url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://forum.seafile.com/t/seafile-pro-edition-10-0-9-is-ready-arm64-is-also-supported-now/18467
code
This is a maintenance release with following improvements and fixes: - Add an option (library_file_limit in seafile.conf) to support setting the maximum number of files in a single library - [fix] Support for virus scan in golang file server when uploading files via upload links - Some UI fixes and improvements - Improve script clear_invalid_repo_data.py ARM64 is also supported now. When you pull docker image in ARM64 based system, the corresponding docker image for ARM64 will be downloaded.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00692.warc.gz
CC-MAIN-2023-40
496
6
https://www.prajwaldesai.com/enroll-hololens-2-device-for-autopilot-deployment/
code
This post covers the steps to enroll a HoloLens 2 device for Autopilot deployment. In my previous post I showed you how to create an Autopilot Profile for HoloLens 2 Devices. This post assumes that the customer is not a CSP subscriber. If the customer does have a CSP subscription, then device enrollment can occur via the Microsoft Partner center using Tuple (Make, Model & Serial, and/or PKID and/or a combination thereof, see example below). Device serial number,Windows product ID,Hardware hash,Manufacturer name,Device model,Order ID 000998002156,,,Microsoft Corporation,HoloLens 2,HoloLens Retrieving the device hardware hash The device can record its hardware hash in a CSV file during the OOBE process, or later when a device owner starts the diagnostic log collection process (described in the following procedure). Typically, the device owner is the first user to sign in to the device. To retrieve the hash, start the HoloLens 2 device. On the device, press the Power and Volume Down buttons at the same time and then release them. The device collects diagnostic logs and the hardware hash, and stores them locally on the device in a set of .zip files. Using a USB-C cable to connect the device to a computer. On the computer, open File Explorer. Open This PC\HOLOLENS-DEVICE\Internal Storage\Documents, and locate the AutopilotDiagnostics.zip file. NOTE: The .zip file may not immediately be available. If the file is not ready yet you may see a HoloLensDiagnostics.temp file in the Documents folder. To update the list of files, refresh the window. Once the AutopilotDiagnostics.zip has been created. Extract the contents of the AutopilotDiagnostics.zip file to a location of your choice. In the extracted files, locate the CSV file that has a file name prefix of “DeviceHash*” Copy that file to a drive on the computer where you can access it later. IMPORTANT: The data in the CSV file should use the following header and line format. Device Serial Number,Windows Product ID,Hardware Hash,Group Tag,Assigned User <SerialNumber>,<ProductID>,<hardwareHash>,<optionalGroupTag>,<optionalAssignedUser>. NOTE: The Group Tag and Assigned User are not always populated by default, so you may need to add these. Especially in this example, whereby we wish to utilize the Group Tag data to specifically assign a Profile defined for HoloLens. Be sure to add this, if required. Enroll HoloLens 2 Device for Autopilot Deployment There are two primary ways to register or enroll HoloLens 2 device for Autopilot deployment. - Reseller can register devices in the Partner Center when you place an order. - Retrieve the hardware hash (also known as the hardware ID) and register the device manually in MEM admin center. Login to the Microsoft Endpoint Manager console, select Devices > Windows > Windows enrollment, and then select Devices. Under Windows Autopilot Deployment Program, select Import. Under Add Windows Autopilot devices, select the DeviceHash CSV file, select Open, and then select Import. Ensure you don’t see any errors under Formatting results. Click Import to import the hardware hash. After the import finishes, select Devices > Windows > Windows enrollment > Devices > Sync. The process might take a few minutes to complete, depending on how many devices are being synchronized. To see the registered device, select Refresh. Use the Sync and Refresh commands to view the device list. After some time, the Profile should change to Assigned. Should you wish to assign this device to a user, either for track/trace capabilities or PreProvisioning (formerly White Glove) you can achieve this, by selecting the Device, and clicking Assign User. In the right pane, select the User, and click Select to confirm. This will result in the device being assigned to the User, allowing you to perform PreProvisioned deployments (deployments with the Users profile/configuration installed automatically). At this point, you are now ready to perform an Autopilot Deployment to the HoloLens device. Further articles will describe how to Enrol, and Deploy HoloLens devices using the profile created herein.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.3/warc/CC-MAIN-20230923194908-20230923224908-00402.warc.gz
CC-MAIN-2023-40
4,114
28
https://ds-servers.com/skins/css/weapon-packs/epicfury-s-unreleased-skins.html
code
Добавил: The DSystem This is a pack of skins I never released. This includes: - An unfinished M37 with w_models consistency errors. - A reorigin of the Dragon Deagle. - Teh Snake's Silenced Five-seveN with an alternate texture. - Unkn0wn's M4 with no cubemaps - And last and definitely least, a tinted beta deagle, which was my first skin. I don't care if this is rated lowly. This is just an archive of my old skins.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121453.27/warc/CC-MAIN-20170423031201-00103-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
424
8
https://rossdallaire.com/notes/tv-interfaces-can-be-hard-to-find-active-selection/
code
What is currently selected on this screen? I've noticed a pattern where some tv interfaces are hard to see what is the current actively selected item. Especially ones with bright colors. Once you start clicking around it becomes apparent, but if you look away for a second it is sometimes hard to determine what is selected. The above is Disney+ where this occurs in a few places.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00410.warc.gz
CC-MAIN-2024-18
380
3
https://discuss.elastic.co/t/installed-6-6-could-not-find-java-set-java-home-or-ensure-java-is-in-path/172026/4
code
I just installed Elastic Search 6.6. I ran it and it worked fine until I tried again a few hours later: # /export1/opt/ELK_Bin/elasticsearch-6.6.1/bin/elasticsearch which: no java in (/usr/lib64/qt-3.3/bin:/usr/local/sbin:/bin:/usr/bin:/sbin:/usr/sbin:/usr/local/bin:/usr/X11R6/bin) could not find java; set JAVA_HOME or ensure java is in PATH [Dev root @ vm-63f1-8c50 /export1/opt/ELK_Bin] # echo $JAVA_HOME /export/opt/jdk/1.8.0_25l64/ The logs I got usually showed up on the console and now I can't even see what the larger issue is. Java is installed and this has started up before. I'm not sure what went wrong...
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232260161.91/warc/CC-MAIN-20190526225545-20190527011545-00111.warc.gz
CC-MAIN-2019-22
618
4
http://www.microsofthouse.co.za/programs.html
code
Microsoft Programming Courses in Cape Town 2KO International has been a Microsoft Partner since 1999, and offers IT training and consulting in Cape Town and the rest of South Africa. The 2KO Group of companies offers numerous services and consulting packages in IT, as well as offering established training courses for business and IT disciplines. Our computer courses are delivered by means of instructor-led or online methodologies. Our Desktop Development unit are equipped with a multi-skilled team of developers that expose multiple programming languages to fit your desktop application development environment, these languages consists of: 1. Desktop Application Development: Visual Basic .NET (VB.NET) is an object-oriented computer programming language that can be viewed as an evolution of the classic Visual Basic (VB), implemented on the .NET Framework. C# is an elegant and type-safe object-oriented language that enables developers to build a broad range of secure and robust applications that run on the .NET Framework. You can use C# to create Windows client applications, XML Web services, distributed components, client-server applications, database applications, and much, much more. Visual C# provides an advanced code editor, convenient user interface designers, integrated debugger, and many other tools to make it easier to develop applications based on the C# language and the .NET Framework. Java is a programming language that is fast, secure and reliable. From laptops to datacenters, game consoles to scientific supercomputers, cell phones to the internet. Java is everywhere! 2. Web Application Development: Our Web Development team are equipped with multi-range of skills that fits different types of web application development. These includes: Ruby on Rails "Ruby on Rails is a breakthrough in lowering the barriers of entry to programming. Powerful web applications and formerly might have taken weeks or months to develop can be produced in a matter of days." Tim O'Reilly. Ruby on rails is an open-source web framework that's optimized for program happiness and sustainability productivity. Python is a programming language that lets you work more quickly and integrate your systems more effectively. You can learn to use Python and see almost immediate gains in productivity and lower maintenance costs. Widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML. 3. Mobile Application Development: Our Mobile Development Team are equipped with a multi-range of skills to fit different types of mobile application platforms, which include: Andriod is a Linux-based mobile phone operating system developed by Google and it is unique. Google is actively developing the platform by giving it away for free to hardware manufactures and phone carriers who want to use Andriod on their devices. Windows phone is the operating systems version of Microsoft and provide great productivity benefit through its uniform look and feel with the desktop and tablet version. Windows 8 Applications For the most up to date version of this course consult www.2ko.co.za
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488286726.71/warc/CC-MAIN-20210621151134-20210621181134-00016.warc.gz
CC-MAIN-2021-25
3,161
19
https://sourceforge.net/p/mingw/mailman/attachment/000001c22862$b8b60d80$f4ba2944@flaarsville/1/
code
Kind of hesitant to answer this... On 10 Jul 2002 at 14:21, Brian Kropf wrote: > I™ve seen this before on a couple of packages, and now I™m seeing it > again with fltk. Does anyone know why running autoconf on a fresh cvs > download of a package gives an error message like: > /mingw/bin/autoconf: /mingw/bin/autom4te: No such file or directory > /mingw/bin/autoconf: /mingw/bin/autom4te: No such file or directory I > can run the cygwin version of autoconf to get it set up, but that > includes the “mno-cygwin. autom4te, if you installed the MSys DTK is in /usr/bin, not /mingw/bin...umm...not sure where you expect autom4te to be, or if you even expect it to be anywhere... Anyway, the Msys DTK executable places it under /usr/bin, not /mingw/bin. I see that I somehow unzipped it to my mingw bin directory, and not my msys directory. Do you think that’ll matter?? It appears to be looking in the place where the autom4te is actually at, it just doesn’t find it.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543315.68/warc/CC-MAIN-20161202170903-00066-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
975
14
https://www.varsitytutors.com/tutors/878770937
code
Hi! I'm a PhD student at the University of Colorado Boulder studying physics education research. I taught middle/high school math and science in Colorado for 3 years and I've missed teaching since I went back to school. In my free time I like to rock climb, hike, and backpack. I also enjoy sewing, knitting, and reading lots of books. Undergraduate Degree: University of Colorado Boulder - Bachelor in Arts, Physics SAT Composite (1600 scale): 1500 SAT Math: 700 SAT Verbal: 720 SAT Writing: 750 Rock climbing, music (singing!), reading, cats
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104054564.59/warc/CC-MAIN-20220702101738-20220702131738-00536.warc.gz
CC-MAIN-2022-27
543
8
http://superuser.com/questions/665457/no-administrator-password-for-windows-7
code
I'm a secretary and my boss set up my new Windows 7 OptiPlex 7010 (Dell) computer for me while I was on vacation (he does not remember setting any "administrator" password). We are a small office so there is no system password set, either. I've used it for 6 months, all the while I couldn't access network drives, etc., without an administrator password. It was annoying, but I could still get my work done. Finally, on a slow day I took it upon myself to "fix" the problem, and in all my infinite wisdom, I managed to change my user account from administrator to standard user, so now I really can't do anything. I can't download or install any programs, move or rename files, etc. I tried the Dell suggested solution, but the BIOS tells me there is no password set, so it has to be a Windows 7 problem. All the solutions I have come across require an administrator password to let me do them. What can I do to find out the admin password so I can use my own darn computer!? Is there a default admin password?
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533121.28/warc/CC-MAIN-20140416005213-00086-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,011
5
https://support.bolt.com/hc/en-us/articles/360033383434-Logout-of-a-Bolt-Account
code
Bolt allows customers the ability to create Bolt Accounts. If a customer does not wish to use their Bolt Account, they are able to logout and checkout as a guest. Either of the following will allow a customer to logout of their Bolt Account: - If the customer is already logged in and they wish to logout, they can simply click Logout to Guest Checkout. This option is located at the bottom of the One-Page checkout and will return the customer to the guest checkout flow. - If the customer is being prompted to enter a six-digit authentication code to log in to their Bolt account but they wish to enter their details manually, they may click Enter details manually to return to Bolt's guest checkout flow. Note — When a customer clears their phone or other device's memory/cache, this will also log the customer out of their Bolt account.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704799741.85/warc/CC-MAIN-20210126104721-20210126134721-00590.warc.gz
CC-MAIN-2021-04
842
5
https://opendata.stackexchange.com/questions/4507/pharmacist-database-in-canada
code
Where would I be able to get some demographic and employment data for pharmacists in Canada? Much like this one: I am still an undergraduate so I can't apply through their graduate program. And it costs way too much for independent university research. As a non-gradudate student, one has to pay access fees to the database, at the following rates: Data request pricing CIHI responds to data requests on a cost-recovery basis, as follows: •$145/hour, for Canadian health care facilities, media (data requests only), governments, not-for-profit health agencies, universities (except for students through the Graduate Student Data Access Program), health professionals and researchers from the public sector (Price A clients) •$290/hour for private commercial operations (including but not limited to software vendors and consultants), foreign clients (Price B clients) and others not qualifying for Price A Is there an alternate source?
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487622234.42/warc/CC-MAIN-20210616063154-20210616093154-00483.warc.gz
CC-MAIN-2021-25
939
5
https://stackoverflow.com/questions/51549834/how-to-check-the-signal-handler-in-linux
code
Because the Linux kernel does not expose the signal handlers (other than using the signal()) syscall in the process itself), you need to inject executable code to the target process to obtain this information. (Or, alternatively, create a Linux kernel module that exposes this information.) So, this is definitely a c linux question. Note that it is not possible to always obtain the name of a function, because the handler can be declared static void without any particular name in the binary. The easiest approach would be to create a dynamic library to interpose sigaction(), with an ELF constructor function (not related to C++; Linux ELF binaries just support marking functions "constructor", in which case they are automatically executed prior to main()) that opens a suitable log file in write-only append mode, say /var/log/sighandlers/PID.log, and dumps the contents of /proc/self/maps to record the addresses the binaries are loaded in. The interposed functions will then simply write the addresses of newly assigned handlers to the log file. It is important to note that both signal() are async-signal safe functions, so the interposed versions should be, too. (Fortunately, you only need write(), which is async-signal safe. I recommend using dlsym() to look up the original function pointers in the ELF constructor function.) When examining the log file, the function addresses should be calculated relative to the beginning of the binary mapping, then objdump -tT binary or objdump -d binary to find the symbol the address belongs to. I would personally not bother with any other approaches, even if this requires one to execute each binary using a special command (setting LD_LIBRARY_PATH) to find them out; it is either that, or a kernel module.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100651.34/warc/CC-MAIN-20231207090036-20231207120036-00654.warc.gz
CC-MAIN-2023-50
1,761
20
https://securityrules.info/about/xumaf-bobid-cacyz-vosex/SV-46209r1_rule
code
From z/OS CA MIM for TSS STIG Part of ZB000020 Associated with IA controls: ECCD-2, ECCD-1 CA MIM Resource Sharing can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the compromise of the operating system environment, and compromise the confidentiality of customer data. Many utilities assign resource controls that can be granted to system programmers only in greater than read authority. Resources are also granted to certain non systems personnel with read only authority. Refer to the following report produced by the TSS Data Collection and Data Set and Resource Data Collection: - SENSITVE.RPT(ZMIM0020) - TSSCMDS.RPT(#RDT) Automated Analysis Refer to the following report produced by the Data Set and Resource Data Collection: - PDI(ZMIM0020) Verify that the accesses to resources and/or generic equivalent are properly restricted according to the requirements specified in CA MIM Resource Sharing Resources table in the z/OS STIG Addendum. If the following guidance is true, this is not a finding. ___ The TSS resources are owned or DEFPROT is specified for the resource class. ___ The TSS resource access authorizations restrict access to the appropriate personnel. The IAO will work with the systems programmer to verify that the following are properly specified in the ACP. (Note: The resources and/or resource prefixes identified below are examples of a possible installation. The actual resources and/or prefixes are determined when the product is actually installed on a system through the product’s installation guide and can be site specific.) Use CA MIM Resource Sharing Resources table in the zOS STIG Addendum. This table list the resources, access requirements, and logging requirement for CA MIM Resource Sharing. Ensure the guidelines for the resources and/or generic equivalent specified in the z/OS STIG Addendum are followed. Note: SAFPREFIX identifies the prefix for all resources. The default value for this keyword parameter is MIMGR. It is coded in the MIMINIT member of the data set specified in the MIMPARMS DD statement of the started task procedures. The TSS resources as designated in the above table are owned and/or DEFPROT is specified for the resource class. The TSS resource access authorizations restrict access to the appropriate personnel as designated in the above table. The following commands are provided as a sample for implementing resource controls: TSS ADD(dept-acid) OPERCMDS(prefix) TSS PERMIT(syspaudt) OPERCMDS(prefix.ACTIVATE) ACCESS(UPDATE) Lavender hyperlinks in small type off to the right (of CSS id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things. You can obtain data about documents and items in other formats. Simply provide an HTTP header Powered by sagemincer
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00351.warc.gz
CC-MAIN-2024-18
2,968
14
https://www.openexoplanetcatalogue.com/histogram.html
code
|range = [, ]| The plot updates automatically when the above parameters are changed The data presented in this plot is taken from the Open Exoplanet Catalogue. All information on this page is directly generated from the XML files in the catalogue. If you are interested in how, look at the source code. You can download the entire catalogue on github. You can also find ASCII tables of the same catalogue in a separate repository. Some information, especially in the case of a binary system cannot be easily represented in an ASCII table. You are therefore encouraged to use the original XML files provided by the Open Exoplanet Catalogue.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00259.warc.gz
CC-MAIN-2023-50
639
3
https://repository.uel.ac.uk/item/89zwv
code
Supplementary data for 'Investigation into the Accuracy and Practicality of Methods for Transforming Coordinates between Geodetic Datums' Ruffhead, A. 2021. Supplementary data for 'Investigation into the Accuracy and Practicality of Methods for Transforming Coordinates between Geodetic Datums'. Data underpinning Chapters 12 and 13 of the Thesis Coordinates of 4315 points in Great Britain which are common to reference systems ETRS89 and OSGB36 File Access Level Repository staff only Data in Chapter 12 of Thesis Sandi Berk supplied the data in columns B-L and the following technical information: Transverse Mercator projection is used for both CRSs, with the same parameters: the longitude of the central meridian is 15 degrees, the scale factor at the central meridian is 0.9999, the false easting is 500000 m and the false northing is −5000000 m. However, different reference ellipsoids are used: the Bessel 1841 ellipsoid for D48 coordinates (a = 6377397.155 m, b = 6356078.96325 m), and the GRS80 ellipsoid for D96 coordinates (a = 6378137 m, b = 6356752.31414 m). Sandi Berk (of the Surveying and Mapping Authority of the Republic of Slovenia) is contactable via ResearchGate. |Output||Investigation into the Accuracy and Practicality of Methods for Transforming Coordinates between Geodetic Datums| 0views this month 0downloads this month
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00731.warc.gz
CC-MAIN-2023-50
1,351
11
https://www.wayaround.com/
code
WayAround is the app for your smart device that provides on-demand details about everyday things. The simple tag-and-scan approach lets you quickly and easily identify things around you. It also provides extra details, like how something works or when it expires. The result? Doing more of the things you want, with more confidence and more independence.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819847.83/warc/CC-MAIN-20240424174709-20240424204709-00643.warc.gz
CC-MAIN-2024-18
354
2
https://communities.ca.com/thread/241724223-e2e-restart-script
code
I have a script that fails at a point due to a known issue with the app it's running. After a few more runs it continues on. What i'd like to do at this point is if it fails to run the Clean_up etc and restart the script. Is this possible? Below is a snippet: nimAlarmSimple(4, "DM - failed") nimAlarmSimple(0, "DM - success")
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202642.32/warc/CC-MAIN-20190322094932-20190322120932-00192.warc.gz
CC-MAIN-2019-13
326
4
https://docs.microsoft.com/en-us/answers/questions/293817/sharepoint-2013-custom-search.html
code
Hello, I have a subsite document library having 5000 documents. I also have a SP webpart(server control) to display custom result based on custom parameters. The documents were also displayed in the global search. I was asked to not to show documents in global search. I defined the rule to exclude the library for the document library but the documents are not returning results even within my application. It looks like SP search requires crawling content in order to display results even with object model. Having said that how do I block showing these content from the Global search?
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038863420.65/warc/CC-MAIN-20210419015157-20210419045157-00425.warc.gz
CC-MAIN-2021-17
587
2
https://www.westernstarnews.com.au/news/sparkys-horror-discovery-of-15-snake-skins-in-burn/4121952/
code
Sparky‘s horror discovery of 15 snake skins in roof ELECTRICIAN Elliot Mangan is used to finding all kinds of creepy creatures hiding in the nooks and crannies of South Burnett homes, but this was something entirely new. Hired to set up some downlights at a Blackbutt property, the sparky duo uncovered a treasure trove of eerily fresh snake skins, amounting to a horrifying 15 in total. "My apprentice Braydon was up in the roof and he's yelling, 'there's bloody snake skins everywhere' and he actually pulled a few out. I was really edgy about getting up in the roof, because I'm petrified of snakes - I've got a bit of a snake phobia," Mr Mangan said. A little later on Mr Mangan found his nerve and squeezed into some of the tight spots in the roof to get the job done. "I ended up getting up there a bit later on. I had to crawl down into some tight spots, because Braydon's a bit larger than me," he said. "We found a heap more in all the eaves. Luckily we didn't find a live one, thankfully, but they were fresh skins, so we definitely knew they were up there." "I climbed right down in the eave and I was on high alert because I was looking for a live snake. I was getting my hand down the side of the wall, and then I looked to my right there's a bloody snake skin with its mouth open right at my head." While it is tempting to convince yourself the skins came from a single snake, who'd decided to take up residence at this Blackbutt home a while back, unfortunately, this is not the case. According to Mr Mangan, the growing pile of snake skins were not only fresh, but were different sizes too - including small baby snake sized sheddings. The men had stumbled across a snake breeding ground in the roof of this house. "Before we even got up there the owners were saying 'we've actually never seen a snake out here', so they couldn't believe all the snake skins we were pulling out the roof." "In the last 20 years they've never seen a snake here. Apparently, because they're all in the roof." In 11 years, this is the first time Mr Mangan has seen anything like this, but is still thankful he hasn't yet come across a live one. "I've had plenty of my sparky mates, who actually have come into live carpet snakes in the roof. But I've always said if I ever saw one I'd jump straight through the gyprock - through the roof." "We obviously get a lot of spiders in our job, there's spiders and spider webs everywhere, so if you have a phobia of spiders, being an electrician obviously wouldn't be for you. But snakes, you usually don't see too many."
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594808.94/warc/CC-MAIN-20210423131042-20210423161042-00162.warc.gz
CC-MAIN-2021-17
2,561
16
https://www.vanderhouwen.com/job-postings/android-engineer-46439/
code
Our client is in need an experienced Android Engineer with hands on experience with Java and Kotlin. Prior experience with Restful API's is required. Familiarity with Android Studio and GIT is required. Prior experience with TDD using JUnit / Espresso. Roles & Responsibilities Design and implement sophisticated features in Walmart Android applications. Work closely with product and design teams to optimize the experience for the Android platform. Analyze and optimize Android applications. Experiment with new technologies and features and build quick prototypes. 10+ years of professional Software development experience. BS degree in Computer Science or related field. Ability to step out of your comfort zone and use new technologies. Experience with GraphQL. Big pluses - having apps published on Play Store and reference to an active GitHub repo. 7+ years of professional Android development experience. Software development experience in Java and Kotlin. Experience with Android application development using the Android SDK. Experience designing REST APIs and consuming REST services. Familiarity with Android Studio and GIT. Experience with TDD using JUnit / Espresso. Excellent problem solving, critical thinking and communication skills. Benefits are available to eligible VanderHouwen contractors and include coverage for medical, dental, vision, life insurance, short and long term disability, and matching 401k. VanderHouwen is an award-winning, Women-Owned, WBENC certified professional staffing firm. Founded in 1987, VanderHouwen has been successfully placing experienced professionals throughout the Pacific Northwest and nationwide. Our recruitment teams are highly specialized in either Technology and IT, Engineering, or Accounting and Finance career markets. Our recruiters value building meaningful, professional relationships with each candidate as well as developing honed knowledge of companies' staffing needs and workplaces. Partner with us to land your next exciting career. VanderHouwen is an Equal Opportunity Employer and participates in E-Verify. VanderHouwen does not discriminate on the basis of race, color, religion, sex, national origin, age, disability, or any other characteristic protected by applicable local, state or federal civil rights laws. Application Engineer – IOS
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880616.1/warc/CC-MAIN-20200706104839-20200706134839-00110.warc.gz
CC-MAIN-2020-29
2,319
22
https://coastlearn.org/lessons/problem-analysis/
code
In the simplest case, a coastal stretch does not fulfil its requirements and people (the government, interest groups) want certain functions to be improved. It becomes more complicated when a coastal stretch does fulfil its requirements, but that it is anticipated that within a few years it will not. When will that be, and when should measures be taken, and which measures are viable? It becomes even more complicated, when a single party has a problem (for instance a project developer) whereas all other parties judge the situation as being acceptable. The policy maker is not only confronted with problems or wishes, but sometimes also with preferred directions of solutions. He then can follow two approaches: The solution-oriented approach does not include an analysis of the problem for which the solution is meant. Consequently, one runs the risk that at the end, the ‘best’ alternative does not solve the problem. Quite often it occurs that during the policy making process, the question arises to which problem the proposed solutions actually refer. Then the underlying problem is analysed, which actually means that a shift occurs in the orientation of the research: from solution-oriented towards problem-oriented approach. A problem analysis following the problem-oriented approach consists of problem orientation, problem delimitation and problem definition.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607314.32/warc/CC-MAIN-20200122161553-20200122190553-00390.warc.gz
CC-MAIN-2020-05
1,377
4
http://madebychaun.com/journal/2017/11/site-inspired/
code
Surprised and delighted to be featured on siteInspire, a collection of some of the finest web and interactive design on planet Earth. It’s a nice feeling to be up there with some amazing sites. If haven’t clicked around my site yet, feel free to and let me know what you think. I need to post some of the new work I’ve been lucky enough to work in the past months. Shout outs to Stephen Scaff for dev’ng and Thomas Vaeth for looking out.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814101.27/warc/CC-MAIN-20180222101209-20180222121209-00639.warc.gz
CC-MAIN-2018-09
445
2
http://matematika.reseneulohy.cz/2510/matrix-kernel
code
Task number: 2510 Let \(\mathbf A\) be a matrix of size \(m \times n\) over a field \(\mathbb K\). Show that \(Ker(\mathbf A)\) forms a vector subspace in the arithmetic vector space \(\mathbb K^n\). Use the definition of a matrix kernel and show that the set is closed under summation and product with any element of the field \(\mathbb K\). Let \(\mathbf x,\mathbf x' \in Ker(\mathbf A)\), then from the definition \(\mathbf A\mathbf x=\mathbf A\mathbf x'=\mathbf 0\), then also \(\mathbf A(\mathbf x+\mathbf x')=\mathbf A\mathbf x+\mathbf A\mathbf x'=\mathbf 0+\mathbf 0=\mathbf 0\), and so \(\mathbf x+\mathbf x'\in Ker(\mathbf A)\). Similarly let \(\mathbf x\in Ker(\mathbf A)\) and \(a\in \mathbb K\) then we compute \(\mathbf A(a\mathbf x)=a(\mathbf A\mathbf x)=a\mathbf 0=\mathbf 0\), and so \(a\mathbf x\in Ker(\mathbf A)\). Note that although there are three different multiplications in the first equation, it is possible to change the order in which the product with scalar will be done.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711200.6/warc/CC-MAIN-20221207153419-20221207183419-00042.warc.gz
CC-MAIN-2022-49
999
6
https://community.apryse.com/t/purpose-of-the-iframe-within-the-webviewer-iframe/7425
code
WebViewer Version: 8.10 Do you have an issue with a specific file(s)? No Can you reproduce using one of our samples or online demos? No Are you using the WebViewer server? No Does the issue only happen on certain browsers? No Is your issue related to a front-end framework? No Is your issue related to annotations? No Please give a brief summary of your issue: How to target the iframe within the webviewer iframe Please describe your issue and provide steps to reproduce it: For accessibility reasons I need to add properties to an iframe inside the webviewer iframe. I would like to know how I can do it and more importantly what is the purpose of this iframe since I see that it contains only a few lines of code that I would also like to know what they do. Attached are some screenshots of the iframe in question and its content. Greetings and thank you very much.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00338.warc.gz
CC-MAIN-2023-50
868
13
http://www.tomshardware.com/forum/290292-31-development-machine
code
I'm considering building a development rig(no gaming) and I'd love to know you guy's thoughts on whether this is a good build both in terms of being performant, cost effective and energy efficient and or whether any additional components are needed G.SKILL 6GB (3 x 2GB) 240-Pin DDR3 SDRAM DDR3 1600 (PC3 12800) Triple Channel Kit Desktop Memory Model F3-12800CL9T-6GBNQ GIGABYTE GA-X58A-UD3R LGA 1366 Intel X58 SATA 6Gb/s USB 3.0 ATX Intel Motherboard --- Combo Deal ($300) RAIDMAX Quantum ATX-798WB Black SECC ATX Mid Tower Computer Case ($49.99) CORSAIR CMPSU-650TX 650W ATX12V / EPS12V SLI Ready CrossFire Ready 80 PLUS Certified Active PFC Compatible with Core i7 Power Supply ASUS CuCore Series EAH4850 CUCORE TOP/2DI/1GD3 Radeon HD 4850 1GB 256-bit DDR3 PCI Express 2.0 x16 HDCP Ready CrossFireX Support Video Card ($84.99) Western Digital Caviar Blue WD10EALS 1TB 7200 RPM SATA 3.0Gb/s 3.5" Internal Hard Drive -Bare Drive($69.99) Sony Optiarc 24X DVD/CD Rewritable Drive Black SATA Model AD-7240S-0B - OEM ($19.99) I might do some overclocking but not quite sure as to how to do so. The I930 comes with a stock heatsink and fan and I wonder whether I need to buy a better heat sink such as the Cooler Master Hyper 212 Plus for overclocking or whether the stock one will do fine. It's a little spendy($49.99 on newegg)
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663365.9/warc/CC-MAIN-20140930004103-00382-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
1,326
11
http://tuxmachines.org/taxonomy/term/38?page=415
code
techradar.com: Free Linux music packages Ardour, Hydrogen and Jack will help you fall in love with a whole new world of creative possibilities zdnet.com/blog: The Samba team isn’t expecting to release Samba 4 until the first half of 2011 (optimistically) but work on support for Microsoft’s SMB2 — and older SMB/CIFS — has moved ahead quite nicely. linuxjournal.com: Compiz is a compositing window manager that enables users to enjoy clever desktop effects and transparency. Compiz is included in many distributions' default installs and in many others' repositories. The release of Compiz 0.9.0 is the first major release since being completely rewritten in C++. ghacks.net: Today we take another look at the Xfce desktop environment. In this piece of the puzzle we are going to take a look at Xfce’s “control panel”, the Xfce 4 Settings Manager. ghacks.net: I am going to start by showing how to install and start using Xfce 4. I have already introduced this lightweight window manager way back in my article “Get to know Linux: Xfce 4“. That article only skimmed the surface. fosswire.com: For some reason, text editors are something that us Unix geeks get very passionate about. Whether it’s an argument over which editor is better, or just professing our love for our favourite keyboard shortcuts, it’s an emotive issue. jeffhoogland.blogspot: Gnome is the most popular Linux desktop environment and one of it's key features that makes it so wonderful is the "gnome panel". For those unfamiliar the "gnome panel" is the bar that is typically located at the bottom (and top sometimes) of the screen where your menu, task-bar, and icon tray are located. pcworld.com (IDG): With the impending release of version 9.0 of the open-source Postgres database, due in mid-August, the developers behind the project are hoping that the new features will attract more interest from enterprises. linuxplanet.com: Firefox is a great open source web browser for Linux and other OSes, but have you checked out Opera? ghacks.net: How many browsers does an operating system really need? If you are looking from the outside in at the Linux operating system you would think it needed plenty. Rekonq will be the new default browser for Kubuntu 10.10. We will take a look.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917126237.56/warc/CC-MAIN-20170423031206-00437-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,276
10
https://www.fi.freelancer.com/contest/design-a-logo-1011423?w=f&ngsw-bypass=
code
Design a Logo - Tila: Closed - Palkinto: $50 - Vastaanotetut työt: 21 - Voittaja: afiyaaunjum Adobe Illustrator, Photoshop with fully mockup & flat vector The brand name is: aicodex ai - is for artificial intelligence This is an software company and interested in ai related machine learning projects. Short description about company; Main words: Artificial Intelligence with a vision Sub description: Build smarter apps that see the world like you do. The message is: Build smarter apps faster with aicodex's powerful visual recognition technology. Other apps are; Sentiment, Language based algorithms, recommendation engines etc. aicodex helps increase the chances for people to sell their photos by surfacing the right image to the right buyer at the right time. Not only the image recognation also we are good at all ai innovative project. This is new generation & feature Our expectations is; whenever someone look to the design then it should be recognized that this is about ai / machine learning. The chemistry of the company is like scholarship and there lots of strange geeks. But it sure they are the best. Working with them hard but on one hand there are no too much competition in this area.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195929.39/warc/CC-MAIN-20201128214643-20201129004643-00171.warc.gz
CC-MAIN-2020-50
1,205
18
https://docs.frrouting.org/projects/dev-guide/en/latest/vtysh.html
code
VTYSH is a shell for FRR daemons. It amalgamates all the CLI commands defined in each of the daemons and presents them to the user in a single shell, which saves the user from having to telnet to each of the daemons and use their individual shells. The amalgamation is achieved by extracting commands from daemons and injecting them into VTYSH at build time. At runtime, VTYSH maintains an instance of a CLI mode tree just like each daemon. However, the mode tree in VTYSH contains (almost) all commands from every daemon in the same tree, whereas individual daemons have trees that only contain commands relevant to themselves. VTYSH also uses the library CLI facilities to maintain the user’s current position in the tree (the current node). Note that this position must be synchronized with all daemons; if a daemon receives a command that causes it to change its current node, VTYSH must also change its node. Since the extraction script does not understand the handler code of commands, but only their definitions, this and other behaviors must be manually programmed into VTYSH for every case where the internal state of VTYSH must change in response to a command. Details on how this is done are discussed in the Special DEFUNs section. VTYSH also handles writing and applying the integrated configuration file, /etc/frr/frr.conf. Since it has knowledge of the entire command space of FRR, it can intelligently distribute configuration commands only to the daemons that understand them. Similarly, when writing the configuration file it takes care of combining multiple instances of configuration blocks and simplifying the output. This is discussed in Configuration Management. python/xref2vtysh.py script scans through the frr.xref file created earlier in the build process. This file contains a list of all install_element sites in the code, generated directly from the binaries (and therefore matching exactly what is really This list is collated and transformed into statements, output to contains the name of the command plus _vtysh, as well as a flag that indicates which daemons the command was found in. When the command is executed in VTYSH, this flag is inspected to determine which daemons to send the command to. This way, commands are only sent to the daemons that know about them, avoiding spurious errors from daemons that don’t have the command defined. The extraction script contains lots of hardcoded knowledge about what sources to look at and what flags to use for certain commands. vtysh_scan Makefile variable and checks in source files are no longer used. Remove them when rebasing older In addition to the vanilla DEFUN macro for defining CLI commands, there are DEFUN variants that each serve different purposes. Used almost exclusively by generated VTYSH code. This macro defines a cmd_elementwith no handler function; the command, when executed, is simply forwarded to the daemons indicated in the daemon flag. Used by daemons. Has the same expansion as a xref2vtysh.pywill skip these definitions when extracting commands. This is typically used when VTYSH must take some special action upon receiving the command, and the programmer therefore needs to write VTYSH’s copy of the command manually instead of using the generated version. The same as DEFUN, but with an argument that allows specifying the ->daemonfield of the generated cmd_element. This is used by VTYSH to determine which daemons to send the command to. A version of DEFUNSHthat allows setting the ->attrfield of the generated cmd_element. Not used in practice. When integrated configuration is used, VTYSH manages writing, reading and applying the FRR configuration file. VTYSH can be made to read and apply an integrated configuration to all running daemons by launching it with <file>. It sends the appropriate configuration lines to the relevant daemons in the same way that commands entered by the user on VTYSH’s shell prompt are Configuration writing is more complicated. VTYSH makes a best-effort attempt to combine and simplify the configuration as much as possible. A working example is best to explain this behavior. Suppose we have just staticd and zebra running on the system, and use VTYSH to apply the following configuration snippet: ! vrf blue ip protocol static route-map ExampleRoutemap ip route 192.168.0.0/24 192.168.0.1 exit-vrf ! Note that staticd defines static route commands and zebra defines protocol commands. Therefore if we ask only zebra for its configuration, we get the following: (config)# do sh running-config zebra Building configuration... ... ! vrf blue ip protocol static route-map ExampleRoutemap exit-vrf ! ... Note that the static route doesn’t show up there. Similarly, if we ask staticd for its configuration, we get: (config)# do sh running-config staticd ... ! vrf blue ip route 192.168.0.0/24 192.168.0.1 exit-vrf ! ... But when we display the configuration with VTYSH, we see: ubuntu-bionic(config)# do sh running-config ... ! vrf blue ip protocol static route-map ExampleRoutemap ip route 192.168.0.0/24 192.168.0.1 exit-vrf ! ... This is because VTYSH asks each daemon for its currently running configuration, and combines equivalent blocks together. In the above example, it combined the vrf blue blocks from both zebra and staticd together into one. This is VTYSH communicates with FRR daemons by way of domain socket. Each daemon creates its own socket, typically in protocol is very simple. In the VTYSH to daemon direction, messages are simply NUL-terminated strings, whose content are CLI commands. Here is a typical message from VTYSH to a daemon: Request 00000000: 646f 2077 7269 7465 2074 6572 6d69 6e61 do write termina 00000010: 6c0a 00 l.. The response format has some more data in it. First is a NUL-terminated string containing the plaintext response, which is just the output of the command that was sent in the request. This is displayed to the user. The plaintext response is followed by 3 null marker bytes, followed by a 1-byte status code that indicates whether the command was successful or not. Response 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Plaintext Response | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Marker (0x00) | Status Code | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 0x00 byte in the marker also serves to terminate the plaintext
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00733.warc.gz
CC-MAIN-2023-50
6,474
67
https://davidauble.com/2017/11/17/run-wordpress-multi-site-localhost.html
code
This is something I’ve wanted to write about for quite some time. Part of my building process involves three environments: local, staging and production. Most of the sites I’ve built are straight-forward “single sites” with a few bits of magic here and there. However, with my job, I manage several mutli-site websites. For information on getting started with a WordPress multi-site, detailed instructions can be found in the WordPress documentation. For this demo, I’m going to assume you’re taking over a multi-site and are needing to make changes locally and there is a main site and two sub-sites. Also, let’s assume your local website will be “http://demo.local”. Once you’ve downloaded the database and imported it to the database you’re planning on using, it’ll be important to look for the following tables: wp_[site-id]_options, wp_blogs, wp_options, wp_site and wp_sitemeta. You will have several of these. These correspond with the Site ID in the Network tab. You will need to change the siteurl and home columns to “http://demo.local”. This is a little easier. Change each row in the domain column to “demo.local”. Like the wp_blogs table, this will also need the siteurl_and home_ columns updated to “http://demo.local”. Like the wp_blogs table, each row in the domain column will need to be updated to “demo.local”. Finally, I’ve only had issues with this once, however there is one last cell that needs to be updated. Look for the siteurl column and update the value to “http://demo.local”. And that’s it! It’s best to clear the cache on your local machine, but you’ll now be able to log into the WordPress admin panel like you would normally!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297290384.96/warc/CC-MAIN-20240425063334-20240425093334-00838.warc.gz
CC-MAIN-2024-18
1,710
9
https://community.anaplan.com/discussion/33557/oeg-best-practice-model-load-save-and-rollback
code
OEG Best Practice: Model load, save, and rollback A large and complex model such as 10B cells can take up to 10 minutes to load the first time it is in use after a period of inactivity of 60 minutes. The only way to reduce the load time is by identifying what formula takes most of the time. This requires the Anaplan L3 support (ask for a Model Opening Analysis), but you can reduce the time yourself by applying the formula best practices listed above. One other possible leverage is on list setup. Text properties on a list can increase the load times, and subsets on lists can disproportionately increase load times. It is best practice not to use list properties but house the attributes in a system model dimensioned by the list. See Best practice for module design for more details. A model will save when the amount of changes made by end-users exceeds a certain threshold. This action can take several minutes and will be a blocking operation. Administrators have no leverage on model save besides formula optimization and reducing model complexity. Using ALM and Deployed mode increases this threshold, so it is best to use Deployed mode whenever possible. A model will roll back in some cases of an invalid formula, or when a model builder attempts to adjust a setting that would result in an invalid state. In some large models, the rollback takes approximately the time to open the model, and up to 10 minutes worth of accumulated changes, followed by a model save. The recommendation is to use ALM and have a DEV model which size does not exceed 500M cells, with a production list limited to a few dozen items, and have TEST and PROD models with the full size and large lists. Since no formula editing will happen in TEST or PROD, the model will never rollback after a user action. It can roll back on the DEV model but will take a few seconds only if the model is small.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102697.89/warc/CC-MAIN-20231210221943-20231211011943-00515.warc.gz
CC-MAIN-2023-50
1,885
7
https://docs.elearncommerce.com/en/articles/2865829-how-to-track-the-time-your-students-spend-on-a-course-with-elearncommerce
code
You can track how much time a student spends on a course, as well as how much of that time they spend actually focused on the course, that is, the course in question is in the area of the screen that is actually visible to the student. When a student opens a course, eLearnCommerce starts tracking how much time that student is spending on that course. It will only track time when the student is in the course tab in their browser. If they navigate to a different tab or window, it stops tracking. It will also show you how much time they spent with the course actually displaying in the area of the screen they can see (it wasn't hidden by scrolling up or down). To access this data, follow these steps: 1 - Navigate to eLearnCommerce -> Statistics. 2 - Click Activity List -> Courses 3- Go to Time Spent tab 4 - Click User List to see the total time tracked or the Time Tracking tab to see time spent and time spent focused.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039490226.78/warc/CC-MAIN-20210420183658-20210420213658-00020.warc.gz
CC-MAIN-2021-17
927
7
https://www.roboticgizmos.com/raspberry-pi-tank-robot/
code
There is no better way to learn robotics than building and programming your own. This Yahboom Raspberry Pi Tank Robot is worth a look. It has a 480p camera that supports real-time transmission. It can be programmed by C and Python. The robot can handle inclines up to 60 degrees and avoid obstacles. This tank robot can be controlled by an Android device. It ships with ultrasonic sensor, battery, Bluetooth module, servos and everything you need to get started.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.9/warc/CC-MAIN-20240414192536-20240414222536-00525.warc.gz
CC-MAIN-2024-18
462
2
https://workstreamsai.medium.com/following?source=blogrolls_sidebar---two_column_layout_sidebar----------------------------------
code
Product Manager @ Doodle Awkwardly social software engineer and well-rounded weirdo. am: Staff Engineer @SlackHQ 🚀 ¶ was: @HFA, @ibmdesign ¶ always: #withher I like adventures. Tips to integrate with Slack APIs to make your work life simpler, more pleasant and more productive — whether for your internal team or millions of Slack users. Results-driven task manager / Agile Kanban board See all (14) Text to speech
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00828.warc.gz
CC-MAIN-2023-50
421
8
https://community.developer.atlassian.com/t/why-are-the-file-attachment-events-delayed-when-fetching-through-cql-lastmodified-keyword-in-confluence/55510
code
I am trying to get the list of modified objects in the last few minutes for confluence using the REST API that takes the CQL query. The query I am trying to use is cql=lastModified > now("-1m"). However, I am not getting the file attached in the response even after 5 minutes (just hitting the REST API repeated times in an interval of 1 minute). But, if I am using cql=lastModified > startOfDay(), the attachment seem to be appearing in the result after 10 minutes approximately (which basically means that the event is being delayed to appear in the lastModified group/batch). Important update: This is specifically observed with the files attached in the comments section and the files attached to the space with drag and drop option. Is there a way not to miss the file attachment event with the timely polling?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00226.warc.gz
CC-MAIN-2023-50
815
5
https://nordicapis.com/free-api-meetup-in-gothenburg-on-may-6/
code
Free API Meetup in Gothenburg on May 6 Travis Spencer April 30, 2014 Next week, we will have our first after-work meetup. Our 13th Nordic APIs event will be in Gothenburg on May 6th starting at 17:30. We’ll begin with dinner, drinks, and networking. From 18:30 to 20:00, we’ll have three short talks from Andreas Krohn of Dopter, Federico Hernandez from Västtrafik, and myself. We’ll discuss things such as: What APIs are Why they matter The state of APIs in the Nordics API deployment considerations (e.g., security, 24/7 operations) We’ll meet at Västtrafik’s offices downtown. Afterwards, some of us will make our way to a nearby pub for more API chatter over drinks. For the exact address, full agenda, and other info, checkout the event page. Admission is free, so sign up today before the last few tickets are claimed. Register Now A big thanks to Västtrafik for hosting and hope to see you next week!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00358.warc.gz
CC-MAIN-2023-50
920
1
https://en.wiktionary.org/wiki/User:Akedrou
code
|Search user languages or scripts| I am me. I like languages and want to learn more. That is all. Oh, and also. I don't think my Japanese is anywhere near "fluent" but I feel I have much more than "some degree" of knowledge. Is there really progression beyond "fluent" to "nearly native"? (I at least equate the '4' level "near-native" with fluent.) So I went with the more advanced one! Anyway, that's all I've got.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100568.68/warc/CC-MAIN-20231205204654-20231205234654-00270.warc.gz
CC-MAIN-2023-50
416
3
https://help.sap.com/doc/saphelp_nw73/7.3.16/en-US/d3/a850390aa3b608e10000000a11402f/content.htm?no_cache=true
code
The Reporting Agent allows you to check exceptions in the background. If the threshold value for an exception is exceeded or not reached, the system triggers the follow-up action that you specify. The following follow-up actions are available: In the BEx Query Designer, you have defined a query containing at least one exception. For more information, seeDefining Exceptions. Choose New Setting from the context menu. Choose Create New Setting. The New Reporting Agent Setting screen appears. To copy a setting, choose Maintain from the context menu of the setting. The Change Reporting Agent Setting screen appears. Choose Copy. The New Reporting Agent Setting screen appears. The following information is displayed on the General tab page: The functional area for the setting is Exception Reporting & Alerting. Information about the query for which you are creating a setting is shown under the Query group header (description, technical name, InfoProvider). After the setting has been saved for the first time, the system displays details of the last person who changed the setting and the time this change was made, under the Last Changed On/By group header. Under the Setting is Used in Packages group header, the system displays information about the packages in which the setting is used, and how they are scheduled. This information can only be displayed if you have defined the setting and assigned one or more scheduling packages to it. From the Exceptions node in the Available Objects tree structure, choose the exception that you want to process in the background, and use the Drag&Drop function to assign this exception to the Exceptions node in the Selected Objects tree structure. For the exception that you have transferred, choose the intervals or threshold values that you want to check in the background and use the Drag&Drop function to position them under the selected exception. Assign a follow-up action to the intervals or threshold values that you have selected. Drag the follow-up action that you want to use from the Follow-Up Actions node and drop it below the corresponding interval. When you double-click on the assigned follow-up action, the Properties of the Follow Up Action screen area appears. Make the settings that are available for the type of follow-up action that you have chosen. For more information, see From the Characteristics node in the Available Objects tree structure, choose the characteristics that you want to check in the background and use the Drag&Drop function to assign them to the Drilldown Characteristics node in the Selected Objects tree structure. Note: The order of characteristics is important here, since an exception always occurs in a specific cell context. Once you have defined the Reporting Agent setting, you can assign it to a scheduling package for background processing. For more information, seeProcessing a Scheduling Package.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545090.44/warc/CC-MAIN-20220522063657-20220522093657-00196.warc.gz
CC-MAIN-2022-21
2,904
21
https://www.freelancer.com/projects/Java-MySQL/Client-server-Java-based-server.4633620/
code
I'm currently looking for someone with experience in dealing with socket related issues to look into the issue I'm having with my server. I have currently written a server in Java to handle multiple Android based clients. The server works fine but after leaving it on for a while (an hour or two sometimes more) the connection request to the server will result in the server not being able to communicate with the database due to an inactive timeout. 15 freelancers are bidding on average $45 for this job Hello! I am a Java developer with 5 years experience working in multinational software companies. Looking forward to help you resolve the issue. Please check PM.
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323604.1/warc/CC-MAIN-20170628101910-20170628121910-00192.warc.gz
CC-MAIN-2017-26
667
3
https://www.johnnybriones.com/blog/2019/4/30/is-there-impossible-information-to-learnmemorize
code
Is There Impossible Information To Learn/Memorize? No matter how difficult material may seem to be, memory techniques can still be applied even though it may take a bit of work. Maybe there is some information out there where memory techniques can't be used. Is there information out there that you can't apply memory techniques to? Memory techniques are meant to be applied to any type of material out there, no matter how simple or how complex it is. There is always a way to apply memory techniques. When I first started out, I thought memorizing a deck of cards was impossible. You had to be superhuman to do it but guess what? I learned some memory techniques and... Boom! I can memorize a deck of cards plus numbers, binary faces, names, words, spoken numbers, and more. All this information seemed impossible to memorize but if you learn the right techniques, you're able to memorize it, so this material wasn't impossible to memorize. It was more of a question of how do I use these memory techniques to learn this information? Personally, I don't believe there is impossible information out there that can't be memorized because in some fashion, memory techniques can still be applied to "impossible material." When I went to China, I had to memorize cow patterns broken into puzzle pieces which was something completely new and abnormal. Even though I never memorized anything like it, I was able to figure out the right memory techniques to memorize all cow patterns. The same was true for the game show I did in California where I had to memorize numbers on keys and the doors the keys belonged to. I was still able to use memory techniques to accomplish this memory challenge. There is material out there really hard or just plain weird to memorize but not impossible. For example: Memorize the position of all the tiny holes in ceiling tiles. I have really thought about this and how I would go about memorizing this information! I didn't think of a way to do it because why would I ever need to do that haha But if I needed to and put the time in, I could find a way to memorize all the holes in the tiles. I am sharing this idea with you because if there is impossibles information you can't memorize with memory techniques, this would mean memory techniques have some sort of limit. Even though something might be impossible, your skill of memory is going to get better and better by trying to use memory techniques to memorize it because you will think of new ways to use memory techniques you never thought of before. You skill with memory techniques would keep growing with this impossible information. I would love to hear your thoughts about any information you think is impossible to learn/memorize. If you want to learn more memory techniques, get your free memory program: https://learntoimprovememory.com/free-mini-memory-program Also check out my podcast if you rather listen than read: https://anchor.fm/johnny-briones
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986666467.20/warc/CC-MAIN-20191016063833-20191016091333-00499.warc.gz
CC-MAIN-2019-43
2,946
10
https://www.androidbozor.uz/en/app/detail?package=com.ketchapp.stack
code
Stack up the blocks as high as you can! ◉ Simple & Beautiful graphics designed ◉ Compete for the best score in the world |Updated Feb 7, 2019||Size 43 Mb||Downloaded 100 - 500| |Current version 3.0||Required Android Version 15 or later||Permissions More…|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527518.38/warc/CC-MAIN-20190419081303-20190419103303-00254.warc.gz
CC-MAIN-2019-18
261
5
https://writing.meta.stackexchange.com/questions/260/should-these-two-questions-be-merged
code
Justkt merged the question When should I use passive voice? with the question When should I avoid passive voice? I don't believe these questions should've been merged. The first question asked how to avoid passive voice. The second asked when is it acceptable to use passive voice. The first question was asked and answered back in November. The question already has an accepted answer to the original question. It doesn't seem right to edit the question months after it was answered to add a new, separate question to it. Both of these questions should be separate since they're asking two different things, IMO. Modified 12 years ago Viewed 61 times Thank you! I posed the "When should I" question and was surprised at it being merged. I couldn't figure out how to comment on it.– Lynn BeighleyMar 30, 2011 at 16:59 Add a comment | Ok, I unmerged them and re-opened the question. Let's have a do-over on this one.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949642.35/warc/CC-MAIN-20230331113819-20230331143819-00590.warc.gz
CC-MAIN-2023-14
917
7
https://community.onsen.io/topic/526/usage-with-react-router
code
Notice: The Monaca & Onsen UI Community Forum is shutting down. For Onsen UI bug reports, feature requests and questions, please use the Onsen UI GitHub issues page. For help with Monaca, please contact Monaca Support Team. Thank you to all our community for your contributions to the forum. We look forward to hearing from you in the new communication channels. Usage with React Router romulof last edited by I’m making a React based mobile webapp and have just discovered Onsen UI. So far I’m amazed, and my only concerns are about its integration with React. For what I’ve read, the Navigatorcomponent manages routing, but my app already have react-routerfor this task. Is it possible for them to be “friends”? An example would be much appreciated. argelius last edited by @romulof Thanks for trying it out! :+1: I’ve already answered in the issue but I will paste the answer here as well: I was trying to integrate the Navigator component with react-router but the code was very hacky. Maybe I will make another attempt and see if it’s possible to create a wrapper component that you can use together with react-router. In the end we will probably create a new component with an API that better integrates with things like react-router and Redux. Right now the component has methods like pushPage() and popPage() that makes things hard. A better option would be to make it possible to navigate using props. So basically it’s possible to integrate it but the current API makes it a bit cumbersome.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00089.warc.gz
CC-MAIN-2023-23
1,516
17
https://jobs.lever.co/datalogue/8fef4581-838f-4ab2-a1a7-9894119f7ade
code
Datalogue is looking for a QA Engineer to help us change the way businesses use data to drive decisions. We're a software startup backed by top-tier investors with offices in NYC and Montreal. We work with state-of-the-art machine learning to tackle some of the biggest challenges in data and analytics. We’re a friendly and hard-working bunch, we love our users, we love what we do, and we really enjoy doing it together. We’re in the midst of dramatic growth, with our product running in production in Fortune 500 companies across a variety of industries. We’re building out our core QA team for the first time, and we’d love for you to be part of it! What You'll Do - You’ll serve as the last line of defense against bugs being released in our software. You’ll manually test the platform during the release process to minimize the amount of defects, ensuring that our customers continue to use the best possible product we can release. - You’ll collaborate with the VP of Eng and greater Eng team to improve our quality assurance processes and automations. - You’ll help create, monitor, and report QA and performance metrics, establishing benchmarks that we can use for customer-facing solutions and tracking metrics progress over time. - You’ll work closely with Product to report bugs and follow up on bug resolution prioritization. What You'll Bring - Previous experience as a QA Engineer, Quality Engineer, or Testing Engineer. - Familiarity with QA best practices and writing automated QA tests. - You’ll be able to use statistics to create accurate test suites. - You are very curious and love learning new things. - You are highly attentive and have extraordinary organizational and follow-through skills. - You are biased towards action—you're perceptive and alert, and when there's a fire you don't hesitate to face it! What You Should Expect From Us - A dynamic, constantly-evolving work environment with hard, interesting problems to work on every day. - A supportive team that celebrates diversity and inclusion - we want to be a workplace where a diverse set of talented people come together to do their best work and grow together! - Deep exposure to cutting-edge machine learning and data science. - A fast growing organization, with tremendous opportunity for career advancement. - Broad investment in your personal growth and career goals - we believe in helping our team members grow however we can, from personal coaching and mentorship, to providing a Datalogue book library, to budgets for conferences and events, and more. - Do you love great food? Cooking it and/or eating it? That’s a big part of our company culture, and we have frequent team dinners with delicious home-cooked meals. We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573053.13/warc/CC-MAIN-20190917061226-20190917083226-00181.warc.gz
CC-MAIN-2019-39
2,976
23
https://learn.microsoft.com/en-us/dotnet/desktop/winforms/controls/layout?view=netdesktop-7.0
code
Position and layout of controls (Windows Forms .NET) Control placement in Windows Forms is determined not only by the control, but also by the parent of the control. This article describes the different settings provided by controls and the different types of parent containers that affect layout. The Desktop Guide documentation for .NET 7 and .NET 6 is under construction. Fixed position and size The position a control appears on a parent is determined by the value of the Location property relative to the top-left of the parent surface. The top-left position coordinate in the parent is (x0,y0). The size of the control is determined by the Size property and represents the width and height of the control. When a control is added to a parent that enforces automatic placement, the position and size of the control is changed. In this case, the position and size of the control may not be manually adjusted, depending on the type of parent. The MaximumSize and MinimumSize properties help set the minimum and maximum space a control can use. Margin and Padding There are two control properties that help with precise placement of controls: Margin and Padding. The Margin property defines the space around the control that keeps other controls a specified distance from the control's borders. The Padding property defines the space in the interior of a control that keeps the control's content (for example, the value of its Text property) a specified distance from the control's borders. The following figure shows the Margin and Padding properties on a control. The Visual Studio Designer will respect these properties when you're positioning and resizing controls. Snaplines appear as guides to help you remain outside the specified margin of a control. For example, Visual Studio displays the snapline when you drag a control next to another control: Automatic placement and size Controls can be automatically placed within their parent. Some parent containers force placement while others respect control settings that guide placement. There are two properties on a control that help automatic placement and size within a parent: Dock and Anchor. Drawing order can affect automatic placement. The order in which a control is drawn determined by the control's index in the parent's Controls collection. This index is known as the Z-order. Each control is drawn in the reverse order they appear in the collection. Meaning, the collection is a first-in-last-drawn and last-in-first-drawn collection. The MinimumSize and MaximumSize properties help set the minimum and maximum space a control can use. Dock property sets which border of the control is aligned to the corresponding side of the parent, and how the control is resized within the parent. When a control is docked, the container determines the space it should occupy and resizes and places the control. The width and height of the control are still respected based on the docking style. For example, if the control is docked to the top, the Height of the control is respected but the Width is automatically adjusted. If a control is docked to the left, the Width of the control is respected but the Height is automatically adjusted. The Location of the control can't be manually set as docking a control automatically controls its position. The Z-order of the control does affect docking. As docked controls are laid out, they use what space is available to them. For example, if a control is drawn first and docked to the top, it will take up the entire width of the container. If a next control is docked to the left, it has less vertical space available to it. If the control's Z-order is reversed, the control that is docked to the left now has more initial space available. The control uses the entire height of the container. The control that is docked to the top has less horizontal space available to it. As the container grows and shrinks, the controls docked to the container are repositioned and resized to maintain their applicable positions and sizes. If multiple controls are docked to the same side of the container, they're stacked according to their Z-order. Anchoring a control allows you to tie the control to one or more sides of the parent container. As the container changes in size, any child control will maintain its distance to the anchored side. A control can be anchored to one or more sides, without restriction. The anchor is set with the Anchor property. The AutoSize property enables a control to change its size, if necessary, to fit the size specified by the PreferredSize property. You adjust the sizing behavior for specific controls by setting the Only some controls support the AutoSize property. In addition, some controls that support the AutoSize property also supports the |Always true behavior||Description| |Automatic sizing is a run-time feature.||This means it never grows or shrinks a control and then has no further effect.| |If a control changes size, the value of its Location property always remains constant.||When a control's contents cause it to grow, the control grows toward the right and downward. Controls do not grow to the left.| |The Dock and Anchor properties are honored when AutoSize is ||The value of the control's Location property is adjusted to the correct value. The Label control is the exception to this rule. When you set the value of a docked Label control's AutoSize property to |A control's MaximumSize and MinimumSize properties are always honored, regardless of the value of its AutoSize property.||The MaximumSize and MinimumSize properties are not affected by the AutoSize property.| |There is no minimum size set by default.||This means that if a control is set to shrink under AutoSize and it has no contents, the value of its Size property is |If a control does not implement the GetPreferredSize method, the GetPreferredSize method returns last value assigned to the Size property.||This means that setting AutoSize to |A control in a TableLayoutPanel cell always shrinks to fit in the cell until its MinimumSize is reached.||This size is enforced as a maximum size. This is not the case when the cell is part of an AutoSize row or column.| The AutoSizeMode property provides more fine-grained control over the default AutoSize behavior. The AutoSizeMode property specifies how a control sizes itself to its content. The content, for example, could be the text for a Button control or the child controls for a container. The following list shows the AutoSizeMode values and its behavior. The control grows or shrinks to encompass its contents. The MinimumSize and MaximumSize values are honored, but the current value of the Size property is ignored. This is the same behavior as controls with the AutoSize property and no The control grows as much as necessary to encompass its contents, but it will not shrink smaller than the value specified by its Size property. This is the default value for Controls that support the AutoSize property The following table describes the level of auto sizing support by control: AutoSize in the design environment The following table describes the sizing behavior of a control at design time, based on the value of its AutoSize and Override the SelectionRules property to determine whether a given control is in a user-resizable state. In the following table, "can't resize" means Moveable only, "can resize" means AllSizeable and Moveable. ||Property not available.||The user can't resize the control at design time, except for the following controls: ||GrowAndShrink||The user can't resize the control at design time.| ||GrowOnly||The user can resize the control at design time. When the Size property is set, the user can only increase the size of the control.| ||Not applicable.||User can resize the control at design time.| To maximize productivity, the Windows Forms Designer in Visual Studio shadows the AutoSize property for the Form class. At design time, the form behaves as though the AutoSize property is set to false, regardless of its actual setting. At runtime, no special accommodation is made, and the AutoSize property is applied as specified by the property setting. The Form is the main object of Windows Forms. A Windows Forms application will usually have a form displayed at all times. Forms contain controls and respect the Location and Size properties of the control for manual placement. Forms also respond to the Dock property for automatic placement. Most of the time a form will have grips on the edges that allow the user to resize the form. The Anchor property of a control will let the control grow and shrink as the form is resized. The Panel control is similar to a form in that it simply groups controls together. It supports the same manual and automatic placement styles that a form does. For more information, see the Container: Form section. A panel blends in seamlessly with the parent, and it does cut off any area of a control that falls out of bounds of the panel. If a control falls outside the bounds of the panel and AutoScroll is set to true, scroll bars appear and the user can scroll the panel. Unlike the group box control, a panel doesn't have a caption and border. The image above has a panel with the BorderStyle property set to demonstrate the bounds of the panel. Container: Group box The GroupBox control provides an identifiable grouping for other controls. Typically, you use a group box to subdivide a form by function. For example, you may have a form representing personal information and the fields related to an address would be grouped together. At design time, it's easy to move the group box around along with its contained controls. The group box supports the same manual and automatic placement styles that a form does. For more information, see the Container: Form section. A group box also cuts off any portion of a control that falls out of bounds of the panel. Unlike the panel control, a group box doesn't have the capability to scroll content and display scroll bars. Container: Flow Layout The FlowLayoutPanel control arranges its contents in a horizontal or vertical flow direction. You can wrap the control's contents from one row to the next, or from one column to the next. Alternately, you can clip instead of wrap its contents. You can specify the flow direction by setting the value of the FlowDirection property. The FlowLayoutPanel control correctly reverses its flow direction in Right-to-Left (RTL) layouts. You can also specify whether the FlowLayoutPanel control's contents are wrapped or clipped by setting the value of the WrapContents property. The FlowLayoutPanel control automatically sizes to its contents when you set the AutoSize property to true. It also provides a FlowBreak property to its child controls. Setting the value of the FlowBreak property to true causes the FlowLayoutPanel control to stop laying out controls in the current flow direction and wrap to the next row or column. The image above has two FlowLayoutPanel controls with the BorderStyle property set to demonstrate the bounds of the control. Container: Table layout The TableLayoutPanel control arranges its contents in a grid. Because the layout is done both at design time and run time, it can change dynamically as the application environment changes. This gives the controls in the panel the ability to resize proportionally, so they can respond to changes such as the parent control resizing or text length changing because of localization. Any Windows Forms control can be a child of the TableLayoutPanel control, including other instances of TableLayoutPanel. This allows you to construct sophisticated layouts that adapt to changes at run time. You can also control the direction of expansion (horizontal or vertical) after the TableLayoutPanel control is full of child controls. By default, the TableLayoutPanel control expands downward by adding rows. You can control the size and style of the rows and columns by using the RowStyles and ColumnStyles properties. You can set the properties of rows or columns individually. The TableLayoutPanel control adds the following properties to its child controls: The image above has a table with the CellBorderStyle property set to demonstrate the bounds of each cell. Container: Split container The Windows Forms SplitContainer control can be thought of as a composite control; it's two panels separated by a movable bar. When the mouse pointer is over the bar, the pointer changes shape to show that the bar is movable. With the SplitContainer control, you can create complex user interfaces; often, a selection in one panel determines what objects are shown in the other panel. This arrangement is effective for displaying and browsing information. Having two panels lets you aggregate information in areas, and the bar, or "splitter," makes it easy for users to resize the panels. The image above has a split container to create a left and right pane. The right pane contains a second split container with the Orientation set to Vertical. The BorderStyle property is set to demonstrate the bounds of each panel. Container: Tab control The TabControl displays multiple tabs, like dividers in a notebook or labels in a set of folders in a filing cabinet. The tabs can contain pictures and other controls. Use the tab control to produce the kind of multiple-page dialog box that appears many places in the Windows operating system, such as the Control Panel and Display Properties. Additionally, the TabControl can be used to create property pages, which are used to set a group of related properties. The most important property of the TabControl is TabPages, which contains the individual tabs. Each individual tab is a TabPage object. Submit and view feedback for
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00644.warc.gz
CC-MAIN-2023-14
13,775
95
http://stackoverflow.com/questions/18207500/garbage-collection-when-work-is-done-with-single-or-multiple-threads
code
I have a JDBC program which inserts around 50000 rows in a table. I have 2 version of this program. First one insert 50000 rows using one thread while 2nd version inserts 50000 rows using 5 threads (each thread inserting 10000 rows). Now when I do profiling for both the program I found that Garbage Collection is taking more CPU cycles when 5 threads are used (44256 for one thread Vs 401836 for 5 thread). Profiler also give me that number of objects created by each program are almost the same. I am wondering what is making GC to take more cycle in multi threaded program. The work done by both the program is same (inserting 50000 rows) and even the number of objects are also same.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645199297.56/warc/CC-MAIN-20150827031319-00107-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
687
3
https://www.freelancer.ph/job-search/openvpn-ipsec-config/
code
I have a Tensorflow Model that I want to configure on Google Cloud ML Need someone with actual experience installing models to Google ML Engine and configuring them to process jobs. Ideally, you know how to trigger a job based on a new file uploaded to Google Cloud Storage Auto bids will be deleted Googe Tag Manager Container Config. We're looking for someone experienced with using GTM to apply Facebook pixel code and conversion code as well as Adwords multiple conversion tracking and avoiding recording of all page views! VPN PROJECT 1. ANDROID APPLICATION 2. IOS APPLICATION This APP will be very similar to ExpressVPN. FEATURES - MULTI-PROTOCOL (IKEV2, OPENVPN, L2TP) - BUILT IN DNS - SMART CONNECTION TROUBLESHOOTING - SAVING USER SETTINGS - USER OPTIONS: --- KILL CONNECTION IF VPN DISCONNECTED (KILL SWITCH) --- ABILITY TO SELECT WIFI OR DATA --- ABILITY TO SELECT I am looking for an android vpn app that can connect to internet using openvpn with just one certificate and more servers with custom payload like http injector and/or kpn. I need someone to setup a OpenVPN or Algo VPN server for me on DigitalOcean. This VPN server is aimed to facilitate my family present in different countries connect with each other. The main goal is to bypass the regional restrictions such video calling bans, etc. I have tried to do it myself but some errors are unfortunately occurring. Please be reasonable We need Cisco routing, Cisco ASA firewall...(local vs. global), utilizing BGP communities to signal path to remote sites, route reflectors, hard and soft clearing of BGP, redistributing prefixes into BGP from OSPF. . IPsec VPN - ability to set up this particular VPN connection. can you explain how encryption domains relate to them. **Fortinet firewall I need network engineer to solve my problem. We developed vpn app ago, but now it happened some issue. We used OpenVPN servers on LinuxVPS, everything worked well. But I am not able to connect normally now into the server. Could you help me that? I have a Tensorflow Model that I want to configure on Google Cloud ML Need someone with actual experience installing models to Google ML Engine and configuring them to process jobs. Ideally, you know how to trigger a job based on a new file uploaded to Google Cloud Storage Please don't apply unless you have actually made this work and can demonstrate your experience Auto bids will be del... hello, we bought new BGP Edge router which uses XR ios , and current ios configuration not compatible. needs migration from IOS TO IOS XR. BIDDERS MUST HAVE CCNP certificate Develop a node.js azure function to read an azure table with following columns and provide output over https call. The key for table is email addre...Sample data: A, abc@[login to view URL], active, 200, ICE1309 The function should be called via http trigger http://............. row = 'abc@[login to view URL]' The response should be all the config values in the table. very good day I need to program an openvpn client in android, I have looked at several examples in git but I have not been able to make it work, I would like to be able to operate the code of this page [login to view URL] Stay tuned to your comments Hello, we need OpenVPN API in Xamarin C# which needs to support certificate-based authentication by using OpenVPN profiles. It needs to support all platforms which Xamarin officially supports. We need an OpenVPN API which does not use third-party applications like "[login to view URL]" or "[login to view URL]" in order to make this work. Please do only re... ...servers with details from a WHMCS order form 1. Create SSH account (chmoded so other users won't have access to homedir) 2. Create ruTorrent+rtorrent account 3. Create OpenVPN account 4. Create Webproxy account 5. Create FTP/FTPS account Control panel: 1. Installable apps such as Plex, Sickbeard, owncloud and more. 2. Monitor traffic 3. start/stop/suspend create API in my word press API and connect to my HasOffer Account and manage marceting campaigns [login to view URL] You need to do both the design & app coding. The app requires very basic design. We have already written the API's in PHP server sided, so all you need to do is to connect up to them. Requirements: - Login Form. - Simple, but attractive design. - Ability to publish the apps to App Store (App Store & Play Store). - Work for an alright price, so we can easily hire you to do updates in... ...used public ip addressing (11.x.x.x). i would like some to change the ip addresses on location 2 mikrotik. i would like someone also to change the cerfitificate in the openvpn i have setup between the 2 locaitons. i want everything to be working perfect. phone calls currently are having 1 way audio issues. and sometimes calls dropping after 30 need to update outgoing calls, currently set to use SIP, but we are cancelling SIP for International calling and use the ISDN for all calls. the PABX is setup to use ISDN for Local and Mobile calls only and since we are terminating the SIP trunk for International calling we need to have it routed via ISDN I'm looking for an experienced Linux sysadmin who has experience with Digital Ocean. It's about linking a domain and setting up e-mail addresses + email server. need a VPN ...all Active User with there Locations i have like 10 server when user login they can see all The server IP and click connect It will have to connect PPTP, L2TP, IKEv2, OpenVPN, SSTP in app user need a valid user to login if user pakage expire user will see the Renew notice Same like HMA and other VPN apps Now we create Android APPS ...data to MySQL tables (1 MySQL table per data table) - Log out of the site (very important because if the session is not logged out then we cannot log in from another browser) -Config file to set login credentials, MySql connection properties, Frequency, table links, etc - MySql create table SQL files for each table - If a PHP package is needed for data I have a program that connects to an sql database, but the ip/login is in the source code. I need it to read from a config file. ip, port, username,password I need my website re-configured it's megento e-commerce online store. email not working and need to change theme. suggest me any three template which is fit for my website. I'll purchase and send to you. then you can install it to my store. Hello We have a website which use Wordpress Nrgtheme and built using Visual composer (WPBakery). we would like to use WPML Translation editor to create multi langues for the website. We have bought the WMPL and when we try to translate to another language, it doesn't show all the fields in the editor to translate. We would like to higher someone to fix this. Thanks I want to be able to spin up two servers. #1 with MYSQL and can connect to our local server and phpmyadmin. This will scheduled hourly tasks to update AWS database and tables. Not accessible by anyone except from our MPS network and Server #2 AWS private IP. #2 Linux server (preferably Ubuntu), Web Server that all can access. Private connection from Server #2 AWS Private IP to Server #1 AWS Privat... ...provide more detailed instructions) 3) if there's no static ip address we'll need to set up some kind of dynamic dns 4) If there's a need for additional security we can set up an IPSEC tunnel between your router and ours. the server installed the Debian 9 I have router type is draytek Vigor2862 AC drytek [login to view URL] Single control panel. Softaculous HTTP: Apache2 and nginx SMTP: Postfix POP3/IMAP: Courier and Dovecot (1.2.x) FTP: PureFTPd DNS: BIND and MyDNS Database: MySQL Language - English IPv4 support Websites Name-based and IP-based virtual hosts SSL CGI Individual PHP settings per website Rewrites/redirects Subdomains Alias domains Password-protected folders (basic http authentication) FTP users MySQL ... migrate & setup my openvpn server server to our new server, the server use centos 7. We seem to be having some issues with setting up IPSec on Mikrotik RouterOS ...deadlines; Location: Ukraine / Russia TASK: Create VPN Client for MacOS. EXAMPLE: VyprVPN, StrongVPN. Additional info: VPN client should work in stack with stunnel + openvpn. We are creating a team for a project to build VPN Client for MacOs / Windows / iOS / Android. Candidate should be very professional and high motivated. Full-time job with ...vyprvpn) from inside a docker container running Ubuntu, and GUI. At the moment i can connect using: "openvpn --config [login to view URL]" But when I try to connect from the second container, the first connection is lost. I need some help with the openvpn settings. The job will be really fast for someone that understands Linux networking and docker. We will ...and/or Guest might be running Ubuntu 16.04 or Ubuntu 18.04. I need the config files for the traditional systemd-networkd configuration as well as the config files for the new Netplan/networkd configuration. You must understand the difference between bridged and routed setups. The config must be a routed setup since the ISP does not allow undefined MAC addresses Good day, Looking for a freelancer that could upgrade all windows and linux clustered servers. 6 exchange servers, 2 Active directory, 2 pfScense with carp and OpenVPN Necessary to do it as fast as possible and without downtime. Downtime is not tolerated in any circumstances. Bid only professionals please! Looking for someone who experienced work with bitexchange script. I need someone just to configurate BTC deposit/withdrawal side. It seems to not credit deposits on website. Generates wallets properly. Possible problem with withdrawals aswell since I cannot check it. !!!!!!!JOB easy migration from cpanel to cpanel !!!!!!! migration 25 ...website cpanel whm via to cpanelwhm and the fixed problem chek dns1 / dns2 , hostename and ip install and ConfigServer Security & Firewall (csf) install and config letsencrypt install ionCube install Installing FFmpeg change the listening port of the sshd server. I have a server logged in at OVH i ave openvpn installed and was working. Now it stopped a while eago. I used Pritunl to acesse users and criate new [login to view URL] i need is to re establish working condition of it [Removed by Freelancer.com Admin for offsiting - please see Section 13 of our Terms and Conditions] ...achieve: 1. Running 1 application on Windows server 2012 r2 in datacenter which needs to connect to a client server via VPN and to back office of our via another VPN (both IPSEC IKEv2 w/ different PSK). 2. Application has to run on Regular user account 3. From our back office will be connecting via sock to the application to give instructions and run
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743247.22/warc/CC-MAIN-20181116235534-20181117021534-00307.warc.gz
CC-MAIN-2018-47
10,678
36
http://center4edupunx.org/events/global-education-conference
code
Global Education Conference Global Education Conference http://www.globaleducationconference.com/ is being held online November 15 – 19. This five-day free online conference will have participation from all over the world in multiple languages and in multiple time zones. Over 300 general sessions and 50 keynotes will be held in multiple time zones focusing on teachers, students, curriulum, policy and leadership and global issues. The conference is a collaborative and world-wide community effort to significantly increase opportunities for globally-connecting education activities and initiatives. http://www.globaleducationconference.com/all-sessions.html The dates of the conference coincide with International Education Week, a joint initiative of the U.S. Department of Education and the U.S. Department of State. There is no formal registration required for the conference, as all the sessions will be open and public, broadcast live using the Elluminate platform, and available in recorded formats afterward.The hashtag for the conference (for those who “tweet” and blog”) is #globaled10. So all you need to attend is a headset and you should make sure your computer is configured correctly to participate. http://www.globaleducationconference.com/how-to-attend.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190183.80/warc/CC-MAIN-20170322212950-00016-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,284
6
https://groups.yahoo.com/neo/groups/ineb/conversations/messages/203
code
203[buddhismML] April update - Mar 31, 2001the April update to the Buddhist bibliography is now online at : and i have also updated my list of links to Buddhist websites at : good reading and good surf ! other informations on Buddhism available at : subscribe/unsubscribe to our mailing lists at : - << Previous post in topic
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820466.2/warc/CC-MAIN-20171016214209-20171016234209-00416.warc.gz
CC-MAIN-2017-43
325
7
http://www.php-forum.com/phpforum/viewtopic.php?p=4399972
code
hello my friends i want to write a script with php that it find subdomain s of a domain. when i give a domain name as a parameter, it get domain and serarch to find subdomains of it. (i don't know. maybe connect to online subdomain finder or use a wordlist to find subdomain or use google or... .) how can i write this script?
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678409.42/warc/CC-MAIN-20151001215758-00007-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
326
5
https://shoutbox.menthix.net/showthread.php?tid=84052&pid=911550
code
It is calling http://software.msgpluslive.net/getip.php , which is normally replying with the IP of the caller (<?php echo $_SERVER['REMOTE_ADDR']; ?>). As the DNS servers of msgpluslive.net are still down, that will fail and result in a timeout. The server of msgpluslive.net is running, but it is not serving the correct website. You can test this by not using the DNS server, but adding this line to your C:\WINDOWS\system32\drivers\etc\hosts: Then call the URL in your browser and you will get a website with title "Messenger Plus! has moved" and a meta refresh to patchou.com.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664469.42/warc/CC-MAIN-20191112001515-20191112025515-00391.warc.gz
CC-MAIN-2019-47
581
4
https://www.juniper.net/documentation/en_US/junos-space21.1/platform/topics/concept/junos-space-administrators-overview.html
code
Junos Space Administrators Overview Junos Space administrators serve different functional roles. A CLI administrator installs and configures Junos Space Appliances. A maintenance-mode administrator performs system-level tasks, such as troubleshooting and database restore operations. After Junos Space Appliances are installed and configured, users created from the Junos Space user interface perform the roles of accessing workspaces and managing applications, users, devices, services, customers, and so forth. Typically, an administrator performs most of the tasks from the Administration workspace. This entire workspace is available only if you are working in the global domain. You can identify the domain that you are currently in from the banner on the Junos Space Network Management Platform user interface. In subdomains, only the tags task is available under the Administration workspace. Table 1 describes Junos Space administrators and Junos Space user UI users and the tasks that they perform. Table 1: Junos Space Administrators and Junos Space UI Users |Junos Space Administrator||Description||Tasks| An administrator responsible for setting up and managing the system settings for Junos Space Appliances from the serial console. The CLI administrator name is “admin.” The CLI administrator password can be changed from the console system settings menu. An administrator responsible for performing system-level maintenance on Junos Space Platform. The maintenance-mode administrator name is “maintenance.” You can configure the maintenance-mode password is through the serial console when you first configure a Junos Space Appliance. Junos Space user interface users A Junos Space user that is assigned one or more predefined roles. Each role assigned to a user provides specific access and management privileges on the objects (applications, devices, users, jobs, services, customers, and so on) available from a workspace on the Junos Space user interface. For complete information about predefined roles that can be assigned to a Junos Space user, see Predefined Roles Overview. Junos Space allows only admin user login for Space server CLI access. Its not recommended to create custom SSH user for Junos Space CLI access. Juniper Networks devices require a license to activate the feature. To understand more about Junos Space Network Management Platform Licenses, see, Licenses for Network Management. Please refer to the Licensing Guide for general information about License Management. Please refer to the product Data Sheets for further details, or contact your Juniper Account Team or Juniper Partner.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00393.warc.gz
CC-MAIN-2023-14
2,634
16
http://ccl.northwestern.edu/netlogo/models/community/accurate_clock
code
Beginners Interactive NetLogo Dictionary (BIND) Farsi / Persian NetLogo User Community Models WHAT IS IT? This is a simple netlogo model to simulate a clock. HOW IT WORKS Rotates “hand” shapes around the origin according using the timer primitive. HOW TO USE IT Set the time and then start the clock when the current time is euqal to the time set. THINGS TO NOTICE This model relies heavily on the use of the mod function operated on the inherent “who” identifier of the turtles and the way they are created. Each minute (0-59) is associated with a turtle with the same “who” identifier. No turtle changes their ‘x’ or ‘y’ coordinate, the turtles with a hand shape simply change heading. The turtle also uses the timer feature instead of the who feature to be more accurate in timing. THINGS TO TRY Try and tie the time to the actual time using: get-date-and-time EXTENDING THE MODEL Find new ways to represent the passage of time that is appealing to users or more informative. Create a stopwatch Find a way to user seconds that does not require a constant while loop checking mechanism. This might slow down other functions on your computer. Uses turtles for all parts of the clock, both hands and minutes. Uses the timer command as a timing mechanism. Uses the shapes editor to make the hands of the clock CREDITS AND REFERENCES Thank you to the Netlogo summer workshop at Northwestern – particularly Seth Tisue and Josh Unterman. Model constructed by Erik Johnston School of Information (back to the NetLogo User Community Models)
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00552.warc.gz
CC-MAIN-2024-10
1,556
26
https://www.stechies.com/pytest-fixtures-example/
code
How to perform Pytest Fixtures- Python Unit Testing? Please follow the steps below: 1.First take a look at the sample database class. It has the database object, connection and the cursor. 2.The cursor will return the database queries. 3.Next we will create two unit tests. - To verify Ram's employee id - To verify Tim's employee id 4.Create a function to test Ram's id. You have to create a server. Once the server is created, you have to then create a cursor object. 5.Next, add a cur.execute and paste the query. 6.Next copy the code and paste it below to create a function for Tim's id. 7.Next run the test using pytest –v command. 8.There are following issues with this code. - Code repetition - And creating expensive DB connection in every test case 9.You can, however, resolve these issues using the following concepts. - Setup and Teardown methods - Fixtures (recommended method) The tear down concept will initialize everything you need right at the beginning. 10.You need to create a connection and a cursor object global. 11.Next setup a module method. Next, initialize the connection and the cursor. 12.Get rid of the lines highlighted in blue as they are not needed. 13.Next, create a ‘teardown’ module. To clean up after initialization, add two close lines. 14.All the things that the test modules need are being initialized in the setup module. After the process is complete, the teardown module will close the connection and the cursor. 15.Now run the program. 16.Now the issue of repeating same lines of code has been solved. Now we look at Pytest fixtures. First, import the ‘pytest’ module and add a ‘pytest’ fixture. 17.Next define a cursor. 18.Now run the program to view the output. Fixtures leverage concept of dependency injection method is better as global variables are not needed. 19.Now add a print function to see the program is performing as expected. 20.Run the program to view the output. Use the code pytest -v –capture=no. 21.To restrict the repetitive code you have to create a scope. 22.Next run the program to view the output. You will notice that the setting up only happens once. 23.Next, initialize ‘teardown’. 24.Next, run the program and view the output.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00093.warc.gz
CC-MAIN-2024-18
2,218
33
https://rekn.org/node/1280
code
"The goal of the Digital Humanities series will be to provide a forum for ground-breaking and benchmark work in digital humanities. This rapidly growing field lies at the intersections of computers and the disciplines of arts and humanities, library and information science, media and communications studies, and cultural studies. The purpose of the series is to feature rigorous research that advances understanding of the nature and implications of the changing relationship between humanities and digital technologies". Currently, the series feature six publications that address digital theory, digital practices, and teaching in the digital age. Series editors: Julie Thompson Klein, Wayne State University; Tara MacPherson, University of Southern California; Paul Conway, University of Michigan
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864191.74/warc/CC-MAIN-20180621153153-20180621173153-00403.warc.gz
CC-MAIN-2018-26
800
2
http://www.xobdo.org/article/copyleft
code
"A dictionary by you, for you, of you" - keeping in line with this spirit, from the 6th Anniversary, that is 10-March-2012, XOBDO.ORG has become a "copyleft" website and has started to share the main database with anybody who wish to obtain a copy of it. As of Nov-2013, we have shared our database with the following organizations/individuals: |1||Navanath Saharia||March-2012||Development of XOBDO Offline Version| |March-2012||Assamese Mathematical Glossary| |3||Dr. Priyankoo Sarma||June-2012||Comparative Analysis of a few Languages of Assam| |4||Nhut Khang Lam, PhD student of University of Colorado at Colorado Springs. (Adviser: Dr. Jugal Kalita)||July-2012||Creation of a reversed dictionary. Paper accepted in NAACL-HLT 2013| |5||Dr. Shakuntala Mahanta||May-2013||Creation of a database of Assamese of about one million phonetically transcribed Assamese words.| |6||Ms. Ranju Devi, Brahmaputra Innovative Solutions Pvt. Ltd.||Jun-2013||Development of an English-Assamese mobile application.| |7||Mr. Rajesh Patil, Technical Team, KHANDBAHALE.COM||Sept-2013||Development of a free multilingual dictionary.| |Oct-2013||Development of an English-Assamese dictionary app for Android, Windows Phone and iOS. You may download the app from here .| |Nov-2013||Development of a dictionary software for Hmar, Karbi and English| MoFirst Solutions Pvt.Ltd., Mumbai |Sept-2015||In Firstouch, now we are working on Assamese localization; we are making a regional operating system in Assamese and developing a keyboard for Assamese. Also working on Assamese machine translation, transliteration and other projects. We need Assamese word corpus to bring word prediction in the keyboard (only monolingual). We like to have your Xobdo collection of Assamese words in Unicode. We hope, we can use this on phone with commercial purpose.| If you are interested to obtain a copy of the latest database, you may contact us directly at firstname.lastname@example.org with the following details: 1) Your Name 2) Your Email 3) Your Contact Phone Number 4) Do you represent any organization? 5) Your Mailing Address 6) Required data format (available in Text, XML & SQLLITE) 7) Scope of data required (Assamese word list, English word list, Meanings, Grammar Classification, etc) 8) How would you like to use the database? Please provide some details of your proposed/on-going project where the data will be used and how. Liberated from the clutches of COPYRIGHTS. (May be the first and the only 'copyleft' website from the North-East India)
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704824728.92/warc/CC-MAIN-20210127121330-20210127151330-00192.warc.gz
CC-MAIN-2021-04
2,524
24
https://smea.eu/cookie-policy/?lang=en
code
With this document we wish to inform you that access to this site may involve sending so-called “cookies” to your access device (computer, tablet, smartphone or any other type of technology that can be used for online browsing). WHAT ARE COOKIES ? Cookies are lines of text sent by a server usually to an Internet browser used by the user for browsing. These lines of text are stored in the browser itself as specific information regarding the user who is browsing. Cookies, usually present in users’ browsers in very large numbers and sometimes with a long time duration, are used for different purposes such as performing computer authentication, monitoring sessions, storing information on specific configurations regarding users accessing the server, etc. By default, almost all browsers automatically accept cookies; if the browser you use was set differently, for the purpose of a complete use of this, we recommend configuring it so that it accepts the reception of cookies. While browsing this site, the user can also receive cookies on their terminal that are sent from different sites or web servers (by definition, “third parties”), on which some elements may reside (for example, images, maps, sounds, specific links to pages from other domains) not located on the sommaruga-matrone.it server. Cookies can be divided into technical cookies, profiling cookies, third-party cookies. This site uses only technical cookies and third-party cookies; instead it does not use profiling cookies. In order to improve the services offered, this site uses Google Analytics technologies with the aim of obtaining a statistical evaluation on the use of the same. The cookies that derive from Google Analytics are called “technical cookies”. Information can be collected, albeit anonymously, including the time of access, the type / version of the browser used, the operating system, the addressing URL, the number of clicks made on a page while browsing. None of this data can be directly attributed to a specific user. The data generated by Google Analytics are stored by Google as indicated in the Information available at the following link: A user can prevent Google from detecting the data obtained from cookies and relating to their use of the site by downloading and installing the browser plug-ins available by selecting the following link https://tools.google.com/dlpage/gaoptout?hl=it. Further information is available on the privacy information page of the company Google Inc., independent owner of the processing of data relating to the Google Analytics service: https://www.google.com/analytics/learn/privacy.html?hl=it. This site does not track the origin of the visitor’s IP address thanks to the Google Analytics Anonymize IP function. The anonymization of the IP address takes place if this is technically possible in the passage upstream of the network where the data is collected. The IP anonymization function in Google Analytics sets the last octet of IPv4 user IP addresses and the last 80 bits of the IPv6 addresses to zero in memory immediately after being sent to the Google Analytics collection network. In this case, the complete IP address is never written to disk. Google Search Console This site uses Google Search Console, a web analysis service provided by Google Inc. (“Google”). The information generated by the Google Search Console cookies on the use of the site by the user (analysis of searches, broken links, indexing, crawling errors and more) is anonymous and is used exclusively for the optimization of the site. THIRD PARTY COOKIES This site uses plug-ins for sharing content on social networks. In this regard, the reference privacy policies are those of each individual social network: - Facebook information: https://www.facebook.com/help/cookies/ - Facebook (configuration): access your account. Privacy section - Twitter information: https://support.twitter.com/articles/20170514 - Twitter configuration: https://twitter.com/ settings/security - Linkedin information: https://www.linkedin.com/legal/cookie-policy - Linkedin (configuration): https://www.linkedin.com/settings/ - Google+ information: http://www.google.it/intl/it/policies/technologies/cookies/ - Google+ (configuration): http://www.google.it/intl/it/policies/technologies/managing/ - Youtube information: https://support.google.com/youtube/answer/7671399?p=privacy_guidelines&hl=it&visit_id=1-636628433959891591-1139367181&rd=1 - Instagram information: https://instagram.com/legal/cookies/ - Instagram (configuration): https://help.instagram.com/155833707900388/ - Pinterest information: https://about.pinterest.com/it/privacy-policy - Pinterest (configuration): https://pinterest.com/settings/ DURATION OF COOKIES Until they expire, cookies from the sommaruga-matrone.it domain remain stored on the hard disk of the personal computer or in the device data – smartphone or tablet – used by the user / visitor for navigation: the persistence of cookies is set only for the purpose of more practical access to the services that require authentication, so that the user / visitor is prevented from re-entering the authentication data and credentials each time he accesses the services. Persistent cookies are also used for statistical purposes relating to the use of the site such as, for example, the number of pages visited within the site itself. Disabling or deleting cookies may preclude optimal use of the Site or some of its areas, and will compromise the use of the services available under authentication. The user is allowed to block only third-party cookies and accept only those from the domain of the site they are visiting: almost all browsers allow this type of setting. HOW TO CANCEL COOKIES? It is specified that: - The setting of whether or not cookies are accepted by the browser can be changed at any time; - It is possible for the user / visitor to cancel the cookies collected in the browser up to that moment at any time; - The user / visitor has the right to set a term of duration for the cookies that the browser collects during its use, as well as to periodically and automatically initiate the cancellation of browsing data; - The user / visitor can configure his / her navigation browser so that it generates an alert requesting, from time to time, whether or not you want to accept cookies or an alert that, always from time to time, notifies the saving . Here are the ways to disable cookies for the main navigation browsers: - Internet Explorer: http://windows.microsoft.com/en-us/windows-vista/block-or-allow-cookies - Google Chrome:https://support.google.com/accounts/answer/61416?hl=it - Mozilla Firefox: https://support.mozilla.org/it/kb/Attivare%20e%20disattivare%20i%20cookie - Apple Safari: http://www.apple.com/legal/privacy/it/ - Opera: http://www.opera.com/help/tutorials/security/cookies/ - Microsoft Edge: http://windows.microsoft.com/it-it/windows-10/edge-privacy-faq As for other browsers not listed here, refer to the respective guides for deactivating and deleting cookies.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474377.60/warc/CC-MAIN-20240223085439-20240223115439-00088.warc.gz
CC-MAIN-2024-10
7,053
48
https://mono.github.io/mail-archives/gtk-sharp-list/2008-August/008923.html
code
[Gtk-sharp-list] [gtk-sharp-list] Setting the parent Gtk.Window of a FileChooserDialog inside a Gtk.Bin Andoni Morales Alastruey ylatuya at gmail.com Fri Aug 22 09:38:10 EDT 2008 I'm facing the following problem: I have a class TestDialog wich extends Gtk.Dialog. This class contains another class ReusableWidget wich extends Gtk.bin. The ReusableWidget contains a button that launch a FileChooserDialog: FileChooserDialog fChooser = new FileChooserDialog ( "", null, FileChooserAction.Open ,"gtk-cancel", ResponseType.Cancel, As ReusableBin extends Gtk.Bin I cannot set the the parent window of the file chooser dialog FileChooserDialog fChooser = new FileChooserDialog ( "", this,... So, when the file chooser is launched, if I click on TestDialog, it takes the focus and goes over the file chooser dialog (but it doesn't do anything else as ReusableBin is modal). How do I set-up the parent window of the file chooser if it's called inside a Gtk.Bin class? Regards, Andoni Morales More information about the Gtk-sharp-list
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501407.6/warc/CC-MAIN-20230209045525-20230209075525-00676.warc.gz
CC-MAIN-2023-06
1,025
19
https://www.reddit.com/r/place/?rdt=60197
code
Click into the canvas at the top! If you can't see it: Be creative and have fun. It's fine to engage in heated discussions but please refrain from flinging personal insults, trolling other users, or harassing people. Comment, post, and add tiles to add to a community experience, not to subtract from it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00611.warc.gz
CC-MAIN-2023-40
304
5
https://www.drupal.org/node/2201325
code
How can i do delete my account on this site please ? I don't know if it's possible, but if it is, you'll need to request it in the Webmaster's issue queue. Jaypan is an Acquia certified Developer, Back End Specialist, and Front End Specialist OK, I found that it's possible from drupal properties. Just log in as admin, go to People -> Permission and enable permission "Cancel own user account" for authenticated users. The user wasn't asking how to do it with drupal, but rather how to do it for drupal.org. you're starting to look like you're preparing to try and link bomb the site-- don't waste your time. your account will be blocked immediately and your links no followed anyway. Don't be a Help Vampire - read and abide the forum guidelines. If you find my assistance useful, please pay it forward to your fellow drupalers. Drupal is a registered trademark of Dries Buytaert.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207926828.58/warc/CC-MAIN-20150521113206-00261-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
882
9
https://engsci.utoronto.ca/experience/overseas/morgan-hooper-engsci-1t5/
code
No longer the stuff of lucid dreams, this summer I was given the opportunity to help turn human flight into a reality. The Institute for Dynamic Systems and Control at ETH Zurich has recently reopened a project on Wingsuit Flight, and this summer, I was able to immerse myself in the possibilities it represents. The focus of the lab, as the name suggests, is to model dynamic systems, and to develop the control algorithms necessary to work with them. This process begins with understanding the complex dynamics of such a system: this was the focus of my research this summer. I was part of a group responsible for implementing a wireless sensor net to monitor several parameters of a real wingsuit flight, namely the airspeed, groundspeed, and the orientation of several key body segments in space. Using this data, it is possible to reconstruct a basic model of the body during flight, and to observe the effects of altering these body segments on flight parameters. Using this model, it should then be possible to implement a control system to render a powered flight possible, and safe. This goal is however far reaching: the current focus of the project is to collect data to build the flight model. To achieve this, my group and I found an orientation sensor, ETHOS, that is able to communicate wirelessly. I worked with the existing firmware on these modules, to integrate an airspeed sensor to the onboard microcontroller. This allows synchronous collection of airspeed data. Another member of the group, Tony Zhang (EngSci 1T2+PEY) worked to remove some existing bugs with the wireless communication, and to integrate a GPS Doppler-effect velocity module to the sensor net. Samuel Zhao (EngSci 1T0), worked to develop the filter algorithms that we intend to use while we work with the data. Another aspect of the project that I worked with was the data collection and parsing: to save space, onboard data is stored in a raw format, so I developed an automated parsing method to interpret it into integer format, and into a MATLAB array. During the project and the summer, I had the chance to collaborate with many talented individuals. I greatly enjoyed working with Sam and Tony, both recent EngSci graduates, as well as the other members of IDSC. Based in Switzerland, the lab attracts many Swiss and German students, as well as those from all over the world. I loved to learn from so many different perspectives: everyone there is talented and passionate. I found the lab to be very supportive of students’ interests, and this means that it is full of people who truly enjoy what they are doing. This environment is what really made my summer special: it was exciting to learn in a place so full of such inspiring individuals. Overall, I found the experience to be intellectually stimulating, as well as stimulating from a social and cultural viewpoint. The research that I conducted suited my interests perfectly, and I loved being part of a project that is truly on a frontier: we are working to find answers that nobody knows, and to me, that is very exciting. I also greatly enjoyed the social aspect of the lab – the people working in it, and the atmosphere that is created by a group who truly loves what they do. Of course, Zurich and surrounding Switzerland is stunning, and I was able to make ample use of my time there to explore the neighboring countries as well. Having the opportunity to immerse myself in so many unique cultures was fantastic. The experience was simply unforgettable.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505366.8/warc/CC-MAIN-20200401034127-20200401064127-00092.warc.gz
CC-MAIN-2020-16
3,515
5
http://technozed.com/how-to-troubleshoot-logs-in-google-chrome-crashes/
code
Some times happens to see many times same error in Google Chrome Browser. “Whoa! Google Chrome has crashed” message, there is likely a problem on your system. Usually this type of crashes can be fixed. To see the log of crashes type in address bar following: The problem usually can happen because of a software conflict, like Shockwave Flash Player crashes in Google Chrome, or some software on you computer can make Google Chrome to crash. To see if there are some conflicts for Google Chrome, also in address bar type: If you found a conflicting software, first thing is to try to update it to the latest version, if it doesn’t work uninstall it. Scan for Malware Malware can also be a problem, especially when Google Chrome uses different extensions, which also can be installed by malware and change configurations, so search for malware, we have a topic related to this, link here: Scan for Malware. Hope this will help you a little to find the solution!
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815843.84/warc/CC-MAIN-20180224152306-20180224172306-00286.warc.gz
CC-MAIN-2018-09
966
8
https://codereview.stackexchange.com/users/63364/tyler-james-harden
code
Tyler James Harden I am a long-time enthusiast programmer and software engineer/designer/architect currently working on private sector and government contract projects at Vertical Knowledge, LLC. Previously, I worked for RELx/Reed Elsevier Group as a Java/Scala data integration engineer in the Spark/Hadoop space during my time at NVISIA, LLC in Chicago. I began my journey at age 11 with VB6 and VB.NET. My interests and past projects span things such as game development (high-level scripting down to writing my own OpenGL/DirectX rendering engine, and contributing to the Leadwerks Game Engine, CryEngine, and UDK), general utility framework development and personal/enterprise software applications design/development, web design and UI/UX specialization, music product & sound design, electrical engineering (prototyping gadgets, but mostly reverse engineering circuits and breaking things that use electricity), building computers for all types of specialized purposes, trying to understand global economics (my college major), starting a new business every few years trying to be the next Warren Buffet, Bill Gates, or Mark Cuban. My newest interest and passion is big data and the analytics behind it. My day job involves building the world's largest analytics-friendly product database for web and mobile applications, B2C & B2B business applications, and social networking. Hoping to make the world a better place. I've came to Stackoverflow for years now, feeding off answered questions to improve my own code or solve issues I was too lazy to ask questions about, but as of 2015 that has ended, and I now frequent here to give back more than I have taken, whiel continuing to broaden my knowledge and find answers to pesky programming conundrums that are mainly due lack of reading documentation, following zen principles, or coding while asleep.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153729.44/warc/CC-MAIN-20210728123318-20210728153318-00098.warc.gz
CC-MAIN-2021-31
1,859
5
https://blog.gaiterjones.com/send-php-mail-ubuntu-upgrade/
code
I recently made a list of problems experienced after upgrading from Ubuntu 12.04 LTS to Ubuntu 14.04.1 LTS, an additional problem that finally came to light about a week later was that mail sent from php scripts using the php mail() function stopped working. php mail() returns FALSE My Ubuntu mail setup uses sendmail with exim4. After the upgrade I was occasionally seeing the following exim4 error 2014-10-29 08:00:50 unable to set gid=33 or uid=0 (euid=0): forcing real = effective Normal email was working fine and php mail from the command line, or cron jobs was also working fine. It was only email sent via web sites i.e. with online forms using the php mail command i.e. $mail=\mail($email, $subject, $message); $mail would always return FALSE, and an exim4 error would be logged. The exim error points to a permissions problem with the Apache user group – www-data in Ubuntu. Group ID 33 is www-data. After googling around for a while and looking at various configuration options in php.ini the resolution lay with the Apache ITK MPM module. It seems that a default configuration in this module with Apache 2.7 has some kind of influence on the permissions associated with the www-data user/group when communicating with exim4. The fix is to explicitly define the ITK MPM module LimitUIDRange parameter in the /etc/apache2/mods-available/mpm_prefork.conf module configuration to something like LimitUIDRange 0 2000 Restart Apache and Exim 4 and PHP mail via Apache works again.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500094.26/warc/CC-MAIN-20230204044030-20230204074030-00410.warc.gz
CC-MAIN-2023-06
1,489
13
https://archives-manuscripts.dartmouth.edu/repositories/2/resources?q%5B%5D=%2A&op%5B%5D=&field%5B%5D=title&from_year%5B%5D=&to_year%5B%5D=&limit=resource&filter_fields%5B%5D=level&filter_values%5B%5D=collection&filter_fields%5B%5D=published_agents&filter_values%5B%5D=Sparks%2C+Jared%2C+1789-1866&sort=title_sort%20asc&filter_fields%5B%5D=creators&filter_values%5B%5D=Phillips%2C+Willard%2C+1784-1873
code
Letter from Jared Sparks to Willard Phillips, Esq. at Cambridge, MA. The letter concerns the aid that Phillips provided Benjamin Franklin in writing his autobiography. Spark suspected that Phillips would not receive remuneration from Franklin for his "valuable notes" and supplies Phillips with a consolation copy of the published autobiography. Sparks edited and wrote the biographical continuation of Franklin's autobiography.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710533.96/warc/CC-MAIN-20221128135348-20221128165348-00608.warc.gz
CC-MAIN-2022-49
428
1
http://crunchbang.org/forums/viewtopic.php?id=22295
code
I get permission denied in file manager but when i do it in terminal its hard and i mess up any other way? Last edited by GotSupreme (2012-10-06 16:01:01) Right-click and select "Open as root". while ( ! ( succeed = try() ) ); We've earned a reputation as a nice, friendly community; please help us keep it that way. you can launch your file manager with root permissions. that might help. just be careful with that. (to make sure i dont go accidentally messing up my system with root permissions active in a gui file manager, i make my the gtk theme red, when it's root.) Thanks pvsaged, Solved and thanks to vast one, used that way for /etc/apt/preferences
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710115542/warc/CC-MAIN-20130516131515-00013-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
658
11
https://forums.socialpointgames.com/topic/16247/vanoss2099-and-100-mirror-damage
code
When Vanoss2099 hits one or several monsters with 100% damage mirror, Vanoss2099 gets no harm even if the monsters survive the attack! This happens all the time, at the beginning of battles or in the middle of them, so please fix it. Vanoss2099 and 100% Mirror DamagePost count: 57Reputation: 28Joined: Pierce allows Vanoss2099 to attack through Mirrors (Skill and Damage) so it makes sense why they don't get activated Vanoss2099 and 100% Mirror DamagePost count: 7Reputation: 1Joined: @TheAlexDex Well, those features are not meant to avoid harm to some monsters as do shields, area evasion or (mega)taunt, but to inflict damage on the hitter, so they are offensive features, which makes me believe they are a bug or at least a conceptual inconsistency. Pierce through defense means in my opinion being able to inflict pain no matter what, but not to also avoid the consequences of such harm, which is a different matter, in fact the timing is subsequent to the attack: as a consequence of the attack and the harm caused, the mirror features then become active.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053759.24/warc/CC-MAIN-20210916204111-20210916234111-00681.warc.gz
CC-MAIN-2021-39
1,063
5
https://bamboosolutions.zendesk.com/hc/en-us/articles/360003316953-SA08-SQL06-Fetch-data-from-SQL-Server-failed
code
The following error may be displayed at the top of the Workflow Conductor Control Panel General Settings page after installing Workflow Conductor 1.5 or 1.5.1 for the first time: System.ApplicationException: SA08_SQL06: Message Code: SA08_SQL06 Message: Fetch data from SQL Server failed. Please contact your administrator. at Bamboo.Conductor.AdminManagement.ApplicationPages.GlobalSettings.j() at (Object sender, GridNeedDataSourceEventArgs e) Certain Workflow Conductor settings cannot be saved or retrieved until the Workflow Conductor SQL Server and Shared Services account are configured. Once these settings are configured, the error message is no longer displayed. - Configure the SQL Server setting in the Workflow Conductor Control Panel General Settings page. The SQL Server name must be entered in the format DBSERVER\Instance, referring to the SQL Server and database instance name where the Conductor_Content database is installed. - Configure the Shared Services and Deployment accounts in the Workflow Conductor Control Panel Account Settings page. Be sure to enter accounts that meet the permissions requirements described on that page.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817699.6/warc/CC-MAIN-20240421005612-20240421035612-00524.warc.gz
CC-MAIN-2024-18
1,153
8
https://spartanideas.msu.edu/2014/10/21/digital-scholarship-or-how-to-benefit-from-a-wicked-problem/
code
Written by: Thomas Padilla Primary Source: Digital Scholarship Collaborative Sandbox ‘Digital scholarship’ shares affinities with the type of wicked problem posed by C. West Churchman. Solutions are hard to come by and the problems contained therein are often interdependent (e.x. changing views on scholarly communication impact views on open access, research data, digital curation, and repositories). Yet, rather than be unsettled by the nature of the problems, we should see opportunity in the challenges they pose. Shifting scholarly terrain provides the ground for creative responses that are fruitfully predicated on interdisciplinary as well as interprofessional collaboration. At the library, we aim, in part to meet these challenges through a group called the Digital Scholarship Collaborative (DSC). Composed of librarians from across the library and archivists in the University Archives, the DSC breaks digital scholarship down into 9 areas: - Data Services - Digital Humanities - Digital Curation - Open Access and Scholarly Communication - Research Data - Scholarly Repository - Research Data Management Guidance - Digital Text Services - Digitized Collections We get together monthly to discuss challenges, thoughts, frustrations, breakthroughs, setbacks, and progress. I like to believe that we learn as much from our failures as we do from our successes. We aim to learn from each other as we seek solutions to challenges we face in each of the above areas. Sometimes, post meeting, we get together and solve them. Aside from the DSC coordinators, the group has no fixed roster of attendees. The semi-formal nature of the group is a strength. Individuals with deep digital scholarship experience are as equally welcomed as those new to the issues. Given the wicked nature of digital scholarship, diversity of perspective and experience is required to become better at what we do. This blog begins an effort to provide wider access to DSC discussions around digital scholarship. My hope is that our posts will spark some curiosity and maybe even create unforeseen connections. If any of what comes resonates I encourage you to reach out to the DSC via email list (meeting details forthcoming) – DigScholCollab@mail.lib.msu.edu Latest posts by Thomas Padilla (see all) - Data Praxis in the Humanities: Function and Ethic - April 7, 2016 - Humanities Data in the Library: Integrity, Form, Access - March 16, 2016 - Three-Dimensional Science Fiction: Visualizing IF Magazine Covers (1952-1974) - March 2, 2016
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107902683.56/warc/CC-MAIN-20201029010437-20201029040437-00183.warc.gz
CC-MAIN-2020-45
2,529
21
http://ideate.xsead.cmu.edu/gallery/pools?ideate_area=animation-and-special-effects&skill=concept-development&tool=arduino
code
35 projects · 37 members Beg, borrow or steal to make a work of art from which you think you could make money. It’s 2045. A retrospective on the Memory Technology is being prepared for the centenary celebrations of Vannevar Bush’s As We May Think. Design an retrospective of future memory technologies. We didn't find any matches. Try changing your search or refining the selected filters.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818474.95/warc/CC-MAIN-20240423095619-20240423125619-00306.warc.gz
CC-MAIN-2024-18
394
5
https://www.claaudia.aau.dk/platforms-tools/info?id=50
code
Forms (Microsoft Office 365) Microsoft Forms is an online survey creator, part of Office 365. More about accessing Forms at Microsoft Office 365 AAU offers employees and students access to the a suite of products from Office 365. This includes the basic software like Word, Excel etc., but also storage in OneDrive and/or SharePoint/Teams.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710936.10/warc/CC-MAIN-20221203175958-20221203205958-00149.warc.gz
CC-MAIN-2022-49
339
4
https://www.thespoof.com/jokes/13738/typing-in-my-dorm-on-a-blurry-morning
code
Typing in My Dorm on a Blurry Morning (With apologies to Robert Frost.) Whose words these are I think I know. His essay's on the web, although He will not mind me typing here To fill my paper up with snow. My roommate now must think it queer To watch me type without a beer Or joint or shot or Adderall-- The longest evening of the year. I give my work one final look To make sure that it's "by the book." But then I see one small mistake-- Or maybe five. Oh, what the fuck. My paper's deadline's almost here. I hope I get a C, or near. And now I think I'll have that beer. Yes, now I'm ready for that beer.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038074941.13/warc/CC-MAIN-20210413183055-20210413213055-00506.warc.gz
CC-MAIN-2021-17
607
18
https://paulvanderlaken.com/2018/03/06/machine-learning-courses-at-google/
code
Google has announced to provide open access to its artificial intelligence and machine learning courses. On their overview page, you will find many educational resources from machine learning experts at Google. They announced to share AI and machine learning lessons, tutorials and hands-on exercises for people at all experience levels. Simply filter through the resources and start learning, building and problem-solving. For instance, up your game straight away with this 15-hour Machine Learning crash course. Zuri Kemp – who leads Google’s machine learning education program – said that over 18,000 Googlers have already enrolled in the course. Designed by the engineering education team, the courses explores loss functions and gradient descent and teached you to build your own neural network in Tensorflow.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711017.45/warc/CC-MAIN-20221205132617-20221205162617-00262.warc.gz
CC-MAIN-2022-49
820
2
http://wiki.xmagestore.com/Magento2/Geoip_Extension/Currency_Mapping_and_Setup.html
code
For Currency Mapping, login to your admin panel and Navigate to Excellence-Currency Mappimg. You will navigate to page like this- Click on "Add Mapping" button and fill the following parameters- Choose from dropdown for which store you want to map the currency. Select countries from dropdown to map currency with. Select required Currency Mapping for necessary countries and click on Save Mapping button. For Currency Setup, Navigate to Excellence->Geoip Configuration->General->Currency Setup Fill the Base Currency, Default Display Currency, Allowed Currencies and Save Config.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573173.68/warc/CC-MAIN-20190918003832-20190918025832-00224.warc.gz
CC-MAIN-2019-39
580
8
https://www.postgresql.org/about/news/pgedit-12-beta-483/
code
pgEdit 1.2 is available for beta testing. New features include: Grid-based query browser tool. Result sets of any size are efficiently handled using automatic cursor management (no use of COUNT(*) or LIMIT/ORDER BY to manage paging). Definition (e.g. function, table, trigger) parsing and searching commands: Find Definition - Finds the definition source by name (with completion) in any open file. Jumps directly to the definition without prompting if the highlighted text matches the name of a definition. List Buffer Definitions - List all of the definitions in the file with an icon corresponding to the definition type. Full keyboard control for type-ahead selection, jump to definition (Return), or cancel (Escape). Option to store preferences (e.g. last connection, syntax mode, character encoding, etc.) in comments within the source file. Implemented multiple-level undo operations. Compatibility with PostgreSQL 8.1 (includes psql 8.1). Added tab completion support for new 8.1 SQL commands. Integrated PHP 5.1 which includes support for PostgreSQL prepared statement processing and execution. See http://pgedit.com/beta/pgedit for screenshots and downloads. This post has been migrated from a previous version of the PostgreSQL website. We apologise for any formatting issues caused by the migration.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400283990.75/warc/CC-MAIN-20200927152349-20200927182349-00289.warc.gz
CC-MAIN-2020-40
1,311
11
https://smetj.net/tag/release.html
code
Microsoft's Azure Queue Storage service provides cloud messaging between application components. Queue storage delivers asynchronous messaging for communication between application components, whether they are running in the cloud, on the desktop, on an on-premises server, or on a mobile device. Queue storage also supports managing asynchronous tasks and building process work flows. In this article we will go through a "Hello world" example demonstrating Wishbone and the newly released module to consume messages from the Azure Queue Storage service and print them
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347409337.38/warc/CC-MAIN-20200530133926-20200530163926-00566.warc.gz
CC-MAIN-2020-24
569
4
https://ibhc.com/tech-posts/
code
Learn more about the new technology being utilized at BHC. New & Innovative As technology changes so does BHC. Our engineers use new technologies to be innovative and allow the customer to feel at ease. Feel free to sort and filter the list below to get to the news you’d like to read about the most.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00551.warc.gz
CC-MAIN-2024-18
302
3
https://www.dvd-guides.com/guides/all-to-dvd/250-put-many-movies-episodes-in-one-dvd
code
Actually the full title of this article should be "how to put many movies or episodes in one DVD and when you shouldn't" ! I frequently receive emails from users that want to add many movies or a whole season of some series in one DVD. In this article I will try to explain what impact this would have to the quality (with video samples to see for yourself) of the DVD you will create and finally show you how you can create such a DVD using FAVC. The DVD-Video Standard The standard that all DVD-Video discs have to follow in order to be compatible with any player out there uses MPEG2 compression up to 9800kbps or in some rare cases MPEG1 up to 1856kbps. As you can understand, the mandatory use of the MPEG2 codec is our main limitation. The DVD format was finalized back in 1996, so they used what was then a cutting-edge compression technology. Unfortunately, as the years passed and new codecs like DivX/XviD or H.264 came out (MPEG4 if you want) with much greater picture quality in reduced sizes, for a DVD disc we still need to use the MPEG2 codec. The audio in the other hand, can be AC3, DTS or MP2 in multichannel setups, and we can have up to 32 subtitle tracks. What retail DVDs use Most DVDs in the market use a variable bitrate video of approximately 5000kbps video which is increased close to 8000kbps in high action scenes, which require more attention. Most of the times, the media used is DVD9 (7.95GB) in which they fit the movie, various audio tracks, menus and all extras. They rarely use DVD5 (4.38GB). As you understand, the lower the bitrate is, the most video a DVD can hold. However, since MPEG2 is an old codec, unlike H.264 which can achieve great results in low bitrate, anything under 3000kbps gives a very poor result which a significant amount of artifacts. Below I have created a small table which various bitrates, the approximate length of a video you could fit in a DVD (with a low quality AC3 audio in 128kbps in consideration) and an one minute sample from a movie using two free MPEG2 encoders to see for yourself the difference in quality. You can play the samples using the Open Folder option in VLC or with any other player of your choice. |Bitrate||Aprox. Video Length in a DVD-5 disc||Aprox. Video Length in a DVD-9 disc||Sample videos| |~1000 kbps||9 hours||15 hours||HC Encoder | QuEnc| |~1500 kbps||6 hours||10 hours||HC Encoder | QuEnc| |~3200 kbps||3 hours||5 hours||HC Encoder| What does this mean in practice It depends on two things: the movie itself and the devices you will use for playback. Let me elaborate: if your movie contains many action scenes, explosions, fast chases etc or is shot mainly in dark (night) it will not look good if you lower the bitrate too much. In the other hand, a comedy or some sitcom will look better as the video is less demanding. If there is no need I wouldn't encode any DVD under 1500kbps. The action ones even higher. Now the playback equipment is another parameter. For a handheld player (those with that small screens) or a SDTV (the old CRT ones) you will be fine. But if you are planning to use a HDTV (even in low resolution of an old DVD player) I suggest you don't squeeze too much video. For playback on a PC I don't even suggest a DVD-Video. Just convert to H.264 and burn a data DVD. Of course for a HDTV and an upscaling DVD player just encode one movie per DVD for maximum quality, you don't need me to tell you that. Bottom line, I suggest putting up to two movies in one DVD9 and about half a season of any series. Of course, you know your needs better, that's why the table above explaining all options exists. At the guide below we will use the freeware tool FAVC to create a DVD that will hold five movies, which in this example means about 8 hours and 45 minutes of video and an approximate bitrate of 1100kbps (more on less like the first sample in the table above). I decided to use FAVC as it comes with both the encoders I mentioned above, lets you add subtitles per track and creates a menu. It is also pretty easy to use. Note that while other encoders like ConvertXToDVD are much faster and feature full, for such low bitrate the quality of the video is much worse than what we will create with this tool. Download it below. Select the DVD format (5) between NTSC and PAL, obviously depending on your equipment. Now set the target size (6) between a normal DVD and a dual layer one. Note that to burn a dual layer DVD you need a DVD9 disc and a burner capable of burning it, so make sure you can in fact burn such a disc. Chapter length (7) sets every how many minutes a chapter will be created (used to navigate though the movie with the remote). You would probably want to create a Menu (8) in order to easily select which movie you want to see. Note that you cannot have a menu if you add more than 10 videos (for example 20+ episodes of a TV show), for some reason FAVC limits the menu creation to up to 10 tracks. In that case this option will be disabled and you can select the episode to play with the Next Track button in your remote control. At the Encoder (9) option, my choice is HC. In my opinion, it creates better looking video than QuEnc, especially in lower bitrate. If you want to decide by yourself check the samples in the table above. To continue, click the DVD Options tab and move to the next step. Click the HC Options tab to move on. In Method of Encoding (1) select 2-Pass Variable Bitrate. In Quality (2) selecting Best will give the best possible quality but with great expense of time. In CPU Cores (3), if you have a multi core CPU (most new PCs do) choose MultiCoreEnc and set the number of the cores you want to use in order to speed the process significantly. Finally in DC Precision (4) set the value to 10 and click the Audio Options tab. We will use AC3 as the audio encoding (1) codec. We will also select Encode as usual (2) as we cannot afford to possibly retain the present audio as it would be too big for such a small video bitrate: we need to use as less space as possible for audio. So, choose Aften (3) as the encoder and a bitrate of 128kbps (4). Finally click Generate DVD (5) to start the encoding. I hope you found this article helpful. If you need any more help or you have more questions, use the comments form below or the forum.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00248-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
6,299
21
https://community.bitwarden.com/t/bw-send-via-rest/51169
code
Please help me to implement the send function. I can’t find how to use the REST API to send secret text messages to clients. Be interested to see what replies you get. Bear in mind the encryption will be done on the client before the REST call. I would crib the CLI source code or even call the CLI from a subprocess. Do you think that this can only be done through the CLI? I don’t mean only through the CLI but it could be an easy option. Hi @v.yevdokymenko, welcome to community! I think you’re looking for our Vault Management API schema, but please let me know if there’s something more specific you’re looking for. I’ve already got to know your “Vault Management API” a bit. I figured out that I need to run a local web server that I can send REST requests to. However, initially I thought that it was not necessary to download and install the KLI at all. It seemed to me that I can use the public REST API and there are endpoints for creating a new Send object. And for some time I could not understand why API management endpoints do not work on the api.bitwarden.com URL.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508977.50/warc/CC-MAIN-20230925115505-20230925145505-00143.warc.gz
CC-MAIN-2023-40
1,096
9
https://www.reddit.com/r/ARG/comments/71z2pt/doki_doki_literature_club_has_more_to_it_than_we/
code
The biggest double bait of all time would be if project libitina was a smash bros related thing. I mean considering the pre-announcement hype that would probably be a triple-bait. I can see it now Howdy dudes. This doesn't really help forward the 'investigation' but I found that opening DDLC.exe in notepad with text wrapping disabled and the font sent to 1, the garbled unsupported mess of lettering you're not supposed to see actually makes up the Doki Doki logo. https://imgur.com/C4M6Uiz Note that I did this on a fresh install without actually opening the game. My friends cannot see what I'm seeing, for them it's all garbled. Just throwing in my two cents. I think it's actually a way of 'watermarking' your program. I see it too! Holy cow, the devs are mad! Yeah.. Just trying it myself now was terrifying haha. What effort! after doing some investigation i found out that some other applications have this as well. https://imgur.com/a/L8Abx Hi, I'm a bot for linking direct images of albums with only 1 image Source | Why? | Creator | ignoreme | deletthis 2 more replies What the fuck?! HOW?! As an actual attempt to answer, my immediate theories are that... A. There is a huge ASCII art string literal defined in the executable, which appears unmodified and just happens to be near the top of the file for some reason (despite the fact that in my experience, data tends to come after the machine code). B. They did some r/blackmagicfuckery with a compiler to splice ascii art just past the PE header where the start of execution would typically be, but instead modifying that part of the header to instruct the program counter to start just past the end of the ASCII art (sort of similar to how a virus works, come to think of it, sans the malicious payload). The game then self-modifies its own code executable (and I don't know how the hell that is possible on Windows while the program is running, with the ridiculous file locking rules the OS imposes--there must be some kind of tempfile bootstrapping going on there), which distorts the ascii art as a natural consequence. edit: changed code to executable, because I realized that "self-modifying" and "code" in the same sentence implies something entirely different--self-modifying code--which is AFAIK banned by modern memory-protection rules and will get your program force-killed if you try To get a vague idea of what I'm talking about (executable formats are complicated), here's a link to some documentation to the ELF executable format. ELF is used primarily on Linux/Unix-like systems, so you'll have to have some imagination here to mentally translate that to the PE executable format used by the NT kernel. But here's some documentation on that as well -- msdn, pelib, wikipedia (the wikipedia one has a nice infographic to help visualize). But basically, your typical executable format is a container for strictly-formatted metadata and data proper, beginning with the format identifier ("\x7fELF" for ELF, "MZ" for PE, etc.), magic number, and a bunch of metadata, like the endianness, the exact offsets where big chunks of data (or copyright/compiler information) are located, including the actual machine code (or the ".text" section, if you're familiar with ASM), the symbol table, a list of names of shared objects ("DLLs"), etc. This is all extremely precise and well-defined, so it's kind of like a bootstrapping process so that it can be easily loaded into memory by just copying the header 1:1 into memory and then reading the rest of the file using the metadata, setting up the execution environment, setting permissions (e.g. exec+ro on code to thwart attempts to alter code while it's running, noexec+rw on data to thwart attempts to jump the program counter to the stack and execute arbitrary code. Both of which would get your program killed because the hardware actually detects this and shoots a signal at the kernel. It's fascinating stuff.) and eventually transferring control to the actual machine code. And THAT, I believe, is where the program has been modified. ASCII art was inserted, and the offsets were modified to reflect the displacement created by the art. I.e. the start-of-execution offset was modified to point to the actual code, which starts after the ascii art. That's a level of hackery that is simply beyond my skill level. Well, maybe I could do it if I bothered to read up on the documentation of a given format. Disclaimer: I'm not familiar with Windows executables. Most of what I am saying stems from analogy to Linux, based on my passing familiarity with the ELF format, which is not thorough because I am not a compiler writer. So I make no guarantee that the stuff I'm saying is 100% accurate. That said, I did try to be as accurate as possible without fluffing details or oversimplifying to the point of detriment, and I hope I did a good job (: 1 more reply This is so ridiculous, i can't believe the amount of polish and love in this game, I'm racking my brain trying to figure out how they did this while still being usable. I can't wait to see where these devs go next. okay, i tried playing just a little bit after seeing that, and it seems like the more you progress through the game, the more distorted the image becomes ( kinda like how everything starts becoming more and more glitchy throughout the game) Doubly interesting is that the progression of logos matches the story (which doesn't happen in the Steam logo image that /u/ItzDennisz posted). Full logo - everything up to the festival Logo squished to half -- Sayori cut out Logo squished again and again -- Just Monika Since this happens in a fresh install, this is a kind of meta-foreshadowing... for the two people in the world that are crazy enough to inspect the .exe as a text file. 3 more replies This could have already been posted as of now but here is the Natsuki.chr face undistorted. https://i.imgur.com/zQoTMR1.png It was simply mapped to polar coordinates. Here is an even less distorted version. https://i.imgur.com/nPSeBZL.jpg who is that? the ghost of her mom or something? Most likely art for Libitina. I think it is the woman from the story you unravel from Yuris file, the one who gets murdered. She is described as having blond hair of a similar length.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249406966.99/warc/CC-MAIN-20190222220601-20190223002601-00114.warc.gz
CC-MAIN-2019-09
6,264
37
https://discuss.elastic.co/t/best-way-to-reindex-very-active-index/84979
code
When migrating to a new index, what's the best way to handle ensuring there's no differential between the two indexes and migrating aliases for zero downtime. So let's say we are adding 10k documents per second in an index INDEX_A with an alias INDEX and we reindex that to INDEX_B. As soon as that re-indexing is complete let's say we update the alias, there's potentially a few thousand documents added to INDEX_A after reindexing. Is there a way to ensure that once reindexing is complete that any new documents are added to both or what's the idiomatic way to handle reindexing an active index? At the moment what we're doing is, from the application side, duplicating indexing to both the old and new index, then reindexing, and once reindexing is complete, from the application side, only sending documents to the second index, and shifting searches to the second index. I just wanted to be sure there wasn't a better way to handle this in an atomic way within ES. i am interested to see how you do it on with the application side, would appreciate the details i usually reindex only to change mappings for that: A) i stop logstash so new data do my thing with the active index and start it B) update old indexes and the template dont touch todays index, tomorrow it will write to new index with new mapping and i move the old one (my indexes are daily) C) update logstash index name, restart move old ones to new index This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00038.warc.gz
CC-MAIN-2023-50
1,526
9
http://www.techeye.net/software/linus-torvalds-defects-to-kde
code
Linux kernel creator Linus Torvalds has defected to the KDE interface after bitching about Gnome for ages. While KDE developers might be happy at getting a high profile customer, having Torvalds as a client is a bit like having a viper in your underpants. If you don’t move or do something stupid, you should be ok, but if something goes wrong the results are disastrous. Linus Torvalds has been the thorn in the side of the Gnome community after its 3.x failed to impress him and he made his objections rather clear. Writing in his blog Linux said he had been a long time Gnome+Ubuntu user but gave up on Unity after 11.10 when things seemed to be heading in the direction he didn’t want his linux desktop to behave like. Linus has not used KDE for a long time and his opening statement about KDE is a mix of praise and moan. He particularly did not like the default ‘desktop view’ introduced in KDE 4.x. He said it looked a bit too cartoony, and the default widget/plasmoid behaviour with mouse-over pretty much immediately showing the controls for it “annoys the hell” out of him. He said that while you can lock the widgets down and they calm down and act normal, it’s got some really odd and distracting default behaviour. Linus changed the default to ‘folder view’ and became a happy bunny. Linus said he understood why some Gnome people think that KDE may have gone a bit overboard on the configuration ability. Because some of the “you can configure everything” things are just odd. But he did like being being able to rotate those desktop widgets any which way you want. Unity, on the other hand, went too far the other way, he added. In the end he gave KDE the thumbs up.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814801.45/warc/CC-MAIN-20180223154626-20180223174626-00128.warc.gz
CC-MAIN-2018-09
1,703
12
https://forums.online-go.com/t/annotations-missing-from-sgfs/1447
code
It seems that annotations (letter/number/symbol marks) and marks made by free hand drawing tool are missing from downloaded SGFs of reviews/demos. I’m not sure if the free hand drawing can be easily represented in SGF, but the other marks should be there. Here’s a notable example: It seems that the comments are preserved properly, but all of the valuable markings are lost in downloading the SGF. Shameless hijacking to mention additional bugs in the review system: The up/down arrow keys do not navigate up/down when there are 2 or more variations in the following branch. The erase function is not permanent. Any markings previously drawn will reappear on top of any corrections upon refresh or reloading. The lettering function gets screwy after typing in the variations box. Letters are skipped and it shows “Y,” “),” or even blank until the letter function is reselected. During live reviews, observers sometimes experience a bug in which the variations created get “stuck” in one place. New variations are seemingly created from whatever point the observer is viewing at the time. This issue is fixed upon refresh. I experienced this the other day. The explanations from the reviewer seemed to have very little to do with the move being commented on. I refreshed the browser and found that the move tree that had been created on my side was very different than what the reviewer was seeing. If this is happening frequently, it seems to be one of the more urgent bugs right now. It makes a confusing mess of the live review process. Can you clarify what you’ve seen? You’re saying someone shares a variation in chat, someone else mouses over it and sees the variation played out from their position instead of where the variation was created from? In my case, I was following a live review and the comments were starting to make less and less sense to me. We realized that we were looking at different boards. I tried clicking the “sync” button to make sure I was on the same move as him, but the client was insistent that we were on the same move. So I refreshed my page and everything was magically fixed. It looks like the reviewer manually removed some stones in order to show how the situation would have been different if some of the nearby supporting stones were missing. I think this may have been the moment that our paths diverged, and I started seeing a different board than him. I’m not sure though. nispio’s got the same bug it seems. It’s happened 3 times in one review. You’re watching for a few minutes, then the navigation seems to stop and you think the reviewer is just busy. Then weird variations (which belong elsewhere) appear as the reviewer creates them (elsewhere), but the variations appear to you to be made on top of wherever you were left. It’s kind of bizarre.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104542759.82/warc/CC-MAIN-20220705083545-20220705113545-00706.warc.gz
CC-MAIN-2022-27
2,831
14
https://dzone.com/links/programming_language_beauty_look_closure.html
code
In the past year I have been passionately fighting what Simon Peyton Jones calls "the effects monster", although often it feels like I am fighting windmils instead. No useful programs can be written without effects, but effects turn bad when they are observable from within the program itself. Instead we should strive for encapsulating effects such that they become harmless first class pure values, but more on that in the future. In this first installment in a longer series on the perils of side-effects, we will look at one of the most beautiful examples of observable effects, namely closures and variable capture in imperative languages. Aug 11, 08 Mr B Loid
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863949.27/warc/CC-MAIN-20180521043741-20180521063741-00170.warc.gz
CC-MAIN-2018-22
665
3
http://www.upubuntu.com/2012/11/how-to-reinstallrepair-grub-2-boot.html
code
In this tutorial, we will show you how to use the Boot Repair utility to fix the Grub2 boot loader under Ubuntu/Linux Mint. Boot Repair is useful for users having boot issues that occur mainly when dual-booting Ubuntu with other operating systems like Windows 8/7, etc. You can also use it to re-install Grub 2 when you have misconfigured the boot loader. - Ubuntu Live CD/USB (Ubuntu 12.10/12.04) - Internet Connection Boot into your live CD/USB and from the first screen, select "Try Ubuntu without installing": Then wait until your desktop loads completely. 2. Installing Boot Repair Open now the terminal and install Boot Repair with these commands: sudo add-apt-repository ppa:yannubuntu/boot-repair sudo apt-get update sudo apt-get install boot-repair boot-sav 3. Fixing/Re-installing Grub2 You can now start Boot-Repair with this command: From the main interface of the application, click "Recommended repair (...)": For advanced users, you may click "Advanced options" for more actions (restore MBR, repair file systems, change default OS, etc.): Reboot now your system to finish. The Grub2 boot menu will show again other OS installed with Ubuntu.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572744.7/warc/CC-MAIN-20190916135948-20190916161948-00403.warc.gz
CC-MAIN-2019-39
1,156
15
https://hydrogenaud.io/index.php?topic=114559.0
code
How to correctly fixup unpacked PCM samples? 2017-08-25 21:13:26 Hi, I'm very new to the topic of audio de-/compression, so probably the answer to my question may be very obvious. My aim is to write a very simple wavpack unpacker/decoder in C++ to compute AccurateRip checksums directly on wavpack'ed CD rips. It's currently a fun project on my own. I started by creating a losslessly encoded .wv file from a 16 bit stereo interleaved low endian PCM RIFF/WAV file (created from a CD with EAC) to have test input. My decoder so far reads this wavpack file, verifies it is lossless + 16bit stereo with 44100 samples/sec and then processes the sequence of unpacked samples one by one. Now, my problem: From the .wv file, I need to reconstruct the original sample sequence with each unpacked, decoded 16bit stereo PCM sample pair (for left and right channel) represented as a uint32_t that contains one 16bit sample in its upper and the corresponding other sample in its lower bytes. This is the representation my checksum calculator expects. (It works already for RIFF/WAV-PCM, so I have the checksums of the original file as a reference.) I'm afraid I'm stuck with how to proceed with the unpacked int32_t samples in the buffer after having successfully called WavpackUnpackSamples(). Any help is appreciated. I will be happy to provide any further information necessary.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736902.24/warc/CC-MAIN-20200806091418-20200806121418-00115.warc.gz
CC-MAIN-2020-34
1,369
1
https://careers.columbususa.com/job.php?id=2809
code
Job opening ID Roles and responsibilities Must be a US Citizen or Green Card Holder Estimated duration of 11 months with the potential for extension or conversion. W2 with full benefits Customer and contract specific training will be required and provided. Labor Category: Computer Security Engineer III Be the Software Engineer in group 393D for TTC subsystems and participate in the software development for the Human Space Flight, including responsibility for development of software, the interfaces, requirements, trace matrices, system integration and deployment. Partners with the DSN Operation and Engineering Office, tracking stations and system engineering teams and serves as the subsystem engineer to develop, maintain, design, implement and deliver new, improved and modified capabilities. Partners in software development activities and leads testing, troubleshooting and analysis of discrepancy reports. Participates in design and implementation of the next generation hardware and software deliveries for TTC Software systems. Incorporate software development processes and task quality measures and participate in verification and validation of interim deliverables. • Must be a US Citizen or Green Card Holder • Offer contingent on ability to successfully pass a background check and drug screen • BS degree in Computer Science, Electrical Engineering, Physics or a related discipline with 6 years of experience, or an MA/MS degree with 4 years of experience, or a PhD with 2 years of experience. • Extensive knowledge of C-Programming, Unix, Linux (Red Hat), scripting (Shell, Perl, Python, Tcl/Tk) and networking. • Proven ability to effectively lead, mentor, and challenge other members of the group as needed. • Proven commitment to customer satisfaction. Strong interpersonal skills with ability to interface with institutional and project management at all levels. • Excellent verbal and written communication skills and presentation skills. Number of positions
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657142589.93/warc/CC-MAIN-20200713033803-20200713063803-00399.warc.gz
CC-MAIN-2020-29
1,998
16
http://serverfault.com/questions/589831/how-do-i-remove-apache-if-i-installed-it-from-the-source-tarball
code
You remove the files that were installed by hand, using the (If you don't know which files you need to remove sometimes it helps to make install again and look for the files that were updated - you've probably made yourself quite a mess though.) The next time you need to build a test environment you should think it through and plan for the eventual removal of that environment (e.g. by using --prefix=/usr/local/apache-test when you run configure so all the installed files are conveniently under one directory). This requires a little more work on your part, but is less likely to make a mess on your server. A better solution would be to use FreeBSD's jail functionality to fully confine your test environment. This has a steeper learning curve (and uses a lot more disk space), but it is The Right Thing in terms of isolation/containment.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257827791.21/warc/CC-MAIN-20160723071027-00057-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
843
9
https://www.polytechforum.com/autocad/how-to-export-block-attributes-with-visual-basic-14074-.htm
code
15 years ago I hope this posting is not OT, but I do have to import the block values from dxf files (or dwg files) into an access data base.This shall be done using visual basic, on a computer without autocad I already saw a example script how this works, but I could not find Any help or exmaple will be appreciated very much ...
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334591.19/warc/CC-MAIN-20220925162915-20220925192915-00689.warc.gz
CC-MAIN-2022-40
330
6
https://www.careerlink.vn/viec-lam-cua/nnr-global-logistics-vietnam-co.-ltd-%E2%80%93-hanoi-branch/190078
code
Tìm thấy 0 việc làm đáp ứng yêu cầu tìm kiếm của bạn: Bạn vui lòng: NNR VN is one of VN’s leading freight forwarders. NNR offers expertise in air and ocean freight, logistics solutions as well as international forwarder services. As a pioneer on aircargo business started handling aircargo transport in 1948, and in 1957, we established a consolidation company as a joint investment company. In 1983, we began handling individual cargo consolidation business, and at same time we affiliated in WACO (World Air Cargo Organization) group, extending the service to where no other Japanese forwarders are serving.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998369.29/warc/CC-MAIN-20190617022938-20190617044938-00014.warc.gz
CC-MAIN-2019-26
634
4
http://jkwra.or.kr/article.php?num=N0200501104
code
The copula-based models have been successfully applied to hydrological modeling including drought frequency analysis and time series modeling. However, uncertainty estimation associated with the parameters of these model is not often properly addressed. In these context, the main purposes of this study are to develop the Bayesian inference scheme for bivariate copula functions. The main applications considered are two-fold: First, this study developed and tested an approach to copula model parameter estimation within a Bayesian framework for drought frequency analysis. The proposed modeling scheme was shown to correctly estimate model parameters and detect the underlying dependence structure of the assumed copula functions in the synthetic dataset. The model was then used to estimate the joint return period of the recent 2013~2015 drought events in the Han River watershed. The joint return period of the drought duration and drought severity was above 100 years for many of stations. The results obtained in the validation process showed that the proposed model could effectively reproduce the underlying distribution of observed extreme rainfalls as well as explicitly account for parameter uncertainty in the bivariate drought frequency analysis.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318894.83/warc/CC-MAIN-20190823150804-20190823172804-00066.warc.gz
CC-MAIN-2019-35
1,261
1
http://lists.alpinelinux.org/alpine-devel/1993.html
code
2011/12/8 Natanael Copa <ncopa_at_alpinelinux.org>: > I have been using qemu for some time for testing and network > I think raw qemu is a bit cumbersome since i need to keep track of the > mac address of all the guests. When I create a guest i create a > start.sh script where i stuff in the mac address. (I sometimes need > multiple NICs in guests and will need multiple guest vlans etc. I can offer two things: Help you with dealing with the XML files needed for use with Libvirt and making the networks autostart. Work together to make the Xen port 100% usable and give hints on how to use it for a desktop-py scenario I would be happy about the second since it would be good to work on that. Not saying that it wouldn't help me a lot, too ;) Also I'm afraid there will be two half-working virtualization solutions instead of one well-working one, since I except Virtualbox to be a lot of work to package / make work. VirtualBox can also be run under libvirt control, or without it. This year i've probably launched, tested and deleted 600 or so libvirt VMs, and had no problems with it. But there is a fine line to it. My workmates had tried to build the autobuild cluster for our check_mk build using it and virtualbox kept going topside down, with a wide choice of different errors. But, to be clear on that, on my work laptop and on the desktop at home, virtualbox is the #1 choice. I'll also use KVM on the desktop for OpenNebula testing, but that means it's stricly as a "server" like scenario. Mostly I blame that on Libvirt idiocy. One last thing one should mention: VirtualBox is the least user friendly of the pack once you're using the CLI for automating install Cool thing is that VirtualBox has great PXE support, emulates Intel NICs instead of Realcrap[tm]. I wouldn't object using as a desktop thing Xen instead if I had a distro that gave me a working Xen install. Although, honestly, stuff like mounting and unmounting of ISOs is about 5000% more complicated there than anywhere else ;) So, err, this is a rather undecided reply. Poke at Virtualbox, and if you think you can port it in 1-2 days, then go with virtualbox. Otherwise, or once you want automated installs, memory compression, dumping live VM memory, scripting, etc. and a general notation of "bleeding edge", switch to Xen. Received on Wed Dec 14 2011 - 22:41:42 UTC
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999210.22/warc/CC-MAIN-20190620105329-20190620131329-00524.warc.gz
CC-MAIN-2019-26
2,350
41
https://wpf.2000things.com/2013/05/14/819-previewing-truetype-fonts-in-windows-explorer/
code
#819 – Previewing TrueType Fonts in Windows Explorer May 14, 2013 Leave a comment You can view all installed fonts in Windows, using the Fonts applet. You can also view font properties and preview arbitrary fonts using Windows Explorer. For example, assume that you have a directory containing some TrueType (.ttf) fonts, which are not current installed. You start by navigating to the folder containing the fonts. You can set the view in Windows Explorer to one of the icon-based views (e.g. Large icons) to see a thumbnail-based preview of each font. You can also turn on the Preview pane to see a preview of each font, as you select it. Finally, as with the Fonts applet, you can double-click a font to open a preview of the font in a separate window.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186841.66/warc/CC-MAIN-20170322212946-00553-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
756
8
https://shopstudio139.com/products/little-sexy-pixie-wig
code
The wig was to small for my head. I emailed CS and no one replied. So I kept it, and took it at a loss. Your site states you can not guarantee receiving returns. It appears to me, you only care about making a sale, not the customer experience & satisfaction. The quality of the wig is good.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510085.26/warc/CC-MAIN-20230925183615-20230925213615-00278.warc.gz
CC-MAIN-2023-40
290
1
http://www.erinroseglass.com/slides-for-conwest/
code
#teaching agency in a programmed world here is a link to the pdf of my slides for !!ConWest. hopefully i’ll have a chance to write up the talk soon as well. in the meantime, feel free to look at my write ups “open access in an age of surveillance capitalism: fighting for ground in the public imagination” or “ten weird tricks against surveillance capitalism in the classroom.” both pieces deal with subjects i discussed in the talk. thanks so much for a wonderful conference — i enjoyed meeting you and learning from you all! let me know if you want to talk more about tech + edu/ethics/agency/writing.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506959.34/warc/CC-MAIN-20200402111815-20200402141815-00180.warc.gz
CC-MAIN-2020-16
615
5
http://docs.oracle.com/cd/E15635_01/doc.1032/e15056/console.htm
code
|Oracle® Guardian Installation Guide Part Number E15056-01 The following sections provide instructions for installing Guardian in console mode: If you are upgrading from a previous version of Guardian to this release, you must install Guardian in a different location than the previous Guardian installation. Otherwise: The Guardian Registry will not be installed properly and Guardian will not be able to start. You will not be able to import your previous Workspace data. Oracle recommends that you back up your previous installation before proceeding to ensure that your data is preserved. Use the following procedure to download the Guardian software. Log in to My Oracle Support at the following URL: Navigate to the Oracle Guardian Resource Center by doing the following: On the Dashboard page of My Oracle Support, click Knowledge. In the Browse Knowledge panel on the left, click Tools and Training > Diagnostic Tools. In the Diagnostic Tools page, in the Diagnostic Tools - Database And Fusion Middleware section, click Guardian Resource Center. In the Oracle Guardian Resource Center page, click Product Downloads and Latest Signature Patterns Release Documentation. In the Product Downloads and Latest Signature Patterns Release Documentation page, click the Oracle Guardian 10.3.2 product download link that matches your platform. On the download page, click Download to download the installer zip file for your platform. Note that on the download page, you can also click the following: View Readme — to display a window identifying the contents of the zip file View Digest — to view either the SHA-1 digest or MD5 signature of the zip file for verifying the integrity of the product installer after download is complete Use the following procedure to install Guardian using Console Mode. After the download to your machine is complete, unzip the file. Change to the directory in which the product installer has been unzipped and start the installer by entering the following command: guardian_installer.exe -i console ./guardian_installer.bin i console This displays the first section of the Installation Wizard in which you view the terms of the end user Guardian license agreement. Press Enter to agree to the license agreement and continue. The wizard displays the Choose Install Folder section. Press Enter to accept the default installation directory, or enter the fully qualified name of an alternative installation directory. The wizard displays the Choose Link Location section. Select the link location and press Enter. This displays the Pre-installation Summary section. Review your installation details and press Enter to continue. This displays the Ready To Install section. When you are ready to begin the installation, press Enter. The Installation Wizard displays several messages in the console window as the installation continues. When the wizard displays a message indicating that the installation is complete, press Enter to exit the installer. You are now ready to launch Guardian. If you are running Guardian on a version of WebLogic Server earlier than 10.0, you need to deploy the Guardian Agent in the WebLogic Server Administration Server. For more information, see "Deploy the Guardian Agent" in the Oracle Guardian User's Guide. If you are upgrading Guardian from a previous release, you might want to run the Update Wizard prior to launching Guardian. The Update Wizard, which is available from the Guardian user interface, connects to My Oracle Support. You are prompted to enter your My Oracle Support username and password. You are then presented with a list of product updates that you may download and install. For information about running the Update Wizard, see "Updates and Upgrades" in Oracle Guardian User's Guide.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119637.34/warc/CC-MAIN-20170423031159-00020-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
3,772
38
https://www.syncfusion.com/forums/24402/exception-rearranging-tabbed-docking-windows
code
we a customer has just caught an unhandled exception when attempting to drag-arrange tabbed docking panels. Unfortunately the only information I have is the following stack trace: Index was out of range. Must be non-negative and less than the size of the collection. Parameter name: index at System.Collections.ArrayList.get_Item(Int32 index) at Syncfusion.Windows.Forms.Tools.TabPageAdvCollection.get_Item(Int32 index) at Syncfusion.Windows.Forms.Tools.DockHost.ProvideTabFeedback(IDraggable idg, MouseAction action) at Syncfusion.Windows.Forms.Tools.DragFBProvider.ProcessMouseMove(IDraggable ctrl, Point ptscreen) at Syncfusion.Windows.Forms.Tools.DockHostController.HandleMouseMoveImp(MouseButtons button, Point pt) at Syncfusion.Windows.Forms.Tools.DockHost.OnMouseMove(MouseEventArgs e) at System.Windows.Forms.Control.WmMouseMove(Message& m) at System.Windows.Forms.Control.WndProc(Message& m) at System.Windows.Forms.ScrollableControl.WndProc(Message& m) at System.Windows.Forms.ContainerControl.WndProc(Message& m) at Syncfusion.Windows.Forms.Tools.DockHost.WndProc(Message& msg) at System.Windows.Forms.ControlNativeWindow.OnMessage(Message& m) at System.Windows.Forms.ControlNativeWindow.WndProc(Message& m) at System.Windows.Forms.NativeWindow.Callback(IntPtr hWnd, Int32 msg, IntPtr wparam, IntPtr lparam) ADAdministrator Syncfusion Team February 3, 2005 12:02 PM I tried to reproduce the problem, but was unable to. Some information regarding the setup of your application or a similar sample might help me track the problem down. KIKai IskeFebruary 3, 2005 10:36 PM I will try obtaining further information from the user as to how the docking panels were layed out before the exception was thrown. If I do find anything, I will open a Direct-Trac incident
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500619.96/warc/CC-MAIN-20230207134453-20230207164453-00491.warc.gz
CC-MAIN-2023-06
1,770
23
http://genderi.org/the-arboretum-procedure.html?page=4
code
The ARBORETUM Procedure The SAVE statement specifies the output data sets. The SUMMARY= option outputs summary statistics to the data set SUM1. shows the result of printing the SUM1 data set. The sum of square errors produces an R-square of 0.57. AVE SQ ERR The SEQUENCE= option in the SAVE statement creates a SAS data set with statistics for subtrees of every possible size. The number of leaves is stored in variable –NW–. The variable –NW– is created in other SAS data mining procedures to represent the complexity of a model. –NW– is an abbreviation for number of weights in a neural shows the output from printing the number of leaves and the assessment measure from the SEQUENCE= data set. The default assessment measure for an interval target is the average square error. The first observation shows the average square error in the training data, before applying the tree. The first five observations show that the average square error decreases quickly as the number of leaves in the subtree increases from 1 to 5. The error decreases more slowly as the number of leaves increases from 6 to 16. The following PROC ARBORETUM code selects the subtree with 5 leaves and saves the node statistics and splitting rules in SAS data sets: The INMODEL= option imports the information saved from the previous execution of the ARBORETUM procedure, eliminating the need to respecify the training data set or the variables or to re-create the tree. The SUBTREE statement selects the subtree with five leaves. The NODESTATS= option in the SAVE statement saves information about each node into data set NODES2. The RULES= option in the SAVE statement saves all the splitting rules into data set RULES2. Summary Statistics for Subtree 5 The R-square for the subtree with 5 leaves is 0.50, compared to 0.57 for the tree with The NODES2 data set contains information about each node. P–SALES contains the predicted sales amount for observations in the node. In this example, P–SALES equals the average sales among observations in the SHOES data set assigned to the node. The WHERE statement in the following code selects the leaf nodes for printing, excluding the nonterminal nodes. proc print data=nodes2; var node leaf n p_sales; where leaf ne .; Information about Each Leaf The RULES2 data set contains all the splitting rules in the tree, including the unused competing rules, and the candidate rules in the leaves. The WHERE statement in the following code selects the primary rules for printing, and
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256546.11/warc/CC-MAIN-20190521182616-20190521204616-00463.warc.gz
CC-MAIN-2019-22
2,517
39
https://bugs.webkit.org/show_bug.cgi?id=94800
code
We would like to go forward and run pixel tests on QtWebKit bots to have better test coverage and catch minor pixel regressions too where rendertree dump doesn't change at all. It is a meta bug, because we have to fix many things before we can start run pixel tests on the bots. === Bulk closing of Qt bugs === If you believe that this bug report is still relevant for a non-Qt port of webkit.org, please re-open it and remove [Qt] from the summary. If you believe that this is still an important QtWebKit bug, please fill a new report at https://bugreports.qt-project.org and add a link to this issue. See http://qt-project.org/wiki/ReportingBugsInQt for additional guidelines.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945289.9/warc/CC-MAIN-20230324211121-20230325001121-00697.warc.gz
CC-MAIN-2023-14
678
8
https://www.dartdocs.org/documentation/doksan/0.0.3/index.html
code
A simple console application that enables hackers to get latest soccer scores and fixtures. At the present moment, doksan only supports 18 teams that consist Turkish Super League. All data is being parsed from pub global activate doksanon command line. - Add your PATH. (e.g. Add export PATH="$PATH":"~/.pub-cache/bin"to .bashrc) This application is pure Dart and works on only Dart VM. Flags and Options: -l, --league: Specify which league you want to get information about. Must be provided. -t, --team: Specify which team you want to get information about. Optional. -r, --isResults: Get previous results or not. When used with a team name, it returns results of last 5 games. -f, --isNextMatches: Get next games or not. When used with a team name, it returns next 5 games. dart main.dart -l tr -t trabzonspor -f Feb 11 8:00 Osmanlıspor vs Trabzonspor Feb 20 12:00 Trabzonspor vs Alanyaspor Feb 26 13:00 Konyaspor vs Trabzonspor Mar 5 13:00 Trabzonspor vs Karabükspor Mar 12 14:00 Akhisar Belediyespor vs Trabzonspor - Get scorer information for games. - Styling for proper listing of games. - Leagues and teams data other than Turkish League. - League information, fixtures, results.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805977.0/warc/CC-MAIN-20171120090419-20171120110419-00129.warc.gz
CC-MAIN-2017-47
1,189
20
http://wiki.wlug.org.nz/XimianDesktopNotes?action=PageInfo
code
If you get this error from Galeon after upgrading to XimianDesktop 2 INTERNAL ERROR on Browser End: No manager for initializing factory? System error?:: Success then try removing stale /usr/lib/mozilla directories. Apparently, the Sun Java plugin is the culprit in some cases, and should be replaced by the Blackdown plugin.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990112.92/warc/CC-MAIN-20150728002310-00311-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
324
4