url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://docs.appsmith.com/getting-started/setup/instance-configuration/authentication
code
This section covers different authentication methods available on Appsmith. The default form login allows users to sign in using their email address and password. Besides, you can authorize users into Appsmith apps using Google OAuth, GitHub OAuth and popular SSO authentication protocols like SAML(enterprise version) and OpenID Connect(enterprise version). Single Sign-On (SSO) is a convenient and secure way for users to access multiple applications with just one set of login credentials. This eliminates the need for users to remember multiple usernames and passwords, and also increases security by reducing the risk of password reuse. In Appsmith, SSO can be configured to use custom authentication methods, allowing users to securely access your apps using an authentication system they're already familiar with. For example, if a user logs into their email account using their SSO credentials, they can also be able to access other related systems such as the company's internal HR system, or a project management tool, without having to enter their login information again. This can save time and increase security by reducing the risk of forgotten passwords and phishing attacks. In Appsmith, you have the option to configure Single Sign-On (SSO) using custom authentication methods. This allows you to integrate with the authentication system your users are already familiar with, providing a more seamless and secure login experience. Below is a list of available SSO integrations that can be configured in Appsmith:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00277.warc.gz
CC-MAIN-2023-50
1,529
3
https://www.hithsociety.org.au/Executive-Council
code
Society Board and Executive 2023 - 2024 About the Board and Executive roles Board Members are appointed for 2 year terms and have responsibility for ensuring the financial and operational stability of the Society. Any member can nominate for a Board position. President, Vice President, Treasurer, and Secretary of the Society are determined by the board following election of board members at the AGM. Nominations require two financial members to endorse the nomination. Executive require a single financial member to nominate, and are typically members who wish to engage with the society but don't seek a formal board position, wish to do a discrete piece of work on the society's behalf, and is the preferred option to learn more about the society, and it is useful to be an Executive member for a year or two prior to nominating for board. Reports2021-2022 Financial Report (requires login)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816853.44/warc/CC-MAIN-20240413211215-20240414001215-00441.warc.gz
CC-MAIN-2024-18
895
6
https://forums.macrumors.com/threads/itunes-library-not-valid.427704/
code
When I try to open iTunes i get a message that says: " The file "iTunes Library" does not appear to be a valid iTunes library file. iTunes has created a new iTunes library and renamed this file to "iTunes Library (Damaged) 2". It may say 2 because the same message came up this morning when I tried to open iTunes. What I was doing when this happened: I had just downloaded a file from a music blog, I opened the folder, highlighted all the MP3's and then double clicked. Usually I have iTunes open when I do this. Then the above message box appeared. I have a large iTunes music Library of about 5000 songs, approx 20GB. When I click on Finder and click on Music I see all my files along with 3 "iTunes Library (Damaged)" icons in a iTunes folder. I use iTunes 7.6. I Have Tiger 10.4.11. I use an iBook 1.42Ghz with 1.5 GB Ram. I want my music back, please help! Thanx, Greg.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593223.90/warc/CC-MAIN-20180722120017-20180722140017-00109.warc.gz
CC-MAIN-2018-30
876
1
https://github.com/Jaza/s3-saver
code
Utility class in Python for finding, saving, and deleting files that are either on Amazon S3, or on the local filesystem. The idea behind this, is that you can pass exactly the same data (in particular, the same file path) irrespective of whether you're working with a local or S3-based file. All you have to do, on each call, is to specify 's3' for S3, or None for local. This is great for apps where all files are stored on the local filesystem in one environment (e.g. development), and on S3 in another environment (e.g. production). The only thing you have to work out at run-time, is whether to specify 's3' or None - the rest of your file-handling code stays the same. For a complete, working Flask app that demonstrates s3-saver in action, have a look at flask-s3-save-example. from io import BytesIO import os from s3_saver import S3Saver bucket_name = 's3-test-foobar-whizbang' # Absolute path to your project's root static_root_parent = '/home/mrfoo/pyprojectfoo' # Absolute path to dir where file gets saved base_path = os.path.join(static_root_parent, 'static/uploads') # For a dummy object that attributes can get saved to. # In most real-life cases, this would be an ORM model # (e.g. inherited from django.db.models.Model for Django, or # sqlalchemy.ext.declarative.declarative_base() for SQLAlchemy). class Thingy(object): pass # Load a sample file into a temp object filename = 'whizbang.jpg' filepath = os.path.join(base_path, filename) thingy = Thingy() temp_file = BytesIO() # Read a local file into a BytesIO object. # For most real-life cases, you'd instead load a file uploaded # in a HTTP POST request into a BytesIO. E.g. in a Flask route: # from flask import request # request.files['thingy_image'].save(temp_file) f = open('/home/mrfoo/photos/hobbies/whizbang.jpg', 'rb') f.seek(0) one_mb = 1024*1024 t = f.read(one_mb) while t: temp_file.write(t) t = f.read(one_mb) f.close() # Initialize the saver image_saver = S3Saver( storage_type='s3', bucket_name=bucket_name, access_key_id='XXXXX', access_key_secret='YYYYY', field_name='image', storage_type_field='image_storage_type', bucket_name_field='image_storage_bucket_name', filesize_field='image_filesize', base_path=base_path, static_root_parent=static_root_parent) # Save the file to S3, in the specified bucket, # at 'static/uploads/whizbang.jpg' image_saver.save(temp_file, filename, thingy) print(thingy.image) # 'whizbang.jpg' print(thingy.image_storage_type) # 's3' print(thingy.image_storage_bucket_name) # 's3-test-foobar-whizbang' # In most real-life cases, you'd persist the 'thingy' object # at this point. E.g. in SQLAlchemy: # db.session.add(thingy) # db.session.commit() # Now save the file locally, # at '/home/mrfoo/pyprojectfoo/static/uploads/whizbang.jpg' image_saver.storage_type = None image_saver.save(temp_file, filename, thingy) print(thingy.image) # 'whizbang.jpg' print(thingy.image_storage_type) # '' print(thingy.image_storage_bucket_name) # '' # Find files on S3, searching by key prefix. # Prints: # [u'static/uploads/whizbang.jpg'] print([k.name for k in image_saver.find_by_path( '/home/mrfoo/pyprojectfoo/static/uploads/whizb', storage_type='s3', bucket_name=bucket_name)]) # Find files locally, searching by glob. # Prints: # ['/home/mrfoo/pyprojectfoo/static/uploads/whizbang.jpg'] print([k for k in image_saver.find_by_path( '/home/mrfoo/pyprojectfoo/static/uploads/whizb', storage_type=None, bucket_name=bucket_name)]) # Delete the file on S3. image_saver.delete( '/home/mrfoo/pyprojectfoo/static/uploads/whizbang.jpg', storage_type='s3', bucket_name=bucket_name) # Delete the file locally. image_saver.delete( '/home/mrfoo/pyprojectfoo/static/uploads/whizbang.jpg', storage_type=None, bucket_name=bucket_name)
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527720.37/warc/CC-MAIN-20190419121234-20190419143234-00272.warc.gz
CC-MAIN-2019-18
3,726
5
https://www.devshows.dev/podcasts/syntax/hasty-treat-domain-management/
code
In this Hasty Treat (Short episode) Scott and Wes discus all things domains. Where to get them, how to set them up and how to safe time managing them all in one place.Netlify — Sponsor Netlify is the best way to deploy and host a front-end website. All the features developers need right out of the box: Global CDN, Continuous Deployment, one click HTTPS and more. Hit up netlify.com/syntax for more info.Show Notes - What is a domain? - What is DNS? - Different types of DNS records - Different kinds of domains - .com, .tv, .io, etc.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303747.41/warc/CC-MAIN-20220122043216-20220122073216-00000.warc.gz
CC-MAIN-2022-05
537
7
http://joonaspajunen.com/this-vs-that-vs-not
code
this vs that vs not I see a lot of discussion on which technology or framework is the best. Too often, the conversation revolves around which on is the best on absolute terms. To make this less abstract, think about React vs Angular, or pretty much just any library, framework, or architecture we’ve had over the years. The idea that one thing is the best option for everything and everyone is of course plain ridiculous. The opposite - yet still flawed - viewpoint is that of those who declare the chosen framework to be irrelevant. The only thing that matters, is the implementation and overall reasoning. Granted, the chosen technology matters little if the project fails on incompetence or mismanagement. The potential leverage provided by a technology can always end up wasted. There is a multitude of reasons why a framework fails to be the silver bullet, and why a DIY attitude might sound tempting. But incompetence and the lack of know-how also applies to doing things on your own. If a person underperforms when utilising an existing framework, on what grounds would he do better when given even more options? In my experience, some constraints are good. The existing libraries provide conventions, constraints and rules for varying degrees, and if not abused, they are generally sensible. If they’re not satisfactory, you usually have the choice before the selection of the technology. You can choose the one with the most intuitive and fitting constraints. Learning by doing is great if the given customer, employer or project constraints allow for it. Generally, they don’t. Frameworks need learning too, and in some cases that learning curve might actually be steeper than what a project allows. In that case, it’s usually better not to overshoot, and stick to what comes naturally. a tool for a team # By pure technological standards, the choice of technology might be obvious, but that alone is insufficient. We need to consider the people in implementing and designing team, as well the structure of work. As in who is responsible for what, and what kind of workflow are we dealing with. Also, there are the classic monetary, budgetary and timing constraints. The fact is, some technologies provide better grounds for faster development, while some are safer and steadier. A large team or organisation might do better with microservices, modularity, and separation of concerns. They might benefit more from heavy constraints and rules, those found in static languages and strict scaffolding. A small team might excel with a single base behemoth advanced by prototype oriented development with a dynamic language. Projects and teams are rarely divided in any clear-cut categories, and it turns out you must figure these decisions out yourself. In some of the worst adversarial arguments, the opposing sides tend not to acknowledge each others strengths, at all. Instead, they concentrate on weaknesses. For the reader, it is difficult to find out the fitting examples and real world use cases. Selection becomes overwhelming in a sea of biases and heated opinions. Projects like TodoMVC are a great start, but let’s face it, a todo app solves only a certain kind of a problem. I’d like to think these tech1 vs tech2 debates are conducted tongue-in-cheek. But many are too serious. Some live in a bubble where the non-technological issues are irrelevant. For those who don’t have to think about business or people for that matter, they can concentrate on the minute technological details, and that is fine. Comparison and criticism are essential for advancement, and for the growth of the profession and our tools. Technology choices matter, but they’re always only a part of the whole. Debates, comparison and opinions are good, but should not steer the technological selection process without consulting the human crew first. worthwhile stuff # Full Stack Radio - DHH on how technology choices relate to organisational structure, among other things
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816942.33/warc/CC-MAIN-20240415045222-20240415075222-00764.warc.gz
CC-MAIN-2024-18
3,981
13
https://salesforce.stackexchange.com/questions/270384/cant-retrieve-a-different-attribute-than-status-from-a-list-through-ssjs
code
I am trying to receive a specific subscriber from a list by using the email address as an identifier. After I have this subscriber I want to print out it's subscription status. So far I am still stuck with retrieving the actual subscriber. "The count is 0." When putting "Status" as the property and changing the "Value" to Active it does return the correct amount of active subscribers. The list looks as follows, you can see that the email address is in the list.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145438.12/warc/CC-MAIN-20200221014826-20200221044826-00242.warc.gz
CC-MAIN-2020-10
465
4
https://ans.disi.unitn.it/redmine/projects/internet-on-fire/repository/iof-bird-daemon/changes/proto/ospf/lsupd.h?rev=67cc9135bfd515149ecca62f32026cd6e2a390b0
code
You can decide if add LSA into lsrth during flood_lsa(). Better shutdown. (Flush my own router LSA and send 1WAY to every neighbor.)Ext LSA originating and flushing added. Routing table calculation. Dijkstra done. LS ack bugfix. (I didn't remove LSA from LSret hash.) Small change in LSA originating. Sending of lspd as responce to lsreq done. Skeleton structures and files added.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300533.72/warc/CC-MAIN-20220117091246-20220117121246-00376.warc.gz
CC-MAIN-2022-05
380
7
http://www.eightforums.com/windows-8-news/24276-ransomware-tricks-victims-into-paying-hefty-fines-3.html
code
This machine was given to him by a friend without disks. He's not computer savvy whatsoever and he's just a "consumption" user. I believe he was using Chrome, but I don't know which version. I'm sure it wasn't updated. I don't think it would've mattered what browser he was using. Nothing was updated, not even the 3rd party AV. This machine was like an open sore inviting viruses in! There was IE8 on it, of course, but eventually upgraded that to IE9. Once I rid it of this ransomware virus (thank the lucky stars there were good restore points), the machine ran as slow as molasses in the Artic Circle. Vista + 3rd party AV + 1GB RAM = S.L.O.W. LOL! I don't know how this man used this machine as long as he did! Either he hasn't used a good one before, doesn't know how fast a machine can run, or he has patience of a saint! When I opened Programs and Features to uninstall the AV I couldn't believe what I saw! 3 (Yes, three!) AVs and about 40 other programs! I sat there with him and went through the list uninstalling those he didn't use. About 30/35 of them. Rebooted when needed. Ran CHKDSK during one. I downloaded CCleaner and ran the temp cleaner and registry repair. I upgraded IE, downloaded MSE, and ran a scan. Performed a DeFrag. Installed SP1/SP2/updates. The machine ran much, much faster. I advised him that he should look into upgrading and max to 2GB RAM and if possible to Windows 7 or 8. I also suggested he find cleaner sites to surf. About a solution if no Safe Mode > The article stated: I looked on the Symantec site, but cannot find a link to their support? Anyone know?Victims shouldn't pay the fine, Harrison said, but they should know that various software tools — including free tools available at Symantec — can rid their machines of the virus. Microsoft has Windows Defender Offline. Not sure if it will remove it: What is Windows Defender Offline? More on the subject: Ransomware removal | What is Ransomware | Microsoft Security Which has a link to here: Like Hopachi stated, this thing is quite sophisticated. It may take a lot to remove it. My daughter had this happen to her laptop, with vista as the os. Malwarebytes pro was useless. Hitman pro free edition took care of it. Plus, for my lappy I feel a bit better with Norton than with MSE since the lappy is more prone to attacks. I like MSE, but when you're in school and sharing thumb drives all over the place, well... Anyway I'm sure Symantec like all the others will find a way to handle this latest threat... for now 100% effective way to get rid of it: Works EVERY TIME. About 20 mins max and Job Done. Wipe the disk and restore from a CLEAN backup image with a BOOTABLE stand alone backup / restore program like acronis. Use Partition Magic (bootable) or similar to wipe the disk --don't use any AV software for cleansing -these can never be 100% guaranteed to be effective and the computer is already infected. Don't do the disk re-format / partitioning from within Windows itself as it's already infected so how would you be sure windows was working properly. If you haven't got a backup -- "Tough Ladies Accoutrements... " Serves you right so learn for next time. Forget Symantec -- It's as about as USELESS in the AV field as GARTNER is in forcasting computer developments. Anyway on Windows 8 you DON'T NEED ANY 3rd party AV - the built in Windows defender is just as effective as ANY of the other ones and if you do install a 3rd party AV software the Ms version stops working and in any case things like Symantec and McAfee (we know it as McAWFUL) are just RESOURCE HOGS. It's true, always have a backup because the OS is not made of steel and the user's mistakes cannot be predicted by the system.If you haven't got a backup -- "Tough Ladies Accoutrements... " Serves you right so learn for next time. I'm a computer tech and with all viruses we remove the hard drive and slave it to antother machine. We then scan the hard drive with a variety of antivirus and malware scanners. Once done we put it back int he machien and again run scans which generally then pickup the various registry entries.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00262-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
4,109
22
http://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/Welcome.html
code
What is Amazon Simple Queue Service? Amazon Simple Queue Service (Amazon SQS) offers reliable and scalable hosted queues for storing messages as they travel between computers. By using Amazon SQS, you can move data between distributed components of your applications that perform different tasks without losing messages or requiring each component to be always available. Amazon SQS is a distributed queue system that enables web service applications to quickly and reliably queue messages that one component in the application generates to be consumed by another component. A queue is a temporary repository for messages that are awaiting processing. Using Amazon SQS, you can decouple the components of an application so they run independently, with Amazon SQS easing message management between components. Any component of a distributed application can store messages in a fail-safe queue. Messages can contain up to 256 KB of text in any format. Any component can later retrieve the messages programmatically using the Amazon SQS API. Messages larger than 256 KB can be managed using the Amazon SQS Extended Client Library for Java, which uses Amazon S3 for storing larger payloads. The queue acts as a buffer between the component producing and saving data, and the component receiving the data for processing. This means the queue resolves issues that arise if the producer is producing work faster than the consumer can process it, or if the producer or consumer are only intermittently connected to the network. Amazon SQS ensures delivery of each message at least once, and supports multiple readers and writers interacting with the same queue. A single queue can be used simultaneously by many distributed application components, with no need for those components to coordinate with each other to share the queue. Amazon SQS is engineered to always be available and deliver messages. One of the resulting tradeoffs is that SQS does not guarantee first in, first out delivery of messages. For many distributed applications, each message can stand on its own, and as long as all messages are delivered, the order is not important. If your system requires that order be preserved, you can place sequencing information in each message, so that you can reorder the messages when the queue returns them. Be sure to read about distributed queues, which will help you understand how to design an application that works correctly with Amazon SQS. For more information, see Properties of Distributed Queues. There are three main actors in the overall system: The components of your distributed system Messages in the queues In the following diagram, your system has several components that send messages to the queue and receive messages from the queue. The diagram shows that a single queue, which has its messages (labeled A-E), is redundantly saved across multiple Amazon SQS servers. Amazon SQS Features Amazon SQS provides the following major features: Redundant infrastructure – Guarantees delivery of your messages at least once, highly concurrent access to messages, and high availability for sending and retrieving messages Multiple writers and readers – Multiple parts of your system can send or receive messages at the same time Amazon SQS locks the message during processing, keeping other parts of your system from processing the message simultaneously. Configurable settings per queue – All of your queues don't have to be exactly alike For example, one queue can be optimized for messages that require a longer processing time than others. Variable message size – Your messages can be up to 262,144 bytes (256 KB) in size For even larger messages, you can store the contents of the message using the Amazon Simple Storage Service (Amazon S3) or Amazon DynamoDB, and use Amazon SQS to hold a pointer to the Amazon S3 object. For more information, see Managing Amazon SQS Messages with Amazon S3. Alternatively, you can split the larger message into smaller ones. Access control – You can control who can send messages to a queue, and who can receive messages from a queue Delay Queues – A delay queue is one which the user sets a default delay on a queue such that delivery of all messages enqueued will be postponed for that duration of time. You can set the delay value when you create a queue with CreateQueue, and you can update the value with SetQueueAttributes. If you update the value, the new value affects only messages enqueued after the update. PCI compliance – Amazon SQS supports the processing, storage, and transmission of credit card data by a merchant or service provider, and has been validated as being compliant with Payment Card Industry (PCI) Data Security Standard (DSS). For more information about PCI DSS, including how to request a copy of the AWS PCI Compliance Package, see PCI DSS Level 1.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719397.0/warc/CC-MAIN-20161020183839-00340-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
4,846
26
https://www.creativebloq.com/news/should-you-be-worried-about-meltdown-and-spectre
code
If you've been paying any attention to the news over the past couple of days then you're bound to have noticed that there's a pair of serious new computer vulnerabilities out there. Are you at risk? So are you at risk? The simple answer is that if you're using hardware made within the past 10 or so years, then yes, almost certainly. Whether you're using a PC, a Mac or an iPad Pro, if it's not patched against Meltdown and Spectre then it's a potential target. On top of that, both Meltdown and Spectre exploit a technique called speculative execution, which boosts performance by operating on multiple instructions at once, so there's a worry that protecting against these vulnerabilities could seriously impact your computer's speed. The good news is that this doesn't seem to be the case. Apple announced today that it rolled out Meltdown patches for both MacOS and iOS back in December, and no-one even noticed; it says that the December updates resulted in no measurable reduction in performance. And it plans to release an update for Safari on MacOS and iOS that will mitigate against Spectre exploit techniques. Of the two vulnerabilities, Spectre is the hardest to exploit but also the hardest to protect against, and Apple expects that the Spectre patch could result in a performance hit of up to 2.5 per cent. Protect and survive Things could be a lot worse, then; certainly not as bad as the 30 per cent performance hits that many were expecting when news of Meltdown and Spectre first started to appear. And as well as making sure that your system, whatever it may be, is fully patched and up-to-date, you can add an extra layer of protection in the browser by enabling strict site isolation in Chrome or first-party isolation in Firefox. However, if you're a web designer or developer then you should be prepared for Meltdown and especially Spectre to cause you ongoing grief. Cloud services are likely to be a lot more vulnerable to attacks as they're bigger and more inviting targets for hackers, and they're also more likely to be hit by performance issues as they mitigate against potential exploits, so the result for web pros could be sites that either don't run as fast as expected, or stop working altogether if critical services come under attack. All the major online services have been quick to patch, but as we've already noted, Spectre is going to cause ongoing problems for years to come as it's so difficult to mitigate against. So be careful out there, and be ready to take action if your sites suddenly run into trouble.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476180.67/warc/CC-MAIN-20240303011622-20240303041622-00304.warc.gz
CC-MAIN-2024-10
2,552
10
https://www.euro-online.org/websites/ord/news/ewg-ord-2020/
code
Call for Papers EWG-ORD 2020 Workshop will be held virtually via Zoom on August 29 2020, 9 am to noon (GMT). Download: EWG-ORD 2020 Workshop CFP. Abstract submission deadline: July 19, 2020 July 30, 2020 The workshop theme for this year is, “Data Technologies & Analytics for Sustainable Development.” Due to the COVID-19 pandemic, the Workshop will no longer be hosted as a satellite event to 2020 meetings of the Operations Research Society of South Africa (ORSSA) in Magaliesburg, S. Africa. We will be hosting a virtual Workshop via Zoom. The zoom link will be sent to all registered participants.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737289.75/warc/CC-MAIN-20200808051116-20200808081116-00379.warc.gz
CC-MAIN-2020-34
605
6
https://au.indeed.com/Java-Developer-jobs-in-South-Australia
code
Java Developer jobs in South Australia Sort by: relevance - Strong Java skills – Java 11. As part of ths job, you will work on client site on their Java & Kotlin based back-end systems as well as on Angular & Vue front… As a Java Developer you will develop, analyse, test and support software enhancements on a range of enterprise systems. We call it an ‘everyone culture'. $100,000 a year Work for this large organisation with a growing team of Java Developers. Java/J2EE or similar Object Oriented language Oracle SQL, PL/SQL or similar Unix, Linux… Experience in Java 8+ or Scala software development or hadoop projects. A global leader in consulting, technology services and digital transformation, the… Experience with C/C++, Java, and Go programming languages. Collaborate with system engineers, fron tend developers and software developers to implement… Experience as a software developer in industrial software engineering, proficiency in one or more of Linux OS, C++, Java, Python. $40 - $55 an hour Experienced full stack developer - with exposure to OOP languages such as Java, Ruby .Net or Apache Groovy. The state of the project is as follows: Experienced in multiple languages such as Node.js, Java, Ruby or Golang to help us build backend solutions. Engineering is a core part of our identity and our… $90,000 - $110,000 a year More specifically we are seeking application developers from backgrounds in; Flexible working hours - CBD based. React or Angular experience would be a bonus. Get new jobs for this search by email By creating a job alert or receiving recommended jobs, you agree to our Terms. You can change your consent settings at any time by unsubscribing or as detailed in our terms.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330962.67/warc/CC-MAIN-20190826022215-20190826044215-00366.warc.gz
CC-MAIN-2019-35
1,727
16
http://askubuntu.com/questions/182435/brightness-problem-with-xubuntu
code
I use Xubuntu Linux Brightness is good without using suspend mode but after using suspend mode I got problem with brightness It's lower than before ! I need your help Some Ubuntu laptops screen brightness reset to the lowest or highest on every boot and you have to configure the screen birghtness on every login. To save the screen brightness settings in Ubuntu laptop. Open a terminal window, and execute this command to edit /etc/rc.local: Add this before the last line “exit 0″: number 5 is the value of your screen brightness. With this command check the maximum: My m6700 use the disk from another PC, which has xubuntu 12.04. I had the same problem then I downloaded the kernel from and compiled using the command: and then installed the generated packages by the command The Git branch I checkout out was: Try modifying your /etc/default/grub file. Edit the line:
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00179-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
875
14
http://www.romhacking.net/?page=utilities&order=Ver&startpage=7
code
| JNesG||Matt Greer||JNesG is an NES specific tile editor. While currently in the early stages, it is intended to eventually have many advanced features, such as automation/simplification of tedious tasks.||Graphics Editors||NES||N/A||Java||0.3||Beg| | Golden Sun: The Lost Age Editor||Atrius||An all-in-one editor for Golden Sun: The Lost Age, that is also compatible with the original Golden Sun. - Ability stats - Party Member stats, battle sprites, and starting …. |Game Specific||GBA||Golden Sun: The Lost Age||Win||0.3||Beg| | Zero Tolerance level editor||firewing||This is a level editor for Zero Tolerance, a 1994 Sega Genesis game by Technopop. The game and its unreleased sequel are now freeware, you can get them at Technopop’s home page. The unreleased sequel “Be….||Level Editors||GEN||Zero Tolerance||Win||0.3||Beg| | Wario Land 3 Level Editor||Drenn||This is a level editor for Wario Land 3. Enjoy.||Level Editors||GB||Wario Land 3||Java||0.3||Beg| | FFX Tool||ffgriever||Compressor and decompressor that can handle Final Fantasy X (tested with PAL and International) “type1″ and “type2″ compressed files.||Game Specific||PS2||Final Fantasy X||Win||0.3||Beg| | TOSS||Keith Gerdes||TOSS (To Sega Saturn) converts graphic files to Saturn’s .CEL, .MAP and .PAL files. TOSS supports 256-color .BMP, .LBM, .PCX, and .TGA thru the Allegro library. Optionally, it can create a .TEX file, useful for sprites.||Miscellaneous Graphics Tools||SAT||N/A||DOS||0.3||Beg| | FF4kster||Pinkpuff||The goal of this project is to create an all-in-one comprehensive rom editor / hacking tool for FF4 (technically FF2us). This editor tends to use config files rather than hard-coded strings for as many labels as possible. This includes things like….||Game Specific||SNES||Final Fantasy IV||Win||0.3||Int| | BladeEd||Mega-Dog||This is an editor for Power Blade for the NES. Supports editing of all stages and a password generator. It will be unknown if this project will continue.||Level Editors||NES||Power Blade||Win||0.3||Beg| | TIMmay||Klarth||TIM file format PSX graphic ripper and reinserter. (Source included)||Graphics Editors||PSX||N/A||DOS||0.3||Int| | GBA Multi DeCompressor||Mat||This program extracts/inserts data compressed with the Bios’ LZ77 compression. It can extract directly from an address or you can feed it a VBA SWI-log.||Miscellaneous||GBA||N/A||Win||0.3 Beta 2||Int| | Solar Magic Advance||LuigiBlood||Solar Magic Advance, also known before as SMA4 e-Card Maker. It can make e-Reader Cards Data for SMA4 : Power-Up Cards, Switch Cards, Demo Cards… It’s also the first Level Card Viewer. It can also edit SMA4 Saves to change number of live….||Miscellaneous||GBA||Super Mario Advance 4: Super Mario Bros. 3||Win||0.33 Beta ||Int| | spAsm||Silpheed||One of the only psx assemblers out there. It builds psx exe files using assembly code.||Assembly Tools||PSX||N/A||DOS||0.34||Adv| | spAsm (revision)||Silpheed||One of the only psx assemblers out there. It builds psx exe files and raw binaries using assembly code. This is an unofficial build by Gemini which should fix the “Load error: no DOS memory” error once and for all.||Assembly Tools||PSX||N/A||DOS||0.34a||Adv| | NBA Jam: Tournament Edition Player Editor||JCE3000GT||Feel the need to edit the players and team rosters in NBA Jam: TE? Well you’re in luck because this little program allows exactly that. - Edits the players’ stats both “visual” and actual “in-game"…. |Game Specific||SNES||NBA Jam: Tournament Edition||Win||0.36||Beg| | SOALEditor||ADnova||The SOALEditor is a game editor for the Gamecube game Skies of Arcadia Legends. The current version allows basic modification of Armor, Weapons, Accessories, Consumable Items, Magic, and Super Moves. It also has a dialog editor and a texture v….||Game Specific||GC||Skies of Arcadia Legends||Win||0.4||Int| | FatCamp||Mega-Dog||A level editor for the NES game Karnov. Supports both the US and Japanese versions. This editor only works with certain bad dumps of the ROM. The only two versions of Karnov I could get to work with this editor are: Karnov (J) [b1] [o1] |Nitro2DLS||henke37||A tool to extract instrument definitions from Nitro Composer (”SDAT”) archives.||Sound||NDS||Multiple Games||Indep||0.4||Beg| | AppleJuice||Mega-Dog||A G.I. Joe Level Editor.||Level Editors||NES||G.I. Joe||Win||0.4||Int| | GameHeader||Massin||GameHeader is for decoding and displaying the “registration data” section of a rom file. For a game to be granted a license, Nintendo required that publishers write informational values in a reserved area of the rom. This process started wi….||Miscellaneous||Multiple||N/A||Win||0.4.0.1||Beg| | FamiTracker||jsr||FamiTracker is a free windows tracker for producing music for the NES/Famicom-systems. The interface is based on MadTracker and should be easy to use if you’ve been using trackers before. One of the features is NSF-file exporting. That allows….||Sound||NES||N/A||Win||0.4.2||Beg|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705318091/warc/CC-MAIN-20130516115518-00003-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
5,012
36
http://www.sportspowerbundaberg.com.au/register.aspx
code
We are sorry, an internal error has occured that prevents the request from completing. It is possible you typed the address incorrectly, or that the page no longer exists. Our support staff has been notified of this error and will address this issue shortly. We apologize for the inconvenience this may cause. Please retry later. Server name: muscat
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657116650.48/warc/CC-MAIN-20140914011156-00095-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
349
5
https://backend.turing.edu/module2/projects/coupon_codes/
code
This project is an extension of the Little Esty Shop group project. You will add functionality for merchants to create coupons for their shop. - Write migrations to create tables and relationships between tables - Implement CRUD functionality for a resource using forms, buttons, and links, and associated view helpers ( - Use MVC to organize code effectively, limiting the amount of logic included in views and controllers - Use built-in ActiveRecord methods to join multiple tables of data, make calculations, and group data based on one or more attributes - Write model tests that fully cover the data logic of the application - Write feature tests that fully cover the functionality of the application - This is a solo project, to be completed alone without assistance from cohortmates, alumni, mentors, rocks, etc. - Must use Rails 7.0.x and Ruby 3.2.2. - Additional gems to be added to the project must have instructor approval. (RSpec, Capybara, Shoulda-Matchers, Orderly, HTTParty, Launchy, Faker and FactoryBot are pre-approved) - Scaffolding is not permitted on this project. - This project must be deployed to the internet. This project is an extension of Little Esty Shop. Students have two options for setup: - If your Little Esty Shop project is complete, you can use it as a starting point for this project. If you are not the repo owner, fork the project to your account. If you are the repo owner, you can work off the repo without forking, just make sure your teammates have a chance to fork before pushing any commits to your repo. - If your Little Esty Shop project is not complete, fork this repo as a starting point for this project. Evaluation information for this project can be found here. - A Coupon belongs to a Merchant - An Invoice optionally belongs to a Coupon. An invoice may only have one coupon. - Note: When creating this new association on Invoice, your existing tests will fail unless the association is optional. Use these guides as a reference. - Merchants have full CRUD functionality over their coupons with criteria/restrictions defined below: - A merchant can have a maximum of 5 activated coupons in the system at one time. - A merchant cannot delete a coupon, rather they can activate/deactivate them. - A Coupon has a name, unique code (e.g. “BOGO50”), and either percent-off or dollar-off value. The coupon’s code must be unique in the whole database. - If a coupon’s dollar value (ex. “$10 off”) exceeds the total cost of that merchant’s items on the invoice, the grand total for that merchant’s items should then be $0. (In other words, the merchant will never owe money to a customer.) - A coupon code from a Merchant only applies to Items sold by that Merchant. In the user stories below, we have outlined a few examples of Sad Paths you may consider adding in. In your project, you should take time to implement at least 2 sad paths total, but you are not limited to the examples we provide. 1. Merchant Coupons Index As a merchant When I visit my merchant dashboard page I see a link to view all of my coupons When I click this link I'm taken to my coupons index page Where I see all of my coupon names including their amount off And each coupon's name is also a link to its show page. 2. Merchant Coupon Create As a merchant When I visit my coupon index page I see a link to create a new coupon. When I click that link I am taken to a new page where I see a form to add a new coupon. When I fill in that form with a name, unique code, an amount, and whether that amount is a percent or a dollar amount And click the Submit button I'm taken back to the coupon index page And I can see my new coupon listed. * Sad Paths to consider: 1. This Merchant already has 5 active coupons 2. Coupon code entered is NOT unique 3. Merchant Coupon Show Page As a merchant When I visit a merchant's coupon show page I see that coupon's name and code And I see the percent/dollar off value As well as its status (active or inactive) And I see a count of how many times that coupon has been used. (Note: "use" of a coupon should be limited to successful transactions.) 4. Merchant Coupon Deactivate As a merchant When I visit one of my active coupon's show pages I see a button to deactivate that coupon When I click that button I'm taken back to the coupon show page And I can see that its status is now listed as 'inactive'. * Sad Paths to consider: 1. A coupon cannot be deactivated if there are any pending invoices with that coupon. 5. Merchant Coupon Activate As a merchant When I visit one of my inactive coupon show pages I see a button to activate that coupon When I click that button I'm taken back to the coupon show page And I can see that its status is now listed as 'active'. 6. Merchant Coupon Index Sorted As a merchant When I visit my coupon index page I can see that my coupons are separated between active and inactive coupons. 7. Merchant Invoice Show Page: Subtotal and Grand Total Revenues As a merchant When I visit one of my merchant invoice show pages I see the subtotal for my merchant from this invoice (that is, the total that does not include coupon discounts) And I see the grand total revenue after the discount was applied And I see the name and code of the coupon used as a link to that coupon's show page. 8. Admin Invoice Show Page: Subtotal and Grand Total Revenues As an admin When I visit one of my admin invoice show pages I see the name and code of the coupon that was used (if there was a coupon applied) And I see both the subtotal revenue from that invoice (before coupon) and the grand total revenue (after coupon) for this invoice. 9: Holidays API As a merchant When I visit the coupons index page I see a section with a header of "Upcoming Holidays" In this section the name and date of the next 3 upcoming US holidays are listed. Use the Next Public Holidays Endpoint in the [Nager.Date API](https://date.nager.at/swagger/index.html) Students can pick one or more of these extension features/stories to add to their project: - On the Merchant Coupon Index page, active and inactive coupons are sorted in order of popularity, from most to least. - Coupons can be used by multiple customers, but may only be used one time per customer. - Inactive coupons cannot be added to an Invoice. - A Coupon has a maximum number of uses before it is automatically deactivated. When implemented, prove that the number of times used on the Merchant Coupon Show Page is updated accordingly. - Holiday Coupons can be used up to 1 week from the actual holiday date. The coupon should automatically inactivate once someone tries to create an Invoice with that Coupon after a week of the holiday. - Generate unique coupon codes as suggestions when creating a new coupon. 7. Create a Holiday Coupon As a merchant, when I visit my coupons index page, In the Holiday Coupons section, I see a `Create Coupon` button next to each of the 3 upcoming holidays. When I click on the button I am taken to the new coupon page where I see a pre-filled name in the form, similar to: Name: <name of holiday> coupon Code: <uniquely generated code suggestion> All other fields, I will need to fill out myself I can leave the information as-is, or modify it before saving. When I click save, I am redirected to my coupon index page where I see the newly-created coupon added to the list. 8. View a Holiday Coupon As a merchant (if I have created a holiday coupon for a specific holiday), when I visit my coupon index page, within the `Upcoming Holidays` section I should not see the button to 'Create a Coupon' next to that holiday, instead I should see a `View coupon` link. When I click the link I am taken to the coupon show page for that holiday coupon.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00286.warc.gz
CC-MAIN-2023-40
7,718
44
https://rustamsoft.com/crack/?s=antispamsniper-for-outlook&id=28852
code
AntispamSniper for Outlook provides a professional antispam and anti-phishing protection for your mailbox. The plug-in filters POP3, IMAP and Exchange accounts. The unique combination of several methods for automatic email classification shows excellent filtering quality for all kinds of spam, including graphical spam with random text. AntispamSniper for Outlook has a built-in option allowing spam deletion from the server by headers. The good messages, mistakenly deleted from the server by header, may be restored. The statistical trainable classification algorithm has unique characteristics. It analyzes your private correspondence, singles out distinguishing features from messages of different classes and uses this information for the effective analysis of incoming messages. The algorithm constantly improves its classification quality with each new processed message. It is possible to track back the history of classifying messages and training the plug-in using a filtering log. AntispamSniper for Outlook can delete spam right on the server by headers, using a list of account settings. The accounts for filtering can be added manually or automatically for non-secure connections. The rest of messages are downloaded to email client for filtering by full content, and the messages with high spam ratio are moved to a special folder automatically. AntispamSniper for Outlook supports several complementary methods in addition to statistical algorithm: black and white lists of email addresses, anti-phishing filter, blocking spam by IP address of the sender (using DNSBL services), black and white Regexp-based rules. AntispamSniper for Outlook utilizes various methods for filtering graphical spam: · Blocking spam with inline images, linked to third-party web sites. · Blocking the messages with animated GIF pictures in attachment. · Blocking the messages by the type of attachment. · The statistical classifier is optimized for blocking spam with a picture and some amount of unlinked text.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510734.55/warc/CC-MAIN-20231001005750-20231001035750-00755.warc.gz
CC-MAIN-2023-40
2,012
11
https://arxiv-check-250201.firebaseapp.com/each/2311.07993v1
code
Explicit Change Relation Learning for Change Detection in VHR Remote Sensing Images Change detection has always been a concerned task in the interpretation of remote sensing images. It is essentially a unique binary classification task with two inputs, and there is a change relationship between these two inputs. At present, the mining of change relationship features is usually implicit in the network architectures that contain single-branch or two-branch encoders. However, due to the lack of artificial prior design for change relationship features, these networks cannot learn enough change semantic information and lose more accurate change detection performance. So we propose a network architecture NAME for the explicit mining of change relation features. In our opinion, the change features of change detection should be divided into pre-changed image features, post-changed image features and change relation features. In order to fully mine these three kinds of change features, we propose the triple branch network combining the transformer and convolutional neural network (CNN) to extract and fuse these change features from two perspectives of global information and local information, respectively. In addition, we design the continuous change relation (CCR) branch to further obtain the continuous and detail change relation features to improve the change discrimination capability of the model. The experimental results show that our network performs better, in terms of F1, IoU, and OA, than those of the existing advanced networks for change detection on four public very high-resolution (VHR) remote sensing datasets. Our source code is available at https://github.com/DalongZ/NAME. updated: Tue Nov 14 2023 08:47:38 GMT+0000 (UTC) published: Tue Nov 14 2023 08:47:38 GMT+0000 (UTC)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00092.warc.gz
CC-MAIN-2023-50
1,805
4
https://discussions.apple.com/thread/4724980?tstart=0
code
Welcome to the Apple Support Communities OS X Lion and Mountain Lion come with Gatekeeper, that prevents the installation of apps that don't come from the App Store or an identified developer by default. To install a widget or application that it's not from the App Store or from an identified developer: 1. Right-click the installer and select Open. 2. Open System Preferences > Security & Privacy > General, and select "Anywhere" under "Allow applications downloaded from"
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446500.34/warc/CC-MAIN-20151124205406-00160-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
474
4
https://lists.freebsd.org/pipermail/freebsd-stable/2008-August/044040.html
code
reboot sometimes freezes, adaptic scsi card possible problem david at wood2.org.uk Sun Aug 3 12:15:58 UTC 2008 <e46716cf0808011207m2ef1b24bmaf2a1c2977959c03 at mail.gmail.com>, burt rosenberg <burt at cs.miami.edu> writes >On reboot, one out of 10 times, reboot (from hardware initialization) stops. This is about a Dell PowerEdge 2950. I'd start by upgrading the BIOS - and whilst you're at it, I'd bring the whole machine up to date, as the BMC firmware, backplane firmware and PERC firmware are all likely to be out of date as well. The Dell System Build and Update Utility CD with the Server Updates DVD will handle all the necessary updates. The ISOs are available on the Dell Downloads site. The current System Build and Update Utility CD is rather old - I'd use the System Management Tools and Documentation DVD in its place (which boots into the System Build and Update Utility). You boot the System Build and Update Utility CD (or System Management Tools and Documentation DVD), tell the machine that the repository is on a DVD, and it will prompt you to change disk. Insert the Server Updates DVD. You will need console access - keyboard, mouse and monitor. I think I noticed a USB KVM somewhere amongst the information you gave. You don't have a DRAC 5 in the machine - if you did, you could have used the This system handles the correct sequencing of the upgrades (for example, you should upgrade the BMC firmware before the BIOS - at least, I believe that's the correct order, but I'd have to check) and carries out the upgrades in an environment where your hard disks aren't mounted. You may even find you have hard disk firmware updates outstanding. The BIOS in the machine is old - version 1.2.0. The next revision, 1.3.7, which is far from the latest, has something that sounds possibly Fixed possible issue of system device re-enumeration after power There are also potential updates for your processor microcode and memory reference code just by updating the BIOS. Obviously, upgrading all the firmware in your machine is a potentially dangerous operation. My experience is that all will go well, but I can't guarantee that you won't hit trouble. david at wood2.org.uk More information about the freebsd-stable
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626122.27/warc/CC-MAIN-20210616220531-20210617010531-00313.warc.gz
CC-MAIN-2021-25
2,229
36
https://learn.microsoft.com/en-us/answers/questions/190956/how-can-pass-local-db-connectionstrings-as-environ
code
I have a restful api app and it depends on a sql db (sql server 2012-express). Restful Api app picks all colours related data from sql-db tables.The restful api made at dotnetcore 2.2 and define sql-db connection at 'appsettings.json' as below .. "ConnectionStrings": "data source= xxx,1433;Initial Catalog=ColoursDB;Integrated Security=True;ConnectRetryCount=0"* I am using 'Microsoft.EntityFrameworkCore' ORM of version 1.0.1 for sql db data retrieving.. Locally , running api , it fetches colour data from sql-DB..but when i did linux container as below command at windows -powershell and passing 'ConnectionStrings' as environment variable ..Api container gave an exception For Build api-> $ docker build -t colourapiandsql:v1 -f Dockerfile . For Run api -> $ docker run -d -p 8080:80 --name api01 -e ConnectionStrings="data source=xxx,1433;Initial Catalog=ColoursDB;Integrated Security=True;" colourapiandsql:v1 Api container is created but it gave an exception as below "A network-related or instance-specific error occurred while establishing a connection to SQL Server. The server was not found or was not accessible. Verify that the instance name is correct and that SQL Server is configured to allow remote connections. (provider: TCP Provider, error: 35 - An internal exception was caught)". Can you pls help me or guide me on how i can pass local DB 'ConnectionStrings' as environment variable at docker run command?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00818.warc.gz
CC-MAIN-2023-40
1,428
9
https://www.cambly.com/en/browsetutors/Chloe%20Y?lang=zh_TW
code
職業: Student, mentor, private tutor 教學經驗: I've worked as a tutor for over 5 years now! I have experience working with students ages 7 to 20, and in a wide variety of subjects, including (but not limited to) English grammar, reading comprehension, essay writing, math, and science. 興趣: I love talking about TV shows, movies, music, baking, gardening, skincare, social justice, health (physical, mental, or otherwise), religion, multiculturalism, self-improvement, relationships, and much more! I can chat away about anything, so don't be shy! 學歷: I went to high school in Toronto, obtained my high school diploma, as well as the International Baccalaureate (IB) diploma! I am currently a business student at the University of Ottawa. 語言: 英文 (母語者)
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517159.7/warc/CC-MAIN-20210118220236-20210119010236-00584.warc.gz
CC-MAIN-2021-04
778
6
https://moodle.org/plugins/format_page?nonjscomment=1&comment_itemid=992&comment_context=50&comment_component=local_plugins&comment_area=plugin_general
code
IMPORTANT NOTE FOR PLUGIN ARCHIVE AVAILABILITY : due to the large amount of plugins supported, it is NOT affordable for us to update moodle.org packages. Please use the Source Control urls to our github to get plugins archives. This format has been used in big size project in France (Perform@nce, Ministry of Education with Intel support, is adopted in Rectorat de Strasbourg and recently the france southern region Provence Alpes Côte d'Azur for secondary education. Provides several enhancements over the historical 1.9 flexpage version : - Easy move of widgets all around the layout - Easy page duplication - Easy page reorder with graphical treeview - Enhanced access control : Public external access pages - Enhanced access control : Teachers reserved pages (hidden but published) - Enhanced access control : Students published pages - Enhanced access control : Activity score conditional page - Layout enhancement : Page override by another activity module - Individualisation : User specific pages - Individualisation : Group specific pages - Individualisation : With page_module new structure, indivualize each widget per user (expermiental) - Page side comment pages fot teachers - You NEED the block page_module being installed for the page format to work - You NEED customscripts to be activated, and provided customscripts to be settled - Standard Moodle have a protection to not set a module in several sections of the course (not consistant in standard course formats). Page format needs this restriction to be overriden. A singleline impact point patch is provided in the distribution. - You SHOULD choose one of block page_tracker (Learning Stations) - The original pagemenu course module is OBSOLETE and ils NOT any more maintained. - The use_stats (block) and trainingsessions (report) know about page format. They can provide a course report time tracking presenting the guessed course structure based on page format organisation. - The (future publication, based in checklist) learningtimecheck module and report are aware of page format, and will propose to work in a page or page tree scope (in addition to section and course scope as for standard formats)
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988775.80/warc/CC-MAIN-20210507090724-20210507120724-00255.warc.gz
CC-MAIN-2021-21
2,180
25
http://devblog.weshigbee.com/posts/pluralsight-course-using-mongodb-with-asp.net-mvc
code
After months of hard work, I've finished my first Pluralsight course! I labored to distill what I've learned about MongoDB, specifically within the .NET platform, to help others get a jump start. My favorite part was sharing how document databases remove many of the constraints that usually hamper good design within our applications. Interested in using MongoDB to store information in your ASP.NET MVC applications? This course covers the decisions you will face and the tools available to incrementally build an MVC application with MongoDB. You will learn how to connect to MongoDB using the official C# driver, create documents and customize serialization, overcome the object relational impedance mismatch and start creating rich domain models, store and modify documents, query documents with both LINQ and Mongo query styles, and store files with GridFS. At the end of this course, you will have the skills necessary to begin using MongoDB in your .NET applications.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530553.34/warc/CC-MAIN-20220519235259-20220520025259-00470.warc.gz
CC-MAIN-2022-21
975
2
http://www.dbnetsolutions.co.uk/GMapper/help/BatchEditing.aspx
code
Batch editing allows you to update multiple sitemap files values at once. - Click the Batch Edit button to display the Batch edit toolbar. - Select the files you want to update. Hint : Use the Control key to select multiple individual files OR use the Shift Key to select a range of files. - From the Batch edit toolbar select the column you want to update. - Enter or select the value you wish to apply to the field. - Cick Go. - Click Yes to confirm the update. To help you find the files you want to update you may also be interested in learning about the File and folder filtering and sorting.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663039492.94/warc/CC-MAIN-20220529041832-20220529071832-00037.warc.gz
CC-MAIN-2022-21
597
11
http://www.ecmselection.co.uk/jobs/23311/top-software-troubleshooter-computer-science
code
Top Software Troubleshooter, Computer Science (23311) Are you a software systems engineering specialist with an eye for trouble? Do you have the olfactory acuity to pick out a code smell at 1000 yards? Do loops unroll as you look at them? And does your experience span multiple programming languages, operating systems, and see through spurious paradigms and methodologies? This top flight company’s software is used in so many hardware devices globally that the bits in this paragraph no doubt flowed through at least one of their systems to reach you. They produce robust, open source, high quality, highly reliable software; but this doesn’t happen automatically, and even the best developers in the world make mistakes, and sometimes very subtle ones, only visible at the macro scale. In this wide ranging role you will walk through some of the best written code in the world*, but which is carrying out very complex and performance sensitive tasks. You will bend your brain to finding and solving problems both subtle and systemic. Some of these changes may be R&D tasks in themselves. If you have - A top degree in computer science or a related subject from a world class university - Years of commercial experience as a coder in C / C++, Python, and ideally a functional programming language - Exemplary experience as a system level engineer on distributed systems - A keen interest in system performance, complex systems, and/or applying statistical methods to a codebase - Linux, and possibly Windows, development experience Then please do get in touch. We do read all CVs, we try to respond to everyone, and our only regret is that only the best candidates can be put forward to a role of this calibre. This is a full time role in Cambridge, UK. Naturally candidates require existing permission to live and work in the UK without time limit, restriction or sponsorship. (* At least, it will be when you’ve finished with it.) Keywords: Cambridge, software engineer, performance, optimisation, analysis, open source Please note: even if you don't have exactly the background indicated, do contact us now if this type of job is of interest - we may well have similar opportunities that you would be suited to. And of course, we always get your permission before submitting your CV to a company.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251690379.95/warc/CC-MAIN-20200126195918-20200126225918-00386.warc.gz
CC-MAIN-2020-05
2,307
15
http://www.computer.org/portal/web/computingnow/annals
code
This issue includes a special Comments, Queries, and Debates department by Martin Campbell-Kelly in which he explores an ongoing discussion regarding breadth versus depth in the history of computing and describes an exchange on the topic with Donald Knuth. This issue also features several articles that discuss unanticipated but ultimately influential uses of electronic computers. Specifically, Thomas Haigh, Mark Priestley, and Crispin Rope explore the development of the first computer-based implementation of the Monte Carlo algorithm; David Hemmendinger explores the development of computational techniques for solving the problem of color matching; and Eduardo Perez Molina uses patent records from the 1940s and 1950s to provide context for the revolution in computer graphics that began in the 1960s. Lastly, Ramesh Subramanian's article "Technology Policy and National Identity: The Microcomputer Comes to India" gives a history of an indigenous microcomputer produced by the Hindustan Computers Limited in the late 1970s. Read full article » About IEEE Annals of the History of Computing IEEE Annals of the History of Computing covers the breadth of computer history through scholarly articles by leading computer scientists and historians, as well as firsthand accounts by computing pioneers. Annals is the authoritative archival journal for the history of computing.
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931010166.36/warc/CC-MAIN-20141125155650-00088-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
1,380
3
https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/Redshift/reserved-node-coverage.html
code
Ensure that the reservation coverage percentage (i.e. the percentage of node instance hours that a reservation covered) available for your Amazon Redshift Reserved Nodes (RNs) does not fall below a defined threshold. Reserved Node (RN) coverage tracks the number of running node hours that are covered by reservations, and can be measured over a daily, monthly, quarterly, or yearly cadence. For example, you can monitor your RN coverage either at an aggregate level (e.g. monthly coverage of your entire Amazon Redshift RN fleet) or at a more granular level of detail (e.g. monthly coverage of Amazon Redshift ds2.xlarge nodes running within US West - Oregon region). The reservation coverage threshold (percentage) and the time period to retrieve the reservation coverage data for, must be defined in the conformity rule settings, on the Trend Micro Cloud One™ – Conformity account console. This rule can help you work with the AWS Well-Architected Framework. Reserved Nodes (RNs) represent a solid strategy to cut down on Amazon Redshift costs by taking advantage of AWS billing at a discounted hourly rate. The Reserved Node coverage report offered by Amazon Cost Management service allows you to discover how much of your overall Redshift usage is covered by RNs, so that you can make informed decisions about when to purchase or modify a Reserved Node to ensure maximum reservation coverage. The Cost Management service provides effective recommendations for which reservations to purchase in order to help you reduce your Amazon Redshift costs. To determine if the reservation coverage (percentage) of your Amazon Redshift Reserved Nodes fall below your target coverage, perform the following operations: Remediation / Resolution To ensure maximum reservation coverage for your Amazon Redshift Reserved Nodes (RNs), follow the context-aware RN purchase recommendations provided by Amazon Cost Management service to optimize your AWS costs by performing the following operations: - AWS Documentation - Reserved Instance (RI) Reporting - Best practices for AWS Budgets - Managing your costs with AWS Budgets - Accessing Reserved Instance Recommendations - Purchasing Amazon Redshift reserved nodes - Purchasing a reserved node offering with the Amazon Redshift console - Purchasing a reserved node offering using the AWS CLI and Amazon Redshift API - AWS Command Line Interface (CLI) Documentation Unlock the Remediation Steps Free 30-day Trial Automatically audit your configurations with Conformity and gain access to our cloud security platform. You are auditing: Redshift Reserved Node Coverage Risk level: Medium
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103271864.14/warc/CC-MAIN-20220626192142-20220626222142-00710.warc.gz
CC-MAIN-2022-27
2,626
22
https://pkmncollectors.livejournal.com/17561830.html
code
It's been quite some time since I've posted here, but I just had a general question to any Poke Doll collectors; I'm looking into expanding my Pokemon Collection to focus more on Poke Dolls. I've seen pictures of "stair displays" that can support figures, but I wonder if there's any displays like this that can support the size of Poke Dolls. To be more precise, I'm talking about displays similar to this: Any information that can be given, as well as a referal to any specific online shops (or even nation retailers) would be greatly appreciated. Thanks in advance!
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370495413.19/warc/CC-MAIN-20200329171027-20200329201027-00353.warc.gz
CC-MAIN-2020-16
568
4
http://stoptazmo.com/chit-chat/24086-has-anyone-heard-primeamerica.html
code
has anyone heard of primeamerica? ??? someone tried to talk to me about it but i dont know....... Primeamerica is a ripoff insurance and mutual fund company. Its one of this pyramid selling systems (snowballsystem), where you have a product of low or none worth and the only way to gain win is to recruit new members. Eventually the system collapses and everyone involved looses a lot of money, except the ones that created the system. They get away with your money. By the way... I googled this information in 1.5mins. Think about it.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131317541.81/warc/CC-MAIN-20150323172157-00130-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
535
8
http://www.tedxuq.com/bio
code
Since the conception of TEDxUQ in 2011, one element that remains and revels is our thrill in creating a platform to blur the lines between the cognitive and the creative; pushing the boundaries of human knowledge into the realms of the future. Imagine a world where everyone kept their thoughts and ideas to themselves. Everything would grind to a standstill. Conversation and collaboration are the driving force behind innovation and change. A single idea holds the potential to influence multitudes, at a local or global scale. From self-driving cars to increasing concerns about the environment and international security; today’s society is one to talk about. Thinking Out Loud The University of Queensland Advanced Engineering Building Saturday, 12th of August What is TEDxUQ? In the spirit of ideas worth spreading, TED has created a program called TEDx. TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. Our event is called TEDxUQ where x = independently organized TED event. At TEDxUQ, TEDTalks video and live speakers will combine to spark deep discussion and connection in a small group. The TED Conference provides general guidance for the TEDx program, but individual TEDx events, including ours, are self-organized. Speaker applications for 2017 have closed, stay tuned for next years applications. Keen to meet like minded people and listen to the best and brightest? Tickets open at 6pm tonight.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806842.71/warc/CC-MAIN-20171123142513-20171123162513-00597.warc.gz
CC-MAIN-2017-47
1,471
11
https://pubmed.ncbi.nlm.nih.gov/33596823/
code
Background: Bioimaging techniques offer a robust tool for studying molecular pathways and morphological phenotypes of cell populations subjected to various conditions. As modern high-resolution 3D microscopy provides access to an ever-increasing amount of high-quality images, there arises a need for their analysis in an automated, unbiased, and simple way. Segmentation of structures within the cell nucleus, which is the focus of this paper, presents a new layer of complexity in the form of dense packing and significant signal overlap. At the same time, the available segmentation tools provide a steep learning curve for new users with a limited technical background. This is especially apparent in the bulk processing of image sets, which requires the use of some form of programming notation. Results: In this paper, we present PartSeg, a tool for segmentation and reconstruction of 3D microscopy images, optimised for the study of the cell nucleus. PartSeg integrates refined versions of several state-of-the-art algorithms, including a new multi-scale approach for segmentation and quantitative analysis of 3D microscopy images. The features and user-friendly interface of PartSeg were carefully planned with biologists in mind, based on analysis of multiple use cases and difficulties encountered with other tools, to offer an ergonomic interface with a minimal entry barrier. Bulk processing in an ad-hoc manner is possible without the need for programmer support. As the size of datasets of interest grows, such bulk processing solutions become essential for proper statistical analysis of results. Advanced users can use PartSeg components as a library within Python data processing and visualisation pipelines, for example within Jupyter notebooks. The tool is extensible so that new functionality and algorithms can be added by the use of plugins. For biologists, the utility of PartSeg is presented in several scenarios, showing the quantitative analysis of nuclear structures. Conclusions: In this paper, we have presented PartSeg which is a tool for precise and verifiable segmentation and reconstruction of 3D microscopy images. PartSeg is optimised for cell nucleus analysis and offers multi-scale segmentation algorithms best-suited for this task. PartSeg can also be used for the bulk processing of multiple images and its components can be reused in other systems or computational experiments. Keywords: 3D FISH; 3D reconstruction; Batch processing; Bioimaging; Chromatin; Electron microscopy; Nucleus; Segmentation; Super-resolution microscopy.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499826.71/warc/CC-MAIN-20230130165437-20230130195437-00628.warc.gz
CC-MAIN-2023-06
2,569
4
http://slashdot.org/~drinkypoo/tags/somethingwonderful
code
but in that case you could just go with something else than oolite. I wasn't aware that it aspired to be anything else than elite. But then, why not just play elite? I mean, it's around, you don't have to pay for it, why not play elite? If anyone is aware of an elite-like game with a true functional economy where actions have consequences, I'd really like to play it. But I want it to be a single-player game, because I so often have marginal internet access, and I don't want to pay a monthly fee. That leaves out Eve.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699113041/warc/CC-MAIN-20130516101153-00064-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
521
3
https://www.mathhomeworkanswers.org/249031/what-the-equation-of-the-parabola-with-focus-at-and-directrix
code
The equation of a parabola can be written y=a(x-h)²+k where (h,k) is the vertex. The focus is at (h,k+p) and the directrix line is y=k-p where ap=1/4. So (0,-5)=(h,k+p) making h=0, -5=k+p and 5=k-p. From this we get k=0 and p=-5, making a=-1/20. The equation is y=-x²/20.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512504.64/warc/CC-MAIN-20181020034552-20181020060052-00122.warc.gz
CC-MAIN-2018-43
273
4
https://help.clouding.io/hc/en-us/articles/360017195019-How-to-Install-Lighttpd-with-PHP-FPM-and-MySQL-on-Ubuntu-20-04
code
Lighttpd is a free, open-source, secure and fast web server optimized for high-performance environments. It is a very popular alternative to Nginx and Apache web server for Linux-based operating systems. It is light weight, very small in size and does not require a lot of memory and CPU. It supports FastCGI, mod_rewrite, chroot, OpenSSL and CGI interfaces. Lighttpd is a perfect web server for those who are suffering from load problems. In this tutorial, we will learn how to install Lighttpd with PHP-FPM and MySQL on Ubuntu 20.04. - A server running Ubuntu 20.04. - A static IP address is configured in your server. - A root password is configured in your server. Update the System Before starting, it is recommended to update your system packages to the latest version. You can update them with the following command: apt-get update -y Once all the packages are updated, you can proceed to the next step. By default, Lighttpd is available in the Ubuntu 20.04 default repository. You can install it with the following command: apt-get install lighttpd -y Once the installation has been completed, you can verify the status of the Lighttpd with the following command: systemctl status lighttpd You should see the following output: ● lighttpd.service - Lighttpd Daemon Loaded: loaded (/lib/systemd/system/lighttpd.service; enabled; vendor preset: enabled) Active: active (running) since Thu 2020-10-01 05:05:34 UTC; 5s ago Main PID: 1125 (lighttpd) Tasks: 1 (limit: 2353) Memory: 1.4M CGroup: /system.slice/lighttpd.service └─1125 /usr/sbin/lighttpd -D -f /etc/lighttpd/lighttpd.conf Oct 01 05:05:34 ubuntu2004 systemd: Starting Lighttpd Daemon... Oct 01 05:05:34 ubuntu2004 systemd: Started Lighttpd Daemon Lighttpd all configuration files are available inside /etc/lighttpd directory. You can list them with the following command: You should get the following output: Enable PHP and MySQL Support By default, Lighttpd web server won’t be usable without PHP FastCGI support and MySQL support. So you will need to install necessary packages to enable the PHP and MySQL support. You can install them with the following command: apt-get install php php-cgi php-mysql mysql-server -y Once all the packages are installed, enable the FastCGI module with the following command: Next, reload the Lighttpd service to apply the configuration. service lighttpd force-reload Access Lighttpd Web Interface Before accessing the Lighttpd web interface, you will need to create a sample info.php file in the default document root directory. Add the following line: <?php phpinfo(); ?> Save and close the file when you are finished. Now, open your web browser and access the info.php file using the URL http://your-server-ip/info.php. You should see the PHP page: The above page clearly indicates that PHP and FastCGI support is enabled in the Lighttpd web server. Congratulations! you have successfully installed Lighttpd web server with PHP and MySQL support. You can now host your own application with Lighttpd web server.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00407.warc.gz
CC-MAIN-2023-40
3,020
32
https://itservices.cas.unt.edu/services/computers/articles/windows-fast-user-switching
code
Fast User Switching is a feature, i.e. a term for some rather loosely specified functionality, of a multi-user operating system. It allows users to switch between user accounts on a single computer without quitting applications and logging out. This is considered useful so that users do not have to be forced logged out for another user to log in; specifically on a shared desktop. At CAS, we disable Fast User switching for several reasons: - Some software cannot have two instances open at the same time. - Switching over to a new account is not always successful; requiring a reboot to recover. - Switching back to a previously open account is not always successful; requiring a reboot to recover. Since the point of using Fast User Switching is to prevent rebooting to allow another user to temporarily use a computer, the benefits are lost with the issues that we've seen. Force Logoff Screensaver CAS can enable a screensaver that the forces the logged on user to be logged off automatically after a timer (that's displayed in the screensaver) reaches zero. Simply move the mouse, to cancel the screensaver and the timer. CAS can enable a screensaver that displays a message allowing anyone force log off the currently logged on user.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104692018.96/warc/CC-MAIN-20220707124050-20220707154050-00527.warc.gz
CC-MAIN-2022-27
1,241
10
https://community.nxp.com/thread/432365
code
I'm getting a TXB and not a TXF interrupt flag being set at random times. I can't find any documentation that would explain why. TXF fires when the message has been sent. TXB fires when the enhanced buffer has been updated. So under what circumstances would I expect a buffer update but not a complete transmission? Thanks for any comments
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738913.60/warc/CC-MAIN-20200812171125-20200812201125-00281.warc.gz
CC-MAIN-2020-34
339
6
http://blog.bcdsoftware.com/author/josh/
code
Ajax is a popular technique that we’re seeing more of our clients use to create faster and more dynamic web applications. It’s also part of the new WebSmart templates and used in the underlying Presto code. It can, however, be difficult to know where to start when debugging Ajax. How do you tell which component (e.g. HTML, jQuery event, Ajax call, server-side script, Ajax response callback) isn’t working properly?
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744348.50/warc/CC-MAIN-20181118093845-20181118115845-00494.warc.gz
CC-MAIN-2018-47
423
1
https://flbikelaw.org/2016/03/stolen-bike-2/
code
Scottie asked: I have a bike I just got and it has a serial number sticker on the bottom. How can I check to see if the bike was stolen or not? A few communities require registration of bicycles. If your community does that, you would need to find out the requirements. The only one I know of is Daytona Beach. In any event, you could check with the local police to see if it was reported as stolen by the owner Listening to police scanner, I’ve learned that even though a bicycle may not have been registered, it can be reported as stolen, via serial number. The state database would have information specific to that bicycle if it has been reported stolen, regardless of registration status. Local law enforcement should have access to that information, as Geo suggests.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647895.20/warc/CC-MAIN-20230601143134-20230601173134-00273.warc.gz
CC-MAIN-2023-23
774
4
http://forums.zimbra.com/administrators/62726-zimbra-server-seems-crashed-post271158.html
code
I did a small modification yesterday on the config of my Zimbra OSE 8.0.3 (CentOS 6.4 64Bits) by changing the value of POP3 throtling to be: zmlocalconfig -e pop3_throttle_acct_limit = 2000 zmlocalconfig -e pop3_throttle_ip_limit = 2000 After that, i received some calls from end users to informe me that they cannot access their mail, the mail client ask for the password and using the webmail mail they got a 'Network error was occured'. I tried to access the WebAdmin Console but i was not able to do it because i got a blue web page instezd (see attachment). I tried also to upgrade to the version 8.0.4 but the upgrade fail just after removing the old version. I did a reinstallation and restoration of the backup that i made, but after every new installation i access the WebAdmin console, but just after the restoration of the /opt/zimbra from the backup, il restart the services, tried to access the GUI, i got the same error. Attached the logs that i collected. Do you have an idea bout the problem? I'm working on that since 18 hours now, i'm discouraged and i'm thinking about give up the data and do a fresh installation, reconfigure and recrate users. I want just to ask if is there any way to restore my /opt/zimbra/store folder to inject it and use it into my new installation. Thank you for your help.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049281978.84/warc/CC-MAIN-20160524002121-00186-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
1,317
10
http://shopwithm.blogspot.com/2011/07/dressing-up-your-tees.html
code
Under a blazer (usually with jeans, so not super dressed up, but polished): Over a shirt: I do a lot of layering in the colder months (sorry, I have winter stuff stored away, so no IRL for now): lumiere and cape cod Hope this gave you some tee inspiration! Have a wonderful day!
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702447607/warc/CC-MAIN-20130516110727-00073-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
278
5
http://www.linuxquestions.org/questions/linux-newbie-8/pining-broadcast-ip-4175592734/
code
Pining broadcast IP At this point, both VMs have same network adapter name, eno16777736, but MAC address is different: vm1.example.com = MAC 00 :0C :29 :81 :CD :CC vm2.example.com = MAC 00 :0C :29 :9C :EE :6C The vm1 and vm2 IPs are 192.168.0.43 and 192.168.0.43 44. When pinging broadcast IP, 192.168.0.255, from vm2 (192.168.0.44), I get response from 192.168.0.XXX where XXX is not 43 or 44. Why am I not getting a response back from 192.168.0.43 (vm1) if I ping from 192.168.0.44 (vm2)? How do I know which VM is responding since they both have same first three digits, "192.168.0.", and thus their broadcast IPs are same also? Last edited by fanoflq; 11-02-2016 at 11:49 AM.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00033-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
679
10
https://www.insanelymac.com/forum/profile/677287-terrybogard21/
code
No luck on my end; I installed via software update & upon reboot I get crash message stating "You need to restart your computer. Hold down Power button...blah blah blah". I'm lost as to what to do, because no on in this thread had this issue. evga micro x58 SLI using newest chameleon bootloader edit: I did just realize that I didn't change my pmversion= in my apple.boot.plist file & I hope that doesn't have any reason for my update issues. I'll search google for a way to change this outside being in the OS though. edit x2: I can access safe mode; which I'm in right now, but I'm lost on what to do next, checking google for ideas at this time. edit x3: Mac is showing me updated to 10.6.5, but I can't load into it in normal mode. Wondering if I should just restore back to 10.6.4 & sit this one out... edit x4: I'm able to boot into safe mode, but I can't use time machine & I'm new to restoring from disk utility so I'm lost trying to restore from a Wednesday backup Overall I need to figure out why I'm able to boot into safe mode, but not normal mode. Only thing I did was update via Software updater. edit x5: Think I found the culprit of my issues, will be testing theory & reporting back. Thus far I have gone ahead & done combo update; install worked, no sound, but when applying VoodooHDA kext; system crashes...removing voodoohda kext & posting back results. edit x6: I've found what was causing my system to crash, my Voodoo HDA kext; which blows because currently I have no sound & any guide I look at isn't specific in replacing it for my motherboard. if anyone knows of a Kext that will work for the eVGA x58 Micro board, not sure what ALC it is, but if anyone has a kext I should try, let me know & I'll give it a go to get sound working. No other issues besides that... edit x7: is there any good guides on installing ALC889 kext's...& trying combo's! Seems to be a hard kext to crack... edit x8: Wow that was a crazy freaking journey for me in getting through my first update on my own. I finally got sound to work using [url="http://www.insanelymac.com/forum/topic/279450-why-insanelymac-does-not-support-tonymacx86/"]#####[/url]. So for anyone using the eVGA Micro x58 Mobo or ALC889 codec for that matter, try using the newest [url="http://www.insanelymac.com/forum/topic/279450-why-insanelymac-does-not-support-tonymacx86/"]#####[/url] with installing the LegacyHDA 889, HDAenabler 889, & the 10.6.2 AppleHDA rollback. Should install without any issues & just go Disk Utility > OSX Install Drive > Repair Permissions > Exit Disk Utility > Restart - Sound should work from here on out. At Least it did for me. WOOT! 10.6.5 Update Success
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947328.78/warc/CC-MAIN-20180424202213-20180424222213-00290.warc.gz
CC-MAIN-2018-17
2,663
13
https://insights.constellaintelligence.com/post/102eev3/think-beyond-the-security-perimeter-hackers-already-have-your-passwords
code
Cyber thieves can get in, steal valuable data, and get out without being undetected. While hackers have always been interested in hoarding stolen credentials and using them for later attacks, the DBIR team sees this as a new potent threat action. In other words, right now there are thousands of botnets and other malware agents probing your IT systems and applying these existing passwords, hoping to get a match. Based on the DBIR stats, their efforts are paying off. Since hackers already have employee passwords, they can easily impersonate employee insiders, looking for and stealing valuable files and emails from behind corporate firewalls.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178375529.62/warc/CC-MAIN-20210306223236-20210307013236-00443.warc.gz
CC-MAIN-2021-10
647
2
https://reverseengineering.stackexchange.com/questions/17029/brute-force-remote-nop-sled-memory-address
code
ELF x64 binary on a remote server communicates via simple socket server in C. After overflowing the buffer (total buffer is 2000, password buffer is less), overwriting the RIP, filling with NOP sled (512 nops), inserting a reverse bind shellcode on the top of that, finding out a perfect address (without \x00) in middle of nop sled which after sliding it will execute the shellcode. Remote server ASLR is off; Binary compiled without canary and can execute code from stack. No info leak AFAIK I understand the many outcomes but if I decide to brute force the remote server to find the NOP-sled address. Any good practice for that ?
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057622.15/warc/CC-MAIN-20210925112158-20210925142158-00223.warc.gz
CC-MAIN-2021-39
632
7
http://www.tomshardware.com/forum/55960-3-officejet
code
Have an HP Officejet 600. I followed an earlier thread suggestion for cleaning cartridges by resetting factory defaults. It instructed that if after reset lcd did not show to press "2" and it would come on. It didn't. Also, I've lost connection/communication to unit after replugging it back in. Plan to power down and up computer but wanted to see if there were any thoughts to this problem. I was wondering what OS. you have ? I have a 610cl and my software is obsolete in windows 7.The printer works with the provided driver, but I can no longer use the software including clean test print ect.
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444829.13/warc/CC-MAIN-20141017005724-00321-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
597
2
https://www.blimp.io/products/projects/
code
Projects is our team collaboration software. It helps creative teams of all sizes organize and communicate effectively around the work that needs to be done. Our unique take on project management helps teams focus on clearly sharing the progress of many projects across an organization. When we started working on our Projects app we'd already tried everything out there. From very simple to-do apps for our desktops to the most advanced and configurable SASS offerings available, but none of them seemed to work for our team. Some added a lot of ceremony and others barely helped us keep track of who was doing what. We wanted to use something simple that helped clearly communicate tasks and their status, but also the overall progress of all projects going on. We also knew that eliminating emails was not the whole problem. The problem was receiving tasks a bunch of paragraphs long and bullet lists which are not easy to keep track of. We started experimenting and came up with the idea of a collaboration tool that was centered around tasks. Everything is a task, and conversations happen around tasks, and you pull in the people that need to be aware of what's going on. Instead of starting from long form email conversations we wanted to start from short tasks and expand. After a few months and a lot of experimentation we developed Projects. A very minimal user interface on top of a very simple process for managing tasks. We put a lot of effort to keep the feature set as minimal as possible in order to help users focus on the tasks at hand instead of spending time deciding how to organize and communicate. Projects offers a very familiar to-do list appearance with a lot of extra features that help all team members know who is doing what, what is progressing and what is on hold. Projects is the product of years of experimentation. When we started we thought the best solution was to build a native desktop app. After doing a bunch of web prototypes we figured out that the web was the best platform for our product. Since then we've made many incremental changes making the product a little bit better each time. Projects is used every day by tens of thousands of teams around the world. Most users are in the creative and software industries. From all of our products this is the one that has seen the most evolution. Development is still very active and the foundation that was built on 2010 is still strong and we believe it will serve us for many years to come. Need help on your next project or startup? Our team of designers and developers can turn your ambitious ideas into awesome products.Hire Us Next Case Study
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522270.37/warc/CC-MAIN-20220518115411-20220518145411-00032.warc.gz
CC-MAIN-2022-21
2,639
12
http://www.lightreading.com/services-apps/cloud-services/cbeyond-teams-with-microsoft-on-cloud-services/d/d-id/708263
code
Cbeyond Teams With Microsoft on Cloud Services ATLANTA -- Cbeyond Inc. (Nasdaq:CBEY), the technology ally for small and mid-sized businesses (SMBs), today announced it has entered into a marketing alliance with Microsoft to offer U.S.-based Managed Service Providers (MSPs) and Value-Added Resellers (VARs) the option to deploy their SMB customers' solutions in Cbeyond's cloud. Through the alliance, Cbeyond will incentivize MSPs and VARs to move their customers to the cloud and showcase the most advanced, enterprise-class cloud computing capabilities of Microsoft's Cloud OS technologies, including Windows Server, Hyper-V and System Center. In support of the program, Cbeyond is providing MSP and VAR customers with TotalCloud(R) Partner Edition based on the Microsoft Cloud OS technologies. TotalCloud Partner Edition is an advanced cloud platform enabling private, public, and hybrid cloud deployments based on Microsoft Windows Server 2012, a multi-tenant datacenter and cloud infrastructure that simplifies deployment of IT services. "By embracing Cloud OS technologies Cbeyond has the ability to provide unified management, single identity across clouds with integrated virtualization, enabling organizations to shift to more efficiently managing datacenter resources as a whole," said Aziz Benmalek, general manager, Partner Hosting & Cloud Services at Microsoft Corp. "Building upon our existing technical and business relationship, Cbeyond remains a key Microsoft partner in embracing our Cloud OS and in giving a much wider audience of customers, especially SMBs, access to our hybrid cloud technology," he added. Cbeyond Communications (Nasdaq: CBEY)
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861456.51/warc/CC-MAIN-20180618222556-20180619002556-00030.warc.gz
CC-MAIN-2018-26
1,665
5
https://www.razor.co.uk/about/our-people/introducing-fraser-software-engineer
code
Whenever a new tech revolutionist joins our ranks, we make sure their experience is a great one. But don’t just take it from us (because, you know, we’re a little biased!) – we’ve handed the virtual mic over to our newest recruits to see what they’ve got to say. A tech master and software engineer, Fraser joined the team in May 2022 and over the last few months he’s helped to deliver some awesome projects alongside his talented teammates. Hi Fraser. Let’s dive straight in! You’ve had a pretty interesting and varied career, so what drew you to software development? I originally trained as a teacher, but was always keen to have a career with a more regular work-cycle. Although I didn’t really like the coding projects I had to do at University, I decided to learn programming alongside my full time teaching role. I picked up my first programming job solving tricky geometry problems, which sparked my imagination for the power of software and how I could explore my interests in the software world. I know we can’t talk specifics, but I often see some curious geometry, calculations and algebra scrawled across your desk. What skills have you been developing in your new role? I come from a strong geometry background, and although some of our projects require a certain mathematical fluency, I’ve spent most of my time understanding object-oriented programming, web architecture and Razor’s DevOps process. I’ve always been a keen problem solver and I am relishing the opportunities we have to solve different problems in different domains! That’s awesome. Did your perception of Razor change once you joined the team? Razor projects a strong image of competence and whilst this is well earned, it seems that this strength comes from curiosity, teamwork and learning – rather than from people with massive brains who already know exactly what they’re doing and have all of the answers. We’ve all seen the videos of CEO Jamie Hinton gracing us with his lab-coated (and pretty wild) stage personality. What’s he really like to work with? Jamie certainly has his eccentric side! He’s also high energy, encouraging, and keen to hear from everyone in the team.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00455.warc.gz
CC-MAIN-2023-50
2,202
12
https://oliveandpepper.com/collections/animal-print/products/aryn-faux-suede-snake-print-mini-skirt
code
FREE SHIPPING on all domestic orders Your cart is currently empty. Faux suede snake print mini skirt featuring a hidden zipper and button detail at side. See additional details here.* We accept returns on full-priced items within 30 days of purchase*. Some exclusions apply. Buyer pays return shipping. See our full return policy here.* Search our store
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202589.68/warc/CC-MAIN-20190322014319-20190322040319-00075.warc.gz
CC-MAIN-2019-13
353
8
http://www.urbandictionary.com/author.php?author=out_for_a_wile
code
: Hey folks, we're not trying to boil the ocean here. Bill (to Fred): What the fuck did the boss Fred: Oh, the boss means "let's not try to solve all the problems at once". It's just the boss 's usual manage-a-blah.Boss : Well let's run that up the flag pole and see who salutes it. Bill (to Fred): Holy shit, I think just did it again. What the fuck was that? Fred: The boss to see what other people think of his/her thought-lacking, crappy idea. Yet another case of manage-a-blah.
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657141651.17/warc/CC-MAIN-20140914011221-00064-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
482
16
http://thermostatsusa.com/venstar-ez-programmer.asp
code
The EZ programmer accessory allows the user to quickly transfer the configuration settings from one thermostat to another. This unique accessory allows the installer to copy stored information from a thermostat. The information may be loaded into other thermostats, without the need to manually enter each item. The installer can extract programming data from a thermostat in the shop and upload it to multiple thermostats in the field. The EZ programmer accessory is an easy way to make the same program changes or change the time on multiple thermostats at the same location.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735867.94/warc/CC-MAIN-20200804131928-20200804161928-00238.warc.gz
CC-MAIN-2020-34
577
1
https://blogs.vmware.com/euc/2022/01/operationalize-threat-data-for-zero-trust-security-with-workspace-one-intelligence.html?utm_source=rss&utm_medium=rss&utm_campaign=operationalize-threat-data-for-zero-trust-security-with-workspace-one-intelligence
code
One of the top priorities for many of our customers is implementing a Zero Trust security strategy. VMware Workspace ONE Intelligence delivers integrated visibility, analytics, and automation for the Workspace ONE platform, and it can help customers operationalize Zero Trust in a variety of ways, such as: - Monitoring and visibility - Integrating security data from other products through the Workspace ONE Trust Network - Operationalizing threat data through automations - And watching specific triggers and computing a risk score Let’s look a bit closer at each of these. Monitoring and visibility Workspace ONE Intelligence enables customers to monitor their environments for anomalous security and performance-related metrics and build automations to proactively correct issues as they arise. As shown below, one is able to view risk trends over time as well as drill down into individual systems to determine risk causality. In addition to collecting data from across the Workspace ONE Platform – including Workspace ONE UEM and Workspace ONE Access – the data within Workspace ONE Intelligence can be augmented through integration with various partners in our Trust Network. VMware Carbon Black also uses the Trust Network to integrate with Workspace ONE. The screenshots below demonstrate two widgets measuring Carbon Black Threat Count and Threat Type in Workspace ONE Intelligence. Operationalizing threat data with automation You can operationalize this data so that when high-severity malware tagged as ransomware is detected by Carbon Black, an automation is configured to quarantine the system (using Carbon Black), send a Slack message alerting the SOC of the issue, create a ServiceNow ticket, and to use Workspace ONE UEM to tag and quarantine the offending device. See this example in the image below. To further enrich the proactive nature of anomaly detection within the ecosystem, the capability of dynamically calculated device and user risk scores has been overlaid overtop of the Workspace ONE dataset. In the table below, you can see the metrics currently implemented within the platform to determine device and user risk. |Anomalous Alert Activity||A device that produces an unusual number, type, or severity of Carbon Black alerts.||An unusual number, type, or severity of threat alerts is an indication of a potentially compromised device.| |App Collector||A person who installs an unusually large number of apps.||Any app can include known or unpatched vulnerabilities and these vulnerabilities can become attack vectors. The surface area for cyber-attacks increases with the number of apps on the device.| |Compulsive App Downloads||A person who installs an atypical number of apps in a short period of time.||Users frenetically installing unusual apps on their devices have a greater risk of being a victim of malicious activity. Some apps disguise themselves as useful, friendly, or entertaining, when in fact they want to harm the user. Marketplace approaches to filtering unsafe content (malware) vary from vendor to vendor. A careless user can get tracked, hacked, or conned.| |Excessive Critical CVEs||A device with an excessive number of unpatched critical CVEs (Common Vulnerability Exposure).||The greater the number of critical CVEs present on a device, the larger the device’s attack surface.| |Laggard Update||A person who sluggishly updates the device OS or who refuses to update at all.||Ignoring software updates can make a device vulnerable to attack and increases the risk of being compromised.| |Persistent Critical CVEs||A device with one or many critical CVEs (Common Vulnerability Exposure) remaining unpatched after the majority of eligible devices in the organization were patched.||The greater the number of critical CVEs present on a device, the larger the device’s attack surface.| |Rare App Collector||A person who installs an unusually large number of rare apps.||Unlike widely used apps, rare ones are of questionable provenance and have a greater chance of having malware or security vulnerabilities.| |Risky Security Setting||A person who owns one or many devices and has explicitly disabled security protection features or has devices explicitly declared lost.||Disabling security measures on a device increases the risk of being compromised.| |Unusual App Download||A person who has recently installed unusual apps.||Apps can disguise themselves as useful, friendly, or entertaining, when in fact they want to harm the user. Marketplace approaches to filtering unsafe content (malware) vary from vendor to vendor. A careless user can get tracked, hacked, or conned.| The metrics outlined above are collected daily, normalized, and the outliers are assigned a heightened Risk Score. This Risk Score represents a completely dynamic, statistical approach to determining drift that is specifically tailored to your environment. The power of these Risk Scores can be seen when it comes to reporting and automation. To learn more about how risk scoring works, see the Risk Score documentation. Stay tuned to the EUC Blog and Tech Zone for more on newly released features, exciting security use cases, as well as what we have planned next for operationalizing security through Workspace ONE Intelligence.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00220.warc.gz
CC-MAIN-2023-06
5,271
25
https://www.webharvy.com/blog/how-to-scrape-google-maps-location-coordinates-latitudelongitude/
code
Given below is a sample list of addresses for which we will scrape geo location coordinates from Google Maps using WebHarvy as shown in the above video. Note that these addresses do not include special characters like comma, hyphen or semicolon. In case you wish to have commas or other special characters within address text, then each address should be enclosed within quotes. (Ex : “6657 PEDEN RD, FT WORTH, TX”) 6657 PEDEN RD FT WORTH TX 17425 DALLAS PKWY DALLAS TX 12121 COIT RD DALLAS TX 9100 WATERFORD CENTRE BLVD AUSTIN TX 13223 CHAMPIONS CENTRE DR HOUSTON TX 1221 N WATSON RD ARLINGTON TX 5313 CARNABY ST IRVING TX To scrape Google Maps location coordinates of these addresses, load the following URL within WebHarvy’s configuration browser. https://www.google.com/maps/place/6657 PEDEN RD FT WORTH TX Note that the first address (6657 PEDEN RD FT WORTH TX) in the list of addresses is used ‘as-it-is’ in the above URL. Once this URL is loaded in WebHarvy’s browser view, Start Configuration. Then, edit the Start URL of the configuration and paste the same URL which we loaded (https://www.google.com/maps/place/6657 PEDEN RD FT WORTH TX). Now we can add keywords to the configuration. Keywords in this case are the list of addresses. It is important to note that the first keyword in the list which we add, should be same as the one used in the Start URL. Since we are selecting only a single row of data from each page, we can disable pattern detection. The latitude/longitude values are selected from the entire page HTML using regular expressions. To get the entire page HTML, click anywhere on the page and then double click on the Capture HTML toolbar button in the resulting Capture window displayed. The regular expression strings used to get latitude and longitude values are given below. If you are new to WebHarvy we recommended that you download and try using the free evaluation version available in our website. To get started please follow the link below. In case you have any questions please feel free to contact our technical support team.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00276.warc.gz
CC-MAIN-2023-50
2,079
16
https://www.bitbuilt.net/forums/index.php?threads/gc-micro-stls.3921/
code
- Jul 12, 2017 - Queensland, Australia It's pretty straight forward - - 4 Layer Wii - Red board USB A x2 - RVL-PSU x 1 - NAND Flex x1 - PTH or any other regulator for 1.8v - Gamecube controller extension lead x4 (for adapter) - A latching power switch (There's a bit of room to use whatever you can fit) - A 35x35x10 fan and heatsink -Four of these are a good fit for the controller ports but I'm sure many other female jacks will fit. - Four of these for the adapters I'd also recommend shielded wire for video, the AV port sits very close to the Wii board and generates a bit of noise on unshielded wire even if twisted. 319.8 KB Views: 288
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00168.warc.gz
CC-MAIN-2023-50
642
15
https://deepai.org/publication/skip-connections-eliminate-singularities
code
Skip connections are extra connections between nodes in different layers of a neural network that skip one or more layers of nonlinear processing. Introduction of skip (or residual) connections has substantially improved the training of very deep neural networkshe2015 ; he2016 ; huang2016 ; srivastava2015 . Despite informal intuitions put forward to motivate skip connections, a clear understanding of how these connections improve training has been lacking. Such understanding is invaluable both in its own right and for the possibilities it might offer for further improvements in training very deep neural networks. In this paper, we attempt to shed light on this question. We argue that skip connections improve the training of deep networks partly by eliminating the singularities inherent in the loss landscapes of deep networks. These singularities are caused by the non-identifiability of subsets of parameters when nodes in the network either get eliminated or collapse into each other, called elimination and overlap singularities, respectively wei2008 . Previous work has identified these singularities and has shown that they significantly slow down learning in shallow neural networks saad1995 ; amari2006 ; wei2008 . We show that skip connections eliminate these singularities and provide evidence suggesting that they improve training by ameliorating the learning slow-down caused by the singularities. 2.1 Singularities in fully-connected nets and how skip connections break them : elimination and overlap singularities, both related to the non-identifiability of the model. The Hessian of the loss function becomes singular at both types of singularity (Supplementary Note 1), sometimes called degenerate or higher-order saddlesanandkumar2016 . Elimination singularities arise when a hidden unit is effectively killed, e.g. when its incoming (or outgoing) weights become zero (Figure 1a). This makes the outgoing (or incoming) connections of the unit non-identifiable. Overlap singularities are caused by the permutation symmetry of the hidden units at a given layer and they arise when two units become identical, e.g. when their incoming weights become identical (Figure 1b). In this case, the outgoing connections of the units are no longer identifiable individually (only their sum is identifiable). How do skip connections eliminate these singularities? Skip connections between adjacent layers break the elimination singularities by ensuring that the units are active at least for some inputs, even when their adjustable incoming or outgoing connections become zero (Figure 1a; right). They also eliminate the overlap singularities by breaking the permutation symmetry of the hidden units at a given layer (Figure 1b; right). Thus, even when the adjustable incoming weights of two units become identical, the units do not collapse into each other, since their distinct skip connections still disambiguate them. 2.2 Why are singularities harmful for learning? The effect of singularities on gradient-based learning has been analyzed in detail previously for shallow networks amari2006 ; wei2008 . Figure 2a shows the simplified two hidden unit model analyzed in wei2008 and its reduction to a two-dimensional system in terms of the variables and . Both types of singularities cause degenerate manifolds in the loss landscape, represented by the lines and in Figure 2b, corresponding to the overlap and elimination singularities respectively. The elimination manifolds divide the overlap manifolds into stable and unstable segments. According to the analysis presented in wei2008 , these manifolds give rise to two types of plateaus in the learning dynamics: on-singularity plateaus which are caused by the random walk behavior of stochastic gradient descent (SGD) along a stable segment of the overlap manifolds (thick segment on theline in Figure 2b) until it escapes the stable segment (Figure 2d), and near-singularity plateaus which cause a general slowing of the dynamics near the overlap manifolds, even when the initial location is not within the basin of attraction of the stable segment (Figure 2c). 2.3 Plain networks are more degenerate than networks with skip connections To investigate the relationship between degeneracy, training difficulty and skip connections in deep networks, we conducted several experiments with deep fully-connected networks. To measure degeneracy, we estimated the eigenvalue density of the Hessian during training for different network architectures. Specifically, we estimated the probability of small eigenvalues, which reflects the dimensionality of the degenerate parameter space. We compared three different architectures: (i) theplain architecture is a fully-connected feedforward network with no skip connections, described by the equation: is the ReLU nonlinearity anddenotes the input layer. (ii) The residual architecture introduces identity skip connections between adjacent layers (note that we do not allow skip connections from the input layer): (iii) The hyper-residual architecture adds skip connections between each layer and all layers above it: The skip connectivity from the immediately preceding layer is set to be the identity, whereas the remaining skip connections are fixed, but allowed to be different from the identity (see Supplementary Note 2 for further details). This architecture is inspired by the DenseNet architecture huang2016 . In both architectures, each layer projects skip connections to layers above it. However, in the DenseNet architecture, the skip connectivity matrices are learned, whereas in the hyper-residual architecture considered here, they are fixed. In the experiments of this subsection, the networks all had hidden layers (followed by a softmax layer at the top) andhidden units in each hidden layer. Hence, the networks had the same total number of parameters. The biases were initialized to , the weights were initialized with the Glorot normal initialization scheme glorot2010 . The networks were trained on the CIFAR-100 dataset (with coarse labels) using the Adam optimizer kingma2015 with learning rate and a batch size of . Because we are mainly interested in understanding how singularities, and their removal, change the shape of the loss landscape and consequently affect the optimization difficulty, we primarily monitor the training accuracy rather than test accuracy in the results reported below. To estimate the eigenvalue density of the Hessian in our -dimensional parameter spaces, we first estimated the first four moments of the spectral density using the method of Skillingskilling1989 and fit the estimated moments with a flexible mixture density model (see Supplementary Note 3 for details) consisting of a narrow Gaussian component to capture the bulk of the spectral density, and a skew Gaussian density to capture the tails (see Figure3c for example fits). Figure 3b shows the evolution of the tail probability, i.e. the weight of the skew Gaussian component under the mixture, during training. A large tail probability at a particular point during optimization indicates a less degenerate model. By this measure, the hyper-residual architecture is the least degenerate and the plain architecture is the most degenerate one. The differences between the architectures are prominent early on in the training. Importantly, the hyper-residual architecture has the highest training accuracy and the plain architecture has the lowest accuracy (Figure 3a) consistent with our hypothesis that the degeneracy of a model increases the training difficulty. 2.4 Training accuracy is related to distance from degenerate manifolds To establish a more direct relationship between the elimination and overlap singularities and training difficulty, we exploited the natural variability in training the same model caused by the stochasticity of SGD and random initialization. Specifically, we trained 80 plain networks (30 hidden layers, 128 neurons per layer) on CIFAR-100 using different random initializations and random mini-batch selection. Training performance varied widely across runs. We compared the best 10 and the worst 10 runs (measured by mean accuracy over 100 training epochs, Figure4a). The worst networks were significantly closer to the elimination singularities, as measured by the average -norm of the incoming weights of their hidden units (Figure 4c), and significantly closer to the overlap singularities (Figure 4d), as measured by the average positive correlation between the incoming weights of their hidden units. 2.5 Benefits of skip connections are not explained by good initialization alone To investigate if the benefits of skip connections can be explained in terms of favorable initialization of the parameters, we introduced a malicious initialization scheme for the residual network by subtracting the identity matrix from the initial weight matrices,. If the benefits of skip connections can be explained primarily by favorable initialization, this malicious initialization would be expected to cancel the effects of skip connections at initialization and hence significantly deteriorate the performance. However, the malicious initialization only had a small adverse effect on the performance of the residual network (Figure 5; ResMalInit), suggesting that the benefits of skip connections cannot be explained by favorable initialization alone. This result reveals a fundamental weakness in previous explanations of the benefits of skip connections based purely on linear models hardt2016 ; li2016 . In Supplementary Note 4 we show that skip connections do not eliminate the singularities in deep linear networks, but only shift the landscape so that typical initializations are farther from the singularities. Thus, in linear networks, any benefits of skip connections are due entirely to better initialization. In contrast, skip connections genuinely eliminate the singularities in nonlinear networks (Supplementary Note 1). The malicious initialization of the residual network does reduce its performance, suggesting that “ghosts” of these singularities still exist in the loss landscape, but the fact that the performance reduction is only slight suggests that the skip connections indeed alter the landscape around these ghosts to alleviate the learning slow-down that would otherwise take place near them. 2.6 Alternative ways of eliminating the singularities If the success of skip connections can be attributed, at least partly, to eliminating singularities, then alternative ways of eliminating them should also improve training. We tested this hypothesis by introducing a particularly simple way of eliminating singularities: for each layer we drew random target biases from a Gaussian distribution,, and put an -norm penalty on learned biases deviating from those targets. This breaks the permutation symmetry between units and eliminates the overlap singularities. In addition, positive values decrease the average threshold of the units and make the elimination of units less likely (but not impossible), hence reducing the elimination singularities. Note that setting and corresponds to the standard -norm regularization of the biases, which does not eliminate any of the overlap or elimination singularities. Hence, we expect the performance to be worse in this case than in cases with properly eliminated singularities. On the other hand, although in general, larger values of and correspond to greater elimination of singularities, the network also has to perform well in the classification task and very large , values might be inconsistent with the latter requirement. Therefore, we expect the performance to be optimal for intermediate values of and . In the experiments reported below, we optimized the hyperparameters, , and , the mean and the standard deviation of the target bias distribution and the strength of the bias regularization term through random searchbergstra2012 . Putting a prior over the biases indirectly puts a prior over the unit activities. More complicated joint priors over hidden unit responses that favor decorrelated cogswell2015 or clustered liao2016 responses have been proposed before. Although the primary motivation for these regularization schemes was to improve the generalizability or interpretability of the learned representations, they can potentially be understood from a singularity elimination perspective as well. For example, a prior that favors decorrelated responses can facilitate the breaking of permutation symmetries between hidden units, even though it does not directly break those symmetries itself (unlike our bias regularizer). We trained 30-layer feedforward networks on CIFAR-10 and CIFAR-100 datasets. Figure 5a-b shows the training accuracy of different models on the two datasets. For both datasets, among the models shown in Figure 5, the residual network performs the best and the plain network the worst. Our simple singularity elimination scheme of bias regularization (BiasReg, cyan) significantly improves performance over the plain network. Importantly, the standard -norm regularization on the biases (BiasL2Reg (), magenta) does not improve performance over the plain network. These results are consistent with the singularity elimination hypothesis. There is still a significant performance gap between our BiasReg network and the residual network despite the fact that both break degeneracies. This can be partly attributed to the fact that the residual network breaks the degeneracies more effectively than the BiasReg network (Figure 5c). Secondly, even in models that completely eliminate the singularities, the learning speed would still depend on the behavior of the gradient norms, and the residual network fares better than the BiasReg network in this respect as well. At the beginning of training, the gradient norms with respect to the layer activities do not diminish in earlier layers of the residual network (Figure 6 a, Epoch 0), demonstrating that it effectively solves the vanishing gradients problemhochreiter1991 ; bengio1994 . On the other hand, both in the plain network and in the BiasReg network, the gradient norms decay quickly as one descends from the top of the network. Moreover, as training progresses (Figure 6a, Epochs 1 and 2), the gradient norms are larger for the residual network than for the plain or the BiasReg network. Importantly, the same patterns hold even for the maliciously initialized residual network (Figure 6 a; ResMalInit), suggesting that skip connections boost the gradient norms near the ghosts of singularities as well and reduce the learning slow-down that would otherwise take place near them. Adding a single batch normalization layerioffe2015 in the middle of the BiasReg network alleviates the vanishing gradients problem for this network and brings its performance closer to that of the residual network (Figure 6a-b; BiasReg+BN). 2.7 Non-identity skip connections If the singularity elimination hypothesis is correct, there should be nothing special about identity skip connections. Skip connections other than identity should lead to training improvements if they eliminate singularities. For the permutation symmetry breaking of the hidden units, the crucial condition is that the skip connection vector for each unit should disambiguate that unit from all other nodes in that layer. Mathematically, this corresponds to an orthogonality condition on the skip connectivity matrix. We therefore tested random dense orthogonal matrices as skip connectivity matrices. Random dense orthogonal matrices performed slightly better than identity skip connections in both CIFAR-10 and CIFAR-100 datasets (Figure 7a, black vs. blue). This is because, even with skip connections, units can be deactivated for some inputs because of the ReLU nonlinearity (recall that we do not allow skip connections from the input layer). When this happens to a single unit at layer , that unit is effectively eliminated for that subset of inputs, hence eliminating the skip connection to the corresponding unit at layer , if the skip connectivity is the identity. This causes a potential elimination singularity for that particular unit. With dense skip connections, however, this possibility is reduced, since all units in the previous layer are used. Moreover, when two distinct units at layer are deactivated together, the identity skips cannot disambiguate the corresponding units at the next layer, causing a potential overlap singularity. On the other hand, with dense orthogonal skips, because all units at layer are used, even if some of them are deactivated, the units at layer can still be disambiguated with the remaining active units. Figure 7b confirms for the CIFAR-100 dataset that throughout most of the training, the hidden units of the network with dense orthogonal skip connections have a lower probability of zero responses than those of the network with identity skip connections. Next, we gradually decreased the degree of “orthogonality” of the skip connectivity matrix to see how the orthogonality of the matrix affects performance. Starting from a random dense orthogonal matrix, we first divided the matrix into two halves and copied the first half to the second half. Starting fromorthonormal vectors, this reduces the number of orthonormal vectors to . We continued on like this until the columns of the matrix were repeats of a single unit vector. We predict that as the number of orthonormal vectors in the skip connectivity matrix is decreased, the performance should deteriorate, because the permutation symmetry-breaking capacity of the skip connectivity matrix is reduced. Figure 7 shows the results for hidden units. Darker colors correspond to “more orthogonal” matrices (e.g. 128 means all 128 vectors are orthonormal to each other) The blue line is the identity skip connectivity. More orthogonal skip connectivity matrices yield better performance, consistent with our hypothesis. The less orthogonal skip matrices also suffer from the vanishing gradients problem. So, their failure could be partly attributed to the vanishing gradients problem. To control for this effect, we also designed skip connectivity matrices with eigenvalues on the unit circle (hence with eigenvalue spectra equivalent to an orthogonal matrix), but with varying degrees of orthogonality (see Supplementary Note 5 for details). More specifically, the columns (or rows) of an orthogonal matrix are orthonormal to each other, hence the covariance matrix of these vectors is the identity matrix. We designed matrices where this covariance matrix was allowed to have non-zero off-diagonal values, reflecting the fact that the vectors are not orthogonal any more. By controlling the magnitude of the correlations between the vectors, we manipulated the degree of orthogonality of the vectors. We achieved this by setting the eigenvalue spectrum of the covariance matrix to be given by where denotes the -th eigenvalue of the covariance matrix and is the parameter that controls the degree of orthogonality: corresponds to the identity covariance matrix, hence to an orthonormal set of vectors, whereas larger values of correspond to gradually more correlated vectors. This orthogonality manipulation was done while fixing the eigenvalue spectrum of the skip connectivity matrix to be on the unit circle. Hence, the effects of this manipulation cannot be attributed to any change in the eigenvalue spectrum, but only to the degree of orthogonality of the skip vectors. The results of this experiment are shown in Figure 8. More orthogonal skip connectivity matrices still perform better than less orthogonal ones, even when their eigenvalue spectrum is fixed, suggesting that the results of the earlier experiment (Figure 7) cannot be explained solely by the vanishing gradients problem. In this paper, we proposed a novel explanation for the benefits of skip connections in terms of the elimination of singularities. Our results suggest that elimination of singularities contributes at least partly to the success of skip connections. However, we emphasize that singularity elimination is not the only factor explaining the benefits of skip connections. Even in completely non-degenerate models, other independent factors such as the behavior of gradient norms would affect training performance. Indeed, we presented evidence suggesting that skip connections are also quite effective at dealing with the problem of vanishing gradients and not every form of singularity elimination can be expected to be equally good at dealing with such additional problems that beset the training of deep networks. We only performed experiments with fully-connected networks, but we note that limited receptive field sizes and weight sharing between units in a single feature channel in convolutional neural networks also reduce the permutation symmetry in a given layer. The symmetry is not entirely eliminated since although individual units do not have permutation symmetry in this case, feature channels do, but they are far fewer than the number of individual units. Similarly, a recent extension of the residual architecture called ResNeXtxie2016 uses parallel, segregated processing streams inside the “bottleneck” blocks, which can again be seen as a way of reducing the permutation symmetry inside the block. Our results highlight a potential disadvantage of highly redundant, over-parametrized models currently favored in deep learning: degenerate manifolds in the loss landscapes of such models can slow down learning (cf.anandkumar2016 ). The results reported here suggest that it could be useful for neural network researchers to pay closer attention to the degeneracies inherent in their models. As a general design principle, we recommend reducing the degeneracies in a model as much as possible, but without sacrificing the model’s expressive capacity. Acknowledgments: We thank Guangyu Robert Yang for helpful discussions and comments on an earlier version of this paper. EO and XP were supported by the Intelligence Advanced Research Projects Activity (IARPA) via Department of Interior/Interior Business Center (DoI/IBC) contract number D16PC00003. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon. Disclaimer: The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of IARPA, DoI/IBC, or the U.S. Government. - (1) Amari S, Park H, Ozeki T (2006) Singularities affect dynamics of learning in neuromanifolds. Neural Comput 18(5):1007-65. - (2) Anandkumar A, Ge R (2016) Efficient approaches for escaping higher order saddle points in non-convex optimization. arxiv:1602.05908. - (3) Bengio Y, Simard P, Frasconi P (1994) Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Netw 5(2):157-66. - (4) Bergstra J, Bengio Y (2012) Random search for hyper-parameter optimization. JMLR 13:281-305. - (5) Cogswell M, Ahmed F, Girshick R, Zitnick L, Batra D (2015) Reducing overfitting in deep networks by decorrelating representations. arxiv:1511.06068. - (6) Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. AISTAS 9:249-256. - (7) Hardt M, Ma T (2016) Identity matters in deep learning. arXiv:1611.04231. - (8) He K, Zhang X, Ren S, Sun J (2015) Deep residual learning for image recognition. arXiv:1512.03385. - (9) He K, Zhang X, Ren S, Sun J (2016) Identity mappings in deep residual networks. arXiv:1603.05027. - (10) Hochreiter S (1991) Untersuchungen zu dynamischen neuronalen Netzen. Diploma thesis, Institut f. Informatik, Technische Univ. Munich. - (11) Huang G, Liu Z, Weinberger KQ, van der Maaten L (2016) Densely connected convolutional networks. arXiv:1608.06993. - (12) Ioffe S, Szegedy C (2015) Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167. - (13) Kingma DP, Ba JL (2014) Adam: a method for stochastic optimization. arXiv:1412.6980. - (14) Li S, Jiao J, Han Y, Weissman T (2016) Demystifying ResNet. arXiv:1611.01186. - (15) Liao R, Schwing AG, Zemel RS, Urtasun R (2016) Learning deep parsimonious representations. Advances in Neural Information Processing Systems, 2016, 5076-5084. - (16) Saad D, Solla SA (1995) On-line learning in soft committee machines. Phys Rev E 52:4225. - (17) Skilling J (1989) The eigenvalues of mega-dimensional matrices. In Skilling J. ed., Maximum Entropy and Bayesian Methods, pp. 455-466. Kluwer Academic Publishers. - (18) Srivastava RK, Greff K, Schmidhuber J (2015) Training very deep networks. Advances in Neural Information Processing Systems, 2015, 2377-2385. - (19) Wei H, Zhang J, Cousseau F, Ozeki T, Amari S (2008) Dynamics of learning near singularities in layered networks. Neural Comput 20(3):813-43. - (20) Xie S, Girshick R, Dollar P, Tu Z, He K (2016) Aggregated residual transformations for deep neural networks. arXiv:1611.05431. Supplementary Note 1: Singularity of the Hessian in non-linear multilayer networks Because the cost function can be expressed as a sum over training examples, it is enough to consider the cost for a single example: , where are defined recursively as for . We denote the inputs to units at layer by the vector : . We ignore the biases for simplicity. The derivative of the cost function with respect to a single weight between layers and is given by: Now, consider a different connection between the same output unit at layer and a different input unit at layer . The crucial thing to note is that if the units and have the same set of incoming weights, then the derivative of the cost function with respect to becomes identical to its derivative with respect to : . This is because in this condition for all possible inputs and all the remaining terms in Equation 1 are independent of the input index . Thus, the columns (or rows) corresponding to the connections and in the Hessian become identical, making the Hessian degenerate. This is a re-statement of the simple observation that when the units and have the same set of incoming weights, the parameters and become non-identifiable (only their sum is identifiable). Thus, this corresponds to an overlap singularity. Moreover, it is easy to see from Equation 1 that, when the presynaptic unit is always zero, i.e. when that unit is effectively killed, the column (or row) of the Hessian corresponding to the parameter becomes the zero vector for any , and thus the Hessian becomes singular. This is a re-statement of the simple observation that when the unit is always zero, its outgoing connections, , are no longer identifiable. This corresponds to an elimination singularity. In the residual case, the only thing that changes in Equation 1 is that the factors on the right-hand side become where is an identity matrix of the appropriate size. The overlap singularities are eliminated, because and cannot be the same for all possible inputs in the residual case (even when the adjustable incoming weights of these units are identical). Similarly, elimination singularities are also eliminated, because cannot be identically zero for all possible inputs (even when the adjustable incoming weights of this unit are all zero), assuming that the corresponding unit at the previous layer is not always zero, which, in turn, is guaranteed with an identity skip connection if is not always zero etc., all the way down to the first hidden layer. Supplementary Note 2: Simulation details In Figure 3, for the skip connections between non-adjacent layers in the hyper-residual networks, i.e. , we used matrices of the type labeled “32” in Figure 7, i.e. matrices consisting of four copies of a set of 32 orthonormal vectors. We found that these matrices performed slightly better than orthogonal matrices. We augmented the training data in both CIFAR-10 and CIFAR-100 by adding reflected versions of each training image, i.e. their mirror images. This yields a total of 100000 training images for both datasets. The test data were not augmented, consisting of 10000 images in both cases. We used the standard splits of the data into training and test sets. For the BiasReg network of Figures 5-6, random hyperparameter search returned the following values for the target bias distributions: , for CIFAR-10 and , for CIFAR-100. Supplementary Note 3: Estimating the eigenvalue spectral density of the Hessian in deep networks We use Skilling’s moment matching method skilling1989 to estimate the eigenvalue spectra of the Hessian. We first estimate the first few non-central moments of the density by computing where is a random vector drawn from the standard multivariate Gaussian with zero mean and identity covariance, is the Hessian and is the dimensionality of the parameter space. Because the standard multivariate Gaussian is rotationally symmetric and the Hessian is a symmetric matrix, it is easy to show that gives an unbiased estimate of the-th moment of the spectral density: where are the eigenvalues of the Hessian, and is the spectral density of the Hessian as . In Equation 2, we make use of the fact that are random variables with expected value. Despite appearances, the products in do not require the computation of the Hessian explicitly and can instead be computed efficiently as follows: where the Hessian times vector computation can be performed without computing the Hessian explicitly through Pearlmutter’s -operator pearlmutter1994 . In terms of the vectors , the estimates of the moments are given by the following: For the results shown in Figure 3, we use 20-layer fully-connected feedforward networks and the number of parameters is . For the remaining simulations, we use 30-layer fully-connected networks and the number of parameters is . We estimate the first four moments of the Hessian and fit the estimated moments with a parametric density model. The parametric density model we use is a mixture of a narrow Gaussian distribution (to capture the bulk of the density) and a skew-normal distribution (to capture the tails): with 4 parameters in total: the mixture weight , and the location , scale and shape parameters of the skew-normal distribution. We fix the parameters of the Gaussian component to and . Since the densities are heavy-tailed, the moments are dominated by the tail behavior of the model, hence the fits are not very sensitive to the precise choice of the parameters of the Gaussian component. The moments of our model can be computed in closed-form. We had difficulty fitting the parameters of the model with gradient-based methods, hence we used a simple grid search method instead. The ranges searched over for each parameter was as follows. : logarithmically spaced between and ; : linearly spaced between and ; : linearly spaced between and ; : logarithmically spaced between and . parameters were evaluated along each parameter dimension for a total of parameter configurations evaluated. The estimated moments ranged over several orders of magnitude. To make sure that the optimization gave roughly equal weight to fitting each moment, we minimized a normalized objective function: where is the model-derived estimate of the -th moment. Supplementary Note 4: Dynamics of learning in linear networks with skip connections To get a better analytic understanding of the effects of skip connections on the learning dynamics, we turn to linear networks. In an -layer linear plain network, the input-output mapping is given by (again ignoring the biases for simplicity): where and are the input and output vectors, respectively. In linear residual networks with identity skip connections between adjacent layers, the input-output mapping becomes: Finally, in hyper-residual linear networks where all skip connection matrices are assumed to be the identity, the input-output mapping is given by: In the derivations to follow, we do not have to assume that the connectivity matrices are square matrices. If they are rectangular matrices, the identity matrix should be interpreted as a rectangular identity matrix of the appropriate size. This corresponds to zero-padding the layers when they are not the same size, as is usually done in practice. Three-layer networks: Dynamics of learning in plain linear networks with no skip connections was analyzed in saxe2013 . For a three-layer network (), the learning dynamics can be expressed by the following differential equations saxe2013 : Here and are -dimensional column vectors (where is the number of hidden units) connecting the hidden layer to the -th input and output modes, respectively, of the input-output correlation matrix and is the corresponding singular value (seesaxe2013 for further details). The first term on the right-hand side of Equations 10-11 facilitates cooperation between and corresponding to the same input-output mode , while the second term encourages competition between vectors corresponding to different modes. How does adding skip connections between adjacent layers change the learning dynamics? Considering again a three-layer network () with only two input and output modes, a straightforward extension of Equations 12-15 shows that the learning dynamics changes as follows: where and are orthonormal vectors (similarly for and ). The derivation proceeds essentially identically to the corresponding derivation for plain networks in saxe2013 . The only differences are: (i) we substitute the plain weight matrices with their residual counterparts and (ii) when changing the basis from the canonical basis for the weight matrices , to the input and output modes of the input-output correlation matrix, and , we note that: Figure S1 shows, for two different initializations, the evolution of the variables and in plain and residual networks with two input-output modes and two hidden units. When the variables are initialized to small random values, the dynamics in the plain network initially evolves slowly (Figure S1a, blue); whereas it is much faster in the residual network (Figure S1a, red). This effect is attributable to two factors. First, the added orthonormal vectors and increase the initial velocity of the variables in the residual network. Second, even when we equalize the initial norms of the vectors, and (and those of the vectors and ) in the plain and the residual networks, respectively, we still observe an advantage for the residual network (Figure S1b), because the cooperative and competitive terms are orthogonal to each other in the residual network (or close to orthogonal, depending on the initialization of and ; see right-hand side of Equations 16-19), whereas in the plain network they are not necessarily orthogonal and hence can cancel each other (Equations 12-15), thus slowing down convergence. This energy function is invariant to a (simultaneous) permutation of the elements of the vectors and for all . This causes degenerate manifolds in the landscape. Specifically, for the permutation symmetry of hidden units, these manifolds are the hyperplanes, for each pair of hidden units , (similarly, the hyperplanes ) that make the model non-identifiable. Formally, these correspond to the singularities of the Hessian or the Fisher information matrix. Indeed, we shall quickly check below that when for any pair of hidden units , , the Hessian becomes singular (overlap singularities). The Hessian also has additional singularities at the hyper-planes for any and at for any (elimination singularities). Starting from the energy function in Equation 22 and taking the derivative with respect to a single input-to-hidden layer weight, : and the second derivatives are as follows: Note that the second derivatives are independent of mode index , reflecting the fact that the energy function is invariant to a permutation of the mode indices. Furthermore, when for all , the columns in the Hessian corresponding to and become identical, causing an additional degeneracy reflecting the non-identifiability of and . A similar derivation establishes that for all also leads to a degeneracy in the Hessian, this time reflecting the non-identifiability of and . These correspond to the overlap singularities. In addition, it is easy to see from Equations 24, 25 that when , the right-hand sides of both equations become identically zero, reflecting the non-identifiability of for all . A similar derivation shows that when , the columns of the Hessian corresponding to become identically zero for all , this time reflecting the non-identifiability of for all . These correspond to the elimination singularities. When we add skip connections between adjacent layers, i.e. in the residual architecture, the energy function changes as follows: and straightforward algebra yields the following second derivatives: Unlike in the plain network, setting for all , or setting , does not lead to a degeneracy here, thanks to the orthogonal skip vectors . However, this just shifts the locations of the singularities. In particular, the residual network suffers from the same overlap and elimination singularities as the plain network when we make the following change of variables: and . Networks with more than three-layers: As shown in saxe2013 , in linear networks with more than a single hidden layer, assuming that there are orthogonal matrices and for each layer that diagonalize the initial weight matrix of the corresponding layer (i.e. is a diagonal matrix), dynamics of different singular modes decouple from each other and each mode evolves according to gradient descent dynamics in an energy landscape described by saxe2013 : where can be interpreted as the strength of mode at layer and is the total number of layers. In residual networks, assuming further that the orthogonal matrices satisfy , the energy function changes to: and in hyper-residual networks, it is: Figure S2a illustrates the effect of skip connections on the phase portrait of a three layer network. The two axes, and , represent the mode strength variables for and , respectively: i.e. and . The plain network has a saddle point at (Figure S2a; left). The dynamics around this point is slow, hence starting from small random values causes initially very slow learning. The network funnels the dynamics through the unstable manifold to the stable hyperbolic solution corresponding to . Identity skip connections between adjacent layers in the residual architecture move the saddle point to (Figure S2a; middle). This speeds up the dynamics around the origin, but not as much as in the hyper-residual architecture where the saddle point is moved further away from the origin and the main diagonal to (Figure S2a; right). We found these effects to be more pronounced in deeper networks. Figure S2b shows the dynamics of learning in 10-layer linear networks, demonstrating a clear advantage for the residual architecture over the plain architecture and for the hyper-residual architecture over the residual architecture. Singularity of the Hessian in reduced linear multilayer networks with skip connections: The derivative of the cost function of a linear multilayer residual network (Equation 30) with respect to the mode strength variable at layer , , is given by (suppressing the mode index and taking ): and the second derivatives are: It is easy to check that the columns (or rows) corresponding to and in the Hessian become identical when , making the Hessian degenerate. The hyper-residual architecture does not eliminate these degeneracies but shifts them to different locations in the parameter space by adding distinct constants to and (and to all other variables). Supplementary Note 5: Designing skip connectivity matrices with varying degrees of orthogonality and with eigenvalues on the unit circle We generated the covariance matrix of the eigenvectors by, where is a random orthogonal matrix and is the diagonal matrix of eigenvalues, , as explained in the main text. We find the correlation matrix through where is the diagonal matrix of the variances: i.e.. We take the Cholesky decomposition of the correlation matrix, . Then the designed skip connectivity matrix is given by , where and are the matrices of eigenvalues and eigenvectors of another randomly generated orthogonal matrix, : i.e. . With this construction, has the same eigenvalue spectrum as , however the eigenvectors of are linear combinations of the eigenvectors of such that their correlation matrix is given by . Thus, the eigenvectors of are not orthogonal to each other unless . Larger values of yield more correlated, hence less orthogonal, eigenvectors. - (1) Pearlmutter BA (1994) Fast exact multiplication by the Hessian. Neural Comput 6(1):147-60. - (2) Saxe AM, McClelland JM, Ganguli S (2013) Exact solutions to the nonlinear dynamics of learning in deep linear neural networks. arXiv:1312.6120. - (3) Skilling J (1989) The eigenvalues of mega-dimensional matrices. In Skilling J. ed., Maximum Entropy and Bayesian Methods, pp. 455-466. Kluwer Academic Publishers.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662619221.81/warc/CC-MAIN-20220526162749-20220526192749-00188.warc.gz
CC-MAIN-2022-21
41,243
113
https://www.icaching.eu/tag/tips-and-tricks/
code
Just a little tip for the weekend: You can open a geocache webpage directly by clicking the cache icon on the Info tab. The Map window has some nice (hidden) features. So it is worth a separate post. What to show By default the map shows the caches in the active folder. So the caches on the map are the same as the caches listed in the cache list of the main window. When you click on a cache symbol, the cache becomes the selected cache in the main window. Only the additional waypoints of the selected cache are shown in the map. When you zoom out too far, the additional waypoints are hidden. When you click on the little triangle button in the bottom right corner, a little panel pops up with some extra options. Here you can select which caches you want to see (all caches in the current Folder, or only the selected ones) and which additional waypoints you want to see. iCaching has more maptypes to show than listed in the window. There are (standard Google Maps) buttons for roadmap (r), satellite (s), terrain (t) and hybrid (u). In some areas there are also 45 degrees aerial pictures available. You can also toggle between these views by the keyboard shortcuts as listed between brackets. But there are two more maptypes: OpenStreetMap and OpenCycleMap. You can show these by using the o and p keys. For the time being (but hopefully not for too long), the Map is based on Google Maps. This has as disadvantage that it’s speed is not fantastic when you have a lot of caches. So when you have a big number of caches within iCaching, don’t open the Map when you are in the ‘All Caches’ folder, but from folders with about 3.000 caches max. iCaching has a pretty powerfull filtering mechanism. You can do a single filter action by pressing the magnifier icon in the toolbar, but you can also save a filter as a so called ‘Smart Folder’. The filter dialog uses a standard Apple interface element to create the filters, but apparently not all users are familiair with this. One of the most frequent questions for support is how to create a ‘negative’ filter. E.g. search for all caches not owned by me. Therefore this little post to give some insight. You can create a search based on one or multiple filters. For most properties of the geocaches there is a filter. Clicking on a ‘+’-button adds a new filter. The real fun part begins when you add so called ‘compound filters’. There are three compound filters: - ‘none’, you can use this for a negative filter: all rules nested must be not true - ‘all’: all of the nested filters must be true - ‘some’: it’s enough when just one of the nested filters is true You can add a compound filter by clicking on a ‘+’-button while holding the alt (or option) key. You can drag filters around to organize the ordering of the filters. Tips for faster filters: - Start with the most discriminating filters, this way the filter function has less comparisons left for the second filter etc.. - Also important for speed is the processing cost of a filter; a boolean comparision (eg. Available=Yes) is cheaper than a nummeric comparision, which is cheaper than a text-comparision. - Within text comparisions (e.g. woner, cachename etc) a ‘begins with’ filter on a textbase property is cheaper than the ‘contains’ filter, because the filter only has to look at the first characters instead of the whole text - And last but not least: filtering on cacheproperties is (much) faster than filtering on it’s collections: additional waypoints, logs and attributes. Here is a screendump of the Smart Folder I use myself to fill my GPS: When something doesn’t work as you expected, please contact us. We’ll try to get back to you as soon as possible. And of course, when you like iCaching, please give it a good review in the App Store.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476399.55/warc/CC-MAIN-20240303210414-20240304000414-00631.warc.gz
CC-MAIN-2024-10
3,826
23
http://help.fireflylearning.com/teachers-and-staff/pages-and-content/creating-page-content/adding-a-news-feed
code
Adding a news feed Add an external RSS news feed to any page and it will display a live list of the latest stories. Back in Firefly, choose More from the editor toolbar, then select News Feed. Choose the type of news feed you would like to insert. This will usually be an External RSS/Atom feed. Select a Display style, Number of items to display and what you would like to Show. If you would like a small thumbnail image of the news story, remember to select the image box from the options under Show. You can also give more information about the news story by selecting Abstract. Select Done and the news feed will be inserted into your page. It will then update automatically. Please note that for performance reasons there is a 15 minute caching period before the news feed is updated. You can change the way your news feed looks by selecting Edit Page, choosing the feed and selecting the cog.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812871.2/warc/CC-MAIN-20180220010854-20180220030854-00569.warc.gz
CC-MAIN-2018-09
898
8
http://mathematica.stackexchange.com/questions/tagged/text+spacing
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Manipulating spacing in a text object I want to visually illustrate substitution in a mathematical expression. This is an example: ... Jul 11 '12 at 1:17 newest text spacing questions feed Hot Network Questions Best approach to fetch data from broker database or from filesystem? Why is paying mortgage interest considered by some to be beneficial? What Linux software can I use to explore entropy of a file? How many different genes are found in or on the human body? Did the Germans purposefully arrange to send Lenin to Russia to start a revolution? As a GM, how can I stop killing my games? Finding largest prime factor from inputted number Are computers with more RAM potentially faster if not all memory is usually in use? How to intetrupt a form submission in drupal Animal choir simulator Who certified this yogurt as kosher? If I sign someone else's key and later decide it was a bad idea, is it possible to un-sign it? Populate an upper triangular matrix from a vector of elements Java classes and static blocks How to push back when colleagues send work to me they can do themselves? How important is Sanskrit? Make a circle illusion animation Are TED presentations credible? Usare fare qualcosa/Essere solito fare qualcosa Take the next element in a nested list Why does VIM show the Unicode code point and not the UTF-8 code value? How to access Junction Object fields Permanent Camping Cooler - No Ice Needed more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0 Mathematica is a registered trademark of Wolfram Research, Inc. While the mark is used herein with the limited permission of Wolfram Research, Stack Exchange and this site disclaim all affiliation therewith.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997880800.37/warc/CC-MAIN-20140722025800-00194-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
2,268
52
https://floschi.info/so-you-want-to-be-a-application-developer-this-is-a-look-at-version-handle.html
code
Jason Anton is a complete-stack developer with Owings Mills-primarily based software business Bellese Systems and venture guide for civic tech org Code for Baltimore. He is heading to stroll us by means of his workflow in GitHub and illustrate “version handle,” which permits builders to control variations to a job. When functioning with a group of builders on a task, this is why and how a developer tends to make a attribute department from the major department ahead of they alter a line of code. “The best way to have an understanding of GitHub is to assume of it as very similar to time-journey in comic textbooks,” claimed Anton. “Git functions in what are known as branches, which are very similar to the notion of a timeline. There can be many branches —or timelines —but there ought to generally be a grasp or primary department. Or, in comics, a primary timeline.” In comics, what happens in the prime timeline, or canon, is the official depiction of a character. In just one very well-identified case in point that dates back a long time, Batman is identified to hardly ever use a gun. The hero using a gun in the just lately-introduced Snyderverse movies is odd, but ultimately not a significant offer simply because the movie edition of Batman is not recognized as the genuine or most important depiction of Batman. But if Batman applied a gun in new comic books launched by DC, it would deviate from the prime timeline. Fandom would rip their hair out. Writers would have to scramble to explain, or generate in circles to make the new model of Batman make perception with the aged. When coding on GitHub, really do not make fellow developers rip their hair out by earning improvements in the code that will indicate they have to do 2 times as considerably get the job done to make it healthy with what’s already jogging. Branching will make this feasible. “Work and improvements should really by no means be made to the major department,” stated Anton “Instead, it is significant to create aspect branches so that function can be accomplished in parallel to other function while the current operating code is still left unchanged.” Leaving the working code by itself is crucial, for the reason that repairing a person difficulty can produce 5 far more problems. A attribute branch allows a developer to make a duplicate of the code, and work with it in an environment which is not operating stay on an software. Then, variations in the code can be reviewed and authorized right before inclusion in the main branch. This prevents bugs, and potentially even much more get the job done to take care of all those concerns. To get began, there’s a naming conventional that tends to be exceptional to each progress group. The goal is to usually becoming to make anything pertinent and quick to comprehend for the staff. When contributors to the civic tech initiatives at Code for Baltimore make element branches, they use the following convention: In observe for Anton, that seems to be like this: revjtanton/challenge-42. With that line, he’s making a copy of the primary department code from the backend of an software and working on issue 42 in the code. The challenge could be that urgent a connection crashes the software, or that textual content is turning gold they want silver. To build a characteristic department, very first be positive you are on the learn department and that it is up to day. Then simply operate git checkout -b For Anton that is: checkout -b revjtanton/problem-42. Then, continue to make code updates as common. When you’re performed coding, conserve your alterations to GitHub. And finally, thrust the feature branch up for peer critique by running: git thrust origin For Anton, with Code for Baltimore, that seems like: git force origin revjtanton/challenge-42. This is Anton’s way of indicating he’s mounted issue 42. Now fellow crew associates examine his operate, and make sure it doesn’t produce situation 43, 44 and 45. This system of pulling the code into a characteristic branch then requesting peer evaluate just before integration into the principal branch will save a large amount of headache and debugging later down the line. Anton suggests every job build and enforce policies to safeguard the functioning code. Donte Kirby is a 2020-2021 corps member for Report for The usa, an initiative of The Groundtruth Task that pairs younger journalists with local newsrooms. This position is supported by the Robert W. Deutsch Basis. -30-
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100499.43/warc/CC-MAIN-20231203094028-20231203124028-00505.warc.gz
CC-MAIN-2023-50
4,522
19
http://systemmanager.ru/nbadmin.en/ch29s14s11s01.htm
code
The retention period for data depends on how likely the need is to restore information from media after a certain period of time. Some data (financial records, for example) have legal requirements that determine the retention level. Other data (preliminary documents, for example) can probably be expired when the final version is complete. A backup's retention also depends on what needs to be recovered from the backup. For example, if day-to-day changes are critical, keep all the incremental backups in addition to the full backups for as long as the data is needed. If incremental backups only track work in progress toward monthly reports, expire the incremental backups sooner. Rely on the full backups for long-term recovery. Establish some guidelines that apply to most of the data to determine retention periods. Note the files or the directories that have retention requirements outside of these guidelines. Plan to create separate policies for the data that falls outside of the retention requirement guidelines. For example, place the files and directories with longer retention requirements in a separate policy. Schedule longer retention times for the separate policies without keeping all policies for the longer retention period. Set the retention period to infinite for the backups that must be kept for more than one year as follows: Another approach is to send monthly or weekly full backups to an off-site storage facility. To restore the data, request the media from the facility. (Note that a total directory or disk restore with incremental backups requires the last full backup plus all incremental backups.)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817455.17/warc/CC-MAIN-20240419203449-20240419233449-00550.warc.gz
CC-MAIN-2024-18
1,633
5
https://teamcity-support.jetbrains.com/hc/en-us/community/posts/206200659-Git-Reset-Changes
code
During the build process there are some changes that we want to clean up from the last build. Is there a way to reset changes before building? "Clean all files before build" seems to do it but it greatly increases the time of the build. It looks like its doing a complete wipe and chekcing out again. What does this option do?
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370490497.6/warc/CC-MAIN-20200328074047-20200328104047-00084.warc.gz
CC-MAIN-2020-16
326
1
https://xiaomi.eu/community/threads/gingerbread-miui.1038/
code
It's not from a leak. It's taking the system image from the SDK's emulator. This happens after every SDK release. These ROM's are intended to be more of a preview than anything else.the evo 4g has already got a 2.3 update, someone on xda ported it xF so I guess they've already got some leaks. Also, the PORT, has no source code attached, so, miui devs CAN'T put any features from that port on their ROMI don't think you all understand that there are no leaks for Gingerbread (except maybe for the N1) at this point in time. Anything "update" that is seen for anything outside of the N1 is a port from the SDK (Software Developers Kit) not AOSP (Android Open Source Project aka Source Code). The port is unstable and is meant as a preview of Gingerbread and should be used as such (Meaning not to be used for daily use as it may be unstable and things may not be working at the time). I personally can't wait for Gingerbread and MIUI running on Gingerbread.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154163.9/warc/CC-MAIN-20210801061513-20210801091513-00162.warc.gz
CC-MAIN-2021-31
957
4
https://www.fr.freelancer.com/projects/web-scraping/website-data-mining-grant-data/?ngsw-bypass=&w=f
code
We have a variety of websites that we want to extract data from. Some are well structured and other are not. We are looking to implement some kind of web scraping capabilities to capture data and populate a database that will be used for further application development. This data is regarding grant funding opportunities from agencies. We want to capture titles of opportunities, descriptions and requirements, dates and funding amounts. 55 freelance font une offre moyenne de $2056 pour ce travail Hi, Greetings! ✅checked your project details: Website Data Mining - Grant Data ✅Completed Time: In project deadline We have worked on 650 + Projects. I have 6 + years of the experience in same kind of projects. Plus Greetings! Dear Buyer! We have a few very good tools and scripts with us for scrapping the data exactly as per the requiremnet, we will capture titles of opportunities, descriptions and requirements, dates and funding Plus Hi, I have checked your project's [login to view URL] need capture titles of opportunities, descriptions and requirements, dates and funding amounts.I have big team my team consist 20 employer I think I am the perfect one Plus I specialize in web scraping jobs like this one. You can see on my profile that I have completed many similar jobs. Don't make the mistake of hiring an amateur, who doesn't have the skill set to properly complete th Plus Dear sir I can build you a scraping script that will get data from websites and insert into database. would you like to discuss the project with me?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400191160.14/warc/CC-MAIN-20200919075646-20200919105646-00676.warc.gz
CC-MAIN-2020-40
1,539
7
http://beershevathoughts.blogspot.com/2012/06/techunix-ruled.html
code
June 26, 2012 Googling Techunix I found out that different people may mean different things when using it, so for the purposes of this blog post, I mean the Unix Server that used to do Pine mail at the Technion institute of technology. For long spells of time I thought it was the coolest mail server ever! I mean I was a student for the longest time, and I had free mail! Cool! Then I stopped being a student, the year was 2000 or so, and I thought they would let me keep my mail forever, but no! I had to get mail from my ISP. I had to pay for it, and where was that cool thing of accessing your mail from everywhere? Then along came Gmail with its 1GB of free space. I was ecstatic. This was not only mail, it was also a backup of all my files! I begged my friends and finally got an invite in 2004. Immediately I invited anyone who asked for an invite. I took me several months to switch all my mail to Gmail, but from 2005 - I never looked back!
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347407001.36/warc/CC-MAIN-20200530005804-20200530035804-00545.warc.gz
CC-MAIN-2020-24
950
8
https://www.woodrowmercer.com/jobs/backend-engineer
code
Backend Engineer - London **No Sponsorship Offered** I am currently recruiting for a Backend Engineer to join a start-up with a clear mission to help people build mathematical models using fragmented datasets. - 5+ years of Java/Kotlin or Python experience - Knowledge of data structures - Experience designing, building and maintaining API's, microservices and data pipelines - Experience with building and deploying code using Docker - Strong experience of version control with Gitlab and/or GitHub - Developing API's to applications running in the public and private cloud - Designing, developing and testing interface components that the clients use to build models - Developing a scalable and highly performant system - Taking architectural ownership for various critical components and systems - Integrating multiple data sources and databases into one system What's in it for you? - Top-tier, customisable tech (choice of apple or dell) - Unusual levels of flexibility - A huge breadth and depth of career opportunity - Well stocked team fridge, and regular team meals - Training and development training The salary on offer is between £40-60k dependant on experience. If this position is of interest to you then apply below or give Lauren Edwards a call on 0121 2654 445 for more information!
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541294513.54/warc/CC-MAIN-20191214202754-20191214230754-00113.warc.gz
CC-MAIN-2019-51
1,301
21
http://forum.woodenboat.com/showthread.php?14390-boats-enviromental-pollution
code
As a boat deigner from Europe, Danmark, I want to open a new discussion group: - How can boats be more enviromental friendly? - Or is the way they are done now fine? - What about the extensive use of "glue" on wooden boats? ... Although enviromental aspects are are taken serious in Industry (at least in Europe), it has never been a subject in boating indusrty, or do I get this wrong? open for any suggestions
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00005-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
411
6
https://linux.co.uk/documentation/man-pages/subroutines-3/man-page/?section=3&page=tgamma
code
Manual Section... (3) - page: tgamma NAMEtgamma, tgammaf, tgammal - true gamma function double tgamma(double x); float tgammaf(float x); long double tgammal(long double x); Link with -lm. Feature Test Macro Requirements for glibc (see feature_test_macros(7)): DESCRIPTIONThe Gamma function is defined by Gamma(x) = integral from 0 to infinity of t^(x-1) e^-t dt It is defined for every real number except for nonpositive integers. For nonnegative integral m one has Gamma(m+1) = m! and, more generally, for all x: Gamma(x+1) = x * Gamma(x) Furthermore, the following is valid for all values of x outside the poles: Gamma(x) * Gamma(1 - x) = PI / sin(PI * x) RETURN VALUEOn success, these functions return Gamma(x). If x is a NaN, a NaN is returned. If x is positive infinity, positive infinity is returned. If x is a negative integer, or is negative infinity, a domain error occurs, and a NaN is returned. If the result overflows, a range error occurs, and the functions return HUGE_VAL, HUGE_VALF, or HUGE_VALL, respectively, with the correct mathematical sign. If the result underflows, a range error occurs, and the functions return 0, with the correct mathematical sign. ERRORSSee math_error(7) for information on how to determine whether an error has occurred when calling these functions. The following errors can occur: - Domain error: x is a negative integer, or negative infinity - errno is set to EDOM. An invalid floating-point exception (FE_INVALID) is raised (but see BUGS). - Pole error: x is +0 or -0 - errno is set to ERANGE. A divide-by-zero floating-point exception (FE_DIVBYZERO) is raised. - Range error: result overflow - errno is set to ERANGE. An overflow floating-point exception (FE_OVERFLOW) is raised. glibc also gives the following error which is not specified in C99 or POSIX.1-2001. - Range error: result underflow - An underflow floating-point exception (FE_UNDERFLOW) is raised. - errno is not set for this case. VERSIONSThese functions first appeared in glibc in version 2.1. CONFORMING TOC99, POSIX.1-2001. NOTESThis function had to be called "true gamma function" since there is already a function gamma(3) that returns something else (see gamma(3) for details). BUGSIf x is negative infinity, errno is not set (it should be set to EDOM). SEE ALSOgamma(3), lgamma(3) COLOPHONThis page is part of release 3.24 of the Linux man-pages project. A description of the project, and information about reporting bugs, can be found at http://www.kernel.org/doc/man-pages/. This document was created by man2html, using the manual pages. Time: 15:27:01 GMT, June 11, 2010
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00030-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
2,594
41
http://www.fermimn.gov.it/linux/quarta/x86/shrd.htm
code
80386 Programmer's Reference Manual -- Opcode SHRD SHRD -- Double Precision Shift Right (* count is an unsigned integer corresponding to the last operand of the instruction, either an immediate byte or the byte in register CL *) ShiftAmt := count MOD 32; inBits := register; (* Allow overlapped operands *) IF ShiftAmt = 0 THEN no operation ELSE IF ShiftAmt >= OperandSize THEN (* Bad parameters *) r/m := UNDEFINED; CF, OF, SF, ZF, AF, PF := UNDEFINED; ELSE (* Perform the shift *) CF := BIT[r/m, ShiftAmt - 1]; (* last bit shifted out on exit *) FOR i := 0 TO OperandSize - 1 - ShiftAmt DO BIT[r/m, i] := BIT[r/m, i - ShiftAmt]; OD; FOR i := OperandSize - ShiftAmt TO OperandSize - 1 DO BIT[r/m,i] := BIT[inBits,i+ShiftAmt - OperandSize]; OD; Set SF, ZF, PF (r/m); (* SF, ZF, PF are set according to the value of the result *) Set SF, ZF, PF (r/m); AF := UNDEFINED; FI; FI; DescriptionSHRD shifts the first operand provided by the r/m field to the right as many bits as specified by the count operand. The second operand (r16 or r32) provides the bits to shift in from the left (starting with bit 31). The result is stored back into the r/m operand. The register remains unaltered. The count operand is provided by either an immediate byte or the contents of the CL register. These operands are taken MODULO 32 to provide a number between 0 and 31 by which to shift. Because the bits to shift are provided by the specified register, the operation is useful for multi-precision shifts (64 bits or more). The SF, ZF and PF flags are set according to the value of the result. CS is set to the value of the last bit shifted out. OF and AF are left undefined. Flags AffectedOF, SF, ZF, PF, and CF as described above; AF and OF are undefined Protected Mode Exceptions#GP(0) if the result is in a nonwritable segment; #GP(0) for an illegal memory operand effective address in the CS, DS, ES, FS, or GS segments; #SS(0) for an illegal address in the SS segment; #PF(fault-code) for a page fault Real Address Mode ExceptionsInterrupt 13 if any part of the operand would lie outside of the effective address space from 0 to 0FFFFH Virtual 8086 Mode ExceptionsSame exceptions as in Real Address Mode; #PF(fault-code) for a page fault
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948125.20/warc/CC-MAIN-20180426090041-20180426110041-00327.warc.gz
CC-MAIN-2018-17
2,224
9
https://www.backyardchickens.com/threads/hens-fighting.852592/
code
My two 16 month old hens have been fighting (jumping on each other, pecking etc). It only seems to be when i pick one up and give her a cuddle and put her down, they will.go at each other immediately. Their feathers fluff up. I have tried to stop them but i get clawed at. Why is this? It's the middle of summer here in Aust. Could it be a broody thing? They haven't been broody since i've had them. is it normal? Jealous? I just don't want them to kill each other.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945724.44/warc/CC-MAIN-20180423031429-20180423051429-00617.warc.gz
CC-MAIN-2018-17
465
1
https://forums.awsgametech.com/t/collisions-with-blender-exports/5881
code
Went through the getting started tutorial and got everything to work there. But once I was done I tried exporting a basic cube from Blender as an fbx to test it out. It displays as expected, but I’m unable to get collisions to work. Adding the “Mesh Collider” and “Static Physics” components, don’t work. It works with the assets provided for the starter game. It’s not clear what’s missing. I’m using LY 126.96.36.199 and Blender 2.79b. Any help would be amazing. Thanks for the reply. I didn’t have the CryPhysics Proxy modifier set on my cube, but it’s also not set for the meshes in the starter game (e.g., GSG_Maze_Doorway.fbx) and collisions work fine on those. I did try setting the CryPhysics Proxy mod on my cube and setting the Physics meshes to include the cube, but that alone didn’t fix it. I’m not sure what you mean by “collision model”. How does LY identify this model? I do see in the asset browser that GSG_Maze_Doorway.fbx does include a mesh labeled “physics_mesh”, but I tried renaming my cube mesh to match and still no dice, so I’m assuming there’s more to it than that. I believe CryPhysics. I don’t have the PhysX gem installed. Just using stock Lumberyard. Are you using CryPhysics or PhysX? The setup for each is slightly different. Here are some things you can double check: - Does your mesh include a physics / collision model? When you use the Mesh Collider component, Lumberyard looks for this mesh to use for your collision. - The Static Mesh component should be used on meshes that do not need to move. Examples include unmovable objects, streets, sidewalks, walls, etc. If you need your mesh to move and collide with other objects, use the Rigid Body Physics component. - Check the FBX Settings. Right-click on your .fbx file in the Asset Browser and choose Edit Settings… and make certain that you have added the CryPhysics Proxy modifier. I am not familiar with Blender. But here is the general concept: - In blender your asset will have two models: the render mesh and the collision mesh. - The render mesh is the one that you see in Lumberyard. - The collision mesh will be invisible and typically this model should be as simple as possible to describe the collision of your model. When objects in Lumberyard collide, they are actually colliding with the collision mesh. - For simple shapes, you can just duplicate your render mesh and use the duplicate as the collision mesh. - There are soft naming conventions that you can use so Lumberyard will automatically know what each mesh is: - Now in Lumberyard when you go to the FBX Settings… for your sphere you should see the CryPhysics Proxy modifier added automatically. Also, make certain that the mesh named sphere_phys is set for the collision. You should have something like this: Your collision should be set up correctly now. Finally, add the Mesh Collider and Static Physics components to tie it all together.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662533972.17/warc/CC-MAIN-20220520160139-20220520190139-00756.warc.gz
CC-MAIN-2022-21
2,949
22
https://www.top-aquariums.com/en/example-no-5331_uid5331.html
code
Live food: white mosquito larvae, black mosquito larvae, Daphnia Frozen food: white mosquito larvae, black fly larvae There are always alternately one day Live and Frozen Food When I mix live food, what I have just because, when frozen food there per feeding a quarter cube of the variety, which is just off 1 fasting wöchtenlich I know that you should keep this in Killis harem and not in pairs, because the males fight each other among themselves. My observations are, however, that the males absolutely peacefully among themselves behave and there were no disputes. If they were to go but once on the clock Auber would be plenty of room to go out of the way;) However, I wonder if I still DETERMINED me 3 more females.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578586680.51/warc/CC-MAIN-20190423035013-20190423061013-00506.warc.gz
CC-MAIN-2019-18
722
9
https://channel9.msdn.com/Forums/Coffeehouse/193788-Channel-9-Update-Planning/efdb71bf0a4f42a1847b9deb01680fa0
code
The best implementation of themes I've seen works like this: Each user has a CSS link / URL in their personal profiles... When C9 renders the page it just places whatever the user has chosen in the rel="stylesheet" link... If nothing is selected it uses the default. That way the themes are ever-expandable. So for example 9ers would be able to design their own themes and share them around... People just change the location in their profiles to the *.css file and get a new look and feel. As I said I've seen this implemented top to bottom and it works great... Users have a lot of fun finding different themes that others have created.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887054.15/warc/CC-MAIN-20180118012249-20180118032249-00638.warc.gz
CC-MAIN-2018-05
638
4
https://help.yapp.us/en/articles/16676-renaming-pages
code
Once you've selected the page you want to rename, Click the cog icon in the left page list to open the page settings panel Click the page name input and change the name The name will be changed in both the left hand column of the interface and in the tab list of your app. On a phone? Currently, you can't edit an app from your mobile phone.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510208.72/warc/CC-MAIN-20230926111439-20230926141439-00639.warc.gz
CC-MAIN-2023-40
341
5
https://www.codecademy.com/courses/learn-the-command-line/lessons/navigation/exercises/cd-i
code
$ cd 2015 cd stands for "change directory". Just as you would click on a folder in Windows Explorer or Finder, cd switches you into the directory you specify. In other words, cd changes the working directory. - The directory we change into is 2015. When a file, directory or program is passed into a command, it is called an argument. Here the 2015 directory is an argument for the cd command takes a directory name as an argument, and switches into that directory.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174124.9/warc/CC-MAIN-20170219104614-00344-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
465
7
https://markhazleton.controlorigins.com/
code
As a Solutions Architect and lifelong learner, I create solutions that make technology work for businesses. With a focus on tangible benefits, I avoid getting sidetracked by sizzle that does not deliver . The goals of the business are the primary drivers for a solution to be successful. I have extensive experience developing solutions for both on-premises and cloud-based providers. From small business-to-consumer websites to large enterprise projects, I have worked with organizations of all sizes to deliver successful solutions.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00896.warc.gz
CC-MAIN-2023-40
534
1
http://www.phpdeveloper.org/tag/bearer
code
In a quick post to her site Lorna Mitchell reminds us that you can modify the options on the internal PHP streams (like for HTTP requests), more specifically to add a "Bearer" token value for OAuth2 integration. For OAuth2, all I had to be able to do was to send an Authorization header with my web request from PHP. My second-favourite way of making API calls from PHP is to use PHP's stream handling, so I did that. It's not code you see very often but it's super-simple and it works on every PHP platform I've tried so far She gives a few lines of code to show how to modify the options to add in the token value, basically using an array of options and a call to stream_context_create to create the context. This can then be used in future calls (like the file_get_contents she shows) to automagically send this information along with the request.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510225.44/warc/CC-MAIN-20230926211344-20230927001344-00253.warc.gz
CC-MAIN-2023-40
851
3
https://vid.me/lMkG/how-digibronymlp-saved-the-entire-anime-communit
code
*This video was uploaded on Apr. 16th 2017 on YT* Digibro made a rant, there was drama, and I am an asshole who makes bad videos, wants ad revenue and has too much fun pissing people off. This is gonna be good... (also, lol I accidentally used my old end card, but I'm too lazy to fix it so whatever) Support me on Patreon lol: Visit my blog: Follow WattheWut on Twitter: Check out MyAnimeList: Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105961.34/warc/CC-MAIN-20170820015021-20170820035021-00377.warc.gz
CC-MAIN-2017-34
730
9
http://www.basenotes.net/huddlerarchive/373113
code
I wonder what do you guys think about fragrances in the exclusive lines of Designer houses (TomFord Private Blend, Dior Privee, etc). I've sampled some, not much just the more popular ones and feel quite underwhelming by them. They are somehow slightly better than the mainstream stuff but only slightly So what do you guys think about it. Do they worth the price tag or it is just about the exclusive name but not about the quality of the juice?
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.60/warc/CC-MAIN-20170423031202-00092-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
446
2
http://stpatschurch.info/7896/
code
Bitcoin Mining with p2pool , bfgminer on ubuntu Computriks. Bitcoin Mining with p2pool , bfgminer on ubuntu. Doing bitcoin mining with p2pool lets you get incomes as stable as other pools, while avoiding some problems of centralized pools like deepbit , bitminter. p2pool advantages You do not have to trust the owner of a pool for you to pay your Bitcoins honestly. You are. Bitcoin mining malware, analysis of an infection Antonio Angelino 1 nov. Bitcoin Mining Using Raspberry Pi: 8 Stepswith Pictures) Instructables If you don t know already, Bitcoin is a virtual currency set up in 2009. Bitcoin has grown in reputation over the past few years becoming a very popular as a method to pay for services over the internet. The value has rocketed recently thanks to the huge coverage in the media, negative reasons. , for both positive There are. How To linux Mine Bitcoin using the CPU For Linux Steemit In this post digger I will show you how to mine bitcoin using the CPU of your linux computer using a software called cpuminer. We are using Ubuntu server version 16 64 bits If you are looking for profit you should try to mine monero using your CPUCheck our blog posts digger We are using the MINERGATE minig pool; Minergate will. Bitminter bitcoin mining pool Bitminter, the bitcoin mining pool mint your own bitcoins. Mirai IoT Botnet: Mining for digger Bitcoins. Security Intelligence 10 apr. 2017 This new variant of ELF Linux Mirai malware with the bitcoin mining component has us pondering, though. We know that as we move toward becoming a cashless society, purchase digger bitcoins. Linuxcoin has been designed with the average user in mind , everything is super simple to start using mining bitcoins. Everything is. How to Mine Bitcoin , Make Money Null Byte: WonderHowTo 6 okt. 2011 In this Null Byte, , Bitcoin miner. , which is a much more suitable hash cracker, I m going to show you how to mine Bitcoin using your graphics card To do this, you will need a decent graphics card. AMD graphics are superior at math functions, so bear this in. So how is your experience with Bitcoin so far. We have 4 5 free servers, can we use it to mine some cent Any recommendation for. , MacOS This is the first part in my bitcoin adventure series , I m not a professional miner, I m just trying out everything I can digger get between my fingers. Disclaimer: I am not saying this is a smart idea. Actually it s not. The only purpose. MultiMiner: Bitcoin Mining Software MultiMiner is a desktop application for crypto currency mining , Mac OS X , Linux. , monitoring on Windows MultiMiner simplifies switching individual devicesGPUs, ASICs, FPGAs) between crypto currencies such as Bitcoin , Litecoin. Bitcoin ArchWiki 2 okt. 2017 Bitcoin is a decentralized P2P electronic cash system without a central server , trusted parties. Users hold the cryptographic keys to their own money , make transactions directly with each other, digger with the help of the network to check for double spending. Bitcoins, usually denoted by BTCe. g. 0. 1 BTC. Minera Web dashboard , monitor system for bitcoin mining controller Manual Install. bfgminer Linux Mint Community Bitcoin miner software with multi threaded multi pool GPU, FPGA , ASIC mining support. BitCoins are a digital currency, exchanged freely against all other currencies. Coins may be issued by everyone, digger one just needs considerable computer power , luck. To digger even out rewards for one s contribution, many initiative. GitHub pooler cpuminer: CPU miner for Litecoin , add maltivec" to CFLAGS. 11 Best Bitcoin Mining Software for Mac, Windows, Linuxjuni digger 2017 Learn about the best Bitcoin mining software in the most comprehensive guide available on the internet Importance of Bitcoin Bitcoin digger WalletsBitcoin Mining Software for. ethOS Mining OS ethOS Mining OS. ethOS is a 64 linux bit linux OS that mines Ethereum, Zcash, , other GPU minable coins. , Monero Altcoins can be autotraded to Bitcoin. Ladda ner Bitcoin Bitcoin. org Bitcoin Core har en initial synkroniseringstid som tar både tid och laddar ner mycket data. Bitcoin miner NVIDIA Developer Forums 5 juni 2017 , thus Jetson based. , , it is linux not as efficient at Bitcoin mining as the ASIC based mining systems, while the Jetson TX2 is an energy efficient GPU code, , have sub dependencies on tools that are newer than what s available on Ubuntu 16. 04 that s on the Jetson, so that would require more effort than I. exe. Easyminer is free. There are no fees using , all is free as in free speech , registering to our stratum, even better) free beer. 5 Easy Ways To Block Cryptocurrency Mining In Your Web Browser 26 sep. 2017 Apart from ransomware, bitcoin mining malware are rising in popularity at an exponential rate. In case the culprit is some website which. , you need to open the hosts file by running following command 0 digger coin hive. com to the end of the document. Bitcoin Mining Software Bitcoinx EASYMINER A GUI based miner for Windows, Linux , Android. EasyMiner acts as a convenient wrapper for the built in CG BFGminer softwares. BFGMiner Modular FPGA GPU miner in C; CGMINER This is a multi threaded multi pool GPU, FPGA , ASIC Bitcoin miner with ATI GPU monitoring over clocking. software rec Getting a GPU Bitcoin miner for Linux 64bit Super. 28 juli 2011 In my experience, Linux is far better supported by the Bitcoin community than Windows is. As opposed to usual pools. Linux. Using git is preferable, but you can also download tar zipballs on GitHub. sudo apt get install git if git is not installed git clone com forrestv p2pool. Bitcoin miner for Linux from HaxStroke www. This includes mining pools, other users handling large amounts of bitcoins. , large online stores, exchanges, How to install Linux with Bitcoin Miner Bitcointalk I digger have an old dual core with linux a 6770 , 500 GB hard disk. Was thinking of installing linux with Bitcoin mining so that I can use it as a Linux machine for practice , also do some Bitcoin mining. How to Mine Bitcoins With a GPU Using CGMiner. ToughNickel 3 mars 2017 This digger hub will walk you through the process of mining for Bitcoins using a GPU , the program CGMiner. It is compatible with both Windows , Linux operating systems. Among the great features of. Bitcoin. , the Copay app from the folks at digger Bitpay doesn t cost you anything I ve mentioned many Bitcoin wallet applications , cloud solutions during the past few years, but Copay truly is different. It has features linux other. } D9 how do Bitcoin miners get paid. Bitcoin mining on. för 1 timme sedan} D9 how do Bitcoin miners get paid. Bitcoin mining on linux. HOWTO mine Bitcoin in Linux fak3r 8 dec. Une fois allumé, vous allez rapidement arriver sur l écran de sélection de la distribution Linux à installer. Cloud Mining How to Mine Bitcoin without a Miner CoinDesk If you want to invest in bitcoin mining without the hassle of managing your own hardware, there is an alternative. You can use the cloud to earn your coins. Put very simply, cloud mining means usinggenerally) shared processing power run from remote data centres. 24 apr. 2017 Aliases. Application. BitCoinMiner. EM; Backdoor. Perl. digger Shellbot. B; Application. F. softwaree. Cgminer) with API access enabled; All standard compliant ASIC linux , GPU miners are supported; Example: Special mining hardwareASIC Antminer, Linux based miner. Bitcoin Mining Software. How to install SimpleMining OS Bitcoin linux , Altcoins 5 apr. 2017 SimpleMining OS is a special version of Ubuntu that has been compiled specifically for miners. The software makes it simple for people who don t know Linux to setup an Ubuntu system. How to Install SimpleMining OS: You literally download the software. Burn it to digger a USB, , HDD, SSD. , Mac 5 ASIC Bitcoin GUI Mining Software For Microsoft Windows , Linux. för 6 dagar sedan Is Bitcoin mining profitable. , it depends where you live BitCoin mi. The future shines brightly with unrestricted growth, , permissionless innovation, global adoption, decentralized development. How To Mine Bitcoins. TechCrunch 8 apr. digger 2013 Linux users can run miners like CGMiner. An excellent guide to installing a miner on Ubuntu is available here. How to install bitcoin mining software in Ubuntu 14. 04 for joining. 18 maj 2014 To mine bitcoins use cpuminerclick here) , avoid any graphical application: a console application is faster , doesn t need much memory. This may be the reason why bitcoin qt wallet has dropped the official support for bitcoin mining. You should compile cpuminer from the source code to obtain. Bitcoin on Fedora with Electrum Fedora Magazine 1 dec. 2016 The system is peer to peer , transactions take place between users directly. One of the important pieces of software required when using Bitcoins is a Bitcoin Wallet. On Fedora, there is a new Bitcoin Copyright © 2018 · All Rights Reserved · Échange de bitcoin xrp
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039748901.87/warc/CC-MAIN-20181121133036-20181121155036-00469.warc.gz
CC-MAIN-2018-47
8,942
59
https://codecayman.com/programs/we-code-cayman
code
6 weeks | 1.5 hours per week We.Code(Cayman) is a free learning and support network dedicated to empowering Cayman residents who are interested in technology (all are welcome). The goal of this program is to provide an introduction to computer programming course in a friendly and non-intimidating setting. Throughout the program we will explore possible programming paths and show that developing software is only an idea away. We work hard to foster fostering avenues for everyone to develop tech skills and access opportunities. In order to succeed in this program, participants will need access to a laptop and experience using a web browser, able to perform a Google search, basic understanding of how to create, edit and save files, familiarity installing basic software (such as Microsoft Office) and (most importantly) the determination to learn a new skill. There is no cost but we ask for a US$200 refundable deposit as a pledge for your commitment to the program. This deposit will be returned if 80% of the classes are attended.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00044.warc.gz
CC-MAIN-2023-50
1,040
3
http://avrgaming.com/?p=586
code
Mostly just bugfixes and some performance tweaks. Need to get the server performing well again. * /town withdraw has been re-enabled. * /town upkeep will now show you the amount of coins you *will eventually be charged* due to town block spread. See this thread for details: http://avrgaming.com/forum/viewtopic.php?f=4&t=1319 * Fixed conncurrency problems with /build undo and /town demolish commands * Daily upkeep code will now check for anarchy expiration before charging you. * Fixed farm chunks not being removed internally when demolished. * Mayors and residents no longer pay a flat tax when set. * Temple now saves culture in the DB when it adds it to the town. * Towers no longer check distances between players who are in different worlds(aka overworld vs nether, fixes some errors in logs) * Farm template no longer contains fully grown wheat. Potential performance improvements: * Cleaned up/optimized the main thread for block breaking and placing * Settings and SessionDB entries are now cached and asynchronously written/deleted/updated to the back end database. * Reduced total mobs per chunk and made other tweaks to the craftbukkit config.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828501.85/warc/CC-MAIN-20181217091227-20181217113227-00456.warc.gz
CC-MAIN-2018-51
1,158
14
https://kongwenbin.com/overthewire-bandit-level-24-to-level-25/
code
Level goal: A daemon is listening on port 30002 and will give you the password for bandit25 if given the password for bandit24 and a secret numeric 4-digit pincode. There is no way to retrieve the pincode except by going through all of the 10000 combinations, called brute-forcing. The following is my script to perform this brute-forcing techqnies, while [ $pin -lt 10000 ]; do echo “Attempting PIN: $pin” attempt=”$(echo $pass24 $pin | nc localhost 30002)” if ! [[ $attempt == *”Wrong!”* ]]; then echo -ne “$attempt” The script will iterate through each possible PIN to perform brute forcing in identifying the secret pincode of bandit25. The password to gain access to the next level is uNG9O58gUE7snukf3bvZ0rxhtnjzSGzG.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00313.warc.gz
CC-MAIN-2023-50
739
9
http://stackoverflow.com/questions/4958131/what-is-the-core-technology-used-in-ejbs?answertab=votes
code
what is the core technology used in ejb's ? Um... Java? The expression "core technology" is far too vague to give a meaningful answer here. Sign up using Google Sign up using Facebook Sign up using Email and Password 4 years ago
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447729.93/warc/CC-MAIN-20151124205407-00304-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
228
6
https://www.onespan.com/about/careers/job/junior-technical-evangelist-1935475
code
OneSpan is looking for a Jr Technical Evangelist to join our team in North America. Reporting to the Partner and Developer Technologies Manager, the Junior Technical Evangelist will work as an integral part of a dynamic team interfacing with and shaping the OneSpan Community Portal, consisting of current customers, prospective customers, partners, and other OneSpan employees. Job Duties and Responsibilities: - Assist customers, prospects, and partners to integrate our products into their applications through the Community Portal forums and occasionally on the phone with key clients. - Maintain regular blog posts on the OneSpan Developer Blog - Help R&D and the documentation team to create and maintain integration guides and example content for the OneSpan Community Portal using the OneSpan Product APIs and SDKs and the latest, popular technologies - Work with Product Marketing with projects surrounding marketing the technical aspects/features of OneSpan products - Occasionally attend developer conferences as a technical resource for developers looking to integrate an OneSpan solutions into their applications - Be a voice for the developer/user community in internal discussions about product plan direction - Propose speaking sessions at key industry/technology developer conferences - Moderate external contributions to the Community Portal - Bachelor’s Degree in Computer Science, Computer Engineering, or equivalent experience in a related field - Strong verbal and written communication skills in English (French an asset) - Excellent problem-solving and organizational skills - Creative thinker, proactive, team-player, success- and results-oriented - Willingness and ability to travel occasionally (mostly within the U.S. and Canada)
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251690379.95/warc/CC-MAIN-20200126195918-20200126225918-00184.warc.gz
CC-MAIN-2020-05
1,759
15
http://kula.org.uk/webpages.php
code
** Live Site ** Setup Linux Asterisk 1.8 on FreePBX Distro and integrated AsterBilling billing system. Primary system is an i5 with 6GB DDR3 running on SDSL last mile dedicated 3MBit/3Mbit, 1 hop from BT fibre Backbone. The goal was to make phones plug and call, instannt unlimited internal calls and 100 minutes to UK and selected international destinations. Avoiding the need to configure routers, firewalls or any thing at the end user. Also designed simple HTML company website. Quote my name and get a month free trial! ** Example ** A complete overhaul of a Squash Club's Website. Integrated an external court booking system and implemented a php based login, post and manage news system. Freshend up the design and added some widgets e.g "Facebook Like" button. ** Live Site ** A jQuery based website re-built from a flash template. The guest lodge was looking for fresh and new age design to make their already unique and relaxing guest lodge stand out from the local market. Also a requirement was to keep the site fairly dynamic, full of images but also keep it optimised for slow internet connections in South Africa. .NET 3.5 Form application for Windows. This tool was inspired by working with the Magento E-Commerce stores. At the time in older version there was no real way to manage items in a timely fashion. Using the backend PHP took between 5-35seconds to process and was a painfully time consuming task. I made this tool that automatically exports XML data to a local Windows Based PC, where you can manipulate thousands of records in real time, use HTLM tagged description using a built in WYSIWYG plug in, image capturing with auto uploading features and linking to your items. Once you have done editing all the data you just had to export the XML data back to server and let the PHP code do its thing while you can carry on with other work. Even though the tool is highly under developed and somewhat buggy it is used daily (i can verify this by using an anonymous built in java tracker that works with google analytics) Over time this application is starting to evolve into a version 2 application that supports Magento API, Quickbooks IIF synchronisations and some more exciting features. This business was sold in March 2011. A short personal business venture into the world of Data Recovery.Site is now shut down. I have acquired market leading tools for data forensics/repair in hard drive and solid state drives. This was a personal undertaking and full commitment to this project would mean i would have to change my career objectives, which will not happen. It was highly subsidised by an ambition to learn some cutting edge information in data forensics. This service was real and I succesfully recovered data for many individuals! This priceless experience not only helps me stand out more in my career profile but at the same time helps me identify low level problems that could occur in everyday IT situations. And thanks to some closely guarded industry secrets, where i was priviliged enough to get access to - I have the ability above others to fix and guarantee my reapair! I built the website built by my self using a Flash template The form application was developed in VB2008 using APS .NET 2.0 and ODBC with a SMS gateway build in I still run a forum at forum.hddlibrary.com that is private and for members of data recovery centres only. There we share our techniques and in a combined effort try to resolve problems, that otherwise are a closely guarded secret. **Link to live site** A website for a Talented Horse Dentist. Re-designed old homepage to meet requirements for new look This is work in progress. **Link to live site** Open source E-Commerce shop (Magento E-Commerce). Back and Front end managmnent. Mainly developing a bridge program between Magneto and Quickbooks 2008 in VB.NET **link to live site** A team of young enthusiastic directors, musicians and organisers came together to create an amazing festival in South Africa, Capetown. I offer courtesy website maintanance. NifSoft Smallest bespoke PCB design and fabrication for ZigBee applciations. Server Transfer Win2000 server virutal hosts to Ubuntu 11.04(VirtualMin) and ported to PHP5. Hack Email An eloborate hoax. Sends spoofed emails using several php proxies around the world. Trafik100 Added chat box to cake.php site. E-Kompis Installed Question and Answer page. Bedirian Bespoke file browser that parses emails to directories. Corporate Direct Bespoke Customer Relationship rewrite in .NET and SQL for UK Fundraiser. Private Bespoke PCB design, fabrication and software design for vending machine supplier. Trafik100 Android app for Marketplace using PhoneGAP API. Form Application Hotel check in/out for fire records, Notes and Room management. I recieved two Raspberry Pi's early 2012 and decided to make a cheaper weather station that links to WiFi/LAN with a built in WebServer, database and API. It has been interesting venturing into the ARM domain. I hope to come up with my own addon that is compatable with all the extra pieces needed ... I discovered Romotive through kickstarter. It is a robot that is supposed to be controlled via any audio jack from a smartphone. I got mine 6 months later and i was dissapointed to find out it does not work with EU smartphones. So as the robot is powered by an Atmel tiny861 MCU.. I decided to write my own firmware and implement a TTL inteface. I have made a seperate blog, approoved by by Romotive team them selves; I demonstrate how to hack Romotive, link to other hacks and I also added some cool gadgets. Recent acquisiton of our own house has unleashed hundreds of possibilites to change things without worrying about our landlord having a heart attack. For months I wondered what would be a good project for me to work on with my Arduino prototyping kit... During my business venture in the HardDrive forensics sector i was amazed to the price of particle counters. Which is ok i suppose for highly accurate laser counters for nano sized particles(bacteria detectors!) costing thousands but in reality anything smaller than 0.05micron will not damage a HDD directly. So i built my own particle counter for under £15.(Uses Infrared)
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703334458/warc/CC-MAIN-20130516112214-00007-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
6,213
43
http://www.os2voice.org/VNL/past_issues/VNL0401H/vnewsf2.htm
code
VOICE Home Page: http://www.os2voice.org [Previous Page] [Next Page] Leung ©April 2001 Before we go on, let's get one thing straight. I'm not here to advocate either Convenience Pack or eComStation. I know you readers are intelligent enough to decide for yourselves. (I personally will be getting both). This is just to describe my experience with the Convenience Pack (CP). IBM isn't really targeting the home user (officially), mostly the business user, so probably that's why the cost of a Software Choice subscription can be a bit of a turn off for the average home user. Up here in Canada, it costs $350CDN for a single user 2 year subscription direct from IBM. That converts to about $230US, though I've heard of some places offering it for $200US. From what I gather, the regular Software Choice is for small business, with up to 10-pack licenses. Large corporations have an equivalent service called Passport Advantage. I know it gave me pause at first, but then I thought about it some more. Having started with an OEM copy of Warp 3, I later upgraded to Warp 4 for $170. But up until now, all fixes (40 or so for Warp 3 and 15 for Warp 4) had been free (more than I can say for Windows). Including SW Choice now, I'll have spent a total of about $520 over a period of 7 years. Not too shabby, as over the same period, I'd have gone through Win95a, Win95b, Win98, WinME and soon WinXP. I'm not sure about WinXP yet, but the rest of the line were essentially bug fixes and minor enhancements of the level that we've been receiving with the free Fixpacks. Plus, when was the last time you got to hear from the developers of your OS in person on Usenet? If you be polite and air your problems, they'll actually respond. My first test system: There is nothing super impressive here, but it's a good, solid system that serves If upgrading, I recommend you read the README.TXT on the Warp 4.51 CD! You might be okay skipping this, but certain cases (e.g. Thinkpad users like me) with specific problems are described. And always backup before you start! Err...no, not in this case. I actually have to use WinNT at work. While it was fast and stable at first, it has since degraded to the point where I have to do a reboot at least once a day. I was actually hoping for an excuse to re-install... ;-) This computer supports bootable CD, so I shoved in the Installation CD and re-started the machine. This automatically booted and convert all my existing partions to "compatibility volumes". The process didn't take more than a couple of minutes, and reported back that "VCU has created 4 LVM compatibility volumes". At this point, you are instructed to reboot the machine to recognize the new volumes during system install. I have to admit, volume conversion got me a little nervous at this point (I didn't fully read the README, but it sure sounded dangerous to me :), but I charged on. It boots up again with the familiar blue OS/2 Warp startup screen. You are instructed to swap out the Installation CD and put in the Warp CD. Everything is the same up to this point, but next I was presented with a new screen that tells me what is about to occur. I then get the following warning that certain components in my existing installation are no longer supported, so won't be migrated to my new desktop. Okay, that doesn't sound too nice, but I go on. While it's installing, I actually read the notes that flash by. It says it's got UDF for data storage and retrieval. Anyone have some sort of writable DVD going with OS/2 yet? It also says that it "Includes a stronger level of encryption". Encryption? What encryption?? The process was actually fairly quick, maybe 4-5 minutes later, it's rebooting yet again. This time, it boots into the familiar VGA screen for setup of printers, video, software components, etc. I poke around to see what's new. Hey what's this? New stuff under fonts! Unicode fonts, Japanese, Simplified and Traditional Chinese, Korean, Arabic legacy, Greek legacy and Thai. That was about it, though I note that some stuff has been removed, like the BonusPak option is no longer there, OpenDoc and VoiceType are other casualties. The Video setting defaults to MGA GRADD, so I point it to the native Matrox driver that's listed. The Network settings page is revised too. Gone are Mobile Office and Remote Access. Instead a simpler dialog page with just I had applied the TCP/IP 4.3 from my SW Choice CD, but it detected that my File and Print Sharing and TCP/IP were not up to date. Anyways, there wasn't much to fiddle with. I went with whatever default settings it had and pressed "Next". (Hey, I'm thinking like Joe Dummy Average, okay?). I do get a warning that it's going to fiddle with my Netbios setup a bit. I'm not sure what it does, but I give it the okay anyways. Finally, I'm done fooling around and I let it to go off and do its job. Ooops! One glitch, even though the native Matrox drivers were listed, it doesn't seem to know where they are. So I have to press "Cancel", and it appeared to default to MGA GRADD. Next is something new, I get a screen with a side-by-side comparison of old and new CONFIG.SYS so I can edit as necessary. (If you read the README, it will note that certain settings are not migrated over, such as the "SET PROMPT=..." and the "MAXWAIT=..." statements. Strangely enough, it managed to keep all my "SET SCUSEPRETTYCLOCK=..." and "SET SCFINDUTILITY=..." statements. I'm not sure what they were thinking about when they came up with the migration process. That's not the only problem...more on that later... It also re-orders the CONFIG.SYS a bit, so if you had any comments in there, they may not be where you expect them to be. Additional lines are added for I2O drivers, UDF (for DVD), LVM, JFS and what appears to be an Adaptec RAID or SCSI driver. If you're not using any of these, you can probably comment them out at this point (I did it later, to make sure I have a working setup to play with first). It would seem that the CP was really made for WSeB, but quickly hacked up for the Warp 4 client. And then you're asked to do the same thing with old and new AUTOEXEC.BAT before it goes off to finish installing all the Networking stuff. I notice that whoever did the install gave it a nice 3D pointer that changes shade at each stage... Yeah, okay, it takes a while for some reason (come on, how big is the base install?), but at least it doesn't really require intervention. Finally, it's done and restarts. As soon as it finishes booting, it pops up a box to install Java 1.3. Be warned that Java 1.3 is still in development and may not work with all your older Java apps yet, so the installer retains the Java 1.1.8 JVM as the default JVM. Instructions are included on how to switch the default JVM to 1.3, if for some reason you want Under Fonts, if you chose to install any of the Asian fonts, they now come in proportional and monospaced in addition to the "original" Times Roman Once I figured that out, it was a simple matter to use the "Selective Install" to add the PCMCIA drivers. Users will be glad to hear that the list of supported machines has been updated from that ancient list on the default Warp 4 install. No more guesswork! The Convenience Pack really is convenient for getting your OS/2 system up to date, but probably more so if you are installing on a clean machine. The price may be a bit steep for some, but if you do a careful comparison to Microsoft products and consider what you've received and paid during the past years since Warp 4 came out, it's not too bad. If you have the time, a clean re-install of the Convenience Pack might be your best bet to avoid any problems. However, you might then have to fight with installing some of the "unsupported" features such as VoiceType or IBM Works. If that's a priority for you, or if you are like me, and don't have spare time or a spare system, the upgrade process works easily as well, with only very minor issues to deal with. Referenced web sites: IBM Software Choice Catalog: http://service.boulder.ibm.com/asd-bin/doc/en_us/catalog.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534693.28/warc/CC-MAIN-20220520223029-20220521013029-00632.warc.gz
CC-MAIN-2022-21
8,088
113
https://www.freelancer.com.ru/projects/python/create-discord-bot-with-webscrapping
code
Hello I would like to create a bot discord that with commands performs actions in a browser as does selenium 36 фрилансеров(-а) готовы выполнить эту работу в среднем за €173 I'm a senior Python & ML developer and owner & founder of Dedeoglu Dev Company. Kindly send me a message to get in touch with me, Thanks, Yusuf. Hi, I am a python expert with 3 years experience. I can develop a discord bot using selenium to carry out tasks. Please message me for further discussion Hey I can do this for you immediately this is not a problem at all I can do this in c# for you I’ve made 100’s of bots and scrapers just open a chat nothing we cannot do.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00503.warc.gz
CC-MAIN-2022-33
695
5
https://soi.ch/blog/prof-dr-donald-knuth-am-soi-tag
code
Results First Round The following participants qualified for round 2: |Rank||Participant||Points (max: 60)| |Nicolas Da Mutten||14| For the first round of the SOI 2012 we have prepared 6 tricky tasks. There are different kinds of tasks. Three of the tasks are practical tasks: You are asked to write a complete program that solves those tasks and submit the source code. For the two theoretical tasks, the focus is on mathematical aspects that are analyzed by the means of logical considerations in order to develop and write down a detailed solution. The last tasks is a creativity task that asks you to create a program that can interactively compete against the programs of other participants. The task is chosen such that it cannot be solved optimally. But note that even a simple solution scores points.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00244.warc.gz
CC-MAIN-2023-50
808
5
https://www.surfacegroup.org/tutorials/wet/simple_mover_part2/
code
With our path mapped out we can now focus on what is going to move along it and how we want to move it. This part will get you to create the mover's brushwork and make a script that it can use. Creating the tank's brushwork Creating a script for the tank - Import a .md3 model file which you will use as your script mover. For me i'm going to use the Jagdpanther that is in goldrush. Right click on main window, goto misc > misc_gamemodel. The Jagdpanther is located in ../etmain/models/tanks_sd/jagdpanther_africa_shell.md3, you might notice the jagdpanther is not in the tanks_sd folder when you try to find it, that is because Radiant hasn't installed the tank. However if you use winzip and open up pak0 in the etmain directory, it will be located there, along with many other models. So click cancel in the dialog screen, open up the entity window (n), and type in key model , value models/tank_sd/jagdpanther_africa_shell.md3. Press Enter, exit the entity window and you will see the tank(notice there is no need to include the path before the models folder). - Import the tank turret as an gamemodel located in models/mapobjects/tanks_sd/jagdpanther_africa_turret.md3, then the wheels, models/mapobjects/tanks_sd/jagdpanther_africa_tracks.md3. Try to place the models as precisely as you can to where they would appear on the tank. - Now we are going to create a clip of tank which consists of brushes in the shape of the tank. We will use the previously imported models as a guide for our brushes. First load up the common textures and select clipweap_metal. Now create 2 brushes for the body of the tank, use one for the front half and the other for the back, then using the clipper tool to cut the angles of the body. You don't have to be too precise with the clip just make sure it resembles the shape of the model. Next create two brushes one for each track, then finally a brush for the turret. - Next we are going to add an origin brush which the mover uses to follow the spline path. In the texture window select the origin texture then where u see a cross inbetween the tank's wheels create a brush that is 16x16x16 units. - Now select and delete the tank's track model. Next select the tank's body model, open up the entity window and give it the following values. Key targetname value tank_shell Key scriptname value tank_shell. Close the entity window, deselect the body then select the turret model. Open the entity window and give it the following,key targetname value tank_turret key scriptname value tank_turret. You can move the two models away from the clip to make it less cluttered if you want to. - Exit the entity window, deselect any models and select all the clip brushes and the origin brush then right click on the main window, goto script > script_mover. Open the entity window and give insert the fllowing, key targetname value tank key scriptname value tank key model2 value models/tank_sd/jagdpanther_africa_tracks.md3 Tick the checkbox solid then exit the entity window. - Lastly we have to add an script_multiplayer which triggers a script to be run when the map is loaded. Right click in the main window, goto script > script_multiplayer. Then go into the entity window and give the key scriptname the value game_manager. - Using notepad or a text editor create a script file in the etmain/maps directory named [mymapname].script . - Copy the following script into notepad, any lines with // are annotations that are not read by the game. game_manager //this is triggered by the script multiplayer in your map tank //scriptname of script_mover followspline 0 spl_01 50000 length 32 wait //spawn the tank to here trigger self tank_path //goto tank_path //here is the commands the mover will follow playsound sound/vehicles/tank/tank_move.wav looping volume 512 //play a tank sound followspline 0 spl_01 100 wait length 304 //this says goto spl_01 at a speed of 100 and don't look at //the next command until after waiting 304 followspline 0 spl_02 100 wait length 304 followspline 0 spl_03 100 wait length 304 followspline 0 spl_04 100 wait length 304 followspline 0 spl_05 100 wait length 304 followspline 0 spl_06 100 wait length 304 followspline 0 spl_07 100 wait length 304 followspline 0 spl_08 100 wait length 304 //add more lines for how many more splines u have //notice that you don't include scripting for spline controls trigger self tank_path //repeat tank_path part of the script, remove this line //if u don't won't it to loop attachtotag tank tag_tank //this attaches the tank_shell to the scriptmover tank attachtotag tank_shell tag_turret //this makes the turret attach to the tank_shell - Finally compile your map, load up ET, and hopefully you will see a beautiful script mover. - Here is a zip of the map and script. Also have a good look at the goldrush map and script to understand more and get ideas. Queries > Forum
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00696.warc.gz
CC-MAIN-2022-33
4,878
72
https://www.codeproject.com/Questions/5164352/I-want-to-display-xlsx-file-in-browser-using-openx
code
For my question, there may be many solution but nothing fits to my exact please help. It is URGENT. Using DocumentFormat.OpenXML, I am able to upload the excel file to my project. But now, I have a DISPLAY button. Clicking on that, the uploaded excel file should open in browser in xlsx format only. And I should be able to edit and SAVE it back in browser itself. I do not need to download because I do not have MS OFFICE installed. What I have tried: I am not getting any clue how to do that.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737050.56/warc/CC-MAIN-20200807000315-20200807030315-00307.warc.gz
CC-MAIN-2020-34
494
9
https://blender.stackexchange.com/questions/16537/how-to-move-the-3d-manipulator-widget-itself
code
I've uploaded an obj file and the widget is waaaayy far from the object I've inserted. Again, I'm not trying to move the object, but the widget itself. Is there a way to reposition it? Most likely the origin of your object is off. To recenter it, select the object and press ⎈ Ctrl⎇ Alt⇧ ShiftC> Origin to geometry. If you want to move it to a more customized location, you can move the 3D cursor where you want it to go, either by clicking with LMB or by snapping the cursor with ⇧ ShiftS, then pressing ⎈ Ctrl⎇ Alt⇧ ShiftC> Origin to 3D cursor. Note that the manipulator widget is located at the pivot point, which is set in the header of the 3D view: It's also possible that the pivot point is set to 3D cursor (.), in which case the manipulator will be position at the cursor. To switch it back to the default setting of median point, either select it in the drop down or press ⎈ Ctrl, (comma). I once modeled an object and moved all the geometry while it was still in edit mode. Then when I switched to object mode, the center point/origin/gizmo thing remained back where I modeled it in the scene. All I had to do was go back into edit mode, and return the object to the center point by moving all faces. Then when I returned to object mode, the center point was again "joined" to my object. Then I could move them together while in object mode. Hope that helps.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474470.37/warc/CC-MAIN-20240223221041-20240224011041-00750.warc.gz
CC-MAIN-2024-10
1,384
7
https://walletreview.cc/defi-gent-tether-mining-website-my-active-deposit-is-860-daily-earn-100-usdt-with-proof
code
Defi Gent – Tether Mining Website || My Active Deposit is 860$ || Daily Earn 100$ Usdt With Proof Join now and earn money: https://defi.gent/reg?code=s6iji7 Investment is high risk. Study hard before investing, everyone Our corporate white paper: https://defi.gent/uploads/defi.gent.pdf Official Telegram Group: https://t.me/DefiHub001 You can earn cryptocurrency in two easy ways. First investment, daily profit, 1-year contract -Accumulated 0-4,999 USDT daily minimum profit of 3% – Accumulate 5000-49,999 USDT, with a daily minimum profit of 3.5% -Save 50,000-99,999 USDT with a minimum daily income of 4% -Earn 100,000-199,999 USDT, with a daily minimum profit of 5% – Daily minimum income of 6%, accumulated over 200,000 USDT. 10% commission on downline referral level deposits. When you refer an alternative downline deposit, you will get a 5% commission. Level 3 offline deposit recommendation 2% commission Listed in July 2021, the latest usdt mining software defi company is listed Usdt is the most stable currency usdt is the most stable investment in the case of world currency inflation To get 299 free DeFi deposits use the link Top business investment and power companies DeFiHub is a new platform to make money online for everyone (even beginners) #tesla #car #Invest #Movie #financial #defi #finance #USDT #TRX #BTC #stock #website #cryptocurrency 💥 For Business And Promotions My Telegram Username For Promotions.👇👇 WhatsApp Contact : 💥 Telegram CHANNEL💥 Search In telegram. 👉 € Technical Zeeshan € 💥 WhatsApp Group💥 ◉ ▬▬▬: Technical Zeeshan :▬▬▬ Friends, I Hope you Like This Video We are Providing the Earn Money Method, Latest Online earning sites, New bitcoin mining sites… Please Like, Share and Subscribe My YouTube Channel Hey guys can you subscribe my channel I don’t have alot to say please hit the subscribe button now Immediately DISCLAIMER: This Channel DOES NOT Promote or encourage Any illegal activities , all contents provided by This Channel is meant for EDUCATIONAL PURPOSE only .(Technical Zeeshan) Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. Thanks for watching
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103347800.25/warc/CC-MAIN-20220628020322-20220628050322-00626.warc.gz
CC-MAIN-2022-27
2,467
36
http://www.libarttech.net/2012/08/twice-factors-equals-twice-fun.html
code
The problem with something we know is that as soon as someone else knows it... it's not a secret anymore, and not very useful for security purposes. When we add in something we have to get 2 factors of authentication it's no longer just about what we know, but what we have. Then, it's not as terrible if someone knows what we know, because they don't have what we have, so knowing what they know doesn't help them as much, unless of course they end up having what we have, in which case we better hope that they also don't know what we know, because then they'll have what we have AND know what we know, causing people like myself rant in long run-on sentences about having and knowing things that people shouldn't have or know. So the key with something we have is that we're often able to secure physical 'things' much better than we can secure knowledge. Securing knowledge is tough, because that knowledge needs to be shared with at least one other person... the system we want to access. So even though we might be quite good at keeping secrets, like our login passwords, the systems that we share those secrets with are often not as good as humans at keeping secrets. Usually they try hard, but too often they're the target of knowledge thieves who want nothing more than to force a system to reveal all of it's possible knowledge (ie. passwords) for their own personal gain. However, things are a whole different story. Things are physical, and since the dawn of man, we've learned how to keep track of physical things really, really well. This is why many security experts tell people that it's OK to go ahead and write down their passwords on a little slip of paper in their wallets. We've learned how to keep track of our wallets since we were young, and we're quite aware of how to protect them physically. So what are these things we have for accessing systems? In some cases, it could be a bio-metric system, like a fingerprint. Since our fingers are always attached to us (or so we hope), it's pretty easy to secure this 'thing'. If someone finds out your password to a system, but they also need your fingerprint to access it... well, they've just made their job close to impossible. However, fingerprints and retina scanners all require special hardware hooked up to our machines, so a much more common technique is a number generating device. Many people know these devices by their brand name "SecureID", but the basic principle is the same. You are given a little token that has an LCD screen on it with sets of numbers that change every 60 seconds (smartphone apps that do the same thing are becoming common too). The master system is synchronized with your device, and it knows at all times what your number is. However, the system is never set up to tell anyone what a number is at any given time. It can just answer 'Yes' or 'No'. So a login situation looks like this: - A user types in their username and password in to a login system. - The login system asks them what their current number code is. - The login system then makes a request to a security system and asks "Is Mr X's generated number 12345?" - The security system then says either yes or no. - If the answer is 'no' then the login attempt is denied and the user has to try again. So the time was never better to start thinking more about 2-factor authentication. As more and more of our life goes online, it's important to take all the right steps to make sure that you're not the target of a hack. 2-factor authentication is a great tool in the average users toolbox to help keep you safe online.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189474.87/warc/CC-MAIN-20170322212949-00295-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
3,586
11
https://askubuntu.com/questions/111563/lost-power-during-upgrade-how-do-i-recover
code
Did you try booting into the recovery mode (selected via grub)? You could then try to restart the upgrade with sudo apt-get update sudo apt-get upgrade You may need to run sudo dpkg --configure -a to fix the partially installed packages. If the recovery mode is also broken, you could try booting off a live cd and then chroot'ing into your hard drive installation and performing the above steps. To chroot into your hard drive installation, first boot off a live cd. You can use the ubuntu install CD for this task, just choose the option "try ubuntu" rather than installing. Once booted, open a terminal and mount your root partition. If your root partition is /dev/sda1 (to find out your root partition, there is a guide at https://help.ubuntu.com/community/RecoveringUbuntuAfterInstallingWindows#The_terminal_way): sudo mkdir -p /media/ubuntu sudo mount /dev/sda1 /media/ubuntu Then you need to mount the proc, dev, and sys filesystems into your new environment: sudo mount --bind /dev /media/ubuntu/dev sudo mount --bind /proc /media/ubuntu/proc sudo mount --bind /sys /media/ubuntu/sys cp /etc/resolv.conf /media/ubuntu/etc/resolv.conf Finally, chroot into it: sudo chroot /media/ubuntu From here you can run apt-get and dpkg to fix your system. This is identical to the way that people fix grub using chroot, in case you run into problems you can google something like "grub chroot ubuntu livecd" and find more info.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474412.46/warc/CC-MAIN-20240223121413-20240223151413-00243.warc.gz
CC-MAIN-2024-10
1,423
18
http://www.mozillazine.org/talkback.html?article=2356&message=83&state=reply
code
Mozilla 1.1 Beta Released Monday July 22nd, 2002 #83 Re: It's still AWFULLY s-l-o-w ! Wednesday July 24th, 2002 3:17 PM You are replying to this message This comment has caused a lot of discussion. In general, I would disagree that Mozilla is "awfully slow". It is quite responsive on this here P-III 500 and my P-II at home. However, as a former Opera user and a full-time Mozilla user, I notice a big difference in response times between when I hit the back button and the last visited page appears. When used on the same machine, Opera is lightning-quick, while Mozilla always has a relatively lengthy pause. Sometimes it's several seconds. I'm not complaining, mind you. I'm just saying that I *notice* it, and I wish I didn't. I've tried changing cache settings and I did some quick google and bugzilla searches. No dice. Is anyone here able to address this? Anyone got a solution or a recommendation or a link to some discussion of this?
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589932.22/warc/CC-MAIN-20180717222930-20180718002930-00386.warc.gz
CC-MAIN-2018-30
943
9
http://dba.stackexchange.com/questions/tagged/backup+flashback
code
Database Administrators Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Is there a way to export Oracle's UNDO? I tried exp utility to dump all database. Looks like this exports only the last version of data skipping undo log. Using flashback queries I see: 01466. 00000 - "unable to read data - table ... Dec 28 '12 at 13:41 newest backup flashback questions feed Announcing The Launch Of Meta Stack Exchange Hot Network Questions How can I deal with the challenges a player having Mind-Reading represents without negating their ability? What should be included in a freshman 'Mathematics for computer programmers' course? Tool to split MP4 videos Why did Microsoft choose the word "Recycle Bin"? Angular momentum depends on origin? Bastard children who became Kings How to get Ubuntu distribution's full code name? Should I unsubscribe uninterested mailing-list members? How do I post a node that has its created field set to the past in a test class? Did Arwen actually die? How to run VLC player in root If there are obvious things, why should we prove them? How to get the current upload and download speeds in terminal? Inductive argument for infinite number of cities Writing better JUnit tests Is there a way to create a for loop with only two expressions in C? Why irrational implies having an infinite decimal expansion? Disable atd (and other unnecessary startup processes) in Ubuntu? How much does tire pressure affect the weight of the wheels Forward all TLD requests to another server In a leap year, is the extra month Adar I or Adar II? Does Unity own my game? In an empy env, how are executables found? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537376.43/warc/CC-MAIN-20140416005217-00330-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,214
53
https://luminousmen.com/?tag=development
code
The Law of Testing: The degree to which you know how your software behaves is the degree to which you have accurately tested it. -- "Code Simplicity" In order to verify the correctness of an application we use different kinds of tests: some check the logic of a small function or class, others check all the system layers from UI to databases and external services. Some kinds of tests could be... Sat Jan 12 2019 | 7 minute read Software Development Principles — it is a number of specific rules and recommendations, which engineers need to be followed during program implementation if they want to write beautiful, understandable and maintainable code. There is no magic wand, by which you can transform a mixture of variables, classes and functions into the ideal code, but there are some tips and hints, which can help the... Wed Dec 12 2018 | 7 minute read Why do we need it? During the work developers frequently need to update their services and deploy them on the servers. When amount of projects is small it's not an issue, there are no problems because releases and deploiment processes are rare. Tests are running manually. But when the time comes, number of projects and tasks increases and execution of the same task takes more time. Let's look... Sun Nov 18 2018 | 6 minute read On my current project, I'm playing the role of a Team Lead. It is one of those roles, whose responsibilities many people understand differently and often confuse with a Senior role. In this post, I want to clarify this question and describe how I see the responsibilities of a Team Lead. Let's start with the Senior role. Senior role in a team is closer to the technical side of the project --... Thu Oct 25 2018 | 2 minute read
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578806528.96/warc/CC-MAIN-20190426133444-20190426155444-00451.warc.gz
CC-MAIN-2019-18
1,723
12
https://breaking-news.fisildas.com/baby-shark-holiday-song-sing-along-christmas-songs-for-kids-nursery-rhymes-and-xmas-carols/
code
Learning is always fun with Loco Nuts – Sing Along Nursery Rhymes popular nursery rhymes. We bring to you some amazing songs for kids to sing along with us and have a good time. Kids will dance, laugh, sing and play along with our videos while they also learn numbers, letters, colors, good habits and more! So come along for an awesome educational fun ride with our wide variety of nursery rhymes songs and don’t forget to subscribe to our channel for new videos every week. KIDS FIRST – Kids Videos & Nursery Rhymes | Free App Download: http://m.onelink.me/1e8f6c16 Bob the Train Plush Toys now available on Amazon. Buy yours today! Bob the Train Amazon Store: https://amzn.to/2PCeSDS Click on the Link Below to Watch and Read Wonderful Stories of Super Supremes only on Rivet! : © 2017 USP Studios Private Limited Music and Lyrics: Copyright USP Studios™ Video: Copyright USP Studios™ #babysharkholidaysong #singalongsong #songsforkids #songsforchildren #christmassongs #childrensongs #cartoonforkids #rhymesforkids #merrychristmas #christmassongs #singalong #babysharksong #christmasvideos #kidssongs #kidsyoutube
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00537.warc.gz
CC-MAIN-2023-23
1,128
8