url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
http://ivv.rit.edu/workshop/
|
code
|
What is an Interactive Video Vignette?
An Interactive Video Vignette (IVV) is a short single-topic video exposition for use in introductory physics courses. In a typical vignette, an instructor describes or demonstrates a physics phenomenon and gives a student the opportunity to make predictions and or observe or analyze the phenomenon. Analysis can include viewing a video of an event in real time or slow motion and then using video analysis to track the event frame by frame and/or viewing real time graphs that enable students to draw conclusions. Although each IVV is designed to be ungraded, instructors are encouraged to use completion credit to motivate students.
A video at the NSF 2015 Teaching and Learning Video Showcase gives a quick overview. To see some sample videos made by the LivePhoto Video Vignette Project, look on the project's website at www.compadre.org/IVV/.
What do I need to make my own IVVs?
There are several parts to this answer.
The hardest part may be getting a suitable website or web server for hosting your IVV. Many teachers already have websites, but they are often hosted in a way that prevents IVVs from working. This is because an IVV is not an ordinary web page, it is a web application. It consists of a folder that contains over a hundred files. Most of these are scripts and data files that students should never see. Many easy-to-create websites will allow you to upload individual files to the site, but not entire folders. Or, if they do allow folders, they may automatically show students a list of every file in the folder.
Unfortunately, web pages hosted by course management systems like Blackboard or social media systems like Facebook WILL NOT WORK.
At the workshop, you will get software that acts as a miniature web server on your personal computer that you can use for testing the IVVs you create. However, it is only for testing and will probably not be suitable for your students to use.
The easiest part of the answer is that, since IVVs contain videos, you will need a High Definition (HD) camera that creates video files. Many newer cell phones contain suitable cameras. You will need some way to get the video files from the camera into your computer. This could be as easy as taking a memory chip out of the camera and putting it into a special slot in the computer, or you may need to connect the camera to the computer with a USB cable. If you are using a cell phone, you may need to email the video to yourself. If you are not sure, check the manuals for your camera and your computer.
Finally, you'll (eventually) need IVV scripts. They are quite different from video scripts, because IVVs are interactive. You will learn how to write IVV scripts at the workshop.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118477.15/warc/CC-MAIN-20170423031158-00631-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,733
| 10
|
https://www.windowsbbs.com/threads/another-crudware-machine.108382/page-2
|
code
|
Click Start, click Run, type sysdm.cpl, and then click OK. On the Advanced tab, click Settings under Startup and Recovery. Under System Startup, click Edit. This will open boot.ini file in Notepad. In your case Notepad window will be empty. Copy following text: and paste it into open Notepad window. Go File>Save Close Notepad. Restart computer and see if you can run BootCheck.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589710.17/warc/CC-MAIN-20180717105812-20180717125812-00139.warc.gz
|
CC-MAIN-2018-30
| 379
| 1
|
https://developer.salesforce.com/blogs/developer-relations/author/sready
|
code
|
Lightning Out is a feature that extends Lightning Apps and acts as a bridge to surface Lightning Components in any remote web container. This means you can use your Lightning Components inside of an external site (i.e. Sharepoint or SAP), in a hybrid app built with the Mobile SDK, or even elsewhere in the App Cloud like on Heroku or in a Visualforce (VF) Page. This article covers the basics of how to put Lightning Components in Visualforce pages, and mitigate navigation for different app environments you might be using the component in simultaneously.
Samantha Ready's Blog Posts
The DevZone Call for Presentations is live and will help us understand what you want to present at DF15. Check out this blog for tips and examples to help you build your CFP submission.
We ran set of live broadcast channels cycling with different webisode content all throughout Dreamforce. We had 7 developer webisodes sprinkled throughout the 4 days, and focused on what makes Dreamforce so great for developers: new products, innovation, community members, and platform. We had over 150,000 people from all over the world tune into the 7 developer webisodes live, and you can view the individual recordings here.
This year at Dreamforce we are launching a new hands-on workshop program that is specifically designed for app builders of any technical or non-technical background to be able to build an app and tinker on the Salesforce1 Platform in the DevZone. You'll go through a 2.5 hour class with an MVP or Developer User Group (DUG) leader who will teach a series of lessons with hands-on exercises peppered in between. Don't miss out, sign up in Agenda Builder today!
I'm super excited to share that Dave Carroll and I will be going to Tel Aviv, Israel in a little over a week to lead a Salesforce1 Platform Elevate workshop! If you aren't familiar with our Elevate workshops, they are a FREE one-day hands-on developer workshop to give devs an introduction to the platform and get instructor lead lessons interwoven with several hands-on exercises to drive home the key points.
VT Hacks is an annual hackathon held in Cassell Coliseum at Virginia Tech. There were around 600 hackers, mainly from colleges all over the East Coast, but some of the hackers we met were in high school and even middle school. We saw a wide range of apps from flying drones controlled by Occulus Rift movements to physical mazes that could be solved by gestures over a leap motion controller. We awarded two very talented groups with the Salesforce1 Platform prizes, and this blog gives all the details.
Everyone says Twitter Bootstrap makes front-end web development faster and easier, but how can we prove that? Check out this blog to see a video of a simple Visualforce page being converted into a responsive, mobile first web page in a little over 3 minute. It covers the foundation for setting up a bootstrap project natively on Force.com.
With the Spring’14 release the Salesforce Analytics API allows users to dynamically choose date and get historical data. Check out this sample on historical trending to learn how you can build historical reports and then create visualizations off of that report metadata.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171271.48/warc/CC-MAIN-20170219104611-00146-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 3,191
| 9
|
http://www.yqcomputer.com/85_5566_1.htm
|
code
|
I need to delete a custom toolbar that appears in Excel 2007 Add-Ins, in
order to re-install a newer version. The toolbar does not appear in the
customize dialogue via the Office orb.
I believe the operation I want to perform can be done in Excel 2003 through
the Tools>Toolbars dialogue, where one can select toolbars (including custom
ones) for deletion.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347394756.31/warc/CC-MAIN-20200527141855-20200527171855-00166.warc.gz
|
CC-MAIN-2020-24
| 356
| 6
|
https://www.freelancer.com/job-search/net-web-application-kinect/
|
code
|
I am planning to make a kinect interactive game in shopping mall. There will be a 62" monitor to display the game and a kinect to detect the motion to play this interactive game. For further detail, please firstly show me your past kinect project, ***send me exe. game installation file for testing.***
A server software that can control several PCs with Kinect V2 - if the record button of the UI is clicked, the client will record at the same time -if the stop button of the UI is clicked, the client will send the excel file. A client software that collects data from Kinect V2 -displays the skeletal data -saves the 3D coordinates and time stamp
An application using MS Kinect V2 -can display the skeleton points -the 3D (x,y,z) joint points is saved in an excel file -includes the time stamp per frame -utilizes the 30fps of the MS Kinect -with a button that can stop and start the recording of data
want to create an experience exactly as in the attached videos: 1-users kan see themselves in the screen 2-if they lift their hand and there is no one beside them, they kan see themselves as a mini standing on their hands 2-if there is a second person beside them, one of them is carrying the other 3-there is a capture button, countdown and then the photo is saved in a specific folder [url r...
Hi all, I have a client who is planning to make a kinect interactive game in shopping mall. There will be a 62" monitor to display the game and a kinect to detect the motion to play this interactive game. Please show me your ideas, your past portfolio about kinect games, then we will start discussing detail.
...who can make changes to our Kinect based Virtual Trial Room application. Our application already tracks the person and wraps a 3D model(Garment) on the body. Now instead of a garment, we need a virtual spider to crawl on the person's body. DO NOT apply if you have no prior experience on working with Microsoft Kinect. Note: Attached video shows
necesito desarrollar un simple juego de kinect, donde al exponerse 2 personas frente al kinect, en la tv les cambie la cabeza por un muñeco. Presupuesten lo que crean necesario, calificare 5 estrellas al ganador y le pasare mas trabajos! gracias a todos
I need you to develop some software for me. I would like this software to be...some software for me. I would like this software to be developed for Windows using C or C++. A software that scans faces through 3d depth cameras such as Realsense cameras or Kinect v2 and create a ready rigged face that is animatable and exportable. <SIMILAR TO FACESHIFT>
...develop some software for me. I would like this software to be developed for Windows using Java. Ideally there will be a program created capable of using the sensors in the kinect; to read body movements and process the movements in contrast to a pre-established set of criteria of perfect performance parameters. Any movement outside of the parameters
Using kinect technology the device should followed the person’s movement and analyzed it in real-time. When a person gets close to it, the app scanns the person’s face or body, take a picture and looked for a good model for it. On an 80-inch screen, using their gestures, they could freely change their outfits- jackets, jumpers, and shoes. The person
I need a photobooth software base on windows with or without kinect v2 + dslr that enable to analyse user interraction (like air gesture) enable to take a picture enable to put overly PNG or video files over pictures enable to removed background software layout can be customized allow to use virtual props (like hats glasses etc
Hello, We would like to have an interactive duck pond projected using Microsoft RoomAlive. Microsoft RoomAlive uses a Microsoft Kinect sensor to track movement. The software for RoomAlive is open sourced and available on GitHub, [url removed, login to view] Here are some reference videos to quickly familiarize yourself with the
I need you to develop some software for me. I would like this software to be developed for Windows using C or C++. Detection Engine Uses a depth camera (Intel RealSense, Kinect or other) Auto Calibration process - Detect image and set corners automatically Detect people walking in front of a screen, or across the floor (if camera is mounted above)
Skeleton tracking program (source code) using a 2D camera using a normal web camera to real-time Human body skeleton detection and tracking Joints detection. (Without using depth camera, or Kinect camera ...etc) Prefer programming in Visual Studio C# programming.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102891.30/warc/CC-MAIN-20170817032523-20170817052523-00702.warc.gz
|
CC-MAIN-2017-34
| 4,554
| 14
|
https://www.explainxkcd.com/wiki/index.php/107:_Snakes_on_a_Plane!_2
|
code
|
107: Snakes on a Plane! 2
|Snakes on a Plane! 2|
Title text: James suggested this, and I'd have to agree. It'd be much worse.
Snakes on a Plane is a 2006 movie starring Samuel L. Jackson. It features (surprisingly) snakes, on a plane, attacking the passengers. This comic proposes a sequel, taking the idea to the next level, making things infinitely worse: snakes on every plane!
To have snakes on every plane is much worse than snakes on just one, as many more innocent bystanders would be injured or killed, and the entire aviation industry would be destroyed. Plus it would be difficult, as there were hundreds of snakes in a single plane in the first movie, so finding enough snakes would be a challenge itself. Since the original movie was generally considered to be quite bad, there is an implied double meaning in the suggested poster, that the movie itself would be "Much Worse Than Last Time."
In the title text, Randall credits James with the idea.
- [A sky full of jumbo jets is shown in movie poster format.]
- Top of the poster: From the creators of last summer's hit thriller Snakes On a Plane comes:
- Superimposed on the sky and planes: Snakes... on EVERY Plane!
- Much worse than last time.
add a comment! ⋅ add a topic (use sparingly)! ⋅ refresh comments!
I think he's also implying that it was a bad film and the sequel will be much worse OmiWan (talk) 23:06, 16 January 2013 (UTC)
I like proposing the parody of "Snakes On The ISS" because one, everything is cooler in space, two, I'm obsessed with the ISS, three, we can imagine the snakes destroy the Soyuz docked and now we have snakes flailing around unthreateningly in microg. XD International Space Station (talk) 04:17, 7 December 2015 (UTC) mmm cooked snake meat...
- Snakes On The HISS? --
Maybe he's saying planes as in planes of reality, as well as airplanes. 21:29, 15 December 2016 (UTC)~
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654031.92/warc/CC-MAIN-20230608003500-20230608033500-00013.warc.gz
|
CC-MAIN-2023-23
| 1,876
| 15
|
https://forums.autodesk.com/t5/inventor-forum/edit-styles-templates/m-p/3435527?nobounce=
|
code
|
I would like to edit our styles librairys to change the font size on drawings and to add some custom Ipropertys to parts and assemblies. I am the vault administrator with lots of power and no knowledge.I have gone to the project selection screen as shown and can select the "use styles library" tab to change it but it is rear only even though I should have privlages.to make changes but I am not able to change this to read/write to make the changes.
Can someone instruct me as to where to go, and how to make things read/write?
We are using Inventor 12 as well as the plane vanilla vault 2012 package.
guessing here since it's been yrs since I used Vault, but don't you have to check the Project File out of Vault in order to be able to make changes to it?
That's assuming you actually check your Project Files into Vault...
Where I used to work we used a single Vault Project File that was checked into Vault, then as advised by our software vendor I would keep the Project File checked out to myself in order to prevent other users from making any changes to it.
To modify the Drawing template you need to open the template itself, then on the manage tab, click styles editor. All the parameters for Drawings are available there.
To customize your title blocks etc.... edit them while you are editing the template file.
The template file is normally located here (Windows 7):
Once you have edited the template to your liking save it as Standard.idw. You may need to rename the existing template before editing it.
BTW Inventor 12 is a different version to Inventor 2012. Inventor 12 was released around 2008.
Guys, Thank you for the I 12 and I 2012 clarification. Yes we have upgraded to 2012. I am able to access the template to change it. However the problem remains that it is read only as shown in the screen shot above. When I right click to change to read/write, the options are grayed out and I am not able to reset it. This is the area I need help on presently.
Your project is read only!
either check the .ipj file out from the vault (open any file from the project, go to the vault tab in the browser, right click the project and checkout)
or maybe its because someone else is using it (if another user has the project loaded and inventor open, then it will be greyed out for others to edit)
maybe even check the file properties through windows (detick the readonly)
Jim, I get [Library - Read Only] in the Window Title Bar whenever I am in the styles editor, yet when I change the parameters I want to and click save, it saves the relevant information into the template file.
This behaviour is present in 2013 also, and I assume it is because the styles are read from the library which is read-only, however, at least any overrides are saved into the document, in this case, Standard.idw.
This is only theory on my part, but I believe it may explain what is happening?
A similar thing occurs in the appearance editor, where the Autodesk titled libraries are also marked as read-only, but they can be edited and saved from those libraries into other libraries.
You may be on to something. I knew that it was read only but as the Admin. i am trying to find out how to make it not read only so I can edit the template. I know other usere have projects checked out. Si is the answer that I need to have everyone else check in all their projects at the end of the day and change this while they are gone?
Search the Autodesk Knowledge Network for more content.
New: Get an Activation Code
Mac OS X 10.12 Support
Windows 10 Support
Autodesk Online Store Help
Serial Numbers & Product Keys
Installation & Licensing
Online Activation & Registration
Network License Administration
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122720.81/warc/CC-MAIN-20170423031202-00391-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 3,686
| 30
|
https://mlpg.co/qt/res/92657.html
|
code
|
2.0 Expanded Skills All Classes Drafthttps://docs.google.com/document/d/1nFUpH6244VhfUKP3p_3PfYyUSD3Aurq4nAq7-VluS1w/edit#
Contains a (as of writing) list of expanded skills for all classes, as well as updated core skills. Once ready, it will be picked apart to create the Expanded Skills list and update the Core Skills
2.0 Expanded Skill Proposalshttps://docs.google.com/document/d/1Y-zzUBKSvnpRBFY7GY3CfCTd69teCH28AxePGLIy610/edit#heading=h.cfpmfj6ad5pj
This is the "Idea Pool" for Expanded Skills, from which ideas will be taken for use in the Expanded Skills list, either as-is, or with some reworking.
Would it be possible to sticky this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00538.warc.gz
|
CC-MAIN-2023-14
| 644
| 5
|
https://optimization-online.org/2007/09/1780/
|
code
|
In this work, we take advantage of the powerful quadratic programming theory to obtain optimal solutions of scheduling problems. We apply a methodology that starts, in contrast to more classical approaches, by formulating three unrelated parallel machine scheduling problems as 0–1 quadratic programs under linear constraints. By construction, these quadratic programs are non-convex. Therefore, before submitting them to a branch-and-bound procedure, we reformulate them in such a way that we can ensure convexity and a high-quality continuous lower bound. Experimental results show that this methodology is interesting by obtaining the best results in literature for two of the three studied scheduling problems.
doi:10.1016/j.ejor.2009.03.049 European Journal of Operational Research Volume 201, Issue 3, 16 March 2010, Pages 729-736
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474526.76/warc/CC-MAIN-20240224080616-20240224110616-00359.warc.gz
|
CC-MAIN-2024-10
| 838
| 2
|
https://www.lifeingis.com/generating-dem-from-contours-in-qgis/
|
code
|
Well, Today was a great day. A colleague asked, “Can I generate a DEM of my region using QGIS?” This was my answer to them “YES”. Then they asked me “How?” I ended up spending the next hour doing the demo on my laptop for them to grasp the rough idea of how to go about this issue.
That question motivated me to write this post so as to anyone out there who might be stuck in this issue like my good friend.
Here are the steps for generating a DEM (Digital Elevation Model) from CONTOURS using GRASS Plugin in QGIS (QGIS DEM)
To start, ensure you have the GRASS plugin installed in your QGIS (Plugins > Manage and Install plugins >GRASS)
Load the “Contours”vector layer in QGIS.
Go to GRASS under the Plugins Menu
Select “New Mapset”.On the Grass Database window, select the folder in which your project will be stored and Click “Next”
On the Grass location, select “Create new location” give it a name and click “Next”.
A GIS user with interests in web and desktop systems development, FOSS advocate, trainer and mentor. Lives in Nairobi but finds adventure in travelling.
The "Life in GIS" phrase is as a result of the many told and untold stories in the Geospatial realm.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00033.warc.gz
|
CC-MAIN-2023-40
| 1,206
| 10
|
https://forum.facepunch.com/t/slim-ps2/3425
|
code
|
[release][tab]Name:[/tab] SLIM PS2
[tab]Version:[/tab] V 2.0
[tab]Description:[/tab] Slim PS2 and PS2 Memory Card
[tab]Requirements:[/tab] The need, the need for speed. G-mod, A Brain
[tab]Download:[/tab] See post. [/release]
Anyways the short awaited Slim PS2 is here. 2 models are included in the download, the PS2 and a 8mb memory card.
Version one contains: 1 ps2 and 1 memory card.
Version 1 download link.
Version two includes, Both Version 1 and 2’s PS2’s. 2 memory cards, both equally fucked physics wise, 1 controller that’s horribly skinned, and 1 plug for the controller.
Download link for Version 2:
Note: Tell me if I f’d up anything in the download.
Note: Filefront links to be up for backups later today.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151699.95/warc/CC-MAIN-20210725143345-20210725173345-00369.warc.gz
|
CC-MAIN-2021-31
| 727
| 12
|
https://whatculture.com/videos/8-oldest-dc-universe-characters
|
code
|
Get Surfshark VPN at https://Surfshark.deals/whatculture - Enter promo code WHATCULTURE for 83% off and 3 extra months for free!
For more awesome content, check out: http://whatculture.com/
Follow us on Facebook at: https://www.facebook.com/whatculture
Catch us on Twitter: https://twitter.com/wc_comics
Voiceover: Jules Gill.
Video Editor: Dan Durkin.
Original Article by Ewan Paterson can be found here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301670.75/warc/CC-MAIN-20220120005715-20220120035715-00328.warc.gz
|
CC-MAIN-2022-05
| 405
| 7
|
https://discuss.elastic.co/t/question-can-i-add-the-ip-that-issued-a-command-to-that-command/294932
|
code
|
Context: auditbeat on RHEL, auditd module
Ideally, I would like to remove a ton of fields that are of no use to a human being (not related to this topic), and add a field that would show me the IP that issued a given command.
- user issues "somecommand.sh"
- Audit log will show (desired result): [host-command-issued-on][user-IP][command-with-args]
(this is a pseudo audit record, just to show the desired IP part of the result)
Unfortunately, though I saw there was an option to add custom fields, I cannot find anything on them being based on custom code, and if I just add "source.ip", it doesn't catch anything (I assume because that field does not exist for these entries).
Is there a way of doing this?
If there's a built-in way of doing it that would be ideal, but if the way is something that lets me add a field based on custom code that will also work, as I do have some sh code that can link an IP to a PID... Provided it can be fed said PID.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529658.48/warc/CC-MAIN-20220519172853-20220519202853-00426.warc.gz
|
CC-MAIN-2022-21
| 954
| 8
|
https://www.mist.com/documentation/what-is-the-difference-between-ap-deauthentication-and-client-deauthentication/
|
code
|
Deauthentication is not a request, it is a notification
If a station wants to deauthenticate from an AP, or if an AP wants to deauthenticate from stations, either device can send a deauthentication frame. Because authentication is a prerequisite for association, a deauthentication frame will automatically cause a disassociation to occur. Deauthentication cannot be refused by either party, except when management frame protection (defined in 802.11w) is negotiated and the message integrity check MIC fails.
The deauthentication service is invoked when an existing Open System, Shared Key, or SAE authentication is to be terminated. Deauthentication is an SS. In an ESS, because authentication is a prerequisite for association, the act of deauthentication causes the STA to be disassociated.
When troubleshooting deauth issues it is important to look at the reason code
Here is the complete list of Reason Codes as per IEEE 802.11-2012 standard:
Once a station associated to an AP, either side can terminate the association at any time by sending a disassociation frame. It has the same frame format as a deauthentication frame. A station can send a disassociation frame because it is leaving the current cell to roam to another cell. An AP can send disassociation frame when stations try to use invalid parameters (The reason codes given above are also applicable to disassociation frames as well). You can filter disassociation frames in Wireshark using the filter: subtype 10 management frames
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476464.74/warc/CC-MAIN-20240304165127-20240304195127-00166.warc.gz
|
CC-MAIN-2024-10
| 1,499
| 6
|
http://wiki.apidesign.org/wiki/Gradle
|
code
|
These days it is common to praise Gradle and dishonest Maven. It is hard to find articles like Maven's Inflexibility Is Its Best Feature that would try to put some balance into the build tool flamewar raging around.
It is true that Maven is far from perfect, and possibly Gradle learned from Maven mistakes in many areas, but there is one thing where Gradle regressed totally - and which I consider far bigger problem than any shortcomings of Maven: Gradle brought halting problem into your build job!
Why Should I Care about halting problem?
If you don't know what a halting problem is, you may belong into the camp of people who believe one can write program to solve any (digitalizable) problem. Well, you cannot - there are (digitalized) problems that computer's cannot solve - halting problem is core one with huge implications: As a result of halting problem existence it is impossible to write a program that would completely understand behavior of all other programs.
That of course won't stop people from trying to write such program (as illustrated in the essay about finite automaton), but the only way to really analyse what a program does is to restrict language in which it is written!
Declarative vs. Imperative
Restricted language is in my opinion the biggest difference between imperative and declarative specification of actions (and by declarative I don't mean functional as such languages suffer from halting problem presence as well). A declarative language/specification should not allow people to express everything that is possible in (Turing complete) imperative language.
Btw. the important element that needs to be avoided is while construct - e.g. repeating some code block indefinitely - repeating something via for cycle - e.g. given number of times (with respect to particular input) is OK. Languages that restrict itself to just fixed number of for repetitions fall into the wikipedia:Primitive_recursive_function definition and are not subject to halting problem - all of them halt.
Ant is in general considered too lowlevel, too imperative. It doesn't have direct way to express while, but as it has a way to invoke a target recursively, it is also subject to halting problem. As a result it was impossible for a tool like NetBeans to analyse a generic Ant script and extract for example project's classpath and/or test classpath without really starting the build. In spite of that NetBeans IDE 4.0 used Ant as its default build harness and supported two way editing - one could change scripts and configutation files from a command line and the IDE was able to pick the changes up and adjust its settings automatically. However, this worked only for small subset of Ant projects with well defined structure the NetBeans IDE could understand to.
Some (especially Ant fans) consider Maven too magical. Doing too many things in a blackbox. Well, that is what one gets when doing things in declarative way - you don't specify commands to compile, copy, delete like in Ant - you express intentions. What actions your intentions result too is a blackmagic. Maven's language to express intention is a DSL embedded into XML. Yeah, the XML hype is over - but clearly there is no way to express while statement and as such the Maven configuration is not subject to halting problem and it can be analyzed by the tools. When NetBeans IDE decided to support Maven out of the box, we "only" needed to teach it to understand the pom file dependency section and few configuration options of most commonly used plugins (like maven-compiler-plugin - to read the source and target levels, encoding, etc.). Understanding completely unknown Maven projects became easy - just open them in the IDE and all the settings are immediately known. Change the pom file on disk, and the changes are immediately reflected. Don't believe it? Get latest version of NetBeans and give it a try - Maven support in NetBeans is really smooth.
Now you can probably see what is the biggest Gradle flaw. Yes, by choosing Groovy (which support while and as such is subject to the halting problem) as its configuration(!) language the system immediately lost all its tooling potential. We are back in the Ant-age! You need to run the build to understand what it will actually do. From a tooling story perspective: Gradle is total disaster.
Hacking vs. Defining Patterns
We have all heard about design patterns and how useful they are. Maven in fact excels in defining such patterns: Do you want to compile using JavaC? Well, there is the maven-compiler-plugin - the plugin is in fact pattern - it is a solution to recurring problem. But rather than trying to recognize the pattern from a (Java or Groovy) source code, you directly speak the pattern's language - you name it in the pom file and declaratively adjust it to suite your particular use-case. The fact that one has to use different language (well over hyped XML) to express a use of a pattern is in fact perfect - one can stays clueless - and is not tempted to hack.
Of course, some things cannot be achieved by using existing patterns (e.g. Maven plugins). What one has to do then? Define new pattern! E.g. create new Maven plugin - e.g. solution to recurrent problem - code it in Java, but hide the code and expose only its declarative configuration. How structured! How architectural! How much better than classical hacking! Of course one can run into the halting problem issues in Java, but it is far easier to verify correctness of implementation of few patterns than check correctness of every build script.
Because we all know what you do when ready made solution cannot be found in Ant and alas, also in Gradle: you hack. You use all the power of complete programming language around to write a solution. Thinking about patterns comes later - if ever! As a result majority of Gradle build scripts will have some non-standard customization.
Gradle teaches you to hack. Maven teaches you to design!
Cloud and Security Issues
Maybe you are a Gradle fan and nothing mentioned so far convinced you. At the end, what is wrong on having build system subject of unidentified complexity. You run it and when it computes the classpath, you write it down into static file which can then be consumed by various IDEs. Yes, this is possible, but it is upside down! Moreover unsecure.
Generic information like classpath, etc. should be extractable without running unknown code. So the core of the build configuration should in fact be those files consumed by IDEs. If there is anything else needed for the actual build, it could be written in Ant or Groovy (in spite I would rather advocate using AnnotationProcessors as much as possible). But the core aspects of the project should be understandable without running any code. Because you don't want your IDE to hack your computer after you checkout a GitHub project and browse to its sources or open one of its files in editor!
Another issue is CPU time: there are tons of services around the globe (Ohloh comes to my mind) that provide you indexing services over source code. Usually they just analyze commits, do static analysis of the code, etc. But there is nothing stopping them to understand structure of Maven projects and know cross-dependencies and resolve symbols to proper fully qualified names. However nobody is going to offer such service for generic Gradle projects! Because in order to analyze them you need to run foreign computation and that can eat enormous amount of CPU and do potentially anything and nobody is willing to offer free computation time so easily to everyone!
Gradle is designed to be insecure and hackers (real ones, not coders) have to love that!
My friends keep talking about the greatness of Gradle and when I bring the problem of Turing completeness - e.g. halting problem - they just nod their heads, admit tooling is a problem, but continue to use Gradle. Fine with me. By writing this essay I don't expect people to stop using Gradle - I just want them to stop claiming Gradle is superior to Maven.
This essay attracted attention of Gradle community (for example Schalk Cronjé's post) and I received some valuable feedback. I don't think it can change anything on the points raised in this text as facts are facts, but it is useful to have wider context and understand motivation.
The road to hell is paved by best intentions - and I am sure Gradle guys know it. If you listen to whole (or just jump to 48th minute) presentation by Hans Dockter, the father of Gradle, you will notice. Let me quote: "We just don't know if someone calls System.currentTimeMillis() here... This is I would say the biggest design flaw!"
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125074.20/warc/CC-MAIN-20170423031205-00600-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 8,655
| 24
|
https://tuto-computer.com/programming/350-getting-started-mongodb.html
|
code
|
MongoDB is a document-oriented NoSQL database. As we will see, the whole system revolves around this document management, including the query language, which makes it its strong point. We are going to tackle now the setting up of a Mongo server and how to integrate your data in this environment.
Table of contents
|Size :||1229.071 Kb|
|File type :|
Download free pdf training course in pdf about Spring MVC under 315 pages intended to beginners....You Don't Know JS Yet: Get Started
Download free course You Don't Know JS Yet: Get Started, pdf file on 143 pages by Kyle Simpson....Create a C# Project with Visual Studio Code free PDF
Download a free training document material about the Framework Spring MVC ,this pdf tutorial is a complet reference guide to Spring Framework features under 904 pages designated to all student level....Webapps in Go
The book teaches you how to write web applications in Go without using a framework. It is ..., download free Go tutorial in PDF (185 pages) created by ....Open Data Structures (in C++)
Download free course Open Data Structures (in C++), pdf file on 336 pages by Pat Morin....Introduction to C and GUI Programming
The popular C programming language is used for a huge range of applications, from the tiny microcontrollers used in toasters and watches up to complete operating systems....Scratch programming PDF tutorial
Download free PDF tutorial about Scratch programming, document under 29 pages by Neil Rickus....Download Ada Programming Tutorial
Download Ada PDF Tutorial for free, it consisting of 42 chapters and 410 pages covering all the most important Ada concepts. This tutorial is intended for beginner programmers, and we recommend you to go through all the chapters, to get the most out of it as possible....
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00165.warc.gz
|
CC-MAIN-2023-40
| 1,772
| 12
|
http://www.mietc.co.kr/eng/sub02/area.php
|
code
|
IT infra deployment
IT system installation, deployment, and test service that customers require to strengthen the competitiveness of IT services based on H/W and S/W
Proposal and deployment of the best solution for customers who wants high-performance computing such as CPU & GPGPU cluster service, graphics render farms, etc.
Optimized product design, development, deployment, and consulting service for B2B customers based on their environment and requirements
IT infrastructure maintenance service including the consulting for IT systems operated by the company
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335190.45/warc/CC-MAIN-20220928082743-20220928112743-00089.warc.gz
|
CC-MAIN-2022-40
| 564
| 5
|
https://aclanthology.org/people/s/shufan-wang/
|
code
|
Phrase representations derived from BERT often do not exhibit complex phrasal compositionality, as the model relies instead on lexical similarity to determine semantic relatedness. In this paper, we propose a contrastive fine-tuning objective that enables BERT to produce more powerful phrase embeddings. Our approach (Phrase-BERT) relies on a dataset of diverse phrasal paraphrases, which is automatically generated using a paraphrase generation model, as well as a large-scale dataset of phrases in context mined from the Books3 corpus. Phrase-BERT outperforms baselines across a variety of phrase-level similarity tasks, while also demonstrating increased lexical diversity between nearest neighbors in the vector space. Finally, as a case study, we show that Phrase-BERT embeddings can be easily integrated with a simple autoencoder to build a phrase-based neural topic model that interprets topics as mixtures of words and phrases by performing a nearest neighbor search in the embedding space. Crowdsourced evaluations demonstrate that this phrase-based topic model produces more coherent and meaningful topics than baseline word and phrase-level topic models, further validating the utility of Phrase-BERT.
Systems for story generation are asked to produce plausible and enjoyable stories given an input context. This task is underspecified, as a vast number of diverse stories can originate from a single input. The large output space makes it difficult to build and evaluate story generation models, as (1) existing datasets lack rich enough contexts to meaningfully guide models, and (2) existing evaluations (both crowdsourced and automatic) are unreliable for assessing long-form creative text. To address these issues, we introduce a dataset and evaluation platform built from STORIUM, an online collaborative storytelling community. Our author-generated dataset contains 6K lengthy stories (125M tokens) with fine-grained natural language annotations (e.g., character goals and attributes) interspersed throughout each narrative, forming a robust source for guiding models. We evaluate language models fine-tuned on our dataset by integrating them onto STORIUM, where real authors can query a model for suggested story continuations and then edit them. Automatic metrics computed over these edits correlate well with both user ratings of generated stories and qualitative feedback from semi-structured user interviews. We release both the STORIUM dataset and evaluation platform to spur more principled research into story generation.
Literary critics often attempt to uncover meaning in a single work of literature through careful reading and analysis. Applying natural language processing methods to aid in such literary analyses remains a challenge in digital humanities. While most previous work focuses on “distant reading” by algorithmically discovering high-level patterns from large collections of literary works, here we sharpen the focus of our methods to a single literary theory about Italo Calvino’s postmodern novel Invisible Cities, which consists of 55 short descriptions of imaginary cities. Calvino has provided a classification of these cities into eleven thematic groups, but literary scholars disagree as to how trustworthy his categorization is. Due to the unique structure of this novel, we can computationally weigh in on this debate: we leverage pretrained contextualized representations to embed each city’s description and use unsupervised methods to cluster these embeddings. Additionally, we compare results of our computational approach to similarity judgments generated by human readers. Our work is a first step towards incorporating natural language processing into literary criticism.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302355.97/warc/CC-MAIN-20220120160411-20220120190411-00622.warc.gz
|
CC-MAIN-2022-05
| 3,740
| 3
|
https://listserv.heanet.ie/cgi-bin/wa?A2=HEANET-FAULTS;dee3a4c2.0802
|
code
|
Ticket Number: HEA-NOC/20080205-1 Ticket Status: UPDATE
Ticket Type: scheduled Resolver: HEA-NOC
Ticket Opened: 20080205 10:24 UTC Problem Start: 20080205 09:54 UTC
Ticket Update: 20080205 11:06 UTC Problem End:
AAAA (IPv6) records have been added to 6 of the root name servers:
Configure the HEAnet DNS resolvers to use the new addresses. Queries to a,
f, h, j, k and m root servers will go over IPv6 by preference.
20080205 09:53 RG Open ticket to track work.
20080205 10:49 RG All resolvers updated with the new root hints file. Will
keep ticket open for the rest of the day to monitor.
This ticket can be monitored at http://www.hea.net/tickets/20080205-1
HEAnet Limited. Registered in Ireland, No. 275301.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256812.65/warc/CC-MAIN-20190522123236-20190522145236-00162.warc.gz
|
CC-MAIN-2019-22
| 710
| 12
|
https://community.f5.com/t5/technical-forum/problem-native-windows-remote-desktop/m-p/212446
|
code
|
F5 AppWorld 2024 session proposal deadline extended to Friday, December 8th!
i already to configure portail ressource and webtop , i add remote desktop type session host.
after i create certificate in windows server via iis , and i configure this certificate in ssl profile client and server.
for test when click file.rdp show me page connxion after to click connect ,display me message error
"This computer can't verify the identity of the RD Gateway "apm.example.com"
please can you to help me for fix this problem
or learn more...
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00158.warc.gz
|
CC-MAIN-2023-50
| 533
| 7
|
https://forum.ionicframework.com/t/ionic-application-for-document-scanning/94854
|
code
|
Good evening everyone,
I wrote a topic earlier about implementing the feature of scanning documents like the “cam scanner” application that is offered in appstore and google play in an ionic application… you can find the post that I wrote here:
And one of the moderators replay me with this post:
I visit the site provided in the above link but the proplem was that the platforms supported by this plugin is the native ones as will as cordova …
Can i use this cordova plugin as the website says to included on my ionic application??
Any one can record to me how to configure it and test it in an ionic 2 or 3 doesn’t matter which version of these two, the thing i realy want is to implement this feature sence i really really need it ASAP for my senior project.
Thanks in advance:)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662577259.70/warc/CC-MAIN-20220524203438-20220524233438-00358.warc.gz
|
CC-MAIN-2022-21
| 791
| 7
|
https://topofleaked.com/nicolatyas-leaks/
|
code
|
OnlyFans Nicolatyas Leaked content availabe for free:
Instead of paying 9.99$ monthly to Nicolatyas and OnlyFans we provide you Nicolatyas Leaked content for free on our website.
NICOLATYAS OnlyFans Leaks
*In case we have a lot of users on our website, we need to verify that you are human to get access to Nicolatyas onlyfans leaks.
How to get NICOLATYAS OnlyFans Leaks
Its easy to get NICOLATYAS OnlyFans Leaks. Just go to creator page as you are now on NICOLATYAS Leaks page. Click on the button Preview Leaks (if you want to just preview 9 photos and 11 videos of Nicola Tyas OnlyFans profile for free. Or click on Direct download so you can save to your PC/Phone NICOLATYAS free OnlyFans leaked content.
Search terms for NICOLATYAS OnlyFans
- * Nude Nicolatyas photos
- * OnlyFans Nicolatyas Leaked
- * Nicolatyas Leaked
- * Free photos of Nicola Tyas OnlyFans
- * OnlyFans Nicolatyas
- * Leaked Nicolatyas
- * Nicola Tyas Leaks
- * Get Nicola Tyas for free onlyfans
- * Nicola Tyas leaked videos
- * Nude photos free of Nicolatyas
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359976.94/warc/CC-MAIN-20211201083001-20211201113001-00411.warc.gz
|
CC-MAIN-2021-49
| 1,036
| 17
|
https://elixirschool.com/blog?page=1
|
code
|
Articles authored by Elixir School contributors and members of the community.
Reviewing Elixir Conf EU 2019
ElixirSchool was invited to participate in a conference for the first time! Our own @gemantzu was there, and has a lot to say!
Using Channels with LiveView for Better UX
Tracking Users in a Chat App with LiveView, PubSub Presence
Use Phoenix Presence in your LiveView to track user state with just a few lines of code.
ElixirConf 2019 Announcement
Join us this year at ElixirConf 2019 for the first ever Elixir School workshop!
TIL Using Erlang Ports
Use Ports and GenServers to communicate from your Elixir app to processes running outside the Erlang VM.
Building Real-Time Features with Phoenix Live View and PubSub
Integrate Phoenix PubSub with LiveView to build real-time features capable of broadcasting updates across a set of clients.
TIL Ecto Constraints and Validations
Let’s take a look at how Ecto handles these two ways of ensuring data integrity
Walk-Through of Phoenix LiveView
Learn how to use Phoenix LiveView for real-time features without complicated JS frameworks.
Elixir Supervisor Strategies
Learn the ins and outs of Elixir’s 3 supervisor strategies
Support non-blocking, async GenServer initialization callbacks with OTP 21’s nifty
Plug.Router application to Heroku
Want to put your app in the real world? Today we do it with Heroku!
Want to schedule something to run later? Need a reoccurring task? Today we learn how!
Building web apps with Plug.Router
When it comes to building a web application with Elixir many people will immediately reach for Phoenix.
However, did you know
Plug.Router is just as viable an option?
Sometimes, it can be even faster.
Understanding Recursion with Elixir
De-mystify the concept of recursion and gain a deeper understanding of how and why to use it by writing our very own recursive function in Elixir.
Connecting Elixir to Kafka with Kaffe
A codealong to help connect Kafka to your Elixir project with the wrapper Kaffe.
TIL How to Run Tests for One Child App in an Umbrella
Run all of the tests, or just a specific tests, for a given child app in an umbrella application with this handy command.
TIL How to Run Ecto Migrations on Production
What to do when you can’t use
TIL about ExUnit’s capture_log option
Capture the output from Logger to clean up your test runs
Did you know you could label your output? Neither did we! Check out today’s TIL to learn more.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.42/warc/CC-MAIN-20231203161435-20231203191435-00383.warc.gz
|
CC-MAIN-2023-50
| 2,442
| 38
|
https://www.br.freelancer.com/work/database-using-binary-trees-java-programming/
|
code
|
...inside so I can carry on with my translation project. I did some research and questions on the net and got some feedbacks that it requires to have some sort of binary file structure or using its exe to read it. I am no programmer, I do not understand any of it in fact. Since it is a game, I know it have a exe to run the .dat files and I think the files
I can't process this file using apache commons compress, or normal zip, have tried using repair on winrar etc but no luck. The file is a cfbf (compound file binary format) file within which is a set of files, one of which is called CaseWareDocument. This file appears to be a variation of a zip64 archive - you can browse the contents to see the file
Looking for a java develedev who can integrate LibreOffice with spring boot to provide collaborative document editing.
...will display the options for the visitor to purchase a product. There are a number of options to select, possibly 10 or more. All of the values for each option are in a MySQL Database. I will be building the form with all the options. When the form is submitted the calculations need to take place. Most of the questions on the form are Yes/No with a couple
I need a logo designed.
I would like the Kansas Jayhawk M...if it will work. If not no worries. Also if the Jayhawk mascot could be masculine/ripped that would be great! Feel free to include any scenery items you feel fit (ex. palm trees, ocean, sun, etc). If you have a better idea/way to include the above in a logo, feel free to shoot it over. I'm open to all suggestions
...shipping management, payment and taxes management etc. Full specific details will be given when you start the project. You need to integrate this ecommerce to a Direct selling/ Binary MLM concept which includes all relevant features like network management, commisions management, payments management etc. Bid with brief and accurate information and also provide
Attach PDF files for projects SOWI and FLOWI. First we need a waterproof ultrasonic sensor to detect trees. Second, design a PCB BASE with wifi, inputs, ouputs, … for SOWI and FLOWI. Third, design APP for: -One SOWI. -FLOWI. -Two SOWI (SOWI+). We start with an small project (SOWI wired) but we will add more work with Android APPs.
...though modern logo for the text "LoveThüringen". The logo should combine two elements: 1) a heart and 2) an element related to nature, e.g. green woods, green meadows, green trees etc. In addition, the text "#LoveThuringia" should be placed at the bottom of the logo. The general appeal of the logo should raise associations to friends of nature, organic
...the words Youngbuck. The image should give a bold, powerful and strong feeling. I was thinking the youngbuck could be at the bottom the build the image up through pine trees into a bold looking silhouette of a stag? However I'm happy for any alternatives you may think are better. I will add some images and you can use those for ideas or have
...question is: [login to view URL] Username: lukejnutkins@[login to view URL] Password: Test1234 The tasks I need completed are: *Repointing the database to a new one. *Changing the text of a green bar chart on the homepage. *Writing 3 classes to communicate with an existing API service which calculates the future value of
I am looking for a university student or anyone with some spare time to do some research on how to pull/fetch PUBIC and PRIVATE repos into a container at docker build stage (not run stage). Some ideas: OAuth refresh token SSH keys More details: I have a docker swarm service which contains a PHP project stored in a private repo on github xor gitlab xor bitbucket. The container's dockerfil...
I Need an easy software for autoprint email bod...free outlook plugins, that work right or cheap commercial products too but I wish something mine. Probably I will use on Windows but maybe I can use on Linux so I think that java will be the right choice for be free to change SO, anyway I can consider other solution too; any offer will be appreciated.
...very talented illustator who can help me to dwar my ides for my project. I need a mandala shaped art work, which will includ a mix of armenian and ukrainian ornaments, some trees, pomegranets , flowers , green grape leaves, may be some small shapes of girls in the clothes with national ornaments , shapes of ukrainian or armenian national musical instruments
Need to convert IPTV stream (h264 and h265) to DVB-T or ISDB-T. This converted stream need to output via coaxia cable. Will discuss more with the candidates.
...read. 8, Designs can be multi colour, blended, shades, ... use your imagination :) HINTS. You can incorporate any of the following that may signify “Growth”..... Arrows / Trees / Leaves / Charts / Birds / Butterflies etc, see pics in attachments on contest ... B 5 is a good example, the “W, with an arrow on top right”...... maybe an arrow wrapping
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213158.51/warc/CC-MAIN-20180817221817-20180818001817-00108.warc.gz
|
CC-MAIN-2018-34
| 4,925
| 16
|
https://bmcecolevol.biomedcentral.com/articles/10.1186/1471-2148-10-339/figures/8
|
code
|
Space time diagram of cell state as a function of position (horizontal axis) and time (vertical axis) in a uniformly proliferating tissue with a linear growth rate. Due to proliferation throughout the tissue, the length increases with time t as L(t) = t + 2. The parameters in the Jaeger and Goodwin model [50, 51] are set as A = 0.5, B = 5, T
= 1 for 0 <t < 50. The cell state ranges from -10 <z < 10 and this is represented on the graph as shading between black and white (corresponding to z = -10, z = 10 respectively). The region above the dotted yellow line has segmented. Areas outside the tissue are coloured in blue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103619185.32/warc/CC-MAIN-20220628233925-20220629023925-00154.warc.gz
|
CC-MAIN-2022-27
| 624
| 2
|
http://blog.directoryofillustration.com/ass-power/
|
code
|
Last week I saw a great talk by Paul Rogers. He talked about something he referred to as “Ass Power,” which is the ability to sit down and get stuff done. I immediately doodled this lettering treatment. (note: I apologize for today’s drawing being late, I was flying back from LA and my flight was delayed.)
See full post here: Chris Piascik2013-11-12.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103316.46/warc/CC-MAIN-20170817131910-20170817151910-00153.warc.gz
|
CC-MAIN-2017-34
| 358
| 2
|
https://ohhaskme.com/272532/mathematics-field-which-same-thing-advertised-independently
|
code
|
Statistics always struck me as a layer of terminology atop concepts in analysis and probabilities. I remember one time, we did a proof in statistics that involved the Borel-Lebesgue characterization of compact sets (from any covering by open sets of the compact, a finite covering can be extracted), in order to get a covering of a compact by a finite set of balls with radius epsilon... This is very very unusual for statistics and is the only glimpse of intelligible math I found in all statistics courses I had to suffer. I would describe statistics as object oriented mathematics, where everything is hidden from view. But, on that day, I was allowed to see that there is something behind the terminological "thicket", to quote Numerical Recipes in Fortran. Sorry, this turned into a rant.
Machine learning and such is basically interpolation with complicated or steep functions (like logistic functions, but they call those some other way), naturally using Optimization (called fitting or training, because why not). What they call a "loss function" is what everyone else calls a "cost function", so there is a tendency here. Also they use mostly stochastic optimization because they have many variables, but that does not make for a field per se, in my opinion. It is similar to statistics as it is an old field used for new purposes, hence the new terminology.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00101.warc.gz
|
CC-MAIN-2023-06
| 1,367
| 2
|
https://gcc.gnu.org/legacy-ml/gcc-patches/2005-02/msg01708.html
|
code
|
This is the mail archive of the
mailing list for the GCC project.
Re: PATCH: Bump version on mainline
"Joseph S. Myers" <email@example.com> writes:
> If the number of locations of the version number are to be reduced
> further, either the unique location should be gcc-common.texi or
> update_web_docs needs to be updated to generate whatever generated
> .texi file gets the version number when building online docs.
I have had the following idea for version numbers floating around in
my head for some time now. It attempts to address the following
0) We have the base version number in at least two places, version.c
1) The version number is propagated from version.c to several other
places by configure. This means that config.status has a
dependency on version.c, which in turn means that the daily bump of
the datestamp is another cause of having the entire world rebuilt
because you did a cvs update in your source directory.
2) The recommended practice for maintaining your own branch of GCC is
to modify the trailing part of the version string, leaving the
initial bit alone to identify the upstream version you branched
from. But then if you want to update to a newer version - say, if
you're tracking a release branch - you inevitably get a merge
conflict in version.c, which is irritating.
3) The mechanism for updating the datestamp is complicated and
fragile (it broke, for instance, when version_string was changed
from a char* to a char).
We create two files in the top-level config/ directory. They are
named DATESTAMP and GCC-BASE-VER. Their complete contents are,
respectively, "YYYYMMDD\n" and "X.Y[.Z]\n". For instance, today on
mainline they would read "20050227\n" and "4.1.0\n". (\n is a
newline, and the quotation marks are not in the file.)
version.c is then changed to read
const char version_string = BASE_VER " " DATESTAMP " (experimental)";
with the commentary above adjusted to match, and is now compiled as
version.o: version.c version.h $(srcdir)/../config/DATESTAMP \
$(CC) $(ALL_CFLAGS) $(ALL_CPPFLAGS) $(INCLUDES) \
-DBASE_VER="\"`cat $(srcdir)/../config/GCC-BASE-VER`\"" \
-DDATESTAMP="\"`cat $(srcdir)/../config/DATESTAMP`\"" \
-c $(srcdir)/version.c $(OUTPUT_OPTION)
Similarly, gcc-common.texi is now generated from gcc-common.texi.in
(this is necessary because texi2dvi does not support command line
@set) by the Makefile (not! by configure), doing something like
sed -e 's/@version@/$(shell cat $(srcdir)/../config/GCC-BASE-VER)/' \
$< > $@
And similarly with all the other places that need the version number.
I'd treat gcccbug.in as a special case - rename it to gccbug, and have
it determine the default version string at runtime via
"gcc --version | head -1" or equivalent.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358570.48/warc/CC-MAIN-20211128164634-20211128194634-00524.warc.gz
|
CC-MAIN-2021-49
| 2,718
| 47
|
https://forum.inductiveautomation.com/t/power-table-header-font-color/59378
|
code
|
How do you change the Header Font Color on a power table?
Is this what you are looking for?
Edit: Durr, i should read the whole thing before posting, you wanted the color specifically. Let me take a look.
yes, but there isn’t anything that says font color
Ok, so you have to use HTML, but it can be done. Something like this:
Alternatively, you can change it using the
configureHeaderStyle Extension Function on the Power Table:
both solutions will work, thanks for the help
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495012.84/warc/CC-MAIN-20230127195946-20230127225946-00387.warc.gz
|
CC-MAIN-2023-06
| 476
| 8
|
https://www.blackbox-tl.com/2021/07/12/xxs-chapters-25-26/
|
code
|
Just a reminder that next week’s update will include the first VIP chapter of the novel! You can find the steps for how to verify your purchase and access the chapter in the general rules and information channels of the #supportauthors discord. If you are having trouble purchasing the book on Changpei, please feel free to contact me or check out this guide.
The novel is about 7 RMB (~1USD) on Changpei. If you come across any issues with currencies/apps/etc, feel free to be in touch!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817036.4/warc/CC-MAIN-20240416000407-20240416030407-00088.warc.gz
|
CC-MAIN-2024-18
| 489
| 2
|
https://blog.yingw787.com/posts/2018/09/16/fluent_python/
|
code
|
It took me about four months or so in order to read this book from cover to cover. If you may recall my blog post on python functions in practice referenced this book. So I don't know if I can give a holistic overview of how this book turned out.
I really wanted to expand my horizons and deepen my understanding of Python by reading this book, and I think it scored very well there. A lot of the concepts were covered quite thoroughly and where there were gaps, more up-to-date resources on the web and in other books referenced in each chapter's “Further Reading” section were very useful.
One of the most useful sections was increasing the performance of your Python
application, particularly using the library
asyncio and Futures. In this
sense, Python 3 took a page out of Node.js in defining how I/O-bound operations
ought to be written. I couldn't do anything with this module since just a short
while before I needed to maintain Python 2/3 compatibility, but due to needing
to package Python 3 for one issue at work, I now am free to use all Python 3
features. I also discovered that people create asynchronous HTTP clients as well
as database clients (like aiohttp
and aiopg), and I might be able to
take those into account while working at my current company.
The most confusing and possibly less interesting aspects of the book was the section on metaprogramming. I don't see Python being a great metaprogramming model and the author was hesitant against it too, so I don't think it'll stick or need to stick.
Overall, an excellent read and quite the reference on the bookshelf.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358153.33/warc/CC-MAIN-20211127073536-20211127103536-00106.warc.gz
|
CC-MAIN-2021-49
| 1,593
| 15
|
http://dannordbye.com/unity-mode/repair-unity-mode-brilliant-way-of-running-a-windows-vm.php
|
code
|
Unity Mode - Brilliant Way Of Running A Windows VM
He says call samsung they very high spec machine. When i downloaded the driver and a CG 580w power supply? Curious if anyone has anywith them, and I would like to know why.Yesterday, my PC fell offsome of which you can't get around at all.
I have a Toshiba M700 post "problems after using SanDisk flash drive" by me. When I have it enabled, none of VM copy a file or run applications like WinRar. of When i plug it in at didn't really settle or what? Apparantly the driver i installed VM rams, but wouldn't work.
Hello, my dvd rom wouldn't open so good sign and replace it. Sony first of all charges by is my first post of many, and I thought i'd start with an easy question. I took out Windows of the things I've gotten help with help you.All the cords stayed inside, but it was couple different things and nothing.
The second is well the last 2 numbers, but I have a DD in the last box... Hi everyone, Im new toit was a firmware issue. Vmware Shortcut To Start Virtual Machine Windows Media Player running a problem with my hdd.Are you always having your notebook on a flat surface when using it?internal bluetooth adapter.
Hi guys, I have we dont have much information at all. Also when i try to boot my PC may be able to help.Brought it to the shop they saidwhat kind of notebook and specs you're running.For this reason, I wish to completely unresponsive when I tried to turn it on.
I would say that is running different things even tried that firmware and nothing.Thanks This Thinkpad has an ATI Radeon Hyper-v Shortcut To Vm does the PSU smell?Are you sure with the drivers from Toshiba's website sucks. Thanks!!! Well first issue is thatthe inverter board, and the cable.
My graphic card is Unity the PCI slots are working ok.Than you. We still dont knowinstalled it it still didn't work.It goes to a screen Unity yellow asterisks in the device manager? My PC is a it would if I had it running.
He has already replaced the lcd, use a different bluetooth manager program.This would be the cheapest repair option They kept saying change7500 mobile graphics chip, not a video card. Thanks in advance its fried as well?I know that it does over heat way same issue happened again.
eye on my temps. I'm no expert, but it's looking2 or 3 interface cables going to the computer?That does open and in My Computer sometimeslike it corrupted my sound card somehow.This would tell you if for any advice.
Can you explain in a little more detail just what are of using a flash drive on my brand new computer.Follow the wizard to see some opinions on what it could be. It causes a lot of little annoying problems, Vmware Unity Mode or from an old machine .It also happens when i try to Any luck with this?
So i guess the motherboard graphics chip is considered good.I am using Notebook Hardware https://www.tenforums.com/virtualization/3065-linux-users-unity-mode-brilliant.html if it detects it .Thanks A laptop has AC - my system games (like Spider Solitare) respond.I have noticed it most oftenthe problems Cpu was crashing about 2 weeks ago.
So i'm here to just get or virus scan app. One USB and one video or one for sound? Hi I Vmware Player try another power cable.Like an adaware running play, any help would be great.I also replaced a power supply on the with the flash drive plugged in, IT freezes!
And the fan reved right up like - adapters, these adapters have power cords...I think it wasthe way in case you didnt know.I have had a host of problems afterdoes the same thing.Now however I don't think anything is wokingbe causing his problems.
As if I wasn't It has antime to have it serviced.Normally, when you have good external video, still present in device manager. Test 2 - Virtualbox pressing the power switch.
I have a the says no boot files. When using external video, are there anythey are working cards.I also have 4 on the side of my monitor. The repair shop wants to charge me 200I took another one and put it in.
It can get as home it still wouldn't boot . Test 1 -my desk and completely blacked out. I started keeping an Control to determine the temps. - The cooling fans and fin assemblies maythis site and I have a question.
If Samsung doesnt play well with others then why do i have to pay be clogged with dust and other debris... This now happens on everygame i I found out in the subsequent hours that my psu had fried (figures). For an hour we tried all kinds of laptop, running Windows Vista ultimate.Regards Steven running and it shuts off from time to time. running
What else could reader as a dvd r and sometimes cd rom. If yes not awhen I am watching streaming vids. I had the same problem withto come out and see whats going on. Unity Are they new TV cards hot also and shut down.
Sorry but it Toshiba satellite A75 series. I called Samsung, they said original pc and it seems to be working. I'm currently doing a dskchk about the hard drive.Went back home the price. My PC will randomly freeze when i plug in my flash drive.
The bluetooth manager software that installs along ideas on what it might be. Anyway, see my thread and see if any my Samsung HDTV connecting to sony viao. We need specifics on your hardware setup to be more helpful. Hello, this has been known!What should i do? See recent Ram was bad and installed new ram.
Thanks in advance. Does the monitor have have recently got back into PC gaming after purchasing Dawn of war 2.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578681624.79/warc/CC-MAIN-20190425034241-20190425060241-00450.warc.gz
|
CC-MAIN-2019-18
| 5,427
| 22
|
https://devrant.com/search?term=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dy8kyi0wng40
|
code
|
Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple APILearn More
Search - "https://www.youtube.com/watch?v=y8kyi0wng40"
Customer: "Our people keep clicking the save button and it saves things and now we have lots of things."
Me: "Should we remove their option to save?"
Customer: "Oh no we want them to be able to save."
Prepare for business rules hell where our protagonist has to account for other human's lack of self-control by applying business logic produced by middle managers who have no idea what anyone who works for a living actually does.4
You win this round SQL.... but I'll be back... and when I do I'll get this stupid join and concat to work the way I want. YOU'LL SEE SQL!!!!
...If I ever buy an SQL book like I keep talking about...
-deploy not entirely janky but also not ideal solution-
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704804187.81/warc/CC-MAIN-20210126233034-20210127023034-00657.warc.gz
|
CC-MAIN-2021-04
| 1,011
| 10
|
https://pagesix.com/tag/monty-python/
|
code
|
The 81-year-old "Monty Python" star was attacked while sparring online with followers angered by his decision to sign a letter of support for Rowling amid the huge backlash over her...
He battled dementia for years.
The urban spaceman has left the Earth. English performer and songwriter Neil Innes — best known for his collaborations with Monty Python and his work with the Bonzo Dog Doo-Dah...
Jones was diagnosed in 2015 with a form of dementia that impairs the ability to speak.
Someone in the residence reportedly opened a piece of mail and noticed a white substance spill out of its envelope.
20 years after he started working on it, Terry Gilliam's "The Man Who Killed Don Quixote" will close premiere at the Cannes Film Festival on Saturday.
A producer who initially worked with the Monty Python star on the project was claiming rights to "The Man Who Killed Don Quixote."
A Paris court rejected an effort by Portuguese producer Paulo Branco to block the showing of "The Man Who Killed Don Quixote."
A Paris court is weighing whether the festival can show the Monty Python star's long-awaited film "The Man Who Killed Don Quixote."
The upcoming book, titled "Always Look on the Bright Side of Life," will be published this fall by Crown Archetype.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304798.1/warc/CC-MAIN-20220125070039-20220125100039-00249.warc.gz
|
CC-MAIN-2022-05
| 1,257
| 10
|
https://discussion.evernote.com/profile/298150-moolzel/
|
code
|
Please... I need this, too... I work in Music Production, Graphic Design, Web Design and Photography -among others. There's no system of tags (as it is actually) that can help me to get my notes properly organized. I just need the ability to nest multiple notebooks. If I would do that with tags, that would be a terrible mess (not to mention that I can't have two tags with the same name!) There is "Noise" in Music Production, and in Photography, too. There is "Composition" in Music, in Design, and in Photography. What can I do, name the tags "Composition Music", "Composition Photography"? No, I won't, because that will make me loose a lot of time. I need nested notebooks in unlimited levels, or at least five levels, or ten. OR: The ability to color-code tags, so that I can have two or three "Composition" tags (one red for Photography, one blue for Design, ...) I hope you can understand what I mean... There are people who just need a Notebook for Math, one for Geography, one for Chemistry... But there are many other people who need deeper, much deeper levels of Organization. Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987833089.90/warc/CC-MAIN-20191023094558-20191023122058-00003.warc.gz
|
CC-MAIN-2019-43
| 1,097
| 1
|
https://blog.certskills.com/page/3/
|
code
|
The Q&A menu bar item lists a large variety of practice exercises. By volume, there are more multichoice Question and Answer posts than any other type. The different types exist because the need arose over the years. Many of those relate to the math required for IPv4 and IPv6 addressing, for IP ACLs, or for topics like Spanning Tree that just need more practice than other topics.
I have two suggestions for how to learn more. First, click the Q&A menu item and click around to see the various types. Alternately, click the “CCNA Vol 1” and “CCNA Vol 2” menu items and select a book part or chapter. Those menu items will show you all posts related to that part or chapter of the book, and you may see different types of posts to explore.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00506.warc.gz
|
CC-MAIN-2023-50
| 748
| 2
|
http://antichamber.wikia.com/wiki/User_blog:Californ1a/Stuff_That_Can%27t_Go_Anywhere_Yet
|
code
|
I'll try to add random facts and information about the game here, and it can later be put on a real wiki page. At the moment, I have no idea as to where to put some of this stuff, but most of it is useful information.
- For Windows 7, the game save is located at "C:\Program Files (x86)\Steam\steamapps\common\Antichamber\Binaries\Win32\SavedGame.bin" -- Keep this in mind if you want to backup your save game, but you also need to start over for whatever reason. (I need this for taking photos and videos, as well as for doing speedruns)
- In some areas of the map, you can see colored lighting effects coming through the walls from other areas. This is most likely unintended, but not a glitch.
- If you set the game's resolution to your desktop's resolution while it's in windowed mode, it will actually be smaller than your desktop. Setting it to fullscreen after doing this will leave black bars on the edges, and you'll have to click on your resolution again.
- There are some controls that are not listed in-game, such as using CTRL in place of middle mouse. Other replacement control schemes have not been found yet.
- Development started in 2006 under the name of Hazard The Journey of Life, but recently changed to Antichamber in late 2011.
More to come as I think of more random facts I know about this game.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423774.37/warc/CC-MAIN-20170721122327-20170721142327-00387.warc.gz
|
CC-MAIN-2017-30
| 1,319
| 7
|
http://upy.scripps.edu/
|
code
|
Welcome to uPy
What is uPy?
The ubiquitous Python API (uPy),extends
the Python programming language to wrap most common functions of the
APIs of several computer graphics programs called hosts.
Code efficiently with uPy:
computer programmers can develop graphical user interfaces and
sophisticated plugins once and use them in any uPy wrapped host. Hosts
currently include Cinema4D, Maya, Blender, PyQT, & Tkinter with partial wrapping for SoftImage.
Expand your impact with uPy:
plug-ins developed for any of these hosts are automatically usable in all hosts
supported by uPy. Write a
plugin for Cinema 4D, and its instantly available for Blender and Maya
as well. When new hosts (e.g., Houdini, 3D Studio Max, etc.) get wrapped
by uPy, your code will function in them as well.
Learn more to get started:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119995.14/warc/CC-MAIN-20170423031159-00025-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 805
| 16
|
http://www.etiquettehell.com/smf/index.php?topic=89236.15
|
code
|
Personally, I think the best reason to use euphemisms like these is when you have a complex issue, you need to illustrate two opposing behaviors or viewpoints, and you don't really want to discuss your specific viewpoint.
So for example, if you have an issue that requires a lot of explanation, and it is related to the fact that the OP is a Methodist, but her SIL is a Lutheran...it might make a lot of sense for the OP to instead identify as an apple, and call her SIL a pear. Because if the OP isn't really interested in talking about Methodist beliefs, even in a polite and general way, the best way to avoid that is to just not identify herself as Methodist.
Since everything posted on the forum is fair game, it might be desirable to obscure highly personal details like that, even if the risk of anyone turning it into a debate about the detail itself is quite low.
I do think that if you have an etiquette question that involves a detail you don't really want to discuss, the best thing to do is to simply leave it out of the question. But sometimes, that detail is so integral to the situation that leaving it out would just not be possible. Usually, my personal answer to that situation is to just not post at all, but I can understand why someone might just try to be vague about what religions (or whatever) they are talking about.
Plus, I sometimes think that using euphemisms can serve to broaden the discussion. Talking about Purples and Oranges allows people to fill in the blanks however they like, even if it has no resemblance to the situation the OP was talking about.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119080.24/warc/CC-MAIN-20170423031159-00179-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,588
| 5
|
https://cagacyq.initiativeblog.com/quantitative-methods-ii-57990ap.html
|
code
|
On account of these disadvantages, this method is not very popular now a day although in the past, it was frequently used. However, when this method is used, the ranking should be done preferably by a committee and provided with accurate job descriptions.
Alejandro Quiroz Flores contact information available later Courese meetings: It mostly deals with a series of advanced models, many of which are estimated via maximum likelihood.
At some point maximum Quantitative methods ii becomes easy, and the relevant issue is then the correct one: Cameron and Trivedia, Microeconometrics You also may find the Greene and Wooldridge graduate texts useful; the corresponse of readings should be obvious Web site: The dynamic syllabus is on the class web site.
This will, by week, have topic, reading, links to overheads, other materials, data sets, exercises and anything else of use.
These are available weekly on each Thursday, and cover the material covered that week. Typically the section on Friday will discuss issues specific to the exercises which are typically data analytic excercies using Stata and its Mata matrix language.
These are due after the weekend, so any issues can be discussed on the ensuing Thursday. The exercises will involve some pencil and paper analysis, some work in Stata that perhaps involves matrix manipulations or writing your own maximum likelihood code these are early in the course and some work in using Stata to estimate models, with the exercises then being cncerned with interpretation.
The goal is not to type 8 letters in Stata but to understand the underlying models; thus early on I will ask you to make sure that you can reproduce using relatively primitive commands the various high level stata commands so you have to show me you could produce with more primitives what "predict" will actually produce for most of the rest of your lives.
I assume that exercises will be done in small groups no smaller than size 2, no larger than size 3. While group exercises can lead to what might be thought of monitoring issues, the issue that really concerns me is that not everyone in the group learns as much as they should.
Thus everyone at least must hand in their own written work, and I would like the written work from group members not to be identical so that everyone has processed the exercises for themselves.
Please do not give us more Stata output than is necessary though of course give us as much as we need to figure out what you did that is, you can edit your Stata log files and annotate them.
|U bent hier||Quantitative Methods Program overview Faculty in the Quantitative Methods QM program train students in state-of-the-art statistical methods and engage in research that develops and applies such methods.|
|Quantitative Methods for Innovation Research||Rules and regulations for exams at CBS Learning objectives To achieve the grade 12, students should meet the following learning objectives with no or only minor mistakes or errors:|
|Quantitative Methods II – Juan Pablo Pardo-Guerra||Categorical Regression and Benchmark Dose Software 3. Categorical Regression — Modeling Concentration-Time-Response Data for Risk Assessment This half-day workshop the second in a series of two will build upon the first to provide participants with interactive training on the use of the U.|
|Academics in QUANTITATIVE METHODS II - initiativeblog.com||Winter Course Description Quant II introduces statistical methods used in economics and business. It is not a continuation of quantitative methods I, but instead a course on statistics, probability, estimation, empirical studies, and related issues.|
The easier it is for us to follow your exercises, the better feedback you will get. There will also be exercises where you read substantive articles relevant to you and write up a report.
The final project is due at the end of the semester and will be described in more detail when students start to panic and ask me about the paper. Please note that because of my travel schedule that some classes will be devoted to discussion of the project with the TA.
Lots of folks teach courses similar to this one, and lots of folks have invested a lot in creating overheads and data sets and the like. So take advantage of this. There are trillions of other sites devoted to maximum likelihood, and many of them are useful and reliable.Overview.
The Graduate Center’s M.S. in Quantitative Methods in the Social Sciences (QMSS) is a credit program that equips students to understand and apply a range of quantitative methods while developing clear and concise written and oral communication skills in the presentation of research techniques and findings associated with the analysis of quantitative data.
The two main types of research methods are quantitative and qualitative.
40 Chapter 3 • Quantitative Versus Qualitative Research, or Both? An example of this design is a study completed by Al-Kandari, Vidal, and semester. Walker’s Health Promoting Lifestyle Questionnaire (HPLP-II) was administered to assess health promoting.
quantitative term paper Your term paper will consist of the analysis of publicly available quantitative data. You can either use the data that comes with the Sweet and Grace-Martin () textbook or any other data that is available for public use, e.g., through the internet.
Although classical significance testing is the most commonly used inferential technique in quantitative geography, it is far from the only choice, and in some circumstances may not be the most appropriate.
In the statistical literature and other disciplines, its utility has come under question in a number of contexts. This report overviews current progress in the development of quantitative.
(We analyze text; our methods apply more generally) Gary King (Harvard, IQSS) Quantitative Discovery from Text 3 / 23 The Problem: Discovery from Unstructured Text. The Quantitative Methods section of the CFA curriculum has traditionally been placed second in the sequence of study topics, following the Ethics and Professional Standards review.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104354651.73/warc/CC-MAIN-20220704050055-20220704080055-00235.warc.gz
|
CC-MAIN-2022-27
| 6,091
| 24
|
http://web2.sys-con.com/node/3112537
|
code
|
|By Alan Rihm||
|June 29, 2014 02:00 PM EDT||
When focusing on one element of a SaaS provider to evaluate, it should not be the technology it is providing today but its commitment to finding new ways to succeed in the future. This kind of agility that goes beyond technology is why SaaS is so loaded with potential for entrepreneurs.
With the barriers to entering the communications market nearly eliminated, this next wave of entrepreneurs have an opportunity to focus on enabling the success of their customers through sourcing, developing and delivering the technologies they need. It is a mindset shift that is critical to leveraging the cloud delivery model to its fullest potential. This is about not just delivering features or functionalities, but helping customers to shape agile, efficient and successful businesses.
Engage, Educate, Enable, Succeed
The most exciting opportunity for entrepreneurs in the cloud is to use the flexibility it offers to co-create, refine and evolve new enterprise services. A SaaS provider has the freedom to change the services it offers with input from across the value chain, as long as they remain focused on the core aspect of their business where they add value: enablement. Whether they offer supply chain management software through to cloud communications, the service is a tool for their enterprise customers to drive efficiency, grow and increase profitability.
Services have been decoupled from infrastructure and that means more freedom to explore new ideas, innovations and business models. It also means sellers and buyers can have a greater influence on one another. An innovative SaaS provider can influence what their customers sell and how they sell while creating a feedback loop that sees services evolve rapidly to meet customer needs.
The relationship between the buyer and seller begins with outlining the business objectives of the customer and it's up to the SaaS provider to shape a service offering that will enable the customer to succeed. This takes a consultancy-based sale and evolves it into an ecosystem that extends beyond the point of sale.
At its most advanced, the SaaS provider can work with customers to co-create and develop the services that will ultimately help meet their business objectives. That is the goal. Not delivering a new technology but clearly having impact within the customer's business and measuring the results of the engagement. When business and IT become aligned, the SaaS provider has to become increasingly adept at using their service platform to influence their customer's businesses.
It also works the other way. SaaS providers learn from customers and at the same time play a role in educating their customers to ensure that they are using the services effectively or, in the case of the channel, are skilled in selling the new services being provided. If it will help the customer to achieve its goals, the SaaS provider can educate its customers' sales staff and arm them with new skills to take these services to market. In this way, enablement means extending the relationship to include not just learning from customers but guaranteeing the success of the operation through education and sharing experience and expertise.
Entrepreneurs in Enablement
The opportunity for entrepreneurs is in creating businesses focused on shared value that evolves the enterprise IT channel model to best use the characteristics of the cloud. This is about focusing less on shifting units or seats and more on creating sustainable and profitable businesses dedicated to helping customers transform their operations and increase profitability.
Why would an entrepreneur be interested in this space? SaaS businesses that are focused on enablement have an advantage over competitors and deliver unique advantages. The closeness that they develop with their customers gives them high rates of customer retention and stickiness as well as a rapid path to differentiation.
Technologies and services will always change but if the business is dedicated to finding new ways to serve customers and evolve their offering then they will always be relevant. If a service provider anticipates emerging customer demand combined with listening and reacting to customer feedback, these customers don't need to look elsewhere for new services. Price comparison also is not central to decision making, ensuring that they do not compete on price but rather on the quality of the service they offer and the real business results they enable for customers.
Similarly, they are able to differentiate their offerings in the long term with more customers feeding into their service creation and refinement, making it easy to anticipate the needs of new customers. This in turn helps them to win more business.
By focusing on using cloud services to enable the success of customers, they create an ecosystem where customers get better services based on feedback and development while new customers become easier to obtain because their needs can be anticipated. Costs of sale are mitigated by long-term relationships, which increase profitability, and the business is able to tap recurring revenue streams.
While this might not appear as exciting as the success stories from the consumer communications market like WhatsApp, focusing on enablement builds dynamic businesses that are flexible and largely future-proof. The model works hard for both the buyer and the seller.
The cloud is ready to enter a new phase of its evolution where the technology is understood and the advantages are leveraged to build a healthy value chain. Entrepreneurs who recognize the opportunity to building businesses around enablement will have a lasting impact on their customers and the market.
SaaS has demonstrated how service development and management can sit outside of a business but that's only the first step. Thinking bigger about how enterprises are served and matching technology to business results is an exciting and logical progression. It will open new doors for both SaaS providers and customers to grow together and intertwine a value chain that has previously run from A to B from the provider to the customer.
The future IT and communications services delivered via the cloud will be shaped by the entrepreneurs that go beyond just the technology and look at how the relationship can develop. Enterprise customers simply want better solutions to meet their needs and are ready to work with providers that have a new approach dedicated to their success.
"At our booth we are showing how to provide trust in the Internet of Things. Trust is where everything starts to become secure and trustworthy. Now with the scaling of the Internet of Things it becomes an interesting question – I've heard numbers from 200 billion devices next year up to a trillion in the next 10 to 15 years," explained Johannes Lintzen, Vice President of Sales at Utimaco, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 17, 2014 07:30 PM EST Reads: 1,237
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session at @ThingsExpo, Ryan Bagnulo, Solution Architect / Software Engineer at SOA Software, focused on desi...
Dec. 17, 2014 07:15 PM EST Reads: 1,153
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the industry’s first all flash version of HyperConverged Appliances that include both compute and storag...
Dec. 17, 2014 06:30 PM EST Reads: 1,084
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 17, 2014 06:00 PM EST Reads: 1,060
"For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 17, 2014 06:00 PM EST Reads: 1,219
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
Dec. 17, 2014 11:45 AM EST Reads: 1,364
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
Dec. 16, 2014 11:45 PM EST Reads: 1,189
Code Halos - aka "digital fingerprints" - are the key organizing principle to understand a) how dumb things become smart and b) how to monetize this dynamic. In his session at @ThingsExpo, Robert Brown, AVP, Center for the Future of Work at Cognizant Technology Solutions, outlined research, analysis and recommendations from his recently published book on this phenomena on the way leading edge organizations like GE and Disney are unlocking the Internet of Things opportunity and what steps your organization should be taking to position itself for the next platform of digital competition.
Dec. 15, 2014 11:45 PM EST Reads: 1,576
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Dec. 15, 2014 10:30 AM EST Reads: 6,835
As the Internet of Things unfolds, mobile and wearable devices are blurring the line between physical and digital, integrating ever more closely with our interests, our routines, our daily lives. Contextual computing and smart, sensor-equipped spaces bring the potential to walk through a world that recognizes us and responds accordingly. We become continuous transmitters and receivers of data. In his session at @ThingsExpo, Andrew Bolwell, Director of Innovation for HP's Printing and Personal Systems Group, discussed how key attributes of mobile technology – touch input, sensors, social, and ...
Dec. 15, 2014 10:00 AM EST Reads: 1,923
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
Dec. 15, 2014 10:00 AM EST Reads: 1,577
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
Dec. 15, 2014 09:00 AM EST Reads: 1,579
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, addressed the big issues involving these technologies and, more important, the results they will achieve. Rodney Rogers, chairman and CEO of Virtustream; Brendan O'Brien, co-founder of Aria Systems, Bart Copeland, president and CEO of ActiveState Software; Jim Cowie, chief scientist at Dyn; Dave Wagstaff, VP and chief architect at BSQUARE Corporation; Seth Proctor, CTO of NuoDB, Inc.; and Andris Gailitis, C...
Dec. 15, 2014 09:00 AM EST Reads: 1,405
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other machines...
Dec. 15, 2014 08:45 AM EST Reads: 1,994
"There is a natural synchronization between the business models, the IoT is there to support ,” explained Brendan O'Brien, Co-founder and Chief Architect of Aria Systems, in this SYS-CON.tv interview at the 15th International Cloud Expo®, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 15, 2014 08:15 AM EST Reads: 2,679
SYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. The ads focus on delivering ROI - how improved uptime delivered $6M in annual ROI, improving customer operations by mining large volumes of unstructured data, and how data tracking delivers uptime when it matters most.
Dec. 15, 2014 06:45 AM EST Reads: 2,132
In this Women in Technology Power Panel at 15th Cloud Expo, moderated by Anne Plese, Senior Consultant, Cloud Product Marketing at Verizon Enterprise, Esmeralda Swartz, CMO at MetraTech; Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems; Seema Jethani, Director of Product Management at Basho Technologies; Victoria Livschitz, CEO of Qubell Inc.; Anne Hungate, Senior Director of Software Quality at DIRECTV, discussed what path they took to find their spot within the technology industry and how do they see opportunities for other women in their area of expertise.
Dec. 15, 2014 04:00 AM EST Reads: 1,370
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between conference participants in three dimensional space. This has been shown to significantly improve comprehe...
Dec. 12, 2014 05:00 PM EST Reads: 1,238
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
Dec. 11, 2014 06:00 PM EST Reads: 1,440
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
Dec. 11, 2014 03:15 PM EST Reads: 1,910
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802765093.40/warc/CC-MAIN-20141217075245-00118-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 18,191
| 60
|
http://www.101.lv/learn/php3/function.split.html
|
code
|
array split(string pattern, string string, int [limit]);
Returns an array of strings, each of which is a substring of string formed by splitting it on boundaries formed by pattern. If an error occurs, returns false.
To get the first five fields from a line from /etc/passwd:
Example 1. split() example
$passwd_list = split( ":", $passwd_line, 5 );
Note that pattern is case-sensitive.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949181.44/warc/CC-MAIN-20230330101355-20230330131355-00781.warc.gz
|
CC-MAIN-2023-14
| 384
| 6
|
https://uk.shopping.com/item.html?id=v1-234724899139-0&offer=true&provider=0
|
code
|
USB 2.0 High Speed Flash Pen Thumb Drive Memory Stick 4GB PC/Mac. New in box, tested before posting. The USB stick has 2 partitions one write protected, other is not and usable at 3.53 GB. Free space. This is why new other I believe there is a way to delete the copy write if you know how to use computer program.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499888.62/warc/CC-MAIN-20230131154832-20230131184832-00642.warc.gz
|
CC-MAIN-2023-06
| 313
| 1
|
https://www.hackercombat.com/prolific-hacker-sandboxescaper-demos-windows-10-zero-day-exploit/
|
code
|
Prolific Hacker SandboxEscaper Demos Windows 10 Zero-Day Exploit
Since 2015, Microsoft casually declared that Windows 10 is the last version of Windows, as Redmond geared-up on making their operating system a software-as-a-service (SAAS). It will forever be marketed as Windows 10 with two major yearly updates containing new features and enhancements, to the delight or annoyance of the users. Of course, as a dynamically changing operating system since 2015 (the 2015 Windows 10 was dramatically a very different animal to 2019’s Windows 10), the introduction of new features inadvertently comes with new bugs to exploit and discovery of flaws that weren’t existing before the update surfaces for cybercriminals to take advantage of.
Recently, a zero-day exploit proof-of-concept has been publicly released by a researcher with an alias of “SandboxEscaper”, detailing the weakness of the Windows 10 operating system. Publicly demonstrated through a GitHub page, the zero-day flaw is a remote code privilege escalation bug that may allow an attacker to take control of the vulnerable Windows 10 computers without any user’s knowledge. Taking advantage of the longtime vulnerability residing in the Task Scheduler service, SandboxEscaper was able to tap on SchRpcRegisterTask, a permission-less register by-default to create access control list permissions. That means any executable that uses a malformed Task Scheduler task using SchRpcRegisterTask can run it with system-privilege (administrator access).
This gives the attackers full control of the computer if they execute a relevant executable that has control to the PC, like Windows Explorer, Regedit or any System Tools available to the system administrator like the Managed Computer Window. The flaw clearly can be exploited under both 32-bit and 64-bit versions of Windows 10, including its server counterparts, Windows Server 2019 and its immediate predecessor Server 2016.
Hackers and researchers often keep zero-day vulnerabilities secret
SandboxEscaper also teased about at least four more zero-day exploits against Windows that she/he knows of but decided to keep secret for the time being. He hinted that 3 out of 4 were local privilege escalation bugs, while the other one is a sandbox escape bug. Microsoft has yet to fix the bug that SandboxEscaper revealed, as Redmond just issued its patch Tuesday last May 14, 2019. Hence, anyone interested in taking advantage of the Scheduled Task flaw may weaponize it against Windows 10 users until Microsoft finally issues an out-of-cycle patch to fix the vulnerability.
Unless Microsoft flexes its muscles again of issuing an out-of-cycle patch, expect the fix on the next update Tuesday, most probably on June 11, 2019.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00883.warc.gz
|
CC-MAIN-2023-40
| 2,742
| 7
|
https://www.veraspringett.com/post/professional-development-courses-university-of-phoenix-product-launch
|
code
|
The working world is changing and people need ways to stay competitive in today's evolving job market. Six intense months led to the launch of an MVP shopping cart experience called Professional Development Courses: the University's first foray into the world of self-led (not instructor-led), self-paced, online courses that can be purchased without having to enroll at University of Phoenix.
I was the Content Designer on the product team that conducted:
Email capture efforts
In addition to the microsite, I also developed all the messaging for the B2C and B2B email campaigns, digital ads and videos.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475711.57/warc/CC-MAIN-20240301225031-20240302015031-00545.warc.gz
|
CC-MAIN-2024-10
| 604
| 4
|
https://devcentral.f5.com/questions/setup-gtm-as-a-dns-relay-and-cache-53721
|
code
|
I am trying to setup GTM 11.5.4 as a DNS relay and cache only meaning all DNS queries go through the GTM and are forwarded to our DNS servers. Have anyone managed to do this ? Is this possible using GTM only (without LTM) ? All guides on F5 page seems to be incomplete or contain contradictory information.
Thanks a lot
The short answer is Yes. You can do it with only BIG-IP GTM/DNS.
Just create your Listener, your DNS Profile and your Pool with SNAT in order to Load balance DNS queries to your DNS servers. Also, you can add to your DNS profile a Transparent Cache profile to speed up your resolution with your BIG-IP.
Furthermore, you can configure DNS Express in order to resolve DNS queries faster on behalf your Master/Primary DNS Servers.
BIG-IP GTM use the internal TMOS/LTM core features in order to do your DNS Load Balancing and DNS caching. Without a LTM license/provisioning. So this could lead to a misunderstanding.
Manual Chapter: Placing BIG-IP GTM in front of a Pool of DNS Servers
BIG-IP GTM 11.5.4 Knowledge Center
I saw this guide and it didn't work for me at all - no queries have been forwarded to our DNS servers. To make this work I had to setup a resolver cache - that worked.
Is that normal or did I miss something ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527148.46/warc/CC-MAIN-20190419061412-20190419083412-00222.warc.gz
|
CC-MAIN-2019-18
| 1,245
| 10
|
https://www.apk2pc.com/adblock-for-samsung-internet/
|
code
|
Cease seeing advertisements on the net. AdBlock is the fully free content material blocker for the Samsung Web browser, with over 50 million customers throughout all platforms!
AdBlock. Settle for no substitutes.
* Save battery life by solely loading the content material you care about * Get monetary savings on month-to-month knowledge utilization * Take pleasure in sooner net web page efficiency * Constructed-in privateness safety with anti-tracking * Customized language setting to dam region-specific advertisements * Free, responsive assist
Ceaselessly Requested Questions:
* Does AdBlock block all advertisements in all my apps? AdBlock solely blocks advertisements on web sites you go to within the Samsung Web browser.
* Is AdBlock appropriate with some other Android browsers? Not but! However you may get AdBlock for Chrome, Safari, or Opera in your desktop. Go to getadblock.com!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038119532.50/warc/CC-MAIN-20210417102129-20210417132129-00584.warc.gz
|
CC-MAIN-2021-17
| 893
| 6
|
https://wn.com/3:_Keiko_the_Killer_Whale
|
code
|
- published: 18 Jul 2009
- views: 63821673
The killer whale or orca (Orcinus orca) is a toothed whale belonging to the oceanic dolphin family, of which it is the largest member. Killer whales are found in all oceans, from Arctic and Antarctic regions to tropical seas. Killer whales have a diverse diet, although individual populations often specialize in particular types of prey. Some feed exclusively on fish, while others hunt marine mammals such as seals and dolphins. They have been known to attack baleen whale calves, and even adult whales. Killer whales are apex predators, as there is no animal which preys on them.
Scientists recorded a killer whale named Wikie repeating the words ‘hello’ and ‘bye bye’, counting up to three, and even saying the name of her trainer ‘Amy.’ Get the latest headlines: http://www.telegraph.co.uk/ Subscribe: http://www.youtube.com/subscription_center?add_user=telegraphtv Like us on Facebook: http://www.facebook.com/telegraph.co.uk Follow us on Twitter: https://twitter.com/telegraph Follow us on Google+ https://plus.google.com/102891355072777008500/ Telegraph.co.uk and YouTube.com/TelegraphTV are websites of The Daily Telegraph, the UK's best-selling quality daily newspaper providing news and analysis on UK and world events, business, sport, lifestyle and culture.
Please SUBSCRIBE - http://bit.ly/BWchannel Tour Tickets on Sale! - http://bit.ly/bravetickets Pre-Order Coyote’s Book - http://bit.ly/BOOKbraveadventures Watch More - http://bit.ly/OLgoldticket On this episode of Beyond the Tide, Coyote and Mark go kayaking with Killer Whales! Yes that’s right…right on the water next to one of the largest predators in the world! The Orca, perhaps the most revered mammal of the sea, is not only a spectacle to witness in person but has been a symbol significance to human cultures all throughout time. They are intelligent, they are perfect predators…they are beautiful. With the opportunity to perhaps see one of these creatures from the natural perspective of a kayak, the Brave Wilderness crew set out onto the ocean’s waves for what might be their most ep...
Can a Minke whale escape a dramatic attack by Orcas? Subscribe to BBC Earth for more amazing animal videos - http://bit.ly/BBCEarthSub Clip taken from the program: Frozen Planet Watch more videos from BBC Earth Planet Earth http://bit.ly/PlanetEarthPlaylist Blue Planet http://bit.ly/BluePlanetPlaylist Planet Earth II http://bit.ly/PlanetEarthIIPlaylist Planet Dinosaur http://bit.ly/PlanetDinoPlaylist Check out the other two channels in the BBC Earth network: BBC Earth Unplugged: http://bit.ly/BBCEarthUnplugged BBC Earth Lab: http://bit.ly/BBCEarthLabYouTubeChannel About BBC Earth The world is an amazing place full of stories, beauty and natural wonder. Jump in to BBC Earth's YouTube channel and meet your planet. You'll find 50 years worth of astounding, entertaining, thought-...
The killer whale pursued a dog. Orca took the dog for a seal / Amazing shots Subscribe to my channel please !!! https://www.youtube.com/c/AmazingAnimals2016?sub_confirmation=1&feature=iv&src_vid=o1RpYuqIa4c&annotation_id=annotation_2178503995 Playlist my channel https://www.youtube.com/channel/UCbLd6eIiU1HVkp7mWBMZ9TQ/playlists?sort=dd&shelf_id=3&view=50 Thank you all for watching and subscribe to the channel 👍
Orcas Vs Shark: Killer Whales Take Down Tiger Shark SUBSCRIBE: We upload a new incredible video every weekday. Subscribe to our YouTube channel so you don't miss out: http://bit.ly/Oc61Hj A POD of killer whales have been filmed for the first time hunting and killing a TIGER SHARK. The footage, which is believed to be a world-first, was captured off the coast of Costa Rica by underwater photographer Caroline Power and British marine biologist Nicholas Bach. It shows three killer whales working as a team to force the panicked shark to the surface, wearing it down and taking opportunistic bites at its fins. Eventually, a large bull moves in to deliver the death blow while flipping the shark onto its back in the process - which induces a state of paralysis known as tonic immobility. The pod t...
Happy Feet movie clips: http://j.mp/1ziG1Lj BUY THE MOVIE: http://bit.ly/2cemRY4 Don't miss the HOTTEST NEW TRAILERS: http://bit.ly/1u2y6pr CLIP DESCRIPTION: Mumble (Elijah Wood), the amigos, and Lovelace (Robin Williams) are attacked by two hungry killer whales. FILM DESCRIPTION: In the world of the emperor penguin, a simple song can mean the difference between a lifetime of happiness and an eternity of loneliness. When a penguin named Mumble is born without the ability to sing the romantic song that will attract his soul mate, he'll have to resort to some fancy footwork by tap dancing his way into the heart of the one he loves. Directed by Babe mastermind George Miller, Happy Feet tells the tale of one penguin's quest for love, and features an all-star cast of vocal talent that include...
Killer Whale brutally kills dolphins / killer whales hunt for dolphins. The dolphin had no chances - Amazing pictures Subscribe to my channel please !!! https://www.youtube.com/c/AmazingAnimals2016?sub_confirmation=1&feature=iv&src_vid=o1RpYuqIa4c&annotation_id=annotation_2178503995 Playlist my channel https://www.youtube.com/channel/UCbLd6eIiU1HVkp7mWBMZ9TQ/playlists?sort=dd&shelf_id=3&view=50 Thank you all for watching and subscribe to the channel 👍
There is much proof that Killer Whales really are the baddest boys. Check out our store : http://shop.weebls-stuff.com Get the tune here: iTunes https://itunes.apple.com/album/killer-whales-single/id1228704205 Google Play https://play.google.com/store/music/album/Mr_Weebl_Killer_Whales?id=Btsiio6qp3omzmytrt2cq4fki2u Spotifiy https://open.spotify.com/album/1gv9LyzQxjDAm2BaHhcE0b Bandcamp https://weebl.bandcamp.com/track/killer-whales ------------------------------------------------------------------------------------------------------- MrWeebl is a channel of fun and silliness, with songs and cartoons and even cartoon songs. Wow. Some call it random. It's not random. It's absurd look at life because day-to-day life is ridiculous. Please subscribe to us, or even better, follow us on Twi...
Killer Whales attack stories are all over the internet these days, but a billschannel viewer who goes by the name of PresidentOfUranus sent me a link to a video that claims to show a man being grabbed off the beach by killer whales…. Teaser Clip In his note to me, the prez asked, “Is this video fake, or has this really happened? Well, Mr. President -- why don’t we crack this one open and see what we can find out! Taking a closer look at the video, we see a man on the beach. He picks something up off the sand and then says Lapiz (which is spanish for Pencil) Seconds later, a killer whale grabs him and drags him away. The video doesn’t go much further than that. Now, on a first look, there are a few things that make me suspicious. Number 1 is the man has that weird outline ...
(spoken) Here's a song about a whale
with a most amazing appetite.
In San Francisco town there lived a whale
Who ate pork chops by the pale,
By the pill-box, by the suitcase,
By the bathtub, by the schooner.
Her name was Sara and she's a peach
But you can't leave food within her reach
Nor nurse-maids, nor Airedales,
Nor chocolate ice cream sodas.
She eats a lot but when she smiles
You can see her teeth for miles and miles,
And her adenoids, and her spare ribs,
And things too fierce to mention.
So what can you do in a case like that?
what can you do except sit on your hat,
Or your toothbrush, or your grandmother,
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794871918.99/warc/CC-MAIN-20180528044215-20180528064215-00562.warc.gz
|
CC-MAIN-2018-22
| 7,619
| 29
|
https://cmuportugal.org/media/priberam-machine-learning-lunch-seminar-andre-martins/
|
code
|
Priberam Machine Learning Lunch Seminar about Structured Sparsity for Structured Prediction
Speaker: André Martins (IST/UTL and CMU)
Venue: IST Alameda, Sala PA2 (Edifício de Pós-Graduação)
Date: Tuesday, February 7th, 2012
Lunch will be provided
Linear models have enjoyed great success in structured prediction in NLP. While a lot of progress has been made on efficient training with several loss functions, the problem of endowing learners with a mechanism for feature selection is still unsolved. Common approaches employ ad hocfiltering or L1-regularization; both ignore the structure of the feature space, preventing practicioners from encoding structural prior knowledge. We fill this gap by adopting regularizers that promote structured sparsity, along with efficient algorithms to handle them.
Experiments on three tasks (chunking, entity recognition, and dependency parsing) show gains in performance, compactness, and model interpretability.
This is joint work with Mario Figueiredo, Pedro Aguiar, Noah Smith and Eric Xing.
André Martins is a dual degree Ph.D. student in Language Technologies, at Instituto Superior Técnico and Carnegie Mellon University, in the scope of the Carnegie Mellon Portugal Program. His main research interests are machine learning, natural language processing, and optimization.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510284.49/warc/CC-MAIN-20230927071345-20230927101345-00624.warc.gz
|
CC-MAIN-2023-40
| 1,325
| 9
|
https://changelog.observium.org/
|
code
|
Welcome to the SVN changelog for Observium project. This document provides a summary of the significant changes, improvements, and bug fixes made to the project over time, as captured in the SVN repository. By following this changelog, you can stay up-to-date with the latest features and enhancements, and gain insights into the platform's development process.
Observium is a powerful, flexible, and user-friendly network management system that automates the discovery, monitoring, and visualization of devices and services within a network. With a broad range of supported devices, protocols, and integrations, Observium empowers network administrators to efficiently manage and monitor their networks.
The changelog entries are organized in reverse chronological order, with the most recent changes appearing at the top. Each entry includes the following information:
- SVN revision number: The unique identifier for the specific changeset in the SVN repository.
- Author: The developer who made the changes.
- Time and Date: The date when the changes were committed.
- Description: A brief summary of the changes, highlighting new features, improvements, and bug fixes.
- Changed Files: A list of files changed.
- Changed Lines Summary: A summary of the added and removed line counts.
Remember to consult the official documentation for more detailed information on the features and functionality of Observium.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510730.6/warc/CC-MAIN-20230930213821-20231001003821-00507.warc.gz
|
CC-MAIN-2023-40
| 1,413
| 10
|
https://plus.google.com/116480414256077492939/posts
|
code
|
Thanks to Tal, Debian binaries for xnoise-0.2.20 and libtaginfo-0.2.0 are now available for download (amd64).
Additionally, +Debian source packages are there now, too.
* Rewrite parts of the C++ API
* Adapt bindings for C and vala
* Support more media file formats
* Access more media tag fields
* Check for open file
* Avoid code duplications
* Add documentation
* Bug fixes
xnoise media player v0.2.21 and it's plugins have been released.
This is a bug fix release. It fixes a crasher bug of the fullscreen mode that came with a problem with the screen saver manager.
* Fix crasher bug with screen saver management
* Add new screen saver manager
* Update some translations
You can download the new version here:
Thanks to helpers, bug reporters and translators!
Xnoise allows listening to music and playing video in a very intuitive way: You can easily search the library and drag each artist, album or title to the tracklist (to any position in any order). In the tracklist all queued tracks (music or video) are played one by one without being removed. There, you can reorder, insert or remove any track as it comes to your mind.
The media library contains all available media as a hierarchical tree structure of media tag metadata. It is easy to find any single track, artist, album or genre by using this tree structure or by just entering a search term. Here you find all you music, streams or videos in a nicely presented, searchable way.
- Fast(!) searchable media library
- Music and Video support
- Equalizer with sound presets
- 'Smart playlists' for last played and most played tracks
- ID3 tag editing
- Automatic album art fetching
- 'Now playing' pane
- State restore
- Can play virtually all media
- Media key support
- Lightweight and speedy!
- Optional Ubuntu unity integration (Quicklists, HUD, ..)
- Plugins for UbuntuOne Music Store, MPRIS, Magnatune, LastFm (album art and scrobbling), Lyrics fetching, Notifications, Ubuntu Soundmenu, ...
- ...And more!...
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678702332/warc/CC-MAIN-20140313024502-00045-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 1,980
| 33
|
https://dev.opencascade.org/ssh-key-generation
|
code
|
How it works
SSH keys are required for authentication of the user when accessing Git server by SSH protocol. Private key is the one stored on the user workstation (optionally encrypted). Open (or public) key is stored in the user account page on the web site. When Git client accesses the remote repository through SSH, it uses this key pair to identify the user and acquire relevant access rights.
You need to have Git client tools installed, see instructions here.
Normally if you have Git installed, you should have also SSH client available. On Unix/Linux it is installed by default in the system. On Windows it is typical to have several SSH clients installed; in particular they are included with Cygwin, MsisGit, TortoiseGit.
It is highly recommended to use for generation of SSH keys the tools that come with Git client you are going to use. Using incompatible tools (e.g. ssh-keygen.exe from Cygwin for code generation, and TortoiseGit GUI with default Putty client for connection to server) will lead to authentication problems.
How to generate a key
Generating key with command-line tools
If you prefer command-line tools, make sure you have ssh and ssh-keygen commands in the path. On Windows, you might need to start 'Git Bash' command prompt window provided by MsisGit.
Use the following command to generate SSH keys:
ssh-keygen -t ed25519 -C "email@example.com"
The last argument is optional (and arbitrary) human-readable comment which can be included with the public key and used to distinguish between different keys (if you have many). The common practice is to put here your mail address.
The command will ask you where to store the keys. It is recommended to accept default path "$HOME/.ssh/id_rsa" -- just press Enter for that. It will also warn if some key is already present in the specified file; you can either overwrite it by the new one, or stop generation and use that old key.
If you want to be on the safe side, enter password to encrypt the private key. You will be asked then to enter this password each time you use that key (e.g. access remote Git repository), unless you use the tool that caches the key (like TortoiseGit). If you do not want to bother, enter empty string.
On Windows, make sure to note the complete path to the files generated (it might be not straightforward to guess where your $HOME is).
Two key files will be created in the specified location:
- id_rsa - private key
- id_rsa.pub - public key
The content of the pubic key file (one text line) is the key to be added to the user account on the site (see below).
Generating key with Git GUI
GitGUI (standard GUI interface included with Git) provides option to either generate the SSH key (if not present yet) or show the existing one: just click Help/Show SSH key. Copy the public key content for adding to the user account page (see below).
Generating key with Putty
Some GUI tools on Windows (e.g. TortoiseGit, Git Extensions) come with SSH client Putty, and use it by default.
To generate the key with this client, run Puttygen (e.g. from Start menu -> TortoiseGit -> Puttygen), then click Generate. After the key is generated, you will see GUI controls to define public key comment and / or specify password for protection of the private key. When done, save both public and private key to files of your choice.
Copy the public key as shown by Puttygen to clipboard for adding the key in your account. Do not copy content of the Putty public key file -- it is formatted in the way not suitable for submission on the web site.
Adding public key in your account
Log in on the web site and click on 'My account' link in the right-side box. If you have a Contributor status, you will see a tab 'SSH keys' on the right. Click on that tab, then click 'Add a public key', and paste the text of the public key (see above sections on how to generate the key) into the text box. The key title is an optional identifier for the key; if left empty, the key comment will be used. Click Save to input the key to the system.
Please note that some time (5-10 min) is needed for the system to update the configuration after the new key is added. After that time, you can try accessing Git.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476180.67/warc/CC-MAIN-20240303011622-20240303041622-00667.warc.gz
|
CC-MAIN-2024-10
| 4,182
| 27
|
https://www.finishing.com/106/87.shtml
|
code
|
Dichromate seal temperature
I would like to know if the temperature of dichromate seal really has to be 194-212 degrees as it states in some specs. I work in an anodizing shop currently trying to become NADCAP certified,but the temp required to work to these specs are a concern. Our current temp is about 170 which seems to work fine and passes all tests. Is there away around this and still comply to these specifications? Any input would be greatly appreciated.
- Natick, Mass
First of two simultaneous responses2001
Steven, to answer your question, no there is no getting around the specification requirements. NADCAP was formed and supported by several leaders in the industry. Its sole purpose was to maintain high quality and consistency through the industry. However, depending on the specification, the customer is able to specify operations "equivalent to" the desired specification.
Best of Luck.Ira Donovan, M.S.F.
Kansas City, Missouri
Second of two simultaneous responses2001
The higher temp gives a better seal. There is no way around it if you have to certify to the spec. If the spec is only a reference then the customer might give you a waiver for his use only. That is highly unlikely since it does not serve any purpose for him to do it. Why should he accept an adequate seal when he can have a good seal?
The higher temp requires a little more electricity, a little more DI water and a little more exhaust, than the 175. It is not really that big a deal to comply with the spec.James Watts
- Navarre, Florida
This public forum has 60,000 threads. If you have a question in mind which seems off topic to this thread, you might prefer to Search the Site
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511872.19/warc/CC-MAIN-20181018130914-20181018152414-00363.warc.gz
|
CC-MAIN-2018-43
| 1,673
| 12
|
https://www.jungo.com/st/document/technical-document-95-windriver-support-development-pcmcia-devices/
|
code
|
Starting with version 6.2.2, WinDriver supports PCMCIA on Windows.
The latest WinDriver Windows version (v12.0.0) supports PCMCIA on Windows 10/8.1/Server 2012 R2/8/Server 2012/7/Server 2008 R2/Vista/Server 2008/Server 2003/XP.
In earlier versions, you can use WinDriver to develop a driver for a PCMCIA card by defining the card’s resources manually and handling the card as a regular ISA card. (Plug and Play detection of the card’s resources is not supported for PCMCIA, in v5.0.4–v6.2.1 of WinDriver).
Alternatively, consider replacing your PCMCIA hardware with a CardBus card (recommended) — see Technical Document #94 for information regarding WinDriver’s support for CardBus.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347394074.44/warc/CC-MAIN-20200527110649-20200527140649-00456.warc.gz
|
CC-MAIN-2020-24
| 692
| 4
|
http://yapocis.readthedocs.org/en/latest/intro.html
|
code
|
Image processing is inherently computationally challenging. Lots of data leads to lots of approximations, shortcuts, and undone experiments. We need code that runs fast, and is easy to develop.
I’ve tried a fair number of hardware and software configurations for doing these experiments. Some, like CADDR-1, are were not readily available. Some, like the dedicated array processors, were overwhelmingly expensive. Some, like Python, come both included as batteries (pre-installed) and come with batteries included (Python packages like PIL and Numpy).
I have the usual complement (meaning, too many) of computers. But images are large, image movement is a bottleneck, and the computers are usually doing something else.
Multi-core multi-processing is more efficient, but image processing really looks like SIMD (single-instruction, multiple-data stream computing), and that is not a strength for message-passing type architectures.
GPU based solutions are promising, and I got one for free with my Mac. In fact, I got two, because Apple includes a CPU implementation of OpenCL which is really fast. And while I don’t have an NVidia card, OpenCL runs directly (and fast) on Intel and AMD CPUs, not to mention ATI graphics chips. And, more importantly, my computer comes out of the box with a decent implementation.
Writing in OpenCL is a lot like writing in C. It helps to have other peoples examples, and to remember that premature optimization is not a good idea. Optimized OpenCL can be hard to read, and can run at near FTL speed. Unoptimized OpenCL can be very easy to read, and can run 10 times faster than Numpy.
PyOpenCL is terrific. The procedure call interface is a little rough: we can do better. Back to the future, with a modified Apollo RPC / Apollo NCS RPC, OSF DCE RPC, MS RPC (COM) interface specification (sweet and nutritious) and a tacky but easy to use Python thunking layer (bitter, but you only have to swallow it once). And with a little care, and syntactic sugar, even the bitter parts can go down pretty well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711240143/warc/CC-MAIN-20130516133400-00099-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 2,038
| 7
|
https://www.ironhack.com/us/blog/when-is-the-best-time-to-learn-how-to-code
|
code
|
Tech is one of the fastest growing sectors and the highest paying fields. You’ve been told about this many times before, and you’ll keep reading about it in the following years: not just from us, but also from other tech companies, on the news, and at your job or school. ‘I know’, you might be thinking, ‘I heard you the first time!’
And yes, learning tech skills to start a career in tech is a pretty safe bet nowadays. But it’s much more than that: technology touches more and more aspects of our daily lives. Ten years ago, we weren’t able to collectively track the transmission of illnesses with our phones or pay through contactless cards and smartphones. Twenty years ago, we couldn’t have dreamed of the impact social media has in our society. The use of computers and the internet was a thing we, as a society, all had to learn and acquire not just to be competitive in the job market, but also to improve our quality of life. And today, the journey hasn’t stopped. Knowing skills like web design and development, cybersecurity, and data management can not only change your career: they should be common knowledge.
Imagine having the power to create your own websites, tailored to your needs, or your own programs and apps, set to automate your tasks, save you time, and make your life easier. Or your own games! The possibilities are endless: what will you create?
The Not-So-Long and Not-So-Difficult Journey to Learn Coding
The answer is not straightforward, but probably not years. Firstly, because you don’t need to learn every programming language out there to ‘know coding’ (even if you want to be a full-stack developer!). Setting the groundwork for computer science key concepts and paradigms will make it incredibly easy to pick up new coding languages after your first one, so don’t worry about that. Coding requires, most importantly, problem-solving skills, attention to detail, and a strong ability to keep up with such a rapidly changing environment!
Acquiring the basic concepts of programming and getting handy with some languages, enough, at least, to be able to create things like applications and websites, can take as little as three months or as long as you need to. It all depends on how much time and dedication you can put aside for coding– and also on whether you use freely available resources only, or sign up for an intensive program like our bootcamp.
What’s Stopping You From Learning to Code?
Acquiring coding skills seems like a difficult path, full of obstacles and traps. Some of the concerns that arise when you consider learning to code are incredibly common and have solutions you might not expect.
‘I don’t like math’
And you don’t need to! Coding doesn’t necessarily involve calculations: mainly, because computers were invented to do those for us in the first place; but also because the field is so vast that any kind of skill set, and any kind of person, has a place for them in technology. If you want to work with math, you could look into a career in Data– but if you don’t, you could do everything from Design to Web Development. The limit doesn’t exist (wink).
‘I’m too old to learn code’
Learning is a lifelong process: it’s a complete myth that we stop learning after graduating from university. Challenging ourselves with new skills constantly is a painfully human trait, and coding is one of the most widely available, versatile skills out there, as well as one of the skills that pay off the most. And it’s not hard: we promise!
‘I don’t have the discipline to teach myself to code’
That’s fine! Some people are insanely motivated to learn by themselves, and can pull it off in record time, but you shouldn’t feel bad that you’re not like them. Everyone’s conditions are different, and some of us just don’t have the bandwidth to assume the extra work that comes with a self-taught journey. This is why options like videos, online courses, and bootcamps are so popular, too! There are fits for all sizes: don’t hesitate to ask for the one you need!
‘I don’t have time to learn coding’
Deciding to learn to code is not an all-or-nothing situation. Depending on your objectives, available free time, and learning style, you could dedicate anything from 30 minutes a day to 30 hours a week, and still acquire the skills you want. If you’re not sure about the time investment, look into the learning options available. Dip just the toe, or dive in, or anything in between!
Coding Gives You the Power to Start, Change or Boost Your Career
When people sign up to Ironhack bootcamps, they do it for many different reasons. Certainly, starting a career in Tech when you’re fresh out of school is a road that many young people take, because, if you want to be a Web Developer, you don’t need to spend four years getting a traditional degree when you could do an intensive bootcamp that will give you all the skills needed to get a job as a developer and keep growing after graduating.
But coding is a great skill to have for people from all walks of life, which is why Ironhack is a very diverse coding school, too. Recently, we talked about career pivoters: experienced professionals who have dedicated years of their lives to all kinds of careers, and have decided to acquire tech skills to switch careers entirely. Many of our alumni have pivoted careers, from jobs like Customer Success Manager or lawyer to Web Development– many of the skills acquired in these jobs are transferable, and the experiences and successes that professionals bring from different backgrounds can make their profile incredibly valuable for recruiters in Tech.
Some people learn coding to expand their skill set in their current jobs, too! Coding skills can take Digital Marketers, Project and Product Managers, and all kinds of other roles to the next level, helping you advance your career, expand your responsibilities, and, ultimately, increase your value for companies and your salary and work benefits, too.
Coding can be a lifelong learning journey, because there's so much to learn and the number of different applications of code is vast. If you can code, you have the boundless potential to reinvent the world– sign up for our Web Development bootcamp, and make it happen!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00290.warc.gz
|
CC-MAIN-2023-50
| 6,308
| 21
|
https://info.the365people.com/webinars/dynamics-nav-development-2
|
code
|
Development in Dynamics NAV and Business Central (Part 2)
In the second half of our Knowledge Session, we will start by converting our C/AL vehicle management system to the AL language. The C/AL development language has been used for Navision and Dynamics NAV since version 1.0 and is the language for all core functionality and is written in C/SIDE. The new language, AL, was introduced in version 11 (2018) and has been designed specifically for Extension development. We can now bolt on Extensions to Dynamics 365 Business Central and unbolt them without affecting core source code. It’s written in an application called VSCode and is also used by Java and PHP developers.
We start by exporting the C/AL file we created in the previous video to a text file. We then split the text file into multiple files per object. From there, we can create our app! By using Txt2AL.exe to convert files to the AL language, we can package up the functionality into an app which gives you all the benefits of modifications but without messing around with the source code. This allows for quicker, simpler upgrades as these are packaged up and can be removed and added as you wish.
Make sure you watch the video to see how these Extensions can be published to Dynamics 365 Business Central and fix any common conversion issues that you may run into. Use the list icon in bottom right of the player to select chapters and jump straight to the parts of our video most relevant to you!
Learn how to convert a C/AL vehicle management system to the AL language
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00075.warc.gz
|
CC-MAIN-2024-10
| 1,544
| 5
|
https://forum.openscad.org/Softening-a-polygon-td33529.html
|
code
|
I'm trying to code a toy bus that I made (in wood) years ago when my kids were young, just to see if my (cheapo) CNC could make a miniature version.
For the time being, I have mostly entered dimensions, and made the bottom part.
I am now trying to code the rear block, and I want to soften the polygon lines, like I did with the wood and the big disc sander.
I thought of using a Béziers curve, and I found a library with a function that returns a set of points corresponding to the Béziers curve.
Now, I can't seem to be able to create a polygon from this list, so for the time being (bear with me, my code is terrible) I have used a linear_extrude of a projection of a hull_polyline3d.
It's not really what I was aiming for.
Would there be a more "openScad" way of concatenating a polygon with a softened version of a part of itself? I will have to do it in other places too, like the top for example...
Thanks in advance.
Rounding is one of the most asked questions.
Short answer for 3d boolean operations union difference and intersection:
There is none as most think of them.
Now there are a bunch of work arounds.
Best but limited is to do all the heavy lifting in 2d.
There are many but two common methods is the Round_Anything library or using a triplet of 2d offsets.
First offset out 1=r, then offset in r=2 , last offset out r=1.
That get you outer and inner radii of 1.
For thin features <r this method will fail
Round_Anything. https://github.com/Irev-Dev/Round-Anything Round_Anything, witch i recommend, don't have the same drawbacks.
In general very powerful, offers individual radius for each point, but is slightly more involved to use.
And then there are the very slow minkowski operation. could be used in a pinch but realistically only on low polygon geometry.
For your case id suggest making three 2d sketches on for each top side and front view.
Top and front views are symmetrical and is best drawn such on centreline.
Then linear_extrude each sketch and 3d rotate into place.
For side view you want to invoke the linear_extrude with the center=true option.
These three extrusions can then be enclosed in a intersection block.
The result should be as if you had cut them out on a band saw in three planes.
As shown in the image there are no rounding on the edge where the planes intersect.
As a finishing step each sketch can individually be given a negative offset of some radius.
Then a minkowski operation can compose the intersection with a sphere of the same radius.
It's all my pleasure.
One tip is to give the techniques a practice run on some simple stuff before your real project,
The rotation of the three 2d sketches was somewhat confusing the first time i tried.
Best of luck.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662510138.6/warc/CC-MAIN-20220516140911-20220516170911-00265.warc.gz
|
CC-MAIN-2022-21
| 2,714
| 33
|
http://www.selfmechanics.com/blog-post08-faq-themes-explained.html
|
code
|
During the last year some of following topics and questions emerged. Although I believe it is all clear (and often explained in the F.A.Q. section) now is the time to address them again, maybe with more details, and/or from a different angle.
Why do you have so many disclaimers?
In this case, again more (disclaimers) is less (risk).
I took and applied my attorney's advice to have short disclaimers at the bottom of every page on my web site plus one longer version on a dedicated page (it is here).
Well, I have to do it legally - for readers' and clients' protection, as well as mine. Also, we live in a world where people often take no personal responsibility (nor accountability) for their own actions and blame everyone else for things they have (or have not) done instead.
Luckily, I have really never dealt with someone who has done something stupid due to the information they received from me (in any way, shape or form) but you just never know.
What to expect on an individual session?
I guess I will have to make a video about it eventually.
In general, there is no need to be nervous as I'm easy. Well, at least I am easy to work with. We start with your questions or with something I see about / for / related to you. You can ask me any question you want as there is really nothing that can shock me and I don't think there are any stupid questions.
Topics usually cover some of the basic areas of people's lives like career and business, health, love life, finances, family, spiritual questions, etc. and I often can help you navigate through your unseen world(s) by making it visible and tangible: my SEE, READ, CHANGE concept.
What if something I say on a session makes no sense?
During your session most of the things will make sense to you (in more than 95% of situations), either immediately when discovered or after we look deeper in the topic. When things do not make any sense to you (in less than 5% of situations), there are usually three reasons for that: either I do not see the whole picture (but just a piece of it) or I am maybe misinterpreting something or it's something (still) unknown to you.
If needed, I will check both of these options again. Otherwise, it's most likely option three and then I will tell you to hold on to it: it may not make sense at the time but it may later. I sometimes get feedback from clients letting me know that something that didn't make sense during the session did after they left.
For example, one client was asking about her business, a small company with some 40 employees. We found that her five team leaders were all good people and "the right man in the right place". Aside of that, I saw that one of them (I described her appearance as I saw it than: mid-thirties brunette, etc.) was in a relationship with the IT guy (again, I described him: tall, slender, blonde man, etc.) and that was unknown to everybody.
My client was surprized as she said that it was simply not possible, that the IT guy was just hired days ago, and that these two do not know each other at all (until just recently). Well, I left it at that as it was certainly not important at that point in time.
A few months after that session I got a phone call from the client and she told me that the lady in question (brunette team leader) was in fact in a secret relationship with the IT guy (blonde), and that it would not normally be a problem nor publicly known but ...
This brunette lady was married and her husband made a big scene at their offices confronting both her and the IT guy. So, if this was something really important for the client's business, I would clarify that during the session. It was not, and I left it so the time told the whole story.
This is just an example I had, it can take more or less time - or sometimes things just change and such images / films I saw but left unexplained over time become meaningless or simply obsolete. Still, this happens rarely.
Also, all of my sessions are done in confidence, so nothing said in a session leaves that room. That being said, most of my clients prefer Skype sessions (so there is really no "room") as we live in different countries, or I am somewhere on the road, or simply because it gives both audio and video experience - both for individual and group programs. My clients' privacy is extremely important to me, as is known and clearly stated on my about page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583690495.59/warc/CC-MAIN-20190120021730-20190120043730-00404.warc.gz
|
CC-MAIN-2019-04
| 4,376
| 19
|
http://community.callofduty.com/message/205687310
|
code
|
I really would like alot of people 2 make their own game modes on here ok.
Sooo my game mode is takes Domanition and HQ and combines them, You have a standerd A B &C flag BUT A&C move around the map B stays where ever its is mainly in the middle soo every 50 points when you cap a flag it moves somewhere else, Maybe Treyarch can keep the flags always be in a triangle-ish way like in Mw3 right!? yep.
This game mode would keep people moving around and not just in the main three areas ok.
I would like 2 hear from anyone that has a game mode. dont just say "WAR" everyone love that game mode i dont think Treyarchs going 2 EVER put that mode back ok.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533957.14/warc/CC-MAIN-20140416005213-00145-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 651
| 4
|
https://www.tapchief.com/sparsh/
|
code
|
Currently working as an Associate Analyst at Novartis, Hyderabad catering to Latin American clients, providing them with information from the vast amount of raw data, thereby helping them in arriving at key Marketing decisions for various pharmaceutical products.
Completed B.E.(Hons.) - Electrical and Electronics from BITS Pilani in 2016.
I hate Electronics and love Marketing, courtesy, my internships at GroupM and Swiggy.
In my spare time, I play Table Tennis, read novels and watch movies. :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589222.18/warc/CC-MAIN-20180716060836-20180716080836-00569.warc.gz
|
CC-MAIN-2018-30
| 498
| 4
|
https://www.opensourceindia.in/osi-speakers-2022/ankit-nayan/
|
code
|
CTO | SigNoz
Our journey Building SigNoz - an open source APM
TRACK: FOSS For Everyone (India contributes)
29 Sep 2022 | Time: 16:30 to 16:45
Ankit is a tech enthusiast, always eager to learn new technologies. He is currently the lead maintainer & CTO of SigNoz which is an open source application monitoring tool.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100540.62/warc/CC-MAIN-20231205010358-20231205040358-00207.warc.gz
|
CC-MAIN-2023-50
| 314
| 5
|
http://www.amazon.de/product-reviews/1591793432
|
code
|
Am höchsten bewertete kritische Rezension
20% Valuable - Rest is blah-blah
am 29. Oktober 2015
Almost all of the book is written in the following way: "Do this..", "Don't do that", "Be like this", "Don't be like that". Not at all helpful without explaining in detail how and just throwing out some philosophical mumbo-jumbo just to impress.
The author is also greedily trying to say something about everything. He touches 51 different topics/advice which he analyzes for 1-3 pages maximum. Lots of the ideas are bad copies of things he has probably read in other books or things he has merely a feeling about.
I skimmed through most of the book. At least I found a couple of interesting thoughts and ideas here and there to make my time spent reading worthwhile.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00036-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 763
| 6
|
http://dottodotnet.blogspot.com/2011/09/
|
code
|
PowerShell has two kinds of errors; terminating errors and non-terminating errors
Terminating errors are the errors that can stop command execution cold. Non-terminating errors provide an additional challenge, as you need to be notified of failed operations and continue with pipeline operations. Powershell by default tries to continue when non-terminating errors occur. Something I don't want to happen when I call Powershell with my CI server to release software. If there are errors I want the script to stop and tell me what is wrong - not the script to continue and report that everything went OK.
$ErrorActionPreference is a variable that describes how PowerShell will treat non-terminating errors. $ErrorActionPreference has four self-explanatory options:
- Continue (the default)
To exit your script with an error code (if an error occurred), you'll need to exit using the $LastExitCode variable. This variable returns a number that represents the exitcode of the last script or application, needed for your CI server to know if the script ran successfully. Here's a template for what I use with the Jenkins CI server...
$ErrorActionPreference = "Stop" # Do something... exit $LastExitCode
Well, yeah... $error is an array of all the errors that have occurred in the current session up to the number specified in $MaximumErrorCount. Also, $? is a boolean value that is $true if the previous operation succeeded and $false if it did not.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655879532.0/warc/CC-MAIN-20200702142549-20200702172549-00518.warc.gz
|
CC-MAIN-2020-29
| 1,445
| 7
|
https://ndvanforeest.github.io/sheila/
|
code
|
- I was born on March 29 1973 in The Hague, the Netherlands.
- In the past 20 years I worked on the development of algorithms for (medical) image processing and data analysis. In my resume you can find more information about my work experience.
- In 2013 I started my own company RealChess. This company develops intelligent tools to improve your chess skills.
- In 2015 I started together with the company .
- My main interests are psychology, medicine, mathematics and art.
- 2015 - now: In 2015 I started with Nicky the company Wellplanned .
- 2010 - now: Inventor of RealChess . RealChess works on the development of chess training tools.
- 2007 - 2015: Senior Software Engineer at Xpar Vision . Xpar Vision is a small, high-tech company that develops control and measurement systems for inspection, process monitoring and quality control in the container glass industry. As senior software developer I am responsible for research and development of new products, as well as training of consultants and advanced customer support.
- 2006 - 2007: Research at the department of Radiology, University Medical Centre Groningen. Several small projects on cardiac imaging (detection of stenosis, vessel segmentation) and breast cancer (develop statistical models to estimate the breast cancer risk).
- 2001 - 2005: Ph.D. at the University Medical Centre Nijmegen under supervision of prof.dr.ir. N. Karssemeijer and prof.dr. C.C.A.M. Gielen . I have developed intelligent and efficient software for the detection and classification of breast tumours on mammograms. The project was done in cooperation with R2, and the software is implemented in the clinically used R2 image checker for 'computer aided diagnosis'.
- 2000 - 2001: Project at the department of Electrical Engineering, Twente University , under supervision of prof.dr. C. Slump. I have worked on the development of software for the three dimensional visualisation of medical CT and MRI images. The project was carried out in cooperation with Philips Medical Systems.
- 1996-1997: Extended student project at the department of Biological Psychiatry UMC under supervision of prof. dr. R.C. Kahn, UMC Utrecht on 1) pharmacological treatment of schizophrenia; 2) the hypothalamus-pituitary-adrenal axis activity in children with Multiple Complex Developmental Disorder
- 2006: Radiation safety expert level 3
- 2006: Ph.D. "Analysis of Temporal Mammogram Pairs to Detect and Characterise Mass Lesions".
- 2002: Propaedeutic mathematics (cum laude) at Twente University.
- 1999: Doctor of Medicine (M.D.) obtained at Utrecht University.
- 1999: Bachelor degree Psychosocial Sciences (clear pass) at the SPSO, Utrecht.
- 1997: Medical Degree obtained at Utrecht University.
- 1991: Grammar School, RSG Schoonoord Zeist.
- Working on real life problems
- Interests: Psychology, perception, medicine, medical technology, chess, art
- Technical knowledge: data analysis, pattern recognition, image processing
- Programming: C, C++, python, Java, statistics (R/S), database (SQL), Qt, Scripting languages
To download my thesis `Analysis of Temporal Mammogram Pairs to Detect and Characterise Mass Lesions', which I finished in 2006, press: .
The cover is a fractal breast image and was made by Deborah Lee Soltesz .
Fractals are patterns that repeat themselves at every scale. Fractals are mathematical structures, but can also be found in nature. There are many nice websites about fractals (for instance fractalfoundation, where you can find beautiful pictures as well as software to explore fractals yourself).
For my breast cancer research I used fractals to detect tumours in mammograms.
For the birth of the twins a had the following birth card with the so-called /images/twin dragon fractal .
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153897.89/warc/CC-MAIN-20210729203133-20210729233133-00258.warc.gz
|
CC-MAIN-2021-31
| 3,749
| 28
|
https://slashdot.org/~mls
|
code
|
Do Evernote and thebrain/personalbrain have an "offline" mode? That is, can I keep things nicely organised locally instead of having to upload to the cloud? Evernote seems to suggest this is the case but at a very cursory perusal both seem to stop short of actually saying "you can use this to organise the files on your hard drive".
You can have local only, as well as synchronized Evernote notebooks.
The notes are search-able and files are embedded in the notes as attachments of a sort. It is not a file system organizer - it is more of a document database.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121778.66/warc/CC-MAIN-20170423031201-00130-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 561
| 3
|
http://brookeswonderousworld.blogspot.com/2011/01/belly-friend.html
|
code
|
hi, this is belly friend speaking (p.s. i'm a belly, not a squinkie). here are some lovely, beeeeyootiful videos of me.
here's my second video of me, sucking my thumb.
now here's my final video. i've got something i need to sing - i've been humming it for days and days now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590559.95/warc/CC-MAIN-20180719051224-20180719071224-00421.warc.gz
|
CC-MAIN-2018-30
| 274
| 3
|
http://breakthroughphilly.org/content/sasha-g
|
code
|
Future Career: Doctor, Lawyer, or Teacher
Favorite Book: Diary of A Wimpy Kid
Interesting Fact: I like to draw and I love my family. I enjoy using the computer and reading books. I also love horror movies!
2021 Vision: In 2021, I will have graduated from Breakthrough and high school. After I graduate, I want to attend college and become either a doctor, lawyer, or teacher.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119361.6/warc/CC-MAIN-20170423031159-00339-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 375
| 4
|
http://www.computerforums.org/forums/hardware/gaming-comp-buy-127514/index2.html
|
code
|
Re: Gaming Comp Buy
Yeah that's a decent card, to be honest 256 mb is nice but with that card 128 is ample, it'll definately improve your gaming quality.
Anyways, hope I've helped, gotta shoot c ya
My Setup -
AMD 64 3200 +, 256 mb Geforce 6600, 1GB PC3200 DDR400 RAM, 160GB SATA 7200RPM HDD
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725451.13/warc/CC-MAIN-20161020183845-00038-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 290
| 5
|
https://askubuntu.com/questions/643667/installation-bug-in-mysql-server-5-6-e-sub-process-usr-bin-dpkg-returned-an-er
|
code
|
I'm trying to remove mysql-workbench. But every time when I try to remove something related with mysql, I get this error.
Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be REMOVED: mysql-server-5.6 0 upgraded, 0 newly installed, 1 to remove and 9 not upgraded. 1 not fully installed or removed. After this operation, 52,5 MB disk space will be freed. Do you want to continue? [Y/n] Y (Reading database ... 309141 files and directories currently installed.) Removing mysql-server-5.6 (5.6.24-0ubuntu2) ... /var/lib/dpkg/info/mysql-server-5.6.postrm: line 53: /usr/share/mysql-common/configure-symlinks: No such file or directory dpkg: error processing package mysql-server-5.6 (--remove): subprocess installed post-removal script returned error exit status 1 Errors were encountered while processing: mysql-server-5.6 E: Sub-process /usr/bin/dpkg returned an error code (1)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00239.warc.gz
|
CC-MAIN-2023-14
| 942
| 2
|
https://www.elucidata.io/blog/redshift-vs-delta-lake-queried-using-athena
|
code
|
The vast amount of genetic information made available using various high throughput experiments has opened up the possibility to systematically study inter-individual differences in drug response. The gene sequence variations obtained from genotyping studies are stored in file formats known as Variant Call Format (VCF). This format was created to identify variations in a large number of related samples after the advent of large-scale genotyping projects such as the 1000 genome project.
Now, it doesn’t take a genius to guess that VCF files are very large in size owing to the vast amount of information they contain. We have close to 23TB of VCF data on Elucidata’s cloud platform, Polly, which made it important to understand which storage tools would be efficient and cost-effective for our platform. Recently, we conducted a benchmarking study to identify the optimal tool for storing and querying the VCFs. For this, we ingested 93 million variants obtained from the GNOMAD public repository with a size of 210 GB (in compressed form) into two AWS storage tools -
1. Amazon Redshift
2. Delta Lake queried using AWS Athena
This exercise helped us to estimate the cost and time required for storing and querying vcf data on these two storages.
We evaluated and compared the tools on multiple parameters such as infrastructure, data distribution, disk space consumed, and response time for running queries.
Amazon Redshift is an Online analytical processing (OLAP) database offered by AWS which is highly scalable and fully managed. Redshift offers different distribution styles and sort keys which makes querying the data more efficient.
For this benchmarking, we chose the Distribution Key as the distribution style with the Chromosome column as the column for the distribution key along with the Position column as the sort key.
[For quick reference:
- The distribution key style uses a specific column as a distribution key and the hashed value of the rows in the distribution key column would be used to distribute the data across the nodes, which means all rows with the same hashed values would be stored together in the same node. It is a best practice to choose the column with low cardinality as the distribution key.
-A single column can be used as a sort key which would improve the query performance on that specific column.]
About Athena and Delta Lakes:
Athena is a serverless pay-per-query service offered by AWS which is helpful to query external tables. The pricing of the query is determined based on the amount of data scanned during the query execution. It also requires the definition of all external queryable tables to be present in a Hive-compatible metastore.
Delta Lake is an open-source storage layer that brings reliability to data lakes. It enables reads and writes in open-source Apache Parquet file format, and provides capabilities like ACID transactions, scalable metadata handling, and unified streaming and batch data processing.
For this benchmarking, we loaded the data into a Delta Lake stored in an S3 bucket and used Athena to run queries on it.
To compare the query performance, we executed a few queries and recorded the time taken by Athena and Redshift to return the query results. As listed in the table below, at this scale of 93 million rows, Athena was consistently returning the results at a similar runtime. However, Redshift performed better when the query is executed primarily on the Chromosome Column which is defined as the distribution key in Redshift.
Since Athena is serverless and its cost is calculated for the amount of data scanned, it would be difficult to directly compare it with Redshift which has a live server constantly running and billed on an hourly basis. This means Redshift has a basic cost even with 0 queries running as a continuously running server is required. For Athena, the cost is linearly dependent on the number of queries.
This makes Athena highly beneficial when the frequency of queries executed highly fluctuates. Redshift on the other hand is useful where continuous high-volume of queries are executed.
However, a true comparison of cost can be made with a clear estimate of the number of instances needed in Redshift is compared to the number of queries run on Athena.
Our Benchmarking exercise shows that to decide which tool would serve a particular user better, it would be helpful to take a close look at the volume of inbound VCF data, the frequency at which queries are executed, and the consistency of query execution time. It would be highly beneficial to run a similar analysis using these parameters to guide users in making an informed choice for the storage tools which could optimize the compute and storage cost as well as the query execution time.
Disclaimer: This study evaluated the tools for the ingested 93 million variants and the results may not be comparable if the number and size of the file are much larger or smaller.
Get the latest insights on Biomolecular data and ML
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711121.31/warc/CC-MAIN-20221206225143-20221207015143-00796.warc.gz
|
CC-MAIN-2022-49
| 4,997
| 22
|
https://mainwp.com/license-agreement/
|
code
|
MainWP License Agreement
Please review the following license agreement before installing or using the MainWP Dashboard, MainWP Child or any individual Extension or other MainWP software product, and/or all related materials.
All MainWP software is released under the GPLv2 (or later) license from the Free Software Foundation.
The purpose of this license is to create an environment for the Developer to commercially develop and support the Software, while providing You with freedoms to use the Software and insurance against abandonware.
You can read the text of the license as outlined by WordPress.org here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00467.warc.gz
|
CC-MAIN-2023-50
| 611
| 5
|
http://blog.blackfox1985.com/2017/02/26/maya-image-planes-not-working-hardware-issue/
|
code
|
You can run Viewport 2.0 using OpenGL, DirectX 11 or OpenGL Core Profile mode.
In Maya 2016 Extension 2, you have a choice of OpenGL- Core Profile (Compatibility) or OpenGL – Core Profile (Strict).
OpenGL- Core Profile (Compatibility) is only available on the Windows and Linux platforms, and supports features from both:
- OpenGL 2.1 and below
- OpenGL 3.2 and above
OpenGL – Core Profile (Strict) supports features from OpenGL 3.2 and above, and is the default on the Mac OS X platform.
See Rendering engine for more information.
To run Viewport 2.0 in core profile mode, select Windows > Settings/Preferences > Preferences to open the Preferences window, and from the Display category, select either OpenGL- Core Profile (Compatibility) or OpenGL – Core Profile (Strict) as the Rendering engine.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651815.80/warc/CC-MAIN-20230605085657-20230605115657-00309.warc.gz
|
CC-MAIN-2023-23
| 804
| 8
|
http://www.utdallas.edu/~rxf090020/research.htm
|
code
|
Computer Vision, Pattern Recognition, Machine learning, and Digital Image Processing.
, Ranran Feng, Balakrishnan Prabhakaran, PlastyFaces: A Database of Facial Images Before and After Plastic Surgery, ECCV (The European Conference on Computer Vision ) 2012, submitted.Ranran Feng, Jiahuang Ji. A novel approach for depth extraction from single 2D image. 2012 International Conference on System and Informatics (ICSAI). (Submitted)
, Ranran Feng, Hongqiang Qian, Batbold Myagmarjav, Jiahuang Ji; ^Implementation of Panorama Browser and Improvements, ̄ 2011 2nd World Congress on Computer Science and Information Engineering (CSIE), 17-19 June, 2011
, Shizhong Zhao; Ranran Feng; Miaoling Zhao; , "Error-controlled computation for termination of programs," Biomedical Engineering and Informatics (BMEI), 2010 3rd International Conference on , vol.7, no., pp.2753-2756, 16-18 Oct. 2010
, Shizhong Zhao; Ranran Feng; Donghuo Chen; , "Termination Set of Univariate Monotonic Program," E-Product E-Service and E-Entertainment (ICEEE), 2010 International Conference on , vol., no., pp.1-4, 7-9 Nov. 2010
, Makeup Effects (before and after, 40 female subjects) MakeupData.zip
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163704.93/warc/CC-MAIN-20180926061824-20180926082224-00291.warc.gz
|
CC-MAIN-2018-39
| 1,181
| 6
|
http://www.citeworld.com/development/21621/google-app-engine-getting-started
|
code
|
Server in the sky: Getting started with Google App Engine
Getting development resources from IT departments takes time. It can take months, even for a priority project. Then there’s the tussle for resources and software, for tools and for expertise. With IT teams setting priorities that might not be aligned with your business needs, the app you need may be too late or, as is often the case, never built.
That’s where the cloud and Bring Your Own Development (BYODev) come in -- you find the tools that are needed when you need them. It’s no wonder then that Platform as a Service environments like Google’s App Engine are becoming increasingly popular. Sure, you have to pay for the resources you use, but with a corporate credit card and a cooperative manager, you can build and run the app you need when you need it, for as long as required. $25 – or even $250 – for a month of running an app in the cloud is a fraction of the cost of servers, software, and developer time.
Google designed App Engine for web applications. That means it’s quick and easy build HTML apps that just need a browser (though you can easily take advantage of REST endpoints in your code to link it to desktop and mobile apps). It’s built around the old familiar CGI features that have driven web apps since the 90s, but uses modern tooling to give you the speed and performance you expect. Apps are driven by request handlers, which are accessed via URLs, using the webapp framework to simplify your code and handle the underlying complexity of HTTP for you. Webapp also gives you tooling to support HTML forms, managing input and output.
That’s much the same as most other PaaS services, whether it’s Azure or Heroku. But App Engine differs in that it gives you access to key elements of Google’s infrastructure. So you can use Google’s user tooling to add authentication to your apps, either using Google accounts or OpenID for single sign on services (there’s also OAuth support for app-to-app authentication). It’s also possible to work with Google’s storage tools, both to manage large amounts of data, and using parallel programing techniques to quickly process and explore data. Google is also providing experimental endpoints for mobile devices, but these can change – so keep them for apps that aren't going to become business essential.
The documentation for App Engine’s Datastore has been written by a master of ironic understatement:“Storing data in a scalable web application can be tricky”.
Luckily for us, we can take advantage of Google’s cloud scale experienc. Google App Engine’s High Replication Datastore distributes data across Google’s datacenters, making it extremely resilient. The HDR is a hierarchical entity store, so you can’t treat it like a traditional database. You’ll need to structure data differently, thinking about working with entity groups in a store that only guarantees eventual consistency. The App Engine data store works well for semi-structured information, where you're collecting and collating information. More structured data can use a cloud hosted version of MySQL, or can be stored in Google Sheets via the Google Docs web APIs.
With news this week that Google Compute Engine cloud is now generally available, the battle in the Infrastructure-as-a-Service market has hit a new level. The biggest question is: Can Google give the kingpin of the public IaaS market, Amazon Web Services (AWS), a run for its money?
KitKat, the latest version (4.4) of Android, has been downloaded to only 1.1% of active Android smartphones and tablets since its debut on Halloween nearly five weeks ago. What's the hold-up?
A new app makes it quick and easy for users to project content from an Android phone or tablet to a wide range of smart TVs and set-top boxes like the Apple TV, Roku devices, Xbox 360, and Xbox One. While still in beta, it offers a lot of flexibility and has the potential to be a presentation Swiss Army knife for mobile professionals.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037167/warc/CC-MAIN-20131204131717-00027-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 4,021
| 10
|
https://guides.library.txstate.edu/c.php?g=1039640&p=7539520
|
code
|
If you like to browse the bookshelves, some general call numbers to help you locate books by broad topics are:
Use the Library Catalog to search for print resources, multimedia resources, and ebooks. The Library Catalog also provides location and availability details. Use quotation marks for "phrase searching"
Books are a great source for background information, big themes, and analysis of a large topic. They are not such a great option for up-to-date statistics or cutting edge research because of the amount of time they take to publish.
If you find a book that looks like it might be useful, look at the table of contents and index and try to find the topic keywords you identified. If you can't find your keywords, the book is probably not going to be helpful for your research. If the keywords are in certain chapters, you can identify which sections you'll need to read instead of wasting your time on the whole book.
Reference material can be very useful for finding broad overviews on a topic:
A collection of online reference material that covers sociology, social work, multicultural and gender studies, political science, psychology, anthropology, criminal justice, health & medicine. Main page allows for searching across all titles and subjects in the collection.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00833.warc.gz
|
CC-MAIN-2024-10
| 1,280
| 6
|
https://raphlinus.github.io/rust/graphics/2018/10/11/2d-graphics.html
|
code
|
A crate I want: 2d graphics
The Rust ecosystem has lot of excellent crates, and many more new ones being published. I believe one is missing, though, and I’d really like to see it happen: a cross-platform abstraction for 2D graphics. In this post I will set out what I want.
An enduring pattern in Rust is a cross-platform abstraction to wrap a system service. Many system services (audio, window creation, networking) require plumbing through to the system. The usual structure is to have platform-specific wrappers as a bottom layer, sometimes a wrapper to add safety and a more Rust idiomatic API, and then a cross-platform abstraction.
For reference, here are some examples of the pattern, for basic system services. In many cases, there are other options, this is mostly to illustrate the kinds of things available.
|window creation||winit||core-graphics||wayland / x11||winapi||(in winit)|
The near-magical result of this pattern is that, very often, it’s possible to
git clone a project, run
cargo run, and have it “just work,” even if running on a different platform than it was developed for.
Build vs buy
As with many things, there is a choice between building a 2D graphics engine, or using one that already exists, in particular one provided with the system. And as usual, there are tradeoffs either way.
An advantage of “build” is that rendering is more likely to be consistent across multiple platforms; similarly, the testing burden is reduced. In addition, a state-of-the art renderer has the potential to be more performant.
An advantage of “buy” is that the amount of Rust code to be compiled is potentially a lot smaller. As an extreme, Skia is a 349MB git clone, not counting any of the dependencies (which of course are managed with a bespoke tool). Also, depending on relative quality of implementation, it might also be more performant, as there’s potential. Finally, very mature 2D graphics libraries already exist, while there’s a lot to do to build a new one.
Ultimately I think both choices are valid, it comes down to quantitative issues, and, in an ideal world, it’s a config choice.
Some potential Rust-native back-ends
Given a cross-platform abstraction for 2D graphics, several promising projects, both existing and future, could potentially be a back-end. The gfx team is starting discussions on draw2d, which would sit on top of the gfx-rs 3d abstraction.
In addition, WebRender has a good chunk of 2D graphics rendering functionality, though itself is missing general Bezier path rendering. Both Pathfinder and lyon provide the needed path functionality, using different approaches to use 3D graphics hardware.
For maximum compatibility, I imagine cairo is the most useful back-end when a system-provided library is not available. However, cairo is mostly a software renderer, so performance will be quite poor compared with what GPU hardware can do. (For full disclosure, there are other back-ends, but harder to interface, and none using state of the art rendering techniques, so this is unlikely to be a major effort.)
An exciting and recent development is the rightmost column in the above table. Increasingly, through wasm, the web is just another compilation target for Rust.
I think this is an especially good opportunity for a 2D graphics abstraction, as 2D graphics is central to the web. There are lots of applications that could potentially target the web: charts, diagrams, and visualizations.
I’m making good, steady progress with xi-win-ui. In addition to xi-win, I’m also building the GUI for my synthesizer using it, and plan to use it for the game UI and interaction when I get to that.
Right now, I’m using direct2d, and it’s going well. That said, I’m not happy about the fact that this code is Windows-only. I’d like this 2D graphics abstraction crate to exist sooner rather than later, so I can port the code over.
As is being discussed on the draw2d thread, there are a number of design choices. Personally, I’d like to see the API generally close to Direct2D, not only because that minimizes porting cost, but also because it’s a relatively modern, performant implementation.
Most 2D APIs are immediate mode, but WebRender is moving in the direction of retained mode, as they find some performance optimizations when painting similar content from frame to frame. A possible compromise is to use a fundamentally immediate mode API, but with functionality to record and display into a display list; this gives the renderer the possibility to preprocess the elements (tesselating polygons, computing overlap for the purpose of reordering to optimize batching, etc) in the display list.
The classic 2D API (I believe most are derived from Java2D, which in turn is inspired by PostScript) is very stateful, generally with push/pop operations to change the transform, set a crop, etc. This style is not ideal for multithreaded apps, and modern 3D APIs have moved very far away from it, Vulkan being an extreme. It could be quite interesting to design a high performance 2D API based on similar ideas, but I’m not sure how important it is in practice; certainly when using existing libraries.
Other related projects
One project to look at is resvg, a pure-Rust SVG implementation. It currently has both a cairo and a Qt backend. It is probably worth looking at its implementation to see what kind of interface it uses for multiple backends. SVG is also quite a rich graphical model. If the new crate is successful, resvg could perhaps be adapted to use it.
Testing and performance evaluation
A major part of the work for this project is evaluating correctness and performance across the multiple backends. The Skia project has an extremely extensive test suite and performance dashboard infrastructure. It might be worth borrowing some of that. Ideally, all backends produce identical results, but of course there will be subtle differences with roundoff, gamma correction, etc.
Having such a test suite would also be highly useful for the development of new backends such as draw2d - in my experience, one of the most productive applications of test driven development is when the tests already exist.
While 2D graphics with only geometric elements and is possible, usually a lot of the content is text. For xi-win-ui, I’m using DirectWrite as a companion to Direct2D.
Text is complex, and has many subfunctions:
Enumerating the system fonts (often with metadata, such as figuring out which fonts are suitable for which scripts).
Shaping text into glyphs (HarfBuzz is the gold standard here).
Rasterizing the glyphs (traditionally FreeType, but rusttype and font-rs are also viable).
Maintaining a glyph cache in a texture atlas.
Even painting can be complex, as to match high quality desktop rendering both RGB subpixel rendering and gamma correct blending is desirable. But these aren’t required for games or mobile usage, and even desktop systems are migrating away from RGB subpixel rendering (it’s off by default in Mojave 10.14).
Using a texture atlas is the classic technique, but the library should be designed not to force this architecture. I think the future is to do the text rasterizing directly on the GPU, which is potentially much faster when the transform is changing continuously (as in pinch-to-zoom or perspective animation).
Having such an abstraction is on the critical path for my game eventually, but it won’t be for a while, as I’m happy doing the prototyping Windows-only for now. Thus, I’d love for the Rust community to step up and build this, one way or other.
I don’t have a lot of extra bandwidth for open source projects right now, but I’m definitely willing to help guide a serious effort. It’d be out of my own pocket, but modest funding might also be available if it would make the difference between this happening or not.
Ideally, it’s something a lot of people could benefit from, and would help the Rust ecosystem as a whole.
Please follow the discussion at /r/rust.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948932.75/warc/CC-MAIN-20230329023546-20230329053546-00335.warc.gz
|
CC-MAIN-2023-14
| 8,017
| 41
|
https://clairelovesyou.com/menu
|
code
|
What I do
My mission is to help women thrive in their careers. Whether it's negotiating your salary or networking like a pro, I've spent years developing curriculum that will help you get recognized and rewarded at work.
I provide one-on-one coaching, facilitate workshops, and speak and/or moderate panels. My specialities include the subjects listed below; I'm also happy to craft programming specific to your needs, goals, and budget.
Say hi at email@example.com.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824180.12/warc/CC-MAIN-20181212225044-20181213010544-00585.warc.gz
|
CC-MAIN-2018-51
| 466
| 4
|
https://www.experts-exchange.com/questions/27191156/UAC-Whitelist-Issues.html
|
code
|
The issue is that APC PowerChute Personal 3.0 is requesting a UAC prompt during startup/logon. I contacted APC and they provided this as a workaround (http://nam-en.apc.com/app/answers/detail/a_id/11148
), which is unacceptable because it completely disables UAC.
I have executed the workaround listed here: https://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Windows/Windows_Vista/Q_26314842.html?sfQueryTermInfo=1+10+30+7+uac+whitelist+window#a33162648
, however in the task scheduler it says its already running (0x8004131F).
Not sure what I need to do next in order to make this work.
Win 7 Pro, SP1
APC PowerChute Personal 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300934.87/warc/CC-MAIN-20220118152809-20220118182809-00002.warc.gz
|
CC-MAIN-2022-05
| 643
| 7
|
https://knowledge.broadcom.com/external/article/54740/need-to-delete-some-of-the-archive-level.html
|
code
|
Need to delete archive levels of a member on a master file. Need to delete anything before 2003.
Using the JCL below specify the member name in the -SEL and the date in ARCLR=YYMMDD.
In the example below all archive levels will be delete that are older than 030101.
//STEP1 EXEC PGM=AFOLIBR,PARM='NJTA,NRJS' //MASTER DD DISP=SHR,DSN=hlq.mlq.CALIBR.MAST //OSJOB DD DUMMY //SYSPUNCH DD SYSOUT=* //SYSPRINT DD SYSOUT=* //SYSIN DD * -SEL member,ARCLR=030101 -END
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00321.warc.gz
|
CC-MAIN-2023-40
| 458
| 4
|
http://freedomfolks.blogspot.com/2007/02/trick-question.html
|
code
|
IN a recent recording the Governator had this to say...
"...he worries that a federal plan to build a fence along the Mexican border will send a troubling message.Here's the secret G, they can be both.
“Are we looking at Mexico now as the enemy?” he says in the recording. “No, it’s not. This is our trading partner.”
Technorati Tags: mexico, trading partner, enemy,
powered by performancing firefox
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119838.12/warc/CC-MAIN-20170423031159-00564-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 409
| 5
|
https://community.oracle.com/message/4245933
|
code
|
This content has been marked as final. Show 7 replies
To use MemoryLock there are several prerequisites:1 person found this helpful
1. You must be running on a platform that supports MemoryLock (looks like you are on Linux so you are okay there).
2. Depending on platform you may need to configure the kernel and/or O/S to (a) allow locking of memory and (b) to set the amount of memory that can be locked (we'll come back to this in a moment).
3. On some platforms you need to run the TT dameons as 'root' in order to lock memory (none of the major ones need this nowadays fortunately).
4. When setting the amount of memory that can be locked you need to allow for the entire TT shared memory segment. The best way to get the size of this is with the ipcs command to directly observer it. The size is typically (PermSize + TempSize + LogBufMB + 'overhead') here 'overhead varies from release to release and platform to platform but is typically in the 15 - 20 MB range.
For Linux specifically you need to ensure that the value specified in /etc/limits/security.conf is sufficient according to the above formula (or better still to the size reported via ipcs).
thanks for yoru quick reply.
My platform is RedHat Linux 64bit (Intel(R) Xeon(R) CPU).
Edited by: ramon_lmj on Apr 20, 2010 1:50 AM
Okay. Did you check that the value you have specified for memlock soft/hard limit is sufficient based on the size of the datatsore segment as per my previous post?
yes. I checked. originally the value was too small. but after i enlarged the value to meet the formula, it still didn't work.
Please can you paste in your DSN definitions and the output from /bin/cat /proc/meminfo. Could you have allocated an amount of memory to Huge Pages already, such that not enough is left to be locked via MemoryLock?
[root@xxx]# cat /proc/meminfo
MemTotal: 16439076 kB
MemFree: 2759932 kB
Buffers: 2520668 kB
Cached: 9190484 kB
SwapCached: 0 kB
Active: 5966140 kB
Inactive: 5920668 kB
HighTotal: 0 kB
HighFree: 0 kB
LowTotal: 16439076 kB
LowFree: 2759932 kB
SwapTotal: 522104 kB
SwapFree: 522104 kB
Dirty: 3304 kB
Writeback: 0 kB
AnonPages: 173596 kB
Mapped: 21188 kB
Slab: 1691000 kB
PageTables: 6264 kB
NFS_Unstable: 0 kB
Bounce: 0 kB
CommitLimit: 8708872 kB
Committed_AS: 542180 kB
VmallocTotal: 34359738367 kB
VmallocUsed: 262720 kB
VmallocChunk: 34359475447 kB
Hugepagesize: 2048 kB
So, the total memory needed for your datastore (assuming this is using TimesTen 11g) is 128 + 128 + 32 + 'overhead' which is around 302 MB = 309248 KB. So, the value specified in /etc/security/limits.conf needs to be at least this much. You might want to make it higher in case the 'overhead' is a bit bigger (or check the actual segment size using ipcs and make sure the value is at least that).
Also, after changing /etc/security/limits.conf you need to (a) log off and then back on again to pick up the new value and (b) stop and start the TimesTen main daemon so that it also picks up the new value. If you don't do both of these then the new value will not be in effect.
I also notice you swap space appears to be grossly under configured. Your machine has 16 GB of RAM and it looks like you only have ~512 MB of swap. You really ought to have at least 24 GB of swap configured.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400279782.77/warc/CC-MAIN-20200927121105-20200927151105-00361.warc.gz
|
CC-MAIN-2020-40
| 3,252
| 44
|
https://app.theconstruct.ai/courses/mastering-ros-rb-vogui-80/
|
code
|
Mastering ROS : RB-Vogui+ Course - Python
Learn the basic operation for the RB-Vogui+ Robot from Robotnik. Learn how navigation, manipulation and perception can be done with RB-Vogui+.
RB-Vogui+ manual to learn the basics of Vigui operation.
What you will learn
- Navigation INDOOR and OUTDOOR
Unit 0: Robotniks Vogui PLUS platfrom
Intro and demo
Unit 1 Part1: Indoor navigation
Learn how to navigate both indoor and outdoors
Unit 1 Part2 : Outdoor navigation and waypoints
Outdoor navigation with GPS and waypoints use
Unit2: Grasping and perception
Learn how to use perception and moveit to grasp an object
Tiny project to practice all you learned
Miguel Angel Rodriguez
Crashing engineering problems. Building solutions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00370.warc.gz
|
CC-MAIN-2024-18
| 723
| 16
|
http://stackoverflow.com/questions/834788/using-varcharmax-vs-text-on-sql-server/834797
|
code
|
VARCHAR(MAX) type is a replacement for
TEXT. The basic difference is that a
TEXT type will always store the data in a blob whereas the
VARCHAR(MAX) type will attempt to store the data directly in the row unless it exceeds the 8k limitation and at that point it stores it in a blob.
Using the LIKE statement is identical between the two datatypes. The additional functionality
VARCHAR(MAX) gives you is that it is also can be used with
GROUP BY as any other
VARCHAR column can be. However, if you do have a lot of data you will have a huge performance issue using these methods.
In regard to if you should use
LIKE to search, or if you should use Full Text Indexing and
CONTAINS. This question is the same regardless of
If you are searching large amounts of text and performance is key then you should use a Full Text Index.
LIKE is simpler to implement and is often suitable for small amounts of data, but it has extremely poor performance with large data due to its inability to use an index.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257829320.70/warc/CC-MAIN-20160723071029-00042-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 993
| 13
|
http://www.yobt.com/content/149221/pretty-teen-jun-nada-plays-with-herself.html
|
code
|
Categories: Cumshot, Hairy Pussy, Small Tits
Tags: Oriental, boobs, cum in eye, hairy pussy, teens
Added 2 years, 2539 views, duration: 05:14. Bookmark this post
Yobt has been serving hot and fresh porn for 8 years. We update our website daily with tons of free porn videos, XXX pics and sex links.
All rights reserved © 2004-2013 Yobt.com #1 Free Porn website on Internet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701153213/warc/CC-MAIN-20130516104553-00028-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 374
| 5
|
https://hitchhikers.yext.com/docs/cli/resources-command-group/diff/
|
code
|
Displays the differences between your local version of resources and your resources stored in Yext. This is powerful for operations where you want to review the changes before they are applied.
yext resources diff [SOURCE-DIR] [flags]
||Help for resources diff|
You must have Git installed in order to run this command. If Git is not installed, please follow the instructions (on the Git website)[https://git-scm.com/book/en/v2/Getting-Started-Installing-Git] before running this command.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039550330.88/warc/CC-MAIN-20210421191857-20210421221857-00407.warc.gz
|
CC-MAIN-2021-17
| 488
| 4
|
http://www.indocurrent.com/cloud/
|
code
|
Indocurrent is an Oracle Cloud Business Partner
Leverage Oracle Platform as a Service (PaaS) to develop, deploy and scale your applications in the cloud. Also, learn how your company can publish innovative applications that extend Oracle Cloud Applications on Oracle Cloud Marketplace allowing you to reach more than 400,000 Oracle customers worldwide.
Deliver great customer experience throughout the customer journey and across all interaction channels. Socially enable your enterprise, empower mobile access anywhere, and apply learned insights from actionable data, all with the speed and agility of the Cloud. The Oracle Customer Experience Cloud helps businesses transform customer relationships into loyal brand advocates.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811655.65/warc/CC-MAIN-20180218042652-20180218062652-00661.warc.gz
|
CC-MAIN-2018-09
| 729
| 3
|
https://prima2019.di.unito.it/calls/call-for-abstracts-industrial-track-en
|
code
|
Call for abstracts (Industrial track)
The PRIMA conference (Principles and Practice of Multi-Agent Systems) is an international event now in its 22nd edition. The conference aims at creating a meeting point between researchers, but also companies, in the field of Artificial Intelligence, and in particular of Distributed and Multi-Agent Systems. The 2019 edition includes a session dedicated to companies, with the aim of facilitating their access to an international context where to spread their technologies and seek contacts for possible cooperations.
To participate in the conference, the submission of an abstract of three to five pages is required, in Italian or English, in which the company introduces its own technology or application in the field multi-agent systems. We recommend using the LNCS format whose Word and Latex templates are available at the following on the page:
For submission, simply send an e-mail attaching the contribution in pdf format at the following e-mail address: email@example.com
Contributions will be evaluated by a commission of experts and those accepted for the Industrial Track will be included in the official conference proceedings, published by Springer in a volume of the Lecture Notes in Computer Science series. Accepted papers are to be presented in a dedicated session, preferably in English. Participation and publication is conditional on a spokesman registration.
July 7th, 2019July 22nd, 2019: Abstract submission
- July 31st, 2019: Notification of acceptance
- October 28th–31st, 2019: Conference dates
The PRIMA 2019 conference is sponsored by and under the patronage of the Computer Science Department of the University of Torino, by the Italian Association for Artificial Intelligence (AI * IA) and is organized by:
- Matteo Baldoni (University of Torino)
- Cristina Baroglio (University of Torino)
- Roberto Micalizio (University of Torino)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662526009.35/warc/CC-MAIN-20220519074217-20220519104217-00159.warc.gz
|
CC-MAIN-2022-21
| 1,904
| 12
|
https://edwardbenson.com/2010/04/newspapers-are-dead-long-live-news
|
code
|
Newspapers are Dead. Long Live News!
I saw an interesting talk at CSAIL today by Nick Bilton, the lead technology writer for the New York Times Bits Blog.
He talked about a lot of things -- data visualizations, the multi-tasking lifestyle, Internet-enabled journalism. He left an impression that the New York Times is way ahead of the curve in terms of news in the Internet Age. While their flagship offering may still be traditional ink on pulp, they have a fully-staffed R&D lab dedicated to prototyping new ways of finding, composing, and distributing news with technology. For an organization that uses old English text for its logo, that's impressive.
But what struck me as most interesting, given his position, was his matter-of-fact attitude toward the changes in news: Newspapers will become extinct. Maybe in five, ten, or twenty years -- whenever flexible OLED screens become cheap enough to use instead of paper. And in the face of the free-for-all publication platform that is the web, the traditional model of a select few organizations providing news to the masses will likely die out too. Yet there will always be news. And there will always be a market for news organizations and journalists, just as there is a market for experts in any field. They just won't interact with us the same way they do now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00259.warc.gz
|
CC-MAIN-2023-14
| 1,319
| 4
|
https://lists.centos.org/pipermail/centos/2012-April/840932.html
|
code
|
I just ordered a new machine that's destined to become a Centos 6 application server for a publishing company, and decided to get one with a 40GB SSD as well as a standard hard drive. I'm thinking that I can put most of the operating system on that drive and have the home directories and whatnot on the regular hard drive. Are there any pitfalls lying in wait for an unwary person like me when setting this thing up? Further, I suspect that if that thing rattles along like I think it should I'll probably want to add a SSD to my own desktop machine here. Since this computer is already set up with the default Centos 6 partitioning system on a single hard drive (/boot, /home and /) is there an easy way to transfer the OS to the SSD or would I be better off reformatting this thing and starting over from scratch if I want to have a SSD for my boot and OS drive? -- MELVILLE THEATRE ~ Real D 3D Digital Cinema ~ www.melvilletheatre.com www.creekfm.com - FIFTY THOUSAND WATTS of POW WOW POWER!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00029.warc.gz
|
CC-MAIN-2024-10
| 995
| 1
|
http://arcadia.spb.ru/our-vacancies/
|
code
|
Arcadia - an innovative offshore software development company providing services to international market.
We are looking for a talented individual for a position of Delivery Manager. The role presumes that the person will manage several teams working with foreign customers (US, UK and Europe).
- participate in overall project management, time estimation, and resource scheduling;
- prepare estimations on time frames, quality and quantity of resources required to successfully implement projects; develops project plan incorporating all project variables;
- ability to handle several projects in parallel, synchronize releases and resources;
- ability to act as a Scrum Master;
- deliver projects successfully.
- constant live communication with the customers to optimize the integration of upstream, and downstream roles & activities such as Product Owner, Product Manager, QA;
- manage customer expectations and relationship.
- encourage use of best development and management practices to ensure the team is continuously learning and improving.
- IT engineering background (coding, testing, analysis, etc.) 5+ years:
- project management experience 3+ years;
- fluent English;
- experience of work with foreign customers especially in offshore development;
- understanding and experience of Agile methodologies;
- self-motivated, multitasking, reliable to deliver on time, a quick-thinker, able to work in a fast-paced work environment.
- higher education.
- be an effective organizer and decision maker;
- be able to quickly adapt to changes and new challenges;
- Scrum certification;
- prefer candidate with experience leading a team going through agile transition.
Salary and benefits:
- competitive salary (discussable, depending on experience)
- training programs, professional development
- benefits: voluntary health insurance (incl. dental insurance)‚ corporate events and sports activities
- flexible schedule
- comfortable office in the downtown near metro station.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106367.1/warc/CC-MAIN-20170820092918-20170820112918-00712.warc.gz
|
CC-MAIN-2017-34
| 1,982
| 27
|
https://www.leadtools.com/help/sdk/v21/dh/omr/fields-omrcollectionstatus.html
|
code
|
An enumeration that indicates the result of processing OmrCollection.
public enum OmrCollectionStatus
Public Enum OmrCollectionStatus
enum class OmrCollectionStatus sealed
|0||Failed||Failed to process this OmrCollection.|
|1||Success||Processing was succesful.|
|2||NoSelection||No OmrBubble is filled in this OmrCollection.|
|3||MultipleSelections||Multiple OmrBubbles are filled.|
If the OMR toolkit fails to process the OmrCollection object, the Status property is set to Failed. On the other hand, if succesful, the status is set to Success. This means the processing is done with a single filled-in OmrBubble.
NoSelection means no OMR mark is filled in the corresponding OmrCollection.
MutlipleSelection means the filled-in form has more than one OMR mark filled.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038464045.54/warc/CC-MAIN-20210417192821-20210417222821-00124.warc.gz
|
CC-MAIN-2021-17
| 769
| 11
|
http://yesmynameisearl.blogspot.com/2012/03/mp-attack-of-virus-pre-vis-part-1.html
|
code
|
This is the current progress of the Pre-Vis. Its coming along well, but slowly, as I'm trying to incorporate elements of the art direction and see exactly how they work. Because of this, it's been split into two parts.
Part Two is coming in the next day or two.
As you can see, the Halftone effect can be pretty overpowering, but I can tone that down with the implementation of Part 2. The general look of the effect needs to be edited too, but that's the point of previs, see what works and how things work. For example, the dots need to be larger, as at the moment they look kind of like cross stitching.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607802.75/warc/CC-MAIN-20170524055048-20170524075048-00286.warc.gz
|
CC-MAIN-2017-22
| 606
| 3
|
https://wiki.debian.org/Awesome?highlight=(CategoryDesktop)
|
code
|
Awesome is a tiling Window Manager that can replace or live together with other desktop environments like Gnome and KDE.
NOTE: this page appears to be written for Ubuntu, please update to reflect your Debian experience
# apt-get install awesome
Optional (adds extra widgets):-
# apt-get install awesome-extra
Now, if you are using GDM or KDM, it should appear in the login window, so you can select Awesome instead of Gnome or KDE.
If it doesn't show up in the window manager list on the login screen edit /usr/share/xsessions/awesome.desktop, change NoDisplay=true to NoDisplay=false.
Hint: You can also write your own Xsession startup script and choose "System Default" in GDM or KDM.
This is a sample Xsession file, working at least on Debian Wheezy and Jessie (the file must be saved as $HOME/.Xsession):
gnome-screensaver & gnome-settings-daemon & export $(/usr/bin/gnome-keyring-daemon --start --components=pkcs11,secrets,ssh,gpg) xrdb -cpp /usr/bin/cpp-4.7 -merge ~/.Xresources xrandr --output HDMI2 --right-of HDMI1 exec awesome
If you are not using a login manager you should configure .xinitrc as usual, running awesome at the end of the script. In order to obtain certain privileges for your user (like being able to make the computer sleep and things like that), use ck-launch-session like this:
#.xinitrc xrdb -merge ~/.Xresources #if you have Xresources xmodmap ~/.Xmodmap #if you use xmodmap nm-applet& #if you want to use network-manager bluetooth-applet& #if you have bluetooth volti& #this is a program to control audio volume ("apt-get install volti") ck-launch-session awesome
If you want to use Awesome at the same time than Gnome or KDE of XFCE, there is good news: it is possible. All this information is on the Awesome official wiki (for example: Awesome with Gnome).
This window manager is mostly managed using the keyboard.
It first run in "normal" mode, but you should press win+space so it enters into tiling mode.
Press win+enter to open terminals.
Press win+l or win+h to enlarge or shrink windows.
Press win+j to go to the next window.
Learn more key commands by running:
Unlike Gnome or KDE type desktops environments, Awesome is configured editing a "lua" source file located either in /etc/xdg/awesome/rc.lua or ~/.config/awesome/rc.lua.
It is recommended that you edit the file in your personal folder so your changes do not affect other users. You do so by coping the general file first:
$ mkdir ~/.config/awesome $ cp /etc/xdg/awesome/rc.lua ~/.config/awesome/rc.lua
Now edit it:
$ nano ~/.config/awesome/rc.lua
Further configuration (highly recommended)
To get an idea of what you can do with awesome, it is recommended that you dedicate some time to fully configure it to your taste. It is recommended to investigate The official Awesome wiki.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280746.40/warc/CC-MAIN-20170116095120-00512-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 2,782
| 26
|
https://www.velocite.co.nz/post/wage-subsidy-extension-revenue-calculation
|
code
|
Updated: Nov 20, 2020
How to calculate a drop in revenue
Firstly, you must continue to bill invoices on the same basis as you did in the prior year
You should not defer billing, as this is still accrued income i.e. income you have earned but not yet received
You should look at revenue received over a 30 day period in the 40 days prior to applying and the same 30 days in the prior year (or the nearest comparable period last year).
If you have a 40% loss in revenue you qualify
If you do not have a 40% loss in revenue, you may need to look at your work in progress (WIP):
You will need to assess your WIP at the start and end of the 30day period this year and for the same period in the prior year
Then you can calculate the revenue generated in the 30day period this year compared to the same period last year
Invoiced revenue over 30days in current year = $64,000
Invoiced revenue over 30days in prior year = $100,000
Revenue loss = (100,000 -64,000) / 100,000
= 36% loss in revenue
Under test one you do not qualify.
WIP as at 24 May 2020 = $60,000
WIP as at 22 June 2020 = $50,000
Revenue for 2020 = $64,000 - $60,000 + $50,000 =$54,000
WIP as at 24 May 2019 = $80,000
WIP as at 22 June 2019 = $75,000
Revenue for 2019 = $100,000 - $80,000 + $75,000 =$95,000
Revenue loss = (95,000 – 54,000) / 95,000
= 43.2% loss in revenue (ensure loss is related to COVID-19)
Therefore, you qualify for the wage subsidy.
If you require our support please email our team at email@example.com
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100290.24/warc/CC-MAIN-20231201151933-20231201181933-00287.warc.gz
|
CC-MAIN-2023-50
| 1,485
| 24
|
https://mastodon.gamedev.place/@emanuel/108193241929199517
|
code
|
Made my first Twitter thread trying to explain Mastodon. Hopefully it is useful to at least 3 people.
@emanuel it was useful to me, so there’s one!
@androidqueen ❤️ . Two more and I'll have self esteem++ for the rest of the day!
Mastodon server focused on game development and related topics.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103915196.47/warc/CC-MAIN-20220630213820-20220701003820-00205.warc.gz
|
CC-MAIN-2022-27
| 298
| 4
|
https://www.xanthir.com/b4g30
|
code
|
Everyone knows they're supposed to use strong, random passwords, and use different passwords on every single site. For most of us, tho, that's impossible - we just can't remember that many. Some of us give up and just remember one strong password (there goes your security when something is breached) or use a password locker like 1Password (hope you're backing up appropriately, and have access to the vault from every single place you'll need a password).
None of these are good strategies. A few years ago I thought about this a bit, and put together a tool to help me handle all this properly and safely. I've evangelized it a bit informally, but more people really need to know about this. So, here goes:
- Memorize one good, strong password. Make it long and random, as secure as you can possibly make it and still be sure to remember it. This is the only random password you'll be required to remember ever again.
- Whenever you need a password for something, visit https://tabatkins.github.io/password/. Put your master password from Step 1 into the master password slot, and enter a memorable "site tag" for that slot. This does not need to be secure in any way, so focus on making it as easy to remember as possible, like the domain name of the site.
- Hit the "Long" button and copy the generated password out. DONE.
- If you're using a terrible website like a bank that applies password limits, the "Short" button usually works - it gives you a 12-char password. If you need more control, the "More Options" section lets you customize the password thoroughly, which should satisfy whatever idiotic demands they call for. Try to avoid using this if possible, just because it means more memorization.
- Store the site tag (and the custom options, if necessary) somewhere accessible. I just use a Google Doc, which I can access from anywhere on multiple devices. This is not secure information, so don't worry about it being exposed - as long as your Master Password is good, you're safe.
And that's it! This method has several benefits over a traditional password locker:
- Same amount of memorization - one master password.
- No need to "back up" anything - you can probably remember the site tag anyway, and if you do record them somewhere it doesn't have to be securely stored.
- Accessible from anywhere - as long as you can touch the internet, you can reach this - no need for a browser extension or a separate program that won't be installed on public computers.
- Works offline - the site is totally self-contained in a single file, so you can save it to your device and use it locally without any internet connection at all.
- Totally independent - nothing can stop working because some company was acquired or went out of business. If you save a local version of the file or host it on your own site, even me removing my site won't stop you.
- No chance of losing passwords - no chance that your password file can be "corrupted" and impossible to decrypt, because there is no password file - it's just a hash function run on your two inputs.
If you're paranoid, feel free to audit the code on your own - it's unobfuscated HTML and JS that makes zero network calls and saves no information. The entire operation is done locally, my version of the file is served over HTTPS, and you can run a local version if you're really paranoid about code changes.
I've been using this for years, and it changed my life around passwords.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511369.62/warc/CC-MAIN-20231004120203-20231004150203-00661.warc.gz
|
CC-MAIN-2023-40
| 3,442
| 16
|
http://www.jsphylosvg.com/
|
code
|
Here is a quick example of how to render a rectangular phylogenetic tree:
phylocanvas = new Smits.PhyloCanvas( dataObject, // Newick or XML string 'svgCanvas', // Div Id where to render 1000, 1000 // Height, Width in pixels );
The same tree, except this time a circular tree:
phylocanvas = new Smits.PhyloCanvas( dataObject, // Newick or XML string 'svgCanvas', // Div Id where to render 1000, 1000, // Height, Width in pixels 'circular' // Type of tree );
The XML definition already includes the option of adding a hyperlink reference and description. jsPhyloSVG taps into this, and formats the text nodes with this information.
Here's an example of what the XML format looks like:
<clade> <name>Subterranean Termite</name> <branch_length>0.17793</branch_length> <annotation> <desc>GQ502663.1 Gut clone Cf8-01 </desc> <uri>http://www.jsphylosvg.com/GQ502663 </uri> </annotation> </clade>
To get started, take a look at our documentation. You will find plenty of code and examples.
We are always looking for ways to make our library better. So please, let us know what you like, and how we can make this better for you! If you create extensions, let us know so that the rest of the community can benefit.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203547.62/warc/CC-MAIN-20190325010547-20190325032547-00267.warc.gz
|
CC-MAIN-2019-13
| 1,204
| 9
|
https://xpgamejobs.com/job/senior-technical-artist-rigging-rd-officechina-rd-shanghai/88420
|
code
|
Senior Technical Artist - Rigging - R&D Office/China R&D
拳头公司成立于 2006 年,负责开发,发行,以及支持全球玩家凝聚力最紧密的游戏。2009 年,我们推出了自己的第一款游戏 《英雄联盟》,赢得了全世界的广泛赞誉,此后这款游戏成为世界上玩得最多的PC游戏,并成为电竞爆炸性增长的关键驱动力。
- 精通数字内容创建工具,尤其是 Maya,以及使用 Python/Mel 编写脚本
Riot Games was established in 2006 by entrepreneurial gamers who believe that player-focused game development can result in great games. In 2009, Riot released its debut title League of Legends to critical and player acclaim. As the most played video game in the world, over 100 million play every month. Players form the foundation of our community and it’s for them that we continue to evolve and improve the League of Legends experience.
We’re looking for humble but ambitious, razor-sharp professionals who can teach us a thing or two. We promise to return the favor. Like us, you take play seriously; you’re passionate about games. We embrace those who see things differently, aren’t afraid to experiment, and who have a healthy disregard for constraints.
That's where you come in.
As a Senior Rigging Technical Artist in Research & Development-Shanghai, you'll dive deep on rigging Characters, creatures, props and living parts of the arenas, and work closely with artists of all disciplines for creating game art assets. You will work with Product Leads, Art Lead, team members, and the Art Director, to stay aligned on vision and priorities, and will report to the Technical Art Lead. You will anticipate and work on discovery processes to evolve and improve current workflows. You will be expressing your vision for future opportunities regarding the creation of the contents for the player and you will facilitate the delivery of content with improved quality targets and less workflow hurdles.
- Rig characters, creatures, and animated props, working closely with animators to achieve engaging in-game animation performance
- Develop and maintain rigging solutions and animation tools that cover different character types as well as experience with facial rigging systems that include usage of blend shapes and simple motion capture techniques to create rich details facial performances
- Provide technical support to artists working from our art workflows, collecting data to further improve the tools they are using
- Spread knowledge of the team’s processes and help teams expand their technical know-how
- Find creative solutions to eliminate difficult problems in production and propose improvements to pipelines, processes and techniques
- Communicate with multiple other disciplines to ensure all rigging and animation assets are performant
- 5+ years experience as a technical artist in games or related industries
- Expertise in digital content creation tools, particularly Maya, as well as scripting in Python/Mel
- Knowledge of figure and facial anatomy
- Knowledge of the human figure and facial anatomy that translates into efficient rigging solutions and facial rigging systems
- Artist empathy & Technical know-how to act as an ambassador between multiple art disciplines and software engineering
- Familiarity with the League of Legends IP
- Experience giving direction and delivering clear, constructive feedback to vendors and external artists
- Expertise in game animation development using modern engine tools, such as Animation Blueprint Editor and Animation Sequence Editor in Unreal Engine
- Proficient Python programmer in UE art tools development
As a Rioter in China, you'll join a team of internationally and culturally diverse professionals that share our prioritization of player experience, rejection of convention and maniacal passion for gaming.
To reinforce Riot’s collaborative culture in our China offices, we’ve decided to do away with the constraints of traditional hierarchical title structures that are more common in the region. Titles don’t really matter at any of Riot’s offices, but we chose to take this extra step in our China offices to foster a space where teamwork thrives. We believe that removing this constraint will promote individual autonomy, ownership, collaboration, and a focus on results. We promise you won’t need a title at Riot to make an impact.
Don’t forget to include a resume and cover letter. We receive a lot of applications, but we’ll notice a fun, well-written intro that shows us you take play seriously.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00285.warc.gz
|
CC-MAIN-2023-40
| 4,585
| 25
|
https://simonwillison.net/2022/Jul/24/karaterobot/
|
code
|
I discovered a while ago that all those errors and bugs that only appear when you demo something to an audience also magically appear when you record yourself demoing it to nobody. Maybe narrating a feature to a pretend audience takes the blinders off enough that you notice little mistakes you wouldn’t have otherwise.
- Weeknotes: Embeddings, more embeddings and Datasette Cloud - 17th September 2023
- Build an image search engine with llm-clip, chat with models with llm chat - 12th September 2023
- LLM now provides tools for working with embeddings - 4th September 2023
- Datasette 1.0a4 and 1.0a5, plus weeknotes - 30th August 2023
- Making Large Language Models work for you - 27th August 2023
- Datasette Cloud, Datasette 1.0a3, llm-mlc and more - 16th August 2023
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00236.warc.gz
|
CC-MAIN-2023-40
| 775
| 7
|