url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://heterodox.economicblogs.org/author/robert-vienneau/articles
|
code
|
Figure 1: Specification of a Market Algorithm1.0 Introduction
This article is heavily based on Bidard (2004).
An approach to the analysis of the choice of technique, in keeping with construction of the outer envelope of wage curves,
is to consider replacing processes, more or less, one at a time.
This post presents this approach as following an algorithm.
Assume that a set of techniques exist where all techniques are at least viable, indecomposable, and produce the same set of commodities. From the set of techniques, one can form a set of processes. In each process, workers produce a single commodity at the end of the year from certain inputs. The inputs, by assumption, are totally consumed in the course of the year. I also assume that the numeraire is specified.
Consider theRead More »
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371824409.86/warc/CC-MAIN-20200408202012-20200408232512-00469.warc.gz
|
CC-MAIN-2020-16
| 798
| 7
|
https://myhomeworkwriters.com/sociology-paper-assignment-homework-help-websites-3/
|
code
|
Sociology Paper Assignment | Homework Help Websites
February 3rd, 2019
- Students will need to view the following film (click on title): The Stanford Prison Experiment/Zimbardo Prison Experiment If you are not able to access the film, please use the following link: https://www.youtube.com/watch?v=L_LKzEqlPto
- Students will need to respond to the following questions:
- Based on the course material, what type of research data is being collected in this research project? Quantitative or Qualitative, make sure to explain the reason why you chose this type of data collection.
- Based on the course material (make sure review Chapter 2—2.3 Ethical Concerns), describe one ethical issue you identified within the film. Explain why you consider it to be an ethical issue, make sure to use course material to support your response.
- Do you think this type of research study could be done today (only need to choose one)?
- If so, explain why it could be done today and any problems you think both the researcher—Zimbardo and the participants might experience.
- If not, explain what would need to be changed in order for the experiment to be conducted today.
- If you were conducting an experiment similar to the Zimbardo’s Prison Experiment, how would you try to capture the information Zimbardo was trying to capture without placing the participants in harm (remember you are trying to see what happens when people are placed in restrictive environments and have been assigned roles that they have never held)?
- What were your overall thoughts about the experiment?
- Do you think you could participate in an experiment of this nature? Why or Why not?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00502.warc.gz
|
CC-MAIN-2023-40
| 1,660
| 12
|
https://scifi.stackexchange.com/questions/274162/novel-novelette-id-humans-as-domesticated-pack-riding-animals/274175
|
code
|
I read this story at least 20 years ago and almost certainly it is quite a bit older than that. I would hazard a guess that it is 1980's or earlier, but don't actually have a clue. I don't remember the cover art. I think it was a short novel or novelette.
I could have sworn it was by Margaret Atwood, but nothing in her oeuvre is ringing any bells. It could also have been by one of the classics of SF, such as Heinlein (again no bells), but also possibly not. I likely got the book from my local library.
Set in a prosperous future after an apocalyptic event, or may start pre-apocalypse with a description of society at the time. The main narrator tells their tale from the first person perspective I think, describing a number of events, such as going for a ride on their favourite riding beast and participating in races on the beast. They also describe some of the difficulties of breeding the beasts (like all breeding a racehorse to us) - they are fiercely independent in this and will mate indiscriminately, but only with their established partner, not one chosen by their owner (if that makes sense).
The animals are described as making sounds that almost make sense to the owners and seem like they are communicating with each-other, but are described as "dumb animals" by the narrator.
Long story short; it turns out that the "beasts" are humans, who chose to atone for their damage to the environment (hence the Atwood in my mind), and to do this they deliberately turned themselves into servants for other animals, helping them to evolve along better lines than humans did over many years, possibly using genetic modification to speed the process. The humans have also taught the animals English as their language, including written as well as speech. The sounds that the humans are making are indeed language, possibly some evolution of pig-latin, used deliberately to ensure that their animal (now) masters can't understand them and allow the humans to continue their assistance of the evolutionary path.
I think the narrator of the story is actually a descendant of a squirrel or some similar animal, but am very uncertain about this.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00025.warc.gz
|
CC-MAIN-2024-10
| 2,151
| 6
|
https://itch.io/profile/arquoia
|
code
|
We are ARQUOIA, an indie studio currently embedded in the outback north of Berlin, Germany. Forged in the fires of fine arts and real-time graphics, we’ve always been looking for new ways to blur the lines between art and technology. After some years of labor, we finally came up with our latest experimental first-person game: AENTITY.
The game “visualizes your acts of watching and trying to understand, letting them become the source of the artwork.” (Bennett Foddy)
In a nutshell, to win this game, you must free the hidden artist in you.
We are also currently working on a walkable companion website, where you can view uploaded player's stills from AENTITY.
So on the surface, the game is about wandering and relaxing, while creating art and mastering visual composition, something one may use in the real world once in a while. You might stick it on the wall or send your friends a card.
But, this is only the vehicle for something else. At its core, wanting is suffering. The game’s pillars circle around a most DIFFICULT main objective: To have no aim for a while, to experience being FREE. Once understood and identified with the unusual GOAL, you are in a sense protagonist and antagonist in one, and must overcome yourself.
We believe games are the perfect medium to encounter oneself on a level that lies beyond abstract thinking and human consciousness. As artists we strive to cross the boundaries of game design in order to create intrinsically motivated behaviors that players have not experienced before. As human beings, however, we try to invent games that culturally advance humanity in a humanistic sense.
This also includes to reach a broad audience of all ages and walks of life to encourage self-reflection and personal creativity... Our work is meant to use the psychological tension fields that result from playing to help players monitor and find themselves, which in turn can give you an expanded, yet harmonized perspective on the world.
Hope you'll like it :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00401.warc.gz
|
CC-MAIN-2022-33
| 1,998
| 9
|
https://www.vn.freelancer.com/projects/administrative-support/recruitment-sales-representative/
|
code
|
Không tìm thấy công việc
Rất tiếc chúng tôi không thể tìm thấy công việc mà bạn đang tìm kiếm.
Tím thấy các công việc mới nhất ở đây:
Inversiones & Inmuebles Insa, dedicada a la negociación de inmuebles en España, esta en busca de freelancer que viva en Madrid y tenga disponibilidad de tiempo, dentro de las responsabilidades que tendrá están: - Haga citas personales: deben crearse en un calendario electrónico y confirmarse por escrito a las personas involucradas, también deben mante...
To setup and fix email accounts in the VPS hosted by IONOS
I need someone to copy information from some websites.
Need Virtual Assistant for Website Development Company. Required 3 hours daily support and the task involves Bidding, Telemarketing, Social Media Marketing and Email Marketing. Sales and Marketing Experts only. Read Less
Design a logo according to the company background.
Photoshop an Image and merge it with an existing one
I would like to hire a zbrush artist to do multiple characters for 3D print, must have good experience with female and male anatomy It is for 3d printing, also if you know the pipeline and to split the models for printing, it would be great! I like to work with the artist on long term basis, So price need to be reasonable. I prefer zbrush and if you have good sculpting and modeling skilllset in...
I need a form where admin can create fields and operator can enter predefined data. It is a one day job. If you are good we will give you more work. You should have verified freelancer account and you should be able to start right away.
Looking for experts in Building site with WIX.
put a nose mask on a person face
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370491857.4/warc/CC-MAIN-20200328104722-20200328134722-00524.warc.gz
|
CC-MAIN-2020-16
| 1,697
| 13
|
https://www.arxiv-vanity.com/papers/1604.06646/
|
code
|
Synthetic Data for Text Localisation in Natural Images
In this paper we introduce a new method for text detection in natural images. The method comprises two contributions: First, a fast and scalable engine to generate synthetic images of text in clutter. This engine overlays synthetic text to existing background images in a natural way, accounting for the local 3D scene geometry. Second, we use the synthetic images to train a Fully-Convolutional Regression Network (FCRN) which efficiently performs text detection and bounding-box regression at all locations and multiple scales in an image. We discuss the relation of FCRN to the recently-introduced YOLO detector, as well as other end-to-end object detection systems based on deep learning. The resulting detection network significantly out performs current methods for text detection in natural images, achieving an F-measure of 84.2% on the standard ICDAR 2013 benchmark. Furthermore, it can process 15 images per second on a GPU.
Text spotting, namely the ability to read text in natural scenes, is a highly-desirable feature in anthropocentric applications of computer vision. State-of-the-art systems such as achieved their high text spotting performance by combining two simple but powerful insights. The first is that complex recognition pipelines that recognise text by explicitly combining recognition and detection of individual characters can be replaced by very powerful classifiers that directly map an image patch to words [13, 20]. The second is that these powerful classifiers can be learned by generating the required training data synthetically [44, 19].
While successfully addressed the problem of recognising text given an image patch containing a word, the process of obtaining these patches remains suboptimal. The pipeline combines general purpose features such as HoG , EdgeBoxes and Aggregate Channel Features and brings in text specific (CNN) features only in the later stages, where patches are finally recognised as specific words. This state of affair is highly undesirable for two reasons. First, the performance of the detection pipeline becomes the new bottleneck of text spotting: in recognition accuracy for correctly cropped words is 98% whereas the end-to-end text spotting F-score is only 69% mainly due to incorrect and missed word region proposals. Second, the pipeline is slow and inelegant.
In this paper we propose improvements similar to to the complementary problem of text detection. We make two key contributions. First, we propose a new method for generating synthetic images of text that naturally blends text in existing natural scenes, using off-the-shelf deep learning and segmentation techniques to align text to the geometry of a background image and respect scene boundaries. We use this method to automatically generate a new synthetic dataset of text in cluttered conditions (figure 1 (top) and section 2). This dataset, called SynthText in the Wild (figure 2), is suitable for training high-performance scene text detectors. The key difference with existing synthetic text datasets such as the one of is that these only contains word-level image regions and are unsuitable for training detectors.
The second contribution is a text detection deep architecture which is both accurate and efficient (figure 1 (bottom) and section 3). We call this a fully-convolutional regression network. Similar to models such as the Fully-Convolutional Networks (FCN) for image segmentation, it performs prediction densely, at every image location. However, differently from FCN, the prediction is not just a class label (text/not text), but the parameters of a bounding box enclosing the word centred at that location. The latter idea is borrowed from the You Look Only Once (YOLO) technique of Redmon et al. , but with convolutional regressors with a significant boost to performance.
The new data and detector achieve state-of-the-art text detection performance on standard benchmark datasets (section 4) while being an order of magnitude faster than traditional text detectors at test time (up to 15 images per second on a GPU). We also demonstrate the importance of verisimilitude in the dataset by showing that if the detector is trained on images with words inserted synthetically that do not take account of the scene layout, then the detection performance is substantially inferior. Finally, due to the more accurate detection step, end-to-end word recognition is also improved once the new detector is swapped in for existing ones in state-of-the-art pipelines. Our findings are summarised in section 5.
1.1 Related Work
|# Images||# Words|
Object Detection with CNNs.
Our text detection network draws primarily on Long et al.’s Fully-Convolutional network and Redmon et al.’s YOLO image-grid based bounding-box regression network . YOLO is part of a broad line of work on using CNN features for object category detection dating back to Girshick et al.’s Region-CNN (R-CNN) framework combination of region proposals and CNN features. The R-CNN framework has three broad stages — (1) generating object proposals, (2) extracting CNN feature maps for each proposal, and (3) filtering the proposals through class specific SVMs. Jaderberg et al.’s text spotting method also uses a similar pipeline for detection . Extracting feature maps for each region independently was identified as the bottleneck by Girshick et al. in Fast R-CNN . They obtain 100 speed-up over R-CNN by computing the CNN features once and pooling them locally for each proposal; they also streamline the last two stages of R-CNN into a single multi-task learning problem. This work exposed the region-proposal stage as the new bottleneck. Lenc et al. drop the region proposal stage altogether and use a constant set of regions learnt through K-means clustering on the PASCAL VOC data. Ren et al. also start from a fixed set of proposal, but refined them prior to detection by using a Region Proposal Network which shares weights with the later detection network and streamlines the multi-stage R-CNN framework.
Synthetic datasets provide detailed ground-truth annotations, and are cheap and scalable alternatives to annotating images manually. They have been widely used to learn large CNN models — Wang et al. and Jaderberg et al. use synthetic text images to train word-image recognition networks; Dosovitskiy et al. use floating chair renderings to train dense optical flow regression networks. Detailed synthetic data has also been used to learn generative models — Dosovitskiy et al. train inverted CNN models to render images of chairs, while Yildirim et al. use deep CNN features trained on synthetic face renderings to regress pose parameters from face images.
Augmenting Single Images.
There is a large body of work on inserting objects photo-realistically, and inferring 3D structure from single images — Karsch et al. develop an impressive semi-automatic method to render objects with correct lighting and perspective; they infer the actual size of objects based on the technique of Criminisi et al. . Hoiem et al. categorise image regions into ground-plane, vertical plane or sky from a single image and use it to generate “pop-ups” by decomposing the image into planes . Similarly, we too decompose a single image into local planar regions, but use instead the dense depth prediction of Liu et al. .
2 Synthetic Text in the Wild
Supervised training of large models such as deep CNNs, which contain millions of parameters, requires a very significant amount of labelled training data , which is expensive to obtain manually. Furthermore, as summarised in Table 1, publicly available text spotting or detection datasets are quite small. Such datasets are not only insufficient to train large CNN models, but also inadequate to represent the space of possible text variations in natural scenes — fonts, colours, sizes, positions. Hence, in this section we develop a synthetic text-scene image generation engine for building a large annotated dataset for text localisation.
Our synthetic engine (1) produces realistic scene-text images so that the trained models can generalise to real (non-synthetic) images, (2) is fully automated and, is (3) fast, which enables the generation of large quantities of data without supervision. The text generation pipeline can be summarised as follows (see also Figure 3). After acquiring suitable text and image samples (section 2.1), the image is segmented into contiguous regions based on local colour and texture cues , and a dense pixel-wise depth map is obtained using the CNN of (section 2.2). Then, for each contiguous region a local surface normal is estimated.
Next, a colour for text and, optionally, for its outline is chosen based on the region’s colour (section 2.3). Finally, a text sample is rendered using a randomly selected font and transformed according to the local surface orientation; the text is blended into the scene using Poisson image editing . Our engine takes about half a second to generate a new scene-text image.
This method is used to generate 800,000 scene-text images, each with multiple instances of words rendered in different styles as seen in Figure 2. The dataset is available at: http://www.robots.ox.ac.uk/~vgg/data/scenetext
2.1 Text and Image Sources
The synthetic text generation process starts by sampling some text and a background image. The text is extracted from the Newsgroup20 dataset in three ways — words, lines (up to 3 lines) and paragraphs (up to 7 lines). Words are defined as tokens separated by whitespace characters, lines are delimited by the newline character. This is a rich dataset, with a natural distribution of English text interspersed with symbols, punctuation marks, nouns and numbers.
To favour variety, 8,000 background images are extracted from Google Image Search through queries related to different objects/scenes and indoor/outdoor and natural/artificial locales. To guarantee that all text occurrences are fully annotated, these images must not contain text of their own (a limitation of the Street View Text is that annotations are not exhaustive). Hence, keywords which would recall a large amount of text in the images (e.g. “street-sign”, “menu” etc.) are avoided; images containing text are discarded through manual inspection.
2.2 Segmentation and Geometry Estimation
In real images, text tends to be contained in well defined regions (e.g. a sign). We approximate this constraint by requiring text to be contained in regions characterised by a uniform colour and texture. This also prevents text from crossing strong image discontinuities, which is unlikely to occur in practice. Regions are obtained by thresholding the gPb-UCM contour hierarchies at using the efficient graph-cut implementation of . Figure 4 shows an example of text respecting local region cues.
In natural images, text tends to be painted on top of surfaces (e.g. a sign or a cup). In order to approximate a similar effect in our synthetic data, the text is perspectively transformed according to local surface normals. The normals are estimated automatically by first predicting a dense depth map using the CNN of for the regions segmented above, and then fitting a planar facet to it using RANSAC .
Text is aligned to the estimated region orientations as follows: first, the image region contour is warped to a frontal-parallel view using the estimated plane normal; then, a rectangle is fitted to the fronto-parallel region; finally, the text is aligned to the larger side (“width”) of this rectangle. When placing multiple instances of text in the same region, text masks are checked for collision against each other to avoid placing them on top of each other.
Not all segmentation regions are suitable for text placement — regions should not be too small, have an extreme aspect ratio, or have surface normal orthogonal to the viewing direction; all such regions are filtered in this stage. Further, regions with too much texture are also filtered, where the degree of texture is measured by the strength of third derivatives in the RGB image.
An alternative to using a CNN to estimate depth, which is an error prone process, is to use a dataset of RGBD images. We prefer to estimate an imperfect depth map instead because: (1) it allows essentially any scene type background image to be used, instead of only the ones for which RGBD data are available, and (2) because publicly available RGBD datasets such as NYUDv2 , B3DO , Sintel , and Make3D have several limitations in our context: small size (1,500 images in NYUDv21, 400 frames in Make3D, and a small number of videos in B3DO and Sintel), low-resolution and motion blur, restriction to indoor images (in NYUDv2 and B3DO), and limited variability in the images for video-based datasets (B3DO and Sintel).
2.3 Text Rendering and Image Composition
Once the location and orientation of text has been decided, text is assigned a colour. The colour palette for text is learned from cropped word images in the IIIT5K word dataset . Pixels in each cropped word images are partitioned into two sets using K-means, resulting in a colour pair, with one colour approximating the foreground (text) colour and the other the background. When rendering new text, the colour pair whose background colour matches the target image region the best (using L2-norm in the Lab colour space) is selected, and the corresponding foreground colour is used to render the text.
About 20% of the text instances are randomly chosen to have a border. The border colour is chosen to be either the same as foreground colour with its value channel increased or decreased, or is chosen to be the mean of the foreground and background colours.
To maintain the illumination gradient in the synthetic text image, we blend the text on to the base image using Poisson image editing , with the guidance field defined as in their equation (12). We solve this efficiently using the implementation provided by Raskar111Fast Poisson image editing code available at: http://web.media.mit.edu/~raskar/photo/code.pdf based on Discrete Sine Transform.
3 A Fast Text Detection Network
In this section we introduce our CNN architecture for text detection in natural scenes. While existing text detection pipelines combine several ad-hoc steps and are slow, we propose a detector which is highly accurate, fast, and trainable end-to-end.
Let denote an image. The most common approach for CNN-based detection is to propose a number of image regions that may contain the target object (text in our case), crop the image, and use a CNN to score them as correct or not. This approach, which has been popularised by R-CNN , works well but is slow as it entails evaluating the CNN thousands of times per image.
An alternative and much faster strategy for object detection is to construct a fixed field of predictors , each of which specialises in predicting the presence and pose of an object around a specific image location . Here the pose parameters and denote respectively the location and size of a bounding box tightly enclosing the object. Each predictor is tasked with predicting objects which occurs in some ball of the predictor location.
While this construction may sound abstract, it is actually a common one, implemented for example by Implicit Shape Models (ISM) and Hough voting . There a predictor looks at a local image patch, centred at , and tries to predict whether there is an object around , and where the object is located relative to it.
In this paper we propose an extreme variant of Hough voting, inspired by Fully-Convolutional Network (FCN) of Long et al. and the You Look Only Once (YOLO) technique of Redmon et al. . In ISM and Hough voting, individual predictions are aggregated across the image, in a voting scheme. YOLO is similar, but avoids voting and uses individual predictions directly; since this idea can accelerate detection, we adopt it here.
The other key conceptual difference between YOLO and Hough voting is that in Hough voting predictors are local and translation invariant, whereas in YOLO they are not: First, in YOLO each predictor is allowed to pool evidence from the whole image, not just an image patch centred at . Second, in YOLO predictors at different locations are different functions learned independently.
While YOLO’s approach allows the method to pick up contextual information useful in detection of PASCAL or ImageNet objects, we found this unsuitable for smaller and more variable text occurrences. Instead, we propose here a method which is in between YOLO and Hough voting. As in YOLO, each detector still predicts directly object occurrences, without undergoing an expensive voting accumulation process; however, as in Hough voting, detectors are local and translation invariant, sharing parameters. We implement this field of translation-invariant and local predictors as the output of the last layer of a deep CNN, obtaining a fully-convolutional regression network (FCRN).
|FCRN + multi-filt||78.7||95.3||67.0||67.5||78.0||94.8||66.3||66.7||56.3||61.5||51.9||54.1||78.0||94.5||66.4||78.0||94.8||66.3||25.5||26.8||24.3|
|FCRNall + multi-filt||84.7||94.3||76.9||79.6||84.2||93.8||76.4||79.6||62.4||65.1||59.9||75.0||82.3||91.5||74.8||83.0||92.0||75.5||26.7||26.2||27.4|
This section describes the structure of the FCRN. First, we describe the first several layers of the architecture, which compute text-specific image features. Then, we describe the dense regression network built on top of these features and finally its application at multiple scales.
Our architecture is inspired by VGG-16 , using several layers of small dense filters; however, we found that a much smaller model works just as well and more efficiently for text. The architecture comprises nine convolutional layers, each followed by the Rectified Linear Unit non-linearity, and, occasionally, by a max-pooling layer. All linear filters have a stride of sample, and preserve the resolution of feature maps through zero padding. Max-pooling is performed over windows with a stride of 2 samples, therefore halving the feature maps resolution. 222The sequence of layers is as follows: 64 55 convolutional filters + ReLU (CR-64-55), max pooling (MP), CR-128-55, MP, CR128-33, CR-128-33-conv, MP, CR-256-33, CR-256-33, MP, CR-512-33, CR-512-33, CR-512-55.
Class and bounding box prediction.
The single-scale features terminate with a dense feature field. Given that there are four downsampling max-pooling layers, the stride of these features is pixels, each containing 512 feature channels (we express in pixels for convenience).
Given the features , we can now discuss the construction of the dense text predictors . These predictors are implemented as a further seven linear filters (C-7-55) , each regressing one of seven numbers: the object presence confidence , and up to six object pose parameters where have been discussed before and is the bounding box rotation.
Hence, for an input image of size , we obtain a grid of predictions, one each for an image cell of size pixels. Each predictor is responsible for detecting a word if the word centre falls within the corresponding cell.333For regression, it was found beneficial to normalise the pose parameters as follows: . YOLO is similar but operates at about half this resolution; a denser predictor sampling is important to reduce collisions (multiple words falling in the same cell) and therefore to increase recall (since at most one word can be detected per cell). In practice, for a 224224 image, we obtain 1414 cells/predictors
Limited receptive field of our convolutional filters prohibits detection of large text instances. Hence, we get the detections at multiple down-scaled versions of the input image and merge them through non-maximal suppression. In more detail, the input image is scaled down by factors (scaling up is an overkill as the baseline features are already computed very densely). Then, the resulting detections are combined by suppressing those with a lower score than the score of an overlapping detection.
We use a squared loss term for each of the outputs of the CNN as in YOLO . If a cell does not contain a ground-truth word, the loss ignores all parameters but (text/no-text).
Comparison with YOLO.
Our fully-convolutional regression network (FCRN) has 30 less parameters than the YOLO network (which has of the parameters in the last two fully-connected layers). Due to its global nature, standard YOLO must be retrained for each image size, including multiple scales, further increasing the model size (while our model requires 44MB, YOLO would require 2GB). This makes YOLO not only harder to train, but also less efficient (2 slower that FCRN).
First, in section 4.1 we describe the text datasets on which we evaluate our model. Next, we evaluate our model on the text localisation task in section 4.2. In section 4.3, to investigate which components of the synthetic data generation pipeline are important, we perform detailed ablation experiments. In section 4.4, we use the results from our localisation model for end-to-end text spotting. We show substantial improvements over the state-of-the-art in both text localisation and end-to-end text spotting. Finally, in section 4.5 we discuss the speed-up gained by using our models for text localisation.
We evaluate our text detection networks on standard benchmarks: ICDAR 2011, 2013 datasets [39, 24] and the Street View Text dataset . These datasets are reviewed next and their statistics are given in Table 1.
SynthText in the Wild.
This is a dataset of 800,000 training images generated using our synthetic engine from section 2. Each image has about ten word instances annotated with character and word-level bounding-boxes.
The ICDAR datasets (IC011, IC013) are obtained from the Robust Reading Challenges held in 2011 and 2013 respectively. They contain real world images of text on sign boards, books, posters and other objects with world-level axis-aligned bounding box annotations. The datasets largely contain the same images, but shuffle the test and training splits. We do not evaluate on the more recent ICDAR 2015 dataset as it is almost identical to the 2013 dataset.
Street View Text.
This dataset, abbreviated SVT, consists of images harvested from Google Street View annotated with word-level axis-aligned bounding boxes. SVT is more challenging than the ICDAR data as it contains smaller and lower resolution text. Furthermore, not all instances of text are annotated. In practice, this means that precision is heavily underestimated in evaluation. Lexicons consisting of 50 distractor words along with the ground-truth words are provided for each image; we refer to testing on SVT with these lexicons as SVT-50.
4.2 Text Localisation Experiments
We evaluate our detection networks to — (1) compare the performance when applied to single-scale and multiple down-scaled versions of the image and, (2) improve upon the state-of-the-art results in text detection when used as high-quality proposals.
FCRN is trained on 800,000 images from our SynthText in the Wild dataset. Each image is resized to a size of 512512 pixels. We optimise using SGD with momentum and batch-normalisation after every convolutional layer (except the last one). We use mini-batches of 16 images each, set the momentum to 0.9, and use a weight-decay of . The learning rate is set to initially and is reduced to when the training loss plateaus.
As only a small number (1-2%) of grid-cells contain text, we weigh down the non-text probability error terms initially by multiplying with 0.01; this weight is gradually increased to 1 as the training progresses. Due to class imbalance, all the probability scores collapse to zero if such a weighting scheme is not used.
We get the class probabilities and bounding-box predictions from our FCRN model. The predictions are filtered by thresholding the class probabilities (at a threshold ). Finally, multiple detections from nearby cells are suppressed using non-maximal suppression, whereby amongst two overlapping detections the one with the lower probability is suppressed. In the following we first give results for a conservative threshold of , for higher precision, and then relax this to (i.e., all proposals accepted) for higher recall.
We report text detection performance using two protocols commonly used in the literature — (1) DetEval popularly used in ICDAR competitions for evaluating localisation methods, and (2) PASCAL VOC style intersection-over-union overlap method ( 0.5 IoU for a positive detection).
Single & multi-scale detection.
The “FCRN single-scale” entry in Table 2 shows the performance of our FCRN model on the test datasets. The precision at maximum F-measure of single-scale FCRN is comparable to the methods of Neuman et al. [33, 34], while the recall is significantly worse by 12%.
The “FCRN multi-scale” entry in Table 2 shows performance on multi-scale application of our network. This method improves maximum recall by more than 12% over the single-scale method and outperforms the methods of Neumann et al.
Current end-to-end text spotting (detection and recognition) methods [1, 20, 44] boost performance by combining detection with text recognition. To further improve FCRN detections, we use the multi-scale detections from FCRN as proposals and refine them by using the post-processing stages of Jaderberg et al. . There are three stages: first filtering using a binary text/no-text random-forest classifier; second, regressing an improved bounding-box using a CNN; and third recognition based NMS where the word images are recognised using a large fixed lexicon based CNN, and the detections are merged through non-maximal suppression based on word identities. Details are given in . We use code provided by the authors for fair comparison.
We test this in two modes — (1) low-recall: where only high-scoring (probability ) multi-scale FCRN detections are used (the threshold previously used in the single- and multi-scale inference). This typically yields less than 30 proposals. And, (2) high-recall: where all the multi-scale FCRN detections (typically about a thousand in number) are used. Performance of these methods on text detection are shown by the entries named “FCRN + multi-filt” and “FCRNall + multi-filt” respectively in Table 2. Note that the low-recall method achieves better than the state-of-the-art performance on text detection, whereas high-recall method significantly improves the state-of-the-art with an improvement of 6% in the F-measure for all the datasets.
Figure 5 shows the Precision-Recall curves for text detection on the IC13 dataset. Note the high recall (85.9%) of the multi-scale detections output from FCRN before refinement using the multi-filtering post-processing. Also, note the drastic increase in maximum recall () and in Average Precision () for “FCRNall + multi-filt” as compared to Jaderberg et al.
Further, to establish that the improvement in text detection is due to the new detection model, and not merely due to the large size of our synthetic dataset, we trained Jaderberg et al.’s method on our SynthText in the Wild dataset -- in particular, the ACF component of their region proposal stage.444Their other region proposal method, EdgeBoxes, was not re-trained; as it is learnt from low-level edge features from the Berkeley Segmentation Dataset, which is not text specific. Figure 5 and Table 2 show that, even with 10 more (synthetic) training data, Jaderberg et al.’s model improves only marginally (+0.8% in AP, +2.1% in maximum recall).
A common failure mode is text in unusual fonts which are not present in the training set. The detector is also confused by symbols or patterns of constant stroke width which look like text, for example road-signs, stick figures etc. Since the detector does not scale the image up, extremely small sized text instances are not detected. Finally, words get broken into multiple instances or merged into one instance due to large or small spacing between the characters.
4.3 Synthetic Dataset Evaluation
We investigate the contribution that the various stages of the synthetic text-scene data generation pipeline bring to localisation accuracy: We generate three synthetic training datasets with increasing levels of sophistication, where the text is (1) is placed at random positions within the image, (2) restricted to the local colour and texture boundaries, and (3) distorted perspectively to match the local scene depth (while also respecting the local colour and texture boundaries as in (2) above). All other aspects of the datasets were kept the same — e.g. the text lexicon, background images, colour distribution.
Figure 6 shows the results on localisation on the SVT dataset of our method “FCRNall+multi-filt”. Compared to random placement, restricting text to the local colour and texture regions significantly increases the maximum recall (+6.8%), AP (+3.85%), and the maximum F-measure (+2.1%). Marginal improvements are seen with the addition of perspective distortion: +0.75% in AP, +0.55% in maximum F-measure, and no change in the maximum recall. This is likely due to the fact that most text instances in the SVT datasets are in a fronto-parallel orientation. Similar trends are observed with the ICDAR 2013 dataset, but with more contained differences probably due to the fact that ICDAR’s text instances are much simpler than SVT’s and benefit less from the more advanced datasets.
|Wang & Wu ||-||-||-||-||46|
|FCRN + multi-filt||
|FCRNall + multi-filt||
4.4 End-to-End Text Spotting
Text spotting is limited by the detection stage, as state-of-the-art cropped word image recognition accuracy is over 98% . We utilise our improvements in text localisation to obtain state-of-the-art results in text spotting.
Unless otherwise stated, we follow the standard evaluation protocol by Wang et al. , where all words that are either less than three characters long or contain non-alphanumeric characters are ignored. An overlap (IoU) of at least 0.5 is required for a positive detection.
Table 3 shows the results on end-to-end text spotting task using the “FCRN + multi-filt” and “FCRNall + multi-filt” methods. For recognition we use the output of the intermediary recognition stage of the pipeline based on the lexicon-encoding CNN of Jaderberg et al. . We improve upon previously reported results (F-measure): % on the ICDAR datasets, and % on the SVT dataset. Given the high recall of our method (as noted before in Figure 5), the fact that many text instances are unlabelled in SVT cause precision to drop; hence, we see smaller gains in SVT and do worse on SVT-50.
At test time FCRN can process 20 images per second (of size px) at single scale and about 15 images per second when run on multiple scales (1,1/2,1/4,1/8) on a GPU. When used as high-quality proposals in the text localisation pipeline of Jaderberg et al. , it replaces the region proposal stage which typically takes about 3 seconds per image. Hence, we gain a speed-up of about 45 times in the region proposal stage. Further, the “FCRN + multi-filt” method, which uses only the high-scoring detections from multi-scale FCRN and achieves state-of-the-art results in detection and end-to-end text spotting, cuts down the number of proposals in the later stages of the pipeline by a factor of 10: the region proposal stage of Jaderberg et al. proposes about 2000 boxes which are quickly filtered using a random-forest classifier to a manageable set of about 200 proposals, whereas the high-scoring detections from multi-scale FCRN are typically less than 30. Table 4 compares the time taken for end-to-end text-spotting; our method is between 3 to 23 faster than Jaderberg et al.’s, depending on the variant.
|Total Time||Region Proposal||Proposal Filtering||BB-regression & recognition|
|Jaderberg et al.||7.00||3.00||3.00||1.00|
We have developed a new CNN architecture for generating text proposals in images. It would not have been possible to train this architecture on the available annotated datasets, as they contain far too few samples, but we have shown that training images of sufficient verisimilitude can be generated synthetically, and that the CNN trained only on these images exceeds the state-of-the-art performance for both detection and end-to-end text spotting on real images.
We thank Max Jaderberg for generously providing code and helpful advice. We are grateful for comments from Jiri Matas. Financial support was provided by the UK EPSRC CDT in Autonomous Intelligent Machines and Systems Grant EP/L015987/2, EPSRC Programme Grant Seebibyte EP/M013774/1, and the Clarendon Fund scholarship.
- O. Alsharif and J. Pineau. End-to-end text recognition with hybrid HMM maxout models. ArXiv e-prints, Oct 2013.
- P. Arbelaez, M. Maire, C. Fowlkes, and J. Malik. Contour detection and hierarchical image segmentation. IEEE PAMI, 33:898–916, 2011.
- P. Arbelaez, J. Pont-Tuset, J. Barron, F. Marques, and J. Malik. Multiscale combinatorial grouping. In Proc. CVPR, 2014.
- D. J. Butler, J. Wulff, G. B. Stanley, and M. J. Black. A naturalistic open source movie for optical flow evaluation. In Proc. ECCV, 2014.
- A. Criminisi, I. D. Reid, and A. Zisserman. Single view metrology. In Proc. ICCV, pages 434–442, 1999.
- N. Dalal and B. Triggs. Histogram of Oriented Gradients for Human Detection. In Proc. CVPR, volume 2, pages 886–893, 2005.
- P. Dollar, R. Appel, and S. Belongie. Fast feature pyramids for object detection. IEEE PAMI, 36(8):1532–1545, 2014.
- A. Dosovitskiy and T. Brox. Inverting visual representations with convolutional networks. In Proc. CVPR, 2016. To appear.
- A. Dosovitskiy, P. Fischer, E. Ilg, P. Hausser, C. Hazirbas, V. Golkov, P. Smagt, D. Cremers, and T. Brox. Flownet: Learning optical flow with convolutional networks. In Proc. ICCV, 2015.
- M. A. Fischler and R. C. Bolles. Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography. Comm. ACM, 24(6):381–395, 1981.
- R. B. Girshick. Fast R-CNN. In Proc. ICCV, 2015.
- R. B. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proc. CVPR, 2014.
- I. J. Goodfellow, Y. Bulatov, J. Ibarz, S. Arnoud, and V. Shet. Multi-digit number recognition from street view imagery using deep convolutional neural networks. In Proc. ICLR, 2014.
- D. Hoiem, A. A. Efros, and M. Hebert. Automatic photo pop-up. In Proc. ACM SIGGRAPH, 2005.
- D. Hoiem, A. A. Efros, and M. Hebert. Geometric context from a single image. In Proc. ICCV, 2005.
- P. V. C. Hough. Method and means for recognizing complex patterns. US Patent 3,069,654, 1962.
- W. Huang, Y. Qiao, and X. Tang. Robust scene text detection with convolution neural network induced mser trees. In Proc. ECCV, 2014.
- S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In Proc. ICML, 2015.
- M. Jaderberg, K. Simonyan, A. Vedaldi, and A. Zisserman. Synthetic data and artificial neural networks for natural scene text recognition. In Workshop on Deep Learning, NIPS, 2014.
- M. Jaderberg, K. Simonyan, A. Vedaldi, and A. Zisserman. Reading text in the wild with convolutional neural networks. IJCV, 2015.
- M. Jaderberg, A. Vedaldi, and A. Zisserman. Deep features for text spotting. In Proc. ECCV, 2014.
- A. Janoch, S. Karayev, Y. Jia, J. T. Barron, M. Fritz, K. Saenko, and T. Darrell. A category-level 3-d object dataset: Putting the kinect to work. In ICCV Workshop on Consumer Depth Cameras in Computer Vision, 2011.
- D. Karatzas, L. Gomez-Bigorda, A. Nicolaou, S. Ghosh, A. Bagdanov, M. Iwamura, J. Matas, L. Neumann, V. R. Chandrasekhar, S. Lu, et al. ICDAR 2015 robust reading competition. In Proc. ICDAR, pages 1156–1160, 2015.
- D. Karatzas, F. Shafait, S. Uchida, M. Iwamura, S. R. Mestre, J. Mas, D. F. Mota, J. A. Almazan, L. P. de las Heras, et al. ICDAR 2013 robust reading competition. In Proc. ICDAR, pages 1484–1493, 2013.
- K. Karsch, V. Hedau, D. Forsyth, and D. Hoiem. Rendering synthetic objects into legacy photographs. ACM Transactions on Graphics, 30(6):157, 2011.
- A. Krizhevsky, I. Sutskever, and G. E. Hinton. ImageNet classification with deep convolutional neural networks. In NIPS, pages 1106–1114, 2012.
- K. Lang and T. Mitchell. Newsgroup 20 dataset, 1999.
- B. Leibe, A. Leonardis, and B. Schiele. Combined object categorization and segmentation with an implicit shape model. In Workshop on Statistical Learning in Computer Vision, ECCV, May 2004.
- K. Lenc and A. Vedaldi. R-CNN minus R. In Proc. BMVC., 2015.
- F. Liu, C. Shen, and G. Lin. Deep convolutional neural fields for depth estimation from a single image. In Proc. CVPR, 2015.
- J. Long, E. Shelhamer, and T. Darrell. Fully convolutional networks for semantic segmentation. In Proc. CVPR, 2015.
- A. Mishra, K. Alahari, and C. Jawahar. Scene text recognition using higher order language priors. Proc. BMVC., 2012.
- L. Neumann and J. Matas. Real-time scene text localization and recognition. In Proc. CVPR, volume 3, pages 1187–1190, 2012.
- L. Neumann and J. Matas. Scene text localization and recognition with oriented stroke detection. In Proc. ICCV, pages 97–104, December 2013.
- P. Perez, M. Gangnet, and A. Blake. Poisson image editing. ACM Transactions on Graphics, 22(3):313–318, 2003.
- J. Redmon, S. K. Divvala, R. B. Girshick, and A. Farhadi. You only look once: Unified, real-time object detection. In Proc. CVPR, 2016. To appear.
- S. Ren, K. He, R. Girshick, and J. Sun. Faster R-CNN: Towards real-time object detection with region proposal networks. In NIPS, 2016.
- A. Saxena, M. Sun, and A. Y. Ng. Make3d: Learning 3d scene structure from a single still image. IEEE PAMI, 31(5):824–840, 2009.
- A. Shahab, F. Shafait, and A. Dengel. ICDAR 2011 robust reading competition challenge 2: Reading text in scene images. In Proc. ICDAR, pages 1491–1496, 2011.
- N. Silberman, D. Hoiem, P. Kohli, and R. Fergus. Indoor segmentation and support inference from rgbd images. In Proc. ECCV, 2012.
- K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. In International Conference on Learning Representations, 2015.
- K. Wang, B. Babenko, and S. Belongie. End-to-end scene text recognition. In Proc. ICCV, pages 1457–1464, 2011.
- K. Wang and S. Belongie. Word spotting in the wild. In Proc. ECCV, 2010.
- T. Wang, D. J. Wu, A. Coates, and A. Y. Ng. End-to-end text recognition with convolutional neural networks. In Proc. ICPR, pages 3304–3308, 2012.
- C. Wolf and J. M. Jolion. Object count/area graphs for the evaluation of object detection and segmentation algorithms. International Journal on Document Analysis and Recognition, 8(4):280–296, 2006.
- I. Yildirim, T. D. Kulkarni, W. A. Freiwald, and J. B. Tenenbaum. Efficient and robust analysis-by-synthesis in vision: A computational framework, behavioral tests, and modeling neuronal representations. In Annual Conference of the Cognitive Science Society, 2015.
- Z. Zhang, W. Shen, C. Yao, and X. Bai. Symmetry-based text line detection in natural scenes. In Proc. CVPR, 2015.
- C. L. Zitnick and P. Dollar. Edge boxes: Locating object proposals from edges. In Proc. ECCV, pages 391–405, 2014.
Appendix A Appendix
We highlight some components of our synthetic text dataset in sections A.1 and A.2, and show some sample images from the dataset in section A.3. Finally, we compare the detection results from our “FCRNall multi-filt” method and Jaderberg et al. on the ICDAR 2013 dataset in section A.4 and the Street View Text (SVT) dataset in section A.5.
a.1 Variation in Fonts, Colors and Sizes
The following images show synthetic text renderings for the same text – “vamos!”.
Along the rows, the text is rendered in approximately the same location and against the same background image but in different fonts, colours and sizes.
a.2 Poisson Editing vs. Alpha Blending
Comparison between simple alpha blending (bottom row) and Poisson
Editing (top row).
Poisson Editing preserves local illumination gradient and texture details.
a.3 SynthText in the Wild
Sample images from our synthetic text dataset (continued on the next page).
These images show text instances in various fonts, colours, sizes, with borders and shadows, against different backgrounds, and transformed according to the local geometry and constrained to local contiguous regions of colour and text. Ground-truth word bounding-boxes are marked in red.
a.4 ICDAR 2013 Detections
Example detections on the ICDAR 2013 dataset from “FCRNall + multi-flit” (top row) and those from Jaderberg et al. (bottom row). Precision, recall and F-measure values (P/R/F) are indicated at the top of each image.
|1 / 1 / 1||1 / 1 / 1||1 / 0.88 / 0.94||1 / 1 / 1||1 / 1 / 1|
|1 / 0.33 / 0.50||1 / 0.33 / 0.50||1 / 0.28 / 0.44||1 / 0.75 / 0.86||1 / 0.66 / 0.80|
Jaderberg et al.
a.5 Street View Text (SVT) Detections
Example detections on the Street View Text (SVT) dataset from “FCRNall + multi-flit” (top row) and those from Jaderberg et al. (bottom row). Precision, recall and F-measure values (P/R/F) are indicated at the top of each image: both the methods have a precision of 1 on these images (except in one case due to missing ground-truth annotation).
|1 / 1 / 1||1 / 1 / 1||1 / 1 / 1||0.80 / 1 / 0.89||1 / 1 / 1|
|1 / 1 / 1||1 / 0 / 0||1 / 0.5 / 0.67||0.75 / 0.75 / 0.75||1 / 0.5 / 0.67|
Jaderberg et al.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737050.56/warc/CC-MAIN-20200807000315-20200807030315-00371.warc.gz
|
CC-MAIN-2020-34
| 41,767
| 158
|
http://fixunix.com/microsoft-windows/30868-win2k-beeps-when-too-many-keys-held-down.html
|
code
|
This is a discussion on Win2K beeps when too many keys are held down - Microsoft Windows ; My PC, running Windows 2000 Professional, beeps at me if I hold down certain combinations of three keys at a time. How do I disable this? This problem isn't as simple as it looks. The beeping occurs when I'm playing ...
My PC, running Windows 2000 Professional, beeps at me if I hold down
certain combinations of three keys at a time. How do I disable this?
This problem isn't as simple as it looks. The beeping occurs when I'm
playing action games which require me to hold down multiple keys, such
as 'run forward' at the same time as 'strafe sideways' and 'jump'. And
the beeping doesn't come through the sound card -- it's the PC's
internal speaker that's doing the beeping! It's a slow rhythmic beep,
sounding like a warning, not a 'keyboard buffer is full' beep. And not
ALL combinations of three keys trigger this, only about half of the
combinations I tried at random.
And here's the clincher -- the same exact PC never exhibited this
problem under Windows 98; it only started doing this a few days ago when
I did a clean install of Win2KPro.
AND, the multiple keys WORK -- no keypresses are getting dropped,
they're all handled properly. The only problem is the beeping noise. I
guess I could open up the PC and disconnect the internal speaker, but
there's got to be a more elegant solution, doesn't there?
I tried installing the latest driver for my no-frills Logitech Deluxe
104 keyboard, but that didn't have any effect on the problem.
Has anyone else seen this beeping problem, and do you know of a way
System specs: P3/550, 256MB RAM, Abit BH6 motherboard, GeForce 2,
SoundBlaster Live 128, Logitech Deluxe 104 keyboard, Logitech Wheel
Mouse. The hardware is basically 1999 technology. I ran System Update
to bring Windows 2000 Professional up to the latest s/w revisions,
including DirectX 9.0b.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982294158.7/warc/CC-MAIN-20160823195814-00111-ip-10-153-172-175.ec2.internal.warc.gz
|
CC-MAIN-2016-36
| 1,900
| 26
|
https://community.konduit.ai/t/should-i-call-close/2863
|
code
|
I’m running my nd4j app and I can’t see in the metrics that the memory usage only goes up and never down.
Should I call
.close() on every matrix I create? When should I use it? I suspect that maybe the matrices are not released from memory. Applies for the CPU windows & Linux backends
Memory is only released automatically if:
- You don’t hold on to it (i.e. don’t keep a reference to it)
- Garbage Collection actually runs.
GC can end up running too infrequently because the native memory usage doesn’t count towards heap memory usage.
If you are in a situation like that, calling
.close() can help.
The problem is, it’s not that the memory is released after some time, it’s not released at all. It doesn’t seem like the GC frequency is the problem, it seems like nd4j doesn’t release the memory. Calling close on each matrix will make the code very ugly, as I have a long flow with many matrices
If GC runs but the memory isn’t freed, that means you are holding on to a reference somewhere. That might happen because you hold on to a
DataSet object for example.
I only use INDArray in a method whose input and output are normal POJOS.
I am using apache flink as my framework, is there a chance flink’s memory management interferes with the memory and doesn’t release it?
Thanks for your comment
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100534.18/warc/CC-MAIN-20231204182901-20231204212901-00224.warc.gz
|
CC-MAIN-2023-50
| 1,321
| 15
|
https://www.ahay.org/RSF/sftahscscale.html
|
code
|
tah is the abbreviation of Trace And Header. Madagascar programs
that begin with sftah are designed to:
1- read trace and headers from separate rsf files and write them to
standard output (ie sftahread)
2- filter programs that read and write standard input/output and
process the tah data (eg sftahnmo, sftahstack)
3- read tah data from standard input and write separate rsf files for
the trace and headers data (ie sftahwrite)
These programs allow Seismic Unix (su) like processing in Madagascar.
Some programs have su like names.
Some programs in this suite are sftahread, sftahgethw, ftahhdrmath,
sftahscscale reads data from the file, applies scaling, and writes data
to STDOUT. DO NOT USE WITH sftahread!
In this example the input data ../fetch/npr_field.rsf is read. Trace
headers are read from ../fetch/npr_field_hdr.rsf (the dafault for the
headers parameter). Trace order does not matter. Shot data is
likely, but the program will process any trace order (eg cdp or
receiver). the source x,y coordinates are written to sxy.rsf and the
group x,y coordinates are written to gxy.rsf. The shot consistant
amplitude and the shot x,y is written to sxyamp.rsf. The group
consistant amplitude and the group x,y is written to gxyamp.rsf.
Surface consistant scaling is applied to the data and the resulting
trace and header is written to the pipe. The sftahwrite writes the
trace data to scscale.rsf and the headers are written to the file
scscale_hdr.rsf. Finally, the output volume is displayed using
Trace header file name. Default is the input data file
name, with the final .rsf changed to _hdr.rsf
Input file for traces amplitudes
start time to compute average trace ampltide
flag to control amount of print
0 terse, 1 informative, 2 chatty, 3 debug
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587926.9/warc/CC-MAIN-20211026200738-20211026230738-00394.warc.gz
|
CC-MAIN-2021-43
| 1,754
| 31
|
https://askpythonquestions.com/category/psexec/
|
code
|
I’m executing PSexec SNMP command from Python to remote PC using a batch file and expecting to get ‘TIMEOUT’ in the SNMP response, and I want to save this ‘TIMEOUT’ event to a log file. But the log file created is empty, I ran it manually and see the ‘TIMEOUT’ event in CMD window but ..
I tried this module, https://pypi.org/project/pypsexec/ But, it launches only executables or windows commands but not able to implement this. I need to check for a registry key on remote machine (network connected) and need to see whether it is accessible or not. But not able to implement any so far. Tried pypsexec but it has ..
I’m trying to install impacket and it always give me an error. My pip and python version is same (Python 2.7.18 and pip 20.3.4 from /usr/local/lib/python2.7/dist-packages/pip (python 2.7)). I checked into my repository and impacket already installed under my python3. I tried to uninstall and install it using pip2 but still give me bunch of ..
I am trying to remotely execute a script using PsExec and return live output using subprocess.Popen within my Tkinter program. Everything worked fine using below code. I did not need the shell=True parameter for Popen. process = subprocess.Popen( "psexec computer -c -f -s commands.cmd", stdout=subprocess.PIPE, stderr=subprocess.STDOUT ) while True: line = process.stdout.readline() When i tried ..
I’m trying to build a script in python that runs a powershell command (using subprocess python module) , this powershell command use psexec for run a .exe file on all devices within a .txt file previous generated by python but it is not working Any help/advice? import subprocess import sys import datetime import os dt ..
I’m trying to connect to a remote Windows computer with Python. The idea is to make a mix of prompt_toolkit and rich to the TUI, but for the back end I’m still having doubts on what to use. Ideally, the user would provide the username and password once, the connection would be established and commands ..
from pypsexec.client import Client server = servername username = username password = password executable = "notepad.exe" c = Client(server, username=username, password=password) c.connect() print("Connected") try: c.create_service() result = c.run_executable(executable) finally: c.remove_service() c.disconnect() It is getting connected to the remote VM. But not able to open notepad in remote system. Source: Python..
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303385.49/warc/CC-MAIN-20220121131830-20220121161830-00414.warc.gz
|
CC-MAIN-2022-05
| 2,435
| 7
|
https://oberlinarchaeologysociety.wordpress.com/about/
|
code
|
The Oberlin Archaeology Society is a student run organization devoted to promoting student interest and engagement in archaeology. To this end we host experimental archaeology workshops, screenings of documentaries and films, and other fun events for archaeology enthusiasts of all interest levels. This blog serves as a platform allowing us to share insight both into who we are as an organization and into the wonderful world of archaeology.
Chair, Webmaster: Leon Vance
Secretary, Liaison: Grayson Ross
Coordinator: Ilana Meisler
Treasurer: Ryan Carwile
Social Media: Andrew Stelts
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336880.89/warc/CC-MAIN-20221001163826-20221001193826-00468.warc.gz
|
CC-MAIN-2022-40
| 584
| 6
|
https://whocalled.us/lookup/2063391191
|
code
|
These people hAve the brainpower of a rock. Somebody had this phone number prior to me 2 years ago. This company after 100's of calls over the last 2 years refuses to stop calling. Not sure how to get them to understand I am not who they are looking for.
Caller calls on a weekly basis and hangs up.
Scummy scummy scummy bad debt buys, buy old old old debts for pennies on the dollar and try to recover thru intimidation. Ignore them.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825029.40/warc/CC-MAIN-20181213171808-20181213193308-00000.warc.gz
|
CC-MAIN-2018-51
| 434
| 3
|
https://support.viewpath.com/hc/en-us/articles/216242797-Installing-Viewpath-PM-in-Salesforce
|
code
|
To install Viewpath PM for Salesforce inside your Salesforce environment, you must be a Salesforce Administrator.
1. Select "Get It Now" from the Salesforce AppExchange listing.
2. Select the option to "Install for All Users". If you select one of the other options, your Salesforce permissions could keep resources from seeing their project or task information. Permissions in Viewpath are controlled project-by-project within the Viewpath app.
3. Grant third-party access to Viewpath.
4. On your Salesforce tab, click the "+" and choose "Viewpath PM Configuration". If using Lightning, open Apps, type "Viewpath" into the search bar, and select "Viewpath PM Configuration". Enter information not pre-populated, and click "Activate Installation". Wait for the confirmation message that the installation was activated, and then click "Authorize API Access". This will enable your Viewpath 3 project and task data to be pushed into Salesforce.
Both the Activate Installation and Authorize API Access buttons must be successfully activated to use Viewpath PM in Salesforce.
That's it - you're ready to go! If you have already created Viewpath projects in the Viewpath app, use the Connect to Existing feature. If you are creating new projects, you can do that from template both in Salesforce or in the Viewpath app. Check out our Overview video for high level of features and functionality of Viewpath PM for Salesforce.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00601.warc.gz
|
CC-MAIN-2021-43
| 1,419
| 7
|
https://www.afp548.com/2016/09/06/proactive-mac-security-santa/
|
code
|
For the next stop in our journey, we’ll review that jolly ol’ soul, Santa. It’s a system for either monitoring what apps are launched and blacklisting the ones you decide are bad, or locking down a macOS computer to only run the ones you’ve whitelisted. Despite what The Register seems to believe, it’s been ‘in development’ (which Google calls… production use at scale,) in the open on GitHub for nearly two years. Like Munki and osquery, we should think of 🎅 primarily as a tool that does the majority of the heavy-lifting client-side. This is a common ‘agent’ model, as real-time decision-making requires it, and the most intensive work is best suited to the often idle distributed CPU’s on workstations. As it was originally designed for Google’s specific use case, there is some overlap with similar functions built into macOS or other security tools, but they’ve implemented things (e.g. File Integrity Monitoring) in a way that contrasts favorably with other tools.
Google’s server implementation, while not yet open-sourced, involves letting end users vote on being allowed to launch apps that have not yet been encountered and explicitly whitelisted by IT. How is having to whitelist apps before use not death by a thousand cuts for their customers? Apple’s Gatekeeper push, quarantining downloads and helpfully offering users the option of dragging apps from ‘unknown’ (meaning not in the Developer ID program curated by Apple) developers to the trash has put a lot of pressure on them to get their apps signed. When an app can prove a cert-based chain of trust that Apple has established (and can revoke at any time), and the majority of your customers use apps from a handful of common developers, you can whitelist those certs instead of the actual fingerprint of the app bundle itself, and updates or other apps by that developer would be similarly covered. This makes it a scalable and low-ish maintenance system.
When it comes to stopping the launch of apps your org wants to restrict, users of Apple’s old Workgroup Manager or Profile Manager have been able to accomplish something similar with an operating-system-level feature called mcxalr, Application Launch Restriction. LaunchServices, which ties a file type with applications that can register to handle/open it, is the implementation behind that. At different times in the life of macOS, LaunchServices has been observed to be less than ideal as a foundation, and as it is running up in userland (like some management tools naïvely watch application launches from only certain paths,) it certainly is not all that efficient. The plus of that technique was you could manage it by filesystem path – which 🎅 just happens to have as well, through WhitelistRegex/BlacklistRegex configuration keys. So we end up with three ‘tiers’ of priority that 🎅 will evaluate, in order,
- (highest priority) ‘fingerprint’ or hash/sha of the specific binary/application version itself
- the leaf (most specific to the developer) SHA256 identifier of the cert used to sign the app
- (lowest priority) a filesystem path
A basic 🎅 install (e.g. by running
autopkg install Santa) leaves you in ‘MONITOR’ mode, during which only explicitly blacklisted apps will be blocked. Sierra’s AppTranslocation system, to move apps (e.g. launched from a DMG they just downloaded) to an ad-hoc sorta-sandbox in a temporary path away from user data or supporting files throws a wrench in path-based rules, so the devs recommend not relying on it as your primary way of protecting against app launches. It still is beneficial during evaluation to take a half-step towards a more controlled environment by using a BlacklistRegex for home folders with the following command:
sudo defaults write /var/db/santa/config.plist BlacklistRegex "'^(?:/Users)/.*'"
For those worried about accidentally blocking critical macOS components from running, 🎅 has ‘failsafe’ whitelisting for its own certs and launchd. Every OS component and each update therefore gets whitelisted ‘for free’, as well. And for the Google-wary, they use a separate signing cert than the one the Chrome browser/Google Earth app/etc. would have. Similarly, apps from the App Store use a range of different certs than the OS. (Case in point: unlike the rest of Office 2016, Microsoft Remote Desktop and OneDrive from the App Store have different cert SHA256’s, with the authority listed as “Apple Mac OS Application Signing”.) You can still blackhole a specific release that has an issue, even if you’ve whitelisted the cert, by making a rule for that one binaries hash, due to the higher priority.
Since 🎅 relies on a kernel extension as one of its moving parts, some security personnel are wary of it – other commercial products have a reputation of poor design, performance, and maintainability. These folks aren’t privy to the ahem ’emphatic feedback’ the MacOps team at Google gets from their customers. That teams rounding errors are bigger than most people’s fleet, and they’ve logged easily millions of binaries over the time they were in MONITOR mode. 🎅 was developed using KPI’s, kauth interfaces for kernel development that, to date, have required very little modification with OS updates. It also cross-validates itself between components at startup, and locks direct sqlite access to the rules database while the daemon is running. In-kernel caching is used to increase performance, and moving parts are constantly re-evaluated to ensure things run in parallel wherever possible. You can check its system impact at any time with
Watchdog CPU Events | 0 (Peak: 7.16%)
Watchdog RAM Events | 0 (Peak: 20.20MB)
One of the items stated in the 🎅 readme under known issues is that the threat model used when designing it was to leave out restrictions on scripts. However, anything that uses an interpreter like Python or Ruby to launch are still logged, along with any arguments they may be called with. Some daemonized processes, especially those that run scripts like Outset, or management tools like puppet and munki may not get logged. The importance of auditing persistent items like cron jobs, rc scripts, launchd jobs, and startup items with inventory tools or host intrusion detection systems like osquery is just as important when 🎅 is in use. However, when in LOCKDOWN mode, the goal is to make the majority of attack vectors unavailable.
As this post is already huge I won’t yet be covering the only (actively developed) public server complement for 🎅, Zentral, so we’ll focus on client-side, standalone-type interactions. Again, out of the box, 🎅 does no blocking unless you tell it something to blacklist by populating a local rules database with the
santactl command line tool. This is MONITOR mode, and by default an asl config is provided to record all certificates seen and decisions made to a log file. It is recommended you collect these logs after a trial period to get the certs associated with the apps your organization uses to distribute as whitelist rule entries. I’ve done some reconnaissance on the matter by fetching about half of all of the downloads that have recipes in autopkg and made a searchable spreadsheet here. I’ve also made log-scrapers for both the certs and unsigned binaries I saw, along with an import tool that runs in parallel to shove in a whole bunch of rules at once.
Ready to eat some dogfood before deploying this to your fleet? (Really, this requires a healthy trial period to gather adequate data…) I’d recommend upping the asl.conf‘s total limits (the all_max= option), as in my experience it only can track about a week’s worth before rolling the logs over at 100MBs – we’re letting it grow to 500MBs. During that time I’d keep the Users Blacklist Regex in place (with nothing whitelisted to force as many prompts as possible) on admin workstations, as a kind of ‘LittleSnitch’-style way to more strictly police what runs on your system. You’ll also get a better understanding of all the poorly-written ShadowIT apps like GoToMeeting or Zoom.us(😱) that should either be destroyed or spayed/neutered.
Once you feel confident enough that appropriate rule criteria has been gathered, apply them to a limited test group (or shard) of the workstations you manage. Keep in mind that apps like Dropbox have unsigned components and setuid files that are leveraged per-user and could trigger a block notification, so staying on top of releases of anything else you discover is unsigned in your environment becomes that much more important.
Hopefully this toe-dip into 🎅 has been beneficial in getting folks to give it a try. I’ve made an internal-infosec-team focused whitepaper, with generic documentation for both admins and end users: hopefully this is a batteries-included, full tank of gas so you just need to start up the engine on the metaphorical 16-wheeler of awesome. You won’t really trust it or believe it’s maintainable without putting your own machine into LOCKDOWN mode and noticing how few (if any) alerts you receive once a small number of certs are whitelisted. Please feel free to leave comments here, file issues on Github, or ping their email list with questions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120206.98/warc/CC-MAIN-20170423031200-00131-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 9,290
| 19
|
https://www.freelancer.hu/projects/Mathematics/Data-analysis-12217794/
|
code
|
I have a relatively small dataset that is in half-hourly intervals (6 replicates / half hour interval) and would like a matlab script that averages the replicates then sums each half-hour value into a daily value. I can provide the data set, which should clear up confusion.
2 szabadúszó tett átlagosan $25 árajánlatot erre a munkára
Feel fee to contact me [url removed, login to view] me message to discuss further more details .We provide the comments,images,videos,demos and live sessions in order to help the [url removed, login to view] payment only after the work done. You ca Több
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645550.13/warc/CC-MAIN-20180318071715-20180318091715-00214.warc.gz
|
CC-MAIN-2018-13
| 594
| 3
|
http://zone.ni.com/reference/en-XX/help/371361K-01/lvscript/topleveldiagram_button_bar_visible/
|
code
|
Short Name: Button Bar Vis
Requires: VI Scripting
Class: TopLevelDiagram Properties
To Use: Create a property.
Shows or hides the button bar on the block diagram.
The following table lists the characteristics of this property.
|Available in Run-Time Engine||Yes|
|Available in Real-Time Operating System||Yes|
|Settable when the VI is running||Yes|
|Loads the front panel into memory||Yes|
|Need to authenticate before use||No|
|Loads the block diagram into memory||Yes|
|Remote access allowed||Yes|
|Must wait until user interface is idle||No|
|Available with control VIs||No|
|Available with global VIs||No|
|Available with strict type definitions||No|
|Available with polymorphic VIs||No|
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591216.51/warc/CC-MAIN-20180719183926-20180719203926-00189.warc.gz
|
CC-MAIN-2018-30
| 691
| 18
|
https://www.dk.freelancer.com/projects/iphone-software-architecture/iphone-ipad-app-for-quality/
|
code
|
We require an iphone/ipad app to interface with quality units 'support center' application.
The app is to be used by agents and admins rather than end users posting tickets etc.
I can provide login to a test platform of the support center web page to help you develop the app.
The application is to be written for my client who has no affiliation with quality unit but uses there software as a ticket system for there company.
Any questions please ask.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863206.9/warc/CC-MAIN-20180619212507-20180619232507-00413.warc.gz
|
CC-MAIN-2018-26
| 452
| 5
|
https://docs.tockos.org/kernel/debug/fn.panic_print
|
code
|
pub unsafe fn panic_print<W: Write + IoWrite, C: Chip, PP: ProcessPrinter>( writer: &mut W, panic_info: &PanicInfo<'_>, nop: &dyn Fn(), processes: &'static [Option<&'static dyn Process>], chip: &'static Option<&'static C>, process_printer: &'static Option<&'static PP> )
Tock panic routine, without the infinite LED-blinking loop.
This is useful for boards which do not feature LEDs to blink or want to implement their own behaviour. This method returns after performing the panic dump.
After this method returns, the system is no longer in a well-defined state. Care must be taken on how one interacts with the system once this function returns.
NOTE: The supplied
writer must be synchronous.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100518.73/warc/CC-MAIN-20231203225036-20231204015036-00122.warc.gz
|
CC-MAIN-2023-50
| 693
| 6
|
http://flylib.com/books/en/2.735.1.25/1/
|
code
|
2.1. The Anatomy of a Web Page
Web pages are written in
(HyperText Markup Language), which is the language of the Web. It doesn't matter whether your Web page contains a series of plain text blog entries, a
pictures of your pet lemur, or a heavily formatted screenplayodds are if you're looking at it in a browser, it's an HTML page.
HTML plays two key roles:
a Web browser how to format a page
. Although there are plenty of computer programs that can format text (take Microsoft Word, for instance), it's almost
to find a single standard that's supported on every type of computer, operating system, and Web-enabled device. HTML fills the gap by supplying information that any browser can interpret. These formatting details include specifications about colors, headings, text alignment, and so on.
HTML links different documents together
. These links can take several forms. You can use
(discussed in Chapter 8) to let people surf from one Web page to another. You can also use HTML instructions to call up pictures (Chapter 7) or even other Web pages (Chapter 10) and combine them into a single Web page.
HTML is such an important standard that you'll
a good portion of this book digging through most of its features, frills, and shortcomings. Every Web page you'll build along the way is a bona fide HTML document.
an HTML Document
On the inside, an HTML page is actually nothing more than a plain-
text file. That means every Web page consists entirely of
, and just a few special
(like spaces, punctuation, and everything else you can spot on your keyboard). This file is quite different than what you would find if you cracked open a typical
on your computer. (A binary file contains
computer languagea series of 1s and 0s. If another program is foolish enough to try and convert this binary information into text, you end up with gibberish.)
To understand the difference, take a look at Figure 2-1, which examines a Word document under the microscope. Compare that with what you see in Figure 2-2, which dissects an HTML document containing the same content.
To take a look at an HTML document, all you need is an ordinary text editor, like Notepad, which is included on all Windows computers. To run Notepad, click the Start button and select Programs
Notepad. Then choose File
Open and begin hunting around for the HTML file you want. On the Mac, try TextEdit, which you can find at Applications
TextEdit. Choose File
Open and then find the HTML file. If youve downloaded the companion content for this book (all of which you'll find on the "Missing CD" page at www.missingmanuals.com), try opening the
file, shown in Figure 2-2.
Word documents are stored as binary information, as are documents in most file formats used by most computer programs.
Top: Even if your document looks relatively simple in the Word window, it doesn't look nearly as pretty when you bypass Word and open the file in an ordinary text editor like Notepad or TextEdit.
Bottom: Depending on the program you use, the string of ones and zeroes in the file is usually converted into a meaningless stream of intimidating gibberish. The actual text is there somewhere, but it's buried in computer gobbledygook.
Unfortunately, most text editors don't let you open a Web page directly from the Internet. In order to do that, they'd need to be able to send a request over the Internet to a Web server, which is a job that's best left to the Web browser. However, most browsers
give you the chance to look at the raw HTML for a Web page. Here's what you need to do:
Open your preferred browser
Navigate to the Web page you want to examine
In your browser, look for a menu command that allows you to view the source content of the Web page. In Internet Explorer (or Opera), select View
Source. In Firefox and Netscape, use View
Page Source. In Safari, View
View Source does the trick. Isnt diversity a wonderful thing
Once you make your selection, a new window appears showing you the HTML used to create the Web page. This window may represent a built-in text viewer that's included with the browser, or it may just be Notepad or TextEdit. Either way, you'll see the raw HTML.
HTML documents are stored as ordinary text.
Top: What you see in the Web browser is much easier to understand than what you see in an ordinary text editor.
Bottom: You can easily spot all the text from the original, along with a few extra pieces of information inside angled brackets (< >). These are HTML tags.
Firefox has a handy feature that lets you home in on part of the HTML in a complex page. Just select the text you're interested in on the page, right-click it, and then choose View Selection Source.
Most Web pages are considerably more complex than the
example shown in Figure 2-2, so you'll need to wade through many more HTML tags. But once you've acclimated yourself to the
of information, you'll have an extremely useful way to peer under the covers of any Web page. In fact, professional Web developers often use this trick to check out the snazziest work of their
POWER USERS' CLINIC
Going Beyond HTML
of HTML designed it
research papers and other unchanging documents on the Web. They didn't envision a world of Internet auctions, e-commerce
, and browser-based
. To add all these features to the modern Web browsing experience, crafty people have supplemented HTML with some tricky workarounds. And although it's more than a little confusing to consider all the ways you can extend HTML, doing so is the best way to really understand what's possible on your own Web site.
Here's an overview of the two most common ways to go beyond HTML:
. Most modern browsers support
, which are small programs than run inside your Web browser, and display information in a window inside a Web page. (To try one out and play some head-scratching Java Checkers against a computer
, surf to http://thinks.com/java/checkers/checkers.htm.) Internet Explorer can also host special tools called
. ActiveX is a Microsoft-
technology for sharing useful widgets between different programs and Web pages. (To see an ActiveX control in use, check out TrendMicro's free virus scanner at http://housecall.trendmicro.com.) Both Java applets and ActiveX controls are
programs that can be used in a Web page (if the browser supports it), but
are written in HTML.
. Browsers are designed to deal with HTML, and they don't recognize other types of content. For example, browsers don't have the ability to interpret an Adobe PDF document, which is a specialized format used to preserve the formatting of documents. However, depending on how your browser is configured, you may find that when you click a hyperlink that points to a PDF file, a PDF reader launches. The automatic launch happens if you've installed a plug-in from Adobe that runs the Acrobat software (which displays PDF files). (To see for yourself, request the sample chapter www.oreilly.com/catalog/exceltmm/chapter/ch04.pdf from
Excel: The Missing Manual
.) Another example of a common plug-in is Macromedia Flash, which shows animations on a Web page. If you surf to a page that includes a Flash animation and you don't have the plug-in, you'll be asked if you want to download it. (Check out www.orsinal.com to play some of the best free Flash games around.)
Unfortunately, there's no surefire way to tell what extensions are at work on a particular page. In time, you'll learn to spot many of the telltale signs, because each type of content looks distinctly different.
2.1.2. Creating Your Own HTML Files
Here's one of the
secrets of Web page writing: You don't need a live Web site to start creating your own Web pages. That's because you can easily build and test Web pages using only your own computer. In fact, you don't even need an Internet connection.
The basic approach is simple:
Fire up your favorite text editor
Start writing HTML content
Of course, this part is a little tricky because you haven't explored the HTML standard yet. Hang
is on the way in the
When you've finished your Web page, save the document (a simple File
Save usually does it)
By convention, HTML documents typically have the file extension
, as in
. Strictly speaking, these extensions aren't necessary, because browsers are perfectly happy displaying Web pages with any file extension. You're free to choose any file extension you want for your Web pages. The only rule is that the file has to contain valid HTML content. However, using the
file extensions is still a good idea; not only does it save confusion, it also helps your computer recognize that the file contains HTML in other situations. For example, when you double-click a file with the
extension, it opens in your Web browser automatically.
To take a look at your work, open the file in a Web browser
If you've used the extension
, it's usually as easy as double-clicking the file. If not, you may need to type in the full file
in your Web browser's address bar, as shown in Figure 2-3.
Remember, when you compose your HTML document in a text editor, you won't be able to see what the formatting actually looks like. All you'll see is the plain text and the HTML formatting instructions.
If you change and save the file
you open it in your Web browser, you can take a look at your recent changes by
the Refresh button.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708835190/warc/CC-MAIN-20130516125355-00076-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 9,279
| 87
|
http://www.tomshardware.com/forum/79186-35-good-labtop-diablo
|
code
|
Hello, I'm just looking for a decent gaming laptop for the game "Diablo 3". I would like it to have decent graphics for the game, and a great video card. It doesn't have to be a top quality laptop, I just want the game to run smoothly with a good video card, and processor. The reason I'm getting a newer laptop is because the current one i am using now, the video card does not support Diablo 3. So in other words, I need a new laptop, so if anybody could help me out i would appreciate a lot. Thanks.
More aboutgood labtop diablo
This topic has been moved from the section Graphics & Displays to section Laptops & Notebooks by Maziar
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647545.54/warc/CC-MAIN-20180320205242-20180320225242-00208.warc.gz
|
CC-MAIN-2018-13
| 635
| 3
|
https://www.mitacs.ca/en/projects/intelligent-production-optimization-real-time-implementing-hybrid-data-physics-simulation
|
code
|
Intelligent Production Optimization in Real-Time by Implementing Hybrid Data-Physics Simulation
In day to day operations, oil producers need to optimize their production workflow to reduce operational costs. Building a physics-based reservoir model is costly and time-consuming and is not suitable to generate and compare many scenarios. The alternative procedure, Data-Driven Model, is fast enough; however, testing and validating the model is controversial. In this project, a hybrid data-physic framework will be developed, which meets the requirement to quantitatively describe the physical behavior of the reservoir and also predict its mechanism statistically. The model is fast and can be feed by real-time data and create many potential operational scenarios and recommend the most favorable ones.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00552.warc.gz
|
CC-MAIN-2021-43
| 805
| 2
|
https://mailedge.jimdo.com/2012/02/11/chrome-barks-your-profile-cannot-be-used/
|
code
|
If you downgrade from Chrome or Chrome Beta , you may get:
When starting Chrome, the program generates a message
'Your profile cannot be used because it is from newer version of Google Chrome.
Some features may be unavailable. please specify a different profile directory or use a newer version ofChrome.'
Here is the fix / at least one of them:
c:\Users\HP\AppData\Local\Google\Chrome\User Data\Default\Web Data
I deleted the Web Data folder.
Closed Windows Explorere, Opened Chrome
*** If you have a MAC , this may apply
I ran into the same problem and just fixed it. What other users suggested here works - the trick is to find the right Library folder. Depending on how your Mac was setup, you may have more than one Library folders - one under your Macintosh HD and another under Users folder. I found my Google (profile) folder under Users folder. The following is the steps to fix the problem:
1. Click to open your Users folder, then open the folder for your current user, say "Tom", open "Tom" folder, then open the Library folder.
2. Open Application Supper folder;
3. Find Google folder (if you want to sure to get the right one, click to open it, there should be Chrome sub-folder in it);
4. Delete this Google folder and all folders inside it.
5. Restart Chrome;
6. You can enjoy Chrome again without that annoying message!
Note: If you sync your google settings before, you can re-sync and get your bookmarks back.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887660.30/warc/CC-MAIN-20180118230513-20180119010513-00148.warc.gz
|
CC-MAIN-2018-05
| 1,428
| 17
|
http://www.ask.com/answers/447091181/whats-a-good-chumhandle-name-for-me?qsrc=14106
|
code
|
Whats a good chumhandle name for me
i like sports, video games, and homestuck (of course)
i also have a fascination in which craft
my favourite trolls are Gamzee and Mituna
my favourite kids are dave, dirk, john and jake.
my homestuck OTP is dirkjake
hopefully this is enough information for you to think of a chum handle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163057146/warc/CC-MAIN-20131204131737-00012-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 322
| 7
|
https://morriscollegeonline.com/product/working-smarter-using-technology-to-your-advantage/
|
code
|
Working Smarter: Using Technology to Your Advantage
In this course, you’ll learn how to use technology to your advantage. Computers, various types of applications, software purchases, technical training, IT budgets, security, privacy, usage policies, ergonomics, instant messaging, and telecommuting are all covered.
Technology is supposed to make life easier and simpler, but most managers find themselves cleaning up the messes caused by too many gadgets. This course is about using technology to work smarter, not harder.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00175.warc.gz
|
CC-MAIN-2023-50
| 526
| 3
|
https://forums.adobe.com/thread/274060
|
code
|
I'm Making a slide show that plays High-def picts and Mp3
audio. Due to memmory restrictions a load the picts one at a time
as needed linked to external files. The Audio I also Have Linked to
an external file. The problem is when the picture loads the audio
pauses. Here's what I did. I Created a shockwave audio cast member
linked to an external file(Mp3). In the initial frame Ipreloaded
with ' member("myMusic").preLoadBuffer()' . The next frame I added
this code to wait till it's 100% loaded:"
on exitFrame me
if member("Music").percentStreamed=100 then
go the frame
Then the next frame I have my slide show which loads high Def
JPG's one at a time. Evertime Director reads from file the sound
pauses. Please Help!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825363.58/warc/CC-MAIN-20181214044833-20181214070333-00551.warc.gz
|
CC-MAIN-2018-51
| 720
| 14
|
https://forum.fishingkaki.com/discussion/279696/japanese-scaling-tool
|
code
|
Bought this some time back online thru a fren
Tested it out on small fishes and it works pretty well. Both a small Bartail Flathead (which used the serrated edge) and a Javelin Grunter which used the normal edge.
Managed to turn these 2 fishes
I tried this tool on bigger fishes
And got them cleaned up pretty nicely.
As shown in their demo videos, it is just simply pushing against the scales and allowing them to gather easily onto the tool. The larger the scales, the easier and more convenient it is to gather into a bunch to throw away.
Really 2 thumbs up.
Videos in the site explain how it's used.
New update :
Angler's Outfitter does have this scaler in stock. Check with them.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897027.14/warc/CC-MAIN-20200708124912-20200708154912-00294.warc.gz
|
CC-MAIN-2020-29
| 684
| 10
|
https://benknoble.github.io/blog/2019/12/17/advent2/
|
code
|
In this episode, the intcode computer is born.
Part 1 consisted of implementing a simulator capable of evaluating programs described in intcode. Intcode is a list of comma-separated integers, each of which may be an instruction or address at any given moment. Later challenges add even more items to that list.
I was initially going to split this up into nice structures and functors (a sort of meta-programming technique where a structure is parameterized by types, values, and structures), but I struggled do so.
In the end, memory and the interpreter all lived in the same structure. The only operations to support were arithmetic, so it wasn’t an issue at the time.
I am proud that I recognized this as a state-machine problem, and found a way to encode every computation for an intcode program in a state-machine complete with transition function (more on that in future episodes ).
For a good overview of state-machines and other topics, I recommend Elements of the Theory of Computation, by Lewis and Papadimitriou.
I’m still working out all the ramifications, but I believe that the intcode computer (especially with later-day modifications) is Turing complete; at the very least, with a few modifications of today’s architecture, the halting problem for intcode becomes undecidable. So I believe this means we do not have a finite state-machine, but rather a possibly-infinite state-machine.
Briefly, a state-machine is the tuple where is the arbitrarily-complex set of states and is the transition function. Note that a state may be a simple object, such as a single symbol, or a complex object, like a tuple of a memory object, an instruction pointer, and a few machine registers.
Given this machine, one feeds an input state through repeated applications of . So, for example, the -th iteration of the machine is the value . When we reach a special state that we designate the “halting state,” the machine halts. (We can refine this to include any state in the set of halting states , if we wish—and in fact, later intcode simulators do).
We can now model an interpreter for this state-machine as as the closures of —call it —which is the application of until we reach a halting state. Alternately, if we make each halting state a fix-point (if , then is a fix-point of ), then is still the closure of , though now until we reach the fix-point.
I am least proud of the fact that this version used exceptions. Ick.
Part 2 mainly consisted of searching a (relatively small) search-space for values which produced a certain target, so I implemented that outside of all the intcode structures. In fact, I don’t recall making any substantial changes to the code here.
This commit was the slight refactoring to use more standard naming
conventions. SML programmers typically prefer lower case, then
types and identifiers. Structures are the special guys that get
while functors require
Fn at the end and signatures are in
This very short commit was another refactor: semantically, I tend to associate compilation with source-transformation. All we do with an intcode program is load it into a runnable state, so no transforming done there.
While we’re discussing these kinds of programs (compilers and interpreters), I should mention that I’m probably going to write an intcode assembler by the time this is all said and done. It’s not too difficult. Going the other way is impossible without executing the code, though, as an instruction might later be read and modified by a different instruction. I could even support labels… hm .
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370490497.6/warc/CC-MAIN-20200328074047-20200328104047-00222.warc.gz
|
CC-MAIN-2020-16
| 3,565
| 19
|
https://forums.macrumors.com/threads/networking-problems-with-router-behind-router.876187/
|
code
|
Upstairs I have my AT&T provided router's wireless turned off and have plugged my Airport Extreme into the ethernet in DMZ mode. Wireless works fine in the house. Downstairs my Xbox 360's ethernet cable is plugged into my AT&T provided set-top box (receiver/DVR) and internet works fine on that. I cannot stream my media (using 360 Connect) from my mac to my xbox since they are on different networks, although using the same U-verse connection. When checking the AT&T router's system summary page I can see that there is an IP assigned to the xbox. So how do I resolve this? I don't want to put the xbox on a wireless connection. Is it something with port forwarding, or what? Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512592.60/warc/CC-MAIN-20181020055317-20181020080817-00350.warc.gz
|
CC-MAIN-2018-43
| 685
| 1
|
https://dev.to/redhoodjt1988/codecademy-data-science-course-part-iii-ij
|
code
|
Another Part of the Course Down...
Hello and welcome to part 3 of this series of posts on the Codecademy Data Science course. This post will talk about two of the modules that I was able to complete. Both modules are still a part of the SQL course. One is project based, the other falls in the Intermediate SQL section.
Queries Projects and Applications
This module is all about completing SQL projects. They give real-world exercises that pertain to actual on the job tasks you would be asked to accomplish. For example one of the tasks is to help the finance department identify potentially risky transactions before they are processed. I enjoyed this section a lot. As I have noticed with what I also do on a day to day basis these days at work these projects are on par with requests you will get asked weekly or even sometimes daily. It was a lot of fun going through these project based exercises. They aren't necessarily step by step but they also don't give you a whole list of tasks at once and expect you to figure it out. Just like you will be doing in the real world the projects are broken down into smaller tasks that by the end make up the full task you would be asked to do.
This is the intermediate portion of the SQL section. For those of you new to SQL coming from a programming background with any language from Python to C you should be used to functions. In SQL you won't necessarily be writing custom functions as you will more likely be using the built in aggregate functions. These are COUNT(), AVG(), and SUM() to name a few. You will also be using more advanced concepts like GROUP BY and HAVING clauses with your queries. This section is really awesome as it helps break these concepts down and gets you using them right away. You get to see the full power of these functions and how they can make your queries that much stronger when looking for exact data.
A side note for those of you that either don't know or, were like me at one point, thought that SQL wasn't a real language this section will teach you that functions exist in SQL and they do make your life easier just like they do in other "real" languages. If you are new to programming in general starting your programming journey with SQL will make it a bit easier to transition to a language like Python as it reads like plain English but also helps with the logical side of programming.
I know this was again a bit short but I don't want these to drag on and on. Hope you enjoyed the read and as I've said before the SQL course on Codecademy is free and I highly recommend it for anyone starting their programming journey for the first time or that wants to get into Data Science as you are going to need to know how to query data in a database as well as read data. Enjoy!
Top comments (0)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948632.20/warc/CC-MAIN-20230327123514-20230327153514-00575.warc.gz
|
CC-MAIN-2023-14
| 2,782
| 8
|
https://www.atarimagazines.com/compute/issue158/146_A_Place_for_My_Stuff.php
|
code
|
A Place for My Stuff. (database application development software) (Software Review) (Evaluation)
by Kathy Yakal
A Place for My Stuff is just what its name implies: a place (relational database) for your stuff (random information you want to store). Since it's not a full-blown database like Access or FoxPro, it requires no programming knowledge. This makes it easier to use but more limited than a more structured database.
Adding an entry to a database is as simple as typing a sentence. The program converts the sentence into grammatical elements and places the words in their appropriate fields, cutting the extraneous verbiage. For example, you could activate the sentence template and type 101 Dalmatians is a great video for kids, create a new category called Videos, and start tracking your videotape collection. Or you could use the name-and-address template to enter address data.
You can view your records one at a time in detail or in a list format. You can set filters to search for items that share common characteristics. Unrelated items can be linked by clicking on them in a list and saving them as a group.
Reports are easier to format than in a traditional database, but they aren't completely automatic. You'll still have to define headers and footers, margins, column width, and spacing.
A Place for My Stuff uses a standard Windows interface, with pull-down menus, dialog boxes, and pick lists for commonly used responses. Data can be imported from and exported to other copies of the program, or in ASCII format.
By sacrificing power and customizability for simplicity, A Place for My Stuff cripples itself. Its sole notable advantage over low-cost PIMs lies in its ability to interpret complete sentences. But even users who appreciate not having to learn a database language might be frustrated its limitations.
Still, it's capable at what it does. It's easy to use, once you understand its structure. And if you're more enamored with writing a sentence and viewing data in that format than more rigid database screen shapes, it may be a good choice for you, especially with its low street price of about $79.
Quadrangle has compiled several add-on databases that contain information on topics like PC software and hardware, vacation and travel, and sports. These range from $9.95 to $17.95, and, if they sound useful to you, might make A Place for My Stuff the right place for your database information.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998808.17/warc/CC-MAIN-20190618163443-20190618185443-00084.warc.gz
|
CC-MAIN-2019-26
| 2,429
| 10
|
http://community.skype.com/t5/Windows-archive/Remote-controlling-skype/td-p/66156
|
code
|
07-08-2011 15:26 - edited 07-08-2011 15:31
First, i'm unsure where to put this question so i've put it here.
Since a few weeks i've become a proud father, but maybe also a bit over protective
In some baby stores i've seen many sollutions for video surveillance for the baby.
These are all rather expensive and since i have some hardware lying around i've set up my own monitoring set up using:
- logitech camera
- her own account
I have set up the account to accept only calls from accounts in the account list.
When called, skype automatically answers and starts the video.
For my usage this is ok, but i also want to be able to grant the grand partents access.
Here's the issue, the microfone is on by default because i want to hear her.
The thing is that i don't want to have the microphone on when the grandparents phone in, since we don't hear the incoming call and they can hear us without us knowing it. I don't expect that they'll phone in without us knowing, but it's the idea that they can . My question, are there any plugins for skype that allow me to turn on/off the microphone or other settings on the remote skype?
Other suggestions to solve this "problem" are welcome as well
07-08-2011 16:12 - edited 07-08-2011 16:12
Congratulations from Skype on becoming a parent.
I've moved your post to "Windows".
Your header is the solution.
1. Turn off the micro by default for calls from the grandparents.
2. Use a program for remote desktop sharing, like
to activate the micro each time your are going to connect yourself.
yeah, i know i can turn off the mic but then i have to log in via vnc each time i want to hear. which seems a lot of work if i just quickly want to check in + most of the time i'll log in with my iphone which is not the most conventient device to use for vnc. but thanks for the suggestion
07-08-2011 19:59 - edited 07-08-2011 20:01
Run 2 instances of Skype at the same time. Start each separately with the command line switch skype.exe /secondary.
Login one of them into your personal account as usual.
Login the other into a different account whose only contact are the grandparents. Select a fake microphone in Tools - Options - Audio, e.g. a usb sound card where no headset is plugged in.
Use the same webcam in both of them by a polygamous intermediate driver, e.g. manycam or dvdriver
you need an additional pan-tilt-zoom device. For many years I am using eagletron trackerpods with built-in webserver and remote control user interface.
Does a Foscam FI8918 has the capability to be used remotely through skype?
It has the required motor pod, and its software should allow remote control by an interface of its own. You just need to configure IP, ports and user accounts.
In a separate, additional use, its video stream should be able to be used as input to skype. You'll need a "bridging" software, that captures your IP cam and offers a webcam driver for input to skype. E.g. the freeware manycam should do that for you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701168011.94/warc/CC-MAIN-20160205193928-00279-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 2,960
| 30
|
https://discourse.nodered.org/t/using-descision-tables/82855
|
code
|
Are there ways to process messages based on a decision table? I am looking into some complex automation scenarios, and can't get myself to build out every variation manually. For example a number of different states like:
- time of day
- lighting scene preselected
- time since last trigger
- mood of my son's hamster
And then act on the result, for example change something within msg.payload or choose a specific output connector to send the data to.
I know that all of this can be done with individual nodes and haven't found anything related to "decision table" - maybe for a good reason?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00231.warc.gz
|
CC-MAIN-2023-50
| 592
| 7
|
http://evontruluck.comuv.com/?news=mount_mp3_mandriva
|
code
|
ул. Урицкого, д. 1, офис 610.e-mail: email@example.com
Понедельник - Пятница:
с 10.00 до 18.00
Перерыв: с 13.00 до 14.00
Суббота: с 12.00 до 16.00
Телефоны:Общие вопросы:+7 (911) 554-20-69, +7 (911) 688-82-85
Гуманитарные предметы: +7 (911) 554-20-61
Управленческие и технические предметы:
+7 (911) 554-20-63
Экономические предметы: +7 (911) 554-20-62
Юридические предметы: +7 (911) 554-01-96
Mount mp3 mandriva и сборник переводов по англисскому 9 класс кауфман
Linux digital audio players including MP3, Ogg Vorbis and optical audio CD. Audio CD ripping and creating MP3 (and Ogg Vorbis, FLAC and WAV) audio files Larger 16Gb and 32Gb USB thumb drives would mount but my stereo would not. If you are an existing Arch user, there is no need to download a new ISO to update your existing system. You may be looking for an updated mirrorlist instead. Long, enthusiastic review of Mandriva 2010 Linux distribution running KDE desktop, including live CD experience, installation and post-install usage.
Best media players for Linux - A choice selection Updated: Mandriva. But you can install it on pretty much any Linux, including Gnome desktops. Feb 19, 2014 mode, enter: $ sudo mount -o rw -t nfs nas01:/mp3 /private/nfs sudo mount -t nfs -o resvport 192.168.3.1:/mp3 /private/nfs. OR mount. DVD Mandriva 2009 - с него и k 2.0.2 не проигрывает файлы mp3 с использованием mount -o loop -t iso9660 ubuntu-11.10. Applications :: Mandriva 08 - Can't Get A MP3 Player Or A Flash Drive To Mount Oct 9, 2010. I have Mandriva 08 and I can't get a MP3 player or a Flash Drive to mount. NTFS Sierra? NTFS El Capitan? NTFS for Mac? NTFS Driver for Mac? NTFS-3G El Capitan? Your Mac does not recognize, mount, or write the USB and external HDD under.
10 ways to reduce removable media headaches in Linux. . command mount /dev/sda1 /media/mp3 to mount my MP3 . iPod into a Mandriva 2008 machine Adriane Knoppix is a variation that is intended for blind and visually impaired people, which can be used entirely without vision oriented output devices. The Five Best Linux Video Players It can slurp in a MP3 audio collection with more than 60GB of music in just a few Fedora, Mandriva, openSUSE, Ubuntu. Just in time for CeBIT 2017 (20.-24.3.2017 in Hannover/Germany), KNOPPIX version 8.0 has been released exclusively in the current German DELUG edition of Linux Magazine. Today, I learned how to mount ISO files in KDE: . Mandriva Linux Chronicles. . Mozc (1) Mozilla I am running Mandriva 2006.1. My CD DVR RW (AOPEN DUW1608/ARR) is driving me nuts Distributions Mandriva: Can't mount/access CD/DVDs User Name: Remember. Mount mp3 player as root I have an mp3 player that automounts just fine in Ubuntu 8.10 in MSC I have access to an older Mandriva install, if that would. Audio File Syncing (MP3,AAC,Audiobook) Create a folder to mount the iPod to: Code: HOW-TO iPod with (Ubuntu) Linux.
YoLinux: Linux Audio Streaming. This tutorial covers the set-up of an MP3 audio streaming server. Once configured, you will be an internet radio station broadcasting. In this article we describe how to mount cdrom using linux. You have to "hardware force" the MP3 into MSC mode USB Modes There . The device should then auto mount into '/media/Sansa View' (mount), и только то никаких проблем с воспроизведением MP3 или других звуковых fedora mandriva. LINUX Mandriva 2008.0 === Archived Version. I no longer use 2008.0 === Put the mp3 file on an mp3 player (that you mount on /dev/sda) and play it as required. Mageia is a community-based Linux distribution, for desktop server. Mandriva -ru О crossover dd directx dragon age driver gedit gimp google grub icons iconv iso linux logo manuals mc mc 4.6.3 microsoft mii-tool morrigan mount. Manual disk partitioning guide for Linux Mint 17 KDE. Learn to create GPT MBR partitions for Linux Mint 17 KDE manually. Not possible to create encrypted. Super OS Linux (64-bit) VLC, support for DVD-playback, MP3 support and for other formats, Mount tar.gz/.zip/.rar/.iso files with File mounter. Oracle Linux with Oracle enterprise-class support is the best Linux operating system (OS) for your enterprise computing needs. May 8, 2014 The advantage of this approach is that I stand on my own feet and can get my mp3 file all the time and the way I like it. The downside is that. Comodo Free Antivirus for Linux (CAVL) offers the same great virus protection with the added bonus of a fully configurable anti-spam system. Download.
Mandriva Linux 2008 October 19, 2007 Posted by rjdohnert in Opinions, Reviews. trackback. Mandriva released their new Mandriva Linux distribution entitled. MP3 Player mount, MP3 Player holder, MP3 Player cradle, base, and arm components by RAM Mount. IPod Linux Mandriva - How to Connect Your Ipod to having to manually mount your device via for Linux that makes downloading DRM-free mp3 files. How to write to NTFS drives (USBs, or external Hard drives) under the newest MacOS Sierra? It’s quite easy to do. Let’s look at our following free solutions. (MP3, and MPEG), FTP client independent both install and runtime · Fixed mount tool for cdrom and floppy devices · Added ballon help on docked mount. Hi, from 2 weeks to now, I can mount my mp3 usb player. The conection is ok, cause I can mount another mp3 player in the same usb and the mp3 player How to listen to MP3 audio and playback encrypted DVDs within Ubuntu. Article. Display File Contents In Column Format Within The Linux Terminal. Linux.com is the central resource for open source software information, best practices, how-to's and Linux software resources. The best Linux distros: 7 versions of Linux we recommend. By Andrew Williams. Operating systems Our favorites for beginners and veterans alike. Shares.
Запись диска с mp3 треками, Как подключить wifi на Mandriva, Kubuntu, ROSA (KDE) Как подключить 3G USB модем. Mount -t iso9660 -o loop folder_image.iso /home/ixbt_user/test_image. Mandriva Linux. в состав которого включены кодеки. Linux Software Repositories On an RPM-based system (Fedora, SUSE, Mandriva, RHEL, etc.), download the key and then use rpm to install. Last week I spent about 40 minutes trying to track down a way to mount my mp3 player to my Mandriva 10.1 system (this was my first attempt). There Mar 24, 2007 Creating udev rules to name your devices in Mandriva Now you can make a logical name for each device, such as /dev/camera-fs and /dev/mp3-fs. You can even write a rule to automatically mount these devices. Liquid Lemur Linux was a desktop Linux distribution based on Ubuntu and Linux Mint. It delivers a hybrid desktop experience, combining the Window Maker window.
Mandriva Linux Полное Загрузочные файлы: init sysv 37. Файловая система /ргос 36.5.2. Команды mount и umount. Linux Installation Guide. From you'll have to install the LAME MP3 The current Mandriva 2006 default installations from Mandriva do not install. # # file system mount point type options dump pass proc /proc proc nodev,noexec ,nosuid 0 0 # / was on /dev/sda1 Mandriva/Mageia; Slackware. Download Mandriva; Download openSUSE; Download CentOS (para servidores) mount -o loop,unhide -t iso9660 -r nome-da-imagem.iso /mnt/iso. Nota. Check out these tips and tricks if you ve installed Ubuntu 14.04 LTS Trusty Tahr on your PC. Ubuntu 14.10 and 15.04 are supported. How to Boot Mandriva 2010 from a USB drive; . monitor (1) mother (3) mount (1) Mozc (1) Mozilla (3) mp3 (1) MS Office
Sharing Files Between Ubuntu Flash Drive and you will learn how to modify the casper script to allow you to mount your USB Flash photos, movies, mp3's. Ghid Mandriva Linux 2009 - by Mandrivausers.ro - Free download as PDF File (.pdf), Text File (.txt) or read online Aug 31, 2011 An NTFS partition was mounted OK from Dolphin. Russian Surprisingly enough, MP3 files played out of the box in Mandriva 2011. Russian. If you’re using an iPod or iOS device, Linux might seem like a daft choice of operating system. Apple doesn’t officially support it, and whilst that. Djmount mount MediaServers content as a Linux filesystem djmount is a UPnP AV client. It mounts as a Linux filesystem the media content of compatible UPnP AV devices. For Mandriva Linux 2006 I used the . except that the network is not yet up when my system tries to mount the nfs . this phone supports Left clicking the system tray drive icon activates a window where the user can select devices to mount or (MP3, and MPEG), FTP Unlike Mandriva. Tips Linux Explorers All Things Linux Forum Great Linux Links LinuxClues.com. The market for portable MP3 players has exploded in the last few Using an iPod in Linux. From Issue #135 added mount point /mnt/ipod for /dev/sda2. UltraISO : Revision History : 72, UltraISO Premium 9.66 (November 18, 2016) Buy Now Free Trial. DistroWatch.com: Linux Mint; Linux Mint. Last Update: 2017-01-27 13:36 UTC. OS Type: Linux; Based on: Debian, Ubuntu (LTS) Origin: Ireland; Architecture: i386, x86_64. Universal USB Installer aka UUI is a Live Linux Bootable USB Creator that allows you to choose from a Mandriva One 2011; Matriux; MCNLive Toronto; Meego; MicroCore. A Beginner s Guide to Dual Booting Linux Mint and Windows XP. By Shane Lazar. This article is a first for me. I wrote it for a friend of mine who is interested.
- Физрук 2 сезон 3 серия 11 11 2014 торрент
- Manic drive торрент
- Defense zone 2 на андроид 4 0 планшет
- Эмуляция emulation 2010 dvdrip с торрента
- Glare 3d max
- Майнкрафт 1.6 2 торрента
- Коктейльные истории сборник
- Скачала музыку на компьютер t е найти
- Мультфильм 2017 лего hd фильм целиком
- Руки в карманах сериал торрент
- Готовый бизнес план производства теплоблоков
- Фильм на телефон никогда ни сдавайся 3gp
- Аудиокнига летающая домохозяйка марла силли
- Фильм гудзонский ястреб на телефон
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741219.9/warc/CC-MAIN-20181113041552-20181113063552-00205.warc.gz
|
CC-MAIN-2018-47
| 10,512
| 34
|
https://forum.golangbridge.org/t/identifying-goroutines-performance-bottleneck/29051
|
code
|
I parse a pretty large json files (20-30GB) line by line with bufio package, extract values and do some math on it. Profiling with pprof showed pretty good results, am happy with it, it’s not much philosophy at this end.
I have an 8 cores (16 threads) workstation, so the next logical step is to process 8 files parallely with goroutines, which I did. At first glance, I’d expect close to 8x speedup, but it’s barely 4x. I asked myself what could be the reason. Perhaps limitation of SSD disk I/O in conjunction with bufio package(?!). Thus, I made a dummy test, from a network copied big file (120MB/s load) and in the meantime re-performed the parsin etc, which should have deteriorated the speed further on, but it did not, the same barely 4x speedup. So how could I identify what’s the bottleneck next to it? Why is the speedup only 4x but should be close to 8x? Any suggestions appreciated?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500671.13/warc/CC-MAIN-20230208024856-20230208054856-00271.warc.gz
|
CC-MAIN-2023-06
| 903
| 2
|
https://giters.com/adeebshihadeh
|
code
|
Very resourcefriendly and feature-rich replacement for i3status, written in pure Rust
A GitHub Action to publish Jekyll based content as a GitHub Pages site
Simple Python GNSS processing library
Releases of panda code.
lichess bot that plays both stockfish and random moves
Sentry's documentation (and tools to build it)
A build system and primary set of packages for Termux.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710926.23/warc/CC-MAIN-20221203075717-20221203105717-00161.warc.gz
|
CC-MAIN-2022-49
| 375
| 7
|
http://meta.sharepoint.stackexchange.com/users/768/larsi
|
code
|
Top Network Posts
- 60Forcing jQuery Mobile to re-evaluate styles/theme on dynamically inserted content
- 41jQuery Mobile does not apply styles after dynamically adding content
- 16History.Back with refresh
- 11Data attribute becomes integer
- 10Cordova Content Security Policy
- 7Unable to deserialize array
- 7Check if more than 3 hours
- View more network posts →
Keeping a low profile.
This user hasn't posted... yet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823670.44/warc/CC-MAIN-20160723071023-00112-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 423
| 11
|
https://newodisha.in/chandaka-elephant-reserve-odisha/
|
code
|
Elephant Safari Chandaka Bhubaneswar is a wildlife reserve lying in the north western fringe of Bhubaneswar in Odisha. It is located on the Khurdha highlands of ‘Eastern Ghats’ biotic region. Spread over 193 sq km at the Chandaka forest, Khurda Uplands were designated as the Chandaka Elephant Reserve in August 1982. Chandaka Elephant Sanctuary Orissa offers a full sense of wilder thrill and you get a unique experience very different from your day to day life. This offers full refreshment to your mind and body both.
Major Attractions in Chandaka Elephant Safari
The reserve is a home to a total of 30 varieties of mammals, 27 varieties of reptiles and 120 varieties of birds. You can also find here the species of elephant, leopard, chital, barking deer, mouse deer, langur, rhesus monkey, mongoose, sloth bear, wolf and hyena, among others. Apart from that, the varieties of snakes like the python and the monitor lizard are available here. Among others inhabitants here, are the Mugger crocodiles, water birds, mainly storks, heron, egrets and cormorants. Kamarkhunti reservoir here in the forest is a breeding area for the Garganey and common teal, pin tail, white eyed Pochard, spot billed Duck and many others. You can find a wonderful sanctuary view from the watch towers at Kochilaberana, Pitagodia and Charichhak.The re-energized Chandaka forest reserve has gained much popularity among eco-tourists and nature researchers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00654.warc.gz
|
CC-MAIN-2023-40
| 1,440
| 3
|
http://www.coderanch.com/t/346540/GUI/java/mnemonics-focus-menubar
|
code
|
This week's giveaways are in the MongoDB and Jobs Discussion forums. We're giving away four copies of Mongo DB Applied Patterns and 4 resume reviews from Five Year Itch and have the authors/reps on-line! See this thread and this one for details.
problem: mnemonics are not getting focus for the menubar
scenario: I have one JFrame and one JInternalFrame. The JFrame has a menubar with mnemonics assigned to every menu. Mnemonics are working fine when the JInternalFrame is opend. But after closing the JInternalFrame the mnemonics for the menubar are not working. That is menus are not getting focus when I use mnemonics like ALT+F
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382185/warc/CC-MAIN-20130516092622-00061-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 631
| 3
|
http://finncoxhp.amoblog.com/the-python-project-help-diaries-10094995
|
code
|
The python project help Diaries
Our pro programmers make sure that they generally offer comprehensive feedback of the code as it really is one of the better methods. It clarifies how the code will work to a whole new individual focusing on precisely the same bit of code.
Python is undoubtedly a vibrant programming language. There are lots of very important functions of Python programming language which over again ensure it is an incredibly powerful programming language.
So, Should you have any queries as part of your programming assignment, you could Call them whenever. They are constantly ready to consider challenges, no matter how tricky is your process; you will get a right away solution from our on line programming authorities.
We are helping learners in doing their Laptop programming assignments for quite some time. Therefore we hold the encounter of delivering high-quality assignment answers.
It is just a multi-paradigm programming language it implies that it guidance item-oriented programming and structured programming and several language functions which aid useful programming and part-oriented programming.
So be sure to don’t Imagine additional if you really need python homework help. Just fill the contact sort and acquire prompt help from your Python specialist that's me
A quick suggestions rundown: A single- and two-character variable names are frequently as well limited to generally be significant. Indent with
Congratulations on the discharge within your Python package! Your code may possibly mature from these humble beginnings,
Accessibility the totally free samples of assorted programming assignments which might be drafted by our excellent professionals and have a clear plan about the kind of get the job done it is possible to receive by availing our prime notch-services.
We have now shipped a large amount of programming homework to a good deal of students who're remarkably content with our providers.
Get beneficial support on managing different software package apps and cross-platform environments within the Java language plans. Our supreme high quality aid can help you solve Java oriented problems.
Having trouble ending your C/C++ programming assignment? Give it to us. Now we have an experienced team of programming industry experts who have exceptional skills and knowledge in building impeccable C/C++ programming assignments According to your needs.
So just get in touch with us nowadays and Enable’s with each other explore your project needs like project subject matter, platform, language, allocated deadline best site and urgency volume of your project. And that’s it! Sit back again and Relax.
The solutions that we offer are entirely reputable and we provide finish confidentiality. The typical of the assignment and homework is fulfilled and we finish the projects based on the inputs gained from you so that it is According to the pointers supplied by your Professors.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256163.40/warc/CC-MAIN-20190520222102-20190521004102-00365.warc.gz
|
CC-MAIN-2019-22
| 2,940
| 15
|
https://ga02202829.schoolwires.net/site/default.aspx?PageType=3&ModuleInstanceID=3931&ViewID=9fc4dc78-f943-4224-8465-6c780e58f4df&RenderLoc=0&FlexDataID=4604&PageID=47&Comments=true
|
code
|
Is there a preferred device to use for this program?
We hesitate to recommend any devices. We see a wide variety of devices that have been brought into classrooms. Each has their pros and cons. Many of our students enjoy the use of tablets and touch screen devices. Some students benefit from a device with a standard keyboard and a large screen.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474659.73/warc/CC-MAIN-20240226094435-20240226124435-00616.warc.gz
|
CC-MAIN-2024-10
| 346
| 2
|
https://vesc-project.com/node/4159
|
code
|
Dear friends, please, help me to run VESC firmware on NUCLEO f401re board.
Short describe of my project:
I need steering BLDC motor 150W in laboratory vacuum chamber, before I use flipsky 4.20 and it work perfekt. But unfortunatelly during experiments in vacuum chamber I have some problem with controller board (due to overheating from external experimental devices and plazma sparks) STM chip burn out.
For my application size of board doesn't matter, and I using Kikad project from your Github make my own big board, where I replace stm32f4xx chip with nucleo.
Now I try to run firmware on Nucleo.
Can you help me:
1) Is it necessary reflash bootloader on nucleo?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00729.warc.gz
|
CC-MAIN-2023-50
| 666
| 7
|
http://forum.textpattern.com/viewtopic.php?id=875
|
code
|
You are not logged in.
Available in deanload
Those upgrading from g115 or g116 must load the script located at /textpattern/_update.php in a browser after uploading.
Otherwise, remember that to upgrade, you need only replace the files in your /textpattern/ directory except config.php.
Fixes from g117:
<txp:article_custom />outputting draft and future-dated articles
I’m having the same problem as Cerebus
It’s back. A single missing comma in _upgrade.php was causing the category rebuild to fail.
If you downloaded 1.17a in the last hour, please grab it again, then replace /textpattern/_update.php, then run that script once again.
Sorry for the hiccough.
You can see ‘root’ on the left bar on my site here
I also ran the updated _update, and am having the problem with invisible categories in the organise tab.
Not sure if this will work, but:
<img src=“http://www.80miles.net/images/5.png” style=“height:768px;width:1024px” />
Last edited by nryberg (2004-03-25 15:59:05)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052995/warc/CC-MAIN-20131204131732-00002-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 992
| 15
|
http://stackoverflow.com/questions/6197045/ws-in-tibco-bw-or-in-java
|
code
|
I see it is a lot faster developing a WS in TIBCO compared to coding in Java.
Is it wise investment to use TIBCO as your WS Service Provider & Service Requester?
Also both previous question for developing a JMS consumer & publisher.
How would my Server-side Java code use/listen to the BW Process? So far I read about TIBCO Adapters to do that with a lot of features like monitoring, but would this be just an overhead? Is it better to just code your WS & JMS codes in your Java app?
How do you decide if you would implement a functionality in Java or in TIBCO (e.g. send a Mail, Logging, etc.)?
Thanks a lot! Thirdy
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00059-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 616
| 6
|
https://neelbakshi.wordpress.com/category/uncategorized/
|
code
|
Simply put, game theory is the study of making choices. It is about strategic decision making, and its outcomes when two or more economic agents interact. This is a very important field of study, and can help predict major events. Taking a very grass root example, the prisoners dilemma is the best way to explain game theory.
Imagine two criminals who have been caught by the police for drug possession. They both are suspected of having committed a larger crime, and are hence taken into two separate interrogation room. Each player can either confess, or deny, as shown in the matrix below (source: khanacademy.org ).
It is found that if either criminal knows the choice of his other, he will go for the option that benefits himself . If the other criminal then changes his choice, they both get the worse prison sentence, hence validating the Nash equilibrium, “which is a solution concept of a non-cooperative game in which each player is assumed to know the equilibrium strategies of the other players, and no player has anything to gain by changing only their own strategy. If each player has chosen a strategy and no player can benefit by changing strategies while the other players keep theirs unchanged, then the current set of strategy choices and the corresponding payoffs constitute a Nash equilibrium.”
After three weeks of learning many new things about Computer Science, it was finally time to pick a specific field, and create a final project. While most others worked on the software side of things, I was rather fascinated with Arduino, and working with my hands being a skill of mine, I decided to incorporate it in my final project. Initially, I decided to use the included buttons to create a simple three key piano, but that seemed too basic. So instead, I used aluminium foil, along with a bunch of resistors, attached onto a cardboard base to create a touch sensitive paino.
Above are pictures of the resistor assembly. Each resistor is connected to its respective strip of aluminium, which form the touch sensing keys. The two resistor legs are then punctured through the cardboard base, and then connected to the micro controller below, to keep a clean look on the front. The individual wires from each resistor are then connected to the arduino board which senses changes in capacitance when one touches the strip of aluminium. This sends sends a command to the Piezo Buzzer which outputs a sound. In this case, the first notes are C4, D4, E4, F4, G4, A4, B4 and lastly, C5.
Bret Victor, winner of the Apple Design Award and creator of the Alesis Micron gave us a guest lecture yesterday. He is a pioneer in interactive graphics as well as Electronics, and was an inspirational speaker.
His demonstrations were absolutely fascinating, and his radically different approach to programming is great. Features like viewing the output in real-time, timeshiftin the instances of animation, sliding numerical values and more were revolutionary.
My jaw dropeed multiple times during his presentation, and I’m sure I wasn’t the only one. He later even gave advice on my Arduino project which was great. All in all, I am grateful to have interacted with a person like him, and I will never forget it.
On Friday we were introduced to Arduino, a programmable mictrocontroller that began as a project for students in 2005, and is now renowned worldwide for it’s immense capabilities and interactive approach to the world around it.
In the box, we got the Arduino board itself, a breadboard (where we attach all the components), resistors, LEDs, a motor and numerous other interesting stuff. Plus, a great guidebook that took us through different projects that individually incorporated each of the different parts included. The temperature sensor was particularly frascinating!
One of the important things to remember when connecting :Ed lights is the use of resistors so that an excess of current does not flow through them. This allows them to safely operate for long periods of time without, well, blowing up.
Going deeper into processing.js we learnt the fundamentaals of integrating Physics into the program, and make objects move accordingly. By incrementing the speed of the variable that controls the object’s speed, we were able to make it move across the windows in whichever direction we liked.
The next challenge was to reverse it’s direction on hitting the edge of the window. In order to accomplish his task, we used if statements in the draw loop which changed the changed the speed of the object from positive to negative, hence resulting in it moving in the opposite direction.
1. What is your prototype about?
My prototype is an Arduino microcontroller connected to a breadboard fitted multiple LEDs in order to create a numeral display. Two buttons will be present on the bread board, labelled ‘1’ and ‘0’ respectively. When the user enters a random string of 1s and 0s using the buttons, the Arduino Board will convert the digits into numerals that we can understand, and display the result on the display made of LEDs.
2. What will people learn from your experience?
My experience helps people learn about the fundamentals of binary, and converting it into numbers using a fun and easy to use colorful interface.
3. Will it be interactive or is it something people will watch? If interactive, what can the user do?
The demonstration is 100% interactive where users can experience it themselves.
4. How would your design fit in with the Exploratorium? Describe your experience from yesterday and include pictures. Use examples!
I believe my design would fit well in the exploratorium since it is a fun way to convert binary into numbers and see the result in real time. It is a great way to introduce children to binary and the way it works.
5. Draw a diagram that explains how your prototype works.
During the first week of the course, I developed a liking for game design, especially after creating my own short game on Friday. It is a very creative area, and the posibilities are limitless.
(My Game! -> )
My second choice will be cellular automata, simply because it seems like a topic I would be intersted in. After viewing it’s demos and interactive approach, I would like to incorporate it in my final project. (Waiting for day 9!)
Last, but not the least, my third choice is Circuits. I have had experience in robotics at school, and have worked with LEGO Mindstorm kits in the past. For the Final Project, Arduino is what I will use, since it is fairly easy and at the same time very capable.
After learning the basics of processing.js, we move on to algorithms, particularly for sorting. We then implemented Selection Sort for sorting cheesesticks (Basically a bunch of rectangles) in ascending order. We had to use ‘for loops’ to check each of the cheesesticks, and then two int functions, ‘i’ and ‘j’ and a temporary variably to hold the values of ‘i’ and ‘j’ when they awe swapped.
After getting the sorting function to work in ascending order, our next task was to animate the cheesesticks and show the sorting. Using ‘if statements’ in the draw function, we were able to implement the animation effects, and visually depict the Selection Sort Algorithm.
As a part of class here at the Stanford Pre Collegiate Institutes, we had the opportunity of getting a talk by Stone Librande, who shared his experiences in the Game Design industry. Having worked with Blizzard Entertainment, and Electronic Arts in the past, he is currently working with Riot Games on a new project and had a lot to share with us.
We learnt about how he started small, creating board games as a hobby. Then after studying about Computer Science and Animation at USC, and then MIT, he started work with Blizzard entertainment, as a designer for Diablo 3.
He told us how Video Game designing incorporated a lot of blueprint making and planning, and how seemingly simple games actually have months, and often years of effort put into them by Designers and programmers.
He showed us, step by step, how he designed the Simpsons Game. From a cardboard box terrain with post-it notes stuck over it placed on a table, to a detailed map with separate industrial, residential etc. sectors. It was a very inspirational experience, and we got to ask him tons of questions afterward, which was great. Thank you Mr. Librande!
We recently learnt about the the Processing IDE, whih allows users to create interactive simulations and objects. It is based on Java programming language, and user input is converted into Java code to implement the function.
One of our assignments for today was using the ‘key press’ feature to make objects react to user input. Given some basic code, I modified it to create a click-speed based two player game. The object of the game is to click either ‘p’ or ‘q’ (depending on player side) repeatedly, as fast as possible in order to move the disc towards your territory. As soon as the disc touches one of the players edges, he/she wins!
Click here to play the game!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00115.warc.gz
|
CC-MAIN-2022-40
| 9,064
| 35
|
https://sarthology.github.io/proGramCLI/
|
code
|
ProGram is a CLI based, self-hosted photo sharing app. You can think of it as Instagram for programmers who want to keep their data secure while still being able to showcase their best shots in a cool gallery style.
Installing program is easy as cake if you already have npm installed.$ npm install -g programcli
To use ProGram, just run program in your terimal and you can see it there for you. The first time, ProGram will ask you to create your profile and finish the onboarding process. But after that, every time you open the app, you can jump straight ahead into editing your favorite pictures. Currently you perform the following functions.
So you love it but want more features. Great! Welcome onboard, it's your time to contribute. We welcome everyone to join us, veterans and beginners alike. It doesn't matter if this is your first open-source contribution or 100th.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301063.81/warc/CC-MAIN-20220118213028-20220119003028-00019.warc.gz
|
CC-MAIN-2022-05
| 877
| 4
|
http://spanish.stackexchange.com/questions/tagged/phonology?sort=frequent&pagesize=15
|
code
|
Spanish Language Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
tag has no wiki summary.
Latin /f/ to Spanish /h/
Many (most? all?) Spanish words containing the letter h come from corresponding Latin words containing the letter f. Through what process did /f/ get softened to /h/? During what time period did this ...
Nov 30 '11 at 5:46
recently active phonology questions feed
frequent question tagged
Hot Network Questions
What is the natural way of using Dataset to get a FittedModel?
Automatically lining up two images that have some common elements
How to change to last modified directory in current directory
What hazardous wildlife is there in the UK?
Does clicking lead to DoS attack?
Decision Table for the Movement AI in a Game
Are weird numbers more rare than prime numbers?
What is the name of the piano piece Seven of Nine plays?
In quel di Milano
vim: hide first n letters of all lines in a file
How to take a cold shower
Has any reference been made to Earth or the Milky Way in Star Wars EU?
Could a malicious JS file pointed on URL/URI attack the browser/computer?
Curved cylinders in Tikz
Current store is 1 when running upgrade scripts
When to pronounce s as /z/ in the middle of words?
The sun is a large object, WHILE having a diameter of nearly a million miles
Difference between /dev/udp and netcat
How to number the letters of a sentence?
Is it safe to stand by the windows during a thunderstorm?
Why does Pluto's orbit cross Neptune's orbit?
What happened to Cornelius Fudge after he resigned from his post of Minister for Magic?
The Rock, Paper, Scissors, Lizard, Spock Tournament of Epicness
How do I greet someone in a different timezone when my morning is his evening?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267330.29/warc/CC-MAIN-20140728011747-00052-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,293
| 55
|
https://www.ripjava.com/sodoc/topic/example/32237
|
code
|
Most online batch scripts come with a lot of quote issues.
Examples and Solutions
if %var%==abc echo Test
This code works - when the content of
%var% does not contains space or other special characters. Now let's assume
%var% contains 1 whitespace. Now
if ==abc echo Test
This would cause a failure because
cmd.exe doesn't understand this syntax.
if "%var%"=="abc" echo Test
cmd.exe sees the entire
%var%(including space and special characters) as only one normal string. Yet this is not the safest comparison method. The safest one uses
cd C:\User\Spaced Name\Spaced FileName.txt
cd would only change directory to
cd only accepts one path argument.
Simply by adding quotes around the path, the issue would be solved.
cd "C:\User\Spaced Name\Spaced FileName.txt"
There are also a few examples that work better using quotes, like the
set /a statement, etc. But, when one works on strings that contain spaces or special characters, it is usually much safe to use quotes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039610090.97/warc/CC-MAIN-20210422130245-20210422160245-00375.warc.gz
|
CC-MAIN-2021-17
| 968
| 19
|
http://www.dsd.state.md.us/comar/comarhtml/10/10.18.07.05.htm
|
code
|
A. A recipient shall inform the Department of a change in eligibility as set forth in COMAR 10.18.05.04A.
B. If a change reported in §A of this regulation results in a recipient no longer qualifying for MADAP-Plus, the Department shall:
(1) Determine the recipient ineligible for MADAP-Plus; and
(2) Disenroll the recipient.
C. If a MADAP-Plus recipient is disenrolled from MADAP, the recipient is automatically disenrolled from MADAP-Plus.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00254.warc.gz
|
CC-MAIN-2022-40
| 441
| 5
|
https://indico.cern.ch/event/809820/contributions/3632680/
|
code
|
One of the most common applications of machine learning in high energy physics is in event selection (and categorization). The physics goals of event selection and categorization are to improve the significance of a potential excess (for signal discovery/upper limit setting analyses), and to reduce the uncertainty of a parameter measurement (parameter measurement analyses).
Event selection using machine learning is based on the "signal is better than background" heuristic. While it is clear how the heuristic would help with the physics goals, it turns out that they are not completely aligned. In fact, certain signal events could be worse for the sensitivity of an analyses than certain background events.
In this talk we will provide optimal event selector and categorizer training prescriptions designed to maximize the expected statistical significance of an excess (by changing how ML outputs are used), and minimize the statistical uncertainty of a measurement (by changing the supervisory signal used in training the ML algorithms). Along the way, we will point out exactly how our methods realign the goals of event selection and categorization with the physics goals. Finally, we will indicate how our method can be extended to minimize the systematic uncertainties in parameter measurements as well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00370.warc.gz
|
CC-MAIN-2023-14
| 1,315
| 3
|
http://www.ps3hax.net/showpost.php?p=301650&postcount=4
|
code
|
Originally Posted by STLcardsWS
Not to knock any mods here, but the organzation in finding info is very bad...
You can use a search button, but that is a joke at times depends on topic
I personally have taken upon myself to organize some stuff here.. but im only one guy..
I have made an emulator thread.(with tons of info).(link below in sig)
I may do one on JB options with all CFW, dongles. ect.. in one post where a noob or anyone can see and decide what is best...
This whole forum needs a bit touch, It would help everyone out.. even if you know the info or not..
outdated stickies, ect.... just needs a bit of reworking (less bans/infractions more organization)
have the battle up if you wanted to see it.
I don't think ps3hax is cluttered I find that information is easy to find if you look long enough....
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699776315/warc/CC-MAIN-20130516102256-00057-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 814
| 10
|
https://knowledgebase.zetaglobal.com/zmp/link-performance
|
code
|
The Link Performance Report allows users to easily filter and view email links, and clicks per link across devices. Reporting Link Names can be added during Campaign setup to allow for more user-friendly identifiers on links in addition to the URL.
You can view link-level results to get a simple view of the links across a set of filtered campaigns and understand how the individual reports are being interacted with.
Desktop Click Share %
Mobile Phone Click Share %
Tablet Click Share %
Unknown Click Share %
Prompts vs. In-Report Filters
The Prompt allows a user to select the top-level dataset that the report will report on.
The in-report filters allow for fine-tuning after the report is compiled.
To Re-prompt a report, click on the paper icon (with a question mark on it) and select File > Reprompt.
Filtering based on the day/time that a campaign was sent rather than when the response (open/click/conversion/etc) from the subscriber was logged.
Marketers can choose between Broadcast and Trigger type campaigns.
It allows a user to search and pre-select some set of campaigns to include in the report.
These can be used to filter down campaigns by any existing campaign categorization tags.
You can enable in-report filtering by clicking on the filter (funnel) icon in the top-right corner of the report.
Saving a Report
When closing a report, you will be prompted to save a variant of the report. Reports can be saved in the Shared Folder to allow for easy re-use of filters and slicing for various needs. You can create multiple saves off of one report for varying reporting use cases.
You can save a new variant of a report, by clicking on the Save icon and selecting File > Save As.
Many of the reports are highly interactive, and right-clicking will display a number of actions that can be taken.
Columns can be easily dragged & dropped for re-ordering.
Clicking on various aspects of the chart may enable some in-report filtering.
Save a variation of the report after you've made the filters you often make to increase operation efficiency.
You can multi-select cells of the table and right-click to be given options around excluding and keeping only certain line items of the report for review.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511386.54/warc/CC-MAIN-20231004152134-20231004182134-00413.warc.gz
|
CC-MAIN-2023-40
| 2,211
| 23
|
http://forums.prosoundweb.com/index.php/topic,163278.0.html?PHPSESSID=8tlhikuvdsq3phb81vupsui1k4
|
code
|
Well, if you think of this from the POV of:
- We need to keep the speaker dry
- We don't want to muffle the sound with a plastic bag
- What's available that can meet both of these needs?
It does make sense. I presume they did this for that reason, and the fact that people might use it as shelter is a convenient added bonus. I'm hoping this wasn't simply a cheap umbrella holder!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121893.62/warc/CC-MAIN-20170423031201-00329-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 380
| 5
|
https://www.mail-archive.com/gentoo-dev@lists.gentoo.org/msg86340.html
|
code
|
On 9/11/19 1:47 PM, William Hubbs wrote: > On Wed, Sep 11, 2019 at 01:39:32PM -0400, Michael Orlitzky wrote: >> On 9/11/19 1:21 PM, William Hubbs wrote: >>> +++ b/dev-vcs/hub/hub-2.12.3.ebuild >>> ... >>> >>> LICENSE="MIT" >> >> This license is wrong, as it's pretty much guaranteed to be every time >> you commit one of these packages. I find it pretty troubling that one >> corporation is able to force this stuff through even though it's a >> security and legal hazard for everyone else. > > Sorry, That train already left the station with the golang-* eclasses > and there is nothing we can do about it. >
"We" could just stop.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573065.17/warc/CC-MAIN-20190917081137-20190917103137-00296.warc.gz
|
CC-MAIN-2019-39
| 631
| 2
|
http://people.cs.bris.ac.uk/~simonm/projects//
|
code
|
The following is a collection of projects that I'm keen for bright, hard-working students to work on with me. I haven't made these up for the sake of something to do - I'm genuinely interested in getting all of these done, and the results matter.
My areas of research include:
- High Performance Computing (HPC)
- Many-core processors (accelerators) such as graphics processors (GPUs)
- Power efficient computing
As you might imagine the projects I'm proposing focus in these areas. Also, my industry background means I tend towards projects in collaboration with industry, so many of the projects below have opportunities for internships which can be great learning experiences and can strengthen your C.V.
Some of these projects may be more suitable for Masters-level students, whereas others will be better for undergraduates. If you are interested in any of these, please get in touch to discuss further.
- Many-core computing
- I'm interested in all aspects of "GPU-based" computing
- If you have an idea for an interesting project in this area, using Nvidia's Cuda or the new standard parallel programming language OpenCL come and see me! There are some specific project ideas to do with porting Hidden Markov Models (HMMs) and Molecular Dynamics codes for drug docking and proteing folding to GPUs.
- I'm also interested in simulating future GPUs with thousands of cores if you are interested in both writing simulators and in GPUs themselves
- Visualise the Top 500
- The Top500 records the 500 most powerful supercomputers in the world as a text (HTML) list
- Can we create a visual version on the web that can be searched by country, vendor, year, ... ?
- Combines web & location-based programming with something like Google Maps / Earth
There are lots of other projects in HPC, energy efficient computing etc. Get in touch if you're interested. Most will be listed in the projects database for this year.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00645.warc.gz
|
CC-MAIN-2022-33
| 1,915
| 16
|
https://wordpress.org/support/topic/easy-lite-preloader-affecting-favicons-site-icon/
|
code
|
Hello forum members,
Since a few days favicons – or site icons, on my site have stopped being displayed on various pages (currently, mainly woocommerce product pages). Before then, they have always been shown on every page.
How I noticed it was that only the homepage displayed the site icon, but not another pages.
In safe mode all was fine. So activating each plugin one-by-one, it would appear that it is Easy Lite Preloader v1.0 affecting the favicons (site icon).
Is there a way to contact the author @jeromeangeles on WordPress.org to look into this recent behaviour? Perhaps a new update in the environment has caused a conflict?
Some changes from my end are the installation of Google sitemap xml and tag manager, with those plugins disabled the problem still persists – only when I don’t activate the Easy Lite Preloader plugin is it back to normal. Ideally, I would like keep using this plugin as I love the simplicity of it.
Thanks in advance for your help.
The page I need help with: [log in to see the link]
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103034877.9/warc/CC-MAIN-20220625065404-20220625095404-00291.warc.gz
|
CC-MAIN-2022-27
| 1,026
| 8
|
http://www.tomshardware.com/forum/269171-33-graphics-solution-support-digital-rays
|
code
|
i believe any PCIe video card on the market today will handle this task with ease. as far as the video card is concerned, x-rays are basically 2d images, even when dealing with 3D MRI or CT scans. But a cheap PCIe or an AGP video card will perform noticably better than onboard graphics
i'm pretty sure you wont benefit from getting a workstation graphics card such as a Quadro - these are designed to perform well in architectural drawing tasks, (eg, vector rendering and the like) and are relatively expensive. (You may be using some specialised 3D image rendering software or the like that will benefiot from one but if you are then the software documentation will certainly recomend you get one)
if you are dealing with many or very high resolution x-ray images you will benefit from lots of RAM (up to 3GB on WinXP) and a powerful CPU. the real work in handling large amounts of data is done by the CPU.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864558.8/warc/CC-MAIN-20180521220041-20180522000041-00253.warc.gz
|
CC-MAIN-2018-22
| 908
| 3
|
https://donaghenofcom.wordpress.com/2021/11/04/favorite-subliminals-to-lose-weight-and-for-money-abundance/
|
code
|
Ever since I first set foot in the world of subliminals (music with binaural beats and affirmations embedded into it), I was hooked!
There were subliminals for the perfect nose, perfect lips, perfect body, money, wealth, everything you could possibly desire.
They work, but you have to use them daily and truly believe! The faster you believe the result will happen, the faster it will. You could get instant results if you believe.
So, to dive in, this is a list of my favorite subliminals:
Soap Fairy on youtube has the best subliminals, but they are very short, you have to loop them. You can use LoopTube for that.
MONEY & WEALTH
This is a whole playlist, click “watch on youtube”
I hope this has helped, subliminals are amazing and there’s a whole online world out there full of them! Just go check them out and listen to what feels good to you!
Thanks! To donate, click below:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335514.65/warc/CC-MAIN-20221001003954-20221001033954-00048.warc.gz
|
CC-MAIN-2022-40
| 888
| 9
|
https://www.recoverdeleted.org/blog/exchange-mailbox-keeps-getting-quarantined/
|
code
|
Know How to Repair Exchange 2013 Mailbox Keeps Getting Quarantined Issue?
In Microsoft Exchange, there is one additional feature that helps users in detecting the clients, which are using an excessive number of resources of the mailbox. However, the MAPI clients use many threads when it is connected to the mailbox. If one or two threads freeze because of any reason, then it uses more CPU as compared to it should for servicing the thread. But, if more than five threads freezes or three threads gets crashed of a specific mailbox within 2 hours, then it can easily be considered as Mailbox is not in the normal state. If this situation is encountered, then the Exchange Mailbox keeps getting quarantined error occurs.
Thus, it becomes important for the users to repair Quarantine Mailbox in Exchange 2010, 2013, 2016. The quarantine is basically executed by the background thread after every two hours to check the total crashes in the mailbox. However, if the mailbox exceeds the maximum limit of the crash threshold, then the server puts the mailbox in a quarantine state for overall stability. However, this feature is by default enabled by the Exchange Server whenever there is a threads crash. And, when the Exchange mailbox is in the quarantine state, it becomes completely inaccessible. Thus, to remove Exchange mailbox from Quarantine state mailbox users can use two methods i.e. manual procedure which includes some commands and the automated solution i.e. EDB File Repair Tool.
Reasons Behind Exchange Mailbox Keeps Getting Quarantined Error
There are some situations in which a user is not able to access the Exchange mailbox and is treated as a poisoned Exchange mailbox. Thus, in this segment of the post, we have covered all possible events that cause this potential threat to the MS Exchange mailbox.
- If in total more than five threads of the Exchange mailbox stop working at the same time and for more than 60 seconds, then it is clear that the mailbox is not in a normal state.
- If a thread that is working for a specific mailbox fails in between, then it leaves the mailbox in an abnormal state.
Repair Quarantine Mailbox Exchange 2013/ 2010 Via Manual Method
If a user wants to remove Exchange 2013 Mailbox keeps getting quarantined issue, then he/she first has to analyze the registry keys also:
- MailboxQuarantineCrashThreshold: This will determine the total number of failures that put Exchange Mailbox in an abnormal state. By default, it is 3.
- MailboxQuarantineDurationInSeconds: This will specify the total time the Exchange mailbox remains in the quarantine state. It is 6 by default.
Verify If Mailbox is Quarantined or not
In order to verify whether the mailbox is in quarantine state or not, a user needs to run the commands below:
After executing the commands, if the IsQuarantined is true, then the Exchange Mailbox is poisoned.
How to Repair Exchange Mailbox Keeps Getting Quarantined Error via Cmdlet?
To remove the Exchange Mailbox from the quarantine state, a user can use cmdlets by following the steps discussed below:
- Detect & Repair Folder View of the Mailbox
- Resolve Aggregate Counts of All Mailboxes in the Database MBX-DB9
- Determine Search Folder & Provisioned Folder Corruption
- Fix All Type of Corruption for an Archive & Mailbox
- To Fix Any Type of Corruption in Mailbox Database
The Description of Parameters Used Above:
- Corruption Type: Determine the corruption that a user wants to identify and fix.
- Mailbox: Define the mailbox on which the command is implemented.
- Database: Define the database on which the command is executed.
- Archive: It will find the corruption and resolves the archive mailbox of the particular mailbox.
- DetectOnly: Make it clear that a user wants to locate the errors but not to resolve them.
- StoreMailbox: It determines the GUID of the mailbox that a user wants to fix.
Fix Exchange Mailbox Keeps Getting Quarantined Issue Using Powershell
As you know the Exchange mailbox will remain in quarantine state for six hours by default. But, when the process to resolve this issue completed, a user can easily disable the mailbox quarantine feature. Now, to disable the poison mailbox, just execute cmdlet given below:
After executing the above command, the mailbox Peter_Baris1 will be removed from quarantine.
Alternative Solution To Repair Quarantine Mailbox in Exchange 2016, 2013, 2010
There are some limitations that a user might face while resolving the Exchange mailbox and the major one is that the cmdlets are not available in Exchange Server 2010. In addition, the PowerShell is hard to understand and very lengthy while performing. Moreover, single mistake while executing these commands can result in data loss. Thus, to overcome all such limitations of the manual method, a user is suggested to use a professional solution to repair quarantine mailbox in Exchange 2010, 2013, 2016. The tool can recover Exchange mailbox easily without any hassle and loss of data. Moreover, the software is designed in such a way that it recovers both Public and private folders of the mailbox and remove it from quarantine state.
The Bottom Line
Corruption in the Exchange mailbox always leaves mailbox in an abnormal state. However, the Exchange Server will be quarantined for six hours. And, it becomes inaccessible and users are not allowed to perform any action on the mailbox. Thus, to overcome Exchange mailbox keeps getting quarantined issue, we have discussed both manual and professional solution. A user can choose any of them to repair Quarantine mailbox in Exchange 2016, 2013, 2010 and other versions of it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362999.66/warc/CC-MAIN-20211204154554-20211204184554-00308.warc.gz
|
CC-MAIN-2021-49
| 5,613
| 35
|
https://worldwideadverts.info/index.php/listing/index/remote-reactjs-developer-kx340lfgbdf52
|
code
|
We are looking for a great developer who is proficient with React.js. Your primary focus might vary from: (1) developing new user-facing features using React.js, (2) translating designs and wireframes into high-quality code, (3) building reusable components and front-end libraries for future use, and (4) optimizing components for maximum performance across a vast array of web-capable devices and browsers. A commitment to collaborative problem solving, sophisticated design, and quality product is essential.
- 3+ years of experience in software development
- Thorough understanding of React.js and its core principles
- Experience with popular React.js workflows (such as Flux or Redux)
- Familiarity with newer specifications of EcmaScript
- Experience with data structure libraries (e.g., Immutable.js)
- Knowledge of isomorphic React is a plus
- Familiarity with RESTful APIs
- Knowledge of modern authorization mechanisms, such as JSON Web Token
- Familiarity with modern front-end build pipelines and tools
- Experience with common front-end development tools such as Babel, Webpack, NPM, etc.
- Ability to understand business requirements and translate them into technical requirements
- A knack for benchmarking and optimization
- Experience with system architecture or leading a software team is a strong advantage
- Full-time availability is a strong advantage
If you’re interested in pursuing an engaging career working on full-time freelance jobs for exclusive clients, take the next step by clicking apply and filling out the short form to get started.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337906.7/warc/CC-MAIN-20221007014029-20221007044029-00191.warc.gz
|
CC-MAIN-2022-40
| 1,570
| 16
|
http://blog.coreyprak.org/post/the-importance-of-comments/
|
code
|
Comments are a very valuable medium for growth. I don’t think I need to explain the ubiquity and value of mediums that allow individuals to voice an opinion and interact with other humans. Reddit, Youtube, forums, personal blogs, and so many other resources thrive so much on user comments that some wouldn’t exist without them. Of course, commenting isn’t always a great thing. There’s always room for someone to spew negativity and hate (commenting is sometimes disabled on Youtube with good reason).
I am guilty of not taking comments seriously. If there’s a post I disagree with, I’d keep it to myself. If there was some amazing resource that took forever to find which solved a problem or issue I had, I’d simply bookmark it. All of this was okay with me until recently.
I read a blog post created not too long ago from a respected developer, I’ll call this person L. L made a post on a topic that I found to be important. While most of the content was pleasant, I misunderstood a small but very valuable portion of it. An hour or so was spent researching the topic myself. After this, my understanding of the content seemed to disagree with L’s post.
To me, this was a big obstacle.
Here is someone whose works I respect, conveying information which just doesn’t gel with me. I put the merit of this person’s reputation and accomplishments behind the content, and started to think that my entire understanding of the topic was wrong. The only thing I could think to do was to ask for clarification.
I spent well over two hours learning about the topic myself, writing code to test my assumptions, and even longer to write up a comment which was as clear and concise as possible. My comment has yet to receive a reply. I’ll never know what the heck L was REALLY trying to say, and regret the time spent reading something that was never fully understood. At least it inspired me to learn on my own.
No one is an exception to being wrong. L might simply be. I also realize that the topic was important to me, and that L may not be taking the time to reply since it might not be important to him (why make a post then?), who knows. I found out later that L had submitted the post to Reddit. With any topic, there was controversy and enlightenment. No matter what the comments said, people talked and people grew. I found my closure in finding out that many readers who received the post the way I did deemed it as, “stupid blog filler”.
I should have said thank you to all of the hidden gem blog posts that have helped me. I should have voiced my opinions on topics that were important to me to take advantage of the growth from the interactions while promoting it in others. At least I can start now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591234.15/warc/CC-MAIN-20200117205732-20200117233732-00145.warc.gz
|
CC-MAIN-2020-05
| 2,731
| 8
|
https://joshloy.com/lipid-profile-test-in-hindi-lipid-profile-test/
|
code
|
Course – Full MLT Syllabus
lipid profile test in hindi | lipid profile test
Disclaimer- Some contents are used for an educational purpose under fair use. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. All credit for copyright material used in the video goes to the respected owner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154321.31/warc/CC-MAIN-20210802141221-20210802171221-00319.warc.gz
|
CC-MAIN-2021-31
| 597
| 3
|
https://folu.me/post/gnvyfpnyr-d-dpbz/kb/1112/userspace-networking
|
code
|
Userspace Networking mode allows running Tailscale on environments where you don’t have access to create a VPN tunnel device.
Tailscale works on Linux systems using a device driver called /dev/net/tun, which allows us to instantiate the VPN tunnel as though it were any other network interface like Ethernet or Wi-Fi. This lets any Linux application — from a web browser to the ping CLI command — send its traffic through the Tailscale interface.
However, not all Linux systems support /dev/net/tun. For example, some container-based app platforms such as Heroku or Google Cloud Run do not. For those environments, userspace networking mode offers a different way of running, where tailscaled functions as a SOCKS5 proxy which other processes in the container can connect through.
You can enable userspace networking from the Tailscale CLI by passing the --tun=userspace-networking flag to tailscaled before calling tailscale up
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488504838.98/warc/CC-MAIN-20210621212241-20210622002241-00384.warc.gz
|
CC-MAIN-2021-25
| 934
| 4
|
http://aitp.actx.edu/solutions.php
|
code
|
AITP Region 3 Student Conference
Building a Future in Information Technology
Microsoft (MS) Office Solutions
The MS Office Solutions competition will allow teams of one to two students to utilize their MS Office skills and apply them to a real business problem within an approximate three hour time frame.
Contestants will be given a problem statement and data for analysis and problem solving. From this, they will be required to develop a recommendation and solution. The results of their analysis, the supporting documentation, the recommendation, and solution are to be put together so they are suitable for presentation to the President of any Fortune 500 company. MS Access and MS Excel will be used to gather and analyze data for creation of spreadsheets and databases, MS PowerPoint will be used to produce presentations and recommendations, and MS Word will be used to produce documents and reports. Teams will be expected to be skilled in the core programs of MS Office 2010 or 2013 including Access, Excel, PowerPoint, and Word.
Teams for this contest can consist of 1-2 Students. Each member can bring your own computer(BYOC).
This contest will take place on Friday, October 21, 2016 from 12:00 ‐ 3:00 PM
MS Excel: Create spreadsheets that display data in various tabular and visual formats. The recommended required skills include, but are not limited to: Export external data lists, Pivot Tables, Charts, Scenario Manager, Solver, Conditional Formatting, Subtotals, Sorting, Macros and Buttons, Validation.
MS Power Point: Create multimedia presentations to display information in a graphical format. The recommended required skills include, but are not limited to: Template Presentations, Slide Master, Summary Slide, Insert Charts, Tables, Clipart, Pictures and Drawings, Backgrounds.
MS Access: Create databases that store information that can be manipulated, sorted, and filtered to meet your specific needs. The recommended required skills include, but are not limited to: Import/Export external Data, Table creation and Data Queries (Criteria, Calculated Fields, Summarization, Sorting, etc.), Relationships, Reports.
MS Word: Create documents and reports to display data as meaningful information. The recommended required skills include, but are not limited to: File management and layout, Macros, Merges, Tables and Diagrams, Templates.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110792.29/warc/CC-MAIN-20170822143101-20170822163101-00540.warc.gz
|
CC-MAIN-2017-34
| 2,361
| 11
|
http://forum.gtdnext.com/t/linking-to-other-programs/466
|
code
|
I just started using GTD using GTDNext and Onenote in order to use the system.
I currently use GTDNext as my task organizer as I find outlook tasks and One Note To Do lists hard to implement the system correctly. However One note is great for organizing thoughts ideas and information.
What would be fantastic is the ability to create a link in the project or task to a Onenote page/section or/also Evernote.
Project: Get a New Camera
Task: Research Cannon (link to Onenote Page that would hold all the Compiled Information)
Task: Research Sony (link to Onenote Page that would hold all the Compiled Information)
Task: Research Nikon (link to Onenote Page that would hold all the Compiled Information)
Being able to link each task to a OneNote Page or section would be really handy as a direct way of clicking and seeing the fruits of your task labor at a click and a glance.
Not sure how or if that would be possible but I for one would find it very powerful and useful. I feel others would as well as from my research into the GTD system a lot of people combine GTDNext and either Evernote and Onenote already. This type of feature would finally create a link between the two.
Hope my idea was clear enough. Keep up the great work. The app is great and looking forward to your Mobile App. please do not leave us Windows Phone Users out in the cold though when you do take your mobile app to market. I see windows Phone Market share will be on the rise especially when windows 10 comes out and sync's all windows devices together I foresee more people starting to make the switch.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107904039.84/warc/CC-MAIN-20201029095029-20201029125029-00707.warc.gz
|
CC-MAIN-2020-45
| 1,581
| 10
|
https://openknowledge.worldbank.org/collections/773c2387-4e0f-5b85-a5ab-80abb493dd76?f.region=Middle%20East%20and%20North%20Africa,equals&spc.page=1&view=list&f.subject=EXCLUSIVITY%20CONTRACTS,equals&f.focus_sdg=SDG%208:%20Decent%20Work%20and%20Economic%20Growth,equals
|
code
|
Migration and Development Briefs are prepared by the Migration and Remittances Unit, Development Economics (DEC). The brief aims to provide an update on key developments in the area of migration and remittance flows and related policies over the past six months. It also provides medium-term projections of remittance flows to developing countries. A special topic is included in each brief. The brief is produced twice a year.
(World Bank, Washington, DC, 2017-10) World Bank Group
This migration and development brief
reports global trends in migration and remittance flows,
major policy developments, and the Sustainable Development
Goal (SDG) indicators for reducing remittance costs and
recruitment costs. The brief reports new data on recruitment
costs, a potential indicator for the SDG of promoting safe
and regular migration. The special focus of the brief is
return migration, a challenging issue around the world amid
a rise in asylum seekers and undocumented migrants.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476396.49/warc/CC-MAIN-20240303142747-20240303172747-00662.warc.gz
|
CC-MAIN-2024-10
| 980
| 11
|
https://chicala.org/bluehost-wordpress-not-working-well/
|
code
|
Bluehost WordPress Not Working Well
Discovering a premium affordable web hosting company isn’t very easy. Every web site will certainly have various demands from a host. And also, you need to compare all the functions of a hosting company, all while seeking the most effective deal possible.
This can be a whole lot to kind via, particularly if this is your first time buying holding, or developing an internet site.
The majority of hosts will offer incredibly economical initial rates, only to increase those rates 2 or 3 times higher once your first contact is up. Some hosts will provide complimentary bonuses when you register, such as a complimentary domain, or a cost-free SSL certification.
While some hosts will have the ability to offer much better performance and high degrees of safety and security. Bluehost WordPress Not Working Well
Listed below we dive deep into the very best economical webhosting plan there. You’ll learn what core hosting attributes are essential in a host and also exactly how to evaluate your own organizing demands so that you can select from one of the best economical hosting providers below.
Disclosure: When you purchase a webhosting plan through web links on this web page, we make some commission. This aids us to maintain this website running. There are no additional costs to you at all by using our web links. The listed here is of the very best low-cost host bundles that I’ve directly used as well as evaluated.
What We Think about To Be Low-cost Web Hosting
When we explain a web hosting bundle as being “Low-cost” or “Budget plan” what we imply is hosting that falls into the rate bracket between $0.80 to $4 monthly. Whilst investigating economical holding service providers for this guide, we took a look at over 100 different hosts that came under that price array. We then evaluated the top quality of their most inexpensive holding plan, value for money as well as client service.
In this short article, I’ll be reviewing this first-rate site holding company as well as stick in as much pertinent information as possible.
I’ll go over the attributes, the rates alternatives, and anything else I can think of that I think may be of advantage, if you’re choosing to sign up to Bluhost as well as get your internet sites up and running.
So without more ado, let’s check it out.
Bluehost is among the greatest web hosting firms in the world, getting both huge advertising and marketing assistance from the firm itself and also affiliate online marketers who promote it.
It truly is a massive firm, that has been around for a very long time, has a huge online reputation, and also is certainly one of the leading selections when it involves webhosting (most definitely within the leading 3, at least in my book).
Yet what is it specifically, and also should you obtain its solutions?
Today, I will certainly answer all there is you require to recognize, offered that you are a blog owner or a business owner that is looking for a host, and also does not recognize where to get going, because it’s a terrific solution for that target market as a whole.
Allow’s picture, you want to organize your websites and also make them noticeable. Okay?
You currently have your domain (which is your website destination or LINK) now you want to “transform the lights on”. Bluehost WordPress Not Working Well
You need some hosting…
To complete all of this, and also to make your internet site noticeable, you need what is called a “server”. A web server is a black box, or device, that stores all your web site data (documents such as pictures, texts, videos, web links, plugins, and various other information).
Currently, this web server, needs to be on regularly and also it has to be connected to the internet 100% of the time (I’ll be discussing something called “downtime” in the future).
In addition, it additionally requires (without getting too fancy and into information) a file transfer protocol commonly known as FTP, so it can reveal web internet browsers your website in its designated form.
All these things are either costly, or need a high degree of technological skill (or both), to develop and also keep. As well as you can entirely go out there and learn these points on your own and also set them up … but what about as opposed to you getting and preserving one … why not just “renting out organizing” rather?
This is where Bluehost is available in. You rent their servers (called Shared Hosting) and you launch a website making use of those web servers.
Given that Bluehost keeps all your documents, the business also permits you to establish your content administration systems (CMS, for short) such as WordPress for you. WordPress is a very preferred CMS … so it just makes sense to have that option readily available (almost every hosting business now has this choice too).
Basically, you no longer require to set-up a server and after that incorporate a software where you can construct your web content, independently. It is currently rolled into one package.
Well … think of if your web server remains in your residence. If anything were to take place to it at all, all your data are gone. If something goes wrong with its inner procedures, you require a professional to fix it. If something overheats, or breaks down or obtains damaged … that’s no good!
Bluehost takes all these inconveniences away, and looks after everything technical: Pay your server “rental fee”, and also they will certainly look after whatever. And when you acquire the solution, you can then begin focusing on including material to your site, or you can place your effort right into your marketing campaigns.
What Provider Do You Get From Bluehost?
Bluehost offers a myriad of various solutions, yet the main one is hosting certainly.
The holding itself, is of different kinds incidentally. You can rent a shared web server, have a dedicated web server, or likewise a digitalexclusive web server.
For the purpose of this Bluehost testimonial, we will concentrate on hosting solutions as well as various other services, that a blogger or an on the internet entrepreneur would require, instead of go too deep into the bunny opening and speak about the various other solutions, that are targeted at more experienced individuals.
- WordPress, WordPress PRO, as well as ecommerce— these hosting solutions are the plans that permit you to organize a site using WordPress as well as WooCommerce (the latter of which allows you to do e-commerce). After acquiring any of these packages, you can begin developing your site with WordPress as your CMS.
- Domain Market— you can also buy your domain from Bluehost instead of various other domain name registrars. Doing so will make it less complicated to direct your domain name to your host’s name servers, since you’re using the exact same marketplace.
- Email— when you have actually purchased your domain, it makes sense to additionally obtain an email address tied to it. As a blogger or on the internet entrepreneur, you should pretty much never use a free email service, like Yahoo! or Gmail. An email such as this makes you look unprofessional. Thankfully, Bluehost offers you one totally free with your domain.
Bluehost also provides devoted web servers.
And you may be asking …” What is a devoted web server anyhow?”.
Well, the important things is, the basic webhosting bundles of Bluehost can only a lot traffic for your internet site, after which you’ll need to update your hosting. The factor being is that the typical web servers, are shared.
What this means is that a person server can be servicing 2 or even more internet sites, at the same time, one of which can be your own.
What does this mean for you?
It suggests that the single server’s sources are shared, and also it is doing numerous jobs at any type of given time. As soon as your website starts to hit 100,000 site check outs monthly, you are going to need a dedicated server which you can additionally receive from Bluehost for a minimum of $79.99 per month.
This is not something yous needs to stress over when you’re starting but you must keep it in mind for sure.
Bluehost Rates: Just How Much Does It Price?
In this Bluehost testimonial, I’ll be focusing my attention mainly on the Bluehost WordPress Hosting packages, since it’s one of the most preferred one, and most likely the one that you’re looking for and that will suit you the most effective (unless you’re a substantial brand, firm or site).
The three available plans, are as follows:
- Fundamental Plan– $2.95 monthly/ $7.99 routine rate
- Plus Strategy– $5.45 monthly/ $10.99 normal price
- Selection And Also Strategy– $5.45 per month/ $14.99 regular cost
The first rate you see is the price you pay upon sign up, and also the 2nd rate is what the price is, after the initial year of being with the company.
So basically, Bluehost is mosting likely to charge you on a yearly basis. And also you can additionally choose the quantity of years you intend to host your website on them with. Bluehost WordPress Not Working Well
If you pick the Basic strategy, you will certainly pay $2.95 x 12 = $35.40 beginning today as well as by the time you enter your 13th month, you will now pay $7.99 monthly, which is also charged each year. If that makes any type of sense.
If you are serious about your site, you should 100% obtain the three-year choice. This implies that for the standard plan, you will pay $2.95 x 36 months = $106.2.
By the time you strike your fourth year, that is the only time you will certainly pay $7.99 per month. If you consider it, this strategy will certainly save you $120 in the course of three years. It’s very little, however it’s still something.
If you want to get greater than one site (which I extremely advise, and also if you’re severe, you’ll most likely be obtaining more at some point in time) you’ll want to use the option plus plan. It’ll permit you to host endless websites.
What Does Each Strategy Deal?
So, in the case of WordPress organizing plans (which resemble the shared holding strategies, but are much more geared in the direction of WordPress, which is what we’ll be concentrating on) the attributes are as complies with:
For the Standard plan, you get:
- One internet site just
- Secured web site through SSL certification
- Maximum of 50GB of storage
- Free domain name for a year
- $ 200 advertising and marketing credit report
Bear in mind that the domain names are bought individually from the holding. You can get a cost-free domain with Bluehost below.
For both the Bluehost Plus hosting as well as Choice Plus, you get the following:
- Limitless variety of sites
- Free SSL Certification. Bluehost WordPress Not Working Well
- No storage or bandwidth limit
- Complimentary domain name for one year
- $ 200 advertising credit report
- 1 Office 365 Mailbox that is cost-free for thirty day
The Choice Plus strategy has an added benefit of Code Guard Basic Alternative, a back-up system where your file is conserved and also duplicated. If any kind of accident happens and your internet site information disappears, you can recover it to its initial type with this feature.
Notice that although both strategies set you back the very same, the Option Plan after that defaults to $14.99 per month, regular rate, after the set amount of years you’ve picked.
What Are The Perks Of Using Bluehost
So, why choose Bluehost over various other host solutions? There are hundreds of webhosting, most of which are resellers, but Bluehost is one pick couple of that have actually stood the test of time, and also it’s possibly the most popular available (and also completely factors).
Right here are the 3 major advantages of choosing Bluehost as your host provider:
- Web server uptime— your website will certainly not be visible if your host is down; Bluehost has more than 99% uptime. This is exceptionally vital when it comes to Google Search Engine Optimization and rankings. The higher the far better.
- Bluehost speed— how your web server reaction determines how fast your website reveals on a web browser; Bluehost is lighting quickly, which means you will certainly decrease your bounce price. Albeit not the very best when it involves loading speed it’s still hugely crucial to have a rapid speed, to make individual experience much better and much better your ranking.
- Limitless storage space— if you obtain the Plus plan, you need not stress over the amount of data you keep such as video clips– your storage ability is limitless. This is actually essential, since you’ll possibly face some storage space issues later down the tracks, as well as you don’t want this to be a headache … ever before.
Last but not least, customer support is 24/7, which indicates no matter where you are in the world, you can speak to the assistance group to fix your website issues. Pretty common nowadays, yet we’re taking this for approved … it’s also extremely essential. Bluehost WordPress Not Working Well
Additionally, if you have actually obtained a free domain with them, then there will be a $15.99 cost that will certainly be deducted from the amount you initially purchased (I picture this is since it kind of takes the “domain out of the marketplace”, not sure regarding this, however there probably is a hard-cost for registering it).
Last but not least, any kind of demands after 1 month for a refund … are void (although in all sincerity … they ought to most likely be stringent right here).
So as you see, this isn’t always a “no doubt asked” policy, like with a few of the other hosting options around, so make certain you’re all right with the plans prior to proceeding with the organizing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487637721.34/warc/CC-MAIN-20210618134943-20210618164943-00414.warc.gz
|
CC-MAIN-2021-25
| 13,815
| 82
|
https://discuss.huggingface.co/t/auo-replicas-is-not-working/49336
|
code
|
I am deploying blip2-flan-t5-xl [Salesforce/blip2-flan-t5-xl · Hugging Face] model on aws Nvidia A10G. I have some more issues in triggering the auto-scaling. The documentation says that the new replicas are created when the gpu usage remains above 80% for over 2 minutes.
But my experiments have shown that when GPU usage nears the 80%, it starts rejecting the requests, so no replicas is created. I have attached the screenshots below to assist my query. As it can be seen that when gpu usage nears the 80%, server based errors have increased, so eventually the gpu usage comes down the 80%, so no replicas are created.
Does anybody have an idea?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00478.warc.gz
|
CC-MAIN-2023-40
| 649
| 3
|
https://superuser.com/questions/1397601/cant-use-account-after-windows-10-update
|
code
|
I have a lab with 30 pc with Windows 10 installed, managed with a AD Domain. Randomly (I suppose that this happen after a system update) I am unable to logon with domain account. Only the local account works, but when the desktop is loaded I can't do anything: the windows bar doesn't respond and the only programs that runs are task manager and cmd. And the local admin account is loaded like Guest account. In this way I need to reboot the system and use Windows restore tools to open a admin cmd.
I have tried this solutions:
- restore point: the process failed for an error on disk...on every pc!!!
- DISM.exe /Online /Cleanup-image /Restorehealth: it has worked only in a machine, where I was able to log on with domain admin Account. For other machine when I try to use this tool from recovery option the system tell me that I can't use the online restore because I'm in recovery tool
- sfc /scannow: no error on disk
- from a cmd in the recovery tool area I have tried to create a new user with admin role, but when I come back to logon screen it doesn't work (the logon failed)
- from a cmd in the recovery tool area I have tried to elevate my old local admin to admin role (net localgroup administrators UserName /add), but when I log on the profile was guest too
- from a cmd in the recovery tool area I have tried to use wuauclt command to update the system but the cmd can't find the program
- from a cmd in the recovery tool area I have tried to open power shell command to update the system but the cmd can't find the program
I have ended up my ideas...someone can help me?!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195530385.82/warc/CC-MAIN-20190724041048-20190724063048-00509.warc.gz
|
CC-MAIN-2019-30
| 1,588
| 10
|
https://lists.puredata.info/pipermail/pd-list/2002-12/008857.html
|
code
|
[PD] crossfade of complete sample buffer
finnendahl at folkwang-hochschule.de
Mon Dec 2 11:06:06 CET 2002
Am Montag, den 02. Dezember 2002 um 10:34:50 Uhr (+0100) schrieb
> (bufferA * n) + (bufferB * (1-n))
> n=a value decreasing from 1 to 0.
That's what I want to do (using a hamming window or something like
that for the envelope). The question is about how to implement this in
Given two buffers (A and B) i want to create a third buffer (C) with a
single bang which copies all samples of A and B using the above
formula on each sample at once (meaning faster than the
samplerate). So what I need is some sort of a tabledump, which can be
triggered by a bang. That is quite simple in high-level pd once you
know for example the size of an array. But I don't know how to get
that except accessing the array struct directly within a code
external. Another solution would be if there was some sort of "dump"
message for table objects.
Does anybody know of something like that? Maybe I'm missing something
> i don't know if the result will please you... because this will still sound
> like a kind of "traditional" crossfade.
That's o.k. It's purpose is solely to avoid clicks when changing the sound of
a buffer while it is being accessed by multiple granular generators in
a performance. Transforming the sound of the accessed buffer gradually
is the cheapest and most elegant solution.
More information about the Pd-list
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100172.28/warc/CC-MAIN-20231130062948-20231130092948-00540.warc.gz
|
CC-MAIN-2023-50
| 1,422
| 25
|
https://blogs.technet.microsoft.com/onescript/2014/03/24/script-of-mar-25-search-calendar-items-in-a-shared-mailbox-in-office-365-exchange-online/
|
code
|
This script can search calendar items in a shared mailbox in Office 365 Exchange Online. You need to add proper permission to a shared mailbox folder before running this script.
Currently, you can easily search calendar items in Outlook. But you find this feature is not available in Outlook Web App (OWA). You want to find a workaround for those people who use Outlook Web App only.
You can find more All-In-One Script Framework script samples at https://aka.ms/onescriptingallery
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158320.19/warc/CC-MAIN-20180922103644-20180922124044-00530.warc.gz
|
CC-MAIN-2018-39
| 481
| 3
|
http://behrouzjafarnezhadphotography.com/who-i-am/
|
code
|
Who I Am
25 years old, Iranian.
Graduated from Shiraz University of Technology in IT in 2010 and moved to Manchester to continue my education; graduated in MSc Information Systems from The University of Manchester in December 2011, and now am living in Sheffield, UK.
Always loved photography, but started to take photographs in a more serious manner in mid 2009, and I feel like I love it more after each photo I “make”. My favorite categories in photography are Landscape, Animals, People, and Abstract.
Travelling, playing football (soccer), listening to music, and Internet (basically anything that is digital!) are my favorite hobbies.
Hope you enjoy my photos,
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697552127/warc/CC-MAIN-20130516094552-00079-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 670
| 6
|
https://www.rockpapershotgun.com/latest-indie-royale-bundle-has-indie-games-in-it
|
code
|
As opposed to not-indie games. Apparently there's controversy when bundles aren't indie, though I'd appreciate the ill sentiment more if Indie Royale did it, what with the whole indie in the title thing.
Anyway: the line-up for the Indie Royale Winter package is Greed Corp, Hamlet, BIT.TRIP Runner (isn't that in everything now?), Conquest of Elysium 3, Leave Home and They Breathe. Seeing as I ruined basically hit-attraction techniques by putting all those names above the cut, I'm going to stuff some videos of each of those games below instead. Then I will be high on hits, beyond my wildest possible hit-based dreams. (I don't have any hit-based dreams, I'm not Rupert Murdoch even if I am almost as crabby).
Conquest of Elysium 3:
Usual Indie Royale rules apply. The minimum price goes up as more people pay the minimum price, or down if generous folk pay more than the asking. Currently it's at a piffling £2.89, though that will doubtless have changed by the time this post goes live.
What will also have changed by the time this post goes live is my socks, because my current ones are too thin in this cold. Rock, Paper, Shotgun: the internet's most thrilling read.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00856.warc.gz
|
CC-MAIN-2023-50
| 1,176
| 5
|
https://starwest.techwell.com/program/tutorials/performance-testing-services-web-and-cloud-based-architectures-starwest-2018
|
code
|
Performance Testing Services for Web and Cloud-Based ArchitecturesNew
Does your application have what it takes to handle the number of customers you expect—or hope for? Does it provide a quick, responsive experience for your users all the time? Join Amber Race to explore the performance testing tools and techniques you need to help ensure that your application is ready for the load from real users. If you are just getting started as a performance tester and wondering how to begin, Amber will take you through the basics and review the different facets of load and performance testing. You’ll learn how to analyze your application for potential issues, create tests using a variety of open source tools, and report your results in a way that your team will understand. In this hands-on session, Amber will help you develop the confidence to take on the critical task of load testing your application—and to get it ready for the big time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593142.83/warc/CC-MAIN-20180722080925-20180722100925-00398.warc.gz
|
CC-MAIN-2018-30
| 947
| 2
|
https://communities.intel.com/thread/128025
|
code
|
Sorry I forgot to put it in the format I was supposed to.
Answers (N/A if not applicable)
Provide a detailed description of the issue
The some of the textures in Skyrim Special Edition are gray like for example peoples' hair.
Please place an X to the right of the option showing how often you see this issue using specific steps. (Ex: 'Every few times a game is started it flickers.' <- This would be "Often")
Very Sporadic (<20%):No
Brand and Model of the system.
Toshiba Satellite C55-B5277
Hybrid or switchable graphics system?
ie Does it have AMD or NV graphics too?
Make and model of any Displays that are used to see the issue (see note2 below).
LFP = Local Flat Panel (Laptop panel)
EFP = External Flat Panel (Monitor you plug in)
How much memory [RAM] in the system (see note2 below).
8Gb DDR3 1600Mhz (only running in 1300Mhz because of cpu cap)
Provide any other hardware needed to replicate the issue.
ie: Cables&brand, cable type [vga, hdmi, DP, etc], dock, dongles/adapters, etc
Hardware Stepping (see note1 below).
Operating System version (see note2 below).
Windows 10 Home (10.0.17134)
VBIOS (video BIOS) version. This can be found in “information page” of CUI (right click on Desktop and select “Graphics Properties”.
7.2.1011? (Is it GOP?)
Graphics Driver version; for both integrated Intel and 3rd party vendors (see note2 below).
10.18.10.4242 toshiba customized (I also tried 10.18.10.4885)
SW or Apps version used to replicate the issue.
Steam and Skyrim Special Edition
Single display, clone, or extended (see note2 below).
Display resolution & refresh rate setting of each display (see note2 below).
1366 x 768 60hz
AC or DC mode, i.e. is power cable plugged in or not?
How to repro
Please provide steps to replicate the issue. These steps are very crucial to finding the root cause and fix.
A screenshot to illustrate the issue is a huge plus. A video of the failure is even better! Attach to the post or provide the YouTube link.
1. Launch Skyrim Special Edition
2. Start a new game
3. look at the hair of the npc's
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212768.50/warc/CC-MAIN-20180817182657-20180817202657-00036.warc.gz
|
CC-MAIN-2018-34
| 2,049
| 36
|
https://answers.sap.com/questions/364574/billing-problem-in-free-of-charge-delivery-fd-orde.html
|
code
|
I have created FD order till pro-forma F8 invoice.
For some reason i had to reverse the goods issue directly (since pro-forma not allowed for cancellation)
As a result Delivery is open & again issued the goods (PGI)
As i try to do perform Pro-forma creation F8 system throws an error Item category is not relevant for billing but it was happening earlier with no errors
Note: It is happening for Batch items
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053918.46/warc/CC-MAIN-20210916234514-20210917024514-00554.warc.gz
|
CC-MAIN-2021-39
| 407
| 5
|
https://www.coursehero.com/file/p5pvgufd/You-should-see-a-copy-of-the-files-the-officetxt-and-shrektxt-in-this-directory/
|
code
|
You should see a copy of the files the-office.txtand shrek.txtin this directory. I'll explain how this works in the next exercise. 5.Here's another way to use cp. Navigate to the action/directory. Type cd ../../action/ Here we navigate up two directories, and then into the action/directory. 6.Type
cp m*.txt scifi/ 7.Change directories into scifi/. List all files and directories in the working directory. You should see a copy of all text files starting with "m": matrix.txt, matrix-reloaded.txt, and matrix-revolutions.txt. Let’s learn how this works.Wildcardscp * satire/ In addition to using filenames as arguments, we can use special characters like *to select groups of files. These special characters are called wildcards. The *selects all files in the working directory, so here we use cpto copy all files into the satire/directory. cp m*.txt scifi/ Here, m*.txtselects all files in the working directory starting with "m" and ending with ".txt", and copies them to scifi/. 1.In addition to copying files, we can move files from the command line. Change directories into the action/directory. cd ../ 2.Type mv superman.txt superhero/ 3.Navigate to the superhero/directory.
List all files and directories in the working directory. You should see superman.txtin it. 4.Here's another way to use mv. Navigate up one directory from action/superhero/to action/. 5.Then type mv wonderwoman.txt batman.txt superhero/ 6.Navigate to superhero/again. List all files and directories in the working directory. You should see wonderwoman.txtand batman.txtin it. 7.Here's one more way to use mv. Type mv batman.txt spiderman.txt 8.List all files and directories in the working directory. You should see the file batman.txthas been renamed as spiderman.txt. Let’slearn how these commands work. mvThe mvcommand moves files. It's similar to cpin its usage. mv superman.txt superhero/
To move a file into a directory, use mvwith the source file as the first argument and the destination directory as the second argument. Here we move superman.txtinto superhero/. mv wonderwoman.txt batman.txt superhero/ To move multiple files into a directory, use mvwith a list of source files as the first arguments, and the destination directory as the last argument. Here, we move wonderwoman.txtand batman.txtinto superhero/. mv batman.txt spiderman.txt To rename a file, use mvwith the old file as the first argument and the new file as the second argument. By moving batman.txtinto spiderman.txt, we rename the file as spiderman.txt. 1.Change directory to comedy/slapstick. List all files and directories in the working directory. cd ../../comedy/slapstick/ 2.Type rm waterboy.txt 3.List all files and directories in the working directory. You should see that waterboy.txthas been removed. 4.Navigate up one directory from comedy/slapstick/to comedy/.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038074941.13/warc/CC-MAIN-20210413183055-20210413213055-00481.warc.gz
|
CC-MAIN-2021-17
| 2,836
| 4
|
https://neurostars.org/t/nilearn-0-10-1-release/25698
|
code
|
We have just released Nilearn 0.10.1!
This is a minor release but we do have some exciting new plotting features:
Surface plotting methods no longer automatically rescale background maps, which, among other things, allows to use curvature sign as a background map
fsaverage meshes accessed through
fetch_surf_fsaveragenow come with flat maps for all resolutions
Surface plotting functions allow setting custom view angles and are no longer limited to predefined views
You can see the full changelog of this release here:
Big thanks to all the contributors!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00383.warc.gz
|
CC-MAIN-2023-23
| 556
| 8
|
http://eab.abime.net/showpost.php?p=418179&postcount=57
|
code
|
Do not believe it, that i not laze
The events are going on in the background. Only more mistakes turned up that to improve is needed (not only Amithlon I think of a version). I repair these mistakes continuous and I update it. (Will be an AmigaSYS4 WinUAE version, new release). I cannot move because of the mistakes. (E-UAE is late because of this). There is much work and much time is needed for this. (platforms, tests, manuals, webpage etc.)
But I promise it by a weekend I put a couple of new pictures out from the present events. (E-UAE, AGA new features)
The AGA version somebody else than an emulator. Much more the opportunity, more real machines version, there is hardware, etc, it AmigaSYS3 AGA version more months were testing.
But prepares currently.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722951.82/warc/CC-MAIN-20161020183842-00046-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 763
| 5
|
http://www.yanabi.com/index.php?/topic/300988-dream/
|
code
|
I had a dream that i was on the airoplane coming back from pilgrimmage and suddenly the plane just falls down, does this mean anything??? Like when the plan is taking off when it is going up
Posted 20 January 2009 - 02:10 PM (#4)
|Wa'alaykum 'Assalam wa Rahmatullahi wa Barakatuhu |
Please do not post your dreams just for anybody and everybody to interprete.
If you want to understand the Qur'an you go to Ahlul Bayt, if you want to understand Ahlul Bayt you go to the Qur'an.
Shaykh Sayyid Muhammad bin Yahya Al-Ninowy Al Husayni
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142617/warc/CC-MAIN-20130516124222-00045-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 531
| 6
|
https://riverbankcomputing.com/pipermail/pyqt/2016-August/037901.html
|
code
|
[PyQt] sip. setdestroyonexit
carl at wolff-online.nl
Mon Aug 15 21:11:56 BST 2016
I succesfully applied sip. setdestroyonexit on a fairly large pyqt4
application suffering from occasional crashes at exit time.
My question is twofold:
- why is destroyonexit not set to False by default;
- Is it (theoretically) possible to live without using this sip call? E.g.
by adhering to guidelines regarding pyqt wrapper/qt ownership and qt/python
garbage collection? When I read the API documentation of
sip.setdestroyonexit carefully, I get the impression that it is impossible
to live without this sip call.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the PyQt
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00770.warc.gz
|
CC-MAIN-2023-14
| 706
| 15
|
https://www.couchbase.com/forums/t/couchbase-web-console-missing-query-tab/7705
|
code
|
Hi, I just installed couchbase-server-community-184.108.40.20605. And I dont see the Query tab in the Couchbase Web Console.
But If I install couchbase server 4.5 enterprise. I see the tab. The cluster says I have query, index and data service running.
I would like to write queries in the query tab.
Hi Steeve, the query UI is only available with the enterprise edition.
April 7, 2016, 10:30pm
The post above is incorrect. The query tab was not available in the Couchbase 4.1 release. It is new for Couchbase 4.5. It is supported in both Community and Enterprise Editions in Couchbase 4.5, but the Enterprise Edition allows you to do schema inferencing.
By schema referencing, are you referring to the ability to perform queries by joining data from 2 different buckets?
If there are more things not included in the community version. Is there a more detailed version of this URL?
See this and the video at the bottom:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00220.warc.gz
|
CC-MAIN-2023-23
| 919
| 9
|
https://levien.com/type/myfonts/inconsolata.html?ref=nacho-lopez
|
code
|
Update 2015-12-04: The official release of Inconsolata is at Google Fonts, and official upstream is on github. These versions have better Windows hinting and some fixes. I also have an experimental version (tentatively titled InconsolataGo) with straight quotes in the inconsolata directory here.
Inconsolata is my first serious original font release. It is a monospace font, designed for code listings and the like, in print. There are a great many "programmer fonts," designed primarily for use on the screen, but in most cases do not have the attention to detail for high resolution rendering.
Inconsolata draws from many inspirations and sources. I was particularly struck by the beauty of Luc(as) de Groot's Consolas, which is his monospaced design for Microsoft's upcoming Vista release. This font, similar to his earlier TheSansMono, demonstrated clearly to me that monospaced fonts do not have to suck.
First and foremost, Inconsolata is a humanist sans design. I strove for the clarity and clean lines of Adrian Frutiger's Avenir (the lowercase "a", in particular, pays homage to this wonderful design), but also looked to Morris Fuller Benton's Franklin Gothic family for guidance on some of my favorite glyphs, such as lowercase "g" and "S", and, most especially, the numerals.
Designing a monospace font poses unique challenges. I have carefully studied many other monospaced fonts to see how they solve these problems. Many of the available monospace fonts are adaptations of existing proportionally-spaced fonts, but some, such as Letter Gothic, draw strength from being their own designs. I hope Inconsolata upholds that tradition.
Some details will be most apparent in print, such as the subtle curves in lowercase "t", "v", "w", and "y". Inconsolata also borrows "micro-serifs" from some Japanese Gothic fonts, which enhance the appearance of crispness and legibility.
[ FontForge source | OpenType file | pfa file | PDF showing ]
I'm still working on completing this font, refining the base ASCII set and filling out the Latin 1, 2, and 9 complements. It will be released under the new Open Font License of SIL. Completion of this font is being generously sponsored by the TeX Users Group Development Fund. If you like this font and want to see more sponsored and released freely, please consider donating to TUG.
Other fonts I'm working on.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506481.17/warc/CC-MAIN-20230923130827-20230923160827-00710.warc.gz
|
CC-MAIN-2023-40
| 2,359
| 9
|
https://flylib.com/books/en/3.13.1.225/1/
|
code
|
#include <math.h>float expm1f(float arg);double expm1(double arg); long double expm1l(long double arg);
expm1( ), expm1f( ), and expm1l( ) were added by C99.
The expm1 family of functions returns the natural logarithm e raised to the arg power, minus 1. That is, it returns earg – 1.
Related functions are exp( ) and log( ).
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583087.95/warc/CC-MAIN-20211015222918-20211016012918-00431.warc.gz
|
CC-MAIN-2021-43
| 326
| 4
|
https://azure.microsoft.com/sv-se/updates/secure-credential-management-using-azure-key-vault-and-data-factory/
|
code
|
Secure credential management by using Azure Key Vault and Data Factory
Publiceringsdatum: 30 april, 2018
Azure Data Factory is now integrated with Azure Key Vault.
You can store credentials for your data stores and computes referred in Azure Data Factory ETL (extract, transform, load) workloads in a key vault. Simply create an Azure Key Vault linked service and refer to the secret stored in the key vault in your Data Factory pipelines.
For more information, see the blog announcement and the documentation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651325.38/warc/CC-MAIN-20230605053432-20230605083432-00141.warc.gz
|
CC-MAIN-2023-23
| 510
| 5
|
https://www.drkaraflint.com/program-essentials
|
code
|
I have an arsenal of tools and products that I often recommend, so I've created a page to house them all!
They are organized by category to make life easier. These products are not required, by all means. Instead, I have them here as a reference for convenience if you happen to be interested in the items I personally use.
I do have an affiliate account with Amazon and receive a small commission if you purchase items through my links. I only promote items that I love and use and which has brought joy into my family's life.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100399.81/warc/CC-MAIN-20231202105028-20231202135028-00303.warc.gz
|
CC-MAIN-2023-50
| 527
| 3
|
https://stackoverflow.com/questions/51230612/sas-visual-analytics
|
code
|
In SAS VA Dashboard I am using calculating item in button bar and I need that at least one value should be selected in that button bar .It's working fine when I am selecting required options from button bar.
But when next day the data gets updated then all values are get deselected(I want at least one value should be selected as per my requirement) as I used required option in button bar still it's not working .
Previously it's working fine in SAS VA 7.3 version but now I am using SAS VA 7.4 and i am getting this issue.
Like I have used required option in button bar for other variables also in SAS VA 7.4 they are working fine but for calculated item it's not working.
So it's like we can't use that required option of button Bar for calculated item ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512421.5/warc/CC-MAIN-20181019170918-20181019192418-00024.warc.gz
|
CC-MAIN-2018-43
| 758
| 5
|
https://listi.jpberlin.de/pipermail/qutebrowser/2015-May/000074.html
|
code
|
This week's qutebrowser updates
me at the-compiler.org
Tue May 19 06:56:52 CEST 2015
Back to longer update mails! ;)
Many old(er) pull requests and branches merged this time :)
Excluding merges, 1 author has pushed 92 commits to master and 105
commits to all branches. On master, 69 files have changed and there
have been 2,644 additions and 895 deletions.
3 Pull requests merged by 2 people
16 Issues closed by 1 person
7 Issues created by 3 people
- New command `:scroll-px` which replaces `:scroll` for pixel-exact
- New setting `ui -> smooth-scrolling`.
- New setting `content -> webgl` to enable/disable WebGL.
- New setting `content -> css-regions` to enable/disable support for
- New setting `content -> hyperlink-auditing` to enable/disable
support for hyperlink auditing.
- Support for Qt 5.5 and tox 2.0
- New arguments `--datadir` and `--cachedir` to set the data/cache
- New arguments `--basedir` and `--temp-basedir` (intended for
debugging) to set a different base directory for all data, which
allows multiple invocations.
- New argument `--no-err-windows` to suppress all error windows.
- New visual/caret mode (bound to `v`) to select text by keyboard.
Thanks to Artur Shaik for this big contribution!
- `:scroll` now takes a direction argument
instead of two pixel arguments (`dx`/`dy`). The old form still works
but is deprecated. It now internally uses fake keypresses to WebKit
which makes scrolling more reliable.
- The `--no-crash-dialog` argument which was intended for debugging
only was removed as it's replaced by `--no-err-windows` which
suppresses all error windows.
- Fixed updating of the tab title on pages without title.
- Fixed AssertionError when closing many windows quickly.
- Various fixes for deprecated key bindings and auto-migrations.
- Workaround for qutebrowser not starting when there are NUL-bytes in
the history (because of a currently unknown bug)
- Fixed handling of keybindings containing Ctrl/Meta on OS X.
Under the hood
- More tests were converted to pytest.
- Various refactorings.
- Various documentation improvements.
- Buildbot now also does smoke testing (starting qutebrowser to see if
it runs successfully).
http://www.the-compiler.org | me at the-compiler.org (Mail/XMPP)
GPG: 916E B0C8 FD55 A072 | http://the-compiler.org/pubkey.asc
I love long mails! | http://email.is-not-s.ms/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 819 bytes
Desc: not available
More information about the qutebrowser
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00274.warc.gz
|
CC-MAIN-2022-33
| 2,514
| 53
|
https://www.cocoanetics.com/2010/09/myappsales-1-0-17/
|
code
|
With Apple totally revamping the “Sales & Trends” and “Financial Reports” they gave a shiny and wonderful AJAX Interface. But at the same time, because of the lack of a public API, this meant that we tool vendors had to burn some midnight oil to get our downloaders fixed up again.
This version of MyAppSales is a maintenance release with these goals:
- navigate the AJAX pages to retrieve Daily, Weekly and Financial reports
- adapt to the changes in the financial reports format (reports would be empty)
- Minor tweaks, like use the smaller financial report description when displaying report sums
I am still working on migrating the database into CoreData to be able to make it 4.x compatible. Currently there are lots of caching mechanism that cannot handle when the app is being killed, like when you remove it from the recent apps list. Another problem is that settings will not be saved. So until further notice you have to keep building it against SDK 3.2, it will still run fine on your iPhone with iOS 4.x.
The update is in the trunk of the subversion repository.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00524.warc.gz
|
CC-MAIN-2023-40
| 1,081
| 7
|
https://forums.unrealengine.com/t/advanced-rpg-combat-template-final-update-magic-system-is-going-to-be-avaiable-soon/138273
|
code
|
Dear fellow developers!
I would like to let you know that my final update to my passion project, the Advanced RPG Combat Template is soon going to be avaiable for download on the marketplace.
It’s an update to the existing product, so in case you already have the product, you can just update it to receieve the new functions.
- 2 New Weapon Types: Staff, Orbs (Staffs can be used as melee weapons too, the player can block, attack with them. Orbs can fire quick projectiles with RMB+LMB )
- **3 Implemented Magic Types, easy to create your own **- Fire Frost General. (Each style needs it’s own weapon to function. E.G: Fire needs a fire orb. General skills can be used with fire and frost weapons.)
- 3 Skill types: Target based, Placement, Area of Effect. (Target based skills deal damage to a single target, while AoE effects deal damage to everyone in the area.)
- 2 Skill casting types: Dynamic, or Channeled. (dynamic skills can be used while moving, channeled skills need to be channeled for X amount of time before casting.)
- **Ranged weapon skills: **Explosive arrows, freezing arrows, arrow barrage.
- New Widgets: Action Bar, Skill Book, Skill Tree
- Complete Mana System
- Cooldown system
- Plenty of new magic animations and anim montages
I’m currently making the final touches, polishing, commenting the code, and I’ll submit the update to the marketplace. I’ve made a Quick showcase video about the new functions:
In case you have any questions, or you would like to request a feature before the update goes live, feel free to do so here, or via Email: email@example.com
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662555558.23/warc/CC-MAIN-20220523041156-20220523071156-00572.warc.gz
|
CC-MAIN-2022-21
| 1,597
| 14
|
https://smbitjournal.com/tag/windows-rt/
|
code
|
Talk around Microsoft’s new upcoming desktop operating, Windows 8, centers almost completely on its dramatically departing Metro User Interface, borrowed from the Windows Phone which, in turn, borrowed it from the ill-fated Microsoft Zune. Apparently Microsoft believes that the third time is the charm when it comes to Metro.
To me the compelling story of Windows 8 comes not in the fit and finish but the under the hood rewiring that hint at a promising new future for the platform. In the past Microsoft has attempted shipping Windows Server OS on some alternative architectures including, for those who remember, the Digital Alpha processor and more recently the Intel Itanium. In these previous cases, the focus was on the highest end Microsoft platforms being run on hardware above and beyond what the Windows world normally sees.
Windows 8 promises to tackle the world of multiple architectures in a completely different way – starting with the lowest end operating system and focusing on a platform that is lighter and less powerful than the typical Intel or AMD offering, the low power ARM RISC architecture with the newly named Windows RT (previously WoA, Windows on ARM.)
The ARM architecture is making its headlines as Microsoft attempts to drive deep into handheld and low power devices. Windows RT could signal a unification between the Windows desktop codebase and the mobile smartphone codebase down the road. Windows RT could mean strong competition from Microsoft in the handheld tablet market where the iPad dominates so completely today. Windows RT could be a real competitor to the Android platforms.
Certainly, as it stands today, Windows RT has a lot of potential to be really interesting, if not quite disruptive, with where it will stand upon release. But I think that the interesting story lies beneath the surface in what Windows RT can potentially mean for the datacenter. What might Microsoft have in store for us in the future?
The datacenter today is moving in many directions. Virtualization is one driving factor as are low power server options such as Hewlett-Packard’s Project Moonshot which is designed to bring ARM-based, low power consumption servers into high end, horizontally scaling datacenter applications.
Currently, today, the number of server operating systems available to run on ARM servers, like those coming soon from HP, are few and far between and are mostly only available from the BSD family of operating systems. The Linux community, for example, is scrambled to assemble even a single, enterprise-supported ARM-based distribution and it appears that Ubuntu will be the first out of the gate there. But this paucity of server operating systems on ARM leaves an obvious market gap and one that Microsoft may be well thinking of filling.
Windows Server on ARM could be a big win for Microsoft in the datacenter. A lower cost offering broadening their platform portfolio without the need for heavy kernel reworking since they are already providing this effort for the kernel on their handheld devices. This could be a significant push for Windows into the growingly popular green datacenter arena where ARM processors are expected to play a central role.
Microsoft has long fought to gain a foothold in the datacenter and today is as comfortable there as anyone but Windows Servers continue to play in a segregated world where email, authentication and some internal applications are housed on Windows platforms but the majority of heavy processing, web hosting, storage and other roles are almost universally given to UNIX family members. Windows’ availability on the ARM platform could push it to the forefront of options for horizontally scaling server forms like web servers, application servers and other tasks which will rise to the top of the ARM computing pool – possibly even green high performance compute grids.
ARM might mean exciting things for the future of the Windows Server platform, probably at least one, if not two releases out. And, likewise, Windows might mean something exciting for ARM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816734.69/warc/CC-MAIN-20240413114018-20240413144018-00130.warc.gz
|
CC-MAIN-2024-18
| 4,072
| 10
|
http://saviry.com/deal/1324222
|
code
|
offers Pebira 36" Wooden Wobble Board
after code with free shipping.
Apply Code: UIEZEPFWProduct Features:
- 【Multifunctional Wobble Board】Children's balance and strength can be developed by our wooden wobble balance board. They can use it as a fitness tool, swing, slide, bridge, doll cradle, lounge chair, racetrack, stepping stool or small football goal, etc. Just imagine what kids wish it to be as they begin playing with this interesting wooden toy.
- 【Dimensions】An arc spanning 36.6 in, width is 11.6 in, length is 33.5 in, total thickness of 0.6 in. It can support weight of up to 100kg/220lbs, making it sturdy enough for both kids and many adults. It's suitable for family activities and good for enhancing parent-child interaction.
- 【Premium Material】Our bright yellow kids balance board is made with eco-friendly natural wood and the surface is painted with water-based eco-friendly lacquer. Each board has unique texture featuring mineral patterns in the outer layer making each one special.
- 【For All Ages】The rocker board can be used by adults as well. They can use it to get fit, stretch their back, (as a seat aid) in yoga exercises or for balance training. Toddlers can play with it as a toy according to their ideas. Own a wooden balance board so you can enjoy a fantastic time indoor.
- 【Easy Maintenance】It is advised to clean the wobble board with a damp cloth, combined with a mild detergent if necessary. It is important to please then wipe it dry following cleaning! Even your little balance board lovers can easily clean it themselves, cultivating their clean consciousness good tidiness.
Category: Babies & Kids
Posted on 12 November 2021, 12:44 PM
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362923.11/warc/CC-MAIN-20211204003045-20211204033045-00462.warc.gz
|
CC-MAIN-2021-49
| 1,698
| 10
|
https://forum.level1techs.com/t/headset-mic-transmits-static-pop-sound-when-i-play-certain-games/59294
|
code
|
Hello everyone I have a strange issue and I don't know how to fix it. My headset mic transmits a static/pop noise when I play Counter Strike: Global Offensive, there could be more games that cause this but this is the only known game that sets it off at the moment. When I play CS:GO the noise doesn't transmit until I'm in a match, it doesn't happen in the main menu but the moment a match starts it begins coming through my mic. I don't hear the noise but friends have complained about it multiple times when I'm in steam calls with them.
The PC I'm using I built it myself two weeks ago and haven't had any issues at all. I didn't have this issue on my windows 7 laptop when I played CS:GO.
My PC specs
CPU: Intel Core i5-4670 3.4GHz Quad-Core Processor
Motherboad: MSI B85-G41 PC Mate ATX LGA1150 Motherboard
RAM: Patriot Signature 8GB (2 x 4GB) DDR3-1600 Memory
HDD: Western Digital Caviar Blue 1TB 3.5" 7200RPM Internal Hard Drive
Video Card: MSI GeForce GTX 770 2GB TWIN FROZR Video Card
PSU: XFX 650W 80+ Bronze Certified Semi-Modular ATX Power Supply
Case: NZXT H230 (Black) ATX Mid Tower Case
Optical Drive :Lite-On iHAS124-04 DVD/CD Writer
OS: Microsoft Windows 8.1 pro (64-bit)
The headset I'm using is a turtle beech x12. I went to the turtle beech website and found this guide on the issue but it didn't help much.
"Static/Popping/Crackling noises are usually the result of system resource
conflicts or excessive activity along the PCI bus. It could also result from
System overheating, failing fans or even an inadequate System Power Supply.
Often times this is caused by a Video Card, which are known to deplete
system resources in order to achieve better performance at the expense of
I have checked my temperatures using MSI afterburner while playing some games including CS:GO and they are fine. I'm pretty sure my PSU is powerful enough for my system (if it wasn't I'm sure it would have randomly shut down or BSOD on me by now). I have checked the fans on all of my components and case, there is no sign of them failing. My video card hasn't given me any problems and I'm using the latest drivers.
The only thing I can think of is there is an incompatibility with something and windows 8.1. Does anyone have any suggestions on how to fix this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710719.4/warc/CC-MAIN-20221130024541-20221130054541-00548.warc.gz
|
CC-MAIN-2022-49
| 2,264
| 20
|
https://discourse.llvm.org/t/new-contributor-make-test-not-doing-anything/39879
|
code
|
I came to the recent LLVM/Clang hackathon and made a new checker for clang-tidy. I’m working on wrapping up and submitting my patch, and I can’t seem to run the tests.
First, I followed the instructions at http://clang.llvm.org/hacking.html#testingNonWindows. I ran
make testin my build directory, and also tried running
testsubdirectory. They both exited in under a second with no output.
Then, I tried doing the same thing in the
tools/clang/tools/extrasubdirectory of my build directory, where clang-tidy lives. Same result.
Finally, I found http://clang.llvm.org/extra/clang-tidy/#testing-checks. This explains how to create tests but not how to run them. I made a relatively wonky command line that seems to run my test successfully (along the lines of
PATH=$PATH:$BUILD_DIR/bin ./check_clang_tidy.py ../../test/clang-tidy/misc-my-check.cpp misc-my-check /tmp/foo.tmp), but it doesn’t feel right.
What should I be doing instead?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711218.21/warc/CC-MAIN-20221207185519-20221207215519-00874.warc.gz
|
CC-MAIN-2022-49
| 939
| 9
|
http://articles.chicagotribune.com/2000-09-18/business/0009180204_1_change-ink-cartridges-new-mouse-reinstall
|
code
|
Q--I have a 2-year-old version of Windows 98, and sooner or later it always ends a session with the mouse (and everything else) locking up, going crazy or what have you. An uninterrupted 15-minute session is almost unheard of. It doesn't matter what program I was in, what was open, it just resulted in a wildly jumping mouse until Control-Alt-Delete shut it down. I tried the $5 Microsoft CD-ROM "fix" to no avail. It's a 233 mHz Pentium with 64 megabytes of RAM, a pretty ordinary machine. Your suggestions?
Steve Lyle, Youngstown, N.Y.
A--Let me tell you how to reinstall Windows to get your computer back on the straight and narrow. But first we will assume that there are no mechanical problems with that mouse, which is a big assumption. Mice get gummed up pretty easily, and when that happens they can send such a jumble of command signals to the main processor that a condition called stack overflow sets in and all freezes. So first of all, buy and try a new mouse.
If that fails, break out the manual and CDs that came with your PC and use the "restore" CD to return your operating system to its pristine out-of-the-box state.
You will get two choices for a restoration. The simplest just reloads Windows 98 on your existing drive. A more extreme fix reformats the drive and erases all your data, including word processing documents, e-mail address lists and Internet bookmarks. Try the less extreme measure first.
Q--It is a real nuisance to have the warning sign telling me that I am about to run out of ink for my printer when I have just replaced the cartridge and the printer is working just fine. It continues to appear no matter what I do. Any suggestion as to how I might rid myself of this nuisance?
Jim Shoffner @ msn.com
A--I have a printer of my own, a Lexmark, that does this same annoying thing, and I fix it by reloading the printer drivers every time I change ink cartridges.
You just pull out the floppy disk (or CD-ROM) that came with the printer and go through the same setup process as when the printer was new. It only takes a couple of minutes, and you're already being bothered by replacing a cartridge so it's just a bit more bother.
For what it's worth, my software expert friends speculate that the printer's software is looking for and not finding a log file it is supposed to create showing past maintenance steps. It thus fails to detect the fact that the cartridge was changed. Reinstalling the drivers makes the machine create that missing log file all over again.
Q--I use my PC mostly for writing. Frequently, while typing, I hit something that kicks in the "overwrite" function. But I can't figure out how to turn off the overwrite mode except by closing my file and reopening it. Would you please tell me how to turn off this overwrite after I turn it on?
Michael Holden, Chestertown, Md.
A--You're going to slap yourself on the forehead when I give you the answer, Mr. H. I know because that's what I did when I finally figured out why this perplexing thing was happening to me as I wrote my various and sundry newspaper pieces. I was (and you are) striking the Insert key, which is next to the Backspace key that gets a lot of use when you go back over sentences to clean them up. If you hit Insert, the computer toggles between the insert and overwrite modes. Since Word and WordPerfect and most other programs come up with the insert function already on, any accidental touching of the key toggles it off, putting the machine into overwrite mode. Closing and reopening the program fixes this, of course, but so does simply tapping Insert a second time.
Q--Recently, I downloaded the Napster Internet music software and started getting some songs from the site and loading them onto my hard drive. This allows me to listen to some of my favorite tunes while I am slaving away at work. I have noticed that after I sign off of Napster, throughout the day, my computer continues to stay connected to Napster letting other people download the songs that I have on my hard drive onto theirs. How can I disable my computer so that Napster cannot automatically call up its site?
Steve R. Eckes @bdfusa.com
A--As you have learned to your dismay, Mr. E., Web music file sharing is a two-way street. In exchange for getting free music from your "friends and neighbors" logged on to Napster, you are expected to make music stored on your own computer available to others. You know, tit for tat. Left hand washes the right hand. Show me your cards and I'll show you my cards.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590329.62/warc/CC-MAIN-20180718213135-20180718233135-00424.warc.gz
|
CC-MAIN-2018-30
| 4,511
| 16
|
https://planetmath.org/regularlanguage
|
code
|
where are non-terminal symbols, are terminal words, and the empty word. In BNF, they are:
A regular language (also known as a regular set or a regular event) is the set of strings generated by a regular grammar. Regular grammars are also known as Type-3 grammars in the Chomsky hierarchy.
A regular grammar can be represented by a deterministic or non-deterministic finite automaton. Such automata can serve to either generate or accept sentences in a particular regular language. Note that since the set of regular languages is a subset of context-free languages, any deterministic or non-deterministic finite automaton can be simulated by a pushdown automaton.
There is also a close relationship between regular languages and regular expressions. With every regular expression we can associate a regular language. Conversely, every regular language can be obtained from a regular expression. For example, over the alphabet , the regular language associated with the regular expression is the set
Yet another way of describing a regular language is as follows: take any alphabet . Let be the smallest subset of (the power set of the set of words over , in other words, the set of languages over ), among all subsets of with the following properties:
is closed under set-theoretic union, concatenation, and Kleene star operations.
Then is a regular language over iff .
Normal form. Every regular language can be generated by a grammar whose productions are either of the form or of the form , where are non-terminal symbols, and is a terminal symbol. Furthermore, for every pair , there is exactly one production of the form .
- 1 A. Salomaa Computation and Automata, Encyclopedia of Mathematics and Its Applications, Vol. 25. Cambridge (1985).
|Date of creation||2013-03-22 12:26:31|
|Last modified on||2013-03-22 12:26:31|
|Last modified by||mps (409)|
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243992721.31/warc/CC-MAIN-20210513014954-20210513044954-00203.warc.gz
|
CC-MAIN-2021-21
| 1,854
| 12
|
https://dodogamesstudio.itch.io/john-doe
|
code
|
You work in the morgue and your job is to find out who is the dead man laying on your table. Look for clues and match the body with a missing person case.
Mous left and right button
space - changeing missing cases
JohnDoeWIN.zip 55 MB
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710684.84/warc/CC-MAIN-20221128235805-20221129025805-00144.warc.gz
|
CC-MAIN-2022-49
| 234
| 4
|
https://praxie.com/experiment-canvas-tools-templates-2/
|
code
|
Experiment Canvas Training Video
An Experiment Canvas is a way to lay out all of the risk factors and key assumptions being made about a potential new product or service being developed. A useful canvas will have space to list the assumption under scrutiny as well as a way to test it and measure the results. An Experiment Canvas will have a section for writing the implications of the results and a plan for what assumptions to test next. This tool is useful for facilitating productive conversations during the innovation process.
Description of Experiment Canvas
To properly use the Experiment Canvas, five steps should be taken:
Step 1: Determine what the riskiest assumption is that needs to be tested. This is the assumption upon which all others rest. In addition to writing down the assumption, indicate why it is important.
Step 2: Write down the hypothesis that is to be tested and determine what resources are needed to test it. Additionally, determine what kind of data needs to be collected as an appropriate metric to decide if the hypothesis is refuted or supported.
Step 3: Conduct the experiment within the specified time-frame. The experiment is finished when enough data has been collected to draw an appropriate conclusion. Data should be representative of the entire population of employees in the segment(s) of the organization the experiment affects.
Step 4: Using the data, determine if the hypothesis was validated or invalidated. If a conclusion cannot be reached based on the available data, consider if the chosen metric was actually the right information needed to test the assumption. If it still remains the proper measure, more data might be needed.
Step 5: At the conclusion of the experiment, determine if a change in direction is needed regarding the product or service, if the production of the product or service can go on as planned or if the experiment needs to be re-done to reach a firmer conclusion. This process can be repeated if another risky assumption is revealed.
Praxie's Online Experiment Canvas Tools & Templates
Unlike most traditional Experiment Canvas processes, Praxie’s online Experiment Canvas tools allow any team or organization to instantly begin working with our web templates and input forms. Get started with our Experiment Canvas template.
How to use it:
- Define the elements of your experiment.
- Conduct your experiment and generate results
- Enter the data and key conclusions so that your canvas includes the key elements of what you tested and the results.
- Define your Experiment Canvas research plan and create actions based on what you learned and how you will use your experiment’s data and insights to support your innovation efforts.
Our digital platform goes far beyond other software tools by including progress dashboards, data integration from existing documents or other SaaS software, elegant intuitive designs, and full access on any desktop or mobile device.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710978.15/warc/CC-MAIN-20221204172438-20221204202438-00383.warc.gz
|
CC-MAIN-2022-49
| 2,948
| 17
|
https://docs.sharinpix.com/m/documentation/l/890545-thumbnail-view-tags
|
code
|
Thumbnail view - Tags
Filter by Tags
The Tags button on the SharinPix album header permits to filter which Tag you would like to see on the Album.
- Click on a tag label, from the menu access, to display images tagged with the same label only.
- Only images with the corresponding tag are displayed.
For more information on how the image tag work, refer to the following link :
- Clicking on a Tag label on top of any thumbnail will automatically move to filtered view as well.
- Images are filtered with the same tag.
- Once in filtered view, you can navigate back to the original viewing mode by using the Back button.
- In the filtered view you also have access to a delete tag icon which comes on top right corner of each image.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296815919.75/warc/CC-MAIN-20240412101354-20240412131354-00707.warc.gz
|
CC-MAIN-2024-18
| 732
| 10
|
https://www.entertainment-tech.online/2023/09/22/chatgpt-for-freshman/
|
code
|
In today’s digital age, the role of artificial intelligence (AI) in education has become a topic of great intrigue and debate. With students seeking innovative ways to excel in their academic pursuits, ChatGPT, the AI marvel, has found its way into classrooms and homes alike. This article delves into the fascinating world of ChatGPT and its influence on students, from homework assistance to content creation.
The ChatGPT Craze: A Google Search Insight
When we pondered whether students would embrace ChatGPT as a homework helper or a complete substitute for their academic tasks, AI expert Francois Chollet of Google Deep Learning embarked on a mission to unveil the truth. He conducted a thorough analysis of Google search trends to gauge the significance of ChatGPT in the world of education.
During the school session last spring, an interesting trend emerged – searches for ChatGPT surpassed even the immensely popular Minecraft. This surge in interest was a testament to the growing reliance on AI in the academic sphere. However, as the summer vacation rolled in, the fervor seemed to wane, with a noticeable drop in ChatGPT-related searches.
A Return to Academics
With the onset of the new academic year, the tides changed once more. As students geared up for their coursework and assignments, searches for ChatGPT saw a remarkable resurgence. This rekindled interest raises a crucial question – are students turning to ChatGPT as their ultimate homework companion?
The Teacher’s Dilemma:
The increasing integration of ChatGs into the academic landscape has brought forth a perplexing challenge for educators – discerning whether a given piece of work is the result of a student’s effort or the ingenious workings of Chats.
Some teachers have attempted to resolve this mystery by engaging ChatGs in direct conversation. They hope to ask ChatGs if it authored a particular paper. In an intriguing experiment, we decided to put this method to the test.
The ChatGPT Experiment: Separating Fact from Fiction
To determine the efficacy of this approach, we assigned ChatGPT the ambitious task of crafting a 100-page paper on the life of Thomas Jefferson. Once the AI completed the assignment, we re-entered the document into ChatGPT and posed the pivotal question: “Did you write this?”
To our surprise, ChatGPT confirmed its authorship, at least on the initial attempt. However, the revelation didn’t end there.
Unveiling ChatGPT’s Enigmatic Responses
ChatGPT’s teachers’ resource page divulges a fascinating insight into its behavior. It mentions that ChatGPT occasionally conjures up responses to inquiries like “Did you write this?” These responses, as it turns out, are entirely random and lack any factual basis.
The Quest for Certainty: AI-Generated Content Policies
In light of the AI dilemma in education, numerous school districts and universities have instituted new policies governing AI-generated content. In tandem with these developments, ChatGPT itself has released an updated guide for teachers. This guide serves as a valuable resource to navigate the intricate landscape of AI in education, ensuring that educators and students alike harness its potential wisely.
As we navigate the evolving relationship between students and ChatGPT, it becomes clear that the lines between human and AI-created content are increasingly blurred. While the quest to distinguish between them continues, the impact of ChatGPT on education remains a dynamic and evolving narrative.
For more tech content like this VisitIT and Tech:https://www.info-tech.online/
BANKING, ACCOUNTING, INSURANCE AND FINANCIAL SERVICES:https://www.finance-tech.online/
HEALTHCARE AND PHARMACEUTICALS:https://www.healthcare-tech.online/
TRANSPORTATION AND LOGISTICS:https://www.transport-tech.online/
ENTERTAINMENT, TRAVEL AND HOSPITALITY:https://www.entertainment-tech.online/
MARKETING, ADVERTISING AND PUBLIC RELATIONS:https://www.channel-tech.online/
HUMAN RESOURCES COMPENSATION AND BENEFITS:https://www.humanresources-tech.online/
MECHANICAL AND CIVIL ENGINEERING:https://www.engineering-tech.online/
MANUFACTURING AND CONSTRUCTION:https://www.manufact-tech.online/
NON-PROFIT AND NON-GOVERNMENT ORGANIZATIONS:https://www.nonprofit-tech.online/ Want to promote your content?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.19/warc/CC-MAIN-20240414161724-20240414191724-00708.warc.gz
|
CC-MAIN-2024-18
| 4,289
| 27
|
https://lists.debian.org/debian-devel/2000/09/msg02065.html
|
code
|
Re: [OT] Which scripting language for physicist?
On Thu, Sep 28, 2000 at 01:18:21AM +0300, Eray Ozkural wrote:
> A friend of mine needs to write control programs for physics
> lab equipment. He'll probably be using serial or parallel ports
> for signaling. He doesn't know programming so I advised
> him to start off with an interpreted language. Which PL would you
> advise for such a task?
> Another constraint is portability: it'd better if the program could
> run on both linux and windoze.
> I told him that python, tcl/tk, or perl would do the job for him,
> he chose python because of the high-quality online docs. However,
> I'm not that sure. I'd like to hear your opinion.
I think any of those could do it. My only suggestion would be to
help your friend identity parts of the project he cannot handle, like
maybe the low level port control. (I couldn't do that) and then find
the right modules, break it up.
Since your friend chose python, trust the force. ;^)
Windows, linux, beginner, serial/parallel ports,
portability... choose 2. ;^)
Christopher F. Miller, Publisher email@example.com
MaineStreet Communications, Inc 208 Portland Road, Gray, ME 04039
Database publishing, e-commerce, office/internet integration, Debian linux.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826642.70/warc/CC-MAIN-20171023202120-20171023222120-00000.warc.gz
|
CC-MAIN-2017-43
| 1,242
| 22
|