url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.netways.de/blog/tag/command/
|
code
|
This week I will take a little look into three command line tools which I find very nice for daily use on a server where we have almost no interface except the command line.
The first tool I would like to bring to your attention is a file explorer for the command line.
Ranger is a finder/explorer/nemo/nautilus replacement for the command line with a simple but straight forward file management approach. It uses the almost everywhere liked miller columns and i personally like it more than the midnight commander but that is a personal preference.
I also like the extensibility as an example you can extend ranger with poppler for pdf support or mutool whatever is available for your distro.
It can be easily installed and can be just started from it’s own directory so no big installation fuzz. Simply unpack and start ranger.
“How to run cmd as different user?” I type into Google. When I search for full sentences instead of just keywords I must be very desperate. Violet links everywhere, I feel like I have tried everything and nothing works. What I want is something like “su”, temporarily changing the current user sounds like a very important thing to be able to do when one administrates Windows. So why is it not that simple?
There is a command called “RunAs”, sounds good, right? Just give the user and command you want to use and you are set! Just make sure you have the right permissions. But problems start with the username since Windows is localized. Sometimes English names work, sometimes you need to use “NT-AUTORITÄT\Netzwekdienst” instead of “NT AUTHORITY\Network Service”. RunAs is one of the latter. Except all of this does not matter since you need a password and system accounts tend to not have one. Bummer.
Without knowledge of Windows inner workings, I blame the lack of quality free material on the topic, I’m left to googling around until I find a 10 year old blog post or forum entry which solves the exact problem I’m having. And I did find something, it’s not even that old. PsExec is a tool which does exactly what I want! So I install the package, edit my path, run the program… and it just works! With English usernames even. (After I used the -accepteula flag, because for some reason it would not work without when running the first time).
Working with Windows often feels to me like piloting a military submarine, not because it’s so advanced, but because I often have no idea what I am doing, the manual is in Russian and clicking the wrong button may or may not make a large strip of land uninhabitable for decades. Trial and error seems to be the way to go for most problems and that’s frustrating. So I hope if somebody else finds themselves in the unknown waters of the Windows user system, this blog post can help.
Komische Sache: Ich bin seit einem Jahr Apple User und habe mich noch nie gefragt, was dieses komische Symbol auf der Command/Apple Taste eigentlich bedeutet. Aber jetzt habe ich zufällig im ApfelBlog dieses Bild gesehen, bin den Links ein bisschen gefolgt und in der Wikipedia wirds erklärt:
Ursprünglich hatte die Taste ein Apple Logo enthalten, aber Steve Jobs wollte nicht so viele Apple Logos an den unterschiedlichen Stellen verwenden. Da wohl eine Deadline bevorstand, hat die Tastaturdesignerin verschiedene Logobücher durchwälzt und dabei dieses Symbol gefunden. Es stammt aus Skandinavien und weist dort auf eine besondere touristische Attraktion hin. Da es den anderen Leuten im Team gefiehl, wurde es das Comman Logo auf dem 1984er Macintosh.
Mich erinnert es am ehesten noch an ein Autobahnkreuz.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584519757.94/warc/CC-MAIN-20190124080411-20190124102411-00108.warc.gz
|
CC-MAIN-2019-04
| 3,611
| 12
|
https://forums.macrumors.com/threads/no-dock-frozen-desktop-please-help.334179/
|
code
|
Hey. Alright well I have searched and searched this forum and many others and can't seem to find a solution. The Problem: Yesterday the dock just quit popping up, so I shutdown and restarted this morning. This morning same problem plus i can't select any files on my desktop. I can access stuff through finder but that's it. I have tried: restarting in safe mode - same problem fixed corrupted preference files - i'm sure it helped somehow fixed overlapped extent allocation files - again i'm sure it helped ran first aid to repair permissions - still same problem A few other thing i can't recall now My Specs: iBook G4 10.3.9 1.33Ghz PowerPC G4 256MB 55.76GB Harddrive 7GB Free If you can help on ANY WAY please do. I have tried everything I can find and think of. Oh yah, I don't currently have the OS disk. Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827252.87/warc/CC-MAIN-20181216025802-20181216051802-00591.warc.gz
|
CC-MAIN-2018-51
| 818
| 1
|
https://www.gleniboutique.com/US-caramel-python-tote-4950.html
|
code
|
Designed in homage to all those women looking for luxury and prestige, this timeless python bag is a standout example of Glenis attention to detail and superior craftsmanship. Mixing together high quality materials with the mastery of our skilled Italian artisans, the result couldnt disappoint any expectations: cared in every single detail, you will hold tight in your hand a precious jewel able to last long in the years.
Spacious enough for all your daily essentials - and more - we predict this impeccable accessory is destined to become one of the season's hottest pieces. Linear and sleek in shape, but also practical and versatile in style, this delicious tote bag encloses all those aspects and characteristics every woman looks in an accessory: classic, luxurious and spacious, this genuine python leather bag will become every city girls most coveted companion piece. Take it to the office with a ladylike skirt suit or team it with a pair of casual denim and jersey basics: every looks you decide to show off with will be liven up by the precious and refined touch provided by this item, able to take you from day to night: you wont know how you lived without it!
The simple and linear shape of the bag is enhanced by a sophisticated genuine python leather, showing all its exotic aspects, especially thanks to the juxtaposition of small and regular scales at the sides, and larger ones in the central sections: while at sight the bag might appear a little aggressive, its at touch that the soft and delicate leather will provide its pleasant and harmonious sensations.
Two middle-length handles in genuine calf leather allow you to wear the bag either on shoulder, tight to your body for the most frenetic moments, or gently laid on your forearm for a more ladylike look.
A twist-lock fastening, fixing together the upper edges of the bag, is doubled by a central zip fastening so that your personal objects and effects will be safely stored in your precious jewel.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127397.84/warc/CC-MAIN-20200930172714-20200930202714-00728.warc.gz
|
CC-MAIN-2020-40
| 1,978
| 5
|
https://boingboing.net/2022/12/15/avert-your-eyes-were-getting-an-american-version-of-peep-show.html
|
code
|
If there are two things the British know how to do, it's put together a decent rock band and produce hilarious comedy. From Black Adder to Black Books and Monty Python to A Bit of Fry and Laurie, the Brits have a special magic for crafting genius comedy. In the early 2000s, fans of British humor were treated to an embarrassment of riches as the decade spawned some of the finest British television comedies ever produced. Although IT Crowd, Garth Marenghi's Darkplace, and The Office were brilliant in their own right, for my money Peep Show sits comfortably at the apex of British sitcoms from the 2000s.
If Americans know how to do two things, it's importing British comedies and botching the adaptation process. For every All in the Family and The Office, you have at least two more American versions of shows like the IT Crowd and Faulty Towers. According to Variety, we may be adding yet another American reboot of Peep Show to the list of failed adaptations of British sitcoms.
FX has ordered a pilot for an American reboot of the British comedy series "Peep Show."
The half-hour project hails from writer Stefani Robinson. Per the official series logline, the new version "takes inspiration from the original U.K. series and its unique narrative format. It follows the relationship between a long-suffering assistant and her boss, an emotionally unstable tech entrepreneur."
Robinson will executive produce the pilot in addition to writing. Dianne McGunigle will also executive produce along with Jesse Armstrong and Sam Bain, two of the co-creators of the original series. Hannah Mackay and Ben Farrell of Objective Fiction, which produced the original series, will also executive produce.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00152.warc.gz
|
CC-MAIN-2023-14
| 1,699
| 5
|
http://blog.netphase.com/duvax65350.html
|
code
|
It simply retrieves much of the raw data that Reddit provides.
Note that the hash included in the file path may change from installation to installation.
Twitter and Tear Gas: The Power and Fragility of Networked Protest.
Quora Quora is more of a Yahoo! If you want to discover something new, be it a mobile app or just a simple game then Product Hunt is the perfect place for you to hunt for the next big thing in the tech space.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103626162.35/warc/CC-MAIN-20220629084939-20220629114939-00035.warc.gz
|
CC-MAIN-2022-27
| 430
| 4
|
https://docs.gitlab.co.jp/ee/development/documentation/drawers.html
|
code
|
The component points to a Markdown file. Any time you update the Markdown file, the contents of the drawer are updated.
Drawer content is displayed in drawers only, and not on
The content is rendered in GitLab Flavored Markdown.
To create this content:
- In the GitLab repository,
go to the
- Create a Markdown file. Use a descriptive filename. Do not create subfolders.
Add the standard page metadata. Also, include:
- Author the content.
If the page includes content that is also on a page on
docs.gitlab.com, on the page’s metadata, include a path to the other file. For example:
- Work with the developer to view the content in the drawer and verify that the content appears correctly.
- The headings in the file are used as headings in the drawer.
H1heading is the drawer title.
- Do not include any characters other than plain text in the
- The drawer component is narrow and not resizable.
- If you include tables, the content within should be brief.
- While no technical limitation exists on the number of characters you can use, you should preview the drawer content to ensure it renders well.
- To link from the drawer to other content, use absolute URLs.
- Do not include:
- Tier badges
- Version history text
- Alert boxes
- SVG icons
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00416.warc.gz
|
CC-MAIN-2023-50
| 1,248
| 24
|
https://forums.civfanatics.com/threads/modified-scenarios-workshop.410838/page-3
|
code
|
Excellent. I planned to sort out my Civ2 stuff today (putting new scenarios in folders / sorting out new graphics etc...) and I intend to convert all my multiplayer projects to ToT. It looks like you beat me to it with Balkan Wars! By the way Petit, I have just started several new ToT multiplayer games at Civ Webring and I have picked 'de Historibus Europae ToT. It looks like a really good scenario and the graphics are great!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141753148.92/warc/CC-MAIN-20201206002041-20201206032041-00358.warc.gz
|
CC-MAIN-2020-50
| 429
| 1
|
https://www.nber.org/chapters/c14094.ack
|
code
|
The IT Revolution and the Globalization of R&D
Chapter in NBER book Innovation Policy and the Economy, Volume 19 (2019), Josh Lerner and Scott Stern, editors (p. 1 - 37)
---- Disclosure of Financial Relationships for J. Bradford Jensen ----
I received approximately $15,000 from the University of Basel for teaching in 2017.
I am a part-time employee at the U.S. Census Bureau.
I am a non-resident senior fellow at the Peterson Institute for International Economics. I am sometimes paid for research I contribute to Peterson Institute programs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127075.68/warc/CC-MAIN-20200930141310-20200930171310-00248.warc.gz
|
CC-MAIN-2020-40
| 544
| 6
|
http://www.acorndomains.co.uk/threads/website-snapshot-tool.106174/
|
code
|
I am finding it increasingly common that some of our sites are down due to server problems. We use over 30 different web hosting companies so this is quite common now. We use Domain Punch to monitor the response from the sites every 30 minutes but of course the server still returns a 200 response even though sometimes there are problems with the MySQL db or other website problems. We recently had a small ecommerce site drop from Google due to the fact that we did not notice that it had lots of errors on the home page due to missing database (web hosting moved servers and 'forgot' to move the database). These got indexed and the rankings plummeted. So, in an attempt to spot any problems as soon as they arise, I am looking for some sort of software solution that will, every day, go through the whole site portfolio and take a snapshot of the homepage and save it on a local drive for visual monitoring. I found a few that almost got it right, but they always had something wrong with them. for example, WebPageCaptorPro works but when it generates the thumbnails, it does not name them with the url so it’s impossible to match the jpeg to the site easily. Does anyone have any other ideas or options?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719960.60/warc/CC-MAIN-20161020183839-00563-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,211
| 1
|
http://groups.google.com/group/alt.os.linux.slackware/msg/020e0ef22797c80c
|
code
|
The group you are posting to is a Usenet group. Messages posted to this group will make your email address visible to anyone on the Internet.
Your reply message has not been sent.
Your post was successful
Is there a kde-multimedaia-nonfree for slack ?
Dragon for instance refuses to play all but the simplest videos.
Xine works ok, so libxine should be fine.
Any ideas on this one ?
You must Sign in before you can post messages.
To post a message you must first join this group.
Please update your nickname on the subscription settings page before posting.
You do not have the permission required to post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699036375/warc/CC-MAIN-20130516101036-00020-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 606
| 11
|
https://ubuntuforums.org/showthread.php?p=5048097
|
code
|
[SOLVED] Intel P35 vs nVidia 630i
I am looking to buy a new pc to use as HTPC.
But now I am stuck in making decision which mainboard to buy.
* Asus P5KPL-CM - Intel P35
* Asus P5N-EM HDMI - nVidia 630i
The EM has 1 extra slot for memory. It has IDE133 instead of 100 and it has HDMI+DVI+VGA instead of just VGA. The difference in price is 1 euro.
At first I was planning to buy the CM with an Asus EN8500GT Silent. But now when I'm searching to make a decision its harder then I thought.
* The CM with the 8500GT (because the CM doesn't have DVI or HDMI)
* The EM without the 8500GT, use onboard HDMI (because its cheaper)
* The EM with the 8500GT (because it doesn't cost you any memory.
I was planning to buy a 45nm processor: the E8200. The system will be equipped with 2x1GB PC6400 DDR2 ram memory.
When searching I came across (recent) problems with both the P35 as the 630i (and the 8500 but that doesn't bother me).
What to do what to do? What is the best way to go?
The system will be connected to a LCD TV with an HDMI cable. For sound i'm buying a Creative Audigy soundcard. The system will be running Kubuntu with LinuxMCE (or a different "HTPC" suite) and will mostly be handling x264 (mkv) video.
I hope someone can help me out here, because I really don't know what's best.
Thanks in advance!
Tags for this Thread
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173761.96/warc/CC-MAIN-20170219104613-00424-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,327
| 17
|
http://blogs.msdn.com/b/bethmassi/archive/2008/10/07/first-day-at-sdn-conference.aspx?Redirected=true
|
code
|
Sharing the goodness…
Beth Massi is a Senior Program Manager on the Visual Studio team at Microsoft and a community champion for .NET developers. Learn more about Beth.
More videos »
I'm here in the Netherlands in a town called Noordwijkerhout near Amsterdam at the SDN Conference with a lot of great speakers and sessions.
I took these shots while the attendees were in session. There's good food, great vendors and lots of entertainment -- XBoxes, bowling, pin-pong, and lots of bars ;-) We also had a really funny English comedian perform at the end of the night. The Dutch really know how to put on a great event.
I have a total of three sessions and two on the first day. First I did a session called LINQ to Everything where I walked through each of the LINQ providers in Visual Studio 2008 SP1 "box" including LINQ to SQL, LINQ to DataSet, LINQ to Entities and LINQ to XML. We discussed application architecture and considerations and I showed demos to introduce each of the technologies. The room was packed and I got great scores so I'd say it went well. :-)
Next session I did was a lot of fun. It was called Taking Advantage of LINQ and Open XML in Office 2007 and I showed how to manipulate Open XML document formats in Office 2007 Word, PowerPoint and Excel documents using the Open XML SDK version 2.0 and LINQ to XML. I think it sparked a lot of people's curiosity and creativity because there are a lot of possibilities. I showed how you can create, query and transform documents without having to have Office installed at all. I also had great reviews and chatted with many attendees afterwards who were building a lot of cool business applications.
I attached the presentation and demos so have a look.
PingBack from http://www.easycoded.com/first-day-at-sdn-conference/
very nice.. such great conference. what i like most on conferences are the fun things too. it gives more interest to attendees. ill be looking forward to SDN conferences soon.
I was at both your LINQ sessions at the conference and it was great fun listening to you, even the early session after a long night at the bar downstairs :-)
Thanks and I hope to see you again next year!
With kind regards,
It was a great time.. I love Europe! So friendly! Glad you enjoyed the sessions, I hope you can find uses of the technologies in your applications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447729.93/warc/CC-MAIN-20151124205407-00240-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 2,338
| 14
|
https://community.fxhome.com/discussion/56823/clickable-button-in-hitfilm-express
|
code
|
Clickable button in HitFilm Express
I've created a short video from 4 videos cropped and stitched together for the home page of my website. I've added text via one of the installed templates.
What I want to do is, once the text displays, add a button that links to a page on the website. Can this be done in HF?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499899.9/warc/CC-MAIN-20230201013650-20230201043650-00650.warc.gz
|
CC-MAIN-2023-06
| 311
| 3
|
https://mail.haskell.org/pipermail/haskell-cafe/2007-November/035618.html
|
code
|
[Haskell-cafe] Design of a Physics Interface
lrpalmer at gmail.com
Fri Nov 30 09:23:03 EST 2007
I'm currently working on idioms for game programming using FRP. After
going through several representations of physics as arrows I
decided that physics objects must not be implemented as arrows,
because introducing new arrows in the middle of a computation leads
to ugly pain.
So far the best approach I have is to represent the physics world as a
single object World, with a function
> integrate :: TimeStep -> World -> World
But I can't figure out a good way to represent bodies in this world.
> newBody :: (Position,Velocity) -> World -> (Body,World)
Where Body is an ADT with an internal representation of an Integer or
something. The problem with this is that (1) there is no way to
guarantee that a Body actually exists in a World (which is a minor but
still annoying issue), and (2) that there's a possibility that you
could make a Body in one world and use it in another and there would
be no way to detect the error.
(2) could be solved using an internal representation of Data.Unique,
but (1) still remains a problem. And as long as the function
> deleteBody :: Body -> World -> World
exists, it will always remain a problem. Are there any clever idioms
I can use for this interface or implementation? Is there a way to
store the data for bodies along with the Body object instead of with
the world in a way that the relationships between them respect
different generations of the World (through integrate)? Any other
Once as SF () (Position,Velocity), and again as SF PhysIn PhysOut
where PhysIn = (Impulse,Momentum) and PhysOut = (Position,Velocity).
Using the arrow joinSF :: SF (Event (SF [a] a)) [a], and other
similar style functions taking streams of SF events...
More information about the Haskell-Cafe
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948522343.41/warc/CC-MAIN-20171213084839-20171213104839-00288.warc.gz
|
CC-MAIN-2017-51
| 1,818
| 32
|
http://www.java8s.com/Spring/spring_security_tutorial/
|
code
|
In this spring security tutorial we will see some security tips about the Spring Framework application. Spring Security is a powerful and highly customization authentication and access-control framework to secure Spring-based Java web application.
Spring Security provides comprehensive security services for J2EE based enterprise software application. It is powerful, flexible and pluggable.
Spring Security Framework provides the following benefits to users:
User authentication and authorization.
Role based authorization control.
Easy to configure with database based authentication and authorization.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998959.46/warc/CC-MAIN-20190619103826-20190619125826-00473.warc.gz
|
CC-MAIN-2019-26
| 605
| 6
|
http://www.astraownersclub.com/vb/showthread.php/497625-Problem-again
|
code
|
Just wandered if anyone could help me, what its is since i got the car it has always been fine when i have more than half a tank of petrol in it's, but when i get below half a tank. It feels as though the car is breaking when i have ma foot on the accellerator, then i get the power.
I have taken it to a garage and they seem to have sorted the main causes out but its still happenin.
In the past year i have had a new: coilpack, lambda sensor, fuel filter and fuel pump. The engine management light doesnt come on and last time it was on a dianostic machine there was no stored codes.
If anyone could give me some suggestions as to what they think it could be, it would be greatly appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00072-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 694
| 4
|
https://vousden.me/series/around-norway/
|
code
|
tl;dr: I rode a bike-packing event covering pretty much the whole of sub-arctic Norway. The 3,400 km route took in Norway’s most iconic scenery and demanded payment in kind. I bike-packed my way to the end in 9 days, 8 hours, 43 minutes.
- 📈 Lots of climbing
- ⛴ Inconvenient ferry timetables
- 😰 A 1,000 m switchback descent, including a 1 km tunnel with a 10% hairpin inside it… that had to be climbed again afterwards
- ⛽️ Extortionate petrol station food
- 🚏 Camping in bus shelters
- 🪦 Camping in graveyards
- 🥵 Unbearable heat
- 🥶 Unbearable cold
- 🎭 Plentiful mood swings
- 🏔 The most beautiful mountain scenery I’ve ever seen
This was a long ride and this is going to be a long write-up – long enough to merit several instalments. Riding so far is a complex experience and I’m not really sure how to capture the whole thing in a blog post, so we’ll see how this goes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00786.warc.gz
|
CC-MAIN-2023-40
| 917
| 12
|
https://discussion.fedoraproject.org/t/cant-switch-back-to-x11/74201
|
code
|
I need to switch back to X11 in order for chrome screen sharing for MS Teams to start working again. Pretty annoying that M$ doesn’t support Firefox, which handles Pipewire Screen Sharing really well…
So recently maybe after upgrading to F35, I am unable to see the gear icon in gdm. Even if I manually disable wayland gdm just won’t be able to start and crash. Not even lightdm or startx work…
I suppose that’s nvidia driver related, since when I boot up an old kernel that has an older version of the nvidia in it’s initramfs, it will show me the gear icon and boot into Gnome on Xorg. The problem then is that the animations just get disabled like on llvmpipe and the dmesg output also suggests that the nvidia driver straight up refused to fully initialize. I unfortunately did not save the output, but will try and add it tomorrow.
One thing I suspected was that the xorg nvidia driver was missing but nope it’s installed. I have no idea what to try next. Hopefully one of you can help me, thank you!
xauth: file /home/user/.serverauth.3511 does not exist X.Org X Server 1.20.14 X Protocol Version 11, Revision 0 Build Operating System: 5.15.6-200.fc35.x86_64 Current Operating System: Linux vbu-c-jlamp-02-li 5.15.12-200.fc35.x86_64 #1 SMP Wed Dec 29 15:03:38 UTC 2021 x86_64 Kernel command line: BOOT_IMAGE=(hd1,gpt2)/vmlinuz-5.15.12-200.fc35.x86_64 root=/dev/mapper/data-froot ro rootflags=subvol=@ resume=UUID=3ece1f9b-b4b9-4ca2-951a-98620f4f76f5 rd.lvm.lv=data/froot rd.luks.uuid=luks-a9f1baa2-fa74-4080-9435-8eaa724c4226 rhgb quiet rd.driver.blacklist=nouveau modprobe.blacklist=nouveau nvidia-drm.modeset=1 Build Date: 17 December 2021 12:00:00AM Build ID: xorg-x11-server 1.20.14-1.fc35 Current version of pixman: 0.40.0 Before reporting problems, check http://wiki.x.org to make sure that you have the latest version. Markers: (--) probed, (**) from config file, (==) default setting, (++) from command line, (!!) notice, (II) informational, (WW) warning, (EE) error, (NI) not implemented, (??) unknown. (==) Log file: "/home/user/.local/share/xorg/Xorg.0.log", Time: Mon Jan 10 21:29:47 2022 (==) Using config directory: "/etc/X11/xorg.conf.d" (==) Using system config directory "/usr/share/X11/xorg.conf.d" (II) modeset(0): Initializing kms color map for depth 24, 8 bpc. (EE) Fatal server error: (EE) failed to create screen resources(EE) (EE) Please consult the The X.Org Foundation support at http://wiki.x.org for help. (EE) Please also check the log file at "/home/user/.local/share/xorg/Xorg.0.log" for additional information. (EE) (EE) Server terminated with error (1). Closing log file. xinit: giving up xinit: unable to connect to X server: Connection refused xinit: server error
[+0.00s] DEBUG: Logging to /var/log/lightdm/lightdm.log [+0.00s] DEBUG: Starting Light Display Manager 1.30.0, UID=0 PID=3605 [+0.00s] DEBUG: Loading configuration dirs from /usr/share/lightdm/lightdm.conf.d [+0.00s] DEBUG: Loading configuration from /usr/share/lightdm/lightdm.conf.d/50-backup-logs.conf [+0.00s] DEBUG: Loading configuration from /usr/share/lightdm/lightdm.conf.d/50-disable-guest.conf [+0.00s] DEBUG: Loading configuration from /usr/share/lightdm/lightdm.conf.d/50-minimum-vt.conf [+0.00s] DEBUG: Loading configuration from /usr/share/lightdm/lightdm.conf.d/50-run-directory.conf [+0.00s] DEBUG: Loading configuration from /usr/share/lightdm/lightdm.conf.d/50-session-wrapper.conf [+0.00s] DEBUG: Loading configuration from /usr/share/lightdm/lightdm.conf.d/50-user-authority-in-system-dir.conf [+0.00s] DEBUG: Loading configuration from /usr/share/lightdm/lightdm.conf.d/50-xserver-command.conf [+0.00s] DEBUG: Loading configuration dirs from /usr/local/share/lightdm/lightdm.conf.d [+0.00s] DEBUG: Loading configuration dirs from /etc/xdg/lightdm/lightdm.conf.d [+0.00s] DEBUG: Loading configuration from /etc/lightdm/lightdm.conf [+0.00s] DEBUG: Registered seat module local [+0.00s] DEBUG: Registered seat module xremote [+0.00s] DEBUG: Using D-Bus name org.freedesktop.DisplayManager [+0.00s] DEBUG: _g_io_module_get_default: Found default implementation local (GLocalVfs) for ?gio-vfs? [+0.00s] DEBUG: Monitoring logind for seats [+0.00s] DEBUG: New seat added from logind: seat0 [+0.00s] DEBUG: Seat seat0: Loading properties from config section Seat:* [+0.00s] DEBUG: Seat seat0 has property CanMultiSession=no [+0.00s] DEBUG: Seat seat0: Starting [+0.00s] DEBUG: Seat seat0: Creating greeter session [+0.00s] DEBUG: Seat seat0: Failed to find session configuration lightdm-greeter [+0.00s] DEBUG: Seat seat0: Failed to create greeter session [+0.00s] DEBUG: Failed to start seat: seat0
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00213.warc.gz
|
CC-MAIN-2023-40
| 4,632
| 6
|
https://forum.dxo.com/t/nik-collection-5-critical-issue/27018
|
code
|
(As I have subsequently found out, this also applied to the upgrade from Collection 3 to Collection 4, but it does not affect me as much as this upgrade.)
I was happy to see that Collection 5 was released, since it updated CEP4 to CEP5 … long overdue. As I usually so, I installed the trial version to make sure everything ran in my environment before fully committing to the purchase. All was OK until a colleague emailed me the following clip from a FB group he follows …
“Caution installing NIK 5 if you use Smart objects. When I installed NIK 5 it deleted NIK 4. I use ColorEffects pro extensively. PS did not recognize the CE 5 and CE 4 were the same program. I lost every edit I made as a smart filter. I have contacted DXO support. Hopefully they will get back to me quickly I will keep you informed.”
Holy Cow … I almost always use PS Smart Objects for my work in Nik … have done so since starting with Nik. For me, it is the only way to fly. But if true, this would affect hundreds of images post processed and made better with Nik filters over the past 13 years.
I quickly devised a test for each Nik filter that works in a PS Smart Object environment, and sure enough: this “bug” affects both the CEP and the AEP upgrades provided in the Nik 5 release: Any Smart Objects containing edits in CEP 4 (or earlier) and AEP 2 (or earlier) would not process in CEP 5 or AEP 3 respectively … meaning that those edits would be lost forever, as the message quoted above indicates.
This also caused me to question whether or not the upgrades to Viveza and SEP supplied in Nik 4 suffered the same issue … and after some further testing, it was apparent that they do! It appears that any edits created in a Smart Object using Viveza 2 (or earlier) and/or SEP 2 (or earlier) will also not be processed in Nik 4. (Fortunately for me, that is only a handful of images processed over the past year.)
For clarity, the message from Adobe regarding this is:
“Filter not available or cannot be applied to this document.”
As a result, I have returned to Nik 3, and I am recovering those images where I have used Viveza 3 and SEP 3 in the past year so that I can continue to work with them. The integrity of the post processing work I have done previously is more important to me than any product updates that have been made by DXO over the past year. Nik Collection 3 works just fine for me, thank you.
Don’t get me wrong … I think the Nik Collection is one of the best products I have used in the digital darkroom, but this issue is a deal breaker - I have now back-leveled to Nik Collection 3, and will not move past that level until DxO addresses this issue, and my testing indicates that it is safe to do so.
Please, DxO … make your future releases 100% backward compatible.
And please alert your customer base when your current and future releases have a profound and permanent consequence to user work … treat us well and we will return the favour.
Possible fixes …
- Allow Viveza, AEP, SEP, and CEP (as well as any future versions of themselves and updates to other filters) to correctly recognize and process images created in Smart Objects using predecessor versions of those filters.
- Allow multiple versions of the collection to co-exist. Don’t just overwrite the previous version, but give the customer the choice of deleting those previous versions, or installing the new version in a different folder.
I hope that this acts as a cautionary tale for other users who have used Smart Objects to contain their Nik work. In any case, buyer beware: do your own testing of new release to ensure you make an informed upgrade decision.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819971.86/warc/CC-MAIN-20240424205851-20240424235851-00871.warc.gz
|
CC-MAIN-2024-18
| 3,666
| 16
|
https://community.canvaslms.com:443/t5/Canvas-Ideas/New-Quizzes-Files-Attached-to-New-Quizzes-Questions/idi-p/520770
|
code
|
In New Quizzes, when you upload/embed an image as part of a question, it renames the file. For example, I had embedded a picture of Olaf from the movie "Frozen" into a question. The original file name was "Olaf.jpg". After uploading the file and saving the question, I looked at the properties of the file, and Canvas had changed the file name to "Olaf (1).jpg". I tried another image, and the same thing happened with that file, too. Why does Canvas append a " (1)" to the file name? Can the file name that was uploaded remain unchanged?
The above Feature Idea request is not related to migrating a Classic Quiz to a New Quiz. I have a separate Feature Idea about that located at Renamed Files after Migrating a Classic Quiz to a New Quiz.
Added to Theme
Technical Functionality Theme Status: Identified
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00850.warc.gz
|
CC-MAIN-2023-50
| 804
| 4
|
http://ququ.cuba-si.ru/tags?/portfolio/413updating-ps3-to-play-ps2-games.html
|
code
|
The earlier 20GB and 60GB models actually have the CPU and GPU of a PS2 onboard, so it's practically working natively, and that'd be the best approach.The newer firmwares do not disable this functionality.One of the most annoying things about the Play Station 3 is its lack of backward compatibility on some models.
- Chat video sex with sexymom
- Sample sex chat pic
- dating sugardaddie
- Sexy adult 3d chat games
- dating younger girls college
- dating canadian sites
The support isn't 100% across the board for any variant of the systems - there are a few games that are buggy.
The hard drives are upgradeable relatively easily, and there's built in backup and restore functionality. The 60GB launch PS3, however, most certainly will, due to it's hardware backwards compatibility, as you know.
Glevand's boot_ps2 does work (sort of) but not on anything higher than 2.50 (again, assuming, I tried 3.15 afterwards, and no go) What I did: 1) I have a QA flagged console on 3.55KMEAW 2) I used recovery mode to install 2.50 OFW (you can downgrade when you set "System Update Debug" to enabled in QA Debug settings) 3) Realized that even though I had the FSM pkg installed, it doesn't work on 2.50 4) Remembered I had boot_ps2 installed, so figured what the hell.
Place the Lv2(NOT THE lv2diag1.self) and the PS3UPDATE. Well, I just figured out all the pieces to the puzzle, thanks to this OP and a bit of dumb luck.
But in just a few minutes, you can install this PS2 software emulator to make your PS3 backward compatible.
You can download the file here, but before you get started, you may want to make a backup copy of your /dev_flash folder since you'll be replacing some files.
Since this PS3 has the guts of the PS2 inside it, firmware updates do NOT affect it's compatibility.
Personally, I have two launch PS3's, and they both make no fuss whatsoever, no matter what game I play.
I have tried to keep them updated as needed, although I'm not OCD about it. As for hard drive replacement, as @RESPAWN said, the PS3 has tools for data backup, and as long as you have a laptop SATA HDD, you're good to go.
Pop off the side panel, remove the screw, the casing with the HDD just slides right out.
I tested the games: Ratchet and Clank, Ratchet and Clank Going Commando, Jak II, and ATV Quad Power Racers. Trying 2.70 (ps3devwiki has 2.60 fw under the 2.70 directory, thus me trying 2.60 in the first place) downloading it from here instead.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525829.33/warc/CC-MAIN-20190718211312-20190718233312-00502.warc.gz
|
CC-MAIN-2019-30
| 2,442
| 18
|
https://iris.univr.it/handle/11562/342540
|
code
|
Cooperative control is a key issue for multirobot systems in many practical applications. In this paper, we address the problem of coordinating a set of mobile robots in the RoboCup soccer middle-size league. We show how the coordination problem that we face can be cast as a specific coalition formation problem, and we propose a distributed algorithm to efficiently solve it. Our approach is based on the distributed computation of a measure of satisfaction (called Agent Satisfaction) that each agent computes for each task. We detail how each agent computes the Agent Satisfaction by acquiring sensor perceptions through an omnidirectional vision system, extracting aggregated information from the acquired perception, and integrating such information with that communicated by the teammates. We empirically validate our approach in a simulated scenario and within RoboCup competitions. The experiments in the simulated scenario allow us to analyse the behaviour of the algorithm in different situations, while the use of the algorithm in real competitions validates the applicability of our approach to robotic platforms involved in a dynamic and complex scenario.
File in questo prodotto:
Non ci sono file associati a questo prodotto.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499768.15/warc/CC-MAIN-20230129211612-20230130001612-00862.warc.gz
|
CC-MAIN-2023-06
| 1,240
| 3
|
https://crmhelp.veeva.com/doc/Content/CRM_topics/Multichannel/ApprovedWeChat/ContentCreation.htm
|
code
|
Setting Up Content for Approved WeChat
Users are able to share marketing and product material via Approved WeChat after an HCP is verified and subscribes to a service account. All content is stored in Vault. For this reason, there is a Vault-CRM Integration. This is similar to the Engage for Portals Integration. See Engage for Portals for more information.
Flagging Content in Vault for Approved WeChat
The Approved WeChat player supports HTML, videos, images, and PDF presentations. PDF presentations can contain a maximum of 100 slides for optimal performance. All content is stored in Vault. Select the WeChat attribute in the Engage Document section in Vault to use content in Approved WeChat.
Associating Content to Service Account Templates in Veeva CRM
Content is shared with subscribed HCPs as a link in a WeChat message using a WeChat Service Account template associated to the Service Account. Content needs to be associated with at least one WeChat Service Account template (Approved Document record) in order for users to share it with HCPs. Content can also be associated with more than one WeChat Service Account template to allow users to select the most appropriate message template for the content they want to share.
Message_template_content_vod is a new object that maintains the association between the Multichannel Content and the WeChat Service Account template (Approved Document). This object is used in conjunction with existing CRM objects: Approved_Document_vod and Multichannel_Content_vod. These objects have new fields and record types specific for Approved WeChat. See the CRM Configuration section for the appropriate permission settings.
Administrators need to create Message_template_content_vod records for each association needed between the Multichannel Content records and Approved Document records (WeChat Service Account Template).
Providing Reps Access to Content in Approved WeChat
Users share content through the Approved WeChat Application by selecting an available product and available content for that product. The products displayed in the initial product list are defined by the Detail Products set in the user's MySetup.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.53/warc/CC-MAIN-20231203193127-20231203223127-00803.warc.gz
|
CC-MAIN-2023-50
| 2,172
| 10
|
https://mail.python.org/pipermail/mailman-users/2012-April/073187.html
|
code
|
[Mailman-Users] multiple footers accumulating on messagesasdiscussion progresses - how to eliminate all but the last mailman footer?
mark at msapiro.net
Fri Apr 20 21:48:53 CEST 2012
David <dave at fiteyes.com> wrote:
>I like the following Mailman options page:
If the list is personalized, it may be better to use just
The difference is that user_optionsurl is equivalent to
This has the advantage of pre-providing the users email address which
avoids the user's having to type it and the issues of the user not
knowing which of her many addresses is actually subscribed to the list.
I don't think there's normally an issue around the address being
sensitive information since if the user replies to or forwards the
message, her address is in the From: header of the reply/forward
This might be a concern for an anonymous list, but not otherwise.
>A footer link to this page may work well because it has a clearly visible
>This leads to two questions:
>1. Where is the html template for this options page? It is not one of the
>items found at "Edit the public HTML pages and text files". (The only
>related template I see is for the page that is shown *after* logging in to
>the above page.)
There is no template for the options login page. It is built on the fly
by the loginpage() function in the Mailman/Cgi/options.py module.
You can edit the strings in that module if your lists are English
language only, but changing those strings breaks i18n translations of
A more robust way to do this is to create the path
messages/en/LC_MESSAGES/ and create a mailman.po in that directory
with just the "translations" you need, and then use msgfmt to cerate
the corresponding mailman.mo file.
>2. Where is the text for the unsubscribe confirmation message so we can
See the FAQ at <http://wiki.list.org/x/jYA9>. The name of the template
Mark Sapiro <mark at msapiro.net> The highway is for gamblers,
San Francisco Bay Area, California better use your sense - B. Dylan
More information about the Mailman-Users
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662584398.89/warc/CC-MAIN-20220525085552-20220525115552-00537.warc.gz
|
CC-MAIN-2022-21
| 2,004
| 33
|
https://expressionengine.stackexchange.com/questions/22442/how-do-i-include-three-fields-using-search
|
code
|
I have a channel that displays artist information and they have an option to list their top three disciplines. Each discipline is listed in a separate field.
For example an artist could indicate the following disciplines:
Related to this I have a page for each discipline to show the artists which have selected that discipline. Currently I have it set to filter entries as follows:
The only problem here is that it doesn't show those artists that may have selected photography as their second or third discipline.
I tried combining multiple fields in the search parameter like this:
That appears to cancel out the filtering and brings back all entries. Is there a way to search all three fields?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00796.warc.gz
|
CC-MAIN-2023-50
| 696
| 6
|
https://docs.hexagonppm.com/r/en-US/HxGN-SDx-Extensibility/969785
|
code
|
This guide includes documentation for the latest update release. For more information about which features are available in each update, refer to the HxGN SDx Release Bulletin.
Not finding what you're looking for? We can help.
Learn about searching tips here. Or, the functionality might have changed or been removed. For more information, see HxGN SDx Modified and Retired Functionality.
How do I find out which version of software I'm using?
Click Settings .
Click the Web Client name under About to display the software version on the About page.
Extensibility has been introduced by Hexagon to help improve scalability and reduce software customizations. The following document provides information about using Extensibility so customers can extend and grow their server system.
The Extensibility mechanism is compatible with SDx server and HxGN SDx Web Client, and Smart Cloud Server.
The examples shown can be modified for use with HxGN SDx or Smart Cloud. Some settings and objects are shared by the applications to reduce the administration overhead. Some configuration by Smart Cloud Support Team is also needed to get Extensibility to work in the Cloud.
Hexagon Policy Against Software Piracy
Copyright 2019-2022, Intergraph Corporation and/or its subsidiaries and affiliates
Published Thursday, March 16, 2023 at 11:31 AM
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945368.6/warc/CC-MAIN-20230325161021-20230325191021-00356.warc.gz
|
CC-MAIN-2023-14
| 1,332
| 12
|
http://mattdurham.github.io/blog/2013/06/19/rpath-and-dylibs-a-fustrating-tale/
|
code
|
This is the true story of how Dylibs caused me pain, here is the totally unhappy error I got.
dyld: Library not loaded: /usr/local/lib/libct.4.dylib Referenced from: Blah blah blah Reason: image not found
I chased this down for the better part of the hour until coming across some information on install_name_tool, you can find more details about the tool here. To find out the basic command I used with @rpath I used.
install_name_tool -id "@rpath/../Frameworks/libsybdb.5.dylib" libsybdb.5.dylib
Then in my application I had to add the @rpath to the Runtime Search Paths
After I setup all my dylibs like this my application runs once again. Oddly enough my application ran smoothly for a while during development but I did a brew update and I can only guess it wiped out the libraries I was using. I was surprised. Seems somewhat archaic to my day job of Java and .NET. So if for some reason a google search turns up this error and saves someone my pain then it is all worth its.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480272.15/warc/CC-MAIN-20190216105514-20190216131514-00607.warc.gz
|
CC-MAIN-2019-09
| 981
| 6
|
https://support.foregenix.com/kb/articles/oregon-dashboard
|
code
|
The Oregon dashboard provides a summary of the various projects that a user has access to. There is a top-level summary showing the following:
- Active Projects - All projects that are currently being worked on or are prepped to start soon
- Not Started - Total projects that have not been scheduled yet
- In Progress - Projects that are currently under way and are being actively worked on
- Submitted to AQM – The project is has been submitted to the SSC AQM team. This only applies to certain project types. P2PE, PADSS, SSF
- On hold - All projects that have been put on hold by Foregenix or the Client. No work packages will be active while a project is in this status
- Completed – The project has been completed and currently being invoiced and finalized.
Dashboard - Project List
- The dashboard has a tabbed view below the Dashboard Summary. The first tab is the Latest Projects list. This list contains a top level summary of the Active Projects and includes basic information like:
- Organization – Name of the organization the project belongs to. This is provided as there may be a hierarchical structure of Organizations that the user has access to.
- Contract – The specific contract that the project belongs to
- Project – The name of the project
- Project ID – Internal ID used for tracking purposes
- Location – Global location where the project is being completed
- Assessors – This is a list of the Foregenix Assessors that are assigned to do work on the project
- Start and End Date of scheduled work
- Expected End Date – This is a date that has been agreed upon by Foregenix and the client
- Project Deadline – A date by which the project must be completed. This is normally set when there is a compliance deadline that need to be met. If not needed it is just shown as a dash -.
- Not Started
- In Progress
- SSC Submission
- On Hold – The project has been placed on hold until further notice
- You can filter the Project List by entering text into the text boxes in each column
- If you hover over text in the grid, you will see a popup which will allow you to do a quick filter in the list.
- If you click the funnel icon, the text will be placed into the textbox at the top of the column and filter accordingly.
- If you click the copy icon the text will be placed into your clipboard for you to use as needed.
If you are only interested in specific columsn you can choose only the columns that interest you by clicking the Columns Button
Dashboard - Project Board
The project Board tab provides a column view of all the projects. The columns are as follows:
- Upcoming - These projects have work packages that are due to start in the next 14 days
- In Progress - Someone has already started wok on this project
- On Hold - Projects hat have been placed on hold until a later date
- Completed - The project work packages have all been completed
Dashboard Contract List
This tab provides a summary of all active contracts for the client.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00365.warc.gz
|
CC-MAIN-2023-14
| 2,984
| 35
|
https://erlang.org/pipermail/erlang-questions/2010-October/053700.html
|
code
|
Erlang SNMP agent coexisting with net-snmp?
Attila Rajmund Nohl
Tue Oct 5 19:16:20 CEST 2010
I have an Erlang application and I want to return some stats about the
application and the host via SNMP. Some of the stats (for example disk
usage or load average) is already implemented by the snmpd in the
net-snmp package (or at least there's a bundled example configuration
file which can provide this data). The application-related stats can
be queried from the application.
I was wondering if it's possible that use the net-snmp snmpd as the
SNMP master agent and the Erlang application as a subagent, so a
single SNMP interface would return all data, but I haven't found in
the documentation that Erlang would support AgentX. This (of course)
excludes the other way, that the Erlang is the master and the net-snmp
is the sub.
I can also implement the host-based counters in Erlang or use the
'pass' or 'exec' directives in net-snmp to get the application-based
counters via an other interface from the application.
Am I missing an other alternative? Maybe an AgentX implementation for Erlang?
More information about the erlang-questions
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00675.warc.gz
|
CC-MAIN-2023-50
| 1,136
| 20
|
https://saturncloud.io/docs/release-notes/2022-04-01/
|
code
|
The Credentials component of Saturn Cloud has been replaced with a new Secrets component. Secrets are similar to credentials except that you explicitly attach them to each resource. This is more secure than the previous implementation which attached secrets to any resource that had access to them. All previous credentials have been migrated to be secrets.
- Users can now build images in the UI with R package support instead of just Python support. (Note that any language can also be installed via the postBuild script).
- The UI has been improved to handle large amounts of data.
- Workspaces now have the option to open port 8000 for testing code that will become a deployment.
- SSH can now be enabled on deployments for debugging.
- Resources will now let you know if they need to be restarted after fields changes. Previously they would automatically restart.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474697.2/warc/CC-MAIN-20240228044414-20240228074414-00437.warc.gz
|
CC-MAIN-2024-10
| 868
| 6
|
http://myfwc.com/news/news-releases/?p=2&category=1219
|
code
|
March 14, 2016
The Florida Fish and Wildlife Conservation Commission (FWC) is offering a free hunter safety course in Calhoun County.
March 07, 2016
Tenoroc Public Shooting Range, located in Polk County between Tampa and Orlando, is reopening its rifle and pistol ranges March 13 after undergoing improvements. The target shooting center features rifle and pistol ranges and shotgun opportunities with trap and sporting clays facilities.
February 29, 2016
For adults, the highly anticipated spring turkey season comes in first south of State Road 70 and runs from March 5 to April 10. In the rest of the state (except for Holmes County), it runs from March 19 to April 24. In Holmes County, the season is March 19 to April 3.
February 27, 2016
In addition to the 2016 Python Challenge™, there are several ways the general public can continue to help the FWC manage nonnatives. People can participate in the FWC’s Python Removal Program, a year-round citizen science program that uses trained individuals to help remove pythons and collect data on pythons on state lands. The public can also help manage invasive species by reporting nonnative fish and wildlife to the FWC’s Invasive Species Hotline at 888-IVE-GOT1 (888-483-4681), by reporting sightings online at IveGot1.org or by downloading the IveGot1 smartphone app.
February 26, 2016
The FWC will temporarily close portions of the CREW Wildlife and Environmental Area located in Lee and Collier counties. A restoration project in the WEA has resulted in this action. The project will commence Feb. 29 for an anticipated period of 18 months.
February 25, 2016
Those interested in attending a course can register online and obtain information about future bowhunting classes at MyFWC.com/HunterSafety or by calling the FWC’s regional office in West Palm Beach at 561-625-5122.
February 25, 2016
Those interested in attending a course can register online and obtain information about future hunter safety classes at MyFWC.com/HunterSafety or by calling the FWC’s regional office in Panama City at 850-265-3676.
February 24, 2016
Those interested in attending a course can register online and obtain information about future hunter safety classes at MyFWC.com/HunterSafety or by calling the FWC’s regional office in West Palm Beach at 561-625-5122.
February 19, 2016
Anglers, hunters and other outdoor recreation enthusiasts with impairments will have greater access to the outdoors, thanks to a group of partners who have pledged to donate Action Trackchairs to the FWC. The Trackchairs, which are off-road wheelchairs that allow users to navigate unpaved surfaces such as hiking trails, shooting ranges, lakes and beaches, will be made available through the FWC’s Florida Youth Conservation Centers Network.
February 18, 2016
The ninth annual tournament will be conducted in two formats: a live tournament that will take place at Bartow’s Carver Recreation Center, 520 Idlewood Ave. S., and a virtual tournament for schools whose students cannot travel.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860122533.7/warc/CC-MAIN-20160428161522-00122-ip-10-239-7-51.ec2.internal.warc.gz
|
CC-MAIN-2016-18
| 3,023
| 20
|
http://nhmdesign.me/category/office/
|
code
|
push button cabinet lock gallery for locks caravan latch where to buy.
printhead for hp officejet pro 8500a plus details about all in one printer with brand new installed 8500 a910 clean print head.
hp officejet pro 8500 print heads left facing wireless printhead problem.
office magnets strong refrigerator neodymium custom depot.
office star progrid australia.
office star worksmart work series executive chair.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669730.38/warc/CC-MAIN-20191118080848-20191118104848-00523.warc.gz
|
CC-MAIN-2019-47
| 413
| 6
|
https://answers.sap.com/questions/2930269/using-rfc-adapter-in-the-pck.html
|
code
|
I am looking to use the PCK and call BAPI/RFM's on a 4.6C. What I can not figure out is how to get a message definition for a BAPI or function module into the PCK. I can load the xported IDOC schema without issue.
Is their a method for either pulling in the FM/BAPI defnintion or generating the RFC XML for them. Or am I going to have to write a small JCO program to generate the RFC XML.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00573.warc.gz
|
CC-MAIN-2023-14
| 388
| 2
|
http://veirtuge.xyz/archives/29519
|
code
|
Novel–Cultivation Chat Group–Cultivation Chat Group
Chapter 1729 – Invisible Death rinse homely
Fighting in Flanders
Tender Feather, Doudou, and Piece of music Shuhang all landed rear on the floor.
the little girl vanity
Her feels of ability to hear, aroma, and preference had previously been taken away. Furthermore, she was not a primordial heart and soul and had not been resonating with Piece of music Shuhang as well as senior citizens with the Nine Provinces Number 1 Group, so she obtained not heard the dialogue between the two.
Dharma Master Formation stated, [What adheres to ought to be the detects of eyesight and contact. Whenever we are lacking all these, we won’t be able to see, perceive, or experience anything. At that time, we will only be in the position to pa.s.sively be handed a pounding.]
Out of the incredible tribulation, there are bursts of Buddhist chants that became available.
Chapter 1729 Unseen Loss of life
After, a statue of a big Buddha comprised of ‘tribulation lightning’ surfaced through the tribulation clouds. The Buddha came out with its head directed for the terrain, although its foot were pointed skyward. It was hanging upside-down as it slowly descended, showing up unexpectedly domineering.
Tender Feather, Doudou, and Tune Shuhang all landed lower back on a lawn.
“At this time, it is always good if the Sage’s eyeball was still listed here,” Track Shuhang mentioned regretfully as part of his intellect.
Delicate Feather, Li Yinzhu, Doudou, Track Shuhang, and many types of the individuals the Nine Provinces Primary Crew right behind him, froze and might not shift.
However, Doudou switched spots with Music Shuhang’s stainlesss steel manifestation a result of the ‘friends.h.i.+p mark’.
In any case, Music Shuhang shifted much faster than Gentle Feather, and then he came until the Buddha first.
Or perhaps it an improved release of Dharma Emperor Creation’s dangerous audio?
the shadow – seven drops of blood in stool
Music Shuhang questioned, [At the moment, would our divine feel still work?]
dark matter pre workout
The Tyrant Cuttlefish’s Dual Rotor blades split away, and one of several blades done the Incredible Saber Burying the Starry Sea—Su Clan’s Seven’s biggest saber technique—while another blade completed the Seventy-Two Angry Saber Strikes—Thrice Reckless’s handed down saber strategy.
The Holy Expert Ape’s Sword stirred and turned into a night sky—it was North River’s Reduce Cultivator’s Twelve Swords of the Milky Way.
Everyone was in a state where their primordial souls have been resonating, which made it possible for them to connect with one another psychologically.
Youthful Learn Phoenix arizona Slayer’s ‘Ground Splitting’ talent, A fact Monarch Tyrant Flood Dragon’s ‘Dragon Flash’, and Real Monarch Bright Crane’s mix of ‘Holy Light’ wonderful techniques.
Music Shuhang inquired, [In doing what kind is this divine tribulation gonna go down? As well as how are we to address it?]
Very soft Feather adopted closely right behind, and she swung her sword from where b.u.t.terfly-Phoenix az Sword Qi came dumping out. The sharpened sword was loaded into the body with the incredible tribulation Buddha as Doudou quickly circled around its human body.
Promptly afterward, even her a sense of ‘touch’ disappeared.
Music Shuhang termed out, [Soft Feather, Doudou, initialize your divine feel. We have to collect up and give back to the ground.]
Her senses of listening to, scent, and taste got previously been removed. Additionally, she had not been a primordial spirit and had not been resonating with Tune Shuhang along with the retirees on the Nine Provinces Number 1 Party, so she acquired not heard the conversation between the two.
The actual influx of your divine tribulation?
When he was discussing, the divine tribulation inside the atmosphere concluded acc.you.mulating electricity and descended all over again. The last ‘purple-yellow gold lightning pillar’ was just the prelude for the incredible tribulation, and the real thing would start now.
For cultivators, their five feelings were actually actually less sharpened as his or her ‘divine sense’. Which has a typical sweep of these divine sensation, anything around them would grow to be as crystal clear directly to them since the palm in their hand.
Soft Feather stated, “Doudou, Older person Piece of music, we must get the head ahead of our vision is stripped gone too!”
Doudou reb.u.t.ted, [Why don’t you examine the hair onto your travel very first ahead of laughing at another person else’s frizzy hair?]
Very soft Feather reported, “Doudou, Senior Piece of music, we must grab the head well before our eyesight is stripped away also!”
blaze.pizza near me
Everybody was in a condition where their primordial souls ended up resonating, which allowed those to communicate collectively mentally.
Everybody was in a condition where their primordial souls were resonating, which made it possible for those to connect with each other mentally.
Dharma Ruler Development explained, [That is terrible, we’ve been missing out on all of our five sensory faculties.]
The Holy Sword with the Conclusion plus the various skills in the older persons, which were getting viewable via the Thirty-Three Divine Beasts’ Mixed Awesome Jewel, all added down on the divine tribulation Buddha.
Currently, two puffs of whitened smoke sprayed coming from the nostril of the Buddha sculpture.
Sword intention billowed out, and intense yellowish qi packed the atmosphere.
Novel–Cultivation Chat Group–Cultivation Chat Group
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710789.95/warc/CC-MAIN-20221201021257-20221201051257-00020.warc.gz
|
CC-MAIN-2022-49
| 5,642
| 42
|
https://forums.makingmoneywithandroid.com/t/fan-worth-before-admob/23168
|
code
|
Since we all are seeing the huge drop in Admob rpm these days and some experiments need to be done to make sure that nothing is left out.
So i want to include the FAN network again in my waterfall. Since i will use the manual way to add the network without any mediation and integration eats lot of time and i may not do it if its not worth.
So i want to know if there are any revenue differences if we use FAN before Admob. I want to know this based on the latest stats.
Ofcourse we need to add another network to fill the ads if FAN is being used.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103034930.3/warc/CC-MAIN-20220625095705-20220625125705-00258.warc.gz
|
CC-MAIN-2022-27
| 549
| 4
|
https://learn.microsoft.com/en-us/answers/questions/89481/ad-password-change-issue-ppe-v8-udp-1333
|
code
|
We have users connecting over AOVPN and tried to change the AD password.
While user is able to change the password successfully, he also mentioned that the following error was displayed even although the execution completed.
"After pressing ctrl+Alt+Del and change password I had the following displayed under username “The server X.X.X.X did not respond, make sure this server is running PPE v8 or later and UDP port 1333 is not blocked by firewall.”
As far i know, UDP 1333 is not used by AD but not able to understand why this error is observed.
Any input in this will be really eye opener..
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.16/warc/CC-MAIN-20230203055519-20230203085519-00380.warc.gz
|
CC-MAIN-2023-06
| 598
| 5
|
https://navms.com/the-real-advantages-of-the-blockchain-are-here-they-are-ignored/
|
code
|
Introducing as many people as possible to the benefits of decentralization is a cause that almost everyone in this sector shares. The problem is that, in making the technology more accessible, many developers are sacrificing the advantages of decentralization for reasons of convenience.
A decentralized product should keep three key promises for its customers:
- Resistant to censorship: your things are safe and cannot be tampered with
- Self-government: you own and control your assets, identities and data
- Open ecosystems: all get value from new contributions
Dapper Labs has some horses in this race: we started with CryptoKitties, still the most popular blockchain game by volume of transactions, and we recently announced NBA Top Shot, a new blockchain-based ecosystem developed in collaboration with NBA and NBPA. We also sent Dapper, one of the first "smart wallets" for ethereum.
The value of resistance to censorship and the customers who own their data are relatively well understood. Less attention is paid to the other great advantage of cryptography that compromises centralized approaches: open ecosystems.
Open ecosystems are the cornerstone
Open ecosystems allow anyone to contribute to someone else's platform or work on the platform and receive rewards for their work. On ethereum, we are seeing open ecosystems appear in the realm of decentralized finance (DeFi).
The MakerDAO DAI, an algorithmic stablecoin, is used by dapps like Dharma, Compound Finance and many others. These decentralized loan applications provide competitive rates by using Dai to attract borrowers, while allowing lenders to make money from the assets they already own.
Compound Finance and Uniswap make MakerDAO stronger if combined together rather than existing individually. These open ecosystems are even on multiple levels, using smart contracts from more primitives to create endless possibilities. For example, Opyn is a non-confidential trading platform built on MakerDAO's Ethereum, Compound, Uniswap and DAI.
Without Compound or Uniswap, Opyn would not be able to exist.
"The combination of Primitives will allow the creation of protocols and systems that were not possible before their existence. These emerging systems will be greater than all the individual primitives alone." – The Emergence of Cryptoeconomic Primitives by Jacob Horne
Transforming creators, users and developers into stakeholders
In an open ecosystem, users, developers and original creators can gain value.
Users have more choice (because anyone can add functionality to anything) and in the end users decide what is important. The speed of software innovation increases because developers can use the other code as lego blocks.
Developers who rely on existing code, in many ways, market the product of the original creator for them, further increasing the scope of the brand. In return, developers draw on an existing and qualified user base.
Consequently, trust is created through a cyclical relationship between all the participating parties.
"I feel like we're in a unique position where platform users have an incentive to work hard to see the platform succeed and move mountains if given the chance."
– kabciane, a KittyVerse developer who creates numerous utility contracts
In the context of MakerDAO DAI, every developer who uses DAI in their dapp is preaching what MakerDAO has done for the decentralized financial ecosystem.
Why are there no more blockchain games?
Open ecosystems have significant long-term advantages, but as Brady Dale of CoinDesk recently pointed out, they are difficult to create in games. Using sidechain or centralizing the data that matters most to third-party creators, dapp developers are inhibiting potential open ecosystems related to their experiences.
Developers are building full-stack games, with most of the existing off-chain data, resulting in less modularity, less shared data and actually closed ecosystems.
One of the main design decisions for CryptoKitties was to calculate and store the genes on the ethereum blockchain. It would have been much easier not to do it, and the resulting experience would have been more accessible – but many of the things that make CryptoKitties interesting or valuable to date would have been possible.
Developers need to access these genes to create third-party games like KotoWars and Mythereum, both of which create more utility and value for specific genes (ie some cats are more valuable because these experiences exist).
If CryptoKitties had decided to reduce the decentralized value of the game for reasons of accessibility, The KittyVerse would not exist, the game would not be as reliable and the tokens would have almost as much value or utility for the players as a result.
Open ecosystems are important outside of DeFi
Cheeze Wizards, the new game from Dapper Labs, tries to exploit as many lessons as possible from CryptoKitties.
It is specifically designed as an open ecosystem: third-party developers can use the Cheeze Wizards API and artistic resources before the game launches its first official tournament by the end of the summer. Cheeze Wizards is also encouraging developers to play in the open ecosystem through a month-long hackathon, with $ 15,000 in cash prizes and a whole host of other rewards like incentives.
The same Cheeze Wizards is composed of "tournaments" hosted by Dapper Labs or third-party developers. The contract and the rationale for these tournaments are all chain, which means that any developer can create their own tournament and take a percentage from the amount collected.
The tournament contract is an integrated business model that developers can develop based on the existing IP, something that was never possible before with second level experiences.
Recognizing the reality that ethereum is not being resized today, CheezeWizards is really for and from the cryptographic community.
Blockchains and dapps can be designed so that developers can gain their fair share of contributing to an ecosystem. Rewarding developers for the maintenance or improvement of a network is the hidden treasure that craves to be discovered by open ecosystems.
"In the same way that the lively ecosystem of consumer exchanges and experiences around bitcoins, ether and ERC20 has driven the liquidity for resources, the ecosystem created by [third party] the experiences will be what drives the enthusiasm and confidence of consumers in digital assets. "
– Blockchain Gaming, which separates the signal from the noise of Devin Finzer
The choices we make now will shape the future
Many developers are turning to so-called "Layer 2" resizing solutions (eg Sidechains, Lightning network) to reduce the load on the basic blockchain and provide a better user experience. Even large companies are starting to rely on blockchain technology, compromising decentralization in favor of performance.
The pendulum for blockchain games in particular seems to oscillate towards more centralized solutions in an attempt to attract mainstream users.
Unfortunately, while this means that while developers will make users interact in an economical and simple way with their application, the main advantage of creating software in an open ecosystem – like the network effects of other developers – will be impossible to achieve.
The most difficult apps on sidechain and blockchain will have difficulty communicating with each other due to the friction and lack of standards for transporting digital resources through networks.
On the other hand, applications on networks that support open ecosystems can build one on the other freely and transparently, creating more choice for consumers and increasing the effects of the network for 39; whole system.
"Decentralized systems begin halfway through cooking but, under the right conditions, they grow exponentially as they attract new employees. "
– "Because decentralization is important"By Chris Dixon
We want to push the pendulum back in the opposite direction, towards open ecosystems and compostability without authorization. Open ecosystems empower customers and developers, ultimately creating more value for everyone involved.
Oscillates the image via Shutterstock
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817073.16/warc/CC-MAIN-20240416062523-20240416092523-00407.warc.gz
|
CC-MAIN-2024-18
| 8,204
| 46
|
https://sites.wustl.edu/monh/identifying-traits-and-classifying-species-of-missouri-spiders/
|
code
|
A useful guide for identifying key traits and classifying species of spiders.
The average outdoor enthusiast is rarely as well versed in spiders as they are in identification of trees or mammals. However, spiders are quite common, and it is valuable to be able to find and recognize interesting species. This identification card provides an easy way to classify the parts of a spider. The user can then utilize this knowledge to recognize spiders native to Missouri. This card was created by Daniel Pannock.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817765.59/warc/CC-MAIN-20240421101951-20240421131951-00383.warc.gz
|
CC-MAIN-2024-18
| 507
| 2
|
http://developer.actuate.com/community/forum/index.php?/topic/24513-map-it-google-maps-two-times-in-a-dashboard/
|
code
|
hey guys, hope you can help me with this one: i wanted to add fancy google maps to my dashboart on the iserver. but when i put more than one map on my dashboard only one map will load, the rest won't do anything. even if i put them on seperate tabs. how do i manage to put another map to my dashboard?
Map it (google maps) two times in a dashboard
2 replies to this topic
Posted 14 March 2012 - 08:17 PM
This is a known limitation of the framework for the way it emits specific DIV tags with HTML hard coded IDs in it. Since a dashboard (even with multiple tabs) is really all the same HTML page, the second time that same DIV tag is emitted, with an ID that already exists in the browser, you will not get the results you are looking for. A solution is to slightly modify the actual script code, and HTML Div IDs used by the framework so that each report has a unique name for the Google Maps container DIV.
Posted 14 March 2012 - 11:11 PM
oh wow, thank you. i never thought it would be so easy to fix this issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609305.10/warc/CC-MAIN-20170527225634-20170528005634-00450.warc.gz
|
CC-MAIN-2017-22
| 1,014
| 7
|
https://sourceforge.net/p/ant-contrib/bugs/90/
|
code
|
The var task seems not to work correctly using ant
1.6.1. The "object rape" method of stealing
the "properties" field from the Project class is no longer
valid since this had moved to a PropertyHelper class.
This breaks its functionality. A.o. the example in the
documentation that does <var name="x" value=""/> no
longer works; the <format/> task later on cannot use
the value anymore.
And: the documentation of the task speaks of a
(handy) "unset" attribute of the task, but this is not
Log in to post a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320130.7/warc/CC-MAIN-20170623184505-20170623204505-00199.warc.gz
|
CC-MAIN-2017-26
| 514
| 11
|
https://findwork.dev/65167/full-stack-developer-mfd-dcmn-at-dcmn?related_job=/64581/full-stack-developer-rentivate-at-rentivate
|
code
|
Sebastian, Team Lead, says: "Team Red is a cross-functional team owning the DC Analytics platform, which not only powers our internal agency business but also is actively used by customers worldwide. We are a driven team which enjoys a good round of Mario Kart once in a while."
You will be working in:
English (fluency required) - as we are an international team, this is our team (and company) language.
Our tech stack:
How you will make an impact:
Skills you will need to be successful:
- You will be part of an amazing cross-functional team and responsible for the marketing attribution and campaign platform
- You will be involved in the full product lifecycle of all our applications, starting from the initial idea, planning, building, deployment and maintenance
- You will be in contact with account managers and the dedicated support team to make sure we deliver the best possible product experience
What's in it for you?
- We appreciate a relevant degree or relevant work experience that provided you with the theoretical and practical knowledge and skills needed for a successful Full Stack Developer
- You have gained experience in developing solutions in different programming languages and you are adaptable and curious about new technologies.
- You are familiar with some of the common frameworks and their tools, like e.g. Django or Ruby on Rails
- You know the ins-and-outs of relational databases
- Frontend frameworks like React.js are not foreign to you
- You are keen to deploy and maintain your code in a production environment
- Well tested code is a given for you
- You want to write maintainable, testable, scalable and secure applications, and are curious to be involved in all stages of the development cycle
Flexibility & Ownership:
We allow you to take ownership of your work, make decisions and determine how you work best. In addition to flat hierarchies, we have flexible working hours based on trust and believe you should be able to work from home and remotely whenever needed.
Professional & Personal Growth:
We support your development, but you're in the driver's seat. Let us know which courses, seminars or other resources help you learn and become better at what you do. If there's something that helps you develop as a person, we're all ears too.
Environment & Tools:
Work from one of our beautiful yet cozy offices, enjoy after-work events with your colleagues or take an afternoon off with your team to have fun together. Snacks & drinks are a given, and so is the right technical equipment for you to work comfortably and efficiently.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360293.33/warc/CC-MAIN-20210228054509-20210228084509-00467.warc.gz
|
CC-MAIN-2021-10
| 2,577
| 24
|
https://lackeysailing.com/scupper-141/
|
code
|
May 9, 2019
I spent the morning taking care of various odds and ends and small tasks, starting with the companionway ladder, which I unmasked around the new blocks to remove the epoxy residue, cleaned up, then remasked for varnish buildup.
The drawer fronts were complete now, so I installed brass knobs and installed the drawers.
Beneath the galley, in the space containing the sink through hull and space for the portable cooler, I finally cleaned up the surfaces, masked as needed (mainly around the through hull, and applied gray bilge paint to the area, reaching as far as I could beneath the cabinet and beyond the through hull. This was one of the last spaces to receive this treatment.
Still in the galley, I secured the cherry piece to the top of the little raised platform, using epoxy adhesive to hold it in place without fasteners.
I continued the varnish work on the head trim with coat #3 of gloss varnish.
A power outage in the afternoon limited work time on some potential projects I’d planned, but with bright sunny weather, plenty of light in the shop, and a mild agenda for the rest of the day anyway, I worked on the electrical panel to install the two 12-volt outlets (USB and socket types), the battery monitor unit, and test-fit of the VHF, though the flush-mount kit I required to secure the VHF in the panel was still on order; in the photo, the VHF is just resting in place in the cutout.
Total time billed on this job today: 5 hours
0600 Weather Observation: Clear, 32°. Forecast for the day: Mostly sunny, 59°
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103810.88/warc/CC-MAIN-20231211080606-20231211110606-00800.warc.gz
|
CC-MAIN-2023-50
| 1,541
| 9
|
http://www.chatbots.org/ai_zone/viewthread/966/
|
code
|
You only see 1 sentence at a time. PERIOD. so you cant trap ~emohello and another sentence using a single pattern.
Normally the system will see the first sentence (~emohello) and generate a response. It will then see the second sentence and generate a 2nd response. This would be the “normal” or “default” way of doing things. When you want something different to happen, you have to code your control script or your regular script differently.
The question is…. what do you want to do.
If the user says Hello! I have a dog.
What output do you want out of your chatbot. Do you want it to reply:
Hello back. That’s nice that you have a dog.
Or ignore hello or ignore the dog or what?
first, I am going to release a tiny update probably tonight to be more efficient about it. Here is an example of how I would use it….
The issue is a user answering the question “do you have any pets” might say:
Yes, I have a dog.
Yes. I have a dog.
The 2nd 2 inputs are the same to chatscript, because it breaks off the interjection into its own sentence.
If the user says just yes, you want to ask what kind. If the user is already going to answer that question you don’t want to ask it.
t: Do you have any pets
a: (~yes) refine()
b: (%more) NextInput() refine()
c: (~pets) ….. react to pet
c: () ^retry(SENTENCE) # return to try input from scratch
b: () What kind do you have?
c: (~pets) …. react to pet
The current coding would require
c: (_*) input(‘_0) fail(SENTENCE)
but that forces the system to receive the new input again and reanalyze it again. Since the analysis done by NextInput is still valid, this is wasteful and hence ^retry now takes what kind of thing to retry and for sentence doesnt redo the prep work. This retry FAILS all the way back to initial processing of the sentence then comes in “as though it were doing this second sentence normally”.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698090094/warc/CC-MAIN-20130516095450-00037-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,879
| 23
|
http://duellinks.gamea.co/c/19avb5fl
|
code
|
It does exactly what it says. You can activate one of Victory Viper XX03 effects without destroying a monster. So if you were to activate the first effect and destroy a monster with the 1600 attack Victory Viper it would gain an additional 400 attack a la Millenium Scorpion.
After 1 powerup and 9 destroyed monsters, 1 Reyuk, 1 Parana army and the token it naturall spawn + this spells ability to destroy set spell and traps + fields. that's 9999+ damage. new farming deck.
I think it might be a good farming card.
once it got 2400 (trigger its effect 3 times or other cards increasing its atk), and summon one duplicate with the magic card.
you can easily reach 9999+ damage with Vassal + 2 union attack combo.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410745.37/warc/CC-MAIN-20200531023023-20200531053023-00416.warc.gz
|
CC-MAIN-2020-24
| 712
| 5
|
https://ooo.cra.sh/strlcpy3/rengine-more-than-just-a-recon
|
code
|
Reconnaissance like no other!
reNgine performs deeper reconnaissance via highly configurable and streamlined pipeline process. Currently capable of performing Subdomain Discovery, Vulnerability Detection, IPs and Open Ports Identification, Directory and files fuzzing, Screenshot Gathering, Endpoints Gathering, and OSINT.
Support for Subscans!
reNgine is the only open-source tool to support subcans. You no longer need to wait for the entire pipeline to complete. Found an interesting subdomain and want to do port scan? Or found a interesting subdomain and want to further perform Vulnerability Scan and Port Scan? We gotchu!
Configurable Scan Engines!
Reconnaissance pipeline has to be configurable! And reNgine comes with highly configurable YAML based scan engines that allows you to design scan engine based on your preference. Only need Vulnerability Scanning? or just need Subdomain Discovery with 10 threads? We got you covered.
With support for Clocked Scans (Run reconnaissance exactly at X Hours and Y minutes) and Periodic Scans (Runs reconnaissance every X minutes/hours/days/week), continous monitoring will help you monitor your assets, both reconnaissance and vulnerabilities.
Don't like our subdomain discovery tools? Wish to install any external tools? reNgine supports tools of your choice, update them, add them or remove simply from Tools Arsenal section.
Reports are an integral part of most VAPT process and reNgine comes with highly customizable PDF reports. Choose either Full Scan Report or just Reconnaissance Report or just Vulnerability Scan report. We have it! Configure executive summary, colors and much more!
Powerful Recon filtering!
reNgine supports advanced recon lookup queries such as
cve_id=CVE-1234-5678! Combine multiple queries with operators such as &,| etc.
Recon data changes!
reNgine can also identify recon data changes. If any new vulnerabilities has been identified, or any subdomain no longer found, reNgine can detect the changes. reNgine can also send recon data changes notifications on your favourite notification channels.
Send scan related notifications on your favourite channel such as Discord, Slack or Telegram.
reNgine is a web application reconnaissance suite with focus on highly configurable streamlined recon process via Engines, recon data correlation, continuous monitoring, recon data backed by database and simple yet intuitive User Interface.
reNgine makes it easy for penetration testers and security auditors to gather reconnaissance data with minimal configuration.
reNgine just makes recon effortless.
reNgine is a web application reconnaissance suite with a focus on a highly configurable streamlined recon process. reNgine is backed by a database, with data correlation and organization, the custom query “like” language for recon data filtering, reNgine aims to address the shortcomings of traditional recon workflow.
Developers behind the reNgine understand that recon data can be huge, manually looking up for entries to attack could be cumbersome, with features like identifying Interesting Subdomains, it helps penetration testers focus on attack rather than recon.
reNgine is also focused on continuous monitoring. Penetration testers can choose to schedule the scan at periodic intervals, get notified on notification channels like Discord, Slack, and Telegram for any new subdomains or vulnerabilities identified, or any recon data changes.
Interoperability is something every recon tool needs, and reNgine is no different. Beginning reNgine 1.0, we additionally developed features such as import and export subdomains, endpoints, GF pattern matched endpoints, etc. This will allow you to use your favourite recon workflow in conjunction with reNgine.
PDF reports are something every individual or a team needs. Beginning reNgine 1.1, reNgine also comes with option to download PDF reports. One can also choose the type of report, Full Scan Report or just reconnaissance report. Also, we understand that PDF reports needs to be customizable. Choose the color of report you like, customize the executive summary, etc.
reNgine features Highly configurable scan engines based on YAML, that allows penetration testers to create as many recon engines as they want of their choice, configure as they wish, and use it against any targets for the scan. These engines allow penetration testers to use tools of their choice, the configuration of their choice. Out of the box, reNgine comes with several scan engines like Full Scan, Passive Scan, Screenshot gathering, OSINT Engine, etc.
Our focus has always been on finding the right recon data with very minimal effort. After having several discussions with fellow hackers/pentesters, screenshots gallery was a must, reNgine also comes with a screenshot gallery, and what's exciting than having a screenshot gallery with filters, filter screenshots with HTTP status, technology, ports, and services.
We also want our fellow hackers to stay ahead of the game, reNgine also comes with automatic vulnerability reporting (currently only Hackerone is supported, other platforms may come soon). This allows hackers to define their own vulnerability report template and reNgine will do the rest of the job to report vulnerability as soon as it is identified.
reNgine is packed with features that no any open other source tool provides. Here are some list of cool features supported by reNgine:
- Reconnaissance: Subdomain Discovery, IP and Open Ports Identification, Endpoints Discovery, Directory and Files fuzzing, Screenshot gathering, Vulnerability scan using Nuclei, WHOIS Identification etc.
- Highly configurable YAML based Scan Engines
- Support for Parallel Scans and Subscans
- Automatically report Vulnerabilities to Hackerone
- Recon Data visualization
- OSINT Capabilities (Metainfo Gathering, Employees Gathering, Email Address with option to look password in leaked database, dorks etc)
- Customizable Alerts/Notification on Slack, Discord and Telegram
- Perform Advanced Query lookup using natural language alike and, or, not operations
- Recon Notes and Todos
- Clocked Scans (Run reconnaissance exactly at X Hours and Y minutes) and Periodic Scans (Runs reconnaissance every X minutes/hours/days/week)
- Proxy Support
- Screenshot Gallery with Filters
- Powerful recon data filtering with auto suggestions
- Recon Data changes, finds new/removed subdomains/endpoints
- Tag targets into Organization
- Identify Interesting Subdomains
- Custom GF patterns and custom Nuclei Templates
- Edit tool related configuration files (Nuclei, Subfinder, Naabu, amass)
- Add external tools from Github/Go
- Interoperable with other tools, Import/Export Subdomains/Endpoints
- Import Targets via IP and/or CIDRs
- Report Generation
- Toolbox : Comes bundled with most commonly used tools such as whois lookup, CMS detector, CVE lookup etc.
- Identification of related domains and related TLDs for targets
- Find actionable insights such as Most Common Vulnerability, Most Common CVE ID, Most Vulnerable Target/Subdomain etc.
🚀 Getting Started
- If this is your first time visiting reNgine, here is a guide on 🚀 Getting Started .
- If are already using reNgine and wish to Update/Upgrade, head to 🔥 Update .
⚡ Usage Guide
If have already installed reNgine, and want to learn how to use, head to ⚡ Usage.
💻 Developer's Guide
If you wish to add new features or want to contribute to reNgine, head to Developer's Guide
🙋 Need Help
📹 Community published blogs/videos
Community may have published blogs/videos on your own language. Please check the community published blogs/videos here.
🛡️ Reporting Security Issues
If you have found any security issues on reNgine, we recommend reporting them immediately. reNgine also has it's bug bounty program and is your chance to get paid for security issues.
Guide on How to report security issues is available.
If you want to know the latest changes in reNgine, head to 🤖 Changelog.
There are many other great reconnaissance framework, you may use reNgine in conjunction with these tools. But, they themselves are great, and may sometimes even produce better results than reNgine.
Over the last few years I have been working insane on reNgine to bring new features with the only goal to make this as De-facto standard for reconnaissance. Most of my out of office hours and weeknds are spent on working on reNgine. I do this with addition to my primary job. I am happy to have received such an overwhelming support from community. But to keep this project alive, I am seeking financial support.
It takes a considerable amount of time to add new features and make sure everything is working. A donation is your way saying: reNgine is awesome
Any support is greatly appreciated! Thank you!
reNgine is licensed under the GNU General Public License v3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817200.22/warc/CC-MAIN-20240418061950-20240418091950-00405.warc.gz
|
CC-MAIN-2024-18
| 8,843
| 71
|
https://github.com/madlib
|
code
|
MADlib has moved to Apache MADlib (incubating). Please send pull requests to the Apache repository.
Examples on how to use MADlib
Git mirror of the upstream mercurial Eigen (https://bitbucket.org/eigen/eigen). This repository is patched to use specialized memory allocators for the MADlib project.
Mirror of Apache MADlib (Incubating) - Send pull requests to the Apache mirror: https://github.com/apache/incubator-madlib
This Git repo is maintained to support MADlib with a patched version of Eigen. This will not compile without the MADlib headers. Use original Eigen repo for standalone code:
Front page code for MADlib.net
Large test suite
Historical workspace, please use madlib/madlib
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171271.48/warc/CC-MAIN-20170219104611-00110-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 689
| 8
|
https://blogs.sap.com/2012/12/19/sap-id-service-improvments/
|
code
|
About SAP ID Service
SAP ID Service is the central cloud services that covers the process for managing identities and their life cycles within the SAP cloud. With this ID Service, users will be able to set up one SAP identity and leverage single sign-on when browsing SAP websites, using SAP on demand systems, or accessing third-party on-demand applications.
SAP’s ID Service saves time and resources by enabling users to update their profiles only once and requiring just one password to log in to SAP’s various on-demand systems.
With the increasing use of the SAP ID service, we realized that the response times were not optimal for such a central authentication service.
In several analyzes using the SAP JVM Profiler we worked out several hot spots in the code, which had to be optimized.
As an example: there were identical read request to the same document in MongoDB again and again. This document was converted with each reading using the Morphia Google Mappers to a Java object to work only with a few attributes.
The same pattern occurred repeatedly. Also at other code places the same request to backend system was done again and again.
In the first case with the object mapping a solution was implemented relatively easy using a local cache. The latter case several attempts have been made, but not all led to hoped-for success.
Here, too, using a local cache we tried to reduce the queries against the backend. However, it was not possible to keep the cache at request scope. So this cache was discarded.
SAP ID Service offers a variety of ways to authenticate a user. The detection logic with which method a user should be authenticated with is not so simple.
In a revision of this resolution we focus on the “Happy Path” for the four main authentication methods. These requests are processed quickly.
The changes were not limited to coding.
So the connections to the LDAP server has been revised. So far, the LDAP servers have been operated in a master-master replication mode, to distribute the read/write access to all LDAP servers. This replica mode was converted into a master-slave mode. So writes occur only on one LDAP node. In addition, we optimized the connection pooling to the LDAP servers.
Additionally we could sharpen the utilization of all nodes by improving the distribution rules in the load balancer.
In total all these measures achieve a significant improvement in the user log on.
Thus, the response time went down from about 700ms to an average of 80ms.
In parallel, the number of concurrent request has nearly tripled.
Here some graphs from before and after the activation of these changes:
Average Response Time per Server:
Parallel Client Connections:
Number of LDAP Connections per Server:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107892062.70/warc/CC-MAIN-20201026204531-20201026234531-00436.warc.gz
|
CC-MAIN-2020-45
| 2,739
| 21
|
http://stackoverflow.com/questions/11518830/what-is-alternative-performance-tuning-tool-of-yourkit-jprofiler
|
code
|
Well, I have to say that YourKit/jprofiler is a best Java performance tuning tool, but it need licence so it don't fit me at this moment, could you guys have alternative performance tuning tool? If it is free that would be deeply appreciated.
it need having some features like YourKit that can capturize/monitor all methods which are invoked in a certain period time and reports all details with calling structure.
I tried Oracle JRockit Mission Control, to me it seems having some lacks, especially you must add these methods that need to be monitored. its not a good idea since many times I don't even know which methods are being called and who is the caller. so it didnot give me comprehensive view to tuning performance issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257827079.61/warc/CC-MAIN-20160723071027-00072-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 731
| 3
|
https://music.stackexchange.com/questions/32976/how-can-i-visualise-the-effects-of-eq-as-a-curvature-represented-on-a-graph
|
code
|
The fun thing about working in the frequency domain is that the maths are really simple. For example, the effect of an equalizer is completely independent of the signal you're feeding it, it's just a simple multiplication of the signal (in frequency domain) with the equalizer frequency response.
What I'm getting at is that any visual equalizer already exactly shows what you want. So, if you have an equalizer that has settings for attenuating different frequencies (e.g., the one from windows media player), and you draw a nice smooth line through the settings, you already have the plot you want! Again, this is completely independent* of the signal you're feeding it.
Now what if you have an equalizer that has some vaguely named knobs like low, mid and high? Then you have a bit of a problem. Although it's possible to create the plot you want (divide the Fourier transform of the original and the equalized sound, and take the absolute value - i.e., what JCPedroza was getting at), chances are that it will be a very, very ugly plot. This is because, especially in music, many frequencies will not be present in the signal (if someone's singing an E, you won't have a lot of F in your signal), but above method will still try and get a frequency response at the frequency of a hypothetical F note. The result: a completely unreadable plot. The only 'easy' way to get a nice plot is to average a bunch of white noise fed through your equalizer.
*Completely independent in theory. In practice, there are always inaccuracies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816863.40/warc/CC-MAIN-20240414002233-20240414032233-00523.warc.gz
|
CC-MAIN-2024-18
| 1,529
| 4
|
https://documentation.grax.com/docs/december-2022-release-notes
|
code
|
Added "Get Support" button and "Diagnostic Reporting" to the web app. This flow opens a support case that automatically includes all relevant environment, version, UI, and network details.
Added a special viewer for "EmailMessage" records to display them more like an email client.
Added a new option to specify IDs of records to restore via an SFDC report.
Improvements to archive plan and delete steps.
Updated 3 days ago
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00730.warc.gz
|
CC-MAIN-2023-40
| 423
| 5
|
http://mylespiags.blogofoto.com/4215839/the-fact-about-programming-assignment-help-that-no-one-is-suggesting
|
code
|
This course is a comprehensive introduction to Python for Data Evaluation and Visualization. This class targets Individuals who have some basic understanding of programming and want to consider it to the next amount. It introduces how to work with diverse knowledge structures in Python and handles the most well-liked Python info Evaluation and visualization modules, which includes numpy, scipy, pandas, matplotlib, and seaborn.
With this segment with the Python course, learn the way to employ Python and Regulate stream to add logic to your Python scripts!
As a rule, you'll have to take care of information which is dirty and unstructured. You will study numerous ways to wash your facts such as implementing regular expressions.
I strongly propose this course to all prospective students which have some programming qualifications. The rate in the beginning is essentially quick to deal with the basics of syntax and structure, to make sure that more time is often devoted to numpy/scipy/pandas/etcetera. John was an excellent teacher, and impressively it absolutely was his initial time educating the study course!
We're going to cover these simple Python programming subjects while in the program also, but shift at a relatively quick pace.
We'll protect these basic Python programming topics while in the class as well, but move at a relatively quickly pace.
Wonderful course. For only a 5 week course it is vitally complete. Handles the basics and generally employed libraries click to read Employed in python for information Evaluation at the same time has tips on how to make use of them.
So Exactly what are you awaiting? Master Python in a way that will progress your career and increase your know-how, all in an enjoyable and functional way!
I took the main supplying of knowledge Science utilizing Python a number of months back, and certainly advocate it to anyone who enjoys hands-on Finding out with some steering. Allow me to demonstrate: Last year, I took Coursera’s Machine Understanding/Intro to Facts Science programs and did very well, but didn't do a fingers-on project that might empower me to retain a whole lot of knowledge. But this training course necessary me to pick a detailed project and existing it to your Reside viewers, who then decided no matter if I did very well or not.
Seaborn is a Python visualization library dependant on matplotlib. It offers a substantial-stage interface for drawing statistical graphics.
Notebooks used in the class are an awesome go-source once the class finishes. Also an excellent community of knowledge gurus and networking In case you are contemplating a whole new gig.
Entire this assignment! You'll need to discover some approaches in many Python objects along with make several capabilities!
I'd state that I bought just what exactly I came for. Tony is an excellent teacher. He is ready to express intricate concepts in an easy to understand way, and I would unquestionably express that now I comprehend plenty of in regards to the Python ecosystem which i could begin Mastering on my own if I desired.
Let us get A fast overview in the help() function in Python, tips on how to use it with procedures, in addition to the Python Documentation
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823303.28/warc/CC-MAIN-20181210034333-20181210055833-00420.warc.gz
|
CC-MAIN-2018-51
| 3,219
| 14
|
http://cg.iit.bme.hu/~szirmay/ibrshadow_link.htm
|
code
|
In many computer graphics applications it is desirable to augment the virtual objects with high dynamic range images representing a real environment. In order to provide the illusion that the virtual objects are parts of the real scene, the illumination of the environment should be taken into account when the virtual objects are rendered. Proper calculation of the illumination from an environment map may be extremely expensive if we wish to account for occlusion, self shadowing and specular materials. In this paper we present a method that does all the calculations on a per-frame basis, and is already real-time on non-cutting-edge hardware.
HDRI, shadow, GPU, reflection.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103940327.51/warc/CC-MAIN-20220701095156-20220701125156-00304.warc.gz
|
CC-MAIN-2022-27
| 679
| 2
|
https://www.windowscentral.com/microsoft-responds-detail-google-blocking-youtube
|
code
|
Microsoft responds in detail to Google’s blocking of YouTube; cites HTML5 and unfair treatment
Last night, Windows Phone Central broke the news about the new Microsoft branded YouTube app essentially breaking. We investigated the problem and concluded that it was due to a revoked developer key. Such a scenario could only happen if Microsoft forgot to update it or if Google yanked it.
That latter situation implies that Google did not authorize the app and was taking direct action of their own by disabling the video player on all Windows Phones. Indeed, just a few hours ago this was confirmed when Microsoft said as much in a note to the press.
Now, David Howard, Corporate Vice President & Deputy General Counsel at Microsoft, has taken to TechNet, Microsoft’s blog on legal and public policy. Needless to say, the nearly 1000 word statement is chock full of information and more details on the matter, making an excellent read.
HTML5, branding and unfair requests
Presenting Microsoft’s side, which of course is expected to be biased towards themselves, Howard finally gives the details behind the current situation with Google.
It’s noted that for a few years now, Microsoft has been striving for a comparable YouTube experience that is found on the iPhone and Android—something for which we see as reasonable. Redmond reiterated that claim earlier this year soon after Windows Phone 8 launched. Google, however, was reportedly not willing to share certain data with Microsoft on to make that happen. As a result, up until April 2013, Microsoft had a much inferior YouTube experience.
This past spring, Microsoft released their version of a YouTube app and it was very well received by the community. However, Google took issue with it and asked that it be removed. Microsoft obliged with the condition that they can work with Google to release an app of comparative performance with their competitors (iOS and Android).
Microsoft agreed to Google’s terms and in version 3.2 of the YouTube app, released earlier this week, they had enabled Google’s advertisements, disabled video downloads and eliminated the ability for users to view reserved videos.
But there was evidently one more thing Google wanted: the app to be coded in HTML5.
Microsoft notes that this was an unusual request since iOS and Android are currently not encoded in HTML5 and moreover, after investigating whether it could be done both companies agreed that making an HTML5 app would be technically difficult and time consuming (and perhaps that was Google’s intent).
This was the breaking point as Microsoft decided to release the non-HTML5 version of the app with the intention of returning to the matter later with Google.
Other lingering issues
Other problems that Google cites are ads “based on conditions imposed by content creators” aren’t always displayed. Microsoft claims that they need more data for this, something for which Google reportedly won’t share.
Finally, Google evidently now has a problem with the branding i.e. it seems like an official Google app when it’s made by Microsoft. Another reason is that according to Google, this new app provides a “degraded experience”, something for which most users have not objected too, making it vacuous.
Where to next?
It is clear Microsoft is ratcheting up the PR war by releasing this statement. From their perspective, Google has set prejudicial requirements for Windows Phone that iOS and Android are not obliged to meet. To that end, especially the request for the app to be in HTML5, it does seem that Google here is behaving rather dishonestly.
However, we should note that Google has yet to go into as much detail and surely they have their side as well. Regardless, this dispute has clearly crossed a line and Windows Phone users are suffering at their expense.
Source: TechNet (opens in new tab)
Windows Central Newsletter
Get the best of Windows Central in your inbox, every day!
Daniel Rubino is the Editor-in-chief of Windows Central, head reviewer, podcast co-host, and analyst. He has been covering Microsoft since 2007 when this site was called WMExperts (and later Windows Phone Central). His interests include Windows, laptops, next-gen computing, and for some reason, watches. Before all this tech stuff, he worked on a Ph.D. in linguistics, watched people sleep (for medical purposes!), and ran the projectors at movie theaters because it was fun.
FUCK GOOGLE THEY FREAKING SUCK. :)
Not MetroTube,Tube Pro or whatever. Google are just be an ass about this.
FUCK GOOGLE THEY ARE FREAKING SUCK!
GOOGLE .......YOU NEVER HAD ANY QUALITY.....NOW YOU DONT EVEN HAVE REPUTATION...!
At least there is MyTube and MetroTube
Both company hate each other. Microsoft always bully Google services(e.g.- Privacy)
I don't know why Microsoft come-up with those apps which always violates Google terms and condition and give them chance to block. and where as Google just need a reason to do this.
Google is not going to make apps unless WP get resonable market shares.
So, I see this is fault from both Microsoft and Google for this mess.
and we as WP users have to suffer.
Still Google search engine is loved by everyone holding approx 90% market share. Google beat Microsoft almost in every service which provided by both companies.....Smartphone OS, Search Engine, browser etc..... I am still saying that its both companies fault. Both companies hate each other so much that they don't want to see there existence. Microsoft always build app which violates Google terms and conditions and Google always going to ban for this.
And we as WP users have to suffer for this
I've switched Bing, good for 90% of my searches, the more in the weeds technical searches I still use google.
They aren't better or worse, but for my needs I don't have a pressing NEED for google services. I still use the email, but I never was a big personal email user, so I can take or leave what ever free email I can get.
Google Search engine is far better than Bing, I used Bing and leave it. Because search results aren't good as Google search engine neither the presentation of data.
Lets take other services like
YouTube vs. Bing Video
Gmap vs. Bing Map
Android vs. Window Phone
All above services Google beat Microsoft by very large margin.
Because Microsoft have a habit of not listening to customers and they provide what they want not what the user want and they are very slow on that too.
And MS "not listening to customers"? Are you kidding? I have never seen a company be as responsive to customers as MS has been recently with the XBox One, basically, reversing position on many of their initial plans due to customer feedback.
In contrast, Google makes money from advertisers, not from paying users, which means they don't give a crap about us as end-users, as long as the experience isn't so bad that we stop using them completely. Google is a vile company.
Unfortunately, YouTube, Google Earth, and a few other apps have no equal (at least that I know about), so we go to Google for those. I hope this babyish behavior of rejecting the app and refusing to offer their own causes MS to offer than own alternative to YouTube or some other company to step into the gap.
All I am saying about market shares .
Sorry, to say but Microsoft don't listen to customer......I said this specially for WP.
GDR2 and 3 are full of craps features. We as WP users need basic features which are missing on WP.(Auto-rotate screen on/off option, better brightness control(since battery back-up isn't good), centralised notication etc)
Where as what did microsoft provide -data sense..totally crap.
I don' t know how it is more useful that those basic features.
They might provide some feature in WP blue but ......wait is too long. Microsft intentionally launch half baked OS and they have habbit of provideing those features very slow or might not provide at all.
I would prefer Microsoft work on certain things, but they know best where they are heading and how they can get there. It would be a fools arrand to attempt to appease everyone and as the XBox One fiasco has shown, listening to customers isn't always the proper course of action.
This has all been well-covered on this site.
Therefore, I don't believe it's reasonable to conclude that MS is not working as hard or fast as it can, albeit slower than many of us would like, to add key features to is fledgling OS that address the needs of its customers, even its current customers (more scale means more apps).
I'm honestly asking because I don't know for sure.
Google is making BS excuses to cover up the truth, otherwise they would be blocking those other OS' because they don't use HTML5 either.
Never did, never will.
Yes, I said that for all to read.
Your "never did, never will" is just so a-hole!
Yes, I said that for all to read.
After all, I just took his troll comment and turned against him, 'cause someone who uses Windows Phone really doesn't have much moral to talk about Linux desktop market share....
All users can access it through browsers, and it's not an 'essential' part of any OS/mobile OS.
over that there are dozens of unofficial youtube client already in WP market. google didn't stop them even though most of them are violating google's TOS.
It's not an essential part of the OS and there is Explorer and Firefox to replace it. But if that were to happen, what do you think Google would say?
Unfortunately, Google can easily afford whatever they would be ordered to pay if a judge found them guilty, and they know it. In the meantime they are hurting the winphone platform which is much more valuable to them in the long run.
2). FUD... Really?? Like Samsung paying people to scour other non-samsung device forums and troll people?
And before you take that particular stance look up google's patent violations and why Microsoft and Apple (mainly Steve Jobs) were gunning for them so hard.
Google will pay a HUGE penalty because of breaking the antitrust laws
I think US of A should pay special notice on the privacy issues, too.
Privacy should be only broken by CIA, not a private co.
That should be constitutional
They may be violating anti-trust laws by blocking MS like this (not clear on the facts with this yet), but that's a whole different issue.
Lets see if we can get their attention with this:
What Google did is a perfect analogy of what Microsoft could’ve done but not allowed to do due to antitrust regulation. Google, in order to sabotage the wp platform, it leverages one of its monopoly product (youtube web service), and intentionally create a sub-par youtube experience on wp platform (by not developing a youtube app for wp, AND not publishing necessary API’s to allow Microsoft create a substitute app). It doesn’t matter what excuse google uses, the intention is loud and clear: Google would do whatever it takes, whether it’s unethical or even illegal, to stop wp, or any Microsoft platform, from having a youtube experience on-par with any other platform can offer. It’s clear that Google doesn’t care the consumer experience of the wp users, and they don’t even care their youtube content creator’s value.
Or, Microsoft can take a simpler approach. What if MS offers an OS level ad blocker that blocks all Google ads, or all online ads? Would that pretty much kill Google all together? OK, Microsoft may also lose their own ads business, but if they go into a full-fledged war, which seems to be what Google wants, it’s not a bad deal for Microsoft. I know what you’re thinking. No, it doesn’t necessarily trigger antitrust law suit, as 1) Microsoft doesn’t really block Google service. Users can still use google search, youtube, gmail, most likely with a better experience. And 2) Microsoft can make it user configurable. But I’m not sure, other than the diehard google fan boys, how many users would be willing to unblock the ads.
We then went a head and setup some windows 8 pc's that the company wanted and they bought office 2013 with them and we could not get the Google sync installed and again the said that the software dose not work with outlook 2013 and they don't have a way of fixing the issue but they have said if the customer upgrades to 2013 office pro it will work. Now I can't work out why that would make a difference. In the end we ended up moving them over to office 365 and since then we have not had any issues. For me Microsoft get a lot of stick on the web but I have tried all the other Systems out there and every time I've fond my self falling back to Microsoft Systems as the support is always good and for me anyway there devices just work and work well together for what I need them for. I hope Microsoft and Google can get this sorted out but I am starting to find my self using YouTube less and less and it would be funny if someone managed to take the market away from them over the next few years but I don't see it happening.
Calling Google anticompetitive for not making a YouTube app for Windows Phone is like calling Microsoft anticompetitive for not making a SkyDrive sync tool for Linux. Both companies chose not to support operating systems that have a small marketshare. It sucks for users of those operating systems, but it's not anticompetitive. There's no law that says you have to make software for every platform out there.
If was just Google did not wanting to do an app, it was fine, but Google does not let Microsoft creates and YouTube app.
Just imagine Microsoft blocking the Google Chrome in Windows because it was not done using Delphi.
Or someone doing an SkyDrive for Linux and Microsoft ban it because the app wasn't pretty.
This treatment of Google is a lost-lost deal, but Microsoft lost more on this. Google prefers to have less Ad than lost users of Android to Microsoft.
And, for the last, it can be an antitrust action because Google is using a service to monopoly another one. And just remember, there is no “Low range” IOS, but there are plenty of “Low range” Windows Phone.
Thanks for calling me stupid though. It really added a lot to the conversation.
You think if Google wrote a program for Chrome that worked just like Office and named it "Office" Microsoft wouldn't get upset and demand it be shut down?
That said, I think MS has intentionally engaged in this battle to highlight issues with Google. They do something for their customers that Google refuses to do and Google lashes out. Google's chief also has lashed out at MS for including Google Talk capability in Outlook, even though they made the API public and encouraged it.
One problem is Bing, which has been growing its search share. Another is Outlook.com, an equal to Gmail, and the big one is Office, the juggernaut that Google is trying to make inroads against (Forbes reported at the beginning of this year that Office still controlled 95% of the productivity market). Truth is, Google isn't all that good at converting things from Office and wants greater access to that market because it'll give them more data to sell to advertizers since that is pretty much what Google does.
So they lash out where they can.
I expect them to also lash out at Samsung when they ditch Android for Tizen and attempt to break Google apps for Android's functionality on Tizen.
I can tell you from sources inside the industry, everyone HATES Google, but they need them for now. However, they see a time coming when Google will get theirs.
So why specifically lash out at Windows Phone beyond the other issues? Because you want to thwart growth. Samsung will abandon Android, but not WP. A growing WP8 user base may move more manufacturers over, limiting Android's own growth (actually, Samsung leaving guarantees a massive implosion). You can bet that MS would like to aggressively woo others to the platform. A problem for now is the benefits that Nokia reaps, but those benefits are necessary for the platform to grow. Even so, Android without Samsung, without the bleed effect from them, will be a shrinking platform, not a growing one. Eventually only Moto might be left if the cards can be played right.
IzaacJ on XDA/Twitter/WPStore/everywhere else so... Yeah, MetroTube DOES work.
But maybe it is time to try again? Integrate the 360 and One DVR, WP, surface, and iOS with it. Maybe it will get traction on attempt 2.
That said, yes, it's time for them to make a competing service again. I think it could work if they bought out Vimeo and gave it a new paint job (and a new Terms of Service).
- Typed in Google Chrome.
For the time being FUCK YOU BUNCH OF BASTARDS AT GOOGLE, FACEBOOK & INSTAGRAM for not creating or not letting create an offical WP8 apps. However, Unofficial apps of all 3(FB, Instagram & Youtube) are better than official as they allow us to *Download* the videos or images! So in a double meaning Fuck you!!
Update: just tested the download feature and its working as well, so ya, as of this posting supertube seems to be fully functional, which is good since its my favorite you tube app Update2 my mytube app will only play 1 vid, then error after that
I use Gmail. A lot. I like Gmail. A lot. I also use and like YouTube a lot. However, I also like Microsoft and Nokia a lot. Google has set it up so that I can't properly use Google services on Microsoft's operating system or the phones that Nokia makes for that operating system.
I can, however, use a lot of Microsoft services on Google's mobile operating system Android. Microsoft is currently supporting Android in a way that would let me switch to Android and keep using a lot of the Microsoft services that I love (Skype, SkyDrive, etc.)
I love WP. I really do. But Google's tactics are working on me and I think my next phone may be an Android phone. I don't want to switch to Outlook.com. I don't want to miss out on YouTube and other Google apps. I want my phone to work properly and I want services like Gmail and YouTube to work properly on that phone.
Honestly, the only things keeping me on Windows Phone right now are Xbox Music Pass and Nokia. However, it's starting to look like the Nokia phone that I really want (the Lumia 1020) might not even come to Canada any time soon. That's yet another issue for me.
There are just so many roadblocks and difficulties that I'm facing as a Windows Phone user right now. Switching to Android just seems so much easier. I'm sick of battling.
Sorry for the long comment.
Sadly, my workplace only allows searching with google, all sites related to work (gsmarena, retail stores, manufacturers) and wikipedia + google are allowed, everything else is blocked by proxy. Sadly, bing is included in all that blocked stuff.
Only "basic" thing I want MSFT to improve now is desktop IE (ModernUI works fine). At work, our main system (Oracle Siebel) crashes 90% of the time, works fine in all other browsers except Chrome.
That is all...
Get your friends and family on board. Start a Facebook / Twitter / Instagram movement. Use Firefox, IE Opera, Safari on the desktop ANYTHING but google chrome.
Remove all the office,skype and other support from android and chrome os
Dont need to remove office and Skype... but give error while installing chrome, while using gmail, and google services.. just say it is OS bug. lets seee what happens.
The answer is to create a better platform than youTube. It's so over. It looks and smells like it was designed in the MySpace. era. It demands replacement.
So if we all have to choose, there's no point in choosing Google. RIP.
What is their incentive to stop using YouTube? Why would they NOT watch all the content that is on YouTube? Why would they even TRY something else, when all the content is on YouTube already?
I don't specifically know the situation in China you are talking about, but it wouldn't surprise me if the government had a hand in it one way or another... but in the US I don't see any way to stop YouTube unless they introduce something that is so unpaletable to the average viewer that it drives them to alternatives.
The only FACT here is that Google is clearly biased against Microsoft...kinda nice to see that Google views Windows Phone as a big enough threat to resort to such shameless tricks...
You can only set up a Google account.
#pureevil needs to be started as a label for Scroogle. Just like Larry Ellison said they were.
But this just makes it plainly retarded.
I really wish there was an alternative to Youtube. A GOOD alternative.
1. Buy up some up and coming EA and Gameloft titles, I'm thinking, the most hyped up games -- e.g. Asphalt 8, Modern Combat 5, Real Racing 4, etc. Release them on Windows Phone, Windows, iOS, Xbox One -- skip out Android.
2. Stop updating the Android Skype app, beyond basic repairs.
3. Try buying up Flipboard Inc, and take it off Android (except for Kindle, let's just F with them).
4. Stop licensing Windows Phone, make it free to all OEMs, but be extra aggressive about patent fees on Android.
5. Identify start-ups with lots and lots of potential and promise, buy them up, the next FB/Twitter/Flipboard/Vine/Instagram will be among them.
Or, preferably, Microsoft could totally continue doing it this way and make a statement that says "THIS is how you treat your users! Not the Scroogle way!"
That would hopefully do some difference if that would spread to all major techsites.
Google has no reason to insist Microsoft develops the app in HTML5, when their apps are native. No HTML5 app on any platform that supports it has comparable performance to a native code version, a point proven by Facebook last year when they ditched their HTML5-based app on Android and replaced it with a native code version. I used Android at the time and, needless to say, the performance difference was night and day.
The advertising issues are beyond Microsoft's control. They've had to reverse engineer the APIs as it is, if Google just gave them the data it would be fine. Plus bear in mind that even in its incomplete state, Google are receiving ad revenue via the WP app, something which Microsoft implemented at their own expense!
As for the trademark complaint and performance... the old web bookmark with vastly inferior performance was okay, then?
Bye bye google.
I think ms figured the app would be ready to go weeks after, but google pretty much just bait and switched them and forced their hand to release.
I dont think google had any intentions to make this easy for MS at all.
Still, I agree, Google is evil and we really need a Microsoft replacement.
Google = #pureevil
Did a fellow welsh man write this?
That would learn them. People can still use it on Chrome books (all .000000000000000001 % of people out there) Seriously MS should throw their weight around. Block Chrome from windows, block gmail, youtube from IE because it isn't written in HTML 5. Just cut that crappy advertising company out.
LOL this must be a joke. Everyone knows, that Google itself is a dishonest company. It is a thief and spy. It uses "a stolen product" and offers it for free. Not everyone knows that Google tracks everything you do. Your whole life in internet will be saved and sold for anyone who is willing to pay for that information.
There is one fresh statement Google brainfarted out recently:
"Google: Email Users Can't Legitimately Expect Privacy When Emailing Someone On Gmail "
As of right now Google could easily pull all their official YouTube apps and make it Android exclussive and Apple already is doing something like that with iTunes.
Started moving my Google App accounts to Microsoft today... they finally pushed me over the edge. All the changes to gmail, adding promotion tabs etc. just add to the desire to leave.
Once a Google evangelist, now a Google antagonist.
Good job Google, you were my default search engine for >10 years!! (previous was altavista), thnaks for making me make the switch to bing.
Android is a big joke, so no questions theere... I love WP, but with all these tirades from competition, the pains of being an early adopter is becoming more and more manifest. iOS suddenly become even more stable than it already is. Congrats, Tim Cook!
Lets make a scene.
I mean, Microsoft products are now way better than the Google products we all had in the past (take Outlook.com's premium-feeling webmail to Gmail for instance).
Unfortunately the users suffer, but ms crying fowl is pure hypocrisy. MS has always bent the rules, threw out standards, and played hardball with competitors. This is nothing more than a song and dance.
If a Microsoft product isn't working well on another platform then its probably that platforms fault.
Microsoft apps are often better with more features on iPhone & Android, case in point - Skype.
You would have to be blind or ignorant to not see Google's fault in this situation.
As important as Goog is to tech advancements / R&D, etc., there is LOTS OF LIFE TO BE HAD WITHOUT THEM.
I have also seen folks comment that there is even a YouTube app for BB10. Just curious - anyone know if it is just a port of the Android app?
Anyway, BOO GOOGLE, and please MSFT - PLEASE - keep your head. Don't retaliate and get into a PR nightmare with the general public. There are still sooo many tech consumers that have no clue - they just know / use what they hear is good or they can get for cheap, and I gotta say - there is waaay too much anti-Microsoft press out there.
Let's go MSFT... don't lose momentum with the WP platform!
I'll stop to use Chrome, Internet Explorer is now good enough for use.
And in the 8.1 IE8 has synchrony of favorites, so it's enough for me, I don't use extensions, so it simply.
block outlook.com to all chrome broswer... ask google to make a lot of change to there broswer and then, ask for more...
and why not, blocking all android device form using skyp...
if Microsoft play the same game, Scroogle mith understand some day..
I read the AndroidCentral post about this hoping they'd have something on Google's reply (I got nada). Then I scrolled through the comments section and could not contain myself, so I JUST HAD TO COMMENT TOO. Now, I feel as if I have opened the gates to hell.
#notetoself: NEVER POST ON ANDROIDCENTRAL AGAIN.
Ok I know that most people are aware of YouTube app problem on WP, but that shouldn't stop people from buying a WP.. Hahahaha
Download metro tube its a lot better than the MSFT created.. Ad free
I hope this influences people to decide whether to use Google's software at home, school and office. Seems to me they just plain can't be trusted. Then again, we all already knew that.
In Windows XP it will be installed in
C:\Documents and Settings\UserName\Local Settings\Application Data\Google\Chrome
Local Settings folder is a hidden folder, to see hidden folder go to tools -> Folder Options -> View tab -> and make sure show hidden files and folders is checked.
In Windows Vista it will be installed in C:\Users\UserName\AppDataLocal\Google\Chrome
AppDataLocal folder is a hidden folder, to see hidden folder go to tools -> Folder Options -> View tab -> and make sure show hidden files, folders and drives is checked.
In Windows 7 it will be installed in
AppData folder is a hidden folder, to see hidden folder go to tools -> Folder Options -> View tab -> and make sure show hidden files, folders and drives is checked.
Remember when Microsoft and Bill Gates were the bane of the world? Now Microsoft allows and even encourages "hacking" of Windows smartphones, while Google and Apple sue anyone and everyone. Bill Gates is now one of the world's greatest philanthropists. Apple and Google are now the shameless greedy bastards.
Wasn't it Microsoft who went after *every single* Android OEM with patent infringement suits, like the neighborhood mob enforcer visiting a local business establishment?
No more using Google from now on, only Bing. This is war people.
Going after Android OEMS with patent infringement suits?
I mean, really, come on. For Microsoft to cry now about unfair tactics is a bit absurd and hypocritical.
Microsoft are far from perfect but Google are just plain evil.
What if you created a software product and someone else used patents you abandoned and claimed that you no longer used them? Of course you'll sue that someone to pay for these abandoned patents! Patents, whether they're used or abandoned always belongs to the patent owners (in that case Microsoft) and nobody or no other company can use them without permission or payment.
So it's not truly Google taking revenge against Microsoft, but Google going against Microsoft and us the Windows Phone users and don't think that Google can patent the name YouTube and the associated app, YouTube is a public video service and cannot be patented.
The best thing to do is stop bitching here and voice your displease at google; be it Twitter, Facebook, email support, blogs, whatever. If YOU use a google service, tell Google to stop the immaturity. YOU are the customer.
In the mean time, stop using YouTube and use services like DailyMotion, Blip.TV, Vimeo, ZippCast, or Metacafe.
In the meantime... I'd like to see the Youtube unblocked by Google immediately or I will most certainly move away from there services and won't be recommending them to anyone. Alternatively, most quality videos these days tend to be on Vevo anyway - and there's an app for that already.
I haven't searched on google in over 3 years.
Haven't used google docs, email or any other offering of theirs.
As Cartman would say "How would you like to suck my balls Mr Garrison?!"
This was a cheap shot with the app. But it doesn't stop there for me.
Many changes with Gmail I absolutely despise, and I find the mail is now worse.
The new/future Google maps is brutal. The current/original one is IMO perfect.
The last batch of changes with YouTube have me going there far less.
Laziness is keeping me from switching my blog over to WP.
Chrome updates are hit and miss. Some are great, some have me using Firefox.
I actually like Google+ (mainly because I hate Facebook).
The lack of a Google Drive app for Windows Phone has me using Skydrive on my Lumia 520, Nexus 7 and PC.
And lastly the search, which I didn't truly realize until today. I was searching for a product and simply couldn't find it on Google. When I went to Bing, they didn't find it initially, however had a suggestion on the side of alternative search terms, which found it instantly. When I tried Google again with Bing's suggested term, they still couldn't find what I was looking for.
Google will always try to make things hard for Windows Phone users.
Don't be evil
If you block 1 platform due to regulations.....let at least 2 others continue whilst all 3 are using html5....is beyond my comprehension!!!
Bring google to court for discrimination.....!!!!!!
ms should yank the skype app on android
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00720.warc.gz
|
CC-MAIN-2023-14
| 30,779
| 198
|
http://blogs.technet.com/b/heyscriptingguy/archive/2012/05/01/winners-of-the-2012-powershell-scripting-games-announced.aspx?PageIndex=2
|
code
|
Learn about Windows PowerShell
Summary: Today we announce the long-awaited winners of the 2012 Windows PowerShell Scripting Games.
Microsoft Scripting Guy, Ed Wilson, is here. Well, the time is finally here. It is time to announce the winners of the 2012 Scripting Games. This year’s Scripting Games involved hundreds of contestants from dozens of countries. They submitted thousands of scripts to twenty events. A blue-ribbon panel of judges then hand graded each of the scripts. Many of the judges took the time to document their observations about the scripts on their individual blogs. The Scripting Wife collected these blogs and wrote a post about them. After the contestants had a chance to write their solutions, a collection of some of the world’s greatest Windows PowerShell scripters wrote expert commentaries on each of the events. During the games, daily prizes were handed out. The prizes came from our amazing sponsors who stepped up to the plate with a raft of really cool prizes.
The competition this year was stiff in both the Advanced and the Beginner divisions. Only a few points separate the top 10 contestants in each division. In addition, the overall grades were up this year over last year’s average scores. This indicates an overall improvement in the quality of the submissions.
If you missed the 2012 Scripting Games, the 2012 Windows PowerShell Scripting Games: All Links on One Page is the place to begin. You are free to write your solutions for the events and compare your results with the expert commentators and your peer’s submissions on PoshCode.
The point of the Scripting Games is not about who is best, who wins prizes, or even the way-cool free pass to TechEd in Orlando. The point of the Scripting Games is about learning. So did the contestants learn? Sure they did. I have seen literally dozens of emails, tweets, and comments on Facebook from contestants who have already applied what they learned to solve real-world problems they faced at work. A great case in point is this post from the Scripting Guys Facebook group.
As stated earlier, the competition this year was fierce. One thing was certain, however: If a person did not enter an event, they stood no chance of gaining any points. Therefore, all the winners completed every task in their division. I love one tweet I saw that stated, “The Scripting Games are a marathon, not a sprint.” I can add to that—they also required a high level of precision.
There are lots of little details that foiled many otherwise excellent scripts, such as leaving in comments, but forgetting the comment character, or having hard-coded values that are not universally applicable. A few contestants got hung up on time-zone issues, and some missed deadlines—all of these issues happen in the real world. The biggest stumbling block was when people did not follow the requirements for a particular event. In some cases, the requirements were not completely spelled out. In those instances, just like in the real world, the contestants were free to ask for clarification via the blog, twitter, or Facebook, or they could make specific assumptions. When making assumptions about a script, it was a great practice to clearly spell out the assumptions in a comment in the script. This also follows real-world best practices. It is well known that bosses do not always provide clear step-by-step instructions to IT Pros. Often, only a vague outline is provided—or at times, only the end result is half explained. It is up to the IT Pro to clarify expectations, or to make informed assumptions prior to commencing coding. Clarifying requirements was one of the skills being tested in the games this year.
The winner of the Beginner category: Lido Paglia
The winner of the Advanced category: Rohn Edwards
Complete list of Beginner Leaderboards
Complete list of Advanced Leaderboards
Here are the steps that you can take to emulate your own version of the Scripting Games:
That is it for now. Join me tomorrow for more Windows PowerShell cool stuff. I invite you to follow me on Twitter and Facebook. If you have any questions, send email to me at firstname.lastname@example.org, or post your questions on the Official Scripting Guys Forum. See you tomorrow. Until then, peace.
Ed Wilson, Microsoft Scripting Guy
Wonderful group of winners. Everyone who participated was a winner in my mind.
Last year and the year before I missed the contest due to schedule. This year I started but realized I was at overload early. Next year I will schedule better if at all possible. Not that I think I can win but just to be in the running.
Congratulations to everyone. There were many amazing solutions. I will pour over the contribution to glean as much as I can before next year’s contest.
Great games this year. I expect to see an announcement of the winners on CNN. Wolf! Pay attention.
Congratulations Lido and Rohn on a job well done! Hope you enjoy TechEd and maybe even meet you guys there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709337609/warc/CC-MAIN-20130516130217-00089-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 4,982
| 20
|
https://ahoythemes.com/reactjs-templates/what-is-redux-template/
|
code
|
At its core, Redux Template is a state container. It uses the concept of a store, an object that holds the current state of your application. Reducers are pieces of code that specify how the state should be updated when an action is dispatched. Reducers can be combined to create more complex state management solutions.
If you are looking for a way to manage the state of your application, Redux Template is worth considering. It provides a simple and predictable way to manage application state, making it easy to test and debug code.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476464.74/warc/CC-MAIN-20240304165127-20240304195127-00890.warc.gz
|
CC-MAIN-2024-10
| 536
| 2
|
http://www.codeproject.com/script/Articles/ListAlternatives.aspx?aid=57670
|
code
|
Members may post updates or alternatives to this current article in order to show different
approaches or add new features.
No alternatives have been posted.
Software Developer (Senior)
Isagenix International Inc.
I'm an old fart living on the bleeding edge of technology. Started off as a EE out of college and got into embedded programming back in the 80's for a while and then did my share of PC programming starting in the DOS days all the way up to using the latest stuff in .NET 4.0. I've been programming on and off for about 25 years now and continue to love figuring out problems and seeing things work and understanding the root causes for why we solve the same problems every year. Did my fair share of PM'ing and Management over the years, but mostly stick with programming because frankly, marketing people scare the heck out of me (much like clowns do).
I'm a huge advocate for solving systematic development problems with improved processes as opposed to re-factoring and/or throwing new technology at a problem and hoping for the best because some inexperienced kid tells us it's awesome. I'm the "old guy" who knows best because I've done everything a crap load of times using every new method out there and so I do know best.
My sincere hope is that some day our industry will stop re-inventing the same "wheels" in order to make a short sighted buck, and move towards a model of true innovation where software transcends the current fixed patterns we re-implement each and every day in an endless cycle. Is there life out there among the drones?
I enjoy fishing, camping, SCI-FI MMO's, Aquariums, shooting lizards with a BB-Gun and of course, eating food so spicy that it strips the lining off your colon.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115864313.15/warc/CC-MAIN-20150124161104-00211-ip-10-180-212-252.ec2.internal.warc.gz
|
CC-MAIN-2015-06
| 1,724
| 9
|
https://forum.virtualmin.com/t/virtualmin-linux-iis-management/34087
|
code
|
I am new to virtualmin but have been learning about its features on Centos 5.3 and have been very impressed.
I see that it can run on windows am curious about two things.
Can Virtualmin manage the asp/.net (IIS) environment in windows, and if so are there any limitations
If you have both a Linux server setup (for Linux only/PHP sites) and Windows server setup (for ASP sites), can virtualmin manage both through a single administration interface, or do you have independant admin console for each.
Any help would be greatly appreciated.
Well, while Webmin itself can run on Windows, Virtualmin (which is a Webmin module) might be a bit more shaky.
The list of supported OS’s and distros is here:
Virtualmin works best on UNIXy OS’s.
Windows isn’t really where Virtualmin excels at the moment.
If you do have multiple servers setup – the Cloudmin product is capable of offering a single user interface to manage all your Virtualmin instances.
Thanks for the Feedback Eric.
At present I have a couple servers, Linux using Centos 5.3 and also a windows 2008 IIS for ASP developments.
I would like to be able to manage both servers with one console if possible, not neccessarily the asp server setup but have a central place for Website management, ie virtual websites, emails, traffic monitoring, etc.
Is it possible to manage the majority of things via virtualmin but redirect to the IIS server when a site requires ASP??
redirect as in call a different url to execute asp ? Yes, just edit your apache server templates and use the proper calls. If you mean to auto setup IIS sorry but virtualmin is strictly a linux thing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711394.73/warc/CC-MAIN-20221209080025-20221209110025-00120.warc.gz
|
CC-MAIN-2022-49
| 1,630
| 15
|
https://libraries.io/pypi/autofig
|
code
|
High-Level Interface to Create Figures/Animations with Matplotlib
This module provides a high-level interface to create figures/animations (currently only in matplotlib). It was designed to be used within PHOEBE but written in a way that it can be used as a standalone package.
See the travis report for details on the full testing-matrix.
autofig is available via pip:
pip install autofig
Alternatively, to install from source, use the standard python setup.py commands.
To install globally:
python setup.py build sudo python setup.py install
Or to install locally:
python setup.py build python setup.py install --user
autofig is imported as a python module:
Contributions are welcome! Feel free to file an issue or fork and create a pull-request.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370526982.53/warc/CC-MAIN-20200404231315-20200405021315-00268.warc.gz
|
CC-MAIN-2020-16
| 748
| 12
|
http://www.antionline.com/showthread.php?129793-Would-you-bomb-the-UK&mode=hybrid
|
code
|
View Poll Results: Which Linux should a newbie(me) learn for the first time.
- 10. You may not vote on this poll
November 19th, 2001, 12:10 PM
Would you bomb the UK?
This is a topical question rather than anything IT related but I thought it would be interesting to get some feedback from you folks across the Atlantic.
If UK Police arrested Osama Bin Laden at Heathrow Airport for example, there is a good possibility that we would not extradite him to the US, as you boys have the death penalty.
As the UK does not approve of this, I believe our law would forbid us from doing so.
How would the US respond and would you try to force us to extradite?
I am no expert on this subject but it was discussed on Radio 4 the other day, I thought it might make an interesting debate.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189589.37/warc/CC-MAIN-20170322212949-00350-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 776
| 9
|
https://wizpert.com/spanish?beta_key=link&ep=167&landing_page=0&type=shorty
|
code
|
Chat with a spanish wizpert now!
Initiating matching engine...
and ready to chat:
Not currently online:
Click here to talk to the first available wizpert!
Hi all, I am a German, Spanish and Italian Teacher. Hope we will have fun learning
Ask me about:
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999677515/warc/CC-MAIN-20140305060757-00043-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 251
| 7
|
https://gorails.com/episodes/api-auth-with-json-web-tokens-and-knock?autoplay=1
|
code
|
Subscribe to GoRails to get access to this episode and all other pro episodes, and new awesome content every month.
Unlimited access. Cancel anytime.
· January 3, 2017
Authenticate your API using JSON Web Tokens (JWT) using the Knock gem
Subscribe or login to view the transcript for this episode.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888341.28/warc/CC-MAIN-20180120004001-20180120024001-00038.warc.gz
|
CC-MAIN-2018-05
| 298
| 5
|
http://internationalart.store/gallery/Alexandra-Jicol/
|
code
|
I'm a simple observer a traveller thru life. My goal is to look, to hear, to explore, to learn, to share, to appreciate all, if possible as a nonjudgmental and a tolerant soul.
Through my work, I have tried to create complete pictorial independence. After years of intense work, I strive to capture in my work my physical, carnal relationship with colors, forms and textures.
A constant subject of interest returns to me like an obsession: the human condition and how to define the states of mind and attitudes through colors and simple forms.
How to to go deeper and probe into my being and that of others, observing, feeling, filtering through myself to transfer this on to a canvas, paper or other foundation.
I continuously filter and refine until I have the pure essence of what I wish to capture, which is to translate the soul in a work of art. I want my work to overflow, and for the viewer to sense that it extends into the infinite. "The human being" - here is the most complex and most passionate subject, a constant search in the "research of the truth".
For many years, I explored a classical approach to painting and while my current work appears divergent, these classical styles and skills constitute my starting point. I have gradually added other media, in the course of discovering this a world and integrating it into my work as a logical evolution. I have enriched my projects through other artistic fields (theatre, writing music, etc), which I use and am inspired by. Each time they breathe another breath into my creation. This thirst of expression, generosity and sharing have always been my reason for living.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249550830.96/warc/CC-MAIN-20190223203317-20190223225317-00422.warc.gz
|
CC-MAIN-2019-09
| 1,635
| 6
|
https://libanswers.uvic.ca/faq/198611
|
code
|
Will I retain copyright when I deposit my work in UVicSpace?
You will retain copyright to any work that you have ownership. If you ceded some or all your rights to a publisher (e.g. publishing an article with a journal publisher) the publisher will continue to retain those rights.
Consult the Copyright Office, to learn about how you can retain your rights.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00343.warc.gz
|
CC-MAIN-2024-18
| 358
| 3
|
https://lwn.net/Articles/111566/
|
code
|
ACLs don't have to be complicated. The Windows ACL implementation has a nice feature of being able to inherit the parent's ACL as a base for the file's ACL.
If every file in the system has this bit set in their ACL, the permissions of the root directory will apply to every file on the system. If you apply an ACL to someone's home directory, those permissions will apply to every file inside it, etc.
This covers much of the ease of use problems with ACLs, since you don't usually need to apply ACLs to many files/directories.
Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424910.80/warc/CC-MAIN-20170724202315-20170724222315-00678.warc.gz
|
CC-MAIN-2017-30
| 675
| 6
|
http://jannonjeffries.com/trans.html
|
code
|
Problem: How can we make our transactional emails more user friendly?
Transactional emails are of the utmost importance when it comes to a user's journey with an eccomerce website. Therefore, redesigning outdated transactional emails seemed like the right decision for a rapidly growing eccomerce company.
Our original transactional emails were not responsive and the content didn't always create a hassle–free experience for users. This meant we needed to not only redesign and code new emails, but we had to spend a lot of time discussing copy for varying purchase paths.
Below is the original order summary email next to its predecessor. As you can see, there is a clearer sense of hierarchy of information in the updated email. We provide the most important information in a card format to separate it from the less important content.
On other emails that follow the order summary, we've included a stepper so users know exactly where they are in the post-purchase flow. We also clearly highlight in the stepper what action the user needs to take next—whether that be to print out their tickets or download them in the app. By using this step–by–step visualization, we hope to be completely transparent with the user as they obtain their tickets one way or another.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371833063.93/warc/CC-MAIN-20200409091317-20200409121817-00102.warc.gz
|
CC-MAIN-2020-16
| 1,277
| 5
|
https://forum.duolingo.com/comment/27437346/Tengo-que-salir-antes-de-las-siete
|
code
|
If I slow it down the chap definitely sounds like salud, not salir!!!
I thought the same thing. It took so many times listening to the slow and fast. Didn't get it.
"tener que" like this is closer to the softer, less pressing "i have to do x" in the given translation. to get the more forceful "i MUST do x" maybe use deber in spanish. "I must leave before seven" == "Debo salir antes de las siete".
"I must leave" sounds better in "British English". "I have to leave" sounds more American. Both are correct.
I don't know, exactly. It never accepts numerals for me, either. I have reported it several times, but nothing seems to have been done about it.
Completely off topic: does this happen to anyone else? I hear the spanish phrase I'm supposed to write down and my brain immediately converts it to English. I then have to translate that back into Spanish to write the answer. It's so weird, but it seems to work. Maybe I've been doing DuoLingo so long it's just getting automatic to translate things. Anyway, I was just curious if anyone else is having their brain do circular translations. BTW: I am FAR from fluent, I know that.
Yes... and in the beginning, I would write the sentences in 1/2 English and 1/2 Spanish. When I would get it wrong, I would read what I wrote and not be able to see the error. I don't do it anymore, but I used to do it a lot. I think it's all part of the learning process, kind of like your brain is blending the two languages. I am also FAR from fluent.
It's a set phrase that you just have to accept :)
"To have to do something" = "Tener que hacer algo".
So the other responses are somewhat correct, but it's better to understand the broader context. When you link verbs (such as here, using both the verb "to have" & the verb "to leave") then you sometimes need to add a preposition between the two verbs. The required preposition depends on the first verb.
In this case, when you link an additional verb to tener, then you need to link the second verb using 'que'.
However other verbs require different prepositions. You might have come across constructions with 'trying to do something', for instance "I try to eat". The preposition depends on tratar (to try) which takes the preposition 'de'. I try to eat is trandlated as (yo) trato de comer.
For more information on linking verbs, and lists of the associated prepositions, see http://users.ipfw.edu/jehle/courses/VRBSPREP.HTM
Would someone please explain why it is "de las siete"? I know time in Spanish is always feminine and between 2-12, it's plural. But why the "de" ? (I read the other comments, but didn't see an explanation.)
The "de" goes with "antes" (same with "después") when it means "before (or "after) [something]" when there's a
noun (or an infinitive) following.
El niño quiere jugar después de/antes de
la cena. (The boy/child wants to play after/before dinner.)
Think of "antes de" being roughly analogous to "prior to" even though it translates as before. That seems to help me. Then I just think of "despues de" being the opposite of "antes de." It's crude, but it works for me.
I think that is very helpful. In the beginning, I kept forgetting which meant "before" and which was "after". Then I told myself that "A" comes before "D" and I would know that "antes" is before and "despues" is after. Whatever works!
Given that "tengo que" means "have to" and "salir" means "to leave," why isn't "tengo que salgo" acceptable?
Because that would translate as "I have to I leave". You said it in your question... "Salir" means "to leave". "Salgo" means "I leave".
Is "de" really needed? Seems like "antes las siete" should translate "before seven".
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986696339.42/warc/CC-MAIN-20191019141654-20191019165154-00320.warc.gz
|
CC-MAIN-2019-43
| 3,659
| 23
|
https://ifttt.com/applets/348708p-log-times-i-have-visitors-to-a-daily-email-digest
|
code
|
Log times I have visitors to a daily email digest
A useful way to keep tabs on things going on at your door!
This Applet uses the following services:
New Ring Detected
Add to daily email digest
How it works
Applet version ID 348708
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204077.10/warc/CC-MAIN-20190325153323-20190325175323-00528.warc.gz
|
CC-MAIN-2019-13
| 231
| 7
|
https://www.experts-exchange.com/questions/27676331/Backup-to-External-HD-is-failing.html
|
code
|
We have recently made a P2V to our SBS 2011 machine to vmware esxi 5.
Before we made the move, we had external hard drive attached to the SBS, and had scheduled windows backup running to backup everything to this hard drive.
Now, since the P2V, we are trying to make the backup with Veeam backup.
We have created another virtual machine, (clean install of server 2008 r2), installed Veeam on it, and tried to run the backup.
After about an hour of the job running, it aborted with error:
Client error: The device is not ready Failed to write data to the file [E:\Backup\Backup Job 1\Backup Job 12012-04-11T145554.vbk].
No matter how many times running, we always get the same error, although it stops at different time always. For example this time it stopped after transferring about 60gb, and the time before that, after transferring about 30gb.
we've checked the Windows Log, and saw that we're getting a lot of
"an error was detected on device \Device\Harddisk1\DR1 during a paging operation." - DR1 is the external driver.
and I mean a lot, almost third of the system log was filled with it, and it was all logged at the same second (although, not the same time when Veeam failed).
We have tried:
Replacing the external drive with a new one.
Creating a new virtual machine with Veeam.
We have tried searching in Google and didn't found anything . Any advice would be appreciated!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251690095.81/warc/CC-MAIN-20200126165718-20200126195718-00484.warc.gz
|
CC-MAIN-2020-05
| 1,384
| 14
|
https://www.montgomerycountymd.gov/council/resources/files/lims/bill/2012/Enacted/html/851_848_Enacted_03282017/index.htm
|
code
|
Program - Child Care Assessment
Executive: _ _ _ _ _ _ _ __
Effective: _ _ _ _ _ _ _ _ __
Ch. _ _ Laws of Mont. Co. _ __
FOR MONTGOMERY COUNTY, MARYLAND
By: Councilmembers Riemer, Floreen, and Andrews, Council President Navarro, Councilmember
Ervin, Council Vice-President Rice, and Councilmember Berliner
require the Office of Management and Budget to submit child care facilities impact
statements with certain capital projects in the Capital Improvements Program;
authorize the Council to require other County departments and agencies to
supplement the impact statements furnished by the Office of Management and
generally amend County law regarding the analysis of capital projects.
Montgomery County Code
Chapter 27, Human Rights and Civil Liberties
Section 27-62A, Child care facilities impact statements
[Single boldface brackets]
[[Double boldface brackets]]
Heading or defined term.
Added to existing law by original bill.
Deletedjrom existing law by original bill.
Added by amendment
Deletedjrom existing law or the bill by amendment.
Existing law unaffected by bill.
The County Council for Montgomery County, Maryland approves the following Act:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948515311.25/warc/CC-MAIN-20171212075935-20171212095935-00121.warc.gz
|
CC-MAIN-2017-51
| 1,156
| 24
|
https://community.amd.com/thread/234136
|
code
|
I would ask the Motherboard's manufacturer Support site for whatever the motherboard you are planning on purchasing. They would give an accurate answer since they are the one's the made and engineered the motherboard Specs.
From reading what you posted, it sounds like some sort of limitations from the APU. just guessing. Best is to ask the Motherboard's Support site.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826354.54/warc/CC-MAIN-20181214210553-20181214232553-00557.warc.gz
|
CC-MAIN-2018-51
| 369
| 2
|
http://www.sapere.co.uk/projects/energy-comparison-software
|
code
|
The completed system provides the following benefits to the users:
- Not Platform specific - The system can be used on any web or mobile browser.
- Businesses Save Money - Energy providers bid for the work creating more competition.
- System Free to use - There is no cost to use the system.
- Accurate Comparisons - Algorithms ensure the price comparisons are 100% accurate.
- No Hidden Costs - The platform removes any hidden costs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232262029.97/warc/CC-MAIN-20190527065651-20190527091651-00292.warc.gz
|
CC-MAIN-2019-22
| 434
| 6
|
https://www.b-critical.com/2016/12/16/citrix-enlightened-data-transport-or-edt-protocol/
|
code
|
Citrix Enlightened Data Transport or EDT Protocol
With the release of XenApp/XenDesktop 7.12 there is also a preview of the next generation data transport engine for HDX. This is especially engineered for Cloud Computing. And Citrix have carefully selected techniques that were previously available with Framehawk.
So, I want to describe this at high-level. And look at what components there are and what needs to be configured.
If we look at the ICA stack today, we can see that is optimized for TCP. And Citrix keeps innovating at this point. For instance “Adaptive Display v2” which was introduced with XenApp/XenDesktop 7.11
In addition to this ICA stack, we have Framehawk and “Real-Time Audio” both of them are optimized for UDP (User Datagram Protocol). This is good for High Packet loss and Latency scenarios for example School Campus or so.
If we look at this text that was published in the Edocs section:
IT administrators can evaluate a new HDX data transport layer designed for challenging long-haul WAN and Internet connections. This alternative to TCP delivers a superior user experience while maintaining high server scalability and efficient use of bandwidth. This new transport layer above UDP improves data throughput for all ICA virtual channels including Thinwire display remoting, file transfer (Client Drive Mapping), printing, multimedia redirection and others. In 7.12, this feature is for evaluation only and is disabled by default. It can be enabled in a non-production environment with a new policy setting
What does this mean.
Enlightened Data Transport is to support TCP and UDP for all virtual channels. So rather having a stack of HDX transport over TCP and UDP. EDT over UDP unifies the traditional ICA stack by adding the enlightened transport to every virtual channel.
This will allow best performance for both interactive sessions like task workers as well as delay sensitive workloads like Skype Calls and video
This technology is also capable of falling back to TCP when needed without any interaction of an administrator.
This automated fallback to TCP can occure if;
- HDX Client/server connection is running on a network where UDP for instance is blocked.
- Receiver version of the client is incompatible
EDT is a Citrix protocol that enhances the UDP. So in other words when you run EDT over UDP you will get the best of both worlds. Fast and low bandwidth overhead efficiency and session reliability and end- to end control enhancement because of EDT.
EDT was designed to be better than the current ICA/HDX connections over TCP and UDP. Although it is available in XA/XD 7.12 Citrix advises only to use this in test environments at this point and not in production.
For Framehawk to run you must open a bunch UDP ports. With EDT this is not the case, EDT runs on port 1494 and 2598. These are the same ports Citrix uses for standard TCP.
Requirement for EDT;
- Citrix Receiver for Windows 4.6
- Delivery Controller 7.12
- VDA for Desktop or Server OS 7.12
- StoreFront 3.8
- NetScaler Gateway 11.2 (Support data transport over UDP)
- Ports 1494 & 2598 open.
To configure EDT you just create a policy from studio.
Preferred: Transporting the data over UDP is used whenever possible, fallback to TCP. This is the default when you want to use EDT
Diagnostic Mode: Transporting the data over UDP is always used, no fallback to TCP
Off: Yes you guessed right, this means TCP is always used.
More on this subject can be found on the following blogs:
Marius Sandbu: http://msandbu.org/citrix-xendesktop-7-12-and-new-updates-and-in-depth-on-hdx-enlightened-data-transport/
REFERENCE MATERIALS USED: CITRIX.COM, SUPPORT.CITRIX.COM AND THE E-DOCS WEBSITE.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500482.27/warc/CC-MAIN-20200331115844-20200331145844-00199.warc.gz
|
CC-MAIN-2020-16
| 3,695
| 31
|
https://www.cloudzero.com/blog/refactoring-techniques/
|
code
|
Although refactoring isn’t typically listed as one of the core phases of the software development lifecycle, you cannot leave it out if you intend to keep code running efficiently.
The unfortunate thing about software is, it doesn’t usually age very well. Even seemingly perfect source code progressively decays over time — due to the ever-morphing tech ecosystem. Small minor issues gradually pile up into an overwhelming mountain of bugs — which then lead to huge system inefficiencies and ballooning maintenance costs.
Thankfully, there are several early interventions you can take along the way to prevent such an outcome. Refactoring, in particular, is a favorite for many software developers because it’s straightforward, cheap, and consistently proactive. What’s more, it’s applicable in more than five different techniques — all of which are capable of modernizing outdated software.
This article reviews each of the five refactoring techniques, and explains the primary benefits that come with them. We’ll also cover what the process of refactoring really entails, and its role in not only the software development lifecycle, but also infrastructure optimization.
Table Of Contents
What Is Refactoring?
Refactoring, or code refactoring in full, is a systematic process of amending previously built source code, without introducing new functionalities or altering the fundamental workings of the subject software.
You can think of it as a minor programming tweak that’s intended to optimize the structure, definition, and implementation of the underlying code without interfering with the software’s original functionality. The end results are usually improvements on the software’s readability, maintainability, and extensibility.
Some of the actions that software development teams commonly take during refactoring include:
- Reducing the size of the code
- Restructuring confusing code into simpler code
- Cleaning up code to make it tidier
- Removing redundant, unused code and comments
- Doing away with unnecessary repetitions
- Combining similar code
- Creating reusable code
- Breaking up long functions into simpler, manageable bits
As such, you could say that the whole process of refactoring typically comprises multiple “micro-refactorings”. They are executed in small bits to minimize the risks on the system as the code is being restructured. This keeps the software running seamlessly throughout, without any major service interruptions that could compromise business operations.
It’s worth noting that while the individual instances of micro-refactorings achieve minor transformations, the standardized sequences ultimately combine to accomplish extensive restructuring.
We are using the term “restructuring” because refactoring techniques only apply to pre-existing source code that’s already fully developed and structured. The goal is not to facilitate the building of software, but rather to optimize its code after deployment.
Don’t expect to follow a regular schedule, though. There are no time guidelines for refactoring. The process doesn’t even feature as a scheduled task in software development plans.
But, this shouldn’t hold you back at all. Refactoring ought to be part of your day-to-day programming. If not, you should at least perform it whenever you intend to introduce updates or new features to your existing code.
For instance, you might want to review your source code right before injecting new features into the software. This is where you evaluate the code structure to flag up all anomalies that may compromise the seamless integration of new features.
And in case you happen to discover any, refactoring should help you resolve the issues without interfering with the software’s core functionalities
You don’t, however, have to restrict yourself to an entirely manual process. As it turns out, quite a number of application development environments now offer some form of automated refactoring support, intended to facilitate the execution of the mechanical aspects.
Whichever approach you choose for your software’s code, refactoring should always take precedence over the addition of new features. The more frequently you manage to perform the procedures, the deeper you’ll be able to optimize your code for scalability. That means you’ll have fewer bugs to deal with when you try to expand the features and functionalities.
Otherwise, disregarding continuous refactoring could lead to the gradual accumulation of technical debt or code debt. This, in particular, comes about when software development teams choose to prioritize functionality upgrades over refactoring.
In other words, they expedite the delivery of features while overlooking the role of refactoring in restructuring their software code. So, as new functionalities come in, unresolved weaknesses within the source code trigger all sorts of technical issues, which then pile up over time and morph into major complexities.
Why Is Refactoring Important? What Are The Benefits?
Regardless of the refactoring techniques that you happen to apply, this whole process of systematically amending the underlying source code offers the following benefits:
Promotes maintainability and scalability
Development teams admit that software maintenance is painstakingly difficult when the source code is unstructured, poorly supported, and unorganized. A basic update, for instance, might take a disproportionate amount of time and resources.
In contrast, refactored code tends to be well streamlined, neatly organized, methodically structured, and adequately stable. This makes it considerably easy for development teams to track all the software parameters, update the functionalities and tools, as well as conduct proper maintenance checks.
Even seasoned programmers find it challenging to read and interpret the fluffy code in applications that are yet to be refactored. Such code is often laden with repetitions, unnecessarily long functions, redundant lines, incoherent flows, and syntax issues.
Now, this is where refactoring comes in handy. The process helps you identify the inconsistencies and then tidy up the code to make everything much simpler for everyone. Even new employees should have an easy time piecing together the lean code as soon as they take over.
In addition to streamlining the source code, refactoring progressively eliminates all sorts of basic anomalies. This prevents the build-up of technical debt, which would substantially compromise the app’s functionalities and resources.
So, in a way, we can agree that refactoring techniques safeguard and improve the performance of your software over the long haul.
Saves money and time
By boosting maintainability, scalability, readability, and performance, refactored code ultimately manages to save you both money and time.
More specifically, it optimizes your underlying code to simplify the maintenance tasks, minimize the size of the application, eliminate potentially costly technical debt, as well as boost the application’s overall efficiency.
This, with time, reduces even the corresponding amount of resources consumed — which translates to more money in your pocket.
What Techniques Can You Use To Refactor?
Refactoring is a multidimensional process that you could perform through either of these five techniques:
- Red-Green Refactoring
- Extract Method
- Simplifying Methods
- Composing Method
Here are their respective details:
1. Red-green refactoring
Red, Green, Refactoring happens to be one of the fundamental engineering patterns that facilitate Test Driven Development — or TDD in short.
When it comes to refactoring, it describes a basic technique that breaks down the whole procedure into three systematic steps.
“Red” comes first. In this step, you’re required to begin by reviewing the specific development that you intend to undertake. Once you’re done, you can go ahead and write a test without accompanying it with any implementation code. So, it’s only natural that the test will fail.
“Green” is the logical follow-up to red. This is where you get to work on the appropriate implementation code, which should then qualify the project through basic testing.
“Refactor”, on the other hand, is where the transformation magic actually occurs. You dive deep into the code and identify all the basic weak points that require some work. The improvement tweaks will then follow, but under the condition that none of them introduces new functionality.
2. Extract method
The Extract Method primarily seeks to improve your overall code readability by addressing complexities, providing clarifications, and regularizing the structure.
The procedure itself entails transferring a code fragment from its original method into a newly established one. This second set of methods are clearly labeled to describe the functions of the code blocks — in a way that makes it easy for development teams to piece together the whole source code structure.
3. Simplifying methods
While the Extract Method enhances readability, Simplifying Methods are meant to simplify code. And, as the same itself suggests, this is yet another refactoring technique that offers more than one approach.
Here are the two options that you’ll be getting:
- Simplifying Method Calls Refactoring
- Simplifying Conditional Expressions Refactoring
That said, your overall approach depends on the type of simplification that you intend to achieve.
If, for instance, you discover that the logic in your code is decaying and getting more complicated with time, you might want to proceed with the latter method — Simplifying Conditional Expressions Refactoring. This will eventually simplify the code’s logic by tweaking its original conditional statement.
Simplifying Method Calls Refactoring, on the other hand, focuses on streamlining the method calls. You’ll be able to simplify the parameters by adjusting interactions between various classes, as well as restructuring their interfaces.
4. Composing method
Composing Method is what you turn to when you come across code functions that are a bit too long, and difficult to interpret or execute. The technique is engineered to reorganize the code by eliminating duplicates, or alternatively, breaking it down into moveable fragments.
Some of the methods you can use here include Split Temporary Variable, Inline Method, Inline Temp, and Extraction.
“Inline” refactoring, for instance, happens to be one of the most popular preferences — as it involves removing redundant methods from the code and then replacing them with the appropriate content of the method.
But, if you think your problem would be better solved through fragmentation, you could try your luck with the “Extraction” option. This one cuts up the code into chunks, after which the fragments are moved and replaced accordingly.
Fifth on our list of refactoring techniques is Abstraction, which specializes in large-scale projects. It’s worth a try if you’re trying to perform refactoring on huge volumes of code.
In essence, Abstraction seeks to remove repetition and redundancy from your code. It achieves that through tactics that touch on extraction, creating interfaces, setting up new classes, hierarchy, class inheritances, etc.
And while you’re at it, you’ll notice that Abstraction tends to implement its large-scale code adjustments not at once, but rather on a gradual basis. This allows you to keep the system running while the changes are proceeding in the background.
Make Cost-Aware Refactoring Decisions
With these refactoring techniques, you’ll be able to modernize and streamline outdated software applications without compromising their functionality. As a result, you can expect time and cost savings, as well as increased maintainability, scalability, readability, and performance.
With a cloud cost intelligence platform, you can take your refactoring efforts to the next level by being able to identify which features, products, and services are costing you the most. Then, you can make informed decisions on whether or not it makes sense to redevelop or rearchitect those solutions for increased profitably.
CloudZero makes this possible, allowing engineering teams to drill into cost data from a high-level down to the individual components that drive their cloud spend — and see exactly what AWS services cost them the most and why.
CloudZero also uncovers unit economics cost insight like cost per feature, cost per product, cost per customer, and more. Engineers can see the cost impact of their work and finance can get the cost intelligence they need to make informed decisions around pricing and profitability.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474440.42/warc/CC-MAIN-20240223153350-20240223183350-00040.warc.gz
|
CC-MAIN-2024-10
| 12,723
| 78
|
https://air.ashesi.edu.gh/items/938b5a93-ef7c-4fea-b129-d27730b87eaa
|
code
|
Transforming home security and traffic light systems with computer vision and human detection
This project observed some important issues in Ghana, namely home security and road transport efficiency and I made an attempt at solving them through two computer vision based applications. I developed an affordable and smart home surveillance system and an intelligent traffic light system to increase transport efficiency and safety in crossing roads with this technology.
Applied project submitted to the Department of Computer Science, Ashesi University College, in partial fulfillment of Bachelor of Science degree in Computer Science, April 2016
Ghana, home surveillance, traffic light system, computer vision
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00328.warc.gz
|
CC-MAIN-2023-50
| 710
| 4
|
https://salmanmaken57.medium.com/data-structures-and-algorithms-a9afea11d49a?source=post_internal_links---------1----------------------------
|
code
|
Data Structures and Algorithms
A brief overview of Data Structures
Data Structure can be defined as:
The logic or mathematical model of a particular organization of data is called a data structure
There are many examples of data structures including Arrays, Linked Lists, Stack and Queues.
In interviews questions about Data Structures and Algorithms have been asked to check how much you know about programming.
In this article I’ll briefly explain arrays and linked lists along with their run time complexity.Before explaining data structure, I’m gonna explain Big O Notation.
Big O notation
According to Wikipedia:
“Big O notation is a mathematical notation that describes the limiting behavior of a function when the argument tends towards a particular value or infinity.”
This looks so difficult to understand. In other words we use Big O to describe the performance of an algorithm. And this helps us to determine whether or not the given algorithm is scalable.
If your code executes completely well on your computer, it does not mean that it performs well when you give it a large data set. This is why we use Big O notation O(n) to describe the performance of an algorithm.
Why do we learn Big O notation?
In data structures and algorithms, certain operations are more or less costly depending on what data structure we use such as Arrays or Linked Lists.
For example accessing an array element is super fast. Arrays had fixed length. As we continue to add or remove elements from arrays it has to get resized. And this will get costly as the size if the input grows large.
We use another data structure called Linked lists. It grows and shrinks very quickly but accessing a linked list element by its index is very slow. That is why we study big O notation before we study more about data structure.
Logarithmic Curve vs Linear Curve
If we compare logarithmic curve with linear curve then the linear curve grows at the same rate while the logarithmic curve will slow down at some point. So an algorithm that runs in a logarithmic curve is more efficient and scalable than in a linear curve.
Linear Search Algorithm
Suppose we have an array of sorted numbers from 1 to 10. We have to find the number 10. One way is to find the number by linear search algorithm. We have to iterate over this array using a for loop. Going forward one by one until we find the number 10.
Binary Search Algorithm
Another way to find the number is Binary Search Algorithm. Sometimes the given array is too long. So by using the Binary Search Algorithm we can find the number in less time.
We start by looking at the middle of the array. Find the middle number in an array. If the middle number is smaller then the targeted number then we ignore all the numbers on the left side of the middle number and If the middle number is greater then the targeted number then we ignore all the numbers on the right side of the middle number.
In our case we have to find the number 10 and the middle number is 5. So, now we start looking from 6 to 10. Now we find the middle item which is 8. As 8 is smaller then 10 and is on the left side of 10. So we ignore all the numbers at the left side of 8 and focus on the right side. Now we have only 9 and 10. And we easily find our target. As you see this method requires less time to find the targeted number.
This is logarithmic time. In the logarithmic growth we reduce our work by half in every step.
An algorithm with logarithmic time is more scalable then the one with linear time.
Space complexity is a function describing the amount of memory an algorithm takes in terms of the amount of input to the algorithm.
There are times where you have limited space like when you build an app for your small mobile device. For this you have to optimize for the space because scalability is not a big factor. Only one user will use your app at that moment.
“An array, is a data structure consisting of a collection of elements, each identified by at least one array index or key.”
Arrays are static. That is why we have to specify the size of the array. And we won’t be able to change the size of an array later on.
We use arrays to store a list of items sequentially. Such as the lists of numbers or objects. Let’s suppose the list of 5 integers. These integers are stored in memory like this: 10, 20, 30, 40, 50.
As you know that integers take 4 bytes of memory. If we consider the address of the first item in memory is 100 then in this case the address of the second location will be stored at the memory location 104. And similarly third item stores 108 and so on.
Run Time Complexity
The run time complexity of this operation is one O(1). Because the calculation of memory address does not involve any complex logic.
What if we want to add items in an array? Consider the array of 5 integers. To add another item in an array we have to resize the array. For this we allocate a new array and copy all the items from the previous array to the new one. Now we add a 6th item in an array.
The time complexity of this operation is O(n)
Again consider the array of 5 integers, if we want to remove the last item we look up its index and clear the memory. This is the best case scenario. In this case the time complexity is O(1)
But if we want to remove the item from the beginning of the array. First remove the first item and move all the items to the left side to fill the gap. This is more costly. This is why it is known as the worst case scenario. The time complexity of this operation is O(n).
We use linked lists to store a list of objects in a sequence. Linked lists can grow and shrink automatically.
Linked lists consist of a group of nodes in a sequence. Each node holds two pieces of data. One is value and other is address of the next node. In this way each node points to the next node. This is why it is called linked lists because all the nodes are linked together.
We can insert and delete nodes in the linked list. Performing each operation has its own time complexity.
If we want to insert an item in a linked list, we have three ways to insert any item. Such as inserting at the end, at the beginning and at the middle. Each time with different time complexity.
- At the End = O(1)
- At the Beginning = O(1)
- At the Middle = O(n)
Similarly we delete the items in the same way. Delete from the middle, from the end and from the beginning. And the time complexity is given is given below:
- From the Beginning = O(1)
- From the End = O(n)
- From the Middle = O(n)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104364750.74/warc/CC-MAIN-20220704080332-20220704110332-00748.warc.gz
|
CC-MAIN-2022-27
| 6,516
| 49
|
https://www.makanan.xyz/chef-ramsays-christmas-crackers-gordon-ramsay/
|
code
|
It’s that time of year again – Christmas crackers. Chef tells some of the worst we’ve heard and is not especially impressed. Got any better ones?
Subscribe for weekly recipe videos.
If you liked this clip check out the rest of Gordon’s channels:
Follow Gordon on Twitter @GordonRamsay01 and Facebook https://www.facebook.com/Gordonramsay01
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703561996.72/warc/CC-MAIN-20210124235054-20210125025054-00080.warc.gz
|
CC-MAIN-2021-04
| 347
| 4
|
https://www.techyv.com/questions/irfanview-illustrator-eps-plugins-view-eps/
|
code
|
N/APosted on - 10/29/2013
I don’t have Adobe Illustrator in my system. I am using IrfanView to view normal JPEG and GIF files. Will IrfanView Illustrator eps Plugins, help me to see Illustrator files through IrfanView. If so please do let me know where to get the IrfanView Illustrator eps Plugins.
Thanks & Regards,
Patricia N Hillman
IrfanView Illustrator eps Plugins to view eps
You can use IrfanView to open *.AI files, provided you have Irfan view eps plugins and Ghostscript.
After installing the above programs you can open a *.ai file. Right click on the file to select “open with”. Choose Irfanview in the list. If it does not appear in the list, select browse and locate i_view32.exe file. The path address: "C:ProgramFilesIrfanviewi_view32.exe".
Then check on the box labeled”always use this program” to make Irfanview as the default program to open *.AI files
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575076.30/warc/CC-MAIN-20190922032904-20190922054904-00441.warc.gz
|
CC-MAIN-2019-39
| 881
| 8
|
https://samsclass.info/121/proj/p3-Bulk.htm
|
code
|
There should be a memdump.mem file on your Windows desktop. Drag it out of the virtual machine and drop it on the host Windows 7 machine's desktop.
When the copy finishes, close the Windows virtual machine.
Launch your Kali Linux machine. If necessary, log in as root with the password toor
Drag the memdump.mem file from your Windows 7 host machine's desktop and drop it on your Kali Linux desktop.
Note: the VMware Tools copy process is buggy and sometimes fails to copy the entire file.
You may see an error message and have to click "Retry".
Note that the last command is "LS -L" in lowercase.
You should see the memdump.mem file, which should be approximately 500 MB in size, as shown below.
In your Kali Linux machine, in a Terminal window, execute this command:
If you see a message saying "xml is inconsistent at line 142," that means the output folder already exists.
bulk_extractor -o bulk -e wordlist memdump.mem
To fix it, replace "-o bulk" with "-o bulk2".
This tells Bulk Extractor to gather data from the memdump file, put the results in a folder named "bulk", and compile a wordlist of all readable strings.
Bulk Extractor will take several minutes to run and output progress messages, as shown below:
You see the files Bulk Extractor created, finding IP addresses, domains, emails, and many other things, as shown below:
You see the domains visited on this computer, and the number of times each was visited, as shown below:
Press Ctrl+X to close nano.
You should see your phone number, as you entered it in the form AccessData required you to fill out to download FTK Imager.
Press Ctrl+X to close nano.
You see the credit card numbers found, as shown below:
You see the words found, and the number of times each word was found. This list is useful as a dictionary when cracking encrypted files or folders.
You see the email addresses used on this computer, and the number of times each was visited. Scroll down and find your own email address, as shown below:
Click the taskbar at the bottom of your host Windows 7 desktop, to make the host machine listen to the keyboard, instead of the virtual machine.
Press the PrintScrn key in the upper-right portion of the keyboard. That will copy the whole desktop to the clipboard.
YOU MUST SUBMIT A FULL-SCREEN IMAGE FOR FULL CREDIT!
On the host machine, not the virtual machine, click Start.
Type mspaint into the Search box and press the Enter key.
Click in the untitled - Paint window, and press Ctrl+V on the keyboard. The desktop appears in the Paint window.
Save the document with the filename "YOUR NAME Proj 3", replacing "YOUR NAME" with your real name.
You can open the packets.pcap file in Wireshark. When I did it, most of the packets were garbled, but there were some intact NetBIOS packets.
Send a Cc to yourself.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00195.warc.gz
|
CC-MAIN-2023-23
| 2,789
| 31
|
https://help.salesfire.co.uk/site-search/search/search-submission
|
code
|
The following outlines how our search submission works.
Your Salesfire search solution will appear as soon as the visitor focuses on your website's search input field.
Initially, we will show relevant products before a search is even performed.
As the visitor types, we will perform autocorrection, suggestion lookups and result findings using our internal algorithms and data enrichment. You can customise the search weightings in your Dashboard to further tailor the results to your needs.
If you submit our search it will in turn submit your website's native search.
You can customise this functionality in your Dashboard.
If you want to change how this functionality behaves on your website you will need to alter the search form on your website. We call a submit event on the form your input sits within.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00399.warc.gz
|
CC-MAIN-2023-50
| 809
| 7
|
https://www.experts-exchange.com/questions/29066251/WPF-where-are-key-bindings-stored.html
|
code
|
In a WPF application, say I have a window, and I set up a key binding to run a command if I press a certain key on the keyboard.
Somewhere in my Window object I expect my key binding is stored. I expect when a key is pressed on the keyboard, that generates a "key was pressed" event, and the operating system determines which window has focus, (and perhaps what control on the window has focus,) and sends the "key was pressed" event to to window, and the window has a list of events it handles, and if there's a match then it calls the corresponding event handler.
But I can't find that list.
Maybe it doesn't work that way. Maybe the window registers the events it's interested in with some higher power, and that higher power keeps the list of events the window handles.
Either way, my problem is I press the key, and... nothing happens.
So I'm trying to trace what happens to this key event, because it's not resulting in my command being called.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00510.warc.gz
|
CC-MAIN-2023-23
| 950
| 6
|
https://github.com/seppeljordan/nix-prefetch-github/issues/32
|
code
|
Join 40 million developers who use GitHub
issues to help identify, assign, and keep track of the features and
bug fixes your projects need.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and
privacy statement. We’ll occasionally send you account related emails.
Already on GitHub?
to your account
Currently (afaik) nix-prefetch-github just probes the latest commit and generates output for that commit.
I'd like to have a flag to fetch the latest release to avoid a manual round trip to the github api.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251669967.70/warc/CC-MAIN-20200125041318-20200125070318-00373.warc.gz
|
CC-MAIN-2020-05
| 663
| 10
|
https://www.construct.net/en/forum/construct-2/how-do-i-18/disable-cache-ajax-post-url-61872
|
code
|
I noticed that when I post my score to a php file using the Ajax Post to Url stuff it Works only the first time, the database is updated only once after the first post. I know that my game is ok since I see in Firefox Firebug that the Ajax post is made as programmed but the database is not affected, only if I reload the page of the game.
Could this be related to the Ajax post call being catched? Have you had any similar experience? If the cache is causing the problem how could I set it to disable in C2?
Thanks and have a great evening.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500356.92/warc/CC-MAIN-20230206145603-20230206175603-00484.warc.gz
|
CC-MAIN-2023-06
| 541
| 3
|
https://www.cocoacontrols.com/search?q=linkedin
|
code
|
March 14, 2017 • Apache 2.0 License
Social Media contain various third party login & LogOut functionality
UI is simple and easy to use
November 29, 2016 • MIT License
Newly is a drop in solution to add Twitter/Facebook/Linkedin style, new updates/tweets/posts available button. It can be used to notify user about new content availability and can other actions can...
October 15, 2016 • Apache 2.0 License
An easy way to get Social Newtworks authenticating by OAuth 2.0 on Objective-C via UIWebView
February 23, 2015 • MIT License
The #PFLinkedInUtils class provides utility functions for working with LinkedIn in a Parse application.
December 08, 2013 • MIT License • 10 Apps
Animated social share buttons control for iOS.
Supports share buttons:
Facebook, Twitter, Google+, Tumblr, Vkontakte (vk.com), LinkedIn, Pinterest, Youtube, Vimeo, Reddit, Instagram, Whatsapp, E-...
December 11, 2012 • MIT License • 1 App
A simple implementation of OAuth 1.0a that not only works with Twitter and Tumblr, but also LinkedIn (who have stricter OAuth implementation).
Insert your Consumer ID and Consumer Secret in the ...
October 07, 2012 • MIT License
An easy-to-use drop-in component to share content on LinkedIn.
Is this hosted on GitHub?
If this control is hosted on GitHub, paste the address below, otherwise click "Not Hosted on GitHub".
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347391309.4/warc/CC-MAIN-20200526191453-20200526221453-00285.warc.gz
|
CC-MAIN-2020-24
| 1,353
| 20
|
https://chicagodist.com/products/power-pad-launchpad-single-power-pad-female-soldered
|
code
|
The PowerPad Launchpad breaks out two pins from a CR2032 connected in series with a switch, so that it can be connected to other components.
This on/off switch that can be used in all sorts of projects! The pads can be used with conductive thread, space tape, paint, wire, thread, copper tape, alligator clips, banana plugs and more. You can even solder to them.
For use with a CR2032 battery.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00240.warc.gz
|
CC-MAIN-2023-50
| 393
| 3
|
https://emacs.stackexchange.com/questions/10176/how-to-export-headlines-including-subheadings-without-other-contents-in-org-mo
|
code
|
In the org-mode documentation regarding export settings, it describes
arch as follows.
Configure export of archived trees. Can be set to headline to only process the headline, skipping its contents (org-export-with-archived-trees).
That's almost what I want, but it skips all the contents, including the subheadings. I want those subheadings too (without their contents). Take this example:
#+OPTIONS: arch:headline * I want to see this :ARCHIVE: But not this. ** and also this. And definitely not this.
If I export this file,
I want to see this is the only thing that comes through. But I was expecting/hoping
and also this to be exported underneath it as well.
How do I make that happen? I tried adding an extra
:ARCHIVE: tag to the second level heading, but that does nothing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00870.warc.gz
|
CC-MAIN-2023-50
| 779
| 10
|
https://scifi.stackexchange.com/questions/75987/when-did-it-become-common-knowledge-that-the-atlantis-expedition-were-from-anoth
|
code
|
Obviously the Athosians find out pretty quick due to their situation of living with the Expedition at Atlantis. I can't really remember if they simply tell the Asurans who they are or if they find out from the hand-in-head thing. The Wraith... I'm not sure if they know straight from the beginning that Earth is in another galaxy or if they just know that it's somehow unknown to them and the rest of Pegasus. They certainly know at some point that it's not in Pegasus, even if they don't know it's in the Milky Way (otherwise the Superhive in the finale wouldn't have needed the signal from an alternate reality before heading there).
But what about everyone else in the galaxy? In 'Inquisition' - episode 5.13 - the Coalition folks seem to know. They say things like "since your arrival in this galaxy." I don't remember the Expedition exactly advertising that though. I think I can remember them being rather vague about stuff, saying that they "weren't from around here" or whatever. Now, I can certainly see how that information might leak out over time. An Athosian says something innocuous to a trader, Michael says stuff about it to his Hybrids, the Genii got some intel from when they took over Atlantis, things like that. But I certainly can't remember them telling someone outright and the other party acting suitably impressed; it is one thing to walk to different planets through a magic ring left by the Ancestors but it's quite another to be able to fly in spaceships from another galaxy.
I don't think it ever was made explicit, I just wondered if I missed something.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057589.14/warc/CC-MAIN-20210925021713-20210925051713-00300.warc.gz
|
CC-MAIN-2021-39
| 1,583
| 3
|
https://forum.e3d-online.com/threads/filament-too-fat-for-heat-break.94/
|
code
|
I have several rolls of 1.75mm filament which previously had fed fine. After doing a major salvage operation after my last disaster, I hooked up a new heat sink to my existing hotend. I couldn't figure out why it wasn't feeding until I disassembled the thing. Filament will go through the heat sink with no issue. However, it won't go through the heat break. There was crap jammed in the heat break and I got it out. However, the heat break has too small an internal diameter to pass the filament. I looked at it very closely and if it's deformed it was symmetrically deformed, so I doubt that is it. Is the filament supposed to go through the canal in the heat break? Or is the heat break supposed to get hot and the plastic start melting in the middle of the heat sink? And yes, it's a 1.75mm heat break and 1.75mm filament. A 0.4mm spare nozzle I have snuggly passes the filament up to the nozzle head.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500368.7/warc/CC-MAIN-20230207004322-20230207034322-00405.warc.gz
|
CC-MAIN-2023-06
| 905
| 1
|
https://enauczanie.pg.edu.pl/moodle/course/index.php?categoryid=193
|
code
|
The course comprises basic and selected advanced issues of modern relational databases, including modelling, implementing and querying databases. It also refers to such important topics as normalization and transactional processing. The course is a necessary prerequisite to the Data Warehouses course.
Course for Data Engineering, semester 3
Access credentials will be provided during the first lab class.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.45/warc/CC-MAIN-20240222193722-20240222223722-00260.warc.gz
|
CC-MAIN-2024-10
| 406
| 3
|
https://pubmed.ncbi.nlm.nih.gov/20130030/?dopt=Abstract
|
code
|
Motivation: Metagenomics is the study of genetic material recovered directly from environmental samples. Taxonomic and functional differences between metagenomic samples can highlight the influence of ecological factors on patterns of microbial life in a wide range of habitats. Statistical hypothesis tests can help us distinguish ecological influences from sampling artifacts, but knowledge of only the P-value from a statistical hypothesis test is insufficient to make inferences about biological relevance. Current reporting practices for pairwise comparative metagenomics are inadequate, and better tools are needed for comparative metagenomic analysis.
Results: We have developed a new software package, STAMP, for comparative metagenomics that supports best practices in analysis and reporting. Examination of a pair of iron mine metagenomes demonstrates that deeper biological insights can be gained using statistical techniques available in our software. An analysis of the functional potential of 'Candidatus Accumulibacter phosphatis' in two enhanced biological phosphorus removal metagenomes identified several subsystems that differ between the A.phosphatis stains in these related communities, including phosphate metabolism, secretion and metal transport.
Availability: Python source code and binaries are freely available from our website at http://kiwi.cs.dal.ca/Software/STAMP CONTACT: email@example.com
Supplementary information: Supplementary data are available at Bioinformatics online.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107889651.52/warc/CC-MAIN-20201025183844-20201025213844-00111.warc.gz
|
CC-MAIN-2020-45
| 1,507
| 4
|
https://showcase.ethglobal.com/hackmoney2021/safe-cdp-farmer
|
code
|
You want to have CDP and farm benefits by borrowed money, but you have no time for 24/7 position controlling? We want to take a load off your mind and let you do it by automated product with 2 buttons: Farm and Withdraw.
Because of liquidation risk, an investor should control his Collateralized Debt Position (CDP) on Aave every time, we want to take a load off his mind and make a protocol for automated position controlling on Aave based on Health Factor, and as a bonus: with farming on Curve pools at the same time. How it works? Deposit: 1. Alisa goes to project site 2. She connects her wallet 3. Then she pushes button Farm and chooses amount of money, for example 1 ETH 4. ETH goes to project smart contract 5. Protocol adds it to the position on Aave and borrows USDT for 1 ETH (with controlling of Health Factor (HF)) 6. Then protocol sends USDT to project position on Curve pool. 7. If HF goes down, protocol withdraws USDT from Curve and balances the position on Aave 8. If HF goes up, protocol borrows more USDT at Aave and ads it to the position on Curve Withdraw: 1. Alisa wants to close her position in the project 2. She pushes button Withdraw on project site 3. Protocol withdraws USDT from the pool on Curve, then repays the debt on Aave and sends Alice's 1 ETH + benefits from farming on Curve to her wallet
How it's made
Because of liquidating risk, the user should control his Collateralized Debt Position (CDP) on Aave every time, we want to take a load off his mind and make an algorithm for automated controlling position on Aave with farming on Curve at the same time. Scheme: User deposits money at our contract. We open position on Aave. Then we put money at Curve. If the health factor goes down, our bot takes money from Curve and closes its position on Aave. If the health factor goes up, our bot borrows more money on Aave and puts it to Curve. Profit.Technologies used
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710924.83/warc/CC-MAIN-20221203043643-20221203073643-00493.warc.gz
|
CC-MAIN-2022-49
| 1,902
| 4
|
https://inboxreads.co/n/whats-hot-in-enterprise-it-vc
|
code
|
Stories on VC, software, & scaling startups
Ed Sim's weekly readings and notes on VC, software, and scaling startups.
Thank you for leaving a review. It will be approved and visible on the site shortly 🙂
The Most Comprehensive News Coverage in Crypto
Real-world startup, tech, product, and leadership advice.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628001138.93/warc/CC-MAIN-20190627115818-20190627141818-00112.warc.gz
|
CC-MAIN-2019-26
| 311
| 5
|
https://forums.sketchup.com/t/print-quality-pdf/170832
|
code
|
I’m modelling some interiors in SKetchUp pro, using millimetres template. The joints between wall panels are 10mm.
I take the elevations into Layout, but if i set the scale to 1:50 the two lines that form the joint merge into one. I have so many elevations to do that i really don’t want to go to 1:20 scale - it would mean 40 x A1 drawings! When I export to pdf its the same - the joint lines merge.
In layout > Document setup > Paper > rendering resolution, both are set to High.
Is there anything else i can do to improve the print quality?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153223.30/warc/CC-MAIN-20210727072531-20210727102531-00444.warc.gz
|
CC-MAIN-2021-31
| 547
| 4
|
https://community.mcafee.com/thread/50413
|
code
|
I've recently been given the task of migrating all the rules from a juniper fw to our s5032 running fw enterprise 8.2.1
I was wondering if there was an easier way to migrate rules apart from entering them 1 by 1 through the control centre gui? I've succesfully imported all network objects from the juniper but adding all these rules is going to take months (5+ years worth of rules ).
From what i have been told, I should not be creating these rules from the CLI on the FW directly because all changes would get over written by the control centre appliance.
is this true? How do others make bulk rules with out having to depend on the gui?
I'm not that familiar with Control Centre, but based on the job it is designed to do, there is a distinct chance that you may find that when applying policy changes directly to a Firewall appliance it may then be overwritten by a subsequent config change in Control Center.
If you've not done so already, it may be worth raising a service request with support to see if they have a policy configuration tool which they can make available will take your Juniper policy and migrate it to something which can then be imported into MFE. Historically I have been aware of a tool which will convert Checkpoint configurations, and possibly even Cisco Pix/ASA, but I don't recall hearing about a Juniper one.
Again, like Control Center, I'm not that sure. In the past I have taken a deep breath and done it all manually.
Phil is correct, we have some tools to migrate policies from other firewall brands, but unfortunately Support does not have those tools. It would make sense to contact sales/professional services for this.
You are correct in that the CC will overwrite any changes you make on the firewall. If you really want to though, you could create all rules on the CLI of the firewall, and then retrieve the rules through the CC. That way the CC and FW policy would match.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223204388.12/warc/CC-MAIN-20140423032004-00250-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 1,915
| 9
|
http://sankiconnect.com/92542.html
|
code
|
Donec leo, vivamus fermentum nibh in augue praesent a lacus at urna congue rutrum.
This is RedMarket, a free, fully standards-compliant CSS template designed. The photos in this template are from. This free template is released under a Creative Commons Attributions 3.0 license, so you are pretty much free to do whatever you want with it (even use it commercially) provided you keep the links in the footer intact. Aside from that, have fun with it :)
Copyright © 2014.Company name All rights reserved./ - More Templates /
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710918.58/warc/CC-MAIN-20221203011523-20221203041523-00062.warc.gz
|
CC-MAIN-2022-49
| 524
| 3
|
https://about.uxpl.us/blog/6-tips-to-maximize-your-conference-experience
|
code
|
Now that I'm co-organizing UX+ for a second time this year, I can’t help but look back on how conferences have helped me boost my career.
When I was still in college, I cut classes to attend UX conferences in Singapore and Hong Kong. I attended almost all of the design and UX-related conferences at home too. Some of my favorites were PWDO’s Form Function and Class, and the UXPH Conference. The most recent conference I attended personally was UX Thailand with my workmates. I've attended online ones too, like Remote Design Week and SofaConf.
Why attend conferences?
Conferences were crucial in (1) helping me understand the landscape and new trends of the design industry, (2) getting to know key UX people who can shape my career, and (3) making lots of cherished friends whether in person or online!
As a serial conference goer, I wanted to share six tips that helped me make the most out of each and every conference experience.
Take a look at the attendee and speaker list, and if you spot anyone that you want to connect with, then make it a part of your agenda to talk and connect with them. Try to overcome your shyness! For introverts, connecting over social media is totally fine (believe it or not, I'm introverted). Message them before, during, or after the conference and start that relationship! You can even make a checklist of the people you want to interact with, and make sure you fill that out before the conference ends.
These days, I take conferences with the Kalibrr design team. We have both a Discord channel and a shared Google Docs file to dump all of our learnings in. The collaborative notes we made is super useful to come back and refer to when we need to recall specific techniques, concepts, or ideas mentioned in the conference. You can't remember everything you hear, so make sure you take notes.
Send the organizers a message of appreciation, and find a way to talk to them! These people are good connectors and curators, and it definitely will be a big plus for you if you get to know them personally.
Recently, I got to have coffee with the organizer of UX Thailand here in the Philippines (just after a year or so) just because I really put in the time to meet him during his conference and tell him how great it was.
When I met Sophia and Kit of Philippine Web Designer’s Organization, it blossomed to an amazing partnership that allowed the student club I was part of (UX Society) to organize Junior Form Function and Class.
Because I met people behind UXPH like Ely Apao, they gave me a chance to become part of the organizing team too!
This will be a lot of effort but contributing to the hashtag of the conference through Twitter can usually net you a lot of new friends or followers who want to discuss the topics or find out what the conference is about.
It will also help signal to others that you’re really passionate about learning in public — which is always a good thing in my experience.
Do this so you can connect with like-minded people online. It’s also a way to give back to the community, and it shows the best take-aways to people who weren’t able to get a ticket to the conference.
My old internship boss Micael Andrei Barlaan Diaz de Rivera (yes I know he has a long name) taught me to look up conference hashtags on Twitter to learn online for free. He would tell me that there would be a specific conference that day, and that we should check out the conference hashtag because we couldn't attend abroad. I never thought of Twitter the same way after that.
Back in UX Hong Kong, we accidentally met with the Agoda Design team outside the conference venue. We all decided to go around Hong Kong together and get drinks.
I nonchalantly asked one of their designers if they had internships cause I was looking for one. When the right time came, I applied and mentioned that instance to the recruiter.
That’s the story of how I got my internship at Agoda with a six-figure salary! I know times are different now but the principle of meeting new groups of people online can still be a transformative experience for your career. It's different meeting people in a conference versus just connecting randomly on LinkedIn.
This is incredibly hard because you’re juggling multiple things at the same time during a conference, but yeah — load up on sleep the night before, and if 8 hours really isn’t possible, some coffee is really useful too! You'll need the adrenaline to really keep up with the topics, plus the energy to meet new people. If possible, clear out your schedule for the rest of the day so you can focus on the conference and really soak in all the learnings.
If you're looking for a design conference to attend, I hope you can come and join us for UX+! We have brilliant speakers like Julie Zhuo, John Zeratsky, Dan Mall, and a lot of Filipino designers I've featured from Roots! Check the conference out, this website (which I personally think is a feast on the eyes) was designed and led by my partner and first boss, Christian San Jose. Come join the biggest UX conference in Asia! Oh, and don't forget to contribute to our conference hashtag! #uxplusconf #uxplus2020
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988858.72/warc/CC-MAIN-20210508091446-20210508121446-00372.warc.gz
|
CC-MAIN-2021-21
| 5,163
| 20
|
https://www.bubbleshooter.net/game/merge-push/
|
code
|
Play Merge Push. Merge Push is a mix between 2048 and a tetris styled game. Push the blocks and match the numbers.
Merge Push is an online game where players work together to push a large block through maze-like levels, with the ultimate goal of making it to the goal line. It is a collaborative game with players playing at their own time and pace.
To complete each level, players must overcome at least one obstacle (such as steep ramps, pushing blocks up to get them over obstacles, or inching along tiny platforms) by working together as a team. The game involves a lot of quirky physics (for example, if a player pushes a block in just the right way to get it past an obstacle, the block will slowly tilt, tipping over and eventually falling off the ledge if it is not moved back into position).
Players use their computers to work together by creating maps where blocks can be pushed and rotated around. Players must solve puzzles, often utilizing blocks pushed into place or created by other players. Once a clue for the level has been solved, the level can be progressed through. It is a popular game because of its collaborative nature, which requires players to work together to progress through levels.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00562.warc.gz
|
CC-MAIN-2023-50
| 1,213
| 4
|
https://forum.dhtmlx.com/t/how-can-i-remove-cell-borders-in-timeline-view/28282
|
code
|
How can I remove cell borders in timeline view of the scheduler but not in x and y scales?
If cannot be removed, is it possible to add a class so i can change the opacity of cell borders?
Help much appreciated.
Add style like next
border-color: transparent !important;
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500126.0/warc/CC-MAIN-20230204110651-20230204140651-00039.warc.gz
|
CC-MAIN-2023-06
| 268
| 5
|
http://vismit.khapre.org/2004/03/lookmicrosoft-shared-source-initiative.aspx
|
code
|
Through the Shared Source Initiative, Microsoft advances several important objectives:You can actually get the Windows source code under the enterprise licensing, Windows CE source code, Smart Devices Developer samples, C#/JScript/CLI Implemetation all for free of cost. I really didn't believe that unless I downloaded the Windows CE source code.
- Bolster the freedom and success of customers, partners, researchers, and developers by affording them expanded access to source code.
- Enable Windows users to ensure the integrity and security of their computing environments.
- Enrich the development community by providing the tools to produce outstanding software.
- Improve feedback processes that play a critical role in developing better Microsoft products for business and individual consumers of software.
- Enhance educational opportunities and to cultivate a vigorous software industry of the future by placing technology in the hands of universities throughout the world.
- Preserve the intellectual property rights that historically have fostered unparalleled innovation and growth in the global software industry.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607704.68/warc/CC-MAIN-20170523221821-20170524001821-00147.warc.gz
|
CC-MAIN-2017-22
| 1,126
| 7
|
http://forums.comodo.com/user-anywhere-remote-access-product-discontinued/no-valid-license-again-t4805.0.html;msg35606
|
code
|
It feels like the speed has improved. It's usable, but I wouldn't cry if it got faster...
It's about a one second delay i think.
It had some issues.
When I transfered a file the remote screen went black until the file transfer was finished.
When starting a new remote control, the remote PC has no wallpaper, but if you remote restart that PC, it will have a wallpaper.
I also would like to be able to scroll with my mouse.
The viewer expires when you reboot the remote PC, so you have to download a new viewer every time. It should be possible to reboot remote PC without having to download and install a new viewer.
The UA host failed to start one time.
The UA host freezed one time.
Both these where on a fresh install of XP pro.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00068-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 732
| 10
|
https://mailman.open-bio.org/pipermail/biopython-dev/2003-July/001358.html
|
code
|
[Biopython-dev] Something wrong with Martel?
andreas.kuntzagk at mdc-berlin.de
Fri Jul 25 04:30:37 EDT 2003
> Andreas, this looks like it might be related to the switch over to
> using a dict object? Could you take a look at it?
First issue is related to dict. Appended a diff to patch this.
Would be good if setup.py in BioPython root dir would also test the
> > Second, trying to run the same script as Andrew wrote in the Readme
> > (attached), I only get:
> > <?xml version="1.0" encoding="iso-8859-1"?>
> > Basically nothing is executed after the command:
> > parser.parse(open(File))
> > Is something wrong on my system or something wrong with the Martel
> > code?
> > Could anyone try to run the above script?
Yair, do you have a file "/etc/passwd" (looks like your email is from a
Windows system)? What do you mean "nothing is executed"? Script hangs,
script returns whithout output, script throws an error?
The parser.parse works for me, but the script is failing at
AttributeError: 'NoneType' object has no attribute 'normalize'
I still don't know enough about the Martel infrastructure to understand
this. sax2dom.document seems to be None.
-------------- next part --------------
RCS file: /home/repository/biopython/biopython/Martel/LAX.py,v
retrieving revision 1.3
diff -r1.3 LAX.py
< self.data.setdefault(tag, ).append(text)
> self.setdefault(tag, ).append(text)
< self.data.setdefault(tag, ).append( (text, attrs) )
> self.setdefault(tag, ).append( (text, attrs) )
< self.data.setdefault(tag, ).append(
> self.setdefault(tag, ).append(
More information about the Biopython-dev
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943589.10/warc/CC-MAIN-20230321002050-20230321032050-00057.warc.gz
|
CC-MAIN-2023-14
| 1,592
| 33
|