url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.delhiclassic.com/4_Delhi/posts/6_Financial_Services/42_Others_Financial_Services/27019969_New_GST_Registration_in_Delhi.html
|
code
|
GST (Goods a service tax) is a Slate based inclusive, multi-stage terminus based appreciated added tax on production, Sale and depletion of goods all over the India. http://https://www.gstport.com/ »
replaces all taxes charged by the national and central supervisions. Goods and Services Tax (GST) is not just the tax improvements in the India, it is going to be entity improvements. A government purpose is to eliminate all tax barriers between central &states. It goals is to create a lone marketplace with undertaking of one nation one tax.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670729.90/warc/CC-MAIN-20191121023525-20191121051525-00550.warc.gz
|
CC-MAIN-2019-47
| 544
| 2
|
https://community.sap.com:443/t5/crm-and-cx-questions/interaction-record-supress/qaq-p/5375508
|
code
|
I am trying to implement the BADI CRM_IC_IARECORD for suppressing creation of interaction records.The interaction record should get generated only when the user clicks on the interaction record work center.
I passed RV_SUPPRESS_IREC as true but then it suppressed the IR generation for even the interaction record work center.
What should be done in such a scenario?
Also in the BAdi when I pass RV_SUPPRESS_IREC as true and then return to service ticket i am getting a message 'Transaction Cancelled' and all fields are getting disabled.
Thanks and Regards
Did you see the badi implementation "CRM_IC_IARECORD"?
The badi implementation judges if the inbox triggered the request of an interaction.
The following part is key point I suppose.
if lr_interaction->get_source( ) eq if_crm_ic_interaction=>source_agent_universal_inbox.
Hope it helps you.
Can the creation of an interaction record be avoided?
There is a BADI available to suppress the creation of the interaction record: CRM_IC_IARECORD
With this BADI it is possible to suppress the creation of the interaction record based on for example the interaction source (Inbox, Call List, ...). There is a sample implementation in the system that suppresses the creation of the interaction record for email interactions started from the inbox.
Be aware that without an interaction record the content of the activity clipboard cannot be linked when the interaction is ended.
When creating a dependent business transaction this BADI should not be used to suppress the creation of the interaction record as the interaction record is necessary for the creation of dependent business transactions. If this BADI would be used to suppress the interaction record, then the creation of a dependent business transaction will fail. - This could explain why your ticket creation is failing.
This is a copy from the following link
Hope this helps,
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00728.warc.gz
|
CC-MAIN-2024-18
| 1,886
| 17
|
https://pypi.org/project/csaf-lint/
|
code
|
Experimental CSAF validator for envelope and body profiles.
Experimental CSAF envelope and body profile validator.
In short: The current version of the
csaf-lint validates documents in various
Common Security Advisory Framework (CSAF) formats against built-in
or user custom schema files.
The supported versions are:
- CSAF 2.0 (default is now the 2021.03.23 editor version)
- CSAF 1.2 (aka CVRF 1.2)
- CSAF 1.1 (aka CVRF 1.1)
- Expect changes to the CSAF v2.0 support because the underlying OASIS specification is undergoing development by the members of the OASIS technical committee. This may lead to breaking changes until the standard is published on committee specification level. The current supported draft JSON Schema versions are from 2021-03-23, 2021-03-19, and 2021-03-07.
- The previous versions namely CVRF 1.1 and 1.2 were in XML format.
- The current version CSAF 2.0-candidates are in JSON Schema format.
Available on PyPI as csaf-lint
Recommended installation of current experimental package:
❯ python -m pipx install csaf-lint
Note: The default branch is
Release history Release notifications | RSS feed
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Hashes for csaf_lint-2022.7.17-py2.py3-none-any.whl
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00073.warc.gz
|
CC-MAIN-2023-40
| 1,287
| 20
|
https://www.delphipower.xyz/handbook_2009/var_6.html
|
code
|
strl, str2: string; buffer: TBytes; begi n strl := 'Hello world';
SetLength (buffer, Length (strl)); Move (strl[l], buffer[l], Length (strl));
SetLength (str2, Length (buffer));
As Length returns the number of two-byte characters and Move works in bytes, only the first half of the string the string is copied to the buffer and then to the second string with the trailing part of the target string full of whatever data was in its uninitialized memory:
| Hello world becomes Hello±LM;Bwe
If you have existing code that uses strings as buffers (like in the example above) and don't want to touch your code, a solution might be to change the string type definition to RawByteString (or, to a lesser extent, AnsiString). The same MoveStrings demo has the same algorithm with the strings declared as: var strl, str2: RawByteString;
This version of the code produces the proper output, as it will be by using AnsiString. Depending on the circumstances (the actual meaning of the data being moved, string or buffer with data), you might prefer one of these types over the other.
Even better, whenever possible, change your code to use a dynamic array of bytes like TBytes, the data structure I've used in the code snippet of this section to hold a generic buffer. The TBytes type is defined in the SysUtils unit as a dynamic array of bytes: type
TBytes = array of Byte;
Was this article helpful?
What you need to know about… Project Management Made Easy! Project management consists of more than just a large building project and can encompass small projects as well. No matter what the size of your project, you need to have some sort of project management. How you manage your project has everything to do with its outcome.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540544696.93/warc/CC-MAIN-20191212153724-20191212181724-00312.warc.gz
|
CC-MAIN-2019-51
| 1,722
| 11
|
https://itsubuntu.com/install-deepin-desktop-environment-on-ubuntu/
|
code
|
Insight: How to install Deepin desktop environment on Ubuntu
Deepin OS has one of the beautiful and clean desktop environment among the Linux operating system. In this tutorial, We are going to talk about the installation process of the Deepin desktop environment on the Ubuntu operating system. Yes, you heard it right as we are going to install Deepin desktop environment on Ubuntu distro.
You can easily install a Deepin desktop environment on Ubuntu 20.04 LTS.
Install Deepin Desktop Environment On Ubuntu
You can build from the source. Download the source file, and start building on it.
cd dde-file-manager mkdir Build cd Build qmake .. make
sudo make install
Note: It might not be compatible with Ubuntu 20.04 LTS
At first, You need to add Deepin Desktop Environment packages to your system by running following command:
sudo add-apt-repository ppa:leaeasy/dde
and update your system:
sudo apt-get update
Now run the following command to install Deepin desktop environment and follow the onscreen instruction:
sudo apt install dde
You need to install a file manager too. Run the following command to install file manager:
sudo apt-get install dde-file-manager
Run the following command to install Deepin desktop theme:
sudo apt install deepin-gtk-theme
Now, you are done with the installation. You need to restart your Ubuntu so that you can start using the Deepin desktop environment on Ubuntu operating system.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473735.7/warc/CC-MAIN-20240222061937-20240222091937-00274.warc.gz
|
CC-MAIN-2024-10
| 1,419
| 19
|
https://pdfbox.apache.org/download.html
|
code
|
There are several ways to obtain the PDFBox binaries or sources:
See also the export control information related to the encryption features included in Apache PDFBox.
[preferred]. If you encounter a problem with this mirror, please select another. If all mirrors are failing, try the *backup* mirrors at the end of the mirrors list, which should be available. Alternatively, view the complete list of mirrors.
This is an incremental feature release based on the earlier `2.0.x` releases. See the Release Notes for more details.
This is an incremental feature release based on the earlier `1.8.x` releases. See the Release Notes for more details.
It is essential that you verify the integrity of the downloaded files using the PGP signatures or MD5 and SHA1 checksums. Please read Verifying Apache HTTP Server Releases for more information on why you should verify our releases.
The PGP signatures can be verified using PGP or GPG. First download the KEYS file as well as the .asc signature files for the relevant release packages. Make sure you get these files from the main distribution directory, rather than from a mirror. Then verify the signatures using
% pgpk -a KEYS % pgpv pdfbox-X.Y.Z-src.zip.ascor
% pgp -ka KEYS % pgp pdfbox-X.Y.Z-src.zip.ascor
% gpg --import KEYS % gpg --verify pdfbox-X.Y.Z-src.zip.asc
Previous Apache releases (starting with version `0.8.0-incubating`) are available in the release archive. Older releases (up to version `0.7.3`) published from SourceForge are still available on SourceForge Files.
svn checkout https://svn.apache.org/repos/asf/pdfbox/trunk/
You can also browse the Subversion repository using ViewVC;
Development snapshots are built automatically from the latest SVN trunk. Snapshots are unreleased development previews and may change without notice. Snapshots do not have their own version numbers and there is no guarantee of API stability between snapshots.Download a snapshot build
This distribution includes cryptographic software. The country in which you currently reside may have restrictions on the import, possession, use, and/or re-export
to another country, of encryption software. BEFORE using any encryption software, please check your country's laws, regulations and policies concerning the import,
possession, or use, and re-export of encryption software, to see if this is permitted. See
The U.S. Government Department of Commerce, Bureau of Industry and Security (BIS), has classified this software as Export Commodity Control Number (ECCN) 5D002.C.1, which includes information security software using or performing cryptographic functions with asymmetric algorithms. The form and manner of this Apache Software Foundation distribution makes it eligible for export under the License Exception ENC Technology Software Unrestricted (TSU) exception (see the BIS Export Administration Regulations, Section 740.13) for both object code and source code.
The following provides more details on the included cryptographic software:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00055-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 2,991
| 19
|
http://newsdailyworld.com/2022/06/08/boris-johnson-boasts-not-even-a-flesh-wound-as-hes-compared-to-monty-pythons-black-knight/
|
code
|
Boris Johnson shrugged off Monty Python comparisons by muttering that his no confidence vote had not even left a “flesh wound”.
SNP Westminster leader Ian Blackford likened the Prime Minister to the comedic character in ‘Monty Python and the Holy Grail’, who claims that his mortal wounds are merely minor injuries.
Mr Johnson could be seen mouthing “not even a flesh wound” as he was accused “delusion and denial” over his future in Downing Street.
In his first PMQs clash since he survived a confidence vote on Monday, the PM joked his political career had “barely begun” and “absolutely nothing” would stop him from delivering on his mandate.
It comes after Mr Johnson clung onto power by 211 votes to 148, which means 41% of Tories opposed him.
Mr Blackford said he had long called for the “lame duck” PM to quit but he hadn’t realised four out of 10 Tory MPs agreed.
The SNP chief said: “The Prime Minister is acting like Monty Python’s Black Knight, running around declaring it’s just a flesh wound.
“And no amount of delusion and denial will save the Prime Minister from the truth: this story won’t go away until he goes away.”
The Ross Sky and Lochaber MP demanded to know asked: “Can the Prime Minister tell us how it is democratic that Scotland is struck with a Prime Minister we don’t trust, a Conservative Party we don’t support, and Tory governments we haven’t voted for since 1955?”
Mr Johnson replied: “We had a referendum, as I’ve told the House before, in 2014. I think he should respect the mandate of the people.
“He keeps saying he wants independence for his country. Our country is independent… and the only way that independence would ever be reversed would be if we had the disaster of a Labour-SNP coalition to take us back into the EU.”
Earlier in the session, Labour’s Angela Eagle confronted the PM over the Tory infighting – and told him the vote was proof he was “loathed”.
She demanded to know “if 148 of his own backbenchers don’t trust him, why on earth should the country?”
Mr Johnson joked that his political career had “barely begun” and said had “picked up political opponents all over” because “this Government has done some very big and very remarkable things which they didn’t necessarily approve of”.
“And what I want her to know is that absolutely nothing and no-one, least of all her, is going to stop us with getting on delivering for the British people,” he added.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337398.52/warc/CC-MAIN-20221003035124-20221003065124-00329.warc.gz
|
CC-MAIN-2022-40
| 2,502
| 15
|
https://www.strehle.de/tim/weblog/archives/2006/11/28/805
|
code
|
Tim Bray - Choose RELAX Now:
"Everybody who actually touches the technology has known the truth for years, and it’s time to stop sweeping it under the rug. W3C XML Schemas (XSD) suck. They are hard to read, hard to write, hard to understand, have interoperability problems, and are unable to describe lots of things you want to do all the time in XML. Schemas based on Relax NG, also known as ISO Standard 19757, are easy to write, easy to read, are backed by a rigorous formalism for interoperability, and can describe immensely more different XML constructs."
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621519.32/warc/CC-MAIN-20210615180356-20210615210356-00148.warc.gz
|
CC-MAIN-2021-25
| 563
| 2
|
https://lists.launchpad.net/maria-developers/msg07363.html
|
code
|
maria-developers team mailing list archive
Mailing list archive
Review request for MDEV-6020, MDEV-5914, MDEV-5941, and MDEV-5262
We discussed on IRC a review of the $subj bugs related to deadlocks in
parallel replication and handling of automatic retry of transactions in case
The patches are in my tree:
The complete diff can be obtained eg. with:
bzr diff -rrevid:psergey@xxxxxxxxxxxx-20140429143317-tkmxrzu6y36hpi7t..revid:knielsen@xxxxxxxxxxxxxxx-20140610081315-o5nx3u32uvqaai7q
Let me give some background for these bugs:
When two transactions T1 and T2 group-commit on the master, we assume that
they have no lock conflicts (otherwise one would have had to wait for the
other to commit). So we run them in parallel on the slave. But before we let
T2 commit, we wait until T1 has committed first, so that we get the same
binlog order on the slave as we had on the master.
But if T1 and T2 somehow _do_ get a lock conflict on the slave, and T1 ends up
waiting for some lock held by T2, we get a deadlock. This causes the
replication to hang (the wait of T2 for T1 to commit is not part of InnoDB
deadlock detection), which is quite bad.
Elena's testing of the parallel replication in fact uncovered a number of
cases where such deadlock issues occur:
1. MDEV-5914. It turns out that InnoDB gap locks can work in a non-symmetric
way. If T1 is an INSERT, and T2 is a DELETE, then T1 can run first and not
block T2. But if T2 runs first, then it may set a gap lock that blocks
T1. Thus, depending on exact execution order, we can get T1 and T2 to group
commit on the master, but T2 block T1 on the slave and cause a deadlock.
2. MDEV-5941. If eg. an UPDATE uses different execution plans on the master
and slave, it might use index scan on the master, but table scan on the
slave. Thus it may take more locks on the slave than on the master, causing it
to conflict with another transaction that is run in parallel and cause a
3. MDEV-6020. Here, there is a multi-value insert into multiple partitions of
a table with auto-increment key. It appears that in this case InnoDB takes an
auto-increment table lock on each partition. Since these locks are taken in
the order of the inserted values, they can be taken in different order between
different INSERT statements, and can cause a deadlock. Since these locks are
released during the statement execution (before the commit), such deadlock can
occur on the slave even though it did not occur on the master. (Note that this
deadlock _is_ detected by InnoDB, and is not related to the commit order on
the parallel slave).
I know a way to prevent (1) on the slave (and it is implemented in the
patches). I do not know if there is a way to prevent (3), it would require
understanding better how innodb autoincrement and partitioning works. I do not
see any way to prevent (2) from occuring on the slave, in the general case.
It also seems to me that there are likely to be more corner cases lurking, and
even if I somehow managed to fix the three above problems, there would be some
other cases where an extra lock conflict can occur on the slave and cause the
slave to hang.
So I decided that a general solution is needed to such deadlocks. So the
currently proposed patch does two things:
A. It adds code to InnoDB, so that whenever T1 starts to wait inside InnoDB
for a lock held by T2, this wait is reported to the upper server layer. The
replication code will then check if T1 and T2 are part of parallel replication
such that T1 must commit before T2. If so, we have a deadlock, and the code
will terminate T2 with a deadlock error, allowing T1 to proceed.
B. It implements code to handle deadlocks during parallel replication. When a
transaction gets a deadlock error (normal, or provoked by the new deadlock
detection code from (B)), it is rolled back, and re-executed.
The result should be that even if there are other non-discovered cases where
locks can conflict in different ways on the master from on the parallel slave,
such conflicts will not cause replication to fail. Instead they will be
detected, and handled automatically by resolving the deadlock. I think this
will be important to ensure the reliability of parallel replication for users.
I went through quite a few different ideas and attempts before ending with the
present solution. So I wanted to give this background about how the patch
relates to the basic problem that needs to be solved. I found a _lot_ of
tricky issues during testing, and so I am somewhat unhappy about the
complexity of this, even though the final patch may look simple enough on the
surface. Maybe you can have some ideas for what could be done simpler, or at
least question anything that looks incorrect or unnecessary.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648322.84/warc/CC-MAIN-20230602040003-20230602070003-00427.warc.gz
|
CC-MAIN-2023-23
| 4,718
| 68
|
https://mercuryworks.com/tag/performance
|
code
|
Application monitoring is a crucial aspect of ensuring the performance and reliability of an application, whether it is in development or in production.
The way we design and develop applications will continue to evolve but the importance of software application performance optimization is here to stay. Keep up with the latest trends, technologies, and optimization strategies to ensure a seamless experience across all channels, including desktop and mobile.
If you are a developer, WordPress is powerful because it gives you access to an admin environment to manage all sorts of content, but the front-end experience can be lacking and often times bloated. Wouldn’t it be great if there was a solution that allowed for a developer to utilize this already well maintained and developed admin interface but gave the freedom of creating a complex front-end experience that many web applications have today?
A slow application can cost you much more than just time. Here’s why software performance is essential for business health, how to measure and monitor it, and how to make sure you’re up to date with best practices.
Recovering from a production site outage during peak hours can be a daunting task. While everyone wants a 100% uptime, it can be near impossible because of things out of our hands. However, we can plan for these potential outages and architect the application and infrastructure to allow for a quick recovery.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00178.warc.gz
|
CC-MAIN-2023-40
| 1,438
| 5
|
http://www.pcmag.com/article2/0,2817,2328665,00.asp
|
code
|
Hands-Off with the Intel-Yahoo HDTV Widgets
Yahoo's new widget platform for HDTVs running the Intel Menlow platform is rather robust and definitely functional, although the number of widgets was limited. More to the point, it's pretty.
On Wednesday, Intel and Yahoo announced a surprisingly broad plan to add widgets to HDTVs. When I say "surprisingly broad," it's because of all of the support the plan received: content providers (ABC, CBS), CE makers (Sony, Samsung, Toshiba), and Yahoo, of course. Just not Microsoft, which has acknowledged but not responded to my requests for comment on how this will impact its Media Center line.
While I couldn't "drive," I had a chance to see someone else play around with the system, which is already up and running; for you to buy it, however, you'll either need the Intel designed "Menlow" platform built into a new TV, or a set-top box that should cost less than $200. The system appeared rather robust and definitely functional, although the number of widgets was definitely limited.
More to the point, it's pretty. Yahoo designed an attractive GUI, whose only drawback is that it distracts a bit from the television content. By default, the "dock," as Yahoo refers to it in Apple-speak, appears as a ticker tape of functional blocks at the bottom of the screen. Yahoo allows the video to be resized and pushed up, so tuning in to CNBC, for example, might yield a whole series of ticker strips. Each widget, in docked mode, was referred to as a "snippet".
Read the rest of this post at Gearlog: "Hands-Off the Intel-Yahoo HDTV Widgets"
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00059-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,582
| 6
|
https://archive.sap.com/discussions/thread/196206
|
code
|
How to delete Registry Key SAP_DBTech
I fatally deleted too many files of my Sneak-Preview (I didn't want to do so, so let's don't discuss why or how this could happen) so that now nothing works anymore.
The attempt to reinstall stops at the same point like the attempt to delete it via UNINSTSAP.BAT:
"MDB-07057 The system is inconsistent. Registry or SAP_DBTech information is available, but software is not complete."
I tried to delete the specific Registry-Entries, but the System didn't let me to do so.
Is there anybody having an Idea how to tell the Installation to ignore the Entries in the Registry or how to delete the Entries in the Registry?
Rich Heilman replied
You can delete the registry entry by.....
Start Menu --> Run, type regedit, hit enter. In the tree structure open HKEY_LOCAL_MACHINE, SOFTWARE, SAP. Delete the folder for the corresponding sneak preview engine(J2E or NSP). Also delete folde SAP DBTEch.
Now, from the c:\ drive. Delete the folder c:\usr and c:\sapdb. You may have an issue deleting these folders because they may be in use. Make sure that you reboot your system, do not start the engine, then delete these folders. Still having problems, disable the service if needed.
Once all this is cleaned up, you should be able to reinstall.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204086.87/warc/CC-MAIN-20190325174034-20190325200034-00373.warc.gz
|
CC-MAIN-2019-13
| 1,271
| 11
|
https://mohamedmosttafa.com/about
|
code
|
I’m Mohamed Mostafa, I'm a Digital Designer, who specializes in User experience and user interface design. I have over five years of experience in this field. I have worked on projects in Egypt, United States, Europe and the Gulf area with multiple clients from different sectors.
I have worked with clients like Americana, EFG Hermes, UTC, OTIS… etc helping them promote their business with impactful designs and solutions that are easily perceived and navigated.
I have a bachelor degree in Computer science which helps me see the projects from a designer perspective and developer perspective which lead to better solutions to help the businesses.
My goal is to help clients who need great designs to represent their products online whether it is a website or application.
I'm not selling designs, I'm selling success
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818711.23/warc/CC-MAIN-20240423130552-20240423160552-00465.warc.gz
|
CC-MAIN-2024-18
| 824
| 5
|
https://www.cdwg.com/product/microsoft-sql-server-standard-license-software-assurance-level-d/2669115
|
code
|
- 2 cores
- Select Plus
- Single Language
Get powerful database, analytics, reporting and application development tools with the Microsoft SQL Server Standard License and Software Assurance. This business intelligence software consists of two-node failover clustering, log shipping and peer-to-peer replication for optimum performance. SQL Server database copies can be backed up to Microsoft Azure SQL database to safeguard data while saving on costs. The integrated SQL Server Integration Services (SSIS) enables integration of data from various sources along with complete support to the deployment and administration of ETL tasks. This licensed software supports Windows PowerShell 2.0 for automating management tasks. SQL Server Management Studio and an improved System Center allow you to manage your infrastructure from a central interface. With integrated support for relational and non-relational data including Big Data sources, SQL Server provides versatile options for your database. You can work with various platforms such as .NET, C/C++, Java, Linux, and PHP using APIs (ADO.NET, ODBC, JDBC, PDO, and ADO). Software Assurance on SQL Server provides unlimited virtualization for consolidating mid-size applications.
- SSIS for bringing together data from varied sources
- SQL Server Management Studio to manage infrastructure from a centralized interface
- Support for relational and non-relational data to provide versatile database options
- Compatibility with various platforms like .NET, C/C++, Java through APIs
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057882.56/warc/CC-MAIN-20210926144658-20210926174658-00648.warc.gz
|
CC-MAIN-2021-39
| 1,530
| 8
|
https://erinschumacher.com/science8/light/mirrorlens/
|
code
|
- Brainpop: Vision Problems
- Frames Direct: How do glasses work?
- How stuff works: how corrective lenses work
- Virtual Lab: how are lenses used to correct vision
- PBS: How light passes through the lenses and prisms of binoculars
- Explain that stuff: How do binoculars work?
- Brainpop: Telescopes
- NASA Space Place: How telescopes ‘see’
- BBC: How do telescopes let us see so far in space?
- Brainpop: Microscopes
- PBS: Bending light with microscopes
- Explain that stuff: how does a microscope work?
- The Compound Light Microscope
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866917.70/warc/CC-MAIN-20180525004413-20180525024413-00149.warc.gz
|
CC-MAIN-2018-22
| 543
| 13
|
https://forum.pylon.money/t/proposal-early-access-on-pylon-pools-for-mine-staking/325
|
code
|
Pylon Pools is a great product and the mechanism pretty much unique in the crypto space. From my point of view Pylon team should continue to improve it further since it’s a unique selling point.
Right now there are zero incentives to obtain or stake MINE in order to participate in Pylon Pools.
While I think it’s the right approach in keeping Pylon Pools open for anyone to participate, this proposal would give Pylon Pools investors a reason to stake MINE and increase long term demand for the token.
Proposal: Early Access for MINE staking
From an investor perspective the first few hours/days in a new listed Pylon Pool is usually the “sweat spot” because of the effect of highest capital efficiency on linear token distribution. As we all know the efficiency decreases over time when more capital flows into the pools.
We could improve from here and grant participants who obtained and stake MINE early access to the token distribution in a tiered system which increased their capital efficiency in those pools. Another pro argument would Pylon team has full control over this mechanism and it’s pretty much independent from the amount of tokens distributed from a particular project.
- 2020-12-01 - Pool opens for deposits on (24h before token distribution starts)
- 2020-12-02 - Token Distribution TIER 1 starts (>1.000.000 MINE staked over 3 month on average)
- 2020-12-03 - Token Distribution TIER 2 starts (>250.000 MINE staked over 3 month on average)
- 2020-12-04 - Token Distribution TIER 3 starts (>100.000 MINE staked over 3 month on average)
- 2020-12-05 - Token Distribution TIER 4 starts (>50.000 MINE staked over 3 month on average)
- 2020-12-07 - Token Distribution TIER 5 starts (>10.000 MINE staked over 3 month on average)
- 2020-12-08 - Token Distribution TIER 6 starts (>1.000 MINE staked over 3 month on average)
- 2020-12-09 - Token Distribution for anyone else starts
Open for discussion to tweak those numbers and tier level.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362619.23/warc/CC-MAIN-20211203091120-20211203121120-00256.warc.gz
|
CC-MAIN-2021-49
| 1,964
| 15
|
http://skooch.com/en/blog/linux-windows-10
|
code
|
June 12, 2018, midnight
By : Eric A. Scuccimarra
In my opinion, the one major advantage of developing on a Mac vs Windows was that OS X was built on top of FreeBSD so you could easily run Linux commands from a shell. To run Linux on Windows meant installing a virtual machine or some other complicated and annoying software. Apparently Windows now has a Linux Subsystem that is easy to install and use. I just installed it and it was fast and easy and I've had no problems so far. I don't think it will be as integrated into the OS as the Mac shell is, but it's nice to be able to run Linux commands.
There are no comments for this article.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816904.18/warc/CC-MAIN-20240414223349-20240415013349-00535.warc.gz
|
CC-MAIN-2024-18
| 640
| 4
|
https://documentation.solarwindsmsp.com/N-central/documentation/Content/Administration/Service_Organizations/SOs_Overview.html
|
code
|
Add a Service Organization (SO) and configure its profile. You must add an SO before you can configure notification and correlated notification templates. After you add an SO, you can add administrative user accounts to manage them.
Depending on your licensing agreement, you can add SOs to SolarWinds N-central, edit company details, contact information, limits, and notification templates, and add SO Admin accounts. You can also allow SOs to manage the password settings that are applied to all of the accounts in the system.
Deleting a Service Organization account will delete associated customers/sites, WSUS groups, devices, probes, notifications, rules and users.
What do you want to do?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315809.69/warc/CC-MAIN-20190821043107-20190821065107-00258.warc.gz
|
CC-MAIN-2019-35
| 694
| 4
|
https://coderdojowa.org.au/2016/06/27/kancho-calling-survey-results/
|
code
|
Kancho Called and you answered!
Thanks to all of the Champions that responded to our Dojo Census survey in May. Check out our snapshot of CoderDojo in Western Australia!
Congratulations to everyone in the community for doing their part to promote digital literacy in WA, helping the Fogarty Foundation, through CoderDojo WA, to reach our goal of giving every young person in WA the opportunity to improve their digital skills through coding! 🙂
Almost 50% of the Champions who answered the survey were from Dojos that are not yet verified on the ZEN platform. Based on this, we have estimated the number of Dojos in Perth to be closer to 100!!
We will repeat this survey at the end of the year to keep track of the growth of the CoderDojo WA community. We will also be sending out another survey for Ninjas and Mentors towards the end of the year.
Well done, everyone! 🙂
If you haven’t registered your Dojo yet, please do so on ZEN, or by emailing Ross: firstname.lastname@example.org and asking to have your Dojo verified.
Check out the infographic here: Kancho Calling June 2016
BACK TO BLOG
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573465.18/warc/CC-MAIN-20190919081032-20190919103032-00035.warc.gz
|
CC-MAIN-2019-39
| 1,100
| 9
|
https://community.arduboy.com/t/the-arduboy-retropie-dock/8885
|
code
|
As i was anyway thinking the Arduboy dock needs some more feature i have now built this tiny thing. Will work as the Arduboy dock headless but will also already have some games and emus included Target is to have retropie with also pico-8 on it. But as the Arduboy dock only works with an older version of jessie i could not take the retropie image.
I have the 2017 jessie on it with the dock already working. Screen (with touch) is also already working. Next will be to install retropie and some emulators.
If i chose wrong categorie please move accordingly thanks
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655906214.53/warc/CC-MAIN-20200710050953-20200710080953-00171.warc.gz
|
CC-MAIN-2020-29
| 565
| 3
|
https://hdmi2usb.tv/firmware/misoc/2015/08/08/new-misoc-based-firmware/
|
code
|
New MiSoC based firmware
This new firmware is substantially easier to develop then the previous firmware and already has many new features compared to the old hand coded firmware. It supports the Numato Opsis board.
|The jahanzeb HDMI2USB firmware was developed using a combination of VHDL, Verilog and cores generated in Xilinx ISE.||The misoc HDMI2USB firmware is developed using migen and misoc technologies.|
|Getting Started||Getting Started|
|Supported Boards||Digilent Atlys||Digilent Atlys, Numato Opsis|
|Streaming Interfaces||USB 2.0 UVC Camera||USB 2.0 UVC Camera, Gigabit Ethernet|
|Control Interface||USB 2.0 CDC-ACM "Serial Port"||USB 2.0 CDC-ACM "Serial Port", Gigabit Ethernet|
MiSoC and migen
From the m-labs’s site.
Migen is a Python-based tool that automates further the VLSI design process.
Despite being faster than schematics entry, hardware design with Verilog and VHDL remains tedious and inefficient for several reasons. The event-driven model introduces issues and manual coding that are unnecessary for synchronous circuits, which represent the lion’s share of today’s logic designs. Counter-intuitive arithmetic rules result in steeper learning curves and provide a fertile ground for subtle bugs in designs. Finally, support for procedural generation of logic (metaprogramming) through “generate” statements is very limited and restricts the ways code can be made generic, reused and organized.
To address those issues, we have developed the Migen FHDL library that replaces the event-driven paradigm with the notions of combinatorial and synchronous statements, has arithmetic rules that make integers always behave like mathematical integers, and most importantly allows the design’s logic to be constructed by a Python program. This last point enables hardware designers to take advantage of the richness of the Python language - object oriented programming, function parameters, generators, operator overloading, libraries, etc. - to build well organized, reusable and elegant designs.
Other Migen libraries are built on FHDL and provide various tools such as a system-on-chip interconnect infrastructure, a dataflow programming system, a more traditional high-level synthesizer that compiles Python routines into state machines with datapaths, and a simulator that allows test benches to be written in Python.
You can find the Migen source here, released under the permissive BSD license.
Built on Migen, MiSoC provides a high performance, flexible and lightweight solution to build system-on-chips for various applications.
- CPU options:
- LatticeMico32, modified to include an optional MMU (experimental).
- mor1kx, a better OpenRISC implementation.
- High performance memory controller capable of issuing several SDRAM commands per FPGA cycle.
- Supports SDR, DDR, LPDDR and DDR2.
- Provided peripherals: UART, GPIO, timer, GPIO, NOR flash controller, SPI flash controller, Ethernet MAC, and more.
- High performance: on Spartan-6, 83MHz system clock frequencies, 10+Gbps DDR SDRAM bandwidth, 1080p 32bpp framebuffer, etc.
- Low resource usage: basic implementation fits easily in Spartan-6 LX9.
- Portable and easy to customize thanks to Python- and Migen-based architecture.
- Design new peripherals using Migen and benefit from automatic CSR maps and logic, simplified DMAs, etc.
- Possibility to encapsulate legacy Verilog/VHDL code.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300289.37/warc/CC-MAIN-20220117031001-20220117061001-00269.warc.gz
|
CC-MAIN-2022-05
| 3,387
| 26
|
https://amplab.cs.berkeley.edu/author/mmlee/
|
code
|
Meredith is the Executive Director of the West Big Data Innovation Hub, a consortium launched by the National Science Foundation to address societal challenges with Big Data innovation. The West Hub is led by UC Berkeley, UC San Diego, and the University of Washington, and includes Alaska, Arizona, California, Colorado, Hawaii, Idaho, Montana, Nevada, New Mexico, Oregon, Utah, Washington, and Wyoming. Dr. Lee previously served as a Science & Technology Policy Fellow at the U.S. Department of Homeland Security (DHS) Homeland Security Advanced Research Projects Agency (HSARPA), guiding strategic research in graph analytics, risk assessment, machine learning, data visualization, and distributed computing. She co-led the White House Innovation for Disaster Response and Recovery Initiative as well as the Ideation Community of Practice, a network of Federal innovators from more than 25 agencies. Meredith completed her Ph.D. in Electrical Engineering at Stanford University and was a postdoctoral researcher at the Canary Center for Cancer Early Detection. She was previously at MIT Lincoln Laboratory, Intel, IBM T.J. Watson Research Center, and Agilent Laboratories. Dr. Lee is a co-founder of NationOfMakers.org, past president of the Stanford Optical Society of America/SPIE, and served on the first Steering Committee for the National Photonics Initiative. Her work has been featured by whitehouse.gov, Make:, ArsTechnica, The Washington Post, Forbes, and Fast Company.
- This user doesn't have any publications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00832.warc.gz
|
CC-MAIN-2023-40
| 1,524
| 2
|
https://www.hackingwithswift.com/example-code/uikit/what-is-a-uiviewcontroller
|
code
|
Swift version: 5.6
iOS developers often like to talk about the Model-View-Controller architecture (MVC), where every component in their code is either a Model, a View, or a Controller. This is the standard architecture on iOS, which makes it strange that one of the first types you meet is
UIViewController – it has both “view” and “controller” in its name, so what is it?
Well, there is no single answer. In the early days of iPhones,
UIViewController represented one screen of content. Your mailbox was one view controller, and when you tapped to read a message that was shown in a different view controller.
However, the story is more complex than that, because of view controller containment – you can put one view controller inside another, which helps break up your code. As a result, one screen of content might consist of four or five view controllers all working together.
The main (and inescapable) role of view controllers is to respond to view lifecycle event. That is, your view controller code will get call when your view is created, shown, hidden, and destroyed, so it’s down to you to write code to respond to those events properly.
Some people make their view controllers more view than controller (i.e., make it handle layout code and as little else as possible), some people make it more controller than view (i.e., put layout code into
UIView subclasses and put glue code into their view controllers), and some people make it do both: they put all their view code and all their controller code in one place.
If you want to make your view controller more view than controller that’s fine. If you want to make it more controller than view that’s less fine, but it can still work. If you want to use it as both, chances are you’ll stop using Model-View-Controller and start using Massive-View-Controller instead.
SPONSORED In-app subscriptions are a pain to implement, hard to test, and full of edge cases. RevenueCat makes it straightforward and reliable so you can get back to building your app. Oh, and it's free if your app makes less than $10k/mo.
Available from iOS 2
This is part of the Swift Knowledge Base, a free, searchable collection of solutions for common iOS questions.
Link copied to your pasteboard.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499966.43/warc/CC-MAIN-20230209112510-20230209142510-00414.warc.gz
|
CC-MAIN-2023-06
| 2,254
| 14
|
https://www.annmorgan.art/portfolio-items/melted-tree/
|
code
|
2022 Unnatural Series
Melted Tree was one of those paintings I was REALLY excited about and started posting right away, when it was just a painted sketch. And then…it seemed like it kept getting worse rather than better, except for the top and the middle. I did something I hadn’t done before, and just SANDED off the parts I didn’t like with a sander, and then repainted. It was the right thing to do.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00723.warc.gz
|
CC-MAIN-2023-23
| 408
| 2
|
https://www.hamaralinux.org/2015/06/security-audits-and-foss-1/
|
code
|
This would be part 1 about some old, some new issues related to security in technology.
I would have to start the story around 20 years back. Where as a school going kid I was introduced to computers. In those days, Windows 3.1 had just been introduced in India, and most of us rather than learning DOS commands and using spreadsheets were busy fragging on Wolfenstein and Doom. There was nothing like the Internet and the only way to get new games was to go to a rich friend’s place, get on his 28.8k k line and get on the only BBS we knew at the time, Jabberwocky and get our dose of games, music etc. Life was good except for a crash now and then.
During those days, my understanding of computer systems was pretty limited (it still is). It was much, much later after series of crashes, viruses and worms that I researched and came to know that when a system wakes up, the software or the Operating system operates the different components with something called a ‘process’. It took its own time to understand how this processes functioned. Borrowing from biology about how cells multiply and divide and have different functions, a similar role was being performed in both Unix and MS-Windows by the various programs in the respective Operating Systems. The only difference between biology and Computer Science was that each software process in this digital system has a unique process id which is/was called a PID.
Somewhere during those on-off periods of engaging with computers, Internet came along and blew all over us. Till the time we were on protected networks such as jabberwocky or floppynet and sneakernet. Viruses, trojans were few and far between. Once Internet came in though, viruses such as the CIH virus, , the ILOVEYOU virus and various such trojans and viruses made my computing life a nightmare. Add to that Adobe Reader and Adobe Flash used to get loads of viruses and even Microsoft word could and would be injected by Macro viruses, it was (and probably is) easier to get infected on the web on a MS-Windows system. I left the MS-Windows world after couple of years of Windows XPSP2 and hence have no idea of the state of the affairs today in the MS-world.
I did found, in the hardest way though, that in the MS-world no anti-virus is infalliable and when you had two or more anti-virus at times they would negate each other’s efforts, makes the system sluggish and at times would just crash the machine. The amount of time it used to take to rebuild the machine (software only) was atrocious and used to end up feeling frustrated as didn’t really know who or what was at fault. Even if I applied any update, it didn’t give any confidence as the updates themselves were cryptic and there was no way to raise it with the company if a patch or patches didn’t work. As a good citizen, I also used to update the anti-virus definitions but still the scenario continued.
While with the above frustrations, I came in contact with something called the PCQ Linux and hence over the years have had my share of GNU/Linux distributions and BSD’s. This was actually where my real educations about a computer system started. One of the selling points of this new system was that there were no computer viruses. As people say, once bitten twice shy, was skeptic but it quickly became clear that once you got over the hurdles, this new system was unlike any other system. The uptime of my system which used to be of few hours quickly became weeks. Uptime is the time from when your system is awake till you put it to sleep or something or the other.
The following is from one of my systems which is pretty much experimental in nature :-
23:39:05 up 2 days, 12 min, 8 users, load average: 0.82, 0.70, 0.52
As can be seen it has been up for 2 days from the last time. The only time this specific system goes down is when electricity is down for more than an hour. It is only on very rare situations where I have to shut down the system to troubleshoot the system.
Remember the bit about PID I shared previously, while in MS-Windows you could just see the PID and how much memory they were confusing there was nothing to tell how the relationship was. In GNU/Linux all this changed.
As can be seen you could get a snapshot of how the system was laid out in this. Obviously this is just to give an idea, if I really wanted to do see which process was using the most memory, would have used htop in tree mode (run htop and use t while running it).
Lot of learnings happened when I started using GNU/Linux. While in MS-Windows people were and are blissfully unaware of whatever happens in the system, in GNU/Linux the tools, the understanding and the philosophy compel people to be aware of the system.
In GNU/Linux the worst thing that is there are what are called as ‘binary blobs’. Let’s take an analogy, let’s say you are given a suitcase but no key and are told that you need to take it everywhere with you. You also cannot function without the ‘suitcase’ because then you won’t look like a business-man and things will be much slower for you or won’t work at all. Now the ‘suitcase’ may have a listening device or have a bomb we won’t ever know but till there is a suitcase which is invented where the businessman can also have the key, he has to make do with what is. This is how and where most GNU/Linux distributions find themselves.
Things were going ‘fine’ when a certain Edward Snowdem made the world realize that the NSA, FBI and other actors have been monitoring us, the masses. While in MS-Windows and Mac’s it was evident that they would have backdoors and what-not (there was and is a huge history there of them co-operating with powers that be) freedom-loving GNU/Linux distributors also became quickly concerned. While investigating, while it was spoken in corners, it came to be known that weaker algorithms had been used to make cryptographic keys which is the basis of many online security systems, encrypted messages and the way things are. There was increased awareness and a healthy dose of paranoia which led to discovery of vulnerabilities of Shellshock, Heartbleed and Poddle in open-source libraries. This is what lead to the creation of forked utilities such as opensmtpd.org, libressl.org and openntpd.org. These has also lead to awakening of not just the code quality but also governing practises at various at various organizations as well as how they take and give feedback.
Two instances relate this story, one which is by-and-large probably finished and the one on-going. The one which was finished was that in iceweasel (firefox) it was downloading Cisco’s H264 codec. You can read all about it in #769716, the bug itself is a huge read but comes down to a simple thing, should you trust some third-part who says this black box/suitcase only has documents and not some bomb or listening device? If there is no way to x-ray and share as to what they are saying to be true is really true or not. Another point to that bug/story is that h264 has patents, so it might have exposed Debian to a patent suit and even if not on a philosophical level Debian is against patents. So better not to use it rather than inviting trouble. I haven’t read those patents but they probably would be more on the encoding side as that is where the algorithms shine, while probably a bit less on the decoding side.
As shared both of them downloaded binary blobs whose intention is suspect.
While these are the known ones, they are many which are unknown. The way forward for companies is to audit and test the code in as many ways as they can, document the ways as well as the results, take help of the community in supporting and improving both the testing infrastructure as well as the software itself.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304760.30/warc/CC-MAIN-20220125035839-20220125065839-00656.warc.gz
|
CC-MAIN-2022-05
| 7,769
| 17
|
http://www.coderanch.com/t/70514/Websphere/security-doen-work
|
code
|
Hello again, I'm trying to set the global security on Was 3.5 I selected Enable security I selected Default on realm and basic as authentication I selected local OS as authentication mechanism I selected a user which has the good rights on user registry. But when i restart the admin server and the console, i still don't have to put a login and a password as it should happen. Can anyone help me please?
Hello Barry, I'm assuming you have already enabled global security. Check if admin (web app) is indeed part of the AdminApplication (enterprise app). Just expand the AdminApplication in the admin console. You should be able to see entries under "Web Application". I encountered this problem when I installed WAS 3.5 Standard Edition. The AdminApplication was empty. There were no web applications that were added to it. Even after setting all the security settings/permission, I still wasn't prompted for a username/password whenever I access http://localhost/admin. If you don't see any web app in AdminApplication, try adding admin (web app) into AdminApplication via "Edit Enterprise Application" wizard. Then try accessing the admin app again. Hope this helps.
Joined: Nov 09, 2001
There is an Web application under the Admin Application. If you have any idea ... Thanks
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398445219.14/warc/CC-MAIN-20151124205405-00000-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 1,279
| 4
|
https://www.luggagefactory.com/collections/briggs-riley/products/briggs-riley-work-large-spinner-briefcase-black-free-monogramming
|
code
|
Brand: Briggs & Riley
- ✅ KR430SP-4 1600D ballistic nylon outer fabric resists wear, moisture, dirt and abrasion
- ✅ Monogrammable leather nameplate on front panel to customize your bag with your initials
- ✅ Outsider handle system for wrinkle-free flat packing provides greater interior capacity and increased packing space
- ✅ Aircraft-grade aluminum handle system with 3 stop heights; v-groove handle tubes are stronger and Guarantee less jamming
- ✅ 9x17.5x15
Details: The ultimate in business case organization. This @work Large Spinner Brief features multiple compartments for files, tech support, business needs, laptop peripherals, and even a change of clothing. Bring your 17" laptop for that client presentation and still have room for an overnight stay.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103850139.45/warc/CC-MAIN-20220630153307-20220630183307-00775.warc.gz
|
CC-MAIN-2022-27
| 774
| 7
|
https://admin.echo360.com/hc/en-us/articles/360035033712
|
code
|
Some institutions want to provide their university policy information to the Legal page in Echo360, making it available for users to review or reference as needed. This also provides a method of dissemination of the university policies or other legal agreements or disclaimers to all Echo360 users for your institution.
The text box on the Legal tab has a 3600 character limit. If your university policies are longer than this, you may prefer to enter a link to existing published policies, or provide a link to existing policy and use this space to amend or append those policies, specific to the use of Echo360.
Once text is entered and saved, it appears in the University Policies tab of the Legal page as shown in the figure below the procedure.
To enter university policy verbiage to the Echo360 legal page
- Log in as an administrator.
- Click the Settings icon in the upper-right corner of the screen.
- From the Settings menu, select Institution Settings.
The Institution appears at the top of the list and is selected by default.
- On the right side of the Institution Settings page, click Legal.
- Type or copy/paste text into the text box, up to 3600 characters.
- Click SAVE.
If the text entered exceeds 3600 characters, you will receive an error message when saving. Reduce the text entered and click SAVE again until it meets the text limit.
Once saved, the text you entered appears in the University Policies tab of the Legal page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348526471.98/warc/CC-MAIN-20200607075929-20200607105929-00329.warc.gz
|
CC-MAIN-2020-24
| 1,446
| 13
|
https://forum.manjaro.org/t/meta-shift-draws-unremovable-red-lines-on-screen/66269
|
code
|
In addition, meta+ctrl+shift draws red arrows. On KDE plasma x11. The lines persist between desktops and activities - the only way I have found to remove them is to reboot the PC.
I would appreciate any help in getting rid of the lines without rebooting or stopping them happening in the first place.
//EDIT: ahaha too slow my dear Aragorn, too slow
//EDIT2: you can also change its settings when enabled, to modify the shortcut and other options.
Thank you so much - I had no idea how to search for this.
This topic was automatically closed 15 days after the last reply. New replies are no longer allowed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710462.59/warc/CC-MAIN-20221128002256-20221128032256-00429.warc.gz
|
CC-MAIN-2022-49
| 606
| 6
|
http://wiki.seas.harvard.edu/geos-chem/index.php?title=Compiling_GCHP&oldid=41836
|
code
|
Previous | Next | User Manual Home | GCHP Main Page
- Hardware and Software Requirements
- Downloading Source Code and Data Directories
- Obtaining a Run Directory
- Setting Up the GCHP Environment
- Running GCHP: Basics
- Running GCHP: Configuration
- Output Data
- Developing GCHP
- Run Configuration Files
First time compilation can take 30 minutes or more because it requires building large modules from scratch, including ESMF, MAPL, FV3 dycore advection, and GEOS-Chem. ESMF (Earth System Modeling Framework) provides core infrastructure to GCHP while MAPL (Modeling, Analysis and Prediction Layer) serves as a layer between GEOS-Chem and ESMF. Both ESMF and MAPL have significant compilation times but generally do not need to be recompiled unless parts of their code have been modified which is usually not necessary. Subsequent compile times will therefore be significantly shorter if you skip recompiling them, on the same order of magnitude as compiling GEOS-Chem Classic. Even if you do need to recompile them, you can greatly speed up recompilation by not cleaning first.
This section provides instructions on how to clean and compile GCHP. There are several options for cleaning and compiling which allow selectively cleaning and compiling modules within GCHP, thereby minimizing recompilation time. This is a very big time-saver so please pay attention to the information presented on this page. You can also always see all build options from the command line, along with tips on which option is most appropriate for your use case, by typing make or make help within your run directory.
If you run into problems compiling GCHP and cannot figure out why, please create an issue on the GCHP issue tracker located at https://github.com/geoschem/gchp/issues.
Run Directory Makefile
The GCHP run directory Makefile contains several options for cleaning and compiling source code, as well as utility options you might find useful. Options are printed out by typing the following at the command line:
It is important that you do this and browse the options available. Several options are particularly useful for cleaning up files in your run directory and displaying the status of your source code. Knowing which build options to use based on what you changed in the model or your libraries is important for saving yourself time.
To compile GCHP from scratch, including ESMF, MAPL, FV3 advection, and GEOS-Chem core files, navigate to your run directory. Then type the followng:
make clean_all make build_all
When you first download source code the directories will already be clean, so doing make clean_all technically is not necessary. However, it is recommended to be in the habit of including clean for fresh builds. It will be necessary if you change compiler or other libraries.
All build information is sent to both the terminal window and to a log file called compile.log. Git information for source code at compile time are recorded in a separate file called lastbuild for future reference, similar to GEOS-Chem Classic.
Upon successful compilation, the following empty files are created in your GCHP source code directories:
These files indicate successful compilation per module. If you are ever uncertain on whether your ESMF, MAPL, and FV3 dycore were previously built, check if these files exist.
For subsequent GCHP compilations you have several options. You can remind yourself of all options by typing make or make help at the command prompt. Here is a summary of the compile options.
make build_all # Compile all source code (slow) make build_mapl # Compile MAPL, FV3, and GEOS-chem core (skip ESMF) make build_core # Compile GEOS-Chem core only (fast)
Same as above but compile GEOS-Chem with debug flags turned on (note that this will slow down the model)
None of these compile options clean the source code. To save time, we recommend not cleaning source code as you are developing GEOS-Chem. However, if you change libraries are upgrade versions you must always do a fresh build from scratch. In these instances we also recommend creating a fresh run directory.
A typical workflow would be:
- Create a run directory
- Compile from scratch (make clean_all; make build_all)
- Edit GEOS-Chem code in GeosCore
- Recompile with debug flags on (make build_core_debug)
- Do a short test run to see if any of the debug flags trigger a problem
- Repeat as needed
- Recompile with debug flags off (make build_core) for longer runs after debugging
If you find yourself editing files in the GCHP/Shared, GCHP/Registry, or FVdycoreCubed_GridComp folders then you will need to recompile with option make build_mapl. Editing these files is advanced. If you are attempting to fix a MAPL error that appears during run-time you may be headed in the wrong direction since most MAPL errors are caused by bad configuration in the run directory. If you are unsure of what you are doing please create a GitHub GCHP issue and we will respond. Even if your question is not a true issue, having it on the GitHub issue tracker allows sharing the question and answer with the wider GCHP community, something we strongly encourage.
If at any time you forget what the make options are, simply type:
If a GCHP executable exists in the GEOS-Chem bin/ folder to be copied to your run directory, then you should see the following message at the end of compilation:
################################### ### GCHP compiled successfully! ### ###################################
If you did a clean compile of your code and you see this message then you know that GCHP compiled without error. Compiler output, including warnings and error messages, will be stored in a log file called compile.log. If you inspect your log file or watch the compile output real-time, you will notice that there are many warnings and error messages. Many of these errors are due to leftover components in MAPL which are no longer used but which still try to compile. As long as the compilation continues, these errors can almost always be ignored and they will have no effect on the operation of GCHP.
If you are recompiling MAPL and see the "GCHP compiled successfully!" message then your compilation may not actually have been successful. This is because failure during compilation of different MAPL sub-components does not trigger the entire build to fail. It will continue and the old binary files for whatever component failed will be used instead. Only if you cleaned first and those files were deleted and needed later in the build would the end result be a build failure.
The general rule-of-thumb is if you clean and then compile, or if you rebuild using make build_core, then you can trust the "GCHP compiled successfully!" message. However, if you recompile using make build_mapl without cleaning first, then you will need to dig a little deeper to ensure a successful rebuild. The best way to do this is to do keyword search for "making install" in compile.log and scan the few lines directly above all instances of it. If there was a problem with MAPL compilation you will spot it immediately in one of these areas, and that is where you should look for clues on how to fix it.
If you plan on developing within MAPL please make sure you fully understand this approach to debugging since it will save you a lot of time and frustration. Repeat: if you are developing MAPL and recompiling be aware you need to check your compile.log for keyword "making install" to ensure success.
Why is this necessary? Again, it is because MAPL will continue to compile even if a compile error occurs. MAPL compilation involves compiling a series of components, many of them dependent on components that came before, and compilation rules are relaxed to allow minor problems. One component may fail compilation but the compilation will not crash until the built file is needed later on in the build sequence. It is therefore necessary to search your log file for errors high above the final error in the event of compile failure. The log file will be long so this should be done by keyword search.
While this has already been stated, we will state it again since it is so useful. Here are strategies that typically hone in immediately on the original MAPL error:
- Search for string "making install", and look at the lines immediately above all results of your keyword search.
- A second and more tedious option is to search for string "error". Ignore results where error is in a filename or in a source code string that triggered a warning.
- If in doubt, check the source code directory to see the file times. If the binary for the file you updated is older than the other binaries then it encountered a compile error in your update.
The Makefile in the run directory invokes a bash shell script called build.sh that includes changing into the source code directory and invoking source code Makefiles. At its core, building GCHP simply requires the inclusion of additional target HPC=yes if cleaning and hpc if compiling when invoking make in the GEOS-Chem repository. Cleaning GCHP also requires changing into the GCHP directory explicitly to clean ESMF, MAPL, and FV3 dycore.
If you are interested in seeing the core make commands used for all options provided in the run directory Makefile, see the commands defined in build.sh. You can then trace the build sequence by looking at the Makefiles in the GEOS-Chem and GCHP repositories. Note that calling make always invokes the Makefile in the directory you are in and changing into the GEOS-Chem and GCHP source code directories occurs within build.sh.
If you are interested in the build sequence and settings for MAPL, look at *.mk files in GCHP/Shared/Config, particularly ESMA_base.mk, ESMA_arch.mk, and GMAO_base.mk, as well as GNUMakefile within GCHP/Shared and all its subdirectories. Also see GIGC.mk in the highest level of the GCHP repository for the include dependencies between GCHP modules.
Currently GCHP does not compile with cmake but work is in progress to make this possible in the future.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00509.warc.gz
|
CC-MAIN-2023-23
| 10,026
| 51
|
http://www.teraplot.com/function-graphing-software
|
code
|
If you're an educator or student seeking function graphing software, you'll find TeraPlot an excellent tool for demonstrating
and exploring many mathematical concepts in 2D and 3D. In 2D, functions (or families of related functions), can be easily drawn
in cartesian, polar, and parametric coordinates. In addition, implicit function graphing can be performed by using
analytical contour plots to draw the 0 level contour of the function z = f(x, y). In 3D, equations of lines planes, quadric surfaces,
and any equation you care to define can be drawn and brought to life using options such colour mapping, transparency and text annotation.
The rotation/tilt parameters of 3D graphs can also be animated, and the animation optionally recorded to a movie file.
Plot of the function z = 200 - (x2 + y2) intersected by two planes drawn with transparency: z=5y+150 (red) and z=10x+100 (grey).
Implicit function. The Tschirnhausen cubic: F = x3+3x2-y2 = 0, drawn by plotting
F as a contour plot and displaying the F = 0 contour. Also shown are F = 2 and F = -2.
Three intersecting lines with shaded area, created by defining three plots for the lines, and an additional plot consisting of
the three intersect points, and shading it as a closed figure.
Two parametric plots. A surface plot of a hyperboloid, and a
3D line spiralling along its surface - just one example of
the versatility of TeraPlot when used as function graphing software.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187690.11/warc/CC-MAIN-20170322212947-00421-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 1,435
| 14
|
http://help.limitedrun.com/articles/using-my-own-custom-domain
|
code
|
Important: Due to privacy concerns, we can't help you set up your custom domain on your DNS provider's end.
- You must already own a domain. If you don't already own a domain, we recommend Namecheap.
- You must be able to manage the DNS records for your domain.
Option 1: Ex. store.yourdomain.com
- Create a subdomain for "store" (or whatever you want to use).
- Point the subdomain's CNAME to "domains.limitedrun.com".
Option 2: Ex. yourdomain.com
- Create a subdomain for "www".
- Point the "www" subdomain's CNAME to "domains.limitedrun.com".
- Create a permanent URL Redirect from "yourdomain.com" to "www.yourdomain.com".
Note: If your registrar doesn't support URL redirects, you can use a redirect service like wwwizer.com. To use wwwizer, create an A record for "yourdomain.com" and point it to 126.96.36.199. This will redirect all traffic to "www.yourdomain.com".
After Your DNS is Configured
- You may have to wait a bit. It could take up to 72 hours before your DNS changes start working.
- Confirm your DNS is working. You'll know your DNS is setup and working correctly because when you go to your custom domain, it will show a Limited Run page that says "Your domain is correctly pointing at Limited Run".
- After your DNS is working, go to your store's admin area (http://yourstore.limitedrun.com/admin) and then click "Settings".
- Check the "use a custom domain" box and enter your custom domain like "www.yourdomain.com".
- Click the "Test Domain" button, if it's working, you'll see a green check mark appear.
- Click "Save".
Existing URLs & Your Admin Area
Please note that your existing, http://yourstore.limitedrun.com URLs will continue working. Additionally, you will continue accessing your store's admin area at http://yourstore.limitedrun.com/admin, not http://www.yourdomain.com/admin.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526799.4/warc/CC-MAIN-20190720235054-20190721021054-00260.warc.gz
|
CC-MAIN-2019-30
| 1,814
| 20
|
https://forum.openwrt.org/t/installed-snapshot-now-want-to-install-luci-how-to-i-get-internet-on-openwrt-device/76608
|
code
|
I have installed the latest snaphot on my dgnd3700v2 device. --> hence there is no Luci.
My problem is that I currently dont have internet on this deice (to do the installs )
--> <Fibre modem 192.168.20.1> --> <OpenWRT Unit 192.168.20.50 > ->
- If i connect my Fibre modem LAN port to OpenWRT LAN Port my PC gets internet via gateway 192.168.20.50 however when I SSH into the OpenWRT Device (SSH firstname.lastname@example.org) doing something like ping www.google.com fails (hence i cannot install luci )
- if I connect my Fibre Modem LAN Port to the OpenWRT WAN port, then my pc uses the OpenWRT device as the gateway. but there is no internet anywhere.
Question .. whats the easiest way to simply get internet on the device (temporarily ) so that I can install Luci
ps.. i have already done this via SSH
uci set network.lan.ipaddr="192.168.20.50"
uci set network.lan.gateway="192.168.2.1"
uci set network.lan.dns="192.168.20.1"
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103360935.27/warc/CC-MAIN-20220628081102-20220628111102-00042.warc.gz
|
CC-MAIN-2022-27
| 930
| 10
|
https://www.fr.freelancer.com/projects/php-java/eportal-for-election-voting/
|
code
|
I am working on my dissertation. I intend to design an ePortal for election purpose that will be hosted on the cloud. It will be able to register voters, give summation of casted votes, give analysis of party votes by state and wards.
4 freelance font une offre moyenne de £188 pour ce travail
Work 4 years as a Software Developer. Familiar with Enterprise technologies (Documentum, different Application Servers) and many programming languages. Technical Skills: Documentum ( 2 years ) DC, WebTop, Plus
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946578.68/warc/CC-MAIN-20180424080851-20180424100851-00021.warc.gz
|
CC-MAIN-2018-17
| 504
| 3
|
http://thbop.pythonanywhere.com/html/article/Your%20first%20html/default
|
code
|
Your first html
HTML stands for Hyper Text Markup Language. Markup languages don't really do anything, they just display stuff. So why do you learn html? Well just try it! Create a text file on your computer. (Doing this on Mac might be hard, if you don't know how to create a text file look it up.) Make sure you enable file extensions, on windows you have to click "view" then click on the check mark (around the top right) that says something like: View file extensions.
Your text file should look like: "text.txt" or something. The ".txt" extension means that this is a text file, if you want your computer to recognize it as a html file change the name from "text.txt" to maybe "index.html". To test if you did it right double click the file, if it opens a browser, that means your did it right! Is this a website? No! This is just your web browser opening up a file.
Edit the html file by right clicking it and select edit. If your on windows it will open up notepad, which is a terrible editor. I'd recommend notepad++:
(They have a dark mode theme!)
Paste the following into your file (it's fine if your still using notepad, it is just a pain to code on notepad.):
<h1>This is my first html file!!!</h1>
<p>I'm excited to learn more!</p>
(Sorry my markup language TML is in it's early stages, that's why this looks weird...)
Play around with the text trying different things, for me that is the best way to learn. Also h1 stands for header 1, try header 2 (h2), h3, h4, h5, and h6. (h7 doesn't exist)
So let me now explain what that all means. Html has code blocks called flags, each flag is surrounded with "<>". In this example a "p" is enclosed with "<>" (p means paragraph). This means that everything after the "<p>" is a paragraph. Now you probably don't want everything after your p flag to be a paragraph, so that's why we end it with a "</p>". This means that the flag is complete, and everything between those two will be displayed with the flag. It would be called almost the flag's value.
Some further syntax:
<flagtype argument="something" argument2="something else">Some other stuff here</flagtype>
So the first flag we define is the html flag, this is just a standard cloak that surrounds the rest of our code. The body flag is the flag that has all the website's (or in this case the html file's) content inside. Everything your reading here is inside a body flag. Now usually we'd have a head flag, but that contains code that this tutorial doesn't cover.
Just to let you know, you can rearrange flags in the body, you can add more, and you can remove them. You aren't limited by this template. If you want to learn more about html, I probably will write more articles on the subject. But for the time being, check out w3schools, they have excellent html reference:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00632.warc.gz
|
CC-MAIN-2023-40
| 2,790
| 15
|
http://bentomakesmehappy.blogspot.com/2012/01/bento-no-22-birdie-bento.html
|
code
|
I was late (again) this morning. I have no idea on what bento to make today. No time for me to boil baby carrots or even pack fruits. Therefore, I only made this simple bento. I just spread my favourite nutella jam on the bird sandwich. Also packed my favourite chocolate sandwich biscuits to fill up the gap.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120092.26/warc/CC-MAIN-20170423031200-00405-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 309
| 1
|
http://mastrave.org/doc/mtv_m/mloop
|
code
|
The module "mloop" of the Mastrave modelling library
Copyright © 2009,2010,2011,2012,2013,2014 Daniele de Rigo
The file mloop.m is part of Mastrave.
Mastrave is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
Mastrave is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with Mastrave. If not, see http://www.gnu.org/licenses/.
[transformed_obj, ...] = mloop( until_, func, obj, ... )
Module for supporting tail-recursive application of a generic function handled by func to a object obj (or more objects passed following the first object obj ). The tail-recursion is implemented as a loop which is intended to address dynamic assignments so that the only possible parallelization (planned) could rely on the definition of the func handle, especially when obj is composed by a large amount of elements. The loop ends according to the until_ argument.
until_ ::scalar_numel|function_handle:: Criterion for terminating the loop. It may be a scalar nonnegative integer, meaning that the loop is to be reapeted until_ times. It may also be a function handle. If so, it is expected to be a function whose number of input arguments is the same as the number of objects passed to @mloop . The function must return as output a logical scalar. func ::function_handle:: Handle of the function to be applied to obj and to the possible subsequently passed objects. It is expected to be a function whose number of input and output arguments is the same and is compatible with the number of objects passed to @mloop . obj ::generic:: Object on which to apply the function handled by func until the until_ condition terminates the loop. More than one object can be passed with an arbitrary number of optional arguments.
% Basic usage c = mloop( 1, @cumsum, [1 0 0 0 0 0 0 0 0] ) c = mloop( 2, @cumsum, [1 0 0 0 0 0 0 0 0] ) c = mloop( 3, @cumsum, [1 0 0 0 0 0 0 0 0] ) % Fibonacci numbers (sequence A000045 in OEIS: http://oeis.org/A000045) mloop( 10, @(x)[ x sum(x(end+[-1:0])) ], [0 1] ) % Lucas numbers (sequence A000032 in OEIS: http://oeis.org/A000032) mloop( 10, @(x)[ x sum(x(end+[-1:0])) ], [2 1] ) % Tribonacci numbers (sequence A000073 in OEIS: http://oeis.org/A000073) mloop( 10, @(x)[ x sum(x(end+[-2:0])) ], [0 0 1] ) % Implementing a cellular automata colormap( 'default' ); rule = @(x)[ x; mod( filter2( [1 1 1], x(end,:) ), 2 ) ]; C = mloop( 300, rule, rand(1,300)>0.5 ); imagesc( C ); pause(3) C = mloop( 300, rule, rand(1,300)>0.05 ); imagesc( C ); pause(3) C = mloop( 300, rule, rand(1,300)>0.99 ); imagesc( C ) % Implementing a Julia set [x,y] = meshgrid( linspace(-1,1,400)*pi/2 ); z = x + 1i*y; function [z,z0] = julia(z,z0) z = z.^2 + z0; imagesc( 1-atan(abs(z))/pi*2 ); axis equal; pause(0.1); end mloop( 40, @julia, z, 0.37*(1+1i) ); mloop( 40, @julia, z, .65i ); mloop( 40, @julia, z, -0.8 -0.175i ); mloop( 50, @julia, z, -0.4 +0.6i ); mloop( 50, @julia, z, 0.285 +0.01i ); % A more complex example: % Spatially correlated noise and downsampling with binary dithering [D, d] = deal( 25, 13 ) % downsampling diameter and radius generator_func = @(M)interp2(M,1,'spline')+.5*rand(size(M)*2-1) get_corrnoise = @(n)mloop(8,generator_func,rand(n)) norm_func = @(M)(M-min(M(:)))/range(M(:)); M = norm_func( get_corrnoise(5) ); colormap( 1 - colormap( 'gray' ) ); subplot( 1, 3, 1 ); imagesc( M ); Mdown = mblk_fun( M, @(M)isfinite(M)*mean(M(:)), D ); subplot( 1, 3, 2 ); imagesc( Mdown ); Mdn = norm_func( Mdown ); z = zeros(size(M)); z(d:D:end,d:D:end) = 1; % see also mfreq_matrix Z = double( mloop( ... d, @(Z,v)deal(Z|filter2(ones(3),Mdn.*Z>v),(v^.5+1/d)^2), z, 1/D ... )); subplot( 1, 3, 3 ); imagesc( Z );
See also: mstream, mblk_fun, func_let, mfreq_matrix Keywords: tail-recursion, looping, anonymous-function Version: 0.3.9
The Mastrave modelling library is committed to provide reusable and general - but also robust and scalable - modules for research modellers dealing with computational science. You can help the Mastrave project by providing feedbacks on unexpected behaviours of this module. Despite all efforts, all of us - either developers or users - (should) know that errors are unavoidable. However, the free software paradigm successfully highlights that scientific knowledge freedom also implies an impressive opportunity for collectively evolve the tools and ideas upon which our daily work is based. Reporting a problem that you found using Mastrave may help the developer team to find a possible bug. Please, be aware that Mastrave is entirely based on voluntary efforts: in order for your help to be as effective as possible, please read carefully the section on reporting problems. Thank you for your collaboration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120092.26/warc/CC-MAIN-20170423031200-00599-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 5,065
| 12
|
https://www.spacewalkers.com/forum/answers/stacking-os6860-u28/
|
code
|
[RESOLVED] Stacking OS6860-U28
We have (2) switches OS6860E-U28 . we need CLI to stack two switches to working as a big switch???. we are using OS6860-CBL-300 for stack.
Release notes attached.
You need to upgrade the switches. Please find the release notes attached for 8.7.354. You should able to find the information with regards to upgrade in APPENDIX D.
Stacking will not work if the switches are not in the Same version.
if two switches are not using the same software version. Stacking will not working or need command to active it???
6860E Switches Automatically from Virtual chassis(/Stack) once you connect the OS6860-CBL-300 cable to VFL Ports (Extreme right-side QSFP port ) switches.
After connecting the cable, one of the switches will reboot and form Virtual chassis.
Note: Please ensure two switches are using the same software version.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00084.warc.gz
|
CC-MAIN-2023-23
| 852
| 9
|
https://gadgetonus.com/hot-news/133368.html
|
code
|
The program covers a variety of Bing AI services across platforms including bing.com, Microsoft Edge, the Microsoft Start app for iOS and Android, and the Skype mobile app. To receive a reward, participants must complete a number of tasks such as identifying the type of vulnerability, providing a replication report, proof of concept, etc. It must submit a detailed report with specific requirements, including: Microsoft is particularly concerned about vulnerabilities that could affect the behavior of Bing chat. can alter its behavior, break memory protection, reveal internal workings and decision-making processes, and bypass restrictions and session limits.
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476532.70/warc/CC-MAIN-20240304200958-20240304230958-00052.warc.gz
|
CC-MAIN-2024-10
| 992
| 2
|
https://dlang.org/library/std/stdio/write.html
|
code
|
View source code
Display the source code in std/stdio.d from which this page was generated on github.
Report a bug
If you spot a problem with this page, click here to create a Bugzilla issue.
Improve this page
Quickly fork, edit online, and submit a pull request for this page. Requires a signed-in GitHub account. This works well for small changes. If you'd like to make larger changes you may want to consider using local clone.
Writes its arguments in text format to standard output (without a trailing newline).
void write(T...) (
if (!is(T : File));
|args|| the items to write to |
In case of an I/O error, throws an
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508959.20/warc/CC-MAIN-20230925083430-20230925113430-00679.warc.gz
|
CC-MAIN-2023-40
| 621
| 11
|
https://boards.greenhouse.io/seera/jobs/4489468002
|
code
|
About the role:
We are looking for a Lead QA Engineer to assist with the management and growth of automation environment. The Lead QA Engineer will be hands-on whilst having the scope and freedom to build a new team. This role requires the experience of Java to develop distributed systems driving the Middle East's largest travel agency
- Lead and mentor the QA team and provide full support and guidance.
- Distribute workload and assign tasks to fulfill the required work.
- Provide full test strategy as well as clear entry and exit criteria for all testing activities.
- Communicate the Quality of the vertical to stakeholders and report as mature output.
- Build an automation framework and provide full team support while onboarding.
- Manage team code repositories and ensure best practices are being followed by members.
- Participate and review requirements, specifications during sprint planning.
- Creating detailed, comprehensive and well-structured test plans and test cases whenever needed.
- Estimating, prioritizing, planning and coordinating testing activities during SDLC.
- Work as a member of an Agile SCRUM team delivering high-quality software in two-week sprints
- Build and suggest tools to improve code quality.
- Define release processes and guide the team through.
- Convert test scenarios to automated test cases as the primary task.
- Perform functional and non-functional testing to support the development team.
- Identify, troubleshoot, and document issues thoroughly during bugs tracking.
- Ability to act as stand-alone and define tasks to start QA efforts in an Agile team
- Document software issues and enhancement requests and assist development with concise and detailed steps for duplication of the defects found while performing manual functional, integration, and regression tests.
- 6+ Years of solid experience in Software Quality Assurance.
- Solid test automation background to fulfill the primary task.
- Java as a primary programming language.
- Familiar with Restful APIs.
- Hands-on RestAssured framework
- CI & CD tools experience.
- Load and Performance testing experience.
- Runscope API monitoring tool experience is a plus.
- Hands-on git command line.
- Merge and review code work and apply quality checks over code
- Strong knowledge of Software QA methodologies, testing types, tools, and processes.
- Ability to implement Quality checks over the complete SDLC
- Excellent communicator.
- Project tracking tools.
- Agile expert to match up agile team expectations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593937.27/warc/CC-MAIN-20200118193018-20200118221018-00016.warc.gz
|
CC-MAIN-2020-05
| 2,522
| 34
|
https://www.workspot.com/
|
code
|
It’s as simple as buying a PC
Cloud desktops deliver simplicity. Deploy fast on the only turnkey virtual desktop service on Azure. Scale up on-demand. Flat pricing includes Azure, go-live services, standard support, 99.95% SLA.
Edge of the Cloud deployment
Cloud desktops deliver agility. Deploy them globally, from a single pane of glass, to the edge of any of the 50+ Azure regions. Cloud desktops can be located within 25ms latency of most users worldwide!
Better Performance than Physical PC
Cloud desktops deliver speed. Virtual PCs run on data center-class hardware in the Azure region closest to users, typically less than 25 ms away. Experience better performance than your physical PC!
Manage like your enterprise desktop
Cloud desktops deliver manageability. Your rules apply! Use your custom Windows 10 image, GPOs, MFA. Your existing systems management tools, such as SCCM, work seamlessly too.
Workspot Introduction and Customer Success Stories
Trusted by Cloud-First Organizations, Globally
High-Performance GPUs in Azure
Windows 10 PCs in Azure
Disaster Recovery Cloud
One-click PC Disaster Recovery in Azure
Windows Client-Server Apps in Azure
Ready for a Demo?
Connect with us and learn how we spin up Enterprise-Ready Windows 10 PCs in Azure! We can share the details on our architecture and how you can deploy Windows apps and desktops in any of the Azure regions and on-premises using a single pane of glass. We can also share how our customers are enjoying our Flat Rate Subscription Pricing and Free Deployment Services.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313889.29/warc/CC-MAIN-20190818124516-20190818150516-00146.warc.gz
|
CC-MAIN-2019-35
| 1,544
| 17
|
https://community.shopify.com/c/Technical-Q-A/Need-help-with-editing-product-descriptions/td-p/839225
|
code
|
I have an online video game store where I have a lot of products and would like some assistance in streamlining the editing of descriptions. My descriptions consist of two parts, the first is one that is specific to the product and the second is our overall merchant policies. For this second part, I'm trying to figure out how (instead of being just text) to use some kind of code or something to link it to an external source where it pulls the text from. The idea would be when this information needs to change, I could do it once on the external source and not have to go through all of the product descriptions manually. Hope this question makes sense. Any help would be very much appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178367949.58/warc/CC-MAIN-20210303230849-20210304020849-00623.warc.gz
|
CC-MAIN-2021-10
| 698
| 1
|
https://meta.stackexchange.com/users/532979/vignesh-s?tab=profile
|
code
|
Stack Exchange network consists of 175 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Currently working as a UX/UI designer, graduated as a Mechanical Engineer, passionate in designing & creative field.
Bibliophile, embrace challenges, loves to meet new people.
We respect a laser-like focus on one topic.
This user hasn't posted yet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144165.4/warc/CC-MAIN-20200219153707-20200219183707-00145.warc.gz
|
CC-MAIN-2020-10
| 445
| 5
|
https://hamiltonreview.libsyn.com/website/kirk-cameron-discusses-his-new-childrens-book-as-you-grow
|
code
|
Dec 13, 2022
Dr. Bob sits down with actor, father, husband author and filmmaker Kirk Cameron to talk about a variety of topics, including his new children's book, "As You Grow."
Don't miss this enlightening conversation!
How to contact Dr. Bob:
Dr. Bob on YouTube: https://www.youtube.com/channel/UChztMVtPCLJkiXvv7H5tpDQ
Dr. Bob on Instagram: https://www.instagram.com/drroberthamilton/
Dr. Bob on Facebook: https://www.facebook.com/bob.hamilton.1656
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00821.warc.gz
|
CC-MAIN-2023-50
| 451
| 7
|
https://wpism.com/learn-jasper-ai/
|
code
|
Jasper AI is undoubtedly one of the most powerful tools for copywriting. It’s currently one of the top AI writers in the AI-powered tools niche.
However, the range of extensive features and necessary instructions make the learning curve of Jasper AI fairly challenging.
Although the 50+ templates of Jasper AI make the content creation process really easy, you will need to learn a few tips and tricks to master long-form content writing with Jasper.
With the right tips and video tutorials, you will be able to master Jasper AI to get the best results and start making the most of the advanced AI copywriting tool.
In this post, we will cover the basics of Jasper and include the best videos that you can watch to learn Jasper AI features and master some of its most important features.
If you haven’t already, you will need to get the Boss Mode Plan of Jasper AI to enjoy the full capabilities with unlimited features.
And if you’re a Jasper user already, see the complementary tools and solutions that you can use in our curated list of Jasper AI resources to make the most out of Jasper AI.
So, whether you are a new Jasper user or still deciding to sign up for Jasper AI, these top learning resources and videos will help you to further evaluate and learn about the tool in detail.
1. Learn with Jasper Academy Training
Jasper AI has a very helpful section called Jasper Academy, where the team members post several training videos featuring some of the experts.
Jasper AI invites experts in different fields, such as SEO, Social Media, Copywriting etc. and asks them to show their workflow using the tool.
Some of our favourite ones are the training videos done by the popular copywriting framework creators themselves, helping us understand their framework in-depth and create with Jasper AI.
2. Keep Updated with Jasper Blogs
The team at Jasper AI also have a very well-maintained blog where they post several guides and tips to get the most out of using the platform for various use cases.
The best part is that they also post guides about using complementary tools to further enhance the content capabilities of Jasper.
So, whether it is using Surfer SEO integration with Jasper to create SEO-friendly content or using spinners to rewrite content, you have got it covered with Jasper Blogs.
3. Learn Jasper AI with Live 101 Training
If you are fairly new to Jasper or still deciding on whether to sign up, you can attend a Live 101 Jasper training and see how the platform looks and works.
The live training is the best way to get any of your questions answered live by one of the Jasper team members.
The recent live training sessions have been conducted by Jasper AI’s co-founder Chris Hull, so you are guaranteed to get the best answer to your queries.
4. Watch Official Jasper AI Video Tutorials
While there is no shortage of videos about Jasper AI on Youtube, the Jasper AI team have created high-quality training videos to help users learn everything from basics to advanced features of their platform.
Here are some of the best videos that can quickly enhance your understanding of the Jasper AI platform.
Knowing Jasper AI Basics and Dashboard
The Jasper Basics video is a broad overview of the Jasper AI dashboard and shows where you can find certain tools within the platform. You can also learn more about the main sections and features in the Jasper AI dashboard.
The basics video introduces you to the Document Editor, Templates and shows you how to work with Projects and AI outputs generated by Jasper.
Understanding Jasper Training Data
This video about training data helps you increase your understanding of how Jasper was trained, the AI model behind the tool and how it can create the content that you need.
You can learn how to set Jasper in the right direction with content that Jasper might not have been trained in.
Using Jasper Templates
Jasper has over 50 different templates that facilitate the content creation process for different writing needs, styles, and platforms.
Templates also have specific options such as keywords, and tone of voice and generate content outputs accordingly.
This video shows you how to use specific Jasper AI Templates to write different types of content.
Using Jasper Documents
The Documents tool that lets you create long-form content is what mainly differentiates Jasper from other AI copywriting tools.
You can watch this video to learn how to use documents to write content on the Jasper AI platform.
Using Jasper Commands
Jasper Commands are very useful to get Jasper to write what you want by telling it in plain language.
You write the command and hit CMD + Enter on Mac or CTRL + Enter on PC to execute that command.
See how to use Jasper commands and how it works in the following tutorial video.
Please note that you will need the Jasper AI Boss Mode Plan to use commands.
Using Jasper Recipes
Jasper AI recipes use series of repeatable commands to help you craft the required long-form document.
Think about using Jasper Recipes to write a complete blog post using series of commands for writing an introduction, a list of topics, expanding on those topics, and writing a conclusion.
You can see more videos covering everything about Jasper in the Jasper Bootcamp series.
5. Engage with Jasper AI Facebook Community
One last tip would be to join the Jasper community on Facebook, where you can engage with other users that are constantly sharing tips, ideas, and results of what they have been able to achieve with Jasper AI.
This Facebook community is the only official community run by the official team members. You might see several other unofficial communities focused on the use cases of Jasper AI.
The Jasper Team have also appointed a dedicated community manager to manage the community and ensure members have a good experience.
Final Learning Suggestions
As with any other tool, you can master Jasper by using it more often and trying all the features of its platform.
Jasper is certainly one of the most advanced AI writing tools, but all the advanced features significantly contribute to its higher learning curve for new users.
If you haven’t signed up already, you can use our special partner link to get a Free trial of Jasper AI and a special deal of 10,000 words allowing you enough time and words to decide if Jasper AI is right for you.
If you are a Jasper Starter or Pro plan user, I highly recommend upgrading to their Boss Mode Plan, which allows you to get the complete functionalities of Jasper AI.
We have also published a curated list of some of the best tools and resources to get the most out of the platform on our Jasper AI Resources page.
Explore More Jasper AI resources on WPism.
Read our review of the AI writing tool and explore more about Jasper AI here on WPism.
Let us know if you have any other suggestions or queries about learning Jasper AI, and we should be able to point you in the right direction.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816864.66/warc/CC-MAIN-20240414033458-20240414063458-00026.warc.gz
|
CC-MAIN-2024-18
| 6,928
| 58
|
https://forum.jdrf.org/t/type-1-diabetes/15685
|
code
|
Hi every one,
I want statistics for Type 1 diabetes ..from 2000 to 2009 year . For Type 1 diabetes Incidence , Prevelence and Mortality data is avilable ? if its avilable pls tell me in which site. because i saw so many site but not get. that why i m asking ..
Similarly For Type 1 diabetes Cure and Survival rate is there ?
How to calculate incidence, Prevalence and mortality data ? i mean is there any formula.. if any one knows pls tell me.. with one example for me ..
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330913.72/warc/CC-MAIN-20190826000512-20190826022512-00361.warc.gz
|
CC-MAIN-2019-35
| 472
| 4
|
https://turabrez.blogspot.com/2016/12/50-words-hi-there-dont-go-please-not.html
|
code
|
Hi there! Don't go!
Please, not just yet. You've only just picked me up.
I know, fifty words isn't much, but still, it's home to me.
Linger a while, won't you?
You can go back and reread, I'd like that.
Well, that's the whole story, see you again sometime?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487629209.28/warc/CC-MAIN-20210617041347-20210617071347-00464.warc.gz
|
CC-MAIN-2021-25
| 256
| 6
|
https://www.labeljoy.com/support/barcode-types/code-11/
|
code
|
Code 11 barcode generator
Code-11 is a barcode symbology developed by Intermec in 1977 and used mainly in telecommunications. The symbol can encode a string of any length (though Labeljoy limits it to 255 characters), consisting of the digits 0-9 and the dash sign (-). One or two check digit(s) can be included.
Creation of a Code 11 barcode
Labeljoy requires you to enter a text in the text box of up to 255 characters.
Code-11 requires 1 or 2 check digits. The Checksum combo box allows you to define the number of check digits to append at the end. The (automatic) selection adds a check digit to texts with a length of up to 10 digits, and two for longer texts, while selections 1 and 2 determine 1 or 2 check digits independently of the text length.
With Labeljoy is it easy to create and print Code 11 barcode labels.
Note: Check digits are only appended to the barcode symbol. They are not appended to the visually readable text.
When a Code 11 barcode element is generated by concatenating fields or counters, the following rules apply:
- The text can contain digits and dash (-) signs only.
- Code length must not exceed 255 digits, including dash signs.
If a value is found that does not comply with the above rules, the barcode will not be displayed.
The visually readable text can also be displayed above the symbol or hidden, according to the setting specified in the Text combo box.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897707.23/warc/CC-MAIN-20200708211828-20200709001828-00359.warc.gz
|
CC-MAIN-2020-29
| 1,397
| 12
|
https://swap.stanford.edu/was/20160311035101mp_/http:/uit.stanford.edu/emailcalendar/vemail
|
code
|
Email Virtual Domain provides Stanford departments and business groups with their own vanity email domain forwarding. For example, Email Virtual Domain enables department foo to list its email as foo.stanford.edu. Department and group administrators can manage the email aliases for their domains via a web interface.
Many departments are running their own mail servers administered by one or two staff members, who must monitor it 24/7 and deal with any issues that arise. With Email Virtual Domain service, you can retain your specialized email addresses while avoiding the expense and burden of maintaining a server.
This service does not provide mailboxes. Instead, the Email Virtual Domain service is meant to work with your existing @stanford.edu mailbox. This service provides email addresses in your stanford.edu subdomain, which you control, and which can be forwarded to existing Stanford and non-Stanford email addresses.
Who can request this service
If you are a department or group system administrator running a mail server, you can request a virtual domain. Once your virtual domain is in place, you can create all the email aliases your department needs.
If you are currently running a department mail server and would like to transition to the Email Virtual Domain service, submit a request using the Getting started directions below, and University IT will work with you to create a suitable cutover plan.
This service is not currently available to Stanford subdomains using the Web Virtual Host (Vanity URL) service. This service does not support Stanford subdomains that are aliases for third-party non-Stanford domains.
- Emails to aliases at the virtual domain have the same virus and junk mail filtering as emails to the @stanford.edu domain.
- Emails to aliases at the virtual domain are subject to the same secure email routing and encryption rules as emails to the @stanford.edu domain.
A virtual domain can have secondary domains. Emails to secondary domains will be treated and routed the same as emails to the primary domain.
How to use
See How to Use page for instructions on adding and editing aliases.
For support, please submit a HelpSU request.
There is no charge currently associated with the Email Virtual Domain service.
To request the service, a department or group administrator should submit a HelpSU request. For example, to request the virtual domain uit.stanford.edu, the group administrator should submit a HelpSU request with the following information:
- Domain: uit.stanford.edu
- Secondary domains (optional): universityit.stanford.edu, university-it.stanford.edu
- Management workgroup: uit:administrators
- Contact email: email@example.com
- PTA: xxxxxxx-xxx-xxxxx
Note: The account number is required only to validate requests; there is currently no charge for Email Virtual Domain service.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818740.13/warc/CC-MAIN-20240423192952-20240423222952-00296.warc.gz
|
CC-MAIN-2024-18
| 2,840
| 21
|
http://technewspedia.com/microsoft-will-increase-the-production-and-distribution-of-rt-surface/
|
code
|
Microsoft will increase the production and distribution of RT Surface
Microsoft announced it will start selling the Surface RT in more stores in the U.S. and Australia this month, can be found in various retail device. The company also said it will be available “in several countries in the coming months”, without specifying which.
The team is already on sale in the U.S., Canada, Australia, China, France, Germany and the UK. So far, the RT Surface had sold only through Microsoft stores, so expanding to other stores is an important step.
The company also said it will increase the production of these teams, which would indicate that Microsoft has been an interesting demand for them.hybrid, Microsoft, Microsoft Surface, RT Surface, Surface, Tablet
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189583.91/warc/CC-MAIN-20170322212949-00032-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 757
| 4
|
http://www.winmatrix.com/forums/index.php?/topic/21131-help-multibooting-win-7/
|
code
|
[help] multibooting win 7
Posted 29 November 2008 - 06:35 AM
I want to multiboot windows 7 build 6801 which i have downloaded.
My whole hard drive is 288 gig. I have one partion or whatever it is called which is my whole hard drive.
It has my vista installed.
I want to install windows 7 without corrupting or losing any vista files.
I have 100 gig left. If a split the partion of vista into a 188 one (with vista) and then install windows 7 build 6801 on the left over (100) will it work without corrupting any of my vista files.
Is it possible that when i split the partion with vista on it it will split up my files on my hard drive. Like will vista be split up on the 2 partions then once that happens i install windows 7 on the 100 gig then it screws everything up.
I just want to make sure when i do this thing my genuine windows vista will be safe and will not be corrupted.
I also would like some advise while installing.
A small tutorial would be nice.
Also tell me any risks or things bad that could happen . Like what to avoid.
Posted 29 November 2008 - 07:48 AM
Use some good software like Partition magic to spit the volume which also gives lot of options if you go wrong as well..Good luck!
Posted 29 November 2008 - 09:24 AM
Only one problem i googled Partition magic and went to the wikipedia page.
I don't think it works on vista... heres a quote "The program runs on Microsoft Windows operating systems (only 2000 and XP, not Vista) "
so theres my problem...
Posted 29 November 2008 - 11:22 AM
Been Dual-Booting for a while now (Win7 and Vista Ultimate.)
Posted 29 November 2008 - 02:38 PM
@Frank(please remove the2s)
Use EASEUS Partition Manager. You can download it from here
Okay why did you end up posting some non-official site? It's here.
I'm still wary of the file. I scanned the file and it says it's clear. Why would you post a different site than the official site?
Edited by CommonSense, 29 November 2008 - 02:52 PM.
Posted 29 November 2008 - 09:19 PM
Ok well i used that it took 3 and a half hours to take 25 gig of my c: drive (which is os [vista]) and put it somewhere else mark analocated space. or something like that.
Btw i hate programs like that one i used it was so scary i was scared it would corrupt vista.
Once it finish spliting the partions my computer restarted and it said windows did not start properly.
Then once that happened i click start normaly.
It started but was very slow much slower then normal.
Then when i used the computer for 5-10 minites it said somthing about new driver found... installing generic sound
Ok what was that????
My sound was working perfecly yet it did that weird thing.
Any way i rebooted my computer again it was a little slow but my computer does not seem to be currupted.
So now that brings me to step 2:
Installing windows 7 on the analocated space.
So first of i have got the iso on a disk. I gave it to my friend as an iso and he used his xp computer and then put the iso on the computer.
He then used daemon tools to mount it to his computer as a virutal cd.
He choose to overight xp and now he has windows 7.
So thats the proff it is a iso that works but now i got some questions.
Should i put it on a disk turn my computer off then let it install on the unamed alocated space or do it have to name it.
Is there any risk for my vista (curruption)
once it is installed what do i do. when i turn my computer on what will happen will it open windows 7 or will it open vista or do i get a choice every time or is windows vista gunna be the defalt and i hold down a button on start up to get into win 7?
Please answer all these questions and tell me any thing that can be dangerous and should be avoided.
thanks from 12padams
Posted 30 November 2008 - 02:10 AM
Anyway when is this timebomb thing.
And will i be able to uninstall windows 7 easily in a month?
Posted 30 November 2008 - 02:33 AM
Should try it next time.
Also, the timebomb is set for January, there is already a crack out there that has a patched winlogon.exe, which contains the timebomb. But if you just want to uninstall, format the partition and merge it back together.
1. It will NOT corrupt vista if it is on a different volume
2. Windows Boot manager will start everytime asking you if you want to boot into Vista or Windows 7. You can change the default OS by using EasyBCD found here: http://www.neosmart.net/dl.php?id=1
3. You can change the name of the OS using EasyBCD, and you can change the name of the partition when booted into an OS (Changing Harddrive Names)
Edited by StickwithXP, 30 November 2008 - 02:38 AM.
Posted 30 November 2008 - 05:44 AM
Windows is not detecting to disk on startup how am i supposed to install windows 7
Can i run setup while in vista or will that overight vista
Posted 30 November 2008 - 05:53 AM
Posted 30 November 2008 - 05:59 AM
I don't want to lose vista so are you sure you can do it from withing windows?
I have tried it in virtual pc and saw how installation went like the custum option but will i get that option from inside windows or is that only done with putting disk in on startup
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703518240.40/warc/CC-MAIN-20210119103923-20210119133923-00518.warc.gz
|
CC-MAIN-2021-04
| 5,080
| 64
|
http://educational-toy-game.info/find/2605-Write-my-program-or-project.html
|
code
|
I'm working on a project for a Write file to project folder on any computer. (for example Program Files) you won't be able to write there unless the user
Write my Java Program for me. Getting Java Homework Done is really easy and cost effective. You can hire us to do your homework , Java Project and Java Homework. We are the best doing Any type of Java Homework.
How to Write a Project Description: Key Criteria and Steps. Personally, I try to follow the rule of 4C when I need to write a description for my future project,
The latest version of this topic can be found at Walkthrough: Deploying Your Program (C++). To do this, you'll add a new project to your existing solution.
Project objectives are the specific objectives for which the project fundsforngos. org Writing Project Funding Program!
0/5/2010Learn to Program for Windows in C++ Module 1. Your First Windows Program. we will write a minimal Windows program. Visual Studio project from
We Make any ' Write My Paper ' Request on Time To Get Whenever we start our project of writing an essay they write a paper, which has lots of errors
When I prepared my own final-year project report, Deep down, all students seem to believe that their project is ``to write a program'' (or,
The hardest project budget you’ll ever write is the first one. Get LiquidPlanner blog posts delivered straight to your inbox. Affiliate Program; FAQ;
CONTENTS PROJECT PROPOSAL WRITING 3 Topic Material 5 Overview 7 Project Basics 9 How to Write a Project Proposal 12 Training Toolkit 21 Tool 1: Ice Breaker, Introduction Exercise 23
Step 1: Explain the project plan to key stakeholders and discuss
R Project: Combining an Image Four Steps to Take before Writing a Computer Program; Even if you write a program that works perfectly,
A concept paper summarizes in two to three pages the entire project After you write your An outreach or dissemination plan is often required by program
In this tutorial, you will learn how to write the first simple but famous program in Python called Hello World.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494485.54/warc/CC-MAIN-20190220065052-20190220091052-00475.warc.gz
|
CC-MAIN-2019-09
| 2,037
| 14
|
https://www.informit.com/store/lesson-3-learning-to-use-game-objects-downloadable-9780133389470
|
code
|
Actual product comes full screen and in high resolution.
In this lesson we learn all about game objects and the various game object types in Unity 4. We examine how to work with specific game objects like meshes, cameras, and lights. Along the way we learn about texturing, layering, and applying prefabs to our objects. By the end of this lesson you should have a strong understanding of the game objects you will use in your games.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153521.1/warc/CC-MAIN-20210728025548-20210728055548-00132.warc.gz
|
CC-MAIN-2021-31
| 433
| 2
|
http://www.mathworks.com/matlabcentral/linkexchange/links/1601-eeg-mri-matlab-toolbox
|
code
|
19 Jun 2009
This toolbox has been developed to facilitate quick and easy import, visualisation and measurement for ERP data. The toolbox can open and visualise ERP averaged data (Neuroscan, ascii formats), 2D/3D electrode coordinates and 3D cerebral tissue tesselations (meshes). All the features can be explored quickly and easily using the example data provided in the toolbox. The GUI interface is simple and intuitive. The following lists the features already available and some items that could be developed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736682102.57/warc/CC-MAIN-20151001215802-00056-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 513
| 2
|
https://clutch.co/profile/asia-flycam
|
code
|
AERIAL CINEMATOGRAPHY AND 360° VIRTUAL REALITY
Our company provides professional drone aerial services, 360° virtual reality (VR) experience and augmented reality (AR) app creations in Vietnam. Our organization is equipped to work with international firms, major industrial corporations, foreign television networks, film-makers, NGOs and research institutions.
- 2 - 9
- Founded 0
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510967.73/warc/CC-MAIN-20231002033129-20231002063129-00547.warc.gz
|
CC-MAIN-2023-40
| 383
| 4
|
http://cpanel.healthdaily.me/make-money-online-age-13.html
|
code
|
Watch make money online age 13 now. Have you ever wondered how time just flies when you watch videos on your smartphone? Now the question is how to make money watching videos online so that you will get paid for the entertainment time too.
Thank you for watching my video! leave a like, comment and subscribe! 🚨 additional way to make money: with surveys 👉 https://bit.ly/best-surveys-587 follow...
I hope you guys find this video helpful on how to make money fast as a teenager. Basically would sell items from the game diab. In this video, i talk about how made money online playing video games when was younger ($1000 per month).
In this video, i talk about how made money online playing video games when was younger ($1000 per month). basically would sell items from the game diab...
*open for more* ♡♡♡♡♡♡♡♡♡♡♡♡♡♡♡♡♡♡♡♡♡ hope you enjoyed today’s video. Keep in mind can be used at any age. Turn on post notifications 💜 jobs for teens, summer how to get money easily, sell poshmark, poshmark tips, seller download.
A new upload every si. Babysitting video (cringe warning lol). With surveys 👉 https//bitly/bestsurveys587 follow.
Leave a like, comment and subscribe. Today i am going to teach you how make money as a 12 year old. 🚨 additional way to make money.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107910204.90/warc/CC-MAIN-20201030093118-20201030123118-00417.warc.gz
|
CC-MAIN-2020-45
| 1,323
| 7
|
http://www.network54.com/Forum/87612/thread/1086167043/last-1086167043/HP+D8897+Vertical+IC+get+Hot+after+a+while
|
code
|
Does anyone can advise me on this HP55-D8897
Chssis:CMC551V .The problem is Vertical Ic get HOT after turn a while then the display got vetical sharking and line like condensor no good. I have confirm that vertical IC,Yoke coil,CRT and check all condersor around vertical size but can't find any component faulty.
and this problem seem to be commond fault, i have 3 units
same problem pending need help urgently!
I will apprecited if anyone can advise me on this issue.
and sent me mail .Many thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705352205/warc/CC-MAIN-20130516115552-00091-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 500
| 6
|
https://nodus.ligo.caltech.edu:8081/40m/2058
|
code
|
As per Matt's instructions in his OAF document (elog 395) in the Tuning section, Sanjit and I took a transfer function measurement from the output of the OAF system, to the input. i.e. we're trying to measure what happens out in the real world when we push on MC1, and how that is fed back to the input of our filter as MC_L. The game plan is to measure this transfer function, and read off the phase at the nyquist frequency, and use this value to calculate the appropriate sample-and-hold delay to be used in the OAF. The downsample rate for the OAF is 32, so that we're running at 64Hz instead of the 2048Hz of the front-end. Thus, our Nyquist frequency is 32Hz.
Phase@Nyquist * ------------------------ = Delay
In the attached figure we do a swept sine from CORR_EXC to ERR_EMPH_OUT to determine the transfer function. Here, we turn off all of the filters in both the CORR and EXC banks, because those are already matched/taken into account in the PEM filter banks.
Using the cursor on DTT, we find that the phase at 29.85Hz is -228.8deg, and at 37.06Hz is -246.0deg. Extrapolating, this means that at 32Hz, we expect about -234deg phase. Using our handy-dandy formula, this means that we should try a delay of 41 or 42 (41.6 is between these two...)
We'll give this a shot!
As Rana pointed out to me last night, I was using continuous phase, which is not good. When using regular phase, I find: (29.85Hz, 131.216deg), (37.06Hz, 113.963deg), so extrapolating gives (32Hz, 126.07deg). Plugging this in to our handy-dandy formula, we get a delay of 22.4, so we should try both 22 and 23.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00067.warc.gz
|
CC-MAIN-2022-33
| 1,589
| 6
|
https://reference.codeproject.com/Search?q=%2Btags:(%22HTML%20Drag%20and%20Drop%20API%22)
|
code
|
The DataTransfer object is used to hold the data that is being dragged during a drag and drop operation. It may hold one or more data items, each of one or more data types. For more information about drag and drop, see HTML Drag and Drop API.
The DataTransferItem object represents one drag data item. During a drag operation, each drag event has a dataTransfer property which contains a list of drag data items. Each item in the list is a DataTransferItem object.
The read-only DataTransferItem.type property returns the type (format) of the DataTransferItem object representing the drag data item. The type is a Unicode string generally given by a MIME type, although a MIME type is not required.
The DataTransferItemList object is a list of DataTransferItem objects representing items being dragged. During a drag operation, each DragEvent has a dataTransfer property and that property is a DataTransferItemList.
The DataTransferItemList.add() method creates a new DataTransferItem using the specified data and adds it to the drag data list. The item may be a File or a string of a given type. If the item is successfully added to the list, the newly-created DataTransferItem object is returned.
The DataTransferItemList.remove() method removes the DataTransferItem at the specified index from the list. If the index is less than zero or greater than one less than the length of the list, the list will not be changed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00726.warc.gz
|
CC-MAIN-2023-23
| 1,421
| 6
|
https://answers.sap.com/questions/13152894/how-to-monitor-application-events.html
|
code
|
Hello All ,
We wanted to monitor the application events that gets logged in the SCP.
To be more specific we want to get to know whenever an app.crash event occurs ,Any API which is available ?
any place from where i can read this string (app.crash) in the logs?
We checked kibana logs which are associated with the applications deployed ,however in case of an app crash this won't be logged in kibana too .
Any info about this would be really helpful .
Sandeep - IBSO OpS CoE
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587926.9/warc/CC-MAIN-20211026200738-20211026230738-00366.warc.gz
|
CC-MAIN-2021-43
| 475
| 7
|
http://www.mathworks.com/matlabcentral/fileexchange/3016-armada-data-mining-tool-version-1-4?requestedDomain=www.mathworks.com&nocookie=true
|
code
|
Association rules are a simple but very useful form of data mining that describe the probabilistic co-occurrence of certain events within a database. They were originally designed to analyse market-basket data, in which the likelihood of items being purchased together within the same transaction were analysed.
In the ARMADA tool (Association Rule Mining And Deduction Analysis) the rules are presented in the form of;
Item1, ItemN => ItemX
The rule is evaluated using two numerical measures.
SUPPORT: The number of occurrences, within the data set, of all components of an association rule occurring within a single transaction (a transaction can be thought of as a row in a conventional database).
CONFIDENCE: This is the probability that, given the antecedent (left hand side of the rule) being true, the consequent (right hand side) is true.
ARMADA contains several visualisation techniques for analysing quantative and qualative measures of each rule, as well as several strategies for undertaking data mining which can be used as exclusive or combinatorial methods.
To run GUI version type ARMADA in command line.
NOTE: A major bug fix was applied to version 1.4 which affected newer versions of MATLAB not generating large rules. This is now resolved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00559-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,259
| 9
|
http://www.getty.edu/education/teacherartexchange/archive/Feb98/0121.html
|
code
|
Corel Photopaint 8 is comparable to Photoshop. I use
photoshop, but I recently used an outdated version of corel,
and found it to be more than acceptable. It has an undo
list that lets you select anything youve done to a work and
pull it out, even if you are already 10 steps past it.
As to your memory, it really depends on how long you can
stand to have your students wait. 32 is actually good enough.
If you plan to do Hi-res work, I would try to get 48 MB.
I also highly reccomend Zip drives. They cost $149, and
hold 100MB of info. the disks are $14 and I've never had
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737940794.79/warc/CC-MAIN-20151001221900-00077-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 573
| 10
|
https://fearby.com/installing-mongodb-onto-a-digital-ocean-ubuntu-14-04-server/
|
code
|
Ok, I want to develop and launch mobile apps and was planning on using MySQL as the database for storing the bulk of the data. After much research, I was concerned that MySQL would not scale if app demands spiked and or offer advanced features (like GeoQueries, partitioning, replication, scalability via thread pools etc) without moving to the more advanced (non-free) MySQL versions.
There are loads of free ways you can speed up a relational database by using indexes, optimising table structures, caching content in memory (OPCache for PHP) and using MySQL connection pools in PHP and running on dedicated (non-shared ) servers. I moved away from a multi-tenant CPanel based domain and looked into purchasing an Amazon EC2 server instance and associated products like AWS SQS but was blown away at the upfront costs and hidden charges. Google and others cloud server providers were not making my decision any easier.
I ended up purchasing unmanaged servers(1x CPU, 512MB RAM, 20Gb SSD and 1,000 GB Transfers) from http://www.digitalocean.com (see my guide on how to set one up here) for $5 a month. Digital Ocean allows you to scale a server up to a server as high as 20 CPU’s, 64Gb RAM, 540Gb SSD and 9TB transfers for $640 a month. Amazon would possibly charge you $10,000 a month. The good thing about Digital Ocean is they have awesome how-to guides.
NoSQL v Relational Database
I wanted to get away from using a relational database and use a distributed NoSQL database. Dataconomy.com have a good read on SQL, NoSQL and NewSQL databases here.
A relational database may be a good fit for some cases ( if normalisedd well ) but in my case, a document based NoSQL database would be perfect. If you are not sure what a relational or NoSQL database is read this and this.
Pros and Cons of NoSQL databases
When you are choosing a distributed NoSQL database you can only choose two of the following attributes.
- Consistency (C) – all nodes see the same data at the same time.
- Availability (A) – every request receives a response about whether it succeeded or failed.
- Partition tolerance (P) – the system continues to operate despite arbitrary partitioning due to network failures.
First I looked into CouchDB from http://www.cloudant.com , CouchDB was great and offered $50 USD of free credit a month before you get billed when using a slower multi-tenant server. $50 buys you approx 1,600,000 light reads or 300,000 heavy writes or 50GB storage a month, beyond that you would be charged for the number of API hits, size and throughput would be limited on multi-tenant servers. My old write up on Cloudant here and here.
CouchDB on Cloudant allows read/writes via secure REST-based queries and had a multi-master replication method (where writes were fast but replication eventually syncs the data across nodes). I really like Cloudant but it would have cost me $4,000 USD a month to move from a shared server to a dedicated (fully managed) server with a team of people monitoring my server’s performance 24/7. If money was no object I would use CouchDB on Cloudant.
The next option was MongoDB as it was similar to CouchDB but does not allow REST based access. MongoDB 3.2 offers Geo based queries that Cloudant did not offer unless I went to a dedicated server for $4,000 a month. MongoDB has loads of supported drivers for most languages (except Lua) and can be installed on most platforms. Time to install it and see how it performs.
MongoDB slide deck for developers.
MongoDB focuses on Consistency and Partition Tolerance over Availability. Having 3 servers in a cluster (replica set) does not mean you will get 3 times the read performance. By default, the primary server on the replica set is queried unless you change some options at the expense of data consistency (same data everywhere). If you want true scalability you need multiple shards (and replicas). Darn.
Setting up a Digital Ocean Server
I installed MongoDB onto a Digital Ocean server (unmanaged Ubuntu VM). If you need your own server follow my guide here: https://fearby.com/article/the-quickest-way-to-setup-a-scalable-development-ide-and-web-server for $5 a month.
Once you have a working Ubuntu Installation on Digital Ocean you can run these commands to install MongoDB 3.2.
sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv EA312927 echo "deb http://repo.mongodb.org/apt/ubuntu trusty/mongodb-org/3.2 multiverse" | sudo tee /etc/apt/sources.list sudo apt-get update sudo apt-get install -y mongodb-org sudo apt-get install -y mongodb-org=3.2.8 mongodb-org-server=3.2.8 mongodb-org-shell=3.2.8 mongodb-org-mongos=3.2.8 mongodb-org-tools=3.2.8
Commands to prevent any updates to this version
I am happy to keep this MongoDB version to 3.2, the following commands will prevent MongoDB version updates.
echo "mongodb-org hold" | sudo dpkg --set-selections echo "mongodb-org-server hold" | sudo dpkg --set-selections echo "mongodb-org-shell hold" | sudo dpkg --set-selections echo "mongodb-org-mongos hold" | sudo dpkg --set-selections echo "mongodb-org-tools hold" | sudo dpkg --set-selections
Enable Public connections on port 27017
sudo nano /etc/mongod.conf
Now comment out this IP to allow remote connections.
# bind_ip = 127.0.0.1
Enabling Firewall Access (if you want to talk to a MongoDB database elsewhere)
iptables -A INPUT -s REMOTE_MONGO_IP -p tcp --destination-port 27017 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -d REMOTE_MONGO_IP -p tcp --source-port 27017 -m state --state ESTABLISHED -j ACCEPT
MongoDB should now be installed, you can start and stop the service by running one for the following commands.
Starting and stopping the MongoDB service
sudo service mongod start sudo service mongod stop
Now you can import data as required and start building your database.
/usr/bin/mongoimport --db mynewdatabase --collection locations --drop --file ./my_data_to_import.json
MongoDB components and shell
Helpful guides and sites that helped me.
Secure your database (I used MongoChef, read my guide here).
Don’t forget to test your servers IP with shodan.io to ensure MongoDB is not open.
Donate and make this blog better
Ask a question or recommend an article
[contact-form-7 id=”30″ title=”Ask a Question”]
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510179.22/warc/CC-MAIN-20230926075508-20230926105508-00018.warc.gz
|
CC-MAIN-2023-40
| 6,258
| 41
|
http://elirrina.dreamwidth.org/2011/06/03/
|
code
|
My mobile phone is set to a tone that sounds like a telephone bell ringing. Thus,
Ca: Sarah, while you were away your phone rang. I mean, I think it was yours. It sounded like a real phone!
me: Yep, that's mine.
at small group-
me: Oh, sorry!
Chris: Your phone actually rings?!?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688997.70/warc/CC-MAIN-20170922145724-20170922165724-00321.warc.gz
|
CC-MAIN-2017-39
| 278
| 6
|
https://getattorneyrelief.com/3-reasons-you-must-watch-kdrama-extraordinary-attorney-woo/
|
code
|
3 Factors You MUST View Amazing Lawyer Woo
” Extraordinary Attorney Woo” is thought about a wonder in the Korean dramatization market when constantly establishing documents in viewership rankings. Beginning at 0.948% across the country score, the dramatization progressively advanced to 10% as well as struck 15% with current episodes. Below are 3 variables that make up the seeming success of “Extraordinary Attorney Woo”
Taken pleasure in the video clip? Assist us to obtain 100k customers
► SUBSCRIBE to BBALI DRAMA → https://www.youtube.com/channel/UCEhFgUsyEJrAlq_GoNGvaFw
► Hit such switch as well as ring the BELL to obtain notified of our brand-new video clips!
Please obtain in get in touch with (firstname.lastname@example.org) and also we will certainly manage it right away if any kind of proprietors have a concern with any of the uploads. Thanks for your collaboration!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.54/warc/CC-MAIN-20240418124808-20240418154808-00884.warc.gz
|
CC-MAIN-2024-18
| 897
| 6
|
https://community-imdb.sprinklr.com/conversations/imdbprocom/feedback-on-new-imdb-layout-and-navigation/63ed28f6a5589135ff2b2be2
|
code
|
Feedback on new imdb layout and navigation
It is much harder to navigate to the information I'm looking for now. It requires many more clicks because without the tabs at the top of each project and company pages, I have to click back to project or company home page each time I want to go from "actors" to "filmmakers" or "staff" to "clients" etc. I understand that websites are often looking to find ways to get more clicks, but as someone with tendonitis in my fingers, I can tell you that extra clicking back and forth is anti-accessibility. It also takes much longer to get information, and is not user-friendly... So overall, this update is a big downgrade from how the site layout used to work.
I hope others who have recognized this problem will vote this up. And if you disagree with me, please comment with whatever hacks you've found to make it work for you.
Thanks for listening.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00161.warc.gz
|
CC-MAIN-2023-50
| 890
| 4
|
http://tamingoftheblog.blogspot.com/2007/03/whats-written-expression-of-sniffing.html
|
code
|
I need to have one, because today is my favorite day of the year - a day for sniffing, indeed. You see, I have three favorite days each year - all subjectively determined by me and me alone. Here they are, counting down to today:
#3 - The first day I notice that it's staying light out later (March 3rd in 2007)
#2 - The day I start calling the air crisp. (last December sometime - it was a late one)
#1 - The day it first smells like Spring. You know what I mean. (TODAY)
Also, unrelatedly, Babel is heartbreaking, even if Melanie called it "uhhhh, pointless and stupid?"
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106984.52/warc/CC-MAIN-20170820185216-20170820205216-00651.warc.gz
|
CC-MAIN-2017-34
| 572
| 5
|
https://ledstrain.org/d/1171-google-sheets-deprecated-chrome-v68
|
code
|
Looks like Google finally did it. They don't say as much, but for a while google docs have all been popping up "this is no longer a supported version of chrome, upgrade now". But as of today, loading even an empty sheet in google sheets in chrome v68 results in "server error, please hit reload". Even on fresh installs or other systems or incognito. Happens right at the end, as the controls all finish loading. Planned obsolescence SUCKS.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363215.8/warc/CC-MAIN-20211205160950-20211205190950-00251.warc.gz
|
CC-MAIN-2021-49
| 440
| 1
|
https://developer.harness.io/docs/platform/get-started/platform-concepts/platform-overview/
|
code
|
Harness provides a fully-managed platform offering Harness products-as-a-service. Instead of managing the deployment and maintenance of Harness products, you can focus on utilizing their benefits.
Functionalities such as login, access control, secrets management, audit, and billing provide centralized account and organization management. You can manage your Harness resources from the UI or using the Terraform provider.
To know more about some of the Harness modules, watch the following video:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644683.18/warc/CC-MAIN-20230529042138-20230529072138-00202.warc.gz
|
CC-MAIN-2023-23
| 497
| 3
|
http://rockabyedad.com/post/31813998367/gary-clark-jr-performing-when-my-train-pulls-in
|
code
|
i am james, the rockabyedad. out numbered w/ 2 daughters and a gorgeous wife. music and family fill my world.
Gary Clark Jr. performing “When My Train Pulls In” on KCRW (by
8 months ago
comments powered by Disqus.
blog comments powered by
© rockabyedad 2012
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00056-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 262
| 6
|
http://askubuntu.com/questions/tagged/old-computer+drivers
|
code
|
I have an old computer which currently runs Windows XP. I want to give Ubuntu (v12.10) a try since I heard that it requires less RAM than XP to operate. Here are its specs: OS: Windows XP RAM: 1GB ...
I have just installed Xubuntu on a pretty old (12 years of age) PC and I am struggling to install the correct drivers for the GPU NVIDIA GeForce4 MX 420... I have managed to get "additional drivers" ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163985723/warc/CC-MAIN-20131204133305-00081-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 403
| 2
|
http://www.howtoforge.com/forums/showthread.php?t=18864&goto=nextnewest
|
code
|
happy new 2008!
i have a little problem here on 1 of my servers running debian etch 32bit and ispconfig 2.2.18
on the server there are more than 300 sites, but lastly after i added a new domain i got shared IP page when trying to access it via web (the domain points to the server).
in the ispconfig log i found these disturbing lines:
02.01.2008 - 10:20:39 => WARN - /root/ispconfig/scripts/lib/config.lib.php, Line 2447: WARNING: could not httpd -t &> /dev/null
02.01.2008 - 10:20:39 => WARN - /root/ispconfig/scripts/lib/config.lib.php, Line 2458: httpd syntax seems to contain errors, reloading with old configuration
... but after running httpd -t manually there is no error, only warning:
[Wed Jan 02 10:35:11 2008] [warn] VirtualHost 192.168.0.110:80 overlaps with VirtualHost 192.168.0.110:80, the first has precedence, perhaps you need a NameVirtualHost directive
... running /root/ispconfig/php/php -q /root/ispconfig/scripts/writeconf.php gives back:
do you have any suggestions?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770742.121/warc/CC-MAIN-20141217075250-00138-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 990
| 10
|
https://forum.arduino.cc/t/wich-sensor-to-be-used/494978
|
code
|
I have a project to realise and I'd like to have your ideas about. Having to points A and B so far away to each other (For example a building A and a building B distant to each other for 2000 m). The purpose of the project is to look for any object that touch a specific space limited by a volume between A and B.
- We use for this project a UAV in a fixed position above point A or B.
- We have to realise a mechanism, attatched to the UAV, to mount a sensor to be used for the scan.
My questions are :
- Which sensor should I use for a minimum of budget and that still gives accurate information in a high slant range (1000 m to 2000 m).
- Which Arduino card most suitable for my project.
Thanks so much.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488519735.70/warc/CC-MAIN-20210622190124-20210622220124-00513.warc.gz
|
CC-MAIN-2021-25
| 706
| 7
|
https://gitlab.kitware.com/paraview/paraview/-/issues/15226
|
code
|
Add tool bar button for annotate time, and other annotations
This issue was created automatically from an original Mantis Issue. Further discussion may take place here.
Please add a tool bar button to annotate time. If a person has time data, they will very often want this on.
Also, I have asked for additional annotations in bug 13645. Maybe make a button that goes to a dialog box that gives all of these items as options?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038084765.46/warc/CC-MAIN-20210415095505-20210415125505-00235.warc.gz
|
CC-MAIN-2021-17
| 425
| 4
|
https://www.caltech.edu/campus-life-events/calendar/quantum-matter-seminar-5
|
code
|
Quantum Matter Seminar
Please join the virtual seminar here https://caltech.zoom.us/j/6807641619
Universality is one of the guiding principles unifying the description of seemingly unrelated physical systems.
Kardar-Parisi-Zhang (KPZ) universality is a celebrated example, describing disparate phenomena such as interface growth or propagating shock waves.
Recently, KPZ was conjectured to also describe spin transport in one-dimensional Heisenberg quantum magnets near equilibrium and at infinite temperature.
We probe this conjecture experimentally in a quantum gas microscope in chains of up to 50 spins and confirm the expected superdiffusive spin transport predicted by KPZ.
Moreover, we study the microscopic mechanisms underlying KPZ in Heisenberg systems: Superdiffusive transport vanishes when breaking SU(2) symmetry or integrability of our system.
Finally, the single-spin sensitivity of our quantum gas microscope enables us to extract spin-transport statistics, which provides further direct evidence for the conjectured KPZ scaling.
Our results raise several interesting questions for future research, regarding, for example, the impact of different initial states on transport dynamics.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710941.43/warc/CC-MAIN-20221203212026-20221204002026-00567.warc.gz
|
CC-MAIN-2022-49
| 1,201
| 9
|
https://www.i-programmer.info/professional-programmer/i-programmer/3892-the-functional-view-of-the-new-languages.html?start=1
|
code
|
|The Functional View of the New Languages|
|Written by Eugen Kiss|
|Monday, 09 April 2012|
Page 2 of 3
A new hope
Due to the problems I observed with Haskell, I finally understood the appeal of languages like OCaml, Scala or F#.
Broadly speaking, they are similar to Haskell in that they emphasize functional paradigms, but they are strict, have first class support for mutability (apart from immutability) and imperative programming paradigms. Of course each of them comes with its own baggage of new concepts and ecosystem-wise there are quite a lot of differences.
So far I’ve tried to play a bit with Scala again, but.. I can’t really put my finger on it but I can’t like the language. It’s probably because Scala seems to be even quite a bit more complex than Haskell and there seem to be so many ways to achieve a task. F# seems to be too .NET centric and OCaml seems to have its share of its own problems but that doesn’t mean that I don’t want to check it out someday.
Choosing a language for a project
I think now it’s a good time to explain that I had a small to medium project in mind that I wanted to implement as elegantly as possible. In order to compare the different languages I tried to implement it in some of them.
I first started with Haskell. Algebraic datatypes, immutability, the help of the type system, automatically derived type classes, type classes in general and some syntactic virtues of Haskell made the beginning of the project really pleasant. However, when it came to state shuffling, monadic code paired with the unforgiving record (updating) syntax I soon felt that the elegance was gone.
Next in line was Java. Ironically, using the “unsexy” Java language I almost fully implemented my project, which hadn’t been the case for the Haskell version although I really felt that missing support for algebraic datatypes, immutability, null pointer safety, first class functions and closures, conciseness and the interlocking of namespaces, classes and files made a lot of things unnecessary cumbersome and unclear. For instance, I had to manually provide copy, equals and hash methods, I had to make silly classes like
Still, the uncumbersome way of writing down control flow, post-fix accessing of methods/fields on a class, great IDE support and first class field manipulation support made up for the weaknesses, that is, just so much that I still had motivation to almost finish the project.
I also tried to implement it with Scala but I ran into some problems that I could not solve elegantly so I didn’t get very far.
Wouldn’t it be great to combine the best parts of languages like Java and languages like Haskell without creating a language that is as complex as Scala?
Well, it turns out there are some interesting new alternative programming languages that make some of the wishes true or at least are able to improve some of the aforementioned pain points. Let me just list them and afterwards talk a bit about each:
Idris and Disciple are quite close to Haskell. I don’t actually know much about each of them apart from them being syntactically similar to Haskell but strict-by-default. This is what I discovered about their features on their respective homepages.
I never used a dependently typed language but what I understood broadly is that you can encode more properties about your program statically in the type system. The advantages notwithstanding, this seems to lead to far reaching implications regarding the practical usefulness of a language with respect to general purpose programming. Idris wants to find the sweet spot between practicality and power of the type system. In any case, I mostly listed the language here as a reminder for me to check it out sometime.
Disciple is not a dependently typed programming language. It is very similar to Haskell in that it even claims on its homepage that a lot of already written Haskell programs would be valid Disciple programs, albeit with some minor modifications here and there. The characterising feature of this language seems to be an effect system.
Without understanding what an effect system is or how this or that is implemented one can still take a look at the language overview on Disciple’s homepage and learn that seemingly the main complaints of mine regarding Haskell above are solved in Disciple. Namely, strict evaluation by default with optional lazy evaluation, first class mutability support, first class field manipulation support. Disciple seems to be great at first glance.
|Last Updated ( Monday, 09 April 2012 )|
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103322581.16/warc/CC-MAIN-20220626222503-20220627012503-00601.warc.gz
|
CC-MAIN-2022-27
| 4,566
| 21
|
https://0-www-ncbi-nlm-nih-gov.brum.beds.ac.uk/CBBresearch/Yu/logoddslogo/index.html
|
code
|
LogOddsLogo is a web based application designed to make the generation of sequence logos from biological sequence alignments simple. Building upon WebLogo 3 source code, LogOddsLogo uses per-observation multiple-alignment log-odds scores as measures of information content at each logo position. These measures have a proper statistical basis and, particularly for proteins, may outperform earlier measures in recognizing functionally relevant alignment columns.
A sequence logo is a graphical representation of an amino acid or nucleic acid multiple sequence alignment developed by Tom Schneider and Mike Stephens. Each position within a logo, corresponding to an alignment "column", consist of a stack of letters. The height of the stack indicates the sequence conservation at a position, while the height of each letter within the stack is proportional to the observed frequency of the corresponding amino acid or nucleotide at that position. In general, a sequence logo provides a richer and more precise description of a sequence motif than does a consensus sequence.
Yu YK, Capra JA, Stojmirovic A, Landsman D, Altschul, SF. Log-odds sequence logos. Bioinformatics 31:324-31, (2015).
Altschul SF, Wootton JC, Zaslavsky E, Yu YK. The construction and use of log-odds substitution scores for multiple sequence alignment. PLoS Comput Biol. 6:e1000852, (2010).
Crooks GE, Hon G, Chandonia JM, Brenner SE. WebLogo: A sequence logo generator. Genome Research 14:1188-1190, (2004).
Schneider TD, Stephens RM. Sequence logos: A new way to display consensus sequences. Nucleic Acids Res. 18:6097-6100, (1990).
We thank Zvezdana Stojmirovic for designing the banner for LogOddsLogo, and Leonardo Marino-Ramírez, Marc Gwadz, and Narmada Thanki for reviewing the website.
Please direct questions and feedback about LogOddsLogo to Yi-Kuo Yu.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038071212.27/warc/CC-MAIN-20210413000853-20210413030853-00438.warc.gz
|
CC-MAIN-2021-17
| 1,835
| 8
|
https://news.povray.org/povray.windows/thread/%3Cweb.54ae8b7cea42fc0bf6be753a0%40news.povray.org%3E/
|
code
|
I have been using POV-Ray for years when teaching and introduction to Astronomy
class. The computers in our lab have just been upgraded to windows 8 and POV-Ray
itself seems to be working great. However the built in help system does not seem
to allow students to select and display specific topic book marks. For example
they can do a search for the topic describing colors.inc but when they double
click on the topic or click on the display button, the window does not go to the
selected part of the help documentation.
Post a reply to this message
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474594.56/warc/CC-MAIN-20240225071740-20240225101740-00220.warc.gz
|
CC-MAIN-2024-10
| 549
| 8
|
https://bukkit.org/threads/easy-railways-bridging.478303/#post-3598989
|
code
|
Plugin category: Block Placement Minecraft version: 1.13 Suggested name: EasyRails? What I want: Similar to the way scaffolding can be chained off of the existing block (laterally) in the snapshots, I would like a way to do this with rails or other blocks. You might be able to view the code for how the scaffolding is handled and take inspiration from that. Allow a player to stand in one place and put down a powered rail line, ice bridge, cobble bridge, wall for a structure, fill an area with sand, etc. Use Case: IF: 1: A player is sneaking AND 2: would place an OFFHAND <Block / Rail>; //whitelist and blacklist defined in the config AND 3: The block they clicked on to place it is an existing block of that same type THEN: Their block will instead be placed laterally (in the direction the player is facing) at the end of the chain of identical blocks (on the same Y value). Blocks should not replace anything other than air. Blocks should only be removed from the player once/if a block has been successfully placed at the end of the chain. Rails types should trigger off of each other, rather than exact-match-only. A powered rail can be placed at the end of a line of regular rails or vice-versa, along with activator rails, etc. Optional: 1: Torches (and other light sources) will be placed 8 blocks apart, rather than 1. Redstone torches will be placed 15 blocks apart. 2: If a rail hits a single-block incline (or an existing inclined rail), it checks along the new, elevated Y-value from there forward, allowing for the occasional dip, or an intentional incline "straight up". 3: Block / Item placing sound should still play (at the player's position, not the block's). 4: Message that there is an obstruction if the block cannot be placed (also don't play the placed sound). Ideas for commands: No player commands. Ideas for permissions: I don't need them, but you can include some if you want. Perhaps OPs can disable the feature for specific players?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103645173.39/warc/CC-MAIN-20220629211420-20220630001420-00012.warc.gz
|
CC-MAIN-2022-27
| 1,967
| 1
|
https://community.spiceworks.com/topic/398721-hyper-v-server-2012-r2
|
code
|
I am trying to download the latest version of hyper-v server 2012 r2 standalone. I found this link here http:/
That is the correct link - I was able to download it yesterday.
Did you log in with an MS ID and fill out the information? It says you can click Cancel if you don't want to fill it out, but then you don't get the link.
I've filled out with my MS ID but never received an e-mail.
I tried the link. Logged in with my MSN id, and clicked Continue twice and it started downloading. Used Chrome.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512014.61/warc/CC-MAIN-20181018194005-20181018215505-00434.warc.gz
|
CC-MAIN-2018-43
| 501
| 5
|
https://forums.opentext.com/forums/developer/discussion/174028/highcharts-google-gadget-for-dashboard
|
code
|
OpenText technical experts collaborate with supported customers and partners in the Magellan product area.
Highcharts Google Gadget for Dashboard
Is it possible to use Highcharts in a google gadget for a dashboard? I've gotten Google Charts to work just fine within a google gadget, but I haven't been able to properly use Highcharts yet. When I try calling Highcharts with some sample code, all I get is a blank gadget.
If it is possible, does anyone have a working sample?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347435238.60/warc/CC-MAIN-20200603144014-20200603174014-00438.warc.gz
|
CC-MAIN-2020-24
| 474
| 4
|
https://bugs.java.com/bugdatabase/view_bug.do?bug_id=8148912
|
code
|
To improve the default strength of EC cryptography, EC keys less than 224 bits have been deactivated in certification path processing (via the "jdk.certpath.disabledAlgorithms" Security Property) and SSL/TLS/DTLS connections (via the "jdk.tls.disabledAlgorithms" Security Property) in JDK. Applications can update this restriction in the Security Properties and permit smaller key sizes if really needed (for example, "EC keySize < 192").
EC curves less than 256 bits are removed from the SSL/TLS/DTLS implementation in JDK. The new System Property, "jdk.tls.namedGroups", defines a list of enabled named curves for EC cipher suites in order of preference. If an application needs to customize the default enabled EC curves or the curves preference, please update the System Property accordingly. For example:
jdk.tls.namedGroups="secp256r1, secp384r1, secp521r1"
Note that the default enabled or customized EC curves follow the algorithm constraints. For example, the customized EC curves cannot re-activate the disabled EC keys defined by the Java Security Properties.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00481.warc.gz
|
CC-MAIN-2022-40
| 1,070
| 4
|
https://forum.kerbalspaceprogram.com/index.php?/profile/190367-tiriss/content/&type=forums_topic_post&change_section=1
|
code
|
"object reference not set to an object" Orbital Re-engineering in KSP Discussion Posted August 12 The main reason I'm posting this is if you run into the same problem, I have found a minor work around of this feature (not necessarily a bug) but while moving parts around on larger stations, I have gotten this error. Here is a screenshot of the bug when you have an engineer moving parts in EVA. The issue is that Senior Clampotron highlighted won't move anywhere. There's no way to use the move tools, or placement tools to migrate it anywhere and throws the exception every time. You cannot reroot a part or assembly in space (probably the underlying issue). The work around I used was to detach the T crossbar assembly (with the 2 sub-systems) rotate the entire thing 180 degrees and reattach the large clampotron (which I was trying to move) and reattach to the main T column so it looks like this. I was able to move the other clampotron to the miner/lander., it then looks like this. You can see I moved the highlighted clampotron to the miner/lander.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587770.37/warc/CC-MAIN-20211025220214-20211026010214-00478.warc.gz
|
CC-MAIN-2021-43
| 1,057
| 1
|
https://azuresdkdocs.blob.core.windows.net/$web/javascript/azure-arm-cosmosdb/16.0.0-beta.3/classes/restorablesqlresourcesimpl.html
|
code
|
Class containing RestorableSqlResources operations.
Return a list of database and container combo that exist on the account at the given timestamp and location. This helps in scenarios to validate what resources exist at given timestamp and location. This API requires 'Microsoft.DocumentDB/locations/restorableDatabaseAccounts/.../read' permission.
Cosmos DB region, with spaces between words and each word capitalized.
The instanceId GUID of a restorable database account.
The options parameters.
Generated using TypeDoc
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499953.47/warc/CC-MAIN-20230201211725-20230202001725-00352.warc.gz
|
CC-MAIN-2023-06
| 522
| 6
|
https://visionist.consulting/whats-new/
|
code
|
What’s New at Visionist Consulting?
Visionist Consulting are the digital transformation specialists, bringing you expert solutions. Read all of the latest news and industry updates right here.
Visionist is a G-Cloud 12 Crown Commercial Services Supplier
Visionist is an approved supplier in the UK Government’s Digital Marketplace. Visionist has once again renewed its...
Visionist Consulting Joins Smarter Business Group
It is with great pride that Visionist Consulting announces the union with Smarter Business Group.
UK Government Supplier Accreditation
Visionist renews its position as an approved supplier on UK government procurement list
Visionist & The Greenpower Challenge
Visionist Consulting’s two teams race into Greenpower Challenge finals
The Lasting Benefits of Lean Thinking
Would your business benefit from improved focus, less waste and increased customer value?
Is your Data Locked In?
Some of you may or may not have heard of the term Software Defined Networking (SDN), regardless for me it is Cloud for the Network.
What Is A Blockchain? Building Trust In Bitcoin
Financial processes are dependent upon mutual trust between all parties involved.
The Miniaturisation of IT and Data Centres
I am a proud iPhone 6s + owner, when I hold my iPhone up I wonder how…
The Technology Landscape In The Year 2025
It is easy to predict what is coming up for the next year but thinking further out is always a challenge.
To Digitally Transform Your Organisation...
Who we're partnering with:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950528.96/warc/CC-MAIN-20230402105054-20230402135054-00170.warc.gz
|
CC-MAIN-2023-14
| 1,507
| 22
|
https://community.spiceworks.com/topic/2335015-conditional-access-rules-for-hybrid-ad-joined-devices
|
code
|
We are fresh to Office 365 in a hybrid environment. We wanted to limit access to only allow our domain joined devices. Our conditional access rules work fine if we do not check the "Require Hybrid Azure AD joined device" option. Once this is checked our test user is unable to access their email.
We are synching our devices to Azure, the devices we test are in fact Hybrid Azure AD joined...is there something else we should be considering or are missing? We see mixed results on errors but the biggest issue is not being able to open Outlook (locally installed). Sometimes its the error of not being able to access the store, today it was repeated password prompts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506481.17/warc/CC-MAIN-20230923130827-20230923160827-00647.warc.gz
|
CC-MAIN-2023-40
| 667
| 2
|
https://security.stackexchange.com/users/184664/idrees-ashraf
|
code
|
I have 6+ years of experience in iOS Development and 1 year of experience in Android Development.
Examples of my work includes E-Commerce apps, REST API calls, SOAP API calls, XML Parsing, JSON Parsing, Push Notifications and Games, Photo and Video Processing and Manipulation apps, Video streaming apps, Location based and Map kit, Accelerometer, OCR.
Experienced in In-app purchases, iAds, Admob, Flurry, Facebook / Twitter / LinkedIn Integration, Calling web services for the communication between the app and web server, Sqlite 3, Core Data, live stream.
Delivers High Quality work without any crashing and Memory leaks. I write Clean code which can be easily understood.
Full attention from Requirements Analysis to development, testing and submission on iTunes.
I have experience in using Git.
Being a senior iOS Developer it is my responsibility to focus on each step from requirement analysis to deployment.
Member for 2 years, 6 months
0 profile views
Last seen Jul 29 '20 at 21:56
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178383355.93/warc/CC-MAIN-20210308082315-20210308112315-00160.warc.gz
|
CC-MAIN-2021-10
| 990
| 10
|
https://java.tutorialink.com/tag/spring/page/3/
|
code
|
Now I know how to findBySomething on root level entity. Let’s say I have a one to many relation of class -> student I can now students/search/findByName?name=Tom But it will give me Tom in all classes. Can I do something like classes/1/students/search/findByName?name=Tom It gives error right now. Answer in StudentController in StudentService in StudentRepository (I use mongoDB; if u use
My Vaadin application used to work fine, but now when I want to start it the application is stuck at running npm install: 2022-10-02 15:24:49.482 INFO 27004 — [ main] dev-updater : Running npm install to resolve and optionally download frontend dependencies. This may take a moment, please stand by… And I cant find a way to fix that. Thanks
I am using the graph api: to get the particular user’s profile photo with my access token. In postman I am able to see the image using the above get call. In my spring-boot application I am using like below: I am getting below error: I have defined RestTemplate like: Could someone please help me with this? Answer You need
I have 2 classes, Aircraft and Operator, with a one to many relationship from Operator to Aircraft. A findAll() call on the Operator table, which has around 10k rows, from the JPA Repository runs quickly, in just a few seconds, but the findAll() call on the Aircraft table, which has around 65k rows, sometimes takes minutes to execute. Also, I’ve
I have created a reusable method that returns the headers, status, and body of an HTTP call using the Spring webclient’s exchange method. I want to capture the 4xx and 5xx errors in the method itself and log the response body. However, i am not able to return/throw custom exception when 4xx or 5xx error occurs. Here is the reusable
I have a Spring Boot application with a YAML configuration that contains a feature list like this: I would like to use @ConditionalOnExpression to conditionally initialize beans related to those features, identifying them by keys. Since “features” property is a list, it seems I need collection selection to do this. I have tried these two options for the annotation’s value:
I have service like this: How can I run method2 without transaction or in new transaction? Can I run in my controller class this 2 method like this: Answer @Transactional is powered by Aspect-Oriented Programming. Therefore, processing occurs when a bean is called from another bean. You can resolve this problem by self-inject create another bean.
I’m using Java 17, spring-boot 2.7.3 and spring 5.3.22 dependencies. I have prototyped beans as follows: My application class: I annotated the InsertTransactionDetailsByScheduleAPIInteractor also as prototype in order to have a new instance of the inner beans per schedule execution, but somehow the @Scheduled method only runs when I have a singleton InsertTransactionDetailsByScheduleAPIInteractor bean, which in my use case I
I have an application that consumes a REST service from another server, which has its own authentication method to be able to consume its services. Today, for each request we have, I am calling the authentication service then i receivethe bearerToken (which has a duration of 3 hours) and after that I call the endpoint I want to use. The
I have an User class: And an UpdateUserDTO class: And an UserDTO class: I’ve used Model Mapper to map the updated fields from updateUserDTO to user, which comes from the DB. My test class looks like this: But the first Mockito.when() line does not even compile, because mapper.map() is a void method, so it does not expect any return values.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499829.29/warc/CC-MAIN-20230130201044-20230130231044-00879.warc.gz
|
CC-MAIN-2023-06
| 3,594
| 10
|
https://s.sudonull.com/?q=flask
|
code
|
Welcome to Flask — Flask Documentation (1.1.x)
Welcome to Flask's documentation. Get started with Installation and then get an overview with the Quickstart. Common patterns are described in the Patterns for Flask section.
GitHub - pallets/flask: The Python micro framework for building web...
Flask is a lightweight WSGI web application framework. It is designed to make getting started quick and easy, with the Flask offers suggestions, but doesn't enforce any dependencies or project layout.
Flask (web framework) - Wikipedia
Flask is a micro web framework written in Python. It is classified as a microframework because it does not require particular tools or libraries. It has no database abstraction layer, form validation, or any other components where pre-existing third-party libraries provide common functions.
Flask · PyPI
Flask is a lightweight WSGI web application framework. It is designed to make getting started quick and easy, with the ability to scale up to complex applications. A Simple Example. from flask import Flask.
Flask - Quick Guide - Tutorialspoint
Flask - Quick Guide - Web Application Framework or simply Web Framework represents a collection of libraries and modules that enables a web application developer to write application.
Flask - Full Stack Python
Why is Flask a good web framework choice? Flask is considered more Pythonic than the Django web framework because in common situations the equivalent Flask web application is more explicit.
Flask is a Python micro-framework for web development. Flask is easy to get started with and a great way to build websites and web applications.
Flask download | SourceForge.net
Free. Windows, Mac OS, Linux. Flask is a lightweight WSGI web application framework designed to help developers get started with their web applications quickly and easily with the ability to scale up to...
Flask Basics - Flask tutorial - OverIQ.com
Hello World in Flask # Let's start our venture into Flask by creating a simple application that outputs "Hello World". Flask Basics. Last updated on July 27, 2020.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305341.76/warc/CC-MAIN-20220128013529-20220128043529-00453.warc.gz
|
CC-MAIN-2022-05
| 2,070
| 17
|
https://eic.cefet-rj.br/ppcic/index.php/linhas-de-pesquisa/?lang=en
|
code
|
The multidisciplinary nature of this research area allows involved researchers and students to acquire a solid and broad training due to the applicability in several domains and the knowledge of the various facets of the addressed problems.
Data Analytics and Applications
The Data Management and Applications area encompass both the aspects related to the data structure, data storage, and location as well as the process of producing information and extracting knowledge from the data. Research in this area involves data structures and algorithms to support the data knowledge extraction process, as well as in the application and development of functions for preprocessing, machine learning and post-processing of data. In this area, it is appropriate to establish a datacentric treatment for those processes which, commonly, correspond to in-silico experiments.
This research area is dependent on the addressed problem domain and has a strong multidisciplinary character. The application of this research area are commonly observed in the government, scientific and business areas. In the government area, one can highlight applications in the areas of planning, health, transportation, education, and communication. In the scientific area, applications in astronomy, seismic and drugs stand out. In the business area, we highlight the development of software for the Information Technology market and its applications in marketing, social networks, multimedia systems, and smart cities. All these domains bring with them different technologies present in the data production and consumption area that can be exemplified from the Internet of Things (IoT), sensor networks to interactive applications.
In this flood of data, applications particular features and demands bring numerous challenges in managing large volumes of data. Regarding large volumes of data processing, there is also a pressing need to use high-performance processing (PAD) to achieve large-scale data analysis. There are significant challenges in the establishment of these analyzes, usually modeled as workflows. In these workflows, activities, and data are directed to execution in some PAD environment (e.g., clusters, grids, clouds).
The different applications, while presenting themselves as applied research, often provide the opportunity to elaborate new theoretical frameworks in basic research, of a more general character, for the solution of these practical problems. Basic research occurs both in establishing representations that are agnostic to the medium in which they will be performed, as well as in the elaboration of new functions that are more appropriate to the different data sources and that have a broad spectrum of use.
Machine Learning and Optimization
Much of the advances in Data Science related to extracting knowledge from data have been achieved through the application of machine learning and optimization techniques. Activities in this research project involve the development and application of machine learning and optimization techniques, as well as designing and using efficient algorithms for the analysis, understanding, forecasting, and description of complex problems in several domains, such as Biology, Computer Science, Engineering, Finances, Health, Logistics, among others.
Optimization is an area of expertise that works on modeling and developing efficient algorithms for solving both fundamental and applied optimization problems. Regarding the development of efficient optimization algorithms, one may classify them as either Exact, Heuristic or Hybrid. When talking about exact methods, common approaches are based on Linear Programming, Integer Programming, and Non-linear Optimization. As for Heuristics, Artificial Intelligence techniques and Metaheuristics are the usual approaches. At last, Hybrid methods consists in combining Exact, Heuristic, Data Mining, and High-Performance Computing techniques, in order to bypass difficulties of one of the previously explained classes of methods.
Machine Learning (ML) is a subarea of Artificial Intelligence that investigates how machines can learn some tasks once being provided with a set of experiences (in the form of historical data). Two subareas of ML are of particular interest to our research group: Deep Learning and Reinforcement Learning. Deep Learning encompasses a set of techniques devised to simulate human brain-behavior in tasks such as visual recognition, speech recognition, and natural language processing. These techniques attempt to produce high-level hierarchical representations of the input data, through layers of sequential processing. Reinforcement learning is concerned with how software agents can rationally execute actions in an environment in order to maximize their reward. RL can be applied to several tasks, such as planning, scheduling, games, and more.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129257.81/warc/CC-MAIN-20200711224142-20200712014142-00204.warc.gz
|
CC-MAIN-2020-29
| 4,867
| 10
|
https://answers.ea.com/t5/EA-General-Questions/help-me-to-buy-fifa-16/m-p/5404152
|
code
|
i ve trouble with buyying fifa16... althought i enter my credit debit number , its been given faoult number of 5001... help me out
Is that the error number you get when trying to use your credit card? We are just a player helping player forum and we can't help with purchasing a game. For that, you need to contact a game advisor. Follow the link: https://help.ea.com .
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146562.94/warc/CC-MAIN-20200226211749-20200227001749-00114.warc.gz
|
CC-MAIN-2020-10
| 369
| 2
|
https://gitlab.com/gitlab-org/gitlab/-/issues/225496
|
code
|
[Feature flag] Enable Alert Setting dropdown
We want to remove the feature flag :
Feature.enable(:alert_integrations_dropdown) when it is deemed safe to do so.
:alert_integrations_dropdown feature flag
### What are we expecting to happen?
The alert settings dropdown will be available.
What might happen if this goes wrong?
The alert settings dropdown will not be available.
Roll Out Steps
- Enable on staging
- Test on staging
- Ensure that documentation has been updated - !35233 (merged)
- Enable on GitLab.com for individual groups/projects listed above and verify behaviour
- [-] Coordinate a time to enable the flag with
- [-] Announce on the issue an estimated time this will be enabled on GitLab.com
Enable on GitLab.com by running chatops command in
Cross post chatops slack command to
#support_gitlab-com(more guidance when this is necessary in the dev docs) and in your team channel
- Announce on the issue that the flag has been enabled
- Remove feature flag and add changelog entry - !36296 (merged)
After the flag removal is deployed, clean up the feature flag by running chatops command in
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735867.94/warc/CC-MAIN-20200804131928-20200804161928-00583.warc.gz
|
CC-MAIN-2020-34
| 1,104
| 21
|
https://www.catalyzex.com/paper/arxiv:2004.00139
|
code
|
We introduce a dictionary containing forms of common words in various Swiss German dialects normalized into High German. As Swiss German is, for now, a predominantly spoken language, there is a significant variation in the written forms, even between speakers of the same dialect. To alleviate the uncertainty associated with this diversity, we complement the pairs of Swiss German - High German words with the Swiss German phonetic transcriptions (SAMPA). This dictionary becomes thus the first resource to combine large-scale spontaneous translation with phonetic transcriptions. Moreover, we control for the regional distribution and insure the equal representation of the major Swiss dialects. The coupling of the phonetic and written Swiss German forms is powerful. We show that they are sufficient to train a Transformer-based phoneme to grapheme model that generates credible novel Swiss German writings. In addition, we show that the inverse mapping - from graphemes to phonemes - can be modeled with a transformer trained with the novel dictionary. This generation of pronunciations for previously unknown words is key in training extensible automated speech recognition (ASR) systems, which are key beneficiaries of this dictionary.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107890586.57/warc/CC-MAIN-20201026061044-20201026091044-00178.warc.gz
|
CC-MAIN-2020-45
| 1,242
| 1
|
https://forums.freebsd.org/threads/abnt2-keyboard.80367/page-2
|
code
|
Interesting. 'vga' gave the hint where to look. I could reproduce the situation. Apparently there is a correlation between VGA mode and displayed characters.hw.vga.textmode=0
hw.vga.textmodeand set the parameters down below into loader.conf(5):
Option 1: screen.textmode=0 Option 2: If you want a higher screen resolution and smaller font size set instead vbe_max_resolution="n" # Replace "n" with desired resolution. # See loader.conf(5) for predefined values or set custom. screen.font="nxn" # For font size see /boot/fonts
ã õ ç
no "/?°₢" (alt + q / w / e / c )
is there any way to upload something to patch this once and for all ...
Don't worry, no problem at all.Sorry if is a noob question
Yes. Please attach the patch to the problem report. After filing the PR drop a note here in this thread of the PR number. I will follow on bugzilla, contribute if necessary.do you want me to include this patch in the bug report explaining the situation right?
Could you provide me an alternate patch with the ₢ symbol even if it's not functional please?You can file a bug report at https://bugs.freebsd.org and propose the extra characters to be included to the 'br' key map with the patch file attached down below.
It modifies br.kbd, AltGr + q / w / e to print / , ? , ° .
No cruzeiro sign. Unicode hex 0x20a2 for ₢ has no effect in console, only a rectangle is printed. The cruzeiro sign is not alone, many of the currency symbols are not displayed.
Sure.Could you provide me an alternate patch with the ₢ symbol even if it's not functional please?
setxkbdmap -variant abnt2 -layout br).
2. The keyboard is supposed to generate it
Now i am realizing that the ABNT2 uses "€" instead of "°" too .-.Some pictures of real keyboards that don't have the copyright symbol there.
Layout de teclado Português - ABNT2 com símbolo do Euro (€) - GitHub - fellipec/abnteuro: Layout de teclado Português - ABNT2 com símbolo do Euro (€)github.com
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662562410.53/warc/CC-MAIN-20220524014636-20220524044636-00200.warc.gz
|
CC-MAIN-2022-21
| 1,954
| 16
|
http://mrs-slick.blogspot.com/2012/06/radio-silence.html
|
code
|
This will be my last post about our adoption journey until it's all done.
It makes me sad to do this but it's necessary and I understand the reasons. If you'd like to know the reasons, I'll be happy to share - just not over a public space. And if you have questions - shoot me an email :)
But that doesn't mean I'm done here. I guess I'll shift my focus from our story to informational types of things with random mixed in.
I will say though that things are going well and I'm still very happy with all of our decisions and the process so far.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589172.41/warc/CC-MAIN-20180716021858-20180716041858-00117.warc.gz
|
CC-MAIN-2018-30
| 543
| 4
|
https://maker.pro/arduino/projects/arduino-mpu6050-interactive-scrolling-game-on-32x8-led-matrix
|
code
|
How to make an interesting interactive game, on a 32 by 8 LED matrix module, which is controlled by moving the device
This time I will show you how to make an interesting interactive game, on a 32 by 8 LED matrix, which is controlled by moving the device. During a certain movement of the device, the MPU6050 sensor sends a signal to the microcontroller, and based on that information, the microcontroller performs a given action on the screen.
In fact, the sensor represents a so-called air controller that we can find as part of remote controls for modern TVs. The project is featured on Benjamin Balogh's GiHub page (https://github.com/benibalogh/LEDMatrix-Games), where you can find the original code. The source code is made in Visual Studio with support for Arduino, known as Visual Micro.
Unfortunately, after compiling and uploading the original code to the Arduino, the device did not process data from MPU6050, and only scrolled the text "Wall Scroller". I tried to contact the author several times, but without success. After certain time of studying the code, with one small modification, I managed to adapt it. Also, instead of Visual Micro, I compiled it into a standard Arduino IDE.
To compile the code without errors, you should open the code from the given folder that contains all the required libraries. Let me emphasize that if you have previously installed any of these libraries in the Arduino IDE, you should delete them. I also added some simple tones to the code that don't interfere with gameplay and make the game much more interesting.
The device is extremely simple to build and consists of only few components:
- Arduino nano microcontroller
- MPU6050 Gyroscope + Accelerometer sensor module
- 32x8 Led matrix module with MAX7219 drivers
- Battery, optionally like in my case one 3.7 Volts Lithium battery with charger, and boost module. Of cource you can use ordinary 9V battery, or external Power Supply.
- and two switches
If you want to make a PCB for this project, or for any other electronic project, PCBway is a great choice for you. PCBway is one of the most experienced PCB manufacturing company in China in field of PCB prototype and fabrication. They have a large online community where you can find a Open Source projects, and you can also share your project there. From my personal experience I can tell you that on this community you can find many useful projects with alredy designed PCBs, from where you can place an order directly.
Finally, the device is installed in a suitable case made of PVC board and covered with colored wallpaper.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00822.warc.gz
|
CC-MAIN-2024-10
| 2,584
| 13
|
http://www.dreamincode.net/forums/topic/232146-adding-records-to-access-database/
|
code
|
I have the databindings all set and can select different records, but can not add a new one.
I have tried BindingSource.AddNew.row() but can't figure out how to add data to the new row, nor does it show in the database.
I have tried
Dim ds As New myDataSet '<---Change this to the dataset name on your form Dim dr As DataRow dr = ds.Tables("Students").NewRow dr.Item(1) = "2" dr.Item(2) = "3" dr.Item(3) = "4" ds.Tables(0).Rows.Add(dr) If ds.HasChanges(DataRowState.Added) Then Me.StudentsTableAdapter.Update(ds.Tables("Students").GetChanges(DataRowState.Added)) End If
But that doesn't do anything at all. No data added, no errors.
I have tried updating a datagrid to be told it can't be updated when bound.
I look on google and nothing seems to relate to adding data to an access database when bound to the project through the datasource wizard.
I just want to learn how to do this but am stuck. Please don't say that I should use another method or whatever, I want to learn this way at the moment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.4/warc/CC-MAIN-20170322212950-00164-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 1,000
| 8
|
https://www.itprotoday.com/devops-and-software-development/produce-pivot-tables-programmatically
|
code
|
For sometime now, I've used Microsoft Excel as my primary VBScript reporting medium. It's easy to sort and organize data in Excel, and in general, Excel is easy to use. I've also found that most people are familiar with it. Team members and managers seem to like Excel because they can easily add their own touches, such as charts and colors, to reports before passing them on to upper management.
Not too long ago, I was manually creating a pivot table that displayed a count of locked-out accounts for an NT domain administration report. I decided to try scripting this functionality. I had tried my hand at scripting pivot tables in the past, but the Microsoft documentation and Visual Basic for Applications (VBA) macros just didn't give me the syntax structure I needed. I had found most of the pieces of this puzzle. I just needed to find the missing few, then put all the pieces together. After an exhaustive trial-and-error period and actually walking away from the project for a couple of months, I decided to give it another shot. It took a couple of long nights, but I finally got all the pieces to fit. The result was two scripts: PivotTable.vbs and PivotTable2.vbs.
PivotTable.vbs creates a pivot table that shows a quarterly breakdown of three roommates and their contributions toward living expenses. PivotTable2.vbs constructs a pivot table for locked-out accounts. It also contains some advanced functionality not included in the first script.
A Look at PivotTable.vbs
Listing 1 shows PivotTable.vbs. The first part of the script sets up the Excel spreadsheet and creates the main worksheet called Quarterly Bills. Note that headers are required in the first row when you create a pivot table.
The code at callout A in Listing 1 builds the sample data to be used in the pivot table. The randomly created test data consists of three roommate names, three types of utilities, the amount paid to the utility, and the quarter the payment was made. Although this example is basic, it paints a clear picture of how you can start producing pivot tables programmatically.
The code at callout B in Listing 1 creates a new worksheet called Summary. The pivot table will reside in this worksheet. The code then selects Quarterly Bills (i.e., the main worksheet that contains the data).
The pivot table creation process begins by calling the PivotTableWizard method, which provides an interface to Excel's PivotTable Wizard. As callout C in Listing 1 shows, I use the method's SourceType argument to specify the type of data source for the pivot table. In this case, I set SourceType to the xlDatabase constant, which specifies the type as an Excel database. There are other constants such as xlExternal (specifies the type as another application) you can use, but this example will concentrate on getting data from the current spreadsheet. Next, I define the range of cells in which the data resides in the Excel database. You have to be precise here. In most cases, the starting point of the range will be A1. The endpoint of the range is the last row and column of data. The column can be hard-coded. In this case, I know that the last column is D because the headers are hard-coded. The code stores the endpoint row in a variable called lastrow. Next, I set the pivot table's destination, which is the Summary worksheet, starting at row 1, column 1. Finally, I provide the name of the database, which is Quarterly Bills.
The lines at callout D in Listing 1 define how the pivot table is constructed. There are three main pieces: row fields, column fields, and data fields. The code uses the Orientation property to define these fields. The Orientation value of 1 specifies a row field, 2 specifies a column field, and 4 specifies a data field. The code also names each field. In this example, the roommates' names and type of utility will appear in the rows labeled Name and Description, respectively. The column containing the quarter the payment was made will appear in a column labeled Quarter. The data field is labeled Amount. Note that the PivotTable Wizard automatically prepends Sum of to Amount, so the data field will appear as Sum of Amount, as Table 1 shows. The PivotTable Wizard also automatically calculates the Grand Total values. In addition, the PivotTable Wizard calculates subtotal values, which the wizard automatically labels as Jack Total, Joe Total, and Judy Total in Table 1.
The two lines after callout D simply close the interface to Excel's PivotTable Wizard. Note that Microsoft Office 2000 doesn't have field-header functionality for pivot tables, so if you're going to use this script with Office 2000 only, you should add the On Error Resume Next statement to the beginning of the script or comment out the line at callout E in Listing 1.
You might want to try switching the Orientation values for the row and column fields to see different layouts for the pivot table. For example, if you change the Orientation value from 1 to 2 in the code
Xl.ActiveSheet.PivotTables _ ("Quarterly Bills"). _PivotFields _ ("Description").Orientation = 1
the electricity, telephone, and water data will appear in columns rather than rows. This layout works well if you have only a few unique values for a field. If you have a lot of different values, you'll probably want to list the field as a row; otherwise, you'll have to scroll right to see all the columns in the spreadsheet.
You need to leave the data-field orientation alone. In this example, that would be the code
Xl.ActiveSheet.PivotTables _ ("Quarterly Bills") _.PivotFields _ ("Amount").Orientation = 4
A Look at PivotTable2.vbs
PivotTable2.vbs creates a worksheet called Test and populates it with a small list of user account data under the headers UserID, Account Locked, and Disabled Account. Listing 2 shows an excerpt from PivotTable2.vbs. You can download the entire script (as well as PivotTable.vbs) from the Windows Scripting Solutions Web site. Go to http://www.windowsitpro.com/windowsscripting, enter 45502 in the InstantDoc ID text box, then click the 45502.zip hotlink.
PivotTable2.vbs is similar to PivotTable.vbs, except that PivotTable2.vbs programmatically resolves the value for the lastcell variable and filters the test data so that the pivot table displays only specific values (i.e., locked accounts). First, PivotTable2.vbs populates the spreadsheet with the test data. Next, the script programmatically obtains the value for the lastcell variable, as callout A in Listing 2 shows. Now if you add new headers, you don't have to manually go in and change the range. The code at callout A uses the SpecialCells method with the value of 11, which represents the xlLastCell constant. The Address property returns the cell row and column. The xllastcell variable stores this information, which the script uses in the PivotTableWizard method call, which callout B in Listing 2 shows.
The code at callout C in Listing 2 illustrates how to use the Subtotals property to suppress subtotals in a pivot table. This property has 12 elements, which Table 2 lists. Setting an element to True indicates you want a subtotal for that element; setting an element to False means you don't want a subtotal for that element. You always get at least one subtotal (i.e., a count of records) in a pivot table, even if you suppress all the subtotal elements. In PivotTable2.vbs, I suppressed all the elements and used the unsuppressable subtotal for the Grand Total row count of all the locked accounts.
The last key task that PivotTable2.vbs performs is displaying the locked accounts. When I first worked on scripting this task, I thought that I'd just have to specify the values I wanted to see. However, contrary to the way I thought it would work, I discovered I had to filter out every value in a specific field that I didn't want to appear by setting its Visible property to False. For this example, there are only two possible values for the Account Locked status: Yes (i.e., the account is locked) and No (i.e., the account isn't locked). So, I set the Visible property to False for those data fields that have the value of No in the Account Locked column, as the code at callout D in Listing 2 shows. In this code, PivotTables(xldata) refers to the source worksheet (i.e., the Test worksheet. PivotFields("Account Locked") refers to the column with the Account Locked header. And PivotItems("No") selects those data fields that have the value of No under this header; the code excludes these data fields by setting the Visible property value to False. Therefore, only locked-out accounts will be appear in the pivot table.
Using and Adapting the Scripts
To use PivotTable.vbs and PivotTable2.vbs, you need to be running Windows 2000 or later and Microsoft Office 2000 or later. After you run and experiment with these scripts, you can adapt them to create pivot tables that display data from your organization. To help you find the methods and properties you need, you can use the resources mentioned in the sidebar "How to Learn About Excel's Methods and Properties."
|HOW TO LEARN ABOUT EXCEL'S METHODS AND PROPERTIES|
Microsoft Excel's macro recorder is an excellent resource for learning about how to write Excel-specific code that you want to incorporate into VBScript scripts. To use the macro recorder for this purpose, you simply need to record a macro while you perform the actions you want your script to perform, then open that macro for editing. In most cases, when you look at the recorded macro, you'll find the methods and properties that you need to use.
You can use the Object Browser or the Immediate pane in Excel's Visual Basic Editor to obtain the values for constants, such as xlLastCell or xlMinimized. To access the Object Browser and Immediate pane, bring up Visual Basic Editor by pressing Alt+F11, then press F2 to get the Object Browser and Ctrl+G to get the Immediate pane. Let's say that you want to find the value for the xlLastCell constant. To use the Object Browser, enter xlLastCell in the text box next to the binocular icon, then click that icon. To use the Immediate pane, type
MsgBox xlLastCellin the pane, then press Enter. In both cases, the value of 11 appears.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00724.warc.gz
|
CC-MAIN-2023-23
| 10,202
| 26
|
https://devforum.zoom.us/t/zoom-meeting-web-sdk-on-android-styling-issue/83490
|
code
|
I am using meeting sdk for web version → 2.9.7
I want to use zoom meeting web sdk on mobile web as well (both on android and ios). When i join the meeting on my mobile web on android it does not resize the view to mobile view, but on ios it works perfectly.
I noticed on clicking the full screen button on android it resizes the window to fit the mobile view (after that it looks similar to ios view)
Welcome to the Developer Forum @tech.admin! Thanks for sharing those details. Can you also share a screenshot of the Zoom Meeting Web SDK on the mobile web both on Android and IOS?
Hi @donte.zoom ,
i was able to resolve the above issue. Thanks for replying. Now I am stuck in another error. So we are trying to run zoom on webview, it works fine for iOS but i am not getting any audio for android webview (we are using react-native-webview). On debugging I found that the sdk is giving this error:
“droped audio data before init”
in file → 1502_js_audio_worklet.min.js:1
Thanks for the context. Are you able to share the entire error stack trace? This will help us diagnose what may be happening. Also, you are integrating the Zoom Meeting SDK into React Native application?
Hey @donte.zoom , I was able to solve for this issue as well. Thank you for your reply. We can close this issue
I’m currently facing this issue in ChromeOS running inside an iframe with the WebSDK component view in embedded mode:
BTW, audio works outside the iframe and iframe permissions seem to be OK.
What was the solution for you?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100399.81/warc/CC-MAIN-20231202105028-20231202135028-00240.warc.gz
|
CC-MAIN-2023-50
| 1,520
| 13
|