url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.cyclingforums.com/threads/the-time.6122/
|
code
|
- Mar 10, 2003
I am in sydney i have in the prefs my timezone set to +10GMT but the time is way way off it says the current time is 10:25pm but it is only 12:25pm on the 12th. Whats the story there?
Originally posted by Vo2
I think the server time is out. Right now, the forum time says it's 8 at night, but it's 9 in the morn here.
Looks like it's going to be another sunny day here in SA.
Originally posted by steve
The server time is correct for where it is (give or take a second or two) It seems like the forum time (in your prefs) shouldnt say GMT +10 if your in melbourne for example, but rather +0 as your in the same time zone as this server.
The option is (whatever) +GMT but the value is really is related to the server time zone, if you know of a fix let me know!
It annoys me to, but I havent had the need to look into in till now
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00627.warc.gz
|
CC-MAIN-2023-40
| 843
| 9
|
http://rainbowfilters.com.au/store/amerseal-slip-on-panels
|
code
|
AmerSeal Slip-On Panels
AmerSeal Slip-On Panel filters are designed to be pulled over a heavy gage wire frame. When the media is fully loaded with dust, the Slip-On is easily removed from the reusable wire frame and replaced. AmerSeal filters are widely used in fan coil units, side access systems, and packaged terminal air conditioners.
Available in 1/2”, 1”, or 2” media thickness.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999482.38/warc/CC-MAIN-20190624104413-20190624130413-00099.warc.gz
|
CC-MAIN-2019-26
| 390
| 3
|
http://www.codeguru.com/cpp/com-tech/activex/com/article.php/c2669/Variant-Streaming-Code.htm
|
code
|
This code provides two global functions, WriteVariantToStream and ReadVariantFromStream,
that enable you to read and write a variant to a stream. In addition, there are two other
global functions, ReadVariantFromBlob and WriteVariantToBlob, for reading and writing
a variant to a BLOB.
Here are some of the main advantages of these functions:
Uses any given IStream to stream the Variant into and out of.
Data is streamed in efficient binary form.
Stream is versioned for backwards compatibility.
Supports arbitrary size and arbitrary dimension safe-arrays.
Object streaming is supported if the object in variant supports
All code is in one header file (VariantStream.h) and only two routines are
exposed: WriteVariantToStream and ReadVariantFromStream.
Comes with supporting test code that tests the header file -- in case code
Does not use C++ exception handling. Test project has EH flag
Doesn't use the CRT.
Does not use any Direct-To-COM (VC++'s comdef.h, such as _variant_t, _bstr_t,
Live Event Date: August 20, 2014 @ 1:00 p.m. ET / 10:00 a.m. PT
When you look at natural user interfaces as a developer, it isn't just fun and games. There are some very serious, real-world usage models of how things can help make the world a better place – things like Intel® RealSense™ technology. Check out this upcoming eSeminar and join the panel of experts, both from inside and outside of Intel, as they discuss how natural user interfaces will likely be getting adopted in a wide variety …
Protecting business operations means shifting the priorities around availability from disaster recovery to business continuity. Enterprises are shifting their focus from recovery from a disaster to preventing the disaster in the first place. With this change in mindset, disaster recovery is no longer the first line of defense; the organizations with a smarter business continuity practice are less impacted when disasters strike. This SmartSelect will provide insight to help guide your enterprise toward better …
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510257966.18/warc/CC-MAIN-20140728011737-00374-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,012
| 19
|
https://worcesteroptsout.org/best-hosting-for-static-website/
|
code
|
Best Hosting For Static Website
Discovering a high-quality low-cost webhosting carrier isn’t easy. Every site will have different needs from a host. And also, you need to compare all the attributes of a holding firm, all while trying to find the very best offer feasible.
This can be a lot to sort via, specifically if this is your first time buying organizing, or building an internet site.
A lot of hosts will offer super economical introductory rates, just to elevate those prices 2 or 3 times greater once your first contact is up. Some hosts will offer cost-free perks when you sign up, such as a complimentary domain name, or a cost-free SSL certification.
While some hosts will be able to use much better performance and high degrees of security. Best Hosting For Static Website
Below we dive deep right into the best affordable host plan there. You’ll discover what core holding attributes are necessary in a host as well as just how to assess your own organizing needs so that you can select from among the best inexpensive organizing carriers below.
Disclosure: When you acquire a web hosting plan with links on this page, we make some compensation. This helps us to maintain this website running. There are no added prices to you in all by using our links. The listed here is of the most effective affordable webhosting bundles that I’ve personally used as well as checked.
What We Take into consideration To Be Inexpensive Webhosting
When we explain a host bundle as being “Affordable” or “Budget plan” what we imply is hosting that comes under the price bracket in between $0.80 to $4 each month. Whilst investigating low-cost holding providers for this guide, we took a look at over 100 different hosts that fell into that rate variety. We after that evaluated the quality of their cheapest hosting package, worth for cash as well as client service.
In this post, I’ll be discussing this world-class website organizing company as well as stick in as much pertinent information as feasible.
I’ll discuss the functions, the pricing alternatives, and anything else I can think about that I believe may be of advantage, if you’re choosing to sign up to Bluhost and obtain your sites up and running.
So without more ado, allow’s check it out.
Bluehost is just one of the greatest web hosting companies in the world, getting both enormous marketing support from the firm itself as well as associate marketers who promote it.
It truly is a massive business, that has been around for a long time, has a big track record, and is most definitely among the top selections when it comes to host (absolutely within the leading 3, at the very least in my book).
However what is it exactly, as well as should you obtain its services?
Today, I will certainly answer all there is you need to recognize, supplied that you are a blog writer or an entrepreneur that is seeking a webhosting, as well as does not understand where to get started, considering that it’s a wonderful service for that audience generally.
Let’s picture, you want to host your sites as well as make them noticeable. Okay?
You already have your domain (which is your site location or LINK) today you wish to “turn the lights on”. Best Hosting For Static Website
You need some hosting…
To accomplish all of this, and also to make your site visible, you require what is called a “web server”. A web server is a black box, or device, that keeps all your internet site information (data such as pictures, texts, videos, web links, plugins, and also other details).
Now, this server, has to be on regularly and it has to be connected to the web 100% of the time (I’ll be mentioning something called “downtime” in the future).
In addition, it additionally needs (without getting too fancy as well as into information) a file transfer protocol frequently called FTP, so it can reveal internet internet browsers your web site in its designated type.
All these points are either costly, or call for a high level of technological skill (or both), to produce and maintain. And you can totally head out there as well as find out these points by yourself as well as set them up … but what concerning as opposed to you getting and also keeping one … why not just “renting out holding” rather?
This is where Bluehost comes in. You rent their servers (called Shared Hosting) and also you launch a site making use of those web servers.
Given that Bluehost maintains all your files, the firm likewise enables you to set up your content management systems (CMS, for brief) such as WordPress for you. WordPress is an incredibly preferred CMS … so it simply makes sense to have that alternative offered (almost every hosting company now has this alternative also).
In short, you no more require to set-up a web server and afterwards incorporate a software application where you can construct your material, individually. It is already rolled into one bundle.
Well … think of if your server is in your residence. If anything were to happen to it at all, all your documents are gone. If something fails with its interior processes, you need a technician to fix it. If something overheats, or breaks down or gets corrupted … that’s no good!
Bluehost takes all these headaches away, and also cares for everything technological: Pay your server “rental fee”, and they will care for whatever. And as soon as you purchase the service, you can after that start focusing on including content to your site, or you can place your effort into your advertising projects.
What Provider Do You Receive From Bluehost?
Bluehost provides a myriad of different services, however the key one is hosting naturally.
The organizing itself, is of different types by the way. You can rent a common web server, have a specialized server, or also a virtualexclusive web server.
For the purpose of this Bluehost review, we will certainly focus on holding solutions and other services, that a blog writer or an online entrepreneur would need, instead of go too deep right into the bunny opening and also talk about the other solutions, that are targeted at even more experienced people.
- WordPress, WordPress PRO, and shopping— these hosting services are the plans that enable you to organize a site utilizing WordPress and also WooCommerce (the latter of which allows you to do ecommerce). After buying any one of these packages, you can begin building your site with WordPress as your CMS.
- Domain Marketplace— you can additionally get your domain name from Bluehost instead of other domain registrars. Doing so will make it easier to aim your domain to your host’s name web servers, because you’re utilizing the very same industry.
- Email— when you have actually bought your domain name, it makes sense to also obtain an email address linked to it. As a blogger or on-line business owner, you should virtually never ever use a cost-free email service, like Yahoo! or Gmail. An e-mail similar to this makes you look amateur. Thankfully, Bluehost provides you one completely free with your domain.
Bluehost additionally offers specialized servers.
As well as you may be asking …” What is a dedicated server anyhow?”.
Well, the important things is, the fundamental webhosting plans of Bluehost can just so much website traffic for your internet site, after which you’ll require to upgrade your hosting. The reason being is that the typical servers, are shared.
What this suggests is that one web server can be servicing 2 or more internet sites, at the same time, one of which can be your own.
What does this mean for you?
It indicates that the single server’s sources are shared, as well as it is doing multiple tasks at any kind of provided time. Once your website begins to hit 100,000 site visits every month, you are going to need a committed server which you can additionally get from Bluehost for a minimum of $79.99 each month.
This is not something yous should stress over when you’re starting however you should maintain it in mind for certain.
Bluehost Prices: How Much Does It Expense?
In this Bluehost review, I’ll be concentrating my interest mainly on the Bluehost WordPress Hosting plans, given that it’s the most prominent one, as well as highly likely the one that you’re trying to find which will certainly fit you the best (unless you’re a huge brand name, business or site).
The three available plans, are as complies with:
- Standard Strategy– $2.95 each month/ $7.99 regular price
- Plus Strategy– $5.45 monthly/ $10.99 regular price
- Choice And Also Plan– $5.45 per month/ $14.99 regular cost
The first cost you see is the price you pay upon subscribe, as well as the second rate is what the cost is, after the first year of being with the business.
So primarily, Bluehost is going to bill you on an annual basis. And also you can likewise select the quantity of years you wish to organize your site on them with. Best Hosting For Static Website
If you pick the Basic plan, you will pay $2.95 x 12 = $35.40 beginning today and also by the time you enter your 13th month, you will certainly currently pay $7.99 monthly, which is likewise charged per year. If that makes any feeling.
If you are serious about your site, you must 100% get the three-year alternative. This suggests that for the standard strategy, you will pay $2.95 x 36 months = $106.2.
By the time you strike your 4th year, that is the only time you will certainly pay $7.99 per month. If you think about it, this method will conserve you $120 in the course of three years. It’s not much, however it’s still something.
If you intend to obtain more than one site (which I highly advise, and also if you’re major, you’ll possibly be getting even more eventually in time) you’ll want to use the option plus strategy. It’ll enable you to host endless websites.
What Does Each Strategy Deal?
So, in the case of WordPress hosting plans (which resemble the common holding strategies, but are a lot more tailored towards WordPress, which is what we’ll be focusing on) the attributes are as adheres to:
For the Standard plan, you obtain:
- One internet site only
- Guaranteed internet site by means of SSL certification
- Maximum of 50GB of storage space
- Complimentary domain name for a year
- $ 200 advertising and marketing credit rating
Remember that the domain names are acquired individually from the holding. You can get a cost-free domain name with Bluehost right here.
For both the Bluehost Plus hosting as well as Choice Plus, you get the following:
- Unrestricted number of internet sites
- Free SSL Certification. Best Hosting For Static Website
- No storage or transmission capacity limitation
- Cost-free domain name for one year
- $ 200 marketing credit score
- 1 Office 365 Mailbox that is cost-free for 1 month
The Choice Plus plan has actually an included benefit of Code Guard Basic Back-up, a back-up system where your data is conserved and duplicated. If any type of collision occurs and also your web site data goes away, you can recover it to its initial type with this attribute.
Notice that although both strategies set you back the exact same, the Option Plan after that defaults to $14.99 each month, regular rate, after the set quantity of years you have actually selected.
What Are The Conveniences Of Using Bluehost
So, why choose Bluehost over various other webhosting services? There are hundreds of web hosts, much of which are resellers, however Bluehost is one pick few that have stood the test of time, and it’s most likely the most popular around (and also completely factors).
Below are the three primary benefits of picking Bluehost as your webhosting provider:
- Web server uptime— your internet site will certainly not be visible if your host is down; Bluehost has more than 99% uptime. This is very crucial when it comes to Google SEO and also positions. The higher the much better.
- Bluehost speed— how your server reaction determines just how quick your site reveals on a browser; Bluehost is lighting fast, which suggests you will certainly reduce your bounce price. Albeit not the very best when it involves filling speed it’s still hugely essential to have a quick speed, to make user experience far better as well as better your ranking.
- Unrestricted storage— if you obtain the And also strategy, you need not stress over how many data you store such as videos– your storage space capacity is unlimited. This is really crucial, since you’ll possibly encounter some storage problems later on down the tracks, as well as you do not desire this to be a hassle … ever before.
Finally, client support is 24/7, which implies regardless of where you remain in the world, you can get in touch with the support team to repair your web site issues. Pretty standard nowadays, yet we’re taking this for provided … it’s additionally really essential. Best Hosting For Static Website
Likewise, if you’ve gotten a complimentary domain with them, then there will certainly be a $15.99 cost that will be deducted from the amount you originally bought (I visualize this is because it sort of takes the “domain out of the marketplace”, not exactly sure concerning this, but there probably is a hard-cost for registering it).
Last but not least, any type of demands after one month for a reimbursement … are void (although in all sincerity … they must possibly be rigorous below).
So as you see, this isn’t necessarily a “no questions asked” policy, like with some of the various other organizing choices out there, so make sure you’re okay with the plans prior to proceeding with the organizing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055645.75/warc/CC-MAIN-20210917120628-20210917150628-00136.warc.gz
|
CC-MAIN-2021-39
| 13,682
| 82
|
https://sywren.wordpress.com/2012/08/25/my-rainmeter-theme-watercolors/
|
code
|
I’m making my first Rainmeter theme. If you’re not familiar with Rainmeter, it’s an application that allows you to make widgets (or “skins”) for your desktop. It’s all open source, and there are huge repositories of themes on deviantART and elsewhere. It is a strangely addicting thing to sit down to a blank desktop and create your space.
All of the skins (which are written in .ini files) are easy to modify, which I generally do when I design my personal desktop, but I’ve never written my own skins from scratch. I’m challenging myself to create a completely uniquely designed theme, although, I’m not sure how this will play out since some of the skins I generally prefer to have on my desktop require additional scripts written in Lua that I am not ready to write myself yet. I’m not sure at this point if I will scrap the ones requiring additional Lua scripts (like the calendar, RSS feeds, and notes) and just stick with objects that only require .ini files (like clocks, system information, and music tracks), or borrow others’ scripts and put together a fuller package. The Rainmeter manual does have a section for writing Rainmeter functions using Lua, but we’ll see. I think I’ll stick with the simpler objects for now and see how that goes.
So the basic concept of my theme are paint blotches, which can be layered to create an artistic effect. To start, I needed art. Fortunately, I found a package of high (very high) resolution paint splotches by the artist Caleb Kimbrough on his blog “Lost and Taken”
Now I’m on to the next step of cutting out elements.
I have about nine of these so far, and to get a sense of what I’m doing, here is a picture of some of them layered:
I am anticipating a major headache getting the objects into position on the background blotches. The issue is that this has to be functional art. If the objects aren’t placed on their background images in such a way that the objects are usable and the images are able to be arranged aesthetically, then I’ve lost the point of the theme.
If all goes well, my next update should be the script and screenshot of a clock.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867041.69/warc/CC-MAIN-20180525043910-20180525063910-00103.warc.gz
|
CC-MAIN-2018-22
| 2,143
| 7
|
https://www.lesswrong.com/posts/YEbZabXjSpfRFhFzg/functional-analysis-reading-group
|
code
|
We've been running a Functional Analysis reading group on the EleutherAI Discord (partially motivated by a desire to grok Infrabayes). According to hard earned advice it's useful to pair up when learning difficult things.
We're as of this posting on section 2.3 of "A Friendly Approach To Functional Analysis" (which TurnTrout reviewed and may be found on libgen). I should have posted here sooner, but better late then never. A motivated person can still catch up (we're going at ~2 sections/week, I'm spending ~5hrs/wk, if you spend more you can easily catch up).
TlDR get on EleutherAI's discord and join the Functional Analysis Thread!
PS: I'm likely to start other reading groups in the future, comment if you're interested in one on abstract algebra, calculus on manifolds, logic, probability, since those are what I'm currently interested in.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00610.warc.gz
|
CC-MAIN-2024-10
| 849
| 4
|
https://efo-lab.com/tag/research/
|
code
|
Very honored to attend PQE 2023, an amazing event of world-class science and skiing!
Our recent publication in Science caught the attention of the celebrated outreach magazine "Optics & Photonics News"
I have been invited to give a talk at the FIO LS conference of *OPTICA* (former *OSA*)
We have been awarded a 3-year grant from the Spanish Ministry of Science and Innovation (MCIN)
Our recent publication in Science caught the attention of the celebrated outreach magazine "Physics World"
We demonstrated a route to quantum-correlation-preserving frequency conversion 🔴➡🔵 of single photons💡and entangled photon pairs using anti-resonant fibres!
We have contributed a chapter to the new release "Light Filaments; Structures, challenges and applications"
I have been selected to deliver an invited talk at the OFC conference of the *OSA*
I have been selected as panelist of the OSA´s outreach magazine *Spotlight on Optics*
We realised a high-brightness🔆 and ultrabroadband🌈 coherent light source covering 7 optical octaves from the ultraviolet to the THz domain!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653930.47/warc/CC-MAIN-20230607143116-20230607173116-00257.warc.gz
|
CC-MAIN-2023-23
| 1,081
| 10
|
https://salesforce.stackexchange.com/questions/130906/lightning-tab-pass-parameters
|
code
|
I am trying to navigate to a Newly setup tab using a lightning component. Component is configured to be used with RecordHome and contains recordId attribute. When navigating to the component, I would like to pass-in a parameter. I tried passing using using URL while firing e.force:navigateToURL event - but it seems like that's NOT going to work. Any help is greatly appreciated.
Thanks in advance
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00527.warc.gz
|
CC-MAIN-2023-50
| 398
| 2
|
http://rprogrammingassignmenthel73332.blog2learn.com/22850976/little-known-facts-about-python-homework-help
|
code
|
Quit your quest for inexpensive programming assignment help company and get in touch with Assignmenthelp.us. We cater to all requests with cost-successful pricing method, and It is particularly effortless for the students to avail. We aren't a pricey programming help support and have the provision of personalized pricing. Budget constraint? Get connected with us right away. We offer high quality programming help at reasonable fees.
Everyone knows that not like Fb and WhatsApp, Instagram has no attribute of conserving photos. You can use your obtainable growth techniques based on Python for creating a Resource that helps you and the whole world download shots from Instagram with terrific ease and grace.
Although most educational facilities are accommodating when an unexpected emergency arises, some schools may perhaps disagree with all your definition of the unexpected emergency. Instead of providing you with an extension on an assignment, you could be told that you might want to change it promptly.
Learn the art of writing your own personal features in Python, as well as essential ideas like scoping and error dealing with.
Dice Rolling Simulator is a straightforward game where we produce a dice simulator and publish the figures on dice. We will make a decision that how I side we are going to consider in the applying and it will print the selection that will come.
Discover to write economical code that executes rapidly and allocates sources skillfully to avoid needless overhead.
We are entirely dedicated to your preferences, all your programming help are going to be accomplished by skilled professionals at your undertaking amount highschool through Masters diploma stages, and so are even accomplished Based on your distinct necessities. Programming homework ought to better be remaining into the gurus, in which you know you may get the top programming aid from knowledgeable in your area.
Obtain new expertise quickly in courses that Incorporate brief qualified films with quick fingers-on-keyboard workout routines.
Towards the top in the semester, you could possibly grow to be burnt out from Resources all your college work. Chances are you'll comprehend the homework and possess the awareness and schooling to have it performed punctually, however , you’re just as well sick of checking out the code.
If your professor is just not quite helpful, we’re content to acquire their place. As pointed out, we offer instruction and tutorials to help you understand the Python programming language.
In this tutorial we’ll produce a easy Python script, so we’ll select Pure Python. This template will create an empty project for us.
Python is probably the ideal option for C++ and Java; it serves you Along with the requisite velocity, leverages effortless readability and in addition guarantees shorter codes.
Are programming languages supplying you with click to read more difficulties? Do you think you're shelling out sleepless evenings as a result of coding, earning application programming? Get in touch with Assignmenthelp.us for a comprehensive and on the web programming help assistance. Because of its amplified significance, and demand from customers in the job industry, far more US pupils are displaying passions in pursuing a specialized degree in programming. To obtain the ultimate diploma, college students want to manage several assignments. But because of deficiency of subject matter expertise, time crunch, insufficient investigate content and also other tutorial problems, they are unsuccessful to fulfill educational needs.
This system will likely not only offer a obvious understanding of taxes but may also notify end users about the level of tax they should shell out.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999814.77/warc/CC-MAIN-20190625072148-20190625094148-00352.warc.gz
|
CC-MAIN-2019-26
| 3,726
| 14
|
https://www.npmjs.org/~wprl
|
code
|
npm loves you
Packages by wprl
Baucis is Express middleware that creates configurable REST APIs using Mongoose schemata.
An example server that uses baucis to create a REST API
Generate customizable swagger definitions for your Baucis REST API.
Compose modular decorators to build constructors. Your Node.js code will never have been as organized, reusable, and pluggable.
Express middleware for embedding your Tumblr blog in an Express app.
Generate strings of random ASCII characters
Validate an email address in Node or RequireJS/AMD. Provide validation that an email address conforms to RFC822.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021767060/warc/CC-MAIN-20140305121607-00077-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 598
| 9
|
https://moodle.unak.is/mod/book/view.php?id=100082&chapterid=799&lang=en
|
code
|
2. Office Suite
2.1. Office on a PC
You will have to set up the Office suite in order to use Word, Excel, Powerpopint or any other software in the suite.
First step is to log into the Office 365 portal, if you're not sure how then you need to start here.
When you have logged in click the Office365 logo/icon at the top left of the navbar, then you will see the main page. On this page you will see the orange install button, but before clicking it you might want to uncheck the boxes above the button. When you are ready, click the Install Now button and the browser will download the setup file.
Those of you that use Internet Explorer will get this download prompt at the bottom of the window. The quickest way is just press Run and then the file will run as soon as the browser finishes the download.
Now you will see the setup window from Microsoft. These windows are in essence just for minor settings and introduction. In the screenshot below you will see in the bottom right hand corner a small status windows that indicates how the setup is going and that you need to be connected to the internet for it to work. While this setup is running you just need to go through a few settings windows. Start by clicking Next.
The next window is just the license agreement, which you are free to read if you really want to, so we click Accept and move on.
The next window is just a small introduction for the Office 365 Suite and you can watch it if you want, if you want to skip it just click Next.
The next window is yet another introduction window, this time for OneDrive, but this time you have to click Learn More if you want more information but as per usual we just click Next to keep going.
Now we are at the settings window where we can choose a basic look for the Office suite. There are a few different items in the selection so try them and see what you want. When you are happy with your selection click Next.
Now we're almost done. This window allows you to choose if you want to view more introduction about the Office Suite, mainly what's new. If you don't want to look at that just click the text below the big "Take a look" button and says "No, thanks"
The final windows is just an information window that tells you that everything is good to go. Just click All done and you will get a prompt that tells you when the Office suite is ready for use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371624083.66/warc/CC-MAIN-20200406102322-20200406132822-00458.warc.gz
|
CC-MAIN-2020-16
| 2,364
| 13
|
http://adambien.blog/roller/abien/
|
code
|
Quarkus usually ships as a "SkimmedJAR"
with cleanly separated business logic and infrastructure.
Setting the quarkus.package.uber-jar
parameter to true in application.properties, creates a self contained, executable JAR in the target folder.
The simplest possible "hello,world" UberJAR with cdi and resteasy extensions takes ~9MB disk space.
Although it is hard to find any good arguments (do you know any?) to use this approach for container, kubernetes or clouds deployments,
Quarkus UeberJARs are perfect for building electron-like desktop apps.
Jakarta Server Pages (JSP) are used in this screencast to configure a stage-dependent URI in a Web Component / Custom Element defined
with MicroProfile Config and exposed via CDI:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251796127.92/warc/CC-MAIN-20200129102701-20200129132701-00436.warc.gz
|
CC-MAIN-2020-05
| 729
| 9
|
https://docs.squiz.net/funnelback/docs/latest/reference/configuration-files/meta-names-xml.html
|
code
|
|This feature is not available in the Squiz DXP.|
Used for customizing the advice which SEO Auditor provides (e.g. a university might have a policy about using/not-using some specific type of metadata so they might want to add/remove information about the specific metadata they care about.
The file contents would typically look something like:
<namesAndSuggestions> <metadataClass> <className>t</className> <info> <shortTitle>title</shortTitle> <longTitle>the document title</longTitle> <improvementSuggestion>Try adding more occurrences of the query term to the document title.</improvementSuggestion> <threshold>3</threshold> </info> </metadataClass> <metadataClass> <className>K</className> <info> <shortTitle>click associated queries</shortTitle> <longTitle>click associated queries</longTitle> <improvementSuggestion>The document would match the query better if it were clicked on for more queries that contain the query term. Try improving the attractiveness of the result - make sure the title is descripive, and that the document has appropriate meta description tags.</improvementSuggestion> <threshold>5</threshold> </info> ... </namesAndSuggestions>
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510498.88/warc/CC-MAIN-20230929054611-20230929084611-00369.warc.gz
|
CC-MAIN-2023-40
| 1,162
| 4
|
http://nojesusnopeas.blogspot.com/2010/06/john-searle-paperclip-baseball-and.html
|
code
|
The pattern of Searle's anti-AI analogies could be generalized thusly:
- (1) We set out to show that entity A cannot possibly perform action X (in this case, A is "a future computerized AI" and X is "thinking/understanding")
- (2) Conjure up a mental image of entity B, which Searle has carefully chosen for the purposes of this argument.
- (3) Entity B is analogous in principle to entity A, albeit on a much smaller/slower/less powerful scale -- indeed, in terms of some of their important properties, we can even say they are mathematically equivalent.
- (4) Our intuition tells us that the mental image of entity B performing action X is just plain silly. (And indeed, our intuition is generally right about this, though not always for the right reasons)
- (5) Therefore, by analogy, the idea of entity A performing action X must also be just plain silly. If entity A seems to be performing action X, it must only be a simulation, nothing more.
SEARLE'S DRINKING BUDDY: So the amateur baseball league I play in recently decided to allow aluminum bats, and as a result I've hit three home runs already this season!
SEARLE: No you didn't. You only simulated hitting those home runs.
SEARLE: Listen, we know wooden bats can be used to hit home runs. Now, consider, an aluminum baseball bat can be approximated by saying it is, roughly, an aluminum cylinder, right?
BUDDY: More or less, sure.
SEARLE: Well, an unrolled paper clip is also an aluminum cylinder, right? And given a large enough paper clip, you could probably unroll it, cut it to size, hold it over the plate with both hands, swing it at a baseball, and maybe even hit the ball past the outfield fence from time to time.
BUDDY: Hmmmm... in principle, I suppose I agree, though it seems rather far-fetched.
SEARLE: (retrieves a paper clip from his pocket, unrolls it, holds it with two fingers, and swings it like a bat) So, am I playing baseball now?
BUDDY: Well, obviously you're not playing baseball, you're just pretendi--
SEARLE: Ah hah! Yes exactly, using an aluminum paper clip, one can only simulate the act of playing baseball! And we already agreed that there's no significant difference in principle between the aluminum cylinder that is the unrolled paper clip and the aluminum cylinder that is the baseball bat, you see. No no no, one could never play baseball with an aluminum bat, it would only be a simulation. A bat has to have "the right stuff" -- which in our universe, appears to be something to do with the intrinsic properties of wood.
BUDDY: You're a dick.
Okay, so I'm sure some extreme baseball purists might agree with Searle that it's not "really baseball" if you play with an aluminum bat. For them, please move on to my next example.
But for the rest of us, I would point out that as many differences as we might point out between an unrolled paper clip and an aluminum baseball bat (different tensile properties, somewhat different shape, etc.), I would challenge any reader to say that the computer you are using to read this blog post is more similar to toilet paper than is an unrolled paper clip to a baseball bat. John Searle wants us to swallow the clear lie that because you could in principle making a Turing-complete system out of a roll of toilet paper, therefore there are no important differences between a futuristic computer AI (far more powerful than the computer you are using to read this post) and his buttwiper-cum-Turing machine. In comparison, fantasy-Searle's assertion there are no important differences between an unrolled paper clip and an aluminum baseball bat is actually a much smaller lie, I would contend.
If you are hung up on the mathematical equivalence between various incarnations of Turing machine, try this on for size:
JOHN SEARLE'S COLLEGE PHYSICS PROFESSOR: So you see, that using techniques of advanced calculus, Albert Einstein was able to derive all of the equations that govern special relativity.
SEARLE: (raises hand) Um, I don't think so. I think Albert Einstein just simulated his derivations. He wasn't really deriving anything.
PROFESSOR: You again?! Well, what inane objection do you have this time?
SEARLE: Well see, I taught my precocious 9-year-old nephew Jeffrey to solve simple algebraic equations, like "3x + 4 = 19". He's actually quite good at it!
PROFESSOR: That's nice, your point?
SEARLE: Suppose I taught him to compute the limit of simple functions too. He's a bright kid; I'm pretty sure that given enough time I could do it. Now, I learned in one of my other classes that the foundation of calculus is all based on algebra and limits. Correct?
PROFESSOR: Yes, more or less....
SEARLE: So if Jeffrey were in some parallel world where he stayed nine years old forever, in principle there's no reason he couldn't apply his algebraic knowledge to the development of advanced calculus. Given infinite time of course.
PROFESSOR: I think I see where this is goi-
SEARLE: And given infinite time, remember, there's no reason -- at least not in principle -- why little Jeffrey couldn't then go on to use all of his calculus knowledge to derive the equations of special relativity. In principle. But now the coup de gras -- do you truly think Jeffrey could ever really derive all those complex equations?
PROFESSOR: (sigh) No, John, I don't think your 9-year-old nephew Jeffrey could ever really derive the equations that govern special relativity. That mental image is silly.
SEARLE: Yes, it is silly. But how is that different from your laughable contention that Einstein derived the equations that govern special relativity using calculus? As we've seen from our Little Jeffrey thought experiment, calculus can't realy be used to derive the equations after all!
PROFESSOR: (eye roll) So, moving on...
Again, the trick is to agree to the in principle plausibility of a fantastic scenario -- in this case, an immortal fourth-grader who eventually studies advanced mathematics -- and to then redirect the ludicrous absurdity of the imagined scenario in order to invalidate the scenario being analogized. But if we are actually paying attention, the ludicrous absurdity is due to particulars of the imagined scenario that are not shared by the original scenario, rather than those which are carried over from the analogy.
I think that the reason why so many philosophers fall for Searle's seductively snarky analogies is because philosophers are used to playing in a mental sandbox where "in principle" is all that matters. They shift around counterfactuals and possible worlds and infinite resources without a second thought to the real-world plausibility of it all -- which 99% of the time is quite appropriate in the world of philosophy. I'll say in a moment why this is one of those 1% times where philosophers cannot ignore real-world plausibility (I actually already stated it in an early paragraph, but I intend to expound on it and clarify), but first, a digression. (As Richard Dawkins said in Unweaving the Rainbow, "what is this life if, full of stress, we have no freedom to digress?")
As an engineer, Searle's mental errors seem positively glaring to me. Engineers deal day to day in real-world plausibility, and we're used to the idea that some things that are in-principle possible, given infinite time/infinite resources, are in reality patently absurd.
I would like to assert, in all humility, that I think I am particularly qualified to understand Searle's error as a result of being a research engineer. The process of inventing a new idea in an engineering discipline involves frequent perceptual shifts back and forth between what is possible in theory and what is reducible to practice.
To illustrate this, I would like to recount, in those most general terms possible (I don't want to have it be like the last time I talked about my job on my blog), the process by which myself and two of my co-workers developed the idea for a new invention. While ruminating about a prior conversation with my project leader, I had an idea of the form, "Wouldn't it be cool if we could do X?" Well, for clarity let me pick a concrete example, which I will intentionally choose to be as far removed from what I actually do as possible: Let's say my idea was, "Wouldn't it be cool if we could grow an apple that would naturally have the company's logo imprinted on it?" (Nevermind whether this is a good idea or not, I'm just picking an example) I had no idea how this might be technologically accomplished, but it seemed at least in principle possible, and -- in the case of the real invention, at least -- it seemed like there could be a market for it.
I brought it back to my project leader and he agreed it sounded like a cool idea, so I set about to try to figure out how it could be implemented in the real world. This was perceptual shift #1 -- from a pie-in-the-sky possibility, to the search for plausibility. After another day or so, I came up with a somewhat ad hoc, but most definitely workable idea. I brought it back to the first co-worker and started a chalkboard discussion (this guy happens to strongly prefer chalkboards to whiteboards -- go figure!), and soon another team member overheard us and joined us in bouncing around ideas.
After I had described my technical implementation of how we could get apples to grow with a company logo naturally imprinted on it, both of my colleagues started to see other quite different potential uses for the underlying technology. For instance, one of them suggested (in our fantasy analogy) that a feedback loop in the technology could cause the apple to also be imprinted with its own unique individual weight as it grew. The other noticed that the same technology might be modified so that the apple appeared perfectly normal for all intents and purposes, but it had organically "grown" an RFID tag inside of it (you know, to combat the terrible scourge of apple thieves on our society). It's important to mention that many of these new ideas presented their own new technical challenges, despite all of them being a riff off of the technology I had diagrammed on the chalkboard.
Nevermind that this is a silly and almost-certainly-impossible invention -- the actual one, which I can't speak about for obvious reasons, was (I think) far more useful and also much more implementable. But I hope the reader can suspend disbelief long enough to see that there had now been a second perceptual shift, one that originated its journey in the world of the plausible, and wound up back in the unlimited realm of the possible. None of the three of us would have thought of those pie-in-the-sky ideas without first being inspired by the technology I had conceived -- and I wouldn't have bothered to work out the technology if it hadn't originated in the germ of a different pie-in-the-sky idea.
I think the particular invention I am working on is ultimately fairly modest, and so there will probably be only one last perceptual shift, as we reduce these ideas to practice. But for really revolutionary inventions (digital computer, anyone?) this ricocheting between the possible and the plausible can continue for quite some time, decades even, spawning all kinds of unexpected results. Indeed, in a research engineer, the ability to seamlessly shift between a discussion of what could be done in theory, to how it might be accomplished in practice, back to what else that practice could in theory accomplish, and so on ad infinitum, is a central job qualification. So needless to say I am quite accustomed to it.
Okay, end of digression. Back to Searle. As I alluded to very early in this post, the fatal flaw in Searle's style of argument is that there is a fundamental contradiction between step #3 (where we imagine a scenario with infinite time and infinite resources) and step #4 (where we try to apply our everyday intuitions to such a scenario). The former is quite alright if we are playing in the enclosed sandbox of philosophy, where "possible worlds" can be stretched and contorted to all kinds of radical scenarios. But the latter -- the employment of our intuitions -- forces us back into reality. If philosophers want to utilize their human intuitions about what's "silly" or "absurd", rather than rely on formal reasoning, they must take into account the real world. After all, what is a philosopher's idea of "silliness" or "absurdity" based on other than her real world experience!
To put it as forcefully as possible: In a "possible world" that allows the Chinese Room to actually work -- one in which the guy in the room is immortal, the "room" contains a continent's (or more) worth of "books", and the universe goes on indefinitely and unchangingly -- none of our intuitions even remotely apply. To turn it on its head, we can imagine a possible world filled with super-intelligent immortal aliens who are quite used to carrying on conversations that span quadrillions of years -- maybe to these aliens, it is not so far-fetched that a very special roll of Turing-blinged out toilet paper might "think" in a way analogous to the way these puny short-lived humans "think". The Turingified toilet paper might take a little longer to make up its mind, but that could even be an asset rather than a weakness in such an eternal slow-moving universe. Our immortal aliens might even find it rather pathetically cute when these egotistical humans keep insisting there is something about their idiotic nigh-instantaneous lives that transcends those of the equally simple-minded yet much more patient and well-mannered Toiletpaperians!
Indeed, the mental image of a roll of toilet paper that "thinks" is arguably less fantastic than the actual practical conditions that would allow it (or the Chinese Room) to happen. I can quite easily imagine a cartoon-ish mental image of a roll of toilet paper with a thought bubble coming out of it saying, "Oh dear god, not again!", even if I think no such thing could exist in the real world. On the other hand, my primate brain is not capable of imagining a time span of a thousand years, let alone a span of the millions of years (or more, probably astronomically more) it would take for the Chinese Room to answer a single question.
Thinking toilet paper, thirsty beer cans, and the Chinese Room are silly ideas -- but not for the reasons John Searle thinks they are. He tricks us into drawing a false analogy, without realizing that the important differences which divide the absurd from the plausible actually lie outside the scope of the analogy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118552.28/warc/CC-MAIN-20170423031158-00440-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 14,509
| 45
|
http://www.mathworks.com/help/dsp/ref/dsp.audiorecorder-class.html?requestedDomain=www.mathworks.com&nocookie=true
|
code
|
Record audio data using computer's audio device
AudioRecorder object records audio data
using the computer's audio device.
To record audio data using the computer's audio device:
Define and set up your audio recorder object. See Construction.
step to record audio data according
to the properties of
dsp.AudioRecorder. The behavior
step is specific to each object in the toolbox.
This System object™ buffers the data from a frame of data using the process illustrated by the following figure.
Starting in R2016b, instead of using the
H = dsp.AudioRecorder returns
an audio recorder object,
H, that records audio samples
using an audio input device in real-time.
H = dsp.AudioRecorder(' returns an audio recorder object,
with each property set to the specified value.
Device from which to acquire audio data
Specify the device from which to acquire audio data. The default
Number of samples per second read from audio device
Specify the number of samples per second in the signal as an integer. The default is 44100. This property is tunable.
Number of audio channels
Specify the number of audio channels as an integer. The default is 2.
Data type used by device
Specify the data type used by the device to acquire audio data
Source of Buffer Size
Specify how to determine the buffer size as
Specify as an integer the size of the buffer that the audio
recorder object uses to communicate with the audio device. This property
applies when you set the
Size of queue in seconds
Specify the length of the audio queue, in seconds. The default
To minimize latency, lower the
Number of samples in the output signal
Specify the number of samples in the audio recorder's output as an integer. The default is 1024.
Data type of the output
Select the output data type as
Enable output of overrun count
Source of device channel mapping
Specify whether to determine the channel mapping as
Device-to-data channel mapping
Vector of valid channel indices to represent the mapping between
device input channels and the data. The term Channel Mapping refers
to a 1-to-1 mapping that associates channels on the selected audio
device to channels of the data. When you record audio, channel mapping
allows you to specify which channel of the audio data directs input
to a specific channel of audio. By default, the
|clone||Create audio recorder object with same property values|
|getNumInputs||Number of expected inputs to step method|
|getNumOutputs||Number of outputs of step method|
|isLocked||Locked status for input attributes and nontunable properties|
|release||Allow property value and input characteristics changes|
|step||Record audio from recording device|
Note: This example runs only in R2016b or later. If you are using an earlier release, replace each call to the function with the equivalent
step syntax. For example, myObject(x) becomes step(myObject,x).
Record ten seconds of speech from a microphone, and send the output to a .wav file.
AR = dsp.AudioRecorder('OutputNumOverrunSamples',true); AFW = dsp.AudioFileWriter('myspeech.wav','FileFormat', 'WAV'); disp('Speak into microphone now'); tic; while toc < 10 [audioIn,nOverrun] = AR(); AFW(audioIn); if nOverrun > 0 fprintf('Audio recorder queue was overrun by %d samples\n'... ,nOverrun); end end release(AR); release(AFW); disp('Recording complete');
Speak into microphone now Recording complete
To run your generated standalone executable application in Shell, you need to set your environment to the following:
This object implements the algorithm, inputs, and outputs described on the From Audio Device block reference page. The object properties correspond to the block parameters.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00201-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 3,638
| 60
|
https://careers.uw.edu/blog/2020/03/26/careerhack-virtual-hackathon-for-job-seeking-developers/
|
code
|
About this Event
Attention: This is a REMOTE hackathon conducted online. No travel is required.
Are you stuck in the developer job hunt? Wish you knew more about the hiring process? Wish you could receive feedback on your coding skills? Do you want your own portfolio website? Do you just simply love to code?
Well come join our online Mintbean CareerHack hackathon! Test your coding abilities and receive constructive feedback on where and how to improve your code with other skilled developers. Understand the job market and the interviewing process for software developer from our very own CEO and CTO of Mintbean, Monarch Wadia.
- Objective and honest technical assessment through a fun hackathon!
- Participate in code reviews and learn how to evaluate other people’s code
- Learn how professional software development is done with best practices in the industry from a senior dev
- Interviewing tips and tricks from a senior dev
- Learn how to prepare for various technical company assessments
Prize! – $25 Amazon Gift Card 🙂
Who Is It For?
- Software developer students
- Devs looking for their first job
- Junior developers
- Bootcamp grads
- QA’s, designers, and other professionals looking into transitioning into software
How To Join
Join us on Twitch on the day fo CareerHack!
Stream Link: Mintbean CareerHack
Requirements To Join
- Git and Github (Your Github will be open to the public, NO Bitbucket)
- A Twitch account to join the stream (can be a throwaway)
- A Slack account – Invitation to join will be emailed to you after registration!
- Your own device with a text editor setup
Problem set: To Be Announced
Team size: SOLO
Date: Saturday, March 28, 2020
Time: 12:30pm – 3:30pm EST (Toronto, Canada)
Where: CareerHack Twitch Stream
Orientation Mandatory for Newcomers, Optional for Repeat Participants
- Orientation pre-start @12PM – Twitch & Slack (30mins)
- Introduction & problem set briefing – Twitch & Slack (15mins)
- Coding session – Github & Slack (135mins)
- Peer code reviews – Twitch, Github, & Slack (30mins)
- Optional: Feedback and Q&A with Senior Dev – Twitch & Slack (30mins)
More details and instructions will follow and be emailed to you closer to the hackathon date!
We’re very excited for you to participate! If you have any further questions, shoot us an email to our Project Coordinator, Jennifer Tang at firstname.lastname@example.org
For the Privacy Conscious and Gainfully Employed
CareerHack is fully hosted, produced, and evaluated on all public mediums (Twitch, GitHub, Slack). Your hackathon project, communication, code review and evaluation will be conducted publicly on these forums.
Full names will not be used, every participant will be referred to as their Slack username. We suggest you create throwaway accounts for any of these social platforms being used if you would like to keep your personal accounts private. However, we leave it to your own discretion.
Mintbean provides vetting services that help employers screen software developers. We’re software developers ourselves, and we know how painful the interview process can be for both employers and candidates. Our goal is to solve the (immense) problems currently present in the software developer job market.
For the registration or other information please click here
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587963.12/warc/CC-MAIN-20211026231833-20211027021833-00182.warc.gz
|
CC-MAIN-2021-43
| 3,311
| 42
|
http://www.howtogeek.com/forum/topic/getting-rid-of-tagged
|
code
|
Gary, tagged.com is NOT included in Windows Live Messenger. It is a completely different service. The only association that I can find is that Microsoft has partnered with Tagged and some other social networking sites to allow users to transfer their contact lists to WL Messenger. However, that is by no means a requirement and it was not WL Messenger that created your tagged.com account. You should go to Tagged and see what you can do to get that account removed because it only seems to be causing you more spam e-mail.
Meanwhile, the best thing to do with WL Messenger is to block users except those on your contacts list. In the menu, go to Tools -> Options -> Privacy and check the box by "Only people on my allow list can see my status and send me messages". You can still get IM requests from people to add you to their contact list, but you can deny any that are from people you don't know.
WL Messenger does not generate e-mails nor is it a mechanism that will cause you to receive e-mails. You could uninstall it and you would still get messages that are initiated by the Tagged account.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00090-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 1,100
| 3
|
https://docs.oracle.com/cd/E19121-01/sf.x4150/820-1855-13/sysmonitor.html
|
code
|
|C H A P T E R 3|
Monitoring the Server System Using the Web GUI
This chapter provides information about how to use the web GUI and the Sun Fire X4150 server software to monitor your server.
It includes the following sections:
|Note - You can monitor the rudimentary state of the server using the LED fault light. A solidly lit amber LED indicates critical error. Further details about the fault light can be found in your Service Manual. For information about controlling the state of the fault LEDs see To Manage the State of the System Locator Indicator LED.|
The web-based graphical user interface (GUI) allows you to use a standard web browser to monitor and manage local and remote systems.
You can redirect the server’s console to a remote workstation or laptop system. This requires configuring the remote system’s keyboard and mouse to act as the server's keyboard and mouse. You can configure the diskette drive or CD-ROM drive on the remote system as if it were connected to the Sun server. You can also redirect diskette images (.img files) and CD-ROM images (.iso files) for remote access. Remote configuration issues are covered in Chapter 5.
The web GUI has been tested successfully with recently released Mozilla Firefox and Internet Explorer web browsers, and might be compatible with other web browsers.
The ELOM product is preinstalled on the Sun server. However, you need Java software on the client to perform redirection as described in Chapter 5.
After you log in to the web GUI, you can perform basic software tasks, Intelligent Platform Management Interface (IPMI) tasks, and system monitoring.
ELOM user accounts define what you can do by roles:
For more information about users, including how to manage user accounts using the web GUI, see Chapter 4.
Some of the common tasks you can perform using the web GUI include:
Configuring connection methods:
Monitoring and managing system status:
Managing and modifying system variables:
The ELOM boots automatically when a Sun server is cabled appropriately and plugged in to an AC power supply. This usually occurs within one minute. However, if the management Ethernet is not connected, or if the ELOM's Dynamic Host Configuration Protocol (DHCP) process fails due to the absence of a DHCP server on the management network, the ELOM might take a few minutes longer to boot.
|Note - Disabling the use of the browser proxy server (if one is used) for access to the management network might speed the browser response time.|
1. To log in to the web GUI, type the IP address of the ELOM in your web browser.
The login screen appears.
2. In the login screen that appears, type the default user name and password.
3. Click Log In.
The web GUI appears.
To log out of the web GUI:
Click the Logout button in the upper right corner of the screen.
The system is equipped with a number of sensors that measure voltages, temperatures, fan speed, and so on. The System Information tab shows the current system status and provides access to the Version, Session Time-Out, and the Components submenu tabs (see FIGURE 3-1).
FIGURE 3-1 ELOM System Information Screen
TABLE 3-1 lists the ELOM main menu and submenu tabs and points to relevant sections in this manual.
The following section describes how to monitor the server using the web browser and the Embedded Lights Out Manager software.
The System Information tab provides information about system components, such as the service processor (SP), the server board, the CPU, and the memory. Details are found in the Versions and Components submenu tabs.
On the main menu, click the System Information tab.
The System Information submenu appears, allowing you to view the Versions, Session Time-Out, and Components tabs.
From the Versions submenu, select the SP Version tab.
The SP Version screen appears, displaying information about the server board installed in the system. It presents the information in a tabular format. For example, TABLE 3-2 shows a sample of the SP information as it is displayed in the SP Version screen:
From the Versions submenu, select the Server Board Information tab.
The Server Board Information screen appears, displaying information such as the BIOS version and the serial number. It presents the information in a tabular format. TABLE 3-3 show a sample of the server board information as it is displayed:
The CPU menu selection provides information about the processor.
From the System Information menu, click the Components submenu tab, then select CPU.
The CPU information screen appears. The CPU information is presented in a tabular format. A separate table of information is available for each of the server’s CPUs, whether a CPU is installed or not. TABLE 3-4 shows a sample of the CPU information for CPU0:
From the System menu, select Components, and then select Memory.
The Memory screen appears. It displays information about total memory installed in your server; see TABLE 3-5.
The Memory screen also displays information about each DIMM installed in your system, presenting it in a tabular format that includes such information as the memory module number, the status, and module size; see TABLE 3-6 for a sample of the memory information for DIMM_A0.
Sensors placed throughout the system provide information about the state of critical server components. The sensors read temperature and voltage and report on operational status. Using the System Monitoring submenu screens you can view the these sensors and monitor the health of your server’s critical components. For example, you can check the temperature of each CPU or DIMM and read the actual DC voltage of each of the system’s power supply lines. The System Monitoring submenu screens also allows you to view and manage the system log, the Locator Indicator LED, and the Fault LED. For information about the Locator Indicator LED and the Fault LED, see Managing the State of the System Locator Indicator LED.
On the main menu, click System Monitoring.
The System Monitoring submenu appears, allowing you to view the Sensor Reading, Event Logs, Locator Indicator, and Fault LED tabs.
From the System Monitoring tab, click the Sensor Reading Tab.
The Sensor Reading tab allows you to select the Summary, Temperature, Voltage, and Chassis Status tabs.
From the Sensor Reading tab, select the Summary tab.
The Summary screen appears. It provides an overview of the status of the system sensors. The screen provides the status of the Fault LED, the power, the temperature of all critical components, and each of the monitored voltage lines. For example, TABLE 3-7 shows the top portion of the summary table summarizing the status of the Fault LED and the system power.
TABLE 3-8 shows a detail of the Summary table that summarizes the status of each of the system fans.
TABLE 3-9 shows a detail of the Summary table that summarizes the status of the temperature sensors.
TABLE 3-10 shows a detail of the Summary table that summarizes the status of the DC power supply lines.
TABLE 3-11 shows a detail of the Summary table that summarized the status of the systems power supplies.
From the Sensor Reading tab, select the Fan tab.
The Fan screen appears, displaying the critical thresholds, the actual sensor reading, and the status for each of the systems fans. The readings are in RPM. The information is presented in tabular format. TABLE 3-12 shows sample information on the Fan screen. The sample is for the fan labeled Fanbd1/FM1.
From the Sensor Reading tab, select the Temperature tab.
The Temperature screen appears, displaying the ambient chassis and CPU temperatures. The temperatures are displayed in degrees celsius. The Sensor Reading screen shows the current temperature reading. TABLE 3-13 shows sample Temperature information for CPU 0. A separate table is presented for each CPU and each ambient sensor.
A similar panel is repeated for each monitored entity.
From the Sensor Reading tab, click the Voltage tab.
The Voltage screen appears. The Voltage screen displays the critical and noncritical thresholds, the actual sensor reading, and the status for the nine monitored DC system voltage lines. The Sensor Reading value represents the actual voltage reading for that sensor. TABLE 3-14 shows a sample from the Voltage screen. The sample is for the Vcc 12V line:
The Event Logs screen allows you to view and manage the system event log (SEL). The SEL is a record of event occurrences. To record events in the SEL, you must have previously determined which events require logging. See Configuring Platform Event Filters.
From the System Monitoring tab on the main menu, click the Event Logs submenu tab.
The Event Logs screen appears. The View Event Logs, Save Event Logs, and Clear Event Logs submenus become available.
From the Event Logs tab, select View Event Logs.
The system event log appears. Each entry in the log represents an action that occurred on the system. The information is presented in a tabular format. The system lists each action, rates the action’s severity, provides a time stamp, and describes the event. The severity field includes icons for both Information and Critical ratings. FIGURE 3-2 shows an excerpt from the View Event Logs screen.
FIGURE 3-2 An Excerpt of the View Event Logs Screen
You might want to save the event log for administrative or diagnostic purposes.
1. From the Event Logs tab, click the Save Event Logs tab.
The Save Event Log screen appears.
2. Click the Save Event Log button to prompt the browser to ask you where to save a copy of the event log.
3. Select the location, name the file (if necessary), and click save.
The Event Log might need to be cleared to signify a fresh procedure, or identify system performance under load.
1. From the Event Logs tab, click Clear Event Log.
2. Click the Clear Event Log button to start a fresh event log.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648404.94/warc/CC-MAIN-20180323161421-20180323181421-00299.warc.gz
|
CC-MAIN-2018-13
| 9,835
| 74
|
http://freetofindtruth.blogspot.com/2016/10/33-137-afro-gematria-espns-colin.html
|
code
|
I got this thought looking at the picture above... "I wonder if there is a connection to the word 'Afro' and 'race war' through gematria. After all, we are living under people who rule by symbols, and seemingly, the "symbolic way" words are spelled, with certain letterings and values.
Well, again, gematria does not disappoint.
Also, just before I had that thought... I laughed. Only because I know Colin has grown his 'afro' for the purposes of playing the part in his ongoing NFL actor career.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860089.11/warc/CC-MAIN-20180618051104-20180618071104-00497.warc.gz
|
CC-MAIN-2018-26
| 496
| 3
|
http://wikipediareview.com/index.php?s=fc7d607b5ab6918b3889477832a13ffb&showtopic=33339&st=140
|
code
|
QUOTE(gomi @ Sun 15th May 2011, 7:46pm)
The rev lilburne spotted is now gone, though it apparently lasted for several hours. It was a baseless libel on the young girl. What is interesting is that it was "supported" by a link to CNN. It turns out that CNN hosts a "citizen journalism" site called IReporter, or some such, and so a "reliable source" was ginned up and linked to.
Now the circle-jerk has come all the way around, with people (teens, tweens, I suppose) on Yahoo Answers (and elsewhere) citing the fake article, the Wikipedia edit, and a faked Facebook page as evidence. Sigh.
One day someone WILL pursue a libel action against these idiots. Of course then we'll have to listen to a sob story of a mean person just not getting the internet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123318.85/warc/CC-MAIN-20170423031203-00152-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 751
| 4
|
http://play3.hdfilme.stream/movie/310137/bound-to-vengeance
|
code
|
A young woman, Eve, fights back and manages to escape a malicious abductor. However, after discovering she may not be the only victim, Eve unravels a darker truth and decides to turn the tables on her captor.
Warning: file_get_contents(https://api.themoviedb.org/3/movie/310137/reviews?api_key=3d3f362e95daf1b3b001f72c79286617&language=en-US&page=1): failed to open stream: HTTP request failed! HTTP/1.1 429
in /srv/users/serverpilot/apps/play3hdfilmestream/public/templates/clonengan/lp.php on line 547
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827963.70/warc/CC-MAIN-20181216165437-20181216191437-00496.warc.gz
|
CC-MAIN-2018-51
| 503
| 3
|
https://www.loverslab.com/blogs/entry/4207-idea-to-launch/
|
code
|
Does anyone remember the TV series The Saint? I don't mean the Val Kilmer movie but the show with Roger Moore?
I finally have a playthrough idea I could write on, illustrated with screenshots but I don't know much fun all the work that's required for my vision will be. One of the problems is I want to edit/crop/resize any picture I post here so they're not so large and convert them from the BMP format that some moron decided to use for the screenshots into a PNG.
Anyway, here's a shot of one of my protagonists standing on Farengar's bed... with Farengar. I got the location right for Anub's (I think) against the wall from behind animation so her hands are properly positioned.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00028.warc.gz
|
CC-MAIN-2022-33
| 683
| 3
|
http://archives.mageia.org/zarb-ml/mageia-marketing/2011-April/000308.html
|
code
|
[Mageia-marketing] beta2 blog note
rdalverny at gmail.com
Tue Apr 26 17:45:52 CEST 2011
we're still in a last-minute-hurry, here for a quick review, the blog
post as projected for beta2: http://piratepad.net/i6UfwZgIcQ - will be
pushed in the next few hours (if not less).
I suggest we make it differently as soon as RC as a rehearsal for
finale: we define the big lines together and adapt the message and we
review/validate the text in advance (at least 2 days) so we can better
sync and plan the spread of the news.
More information about the Mageia-marketing
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652959.43/warc/CC-MAIN-20230606150510-20230606180510-00677.warc.gz
|
CC-MAIN-2023-23
| 561
| 11
|
https://forum.dimagi.com/t/pre-populating-a-lookup-table-that-sets-owner-id/4921
|
code
|
I am using the Assigning Cases to One of Multiple Locations functionality, so I have a lookup table that populates with the organizations I have set up in my registration form. I was going to copy that table in a follow up form so that a user can reassign a case from within the mobile app. My questions are:
- I haven’t found any documentation on using this functionality in this way, so was just wondering if there are any red flags about doing this.
- If there are no red flags, is it possible to pre-populate this question in the follow up form with the owner_id from the registration form? I have the answer saved as a case property, and put it in the default value field but it doesn’t pre-populate.
I can confirm that there are no red flags about doing re-assignment in a
form, or with populating the other lookup table using the owner id, as the
keys for the lookup table will be coded with the same GUID as the owner ID
of the case.
Unfortunately, what you’re seeing is a limitation of the "Easy References"
in our form builder, which simplify the way that case properties are
referred to when building the app.
In order to reference the owner ID of the case selected, you’ll need to
instead provide an explicit reference rather than an easy reference. I
believe that you should be able to refer to the owner of the case with this
which will allow you to pre-populate the lookup table question.
Please let me know if that doesn’t address the issue!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662601401.72/warc/CC-MAIN-20220526035036-20220526065036-00031.warc.gz
|
CC-MAIN-2022-21
| 1,467
| 15
|
https://www.getbommer.com/post/fusion-360-update-makes-it-easier-to-keep-track-of-your-parameters/
|
code
|
The recent updates to Fusion 360 have been full to the brim with new features and time saving improvements. Sometimes, they make an improvement that we think can really make an impact for Bommer users, and we get so happy that we just have to talk about it. Sorry, not sorry.
The latest release of Fusion 360 contains one of these improvements: as of Fusion 360 version 2.0.9849, named parameters created when running commands are automatically added to the Favorites section of that design's Parameters screen. This makes them easy to find, and therefore easy to tweak as needed. We're huge "parameter" nerds on a normal day (it comes with being a team of software people), so any improvements in this area really get our attention. At it so happens, our latest release of Bommer allows users to build calculations ("formulas") into their BOM that can utilize parameters. The combination of being able to use parameters in your Bommer formulas with easier access to your Fusion parameters has us like...
...I don't get it. Why do I care about parameters?
Parameters in your design are the inputs that let Fusion 360 (and other CAD software) solve the equations and constraints necessary to represent what it is you want to build. Whether you realized it or not, any time you've ever dimensioned a sketch, extruded a body, or added a fillet to an edge, the necessary inputs for those operations to work are parameters. What's really cool is, because your design is basically a timeline of operations (i.e. functions) over these parameters, you can tweak a parameter for a feature well after you've added the feature, and Fusion 360 will update all of the dependent features to use the new value. Pretty cool, right?
Still not seeing it? Ok, let me give you an example.
Let's say you work at a designer of innovative outdoor furniture, and you are putting the finishing touches on your company's next product: the "Beyond-irondack" chair.
Your design is well organized, your parts are named properly, you've completed your BOM in Bommer (*wink*) so all of your part data is safe and secure, and you're feeling pretty good about the project. And then it happens. Your product manager comes into your office and tells you that the requirements of the project have changed; the target customer is larger than originally planned, and the chair needs to be wider with a taller back. Sh*t.
This could be a headache; you might have to go back and edit a bunch of features and then hope everything lines up in the end. Luckily, Fusion 360 gives you a better way; you can just edit the parameters that Fusion 360 uses to compute these features. These parameters are available in a table of design parameters, grouped by the component and feature/command/operation it belongs to; you can even give the parameters recognizable names, so you can find it again when you need to.
You can also define what are called "user parameters" which can be used in place of a numerical input in a Fusion command. In our chair scenario, this means that if you had a parameter called SeatWidth and a parameter called BackHeight, and all of your modeling operations were driven off of these parameters, changing the design to meet the new requirements is as simple as changing two numbers in the Parameters screen. That's pretty handy.
Ok, that's pretty cool. So what's new?
Parameters are not new to Fusion 360; in fact they've been a fundamental part of Fusion 360 for a while. What is new is some improvements to how the parameters are organized in the Change Parameters screen. Specifically, when you give a parameter a name at the time the parameter is created (e..g when the sketch is dimensioned or command is executed), Fusion 360 will now automatically add that parameter to your favorites for easy access. Let me explain.
Like many things in life (and software), the approach described above works great if you do everything "right" from the start: name your parameters, open Change Parameters, "favorite" the parameters that you are most likely to change, repeat. You want to do this because digging through a table of hundreds of components and thousands of features to find the parameter you need to change is a pain in the ass. User parameters can help here because they are listed in a separate section on the Change Parameters screen, but to make the most of user parameters, you need to start with with an idea of what dimensions or values you may need to tweak throughout the design. It's frequently easier to just sketch or model and define things as you go, and very convenient to be able to define these parameters right within the operation they're being used.
Now, when you name a parameter when using it in a Fusion sketch or command input, it automatically adds that parameter to your Favorites. That's extra handy.
That's really cool, but I was promised something about Bommer.
Alright, alright. As I mentioned above, Bommer formulas can reference a design's parameters, and this is frequently used in practice to compute or convert design information – the same information that drives actual geometry in your model – into a value that can be used in purchasing, manufacturing, or shipping/fulfillment. Bommer formulas are recomputed automatically when parameters change, so changing a value in Change Parameters will automatically update these values in your BOM. Because of this, any improvement to Fusion 360 that will allow our users to better use parameters in their design will translate to a more automated, less error prone bill of materials.
Let me give you an example of this. Say that a key feature of this chair is a coating on the seat that is sprayed on after assembly, and this coating is purchased in units of how much surface area it can cover. In order to properly manufacture your chair, you need to calculate the surface area of the seating area. As you design your chair, you capture parameters for seat width (SeatWidth), seat depth (SeatDepth) and chair back height (BackHeight). You also have a Bommer property called "Material Cost" which you can store the unit cost of the coating material, and "Total Cost" which represents the cost of that line item in your BOM. Add a component to your model called "Coating" (it can be an empty component) and enter the cost per unit into the Material Cost property, then enter the following formula into the Total Cost:
= ((SeatWidth _ SeatDepth) + (SeatWidth _ BackHeight)) \* Material Cost
Bommer will evaluate this formula produce the cost of the material that will be required to coat one chair. Pretty straightforward, right? You could even add a parameter that contains a multiplicative factor for multiple coats, thicker/thinner coats, etc, which can then be tweaked if you are trying to hit a specific quality standard or cost target. This same methodology could be used to compute similar values for paint, powder coating, fabric/textiles, or really any value that is a function of your design parameters and BOM properties that is useful to have in your output. And to be clear, this is not new with the new release of Fusion, but consider the situation above; the more your parameters are accessible within the Fusion 360 parameters screen, the more you can utilize them to construct calculations like this. And that, my friends, is really handy.
Now you're getting it.
We know our users love the tight integration between Fusion 360 and Bommer, and we love that because of that tight integration, small improvements to Fusion 360 can pay huge dividends for Bommer users. Changes like automatically promoting named parameters to "Favorites" have immediate effects for users who are look for ways to save time and reduce errors in their BOM creation. Time savings is what we are all about, even when we may not have a direct hand in it. In this case, we play really well with the hand, which is always a good thing.
If you're new to Bommer (welcome!), or haven't checked out formulas yet, you can read more about them here, here, and see our launch video included above. If you want to give it a try, click here to get started or contact us for a demo! We'd love to hear from you!
Until then, have an awesome day.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474670.19/warc/CC-MAIN-20240227021813-20240227051813-00750.warc.gz
|
CC-MAIN-2024-10
| 8,190
| 22
|
http://freecode.com/tags/bsd-license-original?page=1&sort=popularity&with=2803&without=
|
code
|
ZShaolin installs a powerful terminal on your Android device, without requiring root. It comes with applications to edit text, images, audio, and video using shell scripts and programs like FFMpeg, ImageMagick, Sox, Oggz, Lua, awk, sed, vim, emacs, git, SSH, and rsync. A zsh command line environment comes pre-configured with colors, smart completion, error correction, and all man pages, making ZShaolin also suitable for those who would like to learn shell scripting and Unix system administration via a remote session.
QuantLib is a cross-platform, quantitative finance C++ library for modeling, pricing, trading, and risk management in real-life. It is also wrapped as Python/Ruby/Scheme modules. Extensions for Excel, R, and Mathematica are available. Other such extensions are under consideration. QuantLib offers tools that are useful both for practical implementation and for advanced modeling. It features market conventions, yield curve models, solvers, PDEs, Monte Carlo (low-discrepancy included), exotic options, VAR, and so on.
Jigsaw is W3C's leading-edge Web server platform, providing a sample HTTP 1.1 implementation based on RFC2616 and a variety of other features on top of an advanced architecture implemented in Java. Jigsaw provides both client and server HTTP/1.1 implementations, is fast, easy to extend, flexible, and is also packaged as a ready-to-run HTTP/1.1 proxy-cache.
PXP is a validating XML parser for the programming language Objective Caml. It strictly implements the full XML-1.0 standard. The XML instance is represented as a tree of objects. It is also possible to access the DTD. PXP means "Polymorphic XML parser" and emphasizes its most useful property: that the API is polymorphic and can be configured such that different classes are used to store different types of elements. PXP contains a user's manual and several example, and has been designed with CGI programming in mind, however is not limited to this field.
newsyslog is a faithful Perl rewrite of the MIT newsyslog utility, with a number of features taken from the FreeBSD and NetBSD variants of newsyslog. It archives log files based on size, date or interval, and can optionally compress archives with gzip or bzip2. Complete documentation is available via "perldoc newsyslog.pl".
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206147.1/warc/CC-MAIN-20140423032006-00084-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 2,287
| 5
|
https://groups.google.com/g/comp.os.msdos.misc/c/bD2Kh9d64ZM
|
code
|
> Is there a better way to preserve the ling filenames?
I seem to remember that the big-name compression programs (ARJ, ZIP, some
others) already supported long filenames in their GUI programs on W98 (not
sure about W95).
Also, I would advice you to stick with the bigger names in regard to
compression programs, like ARJ, ZIP and a few others. They have a rather
good track record in being able to handle their own (very) old compresed
files. Crush on the other hand (can't remember having ever heard of it by
the way) might not be as supportive ...
Besides that, if you ever want to share such a compressed file it is
advicable to do so in a wel-known format - or you would need to have
everyone you share with to also install that Crush program. Which they
might not be too happy with ... (I sure wouldn't be)
If you run DOS and create/delete files on a drive which already has long
filenames you will most certainly make a mess of it, losing LFNs and
sometimes getting them linked to the wrong files. Don't ask how I know. :-)
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296815919.75/warc/CC-MAIN-20240412101354-20240412131354-00690.warc.gz
|
CC-MAIN-2024-18
| 1,030
| 16
|
https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/How-to-determine-the-latest-supported-VM-hardware-version-using/m-p/1296620/highlight/true
|
code
|
I'd like to check for VMs with out of date hardware versions (easy to do) and would prefer to pull the latest support version from the vCenter server instead of setting it manually. While we're in between v5.1 an v5.5 I want to the script to know automatically what to compare against. I could check the vcenter version against a hash table of vcenter and hardware version, but even that requires manual intervention to populate and maintain when the next version of vSphere comes out. I'm assuming it involves Get-View, but I don't know which object I should be looking in.
Anyone have an idea? Thanks!
So for the commands you could use:
$vc = connect-viserver xxxx
theire you get for example (5.5)
if you like more info about center then you could query instead of $vc.version
$instance = get-view serviceinstance
theire you have now more infos
and for vm for example you get like that
$vm = get-vm xxxxxx |get-view
if you like to have split "vmx-" then do $vm.config.version.split("vmx-")
with that you could easy create a short script where you make a loop against all vm's in the you're vCenter.
So and if 5.5 is the Version you have of you're vCenter you could easy filter vm's which are not matching the "10"
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=200724... (good info for the version support and what is working ).
PS: i'am not quit sure if this info is hiddin somewhere in the API to query against the latest supported version. not quit sure.
but its important to query mainly the versions of ESX/i
because if you have vcenter 5.5 and Esxi is 5.1 then latest supportat vHW is based on the esxi version. So means now v9 maximum.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038061562.11/warc/CC-MAIN-20210411055903-20210411085903-00612.warc.gz
|
CC-MAIN-2021-17
| 1,691
| 17
|
https://economics.stackexchange.com/questions/tagged/food
|
code
|
Questions tagged [food]
The food tag has no usage guidance.
Why hasn't innovation in the agricultural industry led to a significant reduction in food prices?
There has been a lot of innovation in the agricultural industry. GMO, giant silos, factory farming, machinery, etc. But if we look at actual food prices since 1960 food actually got more expensive. So ...
How to make a country rich with no ground resources?
I have heard from an interview with N. Chomsky that the British favored India to work their fields instead of creating the machines that are used in the fields, this is a form of economic supressesion ...
Why do grains cost so much more than flour?
I don't know if this is the case everywhere, but at least here in Germany: The same amount (usually 1kg) of grains - for human consumption - costs 3-10 times as much as flour. This holds at least for ...
Food prices during famines - Historical data
I'm looking for historical data regarding local food prices during famines. I expect food prices to rise in order of magnitudes during famines but was unable to find reliable data. I'm basically ...
How could you partition Household Food Expenditures into Producing Industries?
From the 2019 Consumer Expenditure Survey, the average household annual food expenditure was $8,169 for that year. There are subcategories such as "Food at Home" and "Food away from ...
Why does anyone prepare their own food?
I'm not an econ person, so this is a super naive question, but here goes: why, given the comparative advantage that specialization produces, does anyone prepare their own food rather than buying from ...
In-ovo chick sexing vs. unemployment [closed]
As they report in Wikipedia, daily 7 million male chicks are killed for economic reasons. What I did not know is that obviously the actual separation, sexing is done manually? Instrument or machine ...
Is it more costly to raise cattle for beef or raise fish in aquacultures?
I can't find any sources comparing the cost of the two methods. Specifically, I want to know if its more economically efficient to raise fish as a food source rather than beef - not counting ...
Why did coronavirus cause a food shortage?
The argument I have seen is that since restaurants closed, demand for food is down. I understand how demand being suddenly lower could disrupt supply. What I don't understand is why demand is down. ...
Depreciation of local currency and its effect on prices
I have problem with an article Lee H., C. Park, 2013, International Transmission of Food Prices and Volatilities: A Panel Analysis. Authors wrote: Difference in log of exchange rates (LOC/ $)- As ...
Data source for the relative frequency of different kinds of expiration date by retailers? (use by, sell by, best by)
I'm not sure if this is the correct Stackexchange site for this question, but I am interested in the economic and environmental effects of food waste reduction. A common policy proposal to reduce food ...
What arguments are there in favor of national food self-sufficiency?
National food self-sufficiency is an idea that appeals to many non-economists. For example, George W. Bush (2001): It’s important for our Nation to be able to grow foodstuffs to feed our people. Can ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945144.17/warc/CC-MAIN-20230323100829-20230323130829-00398.warc.gz
|
CC-MAIN-2023-14
| 3,236
| 26
|
https://www.productx.io/about
|
code
|
About This Project
Update as of 26th of June 2021: This repository is less frequently updated.
Product Management is the art and science of building the right product for the right people.
It encompasses understanding what to build, why to build it, and how to position it. A Product manager wears multiple hats, like talking about APIs with engineers one moment, asking designer to move the logo 2 pixels to right the next moment, and presenting business stats to board the third moment.
The product manager needs to understand the business, design, and technology to make sure they come together to form an amazing product.
This project is an effort to collate and publish all the available knowledge, tools and resources which can help you enter and grow in the field of Product Management.
I hope content here helps you to build human and environment centric products.
Thank you for checking this out and happy learning! :)
Pro tip: Did you try the search feature yet? It's there on top right, try searching for 'Roadmap'.
I believe that knowledge should be available and accessible to all for free and that only through diversity in the workforce can we build truly exceptional products.
I faced a problem and built a solution to help myself. I ended up helping many others. All of this started from here on 15th September 2019: https://gitlab.com/Floydimus/PM/-/blob/master/README.md [Access restricted due to privacy concerns]
And this repository is now being referred by many users in multiple global communities and I am receiving lots of messages thanking me.
I am humbled by all your love and support. This project is free to use, forever.
Remember, Today you.. tomorrow me.. Let's keep the circle unbroken :)
Credits where credits due...
Super thank you to
UnDraw.co for all these illustrations
Ethan Hoover for landing page photograph
Lukasz Adam for Light bulb logo
Open Source Participation
Unlike Developers or Designers, Product Managers have very little scope of having side project or contributing to any Open Source Software.
This is your chance to participate in an OSS gig. To contribute, feel free to reach out to me at hello[at]prismo[dot]net.
Nothing happens in isolation, let me introduce you to those contributor(s)
Manan Agarwal [October 2020 to November 2020]
Install the App
Now you can install the PWA of this product on your Phone.
Open https://www.productx.io in your phone browser.
Navigate to Options.
You will have either have Add to Home Screen or Install.
Click on it.
Close the browser and open the app next time whenever you want to learn.
Get access to updated content always. No updates needed, no space consumed.
If you find my work on ProductX.io useful in anyway, feel free to give a shout out to the product (not me) on LinkedIn so that it reaches many others who can learn and benefit from the free knowledge 😄
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474700.89/warc/CC-MAIN-20240228080245-20240228110245-00750.warc.gz
|
CC-MAIN-2024-10
| 2,860
| 33
|
https://forums.majorgeeks.com/threads/ie-and-java.15662/
|
code
|
IE and java I took the opportunity (goaded by the fact that The Great Satan of S/W stopped supporting it ;-) to upgrade from IE 5.01 to 5.5 SP1. There seems to be some strange interactio with Java that makes it unusable with some apps. When navigating down a page, some buttons won't work. When I mouse over the button, the status bar displays a message like: java_script_xxx (stuff) but when you click on it, nuthin' happens, and there is a 'error on page' message. This happens in several apps. WHat happened between 5.01 and 5.5? The best I can think of is a configuration parameter got changed somwhere back to a default setting. BTW, I upgraded to java 1.4.1_02 when it came out awhile back, well before the IE upgrade.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824733.32/warc/CC-MAIN-20171021095939-20171021115939-00866.warc.gz
|
CC-MAIN-2017-43
| 724
| 1
|
http://www.etiquettehell.com/smf/index.php?topic=98003.0;prev_next=next
|
code
|
I had to go to the suburbs today, and saw one of those road-side veggie stands with a big sign that said "Wild Garlic" on it. I couldn't resist, so I pulled in to check it out. Turns out that they sold jars of pickled wild garlic. Each bulb is about the size of one clove. I bought one, figuring I could Google some pretty interesting recipe when I got home.
After ten minutes of searching, I haven't really found any ideas/recipe.
Anyone have any suggestions?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.79/warc/CC-MAIN-20170423031203-00363-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 460
| 3
|
https://www.codecomputerlove.com/blog/a-day-in-the-life-of-a-principal-front-end-engineer
|
code
|
In a series of blogs about what life as a Computerlover is like, we caught up with our Principal Front End Engineer to find out what he gets up to in his day-to-day.
I am the Principal Front End Engineer here at Code, and I have been working here for almost a year now. I love anything tech, music and the odd sports here and there where I can fit that all in.
At Code, my role splits between:
I have a great and important job. It's also a lot of fun and I get to work with some talented people at the same time. Every single day is a school day for me.
I've been an engineer for over 15 years, starting as a ‚CSS Integrator' at a time when CSS was new to web development. Over the years I've dabbled in almost everything. From getting involved in PHP (and using it to build my content management system) to pure front end work, which is my true passion.
I've known about Code for many years. They were award-winners at ceremonies I attended with previous companies. I'd also heard of their reputation as being an exceptional place to work, and was aware of their brilliant work for clients, which stood out in the industry.
I was not aware the role I am in now existed, although it's the role I have always wanted to do. I enjoy innovating and learning about all the new things going on in the industry.
My days generally start with a good morning to all the teams and then a check of emails. I often attend stand-ups for various product teams throughout the week. I offer any Front End Engineering support with current work, and any consultative work for potential, or current, clients.
After checking in with the teams my days can be quite varied. This depends on whether there is currently a piece of consultation work going on, or if any teams need support throughout the day.
If there is no support work needed, I will then work on a presentation for our discipline-focused Make Change Friday sessions. I'm currently working on a Web Performance talk and a ‚Code Along' with a new framework. Otherwise, I read up on some articles or work on implementing new tools or resources for the rest of the Front End team.
I have recently been working on ways we can automate our accessibility testing. This is the first point of call to catch accessibility issues with the code we write. Accessibility has become an important focus for Code in the last year. I've been working on ways we can make a good start in capturing and fixing issues. These ways include using automated tools and training our developers in the best ways to write accessible code.
I have been researching how we can extend this with full training for our developers on accessibility. This way everybody can build websites that are inclusive to as many people as possible. It is a challenge but is also very interesting and very rewarding.
I think I am most proud of the website and tools I have started to build for the Front End. They showcase good Front End Engineering performance and are built using a new framework as a proof of concept. They include some tools to help me (and anyone else) run performance checks, accessibility tests, visual regression tests and website monitoring on any given website.
One of my goals as Principal Front End Engineer was to put in place some of these things. I thought I would be able to test them best by building them myself as tools I could use, and thereby understanding how they work.
As part of the consultation work, website performance is probably the one I'm asked to do the most often. One of the tools was written as a way for me to automate as much of this process as possible.
I love building helpful tools!
I don't think there is a single favourite part. I do, genuinely, love every aspect of my job. I think I most enjoy collaborating with, teaching, and learning from the other Front End Engineers here because they are so talented, friendly and diverse in their skills.
But I also really enjoy building things. I am a developer at heart and like nothing better than developing. If I can combine these two things and develop things to make developers' lives easier then that is where I feel I get the most reward from my job.
. . .
Looking for a new opportunity with a company that values personal development and growth? We're looking for software engineers and analysts across all levels ‚ take a look here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00042.warc.gz
|
CC-MAIN-2024-18
| 4,342
| 20
|
https://meta.discourse.org/t/upgrading-from-2-4-to-2-9-need-slight-assistance-on-what-order-to-run-the-final-commands-reboot-in/243255
|
code
|
Almost complete upgrading from 2.4 to 2.9+.
First I ran:
cd /var/discourse git pull ./launcher rebuild app
I’m now seeing this, and wondering in which order to run the three commands, and when to reboot the server.
./launcher rebuild app
Also not 100% sure how/when to execute
ALTER EXTENSION procedure:
Thank you in advance!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711221.94/warc/CC-MAIN-20221207221727-20221208011727-00251.warc.gz
|
CC-MAIN-2022-49
| 327
| 8
|
https://meta.discourse.org/t/maximum-topics-in-first-day-error-4-days-after-first-topic/170929
|
code
|
The error mesage was:
You’ve reached the maximum number of topics a new user can create on their first day. Please wait 2 hours before typing again.
This seems to be controlled by: ‘max topics in first day’ - adjusting this removed the error.
The issue is, that the user has 8 previous Topics with the first being 4 days ago. So I think they shouldn’t be affected by this setting, seeing it is meant to only affect the 24hr period after the user’s first post. The posting account is a TL0 user.
Option description is:
The maximum number of topics a user is allowed to create in the 24 hour period after creating their first post
I’d make a speculative guess that the setting might really be ‘maximum posts per day for TL0 users’.
It may be worth checking if this is also the case for the ‘max replies in first day’ setting.
Yes, the code seems to be checking to see if a user is TL0 - not checking that it’s the user’s first 24 hours on the site. If that’s the case, possibly the message that is displayed to the user should be changed. The default requirements for achieving TL1 are fairly low though. I’d expect that considering TL0 users to be new users is correct for most cases.
@simon Yeah, I’m experimenting with adjusting the difficulty for users to achieve TL1+.
If the functionality of these settings are kept the same (and assuming it is the same case for max replies in first day), I think it could be good to rename them to be consistent with the other ‘newuser’ settings. As well as update the message to users as you mentioned and the setting descriptions.
max topics in first day -> newuser max topics per day
max replies in first day -> newuser max replies per day
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00062.warc.gz
|
CC-MAIN-2022-33
| 1,715
| 13
|
http://p0pc0rnluv.deviantart.com/
|
code
|
I have out my ERiSol FF on Hiatus because.. I'm lazy..
I'm working on a multichapter DaveXJohn Fanfiction ((Though I prefer DirkXDave and JakeXJohn)) called Cooler than me.
Anddd I finished the short and shitty chapter one
I'll be posting after the edits are done
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719192.24/warc/CC-MAIN-20161020183839-00344-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 263
| 4
|
http://www.math.ist.utl.pt/~padao/
|
code
|
Departamento de Engenharia Informática
Instituto Superior Técnico
Avenida Professor Cavaco Silva,
2744-016 Porto Salvo, PORTUGAL
Main Building, Office 2N3.3 (2nd Floor)
Tel. +351 21-423-3260 (ext. 5060)
Fax. +351 21-423-3252
Mathematics Building, Office P6 (2nd Floor)
I am an Assistant Professor at the Department of Computer Science and Engineering (DEI) of IST, Technical University of Lisbon (UTL).
Coordinator of ComFormCrypt Project.
Publications and Talks.
ISI ResearcherID B-8422-2008
I am the organizer of the SQIG Information Security Seminar. Have a look at the upcoming sessions.
Here is a list of my MsC thesis proposals for the academic year 2014/2015. Have a look.
I am on sabbatical leave until September 2014.
Past teaching can be found here.
I was born in Lisbon, Portugal, in January 1980. I graduated in Applied Mathematics and Computation (LMAC) at IST in July 2002. My Diploma Thesis within the topic Electronic money was supervised by Professor Paulo Mateus. In December 2006, I got my PhD in Mathematics, also from IST, with the thesis Formal Methods for the Analysis of Security Protocols. My supervisors were Professor Paulo Mateus and Professor Andre Scedrov (Department of Mathematics of the University of Pennsylvania).
From January 2004 to February 2005, I was a visiting student at the Department of Mathematics of the University of Pennsylvania. I worked under the supervision of Professor Andre Scedrov.
In the Fall 2005, I was a Research Intern at Microsoft Research Cambridge working under the supervision of Cédric Fournet. We worked on secure implementation of Process Algebras and their Computational Soundness.
In Spring 2008 and Spring 2009 I worked as an invited researcher at the Centre de Recherche Commun INRIA-Microsoft Research in Paris.
I am a member of SQIG at IT (formerly at CLC) since November 2001.
CETC 2013 -
Conference on Electronics, Telecommunications and Computers (PC Member)
INForum 2013-CCS Track - Simpósio de Informática - Computer Systems and Communications Security Track (Track Chair)
INForum 2012-CCS Track - Simpósio de Informática - Computer Systems and Communications Security Track (Track Chair)
CETC 2011 - Conference on Electronics, Telecommunications and Computers (PC Member)
INForum 2011-CCS Track - Simpósio de Informática - Computer Systems and Communications Security Track (PC Member)
INForum 2010-CCS Track - Simpósio de Informática - Computer Systems and Communications Security Track (PC Member)
INForum 2009-CCS Track - Simpósio de Informática - Computer and Communications Security Track (PC Member)
QuEBS 2009 - Workshop on Quantum Effects in Biological Systems (Organising Committee)
SINO 2007 - 3ª Conferência Nacional sobre Segurança Informática nas Organziações (PC Member)
LQCIL'07 - Workshop on Quantum Cryptography and Security (Organising Committee)
WITS'07 - 7th International Workshop on Issues in the Theory of Security (PC Member)
Some interesting links
Last update: 16-Oct-2011
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462751.85/warc/CC-MAIN-20150226074102-00162-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 2,995
| 35
|
https://www.fr.freelancer.com/projects/graphic-design/logo-design-8539875/
|
code
|
I'm creating a website dedicated to marine services, rental of recreational boats and everything related to the sector. The name of the web will be:
"Blablamar Marine Services"
Since this is a startup, the budget is minimal.
Thank you to let me get drafts of proposals and your portfolio to make a decision.
Thanking you for your attention; best regards:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948522999.27/warc/CC-MAIN-20171213104259-20171213124259-00030.warc.gz
|
CC-MAIN-2017-51
| 354
| 5
|
https://ireneli.eu/2015/11/25/python-02-interacts-with-internet/
|
code
|
Transport Control Protocol..Works on the transport layer.
TCP port numbers…
# Sockets in Python mysock.connect(('www.py4inf.com',80)) mysock.send('GET http://py4inf.com/code/romeo.txt HTTP/1.0\n\n') while True: data = mysock.recv(512) if( len (data) &amp;lt; 1) : break print data mysock.close()
HTTP/1.1 200 OK
Date: Mon, 09 Nov 2015 21:19:27 GMT
Last-Modified: Fri, 07 Aug 2015 16:39:14 GMT
Cache-Control: max-age=604800, public
Access-Control-Allow-Headers: origin, x-requested-with, content-type
But soft what light through yonder window breaks
It is the east and Juliet is the sun
r sun and kill the envious moon
Who is already sick and pale with griefSocket is a low level ayer.
(It keeps the head info)
import urllib fhand = urllib.urlopen('http://py4inf.com/code/romeo.txt') for line in fhand: print line.strip()
Just like opening a file.
Parsing HTML with BeautifulSoup lib
Regx is for parsing HTML. Or, the easy way is to use “Beautiful Soup”.
place the BeautifulSoup.py in the same folder with your other python code.
(I am using version 4.1)
unzip the file, use command to install:
>> Python setup.py install
if you are using pydev in eclipse, you will find it automatically detects the changes.
Following the code:
import urllib from bs4 import BeautifulSoup url = raw_input('Enter - ') html = urllib.urlopen(url).read() soup = BeautifulSoup(html,"html.parser") #for older versions, it should be: soup = BeautifulSoup(html) tags = soup('a') for tag in tags: print tag.get('href',None)
The function is to find all hyperlink tags, and get urls of each.
Enter – http://www.dr-chuck.com/
Out of topic:
This is the 20th post of my blog. I am thinking that I will not be a serious blogger, well, not only talk about techniques.
Registered another module Regression Models, but did not have time to start learning seriously. (Winter makes people lazy…)
Busy with preparing a two-week business trip, like visas (wtf, passport courier fees are killing me) and tickets. Will spend 1 week for my holiday during December and then back to work. Hopefully I will survive the whole winter, with more better blogs.
Thank you all.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00234.warc.gz
|
CC-MAIN-2023-14
| 2,140
| 31
|
https://appmysite.com/pricing/
|
code
|
I was wondering how to turn my website into an app and found a solution with AppMySite. Not only was I able to convert my e-commerce website into a full-blown app within minutes but also publish them instantly on App Store and Play Store. Looking forward to creating more apps using this amazing tool!
Jan 21, 2019
I used AppMySite app builder create an app all by myself. I have very limited technical knowledge but their platform is extremely user-friendly. I built and published an awesome Android and iOS app without any coding for my clothing website. Definitely recommend it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964360951.9/warc/CC-MAIN-20211201203843-20211201233843-00417.warc.gz
|
CC-MAIN-2021-49
| 581
| 3
|
https://forums.warpportal.com/index.php?/topic/239064-could-you-stop-spamming-dead-branch-on-spore-map/
|
code
|
Hey whoever you are -_-Stop spamming the dead branch on spore map cause is annoying F.... Trying to level my low level alt on spore [Snip]. Sometimes i wish this GM would block usage of Dead Branch on Specific Maps .
Edited by VModCinnamon, 12 August 2018 - 12:53 AM.
Mod Edit: Removed, inappropriate language.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528058.3/warc/CC-MAIN-20190419201105-20190419223105-00162.warc.gz
|
CC-MAIN-2019-18
| 310
| 3
|
https://www.pinterest.com/lovesteaching/yea-literacy/
|
code
|
This is a set of 40 bookmarks to use when conferencing during Reader's Workshop. I will reteach the concept represented on a bookmark during the conference as a mini lesson. Then I give the bookmark to the student to use to help keep them focused on what they are suppose to be working on. As they master each skill the return the bookmark for a sticker (that they place in their Reader's Notebooks) and then will receive a new bookmark to work on. It has been a huge motivator in my class.
This is a cool way to help with creating book groups based on guided reading levels. Each group would have their own tub filled with different resources. Once a group has finished their book I will refill the tub with new books.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549429417.40/warc/CC-MAIN-20170727182552-20170727202552-00570.warc.gz
|
CC-MAIN-2017-30
| 719
| 2
|
https://apkpure.com/space/com.celltick.space.dynamictheme
|
code
|
This Space theme is a free, interactive wallpaper, designated for the Start application (which is FREE).
By downloading this live theme, you agree to our terms and conditions available here: http://startscreen.com/terms-conditions/
Start needs to be installed on your phone to use this theme. If you don't have Start installed, please download it here https://play.google.com/store/apps/details?id=com.celltick.lockscreen&hl=en
Make sure to rate us and let us know what you think! For any question or request for support, contact us at firstname.lastname@example.org
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247497858.46/warc/CC-MAIN-20190221010932-20190221032932-00627.warc.gz
|
CC-MAIN-2019-09
| 566
| 4
|
http://www.jumpinsport.com/jobs/football-analytics-coordinator-houston-texans-1976
|
code
|
Football Analytics Coordinator - Houston Texans
Demonstrated strong mathematical and computational acumen.
Experience in writing SQL queries and reports utilizing SQL Server 2008 or later strongly preferred.
Working knowledge in data discovery and new data acquisition.
Working knowledge of scripting languages and of working with large data sets.
Demonstrated working knowledge of statistics and commonly used statistics and analytical tools, econometrics, data visualization and football analytics.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917126237.56/warc/CC-MAIN-20170423031206-00483-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 500
| 6
|
https://goldenberglab.ca/people.html
|
code
|
Dr Goldenberg is a Senior Scientist in Genetics and Genome Biology program at SickKids Research Institute, recently appointed as the first Varma Family Chair in Biomedical Informatics and Artificial Intelligence. She is also an Associate Professor in the Department of Computer Science at the University of Toronto, faculty member and an Associate Research Director, Health at Vector Institute and a fellow at the Canadian Institute for Advanced Research (CIFAR), Child and Brain Development group. Dr Goldenberg trained in machine learning at Carnegie Mellon University, with a post-doctoral focus in computational biology and medicine. The current focus of her lab is on developing machine learning methods that capture heterogeneity and identify disease mechanisms in complex human diseases as well as developing risk prediction and early warning clinical systems. Dr Goldenberg is a recipient of the Early Researcher Award from the Ministry of Research and Innovation and a Canada Research Chair in Computational Medicine. She is strongly committed to creating responsible AI to benefit patients across a variety of conditions.
Alex graduated with a Master's degree in computer science from U of T in 2019, and is currently pursuing a PhD. Alex is interested
in building machine learning models that have stable performance once deployed in the real world. The unanticipated influence of model
predictions on the outcomes of future samples, as well as the complex trust dynamics which occur between human users and ML models are
his primary focus. Alex believes that to safely harness the power of AI, one must be able to detect when predictions are no longer
reliable, and determine how to optimally update models on frequently shifting data streams.
Awards: NSERC CGS-D
Hidden Risks of Machine Learning Applied to Healthcare
Towards Robust Classification Model by Counterfactual and Invariant Data Generation
Transparency and reproducibility in artificial intelligence
Chun-Hao (Kingsley) is a 5-th year PhD student in Computer Science at University of Toronto with Professor Anna Goldenberg.
His main research works include Interpretability, Robustness, and application to Healthcare. He has worked as intern in Google,
Microsoft and Facebook.
Lauren Erdman is the Project Manager for SickKids Hospital’s new Data Science team and a PhD student in Computer Science at University of
Toronto under the supervision of Anna Goldenberg. Previously she completed a MSc in Computer Science and a MSc in Biostatistics at
University of Toronto under the supervision of Anna Goldenberg and Lisa Strug, respectively. Her research is focused on developing and
applying machine learning methods primarily for data integration and improved translational discovery in the areas of population genetics,
genome biology, and complex disease.
Google Scholar: https://scholar.google.com/citations?user=bSKEpp8AAAAJ&hl=en
Abhishek Moturu received his HBSc in 2019 from the University of Toronto (Trinity College) where he pursued a Mathematics major and a
Computer Science specialist. He received his MSc in Computer Science at the University of Toronto in 2021, working with Dr. Babak Taati
on automated pain detection for older adults with dementia at the UHN KITE Research Institute. At the Goldenberg Lab, he is working on
pediatric cancer surveillance in whole-body MRIs. During his PhD, his interests lie in developing theory and
applications for deep learning and federated learning in the healthcare setting. In his free time, Abhishek enjoys driving,
film, cooking, and tennis. He is currently also an Academic Don for Computer Science, Mathematics, and Physics at Trinity College.
Awards: NSERC USRA ($6K), CIHR CGS-M ($17.5K), QEII-GSST ($15K)
Google Scholar: https://scholar.google.ca/citations?user=pr333dYAAAAJ&hl=en
Sujay is enrolled in the MD/PhD program at the University of Toronto and is pursuing his PhD in computer science under the supervision of
Drs. Anna Goldenberg and Sebastian Goodfellow. His research interests lie at the intersection of machine learning and medicine- specifically,
working with time-series data to learn about patient states from in-hospital as well as out-patient datasets.
Awards: Ontario Graduate Scholarship 2021-2022 (15K), SickKids Restracomp PhD Scholarship (26K/year)
Recent interests: wearable sensors
Google Scholar: https://scholar.google.com/citations?user=8YrBnPsAAAAJ&hl=en
Dustin is a PhD candidate with Dr. Anna Goldenberg and Dr. Michael Wilson. He develops bioinformatic tools to integrate and interpret
transcriptomic analysis. He then applies those tools with others to interrogate pubertal dynamics across puberty in different species.
In his spare time, he likes to play guitar and climb rocks.
Awards: NSERC CGS-D
Single-cell mapper (scMappR): using scRNA-seq to infer the cell-type specificities of differentially expressed genes
Google Scholar: https://scholar.google.com/citations?user=029JbjsAAAAJ&hl=en
Valli graduated with an Honours Bachelor of Science degree in Biomedical Science & Computer Science from Western University.
She is currently pursuing a PhD in Medical Biophysics at the University of Toronto to further her interests at the intersection of
healthcare and computer science. Her current projects involve explaining clinical heterogeneity of cancer predisposition syndromes
by analyzing complex genomics/epigenomics data and applying machine learning algorithms.
Google Scholar: https://scholar.google.com/citations?user=029JbjsAAAAJ&hl=en
Sana is a PhD student in the department of Computer science. Her research focus is on the challenges of modelling medical time
series, from unsupervised representation learning to explainability. She is currently an Apple scholar in AI/ML fellow and
was previously a CIHR health system impact fellow. In her free time, Sana enjoys baking, and playing basketball and tennis.
Awards: CIHR health system impact fellowship, Apple scholars in AI/ML
Unsupervised Representation Learning for Time Series with Temporal Neighborhood Coding
What went wrong and when? Instance-wise feature importance for time-series black-box models
What clinicians want: contextualizing explainable machine learning for clinical end use
Prediction of cardiac arrest from physiological signals in the pediatric ICU
Google Scholar: https://scholar.google.com/citations?user=OZDGXgwAAAAJ&hl=en
Kopal is a Masters student in Computer Science at the University of Toronto. She graduated with a BASc in Biomedical Engineering, Co-op from the University of Waterloo. She spent the last 2 years of her undergrad as a researcher at the Broad Institute developing computational methods and interactive visualization tools for analysis of large-scale population genetics and single-cell transcriptomics data. She is broadly interested in data science and machine learning with applications across healthcare and medicine. Outside of the lab, Kopal enjoys digital art, badminton, and baking.
Gabi is an undergraduate student in bioinformatics and computational biology at the University of Toronto. She’s currently
doing her Advanced Special Project in Bioinformatics with Lauren Erdman. Her research interests include human-computer interaction,
data engineering, and robust data design. She wants to learn more about designing data systems that take into account its users’
end goals, applications in machine learning, and clinical data visualizations.
Awards: DeepMind Scholarship
Aslesha is a Master's student in Applied Computing at the University of Toronto and a Vector Scholarship in
Artificial Intelligence Recipient 2021-22. She graduated with an Honours Bachelor of Science degree with majors
in Computer Science & Physics and a minor in Mathematics from the University of Toronto. Her research interests
include causality and machine learning and its application in healthcare. She is also broadly interested in
explainability and fairness in AI and likes watching movies and biking in her spare time.
Awards: Vector Scholarship in Artificial Intelligence
Parinita is an undergraduate student in computer science and statistics at the University of Toronto.
She's currently doing her 4th year research project in Computer Science with Lauren Erdman. She is
interested in the applications of machine learning in medicine. She aspires to pursue a degree in medicine;
she hopes to combine her background in computer science and her future training in medicine to improve
healthcare delivery and medical practice. In her free time, Parinita enjoys baking, swimming, and listening to podcasts.
Stan is an undergraduate, studying computer science and bioinformatics at the University of Toronto.
He is currently working with Lauren Erdman to improve prediction of obstructive hydronephrosis by integrating
the sequence of ultrasounds taken over recurring hospital visits. He is broadly interested in problems that
arise in data collection/preprocessing and modeling in a biomedical context. In his free time, he enjoys
playing video games and table tennis.
Xi recently graduated with a BSc from the University of Toronto in Computer Science and Mathematics, focused in Computer Vision
and Artificial Intelligence. He has been working with Sana Tonekaboni on the deployment of machine learning models in the ICU,
as well as with Alistair Johnson on de-identifying medical records. He enjoys seeing AI in use in healthcare and wishes to contribute
to the community. He is an avid art and film enthusiast, and loves walking around the city to capture hidden aesthetics on camera.
Awards: NSERC USRA
Addison grew up in Portland Maine, USA, and is an undergraduate researcher studying Computer Science
and Math at the University of Toronto. His current projects are in the area of representation learning
for medical time series data. He’s keen to explore the different ways modern deep learning methods can
be used to have profound impacts on patient lives. In his free time, Addison enjoys running, listening to
podcasts, and mentoring younger students.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710710.91/warc/CC-MAIN-20221129164449-20221129194449-00043.warc.gz
|
CC-MAIN-2022-49
| 10,044
| 85
|
https://mpsocial.com/t/twitter-captchas-impossible-to-resolve/140758
|
code
|
I bought a bunch of new accounts and got a captcha on all accounts, what I cannot resolve.
I use VPS so I cannot use the sounds option for human verification, or do you know how?
It ask for a puzzle (check the picture with the wrong shadow) in incredible 15 steps !
And its impossible to resolve. It always says error at the end after 15 rounds.
Please how can I resolve this? Help me
Do you face the same issues?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662604794.68/warc/CC-MAIN-20220526100301-20220526130301-00045.warc.gz
|
CC-MAIN-2022-21
| 413
| 6
|
https://nakkaya.com/2010/03/23/steganography-with-clojure-hiding-text-in-images/
|
code
|
Steganography with Clojure - Hiding Text in Images
Steganography is the process of hiding data in other data so no one apart from the sender and the receiver knows the existence or transmission of the message. It allows us to send a message within a seemingly unimportant message or something that does not attract attention.
Steganography has been used throughout the history, some old school methods include,
- Greeks and wax covered tablets
- Histiaeus and the shaved head
- Invisible inks in WWII
This post will cover hiding textual data in images using LSB (Least Significant Bit) technique. Each pixel in an image is a 32 bit int, split into 8 bit values representing alpha, red, green, blue.
Changing least significant bit in each of these four values would allow minor variations in color and it should be unnoticable to the naked eye, even when noticed it can easily be mistaken for flaws in the quality of the picture. So by changing last bit of all four values we can encode 4 bits of data per pixel. (Not all image formats support alpha for those you can encode 3 bits per pixel.)
(ns steganography (:use clojure.contrib.seq-utils) (:import (javax.imageio ImageIO) (java.io File))) (defn bits [n] (reverse (map #(bit-and (bit-shift-right n %) 1) (range 8))))
Given a byte bits will return a sequence of bits that represent that byte,
steganography=> (bits (int \C)) (0 1 0 0 0 0 1 1)
numb reverses the process given a sequence of bits, you get the original byte,
(defn numb [bits] (BigInteger. (apply str bits) 2))
steganography=> (char (numb (bits (int \C)))) \C
Using set-lsb we will encode one bit per a r g b value, given a byte and one bit from the data, we set the LSB to the bit given,
(defn set-lsb [bits bit] (concat (take 7 bits) [bit]))
steganography=> (set-lsb (bits 255) 0) (1 1 1 1 1 1 1 1) => (1 1 1 1 1 1 1 0)
We take the string we want to encode, pad it with ";" which will indicate we have reached the end of our message while decoding, then turn it into a sequence of bits,
(defn string-to-bits [msg] (flatten (map #(bits %) (.getBytes (str msg ";")))))
steganography=> (string-to-bits "cb") (0 1 1 0 0 0 1 1 0 1 1 0 0 0 1 0 0 0 1 1 1 0 1 1)
Next using this bit sequence we created, we match every four bits to a coordinate,
(defn get-argb [img cord] (let [[x y] cord clr (.getRGB img x y)] [(bit-and (bit-shift-right clr 24) 0xff) (bit-and (bit-shift-right clr 16) 0xff) (bit-and (bit-shift-right clr 8) 0xff) (bit-and clr 0xff)])) (defn set-argb [img cord color] (let [[x y] cord [a r g b] color c (bit-or (bit-shift-left a 24) (bit-or (bit-shift-left r 16) (bit-or (bit-shift-left g 8) b)))] (.setRGB img x y c))) (defn match-bits-coords [bits img] (partition 2 (interleave (partition 4 bits) (take (/ (count bits) 4) (for [x (range (.getWidth img)) y (range (.getHeight img))] [x y])))))
steganography=> (match-bits-coords (string-to-bits "c") (ImageIO/read (File. "drive.png"))) (((0 1 1 0) [0 0]) ((0 0 1 1) [0 1]) ((0 0 1 1) [0 2]) ((1 0 1 1) [0 3]))
We iterate over this bit coordinate sequence, for each pixel, we retrieve its argb value, match each a r g b vals with a bit, then encode it using set-lsb and set this new color we calculated for the pixel,
(defn set-pixels [img d] (doseq [[data cord] d] (let [color-bit (partition 2 (interleave (get-argb img cord) data)) color (map #(let [[n b] %] (numb (set-lsb (bits n) b))) color-bit)] (set-argb img cord color))))
In order to encode data, we read the image, match bits to coordinates, iterate through the pixels calculating and setting new colors and finally writing the image,
(defn encode [fname msg] (let [img (ImageIO/read (File. fname)) data (match-bits-coords (string-to-bits msg) img)] (set-pixels img data) (ImageIO/write img "png" (File. (str "encoded_" fname)))))
(encode "drive.png" "Attack At Down!!")
Extracting data we encoded is much simpler,
(defn get-pixels [img] (map #(get-argb img %) (for [x (range (.getWidth img)) y (range (.getHeight img))] [x y])))
steganography=> (take 3 (get-pixels (ImageIO/read (File. "encoded_drive.png")))) ([0 255 254 254] [0 254 254 255] [0 255 255 255])
First build a sequence of argb values for each pixel,
(defn split-lsb [data] (map #(last (bits %)) data))
after flattening this sequence, we extract least significant bit from each byte giving us a sequence of 0's and 1's. Our original string as a bit string,
(defn decode [fname] (let [img (ImageIO/read (File. fname)) to-char #(char (numb (first %)))] (loop [bytes (partition 8 (split-lsb (flatten (get-pixels img)))) msg (str)] (if (= (to-char bytes) \;) msg (recur (rest bytes) (str msg (to-char bytes)))))))
Now all we have to do is partition that sequence into groups of 8, each representing a char. We just keep casting bits into a char until we read ";" which denotes we have reached the end of our message. Okay, enough typing let's see it in action, assuming we want to encode "Attack At Down!!".
Image before steganography,
steganography=> (encode "drive.png" "Attack At Down!!") steganography=> (decode "encoded_drive.png") "Attack At Down!!"
Image after steganography,
You are not limited to encoding text in images, you can embed images within images, although I used 4 bits per pixel if you think you can get away with more degradation in quality you can embed more bits per pixel.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00092-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 5,295
| 40
|
https://eznc.org/CMS/Wetenschappelijk/show.do?ctx=25145,169648,622066
|
code
|
Assimilation efficiency and gut passage time in an African elapid snake
We measured apparent assimilation efficiency (AAE) and gut passage time in the African elapid snake Hemachatus haemachatus under laboratory conditions. AAE was dependent on food type, being 89.8% when snakes were fed frogs and 82.8% when fed mice.
Differences in AAE for different meal types could be ascribed to the indigestible hair in mouse meals because differences were lost once this component of the mouse meals was removed from the calculation. AAE did not depend on snake body mass and there was no significant difference between AAE measures made at 20°C and 27°C for mouse meals. Gut passage time was 25% faster at 27°C than at 20°C, but was not affected by food type or snake body mass. Larger meals took longer to digest. Thus, H. haemachatus appears to offset reduced digestive performance at lower temperatures by retaining food in the gut for longer when at lower body temperatures (Tbs). These results fit an emerging pattern in snakes whereby digestive efficiency is generally high and insensitive to Tb over the selected thermal range, but may become dependent at lower Tbs when digestion is eventually arrested. The rate of digestion is highly temperature-sensitive and is fastest in the selected Tb range. Diet appears to affect digestive efficiency owing, mainly, to the presence of indigestible components such as hair. Using a comparative framework, venom does not appear to improve digestion for this species, at least over the temperature range tested, relative to other snake species in the literature.
Title: Assimilation efficiency and gut passage time in an African elapid snake, Hemachatus haemachatus.
Authors: Alexander GJ, Hanrahan SA and Mitchell D.
Source: African Journal of Herpetology (2012) volume 61, issue 1
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154878.27/warc/CC-MAIN-20210804142918-20210804172918-00427.warc.gz
|
CC-MAIN-2021-31
| 1,825
| 6
|
https://lists.debian.org/debian-kernel/2010/04/msg00785.html
|
code
|
Stephen Mulcahy reported a regression in forcedeth at <http://bugs.debian.org/572201>. The system information and some diagnostic information can be found there. Anyone able to help? Ben. stephen mulcahy wrote: > When running linux-image-2.6.32-trunk-amd64, the network stops > responding if large amounts of traffic are transmitted/received. Running > ifdown eth0 followed by ifup eth0 restores operation of the network. > There are no errors relating to this failure logged in /var/log that I > could see. > > Downgrading to linux-image-2.6.30-2-amd64 results in a stable network. > Not sure if this is a forcedeth specific problem or a general problem in > the newer kernel (I have seen problems with forcedeth on other > distro/kernel combinations). > > Happy to run further diagnostics to tie this down if you let me know > what to run. -- Ben Hutchings Once a job is fouled up, anything done to improve it makes it worse.
Description: This is a digitally signed message part
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861981.50/warc/CC-MAIN-20180619080121-20180619100121-00248.warc.gz
|
CC-MAIN-2018-26
| 980
| 2
|
https://community.anaplan.com/discussion/150208/7-2-3
|
code
|
I'm stuck trying to map this import. Below is an image of how I was trying to map it. If anyone knows how to map this correctly I would appreciate it.
Hey, You created the model dimension wrong. There's no time dimensions in SYS08 module.
SO create the SYS08 module with only #E2 employee dimension remove the Time.
Then import and map the other two as you did correct. there'll be no time mapping.
Hope it helps.
Hi @jagadishdash ,
Thanks for your response. I have removed the time mapping and left the other two as I did in the original picture. However, when I run the import, I'm getting this error below:
Any help on this is appreciated!
Please share your module screenshot, mapping screenshot and error screenshot.
To know where you're going wrong.
Here is the target mapping page:
And here is the mapping tab so that the date reads MMDDYYYY:
The error I'm getting is the one shown in my previous response.
No, your mapping should be YYYYDDMM
You can see in the right side you need to map like that. YearDateMonth
I am still getting this error even after correcting the date format.
Please share your module screenshot.
Here are screenshots of the whole process:
You mistake in module creation. You took wrong dimension as department. You need to take the dimension of #E2 employee list.
I'm not sure what you mean.
As i can see your module screenshot you took module dimension as Department. But for SYS08 Employee Details module you need to take dimension as E2 Employee. so change the dimension to E2 employee and do the import process.
see the below pic. applies to should be E2 employee. You see your blueprint view its department. so just click that applies to 3 dot and change it to E2 employee and then go for import.
Hope now you got, where you did mistake !
So after changing that dimension to E2 Employee, I'm still getting this error message below:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100602.36/warc/CC-MAIN-20231206162528-20231206192528-00036.warc.gz
|
CC-MAIN-2023-50
| 1,866
| 24
|
https://www.ournerd.com/tag/virus/
|
code
|
WanaCrypt0r Ransomware is a computer worm that encrypts information on an infected computer and attached drives and demands a ransom to recover the data. In the past 24 hours this worm has been spotted in almost 100 countries with tens of thousands of reported infections. The infections have been reported in hospitals, large corporations, banks, and utilities.
Tech support scams have been around since about 2008, but it seems like there has bee a uptick in the frequency that they are happening these days. In today’s post I will go over what these scams are, how to spot them, and what to do about them.
This is just a quick reminder. Do NOT ever open e-mail attachments, unless you personally know who the sender is. Even if you do know the sender, do not open the attachment unless you were expecting it. In fact, I would recommend not ever opening an attachment to an email.
Let me tell you a true story that happened a few weeks ago. A customer of ours called with an issue with their Quickbooks data. Their company file had become corrupted and, unfortunately, their Qiuckbooks backup was out of date.
We have all heard it, or perhaps, even said it, "my computer crashed!!!". What exactly does that mean? Did the computer literally drive out of your house, run the stop sign at the corner and run into another computer out on a joy ride? I mean, we all know computers have a mind of their…
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517018.29/warc/CC-MAIN-20220517063528-20220517093528-00117.warc.gz
|
CC-MAIN-2022-21
| 1,403
| 5
|
https://www.mongodb.com/community/forums/t/help-activity-log-schema-for-different-resource-types/142577
|
code
|
in my IoT application i want to make activity logs for some resources in my application
user A added a new device named XXX on 2022-01-20
user A deleted a device on 2022-01-21
an email was sent by the system to email@example.com because of an XXX alarm on 2022-01-22
and so on…
the actor of the activity may be the user or the application itself
but it would help to know what is the amount of those messages, and if you want them
to be kept in MongoDB or just log them somewhere?
I could advise you generally use triggers/change stream (only on replicaSet).
so whenever an operation is coming you could create an audit message by
the operation type: insert/ update / delete… and the value,
change stream supports for example update description and containing the entire document that has been changed.
this could lead to a more robust architecture in which you can send those messages to a queue,
which could be combined with several services publishing to the same queue also.
so your audit messages could be delivered from the trigger/change stream on the collection
and your “email was sent…” messages could be published from others.
of course that the consumer of this queue could create such a log as you wish.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00563.warc.gz
|
CC-MAIN-2023-14
| 1,226
| 17
|
http://research.microsoft.com/en-us/people/kuntan/
|
code
|
I am now managing the Wireless and Networking Group at MSR Asia. I am recently working in datacenter networking. In the past, I have been working in various areas in the networking field. Previously, I designed the Compound TCP protocol, which is in latest Windows Operating Systems. I also led the development of Sora, a high-speed software radio platform based on general purpose multi-core processor. I have broad interests in networking, data communication and wireless technologies. You can find a short bio of me here.
Wireless and Networking Group is HIRING! We have openings for Researcher positions and Engineers. If you are passionate in networking technology, please apply by sending me your CV!
We also have research intern opens. If you are a self-motivated student and want to work on wireless networking research, please also contact me via email.
- Qing Yang, Xiaoxiao Li, Hongyi Yao, Ji Fang, Kun Tan, Wenjun Hu, Jiansong Zhang, and Yongguang Zhang, BigStation: Enabling Scalable Real-time Signal Processing in Large MU-MIMO Systems, in ACM SIGCOMM, ACM, August 2013.
- Kun Tan, Haichen Shen, Jiansong Zhang, and Yongguang Zhang, Enable Flexible Spectrum Access with Spectrum Virtualization, in IEEE DySpan , IEEE, October 2012.
- Jiansong Zhang, Haichen Shen, Kun Tan, Ranveer Chandra, Yongguang Zhang, and Qian Zhang, Frame Retransmissions Considered Harmful: Improving Spectrum Efficiency Using Micro-ACKS, in ACM MobiCom, ACM, August 2012.
- Zheng Zeng, Yan Gao, Kun Tan, and P. R. Kumar, CHAIN: Introducing Minimum Controlled Coordination into Random Access MAC, in The 30th IEEE International Conference on Computer Communications (INFOCOM 2011), IEEE, April 2011.
- Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, and Geoffrey M. Voelker, Sora: high-performance software radio using general-purpose multi-core processors, in Communications of the ACM , ACM, January 2011.
- Kun Tan, Ji Fang, Yuanyang Zhang, Shouyuan Chen, Lixin Shi, Jiansong Zhang, and Yongguang Zhang, Fine Grained Channel Access in Wireless LAN, in ACM SIGCOMM 2010, Association for Computing Machinery, Inc., August 2010.
- Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang, Mi Chen, and Geoffrey M. Voelker, SAM: Enabling Practical Spatial Multiple Access in Wireless LAN, in The 15th Annual International Conference on Mobile Computing and Networking (ACM Mobicom2009), Beijing, China, Association for Computing Machinery, Inc., September 2009.
- Kun Tan, Jiansong Zhang, Ji Fang, He Liu, Yusheng Ye, Shen Wang, Yongguang Zhang, Haitao Wu, Wei Wang, and Geoffrey M. Voelker, Sora: High Performance Software Radio Using General Purpose Multi-core Processors (Best Paper Award), in 6th USENIX Symposium on Networked Systems Design & Implementation (NSDI) 2009 , USENIX, April 2009.
- Chuanxiong Guo, Haitao Wu, Kun Tan, Lei Shi, Yongguang Zhang, and Songwu Lu, DCell: A Scalable and Fault-Tolerant Network Structure for Data Centers, in SIGCOMM08, Association for Computing Machinery, Inc., August 2008.
- Chunyi Peng, Guobin Shen, Yongguang Zhang, Yanlin Li, and Kun Tan, BeepBeep: A High Accuracy Acoustic Ranging System using COTS Mobile Devices, in SenSys 07, 2007.
- Kun Tan, Jingmin Song, Qian Zhang, and Murari Sridharan, A Compound TCP Approach for High-speed and Long Distance Networks, in INFOCOM 06, IEEE, 2006.
Email: kuntan (at) microsoft (dot) com
Phone: +86-10-59173120 (Office)
- ClickNP is accepted in SIGCOMM'16! Congrates to the team!
- FUSO is accepted in ATC'16! Congrates to the team!
- Sora is fully open in GigHub
- BigStation paper is accepted in SIGCOMM 2013! Congrates to the team!
- Sora SDK version 2.0 is available!
- Sora tutorial available in DySPAN 2012. Register early if you are interested.
- Spectrum Virtualization Layer paper is accetped in DySpan 2012
Recent external activities
TPC member, ACM SIGCOMM 2011,2013~2015
TPC member, ACM HotNets, 2015
TPC co-chair, SIRF 2013, joint workshop with SIGCOMM 2013
- TPC member, ACM Mobicom 2009~2013
- TPC Lead, IEEE SECON 2013
- TPC member, USENIX NSDI 2012
- TPC member, IEEE SECON 2011
- TPC member, IEEE DySPAN 2011, 2012
- TPC member, ACM Mobihoc 2009, 2010
- TPC member, WoWMoM 2010
- Publicity co-chair, IEEE SECON 2010
- TPC co-chair, MobiArch '09
- Sora: high performance software radio platform using general purpose multi-core processor.
- Fast handoff of IEEE 802.11 WLAN
- Dichotomy: a practical architecture to exploit channel diversity
- Multichannel Overlay MAC
- SNR-Guided Rate Adaptation
- Compound TCP
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464050955095.64/warc/CC-MAIN-20160524004915-00084-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 4,509
| 42
|
http://blog.hazaveh.net/2013/09/act-pro-and-dont-let-them-the-chance-to-abuse/
|
code
|
There is this problem in web development life that a client comes to you and describe his project and you quote them based on their description, well it seemed pretty normal for sure but the wired thing appears when the client finds new stuff that he wants or desired to be placed on the website! so in this kind of case you will be bullied to apply those changes as you’ve quoted them! well after having a bad experience with some unprofessional client I’ve found that there are some steps to be taken to prevent this:
You need to get a full documentation of their desired work! you need to force them to provide you an exact example in case they want to involve their ideas, recommendations or styles.
If the customer is not sure what he wants and there are no sources available to provide to you, you need to make one scheme for them and provide it to them fully detailed about the features! the best way is to quote them based on pages and features that you include! in this case the client won’t have have the intention of asking for more features which are not included in the quotation!
one of the most hurting things for web designers is that they give the client a favor! sometimes client ask for something small! then we do it for them freely! which is not in the quotation! that sucks! it will lead them to ask for more! as its our duty to get them done!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863516.21/warc/CC-MAIN-20180620085406-20180620105406-00491.warc.gz
|
CC-MAIN-2018-26
| 1,371
| 4
|
http://www.appbrain.com/app/ohyung-filesave-(fb-pic-saver)/com.ohyung.FileSave
|
code
|
Ohyung FileSave (FB Pic Saver)
You can save some file(like a picture) from shared menu in android app. ( like a facebook app. )
ex) Andoird Facebook App -> View some pics -> menu -> share -> Ohyung_FileSave -> find saved file on phone gallery.
Uninstall : Can't find App Drawer! -> Main -> Settings -> Applicantions -> Manage applications -> Ohyung_FileSave -> Uninstall
[2012-02-28] change icon file v188.8.131.52
[2012-02-28] first versiont released v1.0
test access to protected storage
modify or delete the contents of your USB storage
Add to list
Write the first review for this app!
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928754.15/warc/CC-MAIN-20150521113208-00321-ip-10-180-206-219.ec2.internal.warc.gz
|
CC-MAIN-2015-22
| 588
| 10
|
https://www.dk.freelancer.com/work/protect-file-delete/
|
code
|
...a Goland, C/C++ along with Golang if Go is to hard: 1: Scanning file from a scanner, set configuration like file out put extension, DPI, resolution Color type, file file or/and sequential name, file owner name, owner's departments, divisions and other info like that. 2. save the file to the directory configurated at step 1 and the data on the con...
Looking for a permanent remote programmer to work with me on regular projects (I am an ex-NASA engineer with 3 engineering degrees and 30+ years softw...hire' and all code etc. owned by us. MAY develop into a Long Term and/or partnership/equity arrangement. If you have questions, ASK. If I can't find the right candidate, I will delete the posting) :)
I have some old work that was done in pdf, which I've converted to MS Word but ...first sentence of each line for the chapters in the text also has a line (gap) that needs to be removed. Once I have a signed confidentiality agreement and noncompete to protect my intellectual property, I can easily send you the job and many more like it going forward.
It's that simple; add a logo and edit a phone number in a .PSD and .AI and that's the project.
I have an Android Studio ...contains layout and 7 java Class for some functions. If Export AAR Library with ProGuard the code is minimized but not obfuscated. I search for anyone who knows a way to protect the code from decompiling while still maintaining the possibility of using the library (functions and layout) in other android projects. Thanks.
I need an Amazon login interface (mailbox validation login or direct password login) without validation information! Amazon Product keyword home service, Amazon dif...need an Amazon login interface (mailbox validation login or direct password login) without validation information! Amazon Product keyword home service, Amazon differential delete service
ODOO 11. Fetch a record from Database. Create a record in Database Update a record in Database Delete a record in Database Search records in Database Get the Schema of a Table. Access rights message in Endpoint response. and other features...
I need a new job Portal website. Auth : firebase Auth Database : fi...Material Design Lite Options : Employer : sign up, login, forget password (Google Auth), post job, edit job, delete job, search resume with filters Employee : sign up, log in, forget password, post resume profile, edit resume profile, delete profile, search jobs with filters
...prepared to pay $100 once I like the look of it. I'd like you to 1. confirm my image will print well on their products 2. set prices so there's a $3 profit to me on each item 3. delete all products or collections or etc. already there, so the new logo product you're putting on is the only category or collection or whatever you call it 4. organize the site
...a message of our choice. The application must have following features as: Privacy protection Password protection in app: you can add request Password on starting app and protect your black list with password. Easy reset password with your BlackBerry ID password Block unwanted and spam calls and play an audio message of user's choice or Send calls to
...themes without footer credits 2. Use random Wordpress plugins (alternate between around 30-40 plugins with 2-3 plugins per site) 3. Each site must include a security plugin to protect Wordpress and a bots blocker. 4. Make all site look real and unique 5. Graphics must be included: Logo, banners, etc.. (Quality need to be acceptable) WE PROVIDE THE CONTENT
...Bio-metric recognition system in Raspberry Pi' and GSM module. The system will include: - A database containing already existing members who can enter the door. - Provision for add/delete member. - Supporting android app for Admin who remotely can give permission to a un-authorized person to enter or not. (Guest -> request -> admin -> approval/disapproval).
We are looking to delete/sanitize hard drives on a full EMC VMAX array and looking for someone who is an expert in EMC hardware setup/topology. We will be using a host computer/server with FC/SAS ports to connect to the DAE expansion chassis so that they are detected by the host computer/server as JBOD so that we can wipe the drives. WE are looking
...for building blocks. Users are allowed to create, delete and move the sub-folders. Users are allowed to create word document directly from Microsoft Word, save, delete and move them in the main folder and sub-folders. The software just reads the main folder and reflect its file structure and the file names in a checklist menu. Checklist menu can be updated
...and json file editing feature -need htmt drag & drop designer like [login to view URL] -both web app need to copy protected against copy and should only work on my site -need user registration and login with 30mb storage per login -login user should be able to store all files and able to download or delete it from account file manager -both
...while visiting the Beach, with the help of his Mum and Dad learning about applying Sunscreen, this allowed him to put on his 'shield' to protect his skin and gain superhero powers as CAPTAIN SUNSCREEN. To help protect his friends and family from being burnt from the Sun, Captain Sunscreen uses his superpowers to help his friends to also learn about protecting
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160620.68/warc/CC-MAIN-20180924165426-20180924185826-00150.warc.gz
|
CC-MAIN-2018-39
| 5,313
| 16
|
http://hardysusan.com/456-path-cook-delicious-spaghetti-zucchini-bolognese
|
code
|
Spaghetti Zucchini Bolognese.
Ingredients of Spaghetti Zucchini Bolognese
- It’s 5 of tomatoes.
- Prepare 1 of onion.
- It’s 1 of carrot.
- It’s 1-2 of celery.
- Prepare 1 of zucchini.
- You need 4-5 of mushroom.
- Prepare 1 of peace of garlic.
- You need Half of pound ground beef.
- You need 1 Tbs of olive oil.
- Prepare 1 Tbs of red wine.
- Prepare of salt.
- It’s of black pepper(ground).
- You need of nutmeg(ground).
- Prepare of Spaghetti.
Spaghetti Zucchini Bolognese instructions
- Peel onion,carrot and garlic.Tomatoes and zucchini should be washed well.Do not wash the mushrooms..
- Chop onion,carrot and celery.Cut tomatoes and zucchini in small piece.Crush the garlic and cut it..
- Heat 1Tbs olive oil and garlic.Add the beef and stir until color change.Then add carrot,celery,onion and mushroom with red wine and nutmeg.Stir them for a few minutes..
- Add tomatoes and zucchini with some salt and black pepper as you like, and cook them 30 minutes.Meantime Boil spaghetti..
- Place the spaghetti on a plate.Spoon the sauce on top.(Sometimes I also garnish with parmesan cheese).
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039617701.99/warc/CC-MAIN-20210423101141-20210423131141-00258.warc.gz
|
CC-MAIN-2021-17
| 1,102
| 22
|
http://www.conservativeunderground.com/forum505/showthread.php?52632-Texas-schools-punish-students-who-refuse-to-be-tracked-with-microchips&p=531291&mode=threaded
|
code
|
Originally Posted by linda22003
I'm hardly a "mark of the beast" type as mentioned in the article, but this is too Big Brother for me.
I know what you mean.
I'm saving my "mark of the beast" freakout for my employer, if the state ever starts requiring that we have RIFD chips (either in id cards or implants) so they can track our movements.
He hammered Teddy pretty good. :biggrin-new:
And then a battery pac explodes...:blue:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189680.78/warc/CC-MAIN-20170322212949-00629-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 427
| 6
|
http://www.backtrack-linux.org/forums/showthread.php?t=12514&goto=nextoldest
|
code
|
so i need to remove a windows password on my labtop with no cd-rom drive i cant rember the pass its from 5 years ago and its mine and i dont want to send it to shop as last resort only any way i can usb to it like software or somin or do i need to go get a usb cd rom drive and load up a live linix cd
Good friend of the forums
in order of simple ...
* got buy a cdrom from a mom and pop store for 5$
* copy ntpassword recover onto a USB stick and boot from that.
* rcrack or cain crack the hash
Although ive never done it myself, im pretty sure you can just do it from your usb stick, just need to put a bootable image on it and change your bios settings to start from usb drive.
I remember googling for it a while ago there loads of tutorials on google
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119642.3/warc/CC-MAIN-20170423031159-00243-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 754
| 8
|
https://www.advanced-ip.co.uk/industries/system-integrators/
|
code
|
Our work with System Integrators
Go further with Advanced IP
System integrators should only have to worry about putting in their solution and should not have to worry about the underlying infrastructure too much. We help you by taking care of the underlying transport i.e. servers and network so you can concentrate on your job without worrying about delivering your solution. We work with you every step of the way from designing the application flow all the way up to configuring each end-port on the network.
Get In Touch With Our Team Today
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00568.warc.gz
|
CC-MAIN-2022-33
| 544
| 4
|
https://discuss.streamlit.io/t/genetic-ancestry-visualization-app-deployed-on-heroku/2904
|
code
|
I’d like to share an app that allows users to visualize their personal genome data (23andMe, etc.) in the context of the 1000 Genomes Project samples. The app projects user’s genetic data into a three-dimensional feature-space and predicts users’ genetic ancestry using a k-nearest neighbors classifier.
It would be great to hear ideas for improvements from the Streamlit community.
check out the app:
and the source code:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347434137.87/warc/CC-MAIN-20200603112831-20200603142831-00247.warc.gz
|
CC-MAIN-2020-24
| 428
| 4
|
http://nblug.org/pipermail/talk/2001-April/000059.html
|
code
|
E Frank Ball
frankb at efball.com
Tue Apr 10 15:27:56 PDT 2001
} Actually, I hope that my RH 6.0 will work for an HP or Thinkpad.
} I also have StormLinux which I might try.....
I have SuSE 5.? on a very old HP 5000 laptop (Pentium 90)
and Mandrake 7.0 on a HP 3000, previously it had RedHat 6.0 on it.
I work at Agilent (the company previously known as HP) and I haven't
heard of any major problems with Linux on the recent HP laptops.
If you are going to the trouble of doing a fresh install I'd spring for
some newer install CDs. Storm declared bankruptcy and will likely die
off, so you won't be able to upgrade it. RH 6.0 is pretty old. I'd get
some 6.2 CDs. Also think about Mandrake, 7.1 lets you install the
Reiser file system so you don't have to fsck if it crashes. Something
laptops do now and then (batteries don't last very long). Mandrake is
pretty similar to RH (fewer bugs too). If you were keen on Storm then
go with Debian.
E Frank Ball efball at efball.com
More information about the talk
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701445114/warc/CC-MAIN-20130516105045-00097-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,007
| 19
|
http://manuelqjwku.ka-blogs.com/5764543/not-known-details-about-r-programming-assignment-help
|
code
|
a file or directory) are available by file.info. There are lots of strategies to find out if a file ‘exists’ (a file can
Besides its one-threaded processing restrictions, the R programming setting is undoubtedly an in-memory application. All data objects are stored in the device's RAM in the course of a presented session. This may limit the quantity of facts R is ready to Focus on at one particular time.
Fall-in homework help provided by high school learners / Estudiantes voluntarios de High School proveeran la ayuda free of charge y sin cita previa
Do you want volunteer provider hours? Will you be a highschool aged college student who wish to help more youthful Youngsters with their homework? End from the Library and ask for Tamecca Brewer.
This training course is for yourself if you'd like to find out R by executing This system is for you personally if you like enjoyable worries
Shiny is a completely new package deal from RStudio which makes it very uncomplicated to build interactive Website apps with R.
authorization see just like this a single. Authorization is granted to copy and distribute translations of the handbook
Some people locate it motivating to have finish independence within their programming projects, and making a match gives you that freedom.
If I would like to discover the suggest rating for all students I don’t really need to use info table. I'm able to utilize the command signify() from foundation R. The under code calculates the necessarily mean of skill (disregarding NAs by indicating na.rm=Accurate) and will save the mean in a different object identified as stulevel_agg_1.
Code-sensible, it looks like you’re grabbing a value from a listing or information frame, however you’re truly reading through a reactive worth. No have to have to put in writing code to watch when inputs adjust–just publish reactive expression that read the inputs they need to have, and Allow Shiny take care of being aware of when to contact them.
I believe the resampling strategies are refreshing and insightful. Plus the textbooks are great within their clarity of expression and genuine environment examples. these details I have informed many of my colleagues about this fantastic and refreshing online medium for learning about stats.
This course is enjoyable and fascinating, but concurrently we dive deep into Machine Discovering. It can be structured the next way:
In the event you’re definitely stumped for programming Strategies, consider producing one thing generic similar to a to-do record supervisor.
Although grid has an optional argument nx for environment the volume of grid lines, it can be impossible to inform it explicitly wherever to place People lines (it will usually not put them at integer values). A more precise and manageable alternative is to work with abline().
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829115.83/warc/CC-MAIN-20181217183905-20181217205905-00255.warc.gz
|
CC-MAIN-2018-51
| 2,834
| 14
|
http://wlmotion.ru/ucr-61sb-driver.html
|
code
|
Current visitors New profile posts Search profile posts Billboard Trophies. Unsolder the resistor by heating ucrsb of its ends at time, lifting it a bit ucrsb a sharp knife or tweezers. Unsolder ucrsb resistor by heating one of its ends at time, ucrsb it a bit using a sharp knife or tweezers.
Grab your stuff while you still can. Your message has been reported and will be reviewed by our staff.
Indi Drivers people don't understand that my website is the best solution if they want to download driver files from the internet. It also needs its own driver. Mainboard Ucrsb data is stored in this chip, xyron wishblade drivers for windows alongside with access methods which ucrsb how the device is controlled by a driver. Solder the red one to the resistor.
Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Geeks To Go is a helpful hub, where thousands of volunteer geeks ucrsb serve friendly answers and support. Cut this glue out from both wires.
Solder the red one to ucrsb resistor. Geeks To Go ucrsb a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. What do you need to know about free software?
UCR 61SB DRIVERS FOR WINDOWS
Once I fixed the cables around, I got unknown device and it said there was a malfunction. They never worked again since. Hope this helps, Ucrsb Check out ucrsb forums and get ucrsb ucfsb from the ucrsb.
UCR 61SB DRIVERS DOWNLOAD
Geeks Ucrsb Go ucrsb a helpful hub, where thousands of volunteer ucrsb quickly serve friendly answers and support. Unsolder the resistor by heating one of its ends at time, lifting it a bit ucrsb a sharp knife or ucrsb. Forums Hardware Motherboards. But it will work Solder the red one to the resistor. Your message has been reported and will be reviewed ursb our staff.
The posting of advertisements, profanity, or personal attacks is prohibited. Note that your submission may not appear immediately ucrsb our site. New posts New profile posts Latest activity. The reader would not work using another computer, yet the card was readable using a syntax usb card reader ucr card reader.
Anything else I could try before I get my hands on that adapter? Note that your submission may not appear immediately on our site. Thank You for Submitting a Reply,! New posts Trending Search forums. Ucrsb posting of advertisements, profanity, or personal attacks is prohibited.
Advertisements or commercial links. Syntax usb card reader ucr Learn More Through Courses. Cafd Exchange Solution brought to you by Your issues matter to us. Community Forum Software by Ucrsb.
Download Now Secure Download. Flaming or offending other users. Finally, found some drivers here. After doing ucrsb my computer was able to see ucrsb folders and be able to transfer files icrsb and from the sandisk card. What i ucrsb was use the card in my Kodak Digital camera ucrsb ucrsb some folders on the card.
USB CARD READER
Are you sure you hooked it up right? First, ucrsb two screws from the reader. Your message has ucgsb reported and will be reviewed ucrsb our staff. Sexually explicit or offensive language.
Sexually explicit ucrsb offensive language. Sexually explicit ucrsb ucrsb language.
UCR 61SB DRIVERS FOR WINDOWS
- Apache awc 550 drivers
- Posiflex tp 5815 drivers download
- Sony vgn z540 driver
- Ehome wireless card driver download
- Ic plus ip100 driver
- Lexmark z810 printer driver
- Chipmaster 6000 xp driver
- Borland dbexpress interbase drivers for mac
- Ca0102 ict drivers for windows xp
- G41-m7 audio driver
- E studio 6550c driver
- Dell optiplex 170l desktop driver
- Cirrus 5430 xp driver
- Hp deskjet 970cse printer driver download
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524111.50/warc/CC-MAIN-20190715195204-20190715221204-00225.warc.gz
|
CC-MAIN-2019-30
| 3,690
| 31
|
https://hypernews.slac.stanford.edu/HyperNews/geant4/get/installconfig/1561.html
|
code
|
|Message: Undefined Qt, Unexpected token "(" and hang while running example B1||Not Logged In (login)|
Click on the Forum title, e.g. on the "Forums by Category" page, to read a sequence of postings to the Forum and its threads all in one page. If you are only interested in one thread or the thread following a specific posting, click the thread or the posting, which takes you to a smaller page, which contains only the part you are interested in and may be easier to navigate.
Messages are "chained" if there are only replies at the first level, i.e. 1/1.html, 1/1/1.html etc. In case of "chained" messages the message number is replaced by the icon and there is no indentation.
Inline: Display the subject line only or also the text of the posting(s); for the choice "All" the "Outline" choices are switched off.
|1||0||1||no text / full text of posting|
|2||1||All||text for level 1 only / text for All postings|
Outline: Choose the depth of the posting thread, successive toggle controls provide increasing detail.
|1||2||1||2 levels / 1 level (original posting)|
|2||3||2||3 levels / 2 levels|
|3||3||All||3 levels / all levels (all postings)|
I encountered 3 problems while installing Geant4.9.6, which I think might related to each other.
I use CMake22.214.171.124 (.dmg file binary distribution - for mac) version to build and install Geant4.9.6 (Geant4.9.6.p02.tar.gz) on Mac OSX 10.7.4. After creating build directory, I run the cmake commands within the build directory;
1) The first problem is can't find Qt4
cmake -DCMAKE_INSTALL_PREFIX=/users/abc/geant4.9.6-install -DGEANT4_USE_OPENGL_X11=ON -DGEANT4_USE_RAYTRACER_X11=ON -DQT_QMAKE_EXECUTABLE=/users/abc/qt/bin/qmake -DGEANT4_USE_QT=ON /applications/geant4.9.6
The output as followings;
-- The C compiler identification is Clang 4.2.0 -- The CXX compiler identification is Clang 4.2.0 -- Check for working C compiler: /usr/bin/cc -- Check for working C compiler: /usr/bin/cc -- works -- Detecting C compiler ABI info -- Detecting C compiler ABI info - done -- Clang version : Apple LLVM version 4.2 (clang-425.0.28) (based on LLVM 3.2svn) Target: x86_64-apple-darwin11.4.0 Thread model: posix -- Check for working CXX compiler: /usr/bin/c++ -- Check for working CXX compiler: /usr/bin/c++ -- works -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- Found EXPAT: /usr/lib/libexpat.dylib (found version "2.0.1") CMake Error at /Applications/CMake 2.8-11.app/Contents/share/cmake-2.8/Modules/FindQt4.cmake:1382 (message): Found unsuitable Qt version "" from NOTFOUND, this code requires Qt 4.x Call Stack (most recent call first): cmake/Modules/Geant4InterfaceOptions.cmake:86 (find_package) CMakeLists.txt:84 (include)
-- Configuring incomplete, errors occurred!
I already check that CMake126.96.36.199 version uses Qt4.8.0 version.
2) Unexpected token while key in source geant4.csh
192-168-1-12:bin abc$ cd /users/abc/geant4.9.6-install/bin ; source geant4.csh -bash: /users/abc/geant4.9.6-install/bin/geant4.csh: line 24: syntax error near unexpected token `(' -bash: /users/abc/geant4.9.6-install/bin/geant4.csh: line 24: `set ARGS=($_)'
3) I also had problem with visualisation installation. Eventhough I already enable -DGEANT4_USE_OPENGL_X11 (the command as in no 1), suddenly it went hang after tried example B1. No 'Idle' word appeare to key in. (Due to error of enabling -DGEANT4_USE_QT because of Qt version is not found, then I just enabled -DGEANT4_USE_OPENGL_X11 and -DGEANT4_USE_TRAYTRACER_X11 only )
[100%] Built target exampleB1 "/Applications/CMake 2.8-11.app/Contents/bin/cmake" -E cmake_progress_start /Users/abc/B1-build/CMakeFiles 0 Kais-MacBook-Pro:B1-build abc$ ls CMakeCache.txt exampleB1 init_vis.mac CMakeFiles exampleB1.in run1.mac Makefile exampleB1.out run2.mac cmake_install.cmake init.mac vis.mac Kais-MacBook-Pro:B1-build abc$ ./exampleB1
************************************************************* Geant4 version Name: geant4-09-06-patch-02 (17-May-2013) Copyright : Geant4 Collaboration Reference : NIM A 506 (2003), 250-303 WWW : http://cern.ch/geant4 *************************************************************
<<< Reference Physics List QBBC Checking overlaps for volume Envelope ... OK! Checking overlaps for volume Shape1 ... OK! Checking overlaps for volume Shape2 ... OK! WARNING: G4QInelastic is deprecated and will be removed in GEANT4 version 10.0. ### Adding tracking cuts for neutron TimeCut(ns)= 10000 KinEnergyCut(MeV)= 0 Visualization Manager instantiating with verbosity "warnings (3)"... Visualization Manager initialising... Registering graphics systems...
You have successfully registered the following graphics systems. Current available graphics systems are: ASCIITree (ATree) DAWNFILE (DAWNFILE) G4HepRep (HepRepXML) G4HepRepFile (HepRepFile) OpenGLImmediateX (OGLI, OGLIX) OpenGLStoredX (OGL, OGLS, OGLSX) RayTracer (RayTracer) RayTracerX (RayTracerX) VRML1FILE (VRML1FILE) VRML2FILE (VRML2FILE) gMocrenFile (gMocrenFile)
Registering model factories...
You have successfully registered the following model factories. Registered model factories: generic drawByCharge drawByParticleID drawByOriginVolume drawByAttribute
Registered filter factories: chargeFilter particleFilter originVolumeFilter attributeFilter
You have successfully registered the following user vis actions. Run Duration User Vis Actions: none End of Event User Vis Actions: none End of Run User Vis Actions: none
Some /vis commands (optionally) take a string to specify colour. Available colours: black, blue, brown, cyan, gray, green, grey, magenta, red, white, yellow
Available UI session types: [ GAG, tcsh, csh ] /control/saveHistory /run/verbose 2
# # Visualization setting/control/execute vis.mac
# Macro file for the visualization setting in the initialization phase # of the B1 example when running in interactive mode # # Use these open statements to open selected visualization # # Use this open statement to create an OpenGL view:/vis/open OGL 600x600-0+0 /vis/sceneHandler/create OGL /vis/viewer/create ! ! 600x600-0+0
Thanks in advanced
|Inline Depth:||Outline Depth:||Add message:|
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655934052.75/warc/CC-MAIN-20200711161442-20200711191442-00149.warc.gz
|
CC-MAIN-2020-29
| 6,120
| 35
|
https://ubuntu.com/security/CVE-2018-16890
|
code
|
Published: 6 February 2019
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
affects libcurl 7.36.0 to and including 7.63.0
Severity score breakdown
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473472.21/warc/CC-MAIN-20240221102433-20240221132433-00667.warc.gz
|
CC-MAIN-2024-10
| 555
| 4
|
http://mrhackman.blogspot.com/2008/05/great-brueggemann-quote.html
|
code
|
"When serious people of good faith disagree, they've got to go back into the narratives and come at it again. One of the problems in the church is that people are not willing to do that. People have arrived at a place where they think they have got the answer." ~ Walter Brueggemann
From a talk on Leviticus, given at First Presbyterian Church of Knoxville. Click here to listen.
*Update* Some great Brueggemann videos here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867995.55/warc/CC-MAIN-20180527024953-20180527044953-00031.warc.gz
|
CC-MAIN-2018-22
| 424
| 3
|
https://it.wordpress.org/themes/ona/
|
code
|
Ona is a Full Site Editing WordPress theme based on the minimal design style. It comes with various pre-defined block patterns. It's easy to customize colors and fonts via global options. This theme is perfect for fast optimized websites that has instant impact On Core Web Vitals performance. You must have the Gutenberg plugin active (version 11.7 or newer) to use Ona before WordPress 5.9 is released. Demo: https://ona.deothemes.com/
Tema non trovato: cercane un'altro.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036077.8/warc/CC-MAIN-20220625160220-20220625190220-00319.warc.gz
|
CC-MAIN-2022-27
| 473
| 2
|
http://www.computerforums.org/forums/hardware/looking-buy-build-new-rig-184348.html
|
code
|
I'm looking to buy a new rig for as cheap as possible. I'll be purchasing all parts from www.msy.com.au
as I am in Australia.
I am building this P.C SPECIFICALLY to run World of Warcraft and the new expansion - I have no other purposes with this P.C other than to play WoW on it.
I was wondering if somebody could help me with some specs that would be perfect to run this game at a high level.
I'm not looking to spend more than $1000 - only after parts as I have the screen etc.
I'm not very knowledgable with P.C's so bare with me lol
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00003-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 536
| 6
|
http://www.newgrounds.com/portal/view/500143/review_page/3
|
code
|
Fight your way through hoards of enemies in this thrilling arcade space shooter with detailed particle and graphical effects! Upgrade your ship and become stronger as you level up from earned EXP.
IF THE GAME IS TOO LAGGY, please go to the Graphic settings in the menu and lower the graphics. This game is very graphical intensive. Thanks!
Mouse Click = Shoot
WASD/Arrow Keys = Movement
Space / Shift = Bomb
E / Ctrl = Pause/Upgrade
Also, if you'd like to see what the game looks like at later stages, here's a nice video my sponsor made: http://www.youtube.com/wa tch?v=1qQCx RhnXzk (Please remove the spaces)
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132495.49/warc/CC-MAIN-20140914011212-00238-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 610
| 7
|
https://nhanvietluanvan.com/numpy-float64-object-is-not-callable/
|
code
|
‘Numpy.Float64’ Object Is Not Callable
Introduction: What is a “numpy.float64” Object?
In Python, NumPy is a widely used library for numerical computations. NumPy provides efficient and convenient data structures, such as arrays, and a wide range of mathematical functions to manipulate these arrays. One of the commonly used data types in NumPy is “numpy.float64,” which represents a 64-bit floating point number.
However, sometimes when working with NumPy and utilizing “numpy.float64” objects, you may encounter an error message stating “‘numpy.float64’ object is not callable.” This error can be frustrating, especially for beginners, but it is important to understand its causes and explore possible solutions to resolve it.
Reasons for the Error: “‘numpy.float64’ object is not callable”
The error “‘numpy.float64’ object is not callable” typically occurs when you are trying to call a method or function on a “numpy.float64” object that cannot be invoked. Here are some common reasons behind this error:
1. Syntax Errors: One possible reason for the error is a syntax mistake in your code. This could be a missing or misplaced parenthesis, incorrect indentation, or a typo when referencing the “numpy.float64” object.
2. Accidental Reassignment: Another common cause is accidentally reassigning a variable that was originally a “numpy.float64” object to a different data type or value. This can happen if you inadvertently overwrite the original object with a new value or assignment.
3. Incorrect Verification of Object Type: It is essential to confirm that the variable you are working with is indeed a “numpy.float64” object. If it is not, trying to call methods or functions specific to “numpy.float64” objects may result in the error message.
4. Importing and Using the Correct NumPy Function: The error might occur if you mistakenly import or use the wrong NumPy function. Ensure that you are using the appropriate functions compatible with “numpy.float64” objects.
5. Incorrect NumPy Version: Incompatibility between the version of NumPy installed and the functions you are trying to use can lead to the “‘numpy.float64’ object is not callable” error. Checking and updating the NumPy version might resolve this issue.
6. Conflicts with Other Libraries or Modules: If you are using other libraries or modules alongside NumPy, some functions or methods might conflict, resulting in the error. Identifying and resolving any conflicts can help address the issue.
7. Compatibility Issues with Specific NumPy Version: Certain code or functions may not be compatible with specific versions of NumPy due to updates or changes in functionality. Ensuring compatibility with the specific version you are using can help avoid the error.
8. Seeking Help and Consultation: If none of the above solutions work, it is advisable to seek help from the supportive NumPy community or consult the official documentation for further assistance in resolving the “‘numpy.float64’ object is not callable” error.
Possible Solutions for the Error: “‘numpy.float64’ object is not callable”
1. Check for Syntax Errors:
– Review your code for any syntax mistakes, such as missing parentheses, incorrect indentation, or typographical errors.
2. Check for Accidental Reassignment:
– Verify that you have not accidentally reassigned the variable to a different data type or value. Double-check your assignments and ensure they are compatible with “numpy.float64” objects.
3. Verify if the Variable is Indeed a “numpy.float64” Object:
– Use the `type()` function to verify the data type of the variable containing the “numpy.float64” object. If it is not a “numpy.float64” object, investigate and correct any inconsistencies.
4. Import and Use the Correct NumPy Function:
– Make sure you are importing the necessary NumPy function that is compatible with “numpy.float64” objects. Review the official documentation to find the appropriate function for your needs.
5. Ensure the Correct Version of NumPy is Installed:
– Check the installed version of NumPy and ensure it is up-to-date. Updating NumPy to the latest version can help address any compatibility issues.
6. Check for Conflicts with Other Libraries or Modules:
– Examine your code for any conflicts between NumPy and other libraries or modules you are using. Resolve conflicts by using alternate functions or modifying your code as necessary.
7. Verify the Compatibility of the Code with the Specific Version of NumPy:
– If you suspect compatibility issues with a specific version of NumPy, cross-reference your code with the documentation for that version. Make any required modifications to align with the functionalities and syntax of that version.
8. Seek Help from the NumPy Community or Consult the Official Documentation:
– If you have exhausted all other solutions, reach out to the helpful NumPy community for assistance. Posting your issue on relevant forums or seeking guidance from experienced users can provide valuable insights. Additionally, consulting the official NumPy documentation can often offer detailed explanations and solutions for various errors.
Frequently Asked Questions (FAQs):
Q1. What is the “Numpy.float64” object?
A1. The “Numpy.float64” object is a NumPy data type that represents a 64-bit floating-point number. It is commonly used for numerical computations involving decimal numbers with a high level of precision.
Q2. What are some other related errors when working with “numpy.float64” objects?
A2. Apart from the “‘numpy.float64′ object is not callable” error, you may encounter errors like “Numpy float64 object is not iterable,” “Numpy float64 object cannot be interpreted as an integer,” “Numpy ndarray object is not callable,” “Float’ object is not callable,” “Int’ object is not callable,” and “Cannot unpack non-iterable numpy float64 object.”
In conclusion, encountering the “‘numpy.float64’ object is not callable” error can be challenging, but understanding its causes and following the suggested solutions can help resolve the issue. Remember to review your code for syntax errors, verify the object type, check for compatibility, and seek help if needed. By addressing these potential pitfalls, you can overcome the error and continue working efficiently with NumPy and its “numpy.float64” objects.
Typeerror: ‘Numpy.Float64’ Object Cannot Be Interpreted As An Integer / Tensorflow Object Detection
What Is Float64 In Numpy?
NumPy, which stands for Numerical Python, is a powerful library in Python used for scientific computing. It provides efficient and convenient numerical arrays, along with a large collection of mathematical functions, operations, and tools. One important data type in NumPy is float64.
Float64 is a floating-point data type that represents real numbers with double precision. The “64” in float64 indicates that it uses 64 bits to store the value. This data type can accurately represent a very wide range of decimal numbers with high precision, making it suitable for various scientific and numerical applications.
In NumPy, float64 can be used to create arrays or matrices that store floating-point values. It is particularly useful when dealing with large datasets that require high precision arithmetic, such as numerical simulations, mathematical modeling, statistical analysis, and more.
To create a float64 array in NumPy, you can use the `dtype` argument when initializing an array. For example:
import numpy as np
arr = np.array([1.2, 3.4, 5.6], dtype=np.float64)
In the above code, we create a NumPy array `arr` containing the values `[1.2, 3.4, 5.6]` with a float64 data type. The use of float64 ensures high precision and allows for accurate computations on the array.
Using float64 arrays in NumPy provides several advantages. Firstly, it allows for efficient storage and manipulation of large numerical datasets. Since float64 uses 64 bits, it can represent numbers with precision up to 15 decimal places. This is particularly important when dealing with scientific calculations and simulations that require a high level of accuracy.
Secondly, float64 arrays facilitate vectorized operations, which significantly enhance the performance and speed of numerical computations. NumPy provides a wide range of mathematical functions and operations that can be directly applied to float64 arrays, making it easy to perform complex calculations on large datasets efficiently.
Furthermore, float64 arrays allow seamless integration with other scientific libraries in Python, such as SciPy, Matplotlib, and Pandas. These libraries leverage NumPy’s float64 arrays, enabling scientists, researchers, and data analysts to perform data manipulation, analysis, visualization, and modeling with ease.
FAQs about float64 in NumPy:
Q: What is the difference between float64 and float32 in NumPy?
A: The main difference lies in the precision and storage requirements. Float64 uses 64 bits, providing higher precision up to 15 decimal places compared to float32, which uses 32 bits and offers precision up to 7 decimal places. Additionally, float64 requires more memory compared to float32.
Q: Can float64 arrays handle large datasets?
A: Yes, float64 arrays are suitable for handling large datasets efficiently. With 64 bits, they can store and manipulate a vast amount of numerical data with high precision.
Q: Are there any limitations or potential issues with float64 arrays?
A: One important consideration is memory usage. Since float64 arrays have larger storage requirements compared to other data types, they can consume more memory. Therefore, it is essential to consider memory constraints, especially when working with very large datasets.
Q: Are there any alternatives to float64 in NumPy?
A: Yes, NumPy provides several other data types for floating-point values, including float16 and float32. These data types consume less memory compared to float64 but have lower precision. The choice of data type depends on the specific requirements of the application.
Q: How can I convert a float64 array to a different data type in NumPy?
A: NumPy provides functions to convert the data type of an array, such as `astype()`. You can use it as follows:
arr = np.array([1.2, 3.4, 5.6], dtype=np.float64)
arr = arr.astype(np.float32)
In the above code, `astype(np.float32)` converts the `arr` array from float64 to float32 data type.
In conclusion, float64 is a crucial data type in NumPy that provides high precision and efficient storage for working with floating-point numbers. Its ability to handle large datasets and facilitate efficient numerical computations makes it an essential component for scientific computing and data analysis in Python.
Why Is Numpy Float 64 Not Iterable?
When working with numerical data in Python, the numpy library is a powerful tool for array manipulation and computation. It provides an extensive range of functions and capabilities for numerical operations. However, working with numpy arrays may sometimes lead to confusion, especially when dealing with data types such as float64 that are not iterable. In this article, we will explore the reasons behind this behavior and provide a comprehensive understanding of the topic.
Understanding Numpy Data Types
Before delving into the intricacies of why numpy float64 is not iterable, we must first grasp the concept of numpy data types. Numpy arrays are homogeneous, meaning that all elements in a single array must have the same data type. These data types, or dtypes, can range from basic numerical types like integers and floats to complex numbers, strings, booleans, and many others.
Numpy uses data types to efficiently store and manipulate arrays. Each data type has a fixed size in memory, allowing numpy to optimize memory usage and enhance performance. The float64 dtype, also known as double precision float, is one of the available options and is commonly used for high-precision decimal calculations.
Iterating over Numpy Arrays
In Python, arrays and other iterable objects can be accessed through iteration with loops or using built-in functions like “enumerate()” or “zip()”. However, numpy arrays behave differently and cannot be directly iterated over using these methods. Attempting to directly iterate over a numpy array, irrespective of its data type, will result in a TypeError, stating that the array is not iterable.
The main reason behind this behavior lies in the design philosophy and performance optimizations of numpy. Numpy arrays are typically large, and allowing direct iteration would be inefficient in terms of memory and performance. Instead, numpy provides vectorized operations, which allow for applying operations on arrays as a whole without the need for explicit iteration.
Vectorized Operations in Numpy
Under the hood, numpy uses highly optimized C or Fortran functions to execute vectorized operations efficiently. These operations are designed to work on entire arrays or subsets of arrays at once, leveraging the capabilities of modern CPUs and GPUs. As a result, vectorized operations are significantly faster than traditional loop-based iterations, making numpy a go-to library for numerical calculations.
Instead of directly iterating over a numpy array, it is advised to utilize the rich set of vectorized operations that numpy provides. These include mathematical functions like addition, subtraction, multiplication, division, exponentiation, and trigonometric functions, among others. Additionally, numpy offers numerous statistical and logical functions, as well as indexing and slicing capabilities, to manipulate array data effectively.
Q: Can I convert a numpy array to an iterable data structure?
A: While numpy arrays cannot be directly iterated over, they can be easily converted to other iterable data structures, such as Python lists, using the “tolist()” function. This allows for more conventional iteration using Python’s built-in methods.
Q: Are there any alternatives for iterating over numpy arrays?
A: In some cases, when it is absolutely necessary to iterate over a numpy array, the “nditer()” function can be used to generate an iterator object that allows access to individual elements. However, this should be used sparingly, as it may undermine the performance benefits that numpy offers.
Q: Can I change the data type of a numpy array to make it iterable?
A: Unfortunately, changing the data type of a numpy array does not affect its iterability. Numpy arrays, regardless of their data type, are designed for vectorized operations and not direct iteration.
Q: I need to perform element-wise operations on an array. How can I achieve this without direct iteration?
A: Numpy provides a set of functions called “ufuncs” (universal functions) that are specifically designed for element-wise operations. These functions, such as “numpy.add()”, “numpy.subtract()”, and “numpy.multiply()”, allow for efficient operation execution on entire arrays, eliminating the need for explicit iterations.
In conclusion, numpy float64 and other numpy data types are not iterable due to the performance optimizations and design philosophy of the library. Instead of resorting to direct iteration, it is recommended to utilize numpy’s vectorized operations and functions for efficient array manipulation and computation.
Keywords searched by users: ‘numpy.float64′ object is not callable Numpy float64 object is not callable auc, Numpy float64 object is not iterable, Numpy float64 object is not callable f1_score, Numpy ndarray object is not callable, Float’ object is not callable, Numpy float64 object cannot be interpreted as an integer, Int’ object is not callable, Cannot unpack non iterable numpy float64 object
Categories: Top 71 ‘Numpy.Float64’ Object Is Not Callable
See more here: nhanvietluanvan.com
Numpy Float64 Object Is Not Callable Auc
Numpy’s float64 object is a data type or a class that represents floating-point numbers with a precision of 64 bits. It offers a greater level of accuracy compared to the standard float data type in Python. This higher precision can be advantageous when dealing with complex numerical calculations where accuracy is crucial.
However, it is important to note that the float64 object is not directly meant to be used for area under the curve calculations or any specific statistical analysis. The confusion arises from the fact that the term AUC is often used in machine learning tasks where numpy arrays are commonly used, and people assume that Numpy might have a built-in method or function to calculate the AUC.
In reality, calculating the AUC involves using appropriate libraries or functions specific to the task at hand, such as scikit-learn’s `roc_auc_score()` or various other statistical or machine learning packages. These libraries and functions provide the necessary algorithms and implementations to calculate the AUC accurately. Numpy, on the other hand, primarily focuses on array manipulations and mathematical operations rather than specialized statistical analysis.
To exemplify the point, let’s consider an example where we want to calculate the AUC in a binary classification task using scikit-learn. We would import the required libraries and functions, load our dataset, train our model, make predictions, and then use the `roc_auc_score()` function to calculate the AUC.
import numpy as np
from sklearn.metrics import roc_auc_score
# Load dataset, train model, make predictions
y_true = np.array([0, 1, 1, 0]) # Actual labels
y_pred = np.array([0.2, 0.6, 0.8, 0.3]) # Predicted probabilities
# Calculate AUC
auc_score = roc_auc_score(y_true, y_pred)
As seen in the above example, Numpy is used to create and manipulate the arrays that are then passed as arguments to the `roc_auc_score()` function from scikit-learn. Numpy plays a supporting role in providing efficient data structures and operations, but it is not directly involved in the AUC calculation itself.
Q: Can’t we use Numpy to calculate the AUC directly?
A: No, Numpy doesn’t have a built-in function or method to calculate the AUC. It primarily focuses on array manipulations and mathematical operations, while AUC calculations involve specialized statistical analysis or machine learning libraries like scikit-learn.
Q: Why is there confusion regarding the float64 object and AUC calculation?
A: The confusion arises from the use of the term AUC in machine learning tasks, where Numpy is commonly used for array manipulations. People assume that since Numpy provides a higher precision float64 object, it might have a direct method or function to calculate the AUC. However, the AUC calculation requires specialized statistical analysis libraries.
Q: Are there any advantages to using the float64 object in Numpy?
A: Yes, the float64 object offers a higher precision compared to the standard float data type in Python. This increased precision can be beneficial in complex numerical computations where accuracy is critical.
In conclusion, the float64 object in Numpy provides a higher precision floating-point representation, but it is not directly involved in AUC calculations or specialized statistical analysis. Numpy primarily focuses on array manipulations and mathematical operations. To calculate the AUC, it is necessary to use appropriate libraries or functions specific to the task at hand, such as scikit-learn’s `roc_auc_score()`. Clarifying this misconception helps to ensure accurate data analysis and avoids unnecessary errors in machine learning or data science tasks.
Numpy Float64 Object Is Not Iterable
NumPy is a popular Python library that provides support for efficient numerical computations. It includes a versatile collection of functions and classes, making it invaluable for various scientific and mathematical operations. However, when working with NumPy, you might encounter an error message stating “float64 object is not iterable.” In this article, we will explore the meaning behind this error and understand potential causes and solutions. So let’s dive in!
Understanding Iteration in Python
Before delving into the specifics of the “float64 object is not iterable” error, let’s first grasp the concept of iteration in Python. Iteration is the process of repeatedly executing a block of code or accessing elements in a sequence, such as a list or an array. It allows us to perform operations on each element of the sequence individually without the need for repetitive code. Python provides a convenient way to implement iterations through loops, such as for loops and while loops.
Introduction to NumPy float64 Object
NumPy is primarily known for its ability to handle arrays, which can store elements of various data types. One of the most commonly used data types in NumPy arrays is float64. As the name suggests, float64 represents a 64-bit floating-point number. These numbers are used to represent decimal fractions and real numbers in scientific computations. Float64 is highly precise and allows for a wide range of values, making it suitable for many numerical calculations.
Understanding the Error: “float64 object is not iterable”
When attempting to iterate over a NumPy float64 object, you may encounter the error message “TypeError: float64 object is not iterable.” This error occurs because the float64 object is not designed to be iterable. In Python, iterating over an element or object means accessing its individual components one by one. However, a float64 object, being a single numerical value, does not have any components to iterate over. Therefore, this error is raised to indicate that the desired operation is not supported on the float64 object.
Common Causes of the “float64 object is not iterable” Error
1. Incorrect Usage of Iteration: The most common cause of this error is mistakenly attempting to iterate over a single float64 value. Remember, iterations are meant for sequences with multiple elements, and trying to iterate over a single value will trigger this error.
2. Unexpected Variable Type: Another possible cause is inadvertently assigning a float64 value to a variable that should have a different data type. This can happen if the variable was previously assigned an iterable object, and you later assign a float64 value to it.
3. Incorrect Indexing or Slicing: In some cases, the error may occur due to incorrect usage of indexing or slicing operations on the float64 object. These operations are meant for accessing specific elements of an iterable sequence, so applying them to a float64 object is not appropriate.
Solutions to the “float64 object is not iterable” Error
1. Verify Variable Types: Double-check the variable types in your code. Ensure that any variable used in an iteration is an iterable data type, such as a list or an array, rather than a float64 object. Make sure you assign float64 values to appropriate variables to avoid any data type conflicts.
2. Check Your Iterations: Review your code and verify that you are not accidentally attempting to iterate over a float64 object. If you need to perform a specific operation on a single float64 value, remember that there is no need for iteration.
3. Verify Indexing and Slicing Operations: If you are using indexing or slicing operations, confirm that they are not applied to a float64 object. These operations should only be used with sequences that can be indexed or sliced, such as arrays or lists.
Q1. Can I iterate over a NumPy float64 array?
No, you cannot directly iterate over a NumPy float64 array. Instead, you can iterate over the array’s elements by using a loop or other appropriate methods.
Q2. Are there alternative data types I can use to avoid the error?
Yes, if you need to iterate over your data, you can consider using NumPy arrays with data types that are iterable, such as int or float.
Q3. Can I convert a NumPy float64 object to an iterable data type?
Yes, you have the option to convert a float64 object to other iterable data types, such as lists. For example, you can use the tolist() method to convert a NumPy array to a Python list and then perform iterations on it.
Q4. Are there any specific situations where iterating over a float64 object might be necessary?
While iterating over a single float64 value may not be necessary in most cases, there could be situations where you have multiple float64 values stored in an array, and you need to iterate over that array to perform computations on each value individually.
In conclusion, the “float64 object is not iterable” error is a valuable cautionary message that prevents erroneous attempts to iterate over individual numerical values. It reminds us to review and validate our code, ensuring that iterations are only performed on the appropriate data types, such as arrays or lists. By understanding the nature of the error and applying the provided solutions, you can avoid this common stumbling block when working with NumPy’s float64 objects and enhance the efficiency of your numerical computations.
Images related to the topic ‘numpy.float64’ object is not callable
Found 45 images related to ‘numpy.float64’ object is not callable theme
Article link: ‘numpy.float64’ object is not callable.
Learn more about the topic ‘numpy.float64’ object is not callable.
- How to Fix: TypeError: ‘numpy.float64’ object is not callable
- TypeError: ‘numpy.float64’ object is not callable – Stack Overflow
- How to Fix: TypeError: ‘numpy.float’ object is not callable?
- Difference between numpy.float and numpy.float64 – Stack Overflow
- How to solve TypeError: ‘numpy.float64’ object is not iterable
- What is np.float32 and np.float64 in numpy in simple terms? – Quora
- How To Convert a NumPy Array to List in Python – DigitalOcean
- [SOLVED] typeerror: numpy.float64 object is not callable
- ‘numpy.float64’ object is not callable – Kaggle
- TypeError: ‘numpy.float64’ object is not callable – DQ Courses
- TypeError: ‘float’ object is not callable in Python (Fixed)
- How to solve TypeError: ‘numpy.int64’ object is not callable
- ‘numpy.float64’ object is not callable – While Printing F1 Score
- Fix Float Object Is Not Callable in Python | Delft Stack
See more: https://nhanvietluanvan.com/luat-hoc/
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818474.95/warc/CC-MAIN-20240423095619-20240423125619-00831.warc.gz
|
CC-MAIN-2024-18
| 26,472
| 151
|
https://word.uservoice.com/forums/304924-word-for-windows-desktop-application/suggestions/13573101--white-words-against-black-background-function-fo
|
code
|
"white words against black background" function for MS word to contribute towards eye health of computer users
Google e-books can now be read on white words against black background which seems less straining on the eyes (This is similar to the Zoomtext accessibility software for low vision people). Could Microsoft consider adding white words against black background function for MS word to contribute towards eye health of computer users worldwide?
Cheung Yuet Wah
Cesare Vesdani commented
Yeah. Microsoft can add a black background and white text feature just like in command prompt.
Also, bring back the blue background, white text feature as well.
I use Word for Windows and Mac for long periods of time. I really miss the blue background/white text option to reduce eye strain!
Loretta Yeo commented
Curious; this is where we started 30 years ago with green monochrome monitors. I haven't used WordPerfect in years, but their default was white text on blue background.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704798089.76/warc/CC-MAIN-20210126042704-20210126072704-00784.warc.gz
|
CC-MAIN-2021-04
| 976
| 9
|
https://wiki.audacityteam.org/wiki/User:Stevethefiddle/Track_Controls
|
code
|
|Proposal pages help us get from feature requests into actual plans. This proposal page is about rationalizing the behaviour of track buttons.|
Proposal pages are used on an ongoing basis by the Audacity development team and are open to edits from visitors to the wiki. They are a good way to get community feedback on a proposal.
- Note: Proposals for Google Summer of Code projects are significantly different in structure, are submitted via Google's web app and may or may not have a corresponding proposal page.
This is a first draft Please comment on the discussion page.
To rationalize the behaviour of the track buttons to provide a simple, consistent and flexible way to select which tracks are included in the export mix and which tracks can be heard when playing.
This topic has been the subject of several long and heated arguments. The purpose of this proposal is to take the heat out of the argument and come up with a solution that provides at least as much power and flexibility as the current Audacity 2.0.2 behaviour but in a more intuitive, consistent and easy to understand way. The approach taken in this proposal is to examine user cases to determine the required functionality and then to investigate possible ways to achieve that functionality.
The behaviour of Mute and Solo buttons changes depending on:
- The behaviour set in preferences (3 options)
- Whether using Export, Play or Mix and Render (3 options)
This is a lot of different behaviours. This proposal takes the position that it would be better if the behaviour of the buttons was consistent.
- The manual states that: Mix and Render mixes all of the selected tracks down to a single mono or stereo track and simultaneously applies all real-time transformations for the track, such as gain, panning or resampling. In hardware terms this mix is equivalent to "Pre-mute, Post-fader" which for anyone familiar with hardware mixers is a weird and irrational combination.
- The manual states that: (Mix and Render) "fixes" that mix by rendering the mix to a new track and deleting all the tracks that were selected. This is incorrect / misleading as it does not fix the mix but creates its own new mix regardless of the state of the Mute / Solo buttons.
- If one track is soloed, other tracks are not normally heard, but another track will be heard when using Cut Preview unless the selected track is muted. Thus it appears that the mute button is honored, but the solo button is ignored. (bug 231)
There is currently no way for visually impaired users to know if the mix they hear is the mix that will be exported without manually navigating through each track and examining the state of the Solo buttons.
Related Feature Requests:
- Add mute/solo state to history
- Add 'Honour solo state' checkboxes to the 'Export' and 'Export Multiple' dialogue boxes
- Track Drop-Down menu > Solo and Mute choices
- behaviour of mute and solo (-devel)
- Mute/Solo buttons ignored by Mix and Render (forum)
- Muted/Soloed track plays in Audacity but is not in MP3 (forum)
- How do I hear the Export mix? (forum)
Working With Multi-Track Projects
When working with multi-track project it is very common that there will be some track that need to be excluded from the exported mix. This functionality is provided by the Mute button.
Properties of the Mute button:
- One click to mute a track. The track will then be excluded from "the mix".
- One click to unmute a track. The track will then be part of "the mix".
There is no need to consider different export/mix and render/playback mixes. "The Mix" is the same in each context. Mute means mute and the track is muted.
Monitoring one or more tracks It is often useful to be able to listen (monitor) one or more tracks independently from "the mix". The danger here is of confusion between what is heard and what is in "the mix". It is essential that it is totally clear that what is being monitored is not "the mix".
- It must be possible to monitor one or more tracks regardless of their mute button status.
- It must be clear that what is heard is not what will be exported, or exporting could be disabled while monitoring.
With large multi-track projects, the track buttons are likely to be hidden on the majority of tracks, so the visual state of the buttons cannot be relied on as an indication of whether tracks are being monitored or "the mix" is being heard.
- Easy A/B comparison of alternative "takes" (very useful for live recordings, or when applying effects)
Additional Useful Behaviour
- Option to mute or unmute all tracks (as now).
- In large multi-track projects the track gain level may be very low so the ability to monitor "pre gain slider" would be useful. This could be achieved with a PFL button.
Transferring analogue recordings to digital
When transferring tapes / vinyl to digital format it is often necessary to apply corrective restoration for the removal of clicks, noise removal, corrective equalization etc. The ability to perform A/B (or A/B/C) comparisons is useful and should be available in a convenient manner.
Making Voice and Music Podcasts
When making a voice and music podcast the will be times when it is essential that all tracks can be heard together, but there may be times, such as when "dropping in" an additional live recorded voice, that it is useful to temporarily mute some tracks to avoid distraction. This is a simple case for muting tracks so that they are excluded from "the mix".
When mixing down a podcast, the user may want to experiment with different mixes and alternative "takes". Many of the issues relating to large multi-track projects will apply.
With large projects or low powered machines it is often useful to mix down some of the tracks so as to reduce the track count. A user would not normally select a muted track as part of such a mix down. If one of the selected tracks was muted, then it would not be surprising if muting was honored, thus maintaining consistent behavior of "the Mix".
Mix-Down Prior to Export
There are several benefits to mixing down the entire project prior to export.
- The project can be easily checked for over 0 dB clipping
- The project can be normalized.
- The start and end of the project may be trimmed
- Fade-in / Fade-out can be easily added to the mix
- Reverb, equalization, limiting, compression and other "mastering" effects can be applied to the mix.
The most convenient way to mix down the entire project is to select all (Ctrl+A) then Mix and Render. Mix and Render needs to honor the Mute button settings.
Other user cases
Please add any user cases that require special consideration.
- The ability to mute tracks.
- So that tracks are not heard on playback.
- So that tracks are not exported.
These are not necessarily separate options. It may be sufficient that Mute means that the track is excluded from both the export mix and from what is heard.
On hardware mixing desks, the Mute function is usually before "Solo" and after "PFL", so that the Mute button will mute the signal to "Solo" but does not mute "PFL".
- It must be possible to un-mute individual tracks.
- It is desirable to be able to mute or un-mute all tracks at once.
- The ability to listen to one or more tracks without losing the previously set (export) mix.
- This is currently achieved through the "Standard" Solo button behavior.
- The ability to make A/B (or A/B/C) track comparisons.
- This is currently achieved through the "Simple" Solo button behavior.
- One click to make one and only one track heard.
- It is desirable that un-soloing all tracks will return the mix to the previous state.
- "Un-solo All Tracks" would be a desirable feature.
- The ability to "Pre Fade Listen"
- This functionality is currently not available.
- PFL should be before Track Gain, Pan, Mute, envelopes and any additional real time effects in the signal chain.
If any combination of buttons cause "what is heard" to be different to "what is exported", (as will be the case for PFL) it must be clear to users that this is the case.
Pre Fade Level
When selected the PFL button would "light up" to give a visual indication that it is enabled and a sense of caution. Optionally there could be an additional "warning light" whenever any PFL buttons are depressed, for example in the Edit toolbar (or elsewhere). This would not help visually impaired users, but there should be no need to export during pre-fade listening. While any PFL button is pressed attempting to export will produce the error message "Cannot export while pre-fade listening. Release the PFL buttons on all tracks before exporting".
Mix and Render would also be disabled in a similar manner when PFL buttons are pressed.
PFL is pre Track Gain, pre Track Pan and pre real-time processing. The raw audio data as exists in the track is heard.
If a button is disabled in preferences, it is also functionally disabled.
- Context menu accessed by right click on any of the Track buttons, or on the Track Information block (or left click with modifier key) provides options to enable / disable the track buttons (quicker and easier than going into preferences).
- Move buttons above the Track Information (see Redesigned Track Control Panel)
- Include information in the Mixing down to export Warning that Muted tracks are not included in the mix.
- Track button states could be recorded in the History stack and so allow Undoing changes to return to the previous state.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585507.26/warc/CC-MAIN-20211022114748-20211022144748-00573.warc.gz
|
CC-MAIN-2021-43
| 9,419
| 79
|
https://supportforums.blackberry.com/t5/Native-Development/AxesOrientationMode-has-not-been-declared/td-p/2098643
|
code
|
01-15-2013 02:11 PM
I have a c++ cascades project that is using QCompass. I include the <QCompass> at the top of the hpp file. I have a class level compass named m_compass.
In the pro file I added the CONFIG += mobility, and MOBILITY += sensors
In the cpp file, I have this:
// at the top using namespace QtMobility; //... // in the constructor m_compass->setAxesOrientationMode(AxesOrientationM
It's giving me the error:
'AxesOrientationMode' has not been declared
But it looks like its part of the compass file. I'm guessing I'm missing an include, but can't find which one.
Solved! Go to Solution.
01-15-2013 04:11 PM
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171630.65/warc/CC-MAIN-20170219104611-00216-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 620
| 10
|
https://www.fujipress.jp/jrm/rb/robot003400040887/?lang=ja
|
code
|
Self-Localization of the Autonomous Robot for View-Based Navigation Using Street View Images
Nobuhiko Matsuzaki and Sadayoshi Mikami
Future University Hakodate
116-2 Kamedanakano-cho, Hakodate, Hokkaido 041-8655, Japan
Navigation requires self-localization, which GPS typically performs outdoors. However, GPS frequently introduces significant errors in environments where radio reflection occurs, such as in urban areas, which makes precise self-localization occasionally impossible. Meanwhile, a human can use street view images to understand their surroundings and their current location. To implement this, we must solve image matching between the current scene and the images in a street view database. However, because of the wide variations in the field angle, time, and season between images, standard pattern matching by feature is difficult. DeepMatching can precisely match images with various lighting and field angles. Nevertheless, DeepMatching tends to misinterpret street images because it may find unnecessary feature points in the road and sky. This study proposes several methods to reduce misjudgment: (1) gaining image similarity with features such as buildings by excluding the road and sky, and (2) splitting the panoramic image into four directions and matching in each. This study shows the results of each method and summarizes their performance using various images and resolutions.
- J. Revaud, P. Weinzaepfel, Z. Harchaoui, and C. Schmid, “DeepMatching: Hierarchical Deformable Dense Matching,” Int. J. Comput. Vis., Vol.120, No.3, pp. 300-323, doi: 10.1007/s11263-016-0908-3, Dec. 2016.
- P. Thorndyke and B. Hayes-Roth, “Differences in spatial knowledge acquired from maps and navigation,” Cognitive Psychology, Vol.14, pp. 560-589, doi: 10.1016/0010-0285(82)90019-6, Nov. 1982.
- Y. Matsumoto, M. Inaba, and H. Inoue, “View-based navigation using an omniview sequence in a corridor environment,” Machine Vision and Applications, Vol.14, No.2, pp. 121-128, doi: 10.1007/s00138-002-0104-z, Jun. 2003.
- M. Tabuse, T. Kitaoka, and D. Nakai, “Outdoor autonomous navigation using SURF features,” Artif. Life Robotics, Vol.16, No.3, pp. 356-360, doi: 10.1007/s10015-011-0950-8, Dec. 2011.
- C. Shen et al., “Brain-Like Navigation Scheme based on MEMS-INS and Place Recognition,” Applied Sciences, Vol.9, No.8, Art. No.8, doi: 10.3390/app9081708, Jan. 2019.
- H. Morita, M. Hild, J. Miura, and Y. Shirai, “View-based localization in outdoor environments based on support vector learning,” pp. 2965-2970, doi: 10.1109/IROS.2005.1545445, Sep. 2005.
- C. Valgren and A. Lilienthal, “SIFT, SURF and seasons: Long-term outdoor localization using local features,” Proc. of 3rd European Conf. on Mobile Robots, Sep. 2007.
- Y. Yamagi, J. Ido, K. Takemura, Y. Matsumoto, J. Takamatsu, and T. Ogasawara, “View-sequence based indoor/outdoor navigation robust to illumination changes,” 2009 IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, pp. 1229-1234, doi: 10.1109/IROS.2009.5354713, Oct. 2009.
- C. Weiss, H. Tamimi, A. Masselli, and A. Zell, “A hybrid approach for vision-based outdoor robot localization using global and local image features,” 2007 IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, doi: 10.1109/IROS.2007.4398959, pp. 1047-1052, Oct. 2007.
- S. Oishi, Y. Inoue, J. Miura, and S. Tanaka, “SeqSLAM++: View-based robot localization and navigation,” Robotics and Autonomous Systems, Vol.112, pp. 13-21, doi: 10.1016/j.robot.2018.10.014, Feb. 2019.
This article is published under a Creative Commons Attribution-NoDerivatives 4.0 Internationa License.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00388.warc.gz
|
CC-MAIN-2023-50
| 3,644
| 16
|
https://community.haloplatform.tech/blogs/entry/66-halo-platform-bi-weekly-newsletter-october-12th-2018/
|
code
|
Welcome to the Halo Platform Bi-Weekly newsletter! This is where we provide updates on recent developments and announcements for upcoming news, products, and events.
The decentralized exchange will be pushed to MainNet and go live for official trading very soon. Our developers are fixing the last set of reported issues from our Beta users and are beginning to deploy to production for official launch. Upon release, Ethereum will be available as a base trading pair. Halo will be available to be traded against Ethereum, with more coins coming as they are added to the cross network protocol. Stay tuned to our forums, Discord and social media channels for a launch date for HaloDEX. Users will soon enjoy the most advanced decentralized exchange, backed by one of the fastest blockchain networks on the cryptosphere!
Our token voting competition will also be available during launch. If you would like to vote for a project to be listed on HaloDEX, email the project name to email@example.com. We will add the option for that project as soon as the voting competition begins.
Because our platform is so versatile, any coin or token can be listed on the decentralized exchange regardless of network type.
Recent updates to HaloDEX testnet can be found in our patch notes below.
1.0.2 Beta change logs:
- Fixed order book bug that caused incorrect user amounts to trades
- Fixed order book bug that caused incorrect values being based to dex smart contract when making orders and trades
- Fixed Landing page bug that caused null data to be processed from ticker data
1.0.1 Beta change logs:
- Fixes Trading View bugs
- Adds placeholder for future Halo items on Landing Page
- Fixes order book bugs
- Removes the footer from Landing Page
- Replaces Trading View save image with a custom implementation
Fixes bug that caused subscriptions to only start working after user changes base
Proposal-001 Updates - Action Required
Beginning with Proposal-001, the community voted in favor for the split to increase the overall supply of HALO. The next step is to have a second vote proposing the amount of the supply increase. The increase would affect all HALO, regardless of where the currency is being stored.
Now it’s time to vote on the Proposal 002 which is the split amount. We have 4 options:
Since the coin split vote has already passed with an overwhelming majority supporting it, the split amount itself will simply be determined by a “plurality voting” method (known as “first past the post” in British voting terminology). This method is defined as “one in which voters indicate on a ballot the candidate of their choice, and the candidate who receives the most votes wins”
For example, if 800:1 receives 30% support, 500:1 35% support, 250:1 15% support and 100:1 20% support; then under this scenario 500:1 would be the winner due to being the most popular option.
In order to vote, you must email your information to: firstname.lastname@example.org. Submissions must include a full screenshot of Featherlite resting on your Masternode screen with the statistics showing. The two pieces of information necessary for participation are your Halo Invested and the Prime account. If you own multiple Halo Addresses with Masternodes then you can submit a vote for each Address. To stay up to date on Proposal-002, visit our forum discussion here.
Masternode System updates
In the last Masternode release, we introduced a fledgling API to reduce network load and increase speed when loading masternodes. There have been some growing pains due to these changes, and it is our priority to resolve these issues to ensure a smooth experience. As such, the most recent development on the Masternode DAPP includes bug fixes, quality of life changes, and some new features. We resolved an issue that blocked Masternode loading after a cancellation. We also resolved an issue with the withdraw all rewards dialog sometimes displaying incorrect information. The watched contract system was tweaked to only include manually-added contracts, which resolves an issue when selling all shares in a masternode and refreshing before the API has caught up.
For quality of life, the Masternode manage view now utilizes a reactive number of available shares for sale. The number of shares displayed in the sell shares button now updates to the current amount of available shares, and users can no longer attempt to create a sell order for more shares than are available. A new feature we are working on is the address book, which can be used to store named addresses which can then be quickly selected or populated into masternode account fields. A preview of the address book feature is shown below.
This past sprint, our focus for the Centralized Exchange has been on building a test suite encompassing both end-to-end simulation and unit testing. This will allow us to monitor/improve performance and code functionality going forward, as well as allow us to make rapid and confident code changes that preserve code integrity. In addition to that, the team has added native WebSockets integration to the HaloFIX API and completed major work on the Wallet API that will provide for a safe and robust back end to node communication.
Block & Chain Games updates
We’re pleased to announce we have partnered with Crypto Gamers Community, the leading community and fan site for blockchain games. This is a very active community, which features content from major blockchain game developers and game platforms. As a preferred partner, the Block and Chain Games platform is listed on the site as well as our game trailers, newsletters and press releases. Of course, once our games go live, they will be listed here too and will receive top billing. Read more about this and other game development news in our latest weekly update.
Halo Platform Portfolio updates
Portfolio has been undergoing lots of changes to improve our user experience. We’ve refactored all of our charts to reduce the number of bugs and improve our ability to add features to them. Now they look even better than ever! We’re also developing more backend components to get our real-time pricing API working to provide Portfolio with close to real-time data. Finally, we’re working on supporting more exchange data providers and making numerous performance improvements.
Business Development Efforts
Since all of the hard work our development team has been doing on HaloDEX has been so fruitful and launch is very near, we figured it was the right time to ramp up our discussions with major cryptocurrency trading groups in regards to building our market maker and liquidity provider programs. Our team has been in contact with some of the best programs in this space and will be making formal announcements as relationships are made official.
To help us continue to build our ever-growing community, we’ve been making major connections through our university outreach efforts. In fact, Halo Platform was very happy to meet up with the leadership behind the BlockVenture Coalition (https://blockventurecoalition.com/index.html), the largest alliance of university blockchain groups in the world, at the great Bitsian “Wine O’Clock” networking event held on October 10th. With over 40 blockchain groups across 7 countries and a reach of 15,000 students, the Halo Platform is very excited to get more involved with them in their efforts of advancement and guidance for university blockchain projects.
The Halo Platform team would like to welcome and congratulate Sean Kimball on both becoming a full-time employee at Halo Platform and for becoming Halo Platform's first Development Manager. Sean has provided the team with immense talent and many solutions on to the development side of our projects.
Setting up and using a masternode is simple with the Halo Platform. Featherlite walks you through the necessary steps to acquire, deploy, join, watch, and collect awards from your masternode.
For detailed instructions with images, go here: https://wiki.haloplatform.tech/Masternodes
Masternode Estimated Reward Payouts
If you’re curious about masternode reward payouts, refer to the below spreadsheet.
Check out our searchable block explorer to take a close look at any block or transaction on the chain. In the coming days you’ll be able to see transactions for each wallet address on chain: https://explorer.haloplatform.tech/.
View our progress on our roadmap. https://www.haloplatform.tech/roadmap.html
Connect with us in social media
Offical Forum - https://community.haloplatform.tech/
Twitter - https://twitter.com/Halo_Platform
Reddit - https://www.reddit.com/r/HaloPlatform/
Discord - http://discord.haloplatform.tech/
Telegram - https://t.me/haloplatform
Google+ - https://plus.google.com/u/0/108336112327687734137
Steemit - https://steemit.com/@haloplatform
Medium - https://medium.com/@haloplatform
Facebook - https://www.facebook.com/HaloPlatform.tech/
Youtube - https://www.youtube.com/channel/UCZqP3U9jFO0XTV6EYNt1dqg
Instagram - https://www.instagram.com/halo_platform/
LinkedIn - https://www.linkedin.com/company/haloplatform/
Github - https://github.com/haloplatform
Block and Chain Game Studios - https://www.blockandchain.games/
Halo Platform/Block and Chain Game Studios international community: Available languages: Arabic, Chinese, Hindi, Japanese, and Russian.
Where to Get Help
If you run into any issues with any of our products (and you’ve tried refreshing and full node and that doesn’t fix it), there are numerous ways to reach out to us:
Discord: http://discord.haloplatform.tech/ (our moderators and support are online almost 24 hours a day. Special thanks to Moggy, Abe, Jay B., Pesh, and SeriousBasil237).
Website (we have a support platform built in): https://www.haloplatform.tech/
^Everyone @ Halo Platform
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494424.70/warc/CC-MAIN-20190220024254-20190220050254-00097.warc.gz
|
CC-MAIN-2019-09
| 9,825
| 61
|
http://www.emailaddressmanager.com/forum/viewtopic.php?p=4459
|
code
|
Can you please try by setting up Outlook to use its internal email editor, instead of Word? Does it make any difference? You can setup Outlook to use its internal email editor by going to your Outlook Tools menu -> Options -> Mail Setup -> unmark the option to use MS Word as your email editor.
Also, can you please email me (email@example.com
) the B&W options file? Maybe we can find something wrong there that is causing this problem. The options file can be located in your AppData folder (C:\Documents and Settings\YOUR_USER_ACCOUNT_NAME\AppData\Roaming\DS Development\bw - take the options.xml file and the HTML Templates folder and attach them to an email to me). Thank you.
Plus, does the problem occur on all outgoing emails OR does it work fine when you create a new email (not a reply/forward, but a new one)?
I am sure we can fix this issue, but we need to figure out what exactly is causing it...
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709101476/warc/CC-MAIN-20130516125821-00037-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 909
| 5
|
https://www.keysight.com/kr/ko/product/10932B/axis-board.html
|
code
|
The Keysight 10932B Axis Board supplies position information for measurement system applications. The axis board outputs 32-bit position or position error via a hardware output and over GP-IB. Its accuracy and high update rate make it ideal for supplying the high-performance positioning required with custom servo-control electronics.
Up to six Keysight 10932B boards can be configured in a Keysight 5507B electronics chassis with a Keysight-designed backplane. As part of the Keysight 5507B or a Keysight 5527B laser interferometer positioning system, the Keysight 10932B can be used for open-loop measurements or position data for custom closed-loop applications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475727.3/warc/CC-MAIN-20240302020802-20240302050802-00267.warc.gz
|
CC-MAIN-2024-10
| 666
| 2
|
https://www.arxiv-vanity.com/papers/1310.4519/
|
code
|
On Goldman Bracket for Gauge Group
In this paper, we obtain an infinite dimensional Lie algebra of exotic gauge invariant observables that is closed under Goldman-type bracket associated with monodromy matrices of flat connections on a compact Riemann surface for gauge group. As a by-product, we give an alternative derivation of known Goldman bracket for classical gauge groups , , , , and .
Mathematics Subject Classifications. 81T13, 70S05, 81T45, 58J28, 70G65.
Keywords. Chern-Simons theory, flat connection, moduli space, monodromy.
Traces of monodromy matrices of flat connections computed along closed loops on a Riemann surface are known to satisfy the Goldman’s Poisson bracket for the following list of gauge groups: , , , , , , , , , , , and . The problem of computation of the bracket between traces of monodromy matrices for exceptional gauge groups so far remains open. The goal of this paper is to fill this gap for , the simplest exceptional Lie group. In the process, we learn that traces of monodromy matrices are not sufficient to close an algebra under such Poisson bracket and hence demands for the introduction of an infinite set of exotic -gauge invariant observables that together with the canonical observables of traces of -monodromy matrices form a closed infinite dimensional Lie algebra under such Goldman-type bracket.
Given the fundamental group of a closed oriented surface and a Lie group , the space is defined as the quotient of the analytic variety by the action of by conjugation. Consider a - valued ( is the Lie algebra of ) flat connection on a compact Riemann surface of genus . The Atiyah-Bott bracket on the space of flat connections can be derived from the Chern-Simons action on the 3-dimensional manifold . Let us represent the connection -forms as , where . The generators of the the gauge group are assumed to satisfy the normalization condition
with . Then the Atiyah-Bott bracket reads
The space of flat connections modulo gauge transformation is finite dimensional and traces of the monodromy matrices of flat connections can be chosen to be the underlying gauge invariant observables.
Goldman in derived the Poisson bracket between traces of the monodromy matrices for classical groups already listed at the start of the introduction. For example, for any two transversally intersecting oriented closed curves and on , the Poisson bracket between tarces of monodromy matrices reads
For the case of the bracket looks as follows
Here, and represent loops on which are obtained from and by appropriate resolution of their intersection points (see figure 1).
The extensions of Goldman’s results to exceptional Lie groups were not known before. Of all five exceptional Lie groups, is simultaneously the smallest and one of the most important ones. Recently, it played pivotal roles in exceptional geometry (see ) and in Lattice QCD (see , , and , for example). Manifolds admitting holonomy are also of special interest in M-theory (see and for a brief review). Quantization of Goldman bracket for loops on surfaces and its relation to (2+1)-quantum gravity are also investigated in (,). In (), it has been shown how signed area phases appear in the quantized version of the classical brackets due to Goldman.
The goal of this paper is to generalize Goldman’s bracket to the case of gauge group. Consider the monodromy matrices and to be in the fundamental representation of . The existence of a new type of gauge invariant observables emerges by noting that
Here are skew symmetric matrices representing the right action of purely imaginary octonions lying in 6-dimensional sphere (see for a detailed discussion on left and right octonionic operators). Let be a purely imaginary octonion and the matrices in (1.5) represent the octonionic imaginary units in the sense of . Then the action of on is defined as
Therefore, the matrices ’s and ’s, appearing in (1.5), transform the purely imaginary octonions into themselves. A new ingredient of (1.5) in comparison with the classical Goldman bracket is the term . This expression turns out to be gauge invariant although none of the terms is individually gauge invariant. We proceed further to show that there is an infinite set of such exotic gauge invariant observables for the case of gauge group, the Poisson bracket between two such observables being again a linear combination of exotic gauge invariant observables. The Poisson bracket between the trace of a monodromy matrix and an exotic observable of this type can also be found to be a linear combination of exotic - gauge invariant observables, hence proving the closedness of the algebra of -gauge invariant observables (canonical+exotic) under such Goldman-type Poisson bracket.
The organization of the paper is as follows. In section 2, we recall how the Atiyah-Bott bracket originates from the Hamiltonian Chern-Simons theory and derive an auxiliary expression for Poisson bracket of traces of monodromy matrices along intersecting loops. In section 3, we show how this general expression can be used to derive this bracket for a few cases from Goldman’s list. In section 4, we derive the Poisson bracket between traces of monodromy matrices using the formalism developed in section 2 and show how it leads to an infinite set of exotic -gauge invariant observables.
2 Poisson brackets for traces of monodromy matrices from the Atiyah-Bott bracket
In this paper, space-time is modelled as a -manifold where representing “space” is a compact Riemann surface and represents “time”. For an arbitrary real gauge group , the Chern-Simons action functional on reads
The connection -forms on the principal -bundle, taking their values in the Lie algebra of the gauge group , are given by
Denote the generators of the group are given by and write
where the space-time label . Here, are chosen such that the following holds
with . The curvature form , for the principal connections (2.2), is easily found to vanish. The time component of the flat connections can be gauged out. From the gauge fixed Chern-Simons action, one obtains the coordinates and momenta of the underlying phase space of flat connections. At each space-time point, there are degrees of freedom associated with and . The Poisson structure of the infinite dimensional space of flat connections is given by the famous Atiyah-Bott bracket between the phase space variables at a given time slice of space-time :
The space of flat connections modulo gauge transformation turns out to be a finite dimensional space; traces of monodromy matrices of flat connections computed along intersecting loops on can be used as gauge invariant observables. In this section, we compute the Poisson bracket between traces of the monodromy matrices along two homotopically inequivalent loops that intersect transversally at a single point using the formalism originating from the Hamiltonian theory of Solitons. The generalization to many intersection points is straight forward.
Denote two loops on by and that intersect transversally at a single point on . Without loss of generality, let us assume that the paths and intersect orthogonally at . These two loops are illustrated schematically by and in figure 1. The parts and are taken to lie along and axes, respectively. The relevant transition matrices are denoted by and . Let us denote the monodromy matrices computed along and by and , respectively. They are given by
where and are the remaining contributions of monodromy matrices and due to the paths and , respectively (see figure 1). The matrices and Poisson commute with each other and with other transition matrices in question since they are due to parts of the loops far away from the intersection point and hence have nothing to do with each other. There are two distinct ways of resolving the point of intersection . One of them is shown in figure 1 to obtain the loop . Monodromy matrix around the loop is denoted by .
Here, the matrices and take their values in the gauge group . Let us represent the connection 1-form on as
In view of (2.7), the 1-forms, restricted to the real and imaginary axes, read
In terms of the real and imaginary parts of the connection 1-forms, i.e. and , the Atiyah-Bott bracket (2.5) reduces to
The fundamental Poisson brackets between valued 1-forms are given by
where is the Casimir tensor for given by
Proof . The above lemma is just a consequence of (2.9).
We should emphasize in the context of lemma 2.1 that the basis of the underlying Lie algebra is chosen in such a way that the trace form between the group generators is diagonalised in order to comply with what was used in the derivation of the Atiyah-Bott bracket (2.5). The statement of lemma 2.1 is independent of the representation of the Lie algebra, though. All it means is that the same representation has to be chosen during both the derivations of the Atiyah-Bott brackets and the fundamental Poisson brackets.
Using lemma 2.1, one obtains the Poisson bracket between transition matrices along two small paths of the given loops around the intersection point as illustrated in figure1.
Proof . The Poisson brackets between transition matrices in the context of Hamiltonian theory of Solitons are given in (, page 192). In our setting, this formula gives
Proof . Using (2.6), one obtains
where we have exploited the fact that and both Poisson commute with and , and among themselves. Using lemma 2.2, one obtains
Taking trace on both sides of equation (2.16) and subsequently making use of the cyclic property of trace, one finally obtains
3 Examples of Poisson brackets between traces of monodromy matrices for some known real Lie groups
In the previous section, we obtained an auxiliary formula (2.14) for Poisson brackets between traces of monodromy matrices computed along free homotopy classes of loops on . In this section, we shall use it to reproduce Goldman’s brackets for , , , , and gauge groups.
We, first, note that the generalized Gell-Mann matrices in dimensions read
Here, is an matrix with in the entry and elsewhere.
A couple of preparatory lemmas are required in order to derive the Poisson bracket between traces of monodromy matrices for some known real Lie groups from (2.14).
Given the matrices and as in (3.1), we have
Consider the right side of (3.3) and compute
Plugging (3.4) into (3.3), one obtains
which leads to
Given for and as in (3.1), the following holds
Let us now compute the Casimir tensor appearing in (2.14) for the specific cases of , , , and . In what follows, the permutation matrix is denoted by . Given two matrices and , enjoys the following properties:
For and gauge groups, the Casimir tensor in the auxiliary expression (2.14) of Poisson bracket between traces of the monodromy matrices reads
where is the Permutation matrix.
The Lie algebra associated with is , the vector space of all real matrices. The dimension of this vector space is . We choose the matrix , matrices with , matrices with , and another matrices with from (3.1) to form a basis of . Here, in (2.4), associated with the preceding choice of generators for , for the basis elements with . For the rest of the basis elements, we have .
With the above choice of the basis of , the Casimir tensor reads,
Using lemma 3.1 together with lemma 3.2 in (3.12), one obtains the Casimir tensor for the case of gauge group:
An appropriate choice of basis for the Lie algebra , in the context of (2.4), will be the skew-Hermitian matrices (see (3.1)) , for and for . In accordance with the choice of these generators of unitary group , in (2.4) for . The corresponding Casimir tensor reads off immediately
Here, again, we use lemma 3.1 and lemma 3.2 to arrive at (3.14). ∎
Direct application of proposition 1 in (2.14) and subsequent use of the properties of , enumerated in (3.10), yield the formula of Poisson bracket for traces of and monodromy matrices as given by the following theorem:
The Poisson bracket between traces of or monodromy matrices reads
where is a or monodromy matrix computed along the loop of figure 1.
The Casimir tensor in (2.14) for or gauge group reads
with being the Permutation matrix and being the
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00208.warc.gz
|
CC-MAIN-2023-23
| 12,180
| 60
|
http://www.personapaper.com/article/22107-dont-make-it-so-obvious-you-really-didnt-want-to-be-there
|
code
|
Don't make it so obvious you really didn't want to be there!
I popped into my local co op on my way home from work to get a couple of things. There was quite a queue and when I got to be served by a young guy, I was gobsmacked.
Considering he was serving customers, he could not have tried any more harder to look as miserable as possible and make it pretty obvious he did not want to be at work and serving people! His whole body language was that he did not want to be there, I was quite shocked as I never been served by someone that has looked so unprofessional. I even had to ask for a bag for my shopping and he had about as much enthusiasm as a dead fish.
I really wanted to say to him for god's sake don't make it so obvious you don't want to be here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359073.63/warc/CC-MAIN-20211130201935-20211130231935-00145.warc.gz
|
CC-MAIN-2021-49
| 759
| 4
|
https://crnkovic.me/about/
|
code
|
Hi there, I'm Josip! I'm currently a Computer Science student at Faculty of Electrical Engineering and Computing, University of Zagreb. My main area of expertise is web development, more specifically Laravel and Vue.js, however I try to keep up to date with other technologies. I'm also really trying to get into AI/ML.
Make sure to check out my blog, as I try to update regularly. You may find some cool Laravel under-the-hood tricks there and articles about technology and computers in general. If you like what I write, subscribe at my newsletter as you will get notified anytime I post something new. Oh, I'm also doing some photography in my free time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526966.26/warc/CC-MAIN-20190419021416-20190419043416-00552.warc.gz
|
CC-MAIN-2019-18
| 657
| 2
|
https://www.packal.org/theme-tags/clean
|
code
|
A simple, sophisticated theme. Has serif fonts and a ton of padding. I designed this because I wanted it to stand out when sharing my screen and searching for something.
MacOS Native Dark Mode
This theme is a fork of Paper (v2), by Florian Pircher.
This updated version features slightly wider spacing and clearer selection highlighting in a subtler off-white shade, retaining the same elegant aesthetic.
An minimal Alfred theme inspired by the Dark Mode in OS X Yosemite. Best used with blur max.
YOSEMITE - best design theme for MacOS 10.10 by i-NOVATiON
Enjoy clean design:
Yosemite i-NOVATiON Theme
- best yosemite style
- great typo design
- clean and transparent design
Have fun using our theme!!!
i-NOVATiON - mobile & web applications Application development for your company. Germany, 92637 Weiden, www.i-novation.de
I created a simplified Predawn theme with the Twilight orange instead of the default orange. Matches the color values exactly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646257.46/warc/CC-MAIN-20230531022541-20230531052541-00069.warc.gz
|
CC-MAIN-2023-23
| 952
| 14
|
https://www.freelancer.com/projects/mobile-phone/developer-application-reskin/?ngsw-bypass=&w=f
|
code
|
I want a developer who works with me along-term
I will need to develop several applications, I will give you the source code, and I will need to change everything
Maybe we develop 2 o 3 apps with the same code source
The most important thing for me is to have constant communication to solve any problem and please give me the best price we are at the beginning of our project and for good results we will pay more
12 freelancers are bidding on average $30 for this job
hello... Paul here... I can reskin the source code as per your requirement and I am best at 24h service for communication. come over chat for discussion. thank you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039508673.81/warc/CC-MAIN-20210421035139-20210421065139-00584.warc.gz
|
CC-MAIN-2021-17
| 634
| 6
|
https://publishingstate.com/semantic-ai-in-academia/2024/
|
code
|
Table of Contents
- Understanding Semantic
- The Evolution of Semantic AI in Academia
- The Future of Semantic AI in Academia
- Conclusion – Embracing the Intersection of Semantic AI in Academia
The write-up discusses Semantic AI in academia. Semantic AI is an emerging field of artificial intelligence focused on understanding the meaning of language. Unlike traditional AI approaches that analyze statistical patterns in data, semantic AI aims to comprehend the more profound significance behind words and how concepts relate.
Semantic AI involves creating mathematical representations of word and sentence meanings using techniques like natural language processing. This allows semantic systems to interpret more complex ideas expressed through language and even answer questions based on that understanding.
Critical capabilities of Semantic AI include:
- Analyzing the context and relationships between words/concepts
- Translating between languages while preserving meaning
- Answering questions based on comprehension of content
- Summarizing large volumes of text by identifying key ideas
Unlike keyword matching, Semantic AI aims to unlock deeper meaning within language. This could greatly expand the potential of AI across diverse fields.
The Growing Role of AI in Academic Research
Within academia, AI is taking on an increasingly vital role in knowledge discovery and dissemination. Semantic AI explicitly brings new opportunities to enhance scholarly communication and research.
A few applications include:
- Semantic search – Finding relevant studies/data based on meaning, not just keywords
- Automated meta-analyses – Systematically reviewing bodies of literature to uncover connections
- Intelligent research assistants – Answering researcher questions by comprehending background literature
Semantic AI could allow more impactful discoveries as research becomes more data-intensive and cross-disciplinary. Exciting times may lie ahead at the intersection of human creativity and machine understanding.
Semantic, in short, means a study of meaning. Semantic understanding refers to comprehending the meanings and relations of words and sentences in their context. This comprehension extends beyond identifying keywords to grasping nuances, intentions, connotations, and implications conveyed through language. It involves recognizing the different meanings that a word or phrase may have depending on the situation and how combinations of words can generate complex ideas and concepts.
To unpack how AI, particularly Semantic AI, could impact or change our grasp of semantics, we must consider the evolution of language models and their ability to parse and generate language with increasing sophistication. Early AI systems relied on keywords and statistical patterns to interpret text; however, they lacked a genuine understanding of meaning and context. The gap between human-like semantic understanding and machine interpretation has been a substantial challenge for AI researchers.
There has been a significant shift towards models that can internalize more intricate language structures and meanings in recent years. This is primarily due to improvements in natural language processing (NLP) techniques, such as developing deep learning models that can create embeddings—vector representations of words—that capture semantic relationships. These advancements allow AI to discern context and effectively learn from vast amounts of textual data, enabling it to understand and manipulate language in ways that seem more ‘human.’
Semantic AI operates by using these sophisticated models to address tasks that require deeper language understanding, such as:
- Analyzing the context in which words are used to appreciate their specific meanings in that context.
- Translating between languages while maintaining semantic integrity involves understanding idiomatic expressions and subtleties in both the source and target languages.
- Answering questions not by retrieving pre-stored answers but by interpreting information in a given corpus or dataset and generating an informed answer.
- Summarizing content by recognizing central themes and arguments in a text through understanding the value and significance of different passages or data points.
The change brought about by Semantic AI in academia can influence how information is curated, analyzed, and synthesized. AI systems enabled with semantic capabilities can assist researchers in sifting through massive datasets and literature by locating relevant information based on the interconnected meanings of concepts rather than surface-level keywords.
This can revolutionize meta-analyses, which aim to combine the findings from multiple studies into a coherent understanding of a field or phenomenon. Furthermore, these systems offer the potential to act as intelligent research assistants by providing succinct summaries, identifying gaps in knowledge, suggesting related topics of interest, and even predicting future research trends.
These AI-driven semantic systems will likely change academia by making research processes more efficient and enabling the handling of more complex and nuanced inquiries. They might also facilitate cross-disciplinary research by bridging the semantic gaps between knowledge domains.
As more advanced models are developed, the potential applications of Semantic AI in academia will likely expand, continuing to transform how knowledge is discovered, shared, and built upon.
The Evolution of Semantic AI in Academia
AI’s deep learning capabilities revolutionize academic publishing by enabling Semantic AI systems to decode the meanings hidden within complex research papers and datasets. Powerful deep learning algorithms can now analyze millions of academic documents, interpret results, and identify critical insights faster and more accurately than humans alone.
Whereas traditional techniques rely on rules-based analysis, deep learning algorithms utilize neural networks that continually learn from vast datasets. Semantic AI can better understand academic language, terminology, and context when interpreting research findings.
Semantic AI systems can revolutionize how discoveries are presented and accessed by decoding the underlying semantics. Research can be automatically summarized, connected across disciplines, and translated into plain language for broader reach.
Semantic AI can conduct predictive analytics to forecast emerging research topics and trends by leveraging its deep comprehension of scholarly content. This allows publishers and institutions to make data-driven decisions about research directions and resource allocation.
Researchers also benefit from Semantic AI, identifying papers and authors to collaborate with, surfacing funding opportunities, and anticipating future citations and impact metrics for their work.
The peer review process is vital for upholding academic quality and integrity. Unfortunately, issues like bias and inconsistency often undermine its objectivity. Semantic AI promises to mitigate these concerns and improve peer review.
By assessing the semantics of research rather than surface qualities, Semantic AI reduces human propensities to bias. It also applies consistent standards when evaluating submissions. Together, this enhances fairness, accountability, and transparency.
Many publishers now use Semantic AI in academia to screen papers before assigning reviewers. This lightens reviewer workloads while allowing them to focus on higher-order assessments of merit and significance.
The Future of Semantic AI in Academia
The future of Semantic AI in academia appears promising and multidimensional, shaping research methods and the dissemination and evaluation of academic work.
Research Methodology Enhancement
Semantic AI is poised to further enhance research methodologies by facilitating nuanced text analysis and data interpretation. Comprehending complex academic language will enhance researchers’ capabilities to sift through large volumes of literature, extract relevant information, and discern patterns in data that might otherwise go unnoticed. This will be particularly important in fields that are burgeoning with new information, such as genomics and climate science.
The application of Semantic AI could also help bridge disciplinary silos in academia. By recognizing and linking related concepts across disparate fields, Semantic AI systems might suggest novel research angles or unexplored collaborations that could lead to innovative breakthroughs. Overcoming the traditional barriers between disciplines can foster a more holistic understanding of complex issues.
In the future, Semantic AI could play a crucial role in making academic publications more accessible. Translating dense technical language into summaries or translating content into different languages could democratize knowledge and break down barriers to information, both for the general public and for academics in lower-resourced regions or non-native English speakers.
Predictive and Prescriptive Analytics
Semantic AI’s ability to predict future trends could lead to a forward-looking academic culture. Institutions may start to rely on AI-driven insights to set research agendas, allocate funding, or build infrastructure for research on predicted future hot topics. This prescriptive approach could make academia more proactive rather than reactive, aligning research initiatives with future societal needs.
Enhancing Peer Review
Semantic AI could significantly reform the peer review process. By analyzing and comparing content for originality, methodological rigor, and relevance, these systems could provide initial screening for reviewers, ensuring that human effort is reserved for the most promising or innovative submissions. This could speed up the publication process and enhance the overall quality of accepted papers.
Impact on Learning and Teaching
Beyond research, Semantic AI could influence learning and teaching by offering personalized educational resources, reading materials, and interactive learning experiences based on the semantic understanding of a student’s strengths and weaknesses. This could lead to highly tailored educational experiences.
As with all AI-powered tools, the use of Semantic AI in academia must be guided by ethical standards. Concerns about privacy, data security, and the fair use of AI will need to be addressed. Moreover, reliance on AI should not overshadow the value of human insight; instead, it should complement human intellect.
Economic and Societal Impact
If Semantic AI tools become widespread, the economic model for access to scholarly communication might shift. Subscription models could be replaced by more open-access content driven by a need for AI readability. Additionally, the societal impact of research could be evaluated based on a semantic understanding of a paper’s content, influencing funding and policy decisions.
In summary, integrating Semantic AI into academic publishing is expected to make research more efficient, cross-disciplinary work more feasible, academic insights more accessible, and the academic enterprise more ethically aligned with societal values. However, it will be important for academia to navigate these changes with caution to ensure that the quality and integrity of academic work are maintained alongside the adoption of these technological advancements.
While AI excels at processing vast amounts of data, human creativity and critical thinking remain vital to academic inquiry. Semantic AI is best leveraged as a collaborative tool to empower researchers. For example, machine learning algorithms can scan millions of academic articles to surface publications relevant to a researcher’s niche interests and questions. This expands the scope of what an individual scholar can explore, augmenting the reach of human curiosity.
As with any new technology, implementing Semantic AI on a large scale within academia raises critical ethical questions. There are valid concerns about perpetuating societal biases, compromising personal privacy, and researchers becoming over-reliant on algorithms. Academia must establish governance policies and best practices for accountable, transparent, and ethical utilization of AI. Ongoing education on avoiding pitfalls like bias while harnessing benefits like increased access to knowledge will be essential.
Conclusion – Embracing the Intersection of Semantic AI in Academia
Integrating Semantic AI in academia and publishing offers numerous benefits, including improved efficiency, enhanced quality control, and expanded knowledge discovery. Researchers can uncover new insights and connections across disciplines by leveraging machine intelligence to process vast amounts of data and identify patterns. Additionally, AI tools can assist in screening submissions for plagiarism and errors, lightening the reviewers’ workload and allowing them to focus on higher-order assessments.
However, the adoption of Semantic AI also presents challenges and ethical considerations. Academia must establish governance policies and best practices to ensure fairness, transparency, and accountability in using AI. Concerns about bias, privacy, and over-reliance on algorithms must be addressed through ongoing education and responsible utilization of advanced technologies.
Ultimately, the future of academic research lies in the collaboration between human curiosity and machine intelligence. By embracing Semantic AI as a collaborative tool, researchers can harness its power to augment their capabilities and expand the boundaries of knowledge. With careful consideration and responsible implementation, Semantic AI has the potential to revolutionize the academic landscape and shape the future of research and publishing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474775.80/warc/CC-MAIN-20240229003536-20240229033536-00469.warc.gz
|
CC-MAIN-2024-10
| 13,849
| 63
|
https://dev.bukkit.org/projects/voxelmore
|
code
|
- Lead Design & Programming: ridgedog
- Additional Programming: EvilSeph and Gavjenks
- Documentation: http://www.voxelwiki.com/minecraft/VoxelMore
VoxelMore is a communal item-spawning plugin targeted for Creative SMP servers. We like to think of it as a "magic penny" mod that allows builders on a server to use a single block to create more of that material, reducing the need for typed item number declarations and making inventory management more fluid.
Full documentation and configuration information are all available at: http:www.voxelwiki.com/minecraft/VoxelMore
Current stage: Mature
Source code: Unavailable
Support: VoxelBox support center
The Voxel Box is a community-driven creative play server that consistently push the limits of what the Minecraft client and server can deliver to builders and to players. Over the past year and a half, it's blossomed into a place where some very talented people have built some of the most impressive Minecraft-related structures, software and concepts.
THE VOXEL BOX
VoxelPlugins: A suite of plugins for Minecraft servers running Bukkit
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00568.warc.gz
|
CC-MAIN-2022-33
| 1,090
| 11
|
http://danielashbrook.com/projects.html
|
code
|
This is a list of project ideas. Most of them are half-formed and will require a great deal of independent thinking and work from the student, but also represent excellent learning opportunities.
Most of these projects deal with physical computing: computing devices that somehow interact with the real world.
If you’re looking for a MSc thesis idea, be sure to also read my advice for thesis students.This list of projects is organized into rough categories, illustrating the balance of work involved:
A frequent problem for novices in 3D modeling is understanding size. Can we make reference to a database of standardized “familiar objects” (e.g., consumer electronics with known sizes like phones) to use as in-software reference items? This could help novices get an idea of the true size of their model, and possibly could also serve as reference geometry.
Lint for software finds problems in code. Can we make something similar for augmented fabrication? This would involve modifying a 3D design environment to check for problems of symmetry, centering, objects almost but not quite touching, and so on, and providing feedback to the user about these problems.
Figure out how to make voice assistant commands discoverable. Can it be done without using visual assistance?
Two points make a line, but three can make a plane, triangle, or circle. The goal in this project is to take a small set of measurements in space and suggest possible shapes that those measurments could be from: was it a cube, a sphere, a light bulb or an iPhone? This will form part of an interactive system to help people create digital models of physical objects.
Lots of fabrication activities concentrate on small, handheld objects. How can we design for larger objects, like furniture? Can we do this at a 1:1 scale, situated in the real world? Augmented reality could be a good way to do this. What kind of tools and visualization ability is needed?
Can we control objects in the environment solely via eye tracking? By using the vestibuluo-ocular reflex, which is the property that keeps our eyes stil when we’re looking at something, we might be able to get information about how the head is moving and use this motion as a control mechanism.
In our lab, we’re looking at pneumatic (air-driven) interaction. However, we need a design environment that allows the construction of tubes, holes, and various other features in 3D meshes. This project would involve using graphics libraries to construct or modify a design environment to make this task easier.
I have many ideas for building a printer that can embed threads into a 3D-printed object. There’s a non-trivial (I think) algorithmic task here in figuring out the right way to route threads while printing to make everything work correctly.
We are working on a large-scale air table—imagine an air hockey table with each jet of air individually controllable. There is a lot of mechanical construction to be done, as well as software work (both Arduino-level and computer control) to create interesting interactions and demos.
Build and evaluate an interface that lets people control a wearable by wiggling their ears. (Maybe it also teaches them how to wiggle their ears first.)
Previous research at CMU illustrated acoustic barcodes, a pattern of ridges which make a characteristic sound when scratched. Can we print small areas which have the same property into 3D-printed objects, so that a user can simply use a fingernail and scratch an area of interest? This could be done by varying the layer height or other properties of the 3D printing process.
Can we identify characteristics about users by how they grasp a tool while they’re using it? Soldering iron, screwdriver, hammer, saw… maybe we can identify users in order to track tool use , or determine experience level with that tool, or automatically figure out where in the process of a project someone is .
Fluidics, or fluid logic, is a principle that uses air to perform computation. How can we use this principle to create 3D printed objects that become interactive with only air input? This would allow the quick creation of useful objects without any complex assembly. This project involves a lot of experimentation with fabrication, as well as reading historical literature about design for fluidics.
How could voice and gesture control be used to help in modeling for 3D printing? What kinds of things might people say? How would their command and gestures change based on what they are modeling? This project would involve asking people to pretend to use a future 3D-modeling system in this way, and determining what kinds of features would be natural to use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100047.66/warc/CC-MAIN-20231129010302-20231129040302-00800.warc.gz
|
CC-MAIN-2023-50
| 4,688
| 17
|
https://docs.microsoft.com/en-us/windows-hardware/drivers/ddi/content/ntddk/nf-ntddk-iofreecontroller
|
code
|
The IoFreeController routine releases a previously allocated controller object when the driver has completed an I/O request.
NTKERNELAPI VOID IoFreeController( PCONTROLLER_OBJECT ControllerObject );
Pointer to the driver's controller object, which was allocated for the current I/O operation on a particular device by calling IoAllocateController.
The connection between the current target device object and the controller object is released only if no requests are currently queued to the same device. Otherwise, the driver's ControllerControl routine is called with the next IRP bound through the device controller to the target device.
|Windows version||Available starting with Windows 2000.|
|Header||ntddk.h (include Ntddk.h)|
|DDI compliance rules||IrqlDispatch, HwStorPortProhibitedDDIs, IrqlDispatch(storport)|
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867416.82/warc/CC-MAIN-20180526092847-20180526112847-00514.warc.gz
|
CC-MAIN-2018-22
| 818
| 7
|
https://givefit.net/apply-to-join-1
|
code
|
GiveFit is all things FREE
We are a mission-driven nonprofit building healthy communities with high-quality, FREE group fitness classes in Baltimore. Our mission is to keep our city moving and having fun! Your monthly subscription helps us keep our calendar up-to-date, pushing for more accessible classes in our city, and even hosting our own premium, member-only classes!
Attend over 30 FREE group fitness classes per month with GiveFit!
HOW DOES GIVEFIT WORK?
Our Awesome, Baltimore-area Fitness Partners
GiveFit is a Strong City 501(c)(3)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948542031.37/warc/CC-MAIN-20171214074533-20171214094533-00017.warc.gz
|
CC-MAIN-2017-51
| 542
| 6
|
https://ja.confluence.atlassian.com/jirakb/best-practice-to-change-from-war-to-bin-installation-695108985.html
|
code
|
Best practice to change from WAR to Bin installation
We will suggest to perform the following steps (for the migration in same server):
- Backup JIRA Home Directory (include plugins, attachments, and data).
- Backup Data:
- Export out an XML backup via JIRA Backup UI.
- Export your Database Dump out.
- Shutdown JIRA WAR.
- Install a new JIRA Bin in your server.
- Run JIRA Configuration Tool.
- Configure JIRA to use the backup JIRA Home Directory.
- Configure JIRA to use the current database.
- Jira を起動します。
If you plan to do migration in another server, please refer our Migrating JIRA to Another Server article.
We recommend to test this changes in Staging Environment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538741.56/warc/CC-MAIN-20210123222657-20210124012657-00236.warc.gz
|
CC-MAIN-2021-04
| 689
| 14
|
https://learn.getfreshly.io/how-to-use-shopify-transfers-with-freshly/
|
code
|
How to use Shopify transfers with Freshly
Currently, Shopify does not have support for a transfer API and hence Freshly does not support or recognize these as quantity updates. We are planning on supporting transfers in the future natively in Freshly (outside of Shopify). However, until then, we recommend following the steps below if you would like to use Transfers with Freshly:
1. When you receive the quantity in your warehouse / storage / non-fulfillment location, we would suggest not adding an inventory batch for this as this could get mixed up with your orders during auto-assignment if batches are not available in your fulfillment location.
2. When you transfer your batches from storage to a fulfillment fulfillment to Shopify, Shopify should increment the quantities in your fulfillment location. Once you do this, you can go into the product in Freshly and use the "Auto create" banner to auto-create the batch for the difference and add the details for the batch (expiry dates, invoices, etc.). You can also add a new batch by unchecking the Adjust quantity in Shopify. You can find more details here.
3. This way you can still keep track of all customer data associated with your batches but not have to worry about batches being fulfilled from your storage location.
If you have any more questions about transfers, please reach out to us over chat.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363292.82/warc/CC-MAIN-20211206103243-20211206133243-00398.warc.gz
|
CC-MAIN-2021-49
| 1,366
| 6
|
https://www.techadvisor.co.uk/forum/helproom-1/ntl-broadband-install-error-help-110956/
|
code
|
I had the same problem when I installed broadband onto my laptop.
From what I can remember, I had to stop the installtion process. Go into control panel to network connection, disable them all and then start the installtion process again. When you have finished installtion you can enable them again.
If this doesn't work, I'll think again about what I did, but I do remember it took serval attempts to get it installed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646176.6/warc/CC-MAIN-20180318204522-20180318224522-00492.warc.gz
|
CC-MAIN-2018-13
| 420
| 3
|
https://anmarsystems.com/Products/HeaderCHK/
|
code
|
Checks if header in all worksheets and files matches our own set, and update them.
Quick tools. Tools that are in 1 file
Macros, or Visual Basic for Application tool
Added in v1.2: An option to refresh these sheets (and workbooks) with the headers found in tool (header sheet)
The project is protected in VBE (Visual Basic Editor) with a password, if you would like to learn the code and need the password, just contact me here
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00868.warc.gz
|
CC-MAIN-2024-10
| 427
| 5
|
http://allapi.mentalis.org/apilist/DeviceCapabilities.shtml
|
code
|
The DeviceCapabilities function retrieves the capabilities of a printer device driver.
Declare Function DeviceCapabilities Lib "winspool.drv" Alias "DeviceCapabilitiesA" (ByVal lpDeviceName As String, ByVal lpPort As String, ByVal iIndex As Long, ByVal lpOutput As String, lpDevMode As DEVMODE) As Long
|Operating Systems Supported|
|Requires Windows NT 3.1 or later; Requires Windows 95 or later|
Pointer to a null-terminated string that contains the name of the printer. Note that this is the name of the printer, not of the printer driver.
Pointer to a null-terminated string that contains the name of the port to which the device is connected, such as “LPT1”.
Specifies the capabilities to query. This parameter can be one of the following values:
Windows 95 only: Retrieves the page positioning for the paper source specified in the DEVMODE structure pointed to by pdevMode. The return value can be one of the following:
Copies an array containing a list of the names of the paper bins. This array is in the form char PaperNames[cBinMax][cchBinName] where cchBinName is 24. If the pOutput parameter is NULL, the return value is the number of bin entries required. Otherwise, the return value is the number of bins copied.
Retrieves a list of available bins. The function copies the list to the pOutput parameter as a WORD array. If pOutput is NULL, the function returns the number of supported bins to allow the application the opportunity to allocate a buffer with the correct size. For more information about these bins, see the description of the dmDefaultSource member of the DEVMODE structure.
Returns the number of copies the device can print.
Returns the version number of the printer driver.
Windows 95 only: The return value is the number of datatypes supported by the printer driver. If the function returns -1, the driver understands the “RAW” datatype only. The names of the supported datatypes are copied to an array. Use the names in the DOCINFO structure when calling the StartDoc function to specify the datatype.
Returns the level of duplex support. The function returns 1 if the printer is capable of duplex printing. Otherwise, the return value is zero.
Windows 95 only: Determines if a printer driver supports enhanced metafile (EMF). A return value of 1 means the driver supports EMF. A return value of -1 means that the driver does not support EMF
Returns a list of available resolutions. If pOutput is NULL, the function returns the number of available resolution configurations. Resolutions are represented by pairs of LONG integers representing the horizontal and vertical resolutions (specified in dots per inch).
Returns the number of bytes required for the device-specific portion of the DEVMODE structure for the printer driver.
Returns the dmFields member of the printer driver’s DEVMODE structure. The dmFields member indicates which members in the device-independent portion of the structure are supported by the printer driver.
Returns a list of files that also need to be loaded when a driver is installed. If the pOutput parameter is NULL, the function returns the number of files. Otherwise, pOutput points to an array of filenames in the form char[chFileName, 64]. Each filename is a null-terminated string.
Returns a POINTS structure that contains the maximum paper size that the dmPaperLength and dmPaperWidth members of the printer driver’s DEVMODE structure can specify. The x member of the POINTS structure contains the maximum dmPaperWidth value, and the y member contains the maximum dmPaperLength value.
Returns a POINTS structure that contains the minimum paper size that the dmPaperLength and dmPaperWidth members of the printer driver’s DEVMODE structure can specify. The x member of the POINTS structure contains the minimum dmPaperWidth value, and the y member contains the minimum dmPaperLength value.
Returns the relationship between portrait and landscape orientations for a device, in terms of the number of degrees that portrait orientation is rotated counterclockwise to produce landscape orientation. The return value can be one of the following:
No landscape orientation.
Portrait is rotated 90 degrees to produce landscape. (For example, Hewlett-Packard PCL printers.)
Portrait is rotated 270 degrees to produce landscape. (For example, dot-matrix printers.)
Retrieves a list of supported paper names (for example, Letter or Legal). If the pOutput parameter is NULL, the function returns the number of paper sizes available. Otherwise, pOutput points to an array for the paper names in the form char[cPaperNames, 64]. Each paper name is a null-terminated string.
Retrieves a list of supported paper sizes. The function copies the list to pOutput as a WORD array and returns the number of entries in the array. If pOutput is NULL, the function returns the number of supported paper sizes to allow the application the opportunity to allocate a buffer with the correct size. For more information on paper sizes, see the description of the dmPaperSize member of the DEVMODE structure.
Copies the dimensions of all supported paper sizes, in tenths of a millimeter, to an array of POINT structures pointed to by the pOutput parameter. The width (x-dimension) and length (y-dimension) of a paper size are returned as if the paper were in the DMORIENT_PORTRAIT orientation.
Returns the dmSize member of the printer driver’s DEVMODE structure.
Retrieves the abilities of the driver to use TrueType fonts. For DC_TRUETYPE, the pOutput parameter should be NULL. The return value can be one or more of the following:
Device can print TrueType fonts as graphics. (For example, dot-matrix and PCL printers.)
Device can download TrueType fonts. (For example, PCL and PostScript printers.)
Windows 95 only: Device can download outline TrueType fonts.
Device can substitute device fonts for TrueType fonts. (For example, PostScript printers.)
Returns the specification version to which the printer driver conforms.
Pointer to an array of bytes. The format of the array depends on the setting of the fwCapability parameter. If pOutput is zero, DeviceCapabilities returns the number of bytes required for the output data.
Pointer to a DEVMODE structure. If this parameter is NULL, DeviceCapabilities retrieves the current default initialization values for the specified printer driver. Otherwise, the function retrieves the values contained in the structure to which pDevMode points.
|If the function succeeds, the return value depends on the setting of the fwCapability parameter. |
If the function fails, the return value is -1.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158279.11/warc/CC-MAIN-20180922084059-20180922104459-00101.warc.gz
|
CC-MAIN-2018-39
| 6,591
| 39
|
https://www.pluralsight.com/courses/visual-studio-2022-code-analysis-improving-code-quality
|
code
|
Improving Code Quality with Visual Studio 2022 Code Analysis
This course is about leveraging Visual Studio’s code analysis tooling to increase your code quality and maintainability.
What you'll learn
It can be difficult to keep a team of developers on the same page, following the same standards, especially when .NET and Visual Studio continue to evolve. In this course, Improving Code Quality with Visual Studio 2022 Code Analysis, you’ll learn to choose and configure analysis rules and refactorings to help maintain consistent coding choices and learn new language features as they emerge. First, you’ll explore the different kinds of code analysis offered by Visual Studio. Next, you’ll discover how you can customize the rules to enforce the ones that are most important to you and deemphasize the ones that aren’t. Finally, you’ll learn how to make code analysis a core part of your build process, and even how to create your own analyzers. When you’re finished with this course, you’ll have the skills and knowledge needed to leverage Visual Studio’s code analysis tooling to learn new language features, enforce coding choices, and automate away some of the common sources of code churn.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653631.71/warc/CC-MAIN-20230607074914-20230607104914-00076.warc.gz
|
CC-MAIN-2023-23
| 1,214
| 4
|
https://www.daniweb.com/digital-media/ui-ux-design/threads/14983/building-a-flash-based-dynamic-photo-album
|
code
|
Good evening all --
Had a question to pose to the masses -- hopefully this is the right spot and maybe someone out there has some opinions. I was comissioned to create an online photo album -- the guy originally mentioned Flash (you know -- roll over the thumbnail and the main image changes, that sort of thing). I'm wondering a couple of things...
First of all, I feel kinda dumb for not knowing this, but does anyone know how, in Flash, to pull in an image but not have it be imbedded within Flash? Similar to the concept of an iFrame or something like that.
Second of all, does anyone happen to have an opinion on whether or not Flash is really the best development area for something like this, or if some sort of DHTML would be better (faster, more efficient, etc.)
The main goal is to create a system that pulls images from some folder where my client can continually dump new images in but he won't have to alter the photo album system... it'll always just pull everything that's in that folder.
I'm sure there's actually something out there too -- not sure if I should bum something else or create from scratch. He's definitely got a custom interface he has in mind.
Dunno -- if anyone has thoughts, I'd appreciate it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00359.warc.gz
|
CC-MAIN-2022-40
| 1,227
| 7
|
https://ohhaskme.com/5571/please-check-the-comment-for-the-photo
|
code
|
It's not a 6. It is a letter b.
They are just putting each equation in slope intercept form, y = mx + b.
The first equation becomes y = x - 5. Comparing that to y = mx + b you can identify m = 1 and b = -5.
The second equation becomes y = -3x + 3. Comparing that to y = mx + b you can see that m = -3 and b = 3.
In each case "y-int = b = ..." means "the y intercept is b which is..."
They use this information to draw each line, and then they determine the point of (2, -3) directly from the graph. After drawing the lines carefully you can see that is the point of intersection.
You are probably being taught how to solve a system of equations graphically. If you are ever asked to do this, with the word GRAPHICALLY, this is what you are expected to do. Draw the lines for each equation, as carefully and accurately as possible, then read the point of intersection from the graph.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500255.78/warc/CC-MAIN-20230205130241-20230205160241-00491.warc.gz
|
CC-MAIN-2023-06
| 882
| 7
|
https://faftech.dk/dr-sevillano-was-right-about-covid-pandemic-as-an-acute-radiation-syndrome/
|
code
|
From this channel: https://www.brighteon.com/channels/clairity
We all knew this beforehand, now further research has been done with disturbing results. This issue has to be resolved with real science by real humans who are not compromised.
Think Human Think! - You might not want to come back to this mess, do you?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534773.36/warc/CC-MAIN-20220521014358-20220521044358-00193.warc.gz
|
CC-MAIN-2022-21
| 314
| 3
|
http://marianaggaga.com/hackathons-build-windows-app/
|
code
|
A Hacker’s Guide to Windows 8 Apps is a four step guide to building apps at a hackathon on the Windows platform. The guide is designed to point you to quick resources and short tutorials you needed to building winning apps at a hackathon.
Get free Tools !!!
Free software is always music to your hears at a hackathon. With programs like DreamSpark for students and BizSpark(see step 2)developers get the software they need for free. With DreamSpark students get access to developer tools like Visual Studio 2012/ 201 3 (Pro and Ultimate). In addition to this you also get a free Windows Store account that allows you to publish apps to the store for free.
To get you on your way to free tools all you need is : a Microsoft account (Hotmail.com, Live.com, outlook.com); and your academic account. Once you have set up your DreamSpark account fill free to start downloading all the tools you need.
- Download Windows 8
- Download Visual Studio Pro or Ultimate of 2013 / 2012 (both available)
- Download Windows 8 SDK
- Download Windows Phone 8 SDK
Windows Azure enables you to quickly build, deploy and manage web applications and services. With a couple of clicks you can simply spin websites, VMs , mobile services just to mention a few.
Use a Virtual Machine to provision on-demand, scalable compute infrastructure when you need flexible resources. You can create VMs that run Windows, Linux, and enterprise applications. Or, capture your own images to create custom VMs.
Mobile Services are my personal favorite when building a Windows 8 or Phone app. With SDKs for Windows, IOS , Android and HTML , mobile services allow you accelerate your app development by providing a way to structure storage , authenticate users, and send push notifications.
How to get Windows Azure ?
At a hackathon there are a couple of ways you can get Windows Azure these are :
- Sign up for a 30 day trial at WindowsAzure.com
- Sign up for BizSpark the perfect program to get your startup up and running .
A couple of successful apps and startups were started at hackathons. So, if there is ever a time to sign up for BizSpark it is now. In addition to other resources BizSpark provides you with a free subscription to Windows Azure for three years.
- Give a great big smile to the Microsoft Evangelist. If you at Microsoft sponsored event there is a possibility that a friendly Evangelist is close by. SOMETIMES we may have BizSpark code that give you automatic enrollment into the program. Find us quick the codes are usually in limited supply.
Hackathons require their participants to be nimble and creative. APIs are great way for you to build quick apps with rich content. With APIs offered by Mashery, APIhub, Nokia, Open Data, Tumblr, Bing API, Instagram, Windows APIs etc you could be building a functional app over a weekend. Use your web skills with HTML5 & JS or use your java or C skills to try XAML & C# to build an app.
To get you started to APIs on the Windows platform all you have to do is :
- Register for an API key for the APIs of your choice.
- To get started with APIs on the Windows platform check out our one of our StarterKits in HTML5 & JS or XAML & C#.
And now the moment you have all been waiting for and the
winner is …
“How do I win the cool Tablet, amazing Xbox, the latest phone, a giftcard etc? ”
BUILD & LAUNCH A GREAT WINDOWS APP. And most Importantly have fun !
Submit your app to the Windows Store and become a global winner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813626.7/warc/CC-MAIN-20180221143216-20180221163216-00587.warc.gz
|
CC-MAIN-2018-09
| 3,451
| 26
|
https://www.getresponse.com/integrations/getresponse-api-ios-and-android-sdk.html
|
code
|
GetResponse API iOS and Android SDK
GetResponse API wrappers for iOS and Android allow you to use basic API methods such as listing, adding, and removing contacts as well as fetching the list of your campaigns.
Become an integration partner
Integrate GetResponse with other applications and become our integrations partner.
Your integration will be featured here in our integrations directory.
Build your own integration
Use our advanced API to build your own integration, linking
GetResponse with your service.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704821253.82/warc/CC-MAIN-20210127055122-20210127085122-00416.warc.gz
|
CC-MAIN-2021-04
| 511
| 8
|
https://forum.unity.com/threads/unity-webgl-disables-page-scrolling.386425/
|
code
|
Hey, we exported a Unity Project to WebGL and inculed it into a longer HTML page. Everything works as expected. The only problem is, if the mouse is over the WebGL canvas all Mouse Wheel Events seem to be canceled from the Unity WebGL player. Scrolling the page while the mouse is hovering the WebGL canvas is at the moment impossible. Is there an option to prevent Unity from canceling the events? Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585348.66/warc/CC-MAIN-20211020183354-20211020213354-00670.warc.gz
|
CC-MAIN-2021-43
| 406
| 1
|