url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://judaism.stackexchange.com/questions/68416/techum-of-new-york
code
I'm wondering if anyone knows what the techum of/in NYC are? Is Brooklyn separate from Manhattan? What about Brooklyn to Queens? Manhattan and the Bronx? (I assume Staten Island is too far to be connected) If they're separate, What are each of the techumin? If the whole city is one techum, how far can one possibly walk?
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948223038.94/warc/CC-MAIN-20240305060427-20240305090427-00433.warc.gz
CC-MAIN-2024-10
321
7
https://www.allegro.cc/depot/KittenKerfuffle
code
Depot Games: Kitten Kerfuffle Links: Web Site Developers: Eric Johnson Number of Players: Assume the role of Nini, a mother cat who has lost her kittens. You have until nightfall to find all ten of your kittens, lest they will succumb to below freezing temperatures overnight. Will you find them all in time? Kitten Kerfuffle was created for Mark Oates during KrampusHack 2016. ||Linux binary 64-bit ||12/31/2016 10:09 PM ||Linux binary 64-bit version 1.1 ||01/03/2017 2:02 PM ||Source code and assets ||12/31/2016 10:13 PM ||Source code and assets version 1.1 ||01/03/2017 2:05 PM ||Windows binary 64-bit ||12/31/2016 10:08 PM ||Windows binary 64 bit version 1.1 ||01/03/2017 2:04 PM An in-game score counter has been added, which increases each time an entity is destroyed or collected. Scores listed below: Brown tree - 5 points Green tree - 10 points Mushroom - 15 points Kitten - 250 points Each additional entity destroyed in a single meow results in a multiplier bonus. For example, if three entities are destroyed simultaneously, the resulting score will be the sum of the individual entities multiplied by three. Likewise, a time bonus was added to the final score upon winning the game. The faster you find all of the kittens, the higher your score will be. There is no time bonus awarded upon losing. Finally, a vaporized "shadow" of each destructible entity was added. Destroy a tree or a mushroom and its shadowy silhouette will remain. This was added in an attempt to break up the monotony of the landscape, though I am not sure that I am completely satisfied with it. Furthermore, the windows binary is no longer accompanied by a pesky console. The invisible man sold me wind cows for a few thousand caps on 2018.07.08. (View Profile
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304915.53/warc/CC-MAIN-20220126041016-20220126071016-00324.warc.gz
CC-MAIN-2022-05
1,748
28
https://academia.stackexchange.com/questions/72963/is-copying-paragraph-structure-plagarism
code
While helping a friend with a research assignment (basically find some studies on a topic, compare them, and then evaluate the work as a whole), I noticed that the professor had provided a sample paper. They had one paragraph for every study, and they were all in the same exact format. For example: [Authors] conducted a [type of study] to investigate [phenomena]. The study was conducted at [institution] and involved [N] [types of people]. The strengths of this study were [...] etc. Is it plagiarism to copy this exact format? Or is the structure of paragraphs not something to worry about?
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506988.10/warc/CC-MAIN-20200402143006-20200402173006-00516.warc.gz
CC-MAIN-2020-16
594
4
https://www.semanticscholar.org/paper/Finding-anomalies-in-databases-Berzal-Cubero/5312fb059679c8d1d6215f59b0769ab88910005f
code
Association rules have become an important paradigm in knowledge discovery. Nevertheless, the huge number of rules which are usually obtained from standard datasets limits their applicability. In order to solve this problem, several solutions have been proposed, as the definition of subjective measures of interest for the rules or the use of more restrictive accuracy measures. Other approaches try to obtain different kinds of knowledge, referred to as peculiarities, infrequent rules, or exceptions. In general, the latter approaches are able to reduce the number of rules derived from the input dataset. This paper is focused on this topic. We introduce a new kind of rules, namely, anomalous rules, which can be viewed as association rules hidden by a dominant rule. We also develop an efficient algorithm to find all the anomalous rules existing in a database.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948544677.45/warc/CC-MAIN-20171214144324-20171214164324-00595.warc.gz
CC-MAIN-2017-51
867
1
https://tech.kateva.org/2006/04/i-hate-palm-outlook-too-oh-yeah-also.html
code
Another fight lost in the HotSync wars. Today Outlook/Palm/Exchange/BeyondContacts (OPEB) duplicated all of my tasks. I'm so used to cleaning up this nonsense I have special Outlook views defined to help the cleanup. Why did it do this? Beats me. Every so often OPEB decides to punish me. I hate sync. I hate Palm. I hate Outlook. Exchange too for that matter. Oh, yeah, Microsoft too. Sync is hard enough when a single vendor has complete control of both transaction partners. When sync crosses vendors (bilateral messaging, reconciling disparate data models, lack of well managed identifiers), and when sync is three-way (PDA to Outlook to Exchange) it's like juggling antimatter. Every so often, it explodes. BTW, most healthcare environments do the equivalent of "sync" across vendor systems every day. It's ugly there too. PS. When I first tried to post this I got a "blogger has gone splat" message (ok, they said "down for planned maintenance -- at 6pm CT). I hate Blogger too. Also Google.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00720.warc.gz
CC-MAIN-2024-18
997
7
https://community-archive.progress.com/forums/00026/08074.html
code
Lately I was checking how to control AppServer using C#. I would like to say that I am disappointed, the documentation from this website is very poor and even contains multiple mistakes in examples (logic and how it should be used). I even have used JAVA documentation writing C# code because JAVA documentation was in a lot better quality comparing to .NET one. And ProxyGen has some problems with how it compiles everything to .NET assembly. When I put any code which uses Temp-Table as parameter it will not be able to generate me assembly files, while still it will be able to do it with JAVA. (Still looking for any ways how to accomplish it). Here is even such this as Progress.Java (namespace). It looks that they had support for JAVA and decided to port in to .NET, but did not but a lot of effort doing this resulting in poor quality .NET support. Isn't that strange? I was not expecting that poor quality. the Java and the .NET Proxy are fundamentally different. The Progress.Java Namespace in the assemblies deployed from Progress (containing the AppServer communication protocol) seem the contain internal functionality required for the Name Server or AppServer Broker communication - all java processes running on the server. I personally had good success in working through the documentation. I think it's pretty good step-by-step. But I must admit, that I never tried the sample code... Also, when following the various proxy types over the years, it get's clear, that the .NET proxy has a certain preference at OE development: New features like the new data types/prodatasets been added to the .NET proxy before all the other proxy options. it compiles everything to .NET assembly. When I put any code which uses Temp-Table as parameter it will not be able to generate me assembly files, while still it will be able to do it with JAVA. (Still Do you have details on the errors you are receiving? They should be in the log file generated by proxygen. The two most common cases are: 1.) Wrong .NET SDK. The ProxyGen needs the xsd.exe utility of the .NET SDK to generate the c# source code for a typed dataset/temp-table in the proxy assembly. There are some dependencies between the SDK version and the OpenEdge version. What version of OpenEdge are you using and which SDK do you have installed? 2.) Missing .NET SDK / Unable to find SDK if more than one version installed. Specifying the compiler (csc and xsd path) to the right version helps here. That's an option in the generate proxy dialog. Besides than this there have been some issues or limitations when more than one temp-table had the same name but different schema. The K-Base has o number of articles here that should describe the problem and workarounds. From an architectural point of view (and not because you had some issues) it might be a good advice to use dynamic temp-table (TABLE-HANDLE) parameters instead of static ones. This increases the flexibility a lot. Any more detail on your issues might help in giving you additional help! I am quite new to progress so I am sorry if I don not know many things. The examples are really faulty, that is for sure. Talking about the ProxyLog I do not have it at this time, but the problem was related with the syntax. There was a few wrong tokens, trying to compile everything myself I got error that ttTabeDataTable is missing in namespace, while still ttTableDataTable.cs being included in compile command, but error about wrong tokens. For this testing I am using Visual C# 2008 with SP1 and latest .NET Framework SDK (v2.0). To be more specific you will have to wait till tomorrow. Right now I am using 9.0E, 10.1C and 10.2A OpenEdnge versions. I was using 10.1C for this test. The .NET version wtih SP1 update should be 3.5 now. But ProxyGen as I noted is using 2.0XXX version of .NET. Here is the small example procedure: DEF TEMP-TABLE ttTestas FIELD num AS INT. DEF INPUT PARAM pPirmas AS INT. DEF OUTPUT PARAM TABLE FOR ttTestas. ASSIGN ttTestas.num = pPirmas. Here is the log: ProxyGen, Progress Version 10.1C Checking for existence of .r files ... Processing non-persistent procedures ... Processing: C:\Documents and Settings\DAbdurachmanov.BALTIC-AMADEUS\Desktop\ketvirtas.r ... -- Parsing r-code ... INPUT pPirmas INTEGER OUTPUT ttTestas TABLE -- No customizations; Validation not necessary Processing persistent procedures ... Checking method and parameter names ... Generating .NET proxies ... Creating AssemblyInfo.cs ... Creating ttTestasSchema.cs ... Creating ManoTrys.cs ... Creating strongly typed datatable classes ... C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\csc /t:exe /out:C:\tmp\ManoTrys\BA\StrongTypesNS\ttTestas.exe C:\tmp\ManoTrys\BA\StrongTypesNS\ttTestasSchema.cs C:\Program Files\Microsoft.NET\SDK\v2.0\Bin\xsd /d /n:BA.StrongTypesNS C:\tmp\ManoTrys\BA\StrongTypesNS\ttTestas.xsd Compiling .NET proxies and creating .dll ... C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\csc /t:library "/r:C:\pro\10.1C\OpenEdge\dotnet\deploy\signed\Progress.o4glrt.dll" /out:C:\tmp\ManoTrys\BA\ManoTrys.dll C:\tmp\ManoTrys\BA\StrongTypesNS\ttTestas.cs C:\tmp\ManoTrys\BA\ManoTrys.cs C:\tmp\ManoTrys\BA\AssemblyInfo.cs >>ERROR compiling .NET classes Microsoft (R) Visual C# 2005 Compiler version 8.00.50727.3053 for Microsoft (R) Windows (R) 2005 Framework version 2.0.50727 Copyright (C) Microsoft Corporation 2001-2005. All rights reserved. StrongTypesNS\ttTestas.cs(255,1): error CS1519: Invalid token '*' in class, struct, or interface member declaration StrongTypesNS\ttTestas.cs(255,18): error CS1002: ; expected StrongTypesNS\ttTestas.cs(255,30): error CS1002: ; expected StrongTypesNS\ttTestas.cs(255,37): error CS1519: Invalid token '/' in class, struct, or interface member declaration StrongTypesNS\ttTestas.cs(561,6): error CS1513: } expected Deleting intermediate files ... Search for '>>ERROR' and '>>WARNING' in this log to find any problems. Message was edited by: I used synchronize program to capture ProxyGen generated file and tried to compile myself using the same command-line commands as is in log. And again it did not compile and with the last command. This time resulting in: ManoTrys.cs(176,66): error CS0234: The type or namespace name 'ttTestasDataTable' does not exist in the namespace 'BA.StrongTypesNS' (are you missing an assembly reference?) It looks really strange, all files are given to compiler. BA.StrongTypesNS namespace does exist and it does have ttTestasDataTable and it looks that there are no conditional compiler directives stopping it from compiling. this is a error I have me too. Using the OpenEdge 10.1B everything works very vell because the ProxyGenerator use the Framework .Net 1. When I installed the OpenEdge 10.2A this versionn install Framework .Net 2 and I have the same error like you. A solution is to use a clean desktop with Framework .Net 1. and OpenEdge 10.1C. Another solution is to use an LONGCHAR and a xml OUTPUT file or: DEF OUTPUT PARAM TABLE-HANDLE ttTestas. I give you some examples in attachement Then the solution should be to had the 1.1 SDK (and framework) on your PC as well and use the custom compiler settings and use the xsd.exe and csc.exe from .NET 1.1. One is part of the framework and one of the SDK (I guess xsd.exe is part of the SDK). You know the problem was solved by using XSD tool from 1.1 SDK and CSC from 2.0. Basically you can not use 1.1 CSC for compiling because Progress .NET Assemblies are compiled with the second version. So, only second and higher version is required. But for class generator you can use XSD 1.1. I have noticed that you should be using the same .NET version for client too, but tried writting application with 3.5 SP1 and it worked flawlessly.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00445.warc.gz
CC-MAIN-2023-14
7,710
74
http://travel.stackexchange.com/questions/tagged/canadian-citizens+poland
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Canadian minors travelling to Poland with grandmother. What additional documentation is required? My two minor children (both 8 y.o.) are traveling from Toronto to Warsaw for three weeks this summer. My wife and I are married and living together with the children. Besides passports, what ... Jun 12 at 18:41 newest canadian-citizens poland questions feed Hot Network Questions Should I call my adviser by her first name? The existence of a 1-1 continuous map between two topological spaces. StackOverflowError during recursive call Why does Lightroom only recognise my lens after I set the make? Multiply with restricted operations What can I do for my turtle that fell down three floors? How to avoid arguments with a player about what "should" happen? Uso della parola "consultazione" What languages use numbers to name the week days and months? For an HTTPS web application, is it worthwhile to encrypt the password before POSTing it, to keep a MITM attacker from harversting it? Is there a biological mechanism for evolution encoded into our DNA? Fastest way to sum integers in text file Ore's Conjecture for perfect groups What is the Elo of a player who is half as good as another player? 'ip addr' command shows 'UP' even there is no address associated with that interface What to do if you say the wrong version of the last bracha in Shmoneh Esrei? Daughter is 11 and really upset that she may be lesbian Does dark energy annihilate energy? Implementing local variables of a recursive function with either Module or Block A "good scale" that is not really a scale Why should the generalization of a 'sequence' be called a 'net'? Where can I eat sushi with chocolate in it? Can I use the word "school" when referring to something that belongs to a university? Dark matter a medium for light propagation more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920849.16/warc/CC-MAIN-20140909042641-00021-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
2,448
52
http://www.bettafish.com/142-other-fish/102541-preparing-fresh-veg-plec.html
code
I feed lots of zucchini squash, green bean, sweet potatoes to my plecos....what I do is slice it in about quarter inch slices an drop it in boiling water for about 3 min-it usually will start to sink by that time.I remove it from the hot water to cold water to stop the cooking and to cool off so that I can remove the seeds. Once cool and seedless I drop it in the tank...If it doesn't sink I will stick a fork in it to keep it on the bottom. For cucumbers-I make quarter inch slices, remove the seeds-stick a fork in it to keep it under water-remover every 24h Spinach-I do a 20-30 second blanch on it-then drop in cold water-once cool I place it in the tank with a rock on top of it. For 1 pleco-I would feed half an algae wafer every other day and offer a protein meal once a week too-like a shrimp pellet. If you feed fresh blanched veggies-offer small amount to start and remove and replace every 24h. I never have to remove anything-between the plecos, shrimp and snails its all gone within 12h. Last edited by Oldfishlady; 06-19-2012 at 11:00 AM.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00302-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,054
8
https://www.cs.purdue.edu/sss/projects/oscj/download/download.html
code
This page is providing a list of SCJ sub-projects releases, only stable versions are listed. For more up-to-date distributions search in our SCJ Project Code Base that is updated almost daily. - Library - Level 0 is supported (with some limitations) - VM - based on OVM - tools - TCK and Static Checker - examples - HelloWorld and miniCDj benchmark $ hg clone https://scj-jsr302.googlecode.com/hg/ scj-jsr302 For more information, see SCJ section. The benchmarking suit for SCJ is based on our CDx: Collision Detector Benchmark for RTSJ. We have implemented the CDx algorithm in SCJ and we now provide as SCJ application miniCDj.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218203515.32/warc/CC-MAIN-20170322213003-00334-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
629
8
http://mathhelpforum.com/calculus/181112-how-convert-vector-equation-scalar-equation.html
code
please help turn this vector equation [x,y,z]=[3,7,-5]+s[1,2,-1]+t[1,-2,3] into a scalar equation in the form of x+y+z+D=0 i understand in the case of [x,y]=[3,7,-5]+s[1,2,-1] the direction vector is [1,2,-1] and the normal vector is [3,7,-5] all i need to do in this case was to do as the following which would give me the scalar equation 3x+7y-5z-42=0 but how would you find the scalar equation if you have 2 direction vectors? i have a quiz tommorwT_T but still dont get this question... OTL hugs and kisses to anyone who can help/solve it for me....thanks in advance A slightly different way: From the vector equation, x= 3+ s+ t, y= 7+ 2s- 2t, z= -5- s+ 3t. We can eliminate s by adding the first and third equations: x+ z= -2+ 4t. If we add two times the third equation to the second equation, we also eliminate s: y+ 2z= -3+ 4t. Finally, subtract y+ 2z=-3+ 4t from x+z= -2+ 4t to eliminate t: x+ z- y- 2z= x- y- z= 1. So the equation of the plane is x- y- z= 1, the same equation as before.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541696.67/warc/CC-MAIN-20161202170901-00431-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
997
11
https://cloudaffaire.com/aws/amazon-elasticsearch-not-able-to-access-kibana/
code
I have launched Elasticsearch in a Public Subnet, still, I am not able to access the Kibana console from my browser. I am not able to understand the issue, I have configured the Security Group correctly. Please refer the image below for my setup : What other setting needs to be made to access Elasticsearch over the internet in a VPC. If you place your Elastic Search Cluster inside a VPC, whether inside a public or private subnet, the Kibana URL which is generated is internal to the VPC. Which means you cannot access it outside the VPC. You can access it through an EC2 instance inside the VPC i.e. you will have to create a windows EC2 instance inside the same VPC as Kibana and then you will be able to access the Kibana dashboard through the browser of that instance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646457.49/warc/CC-MAIN-20230531090221-20230531120221-00305.warc.gz
CC-MAIN-2023-23
775
4
http://entertaining-thoughts.blogspot.com/2009/02/do-you-smell-that.html
code
*sniff, sniff* I smell fresh-cut grass. I see bright sunlight. I hear the distinct sound of a line drive off an ash bat. That's right. Pitchers and Catchers have reported. Opening Day is almost here. In case anyone was wondering to which team I will be devoting too much time to on this blog, well, they're Amazing.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584415432.83/warc/CC-MAIN-20190123213748-20190123235748-00269.warc.gz
CC-MAIN-2019-04
315
2
http://www.webmasterworld.com/printerfriendlyv5.cgi?forum=112&discussion=4217398&serial=4217767&user=
code
The first thing I notice when reading your post, is the large amount of columns you join on, which probably means a great deal of duplicate data between your tables. Have you considered whether it is possible to denormalize your tables? If the multiplicity of the relationship between the tables is small, that might be a good option. That said, it is usually a good idea to put indexes on the columns you seek on, e.g. those that you join on (expense, code, name, price, charges, url and id). Specifically, you could try creating a compound index on each table containing the columns you join on (expense, code, name, price, charges, url in that order), and an index on the id column of table t2. Hope it helps.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021585790/warc/CC-MAIN-20140305121305-00040-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
712
4
https://www.ebookee.net/Udemy-The-Complete-Ethical-Hacking-Course-2-0-Python-Kali-Linux_3837523.html
code
Posted on 2018-12-31, by fubber. What you'll learn Become proficient with Python programming - Introduction and Advanced Learn how to install a Virtual Box (Machine) for Kali Linux Understand what a penetration tester really does Learn about Various tools for penetration testing Learn how to install Kali Linux in Windows Machine from Scratch - Step-by-Step Create Python programs to seek vulnerabilities on the network system Explore various tools using Kali Linux You need to be tech savvy You also need a fast internet connection A minimum of 8 GB RAM on your computer is recommended Learn network penetration testing, ethical hacking using the amazing programming language, Python along with Kali Linux! Are you ready to become a Penetration Tester and Ethical Hacker and enjoy a fascinating high paying career? Or maybe you just want to learn additional tips and techniques taking to a whole new level? Welcome to The Complete Ethical Hacking Course 2.0: Python & Kali Linux This is by far the mother of all courses � It is not only a comprehensive course but with over 100 lessons, you are will not find a course similar to this. It�s our most current, in-depth and exciting ethical hacking course�to date. We have designed the course especially for beginners and intermediate level students -no matter where you are in your web site development and coding journey�It is for sure that the future belongs to penetration testers and ethical hackers for protecting enterprise networks and seeking potential vulnerabilities within the network. We also use state-of-the-art editors that are easy to learn and use. We�ve left no stone un-turned. We guarantee, this is THE most complete and thorough, as well as up-to-date ethical hacking course available ANYWHERE on the market�or your money back. We walk you through complete Python programming from scratch and then use those skills for penetration testing using Kali Linux See what our students say �It is such a comprehensive course that I don�t need to take any other course but this one to learn all the skills to become a penetration tester, and I would without a doubt recommend it to anyone looking for a complete course on ethical hacking.� -Chris Portman From zero to hero in just four weeks. So, how is our course really different? Well � we go from beginner � right from scratch with no gloves on either and make you a web developer in 8 weeks or so. It is your pace � your time really! �This is such an awesome course. I loved every bit of it � Awesome learning experience!� Sami Shah. Join thousands of other students and share valuable experience and projects Get started today and join thousands of our happy students, many of whom have changed careers, created second incomes or added critical new skills to their tool kits. Our students have become successful web developers and are earning six figure salaries. Some are freelancing and earning even more with high scaled projects. Oh, and did I mention you get FREE unlimited hosting for one year � ClayDesk Web hosting Service? Enroll now in The Complete Ethical Hacking Course 2.0: Python & Kali Linux today and revolutionize your learning. Start with scratch and learn the fundamentals. Jump right in and take an in-depth look into the website development front-end and back-end functionality and features. Start building powerful e-commerce web sites and apps and cash-earning websites today�and enjoy bigger, brighter opportunities. �Excellent course gives you everything you need to know for writing programs using Python to test networks - not to mention Kali Linux - simply superb!� � Waheed Zia Don�t believe us at all? Well - We offer full money back guarantee if you haven�t earned your money back within 60 days of completing the course. Ready to open new doors and become a smart, in-demand penetration tester? You do need to put effort though! Penetration testing is a great skill to add to your existing expertise or if you are a beginner! See you in class! Syed Raza, Team ClayDesk, and co-instructors! Who this course is for: This course is for complete beginners Intermediate and advanced users can also enroll to learn tips and techniques Width: 1920 pixels Height: 1080 pixels Bit rate: 4643 Kbps Frame rate: N/A Aspect ratio: 16:9 Bit depth: 8 bits Color space: YUV Audio track: 1 Codec: AAC LC Bit rate: N/A Sampling rate: 44 Khz Download from NitroFlare Download from UploadGig Download from FileFox Extract the archives with Winrar 5 or WinZip(zip files) & password - Ebooks list page : 38376 - 2017-09-11The Complete Ethical Hacking Course 2 0 Python & Kali Linux - 2017-07-11The Complete Ethical Hacking Course 2.0 Python & Kali Linux - 2016-12-13The Complete Ethical Hacking Course 2.0 Python & Kali Linux (2016) - 2020-07-15Udemy The Complete Ethical Hacking Course Beginner to Advance! - 2020-02-25UDEMY THE COMPLETE ETHICAL HACKING COURSE 2017 CRACK EXAMS TUTORIAL kEISO - 2020-02-25UDEMY The Complete Ethical Hacking Course Beginner to Advanced DERANGED - 2020-02-25UDEMY THE COMPLETE ETHICAL HACKING COURSE WITH CERTIFICATION 2017 TUTORIAL kEISO - 2020-02-04UDEMY THE COMPLETE ETHICAL HACKING COURSE 2017 CRACK EXAMS TUTORIAL kEISO - 2020-02-04UDEMY THE COMPLETE ETHICAL HACKING COURSE WITH CERTIFICATION 2017 TUTORIAL kEISO - 2020-02-04UDEMY The Complete Ethical Hacking Course Beginner to Advanced DERANGED - 2019-12-28Udemy - The Complete Ethical Hacking Course; Beginner to Advanced! [Last updated 11-2017] - 2019-08-27Udemy - The Complete Ethical Hacking Course for 2016/2017! - 2018-12-31Udemy The Complete Ethical Hacking Course Beginner to Advanced - 2018-02-02[PDF] UDEMY The Complete Ethical Hacking Course With Certification 2017 TUTORIAL-kEISO - 2017-06-25Udemy - The Complete Ethical Hacking Course With Certification 2017 - 2017-04-19UDEMY THE COMPLETE ETHICAL HACKING COURSE 2017 CRACK EXAMS TUTORIAL-kEISO - 2017-03-30UDEMY The Complete Ethical Hacking Course With Certification 2017 TUTORIAL-kEISO - 2020-04-01The Complete Ethical Hacking Course Packt - 2020-02-23The Complete Ethical Hacking Course 2020 Start Hacking Today - Download links and password may be in the description section, read description carefully! - Do a search to find mirrors if no download links or dead links.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737238.53/warc/CC-MAIN-20200808021257-20200808051257-00083.warc.gz
CC-MAIN-2020-34
6,363
74
http://www.toroband.com/in-oracle-10g-how-to-call-a-report-since-an-option-of-a-menu-mmb/
code
In Oracle 10g, How to call a report since an option of a menu (*.mmb) In Oracle 10g, working since the browser, how to call a report since an option of a menu (*.mmb)? I know to call it in a form (*.fmb), therefore uses the fields bean area and the objects reports, but in a menu there is not neither canvas, neither fields, neither reports. Someone would be able to help me with that? I understand that you had sent me everything, October 11, 2015 View Thread Other 12 Replies on community.oracle.com I sent for example to you that, no to insert it in your item's menu code, then,You have to modify it. a menu (mmb) doesn't have to define him reports objects... then, what parameter I send to the This is not true Try out this, and then let me know You do not need to have a report object defined in the menu. It is enough to have it in forms. I tried to call a report from the menu in the folowing way: I created a menu and wrote the following code in one item: repid := find_report_object('report2'); SET_REPORT_OBJECT_PROPERTY(repid, REPORT_EXECUTION_MODE, RUNTIME); SET_REPORT_OBJECT_PROPERTY(repid, REPORT_COMM_MODE, SYNCHRONOUS); v_rep := RUN_REPORT_OBJECT(repid); END;Then I created a form with a report object called report2. I attached the menu to this form and while running this form, I was able to successfully run the report. In your case, you have to make sure that you have the dummy report object in each form that will have this attached menu. You can replace by the actual report name as you have written in the code. Hello In Oracle 10g, working since the browser, how to call a report since an option of a menu (*.mmb)? I know to call it in a form (*.fmb), therefore uses the fields bean area and the objects reports, but in a menu there is not neither canvas, neith Could we call a report without BI Publisher-authentication ? Our infrastructure needs some reports that can be call with no authentication. Is there a configuration to do this? Any help will be really appreciated. ThanksYes, Enable the guest account. Dear all, i want to call a report in forms 10g and i do not know which function to use. best regards, ShoOoShrun_report_objects - form help : DECLARE repid REPORT_OBJECT; v_rep VARCHAR2(100); rep_status VARCHAR2(20); BEGIN repid := FIND_REPORT_OBJECT Hi, I want to be able to call a report online by passing in the URL to Portal. Want to show a prompt for a parameter value and nothing else, until the parameter is entered. I can get the report to display the parameter and the controls, and I can get dear sir I am new to form and report 9i I am calling a report from a form by using run_report_object I am not geting properly please help meRespected Sir, I just write the message i am geting FRM - 41219 : cannot find report : invalid id I am having We have Upgrade our BW 7.0 to BW 7.4 on HANA, How to run our BW reports since BI JAVA is not available in 7.4. My scenario: Producer Portal (BW portal ) we are creating/marinating Portal objects ( Folders, roles, work sets --etc.), which replicate in I need to call execute oracle report through. ADF any one have idea?Check this out. http://andrejusb.blogspot.com/2007/07/opening-report-window-in-adf-faces.html -ArunRead other 2 answers Hi Guys, I have a 10.2.0.5 production database. Currently my server has 8GB physical RAM. 3GB is allocated to the SGA and 1GB to the PGA. Let's say one day there is a requirement from application (eg, weblogic) to increase connection pool from 20 to Hi All, I need the output of one standard report e.g RHXSTR00 on web dynpro abap. How can I achieve this? Please help!!! Points will be rewarded. Thanks in advance! Cheers, Darshna.Hi Darshna, The report result is ALV and in most of the c Hi, I have a ABAP report which is created and i want to display this in Portal . Any idea how i can do the same. Please, give me all the details in step-by-step. Thanks & Regards, Ashish MehtaHi, Try this: 1. Create a transaction iView in the port I have uploaded my form to the app server and compiled to Linux. I have copied my RDF file to the reports_path/demo directory. I can run the report via a link from our portal using the URL as follows: /reports/rwservlet?report=IndRpt.rdf&desformat=pd Dear All, How to call Reports in oracle forms 10g. I am using Oracle Forms 10g Reports 10g and Database 10 and and Operating system Windows XP. Please give me the Solution. Thanks and Regards, FaziludeenHi Omkar, Please check the following code. DECL Hi, Hi, Env: 18.104.22.168.2 (forms 6i/reports 6i) Database: Oracle 10g r2 We are running a client server environment and not web based. I want to run the forms 6i or reports 6i directly from a database procedure/function and not by creating a procedure i Could you provide me step by step a solution on how I can call crystal reports 11 from oracle forms 10g application.Hi, Use web.show_document for calling the reports. Check out forms online help for syntax and example of web.show_document. -ArunRead dear all, how to run a report from oracle 10g form in .csv format? i've already run in pdf & excel format. i'm using SET_REPORT_OBJECT_PROPERTY (ro_report_id, report_desformat, 'PDF'); --for pdf SET_REPORT_OBJECT_PROPERTY (ro_report_id, report_desfor Hi to all. We now have to do reports using Oracle Reports that have to call from Java Swing (interface) / EJB (Backend). How can we call the Oracle Reports 6i from Java Swing? Do anybody done that?...Any ideas? Where should we find the resourse, if a Hi All, Please Help me and Help other Beginers in this : Hot to call a report from a form using WHEN_BUTTON_PRESSED trigger (using Oracle 10g R1) Should i save the report as .rdf or .jsp ? Should i save the report in a specific path ? Should i add th Hi, I need a oracle 10g reports sample templates were we need to make modifications and use it. if any body has the sample templates can share with me or where can i get the sample templates. Please advice.In your $ORACLE_DEV_HOME/reports/templates, How difficult is it for non-technical users to generate their own ad hoc reports in Oracle 10g?If they are non-technical , then, somebody technical have to generate adhoc reports for them.Read other 2 answers
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806736.55/warc/CC-MAIN-20171123050243-20171123070243-00676.warc.gz
CC-MAIN-2017-47
6,186
41
http://stackoverflow.com/questions/15671729/centring-sprite-or-moving-camera-c-opengl
code
I'm self learning C++ and playing around 2D tile mapping. Using the above tutorial and some help from the Pearson, Computer Graphics with OpenGL book I have written a small program that draws a 40x40 tiled world and a Sprite (also a tile). In terms of drawing/render order, the map(or world) itself is that back layer and the Sprite is the forward most (or top) layer. I'm assuming that's a good way of doing it as its easier for 2 tiles to interact than a tile and a custom sprite or rectangle. Is that correct? I have implemented a Keyhandling() function that lets you move the map inside the viewport using the keyboards arrow keys. I have a variable called offsetx, offsety that when a key is pressed increases or decreases. Depending on whether I assign the variable to the sprite, I can more one or the other in any direction on the screen. Neither seems to work very well, so I assigned the variables to both (map and sprite) but with positive values for the sprite, and negative for the map. So upon a key press, this allows my Sprite to move in one direction whilst the map moves in the opposite direction. My problem is, the sprite soon moves enough to leave the window and not enough to bring the more of the map into the scene. (The window only shows about 1/8th of the tiles at any one time). I've been thinking all day, and I think an efficient/effective way to solve this issue would be to fix the sprite to the centre of the screen and when a key is pressed the map moves around... I'm unsure how to implement this though. Would that be a good way? Or is it expected to move the viewport or camera too?
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246634333.17/warc/CC-MAIN-20150417045714-00177-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
1,618
20
http://janettehughes.ca/lab/tech-tool-tuesdays/peergrade/
code
Peergrade is an online platform that allows facilitation of peer assessment with students. Peergrade has made it easy for students to assess one another anonymously. You create an assignment, then students hand in their work online. The assignments are then distributed to other students in the class, randomly, and they provide feedback for their peers. The papers are then delivered back to the author with the feedback. You, as the teacher, now have access to the original assignments as well as the feedback that was given. One of the features that I really liked about peergrade is the rubric quality feature. The data that is collected is used to generate feedback, for you as the educator, about which questions in your rubric the students had a hard time answering and which questions generated the most feedback. This is something that could be useful when creating rubrics for assignments. Having this feedback would help ensure that your rubrics are useful and aid in student understanding of what is expected of them. This tech tool really promotes reflection, which is vital in learning and meta-cognition. I really like the peergrade interface and I believe that it could be utilized to ensure students are receiving feedback that is necessary for learning. I love that there is plenty of data and information about each student that is generated, such as how many assignments they’ve handed in, how many reports they’ve given feedback on, how long they worked to give feedback, their class ranking and plenty more. The account is free – students do need to set up an account to log onto your class. PeerGrade is an online platform, and you can create your class account on their website.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474746.1/warc/CC-MAIN-20240228211701-20240229001701-00030.warc.gz
CC-MAIN-2024-10
1,708
3
https://client.cloud4y.ru/index.php/knowledgebase/97/%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD-%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD-%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD-%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD-%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD-%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD.html?language=english
code
Ensuring service availability for customers is an important IT challenge. It can be provided at various levels: - At the application level; - At the virtual machine (VM) level; - At the storage level. In the article below, we will review the scenarios for each of them. 1. FAULT TOLERANCE IN THE APPLICATION LEVEL It is provided by an excessive number of computers in the group (nodes or nodes in the cluster), united by communication channels and provided to the end user as a single service called a cluster. The only matter is placing these nodes. It is possible to place them in a single datacenter and eliminate problems related to technological maintenance and the technical failure of one of the nodes by transferring the active node from one host to another. Or you can consider a more comprehensive approach and place them in different data centers, thus significantly reducing the risks and increasing the number of factors against which the system is protected (storage, hypervisors, communication channels, geographical distribution). In the VMware vCloud Director infrastructure, this is ensured by connecting an additional virtual data center to the organization. Then, in the cloud control panel you can select VDC. Each VDC is independent. It allows you to create your vApp, independent networks, VMware vShield Edge and other virtual infrastructure objects. To do this, select the necessary VDC in the panel from the Datacenters tab. The selected VDC is shown at the top of the screen. When creating a new vApp, you can always pre-select the right VDC where you want your virtual machines to be located. In the vCloud Diector, the window title helps to determine the location of your vApp. By creating your vApps in different datacenters and hosting virtual machine nodes there, you provide application-level resiliency for multiple services, for example, this solution is applied to: - Microsoft Exchange using a DAG (Database Availability Group) cluster. - Microsoft Active Directory, using the replication mechanism between domain controllers Microsoft SQL Server, by means of the AlwaysOn technology (starting with MS SQL Server 2012) you can use secondary replicas, with the possibility of both synchronous (slow, without data loss) and asynchronous replication (faster, with possible data loss). For more details, see https://docs.microsoft.com/ru-ru/sql/database-engine/availability-groups/windows/overview-of-always-on-availability-groups-sql-server?view=sql-server-2017 Network connection between virtual machines located in different data centers can be provided by the following: - By connecting VLANs between data centers, through additional service connections from Cloud4Y. This allows a single private network (gray addresses) between all VMs. - Via public networks (Internet), by creating an additional VMware vShield Edge with a white IP address in the second Data Center and connecting via public IP addresses, or by setting up a VPN channel between EDGEs via gray addresses. In this case, the grey subnets must be different in different Data Centers. Both of these options can be combined. On the one hand, you will allow servers to connect directly without VPN. On the other hand, you will provide two public points (white IP addresses) in different datacenters to connect your users and provide a high availability service. 2. FAULT TOLERANCE AT THE VIRTUAL MACHINE LEVEL To meet the strategic goal of providing a highly available virtual machine, we suggest taking advantage of Veeam Backup & Replication. This technology, using replicas, allows you to create ready to start copies of the virtual machine in another data center. Veeam replication speeds up disaster recovery, prevents data loss and ensures business continuity. If the initial machine in one data center stops working for some reason, you can quickly switch to replication and restore business-critical services and applications with minimal downtime in another data center. For users, this will happen quickly and they will be able to continue their work while IT staff troubleshoots the 'problem' data center. The virtual machine replica is created by creating replication tasks with a certain frequency. During the first session of the replication task, Veeam Backup & Replication copies the entire VM image and registers a copy of the VM on the ESX(i) target host. In the next sessions Veeam Backup & Replication copies only the VM's modified blocks of data relative to the last session (incremental changes) and creates a new recovery point for replication of the VM. Using this recovery point, you can "roll back" the virtual machine to the required state. We recommend that you support multiple recovery points to ensure that your replica remains operable. In case the last recovery point is not working, you can use an earlier recovery point. Once the problem is resolved in one of the datacenters, you can switch from replica back to the original virtual machine or continue using the replica as a working VM. 3. FAULT TOLERANCE AT THE DATA STORAGE SYSTEM (DSS) LEVEL For customers facing specific disaster tolerance tasks, we offer a SyncCluster solution that provides high fault tolerance and service availability. Cloud4Y has developed a new solution in the Russian market - SyncCluster with SLA 99.99%. SyncCluster is a unique service that combines an array based on clusters with synchronous mirroring. A storage system has been implemented in Moscow, where one half is located in one Tier 3 data center and the other half is 10 km away in the other Tier 3 data center, both halves of which operate synchronously as a single structure. This approach ensures that data is written to both storage sites. In case of any failure in one of the data centers (power failure, failure of any part of the storage system, failure of controllers, multiple disks in one disk group in a short period of time, communication channels between data centers), your data will remain available, (RPO=0, RTO=10 minutes), i.e. no transaction is lost. Whereas in the previous solution replication was performed at the VM level and with certain periods, synchronous replication is performed at the storage level all the time, thus avoiding unnecessary load on the servers, providing a maximum SLA of 99.99% and saving data. This solution is particularly suitable for software that does not support application-level replication. SyncCluster from Cloud4Y - a cost-effective solution that provides continuous availability of services and data for companies where business continuity is crucial. We offer MetroCluster as a service with a monthly fee, which will allow our customers to reduce capital costs for the purchase of hardware and its technical maintenance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506481.17/warc/CC-MAIN-20230923130827-20230923160827-00437.warc.gz
CC-MAIN-2023-40
6,756
32
https://www.dell.com/community/forums/forumtopicprintpage/board-id/isilon/message-id/3667/print-single-message/true/page/1
code
Re: Ask the Expert: Isilon Performance Analysis I will answer the second part of your question first. Smartcache is enabled by default for concurrent (default) and streaming optimized directories and files. Random optimization by default implicitly disables write cache coalescing. As you perform buffered write operations from smb, nfs or protocol writes. These writes will be coalesced in a write buffer e.g. If there are a sequence of proto.nfs write operations @32KB at next offsets to each other we will buffer this upto 1MB or 2MB (concurrent / stream optimized). This buffer is cluster wide and cache coherent between all nodes. At some point we will write out the data using both data protection and disk space utilization as guides to which nodes are written too. The journaled writes leverage our nvram as part of the optimized write to disk storage. Answering the first part of your question. A means to measure your buffered writes is simply to measure the latency seen for protocol write operations Isi statistics protocol --class=write --orderby=timeavg --top In 7x onefs you should note very optimal writes in the microsecond range. When this climbs to the millisecond range, the two simple reasons would be 1) the journal cannot flush writes to disk based on rate of change. This is another way of saying that there are insufficient disks in the node pool to satisfy the demand. Isi statistics drive -nall --orderby=timeinq --long --top You might note that the sum of Opsin (writes) + opsout (read) exceeds a normal range for disk type. You would see > 1 queued io . The more queued the more significant it would be to look to increasing spindle count. Adding nodes almost immediately brings new disks into the fold. 2) the write work flow is not buffering. Meaning that its setting a directio flag. In this case nvram is still leveraged however, the I/o are no longer coalesced into more optimal operations. A paper that talks to smartpools and node pools There are sysctls that do monitor write cache but they are non-trivial to translate. This is why I suggested a more simplified approach. I.e you will more likely be spindle challenged than you will be nvram/write cache challenged.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528058.3/warc/CC-MAIN-20190419201105-20190419222037-00028.warc.gz
CC-MAIN-2019-18
2,203
12
https://forum.cardano.org/t/ip-and-port-of-peers/43933
code
Looking through documentation, I found this. ----> Your block-producing node must ONLY talk to your relay nodes, and the relay node should talk to other relay nodes in the network. It says to go to the forum channel for IP address and port of peers. Any guidance as to what I should be doing here? Meaning that on BP u should not run the topology updater script and you will add in the topology file only your relays. The topology updater script must run only on relays (and add ur BP ip:port to custom peers) You could also register on pooltool.io and build your topology manually by selecting and requesting data from other pools relays. In my experience one should do this anyway (including maintenance once in a while). Otherwise you might drown in connection errors from your cardano-node (if you have error logging enabled) overseeing important ones. Thanks! Much appreciated. I have things all set up now, and the pool registered!
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369523.73/warc/CC-MAIN-20210304205238-20210304235238-00341.warc.gz
CC-MAIN-2021-10
937
5
http://consulask.it/kut42i53w56fcep41l.php
code
Comes the boogeyman bdsm demon erotica english edition Category Album. Genre Hip Hop. Download All; Download Selected; Online player is only for users. Please login. Like. Hopsin Pound Erotlca. Hopsin Knock Madness. Hopsin Raw. While our traditional Fall Harvest Festival will be postponed until 2021, we will offer acres of pumpkins, fall. Harvest decor, multiple photo opportunities, a Country Store, rides to and kant ought implies the fields and viewing of our animals. A common year was now divided into 12 months of different lengths: 4 full months with 31 days, 7 hollow months with 29 days, and 1 month with 28 days. The Leap Egnlish, Mercedonius The Republican calendar year lasted for 355 days, which is about 10 days shorter than a. Tropical year englisu, the time it takes Earth to revolve around the Sun. The listing, 3 Basic Weird n' Wild Creatures Cards has ended. 3 basic Weird n' Wild trading cards. You get all the cards seen in the picture. Free shipping in U. but NO international shipping. Meet the ocean's strangest creatures here at National Geographic Kids. Join us as learn about the angler fish, red handfish, carpet shark. Leafy sea dragon and more weird sea creatures!Weird n' Wild Creatures cards contain information on creatures from nature, prehistoric to the present, as well as creatures of the imagination. I am selling 2 boxes of Weird n'Wild large info cards. Cards are lightly used ad in excellent condition. Cards come in eight groups: 1) Monsters of the Past - 85 different cards;Photo of Weird And Wonderful. For fans of Wild Animals. Imagine there is a galaxy and TypeError: validator is not a function typescript: tsc is not recognized as. An internal or external command, operable program or batch file 91199 visits. getPackageJsonInfo is not a function when trying to call generated. Api client constructor in these lines (see Autorest noogeyman. 215;Apr232;s avoir cliqu233; sur quot;R233;pondrequot; vous serez invit233; 224; vous connecter pour que votre message soit publi233. 215; Attention, ce sujet est tr232;s ancien. May 07, 2020Python: TypeError: 'tuple' object does not support item assignment 202012G99 2860Problem: amp;rsquo; object does. Not support item assignment occurs when you attempt to alter or modify a character in a string using assignment operator. The string is an immutable object …TypeError: 'range' object does not support. Item assignment I was looking at some python 2. x code and python TypeErroramp;colon; amp;amp;num;39amp;semi;rangeamp;amp;num;39amp;semi; object does not support item assignmentApr 04, 2018python - quot;TypeError: 'int' object does not support item assignmentquot;; iteration issue tf idf - Python, TypeError: 'int' object does not support item assignmentquot; NewestFeb 05, 2020Jan 23, 2021Pythonname[-1] 'e' TypeError: 'str' object does not support item assignment TypeError: 'Tensor' object does not support item assignment TensorFlowJan 13, 2019: C:UsersMy Namegt;python Traceback (most recent call last):Codecademy deep space probes matloff the easiest way to learn how to code. It's interactive, fun, and you can do it with. Your friends. 2 years ago C U [Python] Solution to quot;TypeError: a bytes-like object is required, not 'str'?quot; 2 years ago C U [Python] How to fix quot;TypeError: 'str' object does not support item assignment?quot; 2 years ago C U [Python] Help with quot;TypeError: 'float' object cannot be interpreted as an editiob I am working on python string. import string import re str quot;Helloquot; b 0 srr quot;quot; for a in str: srr[b] a. 'str' object does not support item assignment b b 1 print (srr) This is my sample code. I was trying to read some characters from a string and put it into another string http://consulask.it/zu20787r17g97ir351913h.php C or. Java but itamp;rsquo;s not working for my case. python - - tuple object does not support item assignment TypeError: 'tuple' (1)[traceback] Type Error: 'Response' object does not support item assignment - ware in process _response devgroup14347 ware in process_response TypeError: 'Response' object does not support item assignment is called on an 'Http404' exception or a tastypie 'Response' object instead of a regular HttpResponse Tuples are sequential data types in Python. A Tuple is an immutable data type dejon Python bdsmm.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154457.66/warc/CC-MAIN-20210803092648-20210803122648-00030.warc.gz
CC-MAIN-2021-31
4,323
5
https://bitbucket.org/hugwijst/jqplot/src/4c8021d76d1e/extras/NaturalDocs/Info/CSSGuide.txt
code
Architecture: CSS Structure It's important to understand the internal HTML file structure and styles in order to design your own CSS style for Natural Docs. If you're content with the default styles, there's no need to read this document. Topic: Diagram Conventions The diagrams are designed for clarity. In the actual HTML, you'd obviously see "<table class=CDescriptionList></table>" instead of "<table CDescriptionList></table CDescriptionList>". - A tag with just a style, for example "CTitle", means an unspecified element with that class. Style with .CTitle. - A tag that includes a #, for example "#Menu", means an unspecified element with that ID. Style with #Menu. - A tag that includes a HTML element as well, for example "table CDescriptionList", means it will always be that element. You can style with either .CDescriptionList or table.CDescriptionList. - A tag that has multiple classes or has an "and" in it, for example "CType and CTopic", means that both styles will apply to the same element. You can style it with .CType.CTopic, noting that the space between them must be omitted. - A tag that has an "or" in it, for example "#Content or #Index", is just shorthand for either of those elements. The diagram applies to both of them but only one will actually appear at a time in the output. - A tag or style with a question mark means that tag or style will only be there in certain situations. Topic: Page Structure The body tag is used to distinguish between the types of pages. Unframed Content/Index Page: <body ContentPage or IndexPage)> <#Content or #Index> Content or Index </#Content or #Index> </body ContentPage or IndexPage)> Unframed Search Results Popup Page: Framed Menu Page: Framed Content/Index/SearchResults Page: <body FramedContentPage or FramedIndexPage or FramedSearchResultsPage> <#Content or #Index> Content or Index </#Content or #Index> </body FramedContentPage or FramedIndexPage or FramedSearchResultsPage> Styles: Page Styles ContentPage - An unframed content page. IndexPage - An unframed index page. PopupSearchResultsPage - A search results page for use in a popup iframe. FramedContentPage - A framed content page. FramedIndexPage - A framed index page. FramedSearchResultsPage - A framed search results page. #Footer - The page footer. Will be in a framed menu page or on its own in a non-framed page. Styles: Browser Styles around browser quirks right in the CSS file. The browser type and version styles will be applied immediately after the body tag. However, neither are guaranteed to be correct minor flaws and should not be heavily relied on. > <browser type>? > <browser version>? > Page Content > <browser version>? > <browser type>? For example, if a <CTopic>'s style is giving you problems in Internet Explorer 6, override it with .IE6 .CTopic. If a <MTitle>'s style gives you a problem in Opera 7 but only in frames, override it with .Framed.Opera7 .MTitle. If the browser is not one of the types below, neither this nor the browser version will be present. There's the possibility that some obscure browser will appear as one of the others by spoofing, but the most prominent of these, Opera, Konqueror, and Safari, are taken care of. IE - Internet Explorer Firefox - Firefox and anything else based on the Gecko rendering engine. Opera - Opera Safari - Safari Konqueror - Konqueror and anything else based on the KHTML rendering engine except Safari. If the browser is not one of the versions below, this style will not be present. The browser type still may be. IE6 - Internet Explorer 6.x. IE7 - Internet Explorer 7.x. Firefox1 - Firefox 1.0.x and anything else based on Gecko 1.7.x. Firefox15 - Firefox 1.5.x and anything else based on Gecko 1.8.0.x. Firefox2 - Firefox 2.0.x and anything else based on Gecko 1.8.1.x. Opera7 - Opera 7.x. Opera8 - Opera 8.x. Opera9 - Opera 9.x. Safari2 - Safari 2.x. Safari3 - Safari 3.x. Because IE 6 doesn't support multiple selectors so I wouldn't be able to combine browser and page styles. .Opera.ContentPage will apply to all ContentPages in IE because it treats it as if only the last class is there. Topic: Content Structure All the topics of a given file is contained in a <#Content>. All other content styles are prefixed with a C. Surrounding each piece of content is a <CTopic> and its type; for example, CFunction for a function. Inside that are the <CTitle> and if necessary, <CBody>. Inside <CBody> are analogues to all the top-level <NDMarkup> tags: <h1>, <p>, etc. In addition to the top-level <NDMarkup> tags, you also have prototypes, class hierarchies, and summaries which are described in their own sections. <CType (CFunction, CVariable, etc.)> <CTopic and #MainTopic?> Code or text diagram </CTopic and #MainTopic?> </CType (CFunction, CVariable, etc.)> Take advantange of the CSS inheritance model. For example, you can style all titles via .CTitle, and you can style specific titles with .CType .CTitle. Styles: Content Styles #Content - Parent element containing all topics. CTopic - An individual topic. CTitle - The title of a topic. CBody - The body of a topic. May not exist. CHeading - Surrounds a heading. CImageCaption - Surrounds an image caption. CImageLink - Surrounds a link to an image. CDescriptionList - A description list, which is the type of list you're reading right now. Is implemented with a table. CDLEntry - A description list entry, which is the left side. CDLDescription - A description list description, which is the right side. #MainTopic - The ID given to the main topic, which is the first in the file. It is applied to the <CTopic>. CType - A placeholder for all type-specific styles. The actual styles will be C followed by the alphanumeric-only topic type name. So the CType of a "PL/SQL Function" topic will actually be CPLSQLFunction. Topic: Menu Structure Everything is enclosed in a <#Menu>. All other menu styles are prefixed with an M. The title is an <MTitle> and will always be at the beginning of the menu if it exists. If a subtitle exists as well, it will appear as an <MSubTitle> inside <MTitle>. Subtitles aren't allowed without titles. Most other entries in the menu are contained in <MEntries>. Here's the diagram: Menu sub title <MFile (and #MSelected?)> <a href>File</a href> <MIndex (and #MSelected?)> <a href>File</a href> <a href>Link</a href> <a href>Group</a href> <#MSearchPanel and MSearchPanelActive/Inactive> </#MSearchPanel and MSearchPanelActive/Inactive> (if in unframed HTML) The <MFile> or <MIndex> entry that's currently selected will have the <#MSelected> ID, so you can reference it in CSS via The search panel is has its own ID, <#MSearchPanel>, but also has one of the classes <MSearchPanelActive> or <MSearchPanelInactive> depending on whether any of the controls are selected or the results window is open. <#MSearchResultsWindow> is separate because it may be floating. Styles: Menu Styles #Menu - Parent element containing the entire menu. MTitle - The title of the menu. MSubTitle - The subtitle of the menu. Will appear within <MTitle>. MFile - A file entry. MGroup - A group entry. MGroupContent - A container for a <MGroup's> content. MText - A plain text entry. MLink - An external link entry. MIndex - An index entry. #MSelected - The ID of the currently selected <MFile> or <MIndex>. MType - <MFile>, <MGroup>, <MText>, <MLink>, or <MIndex>. #MSearchPanel - Contains all the search controls. MSearchPanelActive - Applied to <#MSearchPanel> when any of the controls are selected or the results window is open. MSearchPanelInactive - Applied to <#MSearchPanel> when not in use. #MSearchField - The text input field of the search panel. #MSearchType - The drop down type selector of the search panel. #MSearchEverything - The <#MSearchType> option for the Everything index. #MSearchResultsWindow - Contains all the search results elements. #MSearchResults - Contains the iframe that will hold the results. #MSearchRseultsWindowClose - The link to manually close the search results window. Topic: Class Hierarchy Structure Everything is contained in a single <ClassHierarchy>. Each entry is surrounded by its type, such as <CHParent>, and the generic <CHEntry>. Depending on the context, entries may be surrounded by one or more <CHIndents>. Styles: Class Hierarchy Styles ClassHierarchy - The topmost style containing everything. CHEntry - A generic class entry. CHParent - The style for a parent class. CHCurrent - The style for the current class, which is the one the hierarchy is generated for. CHChild - The style for a child class. CHChildNote - The style for when a child is added that just shows how many other children were omitted. CHIndent - A style used to indent a level. CHType - <CHParent>, <CHCurrent>, <CHChild>, or <CHChildNote>. Topic: Summary Structure Everything is enclosed in a single <Summary>. All the other summary styles are prefixed with an S. <STitle> holds the actual word "Summary" and <SBorder> and <STable> hold the content. <SBorder> exists because different browsers apply table padding attributes in different ways. <STable> exists as a class to separate the main table from any other tables that may be necessary. Here's a diagram: > <table STable> > </table STable> On to the table content. > <tr SType and SEntry (and SIndent#?) (and SMarked?)> > <td SEntry> > <a href>Entry</a href> > </td SEntry> > <td SDescription> > </td SDescription> > </tr SType and SEntry (and SIndent#?) (and SMarked?)> <SIndent#> exist to allow indenting. They're necessary because implementing it as nested tables, while structurally cleaner, won't allow the desciptions to line up on the right throughout the entire summary. <SMarked> will be applied on almost every other row to allow for tinting to improve readability. Use the power of CSS's inheritance rules to specify styles. For example, to set the style of a group entry, apply it to .SGroup .SEntry. However, you could also apply a style to both the group's entry and description by applying the style to .SGroup td. Or, you could apply a style to all the entries by applying it to .SEntry. And so on. Styles: Summary Styles Summary - The topmost style containing the entire summary. STitle - Contains the summary title, which is the part that actually says "Summary". SBorder - Surrounds <STable>, since some browsers can't do table padding right. A hack, I know. STable - The actual summary table. This class separates it from other layout tables that may appear. SMarked - A class applied to rows that should have a slightly different color than the rest of the rows to make them easier to SEntry - The entry (left) side of the table. SDescription - The description (right) side of the table. SIndent# - Surrounding entries and descriptions that are part of a group and need to be indented. Actual styles will be SIndent1, SIndent2, etc. SType - A placeholder for all topic-specific styles. The actual styles will be S followed by the alphanumeric-only topic type name. So the SType of a "PL/SQL Function" topic will actually be SPLSQLFunction. Topic: Prototype Structure Everything is enclosed in a <Prototype>. All other styles are prefixed with a P. Parameter Type First Style: For prototypes such as > void Function (unsigned int* a, int b = 0) where the types come first. "void Function (" (repeated as necessary) Parameter Name First Style: For prototypes such as > function Function (a, b: int; c: int := 0) where the parameters come first. "function Function (" "a,", "b:", "c:" (repeated as necessary) Note that any section may not exist. For example, there will be no <PTypePrefix> cells generated if none of the parameters Styles: Prototype Styles Prototype - The style encompassing the entire prototype. PBeforeParameters - The part of the prototype that comes before the parameters. PAfterParameters - The part of the prototype that comes after the parameters. PType - The parameter type. PTypePrefix - The prefix of a parameter type. PParameter - The parameter name. PParameterPrefix - The prefix of a parameter name. PDefaultValue - The default value expression for a parameter. PDefaultValuePrefix - The prefix of the default value expression. Topic: Link Structure All links to symbols have a type style prefixed with L. The only exceptions are summary entries; summary descriptions use them as well. > <a LType> > </a LType> You can use this to make links to different symbols appear in different styles. For example, making .LClass bold will make all links to classes bold, except when appearing in summary entries. You can combine this with other styles to be even more specific. For example, you can apply a style to function links appearing in summary descriptions with .SDescription .LFunction. Styles: Link Styles LType - A placeholder for all topic-specific styles. The actual styles will be L followed by the alphanumeric-only topic type name. So the LType of a "PL/SQL Function" topic will actually be LPLSQLFunction. Topic: Index Structure Everything is enclosed in an <#Index>. Combine with <Framed> and <Unframed> to distinguish between output formats. All other index styles are prefixed with an I. A - <a href>B</a href> - C ... Heading (A, B, etc.) Prefix, if any Every index entry, including headings, are rows in a table. The first column of a non-heading are <ISymbolPrefixes> so that the non-prefix portions align correctly. The other column are <IEntries>, of which there are multiple formats, described below. <a href ISymbol> </a href ISymbol>, <a href IParent> </a href IParent> <a href IFile> </a href IFile> Each part of the entry is surrounded by its type, which may or may not be a link. If an entry has more than one defining class or file, they're broken out into <ISubIndexes>. It's called <IParent> instead of <IClass> because class entries are <ISymbols>. <IParents> are only used when the symbol has a class. If the symbol _is_ a class, the symbol is global. Styles: Index Styles #Index - Parent element for the entire index. IPageTitle - The page title. INavigationBar - The navigation bar. IHeading - An index heading, such as the letter for the group. IEntry - An entry in the index. ISymbolPrefix - The stripped prefix of the entry. ISymbol - The entry symbol. IParent - The entry parent class. If the entry _is_ a class, this isn't defined because classes are global and don't have parent classes. This is why it's called IParent instead of IClass; hopefully it's less confusing. IFile - The file the entry is defined in. ISubIndex - The surrounding block if an entry needs to be broken out into a sub-index. #IFirstHeading - The ID of the first <IHeading> to appear in the file. #IFirstSymbolPrefix - The ID for the first <ISymbolPrefix> to appear under an <IHeading>. #ILastSymbolPrefix - The ID for the last <ISymbolPrefix> to appear under an <IHeading>. #IOnlySymbolPrefix - The ID if there is only one <ISymbolPrefix> for an <IHeading>. Topic: Search Results Structure The search results use virtually the same structure and styles as the indexes, except that <#SearchResults> replaces <#Index>, there's a new <SRResult> style, and there are a few additional <SRStatus> blocks. abide by these rules. - <SRStatus> sections are visible by default. - <SRResult> sections are *not* visible by default. They must use display: none. - <ISubIndex> should be display: none when under <#SearchResults>. Styles: Search Results Styles #SearchResults - Parent element for the entire page. SRStatus - Status message. Must be visible by default. SRResult - A result. All you need to do for this class is set it to display: none. Nothing else should be set on it. Topic: Tool Tip Structure Tool tips may appear anywhere in the page, mainly because it's assumed that they will use position: absolute and The entire tool tip is found in a <CToolTip> style, with a CType style inside it. CTypes are normally outside their elements, but that would cause it to be partially visible in this case. We need <CToolTip> to be the outermost style so its visibility and Inside there's a <CPrototype> and/or the description text. The description text has no special surrounding tags. > Summary text Styles: Tool Tip Styles CToolTip - Surrounds the entire tool tip. This *must* have position: absolute and visibility: hidden for the tool tip mechanism See also <CPrototype>. Styles: Miscellaneous Styles blockquote - This HTML element should surround anything that needs to be scrolled if it's too wide, like prototypes and text How the page structure has changed throughout the various releases. - Replaced UnframedPage with <ContentPage> and <IndexPage>. - Added <#Menu>, <#Content>, <#Footer>, and <#Index>. They were previously shown in the diagrams as classes but did not actually appear in the generated output. - Removed MenuSection, ContentSection, and IndexSection. Use things like ".ContentPage #Menu" instead. - Removed tables from the unframed <Page Structure>. Use CSS to position the elements instead. - <#MainTopic> is applied to <CTopic> instead of <CType>. - IE4, IE5, Opera5, Opera6, Netscape, and Netscape4 browser styles have been removed. <IE7>, <Opera8>, and <Opera9> have been added. Gecko has been replaced by <Firefox>, <Firefox1>, <Firefox15>, and <Firefox2>. KHTML has been replaced by <Safari>, <Safari2>, <Safari3>, and <Konqueror>. - Removed redundant CParagraph, CCode, and CBulletList classes. Use <CBody> with p, pre, and ul instead. - Added <CImageCaption> and <CImageLink>. - Added <#MSearchPanel>, <#MSearchResultsWindow>, and all related styles. - Added <Search Results Structure>, <Search Results Styles>, and <FramedSearchResultsPage>. - Removed SEntrySize. Apply the width to <SEntry> and <SDescription> instead. - <SType>, <SEntry>, and <SIndent#> were moved from the td and divs into the tr. - Removed HB style. Now using wbr tag. - Added <PDefaultValuePrefix>. - <blockquotes> now surround elements that should scroll if they're too wide for the page. - Removed CPrototype. See the replacement <Prototype Structure> and <Prototype Styles>. - Removed SInGroup, SInClass, and SInSection in favor of more general <SIndent#>. - <CTypes>, <STypes>, and <LTypes> are now completely determined by <Topics.txt> configuration files. - <CTypes>, <STypes>, and <LTypes> no longer have separate list types. A CFunctionList is now just a CFunction. - Indexes are now done with tables. - ISection was removed. - <IEntries> are only used for the entry cell, not for each entry in an <ISubIndex>. - Added <ISymbolPrefix>, related IDs, and <#IFirstHeading>. - Merged <CType> and <CTopic> into the same element. Must now be styled with .CType.CTopic (no space) while all sub-elements will still be .CType .CElement (with space.) - Added <TOPIC_PROPERTY> and TOPIC_PROPERTY_LIST styles, so they get corresponding <CTypes>, <STypes>, and - Added <Class Hierarchy Styles> since 1.2 added class hierarchies. - Changed the first topic from having a CMain type to having a normal type with a <#MainTopic> ID. - Added <Tool Tip Styles>. - Renamed HiddenBreak to <HB>. - Added <TOPIC_CONSTANT>, TOPIC_CONSTANT_LIST, <TOPIC_TYPE>, and TOPIC_TYPE_LIST types, so they get corresponding <CTypes>, <STypes>, and <LTypes>. - The <CType> tags now appear arround the <CTopic> tags instead of vice versa. - Added a <CBody> tag to surround non-<CTitle> elements. - <SMarked> now appears in tr's instead of td's, where it belonged in the first place. - Added <Browser Styles>. - Redid <Page Structure>, replacing generic styles like Menu with page type styles like UnframedPage/MenuSection and - Added <LURL> and <LEMail> link styles, since 0.91 added URL and e-mail links. - Added <ISection> style, which is better than <IHeading> floating on its own. - Added <Index Styles>, since 0.9 added indexes.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398451744.67/warc/CC-MAIN-20151124205411-00097-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
19,720
320
https://packagist.org/packages/phpcr/phpcr-api-tests
code
PHP Content Repository compliance test suite This package is auto-updated. Last update: 2023-12-02 10:21:50 UTC Test suite to test implementations against the PHPCR API interfaces. The tests are organised by feature, with the numbers referencing the chapter numbers in the JCR v2.0 specification, JSR 283. (available at http://www.day.com/specs/jcr/2.0/index.html) Some of the chapters have not yet been implemented. They have a file named in the folder. The tests in all chapters are probably not feature complete, but steadily increasing. Help is of course welcome. This code is dual licensed under the MIT license and the Apache License Version 2.0. Please see the file LICENSE in this folder. The phpcr-api-tests is a suite to test compliance for implementations of the java content repository specification. https://github.com/phpcr/phpcr This test suite is independent of an actual implementation. You need to do a couple of things to provide proper bootstrapping for your implementation: - Add the api tests as submodule of your project, for example in a folder tests/api - Copy phpunit.dist.xml to ../phpunit.xml and adapt as necessary. - Implement the bootstrapping (see below) You find a sample bootstrap.dist.php that you can copy to ../bootstrap.php and adjust to your implementation. Your bootstrap must ensure that the ImplementationLoader class extending the \PHPCR\Test\AbstractLoader is available in the environment. The ImplementationLoader is used by the \PHPCR\Test\BaseCase to acquire the See the inc/AbstractLoader.php file to see what the ImplementationLoader has to do. You can pass parameters from phpunit.xml into your bootstrap with the <var... syntax. The ImplementationLoader must provide a fixture loader. The fixture names are generic, but all names map to .xml files in the fixtures folder. Those files are in the JCR system view format. This is the format that is used with SessionInterface::import and produced by SessionInterface::exportSystemView If your implementation can not import that format, you will need to convert them into a suitable format. We recommend not to use your phpcr implementation import() implementation to load the fixtures but something stripped down. If you use the import() implementation but have some error or bug in that implementation, you will get confusing errors on tests that should not fail. Once this binding is working, run the tests with phpunit. If you use a normal php installation, this is usually along the lines of: $ phpunit -c path/to/folder-with/phpunit.xml You can run the tests for a specific chapter of the specification or just a single test case by specifying a path $ phpunit -c path/to/folder-with/phpunit.xml path/to/suite/tests/NN_chaptername - PHPUnit in PATH - PHPUnit in include_path This test suite is made to work with all implementations of PHPCR. Never write tests for implementation specific things in here - use your applications unit or functional tests for that. All tests must extend from the PHPCR\Test\BaseCase which provides the static member $loader with the ImplementationLoader to load data. The BaseCase offers infrastructure to load fixtures efficiently and has some additional assertions that can be used by the tests. Read the comments in inc/BaseCase.php for details. To improve test running speed, fixture are loaded in the setupBeforeClass method. If you need specific fixtures, pass the name to the parent class setupBeforeClass method, if you do not need fixtures at all, pass false. For the read-only tests, we have just two fixtures that cover all cases: general/base and general/query To only load fixtures once but reliably test write operations, have a fixture per test case class with nodes named after the test names. The BaseCase will put that name into $this->node for each test in setUp(). This way, each test has its own "root" node and does not influence the other tests. To add or adjust fixtures, please keep them in the PHPCR system view format. If you work on Jackalope, you can use jackrabbit and the jack.jar tool to import and export data: http://github.com/jackalope/jackrabbit-importexport See the readme file of jackrabbit-importexport for details. - Christian Stocker email@example.com - David Buchmann firstname.lastname@example.org - Tobias Ebnöther email@example.com - Roland Schilter firstname.lastname@example.org - Uwe Jäger email@example.com - Johannes Stark firstname.lastname@example.org - Lukas Kahwe Smith email@example.com - Benjamin Eberlei firstname.lastname@example.org - Daniel Barsotti email@example.com
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00264.warc.gz
CC-MAIN-2023-50
4,563
45
https://vanmontfort.be/tags/disk-io/
code
after a few hours of searching and testen i’ve got it working! Cacti can now shows disk io of our windows 2008 servers! Here is how i did it: download them and install at http://www.orvant.com/packages/(go to bottom) cacti wmi plugin, download the wmi.phpand put it in your cacti/scripts/ folder. Make sure the webserver you are running can read the file! http://svn.parkingdenied.com/CactiWMI/trunk/ cacti wmi templates
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988724.75/warc/CC-MAIN-20210505234449-20210506024449-00363.warc.gz
CC-MAIN-2021-21
424
6
http://szfq.xyz/archives/1144
code
Awesomenovel The Bloodline System read – Chapter 249 – The Strange Hole sudden cast to you-p3 Novel–The Bloodline System–The Bloodline System Chapter 249 – The Strange Hole cut boundless It turned out already nighttime, so he was steering back to a particular place he experienced chosen to rest set for the night. “What exactly?” Gustav inquired though pausing his footsteps. the empire trilogy goodreads ‘Now I can commence my experiments, but first I will make,’ Gustav smiled since he went in. “Now, I’ve caught your choice,” She voiced out although chuckling. the right of american slavery podcast 8 Thousand Foot! Naze Boku No Sekai Wo Dare Mo Oboeteinainoka? Gustav guessed she should have been higher than everybody else in the daily life throughout her lifetime, which gave her a style of zeal to master some others. Half a dozen Thousand Ft .! Gustav’s entire body duration persisted growing in proportion since he descended to the next certain factor. He deactivated measurement manipulation and returned back to his genuine size right before going up the up in to the gap. He still stored descending with no purpose of carrying out anything regarding it. This happened to become the exact same lady he jumped over within the stairway resulting in the ruins. What created her a lot more bizarre and intimidating was the point that they couldn’t ascertain her bloodline skill, as opposed to Gustav, who they had found changing. Immediately after running for around twenty minutes, Gustav arrived in the sloppy region. Section 249 – The Strange Gap The girl’s confront instantly froze up immediately after listening to that. Gemstones rolled down from his foot situation into the broad spot. 7 Thousand Ft .! It unfolded and turned into a tent like-household. For several seconds she stood available by using a contemplative start looking, not able to say a word in reaction to Gustav’s dilemma. It turned out practically just like a bedroom because of its sizing. “Idiot,” Gustav voiced out and changed approximately to help keep strolling. The girl’s deal with instantly froze up immediately after listening to that. Gustav presented a cube from his bag load up and tapped into it. He deactivated dimensions manipulation and came back to his first size before scaling up within the pit. The instant he crossed nine thousand foot, Gustav turned on the capability.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00413.warc.gz
CC-MAIN-2023-14
2,413
31
https://www.pazera-software.com/builds/
code
In this section, I will share open source projects I have compiled, mainly related to audio and video conversion, but not only. Vorbis-tools 1.4.0 & git 2020.08.08 Vorbis-tools build for Windows 32 and 64-bit. OggEnc - Ogg Vorbis encoder, OggDec - Ogg Vorbis decoder. Opus-tools 0.2 build for Windows 32 and 64-bit. OpusEnc - opus audio encoder. OpusDec - opus audio decoder. A modern, highly efficient lossy audio codec. FLAC 1.3.3 – Free Lossless Audio Codec FLAC 1.3.3 build for Windows 32 and 64-bit. Compiled with the Ogg support so you can create Ogg-FLAC files. Metaflac included. Info-ZIP builds (zip.exe, unzip.exe and other) for Windows 32 and 64-bit. Free ZIP compressor and decompressor. Statically linked so no additional DLL files are needed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00368.warc.gz
CC-MAIN-2023-14
758
7
https://forums.digi.com/t/hardware-software-question/3035
code
I need to set up connections between a DNC software and some Fanuc CNC using serial ports. I want to use a ConnectPort X4 Xbee-ethernet and one XBee-PRO PKG-R per CNC, and connect them via Realport to map each modem to a virtual serial port in the computer. Will this work? Manual and other threads are not explicit about this particual function. CNC work at 1200 bauds, so i don’t think bandwith will be an issue. You will need to write Python code on the X4 to do what you wish. As logical as it would be to allow the X4 to look like a ‘terminal server’ with 8 or 16 remove XBee ports, that function is NOT included. (Note: the X4 can handle Modbus traffic to Xbee nodes, but not raw ASCII). You can enable Digi RealPort to talk in a UDP mode, then use this script. It will take a little understanding on your part, but once you figure it out it can work.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500334.35/warc/CC-MAIN-20230206082428-20230206112428-00451.warc.gz
CC-MAIN-2023-06
863
8
https://lakebrinkconcrete.com/409161-confluent-kafka-go-consumer-example.html
code
Intentionally for kafka example, the consumers and then the property. Documentation contains all for confluent kafka example java topic. Authorities responsible in order to compensation from assistance shall assign a flight disruption, full refund is no costs of passenger form is under both arrival. So we need not the name should see a confluent go and the log of the partition belonging to kafka? Controller fails as these confluent kafka go library is one member of the confluent cloud next? Three runnable consumers must be used for each consumer know where i believe you should first created and confluent schema. Cart or suggest you higher memory blocks, is that kafka connect kafka go consumer group name in cache or fetch the pool and error. Dozen examples therefore, confluent kafka example of message is. Map of messages to apache kafka consumer in the sequence of this means you. Features were stopped it also cause the most java example to confluent kafka consumer example are. Collect messages into that confluent kafka go example client. Now processed by commitmessages will create a node so, the confluent kafka go consumer, but then writes to listeners want since an underlying the right. Reason i test kafka posts for future attempt to occur whether consumers typically do anything from confluent go client creates the second rolling bounce of. Sslcontext kafka go implementation limits the log compaction also digg the consumer subscribes to create adminclient instance of the testing the stream. Ms a kafka promises exactly what is typically you extract the confluent schema which would and writing. Cleanup work with kafka cli command to free memory blocks, confluent go kafka protocol, thank you cannot be sent out our low and idempotent. Hashtable and share the publish a network requests sent as replication on that confluent consumer example is also perform this time it were recently accessed through a manual offset. Cases the durability of ceramic abrasive processes used as key and on. Tuned for apache kafka process it makes kafka consumer groups fairly simple consumer apis we shall go? Serdes nuget packages with confluent kafka are persisted in machine. Clipped your first property zookeeper is a guide to let me already have it uses the sizes across available cipher suites are emitted on kafka consumer reading the underlying channel. Standards and improves throughput, partitions from where the request this ever get n records from the two additional throughput for confluent example java application, topologytestdriver and partition? Cleaner api for example, such strong guarantees atomic, chances kafka go, and calculates the humio hec sink configuration. Jvm kafka consumer, the offsets are big. Maarek is extremely simple and the partition is control heartbeat java. Moving to confluent maintain their products that kafka example of the key and this. Callback in this elimination of confluent kafka producers. 60 kb in our example already have a kafka topic to cover the read. Getting fast into partitions should return a personal experience, during rebalancing is made relatively small proof of connections after the kafka go consumer is the data? Registry for apache kafka consumer schema by replication factor controls which read the confluent example that? Achieved by kafka client controls the confluent platform and click enter a new instance that called a pull the framework? Avroserializer can set of a confluent go consumer example of channels need. Obvious that either express or rabbitmq, commitmessages will print those in confluent kafka go consumer example client. Talking about which the initial list will then start kafka consumer ignore this means that time, require no sequential. Average number of a messaging system should we will create kafka go consumer example below shows how do some text and requests. Restrict access your file for confluent kafka go consumer groups? Goldengate as a producer consumer group registers under the new and confluent! Subdivided into agreement for more quickly and bytes stored offsets using confluent go example that? Cp the only includes more information necessary or should we first of confluent kafka consumer example, than the reader. Communicate with full confluent documentation for the consumer. Onsite go back to retry timeout is discarded to architectural sketch, this effectively means percentage. Few pages you are based in hd has had great price: python tools and colorist alexis hurkman handbook for digital cinema nov 15 from the left of hdr. Volume or thousands of topics is almost immediately added to reduce latency both confluent kafka go consumer has been a search? Want to consume messages from each partition grows, kafka community edition which shows the assigned. Sink and consumer commit the kubeflow news of a kafka, it waits while ensuring that? Tbs of the publish report messages per second record batches do kafka consumer example, mac and any. Load balancing load imbalance allowed values are confluent consumer in? Efficiently load when i will allow administrators can do an application to mongodb docker support when a confluent kafka and consumed by adding more detail in. Technologist at which provides a kafka consumer group a sync via a partial message and use. Resends the rest proxy course helps you kafka example to which could cause the end. Automated analysis pipeline, we have their delivery handler will result of disks in kafka go consumer example the network is very fast. Not observed any kind, if the value is not need zookeeper for confluent consumer example uses which means fewer bytes the java client. Splitting the base on the producer options that will wait for example, kafka consumer example system. Publish the number confluent kafka consumer model a kafka could be done in. Synchronously commit event hubs without introducing idempotent producer awaits the deserializer class for consumer example, analyze the data. Musings about confluent consumer example values in here is probably not the application setup is up for the new topic name, and topic partition for? By seeking extreme performance system and confluent kafka consumer only. Installation by using the stream with confluent kafka and what we go code in sync replicas. Timescaledb that we are committed back information to confluent kafka go example java. About occurs when a go consumer example, whereas the call. Accumulation of the maximum message handling data is not what the value. Valid values are the status. Helper object of kafka consumer from previous posts. Community edition which a requirement that input values via the difference between confluent kafka go consumer example values as both standard alert stream. Suppose you can be a regular expression is a step process reads and bytes of the data, kafka main way and confluent go example that. Method should be consumed by how to read sequentially kafka consumer fails, the wakeup and solaris. Correctness of regular basis, i would require careful attention to confluent go library to or should be used to have this the consumer. Throttled by trust store all partition confluent consumer example, although the default property here are processed in the name should be. Learn consumer example, tests also digg the code, and producers write to restrict access to. Unavailability over to the appropriate exception back to do an end user should return error you first step is happening in the setting offsets fail and confluent kafka consumer api. Biewald consumer example of partitions via 4 threads to? Pull messages that works to refresh your ide of the next set up. Pulled from topics menu, no other systems require that being said, how to turn will need to big data changes other broker that confluent consumer group? Number of the same with many have replication are kafka consumer groups. Trust manager such a confluent go consumer example, managing and another. Maps offsets positions in memory for connecting to demonstrate compliance requirements around maintaining this the confluent kafka monitor. Using a partner will include the organisational activities and what by partnership business. Calling readmessage polls as that confluent kafka go consumer example, you are available by discussing how can build. Grabbing the application this error handling as kafka example what you are. Lowest common format of the connector, providing full snapshot exists only a confluent kafka swift sample producers. Scale without external consumers in kafka connect api enables an interesting aspect of being in kafka. Structured data written with newer version and simpler approach, we added compatibility at confluent kafka consumer as the consumption to ccoak is. Discrepancy in background: partition 2 or confluent kafka go consumer example is. Raid can in confluent consumer is one of partitions function will still a transaction? Runnable consumers that an option is a kafka vs code that confluent kafka example in? Alive usage details. Liberate the message processing library using these will close a confluent kafka go get? Reflection of type not, by this means data backlogs kafka consumer groups waiting to read up and easy. Straightforward confluent kafka go consumer behavior may have to heartbeat is assigned partitions? Outsourcing to create a queue, please report messages are confluent consumer group. App works fine in producer starts, confluent consumer example below code below explain how long as it provides a running in. Differs in this will be done from a given partitions but that confluent go consumer example to. Synonym for apache kafka, how would kill throughput and also possible versioned and producers, feel free to ensure the next? Movement started it up any replica alive brokers and confluent consumer example of. Says here as a way you kafka go example does a couple thousand people were hard to a also a timer. Loves apache kafka even though they actually running a confluent go example the application writes information needed a particular with more replicas which the theoretical and kafka? Offset of languages including control their own kafka consumer example node. Sweeps across many threads used as kafka go consumer example, making the only. Story for consumer will assume the confluent go consumer example and would pull out of the leader waits a bash and they not! Heap space due to the number of these overrides are confluent kafka, kafka connect a producer is, providing logging and headers. Method just cp the streams, confluent kafka consumer, as those topics it also be. Great detail how consumers or confluent kafka consumer example client? Managing the total ordering of smaller pages on kafka consumer is completed. Venture studio high level kafka go consumer example uses. Middle class has method takes a beginner like apis, avro data integration is about confluent go consumer example of. Backoff applies to be in the messages larger environments directly stream that kafka consumer the trust confluent. File an active contributors, and confluent kafka go example below. Bootstrapserver property is to just what we allow for example, both public cloud provider of cookies allow us to confluent consumer group? Feedback on how the time to be required to topics consist of relying on poll method should always be described in confluent kafka example system. Statistics from the maximum record or configuration states and other services that the appveyor build a consumer process records does kafka go example, at their products. M messages from topic in a kafkastreams client for kafka consumer per second. Associate this is brought down a list of a confluent kafka example below shows consumption, for pulling from qiita more producers require an overview gives the best. Message keys and getting into details or your consumer example of data? Noting that confluent kafka consumer will consume from topic, automatic commit returns its constructor by zookeeper is, and consume n days uses the topics. Device at how their connector example, maybe not cpu type means a consumer apis in real time travel. Reassigning partitions if ssl brings in this is persisted to create a large kafka topics. Upload your policy is a configuration of todd mcleod in the state ? Collection of messages have replicated kafka go consumer you. Valuable to be disable by the database systems for the application will cause unexpected behaviour due? Tech behind the store your stream of kafka and kinesis is useful restful interface is enabled the red hat integration, like . Header contains only takes longer usable after which kafka go consumer example, to provide onsite go, tell the kubeflow. Eligible confluent kafka go example java, then we execute the image. Sasl debug and confluent cli by confluent components like at confluent go consumer example what? Test kafka connect without heartbeats in confluent kafka go consumer in? Members in particular topic is a good source in our schema is no message it a confluent kafka example diagrams.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738905.62/warc/CC-MAIN-20200812141756-20200812171756-00117.warc.gz
CC-MAIN-2020-34
13,050
13
https://riverbankcomputing.com/pipermail/pyqt/2013-April/032619.html
code
[PyQt] chain signals, disconnecting an "emit" slot durdenmisc at gmail.com Mon Apr 15 17:02:19 BST 2013 As mentioned here, you cannot use the 'disconnect' method to disconnect something when the signals were connected via the emit() method. I'm curious about the details of why connecting signals to the emit() method does not work. I've tried to do some debugging myself, but I'm still a bit confused. It looks as though the pyqtSignal object **changes** during the course of a running application. For example, consider the following line: As previously mentioned doing a disconnect like the following doesn't work: I've tried debugging by printing the id() of the cancel.pressed object (pyqtSignal) as well as the id() of the cancel.pressed.emit method. These object ids actually **change** between when I connect and later try to I've verified that I'm not deleting the objects, etc. Also, calling cancel.pressed.emit() works as you can imagine even though it's seemingly a different object than the one that was connected earlier. What exactly is I'm assuming it has something to do with the wrapping of the C++ code and maybe the QMetaObject (http://qt-project.org/doc/qt-4.8/qmetaobject.html) is involved somehow. I'm really just trying to understand why these ids don't match up and why connecting signals to signals is preferred vs. connecting to the emit method. I can easily change my code to connect the signals via the preferred method, but I felt like there was a useful lesson to learn here. -------------- next part -------------- An HTML attachment was scrubbed... More information about the PyQt
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100290.24/warc/CC-MAIN-20231201151933-20231201181933-00415.warc.gz
CC-MAIN-2023-50
1,613
28
http://requital.info/software-company-business-plan-template/
code
business plan template for networking sample writing network software development company example. business plan for startup software company development template free softwar. sample software business plan template 7 free documents download company example for. 6 new business plan training company solutions free template for software development. business plan template create a free for software company development. software business plan template internet company continuity free for example. software company business plan template free example for. business plan for software company other size s development template example. business plan development software corporate template free for company. internet business plan template software company cafe proposal development free for comp. 7 fantastic software company business plan template solutions development free for compa. software development business plan do good company template example. software business plan template it samples free for company example. sales business plan template with regard to software startup for s company example free. business plan for startup software company development template free c. business strategy template software company plan example free for. company business plan template software example free for. software feasibility study template free business plan for company example. construction business plan template free software company desktop for development te. internet software company business plan executive summary example template development. software business plan template company startup development example. sample business plan for startup software company development template example. software company business plan template free for development. building company business plan sample construction template doc free for software example. transportation business plan examples template for software development company example. com annual plan template elegant software business sample for development company free compa. software company website template best templates application free business plan for example. top business plan templates you can download free template for software company example. business plan template the software development company free for. internet business plan template software company cafe proposal free for example. software business continuity plan template free for company example.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670921.20/warc/CC-MAIN-20191121153204-20191121181204-00425.warc.gz
CC-MAIN-2019-47
2,443
31
https://www.braincert.com/course/SOCS-350-2746
code
Welcome to SOCS 350 learning space. This learning guide is beneficial for social sciences students who are planning to take "SOCS 350 Cultural Diversity in the Professions" class. Our tutorial contains useful tips and relevant downloadable study material to understand this project task and secure best grades. For the research project, you have to submit a choice of topic (proposal) during week 2, reference list and outline in week 4, and the final research paper in week 7. Hope our included study material will 'll help you a lot to take the challenging task of project, so don't wait until the last minute to get started on this. Chapter 1: SOCS 350 Course Project Papers
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402088830.87/warc/CC-MAIN-20200929190110-20200929220110-00252.warc.gz
CC-MAIN-2020-40
677
3
https://pypi.org/user/njs/
code
multi-platform screen and application forwarding system Capture the outcome of Python function calls. Backport of PEP 654 (exception groups) A friendly Python library for async concurrency and I/O High level compatibility layer for multiple asynchronous event loop implementations Native, async Python gRPC client and server implementation supporting asyncio, uvloop, trio WebSockets state-machine based protocol implementation A pure-Python, bring-your-own-I/O implementation of HTTP/1.1 Cross-distribution Linux wheels Hypothesis plugin for trio Pure Python MySQL Driver A Python package for describing statistical models and for building design matrices. #1 quality TLS certs while you wait, for the discerning tester PostgreSQL client for Trio based on asyncpg WebSocket library for Trio A re-implementation of the asyncio mainloop on top of Trio Pytest plugin for trio Sniff out which async library your code is running under Make Sphinx better at documenting Python functions and methods The async transformation code. A placeholder package for the hip project A colormap tool Async generators and context managers for Python 3.5+ A powerful, accurate, and easy-to-use Python library for doing colorspace conversions Tools for mangling Mach-O and PE binaries A tiny Python module for taking control of your library's public API. A Python package for doing ERP and rERP analysis of brainwaves. ZS is a compressed, read-only file format for efficiently distributing, querying, and archiving arbitrarily large record-oriented datasets. Scikits sparse matrix package A library for writing window managers, using GTK+
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104628307.87/warc/CC-MAIN-20220705205356-20220705235356-00501.warc.gz
CC-MAIN-2022-27
1,618
30
https://angel.co/company/bcg-digital-ventures/people
code
Build innovative businesses from the ground up Log in or sign up to view more people Hiring Startup / Full-Stack Engineers to build Mobile Apps, SaaS, Big Data, and AI & ML powered Platforms; WELL-FUNDED Incubator in Downtown Toronto. SCAD grad, Product Designer, with a focus in visual design and design systems. Helped build a launch a mobile app that has raised over 2+ million in funding Start up background growing organisations from the ground up to profitable and sustainable business, now working for BCG Digital Ventures operating SEA region Launch startups at BCG Digital Ventures and previously scaled LA startups backed by top Silicon Valley VCs. Experienced PM, former Wall Street professional turned Techie, NYU undergrad, UCLA Anderson MBA Former fundraising guru, current product maven; I build products that delight and empower UW Informatics, 5 years at a small e-commerce company, 4 years in building start-ups for a consulting company
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897027.14/warc/CC-MAIN-20200708124912-20200708154912-00586.warc.gz
CC-MAIN-2020-29
954
9
https://turningtooneanother.net/2019/08/02/what-is-parallel-data-loading/
code
What is parallel data loading? SQL*Loader supports parallel loading by allowing you to initiate multiple concurrent direct path load sessions that all load data into the same table or into the same partition of a partitioned table. Initiate multiple SQL*Loader sessions, one for each control file and datafile pair. What is database parallel processing? A parallel database is designed to take advantage of such architectures by running multiple instances which “share” a single physical database. In appropriate applications, a parallel server can allow access to a single database by users on multiple machines, with increased performance. What is load in parallel in ETL? The ETL was implemented as a set of Table Load ETL processes running in parallel. The set of records in each source table assigned to transfer was divided into chunks of the same size (e.g. 20000 records). The ETL process for each source table was performed in a cycle, selecting the data consecutively, chunk by chunk. What is the role of parallel processing in data warehousing? Parallel execution dramatically reduces response time for data-intensive operations on large databases typically associated with decision support systems (DSS) and data warehouses. You can also implement parallel execution on certain types of online transaction processing (OLTP) and hybrid systems. What is direct path load in SQL Loader? The direct path loader (direct=true) loads directly into the Oracle data files and creates blocks in Oracle database block format. To prepare the database for direct path loads, the script $ORACLE_HOME/rdbms/admin/catldr. sql. sql must be executed. What is the drawback of parallel database architecture? Architecture of parallel database Disadvantages : Waiting Time for processor is increased, degree of parallelism is limited, addition of CPU slow down the existing processors. In this single disk is shared between the CPUs and each CPU have it’s own private memory . How processing of query can speed up with Intraquery parallelism? Intraquery parallelism refers to the execution of a single query in parallel on multiple processors and disks. We can speed up processing of a query by parallelizing the execution of each individual operation, such as sort, select, project, and join. What is the difference between direct path and conventional path loading? A conventional path load executes SQL INSERT statements to populate tables in an Oracle database. A direct path load eliminates much of the Oracle database overhead by formatting Oracle data blocks and writing the data blocks directly to the database files. The tables to be loaded must already exist in the database.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337371.9/warc/CC-MAIN-20221003003804-20221003033804-00454.warc.gz
CC-MAIN-2022-40
2,682
16
https://www.vmware.com/support/vmmark/doc/releasenotes_vmmark10.html
code
VMware VMmark 1.0 Release Notes Notes on VMware VMmark 1.0, Build 20070712 Build 20070712 is a release build of VMware VMmark 1.0. The release notes contain the following: What's new in 1.0? We're pleased to announce the release of VMmark 1.0. Significant changes from the public beta are listed below: - Enabled millisecond timing resolution on clients. - The VMmark distribution is now packaged as a .zip file. - Added additional troubleshooting notes to the VMmark Benchmarking Guide. - Minor tilescore bugs fixed. - Reporting scripts added. - Added benchmark results section to the VMmark Benchmarking Guide. - Updated VM templates to better support cloning. - Updated VM templates to fix DNS resolution problems. - Workload parameter updates to java server workload. - Workload parameter updates to file server workload. - Workload parameter updates to web server workload. - Memory ballooning disabled for file server template. - tilescore integrated with harness. - tilescore script updated to allow for html output. - Time synchronization addressed in the VMmark Benchmarking Guide. - Tuning guide included in the /doc directory. - Run and reporting rules updated. - Improved disclosure html template. Note that existing workload virtual machines based on the public beta templates should work as-is, but if you are running with memory overcommitment make sure you use the new templates or include the line: sched.mem.maxmemctl = "0" in your .vmx files. No other performance-sensitive changes were made to the workload virtual machine templates. As a result of updates in the Run and Reporting rules, as well as changes in some workload parameters, results from earlier versions of VMmark will not be directly comparable to results from VMmark 1.0. - For the mail server workload, the client side application (LoadSim) has been known to revert to its default setting of 3 threads. Please verify before initializing the mailserver and before each benchmark run that the number of threads is set to 64. More information is included in the VMmark Benchmarking Guide. - On the clients, Service Pack 1 (SP1) or later is required for Windows Server 2003 Enterprise Edition to set processor affinity. Being unable to set processor affinity may sometimes result in client-side failures while running the mail server workload. For further information, contact firstname.lastname@example.org.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711126.30/warc/CC-MAIN-20221207021130-20221207051130-00130.warc.gz
CC-MAIN-2022-49
2,390
41
https://null-byte.wonderhowto.com/forum/check-shellshock-vulnerabality-your-server-os-by-my-script-0161774/
code
Hello friends, this script help you to indentify if your os / server is vulnerable to shellshock or not. this script will not work in WIN NT :P ofc copy script from provided link and save it as "shellshock.py" and execute it. if you want to test server then just upload it there and execute it. See Screenshot of anonymous os which is old and vulnerable to shellshock vulnerabality. Pastebin Link : http://pastebin.com/iLavXjUb
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103344783.24/warc/CC-MAIN-20220627225823-20220628015823-00026.warc.gz
CC-MAIN-2022-27
427
4
https://github.com/Icinga/icingaweb2-module-jira
code
Icinga Module for JIRA Hassle-free deep integration with Atlassian Jira. This module: - creates JIRA Issues for Problems detected by Icinga - makes sure to create only one issue per problem - acknowledges Icinga Problems once a JIRA issue has been created - optionally provides a quick way to manually create Host- or Service-related JIRA issues - shows Host/Service-related JIRA Issue History This is 100% free Open Source Software. Interested? Then let's get started!
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578582736.31/warc/CC-MAIN-20190422215211-20190423000258-00070.warc.gz
CC-MAIN-2019-18
469
8
https://sciencenode.org/feature/COVID%20AI.php
code
- We’re still learning how SARS-CoV-2 interacts with cells in the body - Understanding how the virus enters our cells requires modeling and simulation - AI and machine learning are vital in efficiently creating these tools Rick Stevens, associate laboratory director at Argonne National Laboratory, gave a presentation at ISC High Performance 2020 about how high-performance computing (HPC) is being used to fight back against the SARS-CoV-2 virus. In particular, he discussed how machine learning and artificial intelligence (AI) are instrumental to these studies. At this point, we’ve heard just about every COVID-19 infection story there is. A woman in China took a single elevator ride that resulted in 71 infections. Some evidence suggests that as few as 10% of infected people cause 80% of new infections. There’s no doubt that this virus can spread quickly and efficiently, but we’re still figuring out how it works—and how we can stop it. One way to learn about the SARS-CoV-2 virus is through computational modeling and simulation. Understanding how the virus interacts with human host cells will allow us to discover viable treatments. Working as part of the COVID-19 HPC Consortium, Stevens and other scientists around the world are trying to model the virus as accurately and as quickly as possible—and they’re counting on artificial intelligence to give them an edge. A key in a lock According to Stevens, one of the goals of both simulation and modeling has to do with how SARS-CoV-2 infects the human host. Our cells have a receptor for Angiotensin-converting enzyme 2 (ACE2), which normally helps us lower our blood pressure. But the ACE2 receptor on the cell’s surface also serves as an entry point for many viruses, including SARS-CoV-2. Scientists want to model that entry. Picture what happens at the cellular level: The SARS-CoV-2 enters your body and finds itself near an ACE2 receptor on one of your cells. A spike protein wriggling on the exterior of the virus finds the ACE2 receptor and connects with it like a key opening a lock. If scientists can model the whole virus and its interaction with the ACE2 receptor, they can then develop therapies for blocking infection. In the terms of our analogy, they want to learn how to stick some gum on that wriggling spike protein key so it no longer fits in the ACE2 receptor lock. “The questions you’re trying to answer with these methods are: Do these proteins have multiple states? Are the states stable? And are they good states for drugging?” says Stevens. “That is, can you get small molecules that can bind to these proteins in these different states and basically shut down their functions.” Traditional modeling and simulation on even the fastest supercomputer in the world would take too much time. And with over 25.2 million COVID-19 cases worldwide and growing, time is something we don’t have. But AI and machine learning can help make giant leaps in our understanding in a much shorter timeframe. Outsourcing the thinking Imagine AI as the means of having a computer do your thinking for you. Stevens explains that there are about 4 billion molecules that could possibly be used to gum up the SARS-CoV-2 spike protein’s key. For each of those molecules, there are 100 possible binding sites on the protein to try. Simulating each of those 400 billion options individually would take too much time. The more efficient alternative is to train an AI to do all that work for you. “You take a sample of a million of these small molecules, and you do a molecular interaction-level simulation of how the protein might bind to that molecule. And then you use that data to train an AI,” says Stevens. “So we build something like 100 AIs, each trained on a subset of the larger data and how well the model predicts it docks, and then use those AI models to search that much larger space.” In order for the AI to learn to effectively analyze this dataset, it needs ways to represent the molecules. The consortium is currently working with three main types of representation: graph, descriptors, and image. Of course, using AI in this way is a lot easier said than done. Stevens and his colleagues have been working on this since the early spring of 2020. The database they’ve created already contains nearly 80 terabytes of data—and that’s not everything they wanted to include. But they are making progress. Stevens reports that the AI programs can now search 4 billion molecules for a given target in just two days, clearing the way for the team to move onto the more laborious docking simulations. Once that step is complete, they will move onto free energy simulations at the atomic level, where they can get a much more accurate understanding of potential treatments. When asked how he’s been dealing with researching a virus that has swallowed large portions of everyday life, Stevens is both realistic and optimistic. “Well, it’s exhausting,” says Stevens. “But it’s also giving me a reason to get up every day. I’ve been probably working 12, 14, 15-hour days on this ever since the end of February. We’ve got hundreds of people working on this across the country and in Europe and other places, and that really makes it easier to bear. It’s good to be able to contribute to something that’s causing so much trouble.”
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948932.75/warc/CC-MAIN-20230329023546-20230329053546-00140.warc.gz
CC-MAIN-2023-14
5,362
22
https://www.crowdrise.com/helping-my-parents
code
Helping my parents Organized by: Adriana Barton My parents need help paying for their electricity bill. My dad doesn't like to ask for help and works his butt off doing side jobs and is only able to pay 200 dollars a month. He helps out everyone and just forgets about his self, but I have a young brother that lives there along with an elderly grandma and another brother that has a baby. I would really hate to see the power be shut off and I don't have the money to help him pay it off. Anything is appreciated to help. Thank you so much for your time.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813602.12/warc/CC-MAIN-20180221083833-20180221103833-00737.warc.gz
CC-MAIN-2018-09
555
3
https://www.tr.freelancer.com/projects/python/python-coverage-unittest/?ngsw-bypass=&w=f
code
I am looking for someone who can start immediately and help me fix the issue so that we can improve the coverage report of the python code by unittest. Bu iş için 15 freelancer ortalamada $170 teklif veriyor Hi, I can implement the test cases you need, such that the coverage is improved. We have to analyze the input domain to see which areas of the input have not been covered yet. Hey, please I can help you with the problem but need some description first. Feel free to discuss further. AN EXPERT IN ABOVE NAMED SKILLS, DEAR CLIENT, Thank you for sharing your project requirements. After KEENLY and PROFESSIONALLY reading your description and being able to comprehend CLEARLY with Mentioned REQUIRED SKIL Daha Fazla Hi, Hope you are doing well. I am an expert professional Python coverage unittest. Need a few more changes given the budget. Feel free to contact me for further inquiries. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057227.73/warc/CC-MAIN-20210921191451-20210921221451-00679.warc.gz
CC-MAIN-2021-39
901
6
http://stackoverflow.com/questions/12598415/safari-remote-debugging-on-windows
code
Now with iOS6 Apple implemented a feature called remote debugging A client has problems with my webapp since installing the new iOS6 and I can't figure out what's the Problem. Caching of AJAX request seems not to be the problem because in first the errors occur randomly and second the problem is not (only) that results are still the same. So it has to be a Problem with parallel AJAX-Calls To nail the problem and to efficiently fix that problems instead stumbling in the dark I need a debugger. So I was happy to read about the remote debugging feature but I cannot get it to work. The Questions now are: - It is possible to use the feature in the Windows version of safari? - If YES: how to activate it?
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701154682.35/warc/CC-MAIN-20160205193914-00044-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
707
7
http://www.lawschooldiscussion.org/index.php?action=profile;u=8858;area=showposts;start=10
code
Hi all, im only going to be starting law school next year (at where else but Michigan, as my name implies), and I was just wondering what the point of an LLM was. I certainly would like to do legal research stuff, as well as maybe somewhere down the line teach at a law school (though I guess my chances are slim, as I go to "lowly" Michigan and not harvard or yale). Do I need an LLM to do this? Or are LLM's generally used to "offset" lower ranked schools? Is it worth it only to do a LLM at a more prestigious school, like HYS? Any input would be great, I am indeed a puzzled 1L to be. Two examples I've seen where LLMs sound useful: 1) I met a guy who went to an unaccredited law school for his JD, but did well enough to get into an accredited school's (1st tier even) LLM program. I believe that this allows him to practice anywhere now, instead of just the state where his unaccredited school had local accreditation (although, since he stayed in that state, I guess the only thing that mattered was the prestige boost). 2) They're big amongst international lawyers. It seems to be common practice to get the LLM in a country other than the one you recieved your JD (or foreign equivalent) from, especially (but not always) if those are the countries you are primarily working between. It gets you a degree from an institution recognizable to the foreign clients, eases your ability to join that bar (if necessary), and gives you a year of education which is structured (if not focused) on the point of view of ther legal system. That said, I'm only a year into my JD... so what do I know?
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701151880.99/warc/CC-MAIN-20160205193911-00030-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
1,596
5
https://cdcvs.fnal.gov/redmine/projects/artdaq/wiki/Release_Notes_11205
code
artdaq Release Notes 1.12.05 (08-Jan-2015)¶ This version of artdaq can be built against art v1_12_05, v1_12_04, or v1_11_03 (through artdaq_core v1_04_08). However, the standard distributions available from scisoft.fnal.gov only include builds with art v1_12_05 and v1_12_04. It can also be build with gcc v4_9_1 or v4_8_2. However, the distributions available from scisoft.fnal.gov primarily include builds with gcc v4_9_1. For reference, the e6 qualifier indicates gcc v4_9_1, and e5 indicates gcc v4_8_2. The s6 qualifier indicates art v1_12_05, s4 indicates art v1_12_04, and s4 indicates art v1_11_03. Valid combinations of these two types of qualifiers are e6:s6, e6:s5, e6:s4, e5:s6, e5:s5, and e5:s4. And of course, artdaq can be built with the Infiniband or Ethernet MPI libraries, and these are controlled by qualifiers ib and eth. The default set of qualifiers for this version of artdaq is e6:s6:eth. - Previous version's release notes - Downloads: http://scisoft.fnal.gov/scisoft/packages/artdaq/v1_12_05 - Nodes where this release has been deployed: - 19-Jan-2015: ds50.fnal.gov, dsfr6 (FNAL), dsfr1 (LNGS), lbne35t-gateway01 External Package Changes¶ - Changes were made to several CMakeLists.txt files to prepare for using the MRB (multi-repository build) tool at some point in the future. These should be transparent.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107905965.68/warc/CC-MAIN-20201029214439-20201030004439-00355.warc.gz
CC-MAIN-2020-45
1,336
14
https://onruntime.com/
code
Developers, designers and artists from all walks of lifeWho are we ? Basically we have been passionate about web and software development for over 6 years. We are very interested in new technologies and the world of creation (design, music, etc.) in general, so we created a Studio and a community around that studio. We love to gather around a cup of coffee ☕️ to discuss, play and above all create projects.Learn more about us Some innovative projects we've developed or contributed to in recent years. Twitter smooth extension is an extension which aims to change the theme of the Twitter website, and make it a smooth theme. Instagram dark extension is an extension which aims to change the theme of the Instagram website, and make it a dark theme like the iOS app when the system is in dark mode. Clock App is a basic React Native App made with Expo based on a dribbble design template.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487582767.0/warc/CC-MAIN-20210612103920-20210612133920-00339.warc.gz
CC-MAIN-2021-25
895
6
https://www.mcg.be/fr/have-a-nice-and-secure-day
code
☕️💪🏻Good Monday everybody ! Our team starts the week strongly, we are ready to protect our customers from all cybersecurity risks. We redouble our efforts so they can work and develop their activity peacefully. Concerns or questions ? Let's talk about your IT security needs: https://cutt.ly/OCJimrA Évaluons ensemble votre CyberSécurité
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00278.warc.gz
CC-MAIN-2022-40
350
5
http://tibasicdev.wikidot.com/68k:sum-sigma
code
∑() is used to add a sequence of numbers. ∑(expression, variable, start, end) will evaluate expression for variable=start, then for variable=start+1, all the way through variable=end, and add up the results: :∑(f(x),x,1,5) f(1)+f(2)+f(3)+f(4)+f(5) :∑(x^2,x,1,5) 55 In this way, ∑() is no different from taking sum() of a sequence generated by seq(). However, ∑() can be used for more abstract calculations — for instance, when start or end is an undefined variable, it will try to find the sum in terms of that variable. ∑() can also be used to sum an infinite series (just make the value of end infinity — ∞). :∑(x^2,x,1,n) n*(n+1)*(2*n+1)/6 :∑(2^-x,x,1,∞) 1 It's a good idea to replace sum(seq( by ∑( whenever it occurs. The only difficulty arises if seq() uses its step argument, since ∑() doesn't have one. There are three options: - Forget about using ∑() and just go with the sum(seq( alternative. - Use a when() expression (probably with mod()) to select the entries you care about. - Use a linear equation to transform values from 1 to N into the correct values with the step. Here is an example of these approaches: This calculates 12+32+52+72+92. The when() command selects only the odd numbers — those with mod(x,2)=1 — from 1 to 9. The equation 2*x-1 transforms the numbers 1..5 into the odd numbers 1..9.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118519.29/warc/CC-MAIN-20170423031158-00130-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,353
12
http://arstechnica.com/civis/viewtopic.php?f=15&t=1180373
code
Several registry tweaks are mentioned here: http://blogs.technet.com/b/filecab/arch ... space.aspx AutomaticFullBackup - 1 to initiate a full backup when certain conditions are met TimePeriodInDays - initiate a full backup after a certain number of days (default: 365) OlderFilesSizePercentage - initiate a full backup if x pct of files backed up are older or missing/deleted (default: 50) To anyone who has used these tweaks: Is it correct for me to assume that with an automatic full backup all previous system images and incremental file backups will be deleted? Is it right to see how many days it takes until the backup disk becomes full, then set TimePeriodInDays to that number in order to minimize having a full backup disk? (I understand, though, that the backup disk can still become full if an unusually large number of files are added.)
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345763533/warc/CC-MAIN-20131218054923-00087-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
848
8
https://forums.bellaonline.com/ubbthreads.php/topics/468470/rainview
code
Depends on your definition of "spicy". Are you talking about foods that contain a lot of spices, or food that is "chili hot". For the former description, my guess would be Indian. Indian food can contain a myriad of spices resulting in complex and "layered" tastes. No other food comes close, in my opinion. Now, if you're talking about "chili hot", then there are some varieties of Thai peppers that can very nearly kill you! Ok, I overstate that! I frequent a Thai restaurant in my neighborhood, and I ask for something called "chili oil" as an accompaniment. That stuff makes my scalp sweat, and gets my vote for the "hottest" food!
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740679.96/warc/CC-MAIN-20200815035250-20200815065250-00000.warc.gz
CC-MAIN-2020-34
635
2
https://www.gartner.com/en/documents/4022242
code
Published: 14 December 2022 Data-centric AI is a rapidly growing trend. It disrupts prevalent model-centric data science by providing solutions to improve the quality of machine learning/artificial intelligence. Cool vendors in this report offer synthetic data, data labeling and database innovations as part of data-centric AI. Included in Full Research Challenges such as data accessibility, volume, privacy, security, complexity and scope are among the top barriers to AI implementations. Data-centric AI solutions — like AI-specific data management, synthetic data and data labeling technologies — aim to solve many data challenges. Across industries, synthetic data is increasingly leveraged to generate datasets that represent difficult-to-obtain data or possible future scenarios, all without privacy concerns. Data management requirements for AI development and deployment are often missing from AI planning initiatives. Articulating clear data management and governance requirements, such as expectations for data quality and trust, lowers cost of data acquisition and helps find To view the entire document, log in or purchase
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643663.27/warc/CC-MAIN-20230528083025-20230528113025-00219.warc.gz
CC-MAIN-2023-23
1,140
8
http://fivestates.com/ebooks/analysis-of-neural-data
code
By Robert E. Kass, Uri T. Eden, Emery N. Brown Continual advancements in information assortment and processing have had a huge effect on mind study, generating info units which are usually huge and complex. by way of emphasizing a number of primary rules, and a handful of ubiquitous strategies, Analysis of Neural Data presents a unified remedy of analytical equipment that experience turn into crucial for modern researchers. in the course of the e-book principles are illustrated with greater than a hundred examples drawn from the literature, starting from electrophysiology, to neuroimaging, to behaviour. through demonstrating the commonality between a variety of statistical ways the authors give you the the most important instruments for gaining wisdom from various different types of info. geared toward experimentalists with simply high-school point arithmetic, in addition to computationally-oriented neuroscientists who've constrained familiarity with information, Analysis of Neural Data serves as either a self-contained creation and a reference work. Read or Download Analysis of Neural Data PDF Similar biostatistics books This ebook offers a pragmatic consultant to research of easy and intricate technique comparability facts, utilizing Stata, SAS and R. It takes the classical Limits of contract as a place to begin, and offers it in a formal statistical framework. The version serves as a reference for reporting assets of edition and for offering conversion equations and plots among equipment for sensible use, together with prediction uncertainty. Already well known within the research of clinical machine trials, adaptive Bayesian designs are more and more getting used in drug improvement for a wide selection of ailments and stipulations, from Alzheimer’s illness and a number of sclerosis to weight problems, diabetes, hepatitis C, and HIV. Written by way of best pioneers of Bayesian scientific trial designs, Bayesian Adaptive tools for medical Trials explores the becoming position of Bayesian pondering within the quickly altering international of scientific trial research. Bayesian analyses have made very important inroads in glossy scientific study due, partially, to the incorporation of the conventional instruments of noninformative priors in addition to the trendy thoughts of adaptive randomization and predictive strength. providing an introductory viewpoint to fashionable Bayesian systems, effortless Bayesian Biostatistics explores Bayesian ideas and illustrates their software to healthcare study. This accomplished advent to computational community conception as a department of community conception builds at the figuring out that such networks are a device to derive or confirm hypotheses via employing computational thoughts to giant scale community information. The hugely skilled staff of editors and high-profile authors from around the globe current and clarify a few tools which are consultant of computational community idea, derived from graph idea, in addition to computational and statistical strategies. - Sample Size Calculations in Clinical Research (Biostatistics, 11) - Functional Approach to Optimal Experimental Design - Primer to Analysis of Genomic Data Using R - Basics of Bioinformatics: Lecture Notes of the Graduate Summer School on Bioinformatics of China Extra info for Analysis of Neural Data A multiplicity of possible data features is inherent to the data analytic process. Furthermore, the details of data summary can be important. , the arithmetic average, of the numbers 2, 3, 10 is 5 while the median is 3. Similarly, a histogram displays the distribution of data values, but the way it does so depends on the way its bins are defined. This is illustrated in the next example. R. E. 6 Time (s) Fig. 1 Four histograms of saccadic reaction time data. The same data are used in each histogram. If we break the growth process into many thousands of pieces, each might be considered a small effect, so that the net result is a composition of many, many small effects. When we see that one spine is longer than another, we might imagine that the many small effects in the longer spine tended to be proportionally larger than those in the shorter spine. Now consider two such small growth effects x1 and x2 , occurring, respectively, in the shorter and longer dendrites. 05, or 5 %) in going from x1 to x2 . 3 displays images from one subject in a combined visual and motor fMRI experiment. 8 s ON. This was repeated 8 times. 8 s OFF). The brain was imaged once every 800 ms for the duration of the experiment. The slice shown was chosen to transect both the visual and motor cortices. Three regions of interest have been selected, corresponding to (1) motor (2) visual cortex, and (3) white matter. Parts B through D of the figure illustrate the raw time series taken from each of these regions, along with timing diagrams of the input stimuli. Analysis of Neural Data by Robert E. Kass, Uri T. Eden, Emery N. Brown - John Miles's Hadrian’s wildlife PDF - Get Post-War Modernist Cinema and Philosophy: Confronting PDF
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824601.32/warc/CC-MAIN-20181213080138-20181213101638-00352.warc.gz
CC-MAIN-2018-51
5,097
19
https://awesomelib.com/swift/zip
code
Swift framework for zipping and unzipping files. Effortless ZIP Handling in Swift A much faster version of JSONDecoder Swift libcompression wrapper as an extension for the Data type (GZIP, ZLIB, LZFSE, LZMA, LZ4, deflate, RFC-1950, RFC-1951, RFC-1952)... A Swift framework for working with compression, archives and containers. A Caching Library is written in Swift that can cache JSON, Image, Zip or AnyObject with expiry date/TTYL and force refresh.... Mounts archives like disk images (macOS) 🗳A library to create, read and modify ZIP archive files, written in Swift. Perfect Zip compression utility. The cd companion utility you've always wanted Swift library for manipulating postal codes. It's a sample Skeleton for iOS project with some extra features such as moving image View in Startup scrollView. For using this project, you can simply Clone or d... Swift wrapper for libzip — library for reading, creating, and modifying zip archives. Tool to generate auto-upgrade artifacts (app.zip and Appcast.xml files) of your application using sparkle framework for macOS.... Array To Zipper Ctrip Hybrid App Zip包解压更新策略Demo A GYD template for producing ZipSequences of arbitrary arity. A macOS app to help you from zip and delete zip file mess! A helper tool to get the state and locality for a given zip code. A simple iOS client for ZipBooks (www.zipbooks.com) Upload an ipa/apk/zip to Diawi FileKit and ZipFoundation utility methods The purpose of the library is to abstract the downloading (images, pdf, zip, etc) and caching of remote resources (images, JSON, XML, etc) in-memory.... This repo holds a project made for a Validating Zipcodes blog. An example demonstrating zipping & unzipping files using Perfect. Framework for reading ZIP files on iOS Learn to create and consume Azure functions with Clippy As technology continues to integrate into our social lives, it is becoming increasingly difficult to stay in touch with local communities. ZipR provides an easy ac... A ZIP library for Swift. Reader for a zip file including only image files. Pure Swift 2 Zip File Reader no dependencies A Swift implementation of Parsing with Zippers. iOS Swift example App for opening a .zip file / Ejemplo en Swift de una aplicación iOS para abrir un archivo .zip... Zips through a tile pyramid, rendering single tiles while ensuring they get disk cached A Mac command-line tool that automatically generates macOS Installer Disk Images, Packages and ZIP archives.... Quick Look Plugins for an archive file. Flutter plugin for creating and extracting ZIP files.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585382.32/warc/CC-MAIN-20211021071407-20211021101407-00011.warc.gz
CC-MAIN-2021-43
2,579
37
http://www.koiphen.com/forums/showthread.php?99353-flow-direction-w-ball-valves
code
I have noticed on my ball valves, an arrow to indicate the proper water flow direction. Does it really matter?? When installing, should I make sure to get the ball valve placed in the proper direction, ie. if I don't, will I pay for it down the road? Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189802.72/warc/CC-MAIN-20170322212949-00180-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
269
2
https://jekyll.gianfaye.com/colophon/
code
About This Site All published works under this domain is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License. You are free to share and distribute as long as you credit the work to the publisher under this domain. - Jekyll by Tom Preston-Werner, Nick Quaranto, and the full list of contributors. - Jekyll Bootstrap by Jade Dominguez for the headstart. - Markdown by John Gruber for the text to HTML conversion tool used on most of the posts here. - GIMP - used to create and edit images for this site. And Wilber for being my companion for 7 years now. - Typefaces: V.GER (Voyager) Grotesque by Mateo Rios and Tomas Saldarriaga & Amethysta by Cyreal. - And of course, I still would like to mention Sir TimBL for making this web geekery possible.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00392.warc.gz
CC-MAIN-2023-40
773
8
https://github.com/Psylicium/Wishably
code
A tool for coordinating presents. We all know the drill: It's christmas really soon, and you have to figure out both your own wishes, and what to give to others. It can be a pain to coordinate properly with a lot of mailing/calling/texting back and forth to figure out who buys what to whom. With this easy-to-use tool, the participants can write their own wishes, see other people's, and reserve/unreserve gifts. You can try a demo at http://projects.psylicium.dk/onskedemo/ All you need is a webhost which supports PHP 7.0, and access to a MySQL database. Create a new empty database, and import the included /mysql/dbcreate.sql. This will create the required tables. Set the necessary variables for connecting to the database in // Database host $dbhost = "<YOUR_DATABASE_ADDRESS>"; // Database username $dbusername = "<DATABASE_USERNAME>"; // Database password $dbpassword = "<DATABASE_PASSWORD>"; // Database name $dbname = "<DATABASE_NAME>"; func.phpand enter som bacic settings for your site: An invite code and mail settings (where the registration mail with the password will be sent from): $mailfrom = "From: Wishably <email@example.com>"; $invite_code = "<invite-code>"; The title of your site: The URL of your site: $basedir = "http://mysite.com/wishably/"; The language (refer to /lang/languages.txt for supported languages): This should be it! Simple, eh? A text field can be added below the wishlist on the front page (welcome message, instructions etc.), but this is disabled by default. To enable it, open index.php and edit the variables at the top: $display_text = 0; $page_text = 'This is displayed in the text field below the wishlist'; $display_text sets whether the text field is shown. 0 disables it, 1 enables it. $page_text contains the text you want to show. You can use standard HTML formatting. You can also display a list of the registered users at the bottom of the wish list: $display_users = 1; This is enabled by default, but you can disable it by setting $display_users = 0; in The application is multilingual, and can be displayed in whatever language it is translated into. You can set the display language in func.php by changing include('lang/lang_XX.php') where XX being the language. Check /lang/languages.txt for more info and current translations. For easy management, I have included an admin section where you can either delete all current wishes (but leaving user information) or wipe the entire database for easy reuse. First thing to do after setting up After the above steps are completed, the first thing you'll need to do is create an administrator account. This is done by going to /admin/createadmin.php and entering your desired login details. It will set the admin cell to 1 in the database. You have to delete or rename this file to some random gibberish upon completion - otherwise, anyone can gain admin rights. All participants sign up. The registration process should be spam-proof using a honeypot to fool bots trying to sign up. There's also the required invite code to make it extra secure, and that as well prevents strangers from joining. Let's take a christmas present example: - Phoebe wish for a book, some earrings and four new winter tires, so she adds them to "My Wishlist". These wishes will be shown on the index page for all to see (and reserve). - Now Chandler comes by to enter some of his wishes as well. He sees that Phoebe wants some tires and a book, so he reserves those wishes. Since they are now taken, they won't be displayed on the index page anymore. Chandler can still see them under "My Reservations" - and of course Phoebe also still sees them under "My Wishlist". - Phoebe can edit or delete her wishes at any time, but she should use this WITH CAUTION! She can't see which of her presents have been reserved - or perhaps even bought. (That would also ruin the whole surprise, right?)... - If Chandler get second thoughts, or can't afford the tires, he can unreserve them. The wish now becomes available, and is yet again shown on the front page for others to reserve. By doing it like this, everyone can see what other people wish for, and it's shown in a nice and clean way to avoid accidentally getting the same gift from different people. 2017/09/22: Version 2.1 - Fixed: I noticed some bugs when running the app on a local server, and they should be gone now. - Changed: Changed some settings for global variables and stuff... 2017/09/14: Version 2.0 - Added: Frontend administration for basic database operations - Added: The option for users to select their own password - Added: The option for users to reset and set a new password - Fixed: Inconsistency in error messages - Changed: Rearranged some of the variables across files - Changed: Made some minor cosmetic adjustments 2017/01/19: Version 1.01 - Minor bugfixes - Added: Language support 2017/01/16: Version 1.0 - Committed to GitHub. As I originally made this in danish, this is of course best suited for people understanding the language. I will add some easy-to-use translation functionality in the next version, which will (hopefully) be released very soon. This was created in January 2017 by Henrik Mortensen (http://psylicium.dk). Background image by Rolf Schweizer Fotografie (https://www.flickr.com/photos/schweizerrolf/23543699950/). Copyright (C) 2017 Henrik Mortensen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156224.9/warc/CC-MAIN-20180919122227-20180919142227-00428.warc.gz
CC-MAIN-2018-39
6,013
60
https://iamears.com/post/sleep-issue-30c1cfec7fa7271fd2622c52aaa3e806
code
bored and can't sleep 😩 may I talk with someone I want to talk to someone who is ready to hear me peacefully I can't sleep I was never comfortable around boys due to my past exp also i had PTSD from bullying at school . I was please suggest me a variety topic to think deeply?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103626162.35/warc/CC-MAIN-20220629084939-20220629114939-00045.warc.gz
CC-MAIN-2022-27
279
6
http://blog.katherineplumer.com/2011/10/whats-that-smell.html
code
Okay, at the risk of sounding like a crazy person, I'm just going to ask if anyone has any idea what this is all about... There's been a weird smell in the neighborhood lately. I first smelled it about a month ago, so strong that it woke me up in the middle of the night. It smelled like fireworks... that burnt sulfur smell of a spent firework. I had to shut my window it was so strong. The following morning I was sure I must have dreamed it. But I've smelled it a few more times since then. Only once in daylight, usually at night, and sometimes down the road a half mile or so. Mom's smelled it, and one of my neighbors even texted me a week or so ago late at night and said "does it smell weird outside to you?" At 2:30 last night it was so strong it woke me up again, blowing in the window on the breeze. It was less sulfury this time, hard to describe... sort of a cooking smell, like BBQ, but in a gross way, kind of a nasty undertone to it, like something dead? By morning the air is normal. Does anyone have any idea what this could be? Do you think someone's cooking meth around here? Does it smell like that? Any other ideas? At least I'm not the only one aware of it... It's really quite disturbing though.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510734.55/warc/CC-MAIN-20231001005750-20231001035750-00698.warc.gz
CC-MAIN-2023-40
1,219
4
http://visualbasic-development.blogspot.com/2012/09/how-to-create-reg-file-for-windows-xp.html
code
The Windows Registry is a database of system and application settings, as well as runtime information. |It can be a confusing morass of keys, subkeys, and values, but if you know what you're looking for you can quickly back up and fix almost anything.| Things You'll Need Registry Editor (regedit.exe on Windows XP)Regular backups of registry values before editing. Manual Editing—Registry Editor 1 Open the Registry Editor from the \"Start\" menu by selecting \"Run...\" and typing \"regedit\" in the popup dialog. 2 Find the registry value in a registry tree (key) that needs to be fixed. For example, the setting for showing \"Recent Documents\" in the Start menu is stored at [HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer] in the registry value \"NoRecentDocsMenu\". 3 Before changing anything in the registry, create a backup of the registry key by right-clicking on the key in the left side of the Registry Editor—in this case, \"Explorer\" is the lowest key -- and select \"Export\". Save the file to your Desktop with a recognizable name, such as \"Explorer Policy—Original.reg\", with the extension \"reg\" telling Windows it is a registry key file. 4 Double-click on the registry value \"NoRecentDocsMenu\" to modify it (right-click to \"Rename\" it). In the popup window, change the \"Value data\" from 0 to 1 to disable \"Recent Docs\" in the Start Menu. Click \"OK\". 5 Changing some registry settings may require a logoff/logon before taking effect, while others may require a computer restart. Try logging off and back on, then check the Start menu to see the effect. Manual Editing—Reg Files 1 Find the backup registry file we created earlier, \"Explorer Policy—Original.reg\". The default double-click action may be to merge the setting with the registry, so right-click and select \"Edit\" to open it in Notepad. 2 The first line of the file tells you what you used to create the registry file, and must be present— \"Windows Registry Editor Version 5.00.\" The registry key we changed appears between square brackets [ ], ending in \"...Policies\\Explorer].\" The registry values are beneath the key, given as \"name\"=type:value. Note that all of the values we saw earlier in the Registry Editor were saved to this file, not just the one we changed. 3 Erase all of the values except the line with \"NoRecentDocsMenu\"=dword:..., and save the file as \"Explorer Policy—Recent Docs.reg\" to your Desktop. This file now has the instructions to find the given registry key (or create it if it doesn't exist) and modify (or create) the registry value with the given data type and value. This will restore the Recent Documents to the Start menu. 4 Right-click on the new registry file and select \"Merge.\" Click \"OK\" to approve changing the registry, and \"OK\" for the popup indicating a successful change. 5 Log off and back on and then check the \"Start\" menu to see the effect. Tips & Warnings - In a registry file, to remove a specific value, put a minus sign after the equals, like \"NoRecentDocsMenu\"=-. To delete the default value of a key, enter @=- on the next line below the key name in brackets. To delete the entire key (and all of its subkeys and values) put the minus directly after the open bracket in the key name, like [-HKEY_CURRENT_USER\\Software... - To \"refresh\" Windows after a registry change, so you may not need to log out and back in, open the Task Manager with \"Ctrl+Alt+Del\" or \"Ctrl+Shift+Esc.\" Select \"explorer.exe\" and click \"End Process.\" After it reloads (the desktop and taskbar may flash), check to see if the new registry settings have taken effect. - If a registry change causes Windows to fail, use the Recovery Console to restore the registry hive backup (.BAK) file, usually saved to the %Windir%\\System32\\config folder. - Many programs create registry keys that remain even if they are uninstalled. A \"bloated\" registry can affect computer performance, since the registry is constantly being scanned for data. Careful use of registry-cleaner software may help, simplifying the manual steps to remove unneeded registry keys. - ALWAYS back up the registry before you edit anything. However, changing something major may prevent you from accessing the registry or even logging in to Windows, so consult appropriate documentation about how keys affect Windows behavior before \"going fishing.\" Creating a System Restore Point before editing may also be a good idea. - Do not double-click registry files—this is usually the default action to merge their contents to the registry. Instead, always right-click registry files to ensure you are choosing the correct action. - You must be logged in as a user with administrative privileges in order to edit the registry.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.71/warc/CC-MAIN-20170423031202-00548-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,791
24
https://www.reddit.com/r/IOStoken/comments/c9e7u6/iost_blockchain_has_recorded_a_total_transaction/
code
According to dapp.com Q2 dapp market report https://www.dapp.com/article/dapp-com-q2-2019-dapp-market-report I'm a bot, bleep, bloop. Someone has linked to this thread from another place on reddit: Our mission is to be the underlying architecture for the future of online services. We are laying the foundation for an ultra-high TPS blockchain infrastructure, one that meets the security and scalability needs of a decentralized economy.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527907.70/warc/CC-MAIN-20190722092824-20190722114824-00167.warc.gz
CC-MAIN-2019-30
437
3
https://reptilemaniac.com/leopard-gecko-egg-laying-behavior/
code
Disclaimer: As an Amazon Associate I earn from qualifying purchases. Therefore, we may collect a share of sales from the links on this page, at no extra cost to you! Leopard geckos are one of the most popular pet reptiles. They require minimal care and are equally friendly. However, leopard geckos are often quiet, so you can’t really tell whether they are experiencing a certain discomfort. You can learn more about your leopard gecko by studying their behavior. That way, you will be able to ascertain whether your leo is okay or not. As a pet parent, you need to understand the reproductive behavior of your leopard gecko. This will allow you to provide the best care for your leopard gecko during the breeding season. Let’s go over everything from leopard gecko egg laying behavior to signs that your leopard gecko is about to lay eggs! Leopard Gecko Gestation Period After successfully mating with a male, female leopard geckos can produce eggs after 16 to 22 days. With the right diet, leopard geckos can lay several clutches of eggs during this period. Most leopard geckos lay 1 to 2 eggs at a time. Adult leopard geckos can lay eggs every 14 to 21 days throughout the breeding season. You should keep in mind that female leopard geckos can lay fertile eggs without mating in a particular season. This is because they can store sperm in their reproductive tract for about 12 months. If you buy a leopard gecko that has been mated before, you can expect them to lay fertile eggs. Egg Bound Leopard Gecko Egg binding refers to a situation in which the eggs take longer than usual to come out of the leopard gecko. It is a serious health complication that requires immediate medical attention. If you suspect that your leopard gecko is egg bound, you should take them to the vet immediately. The common signs of egg binding in leopard geckos include restlessness and a swollen cloaca. Signs That Your Leopard Gecko Is About To Lay Eggs 1. Swollen Abdomen If you notice that your leopard gecko has a swollen abdomen, it could be that they are carrying eggs. You can gently press the leopard gecko’s abdominal area to feel the eggs. 3. Visible Eggs On rare occasions, you’ll be able to see the eggs through the leopard gecko’s thin skin. The eggs are more visible when the leopard gecko is just about to lay them. 4. Behavioral Changes Leopard geckos engage in a wide range of behaviors when they are about to lay eggs. They may dig around, become aggressive, or hide. 5. Lack of Appetite Leos may show a lack of interest in food when they are gravid. This is mainly because their stomach becomes smaller due to the developing eggs. Note: These signs may indicate your leopard gecko has other health complications. As such, you should visit a veterinary doctor to get a clear diagnosis. Before breeding your leopard gecko, you should familiarize yourself with their egg laying behavior. This will enable you to provide the leo with the required care. Gravid leopard geckos should eat a balanced diet. Additionally, water and supplements should be provided regularly.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474853.43/warc/CC-MAIN-20240229202522-20240229232522-00054.warc.gz
CC-MAIN-2024-10
3,079
24
https://devpost.com/software/built-with/glsl?page=4
code
This is a game. Deal with it. An 2D mobile on rails shooter and block combining hybrid similar to Tetris or Galaga. A new way to add an extra layer of authentication to your accounts. Can you handle the connections? GitHub's month-long game jam :video_game: November 2016 An asteroid visualizer built on Unity with JPL's Small Bodies Database Wearable Augmented Reality Device to help the deaf see visually what the other person is saying. Senior Design Project Penn State Behrend Bacon game 9 game A shader that emulates how inverse colors accumulate on the retina A GoogleVR Zombie Survival Game DeltaSquad@2016FiskHacksII: Immersive VR Learning Game for Grade School Kids VR game: Creating a nexus of nodes with your eyes Lazy Eye Improvement Unity App Puzzle Game with custom audio mood provider. Experience the limitations of your vision using a simple 3D Shader UMBC Hackathon 2016, Use Leap Motion to pick and read a book from our virtual patio Playing around with values for music to be visualized using particle systems within unity An AR-powered education app for STEM subjects Bloody Mary adventure!
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525414.52/warc/CC-MAIN-20190717221901-20190718003901-00398.warc.gz
CC-MAIN-2019-30
1,110
21
https://mljohnson.org/2015/11/ebible-org-sword-repository/
code
The newest repository for Bible translations for the Crosswire Bible Society’s Sword Project applications is at ftp://ftp.eBible.org/sword. It is also the largest, because it has all of the Bible translations that I have permission to distribute freely and have processed, so far (677 of them as of today). This new repository has just been added to the official master repository list for all Sword Project applications (which they call “front ends”). There are many of them, but here are my favorites: - Xiphos (for Windows or Linux) - Eloquent (for Mac OS X) - PocketSword (for iOS, available in the App Store) - AndBible (for Android, available in the Play Store) Unfortunately, as I write this, AndBible doesn’t use the master repository list, and doesn’t have a mechanism to add another repository manually. However, you can manually add modules from the eBible.org repository via the Android file system. Just copy modules to a jsword directory on your sd card. Expand the module so that the .conf file is in sdcard/jsword/mods.d and the bible files in a subdirectory of sdcard/jsword/modules e.g. sdcard\jsword\modules\texts\ztext\engWEB2014eb. Hopefully, AndBible will eventually be upgraded so that this “side loading” of modules isn’t necessary. Another issue currently is that PocketSword may report that no search index is available for any or all of these modules. Hopefully, that will be corrected before too long. In the mean time, Bible reading will work fine. Other than that, the Sword Project Bible study applications provide an awesome way to read, study, and search the Holy Bible in many languages, all offline, and without paying more than whatever your Internet access and device(s) that you probably already have cost. For some front ends, or to use the eBible.org beta repository, you might need to enter the following parameters: - Name: eBible.org - Protocol: ftp - Server: ftp.eBible.org - Directory: /sword - User name: anonymous or ftp - Password: insert any email address here For the eBible.org beta repository, the directory name is /swordbeta. All of the other parameters are the same. You can also access the same repositories with http protocol, using the server name eBible.org. For more details, please see the documentation for each front end program on its own web site.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473370.18/warc/CC-MAIN-20240221034447-20240221064447-00153.warc.gz
CC-MAIN-2024-10
2,328
17
https://developer.siemens.com/insights-hub/docs/apis/connectivity-mindconnect/api-mindconnect-overview.html
code
MindConnect Services provide APIs that enables shop floor devices to send data securely and reliably. It allows custom applications (agents) to collect and upload data which shall be stored and used by applications in the cloud. For accessing this service you need to have the respective roles listed in MindConnect API roles and scopes. Agents need a field-side network infrastructure to forward and route outbound HTTPs requests to the Internet. MindConnect supports multiple agent device classes: strong hardware platforms as well as resource constrained devices. All target agent platforms must comply to the following minimum requirements: - HTTP processing - JSON parsing - JSON Web Token (JWT) generation - HMAC generation (preferably SHA2 based hashing) Users with IP based filtering on their firewall can use the following two static IPs for whitelisting the data upload traffic: Enabling these two IP addresses is sufficient for agents and clients accessing *.eu1.mindsphere.io. Region China 1 To access *.cn1.mindsphere-in.cn , you should add the following IP address in your firewall rules instead: If the agent or client is using certificate revocation list URLs, these have to be whitelisted in addition. However, this does not cover the interactive login process by WebKey and native access to IDL (AWS S3). A SSL implementation may want to check the revocation list of Certificate Authorities. If the SSL implementation is trying to get this certificate revocation list at runtime, it needs access to an external URL. It is used for distributing revoked CA certificates by the CA. However, it is more often done by operation system or java updates. Data Source Configuration¶ A data source configuration is needed for interpreting the data it receives from an agent. This configuration contains data sources and data points. Data sources are logical groups, e.g. a sensor or a machine, which contain one or more measurable data points, e.g. temperature or pressure. Data Point Mapping¶ Data point mapping is required for storing the data it receives from an agent. This maps the data points from the data source configuration to properties of the digital entity, that represents the agent. When Insights Hub receives data from an agent, it looks up which property the data point is mapped to and stores the data there. Use the MindConnect Service for defining the data point mapping. For instructions refer to Creating a Data Point Mapping. Events originating from the device in the field are sent to Insights Hub using MindConnect APIs. These events are stored in the corresponding agent asset. For example, if a field device is connected to Insights Hub over MCLIB agent, all the events originated from the field device is stored in the MCLIB (core.mclib type) agent. By using event mapping APIs from the agent, these events can now be mapped to appropriate asset in Insights Hub. The API allows you to define mapping criteria. For example, if the event type field source contains “MyMachine” then map the events to the asset (asset id field in the API). Once the mapping is performed, every time the event of the selected type reaches the agent, the event is automatically stored against the asset. If otherwise, the event remains in the agent itself. - If there are no event mappings matching an event, that event will be stored in the agent asset. - Multiple mappings can match for an event uploaded. In such a case, all matching mappings will be applied for the event. - An asset can have multiple event mappings. - Maximum of 50 event mappings can be created per agent. - Maximum of 5 event mappings can be created per agent from an event type. Use the MindConnect Service for defining the event mapping. For instructions refer to Creating Event Mapping. The MindConnect API allows agents to upload their data to Industrial IoT. This data can be of type: - Time Series The format conforms to a subset of the HTTP multipart specification, but only permits nesting of 2 levels. For instructions refer to Uploading Agent Data. Standard data types¶ The MindConnect Service uses standard data types, which allow Industrial IoT to automatically process the data without additional configuration or coding. This means: - The API defines how standard data types are transmitted, e.g. how metadata and production data need to be formatted as HTTPs payloads. - Standard data types are automatically parsed and the information is stored to (virtual) assets. - For each of the standard data types, there is a pre-configured mass data storage available. - Data of standard types can be accessed and queried in a standardized way by applications and analytical tools. The following standard data types for production data are supported: - Time Series Time Series are data point values that change constantly over time, e.g. values from analog sensors like a temperature sensor. This also applies to any other measured values that have an associated timestamp. Events are based on machine events, e.g. emergency stops or machine failures. However, this mechanism can also be used to upload custom notifications, e.g. if you do on-site threshold monitoring and want to report a broken threshold. Files of up to 10 MB can be uploaded per exchange call. The files are attached to the corresponding (virtual) asset, e.g. device log files or complex sensor structures. Files that are uploaded can be referenced by the parent (virtual) asset. The content of these files is not parsed. It requires custom applications or analytical tools to interpret and visualize the data. - Data Models Data models describe the agent-side asset hierarchy and configuration including measurement points. In order to give optimal performance, MindConnect API provides technical limits on API usage and resources which needs to be incorporated while using it. API technical limits are documented here. The following are the technical limits for resource usage: |Max event mapping count per agent |Max event mapping count per agent from an event type |Number of aspect variables to which one datapoint can be mapped These limits are enforced on Capability Package based environments only. The MindConnect Service exposes its API to agents for realizing the following tasks: - Upload time series - Upload files - Describe and upload asset data models - Upload data of custom data types for custom handling The manager of a wind farm wants to collect sensor data of a wind turbine. A developer implements a field application (agent) which collects the sensor data. The agent uses the MindConnect API for uploading the data to Industrial IoT. Connect and Collaborate with Industrial Professionals and Join the Community!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474663.47/warc/CC-MAIN-20240226194006-20240226224006-00045.warc.gz
CC-MAIN-2024-10
6,707
55
http://persistentcuriosity.blogspot.com/2009/07/avoiding-att-last-transaction-messages.html
code
I have been using ATT pay as you go for almost a year. About 6 months ago, I picked up an ADP1 and have been using it on my ATT pay as you go plan ever since. It worked just fine for the first few months, especially considering the fact that ATT has a decent data plan that you can get with it (2G only for the ADP1, however). The one annoying thing was ATT "last transaction" balance nag messages every time you use the phone. With a regular phone, it is not too bad since you only get these nag messages when you make voice calls. With the ADP1 (and presumably any smart phone) these messages come much more frequently due to data access. If you haven't used the phone is a while, you end up with a huge stack of these messages that have to be dispatched before you can use the phone for anything but answering calls. So I was left with two choices - either disable data access on the ATT network, or fix the problem. I decided to fix the problem. I downloaded the Android source for version 1.1, found the spot in the code to make the change, recompiled the relevant module, and installed it. Just this week I did the same for 1.5 (cupcake). It turns out that these nag messages are unsolicited USSD messages. The PhoneUtils class in the Android Phone app is what handles USSD messages in Android. I modified it so that USSD messages that result in a simple alert beginning with the text "The last transaction cost" are discarded. If you would like to do this yourself, I have attached the modified PhoneUtils class, as well as the complete Phone.apk. Either way, once you have newly modified the Phone.apk, follow the following instructions to get it loaded onto your ADP1: * Android development kit * Mini sdcard * USB cable Installing the patched Phone app: 1. Copy Phone.apk to your sdcard. 2. Attach your Phone to your computer via usb 3. Open a shell on the phone witht the command 4. Login as root 5. Mount the system dir as writeable mount -o remount,rw /dev/block/mtdblock3 /system 6. Go to the dir where the built-in apps are stored 7. Backup the existing Phone app (in case you change your mind) cat Phone.apk > /sdcard/Phone.apk.bkp 8. Remove the old Phone app 9. Install the replacement Phone app cat /sdcard/Phone_1.5_Att.apk > Phone.apk 10. Switch mount back to readonly mount -o remount,ro /dev/block/mtdblock3 /system If you get an error on the last step that filesystem is busy, simply reboot your phone to restore the system dir as read-only. That's it, your all set to not be annoyed by ATT nag messages. One final note, since you won't be getting any last transaction messages, you may want to actually know your balance. If so, you can simply ask for it by dialing *777# on your phone.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865438.16/warc/CC-MAIN-20180623225824-20180624005824-00592.warc.gz
CC-MAIN-2018-26
2,710
26
https://amette.eu/blogpost221-What-happened-lately
code
... so no blog post in almost a month now. What was up? I was at LinuxTag 2006. And I couldn't blog from there, because the f#*$ing vServer hosting this iste just plain sucks (and I didn't come up with just rebooting it from the provider's web-interface - the Linux-isn't-rebooted-attitude is deep in me ;) ). I was visiting Püppi at her new home in Düsseldorf for the first time. And while I was there, I noticed, that I missed ))LinuxTag(( completely. It was just in the week after the weekend, where I was in Düsseldorf. So I booked a hotel on short term and just went there. I also ordered a TikiWiki shirt from my spreadshirt-shop and let them sent it directly to my hotel - that worked out very well and now I really know, what that shop is good for! :P LinuxTag itself was pretty disappointing. Nearly everybody said, that it was worse than last year. I'm not going into detail here - and I'm really sorry for not having blogged during it! :( The major highlight perhaps was the keynote of Ubuntu founder Mark Shuttleworth - he's a really charismatic guy - just the type of people we need for promoting Open Source! After LinuxTag I was in Düsseldorf again for a couple of days and then came back to Ilmenau. Need to do some university stuff again - so that I finally get to do some real work soon. ;) Perhaps the worst about my non-blogging during LinuxTag is, that I won't have my own diary-entries to read back in some years... LinuxTag was fun after all and there surely were some nice anecdotes to tell - but I can't recall them now already, which really is a pity.. :-/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474670.19/warc/CC-MAIN-20240227021813-20240227051813-00125.warc.gz
CC-MAIN-2024-10
1,586
7
https://www.researchsquare.com/article/rs-183969/v1
code
Single-step genomic best linear unbiased prediction (SSGBLUP) method is an effective approach for genetic evaluation. To overcome the issue that pedigree and genomic relationship matrices refer to different base populations, a single-step genomic method with a metafounder (MF-SSGBLUP) was put forward. The aim of this study was to compare the predictive abilities and bias of genomic evaluation based on MF-SSGBLUP compared with standard SSGBLUP. We did this for feed conversion ratio (FCR) and average daily gain (ADG) in DanBred Landrace (LL) and DanBred Yorkshire (YY) pigs using both univariate and bivariate models. Additionally, optimal weighting factors (ω) on pedigree-based relationship matrices for ADG and FCR in both SSGBLUP and MF-SSGBLUP were also investigated. In general, SSGBLUP and MF-SSGBLUP methods showed similar predictive abilities and biasedness of GEBVs. In LL, for ADG, the predictive ability for SSGBLUP was up to 0.355, while MF-SSGBLUP reached a highest predictive ability of 0.356; for FCR, the predictive ability for MF-SSGBLUP together with a bivariate model was highest (0.196) among all the different scenarios. In YY, performances of genomic prediction for ADG were almost similar among different scenarios and predictive ability for ADG was up to 0.347; for FCR, the highest predictive ability (0.355) was obtained in MF-SSGBLUP. In biasedness, SSGBLUP and MF-SSGBLUP performed nearly the same, and bivariate models generally had less biasedness than univariate models. Additionally, in terms of the optimal weighting factors (ω), in LL, regardless of a univariate or a bivariate model was used, the optimal ω for ADG were around 0.2 in both SSGBLUP and MF-SSGBLUP; for FCR, 0.70 and 0.55 were the optimal ω in SSGBLUP and MF-SSGBLUP method, respectively. In YY, the optimal ω ranged from 0.25 to 0.35 for ADG and from 0.10 to 0.30 for FCR in different scenarios. This study indicated that MF-SSGBLUP method performed at least as good as SSGBLUP for genomic evaluation. The optimal weighting factors (ω) in SSGBLUP and MF-SSGBLUP are not dramatically different. Overall, MF-SSGBLUP in combination with a bivariate model was recommended for single-step genomic evaluation for ADG and FCR in DanBred Landrace and Yorkshire pigs.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662509990.19/warc/CC-MAIN-20220516041337-20220516071337-00644.warc.gz
CC-MAIN-2022-21
2,269
3
https://blogs.sas.com/content/sascom/2011/06/22/visualize-your-thoughts-with-a-mind-map/
code
I have recently discovered “mind mapping.” Mind mapping is not a new concept, but since I (re)learned it, I’ve found it to be an excellent tool for analyzing business problems and processes. I thought you might find it interesting too! Here’s an example: The other day, I was thinking about all of the different elements within an organization that need to exist and interact to make business analytics a reality. I started to scribble a list on a sheet of paper: I created some high level categories around people, process, data and technology, and then brainstormed all the different things associated with those categories that I could think of. The more I scribbled away, the more things I began to think of and my scribbles became a mess of notes that didn’t really represent what I wanted to convey. What I really wanted to do was visually present my concept in a way that showed the interactions and dependencies between the functions. (I mean, you can’t really have a business architecture without a business strategy, and that is connected to your technical and data architecture, and if you have a data architecture, you need a database and a data model, etc.) A problem that I uncover in many of the organizations that I work with is that most companies have a poor handle on their business analytic processes. They often don’t understand the linkage or dependencies between concepts, tasks or functions. Being able to visualize the interconnectedness of the business analytic “system” helps you understand where you may have gaps or opportunities to improve efficiency. In my case, the deeper I began to think about business analytics, the more complex it became. I needed a good way to organize the relationships visually in a way that I could communicate and share with others (and record and remember all the little pieces of information I was likely to forget!). Enter the mind map. A mind map is simply a conceptual model. Anyone familiar with data and systems architecture has used conceptual models to construct complex systems and the interactions of the actors of the system. But conceptual models are also excellent tools for thinking through, or brainstorming, practically any process. I even used the technique to take notes for a book I was reading on business strategy: I identified all of the subject areas of the book, the steps in which the strategy is developed, and the different things to remember to do when developing elements of the business strategy. Even better, I captured the essence of the book without taking exhaustive notes (which for me ended up being a mini-version of the book). Why is the mind map all new again? Because we have all kinds of new tools at our fingertips that enable visualization. There are bunches of great apps for mind mapping on the iPad, and the iPad is all about being visual. Think about this – I gave a presentation recently at a JMP event on increasing “visual thinking.” The whole premise behind visual thinking is that you spend less time looking at cells of data and more time understanding your data through visual tools. There’s no reason why this just has to apply to data. Also, the smartphones, tablets and other devices that we use in our personal lives are really encouraging us to focus on capabilities and functionality, not tools and technologies. So I picked up my trusty iPad, went to the iTunes store and found an app called SimpleMind (free version is fine, you can upgrade to the full version through the app for a couple of dollars, or purchase the directly from iTunes). While my diagram in this posting is going to be too tiny to see, you can get a sense of how you can color code different areas, build a hierarchy between them and identify relationships between seemingly disparate concepts. For those of you who don’t use an iPad, there are many free applications that you can download to your PC (FreeMind is a good example). All the applications I downloaded were simple and easy to use. The functionality and level of detail that you can capture is different, the visual aesthetics are also different (I like SimpleMind’s visual display, but you can’t capture a lot of detail; FreeMind lets you add lots of detail, but isn’t as pretty). And for the Android crowd, check out Thinking Space. Back to my business analytic example – now I have a one-page diagram that I can walk people through that illustrates a complex system in a simple way. So throw away your lists and scribbled notes; let’s get creative and do some mind mapping!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00279.warc.gz
CC-MAIN-2023-50
4,568
6
https://courses.cs.washington.edu/courses/cse373/09au/writtenhw-guidelines.shtml
code
Written Homework Guidelines For our written homework assignments, typed assignments are preferred. Handwritten will be accepted, but note that if the TA has a hard time reading your work, the TA will also have a hard time giving you a good grade. Writeups for programming projects must be turned in electronically, which means those must be typed anyway. Some problems on the written assignments ask you to give an algorithm to solve a problem. Unless the assignment specifically tells you to implement the code and run it, pseudocode is acceptable. Pseudocode means that you don't have to write every line in Java with correct syntax; English explanations of operations are acceptable. Note that the general rule you should follow is that you can substitute English for any O(1) operation, but not for more complex steps. Thus, the following would not be acceptable: while the following would be OK The idea is that you don't have to give all the nitty-gritty coding details (that's what the programming assignments are for), but you should demonstrate a clear understanding of what your algorithm does and where those nitty-gritty details would have to go. For the purposes of our homework, when in doubt, MORE detail is probably better than less detail. Another way of thinking of this is to say you should write your answer in code, but we won't be taking off any points for syntax. A common mistake for students to make is to use a phrase in a pseudocode answer that is too vague without realizing it. In the example above, actually defining a pseudo-variable is one way of being sure the reader (grader) can tell what you are incrementing - AND that your algorithm will compute the correct result! Computer Science & Engineering| University of Washington Seattle, WA 98195-2350 (206) 685-1934 voice, (206) 543-2969 FAX [comments to suciu]
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306335.77/warc/CC-MAIN-20220128182552-20220128212552-00093.warc.gz
CC-MAIN-2022-05
1,844
11
http://www.hltv.org/?pageid=18&threadid=153585
code
crosshair: cl_dynamiccroshair 1 crosshair: translucent 1 crosshair color: red and he got very very dark in cs^^ no problem, and low sens with mouseacceleration Probably use RInput aswell(search google and download if u have Windows 7, it removes negetive accelerations from the mouse, really nice tool)..
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710963930/warc/CC-MAIN-20130516132923-00039-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
304
6
https://www.bram.us/tag/javascript/page/68/
code
jwerty is a JS lib which allows you to bind, fire and assert key combination strings against elements and events. It normalises the poor std api into something easy to use and clear. jwerty is a small library, weighing in at around 1.5kb bytes minified and gzipped (~3kb minified). jwerty has no dependencies, but is compatible with jQuery, Zepto or Ender if you include those packages alongside it. Another great post by Stoyan Stefanov, who’s blog I suggest following/subscribing to. Social Button BFFs → FitVids.js is a lightweight, easy-to-use jQuery plugin for fluid width video embeds. FitVids automates the Intrinsic Ratio Method by Thierry Koblentz to achieve fluid width videos in your responsive web design. One of the most important parts of a game engine is the so called “game loop”. It is the central piece of the game’s engine and is responsible for trying to balance running a game’s logic, and executing its drawing operations The jQuery documentation is great, very complete, nicely written and with a lot of examples and demos. The only thing that bugs me is the way we have to find the right documentation for what we search for. Try to search for the .is() function for example. Over 100 matches before the actual function I am looking for?!*) And it is a fixed layout which means even on my big screen I have to scroll all the way down and have to scan for it. There have to be a better way, obviously. … and that’s where JQAPI comes in. Above that it’s also up-to-date, sporting the latest documentation (in contradiction to other, outdated sites).
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488536512.90/warc/CC-MAIN-20210623073050-20210623103050-00180.warc.gz
CC-MAIN-2021-25
1,589
7
https://pro.arcgis.com/en/pro-app/latest/tool-reference/tool-errors-and-warnings/001001-010000/tool-errors-and-warnings-01526-01550-001546.htm
code
Exporting tile cache for a specific area can fail for the following reasons: - The area represented by the feature with the object ID is outside the extent of the tile cache. - The spatial reference of the feature is different from the spatial reference of the tile cache and there is no geographic transformation available. Ensure that the extent of the feature intersects with the extent of the source tile cache. Create an appropriate custom transformation using the Create Custom Geographic Transformation tool from the feature's spatial reference to the spatial reference of the tile cache.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00002.warc.gz
CC-MAIN-2023-14
595
5
https://www.tronicsfixforum.com/t/ps4-controller-bad-soldering-help-please/10053
code
I replaced a joystick on my ps4 controller, since changing the potentiometer plates and cleaning that area didn’t help with the “stickdrift”. After soldering back the new joystick, both joysticks stopped responding when using them, after checking their condition trough “gamepad tester”, which showed that their are both going up/forward. Where did i go wrong? i made sure that the solder isn’t connecting to eachother, and the i made sure that the new joystick is fully connected to the circuitboard. Did i do a bad job when soldering? or did i maybe break something else? Would be great if someone could give me some conclusions on what went wrong, since i made it worse. FYI: im new to soldering. Here is a picture on how the soldering went, i’ve noticed that i might have burned it a little bit on the right side. The little brown square on the right used to have a little solder ball on it, i tried to solder one back, but the solder’ would’nt stick to it. But why does both joysticks not work or react anymore? and both of them goes up/forward. Could it be because of the little solder ball thats missing? i mean i don’t even know what kind of function it had.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00707.warc.gz
CC-MAIN-2023-23
1,186
10
http://stackoverflow.com/questions/9550803/access-a-mat-file-in-matlab-without-using-load-function
code
I have a struct (of matrices) in Matlab that has been saved on the harddisk. I currently use load to load these files inside my functions. Do you have any suggestions of doing this someother way that is much faster? (Yes, I can pass the struct as a variable to my function but that is not possible due to memory issues!). Thanks! This would be a great help! A = struct('local', randn(200000,14), 'usd', randn(200000,14), ... 'ttm', randn(180000,14), 'avg', randn(190000,14), ... 'ttm1yr', randn(190000,14), 'avg1yr', randn(190000,14)) ; save('A.mat', 'A') ; clear all;clc tic, load A.mat, A=A.local; toc %--> Takes 1.05 seconds
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298755.8/warc/CC-MAIN-20150323172138-00018-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
627
4
https://krq.iheart.com/featured/celina-martinez/content/2021-06-22-python-bites-zookeepers-face-caught-on-video/
code
I've seen "Anaconda" before and I never want to be near a snake because of it! Or remember "Snakes On A Plane"? Could you imagine being bit in the face by a python? Sounds terrifying, but not for this zookeeper who brushed it off as another day in the office! Read more about his story HERE!
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154304.34/warc/CC-MAIN-20210802043814-20210802073814-00008.warc.gz
CC-MAIN-2021-31
291
3
http://computrain.com/microsoft-office-classes/microsoft-sharepoint-classes-in-houston/microsoft-sharepoint-2013-site-administrator/
code
Microsoft SharePoint 2013 Site Administrator (Owner) Course Length: 2 Days Course Format: Instructor–Led and In-Person Course Hours: 9:00 a.m. – 5:00 p.m. Course Overview: In this course, you will learn how to create, configure, and manage a SharePoint Team Site so that your team or organization can share information and collaborate effectively. SharePoint content structures and configuration options are complex. Site owners must understand what features, options, and content structures are available in SharePoint, and how to properly configure them. With SharePoint sites, features, and content structures properly implemented, users will be able to securely share files, collaborate on documents, and access information they need to work with their colleagues more effectively. Target Student: This course is designed for existing Microsoft SharePoint site users who will create and manage a SharePoint site. Prerequisites: To ensure your success, the following CompuTrain courses or equivalent knowledge is recommended: - SharePoint 2013 – Site Member - Any or all of the courses in the Microsoft Office 2007, 2010, or 2013 curriculum. Upon successful completion of this course, students will be able to: - Create and configure new SharePoint sites. - Add document, asset, and wiki page libraries to sites and configure them. - Add and configure announcement, task, calendar, contacts, and custom lists. - Create and implement custom forms. - Configures Site Settings, site search, and site navigation. - Assign permissions and access rights to sites, users, and lists and documents. - Configure content roll-up, and finalize site configuration. Lesson 1: Creating a New Site - Create a Site - Change the Look and Feel of Your SharePoint Site Lesson 2: Adding and Configuring Libraries - Configure Document Library for Your SharePoint Team Site - Configure the Site Assets Library for Your SharePoint Site - Add and Configure a Wiki for Your SharePoint Site Lesson 3: Adding and Configuring Lists - Add an Announcement List - Add and Configure a Task List - Add and Configure Contact and Calendar Lists - Add and Configure a Blog Subsite - Add and Configure a Custom List to your SharePoint Site - Customize List Forms Lesson 4: Configuring Site Settings, Navigation, and Search - Configure Site Search Options - Configure Site Administration Settings - Configure Site Organization and Navigation Lesson 5: Assigning Permissions and Access Rights - Sharing Sites and Setting Site Permissions - Secure Lists, Libraries, and Documents Lesson 6: Configure Content Roll-up, Summary Links, and Site Map - Add and Configure the Content Search Web Part - Add and Configure the Relevant Documents Web Part Appendix A: Microsoft Office SharePoint 2013 Exam 77-425
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891886.70/warc/CC-MAIN-20180123091931-20180123111931-00321.warc.gz
CC-MAIN-2018-05
2,769
43
https://www.linkddl.com/link/ecogenetics-ppt
code
The EcoGenetics Lab is committed to research that not only helps us better understand our natural world, but also provides management solutions to complex environmental issues in a rapidly changing world.What is environmentecogenetics in R? EcoGenetics is an R package with infrastructure and flexible methods designed to make easier and faster the data analysis routines of population ecologists and geneticists. These routines usually involve a series of operations over multi-source datasets, that can be simplified in a set of functions. The package definesWhere is the ecogenetics lab at Deakin University? The EcoGenetics Lab at Deakin University is distributed across three locations including the Queenscliff Marine Station, Warrnambool campus, and Waurn Ponds campus.What is epigenetics in biology? 10. The term epigenetics refers to heritable changes in gene expression (active versus inactive genes) that does not involve changes to the underlying DNA sequence; a change in phenotype without a change in genotype. 11.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362918.89/warc/CC-MAIN-20211203182358-20211203212358-00558.warc.gz
CC-MAIN-2021-49
1,028
4
https://www.physicsforums.com/threads/particle-physicist.558251/
code
Hello! I'm currently a Junior, undergraduate Nuclear and Radiology Engineering major at Georgia Tech, and I'm wondering about what comes after graduation~ I was originally thinking about going into grad school and doing Fusion research, but the past few months I've been more and more interested in particle physics; My adviser told me it is possible to go into grad school for physics with an NRE degree (if I study my arse off for the GRE, that is), but I'm wanting to know if that's correct/actually doable. I've just about finished term one of Quantum Mechanics in addition to my regular NRE courses, and I'm signed up for Quantum II in the spring~ I've also been taking Mathematical Physics, which while not really teaching any physics has been teaching me the more in-depth mathematics that i haven't really used in my engineering courses. So...is it doable to go into grad school for particle physics with an NRE degree, and if so are there any specific supplement classes I should take in addition to Quantum? Opinions?
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868132.80/warc/CC-MAIN-20180527072151-20180527092151-00498.warc.gz
CC-MAIN-2018-22
1,027
1
https://www.vn.freelancer.com/work/decompile-exe-files-source-codes/
code
We have been using a Ubuntu 10.04 image for many years now in embedded systems. A disk with a working image on Supermicro A1SRi (In...provide full remote keyboard/video/mouse (KVM). The system also has a bootable Ubuntu 16 disk that can be selected in BIOS (which you can select via KVM) so that you can edit files in the non-booted Ubuntu 10.04 disk. Hello, We export wheat from Kazakhstan to Europe and neighbouring Asian countries. I am currently looking for buyers in Turkey as the demand for wheat from Kazakhstan is high. I need someone who is trustworthy and serious buyers with genuine intentions. In total: I am looking for 3 buyers from Turkey, who are willing to buy soft wheat in bulk for making bread. Min order: 5000 Metric Tonne. ... I have my admin panel for app and admin panel in laravel cms. I want a website and interconnect with my admin panel. I need a WordPress expert to place some ad codes in WordPress website using PHP hooks. Should have good knowledge over php, WP as the 5 ad codes will need to be placed without any plugin. Budget 10 USD. quick task instant award and instant feedback. I need Ludo, Rummy, Teen Pati game source code, if anyone have ready made then only contact me or msg me. *** PLEASE READ ALL AND ANSWER THE QUESTIONS BELOW *** I have a lot of unity code, if you want we can exchange My code list [đăng nhập để xem URL] Question: 1. Do you have a unity project, I will be interested in the list. 2. Do you want to exchange code with me Hi Already few codes have been developed for this project. There will a webpage..in that webpage user will upload [đăng nhập để xem URL] photos will contain insects images..You have to perform count analysis on the image and get the number of traps and also qrcode from that image..place that qrcode in the webpage and store the count of insects and exif data into Hi, Im looking for an expert to explain a few things about MySql and PhpMyAdmin + Accessing files remotely + editing files remotely in Ubuntu Server. I wish to receive an exe file that I can run in the windows command line and be able to type different commands in it to control the specified camera parameters: • Video mode (Image resolution) (might have values: 0 to 54. Most important is 50 - 1920x1080 RGB24 5.00fps) Notice: All the attributes modes that described below should be set to manual: Building company project 5 pages the usual with a contact us page for queries ...day! It must be ready, working and tested on Sunday Evening! Windows Program must be a simple (.exe) program for (light-version) Time & Accountability. INTRODUCTION Create simple (light-version) Time& Accountability Software for Windows. • Must be an .exe installation • Software must have an ADMIN Account • Software must have User-Accounts • Software ...Ask For Hike Final Price- 30000 Referance Site 1. [đăng nhập để xem URL] 2. [đăng nhập để xem URL] Its Have 3 Parts 1. online server/system 2. offline Exe 3. Android Aap External Exam:- this type of exam open for public anyone can access this type of exam by registering on website. Internal exam:- This type of exam access by specific I have two .dat files. They contains game data that I need to read and edit the data inside so I can carry on with my translation project. I did some research and questions on the net and got some feedbacks that it requires to have some sort of binary file structure or using its exe to read it. I am no programmer, I do not understand any of it in fact Preferably you are a 3D modeler or engineer familiar with 3D SLS printing You will receive 3D OBJ files intended for 3D printing, the products are designed (broken down) into many parts to fit inside 3D printer chambers which are later connected for assembly You will review and prepare them for 3D printing as follows: 1. Ascertain the measurements The project needs some upgradation like booking & billing management. Some errors are found which needs to fix and update. I need a website that is mobile friendly that enables me to accept payments for customers in certain zip codes. I will need a member portal too. I will also need ongoing support but this is not required of the person hired to build. Only if you are interested in ongoing hourly work. We have built our own ceph cluster with 5 storage nodes ( 34 osd each ), 1 salt master, 3 rgw, 3 igw, 3...1 gig drac management. We want to use RBD on and erasure coded pool presented via iscsi target for cluster access to our backup servers. Need assistance in creating erasure codes profiles and CRUSH map rule sets for solid and reliable performance. I will hire the best candidate for the video lesson.I would like to talk with you before hiring. ...to issue tariffs through the API of a flight metasearch. And also copy software to use for 3 diferent webpage scrap. ([đăng nhập để xem URL]) (i just have the .exe file, not the source code) The system should search for and capture the lowest fares (by filters) within the site, export the search display with details such as snippets, rates, departures i have vb.net source and have md5 hash to resolve captcha but it not working so i want to change md5 captcha part to captcha service like deathbycapthca or 2captcha.com. don't request more budget price for me. ...script, which encompasses several resolution-dependent tasks, such as resizing and moving windows. - One EXE that executes only one task: making an image display across the entire screen every 30 minutes. He has asked me not to upload these files for everyone to see, but if you need to see them, contact me and I'll send them to you personally. If I'm looking for someone to build an api/script that will take my order that gets placed in Whmcs IPTV portal /Xtreme codes and automaticly create the login and password for Xtreme codes and then send the customer thier activation login and password email so they can use my IPTV Service. I'm currently only reselling IPTV so I don't have access to this i need you to help me create the source code to access kinect using Delphi 7 or delphi xe5 the gospel of this project ia create source code with the exe apppication see this video for reference [đăng nhập để xem URL] Delphi human skeleton tracking, so i can get the 20 Human skeleton describe as shape1 until shape 20 or label1 untuk label20 ...for their 80 year celebration. I have 1 large .pdf files with old child photos that I will post into a major Windows Movie Maker presentation that will also contain modern photos. I wish the Freelancer will do the following. 1. Creates a Windows Movie Maker compatible movie of this movie in .pdf files. In this movie, the "camera" will move from image I have to build an app for android and ios with menu messages and notifications something that i could edit easily from Android Studio because it will be edited weekly and i want to mount a play button for an online radio i already have the online radio and the app but the app is too basic so i want someone to improve that ... We are Hipogeos Radio hello I am a student in master 2 security information systems in fact i need ...information systems in fact i need help for my end of studies project that is under the theme of attack on a connected car I have to do a simulation with ns3 software using c ++ source code ,for the money I can pay 60 USD is there anyone who can help me at this point ...portrait I want these two sites to be the main attraction...make most attention to them ( maybe make the two links into a Qr code or something...or make them all into QR codes...i dont care :P [đăng nhập để xem URL] [đăng nhập để xem URL] then at the bottom, i want a little box included for a list of "other recommended sites"
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217909.77/warc/CC-MAIN-20180821014427-20180821034427-00283.warc.gz
CC-MAIN-2018-34
7,750
27
https://fivenightsatfreddys.online/worm-hunt-snake-game-io-zone
code
Share Worm Hunt - Snake game iO zone via Or copy link Worm Hunt - Snake game iO zone is an online multiplayer snake game. You must eat as much food as possible to become the largest snake on the field. It seems simple enough. The game's worms were modeled after real insects. They look like garden worms. To get started, place a piece of newspaper near your Slitherio console. You can also place the paper on your desk. Place your forehead on the ground by bending down to your knees. Inhale deeply and close your eyes. Imagine that you are playing Slither.io alongside every pupil. You can play this game anywhere, anytime, with anyone, and in any circumstance. Even if you don't have the space to play the games in your home, this game can still be played. Slitherio is a game that you can play with someone else. Before you join their game, ask them questions. Have fun! If you like Worm Hunt - Snake game iO zone, check additional snake games for even more enjoyment. - Earn gold coins and gems for completing daily and calendar tasks; - Collect unique skins; - Improve your skills, collect bonuses and upgrade your worms; - Participate in themed and secret events with unique gifts and tasks; - The snake casual game can be played online and offline. - Move the MOUSE or your finger to direct the worm around the arena - Press the space bar or touch the screen to SPRINT
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653501.53/warc/CC-MAIN-20230607010703-20230607040703-00662.warc.gz
CC-MAIN-2023-23
1,375
11
http://forum.ajas.org.au/?f=6&t=766
code
Xenesis wrote:Strangely enough...it gave me about the opposite of how I actually planned to vote. A few people have said that, it happens when your preffered candidate didn't return the questionnaire. Mappy wrote:Indeed.... Why would they want to send your personal how-to-vote card via email or mobile, when they could just display the results on the screen for you? They do, it's on the next screen. Mel Gibson's remake of The Life of Brian is nowhere near as funny as the original. There are four autonomic responses, and they all start with F. Fright, fight, flight and making love. -Dr Karlhttp://edible-hat.livejournal.com/
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742981.53/warc/CC-MAIN-20181116070420-20181116092420-00468.warc.gz
CC-MAIN-2018-47
629
7
https://www.3cx.com/community/threads/forwared-calls-with-originating-callerid.48249/
code
Hope someone can throw me a bone... V15 Pro box... A Queue call gets answered by OperatorA who then forwards the call to OperatorB. If it's a blind transfer, the originating CallerID is displayed on OperatorB's handset and the call history on OperatorB's handset also shows the originating CallerID, great. It it's an attended transfer, OperatorA's extension shows on OperatorB's handset until the call is transferred through to OperatorB, then the display on OperatorB's handset will show the originating CallerID, again, great, however the history for this call shows not the originator's CallerID but OperatorA's. My client is asking if the history can show it as the originator's CallerID for both transfers. Any ideas ? ---------------- Handsets are Yealinks with uptodate 3CX compat firmware. The call logs within 3CX do show the originating CallerID as being the callee on the last leg of the call so it's possibly a Yealink issue.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825123.5/warc/CC-MAIN-20181214001053-20181214022553-00569.warc.gz
CC-MAIN-2018-51
938
1
https://www.csail.mit.edu/research?f%5B0%5D=%3A1&f%5B1%5D=%3A1&f%5B2%5D=%3A2&f%5B3%5D=%3A52&f%5B4%5D=%3A294&f%5B5%5D=%3A300&f%5B6%5D=%3A300&f%5B7%5D=%3A300&f%5B8%5D=%3A302&f%5B9%5D=%3A303&f%5B10%5D=%3A303&f%5B11%5D=%3A304&f%5B12%5D=impact_area%3A5&f%5B13%5D=impact_area%3A6&f%5B14%5D=impact_area%3A26&f%5B15%5D=research_area%3A11&f%5B16%5D=research_area%3A14
code
This CoR brings together researchers at CSAIL working across a broad swath of application domains. Within these lie novel and challenging machine learning problems serving science, social science and computer science. This community is interested in understanding and affecting the interaction between computing systems and society through engineering, computer science and public policy research, education, and public engagement. We develop techniques for designing, implementing, and reasoning about multiprocessor algorithms, in particular concurrent data structures for multicore machines and the mathematical foundations of the computation models that govern their behavior. We work on a wide range of problems in distributed computing theory. We study algorithms and lower bounds for typical problems that arise in distributed systems---like resource allocation, implementing shared memory abstractions, and reliable communication. We study the fundamentals of Bayesian optimization and develop efficient Bayesian optimization methods for global optimization of expensive black-box functions originated from a range of different applications. The Robot Compiler allows non-engineering users to rapidly fabricate customized robots, facilitating the proliferation of robots in everyday life. It thereby marks an important step towards the realization of personal robots that have captured imaginations for decades. Last week MIT’s Institute for Foundations of Data Science (MIFODS) held an interdisciplinary workshop aimed at tackling the underlying theory behind deep learning. Led by MIT professor Aleksander Madry, the event focused on a number of research discussions at the intersection of math, statistics, and theoretical computer science. This week it was announced that MIT professors and CSAIL principal investigators Shafi Goldwasser, Silvio Micali, Ronald Rivest, and former MIT professor Adi Shamir won this year’s BBVA Foundation Frontiers of Knowledge Awards in the Information and Communication Technologies category for their work in cryptography. When a power company wants to build a new wind farm, it generally hires a consultant to make wind speed measurements at the proposed site for eight to 12 months. Those measurements are correlated with historical data and used to assess the site’s power-generation capacity.This month CSAIL researchers will present a new statistical technique that yields better wind-speed predictions than existing techniques do — even when it uses only three months’ worth of data. That could save power companies time and money, particularly in the evaluation of sites for offshore wind farms, where maintaining measurement stations is particularly costly.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588398.42/warc/CC-MAIN-20211028162638-20211028192638-00440.warc.gz
CC-MAIN-2021-43
2,722
9
http://www.stat.yale.edu/~jay/TheGame/
code
My original article (with plot) in a special issue of the YDN, 11/17/2006. A new version of The Plot. The data: README file The data: CSV file (note: Excel sometimes converts fields to dates; use caution) The data: R ASCII structure (for use with dput() and dget()) An alternative plot created by Hao Zheng, Peking University.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578558125.45/warc/CC-MAIN-20190422155337-20190422181337-00387.warc.gz
CC-MAIN-2019-18
326
6
http://what-when-how.com/Tutorial/topic-6654l7tl/JasperReports-for-Java-Developers-194.html
code
<!-- Start 3D Pie Chart --> <chart evaluationTime="Report" isShowLegend="false"> <reportElement x="125" y="375" width="300" height="200"/> <!-- End 3D Pie Chart --> As we can see from this example, the JRXML element to create a two-dimensional pie chart is <pieChart> , and the JRXML element to create a three-dimensional pie chart is called <pie3DChart> . Just like all JRXML chart elements, these elements contain a <chart> sub-element. They also contain a <pieDataset> sub-element, which in turn contains the <dataset> element for the chart, a <keyExpression> sub-element, and a <valueExpression> sub-element. The <keyExpression> sub- element contains a report expression indicating what to use as a key in the chart. The <valueExpression> sub-element contains an expression used to calculate the value for the key. The values we see to the left of the equal sign in the chart label correspond to the <keyExpression> (aircraft model, in this case). The values we see to the right of the equal sign in the chart label correspond to the <valueExpression> (number of aircraft of a particular model, in this case). In this example, the aircraft model is used as the key. It is represented by the report field called model . The value to be used in the chart is the total number of aircrafts of that model, represented by the totalAircraft report variable. <pieChart> must contain a <piePlot> sub-element containing the chart's <plot> element. <pie3Dchart> must contain an analogous <pie3DPlot> element. Although <piePlot> has no attributes, <pie3DPlot> has a single optional attribute called depthFactor . This attribute indicates the depth (how 'tall' or 'short' the pie chart is) of the 3-D pie chart. Its default value is 0.2 .
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741578.24/warc/CC-MAIN-20181114020650-20181114042650-00206.warc.gz
CC-MAIN-2018-47
1,729
24
https://www.codecademy.com/resources/docs/python/dates/time
code
Published Jun 7, 2022 Contribute to Docs datetime.time() method returns a time in seconds that has passed since the epoch set on the computer. datetime.time(hour=0, minute=0, second=0, microsecond=0, tzinfo=None) The epoch is usually set as January 1, 1970, 00:00:00 (UTC) on most operating systems, excluding any leap seconds. The time can be retrieved and stored in a variable as shown below: Looking to contribute? - Learn more about how to get involved. - Edit this page on GitHub to fix an error or make an improvement. - Submit feedback to let us know how we can improve Docs. Learn Python on Codecademy Computer ScienceLooking for an introduction to the theory behind programming? Master Python while learning data structures, algorithms, and more! Includes 6 Courses With Professional Certification
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00797.warc.gz
CC-MAIN-2023-23
806
15
http://stackoverflow.com/questions/3790090/how-to-open-sql-compact-database-read-only
code
There is a SQL Compact v3.1 database that I want to quickly read. I'm doing this in python so I don't have access to managed code. I've noticed that if I use adodbapi the database file actually gets modified just by opening it. And sadly when I add 'File mode=Read Only' to the connection string I get a weird error. Here is the code I use to connect: import adodbapi adodbapi.connect('Provider=Microsoft.SQLSERVER.MOBILE.OLEDB.3.0; Data Source="awesome.sdf"; File mode = Read Only;SSCE:Temp File Directory=c:\temp\\;') And then I get the error message OperationalError: (com_error(-2147352567, 'Exception occurred.', (0, u'Microsoft OLE DB Service Components', u'Multiple-step OLE DB operation generated errors. Check each OLE DB status value, if available. No work was done.', None, 0, -2147217887), None), u'Error opening connection: Provider=Microsoft.SQLSERVER.MOBILE.OLEDB.3.0; Data Source="Awesome.sdf";File mode = Read Only;SSCE:Temp File Directory="c:\\\temp\\";') I added the SSCE because when I wrote a test program in C# it needed it. The following code works perfectly fine and doesn't modify the file when you do a simple SELECT query. conn = new SqlCeConnection("Data Source = awesome.spf; File mode = Read Only;SSCE:Temp File Directory=\"c:\\users\\evelio\\desktop\\\";"); conn.Open(); Thanks for the help,
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931005387.19/warc/CC-MAIN-20141125155645-00044-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
1,322
9
http://www.infoworld.com/article/2655651/security/the-security-grab-bag--is-treo-hacking-overrated-.html
code
I’ve been ranting lately about things that bug me. This week, I’ll cover a variety of topics that have nothing to do with one another other than my level of excitement. Elemental Security's co-founder and CTO, Dan Farmer, is making headlines again. Farmer is famous for his 1995 vulnerability scanner, SATAN (Security Administrator's Tool for Analyzing Networks). Its release ushered a new age of hacking and hacking defense. Dan’s always a good guy for a quote, and during SATAN’s release he told computer security defense vendors something along the lines of, “You’re not mad at me for releasing SATAN. You’re mad at me for releasing it for free.” His software, Elemental Compliance, is winning kudos and awards for its unique security approach, including a 2006 Technology of the Year award from InfoWorld. With Elemental Compliance, every managed computer acts like a nosy neighbor, looking for arbitrary applications, open ports, running processes, and the content of configuration files and registry database entries. It excels at rules-based access control defined by easy scripting language. As Farmer says, “We can map the way you talk and think about security.” Here are some examples of types of policies you can define with Elemental Compliance: -- West Coast clients running Kazaa cannot connect to our servers -- Send my Windows policy to my Windows machines in my Sales Active Directory group -- Block VPN users from accessing the corporate mail servers All of this is done through Elemental Compliance's clickable GUI. The product relies on an Oracle back end, an Apache/Tomcat server center, and a Python-like interpreted scripting language called Fuel. It works with Windows, Red Hat Linux, Solaris, AIX 5.2/5.3, HP-UX 11i, and Mac OS X (Panther and Tiger). I finally upgraded my aging, clunky cell phone with a new Treo 650. I don’t want to say that my old cell phone was ancient, but whenever I made a trip to Tokyo, I seemed to cause spontaneous laughter from friends and strangers whenever I pulled it out. Old tech is not the way to gain respect in the Land of the Rising Sun. Treo phones are probably second only to BlackBerries when it comes to customer loyalty. After buying one and using it during the past few weeks, I have to agree: The Treo 650 is a great all-around cell phone. I was especially excited to download dozens of free Palm OS-ready software programs and games to my Treo. As a professional penetration tester, I downloaded every pen testing and hacking tool I could find. I was delighted to learn that The Hacker’s Choice Hydra brute-force password-guesser program works with the Palm OS. I was also able to find war dialers, port scanners, Telnet programs, FTP servers, VNC, and several SSH tools. I put them all to the test -- go to my Security Adviser blog to see my Treo screenshots. My conclusions? Hacking from a Treo is more a gimmick than anything else. The software is slow and clunky. Interfaces are bare-bones -- you can’t fit a lot of buttons on the tiny Treo screen -- and what functionality is available is slow. Besides wowing my friends and CSOs by brute-force attacking their Telnet servers, why would I ever want to hack from my Treo? And budding small-form, mobile hackers should beware -- any scans will originate from your cell phone provider’s IP address space, which I’m sure can easily be correlated to your cell phone number. SANS Goes to College Established in 1989, the SANS Institute is one of the foremost computer security educational entities in the world. Its GIAC certification is one of the most sought-after computer security certifications, and the SANS leadership team continues to garner my respect. The SANS Technology Institute recently received a license to teach master’s level college classes in Maryland. SANS teaches two tracks and offers distance learning. Contact Stephen@sans.edu for more details. Bruce Schneier’s Crypto-Gram Newsletter I can’t say enough good things about this information resource. Bruce Schneier, CTO of Counterpane, produces what's probably the best general computer security newsletter in circulation today. Schneier’s Crypto-Gram Newsletter is a free monthly e-mail newsletter now available as a podcast. While Schneier is often seen by many as just a crypto expert, his insights across the industry and across the globe are revealing and dead-on. He can cut away the false sense of security from an issue and expose the real problem faster than any other expert I know. If you’re in the computer security field, do yourself a favor and read this newsletter religiously.
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607648.39/warc/CC-MAIN-20170523163634-20170523183634-00585.warc.gz
CC-MAIN-2017-22
4,625
18
http://direct.hostedredmine.com/projects/gantrex-evernote-technodyn
code
Evernote Techno-collaborative Dynamics Deployment project.¶ - Evernote: a tool designed to improve the world’s memory. It works across devices, different time zones, teams, and projects to create one workspace so every hour of the day becomes more productive. Over 200 million users, 70% of them use Evernote for their work. - Techno-collaborative: supported (not based) collaboration on a narrow selection of technological tools (cloud office suites, collaborative working environments, videoconference…). Characterized by rich functionality, easy operation and low price. - Dynamics = forces os processes that produce change inside a group or system; - Deployment = the use of something in an effective way - Project Type: Team Collaboration Manager: Rafa García
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370519111.47/warc/CC-MAIN-20200404011558-20200404041558-00303.warc.gz
CC-MAIN-2020-16
770
7
https://brainly.com/question/32924
code
So your trying to find the percentage, so the question is: now, you multiply, so 106 times 100 is 10,600 now we divide this number to 121.9 which gives you : 86.8852459016 So lets round off, to 87. because its closer. So, 87% would be your percentage. :D Hope i helped! :D
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00546-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
272
6
http://akarshsimha.xen.prgmr.com/deprecated.bas.org.in/
code
Welcome to the Bangalore Astronomical Society. We are a non-profit organization working for the promotion of astronomy as a hobby as well as a science in and around Bangalore, India. Our primary channel of communication is our very active Google Group. This is the place where all the astronomy discussion happens. Feel free to post your questions about the universe, astronomy, telescopes, star-gazing, observing, astrophotography etc. BAS has announced a certificate program for visual observers. Observe 55 of the Messier objects to earn a certificate! You may download logbooks designed specifically for BAS certifications for free. See the Logbook project for more details. Choose the A4 size to get the logbooks designed for BAS. BAS needs your help to grow! We are looking for volunteers to help with a series of workshops in July. Please do come forward and help make this happen! (June 2014) Young Bangalorean Santhosh Surendra attended the Texas Star Party 2014 held at the Prude Ranch, Texas, USA. He was the farthest attendee and won an award for his sketch of lunar craters, and also earned two observing pins for his deep-sky observations. BAS volunteers are proud to have mentored him at the astronomy workshop at Coorg. Six months after his first experience observing under dark skies at Coorg, he was already ready to observe from some of the darkest skies in the world. (December 2013) BAS conducted an astronomy workshop under the dark skies of Coorg. About 50 people observed and photographed the sky through about 25 telescopes! The trip produced some very good astrophotographs and some very deep observations, probably for the first time ever from Indian soil!
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991801.49/warc/CC-MAIN-20210515100825-20210515130825-00617.warc.gz
CC-MAIN-2021-21
1,683
7
https://dsp.stackexchange.com/questions/9165/multiple-filters-or-not
code
I'm processing audio signal sampled at 44.1 kHz. After some other processing, I need to filter the signal between ~5-50 Hz. Achieving this for a signal with such a high sampling frequency appears to be difficult. I would like the magnitude response to be nicely flat within the bass-band. No phase distortion is allowed. I'm using MATLAB toolbox fdatool for the filter design, FIR filter created with least squares approximation. After some testing, I found out I could get better magnitude responses if I first decimate the signal with some small factor, and then to do the final filtering. Is this a common thing to be done (how about in scientific research, I'm trying to do this the right way..)? All help appreciated. Your goal should be achievable. The key driver for the filter's complexity is the size of the transition band, which you haven't specified. If you can live with a slow rolloff, then you can use a relatively low order filter. If, as is more likely, you want to isolate the band from 5 to 50 Hz with relatively sharp cutoffs, then as you have started to discover, you will want to use a multi-stage approach. Instead of decimating by a factor of several hundred all at once, you decimate by a series small factors (something like 2, 4, or 8). By gradually decreasing the sample rate, you end up with filter designs that are much less complex. This previous question has a very similar aim to yours, only with slightly different filter specs and sample rate. You should be able to adapt the information there to your application. Yes, decimating first is the most common approach. I would do something like the following: Decimate x10: new fs = 4410, passband = 50 Hz, cutoff = 2205 (new Nyquist frequency) Decimate x10: new fs = 441, passband = 50 Hz, cutoff = 220 You could do more decimation or just leave it at that point. It should be relatively easy to get the filter characteristics you want at that point, and the computational load will be greatly reduced.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306181.43/warc/CC-MAIN-20220129122405-20220129152405-00320.warc.gz
CC-MAIN-2022-05
1,985
7
https://starlinkfree.com/elon-musks-starlink-will-change-the-world/
code
How Elon Musk’s Starlink Will Change the World Elon Musk is an innovator who is having a tremendous impact on the everyday lives of the people of planet Earth by bringing technologies to the forefront that are good for the environment and tremendously useful for people as well. While he has been busy preparing to blast the first people to Mars over at Space X and catapulting his auto company Tesla to the number 1 auto manufacturer in the world, it would be easy to assume he has little time for any other game-changing ideas or projects. That assumption would be wrong because Elon is not your typical billionaire CEO; he is a trail-blazer who takes little time for rest and according to his admission spends 90 percent of his time on research development of his world-changing ideas. A few years back, Musk introduced Starlink to the world, his vision was a satellite internet constellation orbiting the Earth that would bring low-cost high-performance internet to corners of the world that currently have little or no internet available. Let’s take a look at how this next-level tech is going to change the world for millions and bring the world wide web to the masses who currently have little access to it. So, here’s the facts you need to know about how Starlink is going to change the world. Hit that thumbs up button, subscribe, and ring the notification bell. For copyright matters please contact us at: [email protected] TECH BINGE brings you the latest in cool technology and innovation. New videos are uploaded every week so subscribe to this channel and STAY BINGED! ✅Subscribe for more amazing videos! ▶http://bit.ly/Subscribe-to-TechBinge◀ Videos are uploaded twice a week. Make sure to Subscribe and hit the Notification Bell to be notified when videos go live. ?Other Videos To Watch: ➡️TESLA CYBERTRUCK 2021 TOP 10 FEATURES ➡️10 COOL GADGETS TO BUY ON AMAZON 2021 ➡️10 COOLEST WORK FROM HOME GADGETS TO BOOST YOUR PRODUCTIVITY ➡️The World’s Technology in 2050 ➡️8 AMAZING INVENTIONS THAT ARE SAVING THE PLANET ⬇️Ask Me A Question ✅Remember to Subscribe to TECH BINGE! #Starlink #TechBinge #SpaceX .
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304760.30/warc/CC-MAIN-20220125035839-20220125065839-00607.warc.gz
CC-MAIN-2022-05
2,159
17
https://ecommerce-dev.do.staging-box.net/resources/review-reminder/user-manual-review-reminder
code
- Installing Review Reminder - Set up cron - Introducing Review Reminder - Extension Settings - Creating Rules - Mail Log - Tracking Review Reminder Performance Magento 2 Review Reminder sends automatic review reminders to purchasers in accordance with predefined rules and conditions. Store owners can determine the layout and content of each reminder, schedule reminders for concrete dates, assign them to particular product types, preview them before sending to shoppers, etc. The scheduled emails are managed from a separate grid. Compatibility: Magento Open Source 2.3.X - 2.4.X, Magento Commerce 2.3.X - 2.4.X Installing Review Reminder Command Line Installation - Backup your web directory and store database - Download the Review Reminder installation package - Upload contents of the Review Reminder installation package to your store root directory - In SSH console of your server navigate to your store root folder: run the following command: php -f bin/magento module:enable Aheadworks_ReviewReminder php -f bin/magento setup:upgrade php -f bin/magento setup:static-content:deploy 5. Flush store cache; log out from the backend and log in again Make sure the installation is done from the FTP administrator account. Otherwise, set 775 permissions to the store root directory after the extension is deployed. If you are installing an extension from Aheadworks for the first time, you need to add our composer repository to your Magento store: 1. Login to your ssh console and navigate to your store folder: Run the following command: composer config repositories.aheadworks composer https://dist.aheadworks.com/ After the command was executed successfully, you can use the composer to install the products. To install the extension: 2. Login to your ssh console and navigate to your store folder: 3. Run the following command to install the latest version of the extension: composer require aheadworks/module-review-reminder if you need to install a specific version, run this command: composer require aheadworks/module-review-reminder:<version> Specify the version of the extension in <version> When prompted, enter Public Key (Username) and Private Key (Password): Both Public Key (Username) and Private Key (Password) can be found in My Projects and Licenses in your personal account on our site: 4. Enable the extension: php -f bin/magento module:enable <Module_Name> Add the product name in <Module_Name> Next, register the extension: Recompile your Magento store if you are in the Production mode: To verify that the extension is enabled, run this command: Clean store cache, by running the following command: Log out and Log in the backend again. To upgrade the extension: 5. To update or upgrade an extension: Download the updated extension file. Take note of the module-name and version. Export the contents to your Magento root. If a composer package exists for the extension, run one of the following. Update per module name: composer update aheadworks/module-review-reminder Updater per version: composer require aheadworks/module-review-reminder:<version> Run the following commands to upgrade, deploy, and clean the cache. php bin/magento setup:upgrade --keep-generated Set up cron If you have already configured cron jobs for your Magento installation then you can skip this step. Read the following instructions on setting cron job for your Magento store: Magento user guide. Generally it would be enough to run in SSH console of your server: And insert the following line: */3 * * * * php -c <ini-file-path> <your Magento install dir>/bin/magento cron:run Don't forget to confirm saving request when exit. Introducing Review Reminder Review Reminder extension allows sending notification emails automatically at a set time after an order has been placed: - Product conditions; - Cart conditions; - Customer group conditions; - Rich text; - Mail log; - Mass actions. Review Reminder extension for Magento 2 in straightforward notification tool aimed at generating more product reviews by sending automatic email notifications. The workflow is simple. Every notification is send with a separate rule - a basic extension entity that controls when and on what conditions the notification is sent. When setting up an extension rule the storeowner defines: - Review reminder subject and text; - Delivery time - to deliver the notification after a set time the order has been invoiced and shipped; - Cart conditions - if order has been placed for a particular total or the parcel weight exceeds a set limit; - Customer conditions - including customer group and store view; - Product conditions - if order contains products of a particular color or set manufacturer. After the rule or a set of rules is created the extension starts tracking all orders placed. When order obtains 'Complete' status the rule, if conditions are met, schedules a review reminder. All scheduled and sent reminders can be found in the Mail Log, where they can be manually sent, cancelled or deleted. If customer writes a review before the reminder is sent - an email delivery is cancelled automatically, to prevent spamming customers with irrelevant messages. The extension allows sending review reminders automatically from a particular email address. To define the email address for sending notifications and test extension before going live, the storeowner navigates to the extension settings at Stores > Configuration > Aheadworks extensions > Review Reminder. There are following extension settings: - Sender - defines an email address all review reminders will be sent from; - Test Email Recipient - defines an email address all test review reminders will be sent to; - Enable Test Mode - defines if all review reminders should be sent to Test Email Recipient, which helps evaluating the reminder look and feel. - Keep Emails for, days - defines for how many days sent review reminders should be kept in the mail log. Once done with the settings the storeowner clicks on the Save Config button to apply any changes made. The rules are basic extension entities that control when and on what conditions the review reminders are sent. To create or edit a rule the storeowner navigates to Marketing > Review Reminder by Aheadworks > Rules. To add a new rule the storeowner clicks on the Add Rule button. The first section of the new rule defines basic rule attributes such as subject, content and internal name: - Enable - defines if the rule is enabled. Disabled rules cannot sent review reminders; - Name - defines the name of the rule for internal identification purposes (not visible to customer); - Subject - defines a subject of a review reminder; - Content - allows the storeowner type in the reminder content. The content can be edited with the help of What You See Is What You Get (WYSIWYG) editor, featuring rich text, variables, media etc. After the content is created the storeowner can either preview how the reminder will look like by clicking 'Preview' button. Or send test email to the Test Email Recipient by clicking 'Send test email'button. Next, the storeowner decides when a reminder should be delivered. The review reminders are scheduled upon order obtaining 'Complete' status. Meaning that the reminder will be sent after a time set in the Send field upon order being invoiced and shipped. Then the storeowner decides on what conditions the review reminder is sent. There are five types of conditions that work together: - Store View - defines for what store view the rule is active; - Customer Groups - defines to what customer groups the review reminder is sent; - Cart Conditions - defines what items should be orders for the review reminder to trigger, including total, shipping region, payment method; - Product Conditions - defines products with what attributes should be ordered for the review reminder to trigger, including manufacturer, product category, color; - Product Type - defines what types of products should be ordered for the review reminder to trigger. Once every rule option is set the storeowner clicks 'Save' button. The review reminders will now be sent to all customers with orders matching the conditions set after a defined time. All scheduled, sent and delivered review reminders can be tracked in the Mail Log. To get to the Mail Log the storeowner proceeds to Marketing > Review Reminder by Aheadworks > Mail Log. The Mail Log grid comes with the following interactive elements: - Columns button allows customizing the grid look by hiding, applying columns. Some columns may be excessive and some relevant to the current tasks; - Filters button allows looking for particular review reminders depending on the filters selected; - Default View button allows saving the perfect grid look to quickly load it whenever required. In addition in the column 'Action' the storeowner can select what should be done with selected reminders including: - Preview - opens a review reminder as an email; - Cancel - cancels scheduled review reminders; - Delete - deletes a review reminder from the Mail Log; - Send now - sends selected review reminders instantly to customers. Tracking Review Reminder Performance For the performance tracking and understanding how many customers left a review after a reminder the extension introduces Orders and Reminders section that can be accessed via Marketing > Review Reminder by Aheadworks > Orders and Reminders. The section comes with the same interactive elements as does the Mail Log. Here the store owner can get an order and customer reference of a particular reminder and see if the review has been left yet. You can always find the latest version of the software, full documentation, demos, screenshots, and reviews on http://aheadworks.com License agreement: https://aheadworks.com/end-user-license-agreement Contact Us: https://aheadworks.com/contact Copyright © 2021 Aheadworks Co. http://www.aheadworks.com
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710931.81/warc/CC-MAIN-20221203111902-20221203141902-00652.warc.gz
CC-MAIN-2022-49
9,898
117
http://onsitepcsolution.com/error-in/solved-error-in-createouiprocess-2.php
code
And I'd get to the heatsink with all the thermal paste. Then what is the most efficient i assume its a new QuickCam? Must be reasonable priced, a good brand, andno effect on the laptop.Thanks Argylite Well,random automatic reboots of my machine. I have 2 computers, 1 is hard to explain clearly, but here goes... If you got an awesome budget than 2 http://onsitepcsolution.com/error-in/help-error-in-createouiprocess-193.php tv, i dont hear any sound. createouiprocess Don't set a percentage limit, just push it the proc, video card and power supply. After about 2 min, it froze again and 2 upgrading my power supply. Thoughts? 10% the old white one? So I start by taking the motherboard newegg.com. OK, here's my biggest issue right now. Did you try reverting to in pins and didn't see any..If by static you mean a fuzzy picture. The only I would get the 8800GTX or 8800Ultra. But my question is, is a small overclock. Hi, I havea g92-based nvidia card. 3. Error In Createouiprocess() 5 Christmas is coming so it wouldn'tare a waste of money.I checked for benta free External HD! and tab, but nothing worked.This is kinda long and might be Error In Createouiprocess() 1260 whole thing froze up.Buy ATI and all to try and fix it. For now I would recommend taking a look atoff and restarted. So i continue on by swapping outbunch of paste too...Do you have any suggestions? ...button until it shut down.The audio began freezingas far as you can without overheating it.I wouldn't worry check over here booted back, same blank screen. As long as you keep it thing I'll use it as an external HD.But to be honest theycpu or ram or something? Notice it covers most is some sort of stand-by Win-XP problem.If your budget is OK but limitedgraphics cards for their price. If no extensive damage or cooling option to boot into safe mode. As for the games running DX10 only DX10want to know if I should consider DX10.1.I tried pressing both delI can attach them as from a store thats safe to buy from. So if I actually decide to retire this createouiprocess problem with the headphone jack.But, when i turn on i don't know what sound card i have. More paste does not mean better heat transfer so just use a smear. the Oracle Universal Installer Error In Createouiprocess():5 one then static is inevitable.I am sending my motherboard in for repairs Try attaching an external monitor. I set it all http://onsitepcsolution.com/error-in/solved-error-in-createouiprocess-5.php while, thne it stopped again.What is the highest-bitrate, http://orafapp.blogspot.com/2013/11/error-in-createouiprocess-13.html for laptop that is good for gaming, surfing the web, and watching movies.This time it gave me the error question is regarding programs and codecs as well which one is better supported ?That seemed to have createouiprocess a gateway the other a dell.. It worked for a all depends on your budget. That would be a good troubleshooting idea. Error In Createouiprocess() 216 be too bad of an idea.This leads me to believecool it should last for years.It's got a pretty could, cause many of them didnt allowed me to install them. If its the old whiteup and power it on.I eventually held the powerI basically manhandles the thing off?I'm buying new graphics cards, and Ithat it is a hardware malfunction.After that, theto resolve this problem? It turns on but there is no video this content solution i can offer are the latest drivers from ATI site.I am having issues witha zip archive immediately on request.Forget it and get DX10.1 card (nvidia or ati). Any recommendations on how Oracle Error In Createouiprocess() your previous RAM configuration ? Oh yes, the way to play that content: 3. Should I be worried thatmost cpu-consuming BD/HD content 2.Just like 10% on my system will only accept a PCI based video card. You might try swapping memory and reinstall Windows Those isay a DX7 game it will run in DX7. The clean all the muck off and have they improved this? Also, the CPU is pretty much gluedobsolete long before it burned out. 2 They are VERY fast Preparing To Launch Oracle Universal Installer From /tmp/orainstall hard drive and got the same results. error I have no disks to install drivers and 2 speaker since my brothers didnt have one. Here are some examples: http://www.newegg.com/Product/Product.aspx?Item=N82E16814161010R or http://www.newegg.com/Product/Product.aspx?Item=N82E16814145136 Im looking your motherboard has probably gone belly up. Thanks in advance! Chances are that yourabout the lifespan issue. Took out the battery, and the light on the monitor is amber.There seems to be athick coat on it. Or is it system is needed, i figured y not? Wait for a better createouiprocess a Toshiba Satellite M55-S329. I turned itI had to hold the power button to restart. I opened it up and but cant hear tv and microphone. I've also tried booting with a different of the power supply. I'm hoping someone than I would recommend the HD3870 or 8800GT. But to be honest it games will run in DX10 and under Vista.Chances are it would become from the same issue? Music and modem sounds are ok, replace it with fresh heat transfer paste. I'm thinking of My laptop began acting strangely yesterday. If you see the same blank screen, and cutting in and out.My first guess and hope was this get DX10.1 2.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826145.69/warc/CC-MAIN-20181214162826-20181214184826-00126.warc.gz
CC-MAIN-2018-51
5,298
19
http://bioperl.org/pipermail/bioperl-guts-l/1999-August/000987.html
code
Bioperl-guts: Thoughts on GeneBank location descriptors Tue, 24 Aug 1999 15:18:40 +0100 (BST) On Tue, 24 Aug 1999, Zia Khan wrote: > For one of my GeneBank related features, I'm adding support or > GeneBank/EMBL style feature location descriptors (not simply start and > end). Has there been any discussion on the list on how to go about dealing > with them? I have some code worked out (yet to be debugged arrgh...). That > allows you to extract spans of sequence based on these location > descriptors (join(), complement(), order(), 23..3828, etc.). The SeqFeature system that is currently in place on the cvs head handles it as follows: a join(xx,yy,zz) maps to a seqfeature(start = xx.start, end = zz.end) with subseqfeatures at The benefit of this system is that we can provide a decent representation using "simple" ranges of these complex features. This scheme is mapped out in the AnnSeqIO/FTHelper code. I would strongly recommend you browse around the AnnSeqIO/EMBL.pm and AnnSeqIO/FTHelper code to see how I wrote it with the EMBL feature table. The FTHelper module should be reused in the (putative) AnnSeqIO/GenBank.pm module, which we haven't written yet, but someone at the EBI is planning to have a stab at. I am rather worried that your work is not dovetailing with the AnnSeq and AnnSeqIO system, which would mean we would have two different ways of representing features in the Bioperl package, which would be bad news. Can you send the guts list an outline of what you have been doing? Or possibly send hte list or me the code you have been working on? This way we can figure out how it can fit in. I don't want to have to spend a while untangling your stuff or changing my stuff because we didn't talk things through clearly beforehand. But it is great that you are doing this. Keep it up! > Zia Khan > Carnegie Mellon University > =========== Bioperl Project Mailing List Message Footer ======= > Project URL: http://bio.perl.org > For info about how to (un)subscribe, where messages are archived, etc: =========== Bioperl Project Mailing List Message Footer ======= Project URL: http://bio.perl.org For info about how to (un)subscribe, where messages are archived, etc:
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701145519.33/warc/CC-MAIN-20160205193905-00199-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
2,192
39
https://en.thilmera.com/project/UOMapistro/page-help-25
code
Unable to connect to location sharing server We do not accept questions about not being able to connect to the location sharing server. The reason is that it's not a software problem. Please check the following. ・Do you have a single global IPv4? If you have a shared global IPv4-only line or only IPv6, you cannot host. ・Port not free or UPnP failing If you use UPnP and it does not start correctly, you need to manually open the corresponding port on the router. This is general networking knowledge, so search for "port opening" to find out. UPnP is not accepted by some routers, but this is also a problem that depends on the environment. In addition, lines that only offer shared global IPv4 are not authorized to do UPnP in the first place. ・Using private network addresses The IP starting with 10.*.*.*, 172.*.*.*, 192.168.*.*, is a private IP address (connection destination in the network up to the router in your home). If you do not specify a single global IP address, you cannot connect from the outside. ・Access failed and temporarily blocked Wait for a while and try to reconnect. If you hit repeatedly, the block time will be extended extra. ・Source IP is blacklisted Please contact your host.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100599.20/warc/CC-MAIN-20231206130723-20231206160723-00668.warc.gz
CC-MAIN-2023-50
1,218
19
https://elementoutpost.com/bluehost-tel/
code
Finding a high-quality cheap host company isn’t easy. Every website will have different needs from a host. And also, you have to compare all the functions of a hosting company, all while looking for the most effective offer possible. This can be a whole lot to type with, specifically if this is your very first time acquiring hosting, or constructing a web site. Most hosts will certainly use very inexpensive introductory pricing, only to raise those prices 2 or 3 times higher once your initial call is up. Some hosts will certainly provide free bonuses when you join, such as a cost-free domain, or a free SSL certification. While some hosts will certainly be able to supply far better performance and also high degrees of security. Bluehost Tel Listed below we dive deep right into the very best inexpensive webhosting plans out there. You’ll discover what core hosting attributes are essential in a host and also exactly how to analyze your own holding requirements to make sure that you can pick from one of the most effective affordable holding providers below. Disclosure: When you acquire a webhosting package through web links on this page, we earn some payment. This aids us to maintain this site running. There are no extra prices to you at all by using our web links. The listed here is of the best inexpensive host packages that I have actually directly used as well as examined. What We Think about To Be Inexpensive Web Hosting When we describe a host bundle as being “Affordable” or “Spending plan” what we mean is hosting that falls into the cost brace between $0.80 to $4 per month. Whilst investigating cheap holding providers for this guide, we took a look at over 100 various hosts that fell under that rate range. We then examined the top quality of their cheapest holding package, value for money and also customer support. In this short article, I’ll be reviewing this first-rate web site holding company and also stick in as much appropriate information as feasible. I’ll go over the attributes, the prices choices, as well as anything else I can consider that I assume could be of benefit, if you’re determining to register to Bluhost and obtain your web sites up and running. So without additional ado, allow’s check it out. Bluehost is just one of the biggest webhosting firms worldwide, obtaining both large advertising support from the company itself as well as associate marketers that advertise it. It really is a substantial firm, that has actually been around for a long time, has a large online reputation, and is most definitely one of the top choices when it concerns webhosting (most definitely within the leading 3, at the very least in my publication). However what is it exactly, and also should you get its solutions? Today, I will certainly address all there is you require to recognize, offered that you are a blog owner or a business owner who is trying to find a webhosting, and does not recognize where to get started, since it’s a fantastic remedy for that audience as a whole. Let’s imagine, you want to hold your websites as well as make them noticeable. Okay? You already have your domain name (which is your website location or LINK) but now you want to “turn the lights on”. Bluehost Tel You require some organizing… To achieve all of this, and to make your site noticeable, you need what is called a “web server”. A web server is a black box, or gadget, that keeps all your website data (data such as pictures, texts, video clips, web links, plugins, and other details). Now, this server, needs to get on at all times as well as it needs to be linked to the internet 100% of the time (I’ll be discussing something called “downtime” later). On top of that, it also requires (without getting too fancy and also right into information) a file transfer protocol typically known as FTP, so it can show internet browsers your internet site in its desired form. All these things are either expensive, or call for a high degree of technical ability (or both), to develop as well as preserve. And also you can absolutely go out there and discover these things on your own and also established them up … however what concerning as opposed to you getting as well as keeping one … why not simply “renting organizing” rather? This is where Bluehost is available in. You rent their servers (called Shared Hosting) and also you release a site using those web servers. Given that Bluehost keeps all your data, the business likewise allows you to set up your web content management systems (CMS, for short) such as WordPress for you. WordPress is a super preferred CMS … so it simply makes good sense to have that option readily available (nearly every hosting firm currently has this choice as well). In other words, you no more need to set-up a server and after that incorporate a software program where you can construct your material, separately. It is already rolled into one package. Is it secure to have Bluehost deal with your internet sites? Well … picture if your web server remains in your residence. If anything were to happen to it whatsoever, all your data are gone. If something goes wrong with its inner processes, you require a technician to repair it. If something overheats, or breaks down or gets damaged … that’s no good! Bluehost takes all these troubles away, as well as cares for everything technological: Pay your web server “rent”, as well as they will certainly deal with every little thing. And also once you buy the solution, you can then begin concentrating on including material to your internet site, or you can place your effort into your marketing projects. What Provider Do You Receive From Bluehost? Bluehost supplies a myriad of different solutions, yet the primary one is hosting certainly. The hosting itself, is of different kinds by the way. You can rent a common server, have a dedicated server, or also an onlinepersonal web server. For the purpose of this Bluehost review, we will certainly focus on holding solutions and various other services, that a blogger or an on-line business owner would certainly need, as opposed to go too deep into the rabbit opening and also talk about the various other services, that are targeted at even more knowledgeable people. - WordPress, WordPress PRO, and ecommerce— these hosting services are the plans that permit you to host a site using WordPress and also WooCommerce (the latter of which permits you to do shopping). After purchasing any one of these packages, you can begin developing your site with WordPress as your CMS. - Domain Industry— you can likewise acquire your domain name from Bluehost rather than various other domain name registrars. Doing so will certainly make it less complicated to direct your domain name to your host’s name web servers, given that you’re using the very same industry. - Email— as soon as you have purchased your domain, it makes good sense to likewise get an e-mail address connected to it. As a blog writer or on the internet business owner, you should practically never make use of a free e-mail service, like Yahoo! or Gmail. An e-mail like this makes you look less than professional. The good news is, Bluehost gives you one for free with your domain. Learn More About Bluehost Tel Here -> Bluehost likewise uses dedicated servers. As well as you may be asking …” What is a dedicated server anyhow?”. Well, the important things is, the basic web hosting bundles of Bluehost can just so much traffic for your internet site, after which you’ll need to upgrade your holding. The factor being is that the common web servers, are shared. What this suggests is that a person server can be servicing two or even more sites, at the same time, among which can be yours. What does this mean for you? It implies that the solitary web server’s resources are shared, and also it is doing multiple tasks at any type of given time. As soon as your website begins to strike 100,000 site gos to each month, you are going to need a dedicated server which you can also get from Bluehost for a minimum of $79.99 per month. This is not something yous needs to bother with when you’re beginning but you need to keep it in mind for sure. Bluehost Pricing: How Much Does It Expense? In this Bluehost review, I’ll be concentrating my interest primarily on the Bluehost WordPress Hosting plans, because it’s the most preferred one, and most likely the one that you’re searching for and that will suit you the very best (unless you’re a big brand, firm or site). The three readily available strategies, are as adheres to: - Fundamental Plan– $2.95 monthly/ $7.99 normal rate - Plus Plan– $5.45 per month/ $10.99 normal price - Choice Plus Plan– $5.45 each month/ $14.99 normal price The very first price you see is the cost you pay upon join, and also the second cost is what the cost is, after the very first year of being with the business. So primarily, Bluehost is going to charge you on a yearly basis. As well as you can likewise pick the amount of years you intend to hold your website on them with. Bluehost Tel If you select the Standard strategy, you will certainly pay $2.95 x 12 = $35.40 beginning today and also by the time you enter your 13th month, you will certainly now pay $7.99 monthly, which is additionally charged each year. If that makes any type of feeling. If you are serious about your site, you must 100% get the three-year choice. This suggests that for the fundamental strategy, you will certainly pay $2.95 x 36 months = $106.2. By the time you hit your 4th year, that is the only time you will pay $7.99 per month. If you think of it, this approach will save you $120 during three years. It’s very little, but it’s still something. If you wish to obtain greater than one internet site (which I extremely recommend, and if you’re severe, you’ll most likely be getting more eventually in time) you’ll intend to make use of the choice plus plan. It’ll allow you to host endless internet sites. Learn More About Bluehost Tel Here -> What Does Each Strategy Deal? So, when it comes to WordPress organizing plans (which resemble the common hosting plans, but are extra tailored towards WordPress, which is what we’ll be concentrating on) the attributes are as complies with: For the Standard strategy, you get: - One website just - Guaranteed website using SSL certification - Optimum of 50GB of storage space - Complimentary domain for a year - $ 200 advertising and marketing credit history Bear in mind that the domains are bought independently from the hosting. You can obtain a complimentary domain name with Bluehost here. For both the Bluehost Plus hosting and also Choice Plus, you obtain the following: - Endless number of websites - Free SSL Certificate. Bluehost Tel - No storage space or data transfer restriction - Complimentary domain name for one year - $ 200 marketing credit report - 1 Workplace 365 Mailbox that is totally free for one month The Choice Plus plan has an included benefit of Code Guard Basic Back-up, a back-up system where your data is saved and replicated. If any accident happens and your internet site information vanishes, you can restore it to its initial type with this feature. Notification that even though both plans cost the very same, the Option Plan after that defaults to $14.99 each month, normal cost, after the collection quantity of years you have actually selected. What Are The Perks Of Using Bluehost So, why pick Bluehost over various other webhosting services? There are hundreds of host, most of which are resellers, however Bluehost is one pick couple of that have actually stood the test of time, and it’s probably one of the most popular around (and also completely factors). Below are the 3 main benefits of picking Bluehost as your host company: - Web server uptime— your site will not show up if your host is down; Bluehost has more than 99% uptime. This is very essential when it concerns Google SEO and also positions. The higher the much better. - Bluehost rate— just how your web server action establishes how quick your website reveals on an internet browser; Bluehost is lighting fast, which indicates you will certainly reduce your bounce price. Albeit not the very best when it concerns loading speed it’s still extremely crucial to have a fast rate, to make individual experience far better and also far better your ranking. - Endless storage— if you get the Plus strategy, you need not fret about the amount of files you keep such as video clips– your storage capability is unrestricted. This is actually important, due to the fact that you’ll possibly encounter some storage concerns later on down the tracks, and also you don’t desire this to be a hassle … ever before. Lastly, consumer support is 24/7, which suggests despite where you are in the globe, you can get in touch with the assistance group to repair your internet site concerns. Pretty basic nowadays, however we’re taking this for given … it’s likewise very important. Bluehost Tel Also, if you’ve obtained a complimentary domain name with them, after that there will certainly be a $15.99 fee that will be deducted from the amount you initially bought (I imagine this is because it sort of takes the “domain out of the market”, unsure regarding this, however there probably is a hard-cost for registering it). Lastly, any type of demands after thirty days for a reimbursement … are void (although in all honesty … they should most likely be strict right here). So as you see, this isn’t always a “no questions asked” policy, like with a few of the various other holding alternatives available, so make certain you’re okay with the plans prior to continuing with the hosting.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363641.20/warc/CC-MAIN-20211209000407-20211209030407-00421.warc.gz
CC-MAIN-2021-49
13,832
84
http://comixtalk.com/node/18271
code
Hi to COMIXtalk Submitted by Graptopetalum on October 21, 2008 - 16:32 Well, if this works this blog will now be viewable on COMIXtalk This is related to PixelPalaces pressents: Dragon Knights, which is one of the more technically ambicious comics and hopefully also has a good artwork and story (feedback would be nice people). AFAIK it's the only major action comic mostly in the SVG format. SVG is similar to SWF (Flash) but is a non-propriatory open standard. It's now natively supported by most browsers except Internet Explorer (which still needs a plug-in to display SVG). I'm trying to make full use of SVG's features, using gradients and filters to make the vector graphics look more like bitmaps, and using interactivity and bits of animation. Unfortunately browsers and plug-ins are inconsistent in how well they handle this but things are improving rapidly. I'm also making an effort to produce this comic as much as possible with free software - mostly Inkscape. Part IX is still in production and will be a 3D animation produced in Blender. Unfortunately this means that updates are rather slow at the moment. Part X is an XHTML page sumerizing the story to date. I'm doing this to have some updates between the part IX updates. Part XI will be back to SVG but with stylistic improvements. The story is unusual in that it's about superheroes but set in the 22nd century (so far). The Earth has been plunged into an ice age and most people have super powers due to nanotechnology. There are also some ominous aliens. I try to tackle controvertial subjects and keep things scientifically accurate.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700107557/warc/CC-MAIN-20130516102827-00037-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,609
9
https://forums.adobe.com/thread/141702
code
I have created a number of V2 components. Each of them has a certain number of inspectable properties that can be modied via the When I change any of them, the component is invalidated, regardless of whether there is an invalidate(), redraw() or draw() call. What's more, the draw() function within the component is called 2 times.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155634.45/warc/CC-MAIN-20180918170042-20180918190042-00087.warc.gz
CC-MAIN-2018-39
331
6
https://vzcfleet.zendesk.com/hc/en-us/articles/360010851759-Understanding-InSight-Alerts
code
InSight Alerts™ notify you, in real time, when a vehicle does something special or unexpected. For example, you may want to get a heads-up when a vehicle is due for routine servicing, be notified when a vehicle breaks a rule such as exceeding the speed limit, or get a notification as soon as a vehicle arrives at its scheduled destination. These notifications appear automatically in your InSight Alerts Inbox. In addition, you can also configure the system to send an email message or notification to a text-enabled device such as a pager, cell phone, or desktop computer when the alert occurs so that the appropriate people in your organization are informed immediately. Set Up an InSight Alert - Log into the platform at https://login.telogis.com/. - Choose Setup InSight Alerts under Tasks in the navigation bar to the left of your screen. - Click the Create button. - Select an alert type and click OK. The InSight Alerts setup screen for the type of alert opens. - Specify the details for the alert: - Parameters - This tab contains general information regarding the alert, such as after how many minutes to trigger the alert, what severity it has and in which color to display the alert. There are also specific settings that can be configured for the selected alert type. - Email Options - This tab lets you specify what emails should be sent when the condition for the alert is met. You can also specify who will receive the emails, and whether the emails should be sent when the alert triggers or when the alert ends. - Push Notification Options - This tab lets you configure the alert so that a notification will appear in the notification tray on your mobile device. The notification is sent to the currently logged in user, as well as to all subuser accounts with roles added to this alert on the Roles tab. - Pop-up Options - This tab lets you configure the alert so that a pop-up window appears on screen when the alert triggers. This pop-up window appears on whatever screen you are viewing, so that you do not need to check the InSight Alerts Inbox to see that the alert has triggered. - Roles - This tab lets you define the list of users to share the alert with. - Schedule - This tab lets you specify when an alert is in effect. When an alert is not in effect, the system does not check for the condition that defines the alert. This can be useful; for example, if you want to be notified when a vehicle arrives at its destination after hours: simply set up a marker alert to only trigger during off-hours. When you have finished, you can view the InSight Alerts Inbox by choosing InSight Alerts from the Main section of the navigation bar.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371861991.79/warc/CC-MAIN-20200409154025-20200409184525-00409.warc.gz
CC-MAIN-2020-16
2,662
16
https://developer.zebra.com/thread/36545
code
Looking for a way to name multiple devices easily using StageNow. Currently the best/only way I've found to do this is to create a separate StageNow profiles for each device and use the HostsMgr to set the name for each of them. This is entirely too cumbersome, and I need a better way. (n.b. Doesn't have to be StageNow, but my research tells me that's the only way I can rename the devices.) Note: Using a TC8000
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385378.96/warc/CC-MAIN-20210308143535-20210308173535-00024.warc.gz
CC-MAIN-2021-10
414
4