which will in turn cause any changed outputs to be updated. The reactive programming model eliminates the need for additional event handling code. In Shiny, there are three kinds of objects in reactive programming: reactive sources, reactive endpoints, and reactive conductors. You can install Shiny the usual way from your R console:
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00714.warc.gz
CC-MAIN-2023-40
996
5
https://gis.stackexchange.com/questions/183227/how-print-map-in-ol3-with-top-resolution
code
I'm developing a GIS app using OpenLayers-3. In this app, users draw features and print the map. Suppose the user draws his features in a large area. Now to print all his features, he would zoom out until all his features are in the screen. In this zoom level, quality of print will be very low. I want the user to set a zoom level and then print all features in this zoom level. In this state, it's possible some features will not be visible. Finally the result should be a high quality image, with resolution greater than screen resolution. How can I Implement that?
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304928.27/warc/CC-MAIN-20220126071320-20220126101320-00062.warc.gz
CC-MAIN-2022-05
568
4
https://www.smallbasic.it/challenge-2014-09/
code
Write a program to read and write an array of Small Basic data to and from a csv file. Variable Type Challenge Write a program that checks a Small Basic variable and determines if it is an array or not: - If it is an array, then the number of elements is reported - If it is not an array, then it is checked to see if it is a number or not - If it is a number, then it is determined if it is positive or negative and if it is an integer or decimal number Graphics Challenge 1 Draw a flower. Graphics Challenge 2 Draw a traffic light that changes through the correct lighting sequence, perhaps using the Timer object. Write a simple stick mad fighting game. see some recent posts for some ideas on this. - Write a program to find an absolute path from an input relative path. While it is assumed that the current path is Program.Directory. For example, if the current directory is “C:\Users\Nonki\Documents”, Input “..” → Output “C:\Users\Nonki” Input “test” → Output C:\Users\Nonki\Documents\test” - Draw (or fill) a Trapezoid. - Make a kitchen timer.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817576.41/warc/CC-MAIN-20240420091126-20240420121126-00016.warc.gz
CC-MAIN-2024-18
1,073
17
https://reach-network.com/author/amishi/
code
In various research projects Reach has investigated people’s different uses and perceptions of smart devices that are part of their personal ecosystems. Language and culture affect the way people communicate with each other, and the devices they use can enable (or hinder) these interactions. The following projects studied languages from both a cultural and a functional point of view, exploring how language is used in different contexts and social groups, as well as the impact of digital writing, interfaces and mobility on language use. The following projects are global studies focussing on people’s contextual usage of mobile devices, with a perspective to identify needs and preferences that could be satisfied by future designs and concepts. The Reach Network works with clients to develop a better understanding of opportunities for new concepts and value propositions, based on the technology platforms in their portfolio, and to develop new service offerings to augment and enhance the consumer experience.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476205.65/warc/CC-MAIN-20240303043351-20240303073351-00292.warc.gz
CC-MAIN-2024-10
1,022
4
http://forum.bytesforall.com/showthread.php?t=1187
code
I would like to automatically display today's date at the top of the center column on all the posts as well as front page. I can't find a way to do that, since the date option in the Post/Page Info items seems to deal only with the date the post was posted. I suppose it could be a text widget in a sidebar as well; maybe a Perl script? That seems like overkill, somehow. Or a plugin. I've found one that might work, but I'd still rather have this somewhere other than a sidebar. EDIT: OK, I've solved it. I found a plugin called Current Date and Time Widget, and I've put it atop the left sidebar. Looks nice.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705318091/warc/CC-MAIN-20130516115518-00087-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
610
4
https://kaixin883228.com/analyzing-the-role-of-ai-in-game-design-ideation/
code
Artificial Intelligence (AI) has become an integral part of various industries, including game development. In recent years, game designers have started leveraging the power of AI to enhance the ideation process, resulting in more engaging and immersive game experiences. Understanding AI in Game Design Ideation Game design ideation involves the process of generating and conceptualizing ideas for game development. Traditionally, this has been a human-driven process, relying on the creativity and experience of game designers. However, the integration of AI technologies brings a new dimension to this process. AI algorithms and machine learning techniques can analyze vast amounts of data, including player preferences, demographics, and gameplay patterns, to generate valuable insights for game designers. By understanding player behavior and preferences, AI can assist designers in creating more personalized and tailored gaming experiences. The Benefits of AI in Game Design Ideation 1. Enhanced Creativity and Innovation: AI algorithms can provide designers with unique and creative ideas by analyzing existing game concepts and mechanics, allowing for greater innovation in the gaming industry. 2. Data-Driven Decision Making: AI can process and analyze large datasets to identify patterns and trends, enabling designers to make data-driven decisions during the ideation process. 3. Personalized Gaming Experiences: AI algorithms can dynamically generate content and adapt gameplay based on individual players’ preferences, creating more immersive and personalized gaming experiences. 4. Improved Game Balancing: AI can assist in balancing game mechanics, optimizing difficulty levels, and ensuring an enjoyable gaming experience for both casual and hardcore gamers. Challenges and Limitations While AI brings numerous benefits to game design ideation, there are challenges and limitations to consider: 1. Ethical Concerns: Appropriate measures should be in place to address ethical issues associated with AI-generated content, ensuring that it aligns with societal norms and values. 2. Over-reliance on AI: Relying solely on AI for game design ideation may limit the human creative process and intuition, potentially resulting in less diverse and innovative games. The Future Outlook As AI continues to evolve and improve, its role in game design ideation is expected to expand further. Machine learning algorithms that can understand and generate realistic game scenarios or adapt to player behavior will become more sophisticated, pushing the boundaries of game design creativity. Additionally, advancements in AI will enable designers to create games that offer more immersive narratives, dynamic environments, and adaptive gameplay tailored to individual players’ preferences. The integration of AI technologies in game design ideation has revolutionized the gaming industry, providing designers with invaluable insights and inspiration. AI-powered tools and algorithms have enhanced creativity, facilitated data-driven decision making, and personalized gaming experiences. However, it is important to strike a balance, leveraging AI as a powerful tool while maintaining the core human element of creativity. The future holds exciting possibilities as AI continues to shape the landscape of game design ideation.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476211.69/warc/CC-MAIN-20240303075134-20240303105134-00621.warc.gz
CC-MAIN-2024-10
3,330
42
https://www.drupaleurope.org/session/better-console-applications.html
code
Console applications - whether part of a larger (Symfony-)application or standalone-tool - usually are the bash-script of PHP developers. Thereby one often leaves the path of clean code and hacks a very pragmatic solution. Despite the fact that a lot of these fast solutions remain in project and need to be maintained for longer. What to reason about while developing a console application and which simple tricks help to clean up your code, is shown by examples in this talk. How do I decouple my code from CLI runtime, how do I optimize long running processes and so on. The talk is made for beginners and intermediate developers. A code-centric collection of best practices and small tricks, that ease the daily life of developing and CLI-command. The talk is not meant to present a perfect solution for every problem, but provides code examples that invite to reflect about your own work.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00056.warc.gz
CC-MAIN-2024-10
893
2
https://sharepoint.stackexchange.com/questions/25434/parent-content-type/25435
code
In SharePoint 2010, is there any chance to create a parent content type? If so, how? I want to create a new parent content type and inherit it for other types. In SharePoint, all content types inherit from "Item". You can create any number of new Content Types, that inherit any number of times from each other (singularly, no multiple inheritance here), but they must ultimately inherit from Item. There is no getting around this. Also note that it's impossible to change the parent content type for an existing content type. You must create re-create a content type and inherit from the desired one if you wish to 'change' the parent content type. Unfortunately for child content types, this also means re-creating them. Take great care when choosing your content type hierarchy, and devote significant effort (read: time) in this area of your information architecture design, as it is very difficult, if impossible to change later in use.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00520.warc.gz
CC-MAIN-2023-50
941
4
https://forum.bubble.is/t/how-to-businesses-do-micro-transactions/1656
code
Lets use itunes as an example. They sell individual mp3s for .99 cents or sometimes even .49 cents. When using a payment processor such as braintree or stripe that charge a .30 cent fee on each transaction. This obviously wouldn’t be viable to take that out of each transaction. I’m assuming they batch process either once a week or once a month. Am i correct in thinking this? How would i do it using a payment processor such as the ones listed above? Would i somehow validate that the card has money on it and then just save the card info to batch later? Would this show up as only 1 transaction to the processors? Any info would be greatly appreciated. Thanks! Paypal does have a different transaction setup for micropayments. Which is a rate of 5% + $0.05 for purchases that are $10 or less. See more details here: https://www.paypal.com/us/webapps/mpp/merchant-fees I’m not sure how it works with Braintree though, but I would hope that you could still use micropayments. Another option would be to somehow allow your customers to load funds in larger amounts (i.e. $20+) onto their account, and then just deduct from their account when they make purchases. Not really sure what would be involved with building something like that though. Oh i didnt think about that second option. I think i could build that out. thanks! I’m sure you solved this as this thread was created three years ago, but for future users you could also tally up their balance in the backend and set up a conditional after each purchase that "when users fees are equal to or greater than “X”, run charge workflow. “X” being whatever number you are comfortable with being charged at ($10, $20, $100)
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202572.29/warc/CC-MAIN-20190321193403-20190321215403-00186.warc.gz
CC-MAIN-2019-13
1,692
7
https://themeforest.net/forums/thread/get-first-attached-image-path/15468
code
Does anyone can share a code snippet, how to get first attached image path inside of the loop in index.php? Thanks for a quick reply. However I’m having problems $images =& get_children( ‘post_parent=’.$post->ID.’&post_type=attachment&post_mime_type=image’ ); print_r($images); It seems that it doesn’t populate an array… really strange Take a look at Jeff Starr’s post on displaying Image Attachments: Take a look at WordPress for Designers Day 17, we deal with using attachments within the loop and how to display them.
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322873.10/warc/CC-MAIN-20170628065139-20170628085139-00525.warc.gz
CC-MAIN-2017-26
537
6
https://forum.wordreference.com/threads/hangzik.2676352/
code
Context: Somebody calls me from a party, it's loud on the other end. I say: Sounds like you are having fun there! I know that when hangzik or tűnik is used with a noun we just add "-nek/nak" - It sounds like fun. (Hangzik mulatságnak.) But if we use a verb - It sounds like you are having fun; It sounds like you are running; etc. What structure is there in such a case?
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696696.79/warc/CC-MAIN-20170926212817-20170926232817-00164.warc.gz
CC-MAIN-2017-39
372
1
https://datadryad.org:443/stash/dataset/doi:10.5061/dryad.4f4qrfj8d
code
Lower St. Lawrence Estuary bacterial 16S rRNA gene diversity Walsh, David (2020), Lower St. Lawrence Estuary bacterial 16S rRNA gene diversity, Dryad, Dataset, https://doi.org/10.5061/dryad.4f4qrfj8d The Estuary and Gulf of St. Lawrence (EGSL) in eastern Canada is among the largest and most productive coastal ecosystems in the world. Very little information on bacterial diversity exists, hampering our understanding of the relationships between bacterial community structure and biogeochemical function in the EGSL. During the productive spring period, we investigated free-living and particle-associated bacterial communities across the stratified waters of the Lower St. Lawrence Estuary, including the particle-rich surface and bottom boundary layers. Modeling of community structure based on 16S rRNA gene and transcript diversity identified bacterial assemblages specifically associated with four habitat types defined by water mass (upper water or lower water column) and size fraction (free-living or particle-associated). Assemblages from the upper waters represent sets of co-occurring bacterial populations that are widely distributed across Lower St. Lawrence Estuary surface waters., and likely key contributors to organic matter degradation during the spring. In addition, we provide strong evidence that particles in deep hypoxic waters and the bottom boundary layer support a metabolically-active bacterial community that is compositionally distinct compared to surface particles and the free-living communities. Among the distinctive features of the bacterial assemblage associated with lower water particles was the presence of uncultivated lineages of Deltaproteobacteria, including marine Myxobacteria. Overall, these results provide an important ecological framework for further investigations of the biogeochemical contributions of bacterial populations in this important coastal marine ecosystem. The full methods is available in the published article. The article has been accepted for publicaiton. The dataset consists of two files. The first file (LSLE_16S.fasta) is the nucleotide algnment of all 16S rRNA amplicons and the second file (LSLE_16S.groups) maps each amplicon to its sample of origin. FD is free-living DNA fraction, FR is free-living RNA fraction, PD is particle-associated DNA fraction, PR is particle-associated RNA fraction.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00624.warc.gz
CC-MAIN-2022-33
2,370
5
https://forums.acoustica.com/bbs/viewtopic.php?f=10&t=23555
code
So I was trying to figure out the workflow of Mixcraft when I made this. Almost entirely made from loops found in MIxcraft 8. Loops isn't generally something I work with and I feel I must credit much of this to the people responsible for Mixcraft and the loops. I recently made another classical song by one of the masters in midi. I can't display that here because I didn't make it in Mixcraft. I am learning the routing of Kontakt in Mixcraft and am quite happy with the ease it can be done. I made a template for Mixcraft and plan to have more here using it. https://soundcloud.com/starise/celtic-s ... f-the-pond
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514571027.62/warc/CC-MAIN-20190915093509-20190915115509-00012.warc.gz
CC-MAIN-2019-39
616
3
http://christianity.stackexchange.com/questions/tagged/blasphemy+trinitarian
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Blaspheme one part of the Trinity but not the whole? Luke 12:10 NIV And anyone who speaks a word against the Son of Man, it will be forgiven him; but to him who blasphemes against the Holy Spirit, it will not be forgiven How is it possible to ... May 20 at 13:13 newest blasphemy trinitarian questions feed Hot Network Questions Examples of non isometric surfaces having the same curvature function Flat beer with table sugar? Combining solutions while solving Is it bad to ask the editor about the status of a submission on seeing that referees' reports were submitted a week ago? Why are these two random variables identically distributed? Connecting points on a plot for readability in slides Does Workshop Automation use Workshops? Does gravity affect magnetism, vice-versa, or do they "ignore" each other? Remove Last Page from the PDF What is that device at an airport which transports packages to the aircraft called? scp between two servers not in the same network How to restore function attributes to default Is cross-platform (not cross-generation) play possible in Destiny? An intuitive way to form an augmented matrix Why didn't Tony Stark die immediately after having the ARC Reactor removed? Where can Obsidian be found? Improvise a Hardware Random-Number Generator How do fighter pilots manage food, drink & toilet? Identify the server I'm working at Examples of compact sets that are infinite dimensional and not bounded Why is the output of _$ _ when executed on a terminal? How many humans have been in my lineage? Is it almost the same for every human currently living? D&D 5e Passive Perception confusion Why does an aircraft leave a white smoke trail? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137190.70/warc/CC-MAIN-20140914011217-00208-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
2,311
52
http://ttessayneui.afterschoolprofessional.info/an-analysis-of-the-topic-of-the-computer-science.html
code
Computer science project materials below are computer science project topics computer science projects with analysis of data mining techniques of. Clearly, the computer scientist must not only have sufficient training analysis --- certainly a major focus within computer science is the analysis and. Numerical analysis: numerical analysis, area of mathematics and computer science that one important cae topic is that of modeling the dynamics of moving. System analysis - computer science bibliographies topic ideas citation guides computer systems (2011) decision analysis phase. Ap computer science a course description (pdf) part of the problem-solving process is the statement of solutions in a precise form that invites review and analysis. Latest computer engineering projects topics get innovative final year projects for cse with b tect, m tech, be, diploma in computer science engineering projects. Database of free computer science essays - we have thousands of free essays across a wide range of subject areas sample computer science essays. Project ideas in computer science keld helsgaun 2 keld helsgaun research: • combinatorial optimization analysis of large data sets with the purpose of. The contributions of cornell computer science to research and education are widely recognized, sequence analysis, structure analysis, protein classification,. Our goal is to investigate issues in shape-based retrieval and analysis the is is a joint laboratory with the department of computer science research projects. 1000 best computer science and engineering now you can choose best topic for your final year face detection using epitomic analysis computer troubleshooting. What are some ethical issues in computer science the government can combine pervasive surveillance with data analysis to follow everyone everywhere. We've partnered with dartmouth college professors tom cormen and devin balkcom to teach introductory computer science algorithms analysis to describe the. Would computer science stop advancing once we reach the landauer’s limit (the theoretical limit of how energy-efficient computer processors can be. Scs undergraduate thesis topics state-of-the-art, interactive, real-time twitter sentiment analysis evaluating the cte online curriculum in computer science. Breaking science news and articles 2018 — a new study suggests that computer models used to predict the as well as links to topic-specific rss feeds. Prospective students searching for computer systems analysis found of computer science and critical thinking to be related to the topic covered. There is no computer science computer art, yes com-puter technology, yes their theory, analysis, design, efficiency, imple-mentation, and applica-tion. Intensive introduction to computer science problem solving through decomposition problem analysis, program design, algorithm construction, coding,. This is a list of computer science presentation topics casic computer skills i have to give a presentation on any genuine topic & i also have to know. Topic tests class 11th topics this analysis will help you to prepare all important subjects expected weightage analysis for gate computer science thanks, team. Sciencedirect is the world's leading source for scientific, technical, and medical research explore journals, books and articles.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513441.66/warc/CC-MAIN-20181020205254-20181020230754-00337.warc.gz
CC-MAIN-2018-43
3,333
6
http://forums.theregister.co.uk/forum/1/2012/11/23/dreamworks_open_sources_openvdb_software/
code
Animation studio Dreamworks has released some of its production animation code under an open source licence. OpenVDB, the software in question, is billed as “an open source sparse volume processing toolkit” and is available under version 2.0 of the Mozilla Public License. The C++ library “comprises a hierarchical data structure … nice but its not the first This is simply a way of effectively storing data about a volume, things like density, velocity, colour and other properties like that. These can easily run in to enormous caches of data, terrabytes per frame if stored ineffectively. Its also about making sure that all the rendering software out there can use this data. Its a big benefit to dreamworks if they are able to swap data to other companies too. Sony did the same i believe with their Field3D, someone correct me if i'm wrong is a similar project... It seems a bit weird to see this kind of thing reported by so many news sources outside of the VFX circle, some PR department is doing a good job. from the description It just sounds like some kind of octree library. That's hardly a difficult thing to knock together, though maybe there's more to it than it sounds. Hmmm... "animated smoke"... maybe it's just a Perlin noise generator, then... Re: from the description Hmmm... why don't you read the code and let us know? - Review Is it an iPad? Is it a MacBook Air? No, it's a Surface Pro 3 - Game Theory The agony and ecstasy of SteamOS: WHERE ARE MY GAMES? - Hello, police, El Reg here. Are we a bunch of terrorists now? - Kate Bush: Don't make me HAVE CONTACT with your iPHONE - Worstall on Wednesday Wall Street woes: Oh noes, tech titans aren't using bankers
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500822407.51/warc/CC-MAIN-20140820021342-00384-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
1,692
14
https://www.programmableweb.com/sample-source-code/freshbooks-get-apps-python-sample-code
code
In an agile world where the majority of application development is now iterative the testing of applications has never been more important. After all, the impact of single undiscovered error can now be easily compounded through multiple iterations of an application; making it that much harder and expensive to discover and fix later on. Rpost made its name in the compliance space through its Rpost API and core products: email proof, privacy, and electronic signatures. Rpost’s core offering won a customer list full of household names across many industries, both public and private (Whole Foods, AT&T, and Civpol to name a few). Rpost now aims to bring its compliance strategy to all internet transactions via RPost Cloud.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585171.16/warc/CC-MAIN-20211017082600-20211017112600-00211.warc.gz
CC-MAIN-2021-43
728
2
https://www.wallstreetoasis.com/forum/private-equity/pe-ir-growing
code
PE IR "growing"? Have been reading up on some past discussions about PE IR (in house or otherwise) and IR for stuff like HF due to personal interest in going into that field, and there is a repeated point that the space is "growing". Anyone can clarify what they mean? Is it just that more people want to go into it (since its usually small teams/niche space)? Or as in PE firms are spending more resources/giving more comp for these roles? I also know that typically, deal > fundraising/IR type work in prestige/precedence/resources, how does this factor into this as well? Also, any numbers to show this growth or who you are hearing this from (just peers in the space, or like are there stats from these companies)?If anyone could give more details would be helpful!
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711278.74/warc/CC-MAIN-20221208050236-20221208080236-00422.warc.gz
CC-MAIN-2022-49
769
2
https://typeset.io/papers/performance-analysis-of-data-hiding-in-thermal-image-using-4x5b4jgr1p
code
Performance analysis of data hiding in thermal image using alpha blending technique TL;DR: A simple technique called alpha blending is used to hide the data in an image and its impact is analyzed for different alpha values using alpha blending in thermal images. Abstract: Hiding data in an image become a very successful technique to communicate with end users, blinding the interpreter’s intention. Various algorithms have been analyzed on the basis of masking the content within the coordinates of the images or in the color of the images used. Few advanced developed complex algorithms to hide the content in the values of the colors to ensure or guarantee robustness of the data hidden. In this research, a simple technique called alpha blending is used to hide the data in an image and its impact is analyzed for different alpha values. The unavoidable impact of noise on the transmitted carrier image was formulated and studied by many researchers using various available algorithms. In this regard: the same is analyzed using alpha blending in thermal images. TL;DR: In this paper , a pre-trained Convolutional Neural Network (CNN) model was trained via transfer learning and tested to detect concrete defect indications, such as cracks, spalling, and potential subsurface defects. Abstract: This study investigates the semantic segmentation of common concrete defects when using different imaging modalities. One pre-trained Convolutional Neural Network (CNN) model was trained via transfer learning and tested to detect concrete defect indications, such as cracks, spalling, and potential subsurface defects. We compared the model's performance using datasets of visible, thermal, and fused images. In addition, the impact of using different image enhancement techniques, such as histogram equalization and resolution improvement, was investigated. The data was collected from four different concrete structures using four infrared cameras with distinct sensitivities and resolutions, with imaging campaigns conducted during autumn, summer, and winter. Although specific defects can be detected in monomodal images, the results demonstrated that a larger number of defect classes could be detected using fused images with the same viewpoint and resolution as the single-sensor image without significant loss of information. In addition, the output of one hypothesis test showed that the image enhancement techniques provided no significant improvement in the CNN performance for this case of study, even though they resulted in enhanced images with higher information content (entropy) than the original images. 25 Apr 2004 TL;DR: The results of a user study are presented in which multiblended palettes provided higher recognizability of both the background and the palette than the best participating version of alpha blending. Abstract: Alpha blending allows the simultaneous display of overlapping windows-such as palette windows in visual workspaces. Although alpha blending has been used in some applications, such as games, it has not been widely adopted. One reason for the limited acceptance is that in many scenarios, alpha blending compromises the readability of content. We introduce a new blending mechanism called multiblending that uses a vector of blending weights, one for each class of features, rather than a single transparency value. Multiblending can in most cases be automatically optimized to preserve the most relevant features of both the palette and the background window. We present the results of a user study in which multiblended palettes provided higher recognizability of both the background and the palette than the best participating version of alpha blending. TL;DR: A new way to derive the over operator is shown and some implementation details that the author has found useful are described, which are related to matting and alpha blending. Abstract: Associating a pixel's color with its opacity is the basis for a compositing function that is simple, elegant, and general. However, there are more reasons than mere prettiness to store pixels this way. One of the most important anti-aliening tools in computer graphics comes from a generalization of the simple act of storing a pixel into a frame buffer. Several people simultaneously discovered the usefulness of this operation, so it goes by several names: matting, image compositing, alpha blending, overlaying, or lerping. It was most completely codified in a previous paper by Porter and Duff (1984), where they call it the over operator. The author shows a new way to derive the over operator and describes some implementation details that he has found useful. > 01 Jan 2012 TL;DR: A Steganography transformation machine (STM) is proposed for solving Binary operation for manipulation of original image with help to least significant bit (LSB) operator based matching. Abstract: Abst ract - Steg anography is the art and science of hiding information by embedding data into cover media. In this paper we propose a new method of information hiding in digital image in spatial domain. In this method we use Plane Bit Substitution Method (PBSM) technique in which message bits are embedded into the pixel value(s) of an image. We first, proposed a Steganography transformation machine (STM) for solving Binary operation for manipulation of original image with help to least significant bit (LSB) operator based matching. Second, we use pixel encryption and decryption techniques under theoretical and experimental evolution. Our experimental, techniques are sufficient to discriminate analysis of stego and cover image as each pixel based PBSM, and operand with LSB. Ke ywords : spatial domain, pbsm, stm, lsb. ••04 Oct 1998 TL;DR: A DCTdomain convolution theorem is developed which besides exploiting the sparseness of the DCT domain representation also exploits the orthogonality and symmetry in the D CT domain representation to lead to efficient compressed domain based processing methods unlike their spatial domain counterparts, where such properties are not available. Abstract: For direct manipulation in the compressed domain, we develop a DCT domain convolution theorem which besides exploiting the sparseness of the DCT domain representation also exploits the orthogonality and symmetry in the DCT domain representation. These properties lead to efficient compressed domain based processing methods unlike their spatial domain counterparts, where such properties are not available. This theorem can be used in a variety of image and video editing functions when the image and video data are available only as a JPEG or MPEG bitstream. We illustrate the use of these DCT domain convolution theorems in a typical video editing application such as video bluescreen editing. TL;DR: The investigation of wireless communication of steganography images is presented in this paper to study the sensitivity of extraction of hidden images to the channel degradation effects, which is not studied appropriately in the literature. Abstract: This paper presents a robust color image steganography approach for image communication over wireless communication systems. The objective of this approach is to hide three color images in one color cover image to increase the capacity of hiding as most previously published steganography approaches suffer from a capacity problem. Moreover, the investigation of wireless communication of steganography images is presented in this paper to study the sensitivity of extraction of hidden images to the channel degradation effects, which is not studied appropriately in the literature. The proposed approach depends on the Discrete Cosine and Discrete Wavelet transform. The cover image is first transformed to luminance and chrominance components for embedding the images to be hidden. The secret images are encrypted by chaotic Baker map, which is a good representative of the family of permutation-based algorithms, which tolerate the channel degradations better. The investigated wireless communication system is the Orthogonal Frequency Division Multiplexing system with channel equalization. The simulation results reveal the success of the proposed work for robust image communication. Related Papers (5) 01 Jan 2010
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100229.44/warc/CC-MAIN-20231130161920-20231130191920-00672.warc.gz
CC-MAIN-2023-50
8,268
20
https://theosteiner.de/about
code
My name is Theo Steiner and I’m a Software Engineer working for LINE Corporation in beautiful Tokyo, Japan. When it comes to coding, I’m a big proponent of TDD: tummy-driven-development. Write code 💻, eat sushi 🍣, sleep 🌒, repeat 🤖. My native language is German. However, I also speak Japanese and English fluently and have basic knowledge of Spanish and French. 🥖 This one is baguette, and 🥐 this one is crowasson or something. I hold a Master’s degree from 上智大学 (Sophia University in Tokyo) 👨🎓, where I had the awesome opportunity to develop a web platform for conducting spatial literary analysis using Geographic Information Systems. For my Bachelor’s I majored in Japanese Studies 🗾, while also enrolling in classes on database tech, natural language processing and other computer science related shenanigans. I am lucky to have a very exciting dayjob, where I get to develop b2b2c solutions for one of the world’s leading messaging platforms. Massive scale comes with all sorts of interesting challenges 📱. Since sitting in front of a computer all week is not bad enough for my posture already 😭, I make a habit of also programming for fun on the weekends. Most of my time I waste on fine-tuning my neovim config or hanging out in the svelte discord, but every once in a while I do something productive: I am proud to have made (tiny, tiny) coding contributions to fantastic Open Source projects such as Node.js or Svelte.js. ♥️ Especially the community aspect of Open Source Software is dear to my heart, and I am beyond honored to be among the inaugural Svelte Ambassadors for my commitment to this community. I sometimes organize meetups and events to foster and grow the still small, but impactful Svelte.js community in Japan 🇯🇵. If you’d like to join us some day, make sure to follow me on social media.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00625.warc.gz
CC-MAIN-2023-40
1,878
19
https://varderes.com/projects/noaa_aero_2018/
code
One of my first contributions to The Aerospace Corporation’s cloud native initiative was creating a highly-parallelized satellite telemetry data processing pipeline. The goal of this project was two-fold. First, I needed to build a system that provided an order of magnitude faster processing time with respect to a legacy system from the pre-cloud-native era. Processed data would then be streamed into a reporting tool for real-time abnormality detection, a capability that was not possible prior to these foundational changes. Second, I needed to demonstrate the benefits and challenges associated with a containerized and Kubernetes-orchestrated data processing pipeline. The telemetry data is generated from a National Oceanic and Atmospheric Administration (NOAA) joint polar satellite system. It is then collected on a ground station, rsynced into the The Aerospace Corporation’s Cloud Technologies Lab, and stored as H5 files. These files are massive because they store billions of time-based readings across tens of thousands of measurands: sensors, batteries, orientation, etc. Once the data is stored, it is streamed into a processing pipeline with two key phases: Finally, the processed data is fed into a non-real-time abnormality detection software. Initially, I was handed a legacy JAR binary that accomplished the above. For a number of reasons I had no access to the code base. So I played around with it against some test data until I figured out what the cat inside the black box was hiding. I then rewrote the entire thing in Python. A parallelized version, indeed. Once a local, parallelized version of the system was running successfully, I containerized everything and deployed it in a Kubernetes cluster. This involved persistent storage so that worker pods can read and store the telemetry data. It involved service discovery so that pods can stream event metadata to and from Kafka topics. Finally, it involved replica sets so that a large number of workers can crunch away at the incoming telemetry data in real time. Rewriting a parallelized version of this pipeline allowed us to utilize a Kubernetes cluster to deploy highly available data processing workers. This combination enabled us to scale up as much as the underlying hardware would allow, and it provided a high degree of modularity and testability of the system. As a result, the processing time was improved by an order of magnitude, and the customer was convinced of the power of orchestration and cloud-native approaches in general.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104628307.87/warc/CC-MAIN-20220705205356-20220705235356-00489.warc.gz
CC-MAIN-2022-27
2,529
6
https://gbatemp.net/threads/help-r4i-3ds-gold-bricked-but-i-have-an-old-cart-ds-lite.386335/
code
Hey, so I'm an idiot. I was upgrading the firmware of my R4i Gold (r4i-ds.cn) and somehow turned the console off, which basically means I corrupted the bootloader. However, I have a DS Lite and an R4i card (r4i-sdhc.com), and I've heard this can be fixed with a "card swap" method. Can anybody please tell me if this is true, and if so, how I could fix this? Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889733.57/warc/CC-MAIN-20180120201828-20180120221828-00294.warc.gz
CC-MAIN-2018-05
366
1
http://vegchel.tripod.com/upstairshall.htm
code
Last update: may 3rd, 2003 |Not much in this hall, still need to install a lamp. On the table a birdcage, flowers, and some letters. And a ship in a display case..| |The birdcage, made from a kit. Very thin, lasercut wood. I thought it would be very difficult to put together, but it all fitted perfectly.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578582736.31/warc/CC-MAIN-20190422215211-20190423001211-00136.warc.gz
CC-MAIN-2019-18
305
4
http://www.mm.media.kyoto-u.ac.jp/old/research/thesis/2001/b/marutani/marutani-e.html
code
[Japanese | Thesis | Researches in Minoh Lab | Minoh Lab] We propose a method to retrieve range images from database robust for data loss. It becomes easier to get range images by laser range finders. A range image has three-dimensional position data about points on surfaces of objects, and the position data are represented in the coordinate system defined by the range finder. Range images have several merits. (1)they can represent three-dimensional information directly and precisely. (2)they can make geometrical registration easily by the manipulation such as rotation and translation. (3)the values of position data are not affected by the environment. These merits promote researches to use range images for object recognition and pose estimation. In these researches, there are many range images of an object captured from various directions. Hence, range image database which have a lot of range images of various objects captured from various directions will be widely used in near future. On the other hand, there have been no research that proposes the method to retrieve range images from the database using a range image. In the range image retrieval, it becomes a serious problem that a range image includes data loss which occurs when we get the range image. The reasons for the data loss are difference of the capturing angles, out of place from the measurable range of the range finder, and the properties of the range finder's sensor. These data loss may make it hard to identify range images of the same object. In our research, we assume that these data loss exist not only in the input data but also in the data of the database. We can not retrieve range images neither by comparing range images in the feature space, as to be done in the content based image retrieval, nor by matching range images using feature points, as to be done in the object recognition, because of the difference of the rates and the positions of the data loss among range images . For these reasons, the retrieval method has to be robust for data loss. In our method, we emphasis on the common part between the range images. By making use of the common part, we can retrieve range images robust for the data loss. Since this method costs much time, we also discuss the reduction of the calculation time. Our method has three stages. At the first stage, we generate new range images by rotating the input range image by the constant angles. At the second stage, by shifting and overlapping the generated range images to the range images in database, we detect the proper common part between them. The common part is determined by the depth difference in the same grid of the compared two range images. At the last stage, we get the evaluation value by calculating the percentage of the number of the grids in the common part to that of input data. This method takes a lot of time. The reasons are the large amounts of calculation in the registration, and in the evaluation. In the registration process, the proper position that means the position where the common part is maximum is searched. To reduce calculation time, the step of searching the proper position is enlarged. In the evaluation process, we choose the comparison candidates before calculating the evaluation value for all range images in the database. The method of choosing the candidates is as follows. At first, we calculate the evaluation values among all range images in database. Second, we choose representative range images in the database. Third, we calculate the evaluation values between the input range image and the representative range images. The range images whose evaluation values for the representative range images are approximately equal to those of the input image are chosen as the candidates. By this way, the number of calculating the evaluation values between two range images may reduce to the sum of the number of the representative range images and the candidates. This paper reports the effectiveness of the retrieval that use the correlation between the range images by conducting to experiments in range images retrieval. As for choosing candidates, it can keep the good precision and reduce calculation time, when the loss caused by the out of range does not exist.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999000.76/warc/CC-MAIN-20190619143832-20190619165832-00321.warc.gz
CC-MAIN-2019-26
4,262
7
https://www.redgreencode.com/2016/05/
code
Last week, I wrote an editorial for UVa 12192: Grapevine. I thought some more about the experience of solving it, and came up with four lessons that apply to competitive programming problem-solving. Archives for May 2016 Last week, I wrote about the benefits of carefully studying even simple algorithms like binary search, which provides a fast way to find an element in a sorted array. Once you understand how that algorithm works, you can adapt it to solve other problems. For example: Given an array of integers and an integer L, find the position of the first element of the array that is greater than or equal to L. The standard binary search algorithm looks for an exact match. If the target key is not in the array, the search fails (returns a “not found” value). So if we want to handle an inequality, we’ll have to make a few changes. Here are the key points of the revised algorithm. uHunt Chapter 3 has six starred problems, and many more problems in total, on the topic of binary search. If you want to solve them, it helps to have a firm grasp of how that algorithm works. The binary search algorithm is conceptually simple. In ancient times, like the early 1990’s, people used it instinctively when looking up words in a paper dictionary or finding phone numbers in the thick book that arrived on their doorstep. The process: - Open the book to the middle. - If your target entry is alphabetically lower than the current entry, split the left half of the book. Otherwise, split the right half. - Repeat until done. When I’m solving competitive programming problems for practice, I follow a specific series of steps to help me get the most out of the process. My current process ends with submitting an accepted solution and recording my stop time (for measurement purposes). But there really should be another step: find someone else’s solution and compare it with mine.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703550617.50/warc/CC-MAIN-20210124173052-20210124203052-00020.warc.gz
CC-MAIN-2021-04
1,897
11
https://www.raspberrypi.org/forums/viewtopic.php?f=63&t=244136&p=1489505
code
First problem is that you're planning to use a HAT. Unless the HAT you're going to use allows pass-through on some pins, that's going to be a problem for both the RTC and--possibly--the "power" button. The next issue is, what exactly do you mean by a power button? Do you intend to cut off power to the Pi completely? If so, it'll have to be something external to the Pi, like a line switch. If you just want to put it into a halt state, but with power still being provided to the board, there are ways to do that. The simplest is to use two GPIO pins and a dtoverlay for shutdown. If you pick the right pins (5 & 6, IIRC), you can use a button to shut down and the same button to restart. Note the above HAT, problem with this. IIRC, one of the pins on the PoE header can be shorted to ground to shut down, but I don't know if you can restart that way. Every RTC for a Pi that I've seen uses the I2C interface, and again, see the point about using a HAT. The fundamental question about an RTC on a Pi is: Why? If the Pi has network access it will use NTP to keep time, so unless the Pi either has no network connection, or the ports to use NTP are blocked, there is no need for an RTC.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371612531.68/warc/CC-MAIN-20200406004220-20200406034720-00405.warc.gz
CC-MAIN-2020-16
1,186
4
https://www.technogrips.com/case-study/trigger
code
People simply forget, skip or stop taking their medications…which leads to non-adherence. Trigger helps people to integrate healthy behavior by using technology in a very simple way. Trigger is a project to improve patient compliance and health outcome in the most simple way. It is probably the most uncomplicated and effective medication reminder program.Our aim is to stir up your routine and get you (and your loved ones) back to your healthy self, simply by easing up the medication management. To solve the first challenge our developers used Healthkit’s & Fitbits’ API to fetch all the data to the app. For the second challenge which was of medicine reminders, we synced the calendars. We added reminders according to the frequency of the dosage. For encryption and decryption, we used AES encryption algorithm that works parallelly across every platform such as iOS, Android, and PHP. To make this app available in all the languages we made a master in which we stored all the language translations for all the modules
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337473.26/warc/CC-MAIN-20221004023206-20221004053206-00654.warc.gz
CC-MAIN-2022-40
1,032
5
https://www.tutorialandexample.com/cobol-interview-questions
code
1) What is COBOL? COBOL is a programming language which is used for finance, business and administrative systems for companies. COBOL is stands for Common Business Oriented Language. 2) What are the features of COBOL? Features of COBOL are: - Robust Language - Standard Language - Business Oriented - Structured Language 3) What are the different data types in COBOL? Different data types in COBOL are: 4) What is the difference between Structured COBOL Programming and Object Oriented COBOL programming? Difference between Structured and Object Oriented COBOL programming are: ||Object Oriented COBOL |It is a logical way of programming ||It is a Natural way of programming |Here, functionalities are divided into modules ||Here, you identify the objects and then write functions and procedures 5) What is the difference between COMP-1 and COMP-2? Difference between COMP-1 and COMP-2 are: |It is a Single precision floating point ||It is the double precision floating number |Uses four bytes ||Uses eight bytes 6) Which mode is used to operate the sequential file? (Output/Input mode) is used to operate the sequential file. 7) Give some examples of command terminators? Examples of command terminators are: 8) How many Sections are there in Data Division? Six sections are there in data division are: - File Section - Screen Section - Report Section - Linkage Section - Local Storage Section - Working Storage Section 9) What are the access modes of START statement? There are two access modes of START statement are: 10) What are the different OPEN modes available in COBOL? Different OPEN modes available in COBOL are: - Input - Output 11) What is the mode in which you will OPEN a file for writing? There are two modes : 12) How do we get current date from system with century? By using Intrinsic function. 13) Which division and paragraphs are mandatory for a COBOL program? Division and paragraphs for a COBOL program are: Identification division and Program ID. 14) What are various types of search techniques in COBOL? There are two types of search techniques are: - Serial search - Binary search 15) What are the types of table spaces used in COBOL? Three types of table spaces used in COBOL are: - Simple table space - Segmented table space - Partitioned table space 16) What is the use of 66 and 88 levels in COBOL? It is used for Renames clause. It is used for condition names. 17) What is "IS NUMERIC" clause? "IS NUMERIC" clause: It is used to check the item is numeric or not. It returns true if the item contains only numbers (0 to 9). Here, the item can be positive or negative. 18) What is scope terminator? It is used to mark the end of a verb. If and End-If 19) Which COBOL verb is used for updating a file? is used for updating a file in COBOL. 20) Where can we use OCCURS clause? In array declaration, we can use OCCURS clause on Elementary item and Group item. 21) Can a Search be done on a table with or without Index? To search on a table, the table must be indexed./p> 22) What is the difference between PIC 9.99 and PIC9v99? The difference between PIC 9.99 and PIC9v99 are: |It is a four position field. ||It is a three position numeric field. |It contains a decimal point. ||Here, the decimal position is assumed. 23) What is the use of Linkage Section in COBOL? This section is used to pass data from one program/procedure to another program. It is part of a program that maps the data items in the program's storage. 24) What is level 77 in COBOL? is an elementary level item which cannot be subdivided. 25) What are the divisions available in COBOL program? The divisions available in COBOL program are: - Data Division - Procedure Division - Environment Division - Identification Division 26) What is Data Division? It is used to define the variables in the program. 27) What is the use of File Section in Data Division? It is used to define the record structure of the file in the data division. 28) What is Environment Division in COBOL? It is used to specify input and output files to the program. Environment Division consists of two sections: - Configuration section - Input-Output section 29) What are the ways in which parameters can be passed between programs? The ways in which parameters can be passed between programs are:The ways in which parameters can be passed between programs are: 30) What are the types of Call available in COBOL? The types of Call available in COBOL are: - Static Call: Occurs when a program is compiled with the NODYNAM compiler. - Dynamic Call: Occurs when a program is compiled with the DYNAM and NODLL compiler.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104542759.82/warc/CC-MAIN-20220705083545-20220705113545-00131.warc.gz
CC-MAIN-2022-27
4,585
103
https://labnodes.vanderbilt.edu/publication/view/pmid/17307399
code
The recent popularity of two-stage adaptive designs has fueled a number of proposals for their use in phase III clinical trials. Many of these designs assign certain restrictive functional forms to the design elements of stage 2, such as sample size, critical value and conditional power functions. We propose a more flexible method of design without imposing any particular functional forms on these design elements. Our methodology permits specification of a design based on either conditional or unconditional characteristics, and allows accommodation of sample size limit. Furthermore, we show how to compute the P value, confidence interval and a reasonable point estimate for any design that can be placed under the proposed framework.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038464045.54/warc/CC-MAIN-20210417192821-20210417222821-00063.warc.gz
CC-MAIN-2021-17
741
1
http://www.vistax64.com/vista-performance-maintenance/5822-power-icon.html
code
Works fine for me - try bugging it. » More information here: www.vistabase.co.uk » ZackNET Enterprises: www.zacknet.co.uk » MSBLOG Technology News: www.msblog.org » This mailing is provided "as is" with no warranties, and confers no rights. All opinions expressed are those of myself unless stated so, and not of my employer, best friend, Ghandi, my mother or my cat. Glad we cleared --: Original message follows :-- "JPFS" <JPFS@discussions.microsoft.com> wrote in message > I've just installed WINDOWS VISTA BETA 2 - BUILD 5384. Everything seems > except the power icon. The problem is that windows allows me to active the > time, volume and network icons in the notification area of the taskbar, > not the power icon. So i'm not aware when the battery is low. Can somebody > help me with this problem?
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398456289.53/warc/CC-MAIN-20151124205416-00141-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
808
14
https://www.saabcentral.com/threads/windscreen-mounting-template.178550/?u=69608
code
Joel, do you already have a windscreen purchased? Mounting those are a pain in the neck, and I would highly recommend looking for a strap-based system. They are way easier to install and do just as good of job. I personally used Windblox, but you can look around at different options on review sites like windscreenreview.net. Of course, if you like the style then go with what you prefer, but in my opinion strap-on windscreens are highly worth getting.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643585.23/warc/CC-MAIN-20230528051321-20230528081321-00191.warc.gz
CC-MAIN-2023-23
454
1
https://packagist.org/packages/yiisoft/yii2-rest
code
Yii framework REST extension This package has no released version yet, and little information is available. This extension provides the REST API for the Yii framework. For license information check the LICENSE-file. Documentation is at docs/guide/README.md. The preferred way to install this extension is through composer. php composer.phar require --prefer-dist yiisoft/yii-rest
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000175.78/warc/CC-MAIN-20190626053719-20190626075719-00520.warc.gz
CC-MAIN-2019-26
379
7
http://www-10.lotus.com/ldd/dominowiki.nsf/dx/Tip_Ways_to_be_more_efficient_by_using_drag__drop_in_Notes
code
ShowTable of Contents You can drag and drop a file to create a copy or to move it from one place to another. If you are using Notes with Windows you can also right-click an item from the desktop or from a folder and select to either copy the item or embed the item as an OLE object (if that application is installed). Create an attachment from a file on your computer Drag a file from your desktop or file system into a document or email. Copy a document to your operating system Select a document's window tab or a document from an application view in Notes, and drag it to the desktop or file system. : Dragging window tabs is not supported on Macintosh OS X. Copy an attachment from a Notes document to the operating system or into an application (such as Lotus 1-2-3) From a document, select an attachment and drag the attachment to the desktop, file system, or an application. Copy a URL from a browser to a document Drag the URL bookmark icon that displays in the address bar to the desired location in the open document. (The document must be in Edit mode.) Create an OLE object in a document - From the operating system's desktop or file system, right-click a file and then drag it to the open document. - From the pop-up menu, click "Create Embedded Object here." Move a folder to another folder or view From the view pane, select a folder and drag it to a new folder. : Once you have dragged a folder from the top-level Folders to a lower-level folder, you cannot drag it back to the top level. Move a document from one folder or view to another folder or view From the view pane, select one or more documents in a folder or view, and then drag them to the desired folder or view Reschedule a calendar entry Drag a calendar entry to a new time slot on the calendar or Day-At-A-Glance sidebar. (You must be showing timeslots, as shown below)
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827639.67/warc/CC-MAIN-20181216095437-20181216121437-00392.warc.gz
CC-MAIN-2018-51
1,850
23
https://blog.timbunce.org/2017/02/09/comparing-transcriptions/
code
After a pause I am working again on my semi-automated podcast transcription project. The first part involves evaluating the quality of various methods of transcription. But how? In this post I’ll explore how I’ve been comparing transcripts to evaluate transcription services. I’ll include the results for some human-powered services. I’ll write up the results for automated services in a later post. The key metric for transcription is accuracy. How closely the words in the generated transcript match the spoken words in the original audio. To compare the words in the transcript with the audio you need a reference transcript that’s deemed to be completely accurate; a ground truth upon which comparisons can be based. Then the sequence of words in that reference transcript can be compared against the sequence of words in the hypothesis transcript from each system being compared. Word Error Rate The Word Error Rate (WER) is a very simple and widely use metric for transcription accuracy. It’s a number, calculated as the number of words that need to be changed or inserted or deleted to convert the hypothesis transcript into the reference transcript, divided by the number of words in the reference transcript. (It’s the Levenshtein distance for words, measuring the minimum number of single word edits to correct the transcript.) A perfect match has a WER of zero, larger values indicate lower accuracy and thus more editing. Of course there are other metrics, and arguments pointing out that not all words are equally important. For our purposes though, the simplicity of WER is very appealing and widely used in the industry. One Word Per Line I decided early on that I’d simply convert a transcript text file into a file containing one word per line, and then use a simple diff command to identify the words that need to be changed/inserted/deleted, and the diffstat command to count them up. Simple, in theory. In practice a significant amount of ‘normalization’ work, which I’ll describe below, was needed to reduce spurious differences. Visualizing the Differences A very useful command for inspecting and comparing these ‘word files’ is vimdiff. It gives a clear colour-coded view of the differences between up to four files. Here’s an example comparing word files that haven’t been normalized. The left-most column is the transcript produced by a human volunteer. The other three columns, from left to right, were generated by automated systems (in this case VoiceBase API, Dragon by Nuance, and Watson by IBM). This very small section of the transcript has several interesting differences. Before I talk about normalization I want to draw your attention to the second column, the automated transcript by VoiceBase. Note the “two thousand and two” vs “two thousand two” in the fourth column, and “just down the road” vs “just on the road” in the other three columns. The phrases “just down the road” and “two thousand and two” would be more common than the alternatives, yet the alternatives are correct in this case. I suspect this is an example of automated services giving too much weight to their training data when selecting the best hypothesis for a sentence. (It’s a similar situation to autocorrect correcting your miss-spellings with correctly spelt but inappropriate replacements.) A key point here is that, because the chosen hypothesis is likely to read well, it’s harder for a human to notice this kind of error. You can see from the vimdiff output above that numbers can cause differences to be flagged even though the words convey the correct meaning: “2,000” vs “2000” vs “two thousand”, and “2002” vs “two thousand and two” vs “two thousand two”. To address this I wrote some code to ‘normalize’ the words. For numbers it converts them to word form and handles years (“1960” to “nineteen sixty”) and pluralized years (“1960s” to to “nineteen sixties”) as special cases. Words containing apostrophes are another case of differences: I’m splitting on any non-word character so “they’re” is being split into two words. Some transcription systems might produce “they are” (not shown in this example). Apostrophes are tricky. To address this the normalization code expands common contractions, like “they’re” into “they are”, handles some non-possessive uses of “‘s” and removes the apostrophe in all other cases. It’s a fudge of course but seems to work well enough. Another significant area for normalization are compound words. Some people, and systems, might write “audio book” while others write “audiobook” or “audio-book”. To address this the normalization code expands closed compound words, like “audiobook” into the separate words “audio book”. It seemed be too much work to generalize this so the normalization code has a hard-coded list that detects around 70 compound words that I encountered while testing. (Remember that the goal here isn’t perfection, it’s simply reducing the number of insignificant differences for my test cases so the WER scores are a more meaningful.) Other normalizations the code handles include ordinals (“20th” becomes “twentieth”), informal terms (“gotta” becomes “got to”), spellings (“realise” becomes “realize”), and some abbreviations are collapsed (“L.A.” becomes “LA”). Transcripts Produced by Humans For my evaluation I chose a podcast episode of just under two hours length, that had good quality audio, and already had a transcript produced by a volunteer. The primary voice was an American male who spoke clearly but quickly and without a strong accent. I suspected that a single human-produced transcript wouldn’t be sufficiently reliable so I ordered human-produced transcripts from three separate transcription services. This turned out to be more interesting, and more useful, than I’d anticipated. - 3PlayMedia “Extended (10 Days)” - Rate $3/min = $333.44 total. - Completed in 7 days. - Seven “flags” in the transcript, mostly “inaudible” or “interposing voices”. - Scribie “Flex 5 (3-5 Days)” - Rate $0.75/min = $83.35 total. - Completed in 3 days. Formats: TXT, DOC, ODF, PDF. (No timecodes) - VoiceBase “Premium 99%, 5-7 Days, 3 human reviews” - Rate $1.5/min = $168.00 total. - Completed in 4 hours. Formats: PDF, RTF, SRT (timecodes). - Note that VoiceBase provide both human and automated transcription services. The 4:1 difference in cost is notable! 3PlayMedia certainly charge a premium. Let’s see how their transcripts compare. With the normalization I was expecting these transcripts, all produced by humans, to be closer to each other than they turned out to be. Here’s an example of some differences: (In this vimdiff image, and all the ones that follow, the columns from left-to-right are: Volunteer, 3PlayMedia, Scribie, VoiceBase.) That shows three different transcriptions of the “to use” phrase. It’s not very clear on the audio and I’d agree with the majority here and say that “you used” was correct. In this example it isn’t significant but it does illustrate that imperfect human judgement is needed when the audio is isn’t completely clear. Transcribers have to write something and can’t easily express their degree of confidence. If it falls too low they might write something like “[inaudible]” or “[crosstalk]”, but above that threshold they take a guess and you don’t know that. And because the guess is likely to read well it’s harder for a human to notice this kind of error. The second difference shown in that image relates to the difference between a clean transcript and a verbatim transcript. In a clean transcript conformational affirmations (“Uh-huh.”, “I see.”), filler words (“ah”, “um”) and other forms of speech disfluency aren’t included. That “you are” is in the audio, so would be in a verbatim transcript, but three of the four humans decided that it wasn’t significant and should be left out of the clean transcript. But one of the four decided it should be kept in. Other common examples include “I mean” and “you know”. There’s no right answer here, it’s a judgement call case-by-case. It works the other way as well. Sometimes the transcriber will add a word or two that they think makes the text more clear. Compare “everything submits to and is accountable to” with “everything submits to it and is accountable to”. Two of the four humans decided to add an “it” that wasn’t in the audio. Similarly “believe it” vs “believe in it”, here again two of the four added an “in”, only this time it was not the same transcribers adding the word. Transcribers are likely to “clean” transcripts in a way that’s biased towards their own speaking style. Speakers have a distinct verbal style and changes like these by a transcriber can be more distracting than helpful if not in keeping with the speakers own style. Generally these interpretations of the audio, and writing the corresponding text, are made with care and don’t alter the meaning for the reader. At least that’s what I was thinking until I came across this: To be fair this part of the audio is a little garbled due to crosstalk. I’m sure the speaker said “doesn’t matter” (which got normalized to “does not matter”). It’s another example of where the lack of confidence indicators in human transcripts is a problem. Here are a few other examples of differences in these human transcripts that caught my eye: Getting to Ground Truth To compare transcription services I needed a reference transcript – a ground truth – against which to compare the others. Since the transcripts varied significantly I had little choice but to create my own ‘ground truth’ transcript manually. I copied the transcript generated by the volunteer, then listened to the audio in the places where the various transcripts differed in a non-obvious way – well over 200 of them. For each place I decided what the most accurate transcription was and edited the ground truth transcript to match. The most difficult places were where multiple speakers talk over one another. It’s very hard to convey the intent clearly and accurately in a linear sequence of words. Often ‘clearly’ and ‘accurately’ are at odds with each other. I repeated this process with the automated transcripts in order to add-in the disfluencies and conformational affirmations etc. present in the audio. In other words, to shift the ground truth transcript from a ‘clean’ transcript to being closer to a ‘verbose’ transcript. Without that work the apparent Word Error Rate of the automated transcripts would be unfairly higher. They would all be equally effected but that effect would reduce the visibility of the genuine differences. (With hindsight I should have used a separate file for this step but the overall process was iterative and exploratory rather than the linear sequence outlined here.) The final ground truth transcript has 21,629 words. The transcripts produced by the volunteer and by Scribie identified the speakers. The transcript from Voicebase identified transitions from one speaker to another, but didn’t identify the specific speaker. The transcript from 3PlayMedia didn’t identify speakers or transitions, despite costing three to four times as much. 3PlayMedia flagged seven places in the transcript with [? … ?] where the transcriber was unsure of the words but had made a reasonable guess, plus three instances of [INTERPOSING VOICES] and nine [INAUDIBLE]. Voicebase flagged five [CROSSTALK] and two [INAUDIBLE]. Scribie flagged none. Most of 3PlayMedia transcription text flagged as unsure were correct. About half of the INTERPOSING VOICES and INAUDIBLE in the 3PlayMedia transcript the other services had accurate transcriptions for. Segmentation / Punctuation The volunteer transcript had 842 sentences in 158 paragraphs. The 3PlayMedia transcript had 1259 sentences in 331 paragraphs. The Scribie transcript had 915 sentences in 223 paragraphs. The Voicebase transcript had 1077 sentences in 648 paragraphs. I’m not sure what to make of those wide differences. The figures are a little noisy due to artifacts in the way the files were processed, but most the differences seem to be due simply to style. The figures for the automated systems (in a future post) highlight those which do a very poor job of segmentation. The big downside of Dragon by Nuance, for example, is that it doesn’t do segmentation. You simply get a very long stream of words. So you’ll still have a lot of work to do to make them usable, no matter how accurate they might be. Results for Human Transcription Service WER Diarisation Timing Cost ========== === =========== ====== ======= 3PlayMedia 4.5 None Subtitles $333.44 VoiceBase 4.6 Transitions Subtitles $168.00 Scribie 5.1 Speaker names Paragraph $ 83.35 Volunteer 5.3 Speaker names None N/A The important number here is the Word Error Rate (WER). Lower is better. The difference between 4.5 and 5.3 is quite small in practice. Most of the ‘errors’ are in parts of the transcript are due to insignificant differences or ambiguous sections due to cross-talk. I suspect a WER around 5 represents a reasonable ‘best case’ for transcription of an interview. For comparison, the best of the automated transcription services I’m testing have WER of 12 to 16, with some in the 30 to 40 range. All this work was to understand how to judge the accuracy of a transcription in order to evaluate automated systems. Comparing human transcription services turned out to be a useful approach to understanding the issues and help develop the tools. It’s clear that for the highest accuracy it’s very helpful to use more than one service and check the places where they differ. Of course that significantly increases the cost and effort. I’m testing a number of automated systems currently and I’ll include those results in a later blog post. 19 thoughts on “Comparing Transcriptions” Pingback: Semi-automated podcast transcription | Not this... This is a really interesting piece. We actually did a similar experiment in January to research human preference, rather than accuracy. The eventual goal being to train towards more accurate automated systems. View at Medium.com IBM Watson cloud api seems to be much more robust to noise and low bit rate. I compared IBM Watson vs Google Cloud on reference documents I recorded in a quiet room using a handheld microphone. I found the deciles of the bleu scores over the reference transcripts to be fairly comparable. However, when evaluated on audio having background noise and obtained using lower quality microphones, the word count deciles were much different. IBM is much more likely to provide longer transcript text. Here’s the code I used in my comparisons : Interesting. IBM Watson didn’t score well in my testing. That might be due, in part, to them not supporting MP3 audio so I had to transcode it. (I tried mono 16KHz FLAC but the resulting file was larger than their max upload size, so I used the Ogg Opus codec instead.) That transcoding is bound to have reduced the quality. I wonder if it has to do with your recordings being less noisy — most of mine have significant ambient noise. IBM Watson has a narrowband model that can be used in case of low-bit rate or where broadband just doesn’t generate anything useful, whereas I don’t know of any analogous setting in Google for dealing with low-bit rate noisy content. BTW — if you haven’t already you might like the interview of Deepgram on Twiml. https://twimlai.com/from-particle-physics-to-audio-ai-with-scott-stephenson/ Apparently they’ve decided to go with phonemes for indexing rather than words. I recently evaluated simonsays.ai – which uses Watson as their backend service – and the results were consistent with my previous testing: a WER of 25.7 vs 25.2. That’s about twice the error rate of the best automated services I’ve tested (12-16). Perhaps Watson shines better with lower quality audio. When I tested Deepgram, back in December 2016, they had a very poor WER of 40.1. Perhaps they’ve improved since. I like the approach they’re taking and the fact they’ve Open Sourced their core code. Indexing phonemes is an interesting approach. I’ll aim to reevaluate them before I post the overall results. Hi Tim, I was trying out simonsays.ai and comparing it with the output of Watson and I’ve found differences in transcriptions for the same input. Where did you find out that simonsays.ai uses Watson for their transcription service? Thanks! I can’t recall where I got that from, and can’t find it now, so feel free to ignore. I can say that the word error rates from the two services are similar in my testing (both ~25), and not very good compared to the best systems. I’m still waiting to find time to finish my testing, just a couple of services left. I can say that services like Trint, Speechmatics, Sonix, Scribie, YouTube, VoiceBase, and Tremi have much better word errors rates in the 12 to 18 range. Did you ever try Google Cloud speech V1,0 GA and Micorsoft Bing Speech API? Thank you for the extensive review of these services. Have you had a chance to check out Rev, professional human transcription, or Temi, automated transcription? They are similar services to the ones you listed but cheaper. Thanks for sharing your thorough write-ups – As a fellow podcast junkie and software developer… I’ve also felt the pain with lack of searchability and sharability around podcasts, and am also working to solve this problem… I’ve recently released a system for “long audio alignment” at word level. It takes audio and transcript as input, and outputs word-level timecodes. It’s currently being used to power this “immersive listening” proof of concept: (More examples here: http://www.listensynced.com/ycombinator) A great use case for this technology is to combine it with one of the cheaper transcription options to additionally obtain granular timecodes. Alignments are performed in ~3% of audio runtime (i.e.~2 minutes of processing per hour of audio). Meaning, once you have a basic text transcript, interactive transcripts can be generated within just a few minutes as a “post-processing” step! Anyone is encouraged to be in touch if they’re looking for: 1) embeddable interactive transcripts, or 2) a RESTful API for Long Audio Alignment. Pingback: Transkript für Logbuch Netzpolitik #232 We at Scribie just launched our own automated transcription service. Please do try it out once. Just tried it. I’m happy to report that you’re in the top-tier. More details when I write up the results. Do you know a software that I could use two compare the original (good file) against the transcript file? Tim, the other matter is accent/dialect of course. You are welcome to try us out (for free for your testing – just let us know first so we can credit you an agreed set of minutes) as we do manage a very wide range of English accents globally – for a custom solution go to https://waywithwords.net and for our first stage human to the hybrid model (we are still choosing a valid machine partner to work with for this model) try https://nibity.com/ Hi Tim, When do you plan to release your results? The long gaps have meant that the landscape keeps changing under me! Most recently, and dramatically, with Google’s Speech-to-Text product update on April 9th. I’m working on the post again now. I’m mostly away for the next two weeks though, and any estimate I could give would be a hostage to fortune. I can tell you that Google is (now) ranked top :) Pingback: A Comparison of Automatic Speech Recognition (ASR) Systems | Not this… Comments are closed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00279.warc.gz
CC-MAIN-2023-23
19,951
98
https://www.thestudentroom.co.uk/showthread.php?t=3957545
code
I am staring uni in september and was wondering what everyones class timetables where like. As in how many days do you go in and for how many hours?? and if anyone can let me know your schedule for film production it would be well appreciated. For me I go in 4-5 days per week depending on if I have labs or not, depending on the day I'm in uni for between 2 and 8 hours. From what I remember the schedule for film production can be quite erratic as you'll have to go out and do assignments.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823318.33/warc/CC-MAIN-20181210055518-20181210081018-00176.warc.gz
CC-MAIN-2018-51
491
4
https://fileinfo.com/extension/tmproject
code
2.8 | 5 Votes What is a TMPROJECT file? A TMPROJECT file is a project created by MacroMates TextMate, a text editing program with support for many programming languages. It is saved in the XML standard and stores information about a project, which includes references to project directories and files and preferences. TextMate is a free text editor that supports many programming languages. The TMPROJECT file type is used for organizing source code files edited in TextMate together in one project. Before version 2 was released, TextMate supported TMPROJECT, and the more common .TMPROJ files. However, support for TMPROJECT and TMPROJ files ended when MacroMates released TextMate 2. How to open a TMPROJECT file You can open TMPROJECT files with MacroMates TextMate (version 1.5.11 and earlier). TextMate version 2.0 (and later versions) cannot open TMPROJECT files.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00406.warc.gz
CC-MAIN-2023-50
870
7
https://github.com/ethereum
code
Grow your team on GitHub GitHub is home to over 28 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.Sign up Test repository for cross-platform comparison of the Solidity compiler A Python implementation of the Ethereum Virtual Machine Tool suite for testing ethereum applications. The Ethereum Improvement Proposal repository A python interface for interacting with the Ethereum blockchain and ecosystem. Java implementation of the Ethereum yellowpaper. For JSON-RPC and other client features check Ethereum Harmony Mist. Browse and use Ðapps on the Ethereum network. EVMC – Ethereum Client-VM Connector API Browser-Only Solidity IDE and Runtime Environment Official Go implementation of the Ethereum protocol Aleth – Ethereum C++ client, tools and libraries Solidity, the Contract-Oriented Programming Language Utility functions for working with ethereum related codebases. Live deployment of the remix IDE (alpha) Ethereum IDE and tools for the web New experimental programming language Ethereum Foundation website The Ethereum development framework with the most cute animal pictures Ethereum ABI utilities for python Python types for type hinting commonly used ethereum types Cable: CMake Bootstrap Library Current and historical (emscripten) binaries for Solidity A cancelation pattern for asyncio applications Utilities for interacting with the Ethereum virtual machine
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221214713.45/warc/CC-MAIN-20180819070943-20180819090943-00672.warc.gz
CC-MAIN-2018-34
1,462
26
http://www.cs.toronto.edu/~fritz/
code
Christian Fritz, Ph.D. Knowledge Representation Group, Department of Computer Science, University of Toronto Advisor: Sheila McIlraith at cs. toronto. edu I have graduated! Please see my Some contributions of mine that I hope are useful to others: - BibBase.org: The easiest way to maintain your publications page. See example below. - STEP3D.com: The simplest, web-based viewer for STEP files (CAD). a script to generate the latex-source package required by AAAI Press when submitting camera-ready versions for conference proceedings. Usage: aaai_script.sh [TEXFILE]
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104364750.74/warc/CC-MAIN-20220704080332-20220704110332-00222.warc.gz
CC-MAIN-2022-27
567
13
https://lists.debian.org/debian-devel/2003/11/msg01545.html
code
Re: Tabs v.s. spaces On Tue, Nov 18, 2003 at 12:26:37PM -0500, Glenn Maynard wrote: > On Tue, Nov 18, 2003 at 06:04:54PM +0100, Florent Rougon wrote: > > If you are not able to use a programmer's editor, I fail to see how you > > can even try to argue about the usefulness of Python's whitespace > > handling. > Yay! A whitespace flamewar! Yeah, 'whitespace' about sums up the value of it. Except to Python programmers, of course. :-P :-P Unix was not designed to stop people from doing stupid things, because that would also stop them from doing clever things. -- Doug Gwyn
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511203.16/warc/CC-MAIN-20181017153433-20181017174933-00372.warc.gz
CC-MAIN-2018-43
574
11
https://community.esri.com/thread/169455-pop-up-boxes-in-agol
code
I have a web map that I am using to get input from a somewhat large community, and there are quite a few attribute fields that need filled in. I have 2 customizations I want to make but am having trouble figuring out.... 1. I need to be able to make the pop up a different size. The field names are automatically being 'smooshed' into two lines, which is making it difficult for some in the community to track which text box goes with which attribute. I want to be able to increase the size of the pop-up box, and especially the left column showing attribute field names. 2. I need to be able to adjust the location of the pop-up window. The window often covers up the feature that needs to be edited and the community needs to be able to see the full geometry of the feature in question. If anyone has any ideas, please let me know. I would greatly appreciate it!!
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573071.65/warc/CC-MAIN-20190917121048-20190917143048-00059.warc.gz
CC-MAIN-2019-39
865
4
https://forum.xda-developers.com/t/rom-unofficial-lineageos-15-1-for-microg-lineageos-16-0-for-microg-alpha.3784001/
code
LineageOS 15.1 for microG - Mali Drivers - USB Tethering - Video Playback - Fingerprint Sensor - RIL (SMS, Calls, Mobile Data) - Buttons and their Backlight - Wifi Hotspot - 2D and 3D GPU Acceleration - HW Encoding - HW Decoding - Offline Charging (Charging while device is powered off) - HWComposer (HWC) - Wireless Display - Wi-Fi Direct - Possibly other things not listed. Non-working/partially working features: - Possibly things not listed. - HWC on Lineage 16.0 Do not post bug reports without providing logs (logcats) or steps in order to reproduce the bug(s). You should not install GApps as this ROM is intended to be a replacement for them and could cause issues. Download: @Exodusnick builds Lineage 16.0 version (Alpha - requires you to download NanoDroid below) NanoDroid XDA Thread : https://forum.xda-developers.com/apps/magisk/module-nanomod-5-0-20170405-microg-t3584928[/B] Kernel Source: https://github.com/ivanmeler/android_kernel_samsung_universal8890/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558015.52/warc/CC-MAIN-20220523101705-20220523131705-00063.warc.gz
CC-MAIN-2022-21
972
25
https://social.wxcafe.net/@wxcafe/100618278342706993
code
Please stop telling people who don’t know better not to use SMS 2FA. Some other factor is better than no other factor, and not everyone has an adversary that will do SIM cloning or an SS7 attack @wxcafe Agreed! Also I do know better and I still use SMS 2FA for a lot of things because fuck if I'm going to get locked out of my account because my OTP app isn't accessible to me at the moment. @ralaud @wxcafe I’ve been using Authenticator by Matt Rubin, https://itunes.apple.com/us/app/authenticator/id766157276?mt=8 since it has some nice creature comforts. But a full backup isn’t one of them. :( @ralaud @wxcafe the app I use is adamant about not letting you do backups of your own or having any way of transferring the secret anywhere else, although it does at least allow backups to happen in an iTunes encrypted backup (which is what I use). This one claims to allow users to transfer the secrets and such; maybe I'll try it out: https://itunes.apple.com/us/app/otp-auth-two-factor-authentication/id659877384?mt=8&ign-mpt=uo%3D4 So SMS 2FA is more of a false sense of security than anything else. Another problem is that many services, including banks, still offer no 2FA other than SMS 2FA, unless you're a business customer. You are a fool if you have any substantial money they can be stolen via SMS password reset of your email or bank account. Google Authenticator or Authy are much safer and not hard to use. saved my ass when my number was hijacked. @wxcafe Threat Model. @wxcafe though social engineering a sim card swap is probably less than 100$ of labor. So yes its better but if your account has a cash value you need better @wxcafe Also, I know for me, my cell service goes off, and I forget my passwords, so like, how am I supposed to retrieve my passwords then? The emphasis should be on not to hack, not finding ways to blame people for "not being secure enough".
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987787444.85/warc/CC-MAIN-20191021194506-20191021222006-00002.warc.gz
CC-MAIN-2019-43
1,890
12
https://forums.xfinity.com/t5/Xfinity-xFi/Turn-off-5G/td-p/3309866
code
My 2.4 devices connect to my SSID, which has both bands. I don't have to turn off 5G. What Gateway do you have? Certain devices have trouble connecting / get confused when both bands are combined. That said, OP, see if you can disable just the 5 Ghz band with these instructions;
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141171126.6/warc/CC-MAIN-20201124053841-20201124083841-00569.warc.gz
CC-MAIN-2020-50
279
2
http://www.slipbay.com/timer-control-in-vb-with-example/
code
timer control in vb with example is a timer control in vb with document that shows the process of designing timer control in vb with format. A well designed timer control in vb with example can help design timer control in vb with example with unified style and layout. timer control in vb with example basics When designing timer control in vb with document, it is important to use style settings and tools. Microsoft Office provide a powerful style tool to help you manage your timer control in vb with appearance and formatting. A style can apply a consistent look across the whole document instead of having to format each section individually, in the style setting, you can make arrangement for section headers, body text font, header section font, paragraph spacing, color scheme for SmartArt, charts, and shapes etc. a customized timer control in vb with styles may help you quickly set timer control in vb with titles, timer control in vb with subheadings, timer control in vb with section headings apart from one another by giving them unique fonts, font characteristics, and sizes. By grouping these characteristics into styles, you can create timer control in vb with documents that have a consistent look without having to manually format each section header. Instead you set the style and you can control every heading set as that style from central location. you also need to consider different variations: visual basic timer control, visual basic timer control word, timer control c, timer control c word, visual basic timer code, visual basic timer code word, timer control in vb net, timer control in vb net word Microsoft Office also has many predefined styles you can use. you can apply Microsoft Word styles to any text in the timer control in vb with document by selecting the text or sections, clicking the Home tab, and choosing a style in the Styles Gallery. Hover your mouse over the style, and you can see what the text will look like before you apply the style to it. Using styles helps you streamline the creation and editing of timer control in vb with documents, You can also make the styles your own by changing how they look in Microsoft Word. During the process of timer control in vb with style design, it is important to consider different variations, for example, timer control vba, timer control vba word, vbscript timer control, vbscript timer control word, timer control vb, timer control vb word, java timer control, java timer control word. timer control in vb with example timer control for visual basic 6 0 users the timer control in visual basic . is replaced by the t system. the following examples illustrate differences in coding techniques between visual basic . understanding the timer control the timer control is a very useful feature to vb this tutorial demonstrates how to use it. download the vb project code for the example above here. timer timer control the visual studio toolbox has a timer control that allowing you to drag and drop shows a timer example that display current system time in a label control. visual basic 2012 lesson 27 using timer in this lesson, we shall show you how to use timer in visual basic . timer is used to control and manage events that are time related. for example, you need timer control this lesson is about the timer control in vb . for example, set the interval to , to execute the code in the timer event procedure every milliseconds. visual basic timer how to use it to schedule your tasks the vb timer control helps in running a piece of code repeatedly at lets understand the functionality of vb timer using a simple example visual basic timers span class f span class nobr span class nobr sec span class nobr uploaded by thechirpieesusing timers in visual basic in conjunctions with progress bars. how to add a timer in visual basic 7 steps with pictures here are some simple steps in how to add a timer to your visual basic application. please note, you can basic application. the numbers and layout i have used is only for example. ad create a print preview control in visual basic. how to vb timer vb timer this tutorial shows you how to code a simple timer. is there anyway we can create our own timer control with nanosecond support timer control in visual basic 6 0 the timer control is used to fire an event at soecified intervals.the code you want to execute is placed in this event. this control has no
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864725.4/warc/CC-MAIN-20180522112148-20180522132148-00113.warc.gz
CC-MAIN-2018-22
4,409
6
https://mail.mozilla.org/pipermail/es-discuss/2013-August/032618.html
code
domenic at domenicdenicola.com Thu Aug 8 06:38:53 PDT 2013 From: es-discuss [mailto:es-discuss-bounces at mozilla.org] On Behalf Of > From what I understand, setTimeout 0 serves that use case and there is no reason for setImmediate to be better at this job. This is not true, as can be seen from http://domenic.me/setImmediate-shim-demo/. The clamping inside nested callbacks prevents setImmediate from being as good at this job as postMessage or MessageChannel, so as long as there is still clamping on those (which from what I understand is back-compat-constrained) setImmediate is necessary. Microtasks are not sufficient for this purpose because they do not yield to the UI. If you ran the above demo with microtasks, the screen would update all at once, instead of smoothly showing the shorting progress. > I'm having a hard time understanding "before the browser renders again". I'm afraid this is a asking for laggy UIs if there is the least bug. This attitude forces us to maintain user-space trampolines inside microtasks. "Before the browser renders again" microtasks are no more dangerous than `while` loops, which are indeed what user-space trampolines are forced to defer to. There will always be people who abuse `while` loops; those same people will abuse microtasks. Trying to protect us from ourselves by not giving (easy! non-MutationObserver!) microtasks is a poor strategy. > Kyle Simpson wrote: > > Promises implementations necessarily have to insert a defer/delay > > between each step of a sequence, even if all the steps of that > > sequence are already fulfilled and would otherwise, if not wrapped in > > promises, execute synchronously. The async "delay" between each step > > is necessary to create a predictable execution order between sync and > > async usage. > An implementation can keep track of the order in which messages arrived to > the queue and process them in order. No need to impose a delay, no? Yes, this is what I mean by maintaining a user-space trampoline. It is a *not*-insigificant amount of code to do correctly, especially with correct error semantics (i.e., disallow throwing tasks from interfering with future tasks, and re-throw their errors in order in such a way to reach window.onerror). It would be much easier if the browser maintained this queue for us, and we could simply do `window.asap(myTask); window.asap(anotherTask);`. Here "`window.asap`" is a hypothetical pure microtask queue-er, distinct from `setImmediate`'s macro-task queueing (and presumably without all the `eval`-if-string and arguments-passing stuff). More information about the es-discuss
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154420.77/warc/CC-MAIN-20210803030201-20210803060201-00674.warc.gz
CC-MAIN-2021-31
2,617
19
http://quickimvideos.com/how-and-where-to-engage-your-viewers.html
code
All of us want our viewers to watch our videos and engage with us, but it doesn’t happen as much as most of us might like because we have a wrong perspective on engagement. Instead of always asking others to engage with us, today I talk about how it takes some initiative to go out there and engage with others first. The way I’ve built an audience is to always focus on the community and offer more value to them than you ever ask of them. In return, they will give you more than you hoped for. About The Author Aug 25, 2014
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864257.17/warc/CC-MAIN-20180621192119-20180621212119-00475.warc.gz
CC-MAIN-2018-26
529
3
https://www.dfki.de/web/forschung/projekte-publikationen/publikation/13556
code
Learning Implicit Priors for Motion OptimizationJulen Urain; An T. Le; Alexander Lambert; Georgia Chalvatzaki; Byron Boots; Jan Peters In: IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), October 23-27, Kyoto, Japan, Pages 7672-7679, IEEE, 2022. In this paper, we focus on the problem of integrating Energy-based Models (EBM) as guiding priors for motion optimization. EBMs are a set of neural networks that can represent expressive probability density distributions in terms of a Gibbs distribution parameterized by a suitable energy function. Due to their implicit nature, they can easily be integrated as optimization factors or as initial sampling distributions in the motion optimization problem, making them good candidates to integrate data-driven priors in the motion optimization problem. In this work, we present a set of required modeling and algorithmic choices to adapt EBMs into motion optimization. We investigate the benefit of including additional regularizers in the learning of the EBMs to use them with gradient-based optimizers and we present a set of EBM architectures to learn generalizable distributions for manipulation tasks. We present multiple cases in which the EBM could be integrated for motion optimization and evaluate the performance of learned EBMs as guiding priors for both simulated and real robot experiments.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816939.51/warc/CC-MAIN-20240415014252-20240415044252-00808.warc.gz
CC-MAIN-2024-18
1,444
3
http://apk-kindle.blogspot.com/2014/09/blur-launcher-replacement-v111.html
code
Welcome to Blur, our launcher replacement! ** Please note that this project is 100% free, the in-app purchases are solely for donate functionality. There are no ads either ** Blur is a custom launcher designed by Klinker Apps Inc. to bring you the most innovated experience on Android. With Blur, any developer can go in and create a "Page" for their app that can be displayed right on your homescreen, just a swipe away. Think about it like the Google Now Launcher, but instead of being limited to just Google Now on the side, you can use any app with a supported "Page"! Out of the box, we have created pages for both of our newest apps, EvolveSMS and Talon for Twitter. We also have a Google Now style "Info Page" that other developers can plug into and create custom cards for. To get the EvolveSMS page, just download the app: http://goo.gl/i4mzvB To get the Talon for Twitter page, follow these steps: 1.) Download Talon for Twitter from the Play Store: http://goo.gl/Jfcpzw 2.) Download and install the Talon Launcher Page: http://goo.gl/rXRkhG The reason you need to download the seperate launcher page app is because of system limitations preventing us from reading the correct data from the normal Talon app (since it is paid). As I said, other devs can also create their own "pages" or "info cards" for Blur! Just search the Play Store for "Blur Launcher" and they should start to appear once developers start to make them! To apply pages to your launcher: 1.) Long click an empty space on the homescreen, then press settings. 2.) Go to the page picker, and just hit the add button on an open page (swipe left and right to get to other pages) 3.) Next time you return to your homescreen, it will restart itself and the pages will be there! To apply info cards to the "Info Page": 1.) Add the info page to your launcher with the above steps 2.) Go back to settings and click the card picker button 3.) Pressing the "Add Card" button on that screen will then bring up a list of all the available cards - NEW: Vertical Scrolling App Page - NEW: Extra page (on the right) to set from the Page Picker - Revamp of gesture, home, and back button support (under workspace settings) - Bug fixes - Crash fixes Require 4.1 and Up & File Size 4.8 MB Download Blur - A Launcher Replacement v1.1.1 APK
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594790.48/warc/CC-MAIN-20180723012644-20180723032644-00299.warc.gz
CC-MAIN-2018-30
2,298
25
https://mono.github.io/mail-archives/mono-devel-list/2004-July/006958.html
code
[Mono-devel-list] ABC removal massi at ximian.com Mon Jul 12 05:51:30 EDT 2004 The new implementation of ABC removal is in CVS (head). It works *much* better than before, and I think we could enable it by default whenever SSA is used. Also, if we enable it maybe it will receive more testing :-) It now removes more than 600 checks from mscorelib.dll (more than double than before), and the compilation overhead is really low. I tried hard to document it properly, but if something is not clear, just ask... More information about the Mono-devel-list
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500339.37/warc/CC-MAIN-20230206113934-20230206143934-00384.warc.gz
CC-MAIN-2023-06
550
12
https://www.gustavojcorrea.com/cube-experience
code
LED Cube Experience Rev 2 of the Cube My goal for this project is to create an entertainment experience for anyone producing or playing music at a concert stage or venue. As a frequent concert goer and raver, I would like to redesign the concert/rave experience for the audience viewers and performers. My passion for art, music, and engineering has led me to create something that uses music to controls lights. I will be building upon what I created for my CS120B Project. In my CS120B project I displayed the amplitudes of sound picked up from an AUX cord and microphone using the LED Matrix Cube as the primary display device. What I would like to do now is modify the cube idea so that each LED Matrix panel is motorized and is able to expand and contract on the cube. My goal is to have the bass/hi-hat notes from music to synchronize with the lights and motors so that movement is visible on the cube. My inspiration came from Deadmau5’s cube. The Cube will be designed to be deployed with a tripod at concerts/raves. This modular method of deployment follows the modular philosophy of Tait Towers. It will allow for better transportation, support and stability. During a typical show both recorded music and live music that is played will display lighting/motor effects. The music that is played on the MIDI controller will drive patterns on the LED displays.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154053.17/warc/CC-MAIN-20210731043043-20210731073043-00324.warc.gz
CC-MAIN-2021-31
1,369
4
https://docs.oracle.com/cd/E19697-01/816-5484-10/calagadm.htm
code
Complete Contents | Chapter 1 Installation and Deployment Chapter 2 Configuring Calendar Server Chapter 3 Admininistering Calendar Server Chapter 4 Monitoring the Calendar Server Appendix A Commnand Line Utilities Appendix B Monitoring Tools Appendix C Time Zones Appendix D Calendar Server LDAP Schema iPlanet Calendar Server provides the following tools for server administration: |Starting and Stopping the Server| You can start and stop the Calendar Server the using: Using start-cal and stop-cal The start-cal and stop-cal utilities are located in the server-root/cal/bin directory. Both can be run either on a remote machine or the local machine where the Calendar Server is installed. To start the Calendar Server, go to the server-root/cal/bin directory and type: start-cal on the command line. For example: To stop the Calendar Server, go to the server-root/cal/bin directory and type: stop-cal on the command line. For example, enter: Using iplncal.sh (Unix only) The iplncal.sh program is located in /etc directory. It must be run on the local machine where the Calendar Server is installed. To start the Calendar Server using iplncal.sh, go to the /etc directory and execute the program from the command line. It takes the following syntax: iplncal.sh [-h] [-r ServerRoot] start|refresh|stop|list [service] On Windows NT, you can open the Services dialog box from the Control Panel to start and stop the Calendar Server. Refer to the documentation provided with the operating system for instructions. |Using the Command Line Utilities| This section describes the tasks you can perform to administer Calendar Server using the command line utilities. The examples in this section use the most commonly used commands and options. For complete details on the command utilities syntax and usage, see Appendix A, "Command Line Utilities." This section includes the following topics: The following command line utilities let you perform administrative tasks on calendar users. Use the csuser command line utility to: Use the csuser utility's create command to create a calendar user. For example, to create the calendar user JSmith using the default configuration settings, enter the following command on the command line: csuser -g John -s Smith -y password -c calJSmith create JSmith Use the csuser utility's delete command to delete a user from the Calendar Server. Note. The delete command removes all of the user's information from the LDAP server. (Calendar database information can be recovered from a calendar database that has been saved to a backup. See Backing-Up the Calendar Database.) For example, to delete JSmith from the Calendar Server, enter the following command: csuser delete JSmith Enabling a Calendar User Use the csuser utility's disable command to prevent a user from logging into the Calendar Server. The disable command prohibits a user from accessing calendar data, but does not remove the user's information from the calendar database. For example, to disable JSmith from access to Calendar Server data, enter the following command: csuser disable JSmith Note. If a user is currently logged on to the Calendar Server, the disable command has no affect until the user logs off. The cssession utility lets you logout a calendar user (see Logging Out a User).Checking if a User is Enabled Use the csuser utility's check command to determine if a specified user is enabled to access calendar data. For example, to check if JSmith is enabled for calendaring using the default configuration settings, enter the following command: csuser check JSmith For example: To list all users enabled for calendaring, enter the following command: csuser list csuser -v list JSmith Resetting User Calendar Attributes Every calendar has a primary owner and, optionally, other owners. A primary owner can update the events and tasks of a calendar as well as change the properties of a calendar, such as the name, description, additional owners, and display settings. Other owners can update a calendar's events and tasks, but cannot change a calendar's properties. Calendars can also be private or public. Public calendars can be viewed by any calendar-enabled user, but only the owners can make changes to the calendar. Private calendars can be viewed only by the calendar's owners. Use the cscal utility's create command to create a calendar. For example, to create a calendar owned by JSmith that can be read by anyone, enter the following command on the command line: cscal -n exampleA -o JSmith -r public create calA Use the cscal utility's delete command to delete one or more calendars from the Calendar Server. Note. The delete command removes all of the calendar's information from the calendar database and cannot be undone. (Database information, however, can be recovered from a database that has been saved to a backup. See Backing-Up the Calendar Database.) The cscal utility lets you delete a single calendar or multiple calendars. For example, to delete a specific calendar with the CALID calendarA, enter the following command: cscal delete calendarA cscalutil -o JSmith delete cscal enable calendarA cscal -g John -h airius.com -p 80 enable JSmith Disabling a Calendar User Modifying Calendar Properties Resetting Calendar Properties Use the csdb command line utility to view the statistics of the local calendar databases, and to create, delete, backup and restore the calendar database. You must run the csdb utility on the local machine where your Calendar Server is installed. This section describes how to use csdb to view database statistics and to create and delete databases. For csdb backup and restore options, see Backup and Restore Procedures. Warning. You must stop the Calendar Server before restoring, creating, or deleting the calendar database. For example: To view calendar database status and statistical information, enter the following command: csdb list csdb create csdb delete csdb recover Note. The csexport and csimport utilities must be run locally on the machine where your Calendar Server is installed and can be executed while the server is either running or stopped. To export the calendar with the CALID JSmithcal in ICAL (text/calendar MIME) format to a file named jsmith.ics, enter the following command: csexport -c JSmith calendar jsmith.ics csexport -c JSmithcal calendar jsmith.xml Importing Calendar Data |Backup and Restore Procedures| This section describes how to use the command line utilities to backup and restore Calendar Server data: Use the csbackup utility's calendar command to backup a calendar to a plain text file using ICAL or XML format. The file name extension (.ics or .xml) that you specify for the output file determines which format is used. For example: To backup the calendar JSmithcal in ICAL (text/calendar MIME) format, enter the following command: csbackup -c JSmithcal calendar jsmith.ics csbackup -c JSmithcal calendar jsmith.xml Restoring a Calendar from a File Use the csrestore utility's calendar command to restore a calendar that was saved to a backup file using the csbackup utility. The file name extension (.ics or .xml) of the backup file indicates the format in which it was saved. For example: To restore the calendar JSmithcal that was saved in ICAL (text/calendar MIME) format to the file jsmith.ics located in the bcakupdir directory, enter the following command: csrestore -c JSmithcal calendar backupdir/jsmith.ics csrestore -c JSmithcal calendar backupdir/jsmith.xml Restoring a Calendar from a Database Backing-Up a User's Default Calendar Restoring a User's Default Calendar Backing-Up the Calendar Database Use the csdb utility's recover command to recover a calendar database that was accidentally corrupted or deleted. For example, to attempt to recover a damaged calendar database in the current directory, enter the following command:csdb recover Using Solstice or Legato Software to Backup Calendar Server Use the following steps to backup calendar data: The backup procedure creates a backup directory under the current directory. This directory is not the actual directory calendar data is stored, but a directory image of how calendars are stored. This files in this directory are empty and are used only to provide information to the backup program on how calendars will be stored on the backup media. If the backup directory already exists, it is synchronized with the directory structure of the current hierarchy. Note: Do not use the Solstice Backup incremental backup feature because the backup directory is only an image of the folder structure and contains no actual data. The incremental backup feature is not supported in iPlanet Calendar Server. The preceding steps describe how to run a backup manually. It is recommended that you set up the backup program's backup command to run the Calendar Server csbackup command line utility before the running backup program's save command to achieve an automated backup process. Use the Solstice nwrestore feature or the recover command to restore backed up calendar information. If you use nwrestore, you will receive the message: "File already exists. Do you want to overwrite, skip, backup, or rename?" Choose overwrite. (This message appears because the backup tree is just the directory hierarchy, that is, it consists of empty files and stays that way permanently.) Note. If you use the Solstice recover command, you can use the -A and -iy arguments to suppress this message.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948515311.25/warc/CC-MAIN-20171212075935-20171212095935-00466.warc.gz
CC-MAIN-2017-51
9,460
49
http://smokingmeatforums.com/index.php?threads/how-to-keep-smoke-going-with-on-cib.147726/
code
I am looking to smoke ribs the 3-2-1 method. It seems as though chips in the CIB stop smoking after 40mins or so so I'm curious how I would keep the smoke going with only one box? Would I add the chips after the 40mins, 20mins before they're done? i use to do the pouch method and would always add another pouch after 30 mins or so. That way the next batch of wood could start smoking before the first ran out. But with one box I'm sort of puzzled. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804610.37/warc/CC-MAIN-20171118040756-20171118060756-00190.warc.gz
CC-MAIN-2017-47
456
1
http://lists.mplayerhq.hu/pipermail/ffmpeg-devel/2015-April/171501.html
code
[FFmpeg-devel] [PATCH 3/3] avformat: add youtube-dl based demuxer tempn at mi.rr.com Thu Apr 9 14:30:43 CEST 2015 On Wed, 8 Apr 2015 20:14:07 +0200 Gilles Chanteperdrix <gilles.chanteperdrix at xenomai.org> wrote: > > why not machine translate the python to c and import that into > > ffmpeg? :P > > https://github.com/pradyun/Py2C > Because then you will have to maintain that C, update it as soon as > a youtube-dl python file is updated because a site changed. what we should do is convince youtube that having youtube support in ffmpeg (and thus vlc and other projects) with ad playback, login support, etc, is exactly what youtube wants. then youtube sends a patch and maintains it. More information about the ffmpeg-devel
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668772.53/warc/CC-MAIN-20191116231644-20191117015644-00016.warc.gz
CC-MAIN-2019-47
727
15
http://freecode.com/tags/mac-os-x?page=1&sort=created_at&with=2773%2C417&without=
code
libTISCH is a framework for easy development of multi-touch applications. It contains tools for video processing, calibration, gesture recognition and, most importantly, a GUI toolkit with widgets that utilize the multi-touch gestures detected by the lower layers. It runs on Linux, Mac OS X, and Windows. Artisan System is a PHP framework aimed at build Web sites and e-commerce Web software very quickly and efficiently. It supports most of the features expected in a PHP framework, along with a feature-set with e-commerce classes. The e-commerce classes will support credit card processing, other payment methods, shipping calculators and estimators, product management, customer processing, and order creation and management. Artisan System has a very fast but structured development roadmap. The Corosync Cluster Engine provides a cluster plug-in engine for third party cluster service developers. Designers develop service engines for use with Corosync that can take advantage of its features including messaging, membership, IPC, a configuration object database, a handle database, automatic replication, and more. Flash'In'App is a Cocoa framework that lets you load and fully manage Adobe Flash movies from your own applications. It provides classes that play SWF files, communicate with them via External API, FSCommands, or Variables, control external resource loading, and much more. They can interact with Flash Player.plugin and SWF files themselves. WaveMaker is a RAD development tool for Web and cloud apps, with more than double the monthly downloads of any other RAD tool. Its visual, drag, and drop tools flatten the Java learning curve by 92%, enabling any developer to build enterprise Web applications that deploy to a standard Java platform. The WYSIWYG studio creates standard Java applications with 98% less code, boosting developer productivity and quality without compromising flexibility. Applications are cloud-ready and include built-in support for multi-tenancy and elastic scaling.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698104521/warc/CC-MAIN-20130516095504-00045-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
2,015
5
https://dba.stackexchange.com/questions/204084/string-manipulation-tools-to-populate-a-variable-for-two-functions
code
Versions: SQL Server 2008 R2 - 2014 I'm using a server audit to find changes to logins on my SQL Server instances, and writing it to the ERRORLOG directory path. Unfortunately, not all the instances use the same path for the ERRORLOG directory. I can get the path using SELECT SERVERPROPERTY('ErrorLogFileName') but I need to "insert" the return value of that statement to two other places. The first is when I'm creating the Server Audit: CREATE SERVER AUDIT [ServerAuditName] TO FILE ( FILEPATH = N'C:\Program Files\Microsoft SQL Server\MSSQL\Log' ,MAXSIZE = 0 MB ,MAX_ROLLOVER_FILES = 2147483647 ,RESERVE_DISK_SPACE = OFF ) So, I need to "insert" the results of the SERVERPROPERTY query into a variable or...something, so I can use it in the FILEPATH value above. Secondarily, I also need to find the ERRORLOG directory path when reading the *.sqlaudit files the Server Audit creates. I can easily use the following to get files, but here too, I need to "insert" the filepath vaule with the result of the SERVERPROPERTY query: SELECT * FROM sys.fn_get_audit_file('Filepath\*.sqlaudit',DEFAULT, DEFAULT) I have tried some "google-fu" and have looked at a couple of string functions, like replace and the "trim-family"...which wasn't very relevant. If anyone can help or point me to a good article or two on how to achieve this, I would greatly appreciate it.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00691.warc.gz
CC-MAIN-2022-33
1,360
7
https://learn.microsoft.com/en-us/dynamics365/marketing/create-deploy-marketing-pages
code
Create and deploy marketing pages If you’d like to try Dynamics 365 Marketing for free, you can sign up for a 30-day trial. A marketing page is a webpage that includes a form where people can register for an offer, update their contact information, manage mailing list subscriptions, and more. All the information submitted through a marketing page is automatically captured by Dynamics 365 Marketing and applied immediately to your customer database. Marketing pages integrate with—and provide expanded functionality for—many other Dynamics 365 Marketing features, including email marketing, customer journeys, behavior analysis, lead scoring, and result analytics. The marketing-page feature described in this topic requires that you have a Power Apps portal associated with your Dynamics 365 Marketing instance. If your admin chose to install Marketing without a portal, then the features described in this topic won't be available to you. If you attempt to go live with a marketing page without having a portal available, you'll be alerted to the issue and offered a chance to install a portal if you like (admin privileges required). Note, however, that a simple default subscription center is available even if you don't have a portal. This page is hosted by your Dynamics 365 Marketing server and can be customized using the features described in this topic. More information: The default subscription center. Overview: How to create a new marketing page and go live The overall process of creating a new marketing page and making it available on the web goes through the following stages: Go to Marketing > Internet Marketing > Marketing Pages, and select New in the command bar to start creating a new page. Choose a page template, which creates your initial design by establishing the page type, column layout, and sample content. Add and edit your page content. Use the graphical editor to drag new page elements to your design (including forms, text, images, and more), and use the HTML editor to add extra features, custom styles, and scripts. Along the way, you might need to create new forms, but usually you'll be able to use existing ones. When you are satisfied with the design, check it for required content and technical errors by selecting Check for Errors in the command bar. If a problem is found, read the description, address the issue, and try again until the page passes the error check. Select Save in the command bar. Your page is now verified and saved in your system, but is still not available on the web. Select Go Live to publish it to your Power Apps portal, where it will be made available at a public URL. You are now ready to start promoting it by including links to it in your marketing email messages, banners, social-media posts, and other marketing initiatives. More information: Design your digital content The remainder of this topic provides more information about these steps, including how to work with forms and form fields, how to integrate marketing pages into emails and customer journeys, and how to read and interpret results. Types of marketing pages There are three basic types of marketing pages: - Landing pages Landing pages provide a webpage with an input form that visitors can use to sign up for a download, discount, mailing list, or other perk by entering their contact details. When a visitor submits a form, Dynamics 365 Marketing automatically stores the submitted values in your database, creating new records or updating existing ones as needed. - Subscription centers All marketing email messages must include a link to a subscription center, where mail recipients can go to unsubscribe, choose other lists to subscribe to, or update their contact information. You can choose which mailing lists to include in each subscription center, but all subscription centers will also include a check box the visitor can use to opt out of all marketing emails. - Forward to a friend If you'd like to enable recipients of your marketing email messages to forward those messages to friends who might also be interested in your offers, create a forward-to-a-friend marketing page and include links to it in your marketing email messages. Dynamics 365 Marketing tracks when messages are forwarded by contacts who use the forward-to-a-friend form, but not when contacts simply forward a message by using their standard email client. Messages forwarded using an email client will still contain the web beacon and personalized links of the original recipient, so your email results will show all interactions with these forwarded messages as being done by the original recipient too—but when a contact uses the forward-to-a-friend form, Dynamics 365 Marketing generates a new web beacon and personalized redirect links for each forwarded message. Forward-to-a-friend recipients also won't see any personalized information that was intended for the original recipient. For reasons of data privacy, all data entered into a forward-to-a-friend form is deleted after 30 days, so no new contact or lead records are created unless a recipient of the forward chooses to register with your organization using a landing page. Dynamics 365 Marketing also includes both Customer Voice (for running online surveys) and Event Management (which includes a full-featured event website that provides event information and registration). Like marketing pages, these provide interactive webpages that run as Power Apps portals, and work similarly to marketing pages under the hood, but they are more specialized so you'll work with them differently. More information: Set up the event website, and Create and run online surveys Create, view, and manage marketing pages Create a new marketing page To create a new marketing page, do one of the following: Go to Marketing > Internet Marketing > Marketing Pages to go to the full list of all pages currently available on your instance, and then select +New in the command bar. You'll first be asked to choose a template, which establishes the page type and column layout and might also provide sample content. Then you'll be in the content designer, where you can start designing your page. While working in a marketing email message or customer journey, add a marketing page tile or design element to your journey or message, and then select +New on the Properties tab instead of choosing an existing page. A quick-create flyout slides in from the side of the screen, where you must enter values for all required fields and then select OK. A new marketing page is created with your selected settings and is applied to your new customer-journey tile. However, you'll still need to finish the page later by choosing a template and customizing it as needed. You can do that now by selecting Edit on the Properties tab while the page is selected, or you can do it later either from here, or from the full list at Marketing > Internet Marketing > Marketing Pages. Set the required field values Every time you create a new marketing page, you must fill out the required fields shown in the header of the page. Select the More header fields button at the side of the header to open a drop-down dialog and make the following settings: - Name: Enter a name for the page that you can easily recognize later. This name is internal-only. - Type: Choose the type of page you are making. Each type has different requirements and options. - Partial URL: When you publish the page, this value becomes part of its URL. The page will be published on your Power Apps portal, so the final URL for the page will have the form: https://<YourOrg>.microsoftcrmportals.com/<PartialURL>. Enter a suitable partial URL (note that contacts might notice this text when they load your page). (These settings are also available on the Summary tab.) Select Save on the command bar after you've finished making these settings. Design your content After choosing a template, you'll be in the page content designer, which resembles the other digital content designers provided in Dynamics 365 Marketing. Work with it as follows: The Content > Designer tab provides a graphical tool that you use to design your content by using drag-and-drop, point-and-click operations. Add new elements to your design by dragging elements from the Content > Designer > Toolbox tab to the content canvas. Choose a design element that already exists in your design, and then use the Content > Designer > Properties tab to configure and style it. When you select a design element on the canvas, you'll usually see a pop-up toolbar just above the element. The tools it offers vary depending on which type of design element you've selected. The toolbar typically provides commands to move, copy, or delete the selected element. For text elements, the toolbar offers commands for applying basic text formatting as you would in Microsoft Word. To style the overall page with basic fonts, colors, and background, select anywhere in the background of your marketing page in the designer. After you select the background, the Properties tab will display General layout options. Use the Designer > HTML tab to edit the raw HTML directly. You might use this to paste in an existing HTML design, or to fine-tune the code in ways the graphical editor doesn't support (such as custom attributes or logic). HTML code for marketing pages published to the portal must be less than the maximum size of the adx_copy attribute of the adx_webpage portal entity, not including images or imported scripts. If you attempt to publish designs larger than the maximum size of the adx_copy attribute, you will receive an error message. More information: Design your digital content Establish marketing page templates Dynamics 365 Marketing comes with a collection of sample templates to help get you started quickly. You can also save your own templates, which you might do to establish your own visual identity and quickly create new pages that conform to it. You can view, edit, and create all marketing page templates by going to Marketing > Marketing templates > Page templates. The process for creating a new template is similar to creating a new page, but you'll start from a blank slate rather than choose a template at the beginning. More information: Work with email, page, and form templates Deploy your marketing pages While you are building a marketing page it remains in draft status, and is therefore editable in Dynamics 365 Marketing but is unavailable to customers on the internet. When your page is ready for use, you must publish it by selecting Go Live. Your design will be checked for errors and then, provided it passes, be published to your portal. If a problem is found, read the error message, address the issue, and try again. You can edit a live page by selecting Edit in the command bar. While you are editing it, it remains available on the internet. After editing, select Save to go live with your changes. Your design will be checked for errors and then, provided it passes, your updates will be published. Most marketing pages include an embedded form, which you must design and publish separately from the page. The imported form is validated together with the page when you publish it, so if an embedded form has been removed or changed so it is no longer valid, then you'll see a validation error when publishing or saving an edited page. You can remove a live page from the internet by selecting Stop in the command bar. More information: Go live with publishable entities and track their status Integrate landing pages with other marketing initiatives To include a link to a landing page in a marketing email, you can either create a dynamic text link (in a text element) that references the page by using the assist edit feature, or add a dedicated marketing-page element, which creates a colorful call-to-action button that links to the page. More information: Add dynamic content to email messages and The form element for marketing pages You can create customer journeys that include triggers that react to marketing page submissions, so that contacts who submit the page are treated differently from those who don't. To do this, include a marketing page tile in your journey design and then place a trigger that references that tile and specifies logic for how to react to it. To trigger on a marketing page linked to in a marketing-email message, add an email tile for the message and then add a marketing page tile as a child tile of that message. More information: Use customer journeys to create automated campaigns View submitted data and analyze page performance To view form submissions and analytics about page usage and performance: Go to Marketing > Internet Marketing > Marketing Pages and use the search, sort, and filtering controls to find the page you want to inspect. Go to the Insights tab. Explore the various tabs and displays here to view submissions and gain insights. More information: Analyze results to gain insights from your marketing activities Configure marketing page defaults and matching strategies Administrators can choose settings that control several aspects of the way all marketing pages function on your instance and the way they match incoming page submissions to existing contacts and leads. More information: Configure landing pages Create a landing page Design your digital content Accessibility and keyboard shortcuts Design elements reference Upload and use images and files Go live with publishable entities and track their status
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499966.43/warc/CC-MAIN-20230209112510-20230209142510-00569.warc.gz
CC-MAIN-2023-06
13,526
71
http://tvtropes.org/pmwiki/pmwiki.php/PlayingWith/OneOfTheKids
code
: An adult character becomes more childish due to spending time with children. - Straight: Bob, who's a teacher becomes more like his students because he hangs out with them a lot. - Exaggerated: Bob likes to spend time playing with kindergarten kids. He likes to play with glitter. - Downplayed: Bob may act like his students sometimes, but focuses on his job. - Justified: Bob's job requires him to have some level of interaction with kids. - Bob, who's eight-years-old becomes more mature because he hangs out with people older than him. - Alternatively, Bob is a full-blown Man Child, and he works so well with kids because he identifies with them. - Subverted: ??? - Double Subverted: ??? - Parodied: ??? - Zig Zagged: ??? - Averted: Bob doesn't spend time with kids or his maturity doesn't drop whenever he's around them. - Enforced: ??? - Lampshaded: ??? - Invoked: ??? - Exploited: ??? - Defied: ??? - Discussed: ??? - Conversed: ??? Back to One of the Kids
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997886087.7/warc/CC-MAIN-20140722025806-00135-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
965
20
https://feedback.azure.com/forums/34192--general-feedback/suggestions/39844231-realignment-of-drop-down-columns-in-usage-quotas
code
Realignment of drop-down columns in Usage + Quotas under Subscriptions Category : User Experience issue The drop down value columns in Usage + Quotas section under Subscriptions need to be reordered. The first drop down values that allows for selection of Service Quotas do not have any value by default. This drop down will only be populated after a value is selected for the second drop down of Provider. This is not a blocker of an issue, but misleads a user as no values show up for the Provider drop down by default. Suggestion - Swap the first two drop down values so that the Provider appears as the first drop-down and Quotas appears as the selection drop down. Please reference attached file that clearly details out all the steps to reproduce this.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419593.76/warc/CC-MAIN-20200601180335-20200601210335-00461.warc.gz
CC-MAIN-2020-24
758
5
https://www.socode.co.uk/job/senior-embedded-software-engineer-industrial-power-solutions-1
code
Senior Embedded Software Engineer | Industrial Power Solutions £70,000 + Bonus/Benefits Looking for that next technical challenge? Maybe a feel-good industry such as renewable energy? None of that fluffy stuff here – you will be a specialist in the design and manufacturing of power electronics and high-power applications such as power transmission and renewable energy generation. As a small team, your knowledge will help shape the future, being involved in various embedded systems and contributing to the full software lifecycle. Being part of a team that loves to work remotely – as long as you get your work done you can choose how you want to work – speaks volumes about how relaxed the culture is. Alongside legacy code written in C (This needing occasional support), they are looking to focus more on C++, potentially even Rust. Alongside Embedded software, they have PC tools written in C#. All we ask on the application is a good attitude and a minimum of 5 years of commercial experience under your belt. Being used to a bare-metal environment? No problem. Background in embedded Linux? Sure! We welcome all profiles! If you feel you are suitable for this role, please don’t hesitate to apply now. For more information, or to discuss your experience/CV, please do get in touch with Thomas Drake at SoCode - Norwich! And if you don’t have an up-to-date CV, don’t worry. #LI-JV1 #embedded #C++ #Rust #Renewableenergy
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817253.5/warc/CC-MAIN-20240419013002-20240419043002-00151.warc.gz
CC-MAIN-2024-18
1,440
11
http://onlinetutoringworld.com/voip/voip-setup.htm
code
This is a basic voip setup guide aimed at helping ESL teachers select and use VOIP for online tutoring. Before we discuss the technical aspects of VOIP technology, its important to understand the essential parts that make up a complete VOIP system. There are four fundamental components to a complete system: 1. Broadband Internet connection Although free VOIP providers claim to run on dial-up connection, VOIP runs best on fast broadband connection cable, satellite or DSL (DSL is a generic term for digital subscriber line, for home users it's more specifically known as ADSL). The ideal minmum ADSL bandwidth needed for internet telephony on is 512kbps/128 kbps or higher. This speed is fast enough to sustain a normal conversation and allows the user to browse the internet at the same time. During the installation process, your Internet Service Provider (ISP) will also supply a separate modem. The modem makes the communication process possible between your computer and the internet. 2. Subscription to a VOIP provider A VOIP provider is a telecommunications company that handles the connections from the internet to a PSTN telephone line (Public Switch Telephone Network). Most VOIP providers either offer free or paid subscription and allow you to make free calls to a VOIP phone, or cheap calls internationally to a regular phone. Check our comprehensive review: Comparison of Free VOIP Providers and the Comparison of Paid VOIP Providers. 3. VOIP Audio Input Device VOIP input devices aids in converting your voice into digital signals that is than sent over the internet and received by a regular phone, VOIP phone or PC. Choosing the correct technology can be quite overwhelming for first time users. We have tried to simpify this process by dividing popular VOIP solutions into two basic categorys - basic and advance VOIP Setup. Basic VOIP Setup The Basic VOIP Setup section covers inexpensive and non-technical solutions to using VOIP. These solutions are ideal for beginner users and covers making PC-to-PC calls, or using a headset and USB phone. Advance VOIP Setup This section covers special phones and routers specially designed to make VOIP calls over the internet. The Advance VOIP Setup section does not require a higher degree of technical expertise. It is an ideal solution if you have had some experience in making VOIP calls, or if you want the best equipment that produces the highest possible voice quality. A computer may or may not be needed. Some internet telephony solutions can work as independent units. However most telephony solutions require a PC to help in the initial configuration process. |© 2006 Online Tutoring World
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736677950.64/warc/CC-MAIN-20151001215757-00220-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
2,664
13
http://chirpsautobody.com/a5d5-8fae8e3095b9/265-35-20-pirelli
code
Obtaining furious due to an individual else's mistake might be seen as just instinctive. But, allowing that temper to come to be detrimental will simply make concerns worse, so yes be upset yet control your temper, keep in mind emotion plays a large component in our capacity to make sensible choices. You could end up making the incorrect decision and finish up being the individual that does create somebody else to be injured. One college of idea is that many drivers are not being associated with events due to their lack of technical skills behind the wheel; it is not even their lack of understanding of the customary practices. It is their perspective as well as behaviour behind the wheel that lets them down, time and again. Just put, it is our mindset that drives our practices.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583763839.28/warc/CC-MAIN-20190121070334-20190121092334-00636.warc.gz
CC-MAIN-2019-04
788
2
http://math.gatech.edu/seminars-colloquia/series/other-talks/jordan-ellenberg-20150326
code
Thursday, March 26, 2015 - 7:00pm 1 hour (actually 50 minutes) Clary Theater, Bill Moore Student Success Center A reception will follow the talk and giving time for visitors to chat with Ellenberg and each other. The math we learn in school can seem like a dull set of rules, laid down by the ancients and not to be questioned. In How Not to Be Wrong, Jordan Ellenberg shows us how wrong this view is: Math touches everything we do, allowing us to see the hidden structures beneath the messy and chaotic surface of our daily lives. It’s a science of not being wrong, worked out through centuries of hard work and argument.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159561.37/warc/CC-MAIN-20180923153915-20180923174315-00469.warc.gz
CC-MAIN-2018-39
624
5