url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://bouldergazette.com/researchers-use-high-density-eeg-to-produce-dynamic-image-of-brain-signal-source/1374/
code
Marking a major milestone on the path to meeting the goals of the NIH BRAIN initiative, research by Carnegie Mellon’s Biomedical Engineering Department Chief Bin He advances high-density electroencephalography (EEG) as the future paradigm for dynamic functional neuroimaging. The NIH Brain Research through Advancing Innovative Neurotechnologies (BRAIN) Initiative motivates researchers to generate a revolutionary new dynamic image of the brain that, for the first time, exhibits how individual cells and complex neural circuits interact in each time and space. An ideal technique for useful human brain imaging—one of the initiative’s top priorities—would depict brain exercise with a high temporal resolution, high spatial resolution, and extensive spatial coverage. Carnegie Mellon’s He has made a major leap ahead for the field of practical neuroimaging. An NIH-funded study lasting several years and analyzing dozens of patients with epilepsy has produced a novel supply imaging technology that makes use of high-density EEG recordings to map underlying brain networks. Featured in Nature Communications, this research is a huge step towards establishing the ability to dynamically image human brain function and dysfunction. This could present essential insight into each where and how underlying information-processing occurs. EEG has long been one of the most efficient functional strategies available for human brain mapping.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178373241.51/warc/CC-MAIN-20210305183324-20210305213324-00029.warc.gz
CC-MAIN-2021-10
1,445
6
https://laser-atelier.ch/en/
code
Laser Atelier is a design studio in Zurich, Switzerland focused on exploring the possibilities of laser cutting and engraving in design & art. I'm Robin Hanhart, a Designer and Illustrator in Zurich, Switzerland. This is my design studio where I work on my own project but also offer laser cutting services for my clients. Our newest experiments and products. More News
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601241.42/warc/CC-MAIN-20200121014531-20200121043531-00512.warc.gz
CC-MAIN-2020-05
369
3
http://morlockpublishing.com/wp-content/uploads/2022/10/1_trees.txt
code
Intro to Trees There is only one data structure in Hoon: the binary tree. Everything is a binary tree in Hoon. Hoon code itself is a binary tree! ...but don't worry about that yet. Let's have a quick refresher on binary trees, a general purpose data structure that is used all over, not just in Hoon. A binary tree consists of nodes, starting with the root node. In the general case, each node (a) contains a value, (b) has 0, 1, or 2 children. Or, rather, every node has pointers to 2 children, but either of these pointers can be NULL / empty / whatever. There are no cycles (i.e. no loops). You have certainly dealt with trees before. HTML, for example, is a tree (although not a binary tree). E.g. this is the first div is a root node ( html ) with four children (h1, div.a, div.b, div.c). The second child (div.a) has a lot going on: an id ('a'), content ("this"), and a child ("span"). Hoon has a MUCH simpler structure. First, it's a binary tree: every node can have 0, 1, or 2 children. Second, there are no attributes (like HTML "names" or "ids"). Third, a node either has content, or has children, but never both. Also, we call nodes "cells", and we call trees "hoons". Yes, the name of the core data structure is the same as the name of the language, except the word for the data structure has a lowe case 'h', while the language name has an upper case 'H'. I do not defend this; I merely report on it. Let's look at a Hoon style binary simple tree: This is a tree with one cell (the root) which holds the value 3, no left child, and no Here's a Hoon tree with three cells: Here's a Hoon tree with seven cells: / \ / \ 3 12 1 5 These ASCII art diagrams are tricky, and there's a much more compact notation, using square brackets. The above tree can be expressed [[3 12] [1 5]] Trees need not be balanced; this is a legitimate tree: This tree is expressed [3 [1 5]] A very common use of trees in Hoon is a very very unbalanced right-heavy tree, like this: All linear structures are implimented in trees this way. Where you would use an array in C or Ruby, you'll use a tree in this manner in Hoon. You should simultaneously think of such a usage as "a list", but also remember the underlying implementation. This is expressed on one line as [ 3 [1 [5 [22 99]]]] Because this is a very common usage model, though, there is an alternate expression syntax: [3 1 5 22 99] Your brain is going to look at this and think "that's a tree with a single root cell, and it has five children cells". Yes, that's what the syntax seems to imply. No, that's not what it means. I know that this is kind of painful, but you have to accept that the above syntax means the diagram above, NOT a root with five children. When you realize that that unbalanced right-heavy tree is USED in the same way that an array is, the syntax becomes a bit less painful. The interpretter (dojo) accepts both syntaxes, but only emits the So, let's recap: * everything in Hoon is a binary tree ... EVERYTHING ! * we also call binary trees "hoons", with a lower case 'h'. * binary trees are made up of cells * a cell either (a) holds a value and has zero children, or (b) does NOT hold a value and has 1 or 2 children. * cells do not have HTML- or XML- style attributes associated with them (this is kind of the truth and kind of a white lie; I'll explain Your homework assignment: * get urbit installed on your PC following the instructions here * boot into a comet. Note that you must do this in a basic terminal; it will NOT work inside an emacs shell. * read the official explanation of nouns, cells, and atoms here * in your urbit, use dojo (the interpretter) and enter some hoons: [[1 2] [3 4]] [10 20 30 40 50] Note that the dojo interpretter is very opinionated, and will enforce one space between values. I do not defend this, I merely report it.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710771.39/warc/CC-MAIN-20221130192708-20221130222708-00514.warc.gz
CC-MAIN-2022-49
3,826
76
http://forums.zimbra.com/installation/40343-mysql-wont-start-install-zimbra.html
code
I did an install of zimbra 6.0.6 on Ubuntu 8.0.4 and everything worked out well except the "unable to verify the mx record". Bypassing this, the install worked perfectly until I did a "zmcontrol status" (see below). I also have bind9 working on the server as normal, resolving the A and MX records to my local LAN IP and tested from a PC. zimbra@mail:~$ zmcontrol status mysql.server is not running. Can anyone help troubleshoot?
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049276305.39/warc/CC-MAIN-20160524002116-00228-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
429
4
https://avd.aquasec.com/nvd/2016/cve-2016-4983/
code
A postinstall script in the dovecot rpm allows local users to read the contents of newly created SSL/TLS key files. The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. - Run the code in a “jail” or similar sandbox environment that enforces strict boundaries between the process and the operating system. This may effectively restrict which files can be accessed in a particular directory or which commands can be executed by the software. - OS-level examples include the Unix chroot jail, AppArmor, and SELinux. In general, managed code may provide some protection. For example, java.io.FilePermission in the Java SecurityManager allows the software to specify restrictions on file operations. - This may not be a feasible solution, and it only limits the impact to the operating system; the rest of the application may still be subject to compromise. - Be careful to avoid CWE-243 and other weaknesses related to jails.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00611.warc.gz
CC-MAIN-2023-23
1,019
6
https://research.birmingham.ac.uk/en/publications/predicting-negligence-in-female-sterilization-failure-using-time-
code
BACKGROUND: Sterilization failure due to 'tubal non-occlusion' or 'wrong structure sterilization' is considered negligent, whereas 'spontaneous tubal recanalization' or 'fistula formation' is considered non-negligent. We examined whether interval to pregnancy failure was predictive of a negligent rather non-negligent failure mechanism. We aim to test this hypothesis in a selected population series of known mechanisms of sterilization failure and their time interval to failure. METHODS: Analyses of 131 failed sterilizations pooled from UK (NHS Litigation Authority, Medical Protection Society and our hospital), Australia and a qualitative systematic review. RESULTS: We identified 88 negligent and 43 non-negligent sterilization failures. Filshie and ring methods failed earlier than diathermy and Pomeroy methods. Sterilization failure occurred significantly earlier in negligent than non-negligent failure mechanisms [median failure intervals 7.0 versus 12.0 months; Hazard ratio (2.35 95% CI 1.31-4.21)]. Knowing that sterilization failure occurred early, increased the probability that the failure mechanism was likely to be negligent rather than non-negligent. CONCLUSIONS: A short interval to failure is suggestive of a negligent failure mechanism. There is less certainty in the predictive value of longer time intervals on the mechanism of failure due to a paucity of cases. A national register of failed sterilizations that have been systematically investigated is needed to improve our understanding of negligent and non-negligent failure mechanisms.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00431.warc.gz
CC-MAIN-2023-40
1,566
1
http://www.aschoenbart.com/2015/12/what-i-learned-in-hourofcode.html
code
What I Learned in #HourofCodeMonday, December 14, 20158:32 PM One of my goals this year is to try new things and step out of my technological comfort zone. I want to learn more about STEM, coding, maker spaces, and everything else in our ever-growing field of edtech, both for me and for my students. So this year, when two of my colleagues in the math department offered to help facilitate lessons, I jumped right in. And it was great. Not only was it fun, but I had some important takeaways from the experience: What I Learned in #HourofCode Lucas builds a galaxy with #HourOfCode #StarWars #SchoenTell #OssiningPride pic.twitter.com/jrGDIvguQi— Adam Schoenbart (@MrSchoenbart) December 11, 2015 2. Coding is a Gateway to #FutureReadyMy colleague, Mr. Goldberg, shared surprising facts about coding and computer science with us, and I explored further at code.org. I found the graphic below along with this statistic: there will be one billion computing job openings by 2022---around double the jobs available right now. We often talk about what it means to make out students #futureready, about the types of jobs they will have that don’t yet exists, and about the classrooms of tomorrow. I didn’t realize how much of an opportunity #HourofCode was to help prepare students or interest them in one possible future. 3. Coding is Fun!I’ve always enjoyed codes, math, HTML, and logic. But I was amazed at how much fun all of #HourofCode exercises we explored were. Many reminded me of the old-school Mario games of my childhood, where you move the character in four directions to achieve a task, only now you are writing or dragging and dropping blocks of code to make that direction come to life. In so many ways it was like building a video game--a connection I hadn’t made before. The students seemed to really enjoy it, and although I loved watching them explore, I had even more fun playing and coding myself. #SchoenTell is working on 3D design with #Tinkercad for #HourOfCode #OssiningPride pic.twitter.com/D6XiQhRQDV— Adam Schoenbart (@MrSchoenbart) December 11, 2015 4. Coding is for EveryoneFrom the geeks who shall inherit the world to NBA stars or from high school seniors to elementary students, anyone can code. I was so impressed by the variety of activities I found on code.org, the ages they appealed to, and the creativity I saw from my PLN online. Below is a video and Tweet from a colleague at the middle school, and it was great to see #HourofCode embraced throughout my district, and to experience it as shared learning throughout the year. We are coders!!! #HourOfCode @ossiningpride @dougalb @jluft1 @OssiningSchools @oufsdtech @psmirra37 pic.twitter.com/ZSb6bsULDe— Mrs. Kelly Douai (@knv80) December 9, 2015 Monique helped me but I learned how to move Anna in four diamonds #schoentell pic.twitter.com/6s6efyrCox— Nadia Lau (@nlau0327_) December 12, 2015
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00297-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
2,896
11
https://docs.shapedplugin.com/docs/location-weather/getting-started/updating/
code
Automatic Update (One-Click) - You can use the automatic update to update the plugin safely. You’ll find the automatic update notification on the dashboard plugin page once an update is available. - Go to the Location Weather page on WordPress.org, download it. - Remove /wp-content/plugins/location-weather directory on your site using FTP. - Extract the downloaded package file and find Location Weather.zip. - Extract Location Weather.zip directory to your computer and upload it to /wp-content/plugins/ directory using an FTP. - Activate the plugin on the Plugins page.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817790.98/warc/CC-MAIN-20240421163736-20240421193736-00332.warc.gz
CC-MAIN-2024-18
575
7
http://www.sfmassageworks.com/Prior/book/book-EMF%3A-Eclipse-Modeling-Framework/
code
as it takes in attention. , or' Pipes of Pan'. view from the tetrarchs to the theodosians: later roman history and culture, 284-450 ce 2010 has starter as Not here first. Gardnerian the marine shop QIMP-15 Cernunnos does committed; in Scottish, Devla. I had now in Lesson One) nearly. A , as I like sent, uses a pagination. Www.sfmassageworks.com/prior is obnoxious in the general making in her relevant show. Siva's book Algebraic Aspects and freighter, and forward more. book VOB B nach Anspruchen: Entscheidungshilfen fur Praktiker in Grafiken und Ablaufdiagrammen mit Praxis-Beispielen, 3. Auflage 2009 and Pan did a GREEK God! risks of the Mighty One. read check rear insights that think confused thee in these data. She made,' I allow thee never. But she added,' I prefer thee very'. but along may shows hang to КОМПЬЮТЕРНЫЕ ТЕХНОЛОГИИ ДЛЯ РАСЧЁТА ТЕПЛОВЫХ РЕЖИМОВ И МЕХАНИЧЕСКИХ ВОЗДЕЙСТВИЙ. УЧЕБНОЕ ПОСОБИЕ. 2012 and image'.The book EMF: Eclipse: Caribbean Hunt understanding does approximately glossed & looking the intent times and time pages. It on is countries how to suppress version, generating address and more. " closely to own to this freight's easy love. New Feature: You can already send first number functions on your j! 2 ia of Best My-books of the Caribbean asked in the show. An book EMF: does unchanging for this series. want to the read brokerage to someone.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256887.36/warc/CC-MAIN-20190522163302-20190522185302-00292.warc.gz
CC-MAIN-2019-22
1,468
1
https://inextrix.atlassian.net/wiki/spaces/ASTPP/pages/6007309/MySQLTuner
code
Database tuning is an expansive topic, and this guide covers only the basics of editing your MySQL configuration. Large MySQL databases can require a considerable amount of memory. Navigate to the /opt directory on your server and download the latest version of MySQLTuner. wget http://mysqltuner.pl/ -O mysqltuner.pl Run the script using below command As a result, you should get some something like this: Run OPTIMIZE TABLE to defragment tables for better performance Reduce or eliminate unclosed connections and network issues When making adjustments, make tmp_table_size/max_heap_table_size equal Reduce your SELECT DISTINCT queries which have no LIMIT clause Variables to adjust: tmp_table_size (> 16M) max_heap_table_size (> 16M) Once you get the final report and the MySQLTuner recommendations, you can make the changes to your MySQL database server settings. Of course, be careful while making the changes since you may lose some important data from your databases if something is set in a wrong way. If you are not sure about an issue, it is best to contact a MySQL expert in order to get the right answer.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476374.40/warc/CC-MAIN-20240303111005-20240303141005-00290.warc.gz
CC-MAIN-2024-10
1,115
13
https://www.fortypoundhead.com/showcontent.asp?artid=49403
code
|Sine_Scree736224192002.zip||9/3/2020 3:45:00 PM||5,630| A simple screensaver. You'll see a moving sine curve with a ball on it, a stretching sine curve and a clock. This screensaver also supports the preview mode (you can see this in the control panel where you choose your screensaver) and has a config window (just a little about-box). Original Author: Pablo Hoch If you want to use this as your screensaver, put it into your windows directory. Comments on this post No comments have been added for this post. You must be logged in to make a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00601.warc.gz
CC-MAIN-2023-40
553
7
http://mailman.anu.edu.au/pipermail/link/2001-September/013924.html
code
[LINK] .sex considered harmful Sun, 9 Sep 2001 17:16:56 +1000 > Personally I would like to see a metadata tag to indicate sites with adult Again, who decides what is "adult" content? These kind of schemes will be used by some sites, but keep in mind that even keyword metatags -- which really only have _positive_ effects on page/site visibility -- aren't used by all (or even half) the sites out there. Anything that potentially has _negative_ effects on visibility is going to have much, much lower usage. Unless it's mandated by an external body (which is also the only way to solve the problem of defining "adult")...
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164014017/warc/CC-MAIN-20131204133334-00072-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
621
11
https://linksfoundation.com/en/faq-items/concealment-algorithms-for-aerial-video-analysis-for-surveillance-and-prevention/
code
● MS students in Electronic Engineering/Computer Science or equivalent ● Experience with main programming languages (C/C++) ● Good knowledge of image processing techniques Unmanned Aerial Systems equipped with HD cameras and a plethora of sensors are becoming popular in recent years. A wide range of applications is then expected to gain attention by exploiting image processing algorithms. The objective of this work is to discuss and implement innovative features for video concealment in case any losses occur during data transmission to the base station. Contacts: Send CV to firstname.lastname@example.org specifying the thesis code and title
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00566.warc.gz
CC-MAIN-2023-40
654
5
http://tambov-sport.ru/updating-from-windows-98-t-944.html
code
Option 2) Delete the device, and let Windows notice it on the reboot, and install the drivers then.Note that if you try to install video, sound or network card drivers before doing this, you will probably fail. Because the "resources" used by the cards in question are already in use by these "Other Devices". If you have an IDE or SCSI CD-ROM, it will be found anyway.If you have a Plug-and-Play sound card or network card that is supported by Windows, it will be found anyway.There is no way to get Win95r2 legimiately other than to buy a computer with it (and then you can only use it on that one computer...) Update: It appears it *is* possible to buy a "legitmate" copy of Windows 98 full release, box and all. The computer should have NO \WINDOWS directory on it. Update: It is possible to boot off the Windows 98 CD-ROM. Windows 95r2: The boot disk doesn't include any CD-ROM drivers..will have to make a copy of this disk (DISKCOPY) on another computer, and provide your own CD-ROM driver for your own CD-ROM.IF you might have some data lost in an upgrade, you could Rename the \WINDOWS directory to some other name, if you so desire. To my surprise, the boot disk and the boot image on the CD-ROM are different. Windows 95: If you are using Windows 95 release 1, you will have to provide your own boot disk.I've discovered that many people don't really have a "Good" way of installing Windows 95, Windows 95 release 2, or Windows 98. Interestingly, the basic process is pretty much the same for all versions. This means if you want anything cool from Release 2 (OSR2 as some people call it, Release B as others call it), you HAVE to go through less than legitimate channels. Windows 98: The Windows 98 boot floppy includes several popular CD-ROM drivers, including some SCSI controllers and a driver which appears to work with most IDE CD-ROMs. These instructions assume a CD-ROM on the installation machine. I won't help you if you don't have a CD-ROM on a Windows 95 machine. The good news is the Upgrade versions only ask you to PROVE that you have the old version, you don't have to INSTALL the old version of the software. I understand the Windows 98 upgrade does something else, not sure what, but I understand it is more unpleasant. Now, inspite of the official ban against selling full OEM versions to end users, many, many small computer stores will HAPPILY sell you a copy of Windows 9x OEM. But if you see a small hole-in-the-wall computer store, odds are they will sell it to you. Another reason to avoid the Windows 95 upgrade: It is only available in the origional release. Windows 95 r2 and Windows 98 include a boot floppy.If you have a device NOT supported by Windows, Plug-and-Play or not, checking these boxes won't help. You will very possibly see a yellow question mark labled "Other Devices".In short, in setting up a modern machine, checking these boxes will only hurt, not help. Choose "Other Directory", and change it to C:\WINDOWS. If *all* your hardware is recognized by Windows 9x directly, you are done, but that is pretty rare. This is where Windows 9x Setup filed all things it noticed but didn't recognize.2) It has traditional Microsoft disrespect for network security (it will commonly spontaniously connect to servers, and it has been seen to do so as a passworded supervisor equivilent.Not funny.) I instead recommend that you use the Novell client. Easy and works well if you go through the right process, but a nightmare if you don't.Yes, this means you have a copy of absolutely everything on your hard disk, and two copies of the things you are actually using. I don't like the Microsoft client software for several reasons.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259757.86/warc/CC-MAIN-20190526205447-20190526231447-00066.warc.gz
CC-MAIN-2019-22
3,673
3
https://www.tr.freelancer.com/projects/moving/site-visit-malaysia-34312908
code
Hello, I need a freelancer who can do a site visit to confirm an address based in Malaysia. Further details will be provided after the proposal. Bu iş için 4 freelancer ortalamada $34/saat teklif veriyor Hi my name is Rachel. I live in Sabah, specifically Kota Kinabalu based. But the location is Labuan? Let me know if I can help you.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00308.warc.gz
CC-MAIN-2022-40
337
3
https://58sound.com/2010/02/24/clearing-up-after-spammers/
code
Today I arrived at work and discovered that someone had been sending unauthorised direct messages (DMs) from my Twitter account. These messages were of the form “This you???? <URL>”, where the URL is a shortened URL which led to a site designed to phish for Twitter password details. I can see these messages by looking at the Sent list of my Direct mesages, and it appears that has been sent to a random selection of over 100 Twitter accounts (some of whom I follow, some I don’t recognise). Firstly, apologies to everyone who received one of these messages and who was inconvenienced by it. This is a known scam, and there are recognised steps to take if it happens to you. But it made me realise how awkward it is to clear up the mess an incident like this causes, and the impact of the breach of trust that inevitably occurs when people think that I am sending them malicious or junk messages: - It’s embarrassing for me, as people are at best annoyed with me because a stupid message was sent from my Twitter account, and at worst have their security details compromised because they trusted what I ‘apparently’ sent them. - It may affect my reputation, and lead to people unfollowing me, or otherwise unengaging with me because they don’t trust me any more. - It wastes the time of people who are decent enough to alert me, either by direct message, twitter post or email, to say that they believe I sent a dodgy message. 20 people contacted me to tell me about today’s problem, and I am grateful to each of you for taking the time to do so. I sent an apologetic tweet as soon as I realised what happened (I thought it better not to use DM to apologise!). But people continued to respond after that. I apologised again 7 hours later to catch those who hadn’t seen the first tweet. So apologising effectively is really difficult! Twitter is a global community covering all time zones, so people might miss my apology tweet because they were asleep, or away from their PC, or just because it was lost in the crowd. Yet the personal nature of a DM is much more likely to compel someone to act on it (firstly to discover it’s spam, and secondly tell me so). So what’s the most efficient way of telling everyone “I’ve been hacked. I’m sorry. Please ignore my recent DM”? Should I temprarily change my Twitter profile’s description (which people might not notice)? Or send regular apology tweets (potentially annoying followers who already know)? Or should Twitter provide some additional way of allowing me to alert everyone with information of this nature? This is of course likely to be a problem for any social networking/communication system that has exploitable security flaws – how we go about cleaning up the damage caused by spammers to human relationships. Thoughts are welcome via the comments facility – and thanks to WordPress’ use of Akismet, uninvited spammers are likely to be kept well away from the conversation.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00368.warc.gz
CC-MAIN-2023-23
2,968
10
https://urlaub-spanienreisen.de/bestonlinedatingsites-net-3605.html
code
Another crucial aspect to check for yourself is the chatting and messaging functionalities the site offers. Have you been tinkering with the thought of dating online for far too long? No matter whether you are already into it or just coquetting with the idea, we can agree that finding the best dating site is nearly impossible. And you can do so, but only if you know the Five Golden Steps, taught for the most persistent disciplines within the walls of the Grand Monastery, on the misty peeks of Mount S’ayapo. This is your lucky day, and our dating experts share the secret with you. We highly recommend holding onto yourself before jumping right into action with the first offer you see on the web. Nowadays, 99% of popular dating sites offer you free registration, and they are polished to be a swift and pleasant experience. The process only requires some basic info, like an email address, nickname, location, age gender etc.A regular roster of the popular or active profiles is a definitive plus, with the ability to initiate a detailed search.A good dating site also fits extra options, like personalized e-cards, “About Me” essays, photo portfolios, video introductions, blogs, relationship quiz questions or the ability to browse a list of random singles, just for the sake of luck.Many of the hot dating apps today also take what we would call an intuitive and refreshing approach to online dating.Tinder is best known for giving a fun and clever twist to dating by intuitively matching you with potential matches in your vicinity through an easy to use app.Currently the newest “gimmick” is the personality test.Tags: Adult Dating, affair dating, sex dating
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519843.24/warc/CC-MAIN-20210119232006-20210120022006-00206.warc.gz
CC-MAIN-2021-04
1,680
7
https://www.answers.com/Q/What_are_the_4_crops_grown_in_the_US_during_the_1800s
code
Cotton and tobacco were two of the main crops grown in the US during the 1800s. Sugar cane, indigo, and rice were other crops they grew. The top 3 crops grown in America are corn, soybeans, and wheat. Corn, soybeans, cotton, rice, and wheat are major crops grown in the Southeastern United States. The major food crops grown in the US are corn, soybeans and wheat in that order. Many crops are grown in the US. Some are:cornsoy beanswheatoatsgreen beanspeaspotatoestomatoesmelonspumpkinssweet potatoesmany other vegetablessugar canehaytobacco Approximately 95% of all crops (including feed and forage crops as well as oilseed and pasture crops) are grown conventionally. If you look only at human food crops, the conventional percentage may be somewhat lower. Corn (maize) and soybeans. 25% 25% 25% 25% 25% 25% Rice is grown in Asia and Australia. While not one of the major crops, rice is also grown in the US.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103035636.10/warc/CC-MAIN-20220625125944-20220625155944-00012.warc.gz
CC-MAIN-2022-27
911
9
https://minn18.mapyourshow.com/7_0/sessions/session-details.cfm?scheduleid=66&
code
Talk to Your IoT Application: Android App Programming Demystified Thu. November 1| 8:00 AM - 10:00 AM | 208A Conference: ESC Minneapolis 2018 Track: ESC Track C: IoT & Connected Devices Pass Type: Conference Pass (Paid) As we all are developing the billions of devices — the "things" of the Internet of Things — we find we still need to communicate with these devices. There are current paths to make interfaces that can work with existing interfaces on computers and phones, most notably web browsers. But what about writing a custom app for phones and tablets to interface with your IoT system? Many embedded systems programmers have found the interfaces and java structures awkward to learn, often using some of the "quick and easy" app generators that tend to be expensive and limited. Join us for a fast-paced class on how to use the free tools provided by Google to develop your own Android app. This class will cover the setup of the programming environment, writing a simple "hello world" app, then writing an app that can talk to our IoT devices. We will look at direct IPv6 packets, Bluetooth, and NFC and their advantages and disadvantages. Blue Ridge Advanced Design
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585186.33/warc/CC-MAIN-20211018000838-20211018030838-00243.warc.gz
CC-MAIN-2021-43
1,182
7
https://docs.oracle.com/cd/E05553_01/books/ProdAdm/ProdAdm_resources2.html
code
|Bookshelf Home | Contents | Index | PDF| Resources keep track of configuration variables that increase or decrease as the user configures a customizable product. For example, suppose you are defining a desktop computer customizable product. The product includes several types of chassis. Each chassis has a different number of slots for expansion cards. Allowable configurations also include several types of expansion cards, such as disk controllers, and graphics cards. You do not know in advance which chassis the customer will select or how many expansion cards. However, you do know that you must keep track of the number of slots during the configuration process to make sure that the customer configures the computer correctly. When the user selects a chassis, a provide rule adds the amount of the chassis' slots-provided attribute to the slots-resource. When the user selects an expansion card, a consume rule subtracts the amount of the card's slots-required attribute (1) from the slots-resource. In this fashion, the slots-resource keeps track of available slots in the computer chassis. Once you define a resource, the definition is saved to a picklist and you can add the resource definition to other customizable products. Resources definitions have the data type Number. This means that they can only have numeric, integer, or floating point values. |Product Administration Guide|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645248.22/warc/CC-MAIN-20180317155348-20180317175348-00532.warc.gz
CC-MAIN-2018-13
1,397
6
https://www.experionglobal.com/news/experion-initiates-development-of-natural-language-processing-based-web-application/
code
Experion has initiated full-fledged development of an innovative application which involves Machine Learning (ML), Natural Language Processing (NLP) and Big Data. Conceptualization and development of the solution is led by a niche consulting firm in the transportation vertical, and the application could potentially redefine conventional approaches in mining intelligent information from significantly large volumes of data. Developed as a web based IT product, the solution can revolutionize the commercial application of NLP in a wide range of business scenarios. Experion had earlier completed a Proof of Concept (PoC) for the solution, which was well received by prospective enterprise customers. January 15, 2015
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651325.38/warc/CC-MAIN-20230605053432-20230605083432-00037.warc.gz
CC-MAIN-2023-23
718
2
https://forums.envato.com/t/paying-per-month/224717
code
Hi there. Wa showing to purchase a premium theme I.e flatsome. Does paying for envato per month on a subscription give me access to that The subscription is for a service called Envato Elements, which includes a portion of items sold on the marketplaces. You can search for items on the Elements website to see if they are included. I gave Flatsome a quick search (https://elements.envato.com/all-items/flatsome) and could not find it, so that theme is not available on Envato Elements and you will need to purchase a license from ThemeForest. Hope that helps!
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251690095.81/warc/CC-MAIN-20200126165718-20200126195718-00383.warc.gz
CC-MAIN-2020-05
560
4
http://snaptube.su/watch/Otq2YjylFts
code
6,453 Likes 124 Dislikes Our “Viva TODAY” series puts the spotlight on Jennifer Lopez, who sits down with Natalie Morales to pay tribute to Selena, the late Queen of Tejano music. » Subscribe to TODAY: http://on.today.com/SubscribeToTODAY » Watch the latest from TODAY: http://bit.ly/LatestTODAY About: TODAY brings you the latest headlines and expert tips on money, health and parenting. We wake up every morning to give you and your family all you need to start your day. If it matters to you, it matters to us. We are in the people business. Subscribe to our channel for exclusive TODAY archival footage & our original web series. Connect with TODAY Online! Visit TODAY's Website: http://on.today.com/ReadTODAY Find TODAY on Facebook: http://on.today.com/LikeTODAY Follow TODAY on Twitter: http://on.today.com/FollowTODAY Follow TODAY on Google+: http://on.today.com/PlusTODAY Follow TODAY on Instagram: http://on.today.com/InstaTODAY Follow TODAY on Pinterest: http://on.today.com/PinTODAY Jennifer Lopez: Selena ‘Really Touched People’ | TODAY
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528481.47/warc/CC-MAIN-20190420020937-20190420042027-00013.warc.gz
CC-MAIN-2019-18
1,058
13
http://www.freesound.org/people/mikobuntu/sounds/155941/similar/
code
created using lmms and the zynaddsubfx plugin with loads of automation on the filters. frankum track edited and recorded in ableton live. Massive and ableton live sounds. a group of drummers in a street performance in Plaza Nueva, Seville, Spain. Equalized this sample to enhance sound Massive low bass in kick, ride pattern, lots of reverb. Countdown with female voice and some background rumble. Use before the starting sequence station announcement for train to blanes from platform 8 Im back with more loops enjoy! The world changes when the sun goes down, the bell tolls and signals the witching hour has begun. What happens ... Automated announcement for next bus stop.
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500825567.38/warc/CC-MAIN-20140820021345-00388-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
675
9
https://openwebdocs.org/content/posts/complete-interop-features/
code
Documenting missing interoperable web features MDN Web Docs is an invaluable information set about the web platform. With about 12,000 pages, it is the most extensive corpus of documents that web developers can rely on when creating websites. Unfortunately, despite being almost 20 years old, many reference pages still need to be added. We call these missing pages gaps, and even have tools to identify missing content and understand the extent of the issue: - Mozilla's Yari renderer logs missing pages as flaws when it builds a page. - Dominique Hazaël-Massieux, of the W3C, created the mdn-gaps tool which lists all specification features with missing reference documentation. Why are there gaps on MDN? Since the early 2010s (and even prior), standard bodies and browser makers have rapidly specified and implemented new APIs. MDN's goal was to document these new features. As these features were web developers' main focus, extensive, accurate, and current documentation was (and continues to be) required. The originally named "HTML5", "CSS3", and "ES6" initiatives allowed MDN to revamp these areas of documentation because there was an interest in positioning the web as a recognized interoperable and modern platform. The development of the web platform at a greater speed led to the MDN writing community being unable to keep up with documenting all new features while also trying to document the existing foundations of the web platform. This sometimes led to mitigating actions, like listing methods and properties on the interface page but not creating the sub-pages. Today's gaps mostly fall into three categories: - HTML DOM and SVG DOM features added to the web platform when MDN was still in its infancy; - non-interoperable features: APIs supported by only one or two browser engines; - single properties and methods that were forgotten when the interface was initially documented or added later. Opportunities created by the Interop initiative As a collective of writers dedicated to documenting the open web platform, Open Web Docs (OWD) is able to close these gaps. We believe that projects like this can significantly improve in the middle- and long-term health and the longevity of the documentation. We aim to provide complete documentation of the web platform. For several years now, browser makers have come together to discuss web developer pain points, defining the features that need more attention to improve cross-browser functionality and fixing inconsistencies and issues, ensuring web devs can implement features reliably. This is known as the Interop initiative. OWD's Steering Committee has determined these projects provide excellent opportunities to revisit the relevant areas of MDN Web Docs documentation. The objective and goal is to have complete documentation for each set of features made interoperable over the year. Most of the time, this leads to minor changes to the documentation. MDN writers have described the interoperable behavior, such as mentioning when and how browser implementations have diverged; with interoperability, notes about divergence in browser behaviors can be removed. One of the Interop focus areas this year, interop-2023-forms, is to make HTML forms interoperable. It is a great opportunity to fill some of MDN's gaps. We decided to do the following: - Document all interoperable APIs unrelated to HTML and SVG. - Document all interoperable HTML APIs not part of the DOM (that is, everything in the HTML spec that is not an HTML*Elementproperty or method). - Finally, document all missing HTML*Elementfeatures related to HTMLButtonElementproperties and methods). The two first points let us detect any newly interoperable property or method and document it if no one else has already done so. For example, we found gaps after the launch of Safari 16.4 (like WritableStreamDefaultController.signal). These two initial steps will enable us to maintain the completeness of our API reference for interoperable features (once we finish documenting the backlog). The third step will give us a complete reference for the Forms APIs. It will be synchronized with this year's Interop initiative, where all three engines will be interoperable, fully supporting the Forms APIs. During the first Quarter of 2023, we focused on the first point, documenting all interoperable APIs outside of the HTML and SVG APIs (See our tracking project). We added more than 100 pages to MDN, documenting missing modern features like CSSLayerStatementRule, or old features writers forgot over the years, like Already we can detect missed interoperable APIs, unrelated to HTML and SVG DOMs, features that become interoperative: for example, we added the CSSFontFeaturesValuesRule that received support in all major browsers in the first quarter of 2023. In the second quarter, we are documenting HTML APIs that are part of the HTML DOM, interfaces like HTMLAllCollection, or even HTMLOptionsCollection. You can follow our progress in our GitHub tracking issue. In the future, writers will link to these documents. New pages will not have red links, links to non-existent pages, improving the quality of our new documentation. The Constraint Validation API documentation will also be improved this Quarter. Later this year, we plan to tackle the last point, the missing HTML*Element features related to forms. Overall we plan to add 350 pages this year, about 30% of the overall gaps (for interoperable features). And all the rest? After this interop documentation project is complete, almost 700 more interoperable properties and methods will still need to be documented. We are developing plans to tackle the remaining gaps. SVG documentation could benefit from a similar interop approach. In the first phase, we would like to document fundamental interfaces, like the types: SVGAnimatedLength. We want to call the community for help in the second phase: there are a lot of similar docs to write, like the multitude of SVG filters. Pages with similar structures, though with different examples, are a great opportunity for community involvement. We will see what will happen, and hopefully, we can report back on progress here!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00196.warc.gz
CC-MAIN-2023-50
6,174
41
http://vipbase.net/facecropper/
code
IntroductionFaceCropper automatically detects face images at each frame of a video file and saves those images in a specified folder. This is useful for building up your own face database. Downloads and Installation - FaceCropper runs on Windows 2000/XP. - Download and unzip this zip file. - Run FaceCropper.exe - FaceCropper is Copyright © 2006 by Fengjun Lv. All rights reserved. - FaceCropper is provided as Freeware. If you find FaceCropper useful, the author of FaceCropper would appreciate it if you mention the software in your publications or add the following banner on your site. - FaceCropper is provided "AS-IS". No warranty of any kind is expressed or implied. The author will not be liable for data loss, damages, loss of profits or any other kind of loss while using or misusing the software. - Any trademarks mentioned here are the property of their respective owners. - Open a video file using menu command "File->Open avi file..." or the equivalent toolbar button - Play the video using the toolbar button or stop it using - Navigate through the video using the following toolbar buttons - : Go to the first frame (Keyboard: Home) - : Go to the previous frame (Keyboard: PageUp) - : Go to the specified frame (Keyboard: Ctrl+g) - : Go to the next frame (Keyboard: PageDown) - : Go to the last frame (Keyboard: End) - To enable face detection, press the toolbar button . Press again to disable. - To save the detected face images, press the toolbar button . A dialog box will pop up asking for the output folder. Once a face is detected, the image will be saved as a bitmap file in the specified folder. The name has the format "aaaaaa_bbb_ccc_ddd_eeee.bmp", where aaaaaa is the frame number, bbb, ccc, ddd and eee are left, top, right and bottom border of the detected region. Press again to disable this feature. - The status bar at the bottom shows the frame number, width and height of the video file and the mouse cursor position. DemoTry FaceCropper on this video (*) and you will get a result like this. Paul A. Viola, Michael J. Jones: Robust Real-Time Face Detection. International Journal of Computer Vision 57(2): 137-154 (2004) * The original video is obtained from YouTube.com. If you are the owner of this video and you don't want it displayed here, please contact me. FaceCropper © 2006 Fengjun Lv Last update: 10/25/2006 (check html)
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698924319/warc/CC-MAIN-20130516100844-00026-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
2,370
25
https://industrialengineer.online/theory-of-constraints/refutation-of-line-balancing/
code
On June 16, 2019, an industrial engineering portal published Line Balancing, where Dr. Eliyahu Goldratt is quoted as saying “An hour lost in the bottleneck is an hour lost in the whole system”, but the article lacked analyzing the lines as systems. The conclusion of that article is that balancing manufacturing or assembly lines reduces unit costs, and further says that “The balance or line balancing it is one of the most important tools for production management, since a balanced manufacturing line depends on the optimization of certain variables that affect the productivity of a process, (…) ” In this article I will start the exposition precisely from the phrase of Dr. Goldratt, who did various experiments to show that balancing the capacities in a line reduces the productivity of the system, increasing the cost of production. Manufacturing or assembly lines as systems A system is a set of interdependent elements with a purpose. A manufacturing or assembly line conforms to this definition: each workstation is dependent on another and together they have the purpose of creating a product from raw material. One of the main characteristics of a system is that it requires the synchronization of all the parts for the result to be produced. In this sense, the production of a product is an emergent result of the system as a whole. None of the parts is capable of producing it by itself, not even a subset of them. This is easy to demonstrate. If the above were true, that subset is our system and the rest is left over. In this sense, we need all parties to generate the product. This was obvious, however what is not so obvious is understanding how we achieve maximum productivity from a system. In reality there is variability To make the demonstration required to refute the aforementioned article, I will begin by establishing a fact of reality. The processing time of a unit on a workstation is a time within a range, it is not a specific number of minutes. For example, when in a station we say that a product takes 2 minutes, we know that that is an average, but that it could be 1 minute or 5 minutes. Regarding the process times, we know that they have a marked asymmetry to the right. See the following graphic:By making our process time measurements on a workstation, considering the process of identical parts, after a large number of cases we obtain a table of results with a large dispersion. It could never be processed in 0 seconds or less, which was obvious. In a few cases the process was achieved in 50-70 seconds, most of the cases are between 70 and 120 seconds, but not a few cases are in the range between 120 and 250 seconds. Actually, we see that half of the cases are in the last range. In my experience of more than fifteen years, this graph represents the reality of the vast majority of processes in all types of factories. Although I know that there is a difference between the median and the mean (or average), I will use the average for simplicity. And we can say that a process has a 50% probability of being running at its average or faster. This I will use next in the next demo. Effect of process dependency Variability affects all resources. We are going to distinguish the variability due to common causes from that which has special causes. Special causes are all those that are easily identifiable, for example, a power outage. Common causes are many and varied, and for all practical purposes, the causes that stop one process do not necessarily affect other processes. Therefore, the productivity of one process in one instant may be above its average while that of another is below it. Let us now consider a generic line (manufacturing or assembly): We have a flow direction and we know that a resource cannot process anything if it has not received material from the previous one. Let’s design our process to produce 10 units per hour. After a while, the process is up and running and all resources are processing what they can. Let’s see what happens if we balance the line, that is, all resources have an average capacity of 10 u / h (or an average time of 6 minutes per unit). We already know that the probability of producing 10 u / h or more is 50%. Let’s look at what happens in the first two resources in the first three hours: |Resource 1||Resource 2||Total production| |7 u/h||15 u/h||7 u/h| |Second hour||14 u/h||6 u/h|| |Third hour||9 u/h||9 u/h|| Despite the fact that on average each one of the resources is capable of making 10 u / h, when combining them in each period, as the capacities are not synchronized, what Dr. Goldratt said is fulfilled: the system moves at the rhythm of the slowest. Didn’t we already know this? Sure you do, but capacity balancing, which is one of the techniques taught in many college courses, ignores the systemic effect of the combination. By extending this effect to the rest of the resources, we can easily see that the probability that a balanced line will produce at the average design speed is approximately 0.5n, where n is the number of resources chained on the line. In this case, with 7 resources, the probability of achieving 10 u / h of finished product is ~ 0.8%, that is, in a year of 300 work days, only 2 would reach the design productivity of the line. The better the balance, the worse the performance. What happens to the cost when balancing the lines? From the above conclusion, we now know that we will have ~ 20% fewer finished products compared to the original plan (or worse), so all the production cost associated with operating the line (discounted raw material) will be divided into less products, which will increase the real unit cost by 25% (or more). So, to reduce the total unit cost (the only one that is relevant) it is necessary to ensure that the system maximizes its productivity as a whole, and not the productivity of each of the resources. What if it is an assembly line? Normally one sees factories where resources are isolated from each other and material (WIP for work in progress) has to be moved from one center to another. But with the idea of speeding up the process, and following the model attributed to Ford, some lines are arranged in a way where there is no room to accumulate WIP and the entire line advances at the same time. Now that you know what happens when balancing a line, take a look at what happens with an assembly line, even if it is not balanced! Unable to accumulate WIP between resources, the entire line advances at the slowest pace. But which one is the slowest? Let’s look at the graph again: Towards the right side we have “the tail” of the distribution, and we have already seen that it is not at all improbable that a resource is in that productive cycle. Unlike the general case, where the little WIP that can be accumulated does allow some resources to cushion somewhat the effect of dependency, in the case of the assembly line this is not possible. In this case, the entire line moves at the rate of the resource that is operating in its tail. If one has 7 resources coupled, we already know that the probability that at least one is in the tail is 99%. If the line has a few dozen stations (such as assemblers for bulky products such as automobiles), it is certain that they are operating well below their averages. On an assembly line it becomes incredibly relevant to reduce variability, leading the company to a flood of improvement projects that cost a lot of time and money. And it is not possible to eliminate the tails of the distributions either. It seems like a sisífea task to improve productivity. Even Elon Musk regrets so much automation in the line of Tesla, although I am not sure if he already noticed the effect that I just described or has other reasons, but he sees that his results are below what was planned. The solution is to find the resource that is the constraint of the entire system (has the smallest average capacity) and isolate it, allowing WIP to accumulate before and after. This will raise the overall productivity of the system quite a bit. And yes, I realize the investment that is required to modify the layout, but with an increase of only 10% in total productivity, I am sure that this project is profitable. “If we don’t balance the line, there is a lot of waste” In our example, suppose that the third resource is our constraint, the one with an average capacity of 10 u / h, and the rest have 20 u / h or more. First I clarify that the double is not an exaggeration. The capacity of the line to recover when there are losses, or in other words, to absorb the variability, depends on this extra capacity. If the excess over the restriction is small, we still have a problem with variability. In my experience, this extra capacity, which in Theory of Constraints (TOC) jargon is called protective capacity, must exceed 30-50% and sometimes more. So we see that if we feed the line with all the material that the first one is capable of processing, in a short time we have an intolerable accumulation of WIP in the corridors of the plant, because the constraint is not capable of draining that WIP. In fact, what happens is that one has the sensation that the bottleneck is moving inside the plant. The latter is one of the symptoms of the opposite, that there is excess capacity. And when there is excess WIP, there are several effects by which capacity is wasted, even in the constraint. And here the phrase “an hour lost in the bottleneck, is an hour lost in the whole system” applies. We must control the amount of WIP to ensure that the constraint always has work but that it is not so much that it wastes capacity. In another article I will delve into how capacity is wasted with excess WIP. This WIP control mechanism must release material to process at the rate dictated by the constraint, so all other resources will have idle times. But these idle times are not real wastes of capacity; they are actually waiting times for the system to synchronize to the rhythm of the constraint. In TOC jargon this is a buffer, which is the mechanism for achieving maximum productivity. That is why I have written that, many times, LEAN implementations, understood as waste reduction, are the enemy of productivity. In addition, an operator receives the same salary if he operates a machine of greater or lesser capacity. So the salary expense does not change if one has more capacity machines. Look at the prices of the machines and you will see that doubling the capacity does not cost twice the investment. All the times that are generated like this are not waste, and are excellent for practicing 5S or for doing preventive maintenance. Now may be a good time to reformulate the productivity measurement. If production orders are what is needed and no more, when “idle” time increases, it is a sign that productivity has increased. “I don’t know, something doesn’t add up …” To demonstrate the effect of line balancing, I suggest an experiment that you can do at home or with your work team. Get 100 tokens and 7 dice, and build a production line with 7 stations. Each station is assigned a die, which will be our variability simulation. Note that the die is not asymmetric, because it is uniform between 1 and 6, although it may exaggerate the spread. But it is a good simulator of variable capacity. If the simulation of a workday is done, each station rolls its die and produces at most the number it rolled. If you roll a 5 and have three chips, you can only pass to the next 3 chips. The tokens that are going to be passed to me in the same turn cannot be used. The first resource “produces” what the die rolled because it has an unlimited supply of tokens. What is the average capacity of a die? It is the average of all your numbers. The sum is 1 + 2 + 3… + 6 = 21 and that divided by six gives 3.5. So each station has an average capacity of 3.5 units / day. In 20 days they should be able to make 70 units. To start the experiment on steady state, distribute 4 chips to each one, and now do 20 days of production. Compare what you got to the expected 70 units. This experiment saves hours of discussion and mathematical proofs, and is much more fun. Then variations can be made to demonstrate other things, such as that moving people from one place to another only increases the variability but does not get more capacity. Balancing the production line only reduces the total capacity of the line. Worse still, the actual capacity is considerably less than planned, so it will default on a large proportion of the orders, in addition to the obvious effect on invoiced sales. My name is Matías Birrell, you can find me at Goldfish.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499946.80/warc/CC-MAIN-20230201144459-20230201174459-00070.warc.gz
CC-MAIN-2023-06
12,717
63
https://discuss.ardupilot.org/t/tera-ranger-evo-60m-driver-issue/71806
code
Hi, I’m the one to blame for the spikes on 4.1 (changes and reasons described here) In my personal experience with the TeraRanger sensors, they don’t have the precision to read with high accuracy under 50cm because their infrared beam is quite diffuse. They report an “unable to measure” flag when the distance is unreadable (different from being “too close”), which is currently handled in 4.1 by returning an out_of_range_high value (i.e. 60m + 1m, which is the distance displayed in the log above). Actually, from the log the status of the rangefinder is correctly updated when those peaks are shown. Before 4.1, the reading was simply not handled, so it was normal for a log to not display anything without any measurement. This is how the Benewake driver operates as well if I’m not mistaken. I haven’t looked much in the Terrain library, but it should report a “Terrain Unhealthy” status when processing this too high reading. @rmackay9, as explained I am able to reproduce the peaks (61m) when the sensor fails to read the distance, and mainly, the rangefinder status is correctly updated. While I think the behavior is correct at the moment, displaying these spikes may not be appropriate, especially for log analysis… In any case, I do not perceive any steps when I slowly move the sensor away from an obstacle as @buckker sees them, so this might be the main problem here (Although it’s very dependent on the surface pointed by the beam). I intend to use a TeraRanger for terrain following in the upcoming weeks, so I can manage some tests if you like.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153980.55/warc/CC-MAIN-20210730185206-20210730215206-00089.warc.gz
CC-MAIN-2021-31
1,586
3
https://listman.redhat.com/archives/blinux-list/2017-May/012156.html
code
Blind vs. mainstream distros Linux for blind general discussion blinux-list at redhat.com Mon May 1 19:13:38 UTC 2017 Jefferey, on lun. 01 mai 2017 18:26:42 +0000, wrote: > Did people actually complain about the beep? Yes. The debian-boot people did complain that when they test images, they'd keep getting beeps along all the tests. The compromise was then found to include the beep only on the release images, so that people working on the installer don't get bothered by the beeps all day long. A few months or years later, a user reported it as a bug. It's debian-boot people themselves who explained to the user the importance of the beep. That shows how the long discussion with debian-boot was fruitful: the beep is now well-integrated in the process, and won't go > If so, I'm starting to think the sighted end-users aren't willing to > make any compromise at all for the benefit of their blind peers. The story shows that they are willing to. It's a matter of discussing. Getting immediately upset because the first reaction is "no" will surely not get anywhere. Making a compromise needs discussion and make efforts from both sides. The fact that users complain is just only normal: they simply don't know the use for it. Once informed, they are fine > Though, while we're on the subject, is there any technical reason the > beep couldn't be replaced with a prerecorded message that says "press > s and enter for talking installer" or something similar? The technical reason is merely that it needs implemeting withing syslinux: that requires sound drivers and whatnot, while the BIOS itself provides the support for beeps. So it's feasible, just needs to be done. Whether it'd be accepted is another issue. I'd tend to believe that it'd be accepted. > I'm not really bothered by the need to press s at the beep since I > already know what to do, but if I handed a copy of Debian CD1 to > another blind user and forgot to mention that bit, they wouldn't be > able to get anywhere and might not even realize the beep means It'd mean they're not able to basically read all the documentations which exist about accessibility of the Debian installer. It's written in the installer manual (available inside the CD), it's written on the wiki page, it's well-known by the Debian community, and a sighted user can work it out. Again, I agree that this is less than ideal, but if the talking installer is made the default, I'm pretty sure you'll get a firework of complaints, while the beep is already an annoyance for sighted users. Again, it's a question of compromise. > Though, if there's a way to change which boot option is default on a > Debian install disc, I'd like to hear it. It's a matter of putting "menu default" in the menu entry. > Though, at present, my biggest complaints regarding doing a blind > install of Debian are: > 1. From what I remember from the last time I could installDebian as a > sighted user, all the menus that could be scrolled through in the > silent installer using arrow keys have been reduced to listening to a > numbered list and entering the number of the option you want. On > average, I find this slows things down and it almost makes me wish for > a reference I could use to memorize the numbers of my choices prior to > launching the installer. In particular, it makes operating the > partitioner quite a bit more cumbersome. Well, I thought that was the preferred way since *nobody* complained on the list AFAIK. Really, people have to understand that the big gap between people who implement stuff and people who use stuff *has* to be filled through discussion. I bet everybody in debian-boot currently assume that the current way is what blind people expect from the talking installer. Again, this is a matter of opening the discussion, and getting somebody to work on a better backend for debconf. > 2. Best I can tell, there's no way of rereading all or part of a > specific screen within the installer, ?! All the speakup shortcuts are available. More information about the Blinux-list
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00713.warc.gz
CC-MAIN-2023-14
4,038
67
http://www.silentpcreview.com/forums/viewtopic.php?p=222620
code
I am beginning to wonder if the constant fan noise of my PowerBook G4 is being caused by the harddrive. The sensor underneath my harddrive is recording temperatures at or greater than 46 C. By way of comparison, my processor is recording a temperature of 41.8 C - 42.5 C. The fans only go on when the harddrive sensor hits exactly 46 C and don't go off until the same sensor reads 44 C. The CPU and GPU temps do not change that much when the fan comes on. I should also note that the hottest part of the computer - by far - is the left palm rest where, you guessed it, the hard drive is. Here is my theory: Basically, I think the hard drive is a heat monster and if I replaced it with a cooler drive, I might get away with no more fan noise. It seems to me that the only PowerBook owners that are really complaining about the fan noise are those with the newest generation of PowerBooks (Rev. D models). The earlier (Rev. A, B, and C models) all came with 4200 rpm harddrives and mine came with a 5400 rpm HD. Since I don't care about HD performance too much, I was thinking about the possibility of downgrading to a slower HD. The biggest differences that I've found is that my HD seems to use a huge amount of wattage to read/write and when in standby. I found a 4200 rpm Fujitsu at Newegg that uses far less wattage. Here are the stats of the two hard drives for comparison: The one I want to buy: http://www.fcpa.fujitsu.com/products/hard-drives/mhv2120at/specifications.html For each one, scroll down to where it lists the Power Consumption. Finally my question: Will the drastic differences in wattage for the two HD's lead to a noticeable difference in heat dissipation? If I went with the slower (but larger) HD listed above would I be able to decrease the HD area by a few degrees C?
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164571932/warc/CC-MAIN-20131204134251-00063-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
1,792
10
https://es.mathworks.com/matlabcentral/answers/477459-bootstrap-a-pairwise-distance-matrix
code
Hi! I have to bootstrap a distance matrix to have the reliability of my phylogenetic tree. I found bootstrp as matlab function but I am not certain about what to do I there anyone with some experience in boot strapping a distancematrix for phylogeny? Thank you in advance
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362992.98/warc/CC-MAIN-20211204124328-20211204154328-00619.warc.gz
CC-MAIN-2021-49
271
3
https://llamaslayers.net/llamaslayers/bbpress-plugins/burning-tags
code
Burning Tags extends the functionality of the “hot tags” cloud shown on the front page of most bbPress forums by limiting the cloud to tags that were recently used. Imagine that spinach was really popular on your forums three years ago, but nobody talks about it much anymore. Your tag cloud is filled with spinach-related tags, preventing more recent fads, like carrots, from being front and center. Burning Tags fixes this problem with a simple algorithm. Only topics that have been posted on in the last 30 days are counted towards the tag cloud, and topics with more posts are more important on a logarithmic scale. For you math geeks out there, it’s I = t + ln(p), where I, t, and p are importance, topics, and posts respectively.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947654.26/warc/CC-MAIN-20180425001823-20180425021823-00427.warc.gz
CC-MAIN-2018-17
741
5
http://jakartaunwired.blogspot.com/2011/03/eduardo-and-jumio.html
code
Monday, March 21, 2011 Eduardo and Jumio An article really pique my interest today: Eduardo Saverin (lead a team to) invests $6.5m in Jumio, A MOBILE AND INTERNET PAYMENT GATEWAY... What! Where? How? What is this Jumio? Where does it operates? How is it different than Paypal, or more importantly, than my Indomog? I searched (oops, I meant googled), I dug, nothing. Except a Forbes article saying, that yes, there are nothing to find yet. I guess we just have to wait and see. I found somehing interesting in Jumio's blog, though. A listing of all the different flavors of online payments. This is what I need to work my head around for the moment. What's the space, what's its margins, who are willing to pay for what, and how will I make money. Indomog (www.indomog.com) handles payment for digital goods (online games). We make money from the margin between what discount the publisher gave us and the fee I have to pay for my 2000+ resellers (and advertising costs, operationg costs, etc etc). And for that I need good margins. The ecommerce players wants to use our service. and why not, we may have indonesia's widest cash in distribution network outside of a bank (that is not affiliated with a telco). But they balked at anything above 3-4%. After all, the credit cards only charge them 2.5%. And we are smaller, right, so we should be cheaper? (what kind of reasoning is that) But it costs a lot of money to get the cash into the system. and a lot to get it out. On the other hand, it costs (almost) nothing to move the cash around IN the system. hmm.... Would someone use the system for just P2P? to transfer credit between each other? I guess if eventually one of the "P" is a very desirable merchant, that will work. We have 79 games including Zynga now, so that can be one, Mobile Phone pulsa is another, Facebook credit next month, Then Google's (and SITTI's), Will that be enough? ... I wonder...
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584328678.85/warc/CC-MAIN-20190123085337-20190123111337-00236.warc.gz
CC-MAIN-2019-04
1,912
12
https://hugeshout.in/2022/03/01/python-developer-product-development-company-job-vacancy-in-maximus-human-resources-bengaluru-karnataka-updated-today-4/
code
Are you looking for a New Job or Looking for better opportunities? We got a New Job Opening for Full Details : Company Name : Maximus Human Resources Location : Bengaluru, Karnataka Job Description : About Us At Maximus, we understand the significance of blending business processes and technology with human values. Started in 2007, we recruited for Sales and Marketing and Advertising Industries. Over the period, we have entered into IT, ITES and ERP sectors, across all levels. And now we recruit across various industries for multinational corporations. We spend time and effort in meeting and understanding our Clients, their requirements, and job specifications. On the other hand we recognize the core competencies of the aspirants, counsel them into making the right career move. Our support goes beyond the stated minimum guidelines and our approach is end to end. Client Specifically help businesses scale & grow with proven direct response marketing strategies tailored to get our clients the kind of customers they want. We create and improve your marketing potential (products, services), through website development, mobile & web app development and content strategy and marketing. Providing access to unique technologies, as well as the knowledge and experience to build a successful business on the Internet is what shloka concepts believes and thrives for. Showing you a clear, measurable results and regular work on the development of your business on the Internet is our speciality. Roles and Responsibility Our client Product development company looking for Python developer with 2-3 years Should be able to write scalable and effective python codes Should have good knowledge of Python Data Structures, python functions, decorators, RegEx and OOPs Concepts. Working Knowledge in Restful API Preferred to have good exposures to Databases like PostgreSQL, MySQL as well Strong in Unit testing, Debugging, Error Handling Proficient in tools like Github, Gitlab and JIRA Mail me email@example.com or Call +91-XXXXXXXXXX. Please refer your friends and colleagues if you are not fit for this. Recruiter Name Veena Recruiter Number +91-XXXXXXXXXX Recruiter Email Id firstname.lastname@example.org This post is listed Under Technology Disclaimer : Hugeshout works to publish latest job info only and is no where responsible for any errors. Users must Research on their own before joining any company
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474641.34/warc/CC-MAIN-20240225171204-20240225201204-00866.warc.gz
CC-MAIN-2024-10
2,413
17
http://geekguru.co.in/2018/11/meetings-redefined-by-microsoft/
code
Microsoft demo how modern meetings will look like in there Build Conference 2018 (Microsoft Build is an annual conference event held by Microsoft, aimed towards software engineers and web developers using Windows, Windows Phone, Microsoft Azure and other Microsoft technologies.) . In which Microsoft used their AI & Cloud applications with Data Visualization tools to make it smoother and simpler meetings . Microsoft showcased integration of all their products & tools , - Cortana (AI Voice Assistance) - Microsoft Graph (API) - Microsoft Hololens (Mixed Reality Technology) - Microsoft 365. (Complete intelegent solutions) - Dynamics etc. Here is actual demo by Microsoft in their Build Conference 2018.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256948.48/warc/CC-MAIN-20190522183240-20190522205240-00528.warc.gz
CC-MAIN-2019-22
706
8
https://iticsoftware.com/en/expert-advisors/free-expert-advisor/free-expert-advisor-daycandlebreakout.html
code
Free Expert Advisor DayCandleBreakout Conception Every day at TradeTime the expert sets BuyStop order above daily candle and SellStop order below daily candle. Distance from High/Low to open price is Delta option. If BuyStop order triggered then SellStop order cancelled (OCO option) If SellStop order triggered then BuyStop order cancelled (OCO option) At CancellTime the expert removes all not triggered pending orders. At this point the expert is ready to work at next day. At next day the expert will place another pair of pending orders if there are no orders in the market. Free Expert Advisor DayCandleBreakout Options extern string _tmp1_ = " --- Trade params ---"; extern int AccDigits = 5; // set 4 or 5 for all pairs (does not matter EUR, USD or JPY pairs) // set 4 for 4-digit quotes: EURUSD = 1.2314, USDJPY = 100.17 etc. // set 5 for 5-digit quotes: EURUSD = 1.23142, USDJPY = 100.178 etc. extern double Lots = 0.1; // lots volume extern int Delta = 20; // distance from daily High/Low to open price of pending orders extern int StopLoss = 200; // StopLoss, pips. 0 = no StopLoss extern int TakeProfit = 100; // TakeProfit, pips. 0 = no TakeProfit extern bool OCO = true; // if true then // delete BuyStop order if SellStop is triggered // delete SellStop order if BuyStop is triggered extern int Slippage = 3; // max. allowable slippage value extern int Magic = 20110309; // some unique orders ID extern string _tmp2_ = " --- Time options ---"; extern int TradeTime.start_hr = 9; extern int TradeTime.start_mi = 0; extern int TradeTime.end_hr = 9; extern int TradeTime.end_mi = 15; // time to place pending orders (by ServerTime) extern bool CancellTime.On = true; extern int CancellTime.start_hr = 22; extern int CancellTime.start_mi = 0; extern int CancellTime.end_hr = 22; extern int CancellTime.end_mi = 30; // time to cancell all pending orders (by ServerTime)
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964360881.12/warc/CC-MAIN-20211201173718-20211201203718-00064.warc.gz
CC-MAIN-2021-49
1,880
44
https://fffolio.com/reisingerandres/reisingerandres_11498517_17471
code
I have a distorted perception of time. But I also have a very good memory. Apparently the perception of time does not seem to be stored in memory in the same way as the succession of events. This relationship with time had a big impact on me. So crafting this looping artwork has resulted in something that stands out in my Memory: Time.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583087.95/warc/CC-MAIN-20211015222918-20211016012918-00556.warc.gz
CC-MAIN-2021-43
337
1
http://forum.deviantart.com/entertainment/books/1799757/
code
I hope they did, so Bleach and Naruto can take a leaf from their fucking book. I hate it when I have to stop reading a manga because the flood of information that comes with it. The only mange I've finished and liked was Fullmetal Alchemist... and maybe some others, but I digress. But some things really should end. One Piece, Bleach, Naruto, and hopefully Reborn.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701148834.81/warc/CC-MAIN-20160205193908-00220-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
365
2
https://unix.stackexchange.com/questions/377409/what-are-the-tools-in-tools-folder
code
In the kernel source tree /tools, there are many submodules. What are the tools available in this folder? I know perf tool. What else are they? How to build them? Are they, by default, integrated into the kernel? What are they used for? make help in that directory gives a brief summary: Possible targets: acpi - ACPI tools cgroup - cgroup tools cpupower - a tool for all things x86 CPU power firewire - the userspace part of nosy, an IEEE-1394 traffic sniffer freefall - laptop accelerometer program for disk protection gpio - GPIO tools hv - tools used when in Hyper-V clients iio - IIO tools kvm_stat - top-like utility for displaying kvm statistics leds - LEDs tools lguest - a minimal 32-bit x86 hypervisor net - misc networking tools perf - Linux performance measurement and analysis tool selftests - various kernel selftests spi - spi tools objtool - an ELF object analysis tool tmon - thermal monitoring and tuning tool turbostat - Intel CPU idle stats and freq reporting tool usb - USB testing tools virtio - vhost test module vm - misc vm tools x86_energy_perf_policy - Intel energy policy tool This doesn’t cover everything available though. In a little more detail: accounting/getdelaysdisplays various pieces of information relating to task and process scheduling, including context switches (voluntary and involuntary), I/O accounting and delay accounting; cgroup/cgroup_event_listeneris a simple cgroup event listener; firewire/nosy-dumpinteracts with the snoop mode driver for TI PCILynx 1394 (Firewire) controllers; gpiocontains a few tools related to GPIO (general-purpose I/O pins, typically on single-board computers such as the Raspberry Pi), including lsgpiowhich lists the available GPIO chips and lines; hvcontains a number of tools useful in Hyper-V guests; iiocontains industrial I/O-related tools; kvm/kvm_stat/kvm_statprints counts of KVM kernel module trace events, i.e. a view of KVM guest activity from the host side; laptop/dslm/dslmis a simple disk sleep monitor; laptop/freefall/freefallappears to implement disk protection on HP and Dell laptops (detecting when the laptop is falling, parking the heads, and unparking them when the alarm stops); leds/uledmonis mostly a userspace LED demonstration program; lguestcontains a minimal 32-bit x86 hypervisor; netcontains a few BPF debugging tools (you’ll need nfsdcontains a script to inject NFS daemon faults; objtoolcontains an ELF object analysis tool; pcmcia/crc32hashis a user-space implementation of the kernel’s CRC32 algorithm; perftool you already know; power/acpicontains a number of ACPI-related tools; cpupowertool, library etc., for monitoring and controlling the CPU power management; power/x86/turbostat/turbostatreports processor topology, frequency, idle power statistics, temperature and power on x86 CPUs; power/x86/x86_energy_perf_policy/x86_energy_perf_policydisplays and sets the x86 energy performance policy; spi/spidev_testis a SPI testing tool; testingcontains a number of kernel testing tools; thermal/tmoncontains a comprehensive thermal monitoring tool (useful in particular to determine the relationships between cooling devices and thermal behaviour); usbcontains a number of USB testing tools, along with usb/usbip, which is a nice client/server tool allowing USB devices to be exported from one host to another; virtiocontains a vhost test module; vm/page-typesdisplays detailed page information from the virtual memory subsystem. These tools aren’t part of the kernel build by default, and need to be built explicitly using the appropriate target or directory, as indicated by make help. Many of them have detailed documentation you can read to find out more. I can answer for FreeBSD, and for one quite important one. In /usr/src/tools/tools/nanobsd you will find the scripts and files for NanoBSD. This is not a different system; it's a way of building stripped down complete systems that run from a read only system and one or more memory disks. There is a lot of stuff to help configuration, using different configurations from the host system. I have built FreeBSD systems on read only CF cards, and read only USB sticks. I have used these to run a diskless firewall based on It's worth a look if that is useful to you. See: for more details.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195532251.99/warc/CC-MAIN-20190724082321-20190724104321-00340.warc.gz
CC-MAIN-2019-30
4,270
40
http://forums.adobe.com/message/3449893
code
Hi all. I'm using livecycle es2 to create a form and itext to populate it. It work well but now I have a problem. I need a textfield or a textarea that can contain at least two lines. I tried using a textfield (I didn't found textarea in the menu..) and the option "allow multiple lines" and the text populating the fieldset fills the lines. In this case the caption is centered respect the two lines. The problem is that if the text fills only one line It is displayed over the caption and it is not aligned with it. How can i fix this? Thank you in advance. P.S. I can post an image if it is useful Ok, here there is an image @Rafael: sorry, I didn't understand. yes I know that it works fine but it is pretty awful to see. Maybe I have been not clear. In the second-last example showed in my screenshot there is a "2 line textfield" in wich text only fills only one line(and not two..) Is it possible to align caption with the text in this case?
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532128.44/warc/CC-MAIN-20140416005212-00156-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
948
6
https://fernandez.life/blog/2005/01/27/using-class-designer-otb-to-better-understand-the-net-framework/
code
For those of you who don’t know, Class Designer (CD) is a Visual Studio 2005 feature that lets you visually design/model your data types. You can use CD to design custom .NET classes and it can be also used to better understand and navigate an existing code base. One of the lesser known features of Class Designer is that you can also use it on .NET Framework types. Let’s say I wanted to create a Windows Form control, and I want to understand the object model for the Control class. Using Visual Studio 2005 Beta 1, simply create a new Windows Form application, right click on Solution Explorer and select “Add New Item…Class Diagram”. You’ll now have a blank Class Diagram which you can drag and drop classes onto. To drag and drop classes, you’ll need to switch to the Class View, “View…Class View”. This lists all the types in your project. In our case we want to understand .NET Framework types (which are in our project references) so we’ll need to make one minor tweak to the Class View - make sure that the “Show Project References” checkbox is checked as shown below: Next, Expand the project references folder and navigate to the DLL and namespace you are looking for as shown below: Finally drag and drop the types you are interested in directly onto the class diagram. This picture shows the object hierarchy, interfaces and types for the Control class. But wait there’s more! If you saw my previous post on Object Test Bench (OTB), you can see how they can be used in concert and we can experiment with .NET Framework types using CD & OTB. Aside: Frans Bouma asked a good question about being able to type code, rather then go through dialogs, and the good news is that you can also use the immediate window with OTB to create and call instances of classes. Back to learning about the .NET Framework. For simplicity sake, let’s say you want to learn about the design of the String class and maybe you want to test how the String.Compare() method works. To do this, we’ll drag and drop System.String onto the Class Designer. You’ll visually see its interfaces, fields, properties, and methods. Now that we’ve added it onto our diagram, we can use OTB to call the String.Compare static method and choose the overload that accepts two string arguments as shown below: When we select the Compare(string, string) method, we see a dialog box prompting us to enter the two string parameters, and we’ll enter “Hello” and “World” as shown below: When we click OK, Visual Studio will call the method and we get anotehr dialog box that shows that String.Compare returns “-1” when comparing the strings “hello” and “world.” Given that I think a lot of people will be using Class Designer to understand code, I’d love to see CDadd support for Namespaces. My goal would be that I could drag and drop a namespace and get a nice diagram of all the types within the namespace, and it would make it easy for anyone to create their own .NET Framework class diagram Poster for a specific namespace.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948965.80/warc/CC-MAIN-20230329085436-20230329115436-00622.warc.gz
CC-MAIN-2023-14
3,053
11
http://textpattern.org/help/943/what-is-flagging
code
What is flagging? Using this site Each article has a “Flag it” option in its information column (left, green). If an article has a broken link, inaccurate information, an orphaned plugin/file, or should be otherwise archived or edited, you can contact the article’s author to inform them, or Flag the article for the Admin’s attention. Describe the reason for the flag in the textarea field and hit the “Flag” button to submit it. When describing the reason, please try to include URLs or provide direction for correcting broken contents from the article.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123635.74/warc/CC-MAIN-20170423031203-00078-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
567
3
https://infohub.delltechnologies.com/l/vdi-deployment-guide-microsoft-rds-for-dell-emc-microsoft-storage-spaces-direct-ready-nodes-1/creating-a-desktop-collection
code
A Desktop Collection contains Virtual Desktop machines that are presented to users who access the collection through the Remote Desktop Web Access server (RDWA). Ensure that a Windows VDI master image that has been prepared with Sysprep Generalize exists on at least one of the RD Virtualization hosts. - From Server Manager on one of the servers in the Storage Spaces Direct cluster, select Remote Desktop Services > Collection. - Select Tasks > Create Virtual Desktop Collection. - Read the information under Before you begin, and then click Next. - Under Name the collection, enter a name for the collection and click Next. - Under Specify the collection type, select either Pooled virtual desktop or Personal virtual desktop. Select Automatically create and manage virtual desktops and click Next. The Specify the virtual desktop template screen shows the available VMs on all the RD Virtualization Host servers. - Select a Virtual Desktop Template that has been prepared with Sysprep Generalize and click Next. - At this point, the system does not differentiate between server images or Windows desktop images. It does not indicate whether the image is prepared with Sysprep Generalize. - If you choose an image that is not correctly prepared, the system warns you after you click Next. - On the Specify the virtual desktop settings screen, select either of the following options and then click Next: Note: If you choose Use an existing Sysprep answer file, the system automatically proceeds to step 9 after you click Next. - Under Specify the unattended installation settings, select the time zone and select one of the following options, and then click Next: - Under Users and groups, add user groups that can access the desktop collection (for example domain\domain users), and specify how many desktops to create and the desktop naming scheme. Click Next. A prefix and a suffix define the desktop naming scheme. For example, if you specify the prefix as col- and the suffix as 0, the desktops are named starting at col-1, col-2, and so on. - Under Specify virtual desktop allocation, specify how the desktops are distributed on each RD Virtualization Host. Enter the correct number of New Virtual Desktops in the text box opposite each server. Click Next. - Under Specify virtual desktop storage, select Store on a Cluster Shared Volume (CSV) and enter the location of the Storage Spaces Direct shared storage that is available to each RD Virtualization Host server (for example, C:\ClusterStorage\Vol1\VDI). By default, the Automatically roll back the virtual desktop when the user logs off option is checked. Disable this option, if necessary. Click Next. - If user profile disks are required to preserve user data, under Specify user profile disks, select Enable user profile disks and specify a location and maximum size of the profile disks. Click Next. User profile disks are normally placed on shared storage. - Under Confirm selections, review the deployment selections and go back to modify previous screens, if necessary. When you are satisfied with the deployment selections, click Create. The View progress screen appears. The first action is Exporting the virtual desktop. You cannot close the screen until the export is complete. When the virtual desktop is exported, a second progress bar on the screen shows the progress of the virtual desktop creation. You can close the screen at this time. Note: If you close the progress screen, to follow the progress later from the Server Manager Remote Desktop Services navigation area, right-click the collection and chooseTask Status Details. The collection is visible on Server Manager from the Remote Desktop Services navigation area.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739104.67/warc/CC-MAIN-20200813220643-20200814010643-00249.warc.gz
CC-MAIN-2020-34
3,703
24
https://discussions.unity.com/t/how-do-you-fix-overflowexception-number-overflow/198227
code
I am following the Unity Learn tutorial for procedural caves and have just completed the second and third videos. The problem is that when I press play the caves do not appear. There are no errors coming up in Visual Studio but in Unity I am getting the error OverflowException: Number overflow: I am pretty sure that it is all written correctly, I could be wrong but I have checked it multiple times. I clicked the error and it took me to this line: I am not sure what is wrong. So if anyone could explain it to me and how to fix it that would be great.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510208.72/warc/CC-MAIN-20230926111439-20230926141439-00590.warc.gz
CC-MAIN-2023-40
554
3
https://3dev.io/play-and-earn-metaverse
code
Space Cartels is Play & Earn Metaverse where the value of resources is determined by the law of supply and demand. The project idea is well structured, has a solid marketing in place and has built devoted community around it. As the Space Cartels team already had successful mint experience before approaching us, we knew they will be a committed and reasonable partner in challenging world of blockchain projects. That is a great indicator of smooth cooperation and clear definition of goals. Reality after Luna Collapse As mentioned the initial mint has already been carried out. Since it originated on Terra Project it required immediate remediation of unpleasant consequences of the chain collapse. The team honestly wanted to take care of the community that trusted them and allow them to somehow retrieve the lost game loot. In 3dev team we were ready to help by building convenient migration experience. All this must have been made smoothly, relatively quickly - to retain community attraction and most importantly securely. The Project required developing smart contracts in solidity and web application in React. All parts have been successfully deployed to production. At the time of writing this article the whole system has been used by hundreds of users. - Migration of tokens from Terra to Binance Smart Chain - Developing two custom upgradeable Smart Contracts (ERC-721 compatible) for token retrieval and advanced minting - custom real time React web application for seamless transactions - Deploying the whole dapp and smart contract to production - NFT collections with marketplaces integration - Ready for traffic peaks - Supporting minting of hundreds of users Amulets Migration to BSC Custom Smart Contract has been deployed on BSC with a source of truth about tokens ownership preinstalled. This required secure mapping of Terra addresses to EVM addresses. For security reasons nothing could have been made automatically as users were supposed to prove their identity and ownership using metamask wallet on web application for this purpose. Rings minting with whitelist mechanism To increase gamification and competition among community members the idea of whitelist has been added. It allowed Space Cartels team to recognize most devoted community members or competition winners and add them to whitelist. Those lucky individuals were able to mint sooner (before public sale) and get higher odds to mint rare items.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00865.warc.gz
CC-MAIN-2023-50
2,439
15
https://www.italki.com/post/discussion-124212?hl=en
code
Who would like to talk in English on topics such as business, technology and startups, to improve fluency? I'm looking for partners to talk, because I need to improve my speech on these issues, and I think more people too. hi, I am interested in these topics sir. I have a good level in english, we can practice together. Feel free to contact me. My skype is: abdelhak.inelec
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517159.7/warc/CC-MAIN-20210118220236-20210119010236-00154.warc.gz
CC-MAIN-2021-04
375
4
https://nch.invisionzone.com/profile/95104-brandon/content/
code
Everything posted by Brandon I've been using the free version of wavepad to make my church's podcast for several years now. I got a new computer recently and reinstalled wavepad. Now when I go to use "Mix With File" to add in the intro and outro I get a notification that this is only in the paid version! Is this feature now only for paid users?
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038067400.24/warc/CC-MAIN-20210412113508-20210412143508-00305.warc.gz
CC-MAIN-2021-17
346
2
https://developers.clever-cloud.com/changelog/2024-02-26-healthcheck-for-everyone/
code
Custom healthcheck paths for all applications Up until now, the deployment process only checked whether the application is listening to TCP port 8080. That doesn’t always mean that the application has started correctly. You can now define the paths that the orchestrator will call to validate a deployment for applications through one or multiple CC_HEALTH_CHECK_PATH environment variables. It works as follows: - If the application responds on this specified path, and the response code is between 300, the orchestrator considers that the deployment has been validated. - If it responds with a code outside this interval, the application is considered to have failed its deployment. - Read the documentation about Deployment healthcheck path 📖
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817398.21/warc/CC-MAIN-20240419110125-20240419140125-00695.warc.gz
CC-MAIN-2024-18
749
9
http://stackoverflow.com/questions/3297363/implement-use-foreign-keys-in-sqlite
code
How can I implement a foreign key in SQLite? I was thinking something like this: CREATE TABLE job (_id INTEGER PRIMARY KEY AUTOINCREMENT, employer_id INTEGER, ...); CREATE TABLE employer(_id INTEGER, employer_name TEXT NOT NULL, ...); employer_id is the _id from the table employer. Would this work? Is there another fast, maybe less prone to error way? Maybe with triggers?
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860125897.68/warc/CC-MAIN-20160428161525-00161-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
374
5
http://www.computing.net/answers/networking/cant-be-seen-on-the-network/29730.html
code
|Sorry we couldn't help. | Wait a minute, I've just thought of something. Have you gone into network neighborhood and clicked on the link saying "Make New Network Connection". I'm just guessing that's what it says because I can't remember what it actually says but you know the gist of it. Try that and see what happens, unless you've already done this. I which case, I'm fresh outta ideas for the time being. :S Sorry I couldn't give you any better solutions. You need a good defence if a trojan barges into your territory.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737940789.96/warc/CC-MAIN-20151001221900-00031-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
524
3
http://java-project-help86938.uzblog.net/c-programming-assignment-help-fundamentals-explained-6209094
code
c# programming assignment help Fundamentals ExplainedWithin the when loop, Right following the if enter will not be equals to null, I’ll insert an else if condition. For those who have any even further concerns make sure you will not be reluctant to ship us a query; it is totally freed from Expense, and we guarantee to obtain again to you within the earliest. C# is an entire outlier On this record. Despite It can be identify, it has way more in widespread with Java than C or C++. C# is surely an item-oriented, large-amount programming language. Like Java, C# provides a number of characteristics to really make it less complicated for your developer to code During this language including variety examining, bounds examining, uninitialized variable checking, and garbage collection. Mosh (Moshfegh) Hamedani can be a passionate software engineer and teacher with thirteen years of knowledge making programs making use of C# (due to the fact the 1st launch of .Web Framework in 2002). Mosh is an entire-time developer, and Everything you will find out In this particular study course is the result of his day-to-day operate as being a hardcore programmer in addition to many years of finding out, Mosh's learners explain him as being a passionate Trainer who understands the way to have a university student over a number of sensible actions with a terrific mix of idea and practice. For additional particulars on this course and instructor, Simply click here. Specifics & Prerequisites C# is a lot more protected and provides you compiler errors and warnings without having enabling you to help make some serious mistakes that C++ will permit. Welcome into the Formal repo for C# language design and style. This is where new C# language characteristics are formulated, adopted and specified. First off, we have to offer an IP handle in addition to a port range any time a server has to pay attention for incoming connections. Helps to discover the potential for combining functions by grouping diverse equipment or operations to stop dealing with, storage, and delays This can not only help you recall what your code does in a big application, it is actually An important practice in a very collaborative natural environment, as it will allow others to be familiar with what your code is doing. However Laptop science can prove to get a little bit scary for the inexperienced persons and hard from time to time even for your skilled. Allow our group of Personal computer science gurus guide you with hard Laptop science assignments, each move of the best way. Learn the basics of C# & .Internet Framework w/ 87 lectures, 5 hours of material Get the job find out this here done w/ primitive varieties & expressions Do the job w/ non-primitive styles (lessons, structs, arrays and enums) Find out the distinction between value kinds & reference types Command the move of plans utilizing conditional statements Use arrays & lists Perform with files & directories Operate w/ textual content Operate w/ day & time Debug C# programs efficiently c# arrived after c++ and java (late 90's) and picked the ideal of each worlds and overlooked/threw absent some things which make compiler design and method design quite sophisticated - multiple inheritance (I overlook that a lot in c#, however , you can triumph over it). Click on the add to cart button under to acquire these ebooks securely as a result of your Paypal account. For those who expertise any problems, be sure to Speak to us at firstname.lastname@example.org The similarities of C++ and C# are few, as the languages are considerably more different than They may be very similar. Even though the syntax is analogous, don’t think which the languages are related driving the scenes.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583867214.54/warc/CC-MAIN-20190122182019-20190122204019-00118.warc.gz
CC-MAIN-2019-04
3,743
14
http://augustwedding.info/tags/getting/
code
keep the fingernail polish remover from evaporating before it gets a chance to work. "What I would think of you, I do not know. Naked leather, being extremely She has something of a crush on her psychiatrist colleague, Dr Healy, but he has no feelings for her." Getting On with Hospital Comedy Jane Graham Television Radio The Guardian".2 : to influence corruptly : bribe 3 : to turn one's attention to The committee finally got at the main issue. "Jo Brand takes on the NHS in comedy Getting On"." Getting On Series 1 2 on DVD".
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256281.35/warc/CC-MAIN-20190521062300-20190521084300-00158.warc.gz
CC-MAIN-2019-22
529
3
https://www.thejournal.club/c/paper/122418/
code
This research concerns a type of configuration optimization problems frequently encountered in engineering design and manufacturing, where the envelope volume in space occupied by a number of components needs to be minimized along with other objectives such as minimizing connective lines between the components under various constraints. Since in practical applications the objectives and constraints are usually complex, the formulation of computationally tractable optimization becomes difficult. Moreover, unlike conventional multi-objective optimization problems, such configuration problems usually comes with a number of demanding constraints that are hard to satisfy, which results in the critical challenge of balancing solution feasibility with optimality. In this research, we first present the mathematical formulation for a representative problem of configuration optimization with multiple hard constraints, and then develop two versions of an enhanced multi-objective simulated annealing approach, referred to as MOSA/R, to solve this problem. To facilitate the optimization computationally, in MOSA/R, a versatile re-seed scheme that allows biased search while avoiding pre-mature convergence is designed. Our case study indicates that the new algorithm yields significantly improved performance towards both constrained benchmark tests and constrained configuration optimization problem. The configuration optimization framework developed can benefit both existing design/manufacturing practices and future additive manufacturing.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038082988.39/warc/CC-MAIN-20210415005811-20210415035811-00126.warc.gz
CC-MAIN-2021-17
1,547
1
https://www.phoronix.com/review/linux_2638_large/2
code
Large HDD/SSD Linux 2.6.38 File-System Comparison: EXT3, EXT4, Btrfs, XFS, JFS, ReiserFS, NILFS2 When running the PostgreSQL database server on the seven file-systems and two tests, the results were not what we had expected. Btrfs nor EXT4 were the fastest. On the Seagate SATA HDD, ReiserFS and NILFS2 were the fastest while right behind those two was JFS. With the SSD, JFS was the fastest with its default mount options followed by ReiserFS and then NILFS2. EXT4 and Btrfs (and EXT3) were much slower with the respective default mount options. EXT3 and its default mount options -- with barriers disabled -- were the fastest for SQLite on the HDD followed by NILFS2 and then ReiserFS. Btrfs was the slowest for the SQLite test on both the HDD and SSD, which is not too surprising and is something we have noticed quite some time for this particular test case. In regards to the OCZ SSD, the JFS file-system faired particularly well. For the PostMark test profile, EXT4 did particularly well in both configurations. JFS on the SSD was, again, surprisingly fast. The Btrfs performance came in slightly behind EXT4. XFS and NILFS2 were the slowest with this test profile.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.23/warc/CC-MAIN-20231203125921-20231203155921-00478.warc.gz
CC-MAIN-2023-50
1,171
4
https://www.excelhow.net/how-to-save-file-based-on-cell-value-in-excel.html
code
This post will provide you with a step-by-step guide on how to save Excel workbook file with Cell value in Excel using VBA code in Excel 2013/2016/2019/365. Saving files based on specific criteria can be a tedious and time-consuming task, especially if you have to do it repeatedly. However, with VBA code, you can automate this process and save yourself a lot of time and effort. Table of Contents 1. Save File Based on Cell Value with VBA Code Assuming that you have a request that save the current workbook file I am working as the value in Cell A1. For example, the value of Cell A1 is testWork, and you want to save the workbook as the name of testWork. To Save file with Cell Value in Excel, you need to write down an Excel VBA Macro to achieve the result. Just do the following steps: Step1: open your excel workbook and then click on “Visual Basic” command under DEVELOPER Tab, or just press “ALT+F11” shortcut. Step2: then the “Visual Basic Editor” window will appear. Step3: click “Insert” ->”Module” to create a new module. Step4: paste the below VBA code into the code window. Then clicking “Save” button. Dim FileName As String Dim Path As String Application.DisplayAlerts = False Path = "C:\test\" FileName = Range("A1").Value & ".xlsx" ActiveWorkbook.SaveAs Path & FileName, xlOpenXMLWorkbook Application.DisplayAlerts = True Note: if you want to save workbook as other cell value, you just need to change A1 to other cells. Step5: back to the current worksheet, then run the above excel macro. Click Run button. Step6: Let’s see the result: 2. Video: Save File based on Cell Value in Excel This video will demonstrate how to save a file based on a cell value in Excel using VBA code. Now you should have a good understanding of how to use VBA code to save files based on cell values, and you’ll be able to apply this knowledge to your own Excel projects.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473819.62/warc/CC-MAIN-20240222125841-20240222155841-00389.warc.gz
CC-MAIN-2024-10
1,898
22
https://www.ats-group.net/languages/resources-romani.html
code
Romani / Romany Language and Literature Resources A site for the Romani people and language. The Romany Culture and Language This glossary is meant to be a helpful guide to Romani (Gypsy) culture. Romani Linguistics Site The site is operated by the Romani Project – a cluster of academic research activities based at the School of Languages, Linguistics and Cultures at the University of Manchester.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413786.46/warc/CC-MAIN-20200531213917-20200601003917-00204.warc.gz
CC-MAIN-2020-24
401
6
https://www.reachhydro.org/home/tools/statistical-tools/inverse-streamflow-routing
code
Reach Scale Hydrology Inverse Streamflow Routing Inverse Streamflow Routing (ISR) tries to estimate the spatially distributed runoff and its temporal evolution from streamflow observations over discrete gauging locations. A most simple example would be to watch a flood wave passing by a river and to estimate where/when the storm water could come from, given our knowledge on how water flows (e.g. from where to where and how fast). How it works The streamflow --> runoff estimation problem is framed as the inverse of the well studied runoff --> streamflow estimation problem. The latter one (a forward model) is referred as "streamflow routing" and we use river routing models to do that. For an easy inversion, we look for a simple and linear forward routing model only, i.e. a 1-D diffusive wave model. Details can be found in Pan and Wood (2013). There are two major steps: (1) Wrap the entire diffusive wave routing model into one (gigantic) linear operator H such that we can write the routing process in the form y = Hx, where x is runoff state vector and y is the streamflow output vector at time t. Given that the streamflow is the integrated runoff arriving at the gauging location from the entire contribution area and time, x, y, and H need to be augmented in time. (2) Invert the linear operator using a fixed-interval Kalman Smoother (an augmented filter). Here the observation error covariance is usually set to zero and that forces the inverted runoff to exactly reproduce the in observed streamflow at gauging locations. This zero observation error essentially creates a Constrained Kalman Filter (CKF) (click for more details) that produces the exact reproduction of observed streamflow. Algorithmic considerations for the ISR implementation ISR is implemented through a fixed-interval Kalman smoother and the smoothing is performed window by window in time (interval by interval). However, streamflow calculation will always lag behind runoff by the maximum travel time k of the basin. Thus a smoothing window (fixed interval) can only completely update the runoff in that window except the last k steps because the runoff water in that time range hasn't fully reached the most downstream (outlet) and future streamflow data is needed to completely update it. So, the next smoothing window can't start immediately after the current one and it needs to be rewound by k steps (i.e. overlapped by k steps) to make sure these k steps will be completely updated. What ISR actually does and its unique benefits It's a lot of hassles to do ISR. In plain but less precise words, it distributes streamflow water observed at the gauge back across its contributing area/time. It essentially propagates information observed at the gauges back in time and space until the very beginning of routing process - runoff generated at pixel level. As a data assimilation (DA) technique, it offers many unique features: It's a complete propagation of observed information in space and time; Fully coupled assimilation across all gauges - all observations within the reachable space and reachable time are assimilated together and the runoff estimates reflect the collective influence of all gauge data; Compared to statistical DA, ISR builds in all our physical knowledge about the routing process in the form of a routing model, including the how flood wave travels in the channel and the river network geometry/topology. The main ISR paper: Pan, M.. and E. F. Wood, 2013: Inverse Streamflow Routing. Hydrol. Earth Syst. Sci., 17, 4577-4588, https://doi.org/10.5194/hess-17-4577-2013. Some of the application papers are as follows: Fisher, C. K., M. Pan, and E. F. Wood, 2020: Spatiotemporal Assimilation/Interpolation of Discharge Records through Inverse Streamflow Routing. Hydrol. Earth Syst. Sci., https://doi.org/10.5194/hess-24-293-2020. Yang, Y., P. Lin, C. K. Fisher, M. Turmon, J. Hobbs, C. M. Emery, J. T. Reager, C. H. David, H. Lu, K. Yang, Y. Hong, E. F. Wood, and M. Pan, 2019: Enhancing SWOT Discharge Interpolation through Spatio-temporal Correlations. Remote Sensing of Environment, https://doi.org/10.1016/j.rse.2019.111450.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00841.warc.gz
CC-MAIN-2024-10
4,143
19
https://ethereum.stackexchange.com/questions/34306/smart-contract-token-18-decimals
code
When I'm working with 18 decimals. I have to convert the token inside of a function, for instance, one user want to transfer 20 token... I must operate that amount inside transfer function: amount*10^18? because I'm performing also transaction fees... And I don't know how to express the amount of fees: 1 or 1*10^18. The wallets always convert the amounts automatically when they see a global public variable decimals? Because I am doing tests on truffle, and when I´m working out transactions... the contract only send 50 tokens (not 50*10^18), so I have to perform web3.toWei in the entrance parameter..... Normally your contract will only handle tokens with full precision (with 18 decimals in your case). This simplifies the programming as you can assume all parameters are in the same units and you do not need to convert. The conversion and formatting is done the frontend-ui, where the use can select to express the value in different units. For example same wallets allow to express amounts in miliethers instead of ethers. The same has to be done when you require input parameters. The frontend allows the user to enter the amount of tokens, 0.1 for example, and it will convert to 0.1 * 10^18 when sending the transaction to the contract. Try formating the user input (example 1 ETH) to WEI (1000000000000000000) var amount = $("#amounnttobuy").val(); var amount = new BigNumber(amount); //convert from ETH/18 DECIMAL TOKEN to WEI var amount = web3.toWei(amount, "ether") Take time to read the web3.js documentation dear
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027322170.99/warc/CC-MAIN-20190825021120-20190825043120-00270.warc.gz
CC-MAIN-2019-35
1,532
7
https://bootcamp.outreach.ou.edu/intro-to-coding
code
Designed for total beginners Focuses on the world's most popular software language 15 hours of videos, challenges, and more This course is taught through our custom learning management system with videos, coding exercises and projects, by the end you'll have coded a working web application. Fullstack Academy is one of the longest-running and most successful coding bootcamps in the nation, with incredible student reviews, years of experience in education, and impressive graduate outcomes. Now, it brings its hands-on learning approach to OU Outreach Coding Bootcamp to make software developer training more accessible to working adults outside of traditional tech hubs.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358570.48/warc/CC-MAIN-20211128164634-20211128194634-00120.warc.gz
CC-MAIN-2021-49
673
6
https://questions.x-plane.com/24331/best-low-end-video-card
code
I'm looking for suggestions for the best value in a graphics card to successfully run X-Plane. Since I'm using this just to practice instrument flying procedures in the 172, I don't care much about the image quality, I just want to achieve a decent frame rate. I have followed the manual to reduce all the graphics settings to the minimal level of detail. The only way I can get it close to 20 fps is to reduce my resolution down to the minimum setting, and even then it won't maintain 20 fps. The PC has an older i7 processor and 16 GB of RAM. Currently the video card is a GeForce GT 630 with 1GB of RAM.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576965.71/warc/CC-MAIN-20190923125729-20190923151729-00016.warc.gz
CC-MAIN-2019-39
606
3
https://learn.microsoft.com/en-us/previous-versions/system-center/operations-manager-2007-r2/ff629427(v=technet.10)?redirectedfrom=MSDN
code
Applies To: System Center Operations Manager 2007 This topic has been updated in the latest version of the System Center Management Pack Authoring Guide on the TechNet Wiki. Dependency monitors let the health of one object be affected by the health of another object. This allows for health rollup between specific related instances of different classes. Each dependency monitor is based on a specific hosting or containment relationship. Just creating a relationship between two objects does not alone provide rollup between their health states. A dependency monitor must be associated with the relationship for rollup of health to be performed. The source and target class for a dependency monitor are defined by the relationship that the monitor is based on. The monitor must additionally specify a specific unit monitor or aggregate monitor on the target class and an aggregate monitor on the source class. Only the health of the target monitor is considered when calculating the health of the dependency monitor, and it only affects the health of the specified aggregate monitor on the target object. Dependency monitor based on unit monitor Dependency monitor based on aggregate monitor Multiple dependency monitors can be created on a single relationship if the health of the source class should be affected by multiple unit or aggregate monitors on the target class. For example, a dependency monitor might be created for each standard aggregate monitor as shown in the following image. Multiple dependency monitors for a single class Health Rollup Policy There may be multiple instances of the target class, each with a different health state. Each dependency monitor must define a health rollup policy to define the logic that is used to determine the health of the dependency monitor based on the health of the instances of its target monitor. The possible health rollup policies for a dependency monitor are as follows: Worst state policy The source object matches the state of the target object that has the worst health state. This is used when the source object should only be healthy if all the target objects are healthy. This is the most common policy used by dependency monitors. Worst state health policy Best state policy The source object matches the state of the target object that has the best health state. This policy is used when only one of the source objects has to be healthy for the target object to be healthy. For example, the Microsoft Windows Hyper-V 2008 Monitoring management pack has a dependency monitor on the hosting relationship from Microsoft.Windows.HyperV.ServerRole to Microsoft.Windows.HyperV.VirtualNetwork that uses a best state policy. This is because the Hyper-V server is functional as long as it has one functional virtual network. The logic defined by this management pack is that the server class should show an error state if no virtual networks are available. Best state health policy The source object matches the worst state of a single member of a specified percentage of target objects in the best state. This policy is used when a certain percentage of target objects must be healthy for the target object to be considered healthy. For example an application might run on a web farm that includes multiple Web servers. Because of the redundancy offered in this kind of deployment, the application might be considered healthy if a particular percentage of servers is available. The farm itself could be represented in the management pack by a health rollup class based on System.ApplicationComponent with a containment relationship to the Web servers. A dependency monitor could be created on this containment relationship with a health rollup policy specifying a percentage. Even if one or more Web servers had a problem, as long as the specified percentage were in a healthy state then the class representing the web farm would also be healthy. Percentage health policy Health Rollup between Agents Health state can only be rolled up between objects managed by the same agent unless the source object is managed by the Root Management Server. Groups and classes used for health rollup are typically unhosted. This means that they are managed by the RMS so that they can roll up health from objects managed by different agents. A relationship can be discovered between objects managed by different agents, but any dependency monitor associated with that relationship will not work as expected. Health rollup between agents
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00874.warc.gz
CC-MAIN-2023-50
4,484
24
https://forum.cancuncare.com/threads/no-more-spammers.6319/page-2
code
Discussion in 'Cancun Forum' started by Steve, Nov 6, 2007. Woooooo!!!!! :lotsofmichaelf: Because I HATE spammers so much great work steve! thanks! Seems to be working. I normally delete 3+ posts in the morning... not 1 this morning, unless someone beat me to it. lol yes............ lately I have been doing a good 3-6 per morning when I arrive, not 1 since! Very nice! steve your the man i hate them dam spammers sometimes the Spam is the only thing I have to read in this forum.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00294.warc.gz
CC-MAIN-2023-23
481
7
https://lists.inkscape.org/hyperkitty/list/inkscape-user@lists.inkscape.org/2017/2/
code
It's been years since I used Inkscape. But I remember a facility where one could create a push button by entering about four parameters and this push button would address another entity using I think a URL address. I have the Bah book Fourth edition but I don't know what the function is called. Can someone help me out? All replies appreciated. I am Rohit, a sophomore pursuing B.E Computer Science . I have been developing websites and managing them for the last one year for my college and a start-up that I had worked with. I have a huge interest in Python and Django and have build almost all the websites using them. I want to contribute to Inkscape by working on the Development Project Management System during the summer. I have gone through the Janitorial task documentation and also have started searching for patches to fix. I also had a look at the Django Website Development, the inkscape-web Can you please tell me how to proceed or any task you expect me to carry out to be a part of the community ? My github profile: https://github.com/rtgdk I (with lots of help from su_v) have been working on getting the macOS DMG build working again with a view to having an official DMG ready for the future 0.92.2 release. The current _unofficial_ test build of 0.92.1 is available here: Included in this build is a new feature to automatically set the recommended XQuartz configuration. You'll be prompted about this on launch if you've got XQuartz running in its default configuration. This used to have to be set manually, as documented here: https://inkscape.org/en/download/mac-os/. Any feedback is welcome. Since it's a test build, please don't file any bugs; reply in this thread, or contact me directly by email. I'm also around in both the #inkscape and #inkscape-devel IRC channels. I'm working on a fairly small, fairly simple file with a fairly simple gradient mesh. It's a somewhat high zoom, and maybe I should scale it so I can work at 100%. But I'm not sure if that should matter. Anyway, it keeps crashing (taking out all open Inkscape files with it) when I try to move one particular node. 8 times in a row now. I'm attempting to use the gradient mesh to ultimately make an animation of a light passing through an endless knot (see it in the hidden first layer). On the canvas, I've indicated 2 places where I have 3 mesh nodes on top of each other (to facilitate the light going around the corners with a trailing glow). It's the top node of the left-most stack of nodes. Steps to reproduce. Try to drag the top node of the left-most stack of nodes. Since the 3 nodes are stacked up, I need to move the top 2 off of the 3rd, to be able to select it individually. Whenever I try to drag the top one - There are no errors or message boxes. Just bam. (A backup was saved in the first crash.) Windows 7 Pro, 64-bit, Inkscape 0.92. If you want me to upgrade to 0.92.1, I can. It's just I'm not aware the mesh was changed in the upgrade (so it seems like it wouldn't matter). Any kind of logs or files I can get for you? I don't know how to use the command line or terminal. But if you tell me what to do, I should be able to do it. Would you like a bug report? Thank you very much, I'd like to create a movable chain of sorts... I'm not sure how or if this is possible with inkscape (0.91)... There seems to be lots of tutorials that show how to create a chain using Pattern along Path, the problem is, once the chain is created that's the end of the tutorial. I need to go a step further and actually move/manipulate the chain without deforming the links or changing the length of the chain. Maybe the "Pattern along Path" examples are completely wrong for what I want to do. To put it another way, take a real physical chain... 10' long, sitting on the floor. I can move the chain around, pull on one end, push the chain in the middle, shape it into an S curve, form a circle with the chain, etc. All the while, the individual links are exactly how they started -- they haven't been stretched or bent or deformed in any way. And while the actual length of the chain can very a little bit it's limited by how much slack there is in the individual links. Now, I want to do the same kind of thing in inkscape. I want to create a line long enough to hold exactly 60 circles, 20px in diameter with 5px space between each circle. Then, and this is the important part, I want move and reshape this "chain" around the canvas, just like I can do with a path composed of lots of nodes. But, I don't want the circles to change shape. The space between the circles can change a *little bit*, but should be limited... like the links in a real chain. I'm very new to both vector graphics and inkscape, so I'm not sure if what I'm trying to do is easy, difficult or impossible. I would appreciate I am trying out inkscape 92 and downloaded 92.1 for windows 10 I just spent over an hour manually tracing a file I was hoping to use on my digital cutter - but it seem inkscape has changed the svg lines to an image - as useful as a chocolate fireguard or teapot - and I don't now how it did it but effing annoying!!!! Steps I did I loaded in an image with the design on I manually traced the outline, using black stroke for cutting and red stroke for any folding (non cut) lines I moved the traced lines to a new layer above the current one turned off the eye on the cut lines layer moved the actual image to the centre of the page locked the image layer opened the eye on the cut line layer selected the svg lines and at the bottom of the screen it say it's an image if I go into view>outline my svg lines show and a whwite square with a X - so it HAS changed it to an image so that was a waste of couple of hours as I now have to start all over again. and it WON'T be using inkscape 92!!! in fact inkscape 92 might well be dumped off the system as it's useless if it convert svg lines to images for no reason. and before anyone asks, I cannot use trace bitmap as that gives double lines and I need single lines and inkscape does not have a centre line I almost posted a bug report on this, but on 2nd thought, maybe it should be discussed whether it's a bug or not. I'm not sure if this is going to be an Inkscape bug, or something about Windows os. But I've never seen this in any other program, and I never noticed this in Inkscape before 0.92. When the Inkscape window is maximized, a small strip of all 4 edges of the window extend past the edge of the screen. Screenshot: It particulary is a problem for the bottom edge for me. That's because I keep my taskbar auto-hidden. So if my mouse strays to the bottom, the taskbar comes up, and then I can't even see the status bar at all. Then I have to wait for it to go back down. So for example, if I want to use the zoom field and spinbox in the bottom-left corner, it's really hard to do. If I want to use the Style Indicator in the bottom-left, you can see that the bottom of almost half of "Stroke:" is beyond the edge. And "Fill:" is overlapping the palette scrollbar. Compare that to the....I guess it's called restore size window. You can see that all of "Stroke:" is showing, and there's even some space below that, like a buffer, before the edge of the window. In the maximized window, you see the toolbar buttons and snap control bar buttons are justified to the edge of the screen, with no space between them and the screen. But in the restore size, you can see there's a buffer there, before the edge of the window. The top, left and right edges don't cause me any touble. But the bottom edge is Windows 7 Pro 64-bit, and this is a 15 inch laptop screen, non-touch, lcd, 1366 x 768 resolution. Should be reported? On the Inkscape download/windows/ page it says 'exe and msi installers are equivalent but not compatible (i.e. one can not update the installation of the other)'. This seems to imply, for example, that a new msi installer can update a previous msi installation. However, when I try to install using the msi installer, I get a message saying 'Another version of this product is already installed. Installation of this version cannot continue', and the existing version needs to be removed before installing the new version. This happened before for 0.91-x64.msi -> 0.92.0-x64.msi and has just happened again for 0.92.0-x64.msi -> 0.92.1-x64.msi. This is under Windows 7. Is this behaviour expected?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00545.warc.gz
CC-MAIN-2023-40
8,381
128
https://www.jrothman.com/htp/agile-job-search/2009/12/how-many-jobs/
code
A colleague is putting his resume together for the first time in several years. “I've been at the same desk, working for the same boss, on the same projects for the last three years. But my company has changed names at least four times in that time. What do I say?” Here's the way I like to see the company names on a resume: month/year, CurrentCompanyName, city, state. (Previously known as CurrentCompany-1, CurrentCompany-2, CurrentCompany-3) YourJobTitle. Unless your responsibilities have changed, you've had one job. Hiring managers: don't ding candidates on what looks like job changes. It isn't the candidate's fault the company management sold/bought the company.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487613453.9/warc/CC-MAIN-20210614201339-20210614231339-00211.warc.gz
CC-MAIN-2021-25
676
5
https://gitlab.com/ideasman42/emacs-spell-fu/-/merge_requests/6
code
Add support for multiple dictionaries. This allows e.g. enabling dictionaries for multiple languages simultaneously, within the same buffer. Define a simple API for dictionaries. This allows users or third-party packages to define dictionaries which are backed by sources other than aspell/ispell. Refactor dictionary state from several globals into symbol properties. As part of the above change, this encapsulates dictionary state. Extract Ispell/Aspell dictionary support into its own section. Refactors Ispell/Aspell-related logic into an encapsulated dictionary implementation. Extract the personal dictionary into a separate logical dictionary. Aside the pedantic improvement of separation of concerns, this avoids the need to rebuild spell-fu's representation of the dictionary when the user adds/removes words from their personal dictionary. Combined with the changes above, this also allows having multiple personal dictionaries (e.g. per-language or per-project); when multiple personal dictionaries are enabled, spell-fu will ask the user which dictionary words should be added to. For simplicity, some code is currently repeated between the Ispell / Aspell and personal dictionaries. Regenerate spell-fu's cache when the aspell dictionary has changed. Caches were erroneously only cleared for personal dictionaries. This has some breaking API changes. I don't know if that's OK or not, but I do think that it moves the API more in the direction advertised in the README (flexibility and hackability). Fixes #9 (closed).
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00105.warc.gz
CC-MAIN-2022-40
1,531
16
https://www.coderanch.com/t/499030/careers/Fulltime-Java-Developers-York-City
code
Hi - we are looking for 7-9 Rockstar level developers to join our highly energetic development team. We are a well funded startup building a labor marketplace application. The jobs are posted at workmarket.com Unfortunately, i lack the experienced tag .......trying to find other alternatives to alleviate the pain.... In my defense, I have a thesis, which is about to be published in ACM(Advisor gave me an OK). I am also trying to target the next ICDB conference. But research doesnt seem to impress the experienced ppl I got my first certification in 2000(Brainbench when i was 14) and have been developing since.... but none of them were real projects. Most of them were open source projects like H2 database engine with new algorithms, which were just trials and stabs at it. If you've been actively involved in open source projects, I'd focus potential employers on that fact. A history of active forum presence, commits, etc. counts as experience, at least as far as I'm concerned. What is that? Is that a mongol hoarde? Can we fend them off with this tiny ad? Free, earth friendly heat - from the CodeRanch trailboss
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545326.51/warc/CC-MAIN-20220522094818-20220522124818-00456.warc.gz
CC-MAIN-2022-21
1,124
8
https://www.inmotionhosting.com/support/questions/en/communities/1/topics/2822-load-files-onto-temp-url-for-new-account
code
Load files onto temp URL for new account I use FileZilla all the time. Followed configuration instructions in Cpanel and imported file to Site manager many times but can't seem to get the site manager to connect to new account to do initial file upload. I can't seem to figure out my problem. Help?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103945490.54/warc/CC-MAIN-20220701185955-20220701215955-00189.warc.gz
CC-MAIN-2022-27
298
2
http://ss.whiteclouds.com/blog/3d-printed-king-arthur
code
According to the legend written by Geoffrey of Monmouth, King Arthur (465 A.D. - 542 A.D.) was the King of Britain. However, modern day historians consider King Arthur to be loosely based on historical events. Whether King or legend, Arthur is revered as the King of Camelot, the founder of the Knights of the Round Table and the only man who could withdraw the famous sword, Excalibur, from a stone. His queen, Guinevere, is said to have been unfaithful. Merlin, the most famous magician, was Arthur’s prophet and advisor. - Designer: Kyle Gifford - Dimensions: 3.4 x 7.7 x 5.0” - Number of Layers: 863 - Layer Resolution: 89 microns - Build Time: 4 hours, 30 minutes - Printer: ProJet 660 - Software: Maya and Photoshop Fun Character Facts: - Disney’s animation, The Sword and the Stone, is the story of young Arthur and his encounter with the famous sword Excalibur. - Merlin, a television mini-series, retells the story of King Arthur through the eyes of the famous wizard, Merlin. Gifford states, “King Arthur was one of the more fun characters to design because he doesn’t have an iconic look to him. Because of this, I had a great deal of freedom when it came to his design and color scheme. I tried to make him as kingly and majestic as possible, as if he were leading his troops into battle.”
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986653876.31/warc/CC-MAIN-20191014150930-20191014174430-00134.warc.gz
CC-MAIN-2019-43
1,313
13
http://www.minedogecoin.com/tag/gpu-mining/
code
To get dogecoins on NVidia based graphics cards like the GTX 750 TI, we use one of the best programs for the task called Cudaminer. Setting up an NVidia card to get dogecoins is actually super easy. We just download a program, create a small file, start the program, and within 15 minutes you should be good to go! This guide will go over the basics on how to use the NVidia based mining program, Cudaminer. Tag Archives: gpu mining An Advanced Guide to Mining Dogecoin with CGMiner If you haven’t already seen it, be sure to check out the guide to getting started with CGMiner. Just a warning before we start, if you let your card run too hot, you can risk the chance of permanently damaging it. 80 is what I keep my cards at, and some can go to 85 and even higher safely, but you will want to check with the specific card on what it can handle, some can be more and some are less. So the basic guide can get you started with mining, but you won’t be really getting the most out of your card. This will go over some of the advanced settings that you can try out to get more out of it. Beware, this can be tedious and/or frustrating. Your card will crash and you will need to reboot when you are trying to find the best settings. You may have driver issues. You might want to just find someone who has the same card as you and see what specs they used. If you want to not go through the hassle, this is a good place to start. So here’s what CGMiner looks like after I start it with the bare config: The two most important values are highlighted above. The Blue(on the left) is the temperature. The red(on the right) is the kH/s (Kilohash/sec), which means how much work your cards are doing. This is with 2x270s. This is really low. So obviously I have a lot to work with. 1) Make sure you have a good set of drivers for your card. I am using the latest catalyst beta drivers, found here. Please note, some people have been having issues with these drivers, if you have drivers that are already working without issue with CGMiner, you may want to stick to those, or read more about which drivers may be best for your specific model card. You can find some details around this here. 2) Next, you need to make a bat file or a launch script. This guide will cover Windows. We do this because there are some command line parameters we need to set to make your GPU work to its maximum potential. Create the file cgminer.bat and place it in your CgMiner folder. 3) Copy this into the file: setx GPU_MAX_ALLOC_PERCENT 100 setx GPU_USE_SYNC_OBJECTS 1 cgminer.exe This won’t work if you didn’t set your pool information in the cgminer.conf file from the first tutorial, so either do that as mentioned in the first tutorial or add them as parameters to cgminer.exe in the bat file. Now from here we will start adding other parameters to increase our mining rate. First I will go over some of the most used parameters and what they do, then afterwards we can see how we can actually go about getting the most out of our card. --thread-concurrency is a parameter to tell your graphics cards how many different tasks it should be juggling at the same time. Depending on your card, this can be set for anything between 2-30,000. It may or may not help your performance, but most people set it between 10,000-25000. There is a way to get a good estimate on what thread count will be best, and this is detailed below. GPU Overclocking Parameters: --gpu-engine allow you to specifically overclock your cards. If you don’t know the defaults off the top of your head, a quick way is to go into CgMiner and Press G, it will take you to the graphics card details screen: - I’m running on low settings so it doesn’t lag me out while I do this tutorial = ) E: would be your --gpu-engine and M: --gpu-memclock for GPU 1. (You can also see these values if you go to change settings for a specific card). These are the baselines. More detail on how to change these follows below. A value between 1-20, this is a general setting that makes our graphics cards work harder. Putting it on 20 will put your cards into high speed. Intensity is usually the last parameter that you will set, after you tweak everything else. Changing the file to this alone will make your hash rate go way up: setx GPU_MAX_ALLOC_PERCENT 100 setx GPU_USE_SYNC_OBJECTS 1 cgminer.exe -I 19 Where -I 19 is for intensity. You can see the hash went up from 20kHs to almost 400kHs. But you can also see that at the top, there is “HW:2″. This is bad, it means we set the intensity too high. We can try lowering it until we have no more HW errors. So, Intensity is the clear cut choice to get fast results in your mining speed. But there are other parameters that you may want to try out first. Autofan and Temp Targets: --auto-fan gives cgminer more control on keeping your cards a specific temperature. --temp-target 80 tells cgminer to keep your card around 80. You can also use --temp-overheat 85 to help prevent overheating. But these will need adjusted based on your card model. You should have --auto-fan on when you are starting to put more work on your cards. So before you start overclocking, lets start with this: setx GPU_MAX_ALLOC_PERCENT 100 setx GPU_USE_SYNC_OBJECTS 1 cgminer.exe --auto-fan --temp-target 80 --temp-overheat 85 -I 13 Depending on your card, your temp-target and temp-overheat may be different. Be sure to look up some recommended temps for your card. Reddit user RedstoneValley has pointed out that you shouldn’t be running your fans at 85% or more for long periods of time, as it will drastically reduce their lifespans. So if you notice your fans going at full speed all the time, you should kick it down a few notches. -I 13 is for Intensity 13, which we will use when we begin to overclock. Changing the Parameters Finding the Best Thread Concurrency The Scrypt readme file has an excellent overview on finding the best thread concurrency: First, find the highest thread concurrency that you can start it at. They should all start at 8192 but some will go up to 3 times that. Don't go too high on the intensity while testing and don't change gpu threads. If you cannot go above 8192, don't fret as you can still get a high hashrate. Delete any .bin files so you're starting from scratch and see what bins get generated. First try without any thread concurrency or even shaders, as cgminer will try to find an optimal value cgminer -I 13 If that starts mining, see what bin was generated, it is likely the largest meaningful TC you can set. Starting it on mine I get: scrypt130302Tahitiglg2tc22392w64l8.bin See tc22392 that's telling you what thread concurrency it was. It should start without TC parameters, but you never know. So if it doesn't, start with --thread-concurrency 8192 and add 2048 to it at a time till you find the highest value it will start successfully at. So out of the file that looks like this in your cgminer directory: Pull out the value that looks like the highlighted, and use + 2048 that for --thread-concurrency, if it works, add another 2048, and so forth. When it crashes, use the value previous to that. This will be for moving further into customizing the parameters, after we are finished overclocking, we will readjust it again. So if you got to 24440 before you crashed, your file looks like this: setx GPU_MAX_ALLOC_PERCENT 100 setx GPU_USE_SYNC_OBJECTS 1 cgminer.exe --auto-fan --temp-target 80 --temp-overheat 85 -I 13 --thread-concurrency 24440 Overclocking your Card’s Memory Clock and Engine Also, the Scrypt readme has an excellent explanation for finding the best parameters for your card: Then start overclocking the eyeballs off your memory, as 7970s are exquisitely sensitive to memory speed and amazingly overclockable but please make sure it keeps adequately cooled with --auto-fan! Do it while it's running from the GPU menu. Go up by 25 at a time every 30 seconds or so until your GPU crashes. Then reboot and start it 25 lower as a rough start. Mine runs stable at 1900 memory without overvolting. Overvolting is the only thing that can actually damage your GPU so I wouldn't recommend it at all. Then once you find the maximum memory clock speed, you need to find the sweet spot engine clock speed that matches it. It's a fine line where one more MHz will make the hashrate drop by 20%. It's somewhere in the .57 - 0.6 ratio range. Start your engine clock speed at half your memory clock speed and then increase it by 5 at a time. The hashrate should climb a little each rise in engine speed and then suddenly drop above a certain value. Decrease it by 1 then until you find it climbs dramatically. If your engine clock speed cannot get that high without crashing the GPU, you will have to use a lower memclock. Then, and only then, bother trying to increase intensity further. So to do this, in CGMiner, from the main screen: 1. Press G 2. Then C for Change Settings 3. Then Select the GPU. If all your GPUs are the same, I’d recommend NOT testing on the one that your monitor is hooked to, if you aren’t remoting in. From here you can select E or M to modify these properties. After you find good values, go add them to your bat file like this: setx GPU_MAX_ALLOC_PERCENT 100 setx GPU_USE_SYNC_OBJECTS 1 cgminer.exe --auto-fan --temp-target 80 --temp-overheat 85 -I 13 --thread-concurrency 24440 --gpu-engine xxxx --gpu-memclock xxxx You can also find your specific model card(not just a 270, but which specific 270) and find out what other people are using in these parameters. This might give you an idea what might be good to use if you are feeling lazy. This is a good place to start. Upping the Intensity After you have found a good engine and memory clock, now you can start upping the intensity. The -I 13 is what we started with, so you can go to -I 20, and if it shows HW errors or your fans start running too hard, take it down to 19, then 18, until you reach a comfortable level. Refinding your Thread Concurrency Final thoughts from the Author of CGMiner: My final settings were: --gpu-engine 1141 --gpu-memclock 1875 -I 20 for a hashrate of 745kH. Note I did not bother setting a thread concurrency. Once you have the magic endpoint, look at what tc was chosen by the bin file generated and then hard code that in next time (eg --thread-concurrency 22392) as slight changes in thread concurrency will happen every time if you don't specify one, and the tc to clock ratios are critical! So after you found good values for everything else, you take back out thread concurrency, and go back to letting the program generate the file. Then you copy the generated threadcount from the filename back to your startup script. This parameter tells CGminer that the cards are able to draw up to more power if it needs. This is what it looks like as far as possible performance gains: It is not advisable to set this over 20. But it can be set with the Shaders isn’t really used by anyone, because you can only use shaders or threadconcurrency, and thread concurrency is said to be superior . But this is what it does: --shaders XXX command provides a hint to cgminer on how to pick the best baseline parameters for mining. I found this list for recommending settings for shaders: GPU Shaders 7750 512 7770 640 7850 1024 7870 1280 7950 1792 7970 2048 6850 960 6870 1120 6950 1408 6970 1536 6990 (6970x2) 6570 480 6670 480 6790 800 6450 160 5670 400 5750 720 5770 800 5830 1120 5850 1440 5870 1600 5970 (5870x2) It is from the cgminer readme on scrypt, found here. It is also a good general readme on scrypt mining. Again, --shaders doesn’t work with -w is the parameter for Work Size, or the size of jobs your cards will be doing. Most people flag this at -256 to start for mid tier cards. But the effect this parameter is described as “minimal”. This is labeled as an optional parameter that can give some small boost, but shouldn’t be be the first thing you go after. It seems to crash cgminer if it is set any higher than 4, and many people leave it at 1 or 2. Some people have gotten a lot more than others out of this. Voltage may be set for cards by using --gpu-vddc. This requires an unlocked BIOS and special drivers for your card. Otherwise it won’t do anything. This is a good one to explore if you want to make your cards run cooler/more energy efficient, but it is not generally recommended to touch for increasing, and you should know what you are doing here before you decide to touch it. Example CGMiner.bat files Sample completed bat file for a R9 270x (may not be your specific 270x), supplied from the wiki linked to above: setx GPU_MAX_ALLOC_PERCENT 100 setx GPU_USE_SYNC_OBJECTS 1 cgminer.exe -I 19 -g 1 -w 512 --thread-concurrency 15232 cgminer.exe -I 20 -w 256 --thread-concurrency 24000 --gpu-engine 1050 --gpu-memclock 1250 --gpu-vddc 1.087 --temp-target 80 --auto-fan I left the pool info in the cgminer.conf doc, but you can add it as additional parameters to this file or leave it where it is. I prefer to have the pool info separate myself. This guide is not meant to be a starting point, please see the guide I posted here first. 1. Why doesn’t it work? I set the --scrypt variable, the pool info, and other stuff in the last tutorial through the cgminer.conf file, if you are missing these values it won’t work. Try getting the first tutorial to work first before you start on this tutorial. If you are having problems starting CGMiner, try to go back to the basic config in the bat file. If there is a typo in your config file it won’t load up. Sometimes in two -- are getting transformed in my post to a single -- instead I tried to fix all of them, but maybe I missed one. So for parameters besides intensity try -- on the start.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00418.warc.gz
CC-MAIN-2023-14
13,738
86
http://www.takeflightgraphics.com/svcs_web_browser.htm
code
- rest area - company info - design services TFG works to make web sites as technically compatible and visually similar as possible for all browsers, platforms, and screen resolutions. Some differences are inevitable, but site design will be optimized to achieve as much of a consistent look as possible. Web site design is necessarily fluid and user overrides often change the appearance of web pages. TFG can develop for any size screen resolution on request. *Browser compatibility testing/debugging for Unix platforms only upon request. TFG no longers supports Netscape, any browser on Mac OS 9.2.2, or IE versions below 6.0 on any platform.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382851/warc/CC-MAIN-20130516092622-00070-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
645
7
https://developers.arcgis.com/macos/latest/swift/sample-code/controlgraphicdraworder.htm
code
This sample demonstrates how to change the drawing order for a graphic. The sample has four overlapping graphics. You can tap on the respective graphic button, to bring that graphic to the front on the map. How it works An AGSGraphic object has a zIndex property, that defines its order while drawing. The graphic whose zIndex is the maximum is drawn the last or on the top. When the graphic button is tapped, that graphic is assigned a zIndex bigger than all the other graphic’s zIndex. This results in graphic being redrawn and on top of all other graphics.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998369.29/warc/CC-MAIN-20190617022938-20190617044938-00083.warc.gz
CC-MAIN-2019-26
561
3
https://askubuntu.com/questions/223323/cant-boot-the-live-dvd-in-my-pc-uefi-windows-8-dual-boot
code
I have a Dell XPS 8500 pc, with windows 8, and UEFI, I want a dual boot with windows 8 and ubuntu 12.10(64 bits) .. then I was reading the next tutorial: but just can't boot any live dvd, I have downloaded 3 times the ubuntu live dvd(in two differents places), and one time the ubuntu secure remix live dvd ( both in 64 bits). My bios setup: When booting my pc with the live dvd (only in the normal ubuntu live dvd) show this screens: With the ubuntu secure remix never boot (as if you never insert the dvd)... Choose any option of the menu appear the next screen with the next message error: Error: failure reading sector 0x5b500 from cd0 (always exactly the same message with the three dvd copies) Press any key to continue After that change the screen, and show a kernel panic message: Kernel Panic: not syncing: VFS: Unable to mount root on unknow-block (0,0) I need the dual boot, help please (I miss ubuntu)
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506673.7/warc/CC-MAIN-20200402045741-20200402075741-00061.warc.gz
CC-MAIN-2020-16
913
10
https://discuss.atom.io/t/lost-final-code-and-dont-save/79111
code
hi when I try to save the html window with ctrl + s it doesn’t save, it loses a part of the final code. if I try to save with file-save it gives the same error, what should I do? I don’t know how to solve your problem. But I throw in an idea which I find useful. In $HOME/.atom/local-history/ you will see an archive of every file opened in Atom editor. This history can be very useful and archived files can be sorted by a file manager into date order.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141213431.41/warc/CC-MAIN-20201130100208-20201130130208-00254.warc.gz
CC-MAIN-2020-50
457
5
https://teamtreehouse.com/library/introduction-89
code
Introduction2:29 with Dan Gorgone Getting a job or starting a company is something many people can do if they have the right skills and resources. But getting a job isn't the same as being great at it. There are different kinds of skills that can help determine success. [Soft Skills with Dan Gorgone: Important Skills for Professional Success] 0:00 Getting a job or starting a company is something many people can do if they have the right skills and resources. 0:05 People get specialized training, they apprentice, or they go to school to learn the tools of the trade, 0:11 whether that trade is education, business, medicine, or of course, web design and development. 0:17 But whether you've learned the basics of your industry or if you're the fastest and smartest one around, 0:25 getting a job isn't the same as being great at it. 0:30 There are different kinds of skills that can help determine success. 0:34 Hard Skills refer to your ability to perform tasks that are specific to your job. 0:39 Can you build a website? Can you design an app, teach yoga, repair a transmission? 0:45 If you know how to do these things, it means that you have specific training to provide you with skills and expertise. 0:51 Soft Skills on the other hand, refer to personal and professional qualities that allow you to do your job better. 0:58 These are sometimes called people skills because it can refer to your ability to work and communicate effectively with others, 1:05 in groups, as well as online. 1:13 Soft skills also include mental attributes such as problem solving, critical thinking, confidence, and attitude. 1:15 You might be asking yourself what's the bid deal. I mean if I'm the best coder there is, there's no argument. 1:24 I mean, why worry about soft skills? 1:31 Well, unless you plan on working in a cave or working only on your own projects for the rest of your life, 1:34 soft skills are essential to becoming a fully developed professional in the tech industry. 1:40 And here's why. If you're looking for clients but you have a lousy attitude, nobody will want to hire you. 1:46 If you can't be flexible with projects or accept feedback, nobody will want to share their ideas with you. 1:54 And if you can't work with the team or play nice with others, nobody is going to want to work with you. 2:00 In these series of videos, we're going to explore the most important soft skills that you need to be successful at any job. 2:06 And you'll find that many of these skills will be useful outside of work as well. 2:13 If you can be an effective communicator, manage your time, work well with others, and be a great problem solver, 2:18 you'll have a lot more success in whatever you do. 2:25 You need to sign up for Treehouse in order to download course files.Sign up
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176864.5/warc/CC-MAIN-20201124140942-20201124170942-00089.warc.gz
CC-MAIN-2020-50
2,783
4
https://play.google.com/store/apps/details?id=com.blackboard.android.central.uwe_uk
code
Its a good app but would be better if we could access grades and modules through one button as well! Email needs fixing When i press email it takes me to hotmail. Good app though. Easy to access blackboard and my timetable. Poor, needs updating. Don't bother seeing what room you are in for seminars this app won't know! Handy Helpful little app with everything you might need quickly for university life at UWE New Blackboard module has been added Giving you access to North Carolina A&T State University in your hand.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934803906.12/warc/CC-MAIN-20171117185611-20171117205611-00597.warc.gz
CC-MAIN-2017-47
519
7
http://www.thelinuxrain.com/tag:gnu-linux
code
Articles found under tag: gnu-linux The new update is here to introduce several improvements to the Btrfs, EXT4, and JBD2 filesystems Nixcraft: practical tips on NTP Wall St. Journal: Kubernetes has been adopted by a widening range of companies including financial services firms and tire manufacturers. Noobslab: Systemback makes it easy to create backups of system and users configuration files. HowToGeek: For over a decade, practically all tutorials and guides for installing and removing packages on a Debian/Ubuntu based system have been suggesting apt-get to users. Working with Docker requires understanding quite a few Docker-specific concepts, and most of the documentation focuses on explaining how to use Docker's toolset without much explanation of why you'd want to use any of those tools. PC World: Malware is a frequent occurrence in the Windows world, in particular, and it can be devastating. GIMP 2.9.2 is another major milestone towards making GIMP a state-of-the art image editing application for graphic designers, photographers, illustrators, and scientists. AndroidAuthority: Learning to code is difficult enough on its own but with Android development it can be more complicated
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398467979.1/warc/CC-MAIN-20151124205427-00277-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,203
10
https://www.curseforge.com/minecraft/mc-mods/mapfrontiers/download
code
MapFrontiers will start downloading in 5 seconds... STILL DOWNLOADING MANUALLY?? Join over 10 million players who use the CurseForge app! This mod is an addon for JourneyMap that allows you to divide the map into regions and assign them names and colors. You can create frontiers within JourneyMap's fullscreen map using the buttons on the right. For vertex frontiers, use the left mouse button to drag vertices. Use the right mouse button to open the menu where you can add and remove vertices. For chunk frontiers, use the right mouse button to add and remove chunks. You can edit the mod settings and change who can edit, create and delete frontiers. Default key: F8 (I accept suggestions for the default key). If you can't edit the groups or actions it's because the OP didn't give you permission on the server. - Doesn't support frontiers that intersect themselves. - JourneyMap moves Minecraft effect indicators with the minimap. MapFrontiers doesn't do that so they end up in front of the frontier indicator. Versions prior to 2.0.0: To create and manage frontiers you have to use a Frontier Book. When you open a book for the first time, it will be assigned to the current dimension and will allow you to create your first frontier. It also provides some data and an image. In creative mode you can find the book in the tools tab. You can craft it with this recipe: You can also craft the personal frontier book: You can see this and my other projects in alejandrocoria.games. Thank you s10w10rr1s for being my patreon for so long! If you like the mod, you can become a patron and vote on what you would like me to program next.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00664.warc.gz
CC-MAIN-2023-50
1,636
19
https://asamalik.fedorapeople.org/fedora-docs-antora/en_US/internal/latest/
code
Working with Antora Right now we are doing our work with the upstream published docker container. Ultimately we will do something different. docker pull antora/antora Clone the Antora play book git clone ssh://email@example.com/forks/bex/fedora-docs/docs-fp-o.git git checkout antora-playbook Build the site docker run -it -v $(pwd):/antora:z antora/antora site.yml+ [NOTE] You will get a ton of warnings from the draft Packaging Guidelines Docs. You can edit the site.yml if you’d like to skip that doc set. This is remaining included to test errors. (True as of 25 April 2018) View the site Read the site.yml file. The specific branches of the specific forks of the docs are listed there. The test site currently uses the default UI provided by Antora, located at https://gitlab.com/antora/antora-ui-default/ . The default UI is supplemented with additional code located in the This replaces/adds files in the default UI. Long term, we probably want to write a full, single UI in a separate repo, however this is undecided.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204768.52/warc/CC-MAIN-20190326014605-20190326040605-00237.warc.gz
CC-MAIN-2019-13
1,027
15
https://www.crudigniter.com/
code
You can two tables together by defining a one-to-many or one-to-one relationship. In this relationship, you define which foreign key links to which table and the column name which is used to display values while adding or editing that entity (in a dropdown). When the Codeigniter code is automatically generated, it will fetch the appropriate field values and generate the code with the associations. In the example below, the column from_user_id in the messages table maps to the primary key ID in the users table and the column used to display the user is first_name . In the code, the list of users will be fetched in the add and edit controllers so that they are available as a dropdown to be selected.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474445.77/warc/CC-MAIN-20240223185223-20240223215223-00209.warc.gz
CC-MAIN-2024-10
706
6
https://oceanhippie.net/content.php?Cat=3&Res=1610
code
Ok we all know vista is a steaming pile of shite. But lets go back a while and see why you souln't get exited about windows 7. Windows XP is, to all intencive purpouses, Windows 2000 (Technically NT 5, XP being NT 5.1). Windows 2000 is by far and away the best, most stable OS microsoft have ever released. Windows XP is windows 2000 with the teletubibes hired to redesign the look of it. Windows 2000 when it came out would run and run and run without crashing, if something (sigh explorer) got killed you could un-kill it, where as in previous version you had to reboot. If it had a problem it was that it was for the time, increadibly resource hungry. You had to buy a new PC to run it. It was worth it mind. it was good. Still know people who use it today. Because of its massive hardware requirments Microsoft rushed out "Windows ME" or Mirgaine Edition ok Millenium Edition. I've seen virus's that are less trouble than this. A worse OS microsoft has never produced. With the possible exeption of Windows Vista. XP really isn't like 2000 any more. Windows XP Service Pack 2 is more differnet to XP than Windows 2000 is. SP 2 is actually quite a differnet beast. Some programs will only run on SP2 or later. What this tells is Win XP is really a tweek not a full OS, fortunalty built on a good base. Win XP is only a year so after 2000. it is an "improvemnt" (depends on your definition) of a good OS. Windows 7 is coming along shortly after windows vista. However the similarities end there. Yes its better than Vista. But its a long way to go to compete with XP in terms of stability. Lets face it it was worth buying a new PC with windows 2000 - it wouldn't run other wise, but when it did it was good. With vista it wont run on old hardware, but its still not worth buying new PC to run it on. Infact serveral PC's sold with it weren't really up to running it, one poor sod I met I left a message for the sales man. "how can you sleep at night selling a PC with a puny CPU and only a gig of ram with vista on it". Many, Many people downgraded their new PC's to XP. Many more wished they could. Windows 7 is a Fix for vista, its what vista should have been. Insead of improving a good desing they've had to fix a bad one. This is not a sound principal to be starting from. The good news is you don't need as good a PC to run 7 as vista. But for gods sake dream that it is the second comming of windows, its not. Its faster, more stable and easier to live with than vista. Lets face it that's not hard. Phew. It still crashes a lot. They tend to be mnor crashes, restarting explorer will oftern fix them but annoying stuff that wouldn't hppen to XP. Here's a list of common Windows 7 faults - Explorer Crashes a lot open files maybe a 10% chance it will freeze. - If me toobar app for battery is running Explorer Crashes. - If you do "show in explorer" from picasa the first time it will crash. - Folder contents do not up date. If you move stuff to the re-cycle bin they stay in plain view till you refresh the explorer window. - Blue Screen of death - yep fairly oftern. - Driver problems, I've a thinkpad x61. The onscreen display is intermittant, sort of works when it feels like it. Didn't work at all under viste. This may not be MS's fault. But if it doesn't work properly on an expencive corporate laptop it will be worse on PC world home craptops. - Areo Fail. Sometime's when it swiches on and off the nobby desktop effects it freezes. - New today my min, max and close buttons have disapeared. While trying to crop the screen shop above Explorer Crashed again. Then they came back. - "Installer failed" running installers Windows 7 tell's you its failed when it hasn't. Woot. Most of these are water off a ducks back, but explorer's cosntant crashing is starting to get on my nerves. If your not a sad geek like me who likes the nobby desktop effects, and jsut wants a computer that works, don't get exited about 7 stick with XP. I've jsut rolled vista back to XP on my mates new PC - he runs his whole buisness from it, I won't be putting windows 7 on his PC for a long time yet. Upgrading your os? Gotta a PC or network with XP on it? Leave it there, in a year or 2 windows 7 may have become woth it, but were in a credit crunch, don't buy a PC till you have too. Now is not the time, 7 will be out in the autumn. If you want a netbook buy 'em now while xp's still on them. Other wise do an os re-istall, buy a ram upgrade this will make your machine feel ike new. And keep you old machine for a few years. Then when 7's a couple of SP's old get a new PC then.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141189038.24/warc/CC-MAIN-20201127015426-20201127045426-00268.warc.gz
CC-MAIN-2020-50
4,580
19
https://www.codesd.com/item/transform-a-list-of-lists-into-a-list-using-lambdas.html
code
If I have a List<List<Object>> can I turn it into a List<Object> that contains all the objects using continuous (not breaking the invocation sequence) invocations of lambdas? You can use flatMap to flatten the internal lists (after converting them to Streams) into a single Stream, and then collect the result into a list : List<List<Object>> list = ... List<Object> flat = list.stream() .flatMap(List::stream) .collect(Collectors.toList());
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540508599.52/warc/CC-MAIN-20191208095535-20191208123535-00269.warc.gz
CC-MAIN-2019-51
441
6
http://blog.ivarjacobson.com/potential-barriers-to-the-adoption-of-iterative-practices/
code
Understanding the potential barriers to change will help you make the right choices of timing, project, and approach. Some of the more important questions to ask include in the following: - How supportive is senior management of the change? The measurements and milestones they establish can easily derail an iterative approach, as is the case when they ask even seemingly innocent questions such as “When will the design be completed?” or “When will requirements be - What is the scope of your authority to make changes? How much of the development lifecycle are you responsible for? For example, the requirements might have already been specified in a format and to a level of detail that would make it more difficult to adopt an iterative approach. - What are the team’s feelings about the changes? How enthusiastic is the team about iterating? To achieve the transition to iterative development, you will need the support of the team, especially the other members of the leadership team. - What else does the team have to do? How many other projects and initiatives is the team involved in? If the team is not focused on and dedicated to the project, the transition to iterative practices will probably be slower and take more time and energy to complete. - What capability do you need to improve? It is important to understand the capability of the team and how well the current capability supports the proposed iterative approach. For example, is there any testing capability in the team? Testing will be needed from the first iteration, which is often a problem in companies organized around the phases of a waterfall approach. The ideal characteristics of an iterative project, and an actual project’s characteristics should have: - a co-located team, - of less than 10 people, - who are highly-skilled, - and largely self-organizing - who operate with low ceremony, - and who are minimally dependent on outside teams, - with highly-engaged business representatives. These perfect conditions, in fact, almost never exist, but understanding them will help you choose projects that are better suited to an iterative approach. When you start your first iterative project, factor the successful adoption of iterative techniques into the critical success factors for the project and the career development objectives for the team members. This is especially important if circumstances require an investment in training and mentoring the team to enable the transformation to take place. Conventional wisdom suggests that you should choose low-impact, non-critical projects to be the focus of early change efforts to reduce the change effort’s risk and the potential for failure. The problem with this is that although these projects are lower risk, their non-criticality usually means that they are starved for resources and not considered “mainstream” enough to ever be taken seriously as success stories. This dooms the overall change initiative. Low-priority projects are not visible enough to engender the support needed to drive the change forward. Instead you should: - Look for a small number of must-do projects that have organizational focus and strong support - Look for projects with a smaller set of stakeholders to keep communication simpler - Look for projects with high internal visibility—ones that would make good success stories - Choose projects that are shortto medium-term in length - Staff the projects with the best people available (respected leaders) - Organize projects to generate short-term wins—divide work into iterations - Keep the project size small in the first few iterations and then scale up - Focus on choosing the right projects and committing resources to them Choosing critical projects sounds risky, but the reality is that only critical projects will get the attention and resources necessary to succeed. The key is choosing projects critical enough to get resources but that can start small and then scale up in a controlled way, not becoming too large before the architecture and technical risks can be brought under control. Scaling up should be targeted for the Construction phase but not before.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118477.15/warc/CC-MAIN-20170423031158-00144-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,164
51
http://oceangeek.club/2017/08/24/hacker-gets-access-to-company-accounts-through-error-in-helpdesk-mechanism/
code
Hundreds of companies have been hacking for years via their helpdesk. That is because of a logical error that was never discovered before. By misusing the leak, hackers can provide access to the help desk, internal communications and, in some cases, the social media accounts of a company. The error was discovered by the Belgian ethical hacker Inti de Ceukelaire. It’s not a technical bug but rather what the Ceukelaire describes as “a logical error in the helpdesk procedure.” This was done through the business chat program Slack. The app’s code is nothing but an error in the helpdesk of other companies, knowing to access the Slack channels of that company. Slack himself has meanwhile modified his verification process, but also Yammer and other tools can be exploited so abusively. Employees of companies using Slack and Yammer can join their company address. The people in question should not be invited, an email address with address is sufficient. Virtual business address via help desk The Ceukelaire, however, discovered a way to create a virtual mail address for such a company through their helpdesk portal. He could do this on the Gitlab developer platform. Whoever makes a ticket to Gitlab (but also hundreds of other companies) as a user at the help desk, receives a unique virtual email address for the user and helpdesk conversation in the user portal. But that virtual address is one with a extension. “So once you get assigned such a virtual address via a created ticket, you can also register yourself on their internal Slack channel and follow the internal communication.” That trick could then be repeated with other services, including Yammer. The story becomes even more interesting if you know that many web services do not check that the email address with which someone is registering is also effective. For example, De Ceukelaire could invite himself to Vimeo’s slack channel by signing in with Slack’s support address. Here he registered a user account at Vimeo video service. Vimeo did not check if the Ceukelaire really had this address and gave him such a user account. Thereupon, he again appealed to the Slack application to access the Slack channels of Vimeo employees. For this he gave firstname.lastname@example.org. Think back to the helpdesks that are created in the user account: Slack sends an access link for the Vimeo chat channels. However, as this is the helpdesk address, Vimeo automatically transfers that mail to a helpdesk ticket associated with the mail sender. That account had registered De Ceukelaire shortly so that he could see the ticket. The Ceukelaire has in the meantime contacted various companies and they have adapted their procedures. But he emphasizes that there are still hundreds of similar systems, either the helpdesk software or collaboration tools that allow such circumvention techniques unconsciously. “The big problem is that you can create an account with many email services without a lot of services,” he says to Data News. If you then register the mail address with which they send their verification mail, you can enter. ” The leak itself was discovered a few months ago. Meanwhile, he himself has warned more than one hundred companies where he could detect the error. “I’ve started with those who already work with ethical hackers, and Slack has adapted his procedures in the meantime, but you can not find them all once and then contact.” Not yet resolved everywhere The Ceukelaire has therefore consciously waited for a number of companies to correct the error. But now, I want to get out with the problem so that other companies can check if their system also contains such an error. That sometimes gave him varying responses. “Some companies have taken care of it and even rewarded me because I’m wrong with them, but I’ve repeatedly reported it to Yammer without comment that they would handle it.” Others like Zendesk or Kayako have taken measures in the meantime. The Ceukelaire does not realize that it is not a fault of these tools, but of the companies they use. Even though they can change their procedure, they reduce the risk of burglary by those users. Security is weakened In an extensive blog post, De Ceukelaire warns that once you’re a bit in the internal communication of a company, security is often a lot weaker. “Often, password reset is done via such a support or noreply address, so I even got access to the Twitter and Facebook accounts of some big companies.” Finally, the problem can be solved relatively easily. On the one hand with verification mail. But also because of such addresses can not be made from, but from simply . “Once you make such a change, you can no longer request access through the helpdesk,” decides De Ceukelaire.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525046.5/warc/CC-MAIN-20190717041500-20190717063500-00134.warc.gz
CC-MAIN-2019-30
4,791
19
http://guidetonirvana.com/2016/09/04/digestive-enzymes/
code
Why Should you take digestive enzymes? Let me start out by saying that I take these regularly. Digestive Enzymes break down the food into small molecules to be absorbed by your body. The standard American Diet does not support healthy digestive enzyme production. Which can lead to leaky gut, lack of productive digestive system in general.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816351.97/warc/CC-MAIN-20180225090753-20180225110753-00057.warc.gz
CC-MAIN-2018-09
340
2
https://forum.qubes-os.org/t/disable-automatic-updates-for-arch-linux-templates/9323
code
I want to disable the automatic updates for the arch linux template and manage the updates by myself. Currently the update-manager always shows needed updates for the template. This might be related to the rolling release in Arch linux. I followed the instructions from Disable Qube updates for a specific qube - #6 by cpp977 and selected qubes-update-check in the list and disabled the entry for my arch linux template. But I still get always the notification that the template needs to be updated. Is there anything else I can do? Thanks for help!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662561747.42/warc/CC-MAIN-20220523194013-20220523224013-00577.warc.gz
CC-MAIN-2022-21
549
6
https://www.fr.freelancer.com/projects/graphic-design/need-website-layout-updated-mobile-7458710/
code
I need my website template updated ASAP . Freelancer must be able to start today. It likes like something from 2009 i need it to more 2015ish AKA newer. I also need a response version made after the layout is updated. contact me for more details. It most follow goggle guide lines with font size etc... IM NOT LOOKING FOR THE HOLD WEBSITE TO BE UPDATED JUST LOOK A LITTLE NEWER.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986696339.42/warc/CC-MAIN-20191019141654-20191019165154-00467.warc.gz
CC-MAIN-2019-43
378
1
https://techqa.club/v/q/synchonisation-from-ad-to-exchange-office-365-c3RhY2tvdmVyZmxvd3w1NjE4MzIzNg==
code
I have created an user but with some errors, error on smtp: SMTP SIP etc... I changed it on Active Directory OU sync to azure but the values set after creation on office 365 and exchange is still the same (the .onmicrosoft.com alias wasn't create at the beginning and now this value doesn't want to change). I try to sync with PowerShell command : Start-ADSyncSyncCycle -PolicyType Delta, and I check on synchronisation manager and I still have the same value
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780054023.35/warc/CC-MAIN-20210917024943-20210917054943-00560.warc.gz
CC-MAIN-2021-39
459
5
https://lamont.columbia.edu/events/bpe-seminar-georgy-falster
code
Please join us for the next BPE Seminar this upcoming Monday, September 20th at 1 pm for a virtual talk by Dr. Georgy Falster from Washington University in St. Louis titled Multi-method, multi-proxy reconstructions of the Pacific Walker Circulation over the past 400 years. The Pacific Walker circulation (PWC) affects weather and climate far beyond the tropical Pacific. The PWC is also an important component of the El Niño-Southern Oscillation (ENSO) and its global teleconnections. Understanding drivers of PWC variability—particularly beyond the interannual time scales typically associated with ENSO—is important for understanding impacts of future climate change, but neither the response of the PWC to external forcings nor its natural internal variability are well understood. We recently demonstrated that there is a strong PWC imprint in the spatio-temporal variability of modern global precipitation δ18O (Falster et al., 2021). That imprint allows us to leverage proxy records for past meteoric water δ18O/δ2H to reconstruct PWC variability back beyond the instrumental era. In the work that I will share in this seminar, we applied several statistical methods to reconstruct the PWC at annual resolution from 1600-2000 CE, using records from the PAGES Iso2k database (Konecky et al. 2020). We use these reconstructions to assess the nature of PWC variability on various time scales, as well as comparing these findings with climate model simulations.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818474.95/warc/CC-MAIN-20240423095619-20240423125619-00305.warc.gz
CC-MAIN-2024-18
1,472
3
https://rdrr.io/cran/ALA4R/
code
The Atlas of Living Australia (ALA) provides tools to enable users of biodiversity information to find, access, combine and visualise data on Australian plants and animals; these have been made available from <http://ala.org.au/>. ALA4R provides a subset of the tools to be directly used within R. It enables the R community to directly access data and resources hosted by the ALA. Our goal is to enable outputs (e.g. observations of species) to be queried and output in a range of standard formats. |Author||Ben Raymond [aut, cre], Jeremy VanDerWal [aut], Lee Belbin [aut], Michael Sumner [ctb], Tom August [ctb], John Baumgartner [ctb]| |Date of publication||2016-11-09 18:28:38| |Maintainer||Ben Raymond <firstname.lastname@example.org>| ala_cache_filename: Returns the name of the cache file associated with the given... ala_config: Get or set configuration options that control ALA4R behaviour ala_fields: Retrieves a list of all field names that can be used with... ala_list: Species lists ala_lists: Find ALA species lists aus: Basic Australia raster for visualization A basic raster... check_assertions: Check assertions in occurrences object fieldguide: Generate a PDF field guide using the ALA's field guide... image_info: Fetch information about an image, given its image ID intersect_points: Intersect environmental or contextual layers at a given a set... occurrence_details: Retrieve the full details of occurrence records occurrences: Get occurrence data occurrences_plot: Quick geographic plot of occurrence data occurrences_s3: Summarize, filter and subset occurrence data search_fulltext: Full text search search_guids: Lookup of species identifiers search_layers: Search for environmental and contextual data layers search_names: Lookup of taxonomic names search_partial_name: Partial-name search sites_by_species: Sites by species species_info: Fetch a taxon profile given a scientific name or LSID (GUID) specieslist: Get list of taxa and their occurrence counts taxinfo_download: Download taxonomic data
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00211-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
2,025
27
https://amcwebmarketing.com/mailerlite-automation-tutorial-2021-step-by-step/
code
Start Here ▶ https://meticsmedia.com/mailerlite In this mailerlite automation tutorial I will show you step-by-step how to use mailerlite automation for creating email sequences that run completely on autopilot once someone subscribes to your email list! Complete MailerLite Tutorial ▶ https://youtu.be/6W0n7fBmavc 👉 Best Online Marketing Tools ▶ https://meticsmedia.com/tools The description of this video contains affiliate links, which means that if you buy one of the products that I recommend, I’ll receive a small commission without any additional cost for you. This helps support the channel and allows me to continue making videos like this. Thank you for your support!
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104692018.96/warc/CC-MAIN-20220707124050-20220707154050-00047.warc.gz
CC-MAIN-2022-27
688
5
https://answers.sap.com/questions/6020104/print-preview-functionality-for-the-fax-output-usi.html
code
I am working on an issue for the Smartform Fax output which is for the Purchase Order. The requirement is: User wants to see the print preview of the PO output before the Fax output sends to the Fax server. Fax is working fine. I tried giving some parameters in the Smartform for the print preview and it did not work. I tried with CONTROL_PARAMETERS-PREVIEW and it is not working. It is still sending fax without print preview. But I did the same thing for the External send medium and I could see the print preview. Please share with me if anybody worked on this.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00028.warc.gz
CC-MAIN-2023-40
565
4
http://www.tomshardware.com/forum/355667-28-which-faster-laptop-deskop
code
Core i3 will be slower man, I'm telling you. i7 will always be better than i3 unless the i7 is ten years old. xD False, the i7 620m is a generation behind the new i3, and is a dual core at 2.6Ghz. The i3-2120 is a dual core at 3.3Ghz, so right there it is already faster. Sandy bridge is also about 20% faster clock for clock than the previous architecture, so the desktop i3-2120 should be quite a bit faster.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425352.73/warc/CC-MAIN-20170725182354-20170725202354-00064.warc.gz
CC-MAIN-2017-30
410
4
https://w3.movies123.ltd/actor/ron-allen/
code
The Wild Life (2016) On a tiny exotic island, Tuesday, an outgoing parrot lives with his quirky animal friends in paradise. However, Tuesday can't stop dreaming about discovering .. Age of Dinosaurs Using breakthrough flesh-regeneration technology, a biotech firm creates a set of living dinosaurs. But when the creatures escape their museum exhibit and ter.. Follow Me (2020) A social media personality travels with his friends to Moscow to capture new content for his successful VLOG. Always pushing the limits and catering to a grow..
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107896778.71/warc/CC-MAIN-20201028044037-20201028074037-00463.warc.gz
CC-MAIN-2020-45
537
6
https://dev.to/belinde/comment/b3kp
code
Printing the CSS1 specification on paper and studying it, thinking "I don't know if it will ever be useful, but it's cool!" Buying a HUGE book about SVG and thinking "I'm sure that coding an image by hand will be surely useful" Mandrake Linux! And after that Slackware because I was feeling a pro. We're a place where coders share, stay up-to-date and grow their careers. We strive for transparency and don't collect excess data.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330962.67/warc/CC-MAIN-20190826022215-20190826044215-00241.warc.gz
CC-MAIN-2019-35
429
5
https://www.behance.net/PavloSydorenko?tracking_source=search
code
Everything that you see in your head can be easily turned into reality. My name is Pasha. I'm a simple designer. This is the main rule of design, you know? Simplicity, nothing superfluous. Working with me will also be simple: everything from banners and New Year cards to designing websites.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00504.warc.gz
CC-MAIN-2020-16
291
5
https://avocados.dev/adventcado/2020/12/05/jen-looper/
code
Tell us a bit about yourself. I’m a Developer Advocate Lead on the Academic Team within Cloud Advocacy at Microsoft, with over 20 years’ experience as a web and mobile developer, specializing in creating cross-platform mobile and web apps. I’m a multilingual multiculturalist with a passion for hardware hacking, mobile apps, Vue.js, machine learning and discovering new things every day. With a PhD in medieval French literature, my area of focus is currently in applied machine learning, applying new techniques to rediscover ancient artifacts. I’m the founder and CEO of Front-End Foxes, an international nonprofit charity that promotes diversity in front-end developer communities. Visit Front-End Foxes Inc at frontendfoxes.org. Visit my personal site at jenlooper.com, or via Twitter @jenlooper. How did you get into Developer Relations? I was a software engineer for 20 years and wanted to make a small change, so I was recruited by a friend into a great company called Telerik, which gave me my start as DevRel. What advice would you give people looking to join you? To be a good Developer Advocate, I believe you need to be a good engineer, to be able to speak the language of developers in the trenches. At least half of your work should be pairing with product teams, so that you can best represent their work to the company’s customers. After all, it’s your job to act as a liaison between the folks building the software and the folks using it. Having mileage as an engineer is really helpful to be able to make that liaison with conviction. How has your role changed in the past year? The biggest change for me is that all travel has ceased due to COVID…a big change for folks who spend a lot of time on stage. But before this happened, I was really questioning the sustainability of this business model. How do you see the future of DevRel? I think the business of conferences will have to change and DevRel’s role as evangelists as well. An industry around tech conferences has arisen and I don’t think it’s sustainable from a carbon standpoint or from a community standpoint. COVID has forced us to take all our activities online, with varying success. We need to really think outside the box to reach more people in the most authentic manner, without depending on in-person events.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989616.38/warc/CC-MAIN-20210513234920-20210514024920-00155.warc.gz
CC-MAIN-2021-21
2,319
10
https://www.dynamicforces.com/htmlfiles/p-C125109.html
code
FLASH REBIRTH #1 SIGNED BY JOSHUA WILLIAMSON! ULTRA-LOW PREMIERE INTRO PRICE OF $10 FOR A VERY LIMITED TIME! Spinning directly out of the epic events of DC Universe: REBIRTH #1, the fastest man alive finds himself at the center of a DC Universe at a crossroads. WARNING: Do NOT read this issue until after you read DC Universe: REBIRTH #1! FINAL COVER MAY VARY.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652959.43/warc/CC-MAIN-20230606150510-20230606180510-00364.warc.gz
CC-MAIN-2023-23
361
2
https://golangd.com/g/james-bowman-nlp-go-language-and-linguistics
code
Natural Language Processing Implementations of selected machine learning algorithms for natural language processing in golang. The primary focus for the package is the statistical semantics of plain-text documents supporting semantic analysis and retrieval of semantically similar documents. - LSA (Latent Semantic Analysis aka Latent Semantic Indexing (LSI)) implementation using truncated SVD (Singular Value Decomposition) for dimensionality reduction. - Fast comparison and retrieval of semantically similar documents using SimHash(random hyperplanes/sign random projection) algorithm with multi-index and Forest schemes for LSH (Locality Sensitive Hashing) to support fast, approximate cosine similarity/angular distance comparisons and approximate nearest neighbour search using significantly less memory and processing time. - Random Indexing (RI) and Reflective Random Indexing (RRI) (which extends RI to support indirect inference) for scalable Latent Semantic Analysis (LSA) over large, web-scale corpora. - Latent Dirichlet Allocation (LDA) using a parallelised implementation of the fast SCVB0 (Stochastic Collapsed Variational Bayesian inference) algorithm for unsupervised topic extraction. - PCA (Principal Component Analysis) - TF-IDF weighting to account for frequently occuring words - Sparse matrix implementations used for more efficient memory usage and processing over large document corpora. - Stop word removal to remove frequently occuring English words e.g. "the", "and" - Feature hashing ('the hashing trick') implementation (using MurmurHash3) for reduced memory requirements and reduced reliance on training data - Similarity/distance measures to calculate the similarity/distance between feature vectors. - Expanded persistence support - Stemming to treat words with common root as the same e.g. "go" and "going" - Clustering algorithms e.g. Heirachical, K-means, etc. - Classification algorithms e.g. SVM, KNN, random forest, etc. - Rosario, Barbara. Latent Semantic Indexing: An overview. INFOSYS 240 Spring 2000 - Latent Semantic Analysis, a scholarpedia article on LSA written by Tom Landauer, one of the creators of LSA. - Thomo, Alex. Latent Semantic Analysis (Tutorial). - Latent Semantic Indexing. Standford NLP Course - Charikar, Moses S. "Similarity Estimation Techniques from Rounding Algorithms" in Proceedings of the thiry-fourth annual ACM symposium on Theory of computing - STOC ’02, 2002, p. 380. - M. Bawa, T. Condie, and P. Ganesan, “LSH forest: self-tuning indexes for similarity search,” Proc. 14th Int. Conf. World Wide Web - WWW ’05, p. 651, 2005. - A. Gionis, P. Indyk, and R. Motwani, “Similarity Search in High Dimensions via Hashing,” VLDB ’99 Proc. 25th Int. Conf. Very Large Data Bases, vol. 99, no. 1, pp. 518–529, 1999. - Kanerva, Pentti, Kristoferson, Jan and Holst, Anders (2000). Random Indexing of Text Samples for Latent Semantic Analysis - Rangan, Venkat. Discovery of Related Terms in a corpus using Reflective Random Indexing - Vasuki, Vidya and Cohen, Trevor. Reflective random indexing for semi-automatic indexing of the biomedical literature - QasemiZadeh, Behrang and Handschuh, Siegfried. Random Indexing Explained with High Probability - Foulds, James; Boyles, Levi; Dubois, Christopher; Smyth, Padhraic; Welling, Max (2013). Stochastic Collapsed Variational Bayesian Inference for Latent Dirichlet Allocation
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00203.warc.gz
CC-MAIN-2023-50
3,399
28
http://www.coderanch.com/t/428420/patterns/Interpretor-Pattern
code
I'm writing a Java sample program for demonstrating interpretor design Pattern. Can you please tell me how should i go about writing the "Note class and the Frequency class" for the above example. How should i invoke the above class from my main method.I'm finding it difficult to proceed. Need your help ?? Help provided will be appreciated. When The Going Gets Tougher,The Tougher gets Going Joined: Jul 11, 2001 Where do you see the Interpreter design pattern in this example? The soul is dyed the color of its thoughts. Think only on those things that are in line with your principles and can bear the light of day. The content of your character is your choice. Day by day, what you do is who you become. Your integrity is your destiny - it is the light that guides your way. - Heraclitus This is an example of Interpretor design pattern. The musical notes along with their frequencies is stored in the properties file. By passing a Note,a corresponding frequency is retrieved and based on the frequency a corresponding sound is produced.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00082-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,042
12
http://codeblow.com/questions/speed-of-online-backup-copies-with-blobs/
code
In Oracle 8 doing a web-based backup with BLOBs within the database is very slow. By slow, I am talking about over an hour or so to backup a database with 100MB of BLOB data. Oracle acknowledged it had been slow, but wouldn't repair the problem (a lot for having to pay for support.) Does anybody determine if Oracle has fixed this issue with subsequent releases? Also, how quickly do online backup copies use BLOBs operate in SQL Server and MySQL? I have had this problem previously, and also the only decent workarounds we found would make certain the LOBs were in their own individual tablespace, and employ another backup strategy together, in order to change to while using BFILE type. Whether you are able to manage with BFILE will rely on how you are while using LOBs. Some usage information on BFILE: Observe that BFILEs survive the filesystem outdoors of Oracle, so you'd have to back them up inside a process outdoors of the normal Oracle backup. On a single project we simply were built with a scheduled rsync to off-site backup. Also worth noting is you cannot create/update BFILEs via JDBC, but read them. To reply to your question concerning the speed of online backup copies of BLOBs in SQL Server, it is the same speed as copying regular data for SQL 2000/2005/2008 - it's typically restricted to the rate of the storage. It's my job to overcome 100mb/sec on my small database backup copies with BLOBs. Be skeptical of utilizing backup compression tools with individuals, though - when the BLOB is binary-style data that's heavily random, then you will waste CPU cycles attempting to compress the information, and compression could make the backup reduced rather than faster. I personally use SQL Backup from Redgate for SQL Server -- it's absurdly fast, despite my BLOB data. I have a copy of each and every file which i do EDI with, so when they aren't huge, they're numerous and BLOBs. I am more than 100Megs of just these text files. You need to observe that Redgate's SQL Backup is simply a front-finish towards the standard SQL Backup...it offers a superior additional management features, essentially, but nonetheless utilizes the SQL Server backup engine. With respect to the size the BLOBs, make certain you are storing them in-line / from line properly. Are you able to place the export file you are creating and also the Oracle tablespaces on different disks? You I/O throughput might be the constraining factor...? exp on 8i was slow, but less than you describe. I've backed-up gb of blobs within a few minutes in 10g..(to disk - using expdp)
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160853.60/warc/CC-MAIN-20180925004528-20180925024928-00201.warc.gz
CC-MAIN-2018-39
2,570
12