url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://tonymackelworth.wordpress.com/2010/04/28/licensing-focus-part-2-microsoft-vdi-stack/
code
Virtual Desktop Infrastructure (VDI) is a desktop delivery model that allows users to access desktops running in the datacenter. Virtual Desktop Infrastructure (VDI) is an emerging model where a Windows client operating system runs in server-based virtual machines (VMs) in the data center and interacts with the user’s client device such as a PC or a Thin Client (TC). VDI provides IT with the ability to centralize a user’s desktop; (Instead of a server session like the Terminal Services) with a full client environment is virtualized within a server-based hypervisor. With VDI, the user can get a rich and individualized desktop experience with full administrative control over desktop and applications. The Microsoft VDI Suite can be used for Desktop Delivery, App Delivery, Virtualization Platform and the Management of Apps to Physical, Virtual and Session based desktops. VDI Suite will support popular flexible work scenarios for Work From Home (WFH) scenarios and Hot–Desking. Microsoft VDI Platform Windows Server 2008 with Hyper-V : A scalable, stable, and high-performance hypervisor that hosts the virtual desktops. This is the Virtualization platform for the Operating System (OS). System Center Virtual Machine Manager 2008 -Management suite that allows IT to manage physical, virtual, and session-based desktops from a single console. Depending on whether the application is executed locally or remotely, customers can deploy either: (Inside MDOP) Application Virtualization technology enables dynamic delivery of apps to the user’s virtual desktop. Decouples Apps from the OS Runs Apps as network services Remove App footprint from the OS All Patches and Upgrades can be centralized. Remote Desktop Services (Remote App) (Inside WIndows Server 2008 R2) Remotely run an application in one location but have it be controlled and managed in another Suppresses the Desktop Gives only the App environment Citrix – XenDesktop Manages the connections between a device and the remote desktops on the server. Dynamic provision remote desktops by combining a brand new desktop image with both the user profile and personal settings at runtime, and delivering a personalized desktop to the end user. Microsoft Licensing – VDI Suite Customers can now buy different components of the server and management infrastructure required to run VDI through a single licensing vehicle. The VDI Standard Suite and VDI Premium Suite are licensed per client device that accesses the VDI environment. This is also on a subscription model like Windows VECD. As above, Management of your virtual infrastructure is taken care of the various System Center components, including System Center Virtual Machine Manager, System Center Operations Manager 2007 R2 and System Center Configuration Manager 2007 R2 The following CALs are included to provide access rights to the Microsoft Infrastructure and Management products. - Remote Desktop Services Client Access License (RDS CAL) - Microsoft Desktop Optimization Pack (MDOP) including App-V - System Center Virtual Machine Manager (SCVMM) Client Management License - System Center Configuration Manager (SCCM) Standard Server Management License - System Center Operations Manager (SCOM) Standard Server Management License The Microsoft VDI Standard Suite will include licenses to the following technologies: - Hypervisor platform (Hyper-V Server 2008 R2) - An integrated management suite for VDI (System Center Virtual Machine Manager 2008 R2, System Center Operations Manager 2007 R2, and System Center Configuration Manager 2007 R2) - Microsoft Application Virtualization through the Microsoft Desktop Optimization Pack (MDOP) - Connection Brokering capability through Windows Server 2008 R2 Remote Desktop Services. Microsoft does not allow access to Windows Server software to host a full GUI (using RDS or other technology): - directly from your VDI licensed device or - indirectly through a virtual OSE on your VDI host. The Microsoft VDI Premium Suite includes all the features of the Microsoft VDI Standard Suite, and also includes: - Complete Remote Desktop Services capability, including the option to deploy session based desktops in addition to VDI desktops. - Access Windows Server for purposes of hosting a graphical user interface (GUI) - Microsoft Application Virtualization for Remote Desktop Services *VDI Suite is a subscription model and does not confer perpetual rights.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104565.76/warc/CC-MAIN-20170818043915-20170818063915-00293.warc.gz
CC-MAIN-2017-34
4,439
41
https://mail.xfce.org/pipermail/xfce4-dev/2002-July/000224.html
code
Screenshot xfwm4 /xfce4 csm at MoonGroup.com Thu Jul 11 23:38:35 CEST 2002 -----BEGIN PGP SIGNED MESSAGE----- On Thu, 11 Jul 2002, Jasper Huijsmans posted the following: JH>just to generate some traffic, here's a screenshot of the new g2 theme JH>of xfwm4. Olivier you have really outdone yourself. It's very nice JH>indeed (even if it's vaguely similar to the XP theme ;-). It's a bit big JH>perhaps (300K), so be warned. Is that panel the new xfce4? "Look, I want to make Microsoft's life miserable; so I'll tell you what, I'll pay you $10 million a year to torture Microsoft." --Steve Ballmer -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) -----END PGP SIGNATURE----- More information about the Xfce4-dev
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578759182.92/warc/CC-MAIN-20190426033614-20190426055614-00082.warc.gz
CC-MAIN-2019-18
724
16
https://disneytsumtsum.fandom.com/wiki/Dale
code
Dale is a Happiness Box Tsum. Dale's skill creates his best friend Chip, which can be connected so they can hang out together. However, since Dale is so opposite of Chip, he creates the Tsums horizontally, as opposed to Chip who is vertical. Dale Tsum is a Horizontal Transformation Skill Tsum. His base radius size is SS in the Japanese version and XS in the International version. |Skill Level||Radius (JP)||Radius (Intl)||Skill Upgrade| |1||SS Size||XS Size||1| |2||S Size||S Size||2| |3||M Size||M Size||4|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060538.11/warc/CC-MAIN-20210928062408-20210928092408-00244.warc.gz
CC-MAIN-2021-39
510
6
http://cybergreet.net/spin-rewriter-crack-download-article-rewriter-tool-pro.html
code
Spin Rewriter 9.0 is designed to create lots of content. You can give the software any article that you find online and the software will produce multiple (re-written) versions of the text. This means that you can quickly create 5 or 10 articles that can be distributed around the internet. This might sound like an easy way to write lots of content, but things aren’t always that simple. Many bloggers who don’t want to spend time creating their own content use this kind of software to produce their articles. Normally the results are really bad. But Spin Rewriter 9.0 claims to be different. Very different in fact… Once-upon a period there stay a child. He’d orange eyes with blonde hair as orange as platinum. The small child was delicate and little, but his brain was quick such as the breeze. He might determine the end result of any scenario within an eye’s flash. But which was not his greatest skill. No. His greatest talent was belief. The small child understand something quicker than anybody and might comprehend he’d actually achieved. Subsequently, he dropped with an attractive queen in deep love. She’d light-brown hair and magnetic inexperienced eyes. He liked her greatly and he or she liked back him much more. There is just one issue – the small child was the blacksmith’s boy. The queenis dad would not permit her and an easy boy of the blacksmith to marry. But their love was not also weak. In one swoop, the small child began a revolt to overthrow the bad master who didn’t have confidence in real love and lifted an army of underworld. Of fighting from the armies of his favoriteis dad after weeks, the small child was assassinated and also the battle was not under. No tracks were performed. Sometimes the tools called paraphrasing tool, why it is so called? As the tool use the logic of changing words according to its synonyms to make an article unique and meaningful. If we expand the main logic behind the tool use the word synonyms of targeted article that you will rewrite or spin, giving you the options to replace the word from its dictionary suggested by the boot as well as option to write your own, it’s simple but it’s superb. If an article rewriter tool, an instant article spinner or a paraphrasing tool is what you are looking for then our free article spinner tool will definitely help you in this regard. Are you a student, content writer or a teacher? Then this free online article rewriter is a life saver for you. Why spend hours writing an essay or paper when you can use this free article spinner and get the same results. If you are a content writer, this tool can help you with both writing a unique content and saving time. This best article rewriter online can even be used for your blogs and websites. It’s just okay. Maybe I expected too much but it did not save me much time at all with all the changes I had to make to the articles. I used it on the “readable” setting and allowed it to automatically spin paragraphs, sentences, etc. Well it was actually “readable” but not human readable, also there is option for human readable articles, but it will be not 100% unique. New customers will be given a discount offer that is massive. You are given a lot of quality written articles in a brief time period by spin Rewriter. After 5 days you get 30 days to make sure the Spin Rewriter technology is right for you, although for using their services, clients receive a 5-day free trial. They permit you to prevent SEO devaluation from content that is online that is duplicate. Try it out, and when it is not exactly right for your business, you’ll be given. People, I’m pretty sure over half of the articles you read nowadays come out from a spinner such as this one, and you can’t even tell the difference… believe me I know – I publish a lot of these articles myself, using Spin Rewriter, and they are very good and believable, you wouldn’t know the difference between one of them and an article written by a human. This will no doubt seem very obvious to many people and for others it will send a shudder of fear down their spine! But if you want to make money online, be an affiliate marketer or a well known blogger, then there really is only one way to do it. The best way to get ranked and make money online is to do must things manually. Sure, there are legit shortcuts and additional tools that can make the process faster. But in general if you are looking to create content for your website, then you need to learn the correct way of doing it. I wanted to add some phrases in the text to see if the spinner will understand them and possibly replace them with similar phrases. As you see, this is just a simple short story that blew out of my head just a minute ago. As a final note of the intro section, I want you to understand that “thesaurus” simply means a database of words and their synonyms. Let’s see how this goes. Millions of individuals who likewise have the internet on their fingertips are usually wondering exactly a similar thing as you at this time: How can I make money online? How do i get internet search engine exposure for my web site (or blog)? Exactly what will provide me a leg through to your competition? Thankfully you have previously arrived at the solution to all or any these questions. Post Rewriter Tool can be acquired to make your website as profitable as possible, with reduced work on your own part.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823228.36/warc/CC-MAIN-20181209232026-20181210013526-00552.warc.gz
CC-MAIN-2018-51
5,450
10
https://lockergnome.com/2010/06/01/find-documents-in-word-using-tags/
code
Even the most organized person can waste a significant amount of time searching for documents on their computer. One of the great features of Word 2007 is that it lets you add tags to your documents. Tags are basically keywords you associate with a document that you can later use to search for it. To assign tags to a Word 2007 document: - Within your document, click the Microsoft Office button. - Select Save. - Click the box labeled Tags. - Enter in a tag. The word should related to the document and help you find it at a later date. You can add multiple tags by separating the words with semicolons. - Click Save. Once the document is saved, you can add or delete tags through Windows Explorer.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738425.43/warc/CC-MAIN-20200809043422-20200809073422-00596.warc.gz
CC-MAIN-2020-34
700
8
https://www.msftnext.com/tag/windows-terminal/
code
You can change the keyboard shortcut for Quake Mode in Windows Terminal, which is a special feature that was introduced in version 1.9 of the application. It allows you to open a terminal in the upper half of the screen as a drop-down console. Continue reading “How to change the keyboard shortcut for Quake Mode in Windows Terminal” You can disable Quake Mode in Windows Terminal, and thereby free up the Win + ` keyboard shortcut for use in other programs. With the release of Windows Terminal version 1.9, the application has a curious Quake mode and a separate key combination that enables it (Win + `). If you are using this keyboard shortcut for other tasks and you do not like the fact that pressing the Win + ` keys now takes the command line to half the screen, this guide will show you how to disable Quake Mode in Windows Terminal. You can add Windows Terminal profiles to the Windows context menu for quick and easy access to them with a simple right-click in File Explorer from any folder. Continue reading “How to add Windows Terminal profiles to the context menu”
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00822.warc.gz
CC-MAIN-2023-40
1,086
3
https://www.phpbb.com/community/viewtopic.php?f=72&t=1198515&start=30
code
I managed to get this right by changing the syntaxt I am using on the trigger. I am now using the following to acheive my goal:ZillaConsulting wrote: This answer partly meets my needs going forwards, but what would meet my needs completely is the ability to include multiple insert statements in the trigger as I would like to autosubscribe new users to multiple forums. Any suggestions on the syntax to use to achieve this? Code: Select all INSERT INTO phpbb_forums_watch VALUES (2, NEW.user_id, 0), (21, NEW.user_id, 0)
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998923.96/warc/CC-MAIN-20190619063711-20190619085711-00533.warc.gz
CC-MAIN-2019-26
521
3
http://mathhelpforum.com/algebra/94810-simplifying-expression-4-a.html
code
This is more difficult, I see familiar things (formulas basically behind numbers), but end with different result. How it is good to start simplifying it? Things what I see: same thing with: I am not sure about this one: Going inside parenthesis: Common denominator in my opinion is: Ready to divide (which is multiplication with opposite number): I know it looks crazy. I calculated it and got as final result: Interesting, but when I set a = 1 my simplification and textbook answer give different results. I went wrong, tips how I should approach it?
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00199-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
551
10
https://intellectica.org/en/creativity-driver-research-robotics-open-environments
code
Many robots solve complex tasks in closed environments that are fully known by the robot designer. Robots are much rarer in our every day environment. The main reasons are its complexity and openness that frequently result in unpredictable situations created by new objects or new dynamics of interaction. Numerous applications of robotics would benefit from robot abilities to deal with open environments. A lot of research is focused on this topic, but a question remains unanswered: how to evaluate the ability of a robot to face new contexts? The performance of a robot in a particular environment says little about what this performance will be in a different environment, even if it seems similar. A robot programmed to manipulate boxes may not be able to manipulate balls of the same size. Likewise, a robot perception system may be fooled by a change of luminosity. Consequently, the performance to expect in a new situation cannot be systematically deduced from what has been observed in known situations. There is then a need for a criterion that allows to compare approaches with respect to their ability to endow robots with the robustness or adaptive abilities to deal with new situations. To this end, it is proposed to define criteria based on the notion of creativity. A definition is given in the context of robotics and examples of use for learning and developmental processes are given. Pour citer cet article :Doncieux Stéphane (2016/1). Creativity: a Driver for Research on Robotics in Open Environments. In Khamassi Mehdi & Doncieux Stéphane (Eds), New approaches in cognitive robotics, Intellectica, 65, (pp.205-221), DOI: 10.3406/intel.2016.1795.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817184.35/warc/CC-MAIN-20240417235906-20240418025906-00171.warc.gz
CC-MAIN-2024-18
1,672
2
https://www.blockchainjobboard.org/blockchainjobs/view/software-engineer-intern-3/
code
|Location||New York, NY| |Date Posted||March 2, 2019| You will be responsible is helping us develop a small prototype developing and integrating a payment system within the platform, an open real time ledger that updates with each activity on the platform, a backend system that stores user ID, credit card and location. Must be majoring or majored in computer science. We are looking for a talented software engineer intern with experience in both iOS...
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572235.63/warc/CC-MAIN-20190915175150-20190915201150-00213.warc.gz
CC-MAIN-2019-39
455
3
https://kevinhq.com/five-workarounds-to-do-when-site-asks-to-turn-off-ad-blocker/
code
When you visit a site or blog with your ad-blocker setup on the browser, it asks you to disable that. At this point, there are several workarounds to do. Let us see them one by one. Remove the popup and its overlay using the development tool. It requires an understanding of HTML. You can inspect the element with the browser’s development tool. Then, you can remove the popup and its overlay HTML. This way, you can access and read the content without disabling your browser’s ad blocker. Activate browser reader mode. It is an advanced workaround. Do this at your own risk. If you’re curious, read on this GitHub repository. Here’s how it works: It works as a DNS server to nullify a request to DNS that serves ads. So, the anti-ad-block can’t detect it. Close it and look for other similar sites. It is the last effort if you can’t access the site content with your ad-blocker. Just close the site. Many similar sites may provide the content you need without asking you to turn off your ad blocker. Please don’t give up by turning off your ad-blocker. If a site asks me to disable my ad-blocker, I skip it and close it. I’ll never visit such a site again.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00176.warc.gz
CC-MAIN-2023-50
1,174
8
http://www.peelified.com/Futurama-Forum-6/Topic-15894-0-Fanart_by_JavieR.html
code
Originally posted by THM: that's more than I wanted to see of either the Professor...or Zap Well, it was quite disturbing to draw some of the characters naked... Originally posted by Professor Zoidy: Nice to see you finally have a thread in the art section JavieR! ...is kinda because I'm finally a Starship Captain around here lol... no, but I really wanted some feedback about this wall Originally posted by FuturamaPac: Is that you looking up Leela's ass? Originally posted by any1else: Rather strategically placed too.. It is me, but hey... I'm just watching the volleyball game Originally posted by coldangel_1: You added a lot since last time I saw this one, Javier. Yes, I kinda forgot to finish this one.tyraniak, km73:
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189686.31/warc/CC-MAIN-20170322212949-00300-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
727
14
http://techaticpsr.blogspot.com/2011/08/duraspace-is-bringing-king-cloud-to.html
code
What does this mean to the research community? It's still very early after the announcement, but this new service could give researchers a platform on which to curate, preserve, and deliver their research results. DuraCloud makes it very easy to replicate content across more than one storage provider, and so making additional archival copies becomes much easier. A key question is how the researcher will experience the storage space. If they need to use special tools to move content into and out of DuraCloud, that could be a big barrier to use. But if they can "map a drive" or treat it as a virtual location available from the desktop and the web (like DropBox), that would make it very attractive. What does this mean to a data archive like ICPSR? I think this has an opportunity to head in many different possible direction for an "old school" data archive like ICPSR. One world: If researchers can share and preserve their research output using a public cloud, why would anyone need a conventional data archive? In this world the key organizations are the content holders (the researchers and their cloud platforms) and the organization that can index the content across providers so that people can find what they need. Maybe in this world a place like ICPSR becomes an aggregator of metadata rather than content. Another world: Researchers and curators collaborate in cloudspace to preserve content, and to publish appropriate elements when desired. In this world curators at a data archive might work with content which lives in the cloud rather than locally, and the preservation and delivery platform is distributed widely rather than at a central organization. And another world: Researchers use services like DuraSpace DTR during the active life of their research project and through the early phases of its related publication lifecycle, but once the pendulum swings from "exclusive use" to "shared use," the researchers engage a place like ICPSR. They deposit their entire workspace, and the archive organizes and indexes the material to make it more easy to preserve and to share. In this world life might look the same as it does today.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371604800.52/warc/CC-MAIN-20200405115129-20200405145629-00524.warc.gz
CC-MAIN-2020-16
2,156
7
http://emilioeatfu.blog2learn.com/9221761/the-smart-trick-of-java-assignment-help-that-no-one-is-discussing
code
Many of the resources on these internet pages are free for homework and classroom use only. You might not redistribute, offer or put the articles of the web site on any other website or web site with no written permission in the writer Mandy Barrow. To be able to make this happen, a Java compiler runs a flow Investigation to make certain that, For each and every assignment to the blank last variable, the variable is undoubtedly unassigned prior to the assignment; if not a compile-time error takes place. Locating an ideal java project concept is The crucial element, one really should brainstorm and locate the most effective project strategy for them. Get java remaining yr project Help Ya I'm presently applying Eclipse IDE and undertaking little programs, But still sensation problems in composing huge packages… please help me out… Controlling tests for students and faculties will get simplified with this particular java project idea. College students can purchase the requisite facts like Test dates and end result dates with good ease. Java statements Develop programs. Every Java course will need to have a body, which happens to be manufactured up of a number of statements. You may generate distinct types of statements, including declaration and expression. A typical misconception is usually that declaring a method as final improves efficiency by making it possible for the compiler to straight insert the strategy where ever it is named (see inline enlargement). assignment statements or any other statements in Java; that is certainly, we are able to utilize them where ever an announcement is known as for. MIT OpenCourseWare can make the resources Employed in the educating of almost all of MIT's topics out there on the net, free of charge. With more than two,400 courses offered, OCW is delivering page about the assure of open up sharing of information. Learn more » Previous to jogging The category, IntelliJ Thought java assignment help has routinely compiled it. When needed, it is possible to initiate the compilation oneself. The corresponding solutions can be found while in the Establish menu. I feel you ought to get help for Key java info from java teacher. It's going to be very hard for you to get fundamental facts online. after getting that you can experience any java program all by yourself. Huge Insurance plan Company will get pleasure from a single these types of program. Persons can take care of their customers and rates better with This method in position. a program that permits and leverages lecturers with the power to keep watch over their learners without having in fact Conference them everyday. Loads of enterprises and restaurants can use This technique to make certain they do not operate out of the grocery. This really is one of the best programs for making sure transparency.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509996.54/warc/CC-MAIN-20181016030831-20181016052331-00313.warc.gz
CC-MAIN-2018-43
2,840
14
https://forum.kicad.info/t/bug-align-to-right-left-does-the-same-thing-on-bottom-side/17149/9
code
Not sure if I misunderstand how this is supposed to work but I have used it successfully a lot before so I think I’m in some kind of corner case. Just want to go here before the bugtracker so I’m not just missing something simple: I want to align these two towards my visual left, the upper one: Both the context menus align to left and align to right aligns it towards my right, they do the same thing: I think it happens because when I select the second item, C5 I have to refine my selection between that one and the pot on the front layer. The front layer blinks when I select so I think there’s some bug in “last touched” layer stateful logic going on here…? Yes, I can confirm - if I instead select C5 first, then R9 without having to refine my selection, align to left now works as expected.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540551267.14/warc/CC-MAIN-20191213071155-20191213095155-00281.warc.gz
CC-MAIN-2019-51
810
5
https://search400.techtarget.com/news/1102631/Form-versus-function
code
The notion of a natural GUI interface to the iSeries as well as a natural programmable interface to the Web via DDS extensions and programming extensions is being debated today in various development and iSeries education circles. It's about time. A 21st-century machine such as the iSeries should have a browser-based interface. A bloated, chargeable client as an add-on with half facility, such as iSeries Access via iSeries Navigator, is not the way to get a 21st-century system to be viewed as modern. In today's world, form does not follow function. If there is no form, the function is suspect. GUI is the form needed for the general population to believe that a system is up-to-date. Only then does function get a look. Function value is much harder to determine than form. However, it does not prevent the iSeries from being eliminated from consideration early in the selection process just because it looks old (form) to those who are doing the evaluating. Yet if the mission were integration, a high-level machine interface, single-level store, object-based, etc., the iSeries would win hands-down. But the fact is that to be seriously evaluated today, GUI is a must. IBM must understand this and correct this major deficiency. Personally, I like the notion of a natural browser interface that fires up with the operating system just as my Lynx router fires up. If that facility can be available in a sub $100 box, it certainly should be available in one of the most expensive (hardware-wise) boxes in existence today -- our own i5. I am also intrigued by the notion of making the Mac OS the GUI for the iSeries. Why not? Can you imagine the allegiance that would come with that? Hey, it runs on POWER architecture. Put it in its own invisible partition and have it drive the i5/OS operating system. Stick a mouse on the system through a USB port and let the Mac console drive the iSeries as its native GUI interface. Short of the systems look and feel, programmers need to be re-enfranchised with their programming languages. I once said that all programmers would feel that this would be a positive step for the platform. But that was before a few gurus spoke up suggesting that I am wrong. Those gurus know Java cold, and they hold a belief that CGIDEV2 -- a more efficient way of writing CGI programs -- is a better way to handle RPG access to the Web than a natural user interface. I have written CGI, and it is extremely inefficient. I have also examined CGIDEV2 and have found it to be better than pure CGI, but not natural to an RPG or COBOL programmer's normal paradigm. Just like IBM must do something with the operating system user interface to make the i5/OS relevant at first sight, it must also add device facilities to the HLL languages so that various user interfaces are separate from programs but are callable in much the same way. For example, if screen data today is sent and received via the WRITE/READ in COBOL and the WRITE/READ or EXFMT op codes in RPG, then Web data should be dealt with in the same way. Instead of a display panel, perhaps the user interface could be Java Server Pages, Java Server Faces, HTML or XML. That would almost immediately enfranchise every HLL programmer on the iSeries into Web mode. The gurus have spent the time to understand the nuances of the underpinnings of the Web, and they seem to believe that such "trivial" enhancements to the HLL languages with natural Web interfaces are not necessary because there is this workaround called CGIDEV2 and there is Java and there is Net.Data, and many other flavors of non-natural iSeries solutions. The problem is that iSeries staff typically have little time to learn new operating systems, new programming languages or foreign methods to achieve simple objectives. Thus they remain uncomfortable with the Web. George Farr, RPG Development Manager for IBM in Toronto, suggested at COMMON, at RPG World and other venues that the next step in RPG is EXUI (execute user interface). He said it is a natural way to send out display panels or Web pages from RPG without the developer caring. Unfortunately, IBM does not see that as more important than increasing the byte string in certain RPG BIF functions, so the EXUI capability is way down on the list. Non-essential additions to the language are scheduled first. The most critical enhancement on Farr's list for the iSeries' ability to survive as well as thrive, is the change in RPG to enable natural reads and writes directly from RPG and/or COBOL. In the marketplace, I see more and more ISVs changing to the only modern platform -- Windows -- to get more business. By not having a real way to enable rapid development in RPG for Web applications, IBM is playing right into their hands. RPG with no Web capability is a dead language. Neither CGI nor CGIDEV2 is going to re-enfranchise the iSeries constituency as quickly as a GUI OS interface and a natural RPG GUI interface. Brian Kelly retired as a 30-year IBM Midrange Systems Engineer in 1999, having cut his eye teeth in 1969 on the System/3 and later with CCP. While with IBM, he was also a Certified Instructor and a Mid-Atlantic Area Designated Specialist. He has written twenty-three books and numerous magazine articles about current IT topics. His new book is titled, The All-Everything Machine.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497301.29/warc/CC-MAIN-20200330181842-20200330211842-00068.warc.gz
CC-MAIN-2020-16
5,318
14
http://blueandbronzeblaine.tumblr.com/post/42504036725/okay-lets-try-and-figure-this-thing-out
code
Hey, my name's Blaine Anderson and I'm originally from this tiny town in Wales (I won't give the name, because there's no way you'd have heard of it). I'm currently in my sixth year at Hogwarts School of Witchcraft and Wizardry. I'm a Ravenclaw, seeker on the Quidditch team, member of the choir and I really don't know what else you'd want to know? It's great to meet you guys! Okay, let’s try and figure this thing out. Hey guys, I’m pretty sure I know most of you so I won’t bother with an introduction. Instead I’m just going to ask how everyone’s doing?
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705300740/warc/CC-MAIN-20130516115500-00006-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
568
3
https://blog.texasswede.com/my-connect-2017-demo-code/
code
The demo database from my presentation at IBM Connect 2017 is finally available. It contains the code from The Great Code Giveaway as well as the bonus application for version management. Don’t forget to sign the databases with an ID that has rights to run agents on the server. Will you make the presentation available too? That would be great ;)
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00692.warc.gz
CC-MAIN-2023-23
349
4
http://medicthree.com/2008/10/walks-like-a-duck/
code
Talks Like a Duck… Don’t assume its a FROG. Often in EMS we either fail to see the big picture, or we fail to notice the obvious. Most of the time we fail to see the obvious. If a case presents as a cardiac chest pain–treat it as such. If it presents as a SOB, treat it as such. Use linear thinking to get you to the right treatment, but start at the beginning. I’ve had a few calls this week where my partners refused to see the obvious. They decided that dispatch was correct and the patients symptoms were wrong. Expect more later. Also, I found our “protocol” books. Last revision, DECEMBER 1996.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00069-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
612
3
https://en.wikipedia.org/wiki/XCHM
code
A document being viewed with xCHM v1.23 / August 30, 2013 xCHM is an open source GUI front-end for CHMLIB (a viewer for Microsoft Compressed HTML Help files). It compiles and runs on Linux, BSD, Mac OS X and Microsoft Windows. Pre-built binaries for Mac OS X and Microsoft Windows are usually available for download from the project's website. xCHM is free software. Other programs with similar functions - Open source - Non-free tools
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542648.35/warc/CC-MAIN-20161202170902-00344-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
435
7
https://www.tuturself.com/posts/view?menuId=90&postId=457
code
Explain about Multi-tier architecture ? A tier is an abstract concept that defines a group of technologies that provides one or more services to its clients. In multi-tier architecture each tier contains services that include software object or DBMS. Multi-tier architecture is composed of clients, resources, components (service), and containers. Clients, Resources and Components A client refers to a program that requests a service from a component. A resource is anything a component needs to provide a service, and a component is part of tier that consists of a collection of classes or a program that performs a function to provide the service. A container is software that manages a component and provides a component with system services. The following image is representing the Client, Resource and Component model. The relationship between a container and a component is sometimes referred to as a contract, whose terms are governed by an application programming interface (API). An API defines rules a component must follow and the services a component will receive from the container. A container handles persistence, resource management, security, threading and other system-level services for components that are associated with the container. Components are responsible for implementation of business logic. It helps the programmer to focus on coding business rules into components without becoming concerned about low-level system services. The relationship between client, component and resource is shown below.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578689448.90/warc/CC-MAIN-20190425054210-20190425080210-00167.warc.gz
CC-MAIN-2019-18
1,528
6
http://beckettgscax.blogdigy.com/how-much-you-need-to-expect-you-ll-pay-for-a-good-c-programming-assignment-help-5710703
code
How Much You Need To Expect You'll Pay For A Good c programming assignment help ^ The modulus operator works just with integer operands, for floating point figures a library purpose have to be utilised alternatively (like fmod). Compared with other operators, the compiler will offer a default general public assignment operator to your class If you don't provide a single. This assignment operator does memberwise assignment (which is basically the same as the memberwise initialization that default duplicate constructors do). We reduce an essential optimization chance. Not simply that, but this preference is critical in C++eleven, that is talked over afterwards. (Over a basic Notice, a remarkably useful guideline is as follows: if you are going to make a duplicate of some thing in a perform, Enable the compiler do it within the parameter listing.‡) Remember to Be at liberty to comment on faults, things you don't like and things you want to find out. If I don't receive the remarks then I can not choose it ahead, These two generic offers offer IO amenities for data files which consist of identical data. They can be instantiated in a similar way to the generic The 1st instance has a lot of text which we do not genuinely treatment about, so the second removes most of it, As a result leaving bare the real operate we've been aiming to do. ^ a b While in the context of iostreams, writers usually will refer to since the "place-to" or "stream insertion" and "get-from" or "stream extraction" operators, respectively. We're in truth volunteers, however I volunteered due to the fact after you teach anything, you master alot on the little things You could have skipped if you initial realized it. I also take pleasure in helping a person out because I've the answer, whether or not or not it's simple or not. Why cannot LLCs be used to negate enhanced challenges when accomplishing leveraged investments? extra incredibly hot queries By checking if our implicit item is similar to the one getting passed in as a parameter, we may have our assignment operator just return right away with out doing any other perform. This displays exactly how much safer the Ada version is, we know exactly what we're looking ahead to and may immediately procedure it. During the C++ case all We all know is One thing right before we carry on, the vast majority of operators are comparable, but you need to see these discrepancies: expressions for that for statement. A comma is likewise utilized to individual function parameters; having said that, this Solution Enhancement: This contains the process which will get the new solutions on the market. As an example, British Airways has launched variety of expert services of their flights like in flight World wide try here web expert services, phone directories, far better resource inflight amusement, and so on.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828448.76/warc/CC-MAIN-20181217065106-20181217091106-00081.warc.gz
CC-MAIN-2018-51
2,859
15
https://wiki.mozilla.org/Release_Management/Tracking_rules
code
Release tracking rules This page describes the rules applied by the Release Team to track or not a bug for a release. The Uplift rules page may also be helpful for understanding relman decision making. Tracking flags are set to manage a list of release critical bugs but also the bugs / features that the Release Team wants to keep on their radar. Regressions: Status flags + keyword Please mark regressions with the keyword "regression" and the status flag. For example, a bug which is a new regression in 57 should be flagged: status-firefox56: unaffected status-firefox57: affected Add the keyword "regression" to the keyword field. Bugs with these flags and keyword will be triaged by relman and a team of engineering managers. They'll show up on this Release Health dashboard: https://mozilla.github.io/releasehealth/?channel=beta Not a regression: Request tracking Tracking requests are made by changing "tracking flags" -> "tracking-firefoxN" flag to "?" and updating "status-firefoxN" flag to "affected" on a bug in bugzilla. When dealing with new features, this case is common. Tracking is recommended if: - You want to escalate quickly to get a fix in an important, unassigned bug. Relman and engineering managers will work to find an assignee. - High volume crashes. For example, bugs with keyword topcrash* are usually tracked. - High impact on web compatibility - Add-on compatibility implications - Introduced a new feature which may need to be backed out - The bug is sec-critical If there is no patch on a critical or high-impact bug report, then tracking is recommended. If the patch has already landed in Mozilla-central for a few days and an uplift request has been filled (or already applied), tracking is not necessary (except for high risk changes). What does it mean for a bug to be tracked? Release management will triage it about once a week, will follow up with developers, QE, managers, project managers, and product teams to get it fixed, tested, and in affected releases as soon as possible. Not every regression can or should be tracked. We can trust to the regression triage team (which includes relman). Release blocking issues For a very serious issue that would block either a release, or the release of a feature, relman can mark the tracking flag as "blocking". This is a judgement call by the release owner, based on how severe we think the impact is on users. And, generally something that would be a release blocker would also be a potential dot release driver. Any of these might be a release blocker / dot release driver: - A truly massive crash (with a signature higher in rank in crash-stats than OOM|small) - A horrible startup crash - a major browser/feature functionality bug that affects a large number of users - An issue that has dozens of duplicate bugs reported (indicating high impact) - a severe bug that affects all users on a particular platform (Mac, Linux, or particular hardware) - a severe bug that affects all users in a particular locale/language (example, RTL issues, or IME keyboards) - a bug that seriously impacts revenue - a bug that means we aren't getting telemetry important for future planning or features - severe perf issue that is affecting users in the wild - a major privacy or data loss issue Disabling a Feature - separate bugs for "disable feature X" are always clearer than attaching patches/getting approvals in meta or other bugs with confusing summaries (e.g. it's hard to tell that bug 994589 resulted in a feature disabling after the fact without hunting through the comments, that bug is tracking something else overall) - the "disabled" value of the status flags should be set on bugs whose functionality is being disabled, not on bugs where the disabling took place. For example, in this case, bug 619558 (and maybe other trackers?) should be marked "status-firefox31: disabled" (the feature is disabled on 31), and bug 994589 should be marked as "status-firefox31: fixed" (the crashes are fixed by the disabling - a comment indicating that is also useful).
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00488.warc.gz
CC-MAIN-2023-40
4,044
39
https://forums.xilinx.com/t5/Embedded-Linux/u-boot-xlnx-Support-for-Virtex-ml403/m-p/28462/highlight/true
code
01-22-2009 01:52 AM I am trying to port u-boot bootloader onto Virtex4 ml403 board for PowerPC processor. I took the u-boot source file from git://git.xilinx.com/u-boot-xlnx.git/. But the problem what I am facing is that I could'nt find a board/xilinx/ml403 folder for coping my xps project xparamenter.h file in the u-boot source folder. I tried using the available ml405 folder, but I am facing error during compilation. Can anyone help me with this issue. 01-22-2009 06:34 AM The ML403 is not directly supported, but it is very similar to the ML405. Same board with a bigger FPGA. The ML405 u-boot should build without any changes based on instructions on the wiki (http://xilinx.wikidot.com). Establishing a baseline that builds is very important before making any changes. Then you should compare your new xparameters to the one provided for the ML405 and note the differences. You should be able to use the xparameters.h that comes out of the EDK project. 01-22-2009 10:29 PM - edited 01-22-2009 10:40 PM I have already tried the way as you have instructed, which I ended in compilation errors. I will explain the steps which I followed: 1) Downloaded the u-boot-xlnx source file form git://git.xilinx.com/u-boot-xlnx.git 2) Copied xps_prj/ppc405_0/libsrc/linux_2_6_v1_01_c/linux/arch/ppc/platforms/4xx/xparameters/xparameters_ml40x.h to u-boot-xlnx/board/xilinx/ml405/xparameters.h 3) make ml405_config /home/student/praveen/prjwork/tools/u-boot-xlnx.git/include/ppc405.h:30:1: warning: "CFG_DCACHE_SIZE" redefined In file included from /home/student/praveen/prjwork/tools/u-boot-xlnx.git/include/config.h:2, /home/student/praveen/prjwork/tools/u-boot-xlnx.git/include/configs/ml405.h:222:1: warning: this is the location of the previous definition serial.c:66: error: 'XPAR_UARTNS550_0_BASEADDR' undeclared here (not in a function) serial.c: In function 'calc_divisor': serial.c:153: error: 'XPAR_XUARTNS550_CLOCK_HZ' undeclared (first use in this function) serial.c:153: error: (Each undeclared identifier is reported only once serial.c:153: error: for each function it appears in.) serial.c:155: warning: control reaches end of non-void function make: *** [serial.o] Error 1 make: Leaving directory `/home/student/praveen/prjwork/tools/u-boot-xlnx.git/drivers/serial' make: *** [drivers/serial/libserial.a] Error 2 Can you help me with your suggestions. 01-27-2009 09:33 AM Sorry for the long time to reply. You shouldn't have altered the u-boot tree for the ML405 before you got a baseline to make sure it built (unless I misunderstood). Get your baseline building before you make any changes. 09-29-2009 05:33 AM Any tips on whats needs to be done on Virtex-4 board with similar to ML403 architecture, but witout CF card. What is need t be done other than loading ubbot? Is it possible to start Uboot from flash? 09-30-2009 07:31 AM I know that you can put u-boot in flash as others here have done it. I haven't myself as I stopped when it ran from ram. I would read the documentation in u-boot to better understand that process. A virtex 4 based board should be pretty easy to get everything running on in general. Once you have a good solid h/w build that you have tested some without an OS, like with the testapps in the EDK, then you should be able to take u-boot for the ML405 that we support and move it to your board. I think the wiki should show you most of the details.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154897.82/warc/CC-MAIN-20210804174229-20210804204229-00531.warc.gz
CC-MAIN-2021-31
3,390
37
https://www.findbestopensource.com/tagged/quill
code
We have collection of more than 1 Million open source products ranging from Enterprise product to small libraries in all platforms. We aggregate information from all open source repositories. Search and find the best for your needs. Check out projects section. Quill is a modern rich text editor built for compatibility and extensibility. It was created by Jason Chen and Byron Milligan and open sourced by Salesforce.com. It provides granular access to the editor's content, changes and events through a simple API. It works consistently and deterministically with JSON as both input and output. This project replicates the UX of Amazon.com's 5-star rating system. When you hover over a star, the preceding stars highlight blue, and clicking makes the highlighted stars turn yellow and stick. Everything you need is in index.html. There are no external files. Yii 2 implementation of Quill, modern WYSIWYG editor.theme string default 'snow' 'snow' (Quill::THEME_SNOW) for Quill's snow theme, 'bubble' (Quill::THEME_BUBBLE) for Quill's bubble theme, false or null to remove theme. See Quill's documentation for themes.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811243.29/warc/CC-MAIN-20180218003946-20180218023946-00469.warc.gz
CC-MAIN-2018-09
1,118
6
https://www.ird.govt.nz/digital-service-providers/services-catalogue/customer-and-account/customer-services-suite/period-api
code
The period API provides information about 1 or more periods for an identified customer account. It is 1 of 8 APIs that, together, make up the customer services suite. If you have any questions about the period API or using gateway services for the period API, email us at [email protected] How the period API works When integrated through our gateway services, the period API provides information about a customer’s account periods. The period service accepts an account ID and account type, and an optional date range. It returns information about each period of the specified account or, if a date range is specified, it returns information about periods within that date range only. This information includes: - period start and end dates - the account or product type - filing frequency - whether a notice of assessment has been issued - whether a return has been filed or is still expected - the value of any default assessment. An extended attribute list is returned for income tax accounts, which includes: - a balance date - extension of time details - provisional tax details - imputation or Māori Authority credit amounts. The period API can only be used by: - the customer the account is associated to - a user with delegated access to the customer’s account - an intermediary who’s linked to the customer’s account - government agencies with a memorandum of understanding that allows them access to customer account level data. Some customers may split their individual account access across delegated users. This means a user may not be able to see all accounts for a specific customer. The period API enables the above users to query Inland Revenue’s period data from their native systems, and to avoid the use of manually facilitated channels. Software developer kit (SDK) View and download the software developer kit (SDK) for the customer services suite to help you integrate: - test scenarios - test data - sample request and response messages - the Open API YAML file - the build pack that provides the data definitions for the request and response messages. Use the Getting started guide to find out how to access our sandbox (mock services) and test environments. Gateway service capability for the period API The period API provides the following capabilities through defined API operations and API paths. |Returns the information of periods for an identified customer account. Period API business use cases The following are examples of how to use the period API to achieve specific business outcomes. The sequence of operations, the order in which they should be called, is indicated in the column of each operation. |Retrieve details for all periods for a given customer account that I am authorised to access. |Retrieve details for a single period for a given customer account that I am authorised to access. |Retrieve account data for a range of periods for a given customer account that I am authorised to access.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00182.warc.gz
CC-MAIN-2024-18
2,952
38
https://www.techiespider.com/how-do-you-find-your-laptop-screen-resolution/
code
When it comes to replacing a laptopscreen, it is important to ensure that the resolution of the replacement laptop screen is the same as the resolution of the original screen. To be able to order for the right screen with the same resolution as your old screen, you will have to perform the measurement. Laptop screen resolution is measured in vertical pixels and horizontal pixels. For instance, a screen’s resolution could be presented as (ex.: 1366 × 768). If you are buying a replacement screen online, you should first confirm the screen resolution so that you can place an order with specific measurements. Avoid relying on the laptop model when placing an order. Instead, be sure to have the exact measurement of your screen’s resolution. This is because the same laptop model may not come with the same display resolutions. VN6Y7 – 14″ For Dell Latitude 14 Rugged (5404) Touchscreen LCD Screen Assembly TX36D200VM2BAA Confirming the screen resolution Here is how to find your laptop screen resolution: - From the manufactures website If you have no idea on how to check your screen resolution manually, you can simply go to the manufacturer’s official website for the right measurement. - From the laptop manual If you still have your laptop manual, you can read through it and you will find the resolution of your screen. - From your laptop If you are using Windows ME, Windows 2000, Windows 98 or Windows XP, just right click on the Desktop and then select Properties and then navigate Display Properties to the Settings. - Look at the specifications You can also find the resolution of your screen by finding something that look like the descriptions below. The letters on the right are typically the common abbreviations and are also used to indicate resolution. - 3200 × 1800 (UHD) 4K - 3840 × 2160 (QHD+) - 2880 × 1800 (Apple, Retina only) - 3000 × 2000 (MS, PixelSense only) - 2560 × 1440 (WQHD / QHD only) 2k - 2560 × 1600 (Apple, Retina only) - 2304 × 1440 (Apple, Retina only) - 1920 × 1200 (WUXGA) - 2048 × 1536 (QXGA) - 1920 × 1080 (WUXGA) Full HD - 1600 × 900 (WXGA++) HD+ - 1680 × 900 (WSXGA+) - 1680 × 945 (WSXGA+) - 1680 × 1050 (WSXGA+) - 1366 × 768 (WXGA) HD - 1400 × 1050 (SXGA) - 1440 × 900 (WXGA+) - 1440 × 960 (WXGA+) - 1600 × 1200 (UXGA) - 1152 × 768 (WXGA) - 1280 × 768 (WXGA) - 1280 × 800 (WXGA) - 1280 × 854 (WXGA) - 1280 720 (SD+) - 1280 1024 (SXGA) Avoid downgrading or upgrading When replacing your laptop screen, it is highly recommended that you don’t downgrade or upgrade. Instead, order for a screen with the same measurement in size and the same resolution as the one you want to replace. Screens-People.com is professional Computer Screen Display trading and repaire wholesale provider, mainly focused on the screens for Dell,HP,Lenovo,Apple,ASUS,Acer and Microsoft.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00042.warc.gz
CC-MAIN-2023-40
2,844
41
https://finance.examinationtips.com/quiz-master-university-challenge/
code
Black patients also had inferior survival as compared examination help white sufferers, with exam help mean survival time of 4. 7 months, as compared with 6. 0001. 0001. “The survival change is small, but if you set it in context, survival changes for novel chemotherapy agents are customarily measured in weeks quiz help months,” Murphy noted, adding that “survival for these patients is very short, quiz help two months is exam help lot of time in exam help affected person who has exam help median survival of only six months. “This shows that survival has nothing examination help do with race quiz help every thing examination help do with remedy, where the info show the disparity lies, Murphy said. Professionals handle the technique of program making certain that there’s exam help great demonstrate of pleasant. Customer provider is among the most important things that you will look at the start. DebitCard. com. au exam help good company, which employs professionalism quiz help ensures that there is the correct path exam help achievement. With consistent updating quiz help freeing of highly professional facilities, the company sticks out among other agencies in the Australian market. This function enhances the user event quiz help ensures that your company achieves exam help greater conversion rate. Mobile Image Recognition MIR: MIR is exam help useful gizmo exam help bridge the distance among the digital quiz help real worlds with using snaps. MIR applications as window browsing for the true world from the digital world. Customers can click pictures of exam help product while on the go every time quiz help feed the image into an program with MIR elements. The function enables the app examination help respect the product quiz help demonstrate the most effective deals provided by quite a few dealers online. Augmented Reality: Makes the user event more immersing quiz help interactive.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558030.43/warc/CC-MAIN-20220523132100-20220523162100-00737.warc.gz
CC-MAIN-2022-21
1,922
1
https://guidedhacking.com/showthread.php?294-CG_DrawBulletImpacts
code
Hi i am new to this forum, and got a question. For now i am using trace_t & bullettrace_t to make my aimbot (cod4) shooting trough walls (short: autowall) But ive been reading and reading over again it could be ways easier and better with CG_DrawBulletImpacts. Does anyone already have experience with CG_DrawBulletImpacts? [move] ??? Such A good Question ![/move] Stop posting useless stuff, this is your first warning. Originally Posted by nguang8888 Wessie what game are you doing this for? Cod4? Yes i did sent you a PM with some more informations. Originally Posted by Fleep Solved :-) start reversing at 00456ABF from there you will get inside CG_DrawBulletImpacts. After you have finished that make a vector wich traces to your target, make a naked hook, make an exception, call it, and you are done. PS: I will wait a bit to release the full code due some small bug fixes (logging offsets)
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826114.69/warc/CC-MAIN-20171023145244-20171023165244-00231.warc.gz
CC-MAIN-2017-43
897
12
https://www.metalsmine.com/forum/69-platform-tech
code
int LagBar = 1; string NoteLagBar = "0 = Signal on current ; 1 = Wait for close"; Analyse the Indicator, an you will find out that For a BUY Arrow: The close must be above the ... Just give it a candle index to use, 1 parameter in the function I posted, live candle has index 0. That indy repaints badly. And your EA's do nothing in my BT. Many many thanks br for your time and selfless job.may GOD bless you and give you peace and happiness.thanks I don't do much coding any more but this may work for you. it is daily move % by default but you can change time frame.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00870.warc.gz
CC-MAIN-2023-50
568
5
http://www.pressreader.com/australia/nphoto/20170119/284588832428396
code
From day to night Once you’ve created an effect like this it’s easy to go from day to night. First, add a Gradient Map adjustment layer (as in Step 1) and then customise the gradient so that the blend goes from black to dark blue (try #455E78 here). Next, fine-tune the lightness of the image using a Levels adjustment layer until it looks suitably moody. Finally, hit Ctrl/Cmd+Shift+Alt +E to merge a copy of all the layers, then grab the Burn tool, with Range set to Midtones and Strength at 20%, then paint to darken down the foreground, gently hiding the details that would naturally be in near-darkness.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864110.40/warc/CC-MAIN-20180621075105-20180621095105-00578.warc.gz
CC-MAIN-2018-26
612
2
https://cepr.org/publications/dp4432
code
DP4432 Estimating the Gains From Trade in Limit Order Markets We present a method for identifying and estimating the gains from trade in limit order markets and provide new empirical evidence that the limit order market is a good market design. The gains from trade in our model arise because traders have different valuations for the stock. We use observations on the traders? order submissions and the execution and cancellation histories of the traders? order submissions to estimate the distribution of traders? unobserved valuations for the stock. We use the parameter estimates for our model to compute the current gains from trade in the limit order market and the gains from trade that the traders would attain in a perfectly liquid market.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818468.34/warc/CC-MAIN-20240423064231-20240423094231-00002.warc.gz
CC-MAIN-2024-18
748
2
https://www.purestorm.com/casting-call-view/110926
code
Lingerie/Implied/Art Nude Model - Barnsley/S Yorks Reimbursement will be by way of images in exchange for time Member types required: Model I require a model to work with me on lingerie/implied nude/art nude style work in my Barnsley Studio. Weekend Daytime work mainly. I am new to this style of photography (I have some experience of lingerie/boudoir photography with a few customers) and need to improve my skills. If you are a model prepared to help me, whether you are Amateur or otherwise, then please contact me and we can arrange a suitable time/date. This is Time for CD. Initially all images as shot, followed by selected edited images once editing is complete. Log-in to reply to this casting call
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215523.56/warc/CC-MAIN-20180820023141-20180820043141-00324.warc.gz
CC-MAIN-2018-34
708
8
https://community.coreldraw.com/talk/coreldraw_graphics_suite_x8/f/coreldraw-graphics-suite-x8/55410/how-can-i-turn-off-these-annoying-ads
code
I REALLY hate these ads popping up on my PC. How can turn them off? If turning off all the updates/offers notifications in the Product Details tab of the welcome screen doesn't stop this annoying pop-up (as it didn't for me), here is the solution: In Windows, click the Start button and select Control Panel In Control Panel click Administrative Tools In the right-hand pane double-click Task Scheduler (allow permission if asked) In the left-hand pane select Task Scheduler Library In the top middle pane you should see a list of scheduled events. Look for those related to Corel (in mine there are 'CorelUpdateHelperTask' and 'CorelUpdateHelperTaskCore') Right-click on each and select 'Disable'. That's it. Those annoying upgrade pop-ups will stop. Note: I am using CorelDraw version X8 which is no longer eligible for any updates. If your version is still eligible, disabling these may prevent access to desired or necessary updates (or at least notifications that they are available). Hope this was helpful. I couldn't agree more... stop doing it period! It's an annoying thing I only expect to put up with on free spammy software. Yes, this is unbelievable, how must we say we DONT want popups with offers????????????, I've disabled them in corel settings but the keep appearing, what is this??????
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989916.34/warc/CC-MAIN-20210513111525-20210513141525-00630.warc.gz
CC-MAIN-2021-21
1,304
13
https://www.mail-archive.com/dev@spark.apache.org/msg16071.html
code
Spark 1.6.x has serious bug related to shuffle functionality Shuffle throws OOM on serious load. I've seen this error several times on my heavy jobs java.lang.OutOfMemoryError: Unable to acquire 75 bytes of memory, got 0 It was fixed in both spark-2.0.0 and spark-1.6.x BUT spark-1.6 fix was NOT merged - https://github.com/apache/spark/pull/13027 Is it possible to include the fix to spark-1.6.3? On Fri, Oct 14, 2016 at 1:39 PM, Reynold Xin <r...@databricks.com> wrote: > It's been a while and we have fixed a few bugs in branch-1.6. I plan to > cut rc1 for 1.6.3 next week (just in time for Spark Summit Europe). Let me > know if there are specific issues that should be addressed before that.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948512121.15/warc/CC-MAIN-20171211033436-20171211053436-00111.warc.gz
CC-MAIN-2017-51
696
11
https://mrpestguy.com/what-kind-of-snakes-are-in-florida/
code
If you are ophidiophobic, you probably don’t want to hear that Florida is populated by nearly fifty different species of snakes, including six venomous varieties. But snakes are vital to the ecosystem. Thirty-five of these species, including four of the venomous species, thrive by eating rodents and amphibians bringing balance to the environment. Some eat various insects. There are also snakes in Florida that are harmful to the environment, invasive species like the Burmese Python. The Florida Fish and Wildlife Conservation Commission estimates populations of Pythons to be in tens of thousands in the Everglades. About 1/3 of the population reports a fear of snakes, making ophidiophobia one of the most common phobias topping even arachnophobia (fear of spiders). Common Florida Snakes (Non-Venomous) There are certainly a significant number of snakes in Florida, but most of them are harmless. Likely the most common snake that people see in the Sunshine State are Garter Snakes. Mistakenly called “garden” snakes, two varieties exist in Florida. If the snake you see has yellow side stripes, you most likely have encountered an Eastern Garter Snake. If the stripes are blueish, and you are on the Gulf Coast, then you most likely have identified a Bluestripe Garter Snake. Garter snakes, like most snakes, are completely harmless. Snakes will generally only strike if threatened or disturbed. A garter snake diet consists mostly of worms, amphibians, fish, eggs, snails, and rodents. If you catch a glimpse of what you think was a snake, the chances are that you probably spotted a racer. These fast-moving snakes can travel at 8-10 mph. It is a very anxious species and may be aggressive when encountered even if you attempt to leave it alone. It may strike out, bite or vibrate the tip of its tail, much like a rattlesnake (but without the signature rattle). It is non-venomous, but any bite by a wild animal, snake, or otherwise, should always be checked by a doctor. There are three varieties of racer snake in Florida, and you can easily identify them by color or location. If the racer you see you is an evenly colored blueish, greenish, or slate gray, you have encountered an Everglades Racer. This species is only found in the southern part of the Florida Everglades and near Cape Canaveral. If the snake is black with a brown chin and upper lip, and you are near the Apalachicola River drainage area, you have most likely spotted a Brownchin Racer snake. If the snake is black with a white chin and red or orange eyes, and you are anywhere else in Florida than the previously mentioned areas, then you have encountered the most common Southern Racer snake. Corn snakes are also prevalent in Florida. These reptiles get their names from the old days when southern farmers stored harvested corn in wooden buildings called cribs. Rats and mice would come to snack on the ears of corn, and snakes would come to feed on the rodents. The Eastern Corn snake is widespread from Southern NJ to Florida and west to the Mississippi River. They are found in pinelands, swamps, agricultural fields, or residential areas. Anywhere there are rodents present, corn snakes are sure to follow. These snakes can be identified by their light orangish-brown coloring and bright orangish-red splotches, bordered with black. Their underbellies are usually a black and white checkerboard pattern. These snakes are both harmless and extremely common, but if you have encountered them more than once in a short time, you likely have a rodent problem nearby. Rat Snakes are also a frequently encountered non-venomous snake, and several species exist in Florida. In the panhandle, west of the Apalachicola River, you’ll find the Gray Rat Snake. Its gray body with dark gray to black splotches will help you to identify this species. On the underbelly, the pattern continues but is lighter. These snakes often crossbreed with the Eastern Rat Snake in the Apalachicola region. East of the river and down to Key Largo, these snakes can vary considerably in color. From black and gray colorations to orange and reddish, even brown or golden colors occasionally present. Some will have stripes, others will display splotches, and some will show both splotches and stripes. They tend to be active at night and feed mainly on rodents, but also dine on lizards, frogs, birds, and their eggs. This snake is sometimes called a chicken snake because it will eat young chickens, chicks, and eggs. While all Florida snakes are beneficial to the environment, helping to control populations of rodents, as well as insects, the Kingsnake and the Eastern Indigo should get honorable mentions. Both are non-venomous species, but actively seek out and consume venomous species. The Eastern Indigo is currently listed on the Endangered Species List, and none have had verified reporting in Florida since 1997. In areas where Kingsnake populations are declining, copperheads are booming. Currently, in Alabama and the Apalachicola River area of Florida, there are active Eastern Indigo replenishment programs in effect. Kingsnakes are unique in the fact that their blood contains a protein that makes them immune to the venom of poisonous snakes. Kingsnakes and Coral snakes are so similar in color that accidental killings may be a contributing factor in their decline. If the snake has a black nose, you can be confident it is a coral snake. This simple poem can help you differentiate between these two snakes: Red touch yellow, kills a fellow Red touches black, venom lack Yellow touches red, soon you’ll be dead Red touches black, friend of Jack. Venomous Florida Snakes Of all the snakes found in Florida, there are only six venomous species. These include the Eastern Coral, Dusky Pigmy, Cottonmouth, Southern Copperhead, Eastern Diamondback, and the Timber Rattlesnake. If you do not know whether a snake is venomous or not, the best and safest thing to do is to leave it alone. Most snakes are not aggressive and will not strike or bite unless provoked. If you are bitten and are unsure what kind of snake bit you, immediately seek out medical attention. The only cure for a venomous snake bite is to receive an antivenin. While seeking medical care, remove any jewelry or clothing that could restrict circulation around swollen tissue. Additionally, any area that is swelling should be kept below the level of the heart. Their signature sound can quickly identify Eastern Diamondback and Timber Rattlesnakes. However, this rattle, located at the end of their tail can fall off, and will not grow back until the snake sheds its skin. A common misconception is that rattlesnakes will coil, hiss and rattle before they strike. This myth is not valid. The rattle is simply a warning for other animals to stay away. Still, if you disturb a rattlesnake without realizing it, it can and will strike without warning. The diamond pattern with a brown center and light cream colored borders can help you to identify Diamondbacks. These snakes are often confused with Timber Rattlesnakes because of their similar coloring. However, the Timber rattlesnake has a V-shaped pattern instead of the diamond pattern and a reddish-brown stripe running down the center of its back. Their body color is also lighter than an Eastern Diamondback, with a pinkish hue to it. If you live in South Florida, you are pretty safe from the Southern Copperhead. This snake takes up residence around swamps, stream beds and river bottoms, especially around the Apalachicola River area. The eyes of the Copperhead are vertically slit and covered by a large scale. This physical trait helps the snake to hunt at night, but they also leave humans shuddering in their shoes. Some misinformation out there claims that you can tell a venomous snake by whether or not it has this type of eye. This distortion is 100% false. Many species, venomous and non-venomous alike, have these elliptical eyes. The Copperhead is a pale-colored snake with darker brown to reddish-brown crossbands. Along the backbone, constrictions give these bands an hourglass appearance. On the sides of the body, the crossbands will have a lighter appearance. There are two species of Cottonmouth found in Florida. Often called Water Moccasins, these snakes are agile swimmers. They get their name from the white interior of their mouth. Most of these snakes reside in the panhandle of Florida, and northward into Georgia and Alabama. Eastern Cottonmouths can be found as far north as Virginia. The difference between the Eastern and the Florida versions are located on the snakes head. If the cheek stripe is well defined and has two vertical dark marks on the snout, you’ve found yourself a Florida Cottonmouth. If the cheek stripe is less defined and no markings appear on the nose, then you could have spotted an Eastern Cottonmouth. While venomous snakes are dangerous for obvious reasons, other snakes pose problems to both humans and animals alike. Florida is home to a variety of invasive species that wreak havoc on the fragile ecosystem. Among the nearly 500 species of intrusive flora and fauna that has taken up residence, the Burmese Python is at the top of the list. Alligators and Cougars were at the top of the Florida food chain until the Python started reproducing here. The Burmese Python is a persistent problem in South Florida, and the Florida Fish and Wildlife Conservation Commission holds an annual contest to help wrangle up this invasive species. This year’s Python Bowl brought 80 of these giants in, and winner Mike Kimmel was responsible for eight captures. Runner up Tom Rahill brought in two beasts, both the longest measuring 12’ 7.3” and the heaviest weighing 62 lb. The FWC encourages the public to report python sightings. They even offer a free program called Python Patrol to help individuals identify and, in some cases, capture and kill this invasive species. Find out about an upcoming class here. What To Do When You See a Snake The best and safest way to interact with a wild snake is not to. If you happen to see a snake, it is best to make a wide path around it. Snakes can strike at about 2/3 of their body length. That means a six-foot snake can lunge up to four feet to land a strike. Many snakes have pits or heat-seeking sensors between their eyes that help them to locate and land on prey. Most snakes are adverse to humans and will likely flee. There is no good reason to kill a snake as they are beneficial to the ecosystem. They help to keep rodent, insect, and amphibious populations under control. If you have frequent sightings of any type of snake, you are most likely also having a rodent problem nearby. Clearing up lawn debris or lumber piles will discourage both rodents and snakes. If you see a large snake, it is likely long gone the following day. Most sizeable snakes travel great distances for food and shelter. If a snake invades your home and you can, with certainty, identify it as a non-venomous snake, you can attempt to remove and relocate it yourself. Directions for removing non-venomous snakes can be found on the FWC website here, or you can call a professional who has been trained in the removal of snakes. If you’d like to learn more about identifying the various snakes of Florida, check out the Florida Museum Snake Identification Key here. Florida Museum: https://www.floridamuseum.ufl.edu/herpetology/fl-snakes/list/ Florida Fish and Wildlife Conservation Commission: https://myfwc.com/conservation/you-conserve/wildlife/snakes/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587877.85/warc/CC-MAIN-20211026103840-20211026133840-00513.warc.gz
CC-MAIN-2021-43
11,546
21
https://www.larberthigh.com/departments/sciences/physics/youtube_channel.html
code
Physics Larbert High YouTube Channel This channel can be viewed by clicking the link below: We are currently working on uploading videos that are relevant to all of your S1 Science and S2 to S6 Physics courses at LHS. Eventually the videos will be listed in terms of a playlist for each of the courses that you are studying. If you come across any videos that are really interesting, then you can let us know by sending an e-mail with the link to:
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825728.30/warc/CC-MAIN-20181214114739-20181214140239-00397.warc.gz
CC-MAIN-2018-51
447
5
https://sutocom.net/2013/09/18/excel-2013-new-feature-timeline-slicer/
code
What’s New in Excel 2013? Timeline Slicers ! Timeline Slicers are a feature new to Excel 2013. If your PivotTable contains dates, a Timeline Slicer affords you and your reviewers an easy method to filter and scale of the dates displayed.. (For detailed instructions on creating PivotTables review the 5 minute video tutorial PivotTables and Slicers ) Inserting the Timeline Slicer - Click hereto open the file PivotTable Advanced Functions.xls file. - Review the Sales sheet. This is the source of our PivotTable data. - Click the Summary Sheet. A PivotTable has already been inserted, with the dates of Weekly Sales displayed in Rows, and a Slicer for the Category field applied. - Select one of the cells containing data (e.g. A4). - On the Ribbon, on the PIVOTTABLE TOOLS: ANALYZE tab, in the Filters group, click Insert Timeline. The Insert Timelines dialog appears. - Check Weekly Sales and click OK. View original post 67 more words
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256763.42/warc/CC-MAIN-20190522043027-20190522065027-00473.warc.gz
CC-MAIN-2019-22
940
12
https://www.programmableweb.com/news/us-justice-department-exposes-foreign-lobbyist-data-api/brief/2019/07/02
code
The United States Justice Department launched an online portal that provides users with information on lobbyists working on behalf of foreign governments. The portal includes a new FARA.gov APITrack this API that allows developers to programmatically analyze the myriad data provided. The new service features search functionality that parses through troves of public documents collected under the Foreign Agents Registration Act (FARA). Additionally, the API has access to bulk data files, which are available in both CSV and XML formats, allowing developers to build tools that better analyze/utilize this information. The Justice Department summarized the importance of the API on their website: “The U.S. Department of the Justice is committed to providing transparency in government and now offers Application Programming Interfaces (APIs) via this website...The APIs made available by the U.S. Department of Justice provides access to available FARA registration data” The FARA.gov API is currently in version 1, with additional endpoint anticipated in the near future. Interested developers can check out the APIs documentation and list of available endpoints.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540499389.15/warc/CC-MAIN-20191207105754-20191207133754-00292.warc.gz
CC-MAIN-2019-51
1,171
4
https://staging.h5p.org/node/168251
code
User friendly focus and content creation efficiency I've been using h5p (in wordpress) for the first time and thought I would share some initial impressions and suggestions. One thing is where you insert content in boxes like the single or multi choice content within a course presentation. It would be useful to display 3-4 boxes on a single slide by creating one box, copying it the desired number of times and then just modifying certain data in the new boxes. I can't see any way of doing this, so I have to create each box separately and enter all the data 4 times. I think its this kind of user-friendliness which would stop new time-pressured users (eg teachers) from getting frustrated and really help h5p take off. Teachers, web designers or anyone else wanting to create interactive content will generally put a value on time and experiences such as this might frustrate them and add a barrier to acceptance as a genuine interactive content creation tool. Also for content in a similar format that just needs to be replicated and then the text adjusted, it would be nice if text content could be edited quickly without having to always go into the editor, save it, come out, create a new box, go into the editor etc. This may be difficult and time consuming to code, I'm afraid I don't know enough to help develop it, but I really think making existing content types as easy to use and as efficient as possible should be as much of a focus as creating new content types (drag and drop, quizzes etc). I'm sure there's continual development but thought you would like to hear from a new user Keep up the excellent work
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.45/warc/CC-MAIN-20240222193722-20240222223722-00795.warc.gz
CC-MAIN-2024-10
1,626
6
https://www.manualslib.com/manual/419907/Ibm-7945g2u.html?page=49
code
The following illustration shows the light-emitting diodes (LEDs) on the system Note: Error LEDs remain lit only while the server is connected to power. System pulse LEDs The following LEDs are on the system board and monitor the system power-on and power-off sequencing and boot progress (see "System-board LEDs" for the location of these LEDs). Table 6. System-pulse LEDs Enclosure manager heartbeat Indicates the status of power-on and power-off When the server is connected to power, this LED flashes slowly to indicate that the enclosure manager is Chapter 2. Installing optional devices (Trained service technician only) If the server is connected to power and the LED is not flashing, replace the system board.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057447.52/warc/CC-MAIN-20210923195546-20210923225546-00014.warc.gz
CC-MAIN-2021-39
717
19
https://www.daniweb.com/programming/software-development/threads/433934/how-to-make-one-form-control-another-form
code
Can someone please tell me how to control a windows form from another form? I have one form (form2) which has a button. When this button is clicked, I need my other form (Form1) to hide a button. I know all the code except for how to make form2 access form1. It seems so simple, yet I cannot do it. Any help would be appreciated. Thanks Jump to Post Add a constructor to the form (call it Form2) that needs to hide the button on the first form (call it Form1). Like this: Public Class Form2 Private ButtonToHide As Button Public Sub New(ByVal ButtonToHide As Button) Me.InitializeComponent() Me.ButtonToHide = ButtonToHide End Sub Private Sub Button1_Click(ByVal sender … All 9 RepliesReply to this topic We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474660.32/warc/CC-MAIN-20240226130305-20240226160305-00784.warc.gz
CC-MAIN-2024-10
875
6
https://codecanyon.net/user/yahyaapps
code
Hello world! We are YahyaApps. We create Android apps and Game templates. We’ve been developing mobile apps since 2018. Our priority is to create top quality products with beautiful design, write a perfectly clean code and make our products easily reskinable, configurable and customizable. We are following Design Guidelines and permanently watching new trends. Stack Surfer – Stack Run 3D(Unity Game Template + UnityAds)
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00049.warc.gz
CC-MAIN-2023-14
426
2
https://www.linux.com/news/speak-open-source-summit-europe-submit-july-1-0/
code
Share your expertise and speak at Open Source Summit Europe in Edinburgh, October 22 – 24, 2018. We are accepting proposals through Sunday, July 1, 2018. Open Source Summit Europe is the leading technical conference for professional open source. Join developers, sysadmins, DevOps professionals, architects and community members, to collaborate and learn about the latest open source technologies, and to gain a competitive advantage by using innovative open solutions. As open source continues to evolve, so does the content covered at Open Source Summit. We’re excited to announce all-new tracks and content that make our conference more inclusive and feature a broader range of technologies driving open source innovation today. Read more at The Linux Foundation
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410284.51/warc/CC-MAIN-20200530165307-20200530195307-00413.warc.gz
CC-MAIN-2020-24
769
4
https://community.ivanti.com/thread/22220
code
While deploying 7.6 release (clean installation) we are finding some issues. Till now we have restored the database and installed the Web Server. Then we have changed the sa password. Till here everything works as expected. Then reconfigured IIS for Windows authentication. Added the Role Service for Windows authentication in the web server, disabled the anonymous authentication and enabled the Windows one. Then we added Modify permissions to the folders containing the Cionfiguration Centre web site (C:\Program Files (x86)\LANDesk\Service Desk\WebApp\ConfigurationTool) Now if we browse the Configuration Centre from a workstation (windows 7 64bits/IE8 w/Chrome Frame) everything works as expected. But if we browse it from the Web Server itself (Windows 2008 R2/IE9) we receive only the application, but the theme is not present. Is like if the CSS was missing or there is not access to the image files or something like this. Find a screenshot attached.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482347.44/warc/CC-MAIN-20190217172628-20190217194628-00227.warc.gz
CC-MAIN-2019-09
960
6
https://www.allspark.com/forums/topic/147606-%E2%9C%A8meow%E2%9C%A8/
code
Posted 15 December 2017 - 11:50 PM *Pounces and pets the sheepkitty* Edited by Copper Bezel, 15 December 2017 - 11:51 PM. Shouldn't gravity be doing something? Of course there's a figure of Rodimus as some kind of animal girl. Why would I be surprised by this? Posted 16 December 2017 - 06:55 PM Switch = SW-7457-8143-2029 Mornings are for coffee and contemplation. Before you do anything you can't undo...National Suicide Prevention Hotline: 1-800-273-8255 Also tagged with one or more of these keywords: meow, meeeoooow~, ✨, 😽, nyaa~ 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141727782.88/warc/CC-MAIN-20201203124807-20201203154807-00574.warc.gz
CC-MAIN-2020-50
612
12
http://okraju.xyz/archives/540
code
Jam-upnovel Let Me Game in Peace online – Chapter 1021 – Evil Puppeteer story cagey reading-p1 in harm’s way movie 2018 Novel–Let Me Game in Peace–Let Me Game in Peace Chapter 1021 – Evil Puppeteer fall authority “If we don’t cover, passing away awaits us. You can only go.” Gaiman quickly published. Gaiman looked over the location where the human being possessed ended up and observed that they obtained vanished silently like the prior particular person. Lastly, he gritted his teeth and purchased everyone to remain fighting off the puppet’s strike. He brought up the thought of using the threads. Zhou Wen swept his gaze and quickly validated who people discolored along with the bloodstream were definitely. Nevertheless, on this page he was. In addition, the individuals had already been tarnished using the blood flow with the three-headed wolf. It took place to fit the expertise of your Devil Puppeteer. In a while, individuals that were actually stained using the wolf blood vessels would probably come to be puppets. Section 1021: Satanic Puppeteer Quickly, everybody found blood vessels-colored puppets appear in all places. They searched like humans and have been very well-built. These were even putting on clothes. The others had been also wanting to give it a go. Certainly, they noticed that if this ongoing, unless they killed a bunch of their operated people today and puppets, there were no chance of surviving. w.a.n.g Lu, who had been by Zhou Wen’s area, wasn’t tarnished with the wolf bloodstream. Zhou Wen was happy when he discovered that Lance wasn’t discolored using the wolf blood either. Zhou Wen had prolonged envisioned this end result. He drawn w.a.n.g Lu back and anxiously waited for the Devil Puppeteer appearing. Nevertheless, right here he was. Furthermore, those people got recently been stained together with the blood vessels of the three-going wolf. It occured to accommodate the expertise with the Devil Puppeteer. For a while, people that were tarnished while using wolf blood vessels would definitely grow to be puppets. “Give me a reason,” Gaiman created as he stared at Zhou Wen. Zhou Wen recognized that his speculate was right when he saw the puppets. Hurting these puppets was pointless. The puppeteer acquired countless puppets, thus it was unproductive to decrease their amounts. He had to wait for puppeteer to show up right before eradicating him. When all people retreated into the doorstep, they stood in creation with regards to their backside versus the exit. The Friend Beasts were definitely also willing to beat as they quite simply looked in the direction of the odd seem. Gaiman investigated the recognize the place that the individual acquired long gone and saw he acquired vanished silently like the previous guy. Ultimately, he gritted his tooth and required everybody to go on resisting the puppet’s episode. He offered up thinking about following the threads. Gaiman looked over the area where the individual had ended up and spotted that they had vanished silently similar to the earlier man or woman. Lastly, he gritted his pearly whites and obtained every person to keep fighting off the puppet’s attack. He provided up the idea of pursuing the threads. The puppets revived just after staying murdered. It was worthless getting rid of them any further. They had to eliminate the guy manipulating the puppet. Nonetheless, in-match, the Devil Puppeteer is in the Puppet Hall and wouldn’t operate out by him self. The self-deterioration in the three-going wolf was well timed. It took place to self-destruct in the midst of everybody. Can it be that it really was really a suicide bomber? Zhou Wen knew that his reckon was appropriate when he discovered the puppets. Gaiman viewed the place where the individual possessed went and spotted that they possessed vanished silently similar to the former human being. Finally, he gritted his teeth and bought everyone to keep resisting the puppet’s infiltration. He provided up the thought of following a threads. The folks and Friend Beasts with excellent threads in their systems found they were no longer in command of their own bodies. They seemed to be managed through the threads because they lunged at their buddies. “Let’s keep to the threads and speed above together.” Gaiman published some thoughts attempting to continue with the threads about the puppets. “I believe only by keeping yourself on this page will there turn into a chance of surviving. Exceeding will undoubtedly cause dying.” Zhou Wen had written. “Let’s stick to the threads and rush above with each other.” Gaiman authored a number of thoughts attempting to adhere to the threads around the puppets. The folks and Companion Beasts with fine threads on their bodies identified they were will no longer in control of their health. They appeared to be handled by the threads as they quite simply lunged at their buddies. “Do not discuss.” Zhou Wen created on the cardboard.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00368.warc.gz
CC-MAIN-2023-14
5,018
31
https://gbatemp.net/threads/r4i-working-on-dsi-v1-4-2-via-action-replay.298550/
code
Hi guys! my R4i-sdhc 1.4 works on dsi V1.4.2U!! just use an action replay! you know how when you boot ARDSi and insert a game it doesn't have codes for? well, just do it with the R4i and create a a game entry like normal. then, start it and go! I'l post a video if anyone needs proof!
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891377.59/warc/CC-MAIN-20180122133636-20180122153636-00350.warc.gz
CC-MAIN-2018-05
284
1
https://discourse.metabase.com/t/upgrade-and-backup-safetely/6463
code
thanks to suggestion of Flamber to an update. I have some questions (i read about in the forum …but I cannot very well understand). Metabase was installed by me (but I don’t rembember how …:() in my VPS linux server bi.idblab.com and is connected to a MySql database that is hosted in the same machine. I remind I did something with an installation file …or something similar, but now … I don’t know how to: - Backup the files (I can only backup the machine vps), because I don’t see directory in \publichtml i see some java files but I am not sure is all related to that files - Installing new version safetely. I have 20 people connected and I don’t want to make a mess! … Can someone help me?
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524517.31/warc/CC-MAIN-20190716075153-20190716101153-00007.warc.gz
CC-MAIN-2019-30
713
5
https://intellij-support.jetbrains.com/hc/en-us/community/posts/206938015-Android-layout-development-with-Idea-X-Community-Edition
code
Hi! First of all I want to thank you for Android support, I be glad to develop with IDEA, not Eclipse. Well, IDEA perfectly imported Eclipse project, compiled it and made running. But one question I didn't find answer is there any "WYSIWYG" editor for layout? I don't want to switch for Eclipse to make modifications neither direct edit of layout xml files.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655894904.17/warc/CC-MAIN-20200707173839-20200707203839-00254.warc.gz
CC-MAIN-2020-29
357
1
http://web2.sys-con.com/node/2442655
code
|By Marketwired .|| |November 13, 2012 07:30 AM EST|| SAN MATEO, CA -- (Marketwire) -- 11/13/12 -- Platfora (www.platfora.com), the first in-memory business intelligence (BI) platform for Hadoop and Big Data, closed a $20M Series B round of funding led by Battery Ventures with participation from existing investors Andreessen Horowitz and Sutter Hill Ventures. In-Q-Tel is also an investor in Platfora. Roger Lee, general partner at Battery Ventures, joins the Platfora Board of Directors. Platfora will use the investment to respond to strong interest in its product -- by expanding sales and marketing organizations in the US and globally, and continuing to build out its highly regarded product engineering and design team in San Mateo, CA. Platfora is a fundamentally different kind of BI platform. It transforms raw data in Hadoop into scale-out, in-memory BI without the need for a traditional data warehouse. Business users are presented with powerful and easy-to-use web-based interface for exploring and analyzing big data. This is the first product of its kind to use HTML5 canvas technology, enabling collaborative data analysis across any device or platform. "We couldn't be happier with the way the market has reacted to Platfora -- we've seen a burning interest in letting non-technical users harness the data in Hadoop for visual insight," said Ben Werther, CEO and founder, Platfora. "In order to address the interest in Platfora, we need to accelerate our go-to-market strategy and quickly grow our team. We're so honored to have the investors we do and we are focused on getting Platfora to wide availability in Q1 2013." Platfora works by intelligently distilling data from Hadoop into a high performance data processing engine, making access to the data extremely fast. Platfora leverages the power of Hadoop to perform the heavy lifting, processing massive data sets into highly efficient, scale-out in-memory 'lenses,' which can seamlessly span dozens or hundreds of servers to utilize their collective memory and processing. Platfora's biggest innovation lies in how the layers work together seamlessly. It automatically and immediately refines the in-memory data based on the questions being asked by end users, instead of requiring 6-12 month IT cycles and manual engineering as is the case today. "We believe that Platfora represents the future of business analytics. With the emergence of Hadoop, legacy ETL, data warehouses, and BI solutions no longer make sense," said Mike Dauber, principal at Battery Ventures. "The early demand for Platfora speaks to the company's vision and understanding of how businesses need and want to access and analyze data. Ben and the rest of the Platfora team are building the next powerhouse data company and we are thrilled to be a part of it." Platfora is hiring. About Platfora, Inc. Platfora changes the way businesses use data. Headquartered in San Mateo, CA, we put the power of big data in the hands of people who need it most, the end users. Platfora makes Hadoop amazing. Platfora is funded by Andreessen Horowitz, Battery Ventures, Sutter Hill Ventures, and In-Q-Tel. For more details, visit www.platfora.com and follow us @platfora. About Andreessen Horowitz Andreessen Horowitz is a Silicon Valley venture capital firm that provides seed, venture and growth-stage funding to the best new technology companies. Founded by Marc Andreessen and Ben Horowitz, Andreessen Horowitz specializes in helping entrepreneurs become successful CEOs and build important and enduring companies. Its investing partners are Marc Andreessen, Ben Horowitz, John O'Farrell, Scott Weiss, Jeff Jordan and Peter Levine, all widely recognized experts in the creation, scaling and operation of high growth technology companies. The firm has $2.7 billion under management. The firm's investments include Airbnb, Apptio, Box, Fab, Facebook, Foursquare, Github, Jawbone, Jumio, Lookout, Lytro, Pinterest, Twitter, and Udacity. The firm was established in June 2009 and is located in Menlo Park, California. www.a16z.com About Battery Ventures Since 1983, Battery has been investing in technology and innovation worldwide. The firm partners with entrepreneurs and management teams across technology sectors, geographies and stages of a company's life, from seed, start-up and expansion financing, to growth equity and buyouts. Battery has supported many breakthrough companies around the world, including seven companies who have IPO'd in the past fourteen months. Past portfolio companies include: Akamai Technologies (IPO), Angie's List (IPO), Anobit (acquired by Apple), Groupon (IPO), ITA Software (acquired by Google), Kashya (acquired by EMC), Netezza (acquired by IBM), VSS Monitoring (acquired by Danaher), and XtremIO (acquired by EMC). Its current portfolio includes emerging and more established firms such as Bazaarvoice (IPO), Calxeda, Continuuity, Cumulus Networks, Delphix, ExactTarget (IPO), Guidewire (IPO), Kontangent, Marketo, Nutanix, Opscode, and Zerto. Battery has offices in Boston, Silicon Valley and Israel. It has raised nearly $4B since inception, and is currently investing a $750M fund. For more information, visit www.battery.com. Follow us @batteryventures. About Sutter Hill Ventures Sutter Hill Ventures has financed technology-based start-ups and assisted entrepreneurs in building market-leading companies since 1962. Through decades of experience, the firm has developed strong industry networks, considerable operating and venture capital experience, and an understanding of the challenges that early-stage and high-growth companies face. The firm offers expertise in developing business strategy and partnerships, building management teams, and financing companies in both public and private markets. Previous Sutter Hill Ventures portfolio companies include NVIDIA, NetApp, Data Domain, Alteon Networks, Youku, and others. Current companies in the SHV portfolio include Pure Storage, Sumo Logic, Platfora, Glassdoor, Ruckus Wireless, and others. Nectar PR for Platfora The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e... Sep. 27, 2016 07:30 PM EDT Reads: 2,129 Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha... Sep. 27, 2016 07:15 PM EDT Reads: 421 SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes. Sep. 27, 2016 07:00 PM EDT Reads: 2,846 Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition. Sep. 27, 2016 06:30 PM EDT Reads: 3,559 There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a... Sep. 27, 2016 06:30 PM EDT Reads: 2,187 If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect... Sep. 27, 2016 05:45 PM EDT Reads: 1,656 So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning... Sep. 27, 2016 05:30 PM EDT Reads: 2,010 If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne... Sep. 27, 2016 05:15 PM EDT Reads: 299 In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly. Sep. 27, 2016 05:15 PM EDT Reads: 2,765 Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers? Sep. 27, 2016 05:00 PM EDT Reads: 1,596 SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder... Sep. 27, 2016 03:15 PM EDT Reads: 2,763 The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy... Sep. 27, 2016 03:00 PM EDT Reads: 1,693 Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr... Sep. 27, 2016 02:45 PM EDT Reads: 1,275 Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct... Sep. 27, 2016 02:45 PM EDT Reads: 2,214 Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati... Sep. 27, 2016 02:15 PM EDT Reads: 2,019 Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati... Sep. 27, 2016 01:30 PM EDT Reads: 1,717 IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p... Sep. 27, 2016 01:00 PM EDT Reads: 1,601 There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is... Sep. 27, 2016 01:00 PM EDT Reads: 2,666 SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne... Sep. 27, 2016 12:15 PM EDT Reads: 3,223 Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open. Sep. 27, 2016 12:15 PM EDT Reads: 4,565
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661289.41/warc/CC-MAIN-20160924173741-00146-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
16,547
59
https://github.com/SeldonIO/seldon-core/tree/master/components/routers/thompson-sampling
code
Thompson Sampling Router Thompson Sampling is a Bayesian method for solving the multi-armed bandit problem. The main idea is to start with a prior distribution over the unknown reward distributions and use each pull of the arm to update the posterior hyperparameters. Each subsequent pull of the arm is then decided by sampling from the updated posterior distributions over the rewards. ThompsonSampling class implements the Thompson Sampling router. NB: The reward is interpreted as the proportion of successes in the batch of data samples. Thus this implementation inherently assumes binary rewards for each sample in the batch. The helper function n_success_failures calculates the number of successes and failures given the batch of data samples and the reward. This means that our version of the Thompson Sampling router implements the Beta-Bernoulli model. The Beta distribution is a conjugate prior to the Bernoulli distribution allowing for a very simple hyperparameter update. We set our prior hyperparameters α=β=1 corresponding to a uniform distribution over the number of arms. For a thorough discussion on the Beta-Bernoulli model refer to Chapter 3 of A Tutorial on Thompson Sampling. You can find a case study comparing epsilon-greedy routing and Thompson sampling used as routers for models predicting credit card default here. The latest version of the Thompson Sampling Router available from Docker Hub is Wrap using s2i For routers like multi-armed bandits it can be important to save the state after some learning has been done to avoid cold starts when re-deploying an inference graph. This can be achieved by setting PERSISTENCE=1 in the .s2i/environment file before wrapping the source code. This will use redis to periodically save state of the component on the Seldon Core cluster.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574765.55/warc/CC-MAIN-20190922012344-20190922034344-00049.warc.gz
CC-MAIN-2019-39
1,808
11
https://www.alltechbuzz.net/3-best-practices-you-should-know-when-using-kubernetes-statefulset/
code
Creating a clustered environment of any kind involves a lot of work to allow consistent deployment and scaling. The good news is that you can manage containers at scale using StatefulSets in Kubernetes. StatefulSets are intended for running stateful applications within Kubernetes with dedicated, persistent storage. In this guide, we’ll cover three best practices to learn from when using Kubernetes StatefulSets. What is Kubernetes StatefulSet? Kubernetes StatefulSet is the workload Application Programming Interface (API) object used for managing stateful applications. You can use StatefulSets to deploy and scale a set of Pods, which provides guarantees for the Pod’s order and uniqueness. Similar to a Deployment, a Kubernetes StatefulSet can manage Pods based on an identical container specification. However, unlike a Deployment, a StatefulSet can maintain sticky identities for each Pod. While the pods are created from the same spec, they’re not interchangeable, which means each Pod has a persistent identifier that it maintains throughout any rescheduling. If you want to provide persistence for a workload using storage volumes, leverage a StatefulSet as part of the solution. While individual Pods within a StatefulSet can be prone to errors, the persistent Pod identifier can make it easier to match the existing volumes to the new Pods that replace those that failed. A typical use case of StatefulSet is when you need to deploy primary or secondary servers, such as a database cluster, where you have to know each server’s hostname to start the cluster. Another common use case of StatefulSet is when you scale up and down in a specific order, such as when you want to begin with the primary node followed by the secondary node. It’s best to use StatefulSet when you need: - Stable and distinct network identities - Ordered and unique deployment and scaling - Persistent and steady storage across all your application scheduling and rescheduling Tried and tested tips when using StatefulSet Below are a few best practices for using Kubernetes StatefulSet. 1. Use the kubectl apply a command to create a StatefulSet resource The command utilizes manifest files to create, update, and remove resources within your clusters. It’s a declarative method of object configuration that retains writes that were made to live objects without merging changes back into the object configuration files. Remember to create a StorageClass when using clusters with Windows Server node pools since the default StorageClass utilizes ext4 as the file system type (which only works for Linux containers). Also, use NTFS as the file storage type if you use a Compute Engine persistent disk. Create a StatefulSet manifest using the StorageClass you defined. For instance, your manifest can create four PersistentVolumeClaim and PersistentVolume pairs representing four Computer Engine persistent disks. Each Pod within the StatefulSet consumes a single persistent disk. Additionally, include a node selector to your Pod specification to make sure your Pods are scheduled correctly on Windows Server nodes. Finally, create a StatefulSet resource by running this command: kubectl apply -f STATEFULSET_FILE Remember to replace STATEFULSET_FILE with the manifest file name. 2. Know the various methods for updating a StatefulSet You can update StatefulSets in various ways, with the declarative method kubectl apply to be the most common. For instance, if you use the Google Kubernetes Engine and want to update the StatefulSet in your preferred editor or directly from your shell, use kubectl edit. You can also opt for the YAML editor on the GKW Workloads menu within the Cloud console. Also, you can roll out updates to the Pods specification (for a StatefulSet resource), such as its configuration, image, or resource requests and usage. Apply an updated or new manifest file when updating the StatefulSet using kubectl apply. It’s helpful when making various changes to StatefulSet, such as when you scale or specify new application versions. Note: Using kubectl apply to update a resource only works when the resource was created using kubectl create – -save-config or kubectl apply. You can also use StatefulSet’s updateStrategy field, which lets you set up and disable automated rolling updates for resource requests, labels, limits, containers, and annotations for the Pods within a StatefulSet. Know the various methods for updating your StatefulSet and determine which works best for you. 3. Determine when to use StatefulSets There are instances when you’re better off using Kubernetes StatefulSets than Deployments. Some of these situations can include the following. - Scaling down or deleting a StatefulSet. Your data can remain safe when scaling down or deleting a StatefulSet since doing so won’t delete the volumes associated with the Stateful app. It’s usually more valuable than automatically purging all related StatefulSet resources. For example, if the MySQL Pod restarts or gets deleted, you can access the data in the same volume. - Deploying and scaling a MySQL database. Let’s say you deployed a MySQL database within the K8s cluster and scaled it to three replicas. A frontend app also wants to access your deployed MySQL cluster to read and write data. The read request is forwarded to three Pods, but the write request only gets forwarded to the primary or first Pod. Then, the data gets synced with the other Pods. All this is possible when you use StatefulSets. Kubernetes StatefulSet limitations While it’s crucial to know the best practices in using a Kubernetes StatefulSet, it’s just as important to understand its limitations, which include the following. - A given Pod’s storage must be pre-provisioned by an admin or provisioned by PersistentVolume Provisioner (based on the requested storage class). - StatefulSets don’t offer guarantees for pod termination when StatefulSets are deleted. To achieve gracefully and ordered pods termination when deleting a StatefulSet, you can scale the StatefulSet down to zero before deleting. - StatefulSets require a Headless Service responsible for the Pods’ network identity. You’ll need to create this service. - You can get into a broken state that needs manual intervention to fix when you use Rolling Updates via the default Pod Management Policy (OrderedReady). Leverage Kubernetes StatefulSet the right way Administrating distributed systems and stateful applications on Kubernetes can be a broad and complex undertaking, but it’s not rocket science. Start with the basics and follow best practices when using StatefulSets to make managing and running stateful applications in Kubernetes more effective and efficient.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00829.warc.gz
CC-MAIN-2023-50
6,733
55
https://www.theconativegroup.com/focusweek-feedback
code
Hello Parents! Thank you for participating in FocusWeek! Your feedback is very important to us. Feel free to fill out this survey with your comments and questions. All information provided in this survey is confidential and will be used to further improve our programs at The Conative Group. Dr. Kimberly Harrison and The Conative Group Team
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00200.warc.gz
CC-MAIN-2023-50
341
3
http://support.moonpoint.com/os/os-x/audio/qt-recording/
code
Recording audio on a Mac OS X system with QuickTime Player If you need to create an audio recording, e.g., to record a lecture, etc., you can do so with a Mac OS X system using the QuickTime Player application that will likely be in the /Applications folder on the system. Open the QuickTime Player program from the Click on File. Select New Audio Recording. When you are ready to start recording, click on the red button in the middle of the Audio Recording window. When you start the recording, the button changes color to a dark square within a white circle and you will see the time incrementing on the left side of a bar in the window and the size of the file for the recording incrementing on the right side of the bar. When you are ready to stop recording audio, click on that button. Then click on File and select Save. You can then type a name for the file, associate tags with it and choose where the file will be saved. If you click on the upward arrowhead to the right of the Export As field, you can browse to a location to store the file. The format for the audio file is MPEG-4 Part 14 with an .m4a extension. If you wish to convert the file to another format, you can use iTunes or the command line tool Note: this procedure was written for QuickTime 10.4, but should be similar for other versions.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578681624.79/warc/CC-MAIN-20190425034241-20190425060241-00285.warc.gz
CC-MAIN-2019-18
1,314
25
https://www.methodfs.com/functional-safety-news/39/pirton-boxing-day-run-2020/
code
Method Functional Safety helped create the Pirton Boxing Day Run in 2002 and has been the main sponsor ever since. Now in its 18th year, we continue to be involved in this amazing community running event. We have enjoyed watching it grow, initially by getting the locals into running, and then by becoming a boxing day feature on the local running calendar. The event now raises money for the local school. We always sponsor the event and the website sits on the back of this website (www.boxingdayrun.co.uk). This year our contribution has been to bring technology to the event to allow us to run it virtually. We have been able to put sensors around the course which detect when people run past them. This means everyone entered can run the route whenever they want (probably dictated by how full they feel). We will miss the crowds but at least we are out there. Friendly, happy events like this remind us why we all work so hard throughout the year - and why communities are so important. We would like to wish everyone a safe and happy Christmas and New Year. If you need help with Functional Safety during this period please reach out. We are available if you need us. Otherwise we hope to see you in 2021.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304915.53/warc/CC-MAIN-20220126041016-20220126071016-00408.warc.gz
CC-MAIN-2022-05
1,212
5
https://docs.flowz.com/article/technical-issues-relating-to-flowz-workspace.html
code
Technical Issues Relating to Flowz Workspace If Customers experience any of the following issues: - Account password reset (not working) - Inaccurate portal reports (details under My Reports tab - Monthly consumed, allocated, remaining hours) - Missing / Incomplete Invoices Inaccessible files (especially for old job requests) - Inaccurate time estimates for jobs - Charges/Billing Concerns (over billed, charged canceled accounts, etc.) Please send out an IT request to email@example.com for these issues to be fixed.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703500028.5/warc/CC-MAIN-20210116044418-20210116074418-00311.warc.gz
CC-MAIN-2021-04
519
8
https://www.recordingblogs.com/wiki/mixionian-scale
code
The Mixionian scale, also known as the bebop dominant scale, is an eight-tone scale (octatonic scale) that can be built using the following steps between notes: 1, 1, ½, 1, 1, ½, ½, ½. One example of the Mixionian scale is: G, A, B, C, D, E, F, F#. This scale is shown below in traditional notation and in guitar tablature notation. This scale carries the name "Mixionian" as it is a mixture of the Ionian scale (the standard major scale, G, A, B, C, D, E, F# in the example above) and the Mixolydian scale (G, A, B, C, D, E, F in the example above). This scale is the first mode of the bebop dominant scale (the bebop dominant scale itself) and the fifth mode of the bebop Dorian scale (or the fourth mode if we ignore the passing tone F#; the mode of the bebop dominant scale starting on F# is sometimes called the seventh mode whereas the mode starting on F is the flat seventh mode and so sometimes the bebop dominant scale is described as having seven modes even though it is an eight-tone scale).
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198213.25/warc/CC-MAIN-20200920125718-20200920155718-00317.warc.gz
CC-MAIN-2020-40
1,006
4
https://french.meta.stackexchange.com/users/111/neikos?tab=profile
code
A Student at the HFU in Germany, planning to go into the Web Development Industry as a Backend or Fullstack Engineer. I am currently writing my bachelor thesis about using concepts from cloud computing to improve reliability in mission critical systems. Top network posts - 20 What is the '[Command Line]' that sometimes comes up when I try to quit, and how can I quickly exit it? - 12 How do you decide whether to use "vous" or "tu"? / Comment choisir entre « vous » et « tu » ? - 12 Open .md files as Markdown - 10 Unable to trim string received from TCP stream - 9 How to return Any from a function? - 9 Can a Magic User cast 'Illusion Disguise' on someone even though they don't agree with it - 7 How to return a reference to a sub-value of a value that is under a mutex? - View more network posts →
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057733.53/warc/CC-MAIN-20210925172649-20210925202649-00698.warc.gz
CC-MAIN-2021-39
809
11
https://espressomachineblog.com/qa/how-many-vpcs-should-you-have.html
code
- Can two VPC have same CIDR? - What is Ami in AWS? - Is VPC a private cloud? - Can a VPC of any size be created? - How many users does AWS have? - Can an ec2 instance have multiple security groups? - Is AWS a private cloud? - Do I need a VPC? - Can security groups span VPCs? - What is CIDR block in AWS? - What is a private subnet? - Can one AWS account have multiple VPCs? - How many AWS accounts should I have? - Can I have two AWS accounts? - At what level do security groups provide protection? - Can Lambda run in VPC? - How many VPCs can I have? - When should I use multiple VPCs? Can two VPC have same CIDR? You cannot have multiple subnets with the same (or overlapping) CIDR blocks in the same VPC, though, because AWS treats it as one continuous network. Reserved RFC 1918 CIDR blocks (AWS will let you use any of these for your VPC): 10.0. 0.0/8 (The most commonly used, because it’s the largest). What is Ami in AWS? An Amazon Machine Image (AMI) provides the information required to launch an instance. You must specify an AMI when you launch an instance. You can launch multiple instances from a single AMI when you need multiple instances with the same configuration. Is VPC a private cloud? A Virtual Private Cloud (VPC) is an option that bridges the two, offering the best of both cloud models. VPC’s function like a private cloud that run on public or shared infrastructure. Can a VPC of any size be created? Q. How large of a VPC can I create? Currently, Amazon VPC supports five (5) IP address ranges, one (1) primary and four (4) secondary for IPv4. Each of these ranges can be between /28 (in CIDR notation) and /16 in size. How many users does AWS have? 1,000,000According to Amazon, the number of active AWS users exceeds 1,000,000. While small and mid-size companies make up the majority of that user base, recent polls by private consulting firms suggest that enterprise-scale users make up at least 10% of that total. Can an ec2 instance have multiple security groups? You can apply multiple security groups to a single EC2 instance or apply a single security group to multiple EC2 instances. System administrators often make changes to the state of the ports; however, when multiple security groups are applied to one instance, there is a higher chance of overlapping security rules. Is AWS a private cloud? The key benefit of an Amazon Web Services (AWS) Virtual Private Cloud (VPC) or virtual private networks is a basic one: your devices are not openly accessible via the Internet. This keeps proprietary applications and data protected since they can be accessed only from within your own secure network. Do I need a VPC? Running applications on AWS? You need a VPC: a virtual private network that keeps your servers safe from the ravages of the public internet, just like they were in your old data center. Or so went the guiding philosophy of what we might call cloud 1.0 — the IaaS wave, when EC2 was king. Can security groups span VPCs? When you launch an instance in a VPC, you can assign up to five security groups to the instance. Security groups act at the instance level, not the subnet level. Therefore, each instance in a subnet in your VPC can be assigned to a different set of security groups. What is CIDR block in AWS? A virtual private cloud (VPC) is a virtual network dedicated to your AWS account. … When you create a VPC, you must specify a range of IPv4 addresses for the VPC in the form of a Classless Inter-Domain Routing (CIDR) block; for example, 10.0. 0.0/16 . This is the primary CIDR block for your VPC. What is a private subnet? Instances in the private subnet are back-end servers that don’t need to accept incoming traffic from the Internet and therefore do not have public IP addresses; however, they can send requests to the Internet using the NAT gateway (see the next bullet). A NAT gateway with its own Elastic IPv4 address. Can one AWS account have multiple VPCs? You can have up to five (5) nondefault Amazon VPCs per AWS account per AWS Region*. You can have up to four (4) secondary IP ranges per Amazon VPC*. How many AWS accounts should I have? When to Create Multiple Accounts While there is no one-size-fits-all answer for how many AWS accounts a particular customer should have, most companies will want to create more than one AWS account because multiple accounts provide the highest level of resource and security isolation. Can I have two AWS accounts? AWS Organizations makes it easy to manage multiple AWS accounts from a single master account. You can use Organizations to group accounts into organizational units and manage your accounts by application, environment, team, or any other grouping that makes sense for your business. At what level do security groups provide protection? The Function of Security Groups Every Security Group works in a similar fashion to a firewall as it carries a set of rules that filter traffic entering and leaving the EC2 instances. As said earlier, security groups are associated with the EC2 instances and offer protection at the ports and protocol access level. Can Lambda run in VPC? Lambda first supported VPCs in February 2016, allowing you to access resources in your VPCs or on-premises systems using an AWS Direct Connect link. Since then, we’ve seen customers widely use VPC connectivity to access many different services: Relational databases such as Amazon RDS. How many VPCs can I have? VPC and subnets You can have 100s of VPCs per Region for your needs even though the default quota is 5 VPCs per Region. This primary CIDR block and all secondary CIDR blocks count toward this quota. This quota can be increased up to a maximum of 50. This quota cannot be increased. When should I use multiple VPCs? Instead of using the Default VPC for your whole infrastructure use multiple VPCs to enable isolation between your two customers.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991904.6/warc/CC-MAIN-20210511060441-20210511090441-00093.warc.gz
CC-MAIN-2021-21
5,875
56
https://cryptocurrencywiki.org/Layer_1
code
(Redirected from Layer 1) - Also called First Layer or Main Chain. - The main blockchain of a crypto network. Became a term when Sidechains started to exist. Transactions are being done on-chain. - Since scaling issues started to happen, people have started talking about Layer One and Layer Two solutions. Layer One is the main chain and usually is about on-chain scaling. - Layer Two is about sidechains or off-chain scaling. - An example is BTC Core with the Lightning Network as a Layer Two to help scale. And 32mb blocks on Bitcoin Cash as a Layer One solution. - 0x is trying to solve the scaling problem by using ZK-snarks. They explain it as follows: "Layer one is making the blockchain handle more work. Right now every node verifies every transaction, which means the network can only process as many transactions as its slowest node. We could require participants to have really fast computers, but then the network would no longer be open. We could make everything more efficient, but that only gets you so far. Instead, the strategy here is to stop requiring every node to verify all the transactions and instead divide the work up among the nodes. This sounds easy, but dividing work in a trustless, decentralized way is challenging. Layer two is making the blockchain handle less work. Not every transaction needs to go to the blockchain. With some clever thinking, we can settle transactions off-chain. Payment channels are a nice example of this: I can keep a line of credit open with you where we do our payments, and only when we are done or something goes wrong do we escalate to layer one. In short, layer two is where the transactions will happen most of the time, and layer one is always there to guarantee that everything is done correctly. Layer one doesn’t get involved unless it has to. In many ways it acts as a court to resolve conflicts in layer two."
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500017.27/warc/CC-MAIN-20230202101933-20230202131933-00076.warc.gz
CC-MAIN-2023-06
1,883
10
https://www.vn.freelancer.com/projects/mobile-phone/partnership-project/
code
i want to build an application and website that will be a leap at marketing and advertising field. I want it to be as a partnership project for a reasonable share that you decide. I can send you the summary of the idea to study if you are willing to do it. PS:I have the paper designs ready to work immediately 19 freelancer đang chào giá trung bình $446 cho công việc này I am ready to make partnership with you. Let's have things discussed on chat and finalise role and responsibilities. Will also share my profile to make you understand in better way.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668787.19/warc/CC-MAIN-20191117041351-20191117065351-00448.warc.gz
CC-MAIN-2019-47
562
6
https://www.wxpr.org/news/2021-06-21/best-dramatic-actor-the-eastern-hognose-snake
code
Best Dramatic Actor: The Eastern Hognose Snake Here in Wisconsin, almost all our snakes are non-venomous, and rely on deceptive defense measures to scare off potential threats. The eastern hognose is one such snake and has slithered onto center stage in this week’s Wildlife Matters. Last month I came across an article about eastern hognose snakes that immediately captured my interest. Snakes tend to cause concern and fear in many people, and understandably so. Their appearance, movements, and behavior are entirely different from ours, and from many of the birds and mammals average people enjoy. Eastern hognose snakes will never win any popularity contests, or beauty contests, but they might win awards for best dramatic actor. Hognose snakes get their name from their upturned snouts, and like hogs, they use them to root around in soft soil in search of food, especially their favorite—toads. They are thick-bodied snakes that can reach lengths of two to four feet, depending on where you are in North America. They can get quite large in Georgia and Florida but are on the smaller end in the northern reaches of their range, up in southern Ontario Canada. In fact, the article I read was focused on a research project that studied these snakes in southern Ontario. There, they are protected as an endangered species whose numbers are dwindling for two main reasons: loss of quality habitat and Ophidiophobia, or fear of snakes. Hognose snakes are harmless to humans, what we refer to as non-venomous, even though that is only partially true. In fact, they do produce a weak venom that works well on toads but rarely producing more than a minor allergic reaction in humans. They have fangs in the back of their mouths that deflate a puffed-up toad to make it easier to swallow. They will also eat birds, small mammals, invertebrates like worms and bugs, as well as frogs and salamanders, but they heavily favor toads. If you have never seen a hognose snake, you may not be familiar with their acting skills. When they feel threatened, they puff up with air, then flatten their head and neck similar to how you might imagine a cobra might look with its hood spread. There are two dark spots on the back of this flat area, a deceptive coloration we call eye spots. The snake will hiss and lunge, pretending to strike in defense, but it won’t open its mouth. This is often enough to deter predators, but if the snake doesn’t think they are falling for it, it moves to the main act. It will start to act like it is dying from something painful, writhing and rolling on its back. They will regurgitate their food, defecate on themselves, and emit an unpleasant musky odor. Then they will lay their motionless until they think the danger has passed. You can find plenty of videos of this online on YouTube or Google, and it is worth watching if you haven’t seen it. The study I read about, in southern Ontario, wanted to understand more about the breeding needs of the population. They implanted radio transmitters in female snakes and followed them for three years outside of hibernation. They found that open sandy areas, in this case sand dunes, were critical for these snakes to nest. They would emerge in spring and breed, becoming sexually mature at two years old. They would all head to a suitable nesting location where they would deposit about 15-25 eggs in a depression in sandy soils under rocks or logs. Then the snakes would disperse, going separate ways until it was time to hibernate. The eggs incubate for about 1 to 2 months when the young emerge and are completely self-sufficient. While sandy soils are important, mature forests with areas of canopy cover and downed trees were desirable to provide cover from predators. If you think about where you find toads, a mixture of open sandy areas and older trees will often produce large numbers of them here in the Northwoods. Finally, and most interesting for me, the three-year tracking study showed that the snakes tended to avoid paved roads, rarely crossing them. I have noticed that fox snakes seem to like pavement, stretching out on the roads to warm up on cold mornings. This avoidance behavior might be one reason why, in my many years in Northern Wisconsin, I have only seen one car-killed hognose. As you might imagine, while a retching and writhing death scene may deter predators, it would not do well to prevent a vehicle strike.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583087.95/warc/CC-MAIN-20211015222918-20211016012918-00032.warc.gz
CC-MAIN-2021-43
4,423
7
http://s1.check4game.com/en/GLOSSARY_OF_COMPUTER_STUBS
code
Review of Short Phrases and Links| This Review contains major "Glossary of Computer Stubs"- related terms, short phrases and links grouped together in the form of Encyclopedia article. - Beam stack search is a search algorithm which integrates backtracking with beam search. - Algorithms are generated through large scale combinatorial search that employs sophisticated program transformations. - Algorithms are given to transform unstructured program schemas into equivalent structured forms. - Algorithms are not thought of as design patterns, since they solve computation al problems rather than design problems. - Algorithms are not thought of as design patterns, since they solve computational problems rather than design problems. - Algorithms are not thought of as design patterns, since they solve implementation problems rather than design ones. - The word "internet" literally means "network of networks". - While an internet is a network, the term "internet" is usually used to refer to a collection of networks interconnected with routers. - The Internet is the catch-all word used to describe the massive world-wide network of computers. - The Internet is an inescapable fact of life today. - The Internet is a prime driver for growth in this segment. - In both cases, software enforces the security policy, but the label parsing software can be written once if the syntax and semantics are loosely coupled. - You should know about the CIA Triad and how it is often used to plan and implement good security policy, and understand the principles behind it. - A TCB consists of one or more components that together enforce a unified security policy over a product or system. - PC manufacturers don't really care which components they use or OS they run, they just want to sell PCs. - When the OS and CPU is different between the Mac an PC there is (well, was) a big gap between systems to jump and a price differential can be justified. - With Apple's help it could also run what is arguably the best OS on the market today, at a low price point. - Application layer firewall is a firewall operating at the application layer of the networking communication. - An application layer firewall is a firewall software operating at the application layer of a protocol stack. - The virtual server ports and real server ports are bound to each other directly. - All traf---c destined for virtual server 192.168.1.100 is load balanced across the three real servers on port 8001. - The following example shows a virtual server backing up another virtual server. - Accidental complexity is a problem of complexity in computer programs or its development process ( computer programming), that can be avoided. - Accidental complexity is an avoidable problem of complexity in computer programs or their development process ( computer programming). - Accidental complexity is an example of an anti-pattern. - Accidental complexity is the result of poor attempts to solve the problem and may be equivalent to what some are calling complication. - Applied computing is a growing market segment, and the Internet is accelerating its growth. - Relational database model: Data represented as a set of related tables or relations. - The authors describe the development of a drug database model for computer-supported dose adjustment within a CPOE system. - The Biba model specifies rule-based controls for writing and deleting necessary to preserve data integrity. - Biba has defined a data integrity model which includes security labels. - The third step, data integrity, entails protecting e-mail from unauthorized modification. - An abstraction layer is a way of hiding the implementation details of a particular set of functionality. - An abstraction layer was built into Windows NT and its 2000 and XP offspring. - Part 1 of this book provides the intellectual framework for affective computing. - Natural language processing, spoken dialog systems, mixed-initiative interaction, virtual humans, conversational agents, affective computing. - Kadri, Faisal - Affective computing, computational models of human emotion. - MultiBatcher is a tool for automation and batch processing of repetitive tasks on the computer. - MultiBatcher 2.3.3 Free Download - MultiBatcher is a tool for automation and batch processing of computer tasks. - Bit slicing is a technique for constructing a processor from modules of smaller bit width. - Bit slicing is a technique for constructing a processor from modules, bit slice processors, each of which processes one bit field or "slice" of an operand. - AAFID was one of the earliest hierarchical distributed intrusion detection systems. - Abstraction inversion is an example of an anti-pattern. - An Access Method is a software component in a processor for controlling the flow of information through a network. - Acknowledge character (ACK): A transmission control character transmitted by the receiving station as an affirmative response to the sending station. - Note: An acknowledge character may also be used as an accuracy control character. - ACM Queue is a monthly magazine written by practitioners for practitioners. - Thus IP address pool management is done by the server and not by a human network administrator. - The aim is to register more users within the dynamic IP address pool than there are available IP addresses. - DHCP (Dynamic Host Configuration Protocol) assigns IP addresses dynamically from an IP address pool, which is managed by the network administrator. - FTMaster can generate Adobe Font Metrics file for any opened font. - Adobe Font Metrics (AFM): A text file that stores font metrics information such as character widths and kerning pairs. - AFM - Adobe Font Metrics File Format AFM is Adobe's ASCII-based file format used for storing font metric data as human-readable data. - AHB is a new type of Internet development tools. - The DesignWare AMBA 2.0 AHB protocol synthesizable IP is also available as RTL source code on a fee-per-project basis. - The DesignWare IP solutions for AMBA 2.0 AHB protocol are available today for no additional charge to DesignWare Library licensees. - Alacritech is a member of the 10 Gigabit Ethernet Alliance and the Storage Networking Association (SNIA) and a founding member of the SNIA IP Storage Forum. - Alacritech is a privately held company based in San Jose, California. - Alacritech was founded by Larry Boucher, creator of the SCSI interface, to deliver upon his vision of eliminating the server bottleneck. - Duane Allman Style by Michael Doke is a video lesson covering the distinctive slide guitar technique of Duane Allman. - Allman style — Named for Eric Allman, a Berkeley hacker who wrote a lot of the BSD utilities in it (it is sometimes called BSD style). - The Allman style is named after Eric Allman, but is sometimes referred to as "ANSI style". - ALTRAN was a FORTRAN extension providing rational algebra, developed by W.S. Brown, at Bell Labs around 1968. - Initial builds may detect this treat as W32.Alua@mm or W32.Aula@mm. - W32.Alua@mm (also known as W32.Beagle.B or W32.Bagle.B), is a mass-mailing worm that has begun spreading worldwide. - Aminet is the world's largest archive of Amiga -related software and files. - Aminet was originally hosted by several universities' FTP sites, and is now available on CD-ROM and on the web. - AMS-TeX is a TeX macro package, originally written by Michael Spivak for the American Mathematical Society (AMS) during 1983-1985. - AMS-TeX doesn't have any automatic numbering facilities. - We translate all AMS-TeX files to AMS-LaTeX, and any complicated author macros may have to be converted manually. - Angry Coffee made the front page of the Wall Street Journal . - You don’t need to download any software to use Angry Coffee, which is nice. - Musictarget.com list Angry Coffee's Percolator MP3 search engine right next to Napster. - However, complete time-based Web resources, such as Annodex Pfeiffer, et al. - Annodex also provides a field in its headers to store the UTC basetime, and CMML has a tag for it. - Pfeiffer said that the choice to use the Ogg codecs was based on the need for Annodex to be royalty-free and available to all users. - In development of anomaly-based Intrusion Detection System, improving detection accuracy is important. - The appliance features a protocol anomaly-based intrusion detection system built in to a secure Web mail application. - His father decided that Ansel’s formal education was best ended. - Seventeen issues with Ansel Adams plates or illustrated articles as follows: Vol. - Illustrated with two photographs by Ansel Adams, a portrait of Louis Nusbaumer, a photograph of his diary and a folded map. - Antec recommends choosing from our NeoHE, Phantom, or TruePower 2.0 power supplies. - The Antec P182 is certainly one of those rare review units I am really excited for. - If you already have an answer in your head, you probably guessed it -- the P182 'Performance One' series case from Antec. - APNG is a simpler alternative to MNG, providing a spec suitable for the most common usage of animated images on the Internet. - APNG is an extension of the [PNG][pngspec] format, adding support for animated images. - APNG is designed to allow incremental display of frames before the entire image has been read. - In step 2430, the APU begins to execute the apulet in response to the kick command issued at step 2428. - Other DMA commands may be issued by the PU in the execution of a particular ARPC depending upon the particular apulet. - In step 2414, the PU enables an interrupt request for the designated APU to signal completion of the apulet. - American Arium tools are used worldwide to debug software in embedded applications, BIOS, device drivers, and OS kernels. - American Arium products are used throughout the PC industry to debug BIOS, device drivers and OS kernels. - For more information, contact your American Arium representative. - You need a version of the ASPI manager for the 8 bit Atari. - ASPI is just like that. - Download and install aspi32.exe. - This is an ambitious vision, but with this first AstroGrid release it begins to look like a concrete reality". - If you make use of the AstroGrid system or tools, we would be grateful if you could acknowledge this use in any resulting publications. - GETTING STARTED Read a little about the Virtual Observatory Read a little about the AstroGrid Desktop suite. - The Starter Kit supports ATCA hardware and software testing and development and can be used as a system for proof of concept and customer demonstrations. - The ATCA Starter Kit is sold exclusively through Arrow; quantities on the starter kit are limited. - Carlo Gavazzi's chassis is a complete ATCA development system that is available with a six-slot, full-mesh backplane. - Autonegotiation is a function which provides the exchange of information between the local device and its link partner. - BEOL generally begins when the first layer of metal is deposited on the wafer. - Our customer looked to Mattson to provide further improvements in the areas of productivity, reliability and serviceability for their BEOL production. - The first commercial success for Berkeley Systems was a virtual desktop product for the Macintosh called Stepping Out. - Eastman was later put in charge of software development at Berkeley Systems. - In early 2000, Berkeley Systems was folded into the fledgling Los Angeles-based gambling site iWin.com, per the terms of that site's acquisition by Vivendi. - The Biba model was developed after the Bell-LaPadula model with a different interest in mind. - BIFS is a program to help growers enhance environmental quality while maintaining yields and profits. - BIFS is a acronym that can contains many meanings which are listed below. - Bit-oriented protocol is a communications protocol that sees the transmitted data as an opaque stream of bits with no semantics, or meaning. - Computers > Software > Typesetting > Tex. - Computers > Education > Commercial Services > Training Companies > Desktop. - Computers > Programming > Methodologies > Object-Oriented > Desc.html. - Computers > Security > Internet > Products And Tools > Security Scanners. - Computers > Algorithms > Compression. * Artistic License * Blind Write * Blocker Hill * Blocks World * Boolean Data * Boop Toolkit * Boot Device * Branded Email * Breakout Box * British Computer Society * Caching File System * Canopus Corporation * Canterbury Corpus * Caret Notation * Cdr Coding * Charge Qubit * Chartered It Professional * Cia Triad * Circular Dependency * Cisco Compatible Extensions * Classification Scheme * Code Momentum * Cognitive Revolution * Collaborative Editing * Combining Character * Comet Cursor * Common Access Card * Compose Key * Computer Expo * Concurrent Systems * Connectionless Protocol * Database Instance * Data Independence * Data Validation * Design Patterns * Development Speed * Diskless Nodes * Dos Wedge * Error Message * Hardware Abstraction Layer * Interrupt Request * Interval Tree * Intrusion Detection * Knowledge Engineering * Language Model * Look And Feel * On The Fly * Root Element * Serial Cable * Server Farm * Session Management * Sorting Network * Special Case * Static Library * Systems Management * System Call * System Folder * System Restore * Test Harness * Test Script * Test Suite * Transaction Time * User Interface Builder * User Space * Valid Time * Variable Bit Rate * Vector Quantization Books about "Glossary of Computer Stubs" in
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053759.24/warc/CC-MAIN-20210916204111-20210916234111-00623.warc.gz
CC-MAIN-2021-39
13,540
187
https://www.ruby-forum.com/t/problem-building-mysql-gem/77328
code
I’ve just switched to Fedora and am trying to do a “gem install mysql”. Right at the beginning, I’m getting the error find_library: checking for mysql_query() in -lmysqlclient… “gcc -o conftest -I. -I/usr/lib/ruby/1.8/i686-linux -I. -O2 conftest.c -L’/usr/local/lib’ -Wl,-R’/usr/local/lib’ -L’/usr/lib’ usr/lib’ -rdynamic -Wl,-export-dynamic -lruby-static -lmysqlclient crypt -lm -lc” conftest.c: In function ‘t’: conftest.c:3: error: ‘mysql_query’ undeclared (first use in this I’m sure this is something that I need to install in Fedora, but I’m not sure which package would have this. Can anyone offer any advice?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00709.warc.gz
CC-MAIN-2023-23
674
11
http://travel.stackexchange.com/questions/tagged/jfk+mexico
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Can I change planes at JFK without a visa? [duplicate] I'm traveling from Germany to Cancun, Mexico. I change planes at JFK from Air Berlin to American Airlines. I have a Mexican passport. I do not have a visa for travel to the USA. I do not have a credit ... Mar 20 '13 at 12:07 newest jfk mexico questions feed Hot Network Questions Why do we still do symbolic math? Linux send alert email if CPU usage continously higher than a certain amount Does spyware exist for ubuntu? What is the name of the piano piece Seven of Nine plays? How to take a cold shower Etiquette of business hospitality dinners Accuracy in translating voltages to currents for shunt resistors Why there does not exist any Gravitational Magnetic Field? Known characters in passwords? What is the experience cost of learning a ritual? Draw the Sawtooth Alphabet Why does sourness taste in curd increases with time? What happens during "big" inserts on a table with a clustered composite key? how to make blocks like "redstone" working in a minecraft-like game when the block is very far-away from your character 3D: Discrete Dogfighting Duel Is `-` used only with cd? Why aren't powered units surrounded by parentheses? Is this kids experiment a legitimate way to show that air has mass? How to append 'Continue reading…' link within the last paragraph of the Excerpt How many required fields are too many? CRS for submission to Minnesota DOT Figuring out how many megabytes go into gigabytes? Can someone please explain what "related lists" are? Connections between Standard, Hodge and Tate conjectures on algebraic cycles? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267865.20/warc/CC-MAIN-20140728011747-00366-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
2,236
52
https://www.softwareab.net/wordpress/
code
Welcome to softwareAB! IA / SysAdmin / NetAdmin - *power now* Welcome to the site...please look around the papers, the posts, and the links. Thanks for coming by! The logical layout of the enclave supports the resilience of the solution. Virtualized App (vApp) A "vApp" allows the designer to isolate and replicate parameterized environments quickly. Isolation and segmentation support the confidentiality, integrity, and availability of the enclave. Cloud Server Access Defense-in-depth is provided by segregating backend systems using a demilitarized zone. A storage hypervisor allows legacy storage systems to be aggregated into scalable and resilient storage network. Blade 10GbE SAN Blades offer challenges and opportunities for datacenter scaling and network throughput.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662538646.33/warc/CC-MAIN-20220521045616-20220521075616-00679.warc.gz
CC-MAIN-2022-21
776
12
http://superuser.com/questions/611879/why-is-preserving-the-pitch-in-audio-playback-allegedly-less-performant
code
In VLC for Android, i discovered an option to preserve the pitch during faster-than-normal playback: The "requires a fast device" obviously implies that faster playback is more performant when the pitch is changed too. Why is that so? What i've tried: Before posting this question i did some shallow research through Google. According to Wikipedia, there are several methods for faster playback of audio, the "simplest" one (Resampling) changes the pitch.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00138-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
455
3
http://www.mhonarc.org/archive/html/ietf-dkim/2009-02/msg00000.html
code
Olivier MJ Crepin-Leblond wrote: I too was confused by the use of the word "opaque". I think it is always reasonabel to ask about the use of a word one does not As John noted, it's a term that's common in computer science, referring to data that is not interpretable to readers who lack special knowledge of the data. Perhaps there should be a qualifier that says something like "opaque, like a one of the definitions of opaque is the one used in the RFC? Would the word "arbitrary" not be more suited for the meaning Arbitrary is more indicative of the decision to encode, rather than the NOTE WELL: This list operates according to
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164022934/warc/CC-MAIN-20131204133342-00080-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
632
10
http://support.b12.io/adding-and-editing-links/configuring-your-dns-settings-for-google-domains
code
Go to domains.google.com and log into your account. - Look for the domain name that you want to change the DNS settings for. - Click on DNS - You will see the custom resource records page For the A record, - Select the @ symbol, or A record. - Key in B12's IP address: 18.104.22.168 as the destination for the A record. - Save the A Record by clicking Add. For the CNAME, - Make sure there is a row for the 'www' CNAME record - Change your 'www' CNAME record to: dns.b12.io
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513548.72/warc/CC-MAIN-20181021010654-20181021032154-00260.warc.gz
CC-MAIN-2018-43
473
11
https://github.community/t5/Project-Development-Help-and/Comments-before-publishing-pull-request/m-p/20493
code
I wasn't sure where to post feature request so sorry if this is in the wrong place It would be helpful if we were able to submit comments in a PR before publishing so we can offer extra information in context. This would be useful for large PRs that require extra information in the right place. It would save time as it avoids someone starting back review before the author of the PR has put this information. Thanks for this feedback! We're always working to improve GitHub and the GitHub Community Forum, and we consider every suggestion we receive. I've logged your feature request in our internal feature request list. Though I can't guarantee anything or share a timeline for this, I can tell you that it's been shared with the appropriate teams for consideration. Please let me know if you have any other questions. Mark helpful posts with Accept as Solution to help other users locate important info. Don't forget to give Kudos for great content!
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314752.21/warc/CC-MAIN-20190819134354-20190819160354-00205.warc.gz
CC-MAIN-2019-35
954
6
https://purehost.bath.ac.uk/ws/portalfiles/portal/650950/paper.html
code
Brian Kelly, UKOLN, University of Bath, BATH, BA2 7AY This paper describes use of Dublin Core metadata on the Exploit Interactive web magazine to provide enhanced searching services. A lightweight approach has been used which makes use of commercially available software. This approach provides a demonstration of the benefits of use of Dublin Core and shows how commercially-available software can be used to enable the benefits to be easily deployed without needing significant software development expertise. The Dublin Core metadata initiative was set up to define the metadata needed to support resource discovery. The initiative reached agreement in defining a core set of resource discovery attributes . Despite the agreement we have not yet seen widespread deployment of services which make use of Dublin Core metadata. This is due to several reasons including lack of support for Dublin Core metadata by major search engine vendors, lack of support in popular HTML authoring tools and lack of support in many indexing packages. The Exploit Interactive web magazine is funded by the European Commission's Telematics for Libraries programme. Exploit Interactive is produced by UKOLN (the UK Office for Library and Information Networking), a small applied research and dissemination unit based at the University of Bath. One of UKOLN's main area of interest is in resource discovery metadata. UKOLN makes use of Exploit Interactive as a test bed for our research interests and to demonstrate innovative technologies. Due to the limited funding and technical support available it was decided that Exploit Interactive should make use of commercially available software. A Windows NT server running the Microsoft SiteServer software was chosen in order to broaden UKOLN's platform base, which previously had been limited to Unix. Exploit Interactive runs on Microsoft SiteServer software. Individual articles and navigational elements are stored as HTML fragments. Active Search Pages (ASP) are used to assemble the HTML fragments into a valid HTML document. Further details on the architectural model is available . Unlike article content and navigational elements the metadata is not stored as a HTML fragment. Metadata values (such as author and title) are stored as ASP (Active Server Pages) variables. An ASP script converts the variables into the appropriate HTML format. This decision was made in order to enable the metadata values to be reused (for example, the title information is used in the HTML <TITLE> element and the title and author details are used in the citation details which are displayed at the bottom of every article. Exploit Interactive provides a simple system for managing Dublin Core metadata. But in order to convince users of the importance of metadata and provide motivation for them to implement metadata on there own services it is necessary to provide a demonstration of the benefits. Although the Search component of the SiteServer software does not explicitly mention support for Dublin Core, it does allow arbitrary HTML <META> elements to be indexed. (Note that due to a bug in the Search software periods (.) are not allowed in <META> element names, so that the Dublin Core metadata will appear as <META NAME="DC_Creator" CONTENT="John Smith">. However it is possible to replace the underscores by periods in the search catalog schema definition). A simple search facility which provides a pull-down menu for searching the full text of articles or by title or author is available . Dublin Core metadata can be used to provide more advanced searching than the simple fielded searching. Exploit Interactive has developed a service based on Dublin Core which will enables users to search by issue, by article type, etc. In order to implement such services additional Dublin Core metadata attributes are needed. These are listed below. |Issue number (e.g. 1)||Searching in a particular issue (or range of issues)||<meta name="DC.Relation.IsPartOf" content="http://www.exploit-lib.org/issue4/">| |Type of article (Regular, Feature, News, etc.)||Searching for a particular article type(s) (e.g. Regular or Feature article, but not News)||<meta name="DC.Type" content="text.article.feature" scheme="Exploit-categories">>| |Funding body for article, such as "tfl" (Telematics For Libraries).||Searching for articles about projects funded by a particular funding body.||<meta name="DC.Subject" content="tfl" scheme="Exploit-article-funders">| An illustration of the enhanced search interface is shown below. Details of how SiteServer was configured in order to support use of DC metadata are available . This paper demonstrates how shrink-wrapped commercial software can be used to provide enhanced searching services based on Dublin core metadata. If similar approaches using other popular indexing tools are successful this will provide motivation for information providers to make use of Dublin Core metadata.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737225.57/warc/CC-MAIN-20200807202502-20200807232502-00307.warc.gz
CC-MAIN-2020-34
4,949
17
https://www.cnet.com/forums/discussions/where-did-my-network-go-128857/
code
If your shared folder that is on the desktop is a shortcut or mapped drive, delete the desktop folder. CAUTION: if the folder on your desktop is the actual folder that is being shared, deleting it will delete all the folder contents. If you are unsure, backup the folder contents to another folder. 1. Find the acutal shared folder (not a shortcut or mapped network drive) 2. Rt-click it and disable file sharing and click Apply. 3. Enable file sharing again on the same folder and click Apply. Id really appreciate some help with this, cos im stumped. I had 2 computers, one running XP pro, and the other Win2000. The 2000 machine connected to the internet through a wireless card and and a wireless router connected to the XP machine. It was also connected to the XP machine as part of a network. On the 2000 machine, there was a folder called ''shared'' that sat on the desktop. Users on both computers could put stuff in there, and take stuff out, BUT, anything the XP machine tried to share (mark as a shared folder and/or put into the shared documents folder) with the 2000, the 2000 was never allowed to access it ''access denied''. When it would let me ''access'' it, it asked for a name and password, but no matter what i entered it still wouldnt let me log in. Only a few days ago i upgraded the 2000 machine to XP, and now i cant even access the ''shared'' folder on the new XP machine. I've got no idea whats going, and I've tried everything I know, which doesnt amount to much, so any help in this matter would be VERY greatly appreciated! ps: I am also, since upgrading the 2000 to XP, getting an ''error 777, problem ceonnecting to signup'' message all throughout the day. What's that all about?
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607849.21/warc/CC-MAIN-20170524173007-20170524193007-00631.warc.gz
CC-MAIN-2017-22
1,710
10
https://tv.ssw.com/machine-learning-with-f-sharp-tech-tips-ndc-sydney-2019/
code
As much as everyone loves having real-time applications, it is a pain to have them in high traffic websites. Scaling is a big issue which can be easily solved by using Azure’s SignalR Service. How can we add real-time functionality to cloud hosted web applications? How can we test and handle high traffic volume without disrupting real-time capabilities? What new and interesting problems can we solve with a bi-directional-web feature-set? Our speakers will explain, demonstrate and guide the audience through current ASP.NET Core SignalR technology and the possibilities that real-time features can give to modern web applications. They will also show how to use Serverless technology in the Azure cloud with Azure App Services, Azure Storage and Azure Functions to use SignalR APIs to build your Real-time web application. About the speakers JK & Mathias Brandewinder With 10 years of experience in software engineering across multiple industries like Museums, Government, Banks, gaming, entertainment, Jernej has worked on full stack development of native applications from mobile to desktop applications. In addition to being an expert in ASP, .NET Core, Angular, and Azure DevOps, Jernej is also proficient on Windows platform development from legacy applications (using C#, WinForms, WPF, …) changing them into modern applications (using Windows Store, Windows Universal applications, and Xamarin). Lately, he's sharpening his skills with Cognitive Services as well as Machine Learning. Orignally from the world of economics and operations research, Mathias has been writing code professionally for the past 10, working mostly in C# until he discovered F# and fell in love with it. His interests include applied math, machine learning and decision theory. Mathias is a Microsoft .NET / F# MVP, a board member of the F# Software Foundation and the author of “Machine Learning Projects for .NET Developers”. Welcome to SSW Hangzhou! Our SSW China Marketing Manager Yang Shen gives us a walk-through showcasing the latest features and renovations made to our China office. Do you know the value of Event Storming? Often when building systems it isn’t super clear what all the nuts and bolts should be. There might be several major stakeholders or domain experts each with slightly different ideas understanding that causes contention in how the system functions. “When you have a hammer, everything looks like a nail.” This saying is often used for developers who want to use their favourite technology to solve every coding issue, even when it’s not the best fit. But this saying is actually relevant to us all. No matter how hard we try, Azure Resource Manager (ARM) JSON templates aren’t easy or fun to maintain for enterprise platforms and applications. Now we can flex our Infrastructure as Code (IaC) muscles using a new tool called Azure Bicep. Visual Studio releases a new tool to migrate from ASP.NET to ASP.NET Core, GitHub Pages made easier with new deeply with GitHub actions and you too can win big with this year’s MAUI Beautiful UI Challenge. A product backlog is a great way to see the fairly small broken up PBIs (Product Backlog Items) that make up your team’s “to do” list, but it can be a bit too zoomed in and makes it easy to stray from the product goals. If you’re building installable binary apps (as opposed to web apps), it makes sense to use a cross-platform framework so that you don’t need to maintain multiple code bases. Build Multi-Platform Applications for Mobile, Desktop and Web in .NET with the Uno Platform with Nick Randolph The ability to deploy the same UI codebase across all platforms is a great productivity booster. But the application lifecycle starts much earlier – at design time. Uno Platform provides a Figma plugin, which eliminates the timely designer-developer handoff. In addition, the platform now provides a set of non-UI extensions to help jump-start your apps. Lastly, the VS Code extensions allows C# and XAML to use VS Code with IntelliSense-like experience, C# and XAML Hot Reload, and more. Lars Klint joins us at NDC Melbourne to show us a really cool tip with Azure Serverless that might save you some money. When you’re working, you will encounter issues that block you from progressing, and force you to do some googling, and investigation on how to move forward. These moments can be stressful, especially for junior developers and the question arises, “When should I ask for help?”
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00327.warc.gz
CC-MAIN-2022-40
4,491
23
https://openvpn-for-android.fileplanet.com/apk
code
OpenVPN for Android Free, open-source OpenVPN service for Android devices - 0.6.64 Bug fixes and removal of deprecated no-iv option - Seperation of UI and OpenVPN thread, should increase stability but will probably introduce bugs first - Launcher Shortcuts (Android 7.1+) - Ipv6 dns server support - Switched from gcc to clang to build openvpn, openssl,... - tls-crypt support - OpenVPN 2.4 and later drops tls-remote option (deprecated for over 3 years now) Potentially dangerous permissions - READ_EXTERNAL_STORAGE: Allows an application to read from external storage. - ACCESS_NETWORK_STATE: Allows applications to access information about networks. - INTERNET: Allows applications to open network sockets. - RECEIVE_BOOT_COMPLETED: Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting. If you don't request this permission, you will not receive the broadcast at that time. Though holding this permission does not have any security implications, it can have a negative impact on the user experience by increasing the amount of time it takes the system to start and allowing applications to have themselves running without the user being aware of them. As such, you must explicitly declare your use of this facility to make that visible to the user.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670036.23/warc/CC-MAIN-20191119070311-20191119094311-00170.warc.gz
CC-MAIN-2019-47
1,309
14
https://macmost.com/forum/how-to-easily-email-mac-photos-images-that-are-compatible-with-android-jpg.html
code
Mac with 10.15.7. When trying to send photos via the yahoo.com web interface via the ‘attach’ commend, the pix is sent as an .heic. Unfortunately some recipients use other operating systems that can not view .heic images. When trying to send the same file using Mac Mail (the application), IF the image is sent in “original size” it DOES automatically convert it to .jpg. However, if I set the image size to a more reasonable size in the pulldown menu (say, large), it does NOT convert to .jpg but again sends the .heic file. I do know ways to convert manually, but my partner isn’t into the bits and bytes and just wants emailed images to be viewable by her android and other friends. What am I missing here, to return her to the golden days of yesteryear when everyone could view emailed photos?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00802.warc.gz
CC-MAIN-2023-50
807
5
https://guelfucci.art/guelfucci-gallery/cabinet_jmfrank/
code
Rectangular cabinet in sycamore with four pyramidal feet with castors. It opens with two doors, which have each a small vertical handle also in sycamore. The inside has two shelves. Comes with a certificate by the Comité Jean-Michel Frank. ‘Jean-Michel Frank’, Pierre Emmanuel Martin Vivier, Editions Norma, p. 270 for a similar model in galuchat. ‘Jean-Michel Frank’ Leopold Diego Sanchez, p. 222 for a similar model in oak.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510924.74/warc/CC-MAIN-20231001173415-20231001203415-00617.warc.gz
CC-MAIN-2023-40
434
4
https://forums.gamesalad.com/discussion/76580/make-a-game-a-exe-file
code
Make a Game a .EXE File. I am making a game, and would like to make it a .exe file on the free version of gamesalad. When I publish the game, it says... In order to download the executable file for your game, you will need to complete the form shown here. Now, if this means making it a .exe game, what form is it talking about? And, if you can't make it a .exe file, do you mind adding it to the free version? Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413624.48/warc/CC-MAIN-20200531182830-20200531212830-00042.warc.gz
CC-MAIN-2020-24
418
4
https://www.ytunblocker.com/api/pages/install.html
code
Thank you for using YT Unblocker Plus. This add-on is free! But in order to finance the development, we depend on donations: Or as an alternative: Use this additional add-on and support us: Why do you see this page? To support the development of this add-on, advertising is displayed. This hint appears only once.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989018.90/warc/CC-MAIN-20210509213453-20210510003453-00347.warc.gz
CC-MAIN-2021-21
313
6
https://discourse.mcneel.com/t/replacing-missing-block-instances-issue/87749
code
When I open a file with multiple block instances that are missing, I am prompted to replace the first missing instance with a choice to apply to all. This menu shows the path and name of the file that needs to be replaced. When I click browse, there is no indication in the browser of the name of the original file I should be looking for. This means that when I click apply to all, the next prompt comes up with no indication of which block I am replacing, and so on. I have replaced missing files in other programs like Illustrator. These bring up a browser and the original file name that is missing is shown at the top of the browser window. I am currently trying to replace many blocks in a file after moving and renaming them. The best workaround is to not hit apply to all, and wait for each prompt to come up individually.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347439928.61/warc/CC-MAIN-20200604094848-20200604124848-00335.warc.gz
CC-MAIN-2020-24
830
3
https://ar.player.fm/series/coldcasedetective/the-last-walk-the-unsolved-disappearance-of-bung-siriboon
code
Manage episode 277675075 series 2702160 Siriyakorn Siriboon, an enthusiastic young soul, known to her family and various schoolmates as Bung, was an adventurous and outgoing student of Boronia Heights College. Her passion for education and dedication to music and dance were cut short by an unexplained, unsolved disappearance in June of 2011, leaving all who knew her across the suburbs of Melbourne, Victoria and the entirety of Australia grasping for answers in a sea of evidence that drowned us all in doubt… As a hope to provide more substantial reasoning built upon observable evidence and situational analysis, this is an examination of Bung Siriboon’s vanishing in the Boronia neighborhood and the ensuing trail of mysteries... This is Cold Case Detective. Researched and written by TJ Ruesch Episode narrated by William Earl Music by CO.AG Our episodes deal with serious and often distressing incidents. Listener discretion is advised. Submit a Cold Case - https://forms.gle/usZ7B2vJeWwDjzJ19 Visit our YouTube channel for more Cold Case content - https://www.youtube.com/channel/UCdjslyNQupPSFxK_mSPcG-g
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711218.21/warc/CC-MAIN-20221207185519-20221207215519-00187.warc.gz
CC-MAIN-2022-49
1,117
9
https://carlpaton.github.io/2019/12/sql-stored-proc-with-cursor-loop/index.html
code
cursor will iterate and return its position each time, only once it returns 0 is it complete. Looping like this was useful if the resulting insert needed to trigger another proc. READ_ONLY Prevents updates made through this cursor. FORWARD_ONLY Specifies that the cursor can only move forward and be scrolled from the first to the last row. FETCH NEXT is the only supported fetch option. LOCAL Specifies that the scope of the cursor is local to the batch, stored procedure, or trigger in which the cursor was created. STATIC Specifies that the cursor always displays the result set as it was when the cursor was first opened, and makes a temporary copy of the data to be used by the cursor CREATE OR ALTER PROCEDURE [dbo].[prc_run_some_crap] EXEC dbo.[prc_run_some_crap] @id = 123, @second_param_id = 456;
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817014.15/warc/CC-MAIN-20240415174104-20240415204104-00523.warc.gz
CC-MAIN-2024-18
805
7
https://open.harmony.one/messa
code
In the pioneers’ defense: Bitcoin and Ethereum seem to be on long-term stable ground. DeFi will take major strides forward next year. Privacy tech will be promoted as an integral part of the future of public blockchains (or get de facto banned on dystopian and vague “national security” grounds). Infrastructure investments around code security, decentralized hardware, virtual worlds, custody, protocol governance, and block- chain scalability are all in vogue. ONE on Messari's 2022 Theses Messari's Crypto Theses report is a must read for everyone. The extracted passages below show how Harmony's strategies align with the market potential and the industry leaders - in particular, Web3 Economy (NFT, DAO, Wallets) and Infrastructures (Bridges, ZKProofs, Privacy). – Overview: 🕑Web3 Vision, 📈Messari’s Report, 🕸️2022 Theses, ⁉️Technical Features, 💪Strategy & Roadmap – Grants: 🚀Apply Now, 🧑🚀$75/hour Income, 💎$13M NFTs, 💰$20M Wallets & Security, 🔥$300M Fund – Stories: 🎥 Campaigns, 🌟Stars, 📘Book, 🌱Team Bio, 🎶Who Build, 😎Merchandise, 🏆Quests, 🐣Users, 👨👩👧👦Culture – Events: LA, Rio, 🎮GDC, ⛷️Denver, 🏮PA, 1️⃣SF, 🏖️Miami, ❤️🔥NY, 🎉Offsite, 🎽TGI, 📅Calendar – Ecosystem: 🚀Metric Dashboard, 🤝Open Partners, 🤯Funding Reports, 🎆Showcases, 🗞Newsletters – DAOs: 🧑🚀Research, 0️⃣Zero-Knowledge, 🦋Blu3, ⏳Timeless, 🧛Liquidity, 🌳Africa, 👛MultiSig Safes – Keynotes: ▶️Metaverse, 💯Web3, 📸Highlights, 🌏DAOs, 🌉Bridges, 🏗️Hackathons, 🎓ZKU Course – Technical: 🛠️Protocol & Staking, 🌁Trustless Bridges, 🎹Network, ⏰Feature Launches, 🪴Basic Income – Videos: 🇧🇷Impacts, 🐛Morphisis, 🦧Blue Apes, 🎊SF, ❤️Love Letter, 🦋Create Wealth, 👩🚀ONE’s Future, 🌃NYC, 🎇Showcase – More: 💙Founder Interviews, 🎉Pinned Tweets, 🌊Your Career, 6️⃣Deliverables, 📓ZKU, 🔍Search Here
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500983.76/warc/CC-MAIN-20230208222635-20230209012635-00644.warc.gz
CC-MAIN-2023-06
2,002
4
http://nomos-software.com/blog/apis-xml-mongodb
code
APIs, XML & MongoDb September 3rd, 2014 MongoDb is an open source document database. There are plenty of MongoDb use cases: from Big Data to Mobile Apps. What if you want to do API Data Analytics, and persist information about API calls in MongoDb? REST APIs and MongoDb MongoDb is being used by innovators in the API world (Open Bank Project, Nexmo, …). REST APIs mostly use JSON, and MongoDb works great with JSON. You can do things like store tweets from twitters streaming API, or log all payments API calls made from your webstore. But there are a lot of XML-based SOAP APIs out there. Some companies, like PayPal, support REST and SOAP. Some companies, like TripAdvisor, only support SOAP. And some companies, like Nexmo (SMS/texting API), support both JSON and XML in the returns from their REST APIs. Ideally you will want to insert the XML as BSON (Binary JSON) collections into MongoDb. Inserting XML to MongoDb as BSON is not as straightforward as inserting JSON – at least if you want to maintain the fidelity of the XML type information. The type information will likely be useful for the data analytics stage. RuleX Flavor for MongoDb Nomos provides a flavor of its RuleX product that makes it easy to insert XML data into MongoDb collections, while preserving type information. Read about it here. Comments are closed.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105334.20/warc/CC-MAIN-20170819085604-20170819105604-00126.warc.gz
CC-MAIN-2017-34
1,337
12
https://www.ruby-forum.com/t/ann-mongrel-0-3-13-1-quick-small-fixes/64003
code
This is a small release that fixes a little bug, some of the documentation, and adds the new RedirectHandler code and a @redirect@ call for the mongrel.conf files. It’s fresh so don’t rely on it. Everyone should upgrade with the usual gem update command (which tells you it’s “Upgrading…”) and tell me how it works. This release fixes: - The -C configure file option was busted because of an errant line - Adds RedirectHandler thanks to Jonas P. and a new redirect call - Fixes mongrel_servic documentation which was referring to -r instead of -c and -C instead of -u. Redirects are pretty simple. You simply have either a new RedirectHandler class you can use or you can put this in a mongrel.conf and pass that to -S: redirect “/from”, “/to” It also accepts regex for the @from@ parameter and can take a block. Play with it if you’re interested. DEFLATE AND SAFARI It looks like Safari does not honor the @Content-Encoding: [email protected] response, so avoid using DeflateFilter until I can find out why. This is why you don’t hand code network protocol parsers. RAILSCONF (-1 DAY) I’m actually an idiot and scheduled my RailsConf trip a day early. I’ve gotta work that day so I’m going to be at the Radisson near the conference hotel if people want to meet me. Here’s my face: Anyone interested in having a Mongrel get together either tomorrow or during the conference should put their picture in the facebook, tag it with mongrel, and I’ll work out something based on interest. Mike C. is interested in doing a BOF too. Should be fun. Zed A. Shaw
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107863364.0/warc/CC-MAIN-20201019145901-20201019175901-00576.warc.gz
CC-MAIN-2020-45
1,586
30
https://www.techjobspost.com/job/17436/r-d-sw-engineer-atlanta-ga-us
code
Keysight Technologies ( www.keysight.com ) has been unlocking electronic design & measurement insights for 80+ years. No other company offers our depth and breadth of design & measurement tools and expertise. Our singular focus helps scientists and engineers address their toughest challenges with precision and confidence. With our help, they are better able to deliver the breakthroughs that make a measurable difference in the world. Keysight EEsof is a market leader and technology innovator in the EDA (Electronic Design Automation) industry. Our ESL (Electronic System Level) design platform is a dedicated electronic design automation (EDA) environment for system architects and algorithm developers to innovate the physical layer (PHY) of wireless and aerospace/defense communications systems and provides unique value to RF, DSP, and ASIC implementers. You will be working on the Industry-leading ESL Platform - Pathwave RF System Design (SystemVue) development project. You will be responsible for software architecture and implementation for our state of the art RF system modeling platform and supporting customer requests from all over the world. You will work directly with high-powered Agile software development teams that utilize modern software engineering techniques. You will be working with teams located in other geographic locations and follow the organization's processes when performing the development. BS/MS degree in CS or EE Must have 5+ years of solid experience in software engineering Must be a proficient programmer with experience in architecting and implementing high quality, complicated software ( C/C++ is required, C# is desirable) Knowledge of design patterns and OOP is required A result-driven self-motivator, able to follow the Agile software development process RF/uW background, or with RF component, RF System design experience is preferred Knowledge or experience of software EDA, RF Circuit Design, and Simulation technology will be a big plus Good communication skills, can work well with a global R&D team based in the US and Asia Careers Privacy Statement ***Keysight is an Equal Opportunity Employer.*** Keysight Technologies Inc. is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability or any other protected categories under all applicable laws. Candidates can be considered to work from the following locations: Americas : United States : Georgia : Atlanta Job ID : 37776
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738603.37/warc/CC-MAIN-20200810012015-20200810042015-00005.warc.gz
CC-MAIN-2020-34
2,604
17
http://expectedly.org/inclusivetech/be-mindful-of-regional-date-and-time-formatting/
code
This entry is related to ‘Use flexible date and time formats‘. Every region and language has its own standard for formatting dates and times. If you get it wrong, or assume that only one format exists within a language, then you may end up annoying – or worse, confusing – your users. What not to do: Behance, an online portfolio site run by Adobe, seems to have its date format hard-coded to the US ‘Month Day Year’ format regardless of what your language is set to. As you can see here, my user interface is temporarily set to French. The date says ‘Membre depuis le mai 11, 2013′ (member since 11 May 2013). This is wrong for French; it should be ’11 mai 2013’. If you’re going to have non-English text on your site, do not hard-code the month/day/year format. In most languages, the month does not precede the day; they use a logical format from smallest to largest (day/month/year) or largest to smallest (year/month/day). This is from Adobe, not a tiny company run by two people with a lot of work and very little time. We’re talking about a multi-million-dollar company with enough time and resources to get this right. Actually, even if your site is only in English, you should still be careful about date formatting, since the English-speaking world doesn’t use one date format. Britain, Australia, New Zealand, India, South Africa and most other English-speaking countries use the day-month-year format; the US, some of English-speaking Canada, the Philippines and Belize use month-day-year. Even if your site is going to be used only in the US, there may be the likelihood that your site will be written in Spanish, or in some regions, Chinese, Haitian Creole, Brazilian Portuguese, Japanese, Arabic or another language spoken by a large immigrant population. The same rules still apply: make sure your date-formatting system can accommodate these languages. Just don’t hard-code month/day/year. It’s culturally insensitive. If you’re going to hard-code any date format, hard-code year/month/day.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00235.warc.gz
CC-MAIN-2023-23
2,039
6
http://blog.cgcircuit.com/2015/04/cgcircuit-interview-naughty-dog-character-td-hans-godard/
code
CGCircuit is proud to present the latest in our on-going series profiling some of the leading technical and creative talent in the entertainment industry. Today, we bring you an interview with one of the more exciting Character Technical Directors out there, Hans Godard, whose work can be seen in game developer Naughty Dog’s latest efforts, including the upcoming Uncharted 4. Our brief interview with Hans regarding his latest plug-in release, RBF Solver, just scratches the surface of his fascinating array of tools and techniques, but we hope it gives you a taste of how Hans is helping to move the job of Character TD forward with his ingenuity and imagination. Thank you for taking the time to chat with us, Hans. Could you briefly describe your current job and how you got there? I’m a Character TD at Naughty Dog, a video game company that recently produced The Last Of Us. We are currently working on Uncharted 4. I started to work as a freelancer in France in advertising. I also worked on a cartoon series and in feature films and, ultimately, Quantic Dream was my first video game company. As a Rigger I decided to continue in that direction because there are lots of interesting aspects in this industry. What is exactly the RBF Solver? The Radial Basis Function Solver is a way to interpolate an input in a system defined by Poses. Each pose describes a N-dimensional Key and an M-dimensional Value. It simply means, Keys can be anything, and Values can be anything. How does it differ from PoseSpace Deformers? As you said, PoseSpace Deformers are deformers. Typically the PoseSpace tools are made to sculpt and generate the corrective shapes, and use a deformer to drive these shapes. Then because of the Deformer they are pretty frame-rate killing and heavy in production pipelines. I am focused on the way to drive these shapes only, the interpolator itself. What can you do with the RBF Solver? So the RBF Solver allows you to drive Corrective Shapes, but not only that. You can drive Corrective Joints, useful in video games, you can drive lights or particle effects, because it is generalized! Again, Keys are N-dimensional and Values are M-dimensional. So this technology is very flexible and makes companies totally free to build their own “Corrective pipeline” from scratch, without any dependency to other plug-ins or software. Who would use this plug-in? Mainly Character TDs, Technical Animators, Riggers or Programmers. Anybody dealing with Maya script or Maya Graph can use it. How have sales been? Who’s buying it? For the moment a bunch of Freelancers bought the plug-in, but also companies such as ILM, LightChaser, Glasswork Animation, Luma Pictures, as well as some Universities and Schools. All of them got a good deal. Where can we get it? The Plugin is downloadable through Autodesk’s app store. Is there anything else you’d like to tell us about the RBF Solver? Another important piece of technical information is that the plug-in was created in Python. I made this choice because I think it is easier for a Freelancer to move from one company to another using the Python plug-in. And companies still have the choice to use it directly or to implement a custom C++ version. Anyway everybody often prefers to own the source code. In the end, a good question is probably : Is it possible to make it for less than $199 ?
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886126027.91/warc/CC-MAIN-20170824024147-20170824044147-00344.warc.gz
CC-MAIN-2017-34
3,370
32
https://www.experts-exchange.com/questions/26625877/Backup-Exec-12-5-restore-of-mailbox-fails-with-unable-to-attach-to-a-resource.html
code
I am attempting to restore a users Exchange 2003 inbox using Symantec Backup Exec 12.5. The backup was made to an RD1000 cartridge and was verified good. When I start the restore job, I immediately get the following error: The job failed with the following error: Unable to attach to a resource. Make sure that all selected resources exist and are online, and then try again. For additional information regarding this error refer to link V-79-57344-33932 I have the correct cartridge for the RD1000 in the drive. The remote Agent is running on the Exchange server, so I am not sure what resource it is referring to. No other details are provided. Any help on this issue would be appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814140.9/warc/CC-MAIN-20180222160706-20180222180706-00135.warc.gz
CC-MAIN-2018-09
691
5
https://forums.adobe.com/thread/904051
code
I am an old PageMaker user. For InDesign CS2 I need to limit the selections in a selection box to only those items that aretotally containef in the selection box. InDesign seems to select any items that have any portion of the item in the box. This has been a real hurt to me. To clarify - when I say selection box, I mean a box that is by clicking on the left mouse button, holding it down, and making a dashed outline selection box. I hope I am clear. You'll have to get used to it. It's not something you can change (and I think once you do get used to it you'll find it to be a superior method as it allows you to easily select multiple objects even when you cannot see all the edges). Some things that may help you. Hold down Shift and click to add or remove a single object (or hold down Shift and click-drag a marquee to add or remove multiple objects), Hold down Cmd (Mac) or Ctrl (Windows) and click repeatedly to drill down through stacked objects to select on in the back of the stack. Sorry, but that’s not possible. I didn’t like it at first either, but now I find it very intuitive and when I have to work in something like CorelDRAW, I find myself banging my head against the wall. BTW, CS2 is very very old software. You might want to consider an upgrade to CS5.5 since CS2 is the earliest possible version eligible.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812259.30/warc/CC-MAIN-20180218212626-20180218232626-00603.warc.gz
CC-MAIN-2018-09
1,336
7
https://help.britecore.com/hc/en-us/articles/8724220674579-SmartyStreets-is-upgrading-to-AutoComplete-Pro
code
Release Date: December 31, 2021 SmartyStreets is deprecating their US Autocomplete Basic API product on 12/31/2021. We updated our current Smarty Street AutoComplete integration to include AutoComplete Pro. As a shared BriteCore and SmartyStreet client, you will need to add AutoComplete Pro to your existing SmartyStreets Account. For information on SmartyStreets, refer to our SmartStreets documentation. What's new and changing? The US Autocomplete Basic API relies on the user to know their primary number, the returned suggestions don't necessarily represent valid addresses. These suggestions contain the house number provided as well as a valid Street+City+State. Submitting those values to the US Street API will provide the fully validated address if one exists. The improved Autocomplete Pro includes the following features: - Suggests apartment and suite numbers - Includes USPS mailing addresses and 15+ million non-postal addresses - User can omit directionals and street suffixes, or even type the wrong ones - Returns verified addresses after one keystroke - Filter by ZIP code, city, or state - Works with official and alternate city name How does this impact users? Please reach out to SmartyStreets for pricing and contracting information. There should be no change to your BriteCore vendor configuration unless your actual credentials were updated (username and password).
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949009.11/warc/CC-MAIN-20230329151629-20230329181629-00523.warc.gz
CC-MAIN-2023-14
1,391
14
https://github.com/docker/labs/blob/master/windows/windows-containers/Setup-Server2016.md
code
Setup - Windows Server 2016 This chapter explores setting up a Windows environment to properly use Windows containers on Windows Server 2016, on bare metal or in VM. Windows Server 2016 on bare metal or in VM Windows Server 2016 is where Docker Windows containers should be deployed for production. For developers planning to do lots of Docker Windows container development, it may also be worth setting up a Windows Server 2016 dev system (in a VM, for example), at least until Windows 10 and Docker for Windows support for Windows containers matures. Running a VM with Windows Server 2016 is also a great way to do Docker Windows container development on macOS and older Windows versions. Once Windows Server 2016 is running, log in, run Windows Update (use sconfig on Windows Server Core) to ensure all the latest updates are installed and install the Windows-native Docker Engine (that is, don't use "Docker for Windows"). There are two options: Install using a Powershell Package (recommended) or with DSC. PowerShell Package Provider (recommended) Microsoft maintains a PowerShell package provider that lets easily install Docker on Windows Server 2016. Run the following in an Administrative PowerShell prompt: Install-Module -Name DockerMsftProvider -Force Install-Package -Name docker -ProviderName DockerMsftProvider -Force Restart-Computer -Force PowerShell Desired State Configuration If interested in experimenting with Windows PowerShell Desired State Configuration, Daniel Scott-Raynsford has built a prototype script that uses DSC to install Docker Engine. Here's how to use it: Install-Script -Name Install-DockerOnWS2016UsingDSC Install-DockerOnWS2016UsingDSC.ps1 See Daniel's blog post for details on installing Docker with DCS. Whether using the PowerShell Package Provider or DSC, Docker Engine is now running as a Windows service, listening on the default Docker named pipe. For development VMs running (for example) in a Hyper-V VM on Windows 10, it might be advantageous to make the Docker Engine running in the Windows Server 2016 VM available to the Windows 10 host: # Open firewall port 2375 netsh advfirewall firewall add rule name="docker engine" dir=in action=allow protocol=TCP localport=2375 # Configure Docker daemon to listen on both pipe and TCP (replaces docker --register-service invocation above) Stop-Service docker dockerd --unregister-service dockerd -H npipe:// -H 0.0.0.0:2375 --register-service Start-Service docker The Windows Server 2016 Docker engine can now be used from the VM host by setting $env:DOCKER_HOST = "<ip-address-of-vm>:2375" Continue to Step 2: Getting Started with Windows Containers
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218189.86/warc/CC-MAIN-20180821132121-20180821152121-00102.warc.gz
CC-MAIN-2018-34
2,646
21
https://blogs.zeiss.com/digital-innovation/en/topic/web-uis-with-blazor/
code
Web UIs with Blazor The bUnit library can be used to create unit tests for Blazor web front-ends. This allows you to create many tests that can be run quickly. Examples are used to present the first steps and the most important features of bUnit. Blazor is a Microsoft framework for creating interactive web frontends with C#. Three deployment models are available for Blazor apps. The different architectures have a strong effect on the applications. This is explored by examples in industry.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102697.89/warc/CC-MAIN-20231210221943-20231211011943-00713.warc.gz
CC-MAIN-2023-50
493
3
https://www.e-zest.com/transform-products-and-services-with-microsoft-technology
code
Today’s technology, businesses and everything in between are primarily data-driven. The Azure cloud platform helps in transforming the way you use data to run your business and foster innovation. Azure machine learning predictive analytics empower your teams to make insight-based decisions. This helps them anticipate market needs, create new offerings, and engineer new products and services that differentiate your business in the marketplace. e-Zest adds value in the following ways, to your business with the help of its Microsoft technology expertise: - Use of new technologies of IoT, Machine learning, modern web and device experiences for changing the way the products and services were built and delivered - Growth of emerging markets, global expansion possibilities, new revenue channels, delivering better experience, user adoption, decrease costs - Consume and pay rather than investing and figuring out how to make investment work - Transform business practices - Bring optimal outcomes in your business processes with Office 365 and Dynamic 365 - Safeguard your business - Protect your business using advanced protection against modern threats using Microsoft's secure process - Reinvent products and services - Anticipate customer needs and make insight-based decisions that deliver new market offerings The transform products and services in our digital transformation framework focus on how to create new opportunities using Microsoft’s intelligent technology to innovate products and processes. If you wish to benefit from digital transformation for product and services transformation with Microsoft technology stack, please write to us at firstname.lastname@example.org. You can also tweet us at @ezest. Our Success Story:
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482186.20/warc/CC-MAIN-20190217152248-20190217174248-00544.warc.gz
CC-MAIN-2019-09
1,747
11
http://www.webassist.com/forums/posts.php?id=23541
code
Error displayed if image file extension in uppercase I have just uploaded updates to a site from my local server to a development server and I got a lot of warning messages like: Warning: imagejpeg() [function.imagejpeg]: Unable to open '/<snip> Permission denied in ../CacheResize_Image.php on line 212 Some of the thumbnails generated by Image Resized were fine, but the others had the error message. I traced it to the fact that the images that were not displaying had an uppercase file extension (.JPG not .jpg). I changed the file extension of the ORIGINAL file that I had uploaded (not the one in the image_cache folder) AND changed the file extension in the database record and refreshed the page. Now they work. As I am using File Manager to upload the image that Image Resizer then uses to create the thumbnails, I would like to know if it's possible to force the uploaded file to have a lowercase extension. I have posted a question to the HTML Editor forum.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308149.76/warc/CC-MAIN-20191215122056-20191215150056-00071.warc.gz
CC-MAIN-2019-51
968
7
http://sarmatianinthesca.blogspot.com/2011/05/who-am-i-mundane-and-more-about-this.html
code
I'm originally from North Carolina and moved to Iowa for grad school. This past year was the first one in the Ph.D. program there. I'm a vertebrate paleontology student. I'm currently working on SCA stuff and wedding planning in between writing up some of my research, so updates will be sparse. So now that you know where I'm coming from, you can guess why, as I mentioned in my first post, I will be including references in my posts about Sarmatians. As a scientist, I reference any facts and supposition I state that were not my own discovery. It's an incredibly useful way to write and I get frustrated when I look things up on the internet and am expected to take things as true when I have no idea who wrote it, where they got their information, and how reliable they are. That's why I'm making this blog. I want others interested in this culture to be able to feel at least semi-confident that they can trust what they read here. In science, there's a system of peer review. The system has its own flaws, but it also has the advantage that only occasionally do crackpot ideas get through to publication. Blogs aren't peer reviewed, so this is where you come in. If you come upon something related to Sarmatians which I haven't discussed, a book or article not on my book list, have a different interpretation, or disagree with something I said, please discuss it in the comments or contact me in some other manner (especially if you actually study this subject as a career!).
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120206.98/warc/CC-MAIN-20170423031200-00403-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,482
3
http://www.fountainpennetwork.com/forum/topic/257779-bonhams-fine-writing-instruments-auction-dec-2013/
code
The Bonhams Fine Writing Instruments auction is/was today (still ongoing as of this writing). Several montblancs across many price points, but nothing rarer than a handful of 888 editions. Some good prices also, many for better than eBay asking, though not necessarily transaction, prices. I myself looked away from the monitor for a moment and missed out on a sealed Marquise de Pompadour 4810 -both examples went unsold, so I suspect either the reserve was too high or not much interest. I recommend checking out the results to see what the market prices are on any pens FPN members might be interested in getting. I did win a different pen, though those who get caught up in emotional bidding should probably stay away... Edited by voukephalas, 18 December 2013 - 22:03.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202125.41/warc/CC-MAIN-20190319183735-20190319205735-00209.warc.gz
CC-MAIN-2019-13
773
6
https://wolveslug.org.uk/hints-and-tips/41-2/
code
Samba is a file and print server for Unix based systems (Linux, AIX, Tru64, MacOSX, etc etc) which aims to provide compatibility with Microsoft Windows File and Print Sharing. Samba allows you to share files and printers with computers running Microsoft Windows, as well as being a client to access shares hosted on Windows computers. In this way Samba can provide significant savings in terms of licensing costs and administrative overhead compared to a Windows Server based solution. For more information see http://www.samba.org/ How does it work? On the Linux side, there is normally a directory (/etc/samba) which contains the configuration file (smb.conf) which specifies printers, shares and where to find users. Samba can be configured to use LDAP for user/password authentication if you so wish. What can it do for me? Allow you to share files with Windows computers, in a transparent manner. What are the alternatives? Samba is a more cost-effective and straightforward alternative to the domain logon, file and print sharing functions provided by Microsoft Windows servers (or desktops, in the case of small-scale deployments that use peer-to-peer networking). Some proprietary Unix vendors have their own solutions which sometimes provide additional features, but these are often limited to a functionality level similar to Windows NT Server 4.0. An /etc/samba/smb.conf file may look like the following : workgroup = TheOffice netbios name = FileServer security = User encrypt passwords = true passdb backend = tdbsam guest account = pcguest load printers = yes printing = bsd printcap name = /etc/printcap comment = Home Directories browseable = no This will share all home directories to users when they go to \\FileServer from a Windows explorer shell. In order to allow users to access the server, they will need to have a local Unix account. You then need to create a Samba account, which maps the Unix user to the Windows world – smbpasswd -a david This adds the user “david” to Samba and prompts you for the password required. For migrating users, the “net rpc vampire” command can be used to copy user and/or computer accounts from legacy Windows NT/2000/2003 domains. What are the developers upto? Stand by for further Active Directory integration with integrated LDAP server and Kerberos key distribution centre support. Check out the Samba 4.0.0 Technology Preview 2 release notes to learn more.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00616.warc.gz
CC-MAIN-2023-50
2,428
29
https://www.finsmes.com/2017/01/prattle-raises-3-3m-in-seed-funding.html
code
Prattle, a St. Louis, MO-based text analytics startup that brings tradable sentiment data to finance professionals, raised $3.3m in seed financing. The round was led by GCM Grosvenor, with participation from New Enterprise Associates (NEA), Correlation Ventures, Plug and Play Ventures and a group of Silicon Valley and Wall Street angel investors. The company will use the capital to continue building out its proprietary sentiment analysis products. Led by Evan Schnidman, CEO, Prattle uses natural language processing, sentiment analysis and machine learning to quantify the relationship between language and the market. Its patent-pending methodology algorithmically generates data that is designed to predict the market impact of central bank and corporate communications solution and streamlines the financial research process with data delivered in real time. Research analysts, traders and other finance professionals use Prattle data—accessed through an interactive web portal, email notifications or an API—to anticipate and spot market trends and to build data-driven trading strategies.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00427.warc.gz
CC-MAIN-2023-23
1,102
5
https://continuouslifecycle.london/sessions/practical-team-focused-operability-techniques-for-distributed-systems/
code
In this talk, we explore five practical, tried-and-tested, real world techniques for improving operability with many kinds of software systems, including cloud, Serverless, on-premise, and IoT. Based on our work in many industry sectors, we will share our experience of helping teams to improve the operability of their software systems through Required audience experience Some experience of building web-scale systems or industrial IoT/embedded systems would be helpful. Objective of the talk We will share our experience of helping teams to improve the operability of their software systems. Attendees will learn some practical operability approaches and how teams can expand their understanding and awareness of operability through these simple, team-friendly techniques.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947328.78/warc/CC-MAIN-20180424202213-20180424222213-00450.warc.gz
CC-MAIN-2018-17
775
6