url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://community.mcafee.com/thread/61817
|
code
|
I do not think this is possible with VSE.
The only way you can add custom detections is with the "Potentially Unwanted Programs" and setting a User Defined Detection in the policy. As you are looking for what appears to be a "*.PST" this is not going to be a possible option as it will not allow wildcards. This stops someone adding an entry for *.EXE which would most likely kill the box by deleting all .EXE's until the OS fell over.
As a solution, you could write a batch file to search the local disks for *.PST's ( excluding as required ) and create a text file with the path/filenames, machine names, username etc. You could then copy this to a netowork share with the associated <computername.log> filename.
If you wanted to go further, within the same batch file you could use that file list to then run a loop / delete command. This could then be initiated from a login script or even packaged up with EEDK and deployed as a task via ePO.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102967.65/warc/CC-MAIN-20170817053725-20170817073725-00634.warc.gz
|
CC-MAIN-2017-34
| 947
| 4
|
http://meta.stackoverflow.com/questions/47708/merge-an-answer-from-one-question-to-another
|
code
|
Existing merge tool
Moderators have the ability to merge two questions together, by declaring one question the "master" and one the "to-be-removed". During the merge (AFAIK), all votes, comments, and answers are merged into the master question, and the to-be-removed question is removed from the system. The only two inputs to the tool are the two question IDs.
I'd like to request a small tweak to the tool. I'd like the to-be-removed input to be able to take an answer post ID as well as a question ID.
- The specific answer will be moved, comments, votes, and all, and merged into the master question, as if it had been posted there originally.
- It would be nice, but not necessary, to record the move in the answer's revision history and visible in the timeline of both questions.
I don't have a good example use off the top of my head. Here's a semi-fictional use case:
A question was migrated from Stack Overflow to Super User. Most of the answers have a few upvotes and are owned by the Community User, since their owners don't have associated accounts on the destination site.
One particular answer doesn't answer the question, but a user notices it answers a related question exactly. The user posts a comment on one linking to the other. Another user flags to propose that the answer be merged from the migrated question to the related question.
If possible, user permission should be obtained before such a merge, and of course this should be used rarely.
But in some cases it's impossible or impractical to contact a user and request that the answer be reposted to the related question. The moderator, or other users, could repost the answer themselves, but this would lose any votes and comments on the new post.
This proposal is about manually merging a single answer into a different question as a diamond-moderator function.
- This related proposal is nearly identical, but proposes the feature be available to high-rep user moderators with a voting interface, like the current close-question voting. Unlike this proposal, my proposal makes no provision for user voting and no requirement for either question being closed.
- These related proposals deal with automatic merging of questions closed as duplicates.
- This proposal deals with consolidating multiple answers into a single post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609525991.2/warc/CC-MAIN-20140416005205-00097-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 2,306
| 14
|
https://laravel-bap.com/forum/reply/2703/
|
code
|
it’s not required to install application on newest mysql.
We are working with 5.7.23. You can run application on 5.7 version
Support staff monitor the community forum and email 9 AM - 6 PM, Monday to Friday. Please be patient when posting an issue as staff may not be in the same timezone as you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057882.56/warc/CC-MAIN-20210926144658-20210926174658-00229.warc.gz
|
CC-MAIN-2021-39
| 298
| 3
|
http://www.linuxquestions.org/questions/linux-software-2/compile-issues-183011/
|
code
|
I have left my windows world and gone completely nix. . . well except for two boxes. I have set up samaba server, and I working on learning a little more about security.
Anyway, I am trying to compile nat10 on my redhat 9 (2-4-20-31.9) and I keep getting this error message:
gcc -DSTEPPING -DSCANNER -DVERBOSE -DWORKGROUP=\"WORKGROUP\" -DGUEST_ACCOUNT=\"nobody\" -DLINUX-DSHADOW_PWD -c client.c
<command line>:1:6: warning: ISO C requires whitespace after the macro name
In file included from includes.h:232,
/usr/include/asm/signal.h:102: redefinition of `struct sigaction'
/usr/include/asm/signal.h:116: redefinition of `struct sigaltstack'
make: *** [client.o] Error 1
SO far I ahve edited the make file for linux by un commenting the following:
# Use this for Linux with shadow passwords
# contributed by Andrew.Tridgell@anu.edu.au
# add -DLINUX_BIGCRYPT is you have shadow passwords but don't have the
# right libraries and includes
FLAGSM = -DLINUX-DSHADOW_PWD
LIBSM = -lshadow
Anyhelp would be greatly appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00642-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,021
| 16
|
http://outreach.nycga.net/oyb/
|
code
|
Occupy Your Block strives to empower these people to in turn inspire and empower their friends and neighbors. People are far more likely to become involved if they are hearing about the movement from someone they know and trust. We speak to many people on the street who not only understand, but are living, the grievances laid out in the OWS declaration, yet they don’t believe mass mobilization will make a difference. They don’t yet have the information and inspiration that will bring them out in the streets, convinced that people power can, has, and will change the world.
We look at this as an opportunity for education, discussion, and organizing. We are working on gathering and creating resources that will allow people to host informal social gatherings, and reach out to those closest to them. We are also going to continue with the Subway People’s Mics in an effort to maintain the public presence of OWS during times abundant and scarce, and continue discussions in one of the few spaces in NYC where all members of the 99% can be found. We hope to support all of these gatherings in a way that can help build towards community building and action, with block parties happening all over the city. Our dream is that, by that point, people will be able to plug into general assemblies, eviction watches, 99% school classes, and other community-centered activities that give people a way to be a part of social change every single day.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00573-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 1,452
| 2
|
https://forum.tudiabetes.org/t/hi-anyone-use-freestyle-libre-14-day-have-a-question/79929
|
code
|
Hi there, I’m a Type 1 Diabetic, and I’ve been using the Libre for about half or less than half a year; I’ve been looking for Windows Software to download to print out the charts/sheets/etc. but on their official US site, I cannot find a download link? I tried to use the links here: https://www.myfreestyle.com/data-management however the Auto-Assist does not seem to work with my Freestyle Libre 14-day.
I’ve been looking everywhere for the link that works with my system but there doesn’t seem to be one? I know my doctors use it to print the charts each visit, but I wanted to print them and write down my insulin intake/any notes that I wanted to add.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154471.78/warc/CC-MAIN-20210803191307-20210803221307-00584.warc.gz
|
CC-MAIN-2021-31
| 666
| 2
|
http://1-dot-name-meaning.appspot.com/girl/Turing
|
code
|
If you have information about this name, share it in the comments area below!
Numerology information Turing:
Definition funny of Turing:
The most boring. most crappiest form of computer programming on the market.
"Time to use For loops children" "My name is Mr.Beech, and today we will use turing.."
To fail miserably at the reacharound; to give a limp-wristed heimlich.
He turinged that bowling ball right into the gutter.
the l33t3st programming language evar. it pwnz, c, java, etc.
"Okay its time to learn about nested if statements. w00t!"
Songs about Turing:
Reservation Under Turing by Mychael Danna from the Album Transcendence: Original Motion Picture Soundtrack
Alan Turing by The Red Fetish from the Album Cardinal Synth
Alan Turing by Facit from the Album Mat Åt Duvorna
Alan Turing by Mike Ensor and the Principles of Strife from the Album As We Dangle From the Alloy Trees and Twirl in the Barb Wire
Alan turing by Various Artists from the Album Planetarium
Alan Turing Sends Me Spam From A Closet In Heaven by El Plan de Aguavodka from the Album Men In White Coats
Alex Buess: N. S. Turing Machine Version 1998 for percussion duo and tape by HOW2 from the Album HOW2 - Turing Machine
Books about Turing:
Turing's Cathedral: The Origins of the Digital Universe by George Dyson (Dec 11, 2012)
Turing (The Great Philosophers Series) by Andrew Hodges (Jul 16, 1999)
Alan Turing: the Enigma: The Book That Inspired the Film "The Imitation Game" by Andrew Hodges and Douglas Hofstadter (Nov 16, 2014)
Alan Turing: The Enigma The Centenary Edition by Andrew Hodges and Douglas Hofstadter (May 27, 2012)
Turing: Pioneer of the Information Age by B. Jack Copeland (Jan 20, 2013)
Turing Omnibus: 61 Excursions in Computer Science by A. K. Dewdney (May 1989)
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine... by Charles Petzold (Jun 16, 2008)
Movies about Turing:
Decoding Alan Turing 2011 NR CC - Runtime: 17 mins Directed by: Christopher Racster
The Turing Enigma 2012 NR - Runtime: 1 hr 14 mins Directed by: Pete Wild
Breaking the Code: The Work of Alan Turing. Producer's Cut . Princeton Turing Centennial 2012 -
Decoding Alan Turing 2011 - Runtime: 17 mins Directed by: Christopher Racster
The Turing Enigma 2012 - Runtime: 1 hr 15 mins
Codebreaker: The Alan Turing Story -
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347411862.59/warc/CC-MAIN-20200531053947-20200531083947-00001.warc.gz
|
CC-MAIN-2020-24
| 2,349
| 32
|
https://madeddu.xyz/posts/aws/amplify/aws-learning-platform/
|
code
|
In the past year, I worked on a project to build an e-learning platform (actually, it’s so much more!). I started using AWS Amplify, and I end up testing so many different services around it. I’ll cover the following topics:
- Choosing the right AWS services;
- Designing the application architecture;
- Developing the backend;
- Developing the frontend;
- Deploying the application;
I hope this article will be helpful for anyone who is considering building an e-learning platform or something similar. Spoiler is: the platform is not ready yet, but I hope I will have the chance to conclude it by the end of this year 🙏 my time is super limited unfortunately :/
Choosing the right AWS services;
I have always been fascinated by aws managed services mainly because of their scalability and the ease with which they make it possible to prototype projects. So I decided to leverage AWS Amplify because I knew it was a suitable project for this scenario: prototyping.
Roughly speaking, any self-respecting application relies on three big pillars: a backend, which I knew I could create leveraging API Gateway and AWS Lambda. A frontend, which I knew I could create leveraging a framework I hold dear (Vue.js) and be able to host on AWS at almost zero cost thanks to services like S3 and Cloudfront. And a system for storing information, both as objects and as data: precisely, I knew I could rely on S3 and DynamoDB.
What makes it all complex, however, is how to make the details work: how to manage authentication within the system? how to manage user access and permissions? how to secure streaming and downloading of data? how to make payments work without blocking everything if the services involved don’t work?
To explain these points, it may be helpful to start with the final outline of what I have made so far, locate the key components, and then talk about each component as we go along.
Let’s deep dive into diagram sections.
A part from Cloudflare in front of everything, we run everything behind an API Gateway created through AWS Amplify. Amplify lets you create an API Gateway able to serve your APIs and integrate them with Cognito - used both as Identify Provider and authorizer, together with IAM and aws policies. More in detail, Cognito User Pool is used as directory services of federated identities that you can exchange for AWS credentials. Identity pools generate temporary AWS credentials for the users of your app. These identities are used to let you operate with AWS services accordingly (i.e. for instance, they let you access protected content on S3, available only to specific identifies, as explained here). The cool thing is that AWS Amplify takes of this automatically, and it can do it not only with storage layers, but also with API (see doc). Everything can be done with the CLI, and integrated in your frontend by using the official npm package (see more on this).
Morever, we have a integration that is handled through a dedicated API Gateway with Stripe. Stripe provide endless ways to handle many different payments methods, and it’s shipped with an API layer and integration webhooks that let your application fluently integrate with payment system.
Video content production
The diagram starts with video content stored in Amazon S3. From here, the video is sent to AWS Elemental MediaConvert, a cloud-based video transcoding service that converts the video into the desired format and bitrate for streaming. This is done thanks to a dedicated AWS Lambda function triggered to submit the transcoding job. The Lambda function is responsible for initiating the transcoding process: the necessary parameters to MediaConvert are sent as part of the input to the jobs, available on S3 with a dedicated prefix.
As the transcoding job progresses, Amazon CloudWatch, a monitoring and observability service, tracks the status of the job and logs any relevant events. CloudWatch provides visibility into the performance and health of your AWS resources, enabling you to identify and resolve issues promptly.
Once the transcoding job is complete, Amazon EventBridge, a serverless event bus service, emits an event notification. EventBridge is used to decouple different parts of your application and enable them to communicate with each other. The event notification triggers another AWS Lambda function, which is responsible for packaging the transcoded video and storing it back in S3, and notify me through SNS.
Securing the serving content
Finally, the transcoded video is served to viewers through Amazon CloudFront, a content delivery network (CDN) that caches and delivers content to users with low latency and high performance. CloudFront is a global network of edge servers that replicates your content across different locations, ensuring that users have a fast and reliable viewing experience.
To safely serve content, I leverage HLS streaming based on Cloudfront Signed Cookies: this was possible throught a lot painful tests, and I’m going to deep dive into the way this solution can work. Practically speaking, the way you can safely stream your premium content is to provide an authenticated endpoint to your user to create and store signed cookies, and inject them accordingly in your frontend using an HLS-ready library. The combo of this steps + the fact that cookies are scoped to the host (thus it’s impossible to test this solution by serving you application locally during development) requires me months of tests to complete.
The useful thing inside amplify is that you can manage custom resources using CDK or Cloudformation templates, so that their deployment goes through the same release cycle as other Amplify resources. This is what I did for this part.
Premium content production
In this part, I again made use of a number of technologies not directly related to the world of Amplify: leveraging AWS Fargate and a chatbot, I built a pipeline capable of responding in a scheduled manner to content generation. These are produced and pushed to a temporary bucket. Again, leveraging a dedicated Event Bridge bus, the execution of a second docker image is triggered that takes this content and places it within a pull request on a Github repository. The content is not video, fear not! But I will talk about that in a dedicated article!
In this article I showed how high-level use can be made of many AWS managed services to instrument an application complete with a backend, a frontend, and processes to produce content in the background. In the next articles we will go over how each of these parts work taken individually, with a focus on the most critical ones.
Go to the next article about how to init the Amplify Project
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817790.98/warc/CC-MAIN-20240421163736-20240421193736-00698.warc.gz
|
CC-MAIN-2024-18
| 6,698
| 27
|
http://akapastorguy.blogspot.com/2010/05/duty-calls.html
|
code
|
Everything including the kitchen sink... but with special attention paid to board games, Jesus Christ, my family, being a "professional" (and I use that word loosely) Christian, and the random firing of the 10% of the synapses I'm currently using.
Okay: That is totally my favorite XKCD comic ever.I was really going to get back to looking through my RSS feed and leave you alone for today, but this was too good to pass up [smile]. ~Luke
Two thumbs up!
Post a Comment
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122629.72/warc/CC-MAIN-20170423031202-00317-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 468
| 4
|
https://drakonoved.org/blog/
|
code
|
A small application with an in-memory database and a web interface, which is build on spring-webmvc and h2 database engine. Project Users.
External feedback form for a static site. This application includes a backend and frontend, so that it can be called both from an external site and from the current site. Frontend has a responsive layout for both desktop computers and mobile devices.
Example of a single-endpoint web service with the GraphQL API and three in-memory H2 databases using spring-webmvc and spring-data-jpa.
The code from the AngularJS Material site updated a bit to use with a md-scroll-shrink attribute.
A simple lightweight solution, which is built using a AngularJS Material library without any directives.
Небольшая подборка стихов, которые мне запомнились со школы. Эти стихи старше меня более чем на полвека. Не уверен, что это входит в школьную программу, но мне нравится.
Задачи по Java, ставшие уже классическими на сегодняшний день, но актуальные. Источники разные - основные темы те же самые. Встречаются в разных местах в интернетах и не только.
Медведь был безобразным, косолапым и грязным животным. Однако добрее его не было никого во всем лесу. Hо звери замечали только его внешность.
Example of a site that uses only servlets with annotations. The server response is based on html templates with parameterized expressions for substitution.
Create one REST controller, several servlets and a custom error handling mechanism.
When task is clear and you know how it solves, result depends on trifle: just to code it. And at that time in keyboard's buttons music starts to play.
Two variants of the same figure. Spatial cross in parallel projection. Rotation of three-dimensional objects on all three axes at once.
A small Java code snippet, which fits in one servlet, to create an image containing captcha and it's text value.
What and how to learn in his life, everyone decides for himself. The main thing is not to make mistake in main direction, then there would be no questions that to do with that education.
Consider the difference between parallel and perspective projection. Both are widely used in practice for different purposes.
The rotation of a point by a specified angle relative to another point on the plane - is a part of a secondary school geometry curriculum. Consider an example with a square 200x200 and the origin of coordinates at its centre.
I found the code of this game on GitHub - liked a transition from 2D to 3D by turning. I made a little changes, because it is a Chinese version, which didn't fit the screen.
Plain and simple, nothing useless - I love these solutions. Unfortunately, this is not mine. Of all the variants of similar animation I mostly like this one.
I was going to use this solution for my Tetris 3D, but had to be abandoned, because when there is a large number of such cubes, the browser slows down.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894890.32/warc/CC-MAIN-20201027225224-20201028015224-00465.warc.gz
|
CC-MAIN-2020-45
| 3,273
| 19
|
https://educationechochamberuncut.wordpress.com/tag/kentesafety/
|
code
|
SWGfL – as part of its work in the UK Safer Internet Centre – with Plymouth University, The Office of the eSafety Commissioner (Australia), and Netsafe (New Zealand) have collaborated on a research programme on young people’s experience of sending and sharing nude and nearly nude images, otherwise known as ‘sexting’.
The purpose of this shared research programme is to better understand the:
prevalence of sending and sharing of both solicited and unsolicited nude or nearly nude images or videos, and young people’s influences and motivations for this behavior.
Experience and ability of…
Continue reading at:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948581053.56/warc/CC-MAIN-20171216030243-20171216052243-00790.warc.gz
|
CC-MAIN-2017-51
| 626
| 5
|
https://appstream.debian.org/sid/main/issues/webcamoid.html
|
code
|
Last updated on: 2023-03-20 14:21 [UTC]
Hints for webcamoid in main
io.github.webcamoid.Webcamoid ⚙ amd64
:22 - Webcamoid is a full featured and multiplatform webcam suite.
The first `description/p` paragraph of this component might be too short (< 80 characters). Please consider starting with a longer paragraph to improve how the description looks like in software centers and to provide more detailed information on this component immediately in the first paragraph.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00081.warc.gz
|
CC-MAIN-2023-14
| 472
| 5
|
https://www.ruby-toolbox.com/projects/corissawex-hitchens-theme
|
code
|
(Hitchens theme, edited by Corissa)
Check out the original instructions at Pay Dryburgh's repository.
If you've already created your Jekyll site and are comfortable with the command line, you can add this line to your Jekyll site's
gem 'corissawex-hitchens-theme', '~> 0.1.0'
And add the following lines to your Jekyll site's
Depending on your site's configuration, you may also need to add:
And then on the command line, execute:
Or install the theme yourself as:
$ gem install gem corissawex-hitchens-theme
The code for this theme is available as open source under the terms of the MIT License.
The font, EB Garamond, is Copyright 2017 The EB Garamond Project Authors and licensed under the SIL Open Font License Version 1.1.
Graphics are released to the public domain.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178362513.50/warc/CC-MAIN-20210301121225-20210301151225-00367.warc.gz
|
CC-MAIN-2021-10
| 771
| 12
|
https://www.ibm.com/developerworks/community/blogs/AntonySatyadas/tags/acer?lang=en
|
code
|
Recently Acer announced that they will be shipping their netbooks with Android - google's linux operating system.
Fedora 11 is out: http://www.eweek.com/c/a/Linux-and-Open-Source/Fedora-11-Delivers-Big-Feature-Boost-to-Latest-Linux-Distribution-748274/
Intel Classmate PCs will ship with Ubuntu: http://www.ubuntu.com/news/intel-classmate-unr-netbook-remix
Canonical announced planned support for Moblin: http://www.ubuntu.com/news/canoical-commits-ubuntu-moblin
Belgian Ministry of Justice saved 50% on software license costs by moving 10,000 users to SuSe Linux Enterprise Desktop: http://www.novell.com/success/belgian_ministry.html
Social Business transformation
Matching: acer X
AntonySatyadas 1100009CNT Tags: novell canonical ubuntu classmate opensource netbook fedora desktop redhat intel belgium acer linux moblin 3,882 Views
Looks like netbook sales will surge more given this move by Verizon (http://news.cnet.com/8301-17938_105-10206584-1.html) to sell netbooks. AT&T is already selling Acer and Dell netbooks...
As mentioned before, more than 30% of netbook sales are on Linux (they are $50-75 less costly than Windows XP --- Vista doesnt run)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320595.24/warc/CC-MAIN-20170625235624-20170626015624-00694.warc.gz
|
CC-MAIN-2017-26
| 1,158
| 10
|
https://forum.phalcon.io/discussion/2759/how-to-compile-my-windows-dll-from-the-github-code-
|
code
|
Hi, is there any tutorial on how to compile the PhalconPHP for
I need compile version 1.3.3 (which is unfortunately still in alfa) for this configuration of mine:
I have Visual Studio 12 Express installed on my computer if it helps.
Btw. my Windows 7 installation is 64-bit. Would I be able to compile 32-bit (x86) dll via VS12 ? because my WAMP is 32-bit and not 64-bit
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00128.warc.gz
|
CC-MAIN-2024-10
| 370
| 4
|
https://wyn.grapecity.com/docs/user-guide/Governing-Data-and-Resources/Introduction-to-Data-Sources/Create-DataSource-OData
|
code
|
To create a OData data source in Wyn Enterprise, follow these steps.
On the Resource Portal, navigate to Create (+) > Create Data Source.
Select Odata in the data source list on the left or in the icon view on the right.
Fill in the database configuration information for the selected data source.
* Required fields
Click Create after the successful connection.
You can view the added data source in the Categories tab of the Resource Portal.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948932.75/warc/CC-MAIN-20230329023546-20230329053546-00691.warc.gz
|
CC-MAIN-2023-14
| 442
| 7
|
https://visualprogramming.net/blog/2020/vl-language-design-repository/
|
code
|
We are pleased to announce that from now on VL language design ideas will be specified in public. This allows you to see
- which areas we identified to work on (quests)
- what ideas we came up with to fix those issues (proposals)
- which proposals got favored over other proposals (decisions)
- which proposals got moved onto which milestone
But it also allows you to join forces with us. Since in the end, it’s all about your patches, we appreciate your feedback.
We decided to start clean: For now, we didn’t throw all our language ideas into this repository. In its current state, we only see issues that came up in the last days, so the selection of issues is quite incomplete. Other ideas that might be more important and didn’t come up in these days will eventually make it there as soon as they come up again.
We’ll address quests by you or us with proposals that might be fresh or have been around for some time. We’ll try to communicate different approaches and the pros and cons. And we’ll try to single out very few issues that are just too promising to not having a shot at. Changing the language is quite hard, so expect an insane ratio of proposalsThatSoundNice / featuresComingSoon.
We were quite impressed by how this was handled by the C# Language Design Team. So we copied the approach.
Sometimes it’s hard to distinguish between the language and ways of expression within the language. You just search for a way to address a certain problem. How would I structure my patches? We’ll allow these so-called design patterns to be discussed in this repository as we want the language to be able to follow well-established ideas on how to solve certain types of problems. Here is an example.
But for now: Welcome to the club! \o/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711003.56/warc/CC-MAIN-20221205032447-20221205062447-00641.warc.gz
|
CC-MAIN-2022-49
| 1,758
| 11
|
http://www.mcall.com/opinion/letters/mc-parmer-obama-gun-control-20150627-story.html
|
code
|
Back in the 1920s, they banned alcohol. That worked, didn't it?
For how many years have illegal drugs been banned? That's working, isn't it?
In the 1960s, they decided that the criminally insane should not be locked up in mental hospitals so they closed those hospitals. That worked, didn't it?
So therefore, outlawing guns has to work, right?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867304.92/warc/CC-MAIN-20180624234721-20180625014721-00471.warc.gz
|
CC-MAIN-2018-26
| 343
| 4
|
https://bootcampmilitaryfitnessinstitute.com/2019/11/12/advance-retreat-die/
|
code
|
“Follow me if I advance! Kill me if I retreat! Revenge me if I die!”
Ngo Dinh Diem on becoming president of Vietnam (1901 to 1963) (1954, from The Concise Columbia Dictionary of Quotations)
Ngo Dinh Diem was a Vietnamese political leader who served as president, with dictatorial powers, of what was then South Vietnam, from 1955 until his assassination.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00473.warc.gz
|
CC-MAIN-2023-50
| 358
| 3
|
https://davidblitz.github.io/2016/10/07/2016-10-07-linear-regression/
|
code
|
When I was showing a friend the advantages of python over Excel/LibreCalc, I remembered the truly beautiful Seaborn Library which produces plots like the following.
As one can see, this a standard scatterplot of a two dimensional dataset together with a regression line fitted to it - the light blue shade indicates a 95% confidence interval btw. It turns out that creating this standard diagram is as easy as
import pandas as pd import seaborn as sns ... #create/load your pandas dataframe here sns.regplot(x="your_dataframe_column1", y="your_dataframe_column2", data=your_pandas_dataframe)
Of course, you might need to have a 10 minute look at Pandas, as well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232260658.98/warc/CC-MAIN-20190527025527-20190527051527-00559.warc.gz
|
CC-MAIN-2019-22
| 662
| 4
|
https://www.uua.org/re/tapestry/adults/commitment/workshop7/111418.shtml
|
code
|
With your co-leader, take some time after the workshop to evaluate the session and plan for future sessions. Consider these questions:
- What parts of the workshop seemed to be the most fun for participants? Why?
- To what extent did everyone get involved in the "play"?
- Were we, as leaders, enthusiastic and playful?
- When did we seem particularly effective as co-leaders? Why?
- How might we use similar techniques in future workshops?
- What were the most challenging aspects of leading this workshop?
- What can be done to address those challenges in future workshops?
- Were issues brought up during the workshop that may need further comment at the next session?
- Is there any other unfinished business from this workshop's activities? If so, what is our plan for completing it?
- Were any couples missing from this workshop? Who will follow up with them?
Assign tasks for the next workshop, such as gathering materials and photocopying handouts. Decide who will lead each section of the next workshop.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00361.warc.gz
|
CC-MAIN-2023-40
| 1,012
| 12
|
https://community.spiceworks.com/topic/1070639-adobe-creative-suite
|
code
|
I would like to know if there is way to "scan" our company network
for clients that have an adobe creative suite licence. The Reason for this:
the previous admin did not take note of what licence is in use and which one not.
now we need to install extra pc's whitout having a clue if the keys are in use or not.
i'm talking about a +100 pc's environment.
use spiceworks to scan your network then run a custom report on adobe software, it should pull the licensing as well.
edit: after thinking about this it also depends on what version of CS you are running. If it is cs6 or newer you need an adobe id to register. That adobe id should contain all license keys for those versions.
Hmm surprised you don't have anything doing this already. I use lansweeper and it posts all packages/software installed on our entire domain. I think 100 assets are free with the option to upgrade. It runs SQL Express and is incredibly light weight. This is a screen within the application showing my domain software for adobe:
Brand Representative for Adobe
If they are volume licenses; then the tracking of the licenses won't be possible.
In case of retail licenses, the activations are valid only on 2 machines.
Hope this helps!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363157.32/warc/CC-MAIN-20211205100135-20211205130135-00084.warc.gz
|
CC-MAIN-2021-49
| 1,213
| 12
|
https://learn.redhat.com/t5/General/Unable-to-boot-Exam-Live-USB-Image/m-p/24722/highlight/true
|
code
|
I'm wondering if someone faces something similar..
I try on Fedora and Windows and also try with different USBs.
I don't think I understand your question. When you say "I try on Fedora and Windows and also try with different USBs." That doesn't make sense to me. Unless you are trying to Virtualbox or KVM boot the LiveExamOS. You're supposed to boot your BIOS or UEFI into the LiveExamOS, not into a hypervisor. So Fedora or Windows should have no bearing on it. The LiveExamOS is a modified Fedora, which is entirely loaded into your RAM sticks during setup.
Give that a try--on my Asus desktop I plugged in the LiveExamOS USB stick, burned by Fedora Media Writer on FedoraWorkstation, and then turned on my PC. I do F12 or DELETE to enter UEFI during PC bootup, then clicked Boot Override on the UEFI-USB stick.
If I am miss understanding you and you're doing all this, please post a larger screenshot. I noticed you have an i386 in the log there--that's a 32-bit CPU archi-type. I think you have to have a 64-bit...but I could be wrong on that.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100146.5/warc/CC-MAIN-20231129204528-20231129234528-00348.warc.gz
|
CC-MAIN-2023-50
| 1,048
| 5
|
https://bounties.gitcoin.co/issue/infura/infura/130
|
code
|
No funded issue found.
Check out the
Issue Explorer Be the OSS Funding you wish to see in the world.
Looking to fund some work? You can submit a new Funded Issue
Workers Auto Approve
Infura IPFS Documentation
This is a Gitcoin bounty to write documentation for the Infura IPFS API.
This documentation will provide a detailed description of each supported IPFS method on Infura's IPFS endpoint, format for calling the methods, and format of the method's response. The description should include common use cases for each method.
An example of API documentation that we really like is Stripe's API documentation here, https://stripe.com/docs/api#intro
Prospective bounty claimer will provide examples of previously written documentation and present familiarity with Infura and its IPFS API.
Once approved for the bounty, the person will have a scheduled meeting with one of the maintainers of the IPFS API system. The maintainer will provide a detailed breakdown of the required documentation and answer any questions around the API and its use cases.
The person will then write the documentation per the details in this ticket and the provided information from the maintainer.
The person will submit the documentation within the agreed time frame and will address 2 rounds of feedback in the event that it is needed.
Once the feedback rounds are complete, the bounty reward will be distributed if the acceptance criteria are met.
The documentation has clear information for the following:
API call format for each method
API response examples for each method
Example use cases for all API methods including written description of the example
Any other criteria outlined by the maintainer during the scheduled meeting will be recorded here.
The expected time to complete the bounty is 9 hours. The timeline will start after the scheduled meeting with the maintainer. We will discuss an agreed upon timeline during the meeting with the maintainer.
Setup your profile
Tell us a little about you:
No results found for
Type to search skills..
Required [[totalcharacter]] / 240
Are you currently looking for work?
[[ option.string ]]
Setup your profile
Our tools are based on the principles of earn (💰), learn (📖), and meet (💬).
Select the ones you are interested in. You can change it later in your settings.
I'm also an organization manager looking for a great community.
Enable your organization profile
Gitcoin products can help grow community around your brand. Create your tribe, events, and incentivize your community with bounties. Announce new and upcoming events using townsquare. Find top-quality hackers and fund them to work with you on a grant.
These are the organizations you own. If you don't see your organization here please be sure that information is public on your GitHub profile. Gitcoin will sync this information for you.
Select the products you are interested in:
Out of the box you will receive Tribes Lite for your organization. Please provide us with a contact email:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00117.warc.gz
|
CC-MAIN-2023-23
| 2,997
| 36
|
https://pedrojordano.net/2012/04/28/university-of-sevilla-phd-award-for-francisco-rodriguez/
|
code
|
University of Sevilla PhD award for Francisco Rodríguez
The University of Sevilla has awarded Francisco Rodríguez with the PhD Excellence Award, 2012. Paco carried out his PhD project in the lab, working on dispersal ecology of Laurus nobilis. Big congratulations Paco!!!
Author: Pedro Jordano
Fazendo ciéncia e soltando pipa... I'm an evolutionary ecologist, working on how ecological interactions, e.g. mutualisms, shape complex ecological systems.
Sevilla, España · pjordanolab.ebd.csic.es
View all posts by Pedro Jordano
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585450.39/warc/CC-MAIN-20211022021705-20211022051705-00277.warc.gz
|
CC-MAIN-2021-43
| 529
| 6
|
https://bugzilla.redhat.com/show_bug.cgi?id=823472
|
code
|
See commit log at
To protect data accessed by main_thread (most spice channels) from being accessed by threads of other channels (namely, the display and cursor channels), an assert was coded in spice-server.
Some calls to the sound channel interface can be done from the vcpu thread. Such accesses hit the assert code, and made spice-server (and qemu-kvm) to abort.
Such accesses are safe as qemu-kvm uses global
mutex for the vcpu and io threads.
Those assert lines of code were replaced by a warning.
spice-server does not abort on such accesses.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865098.25/warc/CC-MAIN-20180623152108-20180623172108-00436.warc.gz
|
CC-MAIN-2018-26
| 549
| 7
|
https://www.eclipse.org/lists/jgit-dev/msg00206.html
|
code
|
|Re: [jgit-dev] JGit sample client - starter|
On 03/11/2010 02:12 AM, Alex Blewitt wrote:
Sure - Anything in particular , that does along the lines of retrieving the tree / listing branches and printing it , that you would suggest as a starting point ?On 11 Mar 2010, at 10:03, Karthik K wrote:Hi - I am trying to use JGit for one of the sample applications - where I am trying to use jgit to connect to a http uri , say - git://github.com/apache/hbase.git , and retrieve the contents of the same. Can you help let me know a sample snippet using the jgit library , that I can take as a reference and go through the source tree , to get more. I am looking under org.eclipse.jgit as a starting point, but more pointers / help related to that would be appreciated. Thanks.There are number of tests that check out a repository. Would any of those help?
By the way, the git:// protocol is different from the http:// protocol, so whilst it's a URI, it's not an HTTP URI.
Oops Sorry . My bad - I meant to type - http://github.com/apache/hbase.git , when I was referring to the uri.
Also - when you mention about the URI being different, if a client were to access a http uri to clone a git repository, would it be sufficient to have port 80 open, from the client to access the same. Or - is there a different protocol / port that refers to the same.
Back to the top
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00118.warc.gz
|
CC-MAIN-2022-33
| 1,358
| 7
|
https://github.com/SiegfriedEhret/webgl-experiments
|
code
|
I wanted to do some WebGL stuff, and came accross BabylonJS.
You'll find here a few experiments, trying to copy Nehe OpenGL lessons.
GitHub is home to over 36 million developers working together to host and review code, manage projects, and build software together.Sign up
|Type||Name||Latest commit message||Commit time|
|Failed to load latest commit information.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256040.41/warc/CC-MAIN-20190520142005-20190520164005-00310.warc.gz
|
CC-MAIN-2019-22
| 365
| 5
|
https://macdownload.informer.com/wingnuts/
|
code
|
WingNuts 2 takes you on a fantastic arcade journey to over 30 real, (and not-so-real), locations and time periods as you hunt Baron Von Schtopwatch and the mysterious “Raina”.
Play through time as you encounter enemies from the 1920’s to the distant future. With over 100 real world aircraft, helicopters, blimps, tanks, ships and submarines, you’ll never run out of things to shoot!
WingNuts 2 features dozens of “Boss” planes and ground units, a plethora of power-ups (including Super Mecha Mode) and a Flying Aircraft Carrier as your base of operations. The game sets a new standard for arcade action!
Advanced OpenGL and 3D particle effects allow you to take advantage of high-end graphic cards and the custom-built game editor lets fans create their own scenarios and share them online. An instant classic, Wingnuts 2 was an Apple Design Award Runner-Up for Game of the Year!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143373.18/warc/CC-MAIN-20200217205657-20200217235657-00383.warc.gz
|
CC-MAIN-2020-10
| 892
| 4
|
https://outspeaking.com/words-of-technology/what-is-programming.html
|
code
|
page updated on August 30, 2016
In 50 years, computers have gone from the room-sized stuff of the space program and science fiction to devices so small and ubiquitous that they're boring. Your car and microwave, for example, have computing power undreamed of half a century ago. The computer or tablet or phone you're reading this on is so much more powerful than the computers that sent astronauts into space that no one in the Apollo program would have dared to believe they would ever exist.
Despite science fiction predictions (and warnings) that computers would automate away all of the work of humans, humans have more power than ever over computers. Humans are vital to the work of computers—because only humans can program computers. If you'd asked all of those scifi authors how to describe software, they might have waved their hands and given answers about math, science, engineering, and construction. They didn't know. (Think of them trying to explain software maintenance, the idea that working code needs regular attention to keep working!)
Exactly what is programming?
Creating a set of instructions for an unthinking machine to emulate.
Building a complicated system from simple parts, often reused between programs.
Describing the world in quasi-mathematical terms, such as the language of logic and algebra.
Solving a problem, usually by transforming input into output via well-understood rules.
Discovering the rules of the problem while creating a solution, often by refining the understanding of the problem.
A computer is a simple device that knows how to remember things and how to look up those memories. At its core, that's all it does. It starts out with a blank slate of memory and relies on a human to tell it what to do with that memory. This was true of the first computers and it's true of modern devices; the history of computing shows an increase in the complexity of the mathematical transformations possible.
Your phone—perhaps the one you're using to read this—is countless times more powerful than the computers that sent astronauts to the moon and back. In a couple of human generations, we've seen dozens of generations of computers.
A program is a set of instructions for managing that memory. Whatever you want to do with a computer, you're manipulating a set of electrical symbols the computer understands in a particular way. This is obvious if you're running a calculator program (take 10% off the price of this $43 sweater) and less obvious (but no less true) if you're writing a document. Think about it this way; every word you type has to be in memory somewhere, right? The same goes for a sentence you emphasize as and a word you write as bold. Even the changes you make to move one paragraph here or delete a sentence are themselves stored in memory so that you can hit undo to revert a change you didn't intend.
Ever play the game Monopoly? The rules start simple. You roll the dice, move your token that many spaces around the board, and follow the directions where you land. They're easy to describe in a page or two.
The game never ends quite that simply. Maybe you add some rules, like putting all of the fines collected on the Free Parking space, and the first person who lands there gets to collect the money. Maybe you let players take loans from the bank without mortgaging properties.
Maybe two players disagree over the interpretation of a specific rule, and you have to read the rule out loud and discuss what a single word in that rule really means, and why the game designers chose that word over another. Sometimes you agree on one interpretation with one group of players and another interpretation with another group of players.
The rules—as simple as they might seem—produce a framework in which countless players have played innumerable games, each one a little different. One player strategy is not another. One roll of the dice can change the entire game.
Programming is like that. Programming means implementing the rules in such a way that complicated systems are possible. Programmers discover and build systems out of these kinds of rules. Good programmers minimize the number and complexity and potential ambiguity of the rules to maximize the flexibility, ease, and correctness of a system. In a very real sense, programming means coming up with the rules for a process and combining them in a coherent way. These rules can be simple or complex, but they're usually part of a larger system in which the interaction of multiple rules leads to consequences intended and not!
Programming isn't a series of equations. It's like equations, but it's also a little messy where it interacts with the real world. It has to deal with the fundamental ambiguities of human language and communication. (If you think quantum mechanics is weird, try linguistics sometime!)
For every right triangle, the old Greek thinker Pythagoras discovered, the sum of the square of the lengths of the sides which make the right angle is equal to the square of the length of the remaining side. (You can prove this trivially yourself.) Every triangle which matches this property is a right triangle. Every triangle for which this is not true is not a right triangle. Mathematicians try to discover and express relationships and identities like this every day.
If telling a computer what to do is like coming up with the rules to a board game, it's also like discovering the invariant properties of a complicated system. "It's impossible to withdraw more money from the ATM than you have in your savings account," one program might say. "It's impossible for the airplane to take off while the cockpit door is open," another might explain.
Computer programs in the real world often have to be more complicated than the rules of a board game. They have to deal with objects in the real world: money, cars, books, employees, paychecks, automatic sprinkler systems. Even though a computer program is ephemeral and untouchable, it has to deal with reality. "If the sprinkler system runs for more than 20 minutes, it'll overflow the pipes and cause damage to the floorboards, so cut it off at a maximum of 19 minutes." These are simple machines, but their interactions are anything but simple. They're logical, yes. On their own they're small but functional. Together, they make complex systems.
These rules may seem arbitrary, even when they have their roots in the real world, but they're anything but arbitrary in the world of the computer program. They're the rules by which the world of the program operates. Writing a program often means designing an ideal version of the real world and setting up these rules that cannot be violated.
If you know that a right triangle always has the property that follows the Pythagorean theorem, you can build up more complicated systems. You know something that will never change, and you can make more and more assertions based on the combinations of these simple rules. Just like Monopoly can't only be "Roll the dice" but has to include buying and selling properties and paying rent and passing Go to collect $200, any computer program which does anything useful in the real world must make assertions about the world it inhabits and define a set of rules built on rules built on rules from there.
Good programmers see these patterns. Great programmers exploit them.
A computer program must touch the real world somehow. Even if it's as simple as giving you a calculator so you don't have to do long division in your head, it has to follow the rules of the real world, where 27 divided by 3 is 9. A calculator that couldn't get that right would be awkward and difficult to use.
Similarly, a program that has inconsistent rules or rules which don't match your expectations will be frustrating (at best) to use or impossible or expensive or dangerous (at worst). A space probe that doesn't understand gravity might smack into a planet. A spreadsheet that silently forgets about compound interest may cost you lots of money. A brake sensor that can't detect temperatures above a hundred degrees might not warn you of a failure in time to react quickly enough. A music program that plays the wrong notes isn't even worthwhile for jazz. A drawing program that can't draw straight lines isn't worth the binary bits it's made of.
A computer program always touches the real world somehow, else why would it be written? Even a program written for the sake of writing it has the real effect of generating pleasure by being a piece of art or the comforting diversion of a hobby. Real life always finds a way to intrude into our carefully crafted models, and our software is all the better for it.
A program need not concern itself with the laws of physics which bind the real world; a game might have a zero gravity mode where players bounce around in space like balloons. Yet a program to calculate the amount of cement necessary to use in bridge pilings to support rush hour traffic across a bridge needs to follow the real world to a great degree.
But what is programming? It's:
Programming a computer requires discipline and patience and practice and study—like any creative act. It is part logic and proof (like math) and part design (like producing a board game that is easy to understand but fun to play). It can be difficult and enjoyable at the same time. It's not easy to define what programming software feels like, as it's different from every comparison we make. Yet it's similar too.
Like any other worthwhile human endeavor, writing a program is not easy, but crafting good software is essential to multiplying the power of human creativity and effort to meet the needs and realize the goals of our modern world.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499524.28/warc/CC-MAIN-20230128054815-20230128084815-00601.warc.gz
|
CC-MAIN-2023-06
| 9,715
| 31
|
https://learn.arcgis.com/en/projects/get-started-with-arcgis-pro/
|
code
|
Get Started with ArcGIS Pro
Create a project
In ArcGIS Pro, maps and data are organized in a project. Before you begin your map, you'll create a project. You can complete the lesson using an ArcGIS Online account or an ArcGIS Enterprise account, as long as ArcGIS Pro is licensed in your portal.
- Start ArcGIS Pro. If prompted, sign in using your licensed ArcGIS Online account or ArcGIS Enterprise account.
If you don't have ArcGIS Pro or an ArcGIS account, you can sign up for an ArcGIS free trial.
- Under New Project, click Map.
The Create a New Project window appears. By default, projects are saved in a new folder. To save them in an existing folder, uncheck Create a new folder for this project and browse to the folder.
- For Name, delete the existing text and type Singapore Tourism. Leave Location unchanged and confirm that Create a new folder for this project is checked.
Your default location may differ from the example image. Typically, projects are saved in the ArcGIS folder that was created when you installed ArcGIS Pro.
- Click OK.
The project is created with a map showing the world. In ArcGIS Pro, maps are composed of layers of geographic data. For now, the only layer is the basemap, which provides reference information such as national boundaries and water bodies.
Depending on your ArcGIS organization's settings, your map may have a different default extent and basemap, so it may look different than the example image.
On either side of the map are panes. By default, the Contents and Catalog panes are open, although other panes may be open if you've used ArcGIS Pro before. The Contents pane lists the layers on the map and the Catalog pane lists all files associated with the project.
Above the map is the ribbon. The ribbon contains several tabs, each with multiple buttons. These buttons may affect map navigation, change the map's appearance, or open windows or panes with more functionality.
You can rearrange panes by dragging their title and docking them in new locations. You can also resize panes by dragging their edges. To return to the default pane arrangement, click the View tab. In the Windows group, click Reset Panes and choose Reset Panes for Mapping. Throughout this lesson, feel free to arrange the panes and views.
Navigate to Singapore
Your area of interest is the island city-state of Singapore, so you'll navigate to it.
- On the ribbon, click the Map tab.
- In the Inquiry group, click the Locate button.
The Locate pane appears. Using this pane, you can search for and navigate to geographic locations, including countries, cities, and street addresses.
- In the Locate pane, in the search bar, type Singapore and press Enter.
The map automatically navigates to the first result: the country of Singapore. (The locations of the search results are displayed on the map as circles.)
Singapore, one of the world's smallest nations, is home to 5.6 million people and has four official languages. The modern city contains numerous historical and cultural landmarks, entertainment venues, and ecological sites. It is one of the most visited cities in the world and tourism is a major industry.
- Close the Locate pane.
- Above the ribbon, on the Quick Access Toolbar, click the Save button.
The basemap shows Singapore and some basic geographic information, such as roads and lakes. However, it doesn't show tourist destinations or rail stations. To create a map that is useful to tourists, you'll add this data to the map.
- On the ribbon, on the Map tab, in the Layer group, click the Add Data button.
The Add Data window appears. You can add data from several sources, including your project's folder (Project), the website of your ArcGIS account (Portal), or your computer (Computer).
Most ArcGIS accounts, including trial accounts, use the ArcGIS Online website as their portal. ArcGIS Online is an online GIS mapping platform that hosts a large amount of spatial data. You'll add the data you need from there.
- In the Add Data window, under Portal, click ArcGIS Online.
This option provides access to all data hosted on ArcGIS Online. The data you'll use is owned by the Learn ArcGIS administrator account. To find the data, you'll search for it by name and owner.
- In the search bar, type Singapore owner:Learn_ArcGIS and press Enter.
The search returns three results: Singapore Rail Lines, Singapore Tourist Attractions, and Singapore Rail Stations.
Some ArcGIS accounts use an ArcGIS Enterprise website as their portal. If your account uses ArcGIS Enterprise, you can't search for ArcGIS Online content. To add the data, go to the Singapore_Data_gdb item on ArcGIS Online and click Download. Extract the downloaded folder to a location on your computer. In the Add Data window, browse to the location of the extracted folder. (You may need to click the Refresh button in the Add Data window to see the folder.)
- While pressing the Ctrl key, click the Singapore Rail Lines, Singapore Tourist Attractions, and Singapore Rail Stations layers to select them.
- Click OK.
The three data layers are added to the map.
If you're using ArcGIS Enterprise and downloaded the data instead of adding it from ArcGIS Online, your layers may look different than in the example images.
The layers are also listed in the Contents pane.
The green points are tourist attractions, the white lines are rail lines, and the black polygons are rail stations. Layers that are composed of points, lines, or polygons are called feature layers.
The majority of tourist attractions are grouped in the south-central part of the island. This area is Singapore's downtown, also called the Central Business District. The tourism agency wants their brochure to focus on this area, so you'll zoom to it.
- On the map, point to downtown Singapore and move the mouse wheel to zoom in. Zoom until the downtown area takes up most of the map.
Another way to zoom to an area is to select the Explore tool and press the Shift key while drawing a box on the map where you want to zoom. Alternatively, right-click and drag the mouse on the map to zoom in or out. Use the navigation method you prefer.
- If necessary, drag the map to pan it until the Central Business District is in the center of the map.
At this extent, the rail stations are displayed in more detail. Depending on the size of your monitor, more information about streets and buildings may be displayed.
This map extent will be the one you use for the rest of the project. It'll be convenient to quickly return to this extent if needed, so you'll create a navigation shortcut called a bookmark.
- On the ribbon, on the Map tab, in the Navigate group, click Bookmarks and choose New Bookmark.
- In the Create Bookmark window, for Name, type Central Business District.
- Click OK.
The bookmark is created. You'll use this bookmark later in the lesson.
- Save the project.
Style the map
While navigating the map, you may have noticed that some of the data layers are difficult to see. The rail lines, for instance, are white and often blend into the other information on the map.
The information about streets, water bodies, and buildings comes from the basemap. A basemap provides reference information that contextualizes your data. ArcGIS Pro includes several basemap layers, with the default being World Topographic Map. (Depending on your ArcGIS organization's settings, you may have a different default basemap.)
You'll change the basemap to one that emphasizes your data. A darker basemap will make the white rail lines appear more clearly.
- On the Map tab, in the Layer group, click Basemap and choose Dark Gray Canvas.
The basemap changes.
With this basemap, the rail lines stand out more. Unlike the Topographic basemap, this basemap contains two layers. One of these layers, Dark Gray Reference, contains text that labels some areas. This text isn't necessary for your map's purpose and may obscure some features, so you'll turn it off.
- In the Contents pane, uncheck the Dark Gray Reference check box.
The layer no longer appears on your map. (To make the reference information reappear, click the check box again.)
The tourist attractions are displayed on the map as small points that don't stand out well. Because the attractions are meant to be a focal point of the map, you'll change the way they appear.
- In the Contents pane, click the Tourist Attractions layer symbol.
The Symbology pane appears. Symbology defines a layer's appearance. You can choose from a gallery of default symbols or customize a symbol.
- In the Symbology - Tourist Attractions pane, on the Gallery tab, search for Tear Pin. In the list of results, click the largest Tear Pin 1 (40%) symbol.
The symbols for tourist attractions change to the chosen symbol. The tear pin symbol helps convey that the tourist attractions are places of interest. The 40% indicates that the symbol is 40 percent transparent, which is useful in case the symbols obscure parts of the map.
You can make the symbols stand out more by adding an outline and increasing the symbol size.
- Click Properties.
- Click the Layers tab.
- For Outline color, choose Arctic White.
To see a color's name in the color picker, point to it.
- Change Outline width to 0.7 pt. Change Size to 22 pt.
- At the bottom of the Symbology pane, click Apply.
The new symbology is applied to the layer.
Now the tourist attractions stand out more clearly, without obscuring other map features.
If your ArcGIS account uses an ArcGIS Enterprise portal and you downloaded the layer data, the rail lines and rail stations may have different symbols than those shown in the example images. To change the rail lines symbol to match the example images, click its symbol to open the Symbology pane. On the Properties tab, on the Layers tab, change Color to Arctic White and click Apply. To change the rail stations symbol, open its Symbology pane. On the Properties tab, on the Symbol tab, change Color to Gray 80%, Outline color to Black, and Outline width to 1.2 pt. Click Apply.
- Close the Symbology pane and save the project.
The tourism agency wants its brochure to indicate the closest rail station to each tourist attraction. Measuring the distance between each tourist attraction and rail station one by one would take a lot of time, so you'll automate the process by running a geoprocessing tool.
A geoprocessing tool performs an operation on a dataset. In ArcGIS Pro, there are hundreds of geoprocessing tools, encompassing a wide variety of operations. You'll use the Spatial Join tool, which combines information from two feature classes based on their spatial relationship. You'll use this tool to determine the closest rail station to each tourist attraction.
- On the ribbon, click the Analysis tab. In the Geoprocessing group, click Tools.
The Geoprocessing pane appears.
- In the Geoprocessing pane, in the search bar, type Spatial Join. In the list of results, click the Spatial Join tool.
Another way to open the Spatial Join tool is from the Analysis Gallery. On the Analysis tab, in the Tools group, expand the Analysis Gallery. In the Overlay Data group, click Spatial Join.
At the bottom of the Geoprocessing pane, you can choose to view the tools with description and details or as a list view.
The Spatial Join dialog box appears. Most geoprocessing tools have parameters you can set to change the tool's result. For this tool, you'll first choose the feature layers to join.
- For Target Features, choose Tourist Attractions. For Join Features, choose Rail Stations.
To learn more about any parameter, point to the parameter. Then, point to the information button that appears. A ToolTip appears with a description of the parameter.
Next, you'll set the Output Feature Class parameter. Many geoprocessing tools create an output layer, leaving the original layers unchanged.
By default, output layers are saved in a folder specialized for geographic data, called a geodatabase, that was created when you created the project. You'll leave the output location unchanged, but you'll change the output name.
- For Output Feature Class, click the text box. Replace the text with Tourist_Attractions_Join.
You'll leave the Join one to one operation unchanged. This operation ensures that each tourist attraction is joined to only one rail station, which is ideal for your purposes because you only want to know the single closest station.
Next, you'll set the Match Option parameter. This parameter determines the spatial relationship between the features to be joined.
- For Match Option, choose Closest.
- Below the visible parameters, expand Fields.
The Field Map parameter determines which attributes from each input feature class are kept in the output feature class. You'll learn more about attributes later. For now, you'll only remove the Shape__Area and Shape__Length fields, because you're not interested in the size and shape of the features on the map.
- In the Output Fields column, click Shape__Area and click the Remove button.
- Remove the Shape__Length field.
You've set all the parameters you need. Based on the parameters you've chosen, the tool will run an operation that combines information from each tourist attraction with information from its closest rail station.
- Click Run.
The tool runs. When it finishes, a new layer, Tourist_Attractions_Join, is added to the map and the Contents pane. The new layer looks similar to the original Tourist Attractions layer; however, the geoprocessing tool changed the layer's attributes.
Attributes are information associated with each feature in a feature layer. They may include the feature's name, address, area, or many other types of information. You can view a layer's attributes by opening its attribute table.
- In the Contents pane, right-click Tourist_Attractions_Join and choose Attribute Table.
The attribute table opens.
Each row of the table represents a single feature on the map and each column is a field of information. In this table, the first row corresponds to a feature named Chinatown Heritage Centre on 48 Pagoda Street. The Object ID field contains a unique ID number for each feature.
You can resize the table by dragging the handle at the top of the table.
- If necessary, scroll until you see the last few fields.
The table has two fields titled Name. While the first Name field is the name of the tourist attraction, the second Name field is the name of the closest rail station. The second Name field was added to the table after you ran the Spatial Join tool.
The Type field was also added by the Spatial Join tool. It indicates whether the closest station is part of the Massive Rapid Transit (MRT), Light Rail Transit (LRT), or Circle Line (CCL) system. You can determine the fields the tool added by opening the attribute table for the original Tourist Attractions layer and comparing.
- Close the table.
You no longer need the original Tourist Attractions layer, so you'll remove it.
- In the Contents pane, right-click the Tourist Attractions layer and choose Remove.
The layer is removed. You'll also rename the new layer so that its name matches the one you removed.
- Click the Tourist_Attractions_Join layer name to select it. Click it again to make the layer name editable.
- Change the name to Tourist Attractions and press Enter.
Another way to change the layer name is to double-click it to open its Layer Properties window. On the General tab, change the name. Click OK.
- Save the project.
Export a table
If tourists accessed your map in ArcGIS Pro or as an interactive web map in ArcGIS Online, they could open the attribute table like you did to find the closest station to each attraction. However, this map will be printed in brochures, so users won't have that ability.
To accompany the map, the tourism agency plans to print key information from the attribute table in the brochure. You'll export the attribute table to a plain text file so the agency can copy the necessary data into the brochure design.
- In the Contents pane, right-click Tourist Attractions, point to Data, and choose Export Table.
The Export Table window appears. This tool converts a layer's attribute table to a new file format. The Tourist Attractions layer is already selected for the Input Rows parameter.
The default output location is the geodatabase that was created with the project, Singapore Tourism.gdb. However, a text file cannot be stored in a geodatabase. You'll change the output location to one appropriate for the data you're exporting.
- For Output Table, click the Browse button.
The Output Table window appears.
- In the Output Table window, click Folders and double-click the Singapore Tourism folder.
- For Name, type Tourist_Attractions.txt. (Be sure to include the .txt extension.)
If you change the output location to a geodatabase, the tool will not run correctly; choose a location other than the default location.
- Click Save.
You can also export the table to a comma-separated values file using the .csv extension or a dBase database file using the .dBF extension.
As with the Spatial Join tool, the Export Table tool includes the option to remove fields from the output table. You'll remove the Join_Count and TARGET_FID fields, which don't provide necessary information for your purposes.
- Expand Fields.
- For Field Map, click the Join_Count field to select it and click the Remove button. Remove the TARGET_FID field in the same way.
- Click OK.
The tool runs and the table is exported. (You can confirm it was exported successfully by checking the output location you chose). Additionally, the exported table is added to the Contents pane under the Standalone Tables heading . You don't need the table in the project, so you'll remove it.
- In the Contents pane, right-click Tourist_Attractions.txt and choose Remove.
- Close the Geoprocessing pane and save the project.
With the exported table, the tourism agency can add the attribute information to the brochure as textual information. However, tourists using the brochure won't be able to tell which points on the map correspond to which tourist location.
To make the map more useful, you'll label the tourist attractions. Labels are textual information that appear on a map to help users understand the data.
- In the Contents pane, click the Tourist Attractions layer to select it.
The Labeling tab becomes available. This tab is a contextual tab, meaning it only appears when it's relevant to the data you're working with.
- On the ribbon, click the Labeling tab. In the Layer group, click the Label button.
Labels are enabled for the layer. By default, each tourist attraction is labeled with its name. Because there are so many attractions, however, the labels clutter the map and aren't easy to read.
To make the map easy to read, you'll label attractions using their unique ID number instead.
- In the Label Class group, for Field, choose Object ID. (You may need to scroll to see the correct option.)
The labels on the map change from long names to smaller numbers. While the numbers don't immediately identify each attraction, the brochure can include the IDs with the table data to help users identify them.
The labels have small, dark text that doesn't show up well on the dark basemap. Additionally, the position of the labels doesn't always make it clear which number corresponds to which attraction. You'll change the appearance and position of the labels to make them clearer.
- In the Text Symbol group, change Text Symbol Font Size to 8 and Text Symbol Color to Arctic White.
- In the Label Placement group, click Centered Point.
The labels are updated on the map.
These labels are improved, but there are still a few small problems. First, for some tourist attractions, no labels appear. By default, labels are not displayed if they are too close together, to prevent overlapping. Additionally, the labels will look better if they were located more centrally in the pin symbol. You'll make changes to solve both of these problems.
- In the Label Placement group, click the Label Placement Properties button.
The Label Class - Tourist Attractions pane appears. This pane has advanced labeling options.
- Click the Conflict resolution tab.
- Expand the Unplaced labels section and check Never remove (place overlapping).
Now, no labels are removed from the map due to overlapping. Next, you'll adjust the label position so that it is located more centrally within each pin symbol.
- Click Symbol. On the General tab, expand the Position section and change Offset Y to 2 pt.
- Click Apply.
The labels move up slightly, positioning them in the center of the pin symbols.
While some of the labels slightly overlap other pin symbols, they're all generally clear to read. In conjunction with table data published in the brochure, tourists will be able to identify every attraction on the map.
- Close the Label Class - Tourist Attractions pane and save the project.
It may also be useful to users if the rail stations were labeled. For the purposes of this lesson, you won't label them, but you can try creating your own labels. What kind of appearance do your labels need to be legible on the map?
Before you continue, you'll rename your map to something more descriptive. By default, its name is Map.
- In the Contents pane, double-click Map.
The Map Properties pane appears.
- On the General tab, for Name, type Central Business District.
- Click OK.
The map is renamed.
Create a layout
Your map is finished. All that remains is to export it to a form that can be printed in the brochure. To prepare your map for printing, you'll create a page layout. A layout is a collection of map elements organized on a virtual page. It defines how your map will look when it's printed.
You can design a layout from scratch, but ArcGIS Pro also includes several layout templates. You'll use a template and modify a few layout elements.
- On the ribbon, click the Insert tab and click the Import Layout button.
A list of available templates appears. A simple layout is best, as you want the emphasis to be on the map.
- Choose the Title Bar Letter Landscape layout.
If you do not see a list of available templates, you can download and import the layout template used in this lesson.
The layout opens as a new view. (You can switch between the map view and the layout view using the tabs above the view.)
This layout includes a title, a legend, and a scale bar. All of the layout's elements are listed in the Contents pane. Additionally, the ribbon now displays tabs relevant to interacting with the layout.
By default, the template you chose contains a map of Columbus, Ohio. You'll update the layout's map frame to use your map of Singapore.
- In the Contents pane, double-click Map Frame.
The Map Frame pane appears.
- Under Options, for Map Frame, choose Central Business District.
The map in the layout changes. However, the map is zoomed to a worldwide extent, and Singapore is not visible. The map extent and the layout extent are independent.
You'll use the bookmark you created earlier to navigate to your desired map extent.
- On the ribbon, click the Layout tab. In the Map group, click Bookmarks and choose the Central Business District bookmark.
The map extent updates to your area of interest.
To pan or zoom the map to a different extent in the layout, in the Map group, click Activate. Once activated, you can navigate the map normally. When you've changed the extent, click the Layout tab and click Close Activation.
Next, you'll title the layout.
- In the Contents pane, double-click Map Title.
The Map Title pane appears.
- Under Options, for Text, delete the existing text and type Downtown Singapore. Click anywhere outside the text box.
The change is applied to the layout.
You'll also adjust the legend, which explains what all of the symbols on the map mean. The default legend has a white background, which means the white rail lines symbol doesn't show up well. You'll remove the background and adjust the legend's position.
- In the Contents pane, double-click Legend.
The Legend pane appears. First, you'll change the legend text to white, so that it'll appear on the dark basemap when you remove the legend background.
- Click Text Symbol. Expand Appearance and change Color to Arctic White.
- Click Apply.
Next, you'll change the legend background.
- At the top of the pane, click the Legend drop-down arrow and choose Background.
- For Color, choose No color.
- Click Apply.
The legend's background is removed.
- In the layout view, drag the legend so that it appears in the lower corner of the map. When you're finished, click anywhere in the layout view outside of the map to deselect the legend.
The scale bar is in the bottom corner, but difficult to see. Next, you'll update the scale bar appearance to make it more visible.
- In the Contents pane, double-click Scale Bar.
- In the Element pane, click the Display button.
- Under Background, change the following parameters:
- For Symbol, change the color to Grey 30%.
- For X gap, type 0.1.
- For Y gap, type 0.1.
- Click anywhere outside the text boxes to apply the changes.
The scale updates with a grey background that matches with the title background.
- Click and extend the scale bar until the scale shows 1 mile.
- Click and drag the scale bar to align with the edge of the layout and title.
Your layout is complete. The tourism agency will print this map image on the inside of the brochure. The back of the brochure will contain a list of the tourist attractions based on the table you exported. Ultimately, the brochure will help tourists find the closest rail station to each tourist attraction.
- Save the project.
Next, you'll export the layout to an image file.
- On the ribbon, click the Share tab. In the Output group, click the Export Layout button.
The Export Layout pane appears.
- In the Export Layout pane, for File Type, choose your preferred image image file format. For Name, browse to your preferred output location and change the file name to Downtown Singapore.
- Click Export.
The layout is exported to the location you chose.
In this lesson, you created a map that showed popular tourist attractions in downtown Singapore. You created a project, navigated to the area of interest, and added data. You changed the way the map looked and analyzed the distance between tourist attractions and rail stations. Then, you created a layout and exported the map to an image file.
This lesson was an introduction to ArcGIS Pro and covered only the basics of topics such as mapmaking and analysis. To learn more about the capabilities of ArcGIS Pro, see the following Learn ArcGIS lessons:
- To learn about feature editing and 3D mapping, try Map Venice in 2D and 3D.
- To learn about symbology and cartography, try Cartographic Creations in ArcGIS Pro.
- To learn about the advanced analysis capabilities of ArcGIS Pro, try Estimate Solar Power Potential.
- If you're an ArcMap user who wants to migrate to ArcGIS Pro, try Migrate from ArcMap to ArcGIS Pro.
You can find more lessons in the Learn ArcGIS Lesson Gallery.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711232.54/warc/CC-MAIN-20221208014204-20221208044204-00638.warc.gz
|
CC-MAIN-2022-49
| 27,045
| 226
|
https://qiita.com/saharsayema
|
code
|
Qiita Teams that are logged in
You are not logged in to any team
Log in to Qiita Team
Help us understand the problem. What is going on with this user?
It's illegal (copyright infringement, privacy infringement, libel, etc.)
It's socially inappropriate (offensive to public order and morals)
Other than the above, but not suitable for the Qiita community (violation of guidelines)
Sayema Sahar: The legendary singer who is winning hearts worldwide. She comes as a highly recognized Indian classical singer.
Following tags are none
$ analyze @saharsayema
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991648.10/warc/CC-MAIN-20210511153555-20210511183555-00107.warc.gz
|
CC-MAIN-2021-21
| 552
| 10
|
https://github.com/12deadpixels/Gestural-Sound-Toolkit
|
code
|
Gestural Sound Toolkit
Toolkit in Max/MSP for easy and fast gesture-to-sound scenario prototyping.
Copyright 2015 - Baptiste Caramiaux, Alessandro Altavilla
Credits. This tookit has been designed and implemented in order to investigate research questions on sonic interaction design, and led to a publication at the CHI 2015 conference. If you use the toolkit in your research or teaching, please credit our work:
- Caramiaux, Baptiste, Altavilla, Alessandro, Pobiner, Scott and Tanaka, Atau. "Form Follows Sound: Designing Interactions from Sonic Memories". In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 3943-3952. 2015 (http://dx.doi.org/10.1145/2702123.2702515)
GST has been devoloped as part of the MetaGestureMusic project, which received funding from the European Research Council under the European Union’s Seventh Framework Programme (FP/2007-2013) / ERC Grant Agreement n. FP7-283771.
Original authors: Baptiste Caramiaux, Alessandro Altavilla
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747024.85/warc/CC-MAIN-20181121032129-20181121054129-00190.warc.gz
|
CC-MAIN-2018-47
| 991
| 7
|
https://www.scirra.com/users/renanlindner
|
code
|
489 reputation points
550 profile views (334 unique)
Last online: Thursday, November 22, 2018 at 11:16:47 PM
||9th Jan 2014 (5 years ago)
0 days in a row
This user hasn't linked any gaming profiles
Graduated in Product Design. Game Developer, Student of 2D game art/pixel artist and Game Design.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527089.77/warc/CC-MAIN-20190721164644-20190721190644-00372.warc.gz
|
CC-MAIN-2019-30
| 295
| 7
|
https://www.portland.gov/phb/phac
|
code
|
Portland Housing Advisory Commission
PHAC is the primary public forum for the discussion of affordable housing policy and programming for the City of Portland.
Related offices, programs, and projects
Past Meetings and Hearings
- PHAC Executive Committee Meeting (Public Meeting)
- PHAC Meeting - Budget Advisory Committee (Public Meeting)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046149929.88/warc/CC-MAIN-20210723143921-20210723173921-00667.warc.gz
|
CC-MAIN-2021-31
| 338
| 6
|
http://daily10minutes.blogspot.com/2009/03/fluctuation-spectral-analysis_06.html
|
code
|
- We can now read PPR data from Gauribidanur and UTR-2, YEY!!!
- The problems in LRFLUC are ignored for the moment.
- We will now consider to write a suitable GUI. The only candidate (simplest to work with, and most basic to be found on all Python installations) is 'easyGUI'
you try it too.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583684033.26/warc/CC-MAIN-20190119221320-20190120003320-00166.warc.gz
|
CC-MAIN-2019-04
| 291
| 4
|
https://www.checkbox.com/blog/2012/11/how-to-create-a-multi-source-report-item/
|
code
|
Checkbox’s new and improved reporting module makes it easier than ever to view and analyze response data. You can even use multi-source report items to compare multiple questions side-by-side!
For example, we had a survey comparing Twitter post frequency to Facebook post frequency. The answer options for both questions were the same:
More than once per day
At least once per day
At least once per week
At least once per month
Less than once per month
When it came time to analyze our data, we wanted to include a single item in our report that compared Twitter and Facebook post frequency for each possible answer option. To accomplish this, we built a multi-source item using the steps below:
2. On the Source Items tab of the item editor, select two or more questions from the box on the right and click the “Add Item” button.
This will move them into the box on the left.
Note: make sure you are comparing two questions with the same number of answer choices. In fact, multi-source charts work best when the answer options for each question are the same.
3. Before exiting this tab, select a Primary Source from the drop-down at the bottom of the dialog. The Primary Source you choose will determine which answer choices appear on the x-axis of the graph.
If you do not select a Primary Source, both sets of answer choices will appear.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00735.warc.gz
|
CC-MAIN-2022-40
| 1,346
| 13
|
http://www.gilzilberfeld.com/2007/05/this-reminds-me-of-me.html
|
code
|
Scott Hanselman, who has the excellent technology podcast HanselMinutes, wrote about meeting his idols, and how it sounds to an innocent bystander, in this case, his wife.
I remember having this feeling coming off TechEd awhile back, after seeing Don Box on stage (in the great immediate post-COM days). It was easy to share the excitement with those happy few, but I bet it seemed strange to my wife. I bet it still does.
And the joke at the end cracked me up. Also works for those happy(?) few.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00547.warc.gz
|
CC-MAIN-2023-23
| 496
| 3
|
http://pi-dsmc.com/documentation_5.html
|
code
|
This section describes the usage of the programs that are part of the PI-DSMC program package. There are separate programs: PIDS2geo, PIDS3geo, PIDSMC and PIDSMCfrontend. None of these programs has a graphical user interface. All programs should be started from the command line.
5.1 Pre-Processing with PIDS2geo/PIDS3geo
The programs PIDS2geo and PIDS3geo are used to generate 2D and 3D data sets. Both programs require a configuration file that can be created with PIDSMCconfig. The table below lists the available command line parameters of PIDS2geo and PIDS3geo.
If PIDS2geo is executed with the -g option only, a menu with the available options is displayed. The options are:
5.2 DSMC Processing
After the generation of the data set, the DSMC calculation can be started.
The command to start a typical DSMC calculation with 4 domains looks like this:
mpiexec -l -n 4 PIDSMC -d DataSet -v
-l and -n are parameters for mpiexec. 4 is the number of MPI ranks that will be started by mpiexec. The number of MPI ranks must be equal to the number of domains. In this example the directory "DataSet" must contain a data set with 4 domains.
After the simulation was started, the program will begin to output status information to the console. This information includes for example the flow time, the number of molecules and events like the initialization of the sample.
PIDSMC uses a hybrid programming model. Each domain is processed by an individual instance of the DSMC program. All instances are communicating via MPI. Each instance uses 4 threads, i.e. 4 CPU cores in parallel. With this hybrid model, PI-DSMC can run efficiently on NUMA machines and computer clusters. In order to run the DSMC programs efficiently, the underlying structure of the computer must be known.
Current server CPUs consists of 1 or more NUMA nodes. The number of MPI ranks per NUMA node multiplied by 4 should be equal to the number of cores per NUMA node. The MPI ranks can be bound to NUMA nodes using the "-numa a b" option.
HINT: the number of NUMA nodes on a machine can be determined with the following command: "numactl -hardware"
HINT: screen1 is a useful tool for PI-DSMC. Screen provides virtual consoles that do not require a user to be logged in to the system. It is convenient to start a simulation in screen and to detach from the console. At a later time screen can be resumed and it is possible to control the program again.
After PIDSMC was started, PIDSMC can only be controlled via a frontend called PIDSMCfrontend. The frontend must be started on the computer on which the first MPI rank is running. The table below lists the available command line parameters for PIDSMCfrontend.
If you want to show the status of a simulation type:
If you want to stop a simulation and save the data set type:
PIDSMCfrontend -se_on -q
After a command was sent by PIDSMCfrontend, PIDSMC will process the command on the next occasion.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529962.12/warc/CC-MAIN-20190420180854-20190420202854-00493.warc.gz
|
CC-MAIN-2019-18
| 2,915
| 19
|
https://www.iihr.uiowa.edu/people/bart-brown/
|
code
|
Senior Application Developer
IIHR-Hydroscience & Engineering
Office: 423-4 Stanley Hydraulics Lab (SHL)
I do web development and programming for the IFC where I work on the Iowa Flood Information System (IFIS). I recently hail from Computational Genomics where I worked on projects including clubfoot, blindness, and neuroendocrine cancer. In my free time, when I am not programming, I enjoy studying classical languages and literature and am a former teacher of Italian.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297290384.96/warc/CC-MAIN-20240425063334-20240425093334-00840.warc.gz
|
CC-MAIN-2024-18
| 471
| 4
|
https://robineko.com/hostgator-hosting-monthly-plan/
|
code
|
Hostgator Hosting Monthly Plan
In 2002, HostGator was founded by Brent Oxley in his dormitory at Florida Atlantic College. The firm has actually expanded significantly ever since and remains to do so, year after year. Their logo is “We eat up the competition.”Hostgator Hosting Monthly Plan
Today, HostGator has head office in both Austin and also Houston, Texas, after outgrowing a number of various other sites. In 2007, their Brazil office was opened. HostGator has actually won lots of awards for assistance and also organizing services.
An EIG Owned Eco-friendly Host In June 2012 HostGator was bought out by the Stamina International Group (a business that also possesses numerous other hosting suppliers in addition to HostGator). However, it continues to trade under the HostGator name.
HostGator is an environment-friendly energy business. The company buys Green-e accredited Renewable Energy Credit histories (RECs) from a wind ranch in Texas. 130% green power cools and also powers all shared and reseller web servers.
We might earn a commission– at no added price to you– if you make a decision to acquire any one of the items, software application or services we refer to and advertise on our web site. The opinions expressed are of our very own independent reviewers & creating team, appointed to supply helpful reviews & their honest opinion.
You should assume that every exterior web link that you click our site is an associate web link that brings about us being paid by a partner of ours.
Summary of HostGator’s Leading Attributes
Whenever there’s a conversation about host, the name HostGator is bound to find up, and also with excellent reason. Hostgator Hosting Monthly Plan
Having actually been around for more than a decade, HostGator can be said to be one of the most relied on as well as identified web hosts. It masters a number of locations consisting of client assistance, hosting flexibility, uptime, shared organizing, plus a lot a lot more.
This excellence in a number of facets of host paired with the firm’s experience, selection of attributes, and efficiency makes HostGator a wise choice for any type of site proprietor.
What Advantage Do You Get?
HostGator provides a series of plans. If you’re battling to decide on which strategy to select, take into consideration these attributes, which we’ll review listed below:
- You manage your account making use of cPanel, the industry-standard interface
- To maintain your account safe, you obtain a totally free Secure Sockets Layer (SSL) certification
- If you intend to enhance safety as well as malware scanning, you will have to acquire SiteLock
- Also the entry-level common hosting plan includes assistance for unrestricted email accounts
- Regular monthly payment options are offered
- One-click installs, even from the standard strategyHostgator Hosting Monthly Plan
- Access to the internet site builder– at a price
- A Web Content Delivery Network (CDN) maintains your site quickly
- Numerous assistance options including real-time conversation
With all the various other webhosting companies that are offered, why select HostGator? Well, the truth is that no single host is best. So, whether you’re a beginner web designer or are seeking to change host, below’s a peek at the good as well as the poor of HostGator to aid you make the right decision.
HostGator’s Hosting Packages
One of the very best functions of HostGator is the fact that the company uses versatile bundles that leave individuals (both large and also tiny businesses/blogs) with a lot of room to expand.
One of the most basic of the packages, the “Hatchling Plan,” includes support for one domain name, limitless data transfer, disk space, databases, shared SSL certificate, plenty of email addresses, and support for third-party applications like content monitoring systems.
Other common hosting strategies build on this Hatchling bundle by adding extra features such as unlimited domains, personal SSL certification, and also a toll-free contact number (simply among others.).
VPS and Dedicated Holding Plans.
Additionally, if you require more power, or have certain demands that shared web servers can not meet, there’s the option of more advanced plans such as VPS as well as Dedicated server strategies. The greatest tier VPS bundle offers 8GB RAM, 240GB storage, as well as monthly information transfers covered at 3TB.
Committed web server plans, on the other hand, can be customized with as much as 16GB of RAM, 25TB of regular monthly data transfers, as well as an impressive 1TB of storage space.
HostGator also uses Cloud and also WordPress holding, which we dig into below. You can always see HostGator’s official web page to discover the most upgraded organizing packages available along with their specifics.
The firm likewise supplies WordPress hosting with the most affordable package allowing one site with up to 100,000 site visitors monthly. The least expensive WordPress strategy additionally includes 1GB backups. Higher-end plans enable approximately 3 sites and also as much as 500,000 visitors every month.
At the same time, the top WordPress holding strategy also permits as much as 3GB in back-ups.Hostgator Hosting Monthly Plan
Heaps Ahead of The Competition
All WordPress organizing plans consist of enhanced cloud design, low-density servers, CDN, and also several caching layers which suggest that sites load up to a claimed 2.5 times faster than competitors.
HostGator experts are also available to supply a complimentary movement solution as well as top quality support in case anything breaks.
What Concerning Efficiency and also Uptime?
HostGator assures a 99.9% uptime and also has the resources to back it up.
Powered by Countless Worldwide Web Servers.
Among the largest and most preferred web hosts, HostGator has hundreds of servers under its administration.
HostGator servers are kept track of 24/7 by on-site technical personnel. Shielded Framework for Connection of Service. Along with being strategically located across the globe, these web servers make use of high qualityweb server equipment as well as are housed in cutting edge information centers that take all the required procedures (UPS battery back-up systems, top-tier COOLING AND HEATING systems, consistent infrastructure tracking, fire defense systems, and so on) to ensure performance stays flawless and continuous.
Thanks to these world-class information facilities and also their tactical areas, HostGator gives trusted, top quality performance that never lets down.
Uptime and Speed
HostGator has an over 90% customer fulfillment (from a June 2008 customer satisfaction survey). HostGator preserves approximately 99.9% uptime. And also along with the reputable uptime, HostGator additionally provides adequate load times with rates varying from 22 to 940ms depending upon the browser’s area.
Exactly How Excellent is HostGator’s Customer Assistance?
When it pertains to customer support, really few host can take on HostGator’s customer care. The business also has honors to prove this fact. For basic questions as well as concerns, you can make use of HostGator’s e-mail support, which is constantly readily available, social media support on Facebook, Twitter, Google+.
When you sign up for a HostGator strategy, you can request a cost-free web site transfer.
Or look for solutions from the firm’s extensive knowledgebase, which contains Frequently asked questions, helpful short articles, as well as video tutorials that stroll you through some of the controls. HostGator likewise uses a discussion forum where you can ask concerns and also answer those posed by various other individuals of the host.
Additionally, if you require a little bit a lot more immediate aid, or are experiencing a problem that requires unique interest, HostGator has client support representatives on standby 24/7/365 all set to help you with whatever inquiries you may have.
These reps can be gotten to by phone or live conversation.Hostgator Hosting Monthly Plan
Is There a Money-Back Assurance?
No locked-in contracts and a 45-day money-back guarantee. Suggesting if you make a decision to cancel within the very first 45 days of joining, you obtain a full reimbursement, no questions asked.
Even more making HostGator an excellent catch is the reality that the host throws in a couple of added attributes with their various holding plans. For instance, each hosting plan features a number of giveaways.
You get a cost-free internet site builder and also website structure devices, unrestricted bandwidth and disk room, over 4,000 site design templates, free domain transfers, and endless MySQL data sources.
Various other additionals that you can eagerly anticipate with HostGator consist of:.
- $ 150 worth of Google Adwords or Bing/Yahoo advertising and marketing credit reports.
- Complimentary site transfers when you wish to move your web site from one more host to HostGator. And the very best part is that your website can be upgraded during the transfer at no charge. Nonetheless, the claimed migration has to be done within 30 days from the day you sign up.
- A totally free domain name for the first term when you transfer and also set up a brand-new account.
- 1-click sets up readily available for all significant open-source jobs such as WordPress, Magento, as well as Joomla.
- A 45-day money-back guarantee for all HostGator organizing plans. A lot of host business only offer you a 30-day window to cancel your account and also get your cash back.
- A getting-started e-mail with web links to all of the sources you will require to develop your website and also get it up as well as running.
What are the Benefits and drawbacks of HostGator?
So, is HostGator the ideal web host for you?
Well, given the fact that HostGator offers you an easy method to develop as well as handle your site, offers you with all the sources you’ll require to provide high-level services on your website, provides numerous feature-packed holding bundles, as well as brings a ton of experience to the table, it can be a perfect host for anybody with a site.
A Lot Of Pros
HostGator offers a number of advantages including:.
- Reliable uptime and fast action times.
- Affordable organizing plans.
- Lots of space for growth.
- The option of cloud holding.
- Flexible e-mail management.
- Free shared or personal SSL certificate on all holding packages.
- Generous 45-day money-back warranty that offers consumers comfort.
- Considerable Knowledgebase.
- No limitation on transmission capacity, disk space, and e-mails.
- Rock-solid safety and security.
- Free Weebly site builder.
- A wonderful control panel with a lots of functions varying from an online file supervisor to more advanced functions such as cron jobs, picture manager, mistake logs, and apache handlers.
In addition, HostGator has a large data base with response to virtually any question you could have varying from the most basic to the most innovative. So, when the client support team takes as well lengthy to answer, you can choose the solution to your problem from this knowledgebase.
What Are the Cons?
As for the downsides of the business, you’ll just need to deal with the problem of regular backups, sluggish consumer reaction times (according to a few of the host’s individuals), an advanced cPanel that calls for some getting made use of to, and no one-stop WordPress import.Hostgator Hosting Monthly Plan
Try Without Dedication
Considered that HostGator has a whole lot to such as and very few things to dislike, you must certainly try the firm if you own an internet site or strategy to build one.
If the web host does not make an excellent suitable for your website, the 45-day money-back guarantee on offer will enable you to leave without losing money.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056856.4/warc/CC-MAIN-20210919095911-20210919125911-00110.warc.gz
|
CC-MAIN-2021-39
| 11,835
| 84
|
http://www.wlug.org.nz/bookmarks/all
|
code
|
github.com - minted is a package that facilitates expressive syntax highlighting in LaTeX using the powerful Pygments library. The package also provides options to customize the highlighted source code output using fancyvrb.
en.wikipedia.org - Beamer is a LaTeX document class for creating slides for presentations. It supports both pdfLaTeX and LaTeX + dvips. The name is taken from the German word Beamer, a pseudo-anglicism for video projector.
kile.sourceforge.net - Compile, convert and view your document with one click.
Auto-completion of (La)TeX commands
Templates and wizards make starting a new document very little work.
Easy insertion of many standard tags and symbols and the option to define (an...
www.texniccenter.org - integrated LaTeX environment for Windows
powerful LaTeX editor with auto completion
document navigator for easy navigation and referencing
tight viewer integration with forward and inverse search
quick setup wizard for MiKTeX
downloads.raspberrypi.org - Created by a team of teachers from Computing at School, the newly published Raspberry Pi Education Manual sets out to provide support for teachers and educators who want to use the Raspberry Pi in a teaching environment. As education has been part...
www.theregister.co.uk - ... those running government IT projects are still clinging to outdated ideas on open source, which is tipping the playing field against it. “If government makes it harder to work with open source, that's bad and means we have perhaps a...
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802767274.159/warc/CC-MAIN-20141217075247-00037-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 1,506
| 13
|
https://www.indiedb.com/tutorials/creating-and-adding-maps
|
code
|
We will create this tutorial in a way that everybody will be able to follow the steps and create good, custom maps. That includes that all the software used is freeware and I will put download links in the tutorial for easy access.
Programs And Tools:
Before starting, we need to download the required software.
- Python: Python.org
Download the version 2.7.6
- M&B Warband Module System: Forums.taleworlds.com
Download the M&B Warband Module System
- OPTIONAL: Notepad++ : Notepad-plus-plus.org
This is not required, but makes the editing of the code within the module system much easier. This is obviously based on personal preference, so you can choose for yourself if you want to use it or not.
Setting Up The Programs And Tools:
We could do this later, but it is much more convenient to do it all in the beginning.
Let's start with setting up Notepad++. I doubt I really have to explain much about that. Download the program, unzip the file, run the installer. The only thing you should mind here is that you really use the installer, and don't just run the program. It works to run the program, but that way you won't be able to open any files directly with it later.
Second, let's set up the Module System. During this intro, I will use the shortcut MS for this. Download and unzip the file. Now, take the entire module system, and move it to a convenient folder. In some downloads, there appears to be an error with the latest version of the module system, so you might be better off downloading the version 1.153 instead. Now go into the MS folder, and search for "module_info.py". Don't be scared by the amount of files in the MS, you will need less than a handful of those for the actual process of adding a map. Right click on the file "module_info.py", and either click on "Edit with IDLE" or on "Edit with Notepad++". In the rest of the tutorial, I will only say "edit this file" to state that you are supposed to open it in either notepad++ or idle.
Now, this is a quite short document. The first two lines are only for your information, so don't edit them. The line we need to edit is the third (starting with export_dir). This line defines the folder your modifications will be saved in. Now, if you want to add a map to your normal Native module, change the path within the " " to the path of your Native folder. This could look somewhat like that:
export_dir = "C:/Program Files/Mount&Blade/Modules/Native/"
The line below that is not relevant. None of the lines starting with # are relevant in fact. They are all just information, not actual codes.
Now it is time to set up Python. Download the file, and install it. It is easiest to just install it in its default path C:\Python27. Now, you don't have to do much more but to ensure everything works out smoothly, it would be adviced for you to add it to the environmental variables. That isn't as hard as it sounds. I don't know how this works on Windows 8, but on Windows XP, and Windows 7 it works as follos:
Right click on "My Computer" and choose "Properties". There click on "Advanced" tab and select "Environmental Variables". Look for the section "Path" in the small window on the bottom of the window, edit that one, and add ";C:\Python27\" in the end. Make sure not to change any the other files, and check whether the ";" is already there before or not. If it is there, you do not need to add it.
Now we're set, and can start making our map!
First of all, start the Warband launcher, select the correct mod, and click on "Configure". Now go to "Advanced", and tick the "Enable Edit Mode" to activate it. Click on "OK" and start the game. If you are following this tutorial while actually trying the things, I would advice you to start the game in Windowed (this can be adjusted in the launcher as well).
If you want to edit a default map, you can ignore the following step. If you want to actually add an additional map, you should follow the next step. Start the Singleplayer Campaign - just load some character you have or create a new game. On the bottom left of your screen, to the left of "Camp", there is now a buttom that only appears in edit mode: "Terrain". This enters the terrain editor, and that is exactly what we want to do! So click on that, and you will be taken to the editor. Here you can create the general terrain you want your map to be set in. You have the possibility to set things such as river, water depth, vegetation, terrain, valley, map size, and more. Adjust the map the way you want your future map to be, and click on "Generate Terrain" to preview your final terrain, and click on "Copy" on the top.
One thing you need to be careful about here: If you want a completely plain map, without any random grass you can't remove being generated around the map, choose "Snow". You will be able to edit that later in the regular editor.
A casual sized, completely plain, map code is below. Feel free to use it.
Now we have already generated the basic setup for our map. The next step is to add the map to the module system, and with that to the game. If you want to edit an original map, you can also ignore this step. Your map is obviously already added to the game, and you can just jump to editing it. If you want to add a completely new map though, it is important you follow the following steps closely.
For those who edited an original map, the following might be interesting. If you, for some reason, want to edit the terrain of one of the original maps, here is which code belongs to which map:
("multi_scene_3", "Hailes Castle"), #Castle 1
("multi_scene_4", "Ruined Fort"),
("multi_scene_5", "Scene 5"), #not ready yet
("multi_scene_6", "Scene 6"), #not ready yet
("multi_scene_7", "Field by the River"),
("multi_scene_8", "Rudkhan Castle"), #Castle 2
("multi_scene_9", "Snowy Village"),
("multi_scene_10", "Turin Castle"), #Castle 3
("multi_scene_11", "Nord Town"),
("multi_scene_16", "Port Assault"),
("multi_scene_17", "Brunwud Castle"), #Castle 4
("multi_scene_18", "Battle on Ice"),
("multi_scene_19", "Mahdaar Castle"), #Castle 5
("multi_scene_20", "Jameyyed Castle"), #Castle 6
("multi_scene_21", "The Arena"),
("multi_scene_22", "Forest Hideout"),
("multi_scene_12", "Random Plains (Medium)"),
("multi_scene_13", "Random Plains (Large)"),
("multi_scene_14", "Random Steppe (Medium)"),
("multi_scene_15", "Random Steppe (Large)"),
Now back to adding a custom map:
1.) Open "module_scenes.py" in either IDLE or Notepad++. Press Ctrl + F and search for "multiplayer_maps_end". You need to put the code for your map before that, given that this obviously sets the end of the scenes. Copy paste one of the codes, and edit it as shown in the following example:
The blue part is the part you need to copy, the red part is the part you customize (this will be the code for your map), the black part marks the end of the part of the code.
("multi_scene_18",sf_generate|sf_muddy_water,"none", "none", (0,0),(100,100),-100,"0x00000000b00037630002308c00000c9400005d4c00000f3a", ,,"outer_terrain_plain"), ("your_map_name",sf_generate,"none", "none", (0,0),(100,100),-100,"0x00000001300389800003a4ea000058340000637a0000399b", ,,"outer_terrain_plain"), ("multiplayer_maps_end",sf_generate,"none", "none", (0,0),(100,100),-100,"0x00000001300389800003a4ea000058340000637a0000399b", ,,"outer_terrain_plain"),
You can now clearly see the long number in the end of every part of the code. Replace this number with the code we generated previously in the Terrain Editor. Save and exit "module_scenes.py".
2.) Open "module_scripts.py", and press Ctrl + F to search for "scn_multi_scene_1". You will see that right above these lines you can see the lines:
(this_or_next|eq, ":game_type", multiplayer_game_type_deathmatch),
(this_or_next|eq, ":game_type", multiplayer_game_type_duel), (eq, ":game_type", multiplayer_game_type_team_deathmatch),
In this step we will add the map to the game types. You can very easily determine where to add your map for which game. Here is how it works: add your map in the bottom of the list for every game type you want it to be played in in the future: simply copy paste the last line and edit it as shown in the following example:
The blue part is the part you need to copy, the red part is the part you customize (this will be the code for your map), the black part marks the end of this part of the code. Make sure to increase the number at the end of every game type by one. It might look like this after.
(troop_set_slot, "trp_multiplayer_data", multi_data_maps_for_game_type_begin + 13, "scn_random_multi_steppe_large"),
(troop_set_slot, "trp_multiplayer_data", multi_data_maps_for_game_type_begin + 14, "scn_your_map_name"),
(assign, ":num_maps", 15),
Save and exit "module_scripts.py".
3.) Open "module_strings.py" in either IDLE or Notepad++, and search for "multi_scene_end". Copy one of the lines from above, and paste it right before the "multi_scene_end". We will now modify this pasted line to give your future map a name. It might look something like this:
The blue part is the part you should copy, the red part the part that leads the code to your map. Use the name you gave the map in the previous codes here. The green part is the name the map will be displayed with in the admin panel of the game.
("multi_scene_15", "Random Steppe (Large)"),
Save and exit "module_strings.py".
4.) Now the last step of adding your map to the game: Run "build_module.bat". Give it time to generate the module. If you have done everything correctly, it will run without any errors. If you encounter any errors, feel free to ask me for advice. Often times you can easily fix it yourself, or search for the error on Google.
5.) If you want to add it to a module, you are done now. If you want your map to be online on a server, you need to take the created .txt files (found in the folder you directed your module system to after successfully running build_module.bat) and upload those to the server\Modules\Native. In a next step, upload your map to server\Modules\Native\Sceneobj. Obviously, you can replace "Native" with any module you prefer, as long as the server recognizes it.
Congratulations, you have now generated your map and added it to your module/server. You can now proceed to build your custom map. A few pieces of advice here, concerning the editor:
1.) To get into the editor, start the game with edit mode enabled, select Multiplayer, Host A Game, and load your map. Now click on Ctrl + E to get into the edit mode. If you haven't loaded a character, it teleports you to the outer edge of the map. This can be avoided simply by spawning and walking to the place you want to enter the edit mode in.
2.) The Interface: On the left side you can basically control everything. On top you have the different modes you can edit in, below that a list of all objects added to the map, and below that all objects available to be added.
3.) The Controls:
Left Click: Select
Right Click: Place
W - A - S - D: Move around
B: Change item size
Y - Z - X: Turn in the direction of the axis
G: Move item around
U: Turn item
R: Reset item in original position
This shows when i try to open build module.bat..
i searched google and found nothing can you help me with it?
i found how to fix it and then this happen.. .-.
Cool, Can I change the world map without any modding tools?
and I need an tutorial on how to make weapons/armors and put them into MB warband, help would be nice... and pls dont say I can use the Thorgrims Map Editor I've tried but I've got 3 errors when open it up so I give up with that one.
This comment is currently awaiting admin approval, join now to view.
use the thorgrims... i had 3 errors too ... put it in (games/mount&blade;) only and dont move it
Ok, so, I have created a map (intended for multiplayer) and inserted it into the game (it works great, no problem there), but at in the "Host a game" screen it is listed as "Ruins" (which is completely unrelated to it's content), how can I change the title?
I need help, I have done all steps, but when I try to play multiplayer, my M&B crashes.
This is so ******* consfused my god, where are rhe FAQ?
I really want to start working on an Ancient Egyptian mod that focuses on the war between Horus & Set. I shall call my mod, Wars of the Gods: Egypt's Wrath. If anyone knows how to 3D Model, make scenes(as in Egyptian scenes like tombs, the Pyramids etc please let me know here)Also I need a scripter for chariots & units that are bigger(like the Ushabti from the Warsword conquest mod)I also need a sound editor to make custom sounds for those different units. So please let me know if anyone can do any of the above that is listed, let me know please thank you.
This comment is currently awaiting admin approval, join now to view.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00349.warc.gz
|
CC-MAIN-2023-14
| 12,746
| 89
|
http://ovationfanclub.com/megabbs/forums/thread-view.asp?tid=50772
|
code
|
Good afternoon! I have acquired what I believe to be an Adamas but can't find any identifiers other than the name on the headstock. There is no serial number stamp or label. It is the matte black w/ sparkles, ornate bridge and purfling, high and low impedance jacks and preamp w/ tuner. The guy I got this from said it came from an Ovation employee. This was supposed to be part of a 4 lot special order and only 3 were taken. Of course the joke around here (I live in Eastern Connecticut) is that everybody has an uncle that worked at one of the Ovation factories so who knows! I will attempt to attach pics. It looks similar to a 1581-5. Thanks for the help!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00707.warc.gz
|
CC-MAIN-2022-40
| 660
| 1
|
https://ury.org.uk/people/11021/
|
code
|
Hi! I'm URY's Chief Engineer, which means I'm in charge of all the fun audio equipment we use - when the world is back to normal, you might find me in the studios, in stores, or screaming at one of our events when everything goes wrong. For now, come to our Friday meetings (zoom details in #engineering on slack) where we'll likely be discussing chairs, memes, and chairs.
I first developed a passion for radio back home in Newcastle, where I was a presenter on a community station, and I ended up becoming in charge of all their tech!
I currently present the 5th Season of 'The Top 40 Rewind', with previous shows including 'How to Break a Radio Station' with the former Engineering team.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585507.26/warc/CC-MAIN-20211022114748-20211022144748-00611.warc.gz
|
CC-MAIN-2021-43
| 690
| 3
|
http://www.goformonline.com/
|
code
|
GoFormOnline is a database-based online PDF Form-Processing system developed by Sharon Technology in Massachusetts. It is the only what you see is what you get online form-processing system in the world. With GoFormOnline's user-friendly Template Designer, you can easily publish any paper form or e-form on the web without programming. The forms on the web are identical in format to the original paper forms, and are pre-filled with information available from databases. The user can fill, save, and print a form anytime, and submit it for processing after completion. Business rules are validated interactively. After a form is submitted, the system notifies the assigned people to process the form at each level of the preset workflow.
Forms can also be processed in a package. A package cannot be submitted until all forms in the package have been completed.
GoFormOnline can also be used as a web development tool to:
And no programming is required!
- Develop data entry applications
- Develop online registration and application systems such as tax filing and online college applications
- Publish documents
- Replace OCR paperwork elimination systems
- Makes form filling easier: Forms in this system are pre-filled with available information from the database for all users at different levels and sub-levels. With this system, you will never need to re-enter your name, address, or any information already in the database.
- Shortens the form processing life-cycle: The user fills out and submits a form online. The system handles workflow by notifying people responsible for processing the form at different levels and sub-levels, and the workflow is monitored. Thus, the period for processing a paper form could be shortened from weeks to days, hours or even minutes.
- Eliminates paperwork: The system displays and prints forms in their original paper or e-form format. Both the party who submits and the party who receives the form can print identical copies at any time. This eliminates the necessity for keeping a paper copy of the form. GoFormOnline is the ultimate paperwork elimination solution.
- Brings paper and e-forms online without programming: The Template Designer can publish and update forms online by changing template settings, and it can also develop form-based web applications such as data entry, online registration, and other online applications without programming. It is hundreds of times faster than developing similar applications with programming and eliminates costs associated with web development and maintenance, data entry, and paper form printing.
- Centralizes form processing and data entry management: All the form and other applications mentioned above can be managed on a single server, simplifying management.
- Integrates with existing web systems: The system can be integrated with other web-based systems through a built-in single sign-on component. The system can also share databases with other enterprise software systems.
- Supports all major databases
- Supports .NET and Java platforms
- Supports multiple tenants
- Supports public user and office user modes
- Can be easily integrated with existing web sites
- Publishes paper and other e-forms quickly on the web without programming
- Can be localized to any language
- Handles permission with role and level based security systems
- Handles serial and parallel workflow with a built-in workflow component
- Pre-fills forms with available information from the database
- Validates business rules before saving and submitting forms
- Allows form submission with attachments
- Allows retrieval of data from external web services
- Allows adding worksheets for complicated forms
- Allows processing forms in a package
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736679756.40/warc/CC-MAIN-20151001215759-00069-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 3,728
| 29
|
http://www.meetup.com/scala-phase/members/72457962/?showAllGroups=true
|
code
|
Philadelphia, PAUSA 19107
April 9, 2013
Struggling to fuse faith, lifehacks, ministry, friends, and family into one ain't easy... No wonder I'm no good at it.
I'm not using it in either way but I loves me functional programming (Clojure flavor currently) and Scala The Next Big Thing™.
Thanks Tim. I'm actually in Connecticut, I think my profile was accidentally set to London when I joined the Virtual Java User Group. I'll look for an online SICP group. Unless you guys record or stream your meetups.
Thanks Tim! I’m currently looking into functional programming and how functional languages and techniques can help me manage problems we face here at Wildbit (Postmark & Beanstalk). Looking forward to meeting you!
Thanks for the welcome Tim. I've actually been working in Philly for the past few months so I'll be able to attend philly meetups. woot woot
Hey, thanks for the welcome. I will try to show up to an in-person meeting.
Thank you. I'm looking forward to the meetups.
Thanks Tim. I'm looking forward to it.
Thanks for the greetings, Tim. Just getting started with "Web Development with Clojure" using Eclipse since that what the book uses.
Thanks Tim! I'm looking forward to the SICP meetups.
Thanks for the welcome. Interested in Riak (& all things database-y). Be seeing you!
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609525991.2/warc/CC-MAIN-20140416005205-00376-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 1,294
| 13
|
https://fossies.org/linux/heaplayers/allocators/ptmalloc2/README
|
code
|
"Fossies" - the Fresh Open Source Software Archive
Member "heaplayers-351/allocators/ptmalloc2/README" (6 Oct 2003, 7139 Bytes) of package /linux/misc/old/heaplayers_3_5_1.tar.gz:
As a special service "Fossies" has tried to format the requested text file into HTML format (style: standard
) with prefixed line numbers.
Alternatively you can here view
the uninterpreted source code file.
1 ptmalloc2 - a multi-thread malloc implementation
4 Wolfram Gloger (firstname.lastname@example.org)
6 15 Dec 2001
12 This package is a modified version of Doug Lea's malloc-2.7.0
13 implementation (available seperately from ftp://g.oswego.edu/pub/misc)
14 that I adapted for multiple threads, while trying to avoid lock
15 contention as much as possible. Many thanks should go to Doug Lea
16 (email@example.com) for the great original malloc implementation.
18 As part of the GNU C library, the source files are available under the
19 GNU Library General Public License (see the comments in the files).
20 But as part of this stand-alone package, the code is also available
21 under the (probably less restrictive) conditions described in the file
22 'COPYRIGHT'. In any case, there is no warranty whatsoever for this
25 The current distribution should be available from:
29 Please note that ptmalloc2 is currently still in the testing phase.
30 For example, support for non-ANSI compilers is currently not complete.
31 For an implementation with a somewhat more proven record, you may look
32 at ptmalloc.tar.gz, which is based on Doug Lea's malloc-2.6.x and is
33 integrated into GNU libc until version glibc-2.2.x.
36 Compilation and usage
39 It should be possible to compile malloc.c on any UN*X-like system that
40 implements the sbrk(), mmap(), munmap() and mprotect() calls. If
41 mmap() is not available, it is only possible to produce a
42 non-threadsafe implementation from the source file. See the comments
43 in the source file for descriptions of the compile-time options.
44 Several thread interfaces are supported:
46 o Posix threads (pthreads), compile with `-DUSE_PTHREADS=1'
47 (and possibly with `-DUSE_TSD_DATA_HACK', see below)
48 o Solaris threads, compile with `-DUSE_THR=1'
49 o SGI sproc() threads, compile with `-DUSE_SPROC=1'
50 o When compiling malloc.c as part of the GNU C library,
51 i.e. when _LIBC is defined (no other defines necessary)
52 o no threads, compile without any of the above definitions
54 The distributed Makefile includes several targets (e.g. `solaris' for
55 Solaris threads, but you probably want `posix' for recent Solaris
56 versions) which cause malloc.c to be compiled with the appropriate
57 flags. The default is to compile for Posix threads. Note that some
58 compilers need special flags for multi-threaded code, e.g. with
59 Solaris cc one should use:
61 % make posix SYS_FLAGS='-mt'
63 Some additional targets, ending in `-libc', are also provided in the
64 Makefile, to compare performance of the test programs to the case when
65 linking with the standard malloc implementation in libc.
67 A potential problem remains: If any of the system-specific functions
68 for getting/setting thread-specific data or for locking a mutex call
69 one of the malloc-related functions internally, the implementation
70 cannot work at all due to infinite recursion. One example seems to be
71 Solaris 2.4; a workaround for thr_getspecific() has been inserted into
72 the thread-m.h file. I would like to hear if this problem occurs on
73 other systems, and whether similar workarounds could be applied.
75 For Posix threads, too, an optional hack like that has been integrated
76 (activated when defining USE_TSD_DATA_HACK) which depends on
77 `pthread_t' being convertible to an integral type (which is of course
78 not generally guaranteed). USE_TSD_DATA_HACK is now the default
79 because I haven't yet found a non-glibc pthreads system where this
80 hack is _not_ needed.
82 To use ptmalloc2 (i.e. when linking malloc.o into applications), no
83 special precautions are necessary.
85 On some systems, when overriding malloc and linking against shared
86 libraries, the link order becomes very important. E.g., when linking
87 C++ programs on Solaris, don't rely on libC being included by default,
88 but instead put `-lthread' behind `-lC' on the command line:
90 CC ... malloc.o -lC -lthread
92 This is because there are global constructors in libC that need
93 malloc/ptmalloc, which in turn needs to have the thread library to be
94 already initialized.
96 Debugging hooks
99 All calls to malloc(), realloc(), free() and memalign() are routed
100 through the global function pointers __malloc_hook, __realloc_hook,
101 __free_hook and __memalign_hook if they are not NULL (see the malloc.h
102 header file for declarations of these pointers). Therefore the malloc
103 implementation can be changed at runtime, if care is taken not to call
104 free() or realloc() on pointers obtained with a different
105 implementation than the one currently in effect. (The easiest way to
106 guarantee this is to set up the hooks before any malloc call, e.g.
107 with a function pointed to by the global variable
110 A useful application of the hooks is built-in into ptmalloc2: The
111 implementation is usually very unforgiving with respect to misuse,
112 such as free()ing a pointer twice or free()ing a pointer not obtained
113 with malloc() (these will typically crash the application
114 immediately). To debug in such situations, you can set the
115 environment variable `MALLOC_CHECK_' (note the trailing underscore).
116 Performance will suffer somewhat, but you will get more controlled
117 behaviour in the case of misuse. If MALLOC_CHECK_=0, wrong free()s
118 will be silently ignored, if MALLOC_CHECK_=1, diagnostics will be
119 printed on stderr, and if MALLOC_CHECK_=2, abort() will be called on
120 any error.
122 You can now also tune other malloc parameters (normally adjused via
123 mallopt() calls from the application) with environment variables:
125 MALLOC_TRIM_THRESHOLD_ for deciding to shrink the heap (in bytes)
127 MALLOC_TOP_PAD_ how much extra memory to allocate on
128 each system call (in bytes)
130 MALLOC_MMAP_THRESHOLD_ min. size for chunks allocated via
131 mmap() (in bytes)
133 MALLOC_MMAP_MAX_ max. number of mmapped regions to use
138 Two testing applications, t-test1 and t-test2, are included in this
139 source distribution. Both perform pseudo-random sequences of
140 allocations/frees, and can be given numeric arguments (all arguments
141 are optional):
143 % t-test <n-total> <n-parallel> <n-allocs> <size-max> <bins>
145 n-total = total number of threads executed (default 10)
146 n-parallel = number of threads running in parallel (2)
147 n-allocs = number of malloc()'s / free()'s per thread (10000)
148 size-max = max. size requested with malloc() in bytes (10000)
149 bins = number of bins to maintain
151 The first test `t-test1' maintains a completely seperate pool of
152 allocated bins for each thread, and should therefore show full
153 parallelism. On the other hand, `t-test2' creates only a single pool
154 of bins, and each thread randomly allocates/frees any bin. Some lock
155 contention is to be expected in this case, as the threads frequently
156 cross each others arena.
158 Performance results from t-test1 should be quite repeatable, while the
159 behaviour of t-test2 depends on scheduling variations.
164 I'm always interested in performance data and feedback, just send mail
165 to firstname.lastname@example.org.
167 Good luck!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572484.20/warc/CC-MAIN-20190916035549-20190916061549-00403.warc.gz
|
CC-MAIN-2019-39
| 7,527
| 122
|
https://xcessiveaesthetics.co/reality-overloading
|
code
|
Reality Overloading: New Forms of Virtual Existence
JULY 2021 | Terraforma Journal
Developed as a visual essay for the text titled “Squatting the Digital: Beyond Tech Bros” written and curated by 2050+ for Terraforma Journal Issue #1, Reality Overloading is a collective virtual space developed through the use of game engine software, digital collage and photogrammetry. The image is composed of deconstructed digital elements of XA projects that explore the role of hacking in both physical and virtual spaces, from an Augmented Nail Salon to a Data Deli to Milton Keynes Shopping Centre. The space can be experienced in 3D as an immersive environment and collective story, that we expect to grow and evolve with our practice.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474412.46/warc/CC-MAIN-20240223121413-20240223151413-00765.warc.gz
|
CC-MAIN-2024-10
| 732
| 3
|
https://www.nexlesoft.com/what-is-windows-software-development-kit/
|
code
|
The Windows SDK, short for Windows Software Development Kit, is a collection of essential tools that software developers rely on. It empowers them to build reliable, efficient applications by harnessing the capabilities of the Windows operating system. You are in the right place if you’re eager to learn more about “what is Windows Software Development Kit“- its advantages, disadvantages, and notable features. In this article with Nexle Corporation, we delve into these details extensively.
The Windows SDK is Microsoft’s tool collection for creating Windows applications. It helps programmers develop software tailored for the Windows platform.
It empowers developers with a comprehensive set of tools, compilers, and documentation libraries. With this toolkit, programmers can efficiently create programs compatible with various Windows versions. By leveraging the SDK, developers gain access to a wide range of components within the Windows operating system. This includes controls, files, networks, and other essential functionalities.
The Windows SDK allows developers to create various software applications, including desktop and mobile programs, as well as web-based services. Its utilization of the Windows API provides flexibility in development.
The Windows SDK is available for free download and use by users. However, please be aware that certain Microsoft technologies and services may have associated fees or additional terms and conditions. (Install Windows SDK)
- Which versions of Windows does Windows SDK support?
The Windows SDK is compatible with various versions of the Windows operating system, including Windows 10 (Home, Pro, Enterprise, and Education), Windows 8.1, Windows 7, and the latest version – Windows 11.
- What are some other popular SDKs besides Windows SDK?
Apart from the Windows SDK, developers can utilize various other SDKs tailored specifically for different platforms. These include the iOS SDK, Android SDK, macOS SDK, Linux SDK, Facebook SDK, and many more. These specialized software development kits provide developers with the necessary tools and resources to build applications on their platforms.
- Which programming languages are supported by Windows SDK?
In addition, the Windows SDK offers support for various programming languages, including F#, TypeScript, PowerShell, and others. This support is provided through comprehensive tools and documentation.
Read more: Top 5 Artificial General Intelligence Companies in 2023
In summary, the Windows Software Development Kit (Windows SDK) is a crucial tool for developers looking to create various applications on the Windows platform. Its extensive collection of tools and resources empowers developers to meet user needs, maximize the capabilities of the Windows operating system, and seamlessly incorporate Microsoft’s technologies and services.
Whether you’re creating desktop applications, mobile apps, cloud-connected solutions, or even IoT applications, the Windows SDK offers all the necessary tools to turn your ideas into reality on one of the most widely used operating systems worldwide. If you’re ready to start your journey in Windows application development or enhance your current skill set, the Windows SDK is your door to a world full of possibilities on the Windows platform.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00618.warc.gz
|
CC-MAIN-2023-50
| 3,313
| 14
|
https://proptechzone.com/startups/pulser/
|
code
|
Digitize the project to access its information in the future: Easily collect photos from the field with relevant files, plans and discussions. Your entire project information is saved in one place and easily searchable even years later. Create field reports to share with other stakeholders the most accurate description for each issue, progress, contractor, location and task.
Have everything stored and searchable: Pulser gives you the freedom to focus on your work. You can search any item your team has ever worked on, including images, updates, projects, and assignments it is as simple as google search.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500368.7/warc/CC-MAIN-20230207004322-20230207034322-00020.warc.gz
|
CC-MAIN-2023-06
| 609
| 2
|
https://gitlab.gnome.org/GNOME/fractal/-/issues/100
|
code
|
a11y: message widget- allow focusing and activating the member name label from the keyboard
By looking at the message widget I can see there are various versions of a message tile. This relates to a full version of the message widget where there is an avatar a sender label a date label and a body. When looking at the accessibility tree with accerciser this part looks like this:
- There is a listbox with as many items as there are messages displayed in the current room.
- Each list item has our message widged as its child.
- Message widget is a subclass of GTKBox.
- In that GTKBox subclass there are some other GTKBoxes they are represented as fillers in the accessibility tree. e.g. Drawing area where the avatar is drawn on is inside such a filler, date label with GTKEventBox is inside a filler, message body is inside a filler and finally member label is inside the GTKEventBox that is represented as pannel in accerciser.
- All these containers have no text titles nor any other textual ATK related properties.
- Thus when presenting the list item that has been selected as a result of keyboard navigation GTK plus has to calculate the accessible name for the list item. Date label is always taken into account when calculating this and member name label is sometimes missing from this calculated accessible name for the corresponding list item.
I have looked into the message widget source code however I am unable to find out why this might be failing. For sure we are always displaying member name label when showing date label and still the member name label might sometimes become missing from the calculated accessible name.
In accerciser the member labels are all there and their state is visible. However I don't know how to trigger that accessible name calculation to happen from within accerciser to better explain this issue. When using the app with orca the member name label is often missing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736902.24/warc/CC-MAIN-20200806091418-20200806121418-00447.warc.gz
|
CC-MAIN-2020-34
| 1,916
| 10
|
http://www.go4expert.com/forums/url-replace-problem-t29378/
|
code
|
We added a new page in our website about some very important information related to our business. I have been doing SEO of this page's URL for about 1 month and after 1 month it came to the second page of Google. I should be happy now. But here my problem starts here. It has been replaced by another URL of our website. Now what to do ? Should I stop doing seo for that page's url or should I do seo for that new replaced url ?? Please Guide
URL Replace Problem
I'm not quite sure what you mean, are you saying that for a specific keyword, the page you have been trying to rank for (for that keyword) has now dropped off from page 2 of Google but another of your pages is now on page 2?
rajkumar12 like this
You have to wait for a week and see which page is in second page of google the new one or old one.
Yes sir exactly this is my problem. Please help and suggest what to do in this situation ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824146.3/warc/CC-MAIN-20160723071024-00278-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 898
| 6
|
https://dbalifeeasy.com/2021/01/19/how-to-upgrade-aws-rds-postgresql-with-extensions2/
|
code
|
In another post “how to upgrade aws rds Postgresql with extensions(1)” we have demonstrated how to upgrade AWS PostgreSQL RDS 9.5.23-R1 to AWS PostgreSQL RDS 9.6.20-R1 with PostGIS extension. According to AWS doc about PostGIS extension:
If a database uses the
PostGIS extension, you can’t skip major versions for some source to target combinations. For these circumstances, upgrade in steps to the next major version one step at a time until you reach the desired target version.
So in this post, we will show how to upgrade AWS PostgreSQL RDS 9.6.20-R1 with PostGIS extension to AWS PostgreSQL RDS 10.15-R1.
Subscribe to get access
Read more of this content when you subscribe today.
Tasks of After Major Version Upgrade
- Run the
ANALYZEoperation to refresh the
- Optionally, use Amazon RDS to view two logs that the pg_upgrade utility produces. These are
pg_upgrade_server.log. Amazon RDS appends a timestamp to the file name for these logs. You can view these logs as you can any other log. For more information, see Amazon RDS database log files.You can also upload the upgrade logs to Amazon CloudWatch Logs. For more information, see Publishing PostgreSQL logs to CloudWatch Logs.
- To verify that everything works as expected, test your application on the upgraded database with a similar workload. After the upgrade is verified, you can delete this test instance.
3 thoughts on “How to Upgrade AWS RDS PostgreSQL With Extensions(2)”
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648322.84/warc/CC-MAIN-20230602040003-20230602070003-00577.warc.gz
|
CC-MAIN-2023-23
| 1,452
| 13
|
https://community.spiceworks.com/topic/396862-sonicwall-sra-management-interface-issue
|
code
|
I'm having an issue getting a new Sonicwall SRA configured. It is the newer 1600 model with a X0 and X1 interface.
Upstream router is a NSA2400. X0 is our LAN interface with Default VLAN (DATA) and VLAN 200 for VOICE (tagged). The subnet for data is 192.168.1.0/24
Port X5 is our DMZ interface, goes to the same switch, where 4 ports are set to access and set to a PVID of 500. The Subnet of thsi interface is 192.168.2.0/24
I configure the X0 interface on the SRA1600 is connected to a DMZ port on the switch, assigned an IP address of 192.168.2.10, and a default gateway of 192.168.2.1, and no static routes.
I ran through the public server interface, and i am able to connect to the SRA via the WAN IP it is assigned to, however I am unable to connect to the management interface using the DMZ address 192.168.2.10, i cant even ping the interface. I can ping other devices on the 192.168.2.0 subnet. Should i just attach the X1 interface on the SRA and assign it to the LAN VLAN and set a LAN side management iP?
Is this a bug, by design? Ive checked and double checked my firewall rules, nothing should be stopping it, it must be the SRA appliance.
Yes i used the sonicwall SRA wizard to do this, the SRA does not have a wizard that i am aware.
I was able to make some headway this weekend, and this is the issue i am having:
-Trying to set the SRA up in "two leg" mode, such that the X0 (Default) interface resides on the LAN side of the network, and the X1 interface resides on the DMZ side of the network. Remote clients connect over the DMZ to the X1 interface (192.168.2.10), and the SRA connects to the LAN side via the X0 interface (192.168.1.10).
Sadly its not working. When i try to access the portal over the X1 interface via the WAN IP, i get nothing, the Sonicwall is forwarding the packets, so it must be a config issue on the SRA.
Here is how the SRA is configured:
Default Gateway: 192.168.2.1
Default Gateway Interface: X1
Additional Static Routes:
192.168.1.0 255.255.255.0 192.168.1.1 X0
I think everything seems to be correct, does this software just not support a two leg mode?
Do i need a route that i missed? I'd prefer to not give the SRA DMZ interface complete access to the LAN side of things
When i try to configure a portal as well, the portal address is defaulted to 192.168.1.10, and greyed out, i cant change it. I can set a "virtual host" but not sure what the setting does...
Thoughts \ Help?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583690495.59/warc/CC-MAIN-20190120021730-20190120043730-00275.warc.gz
|
CC-MAIN-2019-04
| 2,428
| 19
|
http://ampehre.uni-paderborn.de/ampehre/update/2016/01/11/major-release.html
|
code
|
Ampehre, v0.7.0 is now available at our github repository github.com/akiml/ampehre.
- Combined hettime sysboard and server measurement results to system results.
- Modularized libmeasure measurement struct and store new structs in linked list MS_LIST.
- Adapted all tools and libraries to fit to the new interface. New interfaces are not downward compatible.
Check out the Ampehre documentation for more informations about the current version.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866107.79/warc/CC-MAIN-20180524073324-20180524093324-00553.warc.gz
|
CC-MAIN-2018-22
| 443
| 5
|
https://www.ukessays.com/essays/computer-science/unix-linux-and-windows-is-best-computer-science-essay.php
|
code
|
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
Operating system is the interface between the user and the hardware. It is like a manager which manages everything. For e.g. it Allocates resources to the processes, manages disk, files and devices.
Microsoft Windows is a software company which provides a series of the operating systems and the GUI which are themselves developed by Microsoft. The Microsoft released the first operating system Called Microsoft window which was an extension to MsDOS and it was released in November, 1985. It had a good graphical user interface. Microsoft came after the Mac OS to overtake the computer market. Windows has 91% of the market shares of the client OS which uses the internet. The most recent version of the Microsoft windows is windows 7, the most recent version of server is windows server 2008 R2 and the most recent mobile OS version is windows phone 7.
Features of different versions of windows
1. Windows XP features: the Microsoft windows XP is and upgrade version of the windows 98 and windows 2000. It was released on October 25, 2001. The windows XP comes with two editions: windows XP home edition and XP professional.
1. It is a more stable version of the windows and provided a better UI than windows 2000. It provided smooth, good fonts to the OS. It has the ability to allow a user to log in without requiring other user to log out because it supports wifi.
2. Windows XP Professional has extra features like remote desktop connection and the system recovery tools. It is mainly for business users.
3. XP has two editions of simple and professional version to run on 64-Bit Edition.
2. Windows 7 features:
1. Retrieving device details:
Microsoft provides device details for hardware devices and displays it in control panel
2. Device manager is improved
The windows device manager is for installing the drivers for the hardware devices. These can be easily updated and trouble-shooter.
3. Better Driver Protection:
The windows 7 provide the facility to stop loading the drivers which are not stable. It is stored in a list of driver protection. This list is updated through Microsoft windows update feature. Driver Protection helps prevent the operating system from starting drivers that are known.
4. Windows 7 has features of Installation Improvement Program:
By becoming member of this program the information about your computer is sent to the Microsoft. They use this information to improve the installation and remove installation problems.
5. Printing via internet
With this feature you can print through anywhere in the world while the printer must be attached to another computer at any other place and with the help of internet you can print your files.
6. Bit locker program: it encrypts the logical hard drives and sets a password of user choice.
Fig 1. Start menu of windows 7
UNIX is an OS which was developed by AT&T. it's a well renowned company which deals with all the software related technologies. The engineers like Dennis Ritchie and his partners developed it at bell labs in 1969. Now the UNIX has been divided into different parts which are developed time to time by AT&T itself and other organizations.
Fig 2. UNIX
The UNIX is a registered trademark which is owned by the Open Group. This trademark is given to only those systems that are fully compliant with and follow each and every UNIX specification. Other systems are called UNIX system like or UNIX like but not UNIX. The UNIX is that operating system which is closely related to the trademarked system
The UNIX operating systems are very useful and that's why they are mostly used in the servers, workstations and also in the mobile devices like laptops etc. UNIX OS and the client server model developed the important parts of internet and allowed to connect computers in a network rather than standalone.
The C language and UNIX are developed by AT&T. these both are given to the academic institutes and the government. It is all around that's why the UNIX is also caller the open systems.
UNIX is very portable. It is a multiuser environment and multitasking also. It consists of the various concepts:
1. To store data it uses text in planar form.
2. it's a hierarchical file system
3. provides interposes communication for the sharing of files between processes
4. Provides a large variety of the softwares which provide different-different functionality.
Features of UNIX:
1. It is multi-user environment: in it there can be more than one user which uses the single machine connected in a network.
2. It is a multitasking environment: there can be more than one program running at a time.
3. It provides a hierarchical directory structure: to maintain the organisation of files.
4. It is portable: the UNIX is portable the kernel is built by less than 10% assembler tools
The UNIX Operating System is found on the computer system which has a large range of computation power. It ranges from microcomputers to mainframe systems and also other systems. No other operating system can make this claim. There are many reasons of popularity of UNIX and its unbeatable success:
1. It provides portability:
The UNIX system is developed by high level languages like C. so it is very easy to make changes, to understand, read. On a new machine the changed code can be compiled. Customers have the options to choose from a wide range of hardware systems.
2. UNIX is machine independent:
The UNIX system is able to hide the actual architecture of machine from the user, so it is easy to build application which can run on microcomputers and mainframe systems.
3. Multi-User environment:
UNIX provides the facility of multi user environment. More than one user can be working on the same system. They can share the power supplies, the peripherals and it is all secure, no user can corrupt data of another user.
4. Hierarchical File System:
It provides a hierarchical file system in which the information can be stored. It provides the maximum flexibility so that we can arrange data in our own way as it should be or according to the system. It is easy to maintain and easy to use.
5. UNIX has a shell
UNIX shell provides the different services as required by the user by providing a simple interface. The user doesn't need to know the hardware details.
6. Piping and filtering:
It provides the pipes and filter so as to allow the user to develop complex things from simple ones.
UNIX provides more than 210 different application programs and system programs. We can easily built new programs using existing ones.
8. Software Development Tools:
UNIX provides a wide variety of the software development tools to do editing and maintenance of the software.
The UNIX Operating System Consists of
1. The kernel: it schedules all the tasks to be done like to manage the files and security features and to provide the hardware access.
2. Shell: the users inputs commands in the shell and the shell executes the user commands and it is customisable according to user.
3. Utilities: UNIX provides
a) File management (commands like cat, ls, mkdir)
b) Management of user (password, chmod)
c) Management of processes (kill, ps)
d) printing (lpr)
Advantages of Unix:
1. UNIX provides more flexibility as it can be installed on different time of computer systems which can range from micro computers , mainframe computers and the supercomputers.
2. Unix provides much more stability and it does not go down like windows so it needs less administration and the maintenance.
3. it provides a greater security and permissions to different users than windows.
4. Unix is used in web servers. It is a leader. 90% of the internet is working on Unix operating systems like apache which is widely used web server.
5.. it has more processing power than windows
6. the Unix provides the software upgrades for free while in windows you have to purchase new software.
7. the operating systems like Linux and BSD are free and open source. They provide full flexibility and control and they provide attractive computer wizards. The smarter programmer uses this operating system for developing new softwares because it is free of charge and it is open source.
8. UNIX provides the different and good approach to design the softwares. It provides the facilities like interconnection of the simple tools instead of developing large application softwares.
UNIX vs. Windows Hosting
When talking about the web site hosting then there are two types of platforms on which the websites can be hosted : UNIX and Windows. Both of them provide unique features and also have pros and cons.
It is very difficult to say which is better among the two but according to your needs you can make your choice. The language in which you have built your website also helps to determine which is better among the UNIX and Windows.
The operating systems which are used on the desktop computers (mostly use the different version of Windows) are not related to the operating system that we need to host our website. Many of the personal sited are created using the software MS front page. Even they are built using the Microsoft software but they can work perfectly on the UNIX web server. We have to just install the MS front page extensions.
The different factors which help to choose one out of UNIX or Windows web server:
While there is some debate about which operating system performs better, in our experience both perform comparably in low-stress conditions however UNIX servers under high load (which is what is important) are superior to Windows.
System based on UNIX i.e. they are Linux based but they are identical are the better in this category. There are many reasons on the basis of which we can say that the UNIX is better than windows web servers in term of stability. One factor is during the high load on the server, UNIX handles it better than windows. UNIX system rarely requires rebooting but the windows systems have to be rebooted to provide proper functioning. The UNIX servers provide high reliability
Web sites which are programmed and designed on the UNIX web server are easily compatible to be hosted on the windows server. But the websites programmed under a windows web server are not compatible with Unix web server. So in this case Unix is better choice.
Web sites are changing time to time. At the starting they are small and provide limited functionality but as the time goes on according to the needs of the person or users they have to put the new features to the websites. Both windows and Unix can easily adapt the changes. The windows based websites are much more easily compatible with languages like PHP or MYSQL which are Unix based. But the software based on the Unix is not always fully compatible with the Microsoft .net and VB technologies. So in this case we can choose windows web hosting.
To host your own website you need to install operating system to host the website on the server. So you need licenses of the operating system to be used and the softwares. Windows server 2003 and the other application like the SQL servers are paid services. You have to spend a lot of money to buy these softwares. On the other hand, the Linux operating system is free and easily to install and operate. So Linux is better in this case.
At the end we can say that the UNIX based web hosting provides more stability, it is very fast and it provides more compatibility.
If the website is built under .NET OR VB platform than only the windows platform must be preferred
There are various factors on which we can judge the best out of three:
1. According to ease of usage:
Windows is the best operating system out of Windows, Linux and UNIX
2. On the basis of security
Linux and Unix Are best because they are virus free.
3. On the basis of development
Linux and UNIX are the best available development platforms. They are open system software for which the code is easily available and the developer can easily modify the desktop environment and features and applications by knowing the language fundamentals and deep study and understanding of core of UNIX system.
LINUX is the most popular operating system as it's is open source. The Linux operating system can be installed on different hardware platforms like PowerPC, x86, x64, ARM etc. Linux operating system is based on the design principles which are a part of the UNIX OS and therefore it is also called UNIX like or UNIX variant. Linux is mostly used as a server operating system and also as an embedded operating system. Linux is running on almost all of the servers on the internet and is also used in electronic devices and other gadgets. In the desktop system, Linux has almost same popularity like windows but it is going up steadily.
Fig3. Desktop of red hat Linux
Linux provides a multitasking and a multiuser environment which is stable. Linux has been modified by many persons, but it is robust so the kernel is not changed. Only the peripheral software components are changed.
LINUX is licensed by GNU general public license. It is open source. Different versions of Linux are available so different users work on different versions. Linux is provided for free.
Features of Linux:
Linux has been developed to provide the following features which provide the proper security and the networking
1. Multiuser: there can be more than one user at the same system. So there is no need to have the different license for each operating system.
2. Multiplatform: Linux runs on different hardwares. For e.g. it can be installed on computer which uses multiple processors.
3. Multithreading: it has the support for creating multiple threads of a single process. The threads use the parent process memory space.
4. No Crashes: Linux provides the memory protection between the different processes. one program cannot crash the whole system.
5. executes demanded parts: it only rolls in only those parts of a program which are currently being used.
6. shared memory to processes and copy on write: the multiple processes are able to use the same memory to run. When one process tries to access that memory then other process page is saved on the disk on some other location. It provides two advantages: speed is increased and memory use is decreased.
7. it has the virtual memory so it provides the paging facility so there is no need to swap processes. It swaps the pages to disk to another secondary storage device or to a different partition. The swapping area can be increased on runtime. There can be 16 swapping areas of 128 MB kernel memory each. These can be used at the same time for a 2 GB of swapping space. The space can be easily increased by changing the source code a little bit.
8. Linux provides a memory space known as pool to execute the user programs. It is also used for the disk cache. All the free memory can be used as a cache memory. It can be reduced when the large programs are executing.
9. Linux provides the facility to use a debugger on a program when it is run and also when it crashes.
10. Linux at the source level is compatible with POSIX and BSD
11. Linux also has a CD-ROM file system which is compatible with all formats of CD-ROMS.
12. it provides networking through TCP/IP. Also provide ftp, NFS etc.
13. Linux in client server model is user friendly.
14. Linux can also be run as a LAN manager for Windows servers.
15. Multitasking: Several programs can run at the same time.
A comparison of Linux and Windows:
All version of Linux are freely available or they have low expense as one have to do on Microsoft windows.
Each copy of Microsoft Windows costs around $70-$150 or more for each license
For the new computer users windows is much easier to learn. Although Linux is easy to use but windows is more easy to use.
There are many changes and the new modifications in the Microsoft windows so as to make it easy to use. Windows is not the easiest operating system but is easier in comparison to Linux.
Most of the versions of the Linux are very reliable and they can run without rebooting for months and years.
Microsoft has also made the improvements to increase the reliability of the windows but its reliability is still less than Linux.
Windows has a wide variety of available softwares that can be installed on it. Linux also provides large amount of application softwares, games but still it is less than the application softwares available for windows.
The users of the Microsoft windows are in a very large amount therefore the application builders mostly prefer the windows as the platform for softwares and games.
5. Software Cost:
Most of the application programs, softwares, games and other utilities are provided free of cost on Linux. The softwares like open office and star office are available for free or at a much lower price.
Windows also provides many types of software and the games for free but most of the actual efficient working programs cost from $10-$250 per copy.
A large support has been provided for Linux by the different Linux organisations and the other hardware manufacturers. Linux support almost all the hardware devices. But still the application builders do not provide driver support for the Linux for the new hardware.
Windows provides support for all hardware devices because all companies provide drivers on the basis of the windows platform as it is famous and more users prefer windows
Linux is very secure. It provides the proper security. Yes the Linux can also be cracked but it is more secure than windows which is easy to crack.
Microsoft has tried well to make the improvement with the security of their operating system but still it is more attacked by the viruses and other hackers.
8. Open Source:
Most of the versions of Linux and many other application softwares and programs are open source. So the code can be easily modified by the user according to his need.
Most of the windows programs are not open source so they cannot be modified.
There are many version of Linux so there are very less users who know how to use all the versions of Linux. So a lot of documentation and help is available on internet to learn how to operate Linux.
Instead of this Microsoft Windows provides own help in every application program and also the online help and documents to properly understand the use of different versions of windows.
Linux vs. Unix
UNIX has different version which have different cost.
Linux is provided for free. It is provided free with a lot of magazines and books. Yes they are also priced but very cheaper than windows.
No of viruses in Linux are around 60-100 but in UNIX it is 85-120 in case of Unix.\
3. Application areas:
Linux is for developers and it's a free OS.
UNIX is used in almost all the universities and companies.
4. Development and Distribution: Open source development has developed Linux and the different versions of Linux are Red hat , open SUSE, UBUNTU etc.
UNIX has been developed by AT&T and other organisations.
5. Threat detection: Linux detects the threats very fast and very easily. The threats are removed by the community of the Linux. If one user tells a type of threat then all the developers help to remove it.
In UNIX , user has to wait till its threat is fixed.
6. GUI: GUI of Linux are KDE and Gnome. GUI of Unix is X windows
LINUX is best out of LINUX, WINDOWS and UNIX.
Linux is best option for web hosting.
It is more secure than windows and UNIX.
Linux provides more reliability than windows.
All the explanation and comparisons given above led us to believe that Linux is best option.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124299.47/warc/CC-MAIN-20170423031204-00437-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 19,583
| 147
|
http://www.reactnative.tools/tutorials/2016/10/10/exponent/
|
code
|
When former Facebooker and Quora founder, Charlie Cheever, showed up at Y Combinator Demo Day this August to share what his team is building at Exponent, it turned more than a few eyes. I, personally, got emails from my boss and boss’s boss asking what we’re doing to partner with these guys. The good news is that we already had something cooking.
The Exponent Player
One crucial building block of the Exponent platform is their player app. Essentially, the player app allows you to deploy in-development apps to Android or iOS without building native code. So, for example, if you’re coding in a Windows development environment, you don’t need a Mac or Xcode. Or, if you’re in a MacOS dev environment, you don’t need the Android SDK. Instead, you download the Exponent player app from the store and install it on your phone or tablet. Then, you “push” your app to Exponent’s servers. Your app loads in the Exponent player app and continues to update via hot reload while you code.
It’s also a conveninent way to share your in-development app with clients and co-workers. Simply ask them to install the Exponent app, then share a link. The Exponent player app will download and install a fully functional, native mobile application directly from your source code.
VS Code and Exponent
As of today, I’m happy to announce that the React Native extension for VS Code supports deploying and debugging on the Exponent player. You don’t need to build your app using the Exponent SDK – a vanilla install of React Native will do – but why not give Exponent a try? Whether you choose to use React Native or Exponent, VS Code will auto-magically install your app the Exponent player and establish a debug session.
Try it now
To get started, download the ExponentJS application from the App Store. When starting a debugging session, select the Exponent option.
This operation will install the Exponent version of React Native and start up the React Native packager. If a user is not logged into Exponent, a prompt is displayed. Once everything is ready, the user is shown a link that they enter into the Exponent app.
To debug the application running on the Exponent app, the user can shake the phone and select “Debug” option in the developer menu. Breakpoints can be placed in VS Code and the typical debug workflow follows.
We hope that Exponent integration into the VSCode React Native extension helps people to try out React Native quickly, with just a text editor and a device. You can always switch back to pure React Native and add custom plugins and native code once you have decided that React Native is the right option for you.
Our team at Microsoft is also building a suite services for apps after check-in and in-production, including continuous integration, crash reporting, user analystics and better CodePush integration. If you are interested in the post-authoring set of services, get in touch with us and we would love to show and get feedback on what we are working on! Join our early adopters list.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887849.3/warc/CC-MAIN-20180119085553-20180119105553-00034.warc.gz
|
CC-MAIN-2018-05
| 3,042
| 12
|
https://www.mail-archive.com/pgsql-hackers@postgresql.org/msg234502.html
|
code
|
Is PL/Java safe to use in terms of its threading design? I'm going to ask
the PL/Java community about this too, but I'd ask for opinions here because
I believe people in this community have seasoned knowledge of OS and SPI.
To put the question in other words, is it safe to load a multi-threaded PL
library in the single-threaded backend process, if the PL only calls SPI in
the main thread?
PL/Java (pljava.so) is linked with the JNI (Java Native Interface) library,
libjvm.so, in JRE. libjvm.so is linked with libpthread.so, because Java VM
is multi-threaded. SO, "ldd pljava.so" shows libjvm.so and libpthread.so.
pljava.so doesn't seem to be built for multh-threading --- none
of -mt, -D_REENTRANT or -D_POSIX_C_SOURCE is specified when building it.
When the application calls Java stored function, pljava.so calls a function
in libjvm.so to create a JVM in the backend process, then invokes the
user-defined Java method in the main thread. The user-defined Java method
calls JDBC methods to access database. The JDBC method calls are translated
to backend SPI function calls through JNI.
The main thread can create Java threads using Java Thread API, and those
threads can call JDBC methods. However, PL/Java intercepts JDBC method
calls and serializes SPI calls. So, only one thread calls SPI functions at
a time. I'm wondering if this is the reason why PL/Java is safe for use.
What I'm concerned about is whether multi-threaded code (Java VM) can run
safely in a single-threaded code (postgres). I don't know what can be a
particular problem with PL/Java, but in general, the mixture of
single-threaded code and multi-threaded one seems to cause trouble around
handling errno, memory and file handles/pointers.
FYI, JNI specification says that the code called from Java VM should be
built for multi-threading as follows. But postgres is not.
Compiling, Loading and Linking Native Methods
Since the Java VM is multithreaded, native libraries should also be compiled
and linked with multithread aware native compilers. For example, the -mt
flag should be used for C++ code compiled with the Sun Studio compiler. For
code complied with the GNU gcc compiler, the flags -D_REENTRANT
or -D_POSIX_C_SOURCE should be used. For more information please refer to
the native compiler documentation.
Sent via pgsql-hackers mailing list (firstname.lastname@example.org)
To make changes to your subscription:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662515501.4/warc/CC-MAIN-20220517031843-20220517061843-00447.warc.gz
|
CC-MAIN-2022-21
| 2,401
| 36
|
https://www.learncs.online/practice/java/advertising-conditional/hdeep2@illinois.edu?returnTo=simpleconditionals
|
code
|
By combining data from a marketing platform with the results from personality tests that users have completed, we know that people with more than 500 friends are likely to be extroverts, otherwise they're more likely to be introverts. Based on analysis of user-uploaded photos using computer-vision algorithms, we also know that people who are extroverts are more likely to have many photos of dogs, and introverts are more likely to have many photos of cats. Market research has shown that dog people are highly likely to be positively influenced by advertisements for any product that includes dogs, and similar for cat people and cats.
For an already initialized
if a user has more than 500 friends, print the message "Adopt a Dog Today!" and otherwise print
"Buy Cat Food At 20% Off".
If you'd like to find out more about targeted advertising, you may find these articles interesting:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817144.49/warc/CC-MAIN-20240417044411-20240417074411-00241.warc.gz
|
CC-MAIN-2024-18
| 888
| 5
|
https://dhyanse.libsyn.com/what-next-how-do-i-keep-training-my-mind-meditation-qa-with-dhyanse
|
code
|
Jul 23, 2020
Meditator asks: I recently discovered your 7 point mind training meditations based on Atisha's writings and wanted to ask you when done what next; how do I keep training my mind?
Maybe this is your question too. Listen and Meditate along.
Join me in a 30 min meditation session every day at 7 AM CET on my website: https://www.dhyanse.com/live/
Each session is unique, starts with a 5-10 min discourse, followed by 20 min Guided Meditation.
If you have any questions, please write to me on email@example.com
WHO AM I:
I am Dhyanse, a Meditation Master with a contemporary approach to Yoga, Zen and Tantra. I live in Switzerland/Germany area since 2008 and bring the authentic art of meditation from India to the western world.
My work on Meditative Wisdom is a tribute as well as a succession to the contributions by Osho, Krishnamurti, Gurdjieff, Alan Watts, Aldous Huxley, Shivananda, Vivekananda, Aurobindo, Maharishi Ramana, Papaji and many more...who transformed my life in the first place.
More on my website: https://www.dhyanse.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662573053.67/warc/CC-MAIN-20220524142617-20220524172617-00745.warc.gz
|
CC-MAIN-2022-21
| 1,053
| 10
|
https://wijstaanvooronzegrondrechten.org/mocking-in-c-unit-tests-how-to-test-data-access-code-and-more
|
code
|
Unit tests are great, but how do you test your data access? You sure don’t want to actually delete records when you are testing the delete method, yet you definitely want to be sure the method is configured properly. This is the type of problem that stops a lot of developers from creating unit tests. In this video, I am going to show you how to overcome these obstacles in order to write tests that handle working with external dependencies like databases.
Tuhafeni Angula (Patreon Subscriber)
Xem thêm Bài Viết:
- Online Exam System using C#.NET MVC Part 4 – Registering
- How to Show Popup MessageBox in Webform or Webpage in Asp net c#
- POS receipt report using c# complete – Fast receipt printing solution
- LINQ: Select, proyecciones, ejemplos | LINQ | Programando en C#
- C# Tutorials For Beginners – 18. Read Int Input From Keyboard Using Console.ReadLine
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371886991.92/warc/CC-MAIN-20200410043735-20200410074235-00004.warc.gz
|
CC-MAIN-2020-16
| 877
| 8
|
http://stackoverflow.com/questions/11116295/accessing-event-log-from-application-registered-in-gac
|
code
|
I've .dll which is registered and executed from Global Assembly Cache. When I try to access Event Log
I'm getting an error:
The source was not found, but some or all event logs could not be searched. Inaccessible logs: Security.
Is there a way to avoid this error?
thanks in advance
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00055-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 282
| 5
|
https://hn.boxpiper.com/p/31833880
|
code
|
I want to experiment with zoomable, pannable interfaces on the web. Basically, an interface like Figma, but for interacting with different types of structured data. Think: web-ish interfaces for web-ish data on an infinite pannable, zoomable canvas.
Why? I've become incredibly bored with how homogenized the web has become, everything a neat, perfect grid. Moreover, I want to explore what might be possible in building interfaces outside of these repeatable patterns and paradigms.
I'm aware of a few react libraries for rendering to canvas such as react-konva, react-ape, etc. Most of what I've found are plugins for React itself.
That might be the right way to think about the problem, but it might not be. I'm at the earliest exploratory stage of this, so it's worth questioning if React is the right abstraction for this in the first place.
Hence, is there something like React (but not React) for building these types of zoomable/pannable interfaces?
OTOH, maybe React is the right abstraction, in which case, I'd love to hear anyone's experiences building these types of interfaces.
I work for a Figma competitor doing R&D. Both our product and my testing setups use React. It's completely fine and workable, certainly to get started, but also not at all necessary.
The place you're going to end up spending a lot of time (depending on the user input gestures you intend to support) are A) two-finger panning and pinch-to-zoom in non Safari browsers (Safari's GestureEvents makes this a LOT easier). B) Robust touch support when the number of touch points changes mid-gesture. C) Detecting the difference between a trackpad and a mousewheel (assuming you want to map the mousewheel to zoom).
React wont help with any of the above, but it also wont get in your way.
You'll also be running into all sorts of fun rendering issues (browsers implement minimum and maximums on font-size if you're using HTML text), performance (fullscreen canvas 2d? ooof). If you find yourself headed towards WebGL, the usefulness of React becomes incredibly (though not completely) suspect.
I've been looking for something similar in SwiftUI. Can anyone suggest a good tutorial??Reply
For another added dimension, there’s react-three-fiber (and similar projects for all the big web UI libraries) that render JSX to a scene in ThreeJS (OpenGL). React might be the right abstraction.Reply
I’ve used Pixi.js together with React to build a canvas based white boarding app similar to Figma or Miro.
Pixi for doing all the canvas stuff, React for the UI elements. It wasn’t very performant but for an early stage product knocked out under a year I thought it was alright. We wasted a lot of energy trying to get redux to work. It should be a lot easier now with hooks and context for managing state.
Depending on what you want to do, d3.js is another possibility for just canvas manipulation.
The main problems with canvas was having to essentially do manually what html and css gave for free, especially with regards to text manipulation. There wasn’t a way to have text wrap automatically, we had to calculate sentence length, then manually insert new lines where we thought the wrap would happen.Reply
At Whiteboards.io (https://whiteboards.io) we are simply using React, CSS, DOM, and various ways to exploit the browser performance.
This approach is NOT perfect, but it solves problems like accessibility for example and it keeps us going.
The alternative approach like Pixi.js will work for you, but it effectively means building a browser inside a browser, kind of Adobe Flash type of solution.
IMO it is better to piggy back on the browser mechanics instead of building your own on top of the HTML5 Canvas. The fun fact is that the modern websites like Facebook or news front pages are far more complex and dynamic than pannable and zoomable canvas apps.Reply
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104542759.82/warc/CC-MAIN-20220705083545-20220705113545-00640.warc.gz
|
CC-MAIN-2022-27
| 3,856
| 20
|
https://eternalwarcry.com/decks/d/nt_yb-gQ8p8/mimps-do-you-even-xenan-bro-deck
|
code
|
I have a real love/hate relationship with Katra, the Devoted
, (don't tell my wife.) When I first started out I absolutely hated playing against her. Eventually I got enough shiftstone to craft a set and now I'm on the other side of the fence and the grass is much greener.
I decided to revisit my Katra/Lifegain deck with some of the newer cards from the new sets. I figured while I was at it I'd try seeing if an even version could work, the extra draw from Evenhanded Golem
would help reduce the games where Katra doesn't even get drawn. Xenan Cylix
's plunder also work to this end.
Here are some of the substitutions I made to keep the deck even:
I decided to change up the market a bit being that we'll be getting 4x instead of just 1x of each:
seemed like a good fit for quick life stealing and bringing something back, with a pair of them they can just cycle in the void.
Icaria, First Reaper
are good removal.
Pale Rider's Timepiece
and Azindel, Revealed
should help wrap up if we get locked somehow.
As usual, this is just something I slapped together so I'm sure it'll get refined more as I play it a bit but so far it has a pretty good track record...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488560777.97/warc/CC-MAIN-20210624233218-20210625023218-00499.warc.gz
|
CC-MAIN-2021-25
| 1,163
| 14
|
https://legacy.forums.gravityhelp.com/topic/wont-email-form-with-ssl-https
|
code
|
I cannot get Gravity form to email form content on the HTTPS version of a page. After information is entered and customer clicks submit they get confirmation message and email. However the form does not email the content till 3 days later?
Site does have a SSL certificate.
WP HTTPS plugin installed and "secure post" is checked for the form page.
The form works perfectly if you change the address to "http"
There are several other forms on the site they all work with the https or http at the beginning of the address.
Any ideas what is going on?
Thanks in advance
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.25/warc/CC-MAIN-20240414095752-20240414125752-00860.warc.gz
|
CC-MAIN-2024-18
| 566
| 7
|
https://community.ultimaker.com/profile/332872-nathaniel-zhu/
|
code
|
So I just recieved my migbot from 3dprintersonline and I'm having trouble putting on the base's drive belt. There's like sort of teeth I have to fit the belt into. The problem is, I can't get it in. I'm pushing and pushing and it just won't take the belt. Anyone know how I could get the belt in?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141182794.28/warc/CC-MAIN-20201125125427-20201125155427-00422.warc.gz
|
CC-MAIN-2020-50
| 296
| 1
|
https://www.paypal-community.com/t5/My-Account/how-do-I-change-my-country-on-Paypal/td-p/381966/page/7
|
code
|
New to the community? Welcome! Please read our Community Rules and Guidelines
but what if you have money on the account... it was by accident that somehow I managed to get a UK account (I live in the USA)... and someone sent me money to this account -- they mistakenly put the wrong email... and now I'm not sure how to get the money out, it won't even let me send to my other PayPal account. the whole thing is very weird.
I don't see why I should have a new account for changing country?
I have a German account and I have USD, Euro, and Pound in my wallets. I am going to the UK.
So, why I cannot use my account when I am at the UK?
Couldn't I login an make payment?
You can certainly try, when it goes wrong or you get issues then call customer services as it would be pointless posting on here when you have already said you don't see the point of changing paypal accounts when you move countries.
You have been given an answer and told why you would have issues, you chose not to take that advice so if you don't want to change your account when you move countries OR use a country specific paypal account in another country then thats your choice isn't it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057913.34/warc/CC-MAIN-20210926175051-20210926205051-00132.warc.gz
|
CC-MAIN-2021-39
| 1,163
| 8
|
https://segoldmine.ppi-int.com/node/45340
|
code
|
Replaced/Superseded by document(s)
Elicitation is part of the Requirements Engineering process.
The following checklist addresses only the elicitation part of requirements development. Once
elicited requirements are analyzed, a specification document is created and reviewed. To
complete the requirements engineering process, the requirements are managed using a defined
change control process that ensures that all work products and plans based on the requirements,
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00827.warc.gz
|
CC-MAIN-2023-40
| 466
| 6
|
http://atlas.evilpiepirate.org/git/linux-bcache.git/log/Documentation/auxdisplay/Makefile?showmsg=1
|
code
|
Currently source files in the Documentation/ sub-dir can easily bit-rot
since they are not generally buildable, either because they are hidden in
text files or because there are no Makefile rules for them. This needs to
be fixed so that the source files remain usable and good examples of code
instead of bad examples.
Add the ability to build source files that are in the Documentation/ dir.
Add to Kconfig as "BUILD_DOCSRC" config symbol.
Use "CONFIG_BUILD_DOCSRC=1 make ..." to build objects from the
Documentation/ sources. Or enable BUILD_DOCSRC in the *config system.
However, this symbol depends on HEADERS_CHECK since the header files need
to be installed (for userspace builds).
Built (using cross-tools) for x86-64, i386, alpha, ia64, sparc32,
sparc64, powerpc, sh, m68k, & mips.
Signed-off-by: Randy Dunlap <firstname.lastname@example.org>
Reviewed-by: Sam Ravnborg <email@example.com>
Signed-off-by: Andrew Morton <firstname.lastname@example.org>
Signed-off-by: Linus Torvalds <email@example.com>
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00091.warc.gz
|
CC-MAIN-2022-40
| 1,008
| 17
|
https://teamwork.gigaset.com/gigawiki/display/GPPPO/T640+T440+Release+notes+2.2.0
|
code
|
It is recommended to perform a WebUI-update (.cpio file) ONLY from system with a software version 1.1.3. (or higher).
Please save a backup on an external memory before update!
Find here more information about this release.
If you're facing issues during or after the update, please contact your Gigaset pro support person or enter directly a ticket in our partner-portal.
When updating an existing 1.1.3 system to 2.2.0, the SIP-Gateway settings will change.
Please check BEFORE updating, if your provider is already certified for Version 2.x.x
Beside the FXO or BRI/ISDN interfaces following SIP trunk providers are certified for version 2.x.x
To see the complete list of providers check out our ITSP interop pages.
After the update, check the status and the settings under
Administration --> Routes --> SIP-gateways and
Administration --> System status --> SIP status
- New Asterisk version 13.13 LTS cert4
- New PJSIP version 2.6
- New firmware for N510IP (V242), N720 (V108), Maxwell 3/b (V2.15.9)
- Delete old devices from provisioning list
- Remove devices from blacklist (Administration --> System --> System Settings --> Network --> Blacklist-Tab)
- Support of Maxwell Expansion Modules - detection and configuration via WebUI
- STUN server configuration in System settings
- XML phonebook adjustments
- Extension monitor improvements
- Device provisioning-template update
- BLF / LUA improvements
- Next call anonymous working for N510/N720 and Maxwell 10
- Click2dial from HOME screen working better with the callmanager settings of devices
- NAT support in SIP gateway improved
- RTP issue with some providers - external IP-address in SIP transport not saved - solved
- NTP server synchronization not working - solved
- Call recording - recorded calls are shown correctly in WebUI - solved
- Temporary greeting (voicemail-system) is not played - solved
- G722 transcoding issue - outgoing calls with DE-phones or DECT devices have oneway audio (PBX-user doesn't hear external party) - solved
- Voicemail - cleaned up options for all languages - solved
- Blacklist - parameter adjusted, so devices won't be blacklisted - solved
- USB stick can't be prepared with hddimage for T440 - solved
- MoH - when N510 user is putting an internal user on hold, MoH is not played (muted) - wrong parameter in N510 template - Workaround: deactivate g722 codec
- Provisioning - PBX is not sending data to N720 - Workaround: Start provisioning-process manually in N720: Settings --> Management --> Miscellaneous --> Update Profile
- Provisioning - Last key on Maxwell 3 and last key on expansion module are not provisioned.
- Voicemail - wrong timer settings causes not recorded voicemails, when shorter than ca. 20 seconds - wrong value used in voicemail-configfile
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810807.81/warc/CC-MAIN-20200408072713-20200408103213-00117.warc.gz
|
CC-MAIN-2020-16
| 2,761
| 37
|
https://puri.sm/posts/consent-matters-when-tech-takes-remote-control-without-your-permission/
|
code
|
In my previous post I talked about why consent matters when it comes to privacy; and yet, privacy is only one of the areas where tech companies take advantage of users without their consent. Recently, tech companies have come to a troubling consensus: that they can change your computer, remotely (and often silently) without your knowledge or permission.
Some examples of this include:
Below you will find the origins of this mentality, the risks and harm that arise from it, and what it says about who really owns a computer.
Anyone who has ever worked for a large company in the computer age has experienced first-hand the authoritarian, controlling, and restrictive policies that IT employs to manage company computers. Starting with centralized systems like Active Directory, IT teams were able to create policies that controlled what sorts of passwords employees could use and whether employees could install applications, access printers, and even, in some cases, insert USB drives.
These centralized tools have evolved over the years: they can now add and remove files, install new software and software updates, remotely control machines over the network in order to view what’s on their screens and access local files. This controls extends into Active Management Technology features embedded into the Intel Management Engine, that lets administrators remotely control computers even if they are turned off. Now that smartphones are critical tools in many organizations, MDM (Mobile Device Management) tools are also often employed at enterprises to bring those devices under a similar level of control–with the added benefit of using GPS to track employee phones even outside the office.
The most common justification for these policies is convenience. If you are an IT department and have thousands of employees–each with at least one computer and one smartphone that you need to support–one of the ways to make sure that the appropriate software is on the systems, and updates get applied, is to push them from a central location. Companies often have custom in-house software their employees rely on to do their jobs, and throughout the life of the company more tools are added to their toolbox. You can’t expect the IT team to go desk-by-desk installing software by hand when you have thousands of employees working at offices all over the world: when an employee’s computer breaks, these same tools make it easy for IT to replace the computer so the employee can get back to work quickly.
The main justification for the strictest–and most controlling–IT policies isn’t convenience, though: it’s security. IT pushes software updates for protection against security bugs. They push anti-virus, anti-malware and remote monitoring tools, to protect both employee and company from dangerous email attachments, from software they might download from their web browser. IT removes local administrative privileges from employees in the name of protecting them from installing malware (and, practically speaking, from installing games and other time-wasting apps). They disable USB storage devices so employees can’t insert disks containing malware or copy off sensitive company documents. Each of these practices have valid reasons behind them for companies facing certain threats.
Information security professionals spend much of their time solving problems in the enterprise IT space; as a result, they often take on some of the same patronizing views of users you find in IT. Many view themselves as parents and users as children, their role being to wrap the hard corners of the digital world in foam so users don’t hurt themselves. This patronizing view leads them to pick security measures that remove control and autonomy from end users, and centralizes that power in the hands of IT or information security. The repeating refrain is “just trust us” and that users must place full trust in the internal security team, or the third party enterprise security vendor, to be safe.
Most users tend to bristle against this kind of security policies–especially as generations are entering the workforce who grew up with computers, and are increasingly savvy and knowledgeable about how to use them. All the same, in the workplace employees have grown accustomed to giving up much of their autonomy, control, and privacy for the sake of the company. Yet you can tell that this approach runs against our nature, because so many companies have had to explain these policies in new hire documents and require that employees agree to, and sign them, when they are hired. These documents inform the employees that the computers they use and the documents they access are company property–and that the company is authorized to monitor and control their property at all times.
You could make a convincing argument that, since companies have paid for, and do own, all of the computers they provide to their employees, and pay IT teams to maintain them, it’s their right to set up software to control them remotely. As draconian and privacy-invading as some corporate policies are, you can still argue that employees consented to this level of control when they signed their employee contract. The problem is that this patronizing, authoritarian approach to enterprise IT has now found its way into consumer devices as well, because it’s in a tech company’s interest to have as much power over their customer as possible. Unlike in the enterprise, though, this remote control is on by default and without explicit consent.
More and more tech companies are hiring themselves as their customers’ IT staff, are granting themselves remote control over their customers’ computers, always in the name of convenience and security. The most common form of remote control is that of automatic updates; on the surface, automatic security updates make sense–people can’t be expected to know about all of the security vulnerabilities in all of their software, so it makes sense to make patching easier for them.
The problem is that many companies now set this behavior as the default–without user consent–and don’t limit themselves to security updates: instead, they also push other changes they want, including normal feature updates, adding new advertising to the OS, automatically logging users into their Google accounts, and any other change they want on your computer. These updates often have critical bugs themselves, but since they go along for the ride with security updates, people are left with the false choice between security and stability.
Because these updates happen behind the scenes, without any prompts or notices for the user, users have little to no control over whether, or when, the updates happen. On phones, this control can also extend to whether a user is allowed to install an application, use it after they installed it, or in the famous example of Google and Huawei being caught up in the US/China trade war, a customer losing the ability to update their phone. Most recently, Adobe has told its customers they could be sued if they don’t upgrade–using older versions of the software they bought apparently being against their licensing agreement!
The irony is that, decades ago, when your average person had minimal experience with computers, those inexperienced users had much more control and autonomy over them. Many people grew up with computers and smartphones today, and technology is second-nature to them. Many switch between operating systems, laptops and phone vendors as effortlessly as if they were switching between car brands. Yet, at a time when individuals are much more capable of using computers, and computers are simpler to use than ever before, tech companies have decided people can’t be trusted to manage their own devices, that the vendor should have more control than ever before.
In the case of enterprise IT, it’s clear that the company owns employee computers and exercises their rightful control over their own property. But what does it mean if a tech company exercises the same kind of control over consumer computers or phones? If hardware vendors have the power to change your computer silently, without your consent–including 3rd party applications you installed yourself–is the computer really yours? If phone vendors decide which applications you can install, can remotely disable applications from running and can stop you from getting updates, is the phone really yours? If software vendors can install major feature changes without your permission, force you to update, even sue you if you don’t update to their latest versions–is the software really yours?
The solution to this problem of remote control is pretty simple: consent. While many people in security circles believe the ends justify the means, there are many examples where the same action, leading to the same result, takes on a completely different tone– all depending on whether or not the actor got consent.
Consent doesn’t need to mean users will be at risk from malware or security bugs; it just means they give permission before a company changes files on their computer. Vendors can add a simple prompt that explains what’s about to happen, so the customer can approve it. The customers that don’t care or that fully trust the vendor will still click Accept regardless; customers that do care retain control over their computer and can investigate and approve the change first. The problem with removing everyone’s power because you assume most people are apathetic, is that many people are apathetic precisely because they feel powerless in the face of Big Tech companies.
All of Purism’s products are aimed at removing control from tech vendors (including ourselves) and giving freedom back to users. This is true in the free software we use throughout our hardware, the open standards (again, and free software) we use for our services, in our approach to moderation for Mail, Chat and Social. We ask for your permission before we update software on your computer and explain exactly what’s being updated and why. You shouldn’t have to outsource all of your trust and control to a vendor to be secure. With Purism products, you are in control.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00568.warc.gz
|
CC-MAIN-2023-50
| 10,258
| 18
|
https://groups.jewishgen.org/g/main/message/653065
|
code
|
St. Joseph Missouri City Directories. #records
I am trying to locate the 1923, 1924, and 1925 ST. JOSEPH, MO city directories. I have tried the local historical societies and they have not been able to help. I am looking for two names in these: GOLDIE LISHINSKY who is my grandmother and the name LASHLEY. They had a grocery store that might have been on Charles St. I have found a record of my father, JACOB LISHINSKY, in 1923 at Central High School there. They were only in ST.. JOSEPH for one or two years before returning to New York.
I am hoping someone can tell me where I might find this record that would give me their address. I appreciate any help anyone can provide on this.
Thank you very much.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945248.28/warc/CC-MAIN-20230324051147-20230324081147-00188.warc.gz
|
CC-MAIN-2023-14
| 706
| 4
|
https://www.routledge.com/Intelligent-Sensor-Networks-The-Integration-of-Sensor-Networks-Signal/Hu-Hao/p/book/9780429066962
|
code
|
Although governments worldwide have invested significantly in intelligent sensor network research and applications, few books cover intelligent sensor networks from a machine learning and signal processing perspective. Filling this void, Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning focuses
BASICS. Significance of Intelligent Sensor Networks. Elements of Intelligent Sensor Networks. Recent Advances and Applications. SENSING AND SAMPLING. Sensors for Multi-format Signals. Sampling Principle and Architecture. Bio-inspired Sensing. Compressive Sensing (CS) Principle. CS Signal Recovery. Hardware and Software Design for Compressive Sensing. DISTRIBUTED SIGNAL PROCESSING. Sensing Signal Features. Sensing Signal Processing. Networked Processing. Distributed Estimation. Distributed Prediction. INTELLIGENT SIGNAL LEARNING. Machine Learning Basics. Supervise Sensor Signal Learning. Unsupervised Sensor Signal Learning. Variational Bayes for Sensor Signal Learning. Information Geometry for Intelligent Sensor Networking.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659890.6/warc/CC-MAIN-20190118045835-20190118071835-00330.warc.gz
|
CC-MAIN-2019-04
| 1,082
| 2
|
https://forums.creativecow.net/thread/398/37115
|
code
|
Hey all. Want to start this out by saying I am NOT a video guy. My background is IT, corporate Audio/Visual and audio editing (logic).
I own and operate a corporate a/v rental and staging company. One of my clients came to me and has a conference with the following requirement.
He would like to capture all of the powerpoints as the presenter is presenting them, and instead of using a laser pointer, he wants his presenters to use a mouse. Final result would be a video of each presentation (there are about 30 of them) to upload to YouTube/Vimeo/their own website.
I first thought screen capture software. But that would require all presentations to be shown off one laptop. Problem is that if a presenter would like to use their own computer (like a Mac) they couldn't.
So my second thought was to use a switcher/scaler/scan converter (I.e. barco hd image pro sdi). To feed a Ki-Pro. That way I could have multiple sources/laptops feed my projector and feed the Ki-pro for recording. Ideally would at least be able to make separate video files on the fly for each presentation (I assume the Ki-Pro would allow this by a simple stop/start?).
I will probably end up using a subcontractor to do slight edits and encode the final product. Even though it is tempting to do it myself, as I have a 3 month old MacBook Pro all decked out :) But my customers come before my profit margin. So who knows.
Last bit is that I don't own a Ki-Pro but we are getting more and more requests like this. So the purchase of some solution is imminent. And honestly money is not really an object.
Ease of use, and reliability are the most important things to me. I need to be able to train my employees how to use the equipment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348500712.83/warc/CC-MAIN-20200605111910-20200605141910-00463.warc.gz
|
CC-MAIN-2020-24
| 1,710
| 8
|
https://projecteuclid.org/journals/notre-dame-journal-of-formal-logic/volume-58/issue-1/Canjar-Filters/10.1215/00294527-3496040.full
|
code
|
If is a filter on , we say that is Canjar if the corresponding Mathias forcing does not add a dominating real. We prove that any Borel Canjar filter is , solving a problem of Hrušák and Minami. We give several examples of Canjar and non-Canjar filters; in particular, we construct a family such that the corresponding Mathias forcing adds a dominating real. This answers a question of Brendle. Then we prove that in all the “classical” models of there are families whose Mathias forcing does not add a dominating real. We also study ideals generated by branches, and we uncover a close relation between Canjar ideals and the selection principle on subsets of the Cantor space.
"Canjar Filters." Notre Dame J. Formal Logic 58 (1) 79 - 95, 2017. https://doi.org/10.1215/00294527-3496040
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662636717.74/warc/CC-MAIN-20220527050925-20220527080925-00114.warc.gz
|
CC-MAIN-2022-21
| 790
| 2
|
https://techpmblog.com/category/product-management/page/5/
|
code
|
It takes some living to realize how the world is unfair until you assert yourself. And.. asserting yourself is hard and does not come naturally to most. It does not come easily to me but comes very easily to my wife. I’m grateful for that. It balances things out. It prevents people from running over you and your ambitions just ’cause they can.
Always, the easier position for someone to take is to be “slightly” unfair to you rather than taking a stance against the majority to be fair to you and your interests.
For others to stand up for you, you need them to be able to empathise with you. Or, care for you. Why will they do that? They will do that only if they like you or if they know that you will fight back.
So.. assert yourself. Build this muscle. It helps a lot in life and in product management and in leadership.
Sometimes, I don’t get how large companies work. Management mostly spends time managing appearances or taking it too seriously. By that I mean, making sure that whatever is the hip, cool, shiny thing that upper management is discussing, their team should be able to show that:
- Their team understands it
- Their team practices it already
- Their team excels at it and even evangelizes it to others.
Let me take an example to illustrate this. Lets say, upper management is discussing “Using analytics for decision making” this week. Managers see a sudden urge to demonstrate incredible competence in this area. So.. they:
- Show that they understand the decisions should be driven by data
- Their team collects vasts amounts of data for analytics
- Their team has been asking other support teams for data for quite some time and have been encouraging the use of data in sub-organizations and scrum teams.
Now, if the manager wants to keep up appearances, he will not trouble the team and use existing knowledge to demonstrate these points. And to me, that makes a good manager.
The other extreme is a manager who will push all this down to his team and start asking for data and analytics on the smallest of item to demonstrate that they are acting on data. This causes a fair amount of upheaval and disruption to the team and costs productivity losses.
There is little focus on what problem organization really wants to solve by adopting data driven decision making. For example:
- Were bad decisions made when data was available?
- Is their a desire to use data to make decisions in a certain area?
- Is there a desire to use data to drive out lethargy?
Unfortunately… there is a new flavor every couple of months in large organizations.. so its upto good management to ensure teams stay on track.
I wanted to pass along this cool product that helps small companies track and build a strong company culture.
The monthly price commitment ensures that you pay attention to this important aspect of your business regularly.
I’ve been thinking a lot about what are important things to measure for a desktop software products and SaaS projects and here are my thoughts:
You can gather operational metrics and leading indicators that can impact your decisions as a product team. I think there is value in collecting both. Its important to think about what are the key metrics you want to focus on and if there are any key leading indicators that can predict changes in these metrics. For example: Reduce active use is a leading indicator for reduced revenue in the future. Lack of customer acquisition is a leading indicator of reduced trial downloads and eventually trial conversions, etc.
Generally it helps to have uninterrupted time and a piece of paper to jot down what’s important to your business. For example: Is your goal to grow revenue? If yes, here are the hypothesis that you might want to test:
- Marketing is not effective – not enough new customers coming in?
- Customers are coming in but existing customers are leaving faster?
So, I’ve tried to categorise metrics that I try to gather for any software project I work on:
Customer acquisition Funnel
- This is different for every channel through which you sell your product. The Direct Channel is simplest to understand and the metrics are listed below
- Visits to the landing page – say “myproduct.com”
- Landing page to trial download or “sign up” conversion
- Trial to full product conversion
These to me are the most important metrics that drive business goals and metrics. Everything else is making sure you provide sustained value to keep people once you’ve got them. Keeping existing customers is always easier than getting new ones. If these numbers are healthy and the business is tanking then you start focussing on customer retention.
Customer Retention Metrics
- Active use: Usage by version (number of app launches by version per day)
- Active use: Files saved in each app launch
- Cohort analysis for subscribers
- I’m looking for a simple spreadsheet which looks like this
- | customerID (or GUID) | Subscription date | Subscription Type | Cancellation Date |
- Such a spreadsheet can also answer my Customer acquisition requirements.
Customer Profile Metrics
- Platform – Mac/Win/iOS
- A Questionnaire during app install that can ask the user to share more about themselves
Feature usage metrics
- Most used features – be careful about when this event is logged and how its logged
- Are new features being used, and how will you agree that a feature is being used a lot?
- Look at new feature usage/session or /day post release
- Is the addition of new features impacting customer retention or customer acquisition metrics?
- This is really important – especially for established products. You may find that nothing you do impacts the business metrics. If you do then why develop features. Work on a new product, service or something else.
While any experienced developer can instrument your app so that you can log usage data on your servers its important to get the user to opt into usage tracking. Here are some companies that make it easy to instrument app usage and help startups get a better understanding of their customer
- Omniture from Adobe.com
- Google Analytics since its free
- You can also try to implement a custom logging solution built by your engineering team
More when I get time.
Every now and then engineering is going to come back to you and say that something’s not possible for will take too much time to implement. Its generally good to hold your ground and try to motivate the team to push the envelope or look at the problem differently. And – to always ask for alternatives.
I’ve noticed that, at times, when I push back, splendid things happen. The engineering team gets a chance to shine and prove themselves wrong. Trust me. Development teams enjoy solving problems and outdoing themselves. This is what makes it really fun to work with a really talented and motivated teams. Its easy to agree to a cut down feature set or to say yes to an “ok” experience but it never challenges the teams to out think themselves.
So.. when there is no time pressure, I ask the teams to think about the problem some more and come back with alternatives. Push back and state why the solving the problem a certain way is beneficial to the user. State the importance of the “right” solution in terms of the user experience rather than your opinion. Smart people can always distinguish between facts and opinions.
As a product manager based in India, its great when your product gets centre stage at a worldwide conference in the US. This happened to me last week and it made all the struggles over the last 8 months worth it. But the real heroes are the engineers on the product team. They put in the real work to realise, shape and rationalise management’s vision. It was gratifying to send pictures and emails to the team letting them know that their work mattered and is being showcased at the highest level.
It’s only after shipping that the real analytical work begins as we try to answer the following questions:
- Are people using the new features?
- If yes, how much are they using it?
- What amount of use makes an investment in a feature worthwhile?
- Are these features bringing new users to the product? – If this was a goal for the release.
- Are the new features usable?
I try to get question #5 answered via prerelease testing but all the other questions are truly answered only after the product reaches the customers hands. I know that #4 was not a goal for this release.
Q3 is always tricky. Sometimes you invest way more resources into a feature that you anticipated at the beginning of the cycle. This is just the engineering truth. You discover usability issues late or the engineering team discovers workflow issues that we did not think of before hand.
Sometimes you find a single bug or a performance issue that prevents you from shipping a feature that you worked on for 4-8 weeks. This is still not bad considering that only a few releases ago we would have wasted many more months of work since we were were following a waterfall approach. Every time I run into such situations I feel proud that we develop software incrementally and send it out to a set of users for testing every month. This validates our assumptions earlier and allows us to discover issues earlier. And, that is worth the pain the process changes bring with them.
Travel is a key part of a product managers job. Especially if you have worldwide responsibility for your product.
So why do we travel so much:
The biggest bucket is to meet with customers to
- Understand how they use the product, which is normally different from how you envisioned it 🙂
- Bounce of new product and feature ideas
- Idea discovery
The other bucket is office visits for
- Discussing and presenting product roadmaps
- Politicking or gathering support for your ideas
- Building relationships with folks with influence in the office
Final bucket is outward facing product management function that require you to travel to:
- Train sales team
- Ensure marketing messaging is consistent with product features
- Meet with press, bloggers and influencers
As much as I enjoy traveling, here’s how travel can get taxing. I spent almost 16/52 weeks outside India last year. I’ve already traveled almost once a month in the first quarter of 2013. Here is my travel calendar for the last 15 months and the coming 3
||US & UK & Ireland
||US & Malaysia
||UK & Germany
||France & US
||US & Netherlands
||Thailand & Maldives
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00058.warc.gz
|
CC-MAIN-2023-50
| 10,474
| 88
|
http://www.rpgrevolution.com/forums/lofiversion/index.php/t57435.html
|
code
|
Hi everyone! I have a lot of names, but I commonly go by Maru on the internet- I'm an aspiring game designer, I love the aspect of coming up with ideas and writing everything out and stuff, but I kind of suck at implementing them into an actual end result. So I'd like to form a team and make some of my ideas a reality one day.
I've got a bit of experience with Game Maker, although I've still a lot to be desired. I've also some very basic experience with Notely and Ren'py, I've yet to dabble with anything else, really.
So um, yeah. Hi!
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703748374/warc/CC-MAIN-20130516112908-00010-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 540
| 3
|
https://e-iot.info/video.php?v=IxgevOZTF9Q
|
code
|
A major challenge we face today is digitalization of industrial processes, extending machinery with low power, feature rich microcontroller-based electronics to collect sensor readings and forward data with LPWA communication channels to a Cloud Database in order to build up the “BIG DATA” - the knowledge base of the future.
A mass of sensor readings needs to be organized into central databases for future processing so as to meet the expectations of Industry 4.0. The Internet of Things, or IoT provides the ecosystem to deal with this challenge. We review these potentials based on the IoT infrastructure system developed mainly for demonstration purpose by Endrich GmbH, a leading electronic spare part distributor in Europe, by showing an example how to work with a modem using Narrow-Band IoT / LTE_M technology and introducing the cloud based database service which was created by the company engineers to help IoT developers at the customers.
Endrich GmbH has developed an online sensor network infrastructure, where every component of this hardware have been supplied by the manufacturers represented by the company. The beginning of the processing chain – like in a real-world application – consists of sensors detecting and measuring different physical quantities, which are processed all the way to cloud database storage and visual data representation at the end. There is a sophisticated gateway in between, which collects the sensor readings, preprocesses these data and sends it through a communication channel to a cloud based database service, where it can be displayed after processing, or used for any purpose appropriate for a given task.
A budapesti fejlesztőkozpontban megszületett E-IoT koncepció hardver és szoftver elemeit mutattuk be az ElectroSub 2021 kiállításon, a TV2 Innovátor műsora pedig meglátogatott bennünket... Az Október 16-i adás Endrich vonatkozású része....:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00596.warc.gz
|
CC-MAIN-2023-06
| 1,926
| 4
|
http://dec.bournemouth.ac.uk/hci/workshop/
|
code
|
Intelligent environments (IEs) are smart spaces that are equipped with seamless computing technologies to empower the occupants/users of those spaces for completing the activities of daily living in an efficient way, while insuring security, safety and optimal usage of resources. Naturally, IEs cover a number of settings going from offices, hospitals, schools, factories to cities. While IEs technology may be used for comfort, its relevance for a number of applications such as medical and healthcare monitoring, energy management and education is prevailing. The impact of IEs for the quality of life for different categories of people is significant.
IEs should be designed to benefit people of all ages, genders, capacities, cultural and educational backgrounds. This requires the introduction of related technologies in IEs has to be sensible to the users rather than overwhelming them. Current issues surrounding human factors and user acceptance such as usability accessibility privacy as well as reliability and transparency are posing challenges in adopting IEs. It becomes clear that Human Centred Design (HCD) is the most appealing methodology to address these concerns. HCD offers methods and tools for eliciting the requirements of the IEs from users in addition to co-designing and evaluating intelligent environment systems.
However, HCD itself also faces challenges due to the nature of user involvement. Therefore, HCD methods and tools should be adapted for an effective exploitation in the domain of IEs and consequently for enhancing the acceptability of IEs by potentially considering the current developments in multimodal interactions i.e. modes involved in five human senses to develop intuitive input modalities. The user-centredness in the context of systems development as a multidimensional concept composed of user focus, work-centredness, user involvement and system personalisation requires the development of multimodal interactions for intelligent environments. The user-centred systems development methods such as goal directed interaction design, contextual design, scenario-based design and human centred systems development life cycle, as applied in the context of IEs, will help bridge the gap between Human Computer Interaction (HCI) and Intelligent Systems communities.
This workshop addresses the recent advances in the both areas of HCD and IEs. It particularly discusses ways of applying HCD to develop user-centred and transparent IEs. It serves as a forum for bringing together researchers from both communities of HCD and IEs to overview the opportunities for bridging the two areas and to draw a roadmap for future avenues to enhance the serviceability and usability of IEs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257156.50/warc/CC-MAIN-20190523063645-20190523085645-00133.warc.gz
|
CC-MAIN-2019-22
| 2,723
| 4
|
https://forum.cs-cart.com/t/disable-shipping-method-after-specified-dollar-amount-is-reached/4083
|
code
|
I have 2 shipping methods available. One is ups or fedex ground (signature not required) and the second is ups or fedex ground (signature required) in which I get an extra dollar amount. I am using manual setting. Once the order reaches $500 usd, I only want to offer the "Signature Required".
So, I would like to disable a particular shipping method when the order amount reaches $500.
By doing this, I will be able to offer only one shipping method that requires a signature.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00060.warc.gz
|
CC-MAIN-2023-23
| 477
| 3
|
https://answers.unrealengine.com/questions/846070/view.html
|
code
|
Development server build failed
I just updated my project from 4.20 to 4.21 and I'm trying to setup a dedicated server for it. I've made a target file (exact copy of the GameEditorTarget but with "Editor" replaced with "Server") but for some reason whenever I set my build configuration to "Development Server" I get build errors. This worked completely fine in 4.20. The errors I'm getting are:
If this is any help I'll put my code for PostEditChangeProperty event below, but it shouldn't be wrong as it works completely fine and doesn't return me any errors with the Development Editor configuration. Also the functions are defined the exact same way in both actors Region and Flag.
Thanks in advance, all help is appreciated! :)
asked Nov 11 '18 at 06:48 PM in Packaging & Deployment
Follow this question
Once you sign in you will be able to subscribe for any updates here
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314130.7/warc/CC-MAIN-20190818205919-20190818231919-00176.warc.gz
|
CC-MAIN-2019-35
| 875
| 7
|
http://freakangels.com/whitechapel/comments.php?DiscussionID=252&page=3
|
code
|
Vanilla is a product of Lussumo:Documentation and Support.
41 to 51 of 51
A coworker of mine (Young, Liberal College Student), tried to insist that the current admin is almost like the nazis.I tired to explain to him that, to be fair to all the jews out there(and peoples of Europe at the time), That no, no it isn't. He still wouldn't submit.
Precisely...what's really scary is how apolitical many people are.
government has a reason to think you are either a danger
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464253.80/warc/CC-MAIN-20151124205424-00084-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 467
| 5
|
https://gis.stackexchange.com/questions/178/simplifying-adjacent-polygons-using-postgis
|
code
|
You want to turn your polygons into lines, make those lines be simple coverage edges, simplify those edges, then build them back up into polygons again, and finally use point-in-polygon to re-join the attributes of the old polygons with the new ones.
CREATE TABLE rings AS SELECT (ST_DumpRings(polys)).geom AS rings FROM polytable;
CREATE TABLE simplerings AS SELECT ST_Union(rings) AS simplerings FROM rings;
CREATE TABLE newpolycollection AS SELECT ST_Polygonize(ST_Simplify(simplerings, 10.0)) AS geom FROM simplerings;
CREATE TABLE newpolysnoattributes AS SELECT (ST_Dump(geom)).geom FROM newpolycollection;
CREATE TABLE newpolytable AS SELECT new.geom, old.attr FROM newpolysnoattributes new, polytable old WHERE ST_Contains(new.geom, ST_PointOnSurface(old.polys));
There are errors in the above, but the core concept is there. You can do it all in one query if you like.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643388.45/warc/CC-MAIN-20230527223515-20230528013515-00622.warc.gz
|
CC-MAIN-2023-23
| 876
| 7
|
https://stat.ethz.ch/pipermail/r-help/2003-January/029087.html
|
code
|
Dear R ers, if some can tel me how I can generate a sample from a given density. I have a complex 2D density function en I want to genearte a sample from it? Any package? Thank you Remon ,Utrecht _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153515.0/warc/CC-MAIN-20210727233849-20210728023849-00040.warc.gz
|
CC-MAIN-2021-31
| 322
| 1
|
http://stackoverflow.com/questions/13006467/uimenucontroller-not-showing-uipasteboard-is-cleared-iphone-app
|
code
|
Am working in message based iPhone application. In my application looking like iMessage native iOS app.
I made Bubbles with used UIImageView and UILabel. I made UILabel as clickable and showing Copy option. It is working fine when the message input UITextView is not in active.
1. I can show the "Copy" option when we clicking UILabel and the UITextView is not becomeFirstResponder. 2. When the user clicking the MessageTextView (UITextView) from the bottom of the screen the UITextView becoming first responder and keyboard is showing now. In this scenario if the user clicking the messabe bubble (UILabel) the UIMenuItem showing "Paste" on the bubble instead of "Copy". 3. If i click "Paste" from the bubble UIMenuItem already copied text will be pasting in UITextView. So the control fully in UITextView UIMenuController not activated in UILabel. So i cleared the text from UIPateBoard when the user clicking the Bubble (UILabel). 4. Now the UIMenuController not showing up even [self becomeFirstResponder]; not becoming in UILabel class.
The reason is when the UITextView is in becomeFirstResponder the control fully in that. not coming to UILabel. Could you please help me on this.
How to show UIMenuItem "Copy" when the user clicking UILabel if the keyboard is in visible the control is in UITextView? Could you please help me on this. I spent two days in this issue. Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278091.17/warc/CC-MAIN-20160524002118-00130-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 1,392
| 5
|
https://www.freelancer.com/projects/Website-Design-Shopping-Carts/Magento-Webshop.4341922/
|
code
|
For a new web store project, I need an IT specialist that can support me in setting up the store, and continue servicing and developing the store as we move in to new business areas.
My goal is to operate multiple web stores from the same backend.
I want to build the store in Magento, and you need to be a specialist in that area.
Some of our products are subscriptions, that are activated through an API to different service providers. If you have experience in this area, it's preferred.
Your bid should include what is needed to do a complete setup of the first store. Hosting will be provided.
For the right freelancer, there will be repeating tasks for many months to come.
Looking forward to receiving your bids
We are a creative digital agency with a lot of experience in web design. Please see our portfolio for your reference. We can do this job in 25 days.
35 freelancers are bidding on average $730 for this job
###Expert is here!### I can do that,sir! I'm ready! I'm a full time developer. check private message! kindly regard my message. I will wait for your reply, sir.
Hi, Consider its done! I would love to get this opportunity of working with you. I can guarantee complete satisfaction if you select me to execute this project. Please check your private message board. Thanks
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948567785.59/warc/CC-MAIN-20171215075536-20171215095536-00275.warc.gz
|
CC-MAIN-2017-51
| 1,293
| 11
|
http://community.norton.com/t5/Norton-Toolbar-Norton-Identity/Norton-Confidential-plug-in-crashing-Chrome/td-p/530328/page/36
|
code
|
08-26-2012 04:09 PM
I've identified what causes the problem on my computer (Windows XP Pro) --Norton Confidential only crashes in Chrome when I'm using webmail.earthlink.net -- this website posts two advertisements on each page - one at the top and one on the left -- I've noticed that after using this website for about 1/2 hour there is a likelihood for a Norton Confidential plug-in crash which prevents the ads from running in the website -- thus freezing the website and Chrome. Once I close Chrome it just takes 1 minute for me to restart chrome.
If there is a fix for this please post it so I know that this problem can be avoided.
Did you get the latest patch that requires a reboot as described in this post?
This has helped many users. There is not nearly the amount of people posting in this thread since the latest patch update.
08-30-2012 02:18 PM
08-30-2012 07:36 PM
I am sorry you are having problems with your computer.
You cannot determine Norton has “killed your computer”.
• there is no reason to have your computer “wiped and reinstalled” because a browser crashed
• did you try control-alt-delete to reboot?
• a competent computer tech would back up your information before “wiping and reinstalling” anything
08-30-2012 09:52 PM
Oh and only had this problem since norton updated
If you are talking about the recent patch updates, that's been a week ago. See this post ...
That patch required a reboot of the computer. Did you get the patch then, or just prior to posting? You say Norton has in effect, brought down your entire system. What kind of Norton errors or other errors did you see? What did they say? How have you determined that Norton has brought down your system? Did you get any Chrome extension errors? That would freeze the Chrome browser. It wouldn't crash your entire computer to where you think it needs to be wiped.
This thread is about the Norton extension freezing in Chrome. Is that what really happened? How has this brought your computer to the point of needing to be wiped clean? Is there something else you're not including?
If your computer is not really a 'useless heap' as you say it is, try running Norton autofix. Click Support > Get Support at the upper right of the UI. If it can't fix what it may find, open the Support Web Site. Go from there.
08-31-2012 12:19 PM
This issue is still not resolved. I have all the newest fixes and the computer is still giving a error saying Norton Confidential is not working. It slows my computer and locks it up! What to do?
08-31-2012 01:58 PM
08-31-2012 02:07 PM
Went back to Firefox. So slow!
Have you configured Firefox for pipelining? A couple of simple tweaks will enable the browser to fetch more information at a time, and can dramatically speed up page load times:
1. Type about:config into the address bar and hit enter. Promise to be careful (Don't worry, you won't break anything).
2. In the filter box type network.http or simply scroll down to the network entries.
3. Double-click network.http.pipelining to change the setting to "true."
4. Double-click network.http.proxy.pipelining to also change it to "true."
5. Double-click network.http.pipelining.maxrequests and type the number 8 into the box that appears and click OK (8 is the maximum that Firefox can handle, so entering a larger number is not beneficial).
6. Close and restart Firefox.
09-19-2012 05:27 PM
I have a problem with the "this is a known and long standing issue" as I've only recently started having the problem and it isn't happening on all my computers running both Norton and Chrome. I've double checked which versions of Norton I'm running. On the machine with the new problems I'm running vers. 18.104.22.168 and on the machine I'm not having the problems I'm running vers. 22.214.171.124. When was the 126.96.36.199 version released and is there a way to go back to the older version?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705936437/warc/CC-MAIN-20130516120536-00016-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 3,885
| 32
|
http://linkrotatorpro.com/login/
|
code
|
If you are an existing user, you can login using the button below.
“I spent over 16 hours trying to create a link rotator, and I kept running into problems. I never did pull it off. I am sending clients here in the future!”
— Embarassed programmer
“This does it all! And it’s easy! We paid a guy to build something half as good, and he came up blank. I wish we had looked here first!”
— John Riding, Clovis CA
“The guy who created this is a genius!”
— Everett O’Keefe, Fresno CA
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823282.42/warc/CC-MAIN-20171019103222-20171019123222-00579.warc.gz
|
CC-MAIN-2017-43
| 500
| 7
|
https://bergs.biz/blog/2015/02/14/meikeneewer-lcd-battery-grip-time-lapse-shooting/
|
code
|
I recently got myself a battery grip for my Canon EOS 550D from Amazon.
It has a really cool feature, namely to create time-lapse shots. However the “manual” that came with it is not really helpful trying to understand how to set it up. It really took me quite some time to figure it out…
So let me briefly explain what the four time settings mean:
- Delay: the time that expires until execution of the series begins.
- Long: how long the shutter will be pressed. Must be greater than 0 sec, I normally use 1 sec.
- Interval: the time between shots in a series.
- N: the number of shots in a series.
If this is helpful, please let me know.
In case you’re interested in buying this battery grip, please have a look on Amazon:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817398.21/warc/CC-MAIN-20240419110125-20240419140125-00297.warc.gz
|
CC-MAIN-2024-18
| 732
| 9
|
http://www.gamershell.com/download_107891.shtml
|
code
|
The demo switches to full screen at desktop resolution automatically. There is no windowed mode.
The demo places you in a random maze level which can be one of the easy, tough, or extreme mazes.
Use the arrow keys or left/right on a supported X-Input controller to navigate to the exit.
Pressing the 1, 2, or 3 keys will switch to a random easy, tough, or extreme maze respectively.
Pressing escape will exit the demo.
A few debug keys may have been left in (hint try P ;-)).
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218203536.73/warc/CC-MAIN-20170322213003-00651-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 475
| 6
|
https://forums.businesshelp.comcast.com/conversations/business-voice/be-anywhere-differentiate-between-someone-calling-my-business-phone-number-and-my-iphone/5fe0a62cc5375f08cd961715
|
code
|
Be anywhere - differentiate between someone calling my business phone number and my iphone
For Voice Mobility "Be Anywhere": I have no idea whether the call coming in to my iPhone is a personal call or a call from my business. I need to be able to answer with my business name. For personal use, I don't usually answer calls from phone numbers I don't recognize (spam callers). How can I differentiate a business call from a personal call BEFORE I answer?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103661137.41/warc/CC-MAIN-20220630031950-20220630061950-00167.warc.gz
|
CC-MAIN-2022-27
| 455
| 2
|
https://www.libertycon.org/schedule/writing-and-selling-across-multiple-genres
|
code
|
top of page
Peter Grant will moderate this panel about finding common elements across genres (e.g. SF versus Western versus Fantasy, which have a lot of fundamental plot similarities when you think about it) and writing to a "common core" of adventure to attract readers looking for those elements. In marketing, it's trying to emphasize those elements to draw readers who would never normally think about stepping outside "their" genre, to entice them to try another. One has to fulfil the "genre expectations" of readers (i.e. writing) as well as inform them that those expectations might/will also be met if they read more widely (i.e. marketing).
Writing and Selling Across Multiple Genres
bottom of page
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00532.warc.gz
|
CC-MAIN-2023-14
| 708
| 4
|
https://growingyoungereachday.wordpress.com/2022/08/16/
|
code
|
When I wrote my post yesterday, it was the end of a very tiring day, several hours spent with and for my friend, and I was almost asleep on my feet. Now I have to apologise because there are mistakes in that post. Obviously, I didn’t read it properly before I published it
In paragraph two, the final sentence is repeated, and typos appear in the Shirley MacLaine quote.
“When we release others from the expectations we have of them, we truly love them.”
I am away from home without my laptop (who ever does that) and writing using my phone does not help. So again, apologies.
JB, Raumati, New Zealand, August 16, 2022
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00184.warc.gz
|
CC-MAIN-2023-23
| 624
| 5
|
https://www.eecyak-business-consulting.com/
|
code
|
I have over 10 years of Business Building and Management experience combined!!!
I want to take my skills and help you do the same!!!
Trying new things
Trying new things can be fun, if you let it.
I am learning how to grow and expand on new ways to do things for my business.
Having fun is what this journey is all about.
So be silly and let yourself explore new territory!!!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178375274.88/warc/CC-MAIN-20210306162308-20210306192308-00127.warc.gz
|
CC-MAIN-2021-10
| 375
| 7
|
https://forum.kodi.tv/showthread.php?tid=127397&pid=1062602
|
code
|
Running 11.0 from the DMG on OSX 10.7.3 on an i7 Hackintosh with GA-X58A-UD3R and a RadeonHD 5850. XBMC crashes at start of playback on files with DTS or DD audio streams with both onboard and my PCI-E X-Fi Titanium HD.
<audiodevice>Line Out (Green Rear)</audiodevice>
That is from the guisetting.xml - it is what I believe is the audio settings. I am trying to play it back over the analog 2 channel output from either my onboard or my X-Fi, and neither work.
Any idea what the problem is? Thank you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323807.79/warc/CC-MAIN-20170628222452-20170629002452-00231.warc.gz
|
CC-MAIN-2017-26
| 501
| 4
|
https://unequalcities.org/2020/09/03/covid-19-and-renter-distress/
|
code
|
UCLA Lewis Center for Regional Policy Studies and USC Lusk Center for Real Estate
Coauthored by Michael Manville, Paavo Monkkonen, #UnequalCities Network Steering Committee Member Michael Lens, and Richard K. Green
Abstract: We examine the condition of tenants in Los Angeles during the COVID-19 emergency, using data from the US Census, and in particular an original survey of tenants in 1,000 LA County renter households. Our results reveal distress along multiple dimensions, almost all of them stemming from losses of work and income. These economic losses interact with many renters’ low household incomes and other pre-COVID vulnerabilities to create a host of difficulties, which could compound over time if left unaddressed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500250.51/warc/CC-MAIN-20230205063441-20230205093441-00222.warc.gz
|
CC-MAIN-2023-06
| 734
| 3
|
http://pubmedcentralcanada.ca/pmcc/articles/PMC3498427/?lang=en-ca
|
code
|
The results of this population-based cohort study demonstrate significant associations between the use of zolpidem and the increased risk for overall cancer, as well as oral, liver, lung, breast, esophageal, bladder, and kidney cancers. These unexpected findings may arouse public interest regarding safety issues in zolpidem use.
According to the Taiwan Cancer Registry, since 1982 cancer has been the leading cause of death among the general population in Taiwan. The age-adjusted incidence rate has increased steadily, and in 2007 it reached 270 new cases per 100,000 people.14
However, data from Surveillance Epidemiology and End Results indicate a different trend, with overall cancer incidence rates reportedly decreasing by 0.7% per year between 1999 and 2006 for all racial and ethnic groups combined.15
Because this issue continues to be a challenge for public health in Taiwan, it has gained the attention of the government; the result has been more population-based investigations regarding cancer preventive epidemiology. The NHI program provides adequate data for such studies because of its comprehensive health coverage. The NHIRD contains ambulatory service records, hospital service records, and prescription claim data. It allows researchers to select specific study groups and matched comparison groups, with ensured representation of the underlying population groups. We recently used NHIRD data to evaluate the risk of malignant tumors in patients with end-stage renal disease and found some positive risk. A report on this study has been previously published.16
The current study used a similar design to determine whether zolpidem use relates to the risk of cancer.
To the best of our knowledge, the current study was the first population-based study of zolpidem users in Taiwan (N=14,950 patients). To create a comparison group, we randomly matched each zolpidem user with 4 people from the general population who did not use zolpidem.
As is the case with benzodiazepine use, the probability of a patient using zolpidem increased with age, female sex, and concomitant use of other psychotropics17,18
; our results confirmed this pattern. Kripke11,19,20
has extensively studied the association between hypnotics and cancer risk, and his published work addresses this issue. On the basis of epidemiological data and laboratory studies, Kripke suggests that new hypnotics may increase cancer risk.
Zolpidem use appeared to promote viral infections, which may have indicated suppression of the immune function. Either immunosuppression or viral infections might increase cancer development.11,20
Cancers known to be related to viral infections include oral, liver, and cervical cancers.21-23
Our results demonstrate that zolpidem users have a significantly higher rate of subsequent oral and liver cancer development but not cervical cancer. One possible reason to explain this finding is the effect of national cancer screening. Cervical, oral, breast, prostate, and colorectal cancers are the main targets of Taiwan's free cancer screening program. We assumed that zolpidem users visit physicians relatively frequently and would be screened for cancer whenever necessary. Regarding the carcinogenesis of cervical cancer, cervical intraepithelial neoplasia (CIN) and carcinoma in situ (CIS) lesions are known to precede the development of invasive cancer. Frequent Papanicolaou smear examinations would detect cervical CIS, CIN, and dysplasia, enabling the patient to receive treatment before the disease progresses into invasive cancer. We did not include CIN and CIS as end points for cervical cancer, and this omission may have decreased the number of cases of invasive cervical cancer that we extracted from the database.
The cancer screening effect also partially applies for oral and breast cancers, which showed significantly higher rates in zolpidem users. More cancers can be detected if more frequent cancer screening is conducted among users of zolpidem. Prostate and colorectal cancers, however, did not show any significant difference between zolpidem users and nonusers.
Zolpidem can reduce the arousal response to nocturnal acid exposure and can also increase the duration of each esophageal acid reflux event. Patients with gastroesophageal reflux disease who take zolpidem thus experience significantly higher esophageal exposure to gastric acid, which increases the likelihood of developing esophageal cancer.12
Our data support this theory, and analysis revealed a significantly higher rate of esophageal cancer among zolpidem users. Other cancers that had significantly higher rates in zolpidem users than nonusers were lung, bladder, and kidney cancers. To date, we do not have any biological hypotheses to explain these associations.
Zolpidem users may also take benzodiazepine; thus, benzodiazepine may also be associated with cancer risk. In addition, sleep disorder may be associated with cancer risk. We wanted to investigate whether the relationship between zolpidem use and cancer risk may actually arise from an interaction between zolpidem and other risk factors. clarifies this concern and shows that zolpidem independently increases the overall cancer risk. The dose level of zolpidem also plays an important role. As indicated in , higher doses of zolpidem were associated with greater cancer risk, especially for patients who took zolpidem without taking benzodiazepine. indicates that the group receiving benzodiazepine plus zolpidem had a lower HR than the group receiving zolpidem alone at higher zolpidem dosages (30-299 and ≥300 mg/y but not for the lower zolpidem dosage [1-39 mg/y]). Therefore, the data in should be considered cautiously because the zolpidem-only groups are too small and their HRs are implausible. In addition, complex drug interaction is a possible explanation.
Some readers may suspect reverse causality, which would imply that patients who are already at risk for cancer may have a greater tendency to start using zolpidem than those not at risk for cancer. To clarify this concern, we used the Kaplan-Meier method without adjusting for sex, age, and comorbidity to evaluate it. There was no time lag between the 2 groups (zolpidem vs nonzolpidem). We found that the cancer-free proportion of patients treated with and without zolpidem differed significantly over time (). This finding indicates that cancer risk increases in conjunction with the length of time of zolpidem use; thus, reverse causality seems unlikely.
The current study had some limitations that need to be addressed. First, information on smoking habit, alcohol consumption, body mass index, and family history of cancer was unavailable from the NHIRD. All of these are risk factors for multiple cancers and could plausibly also be associated with zolpidem use. The current study cannot control these possible confounders. However, we have included obesity and alcoholism as risk factors in the models and adjusted for them in the analyses. Second, the organ-specific pattern of cancer occurrence does not appear to correspond to any biological hypothesis of zolpidem action. We think it likely that our findings in part reflect a healthy nonuser effect (ie, those with healthier lifestyles and behaviors may be less likely to require zolpidem treatment or may be more likely to address such problems with nonpharmacological approaches). Third, evidence derived from any cohort study is generally less than that from randomized trials because a cohort study design is subject to many biases related to confounding adjustment. Despite our meticulous study design with adequate control of confounding factors, a key limitation is that bias could still remain if there are unmeasured or unknown confounders. Fourth, the diagnoses in NHI claims primarily serve the purpose of administrative billing and do not undergo verification for scientific purposes. We were unable to contact the patients directly regarding their use of zolpidem because of the anonymity of the identification numbers. In addition, prescriptions issued before 1996 for the drugs under study were not reflected in our analysis. This omission could have underestimated the cumulative dosage and may have weakened the observed association. Fifth, comorbidities were detected between 1998 and 2009. Because the comorbidities do not necessarily precede the use of zolpidem or benzodiazepine, they may be caused by zolpidem and benzodiazepine. This raises a question of whether control for comorbidities incident after zolpidem use is commenced may produce overcontrol and thus underestimation of causal associations. Overcontrol may be a conservative statistical choice. Finally, it is difficult to explain why the HR appears lower when any additional risk factor, except for alcoholism and benzodiazepine, is combined with the risk of zolpidem. Some undetermined mechanisms or intrinsic limitation of this study may lead to the results. Apart from these potential problems, the data on zolpidem prescription and cancer diagnosis were highly reliable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345777159/warc/CC-MAIN-20131218054937-00008-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 9,069
| 18
|
https://metasd.com/2023/05/
|
code
|
The traditional picture of information sources for modeling is a funnel. For example, in Some Basic Concepts in System Dynamics (2009), Forrester showed:
However, I think the landscape has changed a lot, with more to come. Generally, the mental database hasn’t changed too much, but the numerical database has grown a lot. The funnel isn’t 1-dimensional, so the relationships have changed on some axes, but not so much on others.
Notionally, I’d propose that the situation is something like this:
The mental database is still king for variety of concepts and immediacy or salience of information (especially to the owner of the brain involved). And, it still has some weaknesses, like the inability to easily observe, agree on and quantify the constructs included in it. In the last few decades, the numerical database has extended its reach tremendously.
The proper shape of the plot is probably very domain specific. When I drew this, I had in mind the typical corporate or policy setting, where information systems contain only a fraction of the information necessary to understand the organizations involved. But in some areas, the reverse may be true. For example, in earth systems, datasets are vast and include measurements that human senses can’t even make, whereas personal experience – and therefore mental models – is limited and treacherous.
I think I’ve understated the importance of the written database in the diagram above – perhaps I’m missing a dimension characterizing its cumulative nature (compared to the transience of mental databases). There’s also an interesting evolution underway, as tools for text analysis and large language models (ChatGPT) are making the written database more numerical in nature.
Finally, I think there’s a missing database in the traditional framework, which has growing importance. That’s the database of models themselves. They’ve been around for a long time – especially in physical sciences, but also corporate spreadsheets and the like. But increasingly, reasonably sophisticated models of organizational components are available as inputs to higher-level strategic problem solving modeling efforts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00784.warc.gz
|
CC-MAIN-2023-50
| 2,182
| 7
|
https://islamhouse.com/en/videos/468758/
|
code
|
Lecturere : Abdurraheem Green
Reviewing: Muhammad AbdulRaoof
In this great episode Shaikh Abdur Raheem Green talks on the topic of How I Came to Islam, Hear the exciting story of how Abdur-Raheem Green came to Islam in this lecture.
How I Came to Islam
MP4 358 MB
How I came to Islam From Darkness To Light
How Is Snoop Dogg? And Muslims getting in the way of Islam
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863830.1/warc/CC-MAIN-20180620163310-20180620183310-00192.warc.gz
|
CC-MAIN-2018-26
| 365
| 7
|