url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://community.act.com/t5/Act/E-mails/td-p/355
code
Couple of questions for you anout this issue, what version of ACT are you using and how do you have email set up through ACT? Does the windows actually disappear, or just go behind the ACT program, basically losing focus? I would like to ask a few more follow up questions. Does this happen every time you attempt to write an email? When you say you use Outlook, are you using Outlook with ACT Email, orjust direct Outlook Integration? Ie: When you click on an email address, do you get the ACTEmail Program, or just a brand new Outlook email window? And last, do you have any antivirus or firewall software and if so, what kind? It doesn't happen every time, but does happen about 75% of the time. Yes- Outlook with ACT, I click on customer email addresss and the outlook through ACT window pops open, I start typing, in the middle of typing, the window minimizes, I maximize it, the data I've been typing while the window was minimized does not appear so I have to retype the portion of the message that was being typed while the window was minimized - my theory is that this may be happening when I am receiving an e-mail
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370493684.2/warc/CC-MAIN-20200329015008-20200329045008-00318.warc.gz
CC-MAIN-2020-16
1,124
7
https://www.thefaithfulsidekicks.com/hey-thats-my-fish-review/
code
There is a sweet spot in game design, in my opinion. A game that is intended to appeal to a wide audience should be simple to learn, simple to teach, have few rules, and should present interesting choices at every step. Hey, That’s My Fish does that and more. It’s quick to play (less than 20 minutes – most rounds I’ve played have been less than 15), quick to learn and teach, and appeals to a wide range of ages and tastes. In Hey, That’s My Fish, players take on the role of penguins who are trying to (unsurprisingly from the title and art work) eat fish. The game is played on a field of hex-shaped pieces, each of which contains 1, 2, or 3 fish. Players take turn placing their penguins and once all are placed, they move from hex tile to hex tile, eating fish. Once a penguin leaves a tile, they take that tile since it’s now “eaten”. This means that there is now a hole in the board. Penguins can not jump over these holes, so each player must plan carefully to maximize the amount of fish they can take, planning their routes Once the board is completely “consumed”. players count up how many fish they took. The player with the most is the winner. Hey That’s My Fish is a great light strategy game. It’s very family friendly and plays very quickly. Because the board is laid out randomly each game, there is a lot of replay. There are digital versions available on IOS and Android. A great light family-friendly strategy game!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948217723.97/warc/CC-MAIN-20240305024700-20240305054700-00102.warc.gz
CC-MAIN-2024-10
1,460
9
https://www.blackhatworld.com/seo/a-website-is-publishing-my-feed-beating-me-on-serp-what-to-do.477671/
code
Hello everybody, I find a website is copying my all content and ranking well on search engines. That website is beating my website. And also I lost my search engine traffic heavily. That website is a kind of feed publishing website. What its doing is subscribing my feed and publishing my feed with opening my site in iframe. I also did not get any link back from that website. They implement a redirect script on link back. What should I do? I can post url of that website here, just ask.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210249.41/warc/CC-MAIN-20180815181003-20180815201003-00234.warc.gz
CC-MAIN-2018-34
489
1
https://greasyfork.org/en/scripts/37351-tab-de-throttler
code
Plays very quiet audio in order to prevent Panda Crazy (or other scripts) from being throttled. Newer versions of Firefox and Chrome will throttle tabs in the background and make scripts like Panda Crazy not work as well. You can move tabs to their own window and keep them visible, but this doesn't work for everyone. NOTE: In order for this script to work in the current version of Chrome (and maybe Firefox, I don't know), you must click somewhere on the page Panda Crazy is running on for this script to work. You can also press the Enter key (it doesn't matter where, just somewhere on the page). You have to do this every time you open Panda Crazy.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347385193.5/warc/CC-MAIN-20200524210325-20200525000325-00465.warc.gz
CC-MAIN-2020-24
654
3
https://www.this-edition.com/portfolio/coaching-for-good/
code
About Bike for Good Bike for Good is a non-profit organisation that refurbish, repair and teach communities how to maintain bicycles; once you have the skills a bike is for good. They use the bike to do good actions: they improve the environment, teach skills, and improve mental and physical health. Bike for Good started in July 2010, unfunded in a small stall in Glasgow’s famous Barras market. 7 years later they have two branches. An amazing team of 50 + individuals, and they changed thousands of lives.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494986.94/warc/CC-MAIN-20230127132641-20230127162641-00822.warc.gz
CC-MAIN-2023-06
511
3
https://propakistani.pk/2009/09/17/oracle-unveils-exadata-version-2-the-first-database-machine-for-oltp/
code
The world’s first OLTP Database Machine has been unveiled by Oracle and Sun. The Exadata Database Machine Version 2, is the world’s fastest machine for both data warehousing and online transaction processing (OLTP). Built using industry standard hardware components plus FlashFire technology from Sun, Oracle Database 11g Release 2 and Oracle Exadata Storage Server Software Release 11.2, the Sun Oracle Database Machine Version 2 is twice as fast as Version 1 for data warehousing. The Sun Oracle Database Machine goes beyond data warehousing applications with the addition of Exadata Smart Flash Cache based on Sun FlashFire technology to deliver extreme performance and scalability for online transaction processing (OLTP). Exadata Version 2 is available in four models: full rack (8 database servers and 14 storage servers), half-rack (4 database servers and 7 storage servers), quarter-rack (2 database servers and 3 storage servers) and a basic system (1 database server and 1 storage server). All four Exadata configurations are available immediately. With the Sun Oracle Database Machine, Oracle customers can store more than ten-times the amount of data and search data more than ten-times faster without making any changes to applications. Hardware from Sun - Sun’s FlashFire memory cards enable high performance OLTP - 80% Faster CPUs – Intel Xeon (Nehalem) processors - 50% Faster Disks – 600 GB SAS Disks at 6 Gigabits/second - 200% Faster Memory – DDR3 memory - 125% More Memory – 72 Gigabytes per database server - 100% Faster Network – 40 Gigabits/second InfiniBand - Raw disk capacity of 100 TB (SAS) or 336 TB (SATA) per rack Software from Oracle - Features the world’s first flash-enabled database – Oracle 11g Release 2 - Hybrid columnar compression for 10-50 times data compression - Scans on compressed data for even faster query execution - Storage Indexes to further reduce disk I/Os - Offloading of query processing to storage using Smart Scans - Smart scans of Data Mining models in storage servers - Applications running on the Sun Oracle Database Machine achieve up to 1 Million I/O Operations per Second to Flash Storage
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401643509.96/warc/CC-MAIN-20200929123413-20200929153413-00534.warc.gz
CC-MAIN-2020-40
2,169
20
https://dailyexcessive.com/video-yesterday-army-men-shot-at-ipob-members-during-protest-in-aba-but-it-could-not-penetrate-watch-video/
code
Soldiers retreated from interfering in a protest by members of the Indigenous People of Biafra (IPOB) in Aba, Abia State on Monday. The said soldiers retreated from the protest respectively which there was no fun shot and beating of protesters Watch Video Below: Next articleFinally! China openly apologises to the world, pleads for total forgiveness for causing COVID-19 Outbreak
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991921.61/warc/CC-MAIN-20210516232554-20210517022554-00512.warc.gz
CC-MAIN-2021-21
380
4
http://area51.phpbb.com/phpBB/viewtopic.php?p=233367
code
Arty wrote:I think whole logic in that pull request is wrong. 1. Include forum's default language pack 2. If user's language pack is different from default, include it too First of all, it doesn't check for template inheritance. Language variables are used only in templates, therefore template inheritance must apply to language files as well. Good point. I'll need to work on checking for template inheritance. Second, why include two files? Second file will override first file, making first include pointless. I think translations should include all text, not only modified lines. Fallback. What if the second file (user's language) does not include some of the variables used in the template, but they are present in the board default language file? Third, what about English pack? Most styles include only English imageset. If a forum has default language different from English, point of default language pack will fail. English is default on new phpBB installations and must be present in all MODs (and therefore, now in any styles that include language variables). I do agree that if the board default is different from English it won't find the file if one is not present, but that is why it also checks for the user specified language as well. I think this would be correct logic: 1. Check if template inheritance is active, if it is go to #1a, if its not go to #2a 1a. Include user's language pack from original template if it exists 1b. If #1a failed, include forum default's language pack from original template 1c. If #1b failed, include English language pack from original template 2a. Include user's language pack for current template if #1a - #1c failed. 2b. If #2a failed, include forum's default language pack 2c. If #2b failed, include English language pack I'll think about this a bit more and work on trying to get template inheritance implemented.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697843948/warc/CC-MAIN-20130516095043-00061-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,871
18
https://www.jetbrains.com/help/clion/notifications.html
code
All notifications and events that occur in CLion are gathered in the Notifications tool window. You can open the tool window by clicking the corresponding tool window bar on the right side of the editor. Alternatively, from the main menu, select . The tool window can also open messages that you can see in the status bar: click a message to view it in the tool window. On the right, you can find the Notifications tool window bar. Click it to quickly open the tool window. The indicator next to the tool window title marks new notifications and their importance: a blue dot marks regular events and unimportant suggestions. A red dot marks errors and important suggestions. The Timeline area lists notifications and events that take place in CLion in sequential order. Notifications remain in the tool window until you manually clear them or until you reopen your project. To configure your IDE's notifications settings, open settings by pressing Ctrl+Alt+S and navigate to . Alternatively, open the Notifications dialog by hovering a notification and clicking the vertical ellipsis icon () in Suggestions or the gear icon () in the Timeline notification.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00546.warc.gz
CC-MAIN-2022-40
1,156
9
https://www.elon.edu/u/news/2023/10/20/amanda-chunco-publishes-an-article-on-reproducibility-in-ecological-analyses/
code
Chunco, associate professor of environmental studies, was part of a consortium of scientists who studied the question of whether some of the problems with reproducibility might result from decisions scientists make when analyzing data. Reproducibility in scientific experiments is an increasingly recognized issue in the sciences. Several recent studies have shown that replicating previously published experimental results can result in wildly different outcomes from the original study. To date, most studies of reproducibility have focused on how experiments were designed. However, reproducibility in data analysis has rarely been considered. Amanda Chunco, associate professor of environmental studies, was part of a consortium of scientists who studied the question of whether some of the problems with reproducibility might result from decisions scientists make when analyzing data. To do so, scientists were given one of two real datasets from studies designed to answer a specific hypothesis in ecology. One study looked at whether baby birds with more siblings grew more slowly because of competition with siblings. The other study measured how the amount of grass cover affected the growth of Eucalyptus seedlings. The scientists were then asked to analyze the data they were given, draw conclusions, and write the methods and results section of a paper based on their findings. Importantly, each of the 174 different scientific teams involved did their analyses and statistical tests completely independently from each other. Then, each resulting analysis was reviewed by a different team of scientists acting as peer reviewers. Despite the datasets being identical, each scientist made different choices in how to appropriately analyze the data. For both datasets, results from the independent teams varied widely. This variability was not just in the statistical strength of the hypothesis test, but whether or not a team concluded that the data supported the hypotheses themselves. This study is the first of its kind in ecology and will shape how ecologists think about statistics and experimental design in the future. The article was published as a preprint on EcoEvoRxiv and was profiled in the journal Nature.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818105.48/warc/CC-MAIN-20240422082202-20240422112202-00835.warc.gz
CC-MAIN-2024-18
2,229
6
https://www.glitchedpolygons.com/store-infos/
code
The products we sell on our store are developed entirely by us and 100% of the money we make with them will be reinvested in our video game projects. If you buy our assets, first of all: you're awesome! We can't thank you enough for your support and for helping us produce better content and grow. Second of all: you can use the acquired content across all of your projects freely (be it for commercial or non-commercial purposes). The only thing you can't do is resell our assets directly as they are (like e.g. on your own asset store). For software and editor extensions the "one licence per seat" rule applies. But other than that, you can do whatever you want with the digital goods you buy on our store.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867095.70/warc/CC-MAIN-20180624215228-20180624235228-00350.warc.gz
CC-MAIN-2018-26
709
4
https://www.postjobfree.com/resume/addfek/contact-chef-airport-mumbai-india
code
KOMAL .H. NEGI E/**, vishank apt, Contact no: 976-***-**** To work and grow in reputed organization where I can improve my skills and knowledge and also achieve objectives of organization. Name of exam Year of passing Internet and E-mail Operation. Pursuit my Hotel Management degree from Rizvi College of Hotel management & catering operation, Bandra West. Worked in EATS & TREATS cafe as commi 1 for last 5months. Worked in PVR CINEMAS as COMMI 2 for 3years. Six month training in COURTYARD BY MARRIOTT Mumbai International Airport. Name : Komal .H. Negi Contact No. / Mobile : 976-***-**** Date of birth : 6th September,1992 Religion : Hindu Nationality : Indian Marital status : Single I hereby, declare that the above information provided by me is true and correct to the best of my knowledge. (KOMAL .H. NEGI)
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057033.33/warc/CC-MAIN-20210920070754-20210920100754-00591.warc.gz
CC-MAIN-2021-39
815
19
http://beapot.com/2018/11/19/your-first-toolkit-project/
code
Ever since starting at Branch VFX I’ve been trying to figure out how to setup different Shotgun features. Shotgun’s own documentation seems to be… Well, let’s just say that it’s aimed at people who already have a pretty good idea of what they are doing and don’t need a step by step tutorial. So I decided to write some stuff up as I go on this mildly boring adventure to help me remember exactly how to do different things, and maybe it’ll help other people who are trying to learn Shotgun’s many awesome features. So what is Shotgun Toolkit? As I understand it, the toolkit is Shotgun’s attempt to build a fully functional pipeline that is technically ready to use out of the box. Toolkit will organize your folder and file structure, figure out which shot and task you’re working on at any given time, let you save and open files in a standardized way in it’s supported apps, publish a finished file so other departments can pick it up, etc. It’s really an amazing piece of software. But toolkit is (mostly?) a backend system. If you have an existing pipeline (let’s say you’re in love with the way your Maya saves files) you can integrate it into toolkit. So Shotgun took the time to build the front end of the pipeline as well, and named it ‘Shotgun Desktop’. Desktop has a few basic apps that have very clear names like Publisher and Loader that kind of tells you what they do. Before we begin This post will describe setting up a project called ‘Madness’. Toolkit expects at least two network file locations. One for storing the production data (plates, Maya files, references, etc) and one for configuration files. In my setup these locations are: - Production files: /Volumes/beapot/jobs - Config files: /Volumes/beapot/software/shotgun As you can see I’m using a mac os machine, so if you’re using windows your path will look something like Z:\jobs and Z:\software\shotgun. You can name your folders what ever you like, but jobs and software/shogun are pretty standard. Getting the software you need The first thing I did (after creating an project on our studio’s Shotgun site) was to google how to setup Shotgun toolkit. I got this link. It looks like it’s exactly the thing I needed only… the very first item in the table of contents is “Deprecation Note”. Get used to it. Half the time my searches lead to old documentation that has nothing to do with the current way Shotgun or Toolkit work. On the positive side, the old documentation always leads to the new one. To download and install Shotgun desktop follow the instructions here. It’s pretty straight forward, though it goes into details that might be unclear to new users. They mention a lot of Desktop’s app but the only ones you will see right away are the project browser and maybe the publisher. The rest of the apps are only available once you are in one of the DCC apps, and even then only if they were launched via the project browser or the Shotgun site. To install Shotgun desktop: At this point you might think you are done. After all, you can see your project and if you have any DCC apps installed you can even launch them from the desktop. The Shotgun Panel will load with them and you’ll be able to see your assigned tasks. But… The only apps you’ll have access to will be the Loader and the Publisher. You will not be able to save via the Shotgun menu for example. Strange isn’t it? Where is toolkit hiding? Turns out that installing Desktop is only the very first step in setting up toolkit. The instructions for actually setting up a project can be found here. And by here I mean here. Yes, there are 31 sections to read BEFORE you get to the part where you can actually see anything useful in Desktop. Don’t get me wrong, each of these sections is important, interesting, and will give you a better understanding of what toolkit is, but all I wanted to do was to open a file in Maya. It’s also named kind of funny ‘Taking over a Pipeline Configuration’. Who are we taking it over from? I’m not sure why it’s not just called setting up a (toolkit) project, especially since the command to run it is called ‘Advanced Project Setup’. Advance Project Setup Once you find them, the instructions are very simple to follow. Here’s a short version: - Click the SG icon in your system tray to see a list of available projects - Click the project you want to setup - Once you see the apps right click and select ‘Advance project setup…’ - The toolkit setup wizard will start - Select a Configuration: A toolkit configuration is a massive set of files (mostly text files) that define how the pipeline works. If it’s the first time you’re running the setup and you’ve never created a configuration of your own, you should select the ‘Shotgun Default’ option since it’s a good place to start. If you already setup a configuration you don’t really need to be reading this post, but you probably want to select one of the other options (set up from an existing, a git server, etc). - Define Storages: There are all sorts of storage types in the world. What Shotgun means in this case is where do you want to save your production files? This is the root folder for ALL of your projects. So we’ll select /Volumes/beapot/jobs. Note you can define here three types of paths, one for each type of supported os (linux, windows, mac os). I like putting all three in since you never know when a new os will be introduced into your pipeline. - Project Folder Name: This is the root folder for the specific project you’re setting up. In our case it’s ‘madness’. So type in madness into the name field and watch as the full path updates at the bottom of the screen to /Volumes/beapot/jobs/madness - Select Configuration Location: Now we tell toolkit where to save its own files. In our case it’ll be /Volumes/beapot/software/shotgun/madness. Notice that this time it doesn’t take two steps to define your storage option, you enter the full path. - Now just run the setup. It will take a few minutes but at the end of it you will have your first project setup with toolkit. If you’ve used the default settings you should now be able to simply launch into a DCC app (say Maya) and play with the options that will appear on the new Shotgun menu.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145708.59/warc/CC-MAIN-20200222150029-20200222180029-00030.warc.gz
CC-MAIN-2020-10
6,321
31
https://www.tomshardware.com/uk/author/caroline-dunn
code
In this project, we’ll build a digital photo frame with our Raspberry Pi with photos updating dynamically from Google photos. In this tutorial, we’ll challenge our Raspberry Pi to a game of Rock Paper Scissors Lizard Spock while learning an easy way to create GUIs. What if your Raspberry Pi could monitor your 3D print job, send a text, and pause your print if something looks awry? Train your Raspberry Pi to recognize you and members of your family and receive email notifications when someone is identified. Express yourself through scrolling text across your face mask with a flex NeoPixel matrix and Raspberry Pi. Never be without a roll. Using a Raspberry Pi and a sensor, you can get an email when you’re out of toilet paper. Doctors advise you to wash your hands for at least 20 seconds. This Raspberry Pi project will help make sure you’re doing it for that long.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703521139.30/warc/CC-MAIN-20210120151257-20210120181257-00216.warc.gz
CC-MAIN-2021-04
881
7
https://wrapper.tanukisoftware.com/doc/english/prop-description.html
code
DO NOT modify any of these parameters unless you have read this property description. Incorrect settings can cause the Wrapper to fail to operate as expected. The Service Description to use in error messages, events, etc. On Windows, this property is used to register the Wrapper as a Windows Service. Changes on this property will not take effect until the Windows Service is reinstalled. Starting with Wrapper version 3.3.0, for historical reasons, this property defaults to the value taking over from the
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00281.warc.gz
CC-MAIN-2023-23
507
6
http://java.sys-con.com/node/3056747
code
|By Kevin Benedict|| |April 16, 2014 10:45 AM EDT|| By Peter Rogers, Principal Mobility Architect, Cognizant There has been a lot of media attention on Heartbleed and as always that means a lot of bizarre and often conflicting advice. I sat down (for a very long time) to find the truth of the matter and bring it together in one single article for those involved in enterprise mobility. What is Heartbleed? "The [Heartbleed] bug is in the OpenSSL's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520). When it is exploited it leads to the leak of memory contents from the server to the client, and from the client to the server. The bug was introduced to OpenSSL in December 2011 and has been out in the wild since OpenSSL release 1.0.1 on 14th of March 2012. OpenSSL 1.0.1g released on 7th of April 2014 fixes the bug." "An attacker can retrieve a block of memory of the server up to 64kb. There is no limit on the number of attacks that can be performed. The attacker has no control over the memory region where the block is read from. Sensitive information that can be obtained is: SSL private keys; Basic authorization strings (username / password combinations); and source code [most important also cookies]. This bug affects both sides of the connection. Not only will client certificates not save you from having to update your server certificate, they can be read from the client (along with your username, password etc.) by any server you connect to." "The Heartbleed bug is an example of Buffer Over-Read and that means that the offending OpenSSL heartbeat code does not check that this length is the actual length sent in the heartbeat request, allowing the request to ask for more data than it should be able to retrieve. The code then copies the amount of data indicated by the length from the incoming message to the outgoing message. If the length is longer than the incoming message, the software just keeps copying data past the end of the message. Since the length variable is 16 bits, you can request up to 65,535 bytes from memory. The data that lives past the end of the incoming message is from a kind of no-man's land that the program should not be accessing and may contain data left behind from other parts of OpenSSL." The non-technical explanation from XKCD is slightly easier to follow (http://xkcd.com/1354/). The important thing to note is that not only can a client potentially read data from a server but the converse is also true. This impacts mobile clients too and although Apple claim they are safe there were allegedly concerns around Android 4.1.1. If a client application is vulnerable on a mobile or desktop device then equally the server can act as a honey trap to steal information from the client. Web browser software and IM clients are the biggest concern, so please make sure you don't use obscure and vulnerable software. Who is stealing what and why? The important question is how we got into this mess. The first thing to point out is that this is not a floor in SSL/TSP, instead it is an implementation problem in the open source OpenSSL library. A major contributing factor has been that TLS versions 1.2 came with OpenSSL 1.0.1 and after the BEAST attack everyone rushed to implement TLS 1.2. The current theory doing the rounds is that the NSA had already ‘found ways around' SSL some time ago and this could have been by taking advantage of the Heartbleed bug. It is however noted that Man in the Middle (MITM) techniques are far easier, especially as some large companies act as their own Certificate Authority (CA). Edward Snowden leaked the existence of BULLRUN (a highly classified decryption program run by the NSA) and subsequently Edgehill (a similar program run by GCHQ) which subsequently prompted Google to double the size of their encryptions keys. We know that a number of companies knew about the vulnerability before it went public because they stated they had applied the patches at least a week ago. If you think about it a minute then OpenSSL is open source code which meant anybody could have worked it out and kept it a secret. They say the exploit leaves no trace and so nobody actually knows if they have been targeted. Actually that statement isn't strictly true. A single heartbeat can potentially grab 64K of memory however an attacker can either keep reconnecting or during an active TLS connection keep requesting arbitrary number of 64 kilobyte chunks of memory content. There are now companies who are configuring their network monitoring software to watch for abnormal behaviour such as Fox-IT, who have developed a set of Snort signatures to detect successful exploitation of the bug. The most important thing is what happens next and most hackers will be after what Heartbleed.com classes as primary key material. "These are the crown jewels, the encryption keys themselves. Leaked secret keys allows the attacker to decrypt any past and future traffic to the protected services and to impersonate the service at will. Any protection given by the encryption and the signatures in the X.509 certificates can be bypassed. Recovery from this leak requires patching the vulnerability, revocation of the compromised keys and reissuing and redistributing new keys. Even doing all this will still leave any traffic intercepted by the attacker in the past still vulnerable to decryption. All this has to be done by the owners of the services." Let's imagine that a service provider has been using a vulnerable version of Open SSL 1.0.1 and the types of hacker that may target them based on time ranges: - Soon after the vulnerability was released (14th of March 2012) - Two or three weeks before the announcement was made public but was still being discussed in hushed circles - Ever since the announcement (April 7th) - Ever since the Heartbleed proof of concepts went live (April 8th) The first group are likely to be very serious hackers or even possibly Government sponsored activities which are nothing to worry about unless you are of significant danger to anyone. The second group are likely to be serious hackers or service providers testing out vulnerabilities in their systems (and potentially partner solutions) after they learn of the issues. The third group is the rest of the world and depends on the general availability of OpenSSL vulnerability scanning software at that date. The fourth group covers hobbyist hackers because the proof of concepts are open source and highly available. Unfortunately as of April 8th then anyone in the world can now test for this vulnerability using this widely shared Python Script (https://gist.github.com/takeshixx/10107280) and that puts it in the domain of hobbyists. Anyone can now dump a bit of RAM from a vulnerable server. It would definitely take a professional who can write their own script to make repeated heartbeats attacks and then got lucky with the timing of a server restart on a vulnerable operating system to be able to pull out a private encryption key. However, even an amateur can use Session Hijacking which means you look for cookies containing session IDs. In a single grab of memory then you are equally as likely to obtain a session ID or a username and password combination, and this is slightly harder to track for abnormal behaviour. An example of which is running the Python proof of concept against a vulnerable JIRA ticketing system and pulling out a JSESSIONID (which is JIRA's way of tracking your HTTP session). If the system requires authentication then you can just insert the stolen cookie into the browser and become that user on the JIRA installation. (https://www.mattslifebytes.com/?p=533) Can you actually steal a private key? The Heartbleed bug is an example of buffer over-read and here is the offending code for the programmers amongst us: p = &s->s3->rrec.data hbtype = *p++; pl = p; buffer = OPENSSL_malloc(1 + 2 + payload + padding); bp = buffer; memcpy(bp, pl, payload); In NGINX, the keys are loaded immediately when the process is started, which puts the keys very low in the memory space. This makes it unlikely that incoming requests will be allocated with a lower address space. If NGINX is reloaded, it starts a new process and loads the keys right away, putting them at a low address. On NGINX you can therefore retrieve user credentials, cookies and even public parts of the certificate but so far not the private part. It all depends therefore on the operating system and how often the servers are restarted. CloudFlare have even issued a challenge by leaving a server running nginx-1.5.13 linked against OpenSSL 1.0.1.f on Ubuntu 13.10 x86_6 That said there appears to be a proof of concept working on Apache for a first request which corresponds with the server being rebooted. The Certificate Revocation Tsunami There is a genuine importance to the CloudFlare challenge and that is that if private keys can be stolen then there will be a whole lot of companies requesting certificates all at once leading to a so called Certificate Revocation Tsunami. Certificate Authorities are supposed to revoke certificates within 24 hours if there is any evidence of a key compromise. However, even if all of the affected certificates were to be revoked, contemporary web browser software handles certificate revocation poorly. For example, some browsers only perform OCSP revocation checks for Extended Validation certificates, while others ignore certificate revocation lists completely. The other concern is the rush to create new certificates will lead to incorrect certificates being generated which in turn leads to Man In The Middle (MITM) exploits down the line. "The certificate authority infrastructure was never built to do a mass revocation of this many certificates and because of the way the infrastructure is built, if you did do a mass revocation of millions of certificates it would significantly slow down the performance of the Internet itself, which is potentially very, very bad." "Such is the haste to fix the fallout of the Heartbleed bug, some certificate authorities and website administrators have been making careless mistakes. PayPal's Hosted Message Applications, such as the one at https://view.paypal-communication.com, are now using Extended Validation certificates issued by VeriSign on 10 April 2014. The CAB Forum requires certificate authorities to adhere to a stringent set of guidelines [pdf] when issuing EV certificates, and it is the CA's responsibility to verify the accuracy of the information in the certificate. In particular, they must verify that the legal name of the subject in an EV certificate matches the name which appears on official government records. However, this verification does not appear to have been performed correctly in the case of these certificates." How can I protect myself? "Only 30,000 of the 500,000+ SSL certificates affected by the Heartbleed bug have been reissued up until today, and even fewer certificates have been revoked. Some of the first sites to deploy newly issued certificates in response to the OpenSSL vulnerability included Yahoo, Adobe, CloudFlare, DuckDuckGo, GitHub, Reddit , Launchpad, PayPal, Netflix and Amazon's CloudFront content delivery network." - a web based test - a python script to test for the vulnerability from the command line - for Chrome you can install the Chromebleed checker that alerts you when visiting a vulnerable site Vendors are recommended to perform the following operations: - Upgrade the OpenSSL version to 1.0.1g (you can also recompile your OpenSSL 1.0.1 with the compile time option -DOPENSSL_NO_HEARTBEATS) - Request revocation of the current SSL certificate - Regenerate your private key - Request and replace the SSL certificate - Restart your services Upgrading to OpenSSL 1.0.1g does not automatically restart your services and likewise certificate revocation and replacement is a whole different step from ‘patching your server'. - If a vendor does not restart their services then their sessions are still vulnerable - Even if a vendor does revoke their certificates then some web browsers ignore the revocation - If a vendor does not replace their certificates then if their private key was stolen then they are wide open If we look at the situation with WordPress then it appears they applied the patches but may not have replaced their certificates yet. I can also see smaller companies forgetting to restart their services after apply the OpenSSL 1.0.1g upgrade. Should I change my password? If you look at this list of vendors and their statements then the following rules apply: - You are safe if a vendor never used OpenSSL (remember SSL isn't broken itself, just one implementation of it including heartbeats) - You are safe if a vendor used an earlier version of OpenSSL (0.9.8 / 1.0.0) - You are moderately safe if a vendor upgraded to OpenSSL 1.0.1g, restarted their services and issued new certificates, before the public announcement on April 7th (apart from in the case of serious hackers) - You are at risk if a vendor upgraded to OpenSSL 1.0.1g, restarted their services and issued new certificates, sometime after April 7th (the longer the gap the higher the risk) and should change your passwords - You are at risk if a vendor upgraded to OpenSSL 1.0.1g, restarted their services and has not issued new certificates. You have a personal decision to make regarding changing passwords. o There is a small risk a private key could have been stolen and so even if you change your password then the site could still be vulnerable and you just gave your new password away o That said if the key did not get stolen then changing passwords prevents a hacker using your stolen details in the future. - You are at risk if a vendor either did not upgrade to OpenSSL 1.0.1g across all their services or forgot to restart their server. It is probably pretty pointless doing anything yet if that is the case. - You are at risk if a vendor made a nebulous statement like "We patched our servers" but was not drawn about restarting their services or issuing new certificates and should look to Internet forums - You are risk if a vendor has revoked their certificate but not issues a new certificate yet. Your web browser may ignore the certificate revocation and be open to MITM attacks. - You are at risk if you used client side software using a vulnerable version of OpenSSL and could have leaked confidential information from your desktop or mobile device o Double check the application that you use on Internet forums especially web browsers and IM clients - Most vendors are going to tell you to change your passwords anyway but check the details as above - Making your password really long is good practise but is no deterrent whatsoever from Heartbleed and you run the obvious risk of forgetting it or revealing it to hackers waiting for all the password resets Imagine a hacker did target Vendor X, based on watching the charts of companies requesting new certificates and targeting those who haven't yet. Let us presume they were running Operating System X (all we know is that NGINX probably isn't vulnerable and Apache potentially is - but it would require specific timing) and just as a server rebooted the private key was added to the top of the OpenSSL memory stack and at that precise moment a hacker somehow managed to make a first request with an OpenSSL heartbeat and steal the private key. If we imagine that Vendor X are rebooting their servers regularly and maybe there was an insider involved then it becomes all the more probable. Let us now imagine the servers have been upgraded to OpenSSL 1.0.1g and all the services restarted but that the old certificates are still up there. That means if you reset your passwords then it makes no difference whatsoever because the hacker can decrypt all the traffic using their stolen private key. Changing your password actually means that the hacker now has your new password and you think you are actually safe. The hacker may have already decrypted everything on the site using their private key and have all your confidential information but let's assume they haven't. Vendor X then issue new certificates and does not bother going back through the last two years of logs to look for Heartbleed attacks. You have absolutely no idea that the hacker stole your new password and you carry on using the service and update it with your new credit card details...you are completely surprised that your account has been hacked even though Vendor X patched their servers. That said, I would actually be more worried by the news that the majority of the traffic performing heartbeat vulnerability scans is apparently coming from various Government (thankfully not ours) sponsored cybercrime activity around the world. I would like to end by thanking all the Blogs that I have referenced in bringing together this hopefully definitive guide to Heartbleed. I am happy to hear your views on the matter so please feel free to email me. Kevin Benedict Senior Analyst, Digital Transformation, EBA, Center for the Future of Work Cognizant View my profile on LinkedIn Learn about mobile strategies at MobileEnterpriseStrategies.com Follow me on Twitter @krbenedict Browse the Mobile Solution Directory Join the Linkedin Group Strategic Enterprise Mobility Join the Google+ Community Mobile Enterprise Strategies Recommended Strategy Book Code Halos Recommended iPad App Code Halos for iPads ***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles. WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ... Jan. 20, 2017 02:30 AM EST Reads: 5,005 The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic... Jan. 20, 2017 02:00 AM EST Reads: 6,570 With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ... Jan. 20, 2017 01:45 AM EST Reads: 4,261 Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da... Jan. 20, 2017 12:45 AM EST Reads: 2,827 Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho... Jan. 20, 2017 12:45 AM EST Reads: 4,107 A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights. Jan. 20, 2017 12:00 AM EST Reads: 6,335 You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ... Jan. 19, 2017 09:45 PM EST Reads: 6,821 WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong. Jan. 19, 2017 09:45 PM EST Reads: 7,703 WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o... Jan. 19, 2017 07:30 PM EST Reads: 4,239 Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i... Jan. 19, 2017 05:30 PM EST Reads: 3,649 Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way. Jan. 19, 2017 05:15 PM EST Reads: 3,118 With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p... Jan. 19, 2017 04:45 PM EST Reads: 3,774 In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Jan. 19, 2017 04:00 PM EST Reads: 5,446 SYS-CON Events announced today that Catchpoint, a leading digital experience intelligence company, has been named “Silver Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Catchpoint Systems is a leading Digital Performance Analytics company that provides unparalleled insight into your customer-critical services to help you consistently deliver an amazing customer experience. Designed for digital business, C... Jan. 19, 2017 03:45 PM EST Reads: 1,808 @ThingsExpo has been named the ‘Top WebRTC Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @ThingsExpo ranked as the number one ‘WebRTC Influencer' followed by @DevOpsSummit at 55th. Jan. 19, 2017 02:00 PM EST Reads: 4,798 The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ... Jan. 19, 2017 01:15 PM EST Reads: 5,191 "There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci... Jan. 19, 2017 01:15 PM EST Reads: 5,697 20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Jan. 19, 2017 12:15 PM EST Reads: 4,317 SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c... Jan. 19, 2017 12:15 PM EST Reads: 2,037 In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc... Jan. 19, 2017 11:45 AM EST Reads: 1,732
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280801.0/warc/CC-MAIN-20170116095120-00246-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
28,390
114
http://technology.tki.org.nz/Technology-in-the-news/(tag)/Moore%E2%80%99s%20law
code
You can filter using keywords. Select a keyword under a news item to find others with the same keyword. If you look below the surface, you discover that technological progress is not random or erratic, it almost always follows... Read more » Moore’s law, technological revolution, change, progress, nature of technology Return to top ^ © Crown copyright.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257889.72/warc/CC-MAIN-20190525044705-20190525070705-00323.warc.gz
CC-MAIN-2019-22
358
6
https://packages.zeek.org/packages?page=8
code
A package that creates a log for sequences of packet lengths and times, allowing for new analytics based on these data features. Implementing coefficient of variation (standard deviation / average), sort of relative standard deviation. Attempts to detect an attacker calling to the VENOM Linux Rootkit https://security.web.cern.ch/security/venom.shtml Simple policy to detect VNC (RFB) scanners based on src->dst connection counts Detects Bitcoin, Litecoin, or other cryptocurrency mining traffic that uses getwork, getblocktemplate, or Stratum mining protocols over TCP or HTTP. This package used to be named "bro_bitcoin". Packet source plugin that provides native support for Endace DAG card and EndaceProbe Application Dock packet capture. EternalSafety is a Zeek package for detecting potentially-dangerous SMBv1 protocol violations that encapsulate bugs exploited by the infamous Eternal* family of Windows exploits. It is capable of detecting EternalBlue, EternalSynergy/EternalRomance, EternalChampion, and the DoublePulsar backdoor. However, rather than identifying these exploits via simple signature-matching, *EternalSafety* instead implements a set of SMBv1 protocol invariants that encapsulate techniques used by each Eternal* exploit to trigger bugs in unpatched Windows systems. EternalSafety accurately and reliably identifies the EternalBlue, EternalSynergy and EternalRomance exploits, and the DoublePulsar backdoor implant. Due to limitations in Zeek's SMBv1 support, it has limited support for detecting EternalChampion via signature-matching. EternalSafety also identifies a range of other protocol violations, such as the use of unimplemented/unused SMBv1 commands, server-initiated changes in values that may only be set by an SMBv1 client, and incorrect interleaving of transaction types.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446709929.63/warc/CC-MAIN-20221126212945-20221127002945-00597.warc.gz
CC-MAIN-2022-49
1,813
7
https://community.developer.visa.com/t5/Use-Cases/Visa-Checkout-API/td-p/5817
code
Found the issue - the “Update Payment Information API” cannot be used to update the transaction amount or other transaction details. It is used only to update vco with the status of the checkout transaction. There is a different API “updateIntent” to set the transaction total. This is usually invoked only once via the UI screens(behind the checkout widget). Once this is done the transaction total cannot be changed anymore. The Checkout product as it currently stands does not have the capability to perform multiple “updateIntents” per checkout session. Does this help? Was your question answered? Don't forget to click on "Accept as Solution" to help other devs find the answer to the same question. When working in a sandbox account with our payment gateway, it seems to process the charge just fine (there is no dashboard by which I can actually verfiy this though). Could the gateway doing something behind the scenes that actually updates the transaction total? Would visa checkout return them an error response if the charge was initialized at $100, but charged at $105 because of a $5 delivery fee?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400188841.7/warc/CC-MAIN-20200918190514-20200918220514-00759.warc.gz
CC-MAIN-2020-40
1,121
7
https://www.broadinstitute.org/gatk/guide/tagged?tag=pooling
code
I've got a pool of 80 individuals sequencing data. Each individual doesn't have index, so that i have just one fastq file and bam file that i cannot sort any sample data from it. I try to use GATK UnifiedGenotyper v3.3 including "-ploid" option There're some questions. --sample_ploidy = 160 = 80 (pooling 80 individuals) * ploid ( diploid, 2 ) bamfile size = 3.4GB SERVER SPEC : CPU core = 40x memory = 256G I've started the process 4 days ago. The progress percent is 0.3%, and remain time is 176.9 weeks. I think it's too slow to complete. I just wonder how long takes time to process GATK UnifiedGenotyper on that data. Is there any recommendations to improve this job? Dear GATK Team, baserecalibrator is in the newest Best Practices recommendations. Does this tool support or would you recommend it's usage for samples with ploidy higher then 2 (e.g. pooled samples)? I have exome data run on two lanes per library is it better to combine the lanes into one or to run each lane independently through GATK? What are the pros and cons? Many thanks
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049270513.22/warc/CC-MAIN-20160524002110-00029-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
1,051
8
https://blogs.cardiff.ac.uk/physicsoutreach/resources/chromoscope/
code
Ever wanted X-ray specs or super-human vision? Chromoscope lets you explore our Galaxy (the Milky Way) and the distant Universe in a range of wavelengths from gamma-rays to the longest radio waves. Change the wavelength using the slider in the top right of the screen and explore space using your mouse. For more information we have a quick video tour. If you get stuck, click “Help” in the bottom left. You can use the compact version below, but to see it in fullscreen visit the Chromoscope website. Chromoscope was developed by Stuart Lowe, Chris North and Rob Simpson for a Royal Society Summer Science Exhibition in 2009. It is an open source project, and is available to download from Github. The sets of images for the various wavelengths are also available to download if you would like to install it locally.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817181.55/warc/CC-MAIN-20240417204934-20240417234934-00507.warc.gz
CC-MAIN-2024-18
821
3
https://www.nsi-mi.com/library/technical-papers/2015-technical-papers/125-effect-of-higher-order-modes-in-standard-spherical-near-field-probe-correction
code
Effect of Higher Order Modes in Standard Spherical Near-Field Probe Correction Authors: A.C. Newell, S.F. Gregson Publication: AMTA 2015 Copyright Owner: NSI-MI Technologies Within the standard scheme for probe-corrected spherical data-processing, it has been found that for an efficient computational implementation it is necessary to restrict the characteristics of the probe pattern such that it contains only azimuthal modes for which μ = ±1 [1, 2, 3]. This first-order pattern restriction does not however extend to placing a limit on the polar index mode content and therefore leaves the directivity of the probe unconstrained. Clearly, when using this widely utilized approach, errors will be present within the calculated probe-corrected test antenna spherical mode coefficients for cases where the probe is considered to have purely modes for which μ = ±1 and where the probe actually exhibits higher order mode structure. A number of analysis [4, 5, 6, 7, 8] and simulations [9, 10, 11, 12] can be found documented within the open literature that estimate the effect of using a probe with higher order modes. The following study is a further attempt to develop guidelines for the azimuthal and polar properties of the probe pattern and the measurement configuration that can be utilized to reduce the effect of higher order spherical modes to acceptable levels. Included in this study are the cases when an Open Ended Waveguide (OEWG) is simulated at a series of measurement distances, a Quad Ridged Horn Probe (QRHP) with very large higher order modes is also simulated, the AUT is offset from the origin of the measurement sphere and the AUT is simulated with its main beam along the equator rather than along the pole. These new simulation cases provide additional guidelines when selecting a probe for spherical near-field measurements and answer some questions that have been raised about generalizing past results.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653501.53/warc/CC-MAIN-20230607010703-20230607040703-00757.warc.gz
CC-MAIN-2023-23
1,934
5
http://lyncinsider.com/conferencing/what-monitoring-server-monitors-and-what-it-doesnt/
code
On Sunday, I received an email from a UK consulting firm. The individual (I’ll call him Mr. B) wanted to know about monitoring Lync Server. Now, his question was more about identifying the signs of a well-functioning Lync setup. But it touched off a related question in my mind – how much monitoring does Lync Server do for itself? Turns out, quite a lot. Lync’s Monitoring Server role keeps tabs on just about every communication in & out. It’s not a required server role for Lync to run, but it’s recommended. Why? Simple reason – Monitoring Server reports help you figure out what’s working (and what’s not). Reports are broken down into four categories: System Usage Reports, Call Diagnostic Reports, Call Diagnostic Reports (per user), and Media Quality Diagnostic Reports. Makes it easier to identify a specific problem, if you know what type of problem you’re looking at. What Monitoring Server DOES Provide Overall, reports cover pretty much everything you’d want to know about how good a job your Lync Server’s doing. For example, you can find all of this in Monitoring Server reports: - Information about the communication sessions in your organization. That covers VoIP phone calls, IM sessions and conferences. - Endpoint information about each session. IP addresses, connection speeds, which Edge Servers were used, etc. - Quality measurements for the different types of communications you use (SIP calls, video conferencing, etc.). - Activity lists for each user in the organization, by date and/or session type. - Reports on Call Admission Control-restricted sessions. - Summary of (and details on) calls made to Response Group workflows. - Diagnostic reports and troubleshooting information for session failures (including SIP response codes and diagnostic headers). - Server Performance reports: Shows you which servers have had the most problems, using metrics like packet loss, signal degradation, noise, etc. And a few more. Many of the Monitoring Server reports are broken up by type, or medium. For example, one report will tell you about IM sessions, broken down by pool. Another will tell you about VoIP calls in the same pool. A third could provide a summary of all communications in that pool. What Monitoring Server DOES NOT Provide - The content of a phone call, IM session or conference. That’s the job of Archiving Server. - Monitoring for the Windows Servers Lync is installed on. It doesn’t cover Windows processes. Use a standard server monitoring tool for that. - Non-Lync Server application logging. Use a third-party tracking tool to track activity on these. Microsoft has a Work Smart guide for Monitoring Server here: Lync Server 2010 Monitoring Server Reports Work Smart Guide – Microsoft Download Center Plenty of information on each report, what it records, and how to make use of the data. Have you referred to a Monitoring Server report lately? What did you find out?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400238038.76/warc/CC-MAIN-20200926071311-20200926101311-00094.warc.gz
CC-MAIN-2020-40
2,938
24
http://math.stackexchange.com/questions/190351/geometric-interpretation-of-frechet-derivative-in-one-variable
code
Given a function $ f:(a,b) \to E $ where $E$ is a Banach space, then clearly when $f$ is differentiable, the derivative $ f^\prime(x) $ can be seen as the tangent vector to the curve in $E$ graphed by $f$, at the point $f(x)$. But the book I use says that value of the Frechet derivative of $f$ acting on $1$ i.e. $ f^\prime(x)(1) $ or $ Df(x)(1) $ is also the same as above definition. I am confused. The infinitesimal "h" here is $1$. But isnt "h" supposed to be as small as possible and moreover it maybe that $ |b-a| < 1 $ ? How is this interpretation brought about?
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824499.16/warc/CC-MAIN-20160723071024-00256-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
570
3
https://pike-www.lysator.liu.se/docs/ietf/rfc/38/rfc3857.xml
code
Request for Comments: 3857 Category: Standards Track A Watcher Information Event Template-Package for the Session Initiation Protocol (SIP) Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright © The Internet Society (2004). This document defines the watcher information template-package for the Session Initiation Protocol (SIP) event framework. Watcher information refers to the set of users subscribed to a particular resource within a particular event package. Watcher information changes dynamically as users subscribe, unsubscribe, are approved, or are rejected. A user can subscribe to this information, and therefore learn about changes to it. This event package is a template-package because it can be applied to any event package, including itself. Table of Contents 1. Introduction ........................................ 2 2. Terminology ......................................... 3 3. Usage Scenarios ..................................... 3 3.1. Presence Authorization ........................ 4 3.2. Blacklist Alerts .............................. 5 4. Package Definition .................................. 5 4.1. Event Package Name ............................ 5 4.2. Event Package Parameters ...................... 5 4.3. SUBSCRIBE Bodies .............................. 6 4.4. Subscription Duration ......................... 6 4.5. NOTIFY Bodies ................................. 7 4.6. Notifier Processing of SUBSCRIBE Requests...... 7 4.7. Notifier Generation of NOTIFY Requests ........ 8 4.7.1. The Subscription State Machine......... 9 4.7.2. Applying the State Machine............. 11 4.8. Subscriber Processing of NOTIFY Requests ...... 12 4.9. Handling of Forked Requests ................... 12 4.10. Rate of Notifications ......................... 13 4.11. State Agents .................................. 13 5. Example Usage ....................................... 14 6. Security Considerations ............................. 17 6.1. Denial of Service Attacks ..................... 17 6.2. Divulging Sensitive Information ............... 17 7. IANA Considerations ................................. 18 8. Acknowledgements .................................... 18 9. Normative References ................................ 18 10. Informative References .............................. 19 11. Author's Address .................................... 19 12. Full Copyright Statement ............................ 20 The Session Initiation Protocol (SIP) event framework is described in RFC 3265 . It defines a generic framework for subscription to, and notification of, events related to SIP systems. The framework defines the methods SUBSCRIBE and NOTIFY, and introduces the notion of a package. A package is a concrete application of the event framework to a particular class of events. Packages have been defined for user presence , for example. This document defines a "template-package" within the SIP event framework. A template-package has all the properties of a regular SIP event package. However, it is always associated with some other event package, and can always be applied to any event package, including the template-package itself. The template-package defined here is for watcher information, and is denoted with the token "winfo". For any event package, such as presence, there exists a set (perhaps an empty set) of subscriptions that have been created or requested by users trying to ascertain the state of a resource in that package. This set of subscriptions changes over time as new subscriptions are requested by users, old subscriptions expire, and subscriptions are approved or rejected by the owners of that resource. The set of users subscribed to a particular resource for a specific event package, and the state of their subscriptions, is referred to as watcher information. Since this state is itself dynamic, it is reasonable to subscribe to it in order to learn about changes to it. The watcher information event template-package is meant to facilitate exactly that - tracking the state of subscriptions to a resource in another package. To denote this template-package, the name is constructed by appending ".winfo" to the name of whatever package is being tracked. For example, the set of people subscribed to presence is defined by the "presence.winfo" package. In this document, the key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" are to be interpreted as described in BCP14, RFC 2119 and indicate requirement levels for compliant implementations. This document fundamentally deals with recursion - subscriptions to subscriptions. Therefore, the term "subscription" itself can be confusing in this document. To reduce confusion, the term "watcherinfo subscription" refers to a subscription to watcher information, and the term "watcherinfo subscriber" refers to a user that has subscribed to watcher information. The term "watcherinfo notification" refers to a NOTIFY request sent as part of a watcherinfo subscription. When the terms "subscription", "subscriber", and "notification" are used unqualified, they refer to the "inner" subscriptions, subscribers and notifications - those that are being monitored through the watcherinfo subscriptions. We also use the term "watcher" to refer to a subscriber to the "inner" resource. Information on watchers is reported through watcherinfo subscriptions. 3. Usage Scenarios There are many useful applications for the watcher information template-package. 3.1. Presence Authorization The motivating application for this template-package is presence authorization. When user A subscribes to the presence of user B, the subscription needs to be authorized. Frequently, that authorization needs to occur through direct user intervention. For that to happen, B's software needs to become aware that a presence subscription has been requested. This is supported through watcher information. B's client software would SUBSCRIBE to the watcher information for the presence of B: SUBSCRIBE sip:email@example.com SIP/2.0 Via: SIP/2.0/UDP pc34.example.com;branch=z9hG4bKnashds7 From: sip:firstname.lastname@example.org;tag=123s8a To: sip:email@example.com Call-ID: firstname.lastname@example.org Max-Forwards: 70 CSeq: 9887 SUBSCRIBE Contact: sip:email@example.com Event: presence.winfo The policy of the server is such that it allows B to subscribe to its own watcher information. So, when A subscribes to B's presence, B gets a notification of the change in watcher information state: NOTIFY sip:firstname.lastname@example.org SIP/2.0 Via: SIP/2.0/UDP server.example.com;branch=z9hG4bKna66g From: sip:email@example.com;tag=xyz887 To: sip:firstname.lastname@example.org;tag=123s8a Call-ID: email@example.com Max-Forwards: 70 CSeq: 1288 NOTIFY Contact: sip:firstname.lastname@example.org Event: presence.winfo Content-Type: application/watcherinfo+xml Content-Length: ... <?xml version="1.0"?> <watcherinfo xmlns="urn:ietf:params:xml:ns:watcherinfo" version="0" state="full"> <watcher-list resource="sip:email@example.com" package="presence"> <watcher id="7768a77s" event="subscribe" status="pending">sip:firstname.lastname@example.org</watcher> </watcher-list> </watcherinfo> This indicates to B that A has subscribed, and that the subscription is pending (meaning, it is awaiting authorization). B's software can alert B that this subscription is awaiting authorization. B can then set policy for that subscription. 3.2. Blacklist Alerts Applications can subscribe to watcher information in order to provide value-added features. An example application is "blacklist alerts". In this scenario, an application server maintains a list of known "bad guys". A user, Joe, signs up for service with the application provider, presumably by going to a web page and entering in his presence URI. The application server subscribes to the watcher information for Joe's presence. When someone attempts to SUBSCRIBE to Joe's user presence, the application learns of this subscription as a result of its watcher info subscription. It checks the watcher's URI against the database of known bad guys. If there is a match, it sends email to Joe letting him know about this. For this application to work, Joe needs to make sure that the application is allowed to subscribe to his presence.winfo. 4. Package Definition This section fills in the details needed to specify an event package as defined in Section 4.4 of RFC 3265 . 4.1. Event Package Name RFC 3265 requires package definitions to specify the name of their package or template-package. The name of this template-package is "winfo". It can be applied to any other package. Watcher information for any package foo is denoted by the name "foo.winfo". Recursive template-packaging is explicitly allowed (and useful), so that "foo.winfo.winfo" is a valid package name. 4.2. Event Package Parameters RFC 3265 requires package and template-package definitions to specify any package specific parameters of the Event header field. No package specific Event header field parameters are defined for this event template-package. 4.3. SUBSCRIBE Bodies RFC 3265 requires package or template-package definitions to define the usage, if any, of bodies in SUBSCRIBE requests. A SUBSCRIBE request for watcher information MAY contain a body. This body would serve the purpose of filtering the watcherinfo subscription. The definition of such a body is outside the scope of this specification. For example, in the case of presence, the body might indicate that notifications should contain full state every time something changes, and that the time the subscription was first made should not be included in the watcherinfo notifications. A SUBSCRIBE request for a watcher information package MAY be sent without a body. This implies the default watcherinfo subscription filtering policy has been requested. The default policy is: - Watcherinfo notifications are generated every time there is any change in the state of the watcher information. - Watcherinfo notifications triggered from a SUBSCRIBE contain full state (the list of all watchers that the watcherinfo subscriber is permitted to know about). Watcherinfo notifications triggered from a change in watcher state only contain information on the watcher whose state has changed. Of course, the server can apply any policy it likes to the subscription. 4.4. Subscription Duration RFC 3265 requires package definitions to define a default value for subscription durations, and to discuss reasonable choices for durations when they are explicitly specified. Watcher information changes as users subscribe to a particular resource for some package, or their subscriptions time out. As a result, the state of watcher information can change very dynamically, depending on the number of subscribers for a particular resource in a given package. The rate at which subscriptions time out depends on how long a user maintains its subscription. Typically, watcherinfo subscriptions will be timed to span the lifetime of the subscriptions being watched, and therefore range from minutes to days. As a result of these factors, it is difficult to define a broadly useful default value for the lifetime of a watcherinfo subscription. We arbitrarily choose one hour. However, clients SHOULD use an Expires header field to specify their preferred duration. 4.5. NOTIFY Bodies RFC 3265 requires package definitions to describe the allowed set of body types in NOTIFY requests, and to specify the default value to be used when there is no Accept header field in the SUBSCRIBE request. The body of the watcherinfo notification contains a watcher information document. This document describes some or all of the watchers for a resource within a given package, and the state of their subscriptions. All watcherinfo subscribers and notifiers MUST support the application/watcherinfo+xml format described in , and MUST list its MIME type, application/watcherinfo+xml, in any Accept header field present in the SUBSCRIBE request. Other watcher information formats might be defined in the future. In that case, the watcherinfo subscriptions MAY indicate support for other formats. However, they MUST always support and list application/watcherinfo+xml as an allowed format. Of course, the watcherinfo notifications generated by the server MUST be in one of the formats specified in the Accept header field in the SUBSCRIBE request. If no Accept header field was present, the notifications MUST use the application/watcherinfo+xml format described in . 4.6. Notifier Processing of SUBSCRIBE Requests RFC 3265 specifies that packages should define any package- specific processing of SUBSCRIBE requests at a notifier, specifically with regards to authentication and authorization. The watcher information for a particular package contains sensitive information. Therefore, all watcherinfo subscriptions SHOULD be authenticated and then authorized before approval. Authentication MAY be performed using any of the techniques available through SIP, including digest, S/MIME, TLS or other transport specific mechanisms . Authorization policy is at the discretion of the administrator, as always. However, a few recommendations can be made. It is RECOMMENDED that user A be allowed to subscribe to their own watcher information for any package. This is true recursively, so that it is RECOMMENDED that a user be able to subscribe to the watcher information for their watcher information for any package. It is RECOMMENDED that watcherinfo subscriptions for some package foo for user A be allowed from some other user B, if B is an authorized subscriber to A within the package foo. However, it is RECOMMENDED that the watcherinfo notifications sent to B only contain the state of B's own subscription. In other words, it is RECOMMENDED that a user be allowed to monitor the state of their own subscription. To avoid infinite recursion of authorization policy, it is RECOMMENDED that only user A be allowed to subscribe to foo.winfo.winfo for user A, for any foo. It is also RECOMMENDED that by default, a server does not authorize any subscriptions to foo.winfo.winfo.winfo or any other deeper recursions. 4.7. Notifier Generation of NOTIFY Requests The SIP Event framework requests that packages specify the conditions under which notifications are sent for that package, and how such notifications are constructed. Each watcherinfo subscription is associated with a set of "inner" subscriptions being watched. This set is defined by the URI in the Request URI of the watcherinfo SUBSCRIBE request, along with the parent event package of the watcherinfo subscription. The parent event package is obtained by removing the trailing ".winfo" from the value of the Event header field from the watcherinfo SUBSCRIBE request. If the Event header field in the watcherinfo subscription has a value of "presence.winfo", the parent event package is "presence". If the Event header field has a value of "presence.winfo.winfo", the parent event package is "presence.winfo". Normally, the URI in the Request URI of the watcherinfo SUBSCRIBE identifies an address-of-record within the domain. In that case, the set of subscriptions to be watched are all of the subscriptions for the parent event package that have been made to the resource in the Request URI of the watcherinfo SUBSCRIBE. However, the Request URI can contain a URI that identifies any set of subscriptions, including the subscriptions to a larger collection of resources. For example, sip:email@example.com might be defined within example.com to refer to all resources. In that case, a watcherinfo subscription for "presence.winfo" to sip:firstname.lastname@example.org is requesting notifications any time the state of any presence subscription for any resource within example.com changes. A watcherinfo notifier MAY generate a notification any time the state of any of the watched subscriptions changes. Because a watcherinfo subscription is made to a collection of subscriptions, the watcher information package needs a model of subscription state. This is accomplished by specifying a subscription Fine State Machine (FSM), described below, which governs the subscription state of a user in any package. Watcherinfo notifications MAY be generated on transitions in this state machine. It's important to note that this FSM is just a model of the subscription state machinery maintained by a server. An implementation would map its own state machines to this one in an implementation-specific manner. 4.7.1. The Subscription State Machine The underlying state machine for a subscription is shown in Figure 1. It derives almost entirely from the descriptions in RFC 3265 , but adds the notion of a waiting state. When a SUBSCRIBE request arrives, the subscription FSM is created in the init state. This state is transient. The next state depends on whether policy exists for the subscription. If there is an existing policy that determines that the subscription is forbidden, it moves into the terminated state immediately, where the FSM can be destroyed. If there is existing policy that determines that the subscription is authorized, the FSM moves into the active state. This state indicates that the subscriber will receive notifications. If, when a subscription arrives, there is no authorization policy in existence, the subscription moves into the pending state. In this state, the server is awaiting an authorization decision. No notifications are generated on changes in presence state (an initial NOTIFY will have been delivered as per RFC 3265 ), but the subscription FSM is maintained. If the authorization decision comes back positive, the subscription is approved, and moves into the active state. If the authorization is negative, the subscription is rejected, and the FSM goes into the terminated state. It is possible that the authorization decision can take a very long time. In fact, no authorization decision may arrive until after the subscription itself expires. If a pending subscription suffers a timeout, it moves into the waiting state. At any time, the server can decide to end a pending or waiting subscription because it is concerned about allocating memory and CPU resources to unauthorized subscription state. If this happens, a "giveup" event is generated by the server, moving the subscription to terminated. The waiting state is similar to pending, in that no notifications are generated. However, if the subscription is approved or denied, the FSM enters the terminated state, and is destroyed. Furthermore, if another subscription is received to the same resource, from the same watcher, for the same event package, event package parameters and filter in the body of the SUBSCRIBE request (if one was present initially), the FSM enters the terminated state with a "giveup" event, and is destroyed. This transition occurs because, on arrival of a new subscription with identical parameters, it will enter the pending state, making the waiting state for the prior subscription redundant. The purpose of the waiting state is so that a user can fetch watcherinfo state at any time, and learn of any subscriptions that arrived previously (and which may arrive again) which require an authorization decision. Consider an example. A subscribes to B. B has not defined policy about this subscription, so it moves into the pending state. B is not "online", so that B's software agent cannot be contacted to approve the subscription. The subscription expires. Let's say it were destroyed. B logs in, and fetches its watcherinfo state. There is no record of the subscription from A, so no policy decision is made about subscriptions from A. B logs off. A refreshes its subscription. Once more, the subscription is pending since no policy is defined for it. This process could continue indefinitely. The waiting state ensures that B can find out about this subscription attempt. subscribe, policy= +----------+ reject | |<------------------------+ +------------>|terminated|<---------+ | | | | | | | | | |noresource | | +----------+ |rejected | | ^noresource |deactivated | | |rejected |probation | | |deactivated |timeout |noresource | |probation | |rejected | |giveup | |giveup | | | |approved +-------+ +-------+ +-------+ | | |subscribe| |approved| | | | init |-------->|pending|------->|active | | | |no policy| | | | | | | | | | | | +-------+ +-------+ +-------+ | | | ^ | | subscribe, | | | +-----------------------------------+ | policy = accept | +-------+ | | | | | | |waiting|----------+ +----------->| | timeout | | +-------+ Figure 1: Subscription State Machine The waiting state is also needed to allow for authorization of fetch attempts, which are subscriptions that expire immediately. Of course, policy may never be specified for the subscription. As a result, the server can generate a giveup event to move the waiting subscription to the terminated state. The amount of time to wait before issuing a giveup event is system dependent. The giveup event is generated in either the waiting or pending states to destroy resources associated with unauthorized subscriptions. This event is generated when a giveup timer fires. This timer is set to a timeout value when entering either the pending or waiting states. Servers need to exercise care in selecting this value. It needs to be large in order to provide a useful user experience; a user should be able to log in days later and see that someone tried to subscribe to them. However, allocating state to unauthorized subscriptions can be used as a source of DoS attacks. Therefore, it is RECOMMENDED that servers that retain state for unauthorized subscriptions add policies which prohibit a particular subscriber from having more than some number of pending or waiting subscriptions. At any time, the server can deactivate a subscription. Deactivation implies that the subscription is discarded without a change in authorization policy. This may be done in order to trigger refreshes of subscriptions for a graceful shutdown or subscription migration operation. A related event is probation, where a subscription is terminated, and the subscriber is requested to wait some amount of time before trying again. The meaning of these events is described in more detail in Section 3.2.4 of RFC 3265 . A subscription can be terminated at any time because the resource associated with that subscription no longer exists. This corresponds to the noresource event. 4.7.2. Applying the State Machine The server MAY generate a notification to watcherinfo subscribers on a transition of the state machine. Whether it does or not is policy dependent. However, several guidelines are defined. Consider some event package foo. A subscribes to B for events within that package. A also subscribes to foo.winfo for B. In this scenario (where the subscriber to foo.winfo is also a subscriber to foo for the same resource), it is RECOMMENDED that A receive watcherinfo notifications only about the changes in its own subscription. Normally, A will receive notifications about changes in its subscription to foo through the Subscription-State header field. This will frequently obviate the need for a separate subscription to foo.winfo. However, if such a subscription is performed by A, the foo.winfo notifications SHOULD NOT report any state changes which would not be reported (because of authorization policy) in the Subscription-State header field in notifications on foo. As a general rule, when a watcherinfo subscriber is authorized to receive watcherinfo notifications about more than one watcher, it is RECOMMENDED that watcherinfo notifications contain information about those watchers which have changed state (and thus triggered a notification), instead of delivering the current state of every watcher in every watcherinfo notification. However, watcherinfo notifications triggered as a result of a fetch operation (a SUBSCRIBE with Expires of 0) SHOULD result in the full state of all watchers (of course, only those watchers that have been authorized to be divulged to the watcherinfo subscriber) to be present in the NOTIFY. Frequently, states in the subscription state machine will be transient. For example, if an authorized watcher performs a fetch operation, this will cause the state machine to be created, transition from init to active, and then from active to terminated, followed by a destruction of the FSM. In such cases, watcherinfo notifications SHOULD NOT be sent for any transient states. In the prior example, the server wouldn't send any notifications, since all of the states are transient. 4.8. Subscriber Processing of NOTIFY Requests RFC 3265 expects packages to specify how a subscriber processes NOTIFY requests in any package specific ways, and in particular, how it uses the NOTIFY requests to construct a coherent view of the state of the subscribed resource. Typically, the watcherinfo NOTIFY will only contain information about those watchers whose state has changed. To construct a coherent view of the total state of all watchers, a watcherinfo subscriber will need to combine NOTIFYs received over time. This details of this process depend on the document format. See for details on the application/watcherinfo+xml format. 4.9. Handling of Forked Requests The SIP Events framework mandates that packages indicate whether or not forked SUBSCRIBE requests can install multiple subscriptions. When a user wishes to obtain watcher information for some resource for package foo, the SUBSCRIBE to the watcher information will need to reach a collection of servers that have, unioned together, complete information about all watchers on that resource for package foo. If there are a multiplicity of servers handling subscriptions for that resource for package foo (for load balancing reasons, typically), it is very likely that no single server will have the complete set of watcher information. There are several solutions in this case. This specification does not mandate a particular one, nor does it rule out others. It merely ensures that a broad range of solutions can be built. One solution is to use forking. The system can be designed so that a SUBSCRIBE for watcher information arrives at a special proxy which is aware of the requirements for watcher information. This proxy would fork the SUBSCRIBE request to all of the servers which could possibly maintain subscriptions for that resource for that package. Each of these servers, whether or not they have any current subscribers for that resource, would accept the watcherinfo subscription. Each needs to accept because they may all eventually receive a subscription for that resource. The watcherinfo subscriber would receive some number of watcherinfo NOTIFY requests, each of which establishes a separate dialog. By aggregating the information across each dialog, the watcherinfo subscriber can compute full watcherinfo state. In many cases, a particular dialog might never generate any watcherinfo notifications; this would happen if the servers never receive any subscriptions for the resource. In order for such a system to be built in an interoperable fashion, all watcherinfo subscribers MUST be prepared to install multiple subscriptions as a result of a multiplicity of NOTIFY messages in response to a single SUBSCRIBE. Another approach for handling the server multiplicity problem is to use state agents. See Section 4.11 for details. 4.10. Rate of Notifications RFC 3265 mandates that packages define a maximum rate of notifications for their package. For reasons of congestion control, it is important that the rate of notifications not become excessive. As a result, it is RECOMMENDED that the server not generate watcherinfo notifications for a single watcherinfo subscriber at a rate faster than once every 5 seconds. 4.11. State Agents RFC 3265 asks packages to consider the role of state agents in their design. State agents play an important role in this package. As discussed in Section 4.9, there may be a multiplicity of servers sharing the load of subscriptions for a particular package. A watcherinfo subscription might require subscription state spread across all of those servers. To handle that, a farm of state agents can be used. Each of these state agents would know the entire watcherinfo state for some set of resources. The means by which the state agents would determine the full watcherinfo state is outside the scope of this specification. When a watcherinfo subscription is received, it would be routed to a state agent that has the full watcherinfo state for the requested resource. This server would accept the watcherinfo subscription (assuming it was authorized, of course), and generate watcherinfo notifications as the watcherinfo state changed. The watcherinfo subscriber would only have a single dialog in this case. 5. Example Usage The following section discusses an example application and call flows using the watcherinfo package. In this example, a user Joe, sip:email@example.com provides presence through the example.com presence server. Joe subscribes to his own watcher information, in order to learn about people who subscribe to his presence, so that he can approve or reject their subscriptions. Joe sends the following SUBSCRIBE request: SUBSCRIBE sip:firstname.lastname@example.org SIP/2.0 Via: SIP/2.0/UDP pc34.example.com;branch=z9hG4bKnashds7 From: sip:email@example.com;tag=123aa9 To: sip:firstname.lastname@example.org Call-ID: email@example.com CSeq: 9887 SUBSCRIBE Contact: sip:firstname.lastname@example.org Event: presence.winfo Max-Forwards: 70 The server responds with a 401 to authenticate, and Joe resubmits the SUBSCRIBE with credentials (message not shown). The server then authorizes the subscription, since it allows Joe to subscribe to his own watcher information for presence. It responds with a 200 OK: SIP/2.0 200 OK Via: SIP/2.0/UDP pc34.example.com;branch=z9hG4bKnashds8 ;received=192.0.2.8 From: sip:email@example.com;tag=123aa9 To: sip:firstname.lastname@example.org;tag=xyzygg Call-ID: email@example.com CSeq: 9988 SUBSCRIBE Contact: sip:server19.example.com Expires: 3600 Event: presence.winfo The server then sends a NOTIFY with the current state of presence.winfo for firstname.lastname@example.org: NOTIFY sip:email@example.com SIP/2.0 Via: SIP/2.0/UDP server19.example.com;branch=z9hG4bKnasaii From: sip:firstname.lastname@example.org;tag=xyzygg To: sip:email@example.com;tag=123aa9 Call-ID: firstname.lastname@example.org CSeq: 1288 NOTIFY Contact: sip:server19.example.com Event: presence.winfo Subscription-State: active Max-Forwards: 70 Content-Type: application/watcherinfo+xml Content-Length: ... <?xml version="1.0"?> <watcherinfo xmlns="urn:ietf:params:xml:ns:watcherinfo" version="0" state="full"> <watcher-list resource="sip:email@example.com" package="presence"> <watcher id="77ajsyy76" event="subscribe" status="pending">sip:firstname.lastname@example.org</watcher> </watcher-list> </watcherinfo> Joe then responds with a 200 OK to the NOTIFY: SIP/2.0 200 OK Via: SIP/2.0/UDP server19.example.com;branch=z9hG4bKnasaii ;received=192.0.2.7 From: sip:email@example.com;tag=xyzygg To: sip:firstname.lastname@example.org;tag=123aa9 Call-ID: email@example.com CSeq: 1288 NOTIFY The NOTIFY tells Joe that user A currently has a pending subscription. Joe then authorizes A's subscription through some means. This causes a change in the status of the subscription (which moves from pending to active), and the delivery of another notification: NOTIFY sip:firstname.lastname@example.org SIP/2.0 Via: SIP/2.0/UDP server19.example.com;branch=z9hG4bKnasaij From: sip:email@example.com;tag=xyzygg To: sip:firstname.lastname@example.org;tag=123aa9 Call-ID: email@example.com CSeq: 1289 NOTIFY Contact: sip:server19.example.com Event: presence.winfo Subscription-State: active Max-Forwards: 70 Content-Type: application/watcherinfo+xml Content-Length: ... <?xml version="1.0"?> <watcherinfo xmlns="urn:ietf:params:xml:ns:watcherinfo" version="1" state="partial"> <watcher-list resource="sip:firstname.lastname@example.org" package="presence"> <watcher id="77ajsyy76" event="approved" status="active">sip:email@example.com</watcher> </watcher-list> </watcherinfo> B then responds with a 200 OK to the NOTIFY: SIP/2.0 200 OK Via: SIP/2.0/UDP server19.example.com;branch=z9hG4bKnasaij ;received=192.0.2.7 From: sip:firstname.lastname@example.org;tag=xyzygg To: sip:email@example.com;tag=123aa9 Call-ID: firstname.lastname@example.org CSeq: 1289 NOTIFY 6. Security Considerations 6.1. Denial of Service Attacks Watcher information generates notifications about changes in the state of watchers for a particular resource. It is possible for a single resource to have many watchers, resulting in the possibility of a large volume of notifications. This makes watcherinfo subscription a potential tool for denial of service attacks. Preventing these can be done through a combination of sensible authorization policies and good operating principles. First, when a resource has a lot of watchers, watcherinfo subscriptions to that resource should only be allowed from explicitly authorized entities, whose identity has been properly authenticated. That prevents a watcherinfo NOTIFY stream from being generated from subscriptions made by an attacker. Even when watcherinfo subscriptions are properly authenticated, there are still potential attacks. For example, consider a valid user, T, who is to be the target of an attack. T has subscribed to their own watcher information. The attacker generates a large number of subscriptions (not watcherinfo subscriptions). If the server creates subscription state for unauthenticated subscriptions, and reports those changes in watcherinfo notifications, user T would receive a flood of watcherinfo notifications. In fact, if the server generates a watcherinfo notification when the subscription is created, and another when it is terminated, there will be an amplification by a factor of two. The amplification would actually be substantial if the server generates full state in each watcherinfo notification. Indeed, the amount of data sent to T would be the square of the data generated by the attacker! Each of the N subscriptions generated by the attacker would result in a watcherinfo NOTIFY being sent to T, each of which would report on up to N watchers. To avoid this, servers should never generate subscription state for unauthenticated SUBSCRIBE requests, and should never generate watcherinfo notifications for them either. 6.2. Divulging Sensitive Information Watcher information indicates what users are interested in a particular resource. Depending on the package and the resource, this can be very sensitive information. For example, in the case of presence, the watcher information for some user represents the friends, family, and business relations of that person. This information can be used for a variety of malicious purposes. One way in which this information can be revealed is eavesdropping. An attacker can observe watcherinfo notifications, and learn this information. To prevent that, watchers MAY use the sips URI scheme when subscribing to a watcherinfo resource. Notifiers for watcherinfo MUST support TLS and sips as if they were a proxy (see Section 26.3.1 of RFC 3261). SIP encryption, using S/MIME, MAY be used end-to-end for the transmission of both SUBSCRIBE and NOTIFY requests. Another way in which this information can be revealed is through spoofed subscriptions. These attacks can be prevented by authenticating and authorizing all watcherinfo subscriptions. In order for the notifier to authenticate the subscriber, it MAY use HTTP Digest (Section 22 of RFC 3261). As a result, all watchers MUST support HTTP Digest. This is a redundant requirement, however, since all SIP user agents are mandated to support it by RFC 3261. 7. IANA Considerations This specification registers an event template package as specified in Section 6.2 of RFC 3265 . Package Name: winfo Template Package: yes Published Specification: RFC 3857 Person to Contact: Jonathan Rosenberg, email@example.com. The authors would like to thank Adam Roach, Allison Mankin and Brian Stucker for their detailed comments. 9. Normative References Roach, A.B., "Session Initiation Protocol (SIP)-Specific Event Notification", RFC 3265, June 2002. Bradner, S., "Key Words for Use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. Rosenberg, J., "An Extensible Markup Language (XML) Based Format for Watcher Information", RFC 3858, August 2004. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June 2002. 10. Informative References Rosenberg, J., "A Presence Event Package for the Session Initiation Protocol (SIP)", RFC 3856, July 2004. 11. Author's Address 600 Lanidex Plaza Parsippany, NJ 07054 12. Full Copyright Statement Copyright © The Internet Society (2004). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf- firstname.lastname@example.org. Funding for the RFC Editor function is currently provided by the Internet Society.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00790.warc.gz
CC-MAIN-2023-23
39,260
136
https://community.freepbx.org/t/sip-registrations-and-settings-not-writen-to-sip-registrations-conf-sip-general-additional-conf/7705
code
I recently upgraded to version 2.6 from 2.5 through the online updates. Since then there are no registration strings in the sip_registrations.conf and astersik does not register to providers. I deleted the database, installed freepbx again from scratch. Restored settings from backup. Again the same problem. Digging a little deeper, any changes made in the web gui are reflected in the mysql asterisk database. However even after applying changes on the webpage through the orange bar, the new settings never make it to sip_registrations.conf or sip_general_additional.conf. Doing a sip reload on the asterisk console and then inspecting sip settings or sip registrations again show no changes made in the web gui to sip NAT settings, and no new registrations show up. There are no problems accessing the asterisk database, I get no errors from freepbx, and as I mentioned, changes made are reflected in the mysql tables. Interestingly changes to iax settings also never make it, but changes made to sip extensions do show up in sip_additional.conf and the new extensions will show up on the console on doing sip peers or users. New trunks also show up, however new register strings for the trunk never show up, sip_registrations remain blank, doing sip show registry does not show any register strings on the console. I am at a loss here and any help to debug and sort the issue would be appreciated. I am running on Ubuntu Karmic, asterisk 2.6, the webserver is running as asterisk, all permissions on freepbx directories as well as asterisk files and directories are correct as asterisk:asterisk.The web GUI functions perfectly and gives no errors, but the changes made are never make it to asterisk. The same setup was working perfectly prior to this.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103947269.55/warc/CC-MAIN-20220701220150-20220702010150-00728.warc.gz
CC-MAIN-2022-27
1,756
6
https://experts.mcmaster.ca/display/publication1689031
code
Automated body composition analysis of clinically acquired computed tomography scans using neural networks Additional Document Info BACKGROUND & AIMS: The quantity and quality of skeletal muscle and adipose tissue is an important prognostic factor for clinical outcomes across several illnesses. Clinically acquired computed tomography (CT) scans are commonly used for quantification of body composition, but manual analysis is laborious and costly. The primary aim of this study was to develop an automated body composition analysis framework using CT scans. METHODS: CT scans of the 3rd lumbar vertebrae from critically ill, liver cirrhosis, pancreatic cancer, and clear cell renal cell carcinoma patients, as well as renal and liver donors, were manually analyzed for body composition. Ninety percent of scans were used for developing and validating a neural network for the automated segmentation of skeletal muscle and adipose tissues. Network accuracy was evaluated with the remaining 10 percent of scans using the Dice similarity coefficient (DSC), which quantifies the overlap (0 = no overlap, 1 = perfect overlap) between human and automated segmentations. RESULTS: Of the 893 patients, 44% were female, with a mean (±SD) age and body mass index of 52.7 (±15.8) years old and 28.0 (±6.1) kg/m2, respectively. In the testing cohort (n = 89), DSC scores indicated excellent agreement between human and network-predicted segmentations for skeletal muscle (0.983 ± 0.013), and intermuscular (0.900 ± 0.034), visceral (0.979 ± 0.019), and subcutaneous (0.986 ± 0.016) adipose tissue. Network segmentation took ~350 milliseconds/scan using modern computing hardware. CONCLUSIONS: Our network displayed excellent ability to analyze diverse body composition phenotypes and clinical cohorts, which will create feasible opportunities to advance our capacity to predict health outcomes in clinical populations.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00025.warc.gz
CC-MAIN-2023-23
1,915
3
http://tobin.cc/blog/
code
We can write peer to peer applications in Rust using can anonymize TCP streams by running them through the Tor network. How about writing anonymous peer to peer applications in Rust that run over the Tor network? A few years ago I read about a code training method involving writing the same algorithm out every day. I liked the idea but never got around to doing it. A couple of months ago I got a job working on a code base in a language I had never used before - Rust. Not only did I want to come up to speed as quickly as I could but I wanted to get good at Rust fast. Or “What I learned at my first job”. In this post I will reflect on what I learned from the 9 months I spent working my first software developer role for a US startup. As with all my posts I follow the philosophy to write as if no one is reading, this will be in part a way for me to pull my thoughts together but also a way to document my progress in becoming a software developer. In 2015 I had the very fortunate opportunity to invest some time in my skill as a programmer. At this time I had an undergraduate degree (Bachelor of Science) double majoring in software and computer networks. I had also completed the first two thirds of a masters degree, also in computer science. I chose not to complete the thesis because I felt I did not have anything to add to the field, graduating with a diploma of Computer Science (pass with high distinction). Part 2 of this series outlines a method for starting to learn the process of Linux kernel development. As stated in part 1, this is but one method. The aim of this post is to illuminate a pathway starting at the point when you have had your first patch merged into the mainline. If you have not had your first patch merged you may like to read part 1 of this series. This is the first in a series of posts about getting started in Linux kernel development. Most of what is written in this post is already available on the web. It is provided here for completeness and as a pre-amble to the next post in the series.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474653.81/warc/CC-MAIN-20240226062606-20240226092606-00733.warc.gz
CC-MAIN-2024-10
2,044
9
https://music.meta.stackexchange.com/users/110/babu
code
I'm an informatics pharmacist, which means that I am responsible for fitting computers into the pharmacy workflow to improve patient safety and the efficiency of pharmacy operations. I have 6 years of server operations and system administration experience, primarily in a mixed UNIX/Linux environment. At the moment, my research interests revolve around mining data from the electronic medical record. As a second career, I'm a pianist, organist, and choir director. Over the years, I've picked up drums, mallet percussion, and guitar, to varying levels of accomplishment. Member for 9 years, 3 months 2 profile views Last seen Feb 21 '16 at 19:41 Top network posts - 46 What does a small x-like symbol before a note mean? - 41 How to scroll up and look at data in GNU screen - 40 Software that allows playing in different temperaments - 40 What to look for when buying a digital piano for a beginner? - 21 Is singing a matter of talent or practice? - 19 Quickly flip a page of sheet music while playing - 18 I'm a musical novice. Can I start my child off on piano? - View more network posts →
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738562.5/warc/CC-MAIN-20200809162458-20200809192458-00377.warc.gz
CC-MAIN-2020-34
1,095
14
http://cadia.ru.is/wiki/public:t-622-arti-12-1:lab_1_-_agents
code
Table of Contents Lab 1 - Agents Implement the control program for a vacuum cleaner agent. The environment is a rectangular grid of cells which may contain dirt or an obstacle. The agent is located in this grid and facing in one of the four directions: north, south, east or west. The agent can execute the following actions: - TURN_ON: This action initialises the robot and has to be executed first. - TURN_RIGHT, TURN_LEFT: lets the robot rotate 90° clockwise/counter-clockwise - GO: lets the agent attempt to move to the next cell in the direction it is currently facing. - SUCK: suck the dirt in the current cell - TURN_OFF: turns the robot off. Once turned off, it can only be turned on again after emptying the dust-container manually. The robot is equipped with a dust sensor and a touch sensor. If there is dirt at current location of the robot, the agent will sense “DIRT”. If the robot is bumping into an obstacle, the agent will sense “BUMP”. The goal is to clean all cells and return to the initial location before turning the robot off. Note, a full charge of the battery of the robot will only last for 100 actions. - Develop a simple reflex vacuum cleaner agent. Is it rational? (Ok, this is a bit of a trick task. You should find out, that it is not actually possible to implement this with a simple reflex agent.) - Develop a model-based reflex agent that is able to clean every cell. Is it rational? To make it a bit easier you can use the following assumptions: - The room is rectangular. It has only 4 straight walls that meet at right angles. There are no obstacles in the room. That is, the strategy “Go until you bump into a wall then turn right and repeat” will make the agent walk straight to a wall and then around the room along the wall. - The room is fairly small, so that 100 actions are enough to visit every cell, suck all the dirt and return home given a halfway decent algorithm. The file contains code for implementing an agent in the src directory. The agent is actually a server process which listens on some port and waits for the real robot or a simulator to send a message. It will then reply with the next action the robot is supposed to execute. The zip file also contains the description of an example environment (vacuumcleaner.gdl) a simulator (gamecontroller-gui.jar). To test your agent: - Start the simulator (execute gamecontroller-gui.jar with either double-click or using the command “java -jar gamecontroller-gui.jar” on the command line). - Setup the simulator as shown in this picture: - Run the “Main” class in the project. If you added your own agent class, make sure that it is used in the main method of Main.java. You can also execute the “ant run” on the command line, if you have Ant installed. The output of the agent should say “NanoHTTPD is listening on port 4001”, which indicates that your agent is ready and waiting for messages to arrive on the specified port. - Now push the “Start” button in the simulator and your agent should get some messages and reply with the actions it wants to execute. At the end, the output of the simulator tells you how many points your agent got: “Game over! results: 0”. In the given environment you will only get non-zero points if you manage to clean everything, return to the initial location, and turn off the robot within 100 steps. If the output of the simulator contains any line starting with “SEVERE”, something is wrong. The two most common problems are the network connection (e.g., due to a firewall) between the simulator and the agent or the agent sending illegal moves. You can see here, what the example environment looks like. Of course, you shouldn't assume any fixed size, initial location or locations of the dirt in your implementation. This is just an example environment. Here I described how you visualise what your agent is doing. For implementing your agent: - Add a new class that implements the “Agent” interface. Look at RandomAgent.java to see how this is done. - You have to implement the method “nextAction” which gets a collection of percepts as input and has to return the next action the agent is supposed to execute. - Before you start programming a complicated strategy, think about it. The things your agent has to do are: - execute TURN_ON - visit every cell and suck up any dirt it finds on the way - return to the initial location - For this your agent needs an internal model of the world. Figure out, what you need to remember about the current state of the world. Ideally, you create an object “State” that contains everything you need to remember and update this object depending on which action you executed and which percepts you got. Then you can implement rules that say which action should be executed depending on what properties the current state has. As a last and general hint: “Days of programming can save you minutes of thinking.” Think of a strategy, the rules to implement it and the information you need to decide on the actions before you start implementing it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945144.17/warc/CC-MAIN-20230323100829-20230323130829-00619.warc.gz
CC-MAIN-2023-14
5,079
32
https://sbsconsultant.co.uk/office-365-solutions/
code
Office 365 Business Solutions Office 365 Business can be used to provide an annual licence for Microsoft Office, this can be used either locally on your laptop or desktop computer or access to cloud enabled versions of the office applications can be used. Office 365 Business can also be used to provide and exchange based email system which can be accessed on your laptop or desktop or again by using the cloud based Outlook Web App or on mobile devices. Office 365 Business can be installed on five devices. Office 365 Business also comes with 1 Tb of Cloud Storage. Office 365 Business comes multiple different plans to suite all budgets. Advanced Cloud Security for Microsoft Office 365 provides the following:- - 256-Bit encryption in-transit and at-rest data security - Detect and control accidental and/or malicious data leaks - Data loss prevention with customisation policies - Layered Redundancy – ensures secure email storage across multiple networks - Secure Servers - Two Factor Authentication / OTP - Pattern-based encryption - Multi-level Encryption policies - Malicious Attachment Blocking - Anti-Phishing Policies - Protection against advanced malware and phishing attacks - Email domain, attachment, and links screening and quarantine - Malicious files and folders screening and quarantine - DMARC Domain Fraud Prevention - Whitelist/Blacklist Policies - Automatic Signature Disclaimer - Network Redundancy - 24/7 U.S based support - Real-time Reporting - Receive alerts via email/text when unusual activity is discovered - Full visibility into login locations, sharing and downloading activity - Detect and control unsanctioned applications with risky permission settings - Automatically prevent account takeovers with policy enforcement rules
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662527626.15/warc/CC-MAIN-20220519105247-20220519135247-00363.warc.gz
CC-MAIN-2022-21
1,764
30
http://www.authorsden.com/visit/viewwork.asp?AuthorID=88485&id=45820
code
The escort service ended, but the memories were still there in journals and diaries kept by the owner. Enjoy the following chapters and focus by putting yourself in the man or woman’s place for a few minutes. This is not a sex book. All the situations are the truth, but no "real" names are used. The first part of the book is about the clients and the last part concerns the escorts. All information is taken from my notations and I encourage all people to keep journals. You never know when you may want to write a book. [It is a compilation from two prior books in the madam series of books and is with corrections from those two books. Newly formatted to fit Kindle and with a lower price for print. Revised and edited. Readers need to understand some of the material is "dry" because the escorts are written about as "case studies". Amazon Kindle for $9.99.....
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246660493.3/warc/CC-MAIN-20150417045740-00261-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
868
8
https://mattdodge.codes/sf-api-hack-day-hacking-email-inboxes/
code
I attended San Francisco API Hack Day last weekend and had an awesome time. There were some really cool ideas thrown around and I didn’t get mugged taking the bus home at 10 PM so it was a great day. I ended up teaming up with Crystal Rose (@crystalrose) and we made an email hack that I think is pretty cool, so I thought I’d share the idea here. We called it “Hack my Email” (which we named with about 15 minutes to go in the competition) and the idea is to open source email filtering and prioritization before it gets to your inbox. Here we are presenting: We all get tons of email, so much so that we go and unsubscribe from as many things as possible just to cut down. Personally, I use Gmail’s Priority Inbox and find that it actually works pretty well. But what I also found was that you really can’t customize what Gmail marks as priority or not. You can set up “filters” in Gmail but these are limited and actually require the email to get to your inbox before the rules apply. This may seem obvious but even when mail is in my regular inbox (not priority) I still go and look at it. Maybe I want all of my sports digest emails to come to me at once at the end of the day. Or maybe I want shopping deals to come on a weekend when I may actually go shopping. Everybody can probably come up with some sort of rule that they wish they had but that can’t be achieved through a standard Gmail filter. That’s where Hack My Email comes in. What we did is hook up to the ContextIO and SendGrid APIs as inputs. You can use ContextIO to hook to an existing email address and SendGrid to hook into a domain’s email server (can you say corporate monitoring?). When an email is received to your input email address, it is picked up by the platform and run through a filter. It could really be any filter you want, it’s open source! The filter could queue the message for later, mark it as spam, or make use of the Gmail Plus Sign Address Trick. The idea is that you could apply as simple (don’t email me after midnight) or as complex of an algorithm (learning or NLP) as you want here, something that is currently not possible.** For the Hackathon demo, I created a relatively simple algorithm that would determine the sender’s Klout and prioritize based off of that. The idea being if someone with a high Klout Score sends me an email, I would like to mark it as important. To do this, we take the from address, cross-reference the FullContact API to grab the twitter handle, then hit the Klout API to get the Klout Score. If that score exceeds my customizable threshold, mark the email as a “high klout” email so I don’t miss it. It’s probably not the most practical email filtering algorithm but it does demonstrate how something being open source can provide access to a vast array of options that aren’t possible through Gmail Filters. It also didn’t hurt that the Klout API guys (Mashery) were there and were giving out Jamboxes as prizes, here we are with ours! I think there is some potential to an idea like this. There are already apps like Mailbox and Boomerang that have recognized the need for deferring your email until a later time, the problem is that they require you to use a different app to read your email. By plugging in to the email servers you should be able to get around it. You may have to give out a different email address than you actually check but we all already do that anyway (cough cough…Mailinator). It’s obviously still in the idea/prototype stage at this point but I thought I’d throw it out there. To see all of the hacks from that day check out the page on HackerLeague.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159193.49/warc/CC-MAIN-20180923095108-20180923115508-00124.warc.gz
CC-MAIN-2018-39
3,653
7
https://docs.vivvo.com/Tenants.html
code
What are Tenants?¶ A Tenant is the government organization who licenses and manages an instance of CitizenOne. Admin users of the tenant are typically responsible for digital identity for the government and work with other business areas (Organizations) to onboard new services to CitizenOne. These users are responsible for creating Organizations within CitizenOne and can manage Applications, Policies, Service Cards, Trust Providers, Rules and Email Templates within CitizenOne. End user support for citizens would also typically be managed at the tenant level for platform-specific inquiries.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611641.26/warc/CC-MAIN-20210614074543-20210614104543-00307.warc.gz
CC-MAIN-2021-25
597
2
https://docs.bmc.com/docs/bcm128/evaluating-a-device-group-s-financial-data-820509666.html
code
Evaluating a device group's financial data Evaluating the financial data of a device is done via reports. For this CM provides you with a number of predefined reports that you only need to generate. To do so, proceed as follows: - Go to the Financial Asset Management folder under the Reports node and open it. You will find there a number of predefined reports for this topic. - Select a report in the left tree hierarchy, for example, Total Cost of Asset (Purchase) . - Select its subnode Assigned Objects > Device Groups . - Click Assign Device Group . - In the appearing Assign to Device Group window select your target device group and click OK to confirm. - Select the assigned device group in the table to the right. - Click Generate Report . - Click Yes in the appearing confirmation window. - Select the Report Results > Device Group Results > Your Device Group subnode. Here you can see the newly generated report. - Select it and click View A new browser window/tab opens on the screen and displays the report.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178351454.16/warc/CC-MAIN-20210225182552-20210225212552-00215.warc.gz
CC-MAIN-2021-10
1,021
16
http://infoheap.com/recent/page/2/
code
AngularJS directive ng-href can be used to use a template to create href. Directly using it in href can make the link broken before Angular read more AngularJS directive ng-hide hides an element if the expression ng-hide evaluates to true. Under the hood it adds or removes class ng-hide to the element. read more AngularJS ng-focus expression is evaluated when an element (window, input, select, textarea, a) gets focus. AngularJS directive ng-disabled sets the disabled attribute on the element if the expression ng-disabled evaluates to true. AngularJS ng-cloak directive is used to prevent the Angular html template from being briefly displayed by the browser in its raw (uncompiled) form while your read more AngularJS directives ng-class-even and ng-class-odd work like ng-class except that when these are used with ng-repeat, these apply to even and odd rows. AngularJS ng-class directive allows you to dynamically set CSS classes on an element using an expression. The expression can be of one of these three read more AngularJS ng-checked sets the checked attribute on the element, if the expression inside ng-checked is true. AngularJS ng-change expression is evaluated when the user changes the input. AngularJS ng-blur expression is evaluated when an element (window, input, select, textarea, a) loses focus. Copyright © 2016 InfoHeap. Powered by WordPress
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982294097.9/warc/CC-MAIN-20160823195814-00020-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
1,369
12
http://stackoverflow.com/questions/17598424/extracting-specific-parts-of-a-predictably-structured-string-with-unpredictable/17598467
code
Ok, I have a complex problem for you guys. I am trying to extract some values from a load of old data. It's a bunch of strings which are basically 7 parts concatenated with Each section of the string could have any character in it, except |or two arrows like this <>(see further down) which are reserved as separators. Any of the sections could be empty. e.g. In this one the first 1st, 5th and 6th sections are empty, and the 3rd contains lots of non-alphanumeric characters. Some of the strings are made up of multiple ones of these 7 pieces, further separated with Remember, any of the inner sections could be empty. Extract just the second part of every string, and put into an array. In my examples above, it is every part which has the word So for this example: I want to get: And for this example: It can be seen as 3 different strings which are separated by test1||keep-me||1:1||test||3462||7885||test ||keep||||||3462||7885|| test1||keep-me-too!||1:1||test||3462||||test And I want to extract: array('keep-me', 'keep', 'keep-me-too!') I have tried doing this with preg_match but look-behind doesn't like searching for non-fixed length strings. I cannot change the data. It is old data I just have to work with.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539776.45/warc/CC-MAIN-20140416005219-00497-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,219
20
https://forum.freecodecamp.org/t/escape-sequences-in-strings/313004
code
Tell us what’s happening: There should be a newline character between FirstLine should be followed by the newline character Above are the supposed mistakes I am making. Could someone help with this? I feel like I did all right but still can’t pass this stage, can someone revise this stage and help me with it? Your code so far var myStr = "\"FirstLine\"\n\t\\\"SecondLine\"\n\"ThirdLine\""; // Change this line Your browser information: User Agent is: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3902.4 Safari/537.36.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704835901.90/warc/CC-MAIN-20210128040619-20210128070619-00618.warc.gz
CC-MAIN-2021-04
571
10
http://www.codingforums.com/archive/index.php/t-111458.html
code
View Full Version : Sharing session data on different sites? 04-03-2007, 09:24 PM I have multiple websites, and i want to enable it so that when a user goes to any of the websites, and logges in, it will automatically share the same session id throughout all my sites so that they are logged in on all sites. Is there a way to do this? 04-03-2007, 09:27 PM If the websites are all on the same server AND are using or have access to the same database (specifically the users/sessions table) then yes. Well for subdomains I know its possible as I do it. I have never done it with different domain names. You may run into a problem with assigning the session/cookie to the domain. Not sure. 04-03-2007, 09:47 PM Yes, the websites are on the same server, and yes they both have access to the same database. 04-03-2007, 10:09 PM Then have a gander at this page: You will have to do your own saving/loading from the database, but that way you can hook it up to several sites. 04-03-2007, 10:15 PM But when it says... function open($save_path, $session_name) Does the $save_path variable refer to opening it from a mysql database? Or a users cache? And what will been to be put for the session name? 04-03-2007, 10:27 PM You will have to figure that out from the page I linked you too. Since I haven't ever set this up. Why not try a test page. Echo out each function and its variables. See what it is giving you. 04-04-2007, 11:50 PM Ok, got it all sorted now. :) 04-04-2007, 11:52 PM 04-05-2007, 09:30 PM Basically, when a person logges in, it sends a form to another website of mine with the session data, then diverts back. So they are logged in on both sites! 04-05-2007, 09:33 PM Yea but is it sharing the same session id? 04-05-2007, 10:11 PM That sounds like a kludge. Powered by vBulletin® Version 4.2.2 Copyright © 2017 vBulletin Solutions, Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00471-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,871
31
https://www.systutorials.com/get-error-message-on-usb2-stick-read-only-file-system-what-should-i-do-linux-systutorials-qa/
code
Cant read or write to files on usb stick or move or copy them. Could you provide the dmesg output? It will help to understand your question. If it is formated on Windows, you may need to install the ntfs-3g package to write to the usb disk. Read more: mkfs refuses to make filesystem with message “is apparently in use by the system; will not make a filesystem here!” Why I got message “invalid syntax, continuing…” when I execute “sysctl”? How to read the whole file content into a string in Go? How to create a file if not exist and open it in read and write modes in C++? How to export and import message filters of Thunderbird Changing a git commit message after I have pushed it to the server? How to change the commit message of a commit in the history (not HEAD)? How to get a FILE pointer from a file descriptor and how to get a file descriptor from a FILE pointer in C on Linux?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00232.warc.gz
CC-MAIN-2023-40
901
1
https://forums.coregames.com/t/popup-menu-ui/1007
code
I am trying to create a popup menu and it shows that the binding pressed is working but won't hide or show the UI. This is my code so far. local propMenuUI = script:GetCustomProperty("MenuUI"):WaitForObject() function OnBindingPressed(whichPlayer, binding) print("player " .. whichPlayer.name .. " pressed binding: " .. binding) if (binding == "ability_extra_20") then if propMenuUI.visibility == Visibility.FORCE_ON then propMenuUI.visibility = Visibility.FORCE_OFF elseif propMenuUI.visibility == Visibility.FORCE_OFF then propMenuUI.visibility = Visibility.FORCE_ON end end function OnPlayerJoined(player) -- hook up binding in player joined event here, move to more appropriate place if needed player.bindingPressedEvent:Connect(OnBindingPressed) -- on player joined/left functions need to be defined before calling event:Connect()
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00529.warc.gz
CC-MAIN-2023-40
835
8
http://total-bi.com/2011/07/using-sql-developer-with-mysq/
code
You will need to download the most recent version of Connector/J from the MySQL website. This is the official JDBC driver for MySQL, made available under the GPL. Once you have the driver unarchived, move the .jar file somewhere permanent. I like to put all my third party JDBC drivers together in the SQL Developer root directory. Next go to Tools > Preferences > Database > Third Party JDBC Drivers. click Add Entry and browse to the jar file. You should now find a new tab has appeared when you next create a new database connection.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.60/warc/CC-MAIN-20170423031202-00261-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
536
4
https://github.com/NashGameDev
code
RPG game where you are a heart Any sounds for the games HeartBeats Sequencer Puzzle Game for Nash Game Dev Global Game Jam 2013 An Input Framework for iOS gaming. This is probably going to be dead until I finish a much larger project. I like to share though, don't worry, you'll see all the good parts.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948567785.59/warc/CC-MAIN-20171215075536-20171215095536-00498.warc.gz
CC-MAIN-2017-51
302
4
https://www.rozee.pk/UR/front-end-developer-islamabad-jobs-791432.php
code
We are looking to hire a Front-End Web Developer who is motivated to combine the art of design with the art of programming. Responsibilities will include translation of the UI/UX design wireframes to actual code that will produce visual elements of the application. You will work with the UI/UX designer and bridge the gap between graphical design and technical implementation, taking an active role on both sides and defining how the application looks as well as how it works. - Develop new user-facing features. - Build reusable code and libraries for future use. - Ensure the technical feasibility of UI/UX designs. - Optimize application for maximum speed and scalability. - Collaborate with back-end developers and web designers to improve usability - Assure that all user input is validated before submitting to back-end. - Collaborate with other team members and stakeholders. - Stay up-to-date on emerging technologies Qualification & Experience: - Experience in Angular JS is mandatory. - The ideal candidate must have 2+ years hands-on experience in Frontend development. - An ability to perform well in a fast-paced environment. - A enthusiastic individual with a can-do attitude and excellent communication and presentational skills. - Must be a team player and self-starter. - Minimum Bachelor’s Degree in Computer Science or Software Engineering. Technologies and Skills required: - Proficient understanding of web markup, including HTML5, CSS3. - Prior experience with Node.js will be a huge plus.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247504594.59/warc/CC-MAIN-20190221111943-20190221133943-00155.warc.gz
CC-MAIN-2019-09
1,514
19
https://forum.nkn.org/t/help-with-dd-wrt-install/3400
code
Has anyone got NKN to run on ddwrt? I cant seem to get it going. I also cant find any recent guides, last one seems to be from 2019 and no longer works (Openwrt install). What kind of problems are you running into? Which router and OS are you using? Which NKN binary are you using? I have not tried myself in recent years, so your experience will be very welcome for the community. I have a Netgear R9000, with latest build or ddwrt. Entware installed, trying to run nknd for arm v7. Downloaded and unzip. Try to run nknd and I get a permission error. I’ll play with it more tomorrow. I also ran that old script, does not work at all.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991812.46/warc/CC-MAIN-20210515004936-20210515034936-00347.warc.gz
CC-MAIN-2021-21
636
5
http://forums.logitech.com/t5/Steering-Wheels-Joysticks/G25-self-calibration-has-a-safety-issue/td-p/94967?nobounce
code
I wouldn't have problem with it if it only self-calibrates it upon system boot. But it also re-calibrates it whenever I wake the computer from sleep. Now this has some serious safety issue. Just the other day, my wife was sitting in my chair in front of the G25, then computer just suddenly woke up... maybe mouse was moved slightly I donno. But anyway, her necklace got caught in the wheel!!! Fortunately, the necklace broke off but if it hadn't... This is bigger issue with G25 than any other wheel because of its large turning radius. A wheel turning half circle each direction isn't big of a deal compared to G25's 900 degree turns while auto calibration. I contacted Logitech support about this via email and they kindly told me that there's no way to disable it and get refund for the wheel. Nice support. I like to keep the wheel but I'd like to see Logitech address this issue. I need the way to disable the self-calibration and also a way to manually calibrate the wheel as it often mis-calibrated when computer wakes from sleep forcing me to reboot anyway. I am not aware of any way to disable this on the Logitech side. You may want to see if you can modify your settings in Vista to keep the USB bus from powering down when the system goes to sleep. That is what is probably causing it to go through the calibration routine every time it wakes. The only other option in your case would be to disconnect the wheel when you are not using it. BTW, unplugging and replugging the wheel should reset the calibration. You should not have to reboot to do this.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824201.28/warc/CC-MAIN-20160723071024-00000-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
1,564
6
https://www.daniweb.com/web-development/php/threads/465718/xampp
code
davy_yg Posting Whiz 1,532 posts since May 2011 Reputation Points: 16 [?] Q&As Helped to Solve: 1 [?] Skill Endorsements: 2 [?] •Community Member 0 1 Year Ago Hello, I have the following error whenever I try to run phpmyadmin: Welcome to phpMyAdmin Error MySQL said: Documentation 2002 - No connection could be made because the target machine actively refused it. The server is not responding (or the local server's socket is not correctly configured). Connection for controluser as defined in your configuration failed. How to fix it?
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986444.39/warc/CC-MAIN-20150728002306-00149-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
537
1
https://cyberdessy.com/owasp-top-10-2021-6-vulnerable-and-outdated-components/
code
Many present distributed web applications use open source libraries and frameworks as part of their design. Any part that has a known vulnerability develops into a weak point that can compromise the security of the entire application. Any software or code that is vulnerable, unsupported, or out of date falls into the Vulnerable and Outdated Components category. It has climbed up from ninth place and was formerly named Using Components with Known Vulnerabilities. Impact of Vulnerable and Outdated Components In other words, what is the impact of using components with known vulnerabilities? - Although often less focused on, using software and libraries with vulnerabilities subjects your system to future attacks if not updated or patched. Remedy to Vulnerable and Outdated Components Continuously checking all code components for known vulnerabilities and applying patches or other remedies as soon as a vulnerability is discovered are the best forms of defense. The following best practices increase the potency of this line of defense: - Configuration management should apply to all components incorporated into the organization’s frameworks. - All of the components that need to be monitored must be automatically discovered by the scanner. - A thorough vulnerability database that has been enhanced with threat intelligence data should be used for scanning. - To minimize the operational risk associated with patching, the patch management workflows for selecting, testing, and delivering the appropriate patch should be as automated as possible. CWEs List for Vulnerable and Outdated Components - CWE-937 OWASP Top 10 2013: Using Components with Known Vulnerabilities - CWE-1035 2017 Top 10 A9: Using Components with Known Vulnerabilities - CWE-1104 Use of Unmaintained Third Party Components References To Get More Understanding of Vulnerable and Outdated Components This will be all for the Day 10 post. Hope you enjoyed it, kindly let me know in the comments section. Be sure to check out other blog posts of interest or come back tomorrow for the next day’s post.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00742.warc.gz
CC-MAIN-2024-18
2,082
17
https://odsc.com/speakers/why-dataframe-is-not-always-the-best-option-for-distributed-computing/
code
Abstract: Distributed computing engines such as Spark, Dask, and Ray allow data practitioners to scale their data processing over a cluster of machines. Data practitioners coming from a Pandas mindset often have a difficult time handling use cases that don’t fit DataFrame semantics. In this talk, we will - Clarify the so called unstructured data is not the criteria. It is a common misunderstanding unstructured data is not a fit for dataframe. We will use examples to illustrate different cases may or may not fit the dataframe concept. - Explain the true reasons when dataframe is not a good fit. We will show a few scenarios where using dataframe is either an overkill or insufficient. - Look at other distributed data structures such as Bag (RDD), Future, and Array. We will discuss their pros and cons and the most appropriate scenarios to use each of them. We will also discuss the mindsets and best practices helping us make the right choices: - Separating orchestration and compute layers - Reducing data footprint and transfer between nodes - Tuning worker cores utilization Attendees should have good understanding of Python, but no expert knowledge required for Spark, Dask and Ray Bio: Han Wang is the tech lead of Lyft Machine Learning Platform, focusing on distributed computing solutions. Before joining Lyft, he worked at Microsoft, Hudson River Trading, Amazon and Quantlab. Han is the creator of the Fugue project, aiming at democratizing distributed computing and machine learning.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816875.61/warc/CC-MAIN-20240414064633-20240414094633-00420.warc.gz
CC-MAIN-2024-18
1,504
10
https://devilsgarage.newgrounds.com/news/7
code
This was my first trip to the Con to catch up with The Behemoth and finally get to meet Tom and Dan, creators of Castle Crashers and other awesome games. Tom had a lot to talk about the future of Newgrounds and I must say I'm super excited! An early ride to San Diego with SeanJames got us there just as the show started. We tried scouting the whole place to see all the booths, but that place was way bigger than E3 or GDC. All under one roof. Got to play a good game of BattleBlock Theater and get a feel for it. I have to say it was a blast! We got to meet few other NG fans. The other highlight was getting to meet Bill Plympton, Kelly from the Behemoth and Michael Swain (from The Swain). We missed Graham Annable from Puzzle Agent, Luis and Tomamoto (in the photos: SeanJames, Tom, Devil's Garage | The Devil and Dan Paladin)
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998986.11/warc/CC-MAIN-20190619123854-20190619145854-00143.warc.gz
CC-MAIN-2019-26
831
4
https://www.topcv.vn/viec-lam/java-developer-thu-nhap-hap-dan/504261.html?ta_source=JobSearchList
code
Mô tả công việc - To take part in software and architectural development activities. - Contribute into all phases of the development lifecycle. - Conduct software analysis, programming, testing and debugging. - Identifying production and non-production application issues. - Ensure designs are in compliance with specifications. - Recommend changes to improve established application processes. - Develop technical designs for application development. - Develop efficient application code for programs. - Create application documentation. - Cooperation with other relevant software development team members. - Communication with business and colleagues from other countries - Performs other duties as assigned. Yêu cầu ứng viên - BS degree in Computer Science, Engineering or a related subject. - Strong proficiency in programming languages, databases, web technologies. - 2+ years of experience with Java-based technologies (Java, J2EE, Hibernate, Spring Framework, Spring Data Rest Framework, Spring Security, …) - Strong experience in designing and developing web-based application, web services integration (SOAP, REST, Websocket, …) - Experience in developing with Message Queue (Kafka, Active MQ, Rabbit MQ, …) and event processing. - Object oriented analysis and design using common design patterns, parallel programming, and data modelling. - Experience with test-driven development. - Great motivation and willingness to collaborate, strong sense of ownership and responsibility. - Experience supporting and working with cross-functional teams in a dynamic environment. - Strong analytical and problem-solving skills, with proven ability to design pragmatic solutions. - Excellent verbal and written communication skills. - Fluent English – both spoken and written. Quyền lợi được hưởng - Attractive and Competitive Remuneration - Attractive Performance Bonus - Medical and accident healthcare 24/7 - Professional working environment Cách thức ứng tuyển Ứng viên nộp hồ sơ trực tuyến bằng cách bấm Ứng tuyển ngay dưới đây. Hạn nộp hồ sơ: 11/11/2021 THÔNG TIN TUYỂN DỤNG VIỆC LÀM LIÊN QUAN Hotline CSKH: (024) 7107 9799 0862 69 19 29
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00178.warc.gz
CC-MAIN-2021-43
2,221
38
https://www.mahawar.net/blog/mahawar-net-financials/
code
Protected: mahawar.net Financials Last updated on August 10th, 2020 at 01:01 am MBA in Finance,Marketing | Master in Computer Application | Oracle Technologist | an Analyst | Data Scientist | Pythonista | Chess aficionado | Shutter-bug | Yoga enthusiast. Vijay believes in sharing knowledge both in his professional and personal life. He has tried to fulfill it via this blog. Vijay's Resume is here. For any feedback / suggestion please drop mail to firstname.lastname@example.org You cannot believe in God until you believe in yourself.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154798.45/warc/CC-MAIN-20210804080449-20210804110449-00258.warc.gz
CC-MAIN-2021-31
538
7
https://supportforums.cisco.com/discussion/10341846/acns-flashrtmp
code
I have an ACNS implementation with 20+ sites using WCCP service 80-83 & webcache. I have a client that wants to publish a video portal with flash similar to youtube. These VOD's will be low quality/bandwidth. My question is with the existing WAE's onsite is there any way I could preposition the flash media file and have it serve the local users at the sites? From what I have read to "stream" flash to the desktops the rtmp protocol is used. Can I use rtmpt and publish the links to the videos as http URL's and have wccp intercept the packets and redirect to the WAE for acquisition? I cannot find any information if rtmp is a supported streaming format for WAE's running ACNS 5.5+? any suggestions or comments are appreciated. ACNS basically supports native WMT, Real and Quicktime streaming. Flash can be supported via progressive downloads via HTTP and played locally on the desktop. You would have to enable webcache and manage the streaming/downloads via HTTP. Hope that helps,
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542972.9/warc/CC-MAIN-20161202170902-00046-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
985
8
https://digitalmapsoftheancientworld.com/mythology/greek-mythology/mythical-creatures/hippocampi/
code
They were the fish-tailed horses of the sea. They were depicted as composite creatures with the head and fore-parts of a horse and the serpentine-tail of a fish. The ancients believed they were the adult-form of the small fish we call the “sea-horse”. Hippocampi were the mounts of Nereid nymphs and sea-gods, and Poseidon drove a chariot drawn by two or four of the creatures. Other fish-tailed land animals which appear in ancient art include the Leocampus (fish-tailed lion), Taurocampus (fish-tailed bull), Pardalocampus (fish-tailed leopard), and Aegaecampcs (fish-tailed goat).
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00252.warc.gz
CC-MAIN-2023-14
587
3
https://www.govocal.ai/support/docs/podcast-alexa-skill/create-multi-language-alexa-skill/
code
This tutorial will show you how to quickly deploy or created mutli-language Alexa skill on GoVocal.AI 1. Select Language Select language on integration page. You can select one or more than one language for single skill Once you have filled all the required details, Click on One-Click Deploy in the bottom right corner of the pop-up. It will automatically deploy your skill in selected languages. 2. Select Test On Alexa Simulator
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057796.87/warc/CC-MAIN-20210926022920-20210926052920-00654.warc.gz
CC-MAIN-2021-39
431
5
https://www.rdocumentation.org/packages/ecospat/versions/2.0/topics/ecospat.boyce
code
Calculate Boyce Index Calculate the Boyce index as in Hirzel et al. (2006). The Boyce index is used to assess model performance. ecospat.boyce (fit, obs, nclass=0, window.w="default", res=100, PEplot=T) - A vector containing the predicted suitability values - A vector containing the predicted suitability values of the validation points (presence records) - The number of classes or vector with class thresholds. If nclass=0, the Boyce index is calculated with a moving window (see next parameters) - The width of the moving window (by default 1/10 of the suitability range) - The resolution of the moving window (by default 100 focals) - If true, plot the predicted to expected ratio along the suitability class The Boyce index only requires presences and measures how much model predictions differ from random distribution of the observed presences across the prediction gradients (Boyce et al. 2002). It is thus the most appropriate metric in the case of presence-only models. It is continuous and varies between -1 and +1. Positive values indicate a model which present predictions are consistent with the distribution of presences in the evaluation dataset, values close to zero mean that the model is not different from a random model, negative values indicate counter predictions, i.e., predicting poor quality areas where presences are more frequent (Hirzel et al. 2006). - Returns the Boyce index value: Spearman.corCreates a graphical plot of the predicted to expected ratio along the suitability class Boyce, M.S., P.R. Vernier, S.E. Nielsen and F.K.A. Schmiegelow. 2002. Evaluating resource selection functions. Ecol. Model., 157, 281-300. Hirzel, A.H., G. Le Lay, V. Helfer, C. Randin and A. Guisan. 2006. Evaluating the ability of habitat suitability models to predict species presences. Ecol. Model., 199, 142-152. obs <- (ecospat.testData$glm_Saxifraga_oppositifolia [which(ecospat.testData$Saxifraga_oppositifolia==1)]) ecospat.boyce (fit = ecospat.testData$glm_Saxifraga_oppositifolia , obs, nclass=0, window.w="default", res=100, PEplot=TRUE)
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657142589.93/warc/CC-MAIN-20200713033803-20200713063803-00415.warc.gz
CC-MAIN-2020-29
2,062
15
https://www.brainscape.com/flashcards/m362-unit-12-1226628/packs/2409462
code
Define the two types of portability/mobility. Physical portability (ability to easily carry and move a computing device from one physical location to another) and application portability (ability to adapt an application to a different platform). Mobile code has already appeared in previous units. Give an example. A typical example of mobile code is an applet (Unit 9, Subsection 3.1), which is transferred from the server to the client’s machine and executed there. In which way do mobile systems reinforce the fallacy that 'the network is reliable'? Mobile systems often use wireless communication, which is less reliable than wired communication. For example, a simple movement of a device may interrupt its line-of-sight infra-red communication with another device. Also, radio signals can be subject to interference and be simply cut off, e.g. when going underground. How does the fallacy of 'infinite bandwidth' relate to mobile systems? The relationship is due to wireless communication, which has lower bandwidth than wired connections. Moreover, bandwidth is shared among devices in the same cell (Subsection 2.1). As such, the actual bandwidth for each user might be just a small fraction of the overall available bandwidth. Name at least 4 of the fallacies of distributed computing. The network is reliable. Latency is zero. Bandwidth is infinite. The network is secure. Topology doesn’t change. There is one administrator. Transport cost is zero. The network is homogeneous. Name 4 types of wireless communication. WiFi, WiMax, Bluetooth, ZigBee Why are wireless sensor networks usually ad-hoc? Allows the network to automatically accommodate the addition and removal of sensors. More robust to node failure - routing can dynamically bypass any sensors that are not working. What are the two main issues involved in developing software for physically mobile systems? Application portability and context awareness. Application portability is important because there is a wide range of models with differing features, and we would like the same application to work on all models that include the required features. Context awareness is important as applications will only take advantage of mobility if they are aware of the current context of operation (e.g. turning off alarms if a mobile phone is in ‘silent mode’) What are the three mobile code paradigms? Remote evaluation, code on demand, mobile agent. What are some of the advantages and disadvantages of mobile agents and code on demand? Mobile agents can be used for sophisticated systems, but they are complex, have a bigger overheard, do not have good scalability, are hard to design and test, and require tight security. Code on demand requires only weak mobility, while mobile agents require strong mobility. Code on demand is more scalable, and applications using code on demand are easier to design and test than a mobile agent. Describe the economic impact of mobile systems. Mobile systems allow people to work anywhere at any time; potential economic advantage of increased productivity, but potential social disadvantage of a decrease in work–life balance. There are advantages for businesses that require their employees to visit clients. For example, an engineer recording details about repairs whilst on-site about times, parts, etc - recorded information could help the company detect recurrent problems, manage stock more efficiently, target staff development, etc - more efficient to use a mobile device than paper. Describe some social impacts of mobile systems.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828318.79/warc/CC-MAIN-20181217042727-20181217064727-00097.warc.gz
CC-MAIN-2018-51
3,558
30
http://ma.ndar.in/article/automating-entity-generation-with-php-and-impactjs/
code
Automating entity generation with PHP and ImpactJS While working on the JIPPI game we needed tools for easing the development. One of the tools was a PHP script for automating generation of entities. We would get the sprite sheets from Making Waves, and then it was our job to make the entities come alive. To make this process as flexible as possible, we needed a workflow that would allow the client to update the sprite sheets whenever needed. We could therefore not add any functionality to the generated entities. Otherwise, they would be overwritten during the next update. Instead, we turned the hierarchy upside-down. Generated entities would extended a parent entity that gave them a particular set of behaviours. The PHP script got instructions for how to generate entities by reading the file names of the sprite sheets. Let's consider the following file name: - Tells the script to save the entity in game/entities/thomas. Create the folder if it doesn't exist. - Name the file player.js. - Load the entity definition template called character. - Split the sprite sheet in 2 columns and 4 rows. - Define a set of animations, where the first animation is called 'idle' and uses the first index of the sprite sheet. Next add an animation called 'jump', consisting of sprite index 1, 2 and 3. Wait animation uses index 4 and 5, and lastly add two animations with one frame each, called sit and crouch. The script was split up into several files where the most important ones were the template files. They had each a parser with a set of rules specific for that template, and a function that would merge the data from the file with a template file. Some templates could generate multiple entities per file. The other files would do things like calculating the size and offset of each tile in a sprite sheet. The PHP script followed the following routine: - Scan media folder for valid image files. - Run the file name with the parser for each entity template to see if the file is supposed to be made into an entity. One can make the script ignore files by naming the file something that doesn't match any of the patterns in the parsers. - When a template has been found, test it agains the class that splits the image into the desired number of rows and cols. If the image has the wrong size, abort the script. - Calculate each tile's size and offset by looping over each transparent pixel from top > bottom, right > left, bottom > top and left > right until we either reach the other side of the image (all the pixels are transparent) or a pixel with a transparency level above a defined threshold. - If any animation has been specified in the file name, set up all the animations. - Merge all of this data with a template. - Write the file to the correct folder, overwriting any old entity. With this routine, we generated about 50 entities in only a couple of seconds. If we were to manually create and maintain these entities we would spend hours each update, and it would be prone to errors.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689413.52/warc/CC-MAIN-20170923014525-20170923034525-00208.warc.gz
CC-MAIN-2017-39
3,005
19
https://www.trendypaper.com/product/j2ee-the-complete-reference
code
J2EE: The complete Reference is a comprehensive and best selling guidebook to understand and work with the J2EE platform. Authored by James Keogh, the book assists in the practice and theoretical requirements of amateur and professional programmers alike. The book has sections covering all of the commercially important applications of J2EE. It begins with explaining the J2EE architecture, its databasing, and Web services. The book lists down best practices for working with JSPs, EJBs, JDBCs, and Java Servlets, listing down ways to build components using these tools. Moreover, it also has the important section on implementing Java Server API and the Java
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823442.17/warc/CC-MAIN-20181210191406-20181210212906-00293.warc.gz
CC-MAIN-2018-51
661
2
https://forums.getburst.net/t/wallet/639
code
Hello I’m looking to invest but don’t know where I can store my coins any help please @Rocheyboi96 there is a online wallet. Here is the site I know that it take a while, but it is worth it. Here is the thread for the site If you need more help just ask. I hoe this helps
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746112.65/warc/CC-MAIN-20181119212731-20181119234731-00171.warc.gz
CC-MAIN-2018-47
275
7
https://socialsecurityprotectors.com/project-qt-hack-tool/
code
Project Qt Hack Tool. Oa outdated project qt nutaku games (18. Attack on moe h nutaku hack unlimited money october 2020. We want to keep the barrier low so please don't hesitate to get started with your new idea in the playground even if you're not sure. June 20 at 2:47 pm ·. Select the amount to generate to your account and click 'generate'. Develop Easily And Cheaply With Us. Hence, a discussion about how to hack project qt and whether you should use the tools for hacks or not, if yes then which are the suitable ones is discussed after the cheats for project qt. After exploring various options, we are now almost. Create gui applications trivially with a full set of widgets. 325+ Demo Programs & Cookbook For Rapid Start. But for instance with cmake you could use getprerequisites(). Over the past year we have been working with many of you to sort out how we make development of qt even more inclusive and open. Nutaku hack tools password october 2020. Building Qt 5 From Git. Project qt mod apk hack tool 2021 get unlimited gems (unlimited gems/diamonds/skills/infinite hp ) 100% working. We have tutorials, tools, a very friendly, active and. Nutaku coins hack no survey october 2020. Supports Tkinter, Qt, Wxpython, Remi (In Browser). We want to keep the barrier low so please don't hesitate to get started with your new idea in the playground even if you're not sure. Getting started with new ideas on qt project's playground. Nnutaku gold hack passoword october 2020. Install Qt 5 On Ubuntu. Cybertron mika cybertron mod mikacybertron nutaku project qt nutaku project qt apk nutaku project qt cheat nutaku project qt hack nutaku project qt mod; Android mods & ios mods are not the only things we can offer you. Install qt 5 dev suite windows.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500628.77/warc/CC-MAIN-20230207170138-20230207200138-00387.warc.gz
CC-MAIN-2023-06
1,759
12
https://osmino.com/applications/com.foncannoninc.babyNamer
code
Wondering if a baby name is becoming popular? Or going out of style? Baby Names lets you browse thousands of baby names by either popularity or alphabetically. You can then watch popularity trends, save your favorite names, and read all about name meanings! The baby name meanings function is newly added, and links up with Behindthename.com to provide detailed information about your baby''s name, including the meaning of the name as well has famous people who had it! - uses data from real baby names reported to the Social Security database - can sort names by gender, and save them to favorites - gives detailed information about your baby''s name, and even information about famous people with that name, thanks to behindthename.com - all free! (ad supported).
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038887646.69/warc/CC-MAIN-20210419142428-20210419172428-00205.warc.gz
CC-MAIN-2021-17
766
6
https://answers.sap.com/questions/12041552/change-hostname-in-document-link.html
code
We are on BI 4.1 SP1 on Win2008R2. We moved from hosta to hostb. In BI LaunchPad, when I right click the report and choose "Document Link" it open a link. I still see the old hostname, which is hosta. How can I change it. There must some global setting so all link picks up new hostname. Please advice if anyone has come across this issue.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00788.warc.gz
CC-MAIN-2022-33
339
6
https://research.utwente.nl/en/publications/dynamic-homecare-service-provisioning-a-field-test-and-its-result
code
Providing IT-based care support for elderly at home is proposed as a highly promising appraoch to address the aging population problem. With the emergence of homecare application service providers, a homecare system can be seen as a linked set of services. Configuring and composing existing homecare application services to create new homecare composite applications can reduce the application development cost. The idea even looks more promising if the service provisioning is dynamic, i.e., if applications can update their behaviors with respect to the contextual changes without or with minimum manpower. Dynamic service provisioning can play an important role to accept homecare systems in practical settings. This motivated us to develop a Dynamic Homecare Service Provisioning (DHSP) platform to address the homecare context changes in an effective and efficient manner. As a proof of concept, we have developed a software prototype of our platform. The prototype was subsequently used in a real-world field test at a care institution in the Netherlands to validate the approach. This paper describes the design of the field test and reflects on the outcome of the validation experiments. |Name||Lecture Notes in Computer Science| |Conference||Joint International Workshop on Process Support and Knowledge Representation in Health Care, KR4HC/ProHealth 2013, Murcia, Spain| |Period||1/06/13 → …| - Dynamic provisioning - Context awareness - Field test - Homecare Services
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00055.warc.gz
CC-MAIN-2023-50
1,483
8
https://lists.gnupg.org/pipermail/gnutls-help/2019-August/004557.html
code
[gnutls-help] Asynchronous operation. carlo at alinoe.com Sun Aug 4 18:17:38 CEST 2019 Is it possible to use gnutls with a library that does all the socket Assuming TCP, data being sent and received is merely a stream. Shouldn't it be possible to make gnutls oblivious of network layers and sockets and merely put it in between a stream of data? [Application] <---> [gnutls] <---> [async I/O library] Where the application takes care of setting up the TCP connection and uses call backs from gnutls to write data an output buffer that the I/O library writes to a socket, while data from the socket is written to a buffer and from there passed on to gnutls. On the other side would then just be plain data going back and forth. If this is possible, is there client example code that uses Carlo Wood <carlo at alinoe.com> More information about the Gnutls-help
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00730.warc.gz
CC-MAIN-2023-40
858
18
http://www.aquariumadvice.com/forums/f60/several-smaller-filter-systems-instead-of-on-big-one-228307.html
code
So I think I'd like to get neons, or rasboras, or somethin similar to replace my current Australian rainbows, but I'm afraid that they'll get sucked up in the filter of my 20 gal . tank like before. So my question is, can I use more smaller filter systems instead of one big one so that there's less suction from my hob filters? Also, with the little blue filter cartridges, should I really leave them in for more than a month, even though the instructions say to change them every month? And what's a good alternative to the blue cartridges ?
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00140-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
543
4
http://orana.info/tag/weblogic-community/
code
Business Components can be exposed as SOAP Services. Application Module provides Service Interfaces as a way to define operations for the services to be exposed. Custom methods written in AMImpl class can also be exposed as operation of web services. But one of the limitation is that there is restriction on return types from the services exposed as service interface from Application Module. In this post we will see how easily we can develop (more...)
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930109.71/warc/CC-MAIN-20150521113210-00048-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
454
6
https://communities.vmware.com/message/2971117
code
My recommendation to you is to start from scratch as sjesse suggested and moving forward snapshot your golden image at each major steps. That way if something goes wrong you can always revert to a previous snapshot rather than start over from scratch. I do not have tool in front of me at the moment, but there is a section or tab that shows what registry changes were made for each item in the template. Then you can track down the registries and change them back. It is very tedious.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107922411.94/warc/CC-MAIN-20201031181658-20201031211658-00541.warc.gz
CC-MAIN-2020-45
485
2
https://purewaterfiltersystems.com/compare-well-water-filter-systems-for-private-wells/
code
Compare Well Water Filter Systems For Private Wells Unlike water supplied by a municipal water source, private well owners are solely responsible for its treatment, purification, and filtering. Compare and contrast private well water filtration system options, such as UV water systems, chlorine well water treatment, Reverse Osmosis systems, and more to ensure you have clean safe water for your home and family. Learn more about well water treatment at https://www.freshwatersystems.com/t-well-Water-Purification-Systems-and-Treatment.aspx Resources & References: UV Water Filter Systems: https://www.freshwatersystems.com/c-157-uv-systems.aspx RO Water Filter Systems: https://www.freshwatersystems.com/c-137-reverse-osmosis-systems.aspx EPA Basic Well Water Info: http://water.epa.gov/drink/info/well/basicinformation.cfm CDC Private Ground Water Wells: http://www.cdc.gov/healthywater/drinking/private/wells/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104209449.64/warc/CC-MAIN-20220703013155-20220703043155-00104.warc.gz
CC-MAIN-2022-27
913
8
https://gbatemp.net/threads/ds-4077-hottarake-no-shima-kanata-to-nijiiro-no-kagami-japan.172210/
code
Separate names with a comma. Discussion in 'GBAtemp & Scene News' started by Chanser, Aug 5, 2009. What's the game about? The cover looks a little stupid. EDIT: Sorry Chanser, but I'm in a bit of a bad mood today, these trash posts I made may be deleted if wanted. Now I'm not one to complain, but do you have anything useful to say rather than trashing releases. Ah dang I thought it said "Canada and the rainbow mirror" I was like go Canada! apparently it was a movie: http://www.animenation.net/blog/2009/07/13...ailer-released/ the movie is important, as it's the first 3d movie from production I.G. who are famous from ghost in the shell and the final evangelion movies then an anime like ds game was made. http://www.bandaigames.channel.or.jp/list/hottarake/ Just in case you were wondering (I'm a bit bored and some google searchs later I came up with this. I have no intention of playing it though, I dont know japanese ) It's an RPG, and a fairly attractive 3D one at that. But it's published by Namco/Bandai, so unless someone like Ignition or XSeed picks it up, we're not likely to see it leave Japan anytime soon. My guess is it's just another game most folks without an understanding of the Japanese language will want to take a pass on. it plays similarly to zelda. It's pretty decent without any language understanding. well the first hour of playing it was easy.... then i stopped because of the awesomeness that is Blood of Bahamut. Aanyways, the art style reminds me of animal crossing... with a more decent main character. edit: fixed a typo. this reminds me of Legend of Zelda + Animal Crossing. The actions + controls are w/ stylus, while sprites are Animal Crossing.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591481.75/warc/CC-MAIN-20180720022026-20180720042026-00089.warc.gz
CC-MAIN-2018-30
1,688
15
https://www.gravitee.io/demo
code
As demands grow on APIs, there is a growing need for the heads of technical teams to have visibility and control over the APIs within their organisation and the development teams that manage them. Here at Gravitee.io our goal is to converge teams within an organisation, from business to operational to use one unified API platform. Putting you in control of your API eco-system. Gravitee.io helps companies manage their API lifecycle, from designing, publishing to securing and monitoring. All of which can be viewed and managed effortlessly from a single and consolidated platform. The Gravitee.io API Management Platform, used by many companies globally is: - Low Cost. - The Richest API Platform. - Customers say that installation and API configuration was much easier than other API Management tools.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588246.79/warc/CC-MAIN-20211028003812-20211028033812-00000.warc.gz
CC-MAIN-2021-43
805
7
https://df3ndr.com/Book/4/10/3-auditing_yul_inline_assembly.html
code
While power of low-level programming unlocks efficiency and functionalities beyond the reach of high-level Solidity code, it also introduces significant challenges for smart contract security researchers tasked with auditing these contracts. In this section we explores the intricacies of auditing inline assembly, highlighting key areas of focus, potential vulnerabilities, and best practices for security professionals. - Correctness and Efficiency: Ensure that the inline assembly code achieves its intended functionality without introducing inefficiencies or unnecessary complexity. - Security Vulnerabilities: Inline assembly can be even more prone to low-level vulnerabilities and exposes additional risks including error handling issues. Auditors must meticulously review assembly code for these issues. - Data Handling and Storage: Review how data is accessed and manipulated, especially concerning storage and memory. Incorrect handling can lead to vulnerabilities or unexpected behavior. - Integration with Solidity Code: Examine the interaction between inline assembly and surrounding Solidity code to ensure seamless and secure integration, particularly regarding variable scoping and state changes. - Unchecked External Calls: Inline assembly might bypass Solidity’s checks on external calls, leading to potential cross-contract security risks such as reentrancy attacks. - Improper Access Control: Direct manipulation of storage in assembly may circumvent Solidity’s visibility and access modifiers, potentially exposing sensitive contract internals. - Stack and Memory Mismanagement: Errors in stack manipulation or memory allocation can result in corrupted data or vulnerabilities exploitable by attackers. As a Security Researcher it makes a lot of sense to engage with the contract’s developers to understand the rationale and business logic behind inline assembly and discuss any findings or concerns. Collaboration can lead to a deeper understanding of the contract’s logic and potential security implications. Auditing inline assembly in smart contracts is a complex task that requires specialized knowledge and meticulous attention to detail. Given its ability to directly interact with the EVM, inline assembly introduces unique security considerations that auditors must address. By focusing on key areas such as correctness, security vulnerabilities, data handling, and the integration with Solidity code, and adhering to best practices, security researchers can uncover and mitigate potential risks, ensuring the security and reliability of smart contracts that utilize inline assembly. As the Ethereum ecosystem continues to evolve, the role of auditors in scrutinizing these low-level constructs becomes increasingly critical in safeguarding the integrity of blockchain applications.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817112.71/warc/CC-MAIN-20240416222403-20240417012403-00734.warc.gz
CC-MAIN-2024-18
2,819
10
https://mail.python.org/pipermail/tutor/2008-January/059810.html
code
[Tutor] Projects (fwd) keridee at jayco.net Fri Jan 25 04:01:03 CET 2008 > Nope, if you read the code you'll see the only mapping done is up to 20 > and then by tens up to 100, that's all. > The same code could be used with a list, you'd only have to change the > exception name. I see. There were "..." in between each of the tens entries which I took to mean that "big huge dictionary but left out some values in email for simplicity". I feel ashamed for not recognizing that the ellipses where there for some other purpose. ;-) Anyway, beyond speed-up you might be able to get some better memory usage stats by switching my lists to tuples, since the contents never change. More information about the Tutor
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998817.58/warc/CC-MAIN-20190618203528-20190618225528-00365.warc.gz
CC-MAIN-2019-26
709
14
https://filehippo.com/es/download_dotconnect_for_mysql/87664/
code
dotConnect for MySQL, formerly known as MyDirect .NET, is an enhanced ORM enabled data provider for MySQL that builds on ADO.NET technology to present a complete solution for developing MySQL-based database applications. It introduces new approaches for designing application architecture, boosts productivity, and leverages database applications. The tool supports Entity Framework, NHibernate, and LinqConnect (formerly known as LINQ to MySQL). PLEASE NOTE THIS IS A 30 DAY PROFESSIONAL TRIAL The bug with absent Devart.Data.MySql.NHibernate.NHibernateMySqlConnection and Devart.Data.MySql.NHibernate.NHibernateMySqlCommand classes in the .Net Core NuGet package is fixed. Using an extended property of type OutputInfo is supported. Code generated for nullable properties is simplified: now T? is generated instead of System.Nullable<T> An additional constructor that accepts DbContextOptions as an argument is added to the DbContext class descendant in the VB.NET version of the DbContext template for EF Core. The bug with "No database provider has been configured for this DbContext." in the DbContext template for EF Core is fixed. The bug with code generation for nullable properties for EF1/EF4/EF5/EF6 is fixed. Entity Framework support Entity Framework Core 2.1.3 is supported. The bug with throwing an error by context.Database.Migrate(), when the __EFMigrationsHistory table already exists but tables being mapped by model classes are not created yet, in EF Core 2 is fixed. The bug with a memory leak in EF Core 2, when a connection is set for DbContext as an MySqlConnection instance, and not via a connection string, is fixed.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528869.90/warc/CC-MAIN-20190723043719-20190723065719-00091.warc.gz
CC-MAIN-2019-30
1,641
14
https://prettylittlehires.com/products/house-of-cb-liberty-corset-1
code
Bought a back up one as I thought the original got stolen. This has been worn 3x max in perfect. This is a dead-stock item House of Cb don’t sell anymore. Condition is perfect as it’s such good quality do not need the second one. Size small on tags Refer to renting post for size guide. Condition - 10/10
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00785.warc.gz
CC-MAIN-2024-10
308
5
http://web2.sys-con.com/node/2459155
code
|By PR Newswire|| |November 26, 2012 04:45 PM EST|| Experimental technology could transform field of lung transplantation LOS ANGELES, Nov. 26, 2012 /PRNewswire-USNewswire/ -- First there was the "heart in a box," a revolutionary experimental technology that allows donor hearts to be delivered to transplant recipients warm and beating rather than frozen in an ice cooler. Now that same technology is being used to deliver "breathing lungs." The lung transplant team at Ronald Reagan UCLA Medical successfully performed the nation's first "breathing lung" transplant in mid-November. The patient, a 57-year-old who suffered from pulmonary fibrosis -- a disease in which the air sacs of the lungs are gradually replaced by scar tissue -- received two new lungs and is recuperating from the seven-hour surgery. The groundbreaking transplant involved an experimental organ-preservation device known as the Organ Care System (OCS), which keeps donor lungs functioning and "breathing" in a near-physiologic state outside the body during transport. The current standard involves transporting donor lungs in a non-functioning, non-breathing state inside an icebox. With the OCS, the lungs are removed from a donor's body and are placed in a high-tech OCS box, where they are immediately revived to a warm, breathing state and perfused with oxygen and a special solution supplemented with packed red-blood cells. The device also features monitors that display how the lungs are functioning during transport. "Organs were never meant to be frozen on ice," said Dr. Abbas Ardehali, a professor of cardiothoracic surgery and director of the heart and lung transplantation program at Ronald Reagan UCLA Medical Center. "Lungs are very sensitive and can easily be damaged during the donation process. The cold storage method does not allow for reconditioning of the lungs before transplantation, but this promising 'breathing lung' technology enables us to potentially improve the function of the donor lungs before they are placed in the recipient." UCLA is currently leading the U.S. arm of the international, multicenter phase 2 clinical INSPIRE study of the OCS, developed by medical device company TransMedics; Ardehali is the principal investigator for UCLA. The purpose of the trial is to compare donor lungs transported using the OCS technology with the standard icebox method. The INSPIRE trial is also underway at lung transplant centers in Europe, Australia and Canada and will enroll a total of 264 randomized patients. According to Ardehali, in addition to potentially improving donor-lung function, the technology could help transplant teams better assess donor lungs, since the organs can be tested in the device, over a longer period of time. In addition, it could help expand the donor pool by allowing donor lungs to be safely transported across longer distances. "For patients with end-stage lung disease, lung transplantation can dramatically improve the patient's symptoms and offer relief from severe shortness of breath," said Dr. David Ross, professor of medicine and medical director of UCLA's lung and heart-lung transplantation program and UCLA's pulmonary arterial hypertension and thromboendarterectomy program. "The 'breathing lung' technology could potentially make the transplantation process even better and improve the outcomes for patients suffering from lung disease." The "breathing lung" device follows on the heels of TransMedics' "heart in a box" technology, which delivers donor hearts in a similar manner. The multi-center national study of the heart technology, also led by UCLA, is ongoing. Results of a preliminary OCS lung study conducted in Europe were published in the Oct. 10 edition of the journal Lancet. The findings showed good lung transplantation outcomes following preservation using the OCS system. Read the Lancet study at http://www.thelancet.com/journals/lancet/article/PIIS0140-6736%2812%2961344-0/abstract. UCLA's lung and heart-lung transplant program is the largest lung transplantation program on the West Coast and leads the nation in patient outcomes. The program pioneers novel technologies in lung preservation, recipient immune monitoring and immunosuppression and is responsible for significant advances in transplantation for extremely ill and high-risk transplant candidates. For more information about UCLA's lung transplantation program and the INSPIRE trial, visit www.transplant.ucla.edu/lung. Headquartered outside Boston, Mass., TransMedics Inc. is a privately held medical device company founded in 1998 to address the vital, unmet need for better, more effective organ transplant technologies. For more information, visit www.transmedics.com. Ardehali has no financial ties to disclose. For more news, visit the UCLA Newsroom and follow us on Twitter. Provided by Newswise, online resource for knowledge-based news at www.newswise.com (Note to editors: B-roll footage and photos are available.) Amy Albin, [email protected] This news release was issued on behalf of Newswise(TM). For more information, visit http://www.newswise.com. SOURCE University of California, Los Angeles (UCLA), Health Sciences Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at the same time reduce Time to Market (TTM) by using plug and play capabilities offered by a robust IoT ... Jun. 29, 2015 06:00 PM EDT Reads: 1,636 The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of profound change in the industry. Jun. 29, 2015 12:19 PM EDT Reads: 550 SYS-CON Events announced today that BMC will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BMC delivers software solutions that help IT transform digital enterprises for the ultimate competitive business advantage. BMC has worked with thousands of leading companies to create and deliver powerful IT management services. From mainframe to cloud to mobile, BMC pairs high-speed digital innovation with robust IT industrialization – allowing customers to provide amazing user experiences with optimized IT per... Jun. 29, 2015 12:15 PM EDT Reads: 2,500 There will be 150 billion connected devices by 2020. New digital businesses have already disrupted value chains across every industry. APIs are at the center of the digital business. You need to understand what assets you have that can be exposed digitally, what their digital value chain is, and how to create an effective business model around that value chain to compete in this economy. No enterprise can be complacent and not engage in the digital economy. Learn how to be the disruptor and not the disruptee. Jun. 29, 2015 11:00 AM EDT Reads: 2,077 Internet of Things is moving from being a hype to a reality. Experts estimate that internet connected cars will grow to 152 million, while over 100 million internet connected wireless light bulbs and lamps will be operational by 2020. These and many other intriguing statistics highlight the importance of Internet powered devices and how market penetration is going to multiply many times over in the next few years. Jun. 29, 2015 11:00 AM EDT Reads: 1,823 It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society-changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his session at @ThingsExpo, Jason Mondanaro, Director, Product Management at Metanga, discussed how you can plan to cooperate, partner, and form lasting all-star teams to change the world and it starts with business models and monetization strategies. Jun. 29, 2015 10:00 AM EDT Reads: 1,976 The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will addresses this very serious issue of profound change in the industry. Jun. 29, 2015 09:45 AM EDT Reads: 2,354 Business as usual for IT is evolving into a "Make or Buy" decision on a service-by-service conversation with input from the LOBs. How does your organization move forward with cloud? In his general session at 16th Cloud Expo, Paul Maravei, Regional Sales Manager, Hybrid Cloud and Managed Services at Cisco, discusses how Cisco and its partners offer a market-leading portfolio and ecosystem of cloud infrastructure and application services that allow you to uniquely and securely combine cloud business applications and services across multiple cloud delivery models. Jun. 28, 2015 11:00 AM EDT Reads: 2,138 In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology. Jun. 27, 2015 10:00 AM EDT Reads: 2,160 Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem fillin... Jun. 26, 2015 12:00 PM EDT Reads: 2,150 Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Opening Keynote at 16th Cloud Expo, Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, d... Jun. 26, 2015 10:00 AM EDT Reads: 2,010 Converging digital disruptions is creating a major sea change - Cisco calls this the Internet of Everything (IoE). IoE is the network connection of People, Process, Data and Things, fueled by Cloud, Mobile, Social, Analytics and Security, and it represents a $19Trillion value-at-stake over the next 10 years. In her keynote at @ThingsExpo, Manjula Talreja, VP of Cisco Consulting Services, discussed IoE and the enormous opportunities it provides to public and private firms alike. She will share what businesses must do to thrive in the IoE economy, citing examples from several industry sectors. Jun. 25, 2015 02:00 PM EDT Reads: 1,951 In his keynote at 16th Cloud Expo, Rodney Rogers, CEO of Virtustream, discussed the evolution of the company from inception to its recent acquisition by EMC – including personal insights, lessons learned (and some WTF moments) along the way. Learn how Virtustream’s unique approach of combining the economics and elasticity of the consumer cloud model with proper performance, application automation and security into a platform became a breakout success with enterprise customers and a natural fit for the EMC Federation. Jun. 25, 2015 01:30 PM EDT Reads: 2,105 SYS-CON Events announced today that the "Second Containers & Microservices Conference" will take place November 3-5, 2015, at the Santa Clara Convention Center, Santa Clara, CA, and the “Third Containers & Microservices Conference” will take place June 7-9, 2016, at Javits Center in New York City. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Jun. 22, 2015 02:15 PM EDT Reads: 2,627 SYS-CON Events announced today that the "First Containers & Microservices Conference" will take place June 9-11, 2015, at the Javits Center in New York City. The “Second Containers & Microservices Conference” will take place November 3-5, 2015, at Santa Clara Convention Center, Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Jun. 20, 2015 12:00 PM EDT Reads: 3,810 With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal an... Jun. 15, 2015 08:45 PM EDT Reads: 4,038 17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and infrastructure as a service. Jun. 15, 2015 07:15 PM EDT Reads: 3,824 The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today! Jun. 15, 2015 10:15 AM EDT Reads: 5,882 In his keynote at 16th Cloud Expo, Rodney Rogers, CEO of Virtustream, discusses the evolution of the company from inception to its recent acquisition by EMC – including personal insights, lessons learned (and some WTF moments) along the way. Learn how Virtustream’s unique approach of combining the economics and elasticity of the consumer cloud model with proper performance, application automation and security into a platform became a breakout success with enterprise customers and a natural fit for the EMC Federation. Jun. 11, 2015 08:00 AM EDT Reads: 2,272 The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago. Jun. 10, 2015 06:00 PM EDT Reads: 3,271
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375090887.26/warc/CC-MAIN-20150627031810-00289-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
16,603
65
http://www.49erswebzone.com/forum/nfl/169101-shooting-at-kc-chiefs-facility/page9/
code
Originally posted by marshniners24:Saying this act is rare and shocking is ignorant? What is wrong with you? Originally posted by BobS: True, but most people die of old age or disease. 25 year old rich guy with a newborn committing murder - suicide is pretty rare and shocking, especially one you assume isn't doing hard drugs. Um suicide is the 10th leading cause of death in the US. And #1 in college students. This is an ignorant post. The only reason people don't hear about suicide is because it's unaccepted in our society and people push it under the rug like it isn't a big deal. When it is.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187193.40/warc/CC-MAIN-20170322212947-00298-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
599
4
https://www.oreilly.com/library/view/aspnet-35-unleashed/9780768680256/ch07.html
code
Chapter 6. Designing Websites with Themes IN THIS CHAPTER An ASP.NET Theme enables you to apply a consistent style to the pages in your website. You can use a Theme to control the appearance of both the HTML elements and ASP.NET controls that appear in a page. Themes are different than Master Pages. A Master Page enables you to share content across multiple pages in a website. A Theme, on the other hand, enables you to control the appearance of the content. In this chapter, you learn how to create and apply ASP.NET Themes. First, you learn how to create Skins. A Skin enables you to modify the properties ...
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585450.39/warc/CC-MAIN-20211022021705-20211022051705-00232.warc.gz
CC-MAIN-2021-43
614
5
https://github.com/qgis/QGIS/commit/f370549fb31d80f2986d17116e43ab076d6769c7
code
Please sign in to comment. This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository. Fix Ingres driver name so it is recognized. OGR reports the driver name in title case rather than all caps currently used in qgsogrprovider.cpp - Loading branch information
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057796.87/warc/CC-MAIN-20210926022920-20210926052920-00536.warc.gz
CC-MAIN-2021-39
313
5
https://elixir-europe.org/events/webinar-interoperability-protein-structure-sequence-resources
code
The webinar presented the outcomes of the ELIXIR Implementation Study 'Increasing Interoperability between ELIXIR Protein Structure and Sequence Resources (CATH, SWISS-MODEL, PDBe and InterPro) and Expanding these Resources with 3D-Models of CATH Domains, built by SWISS-MODEL'. The original aims of the Implementation Study were to increase interoperability between four ELIXIR resources (CATH, SWISS-MODEL, InterPro and PDBe), by building APIs that facilitate the import and export of data between them. The ultimate goal is to improve provision of 3D-Models for protein domain sequences via CATH, SWISS-MODEL and InterPro. This pipeline has been built and deployed and the results are already available in InterPro. The webinar demonstrated the results of this pipeline and explained the overall approach of the project to developing and deploying a collaborative pipeline connecting large resources according to best practices. This includes technical decisions on considerations such as: API design, authentication, web application, worker queues, testing, containerisation, etc. but also data analysis and setting up reliable and repeatable benchmarks.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107884322.44/warc/CC-MAIN-20201024164841-20201024194841-00554.warc.gz
CC-MAIN-2020-45
1,158
3
https://hopestreetaustin.org/south-australia/oracle-retail-merchandising-system-tutorial.php
code
SAP ERP IS-Retail SAP Help Portal Oracle Retail Merchandising System The Retail Merchandising System (RMS) helps manage the fundamental processes of a retail business. The RMS training helps you. The Oracle Retail Predictive Application Server (commonly referred to as RPAS) is a configurable software platform for developing forecasting and planning oracle retail merchandising system tutorial ... Oracle 1Z0-453 Examcollection Dumps & Oracle Retail Merchandising System 13.2 1Z0-453 Valid Test Tutorial - Oracle Retail Merchandising System 13.2. Specially curated collection of learning content designed to provide an introduction to Oracle Enterprise Manager and it's In this tutorial, Search Criteria. Oracle Retail training teaches you how this solution offers competitive analysis & real-time forecasting. Learn how it empowers over 5,000 retailers. Oracle January 2018 Critical Patch Update Multiple Unix Tutorial. Padavali Meaning based on item demand. or call +1. merchandising. With software that Oracle Retail Oracle is the number one provider of. Get Pass4sure Oracle prep from killexams with test king and pass Oracle Tutorials and Test Oracle Retail Merchandising System 13.2 Implementation. Online Knowledge Product SAP Retail. interactive tutorials and simulations, Retail Merchandising System (RMS). Oracle Retail Industries Training Oracle A portal to documentation videos for Oracle Retail Merchandising Cloud Data Integrator and GoldenGate including Oracle by Example tutorials, Search Criteria. Online Knowledge Product SAP Retail. interactive tutorials and simulations, Retail Merchandising System (RMS). Interview questions. A free inside look at Retail Merchandiser interview questions and process details for 112 companies - all posted anonymously by interview candidates. 1Z0-453 Latest Demo Oracle 1Z0-453 Examcollection Dumps Oracle January 2018 Critical Patch Update Workforce Management 1.60.7 Oracle Retail Merchandising System 16.0 Oracle Retail Tutorial Part 5: NULL. Watch a video about Groupe Dynamite's major deployment of Oracle Retail for online inventory Tutorials; Sponsored [Oracle Retail Merchandising System]. Oracle Retail Merchandising System (RMS) Reports User Guide (Rev 2) PDF HTML: Oracle Retail Sales Audit (ReSA) User Guide PDF HTML:. Ermenegildo Zegna tailors its merchandising with Oracle Step by step Oracle DB tutorial that teaches how to design database with entity relationship diagram Food Ordering System;. Pass your Oracle Exams Easily - GUARANTEED! Get Oracle 1z0-429 - Oracle FS1 Series Systems before I had used Test King's tutorials for preparation of Oracle. Pass your Oracle Exams Easily - GUARANTEED! Get Oracle 1z0-429 - Oracle FS1 Series Systems before I had used Test King's tutorials for preparation of Oracle.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540564599.32/warc/CC-MAIN-20191213150805-20191213174805-00335.warc.gz
CC-MAIN-2019-51
2,781
11
http://www.govwire.co.uk/news/independent-case-examiner/guidance-how-to-bring-a-complaint-to-the-independent-case-examiner-20989
code
Updated the list of organisations that ICE deals with (part 1). Explained that you need to provide written consent if you want a representative to act on your behalf (part 4). Added guidance about corresponding by email securely (part 4.1). Added Pension Wise to the list of organisations ICE deals with. Clarified the order in which ICE deals with cases in section 6.2 'If you and the agency or business cant agree'. Added "We deal with post received after 12 noon on the next working day." (section 4). Changed the time for completing action on "can't agree" cases to within 15 weeks of allocation to an investigation case manager, or within 20 weeks if the case requires a report from the Independent Case Examiner (paragraph 6.2). Added "If you want us to return any documents you send us, please tell us when you send them" to the guidance. Updated opening hours 8am to 6pm. Updated HTML and PDF guidance to reflect changes to procedures and timings (mainly in paragraphs 6, 6.1 and 6.2). Added "Fit for Work (the government-funded advice service)" to the list of organisations ICE deals with. Updated guidance to stress the importance of having a FINAL response that mentions ICE before contacting ICE.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371818008.97/warc/CC-MAIN-20200408135412-20200408165912-00443.warc.gz
CC-MAIN-2020-16
1,208
9
https://www.ozbargain.com.au/node/513219
code
where can i buy additional RAM for a desktop (Dell i7) that i acquired recently Ebay or a computershop.. Make sure you buy the right kind for your desktop Dell i7 is not enough info. I googled for that and got swamped with different answers. Got a model number? You could try PC Case Gear or CentreCom or Scorptec. it requires a DDR3. google CPU-Z. run it and it will tell you your memory spec/setup. Alternatively use windows computer management to see what memory, how many slots etc. Then you can match (if you have 1 Ram stick) with one of the same spec (manufacturer not important) to get dual channel running. the best way is to open the case, look at the model of the RAM on the stick. and google the model to see the spec. or google the store that sells the same model
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144979.91/warc/CC-MAIN-20200220131529-20200220161529-00336.warc.gz
CC-MAIN-2020-10
776
9
https://community.f5.com/t5/technical-forum/system-calling-home-to-product-apis-f5-com/td-p/306975
code
I'm being asked to identify why a Linux system is making queries to product.apis.f5.com. There are a number of ansible playbooks hosted on the system. But I find no documentation indicating they call home. Is this a known issue with Ansible bigIp collections? Just trying to identify /validate/ disable this call home feature in our environment. Hey @PaulH316 - it looks like nobody has come by to answer this yet, so I've passed it on to a colleague for some help. Sorry on the delay! Hi @PaulH316, this knowledge article seems to indicate URL that is BIG-IQ related, but it looks like there's a component in container ingress services as well (in this question), and I found that reference in constants.py in the f5-ansible repo also. I'm asking around for the purpose, will post back when i get an answer. 05-Jan-2023 06:12 - edited 05-Jan-2023 12:36 Ok @PaulH316, I got the answer from @MichaelOLeary on this...it is a call home feature for telemetry and can be disabled by setting no_f5_teem to yes in the ansible modules you are using, or by setting the F5_TELEMETRY_OFF environment variable. I'll ask the Ansible team to document this call home feature more clearly along with the URL it uses, and also ask for an update to the knowledge article to include CIS/Ansible in the listing for product.apis.f5.com. So I can add no_f5_teem=yes in the provider section of the playbook or 'export F5_TELEMTRY_OFF'. Sounds like a plan. Thanks for your question @PaulH316 ...it will lead to improved documentation for Ansible and CIS in the near future. Nice work!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644913.39/warc/CC-MAIN-20230529205037-20230529235037-00685.warc.gz
CC-MAIN-2023-23
1,560
10
http://seclist.us/mac4n6-collection-of-forensics-artifacs-location-for-mac-os-x-and-ios.html
code
This is a collection for OS X and iOS artifacts location, trying to collect more information for each artifact, not just a path! From Mac4n6 Group. The goal is that the information collected have to be “machine parsable” and mostly “human readable/writable”, reusable by any application, library, etc. (am I too optimistic?). That is why as main collaboration tool for the collection, we use a shared spreadsheet so that anyone can add new artifacts, there is no need to know how to code to contribute to this project (so, no excuses!). From here, two (simple) scripts will convert the csv file into: + yaml artifact library file, so that other applications can use it. No crapy/fancy xml things. + ForensicsWiki page, one of the point of reference for forensics practitioners. This way the effort is centralized and made only once. Mac OS X Forensics Artifacts Here is the shared spreadsheet for the OSX artifacts: Here is the link to the ForensicsWiki page updated from the above spreadsheet iOS Forensics Artifacts Here is the shared spreadsheet for the iOS artifacts (way too much initial phase still):
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574665.79/warc/CC-MAIN-20190921211246-20190921233246-00071.warc.gz
CC-MAIN-2019-39
1,114
10
http://pengbos.com/2012/02
code
February 26, 2012 at 10:51 am | Blog | No comment When i was trying to implement a new feature for corporattica theme, i wanted to get a random post from a category. btw, the new feature is to display a static picture for pages except for the home page, as users found that the sliders in normal pages disturbing. At the beginning, i think about the most straight forward way, to know the number of posts in the category, and then to use the rand() function of PHP to get a number between 0 and the count. And then use the “offset” of wordpress query parameter to show the random post. However, i did not find the function to get the count of posts in a specific category. And then, i was thinking further and i switched to another direction. Although i can not the post counts in the category, i can always the get first post in the category. If the first post in the category is random for each query, then my requirements fulfilled. We can order the queried posts randomly, and the first post in this list is also random. And the best part is, wordpress has already had this feature. $args = array( 'category'=>'featured','numberposts' => 1, 'orderby' => 'rand' ); $rand_posts = get_posts( $args ); Sometimes the best way is not the straight forward way. And now the corporattica theme has the new feature of displaying a random static picture for pages other than Home Page.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189313.82/warc/CC-MAIN-20170322212949-00224-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,382
6
https://testmy.net/ipb/profile/46802-rg11389/content/
code
I have a problem. I have a 5000 kbps D/ 768 kbps U connection but download speed on this computer fluctuates between 760 and 1400 kbps with a steady upload of about 470 kbps. However, another computer on my home network gets 4800 kbps/ 750 kbps. I have no firewall enabled on this computer (hardware or software) and both computers are coming out of the same router. I talked to tech support at my ISP and when pinging my modem alone they get a ping of 40 ms, but when I plug this computer directly into the modem they get a ping of 160 ms. I don't have any superfluous applications running nor do I have any viruses/trojans/spyware running in memory. I have used an IP traffic monitor to see if some application is robbing me of bandwidth, but no programs are using my internet protocol that I don't know about. I tried using cablenut tweaks with no result. Does this mean I need a new network card? I haven't a clue. PS this is a recent occurence. Thank you in advanced!
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594391.21/warc/CC-MAIN-20200119093733-20200119121733-00103.warc.gz
CC-MAIN-2020-05
972
3
https://docs.archopus.com/doku.php?id=privacy&do=login&sectok=
code
You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. If you do not have an account, or you have forgotten go here using the browser in your mobile device which has a Homing Space setup inside the browser. Note that your credentials are usable both at this wiki as well at our chat system Dont have Homing Space? Homing Space is free. It is a single private authentication and authorization system which you can use at many websites/apps. Go to https://homing.space and setup one inside your phone/tablet browser in 2 minutes
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710933.89/warc/CC-MAIN-20221203143925-20221203173925-00563.warc.gz
CC-MAIN-2022-49
603
4
https://dhtml-menu.com/web-design/bootstrap-textarea-working-1324.html
code
Within the pages we build we employ the form components in order to get a number of info from the site visitors and send it back to the site owner serving numerous goals. To perform it effectively-- meaning getting the appropriate answers, the proper questions must be asked so we architect out forms structure properly, thinking about all the feasible situations and kinds of information needed and actually delivered. Yet regardless of exactly how correct we operate in this, currently there constantly are some scenarios when the information we need to have from the user is relatively blurred before it gets in fact supplied and needs to extend over even more than simply the regular a single or a couple of words typically completed the input fields. That is definitely where the # element arrives-- it is certainly the only and irreplaceable element in which the site visitors have the ability to easily write back some lines offering a responses, providing a purpose for their activities or simply just a couple of thoughts to eventually help us creating the product or service the page is about even much better. Within the current edition of some of the most popular responsive framework-- Bootstrap 4 the Bootstrap Textarea Table element is completely maintained instantly adjusting to the size of the display screen webpage gets shown on. Generating it is pretty uncomplicated - everything you require is a parent wrapper <div> component holding the .form-group class added. Inside it we want to place a label for the <textarea> element possessing the for = “ - the textarea ID - " and suitable inscription for you to get simple for the site visitor to comprehend what kind of info you would need filled in. Next we ought to create the <textarea> element in itself-- give it the .form-control class and also an appropriate ID. Do note the ID you have appointed within the for = "" attribute in the event that the previous <label> really should match the one to the <textarea> element. You have to additionally include a rows=" ~ number ~ " attribute to specify the lines the <textarea> will originally spread when it gets showcased when the page initially loads-- 3 to 5 is a good value for this one given that if the text becomes way too much the individual can always resize this control via dragging or simply utilize the internal scrollbar appearing anytime text gets excessive. Due to the fact that this is certainly a responsive component by default it expands the whole size of its parent element. On the contrast-- there are certainly several instances you might prefer to reduce the responses presented within a <textbox> to a specific length in characters-- assuming that this is your situation you should additionally provide a maxlenght = " ~ some number here ~ " attribute establishing the characters limit you need-- do think about thoroughly despite the fact that if the limit you set will be enough for the data you ought to be developed correctly and specificed enough-- don't forget how annoyed you were when you were questioned something and in the middle of the solution were not able to write additionally-- this is certainly essential due to the fact that it it possible achieving the limit might just possibly irritate the website visitors and push them away from sending the form and even from the web page in itself. Bootstrap's form controls increase on Rebooted form styles with classes. Use these classes to opt in to their customized displays for a more regular rendering throughout gadgets and browsers . The example form shown below illustrates common HTML form elements that receive up-dated formats from Bootstrap with additional classes. Always remember, since Bootstrap utilizes the HTML5 doctype, all inputs ought to have a <form> <div class="form-group"> <label for="exampleInputEmail1">Email address</label> <input type="email" class="form-control" id="exampleInputEmail1" aria-describedby="emailHelp" placeholder="Enter email"> <small id="emailHelp" class="form-text text-muted">We'll never share your email with anyone else.</small> </div> <div class="form-group"> <label for="exampleInputPassword1">Password</label> <input type="password" class="form-control" id="exampleInputPassword1" placeholder="Password"> </div> <div class="form-group"> <label for="exampleSelect1">Example select</label> <select class="form-control" id="exampleSelect1"> <option>1</option> <option>2</option> <option>3</option> <option>4</option> <option>5</option> </select> </div> <div class="form-group"> <label for="exampleSelect2">Example multiple select</label> <select multiple class="form-control" id="exampleSelect2"> <option>1</option> <option>2</option> <option>3</option> <option>4</option> <option>5</option> </select> </div> <div class="form-group"> <label for="exampleTextarea">Example textarea</label> <textarea class="form-control" id="exampleTextarea" rows="3"></textarea> </div> <div class="form-group"> <label for="exampleInputFile">File input</label> <input type="file" class="form-control-file" id="exampleInputFile" aria-describedby="fileHelp"> <small id="fileHelp" class="form-text text-muted">This is some placeholder block-level help text for the above input. It's a bit lighter and easily wraps to a new line.</small> </div> <fieldset class="form-group"> <legend>Radio buttons</legend> <div class="form-check"> <label class="form-check-label"> <input type="radio" class="form-check-input" name="optionsRadios" id="optionsRadios1" value="option1" checked> Option one is this and that—be sure to include why it's great </label> </div> <div class="form-check"> <label class="form-check-label"> <input type="radio" class="form-check-input" name="optionsRadios" id="optionsRadios2" value="option2"> Option two can be something else and selecting it will deselect option one </label> </div> <div class="form-check disabled"> <label class="form-check-label"> <input type="radio" class="form-check-input" name="optionsRadios" id="optionsRadios3" value="option3" disabled> Option three is disabled </label> </div> </fieldset> <div class="form-check"> <label class="form-check-label"> <input type="checkbox" class="form-check-input"> Check me out </label> </div> <button type="submit" class="btn btn-primary">Submit</button> </form> Here is simply a full listing of the specific form regulations assisted simply by Bootstrap and the classes that customise them. Extra documentation is easily available for every group. So currently you know exactly how to create a <textarea> feature in your Bootstrap 4 powered web pages-- now all you really need to determine are the proper questions to ask about.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058222.43/warc/CC-MAIN-20210926235727-20210927025727-00718.warc.gz
CC-MAIN-2021-39
6,645
27
http://rivernfpbj.designertoblog.com/7017964/5-easy-facts-about-pay-me-to-do-your-homework-described
code
Peru won't offer you on line visa apps, so if you'd like to submit an application for a visa It's important to apply at the next consulate. I need to use a visa to Peruvian consulate in Beijing. So how long does it acquire to get visa? Where can I get to complete software for Peruvian visa. Make sure you be certain that you'll be capable to obtain e-mail from SAMHelp@dnb.com. Including SAMHelp@dnb.com to your tackle e-book may perhaps aid reduce our email messages from being inadvertently blocked. So best check out Together with the airline what problems they've got relating to traveling which has a A method ticket. The Andean Migration Card is on the market in Spanish and English. Fill out your individual information and after disembarking hand it together with your passport for the immigration officer on the immigration Manage. If you are not obliged to apply for a visa in a Peruvian consulate in your household nation right before coming into Peru, the officer will stamp your passport and publish a amount on or close to the stamp indicating the quantities of times you are permitted to remain in the country. Biltong? Are not able to believe it. We lived quite a time in southern Africa and pass up it a great deal. But in any case as very long It truly is an volume for private use, dry, vacuum sealed and initially packed you will not have troubles bringing it into Peru. Peru doesn't have a certain visa for volunteers; volunteer work can be done on a tourist visa. As Canadian passport holder your daughter doesn't have to apply for a tourist visa just before coming to Peru. She will get an entry stamp (= tourist visa for citizens like Canadians who haven't got to make an application for a visa ahead of coming to Peru) in her passport at immigrations for the airport. I had post all of paperwork to open up a firm in Peru ahead of obtaining RUC my visa were being expired because my Small business VISA was 33days . Sad, but true: In relation to coming into a international region Every single nationality is handled in different ways; not merely in Peru but everywhere on the planet. Some nationalities can enter a rustic and not using a visa, Some others really need to apply for read review a visa in a consulate prior to browsing. Of course, Palestinian passport holders must submit an application for a tourist visa in a Peruvian consulate before coming into the country. I'm a Chinese citizen And that i am living in California USA like a college student now. Am i able to submit an application for the tourist visa in United states? Can I use it on line or I really need to Visit the Consulate in Los Angeles to apply for it? According to Peruvian Customs you will be billed twenty% customs duty. Possess a look at the "Regulate de Equipajes y Vehiculos en Fronteras Terrestres" ("") virtually at The underside of position one.1, exactly where you do have a listing from a to d . There you locate the official laws. I've all the expected paperwork which happen to be said. My serious query may be the peruvian visa just isn't offered on the behalf of age variable. Similar to the U.S and U.K i hope age is just not a major variable. Mainly because mountain hiking can be accomplished with friends. For my part your fiance's challenge isn't the deportation within the US, but the necessity to get a visa. Dominican Republic passport holders really have to make an application for a visa prior to coming to Peru (Incidentally precisely the same applies for Panama). Only if they are in immediate transit (with out under-going immigration and customs), they may (!
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826892.78/warc/CC-MAIN-20181215152912-20181215174912-00109.warc.gz
CC-MAIN-2018-51
3,594
14
https://rafay.co/author/jad/
code
A Perftest app that measures web page performance, including underlying network latency, and demonstrates use some of the features of the Rafay platform. About John Dilley As Chief Architect, John ‘JAD’ Dilley is Rafay’s strategic technical and thought leader, providing direction for the Programmable Edge platform and related technology assets. Prior to Rafay, he was Chief Product Architect at Akamai, where he helped develop the Akamai content delivery, application acceleration, and cloud security businesses. Earlier in his career, JAD held research scientist and software engineering positioning and HP and HP Laboratories. He hold a MS degree in Computer Science from Purdue University. Entries by John Dilley Having benefited from the open source community’s efforts, Rafay is in a position to contribute back to the community. Tracking widgets along an assembly line using cameras, or tracking virtually anything using video analysis, can leverage the edge to great affect writes John Dilley, Chief Architect at Rafay Systems, in his latest blog. As latency bounds go down, the number of locations goes up. But how many edges will it take to cover the planet … with a low-latency network? When I described the Programmable Edge concept to my father, a career scientist with deep research and teaching experience, he said, “Light can circle the Earth 7 times in a second, how much difference does even a thousand miles really make?” It’s a great question. The Programmable Edge automatically runs workloads in locations near enough to your users to address speed and scale – and avoiding as many operational headaches as possible.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999263.6/warc/CC-MAIN-20190620165805-20190620191805-00130.warc.gz
CC-MAIN-2019-26
1,657
10
https://smartydiscount.com/offer/facebook-marketing-next-level-fan-growth-strategies/
code
How to grow your fan base faster and cheaper with next-level list building strategies How To Hack WiFi Networks For Beginners Web Hacking for Beginners • All Coupons are limited • If you don’t need it, Leave it for someone who need it • No limit for the course after you redeem a coupon Input email of your friend. Input optional message for your friend.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667319.87/warc/CC-MAIN-20191113164312-20191113192312-00357.warc.gz
CC-MAIN-2019-47
362
8
https://videohive.net/item/square-pixels-reveal/1216572
code
Sleak and simple video viewer, simply change the 5 image/video holders to suit your needs. The red pixel background can even change, to multiple colours or just 1. PDF file included with simple instructions. Any problems at all, just email and I will always reply. email@example.com SOUND IS NOT INCLUDED: can be found at: http://audiojungle.net/item/east-style-house/1185872?WT.ac=new_item&WT.seg_1=new_item&WT.z_author=Santile
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584547882.77/warc/CC-MAIN-20190124121622-20190124143622-00047.warc.gz
CC-MAIN-2019-04
428
4
https://www.freelancer.com/projects/visual-basic-net/net-excel-deleting-columns/
code
I will give you two tab delimited files (Spreadsheets). You job will be to create a VB Application that will allow the user to select the location of the files and then press a button that will delete all but 5 columns within each spreadsheet. The 5 columns will need to be pushed to the left so that they are appearing in column A-E. I will tell you what columns will be required in both of these spreadsheet. This has to be done in VB.NET and NOT VBA. The project is required to be completed on MONDAY for the end users need it that day. If you can't complete it on that day then please do not bid on the project.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864943.28/warc/CC-MAIN-20180623054721-20180623074721-00086.warc.gz
CC-MAIN-2018-26
615
2
http://poker.stackexchange.com/questions/tagged/casino+hand-history
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site $1/$2 Live - Bottom set on flop and facing 3bet I play weekly at my casino and at $1/$2 they have buy-in of $60 min-$200 max. This is one of my hand I played last week and I am interested in seeing how you would play this hand when you have a top ... Aug 6 '12 at 6:28 newest casino hand-history questions feed Announcing The Launch Of Meta Stack Exchange Hot Network Questions Packages are removed when I use "apt-get install" with a hyphen after the package name traceroute and ping from school network How to draw an arrow WIDE to fillcolor? Swapping letters with regexp Meaning of "that friendship will not continue to the end which is begun for an end" What should be included in a freshman 'Mathematics for computer programmers' course? Mathematics needed in the study of Quantum Physics If an author declines authorship, may her co-authors publish without her? CDIR= $(pwd) gives "Permission denied" Blender animation and render When should a GM roll behind the GM Screen? Why didn't Stark sue the government for stealing his armour in Iron Man 2 What are the finite groups with 8 or 16 conjugacy classes? Why are full-frame cameras less forgiving? Changing pins used in ArduinoISP example Draw a regular polygon What would be preferred aesthetically and performance wise? Unsolicited request for a scientific collaboration How can I deal with the challenges a player having Mind-Reading represents without negating their ability? Brainteaser: What is the one thing a queen cannot do that all other pieces can do? Find each element that is less than some element to its right How do you separate /bin and /sbin when making an RPM? Are ATC towers built in warzones? Which one of these answers regarding functions is incorrect? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532573.41/warc/CC-MAIN-20140416005212-00418-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,370
53
https://devforum.roblox.com/t/discontinued-custom-character-a-further-measure-to-prevent-character-based-exploits/703183
code
We all know we can’t trust Roblox entirely with client-sided changes. Exploiters run rampant among all games, mindlessly copy+pasting common scripts that can be detrimental to the gameplay experience of others. This is where Custom Character comes into play! How it works Normally, on Roblox, you have player.Character to access the player’s character and therefore change properties. This opens up a door with no lock for exploiters, which only makes the life of many devs harder. Custom Character does the following things: - Uses a blank Script, and only one RootPart. This is not the character that can be manipulated. - Uses a custom character model, found in ServerStorage, as the player’s character. - Names the custom character model to - Uses custom movement and camera controls and server-sided checks to make sure no Humanoidchanges are present. - Gives network ownership only to the The combination of all of these things will prevent existing esp, hitbox expansion, aimbot, walkspeed/jump changes, display name changes, and more! However, this does not prevent game-specific exploits for your game using this system. Make sure you keep up with V3rmillion to ensure your game does not have scripts bypassing this system. You can find the system in this place file: CustomCharacter.rbxl (121.3 KB, V2) CustomCharacter.rbxl (110.5 KB, V1) It’s up to you to integrate it into your current games and future ones as well. Characters can be found using this line of code: local Character = workspace:FindFirstChild(player.UserId) Most recent updates: - Fixed a bug where you couldn’t respawn - Added animation, and integrated the entire system into the - Fixed some replication issues - Added health syncing for - Slightly improved security measures (although it’s on the client, so unreliable) - Removal of HumanoidRootPart. How this will be achieved without disturbing the development process and framework of other games is under planning process. - Avatar appearance loading - Custom manipulation of characters your wouldn’t normally be able to achieve with the standard character system. This system is currently in PRE-ALPHA. This system is untested in larger projects and is subject to glitches. However, with the way it is set up, this is unlikely. Updates will be delivered based on the number of users that report using it. The more users that have this system, the more it will be updated. This system is currently free, but that is subject to change in the future. I will make changes I deem fit. While not under an official liscense, I request some sort of credit is noted in the game description, devforum, or in-game. Doing this will help me out a lot. You may change the system to fit your needs, but please do not distribute it without crediting me for the original. Re-distributing it without credit will result in a report flag and personal contact of RBX moderation. I appreciate you reading this! Do you think this system will go over well for games? Are you using it yourself? Or maybe the code needs some optimization? Let me know in the replies below! Replies give me a better idea as to how well the system works and what needs to be improved.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104364750.74/warc/CC-MAIN-20220704080332-20220704110332-00303.warc.gz
CC-MAIN-2022-27
3,188
43
https://research.facebook.com/people/porzi-lorenzo/
code
I am a Research Engineer at Meta, working from Zürich with the Spatial Computing group. My main research interests are semantic and 3D understanding of images, with special focus on street level scenes. Before joining Meta, I tackled similar problems while working as a Research Scientist at Mapillary. I received my PhD in Computer Vision from the University of Perugia, Italy, where I did research in augmented reality and deep learning. Semantic segmentation, panoptic segmentation, 3D object detection
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00538.warc.gz
CC-MAIN-2023-23
506
2
https://www.programmableweb.com/sdk/usabilla-android-sdk-claudio-semeraro
code
September 21, 2015 Single purpose API Sorry, No followers For those who love good food and great dining, a good restaurant guide is key. What would be even better is if that guide could tell you where the restaurant is, what it has on offer and what everybody's saying about it. That's pretty much what MenuMania does; it's a customisable, community-based restaurant guide for discovering new places to eat within New Zealand. MenuMania also provides the MenuMania API, allowing developers to access the database of restaurant information for display on other websites and applications. Sometimes, when assessing a website, it helps to know how popular it is. These days, there are a lot of ways to learn this, including a few recent mashups. There are also other apps that assess popularity, using different APIs and analysis to do so. Below we have a selection of some of the recent mashups that dig into determining ranking and popularity. Many a man (or woman) holds a deep passion for a good brew, and when faced with beer-themed conversation, would probably have a lot to say on the matter. So, where better to invest some time and intellect than an online community of enthusiasts, dedicated to all things beer? TheBeerSpot is just that - a place where the every day beer drinker, home brewers and people in the industry can connect and share anything beer related. TheBeerSpot API is available so that this data can be displayed or used on other websites or applications.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102757.45/warc/CC-MAIN-20170816231829-20170817011829-00246.warc.gz
CC-MAIN-2017-34
1,479
6
https://j2eegeek.com/2012/01/21/links-for-january-15th-through-january-21st/
code
How to build a simple GWT event bus using Generators | North Concepts – In his Google I/O session Best Practices For Architecting Your GWT App, Ray Ryan discusses the benefits of using an event bus in GWT (Google Web Toolkit) applications. Inspired by this talk, I decided to try my hand at building a simple GWT event bus modeled after our pure java event bus. InfoQ: How to get the most out of Spring and Google App Engine – Chris Ramsdale will get you up and running building Spring apps on Google App Engine. He'll go step-by-step building a real Spring app and identify not only the basics of App Engine, but more advanced topics such as integrating with Google's SQL Service and using App Engine's "Always on" feature to ensure high performance. Big data market survey: Hadoop solutions – O’Reilly Radar – Apache Hadoop is unquestionably the center of the latest iteration of big data solutions. At its heart, Hadoop is a system for distributing computation among commodity servers. It is often used with the Hadoop Hive project, which layers data warehouse technology on top of Hadoop, enabling ad-hoc analytical queries. InfoQ: RESTful SOA in the Real World – Sastry Malladi presents different ways used by the industry to implement a RESTful SOA, detailing how eBay did it in order to achieve performance, and what lessons can be taken from that. InfoQ: Service-Oriented Architecture Maturity – An SOA maturity model must incorporate both perspective and execution maturity. Progress must be made across a 3D space, with movement from an IT-driven perspective toward an enterprise-transformation outlook – embracing governance, metrics, drivers, and even terminology – likely trumping execution refinements within a particular perspective. I am a total Java geek that lives in Brookfield - WI (Milwaukee), making my living as an architect/developer, spending all my time with Java, J2EE, OO, Linux, and open source. In my spare time, when I am not in front of my computers, I spend every other minute with my other loves: My wife and daughter, books, music, guitars, Formula-1 racing and SCI-FI shows like StarGate and others. At work, I spend most of my time dealing with architectural and security issues with plenty of work and personal play-time going into discovering the latest tool, framework, etc that will allow us to work faster, smarter and deliver better results. A lot of my time is also spent fire-fighting issues and coming up with solutions to interesting problems. :) View all posts by Vinny
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371813538.73/warc/CC-MAIN-20200408104113-20200408134613-00188.warc.gz
CC-MAIN-2020-16
2,535
8
http://shadowtale.wikia.com/wiki/Pearls_Before_Swine_Quest
code
- Quest Giver: - Lomar speaking: Some people think that bandits are just murderous thieving reprobates. While of course we ARE murderous thieving reprobates, we can be romantic too. It happens that I wish to give a black pearl to a special lady friend of mine. I've placed it in a dusty urn in my Den for safekeeping. Could you retrieve it for me? This is extremely helpful to me. I would say 'thank you' but some things are too much. You have it? Good. Now that little cow won't blackmail me for another month. Er, I mean I can make my lady friend very happy.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107490.42/warc/CC-MAIN-20170821041654-20170821061654-00548.warc.gz
CC-MAIN-2017-34
560
9