url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://lists.debian.org/debian-user/2000/08/msg04030.html
code
*SOLVED* problems with staroffice 5.2 /net install first of all, i want to thank all the people who answered me. what i did was download the .bin file again (the english version) and follow debian users' and sun's instruction. worked perfectly. i still don't know why the italian version i was using the 1st time didn't work, but now i don't care. thank you very much to all of you. Marco Frattola (Pianificazione processi) - Via de Marini,1 3 piano Torre WTC tel. 010 6591184
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345771844/warc/CC-MAIN-20131218054931-00041-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
476
10
https://www.odoo.com/forum/help-1/question/cname-resolve-from-different-server-40279
code
I have my OpenERP installation on a separate VPS, running on the default 8069 port. My site is hosted on a different server with cPanel. I'm trying to figure out how to add a subdomain (as a CNAME record, right?) as erp.mydomain.com that will resolve to the IP address of the OpenERP server, and it will accept the connection. Right now, all it's doing is redirecting to the Ip address:8069 instead of staying "masked" by my subdomain.domain.com Any suggestions on how to configure OpenERP/my cPanel dns to get this working would be appreciated! Happy new year! Please try to give a substantial answer. If you wanted to comment on the question or answer, just use the commenting tool. Please remember that you can always revise your answers - no need to answer the same question twice. Also, please don't forget to vote - it really helps to select the best questions and answers! About This Community |Asked: 12/29/13, 10:51 PM| |Seen: 1112 times| |Last updated: 3/16/15, 8:10 AM|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541134.5/warc/CC-MAIN-20161202170901-00248-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
980
10
https://poweredbydata.org/blog/2017/5/30/launching-transform-the-sector-2017-video-series
code
Launching the Transform the Sector 2017 Video Series We’re thrilled to announce that we’ve produced a video series of the sessions at Transform the Sector 2017. The series includes a conference recap and also videos that cover the various topics discussed at the conference including open data and funders, administrative data, data capacity and data ethics. These videos are the first part of the work we are doing to take the conversations that happened at Transform the Sector 2017 and turn them into useful resources. We are also in the process of finalizing a series of reports that summarize the conference and take a deeper dive into the topics discussed at the conference. So keep a look out for the reports which should be published soon. In the meantime, you can check out the full video series here.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986707990.49/warc/CC-MAIN-20191020105426-20191020132926-00476.warc.gz
CC-MAIN-2019-43
814
4
https://www.mail-archive.com/sc-l@securecoding.org/msg01850.html
code
On Thu, 7 Jun 2007, Michael Silk wrote: > and that's the problem. the accountability for insecure coding should > reside with the developers. it's their fault [mostly]. The customers have most of the power, but the security community has collectively failed to educate customers on how to ask for more secure software. There are pockets of success, but a whole lot more could be done. >From a developer-focused perspective, we need to deal with (1) ensuring that developers KNOW how to produce secure code (or interpret tool results), but then (2) actually produce the secure code within given deadlines. I know that (2) is a common topic on this list, but deadlines won't change until customers force the issue, which currently requires weaning them from featuritis, which has such low prospects of success that it's starting to depress me, so I'll stop and we've talked about this before anyway. > > It would seem to be that tools that developers plug into their IDE > > should be free since the value proposition should reside elsewhere. I personally love this sentiment, but that's not how the current market is working, and I'm not sure how it would shift to that point. There might be lessons from the anti-virus community's long history (nowadays mostly covering the same stuff usin a subscription model, but they still compete on speed more than quality of information to the end user). I don't know what the vuln scanning tool indusry is up to these days (Nessus, Retina, etc.) but I do know that management-friendly reporting was the bane of that technology's existence for years. - Steve _______________________________________________ Secure Coding mailing list (SC-L) firstname.lastname@example.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710974.36/warc/CC-MAIN-20221204140455-20221204170455-00648.warc.gz
CC-MAIN-2022-49
2,054
2
https://africahead.co.za/Africahead/Subscribe.html
code
∞ ⋈ ∞ ∞ ⋈ ∞ ∞ ⋈ ∞ ∞ ⋈ ∞ ∞ ⋈ ∞ Pay either via Paypal (19,99 USD) or Payfast (& fonetones) (267,89 ZAR) below for a year subscription. The Payfast and Paypal icons connect to their secure websites. Unsubscribe via Paypal with the following link. To subscribe for a year with cryptocurrency, calculate the amount based on 19,99 USD, and pay to any of the following addresses: Basic Attention Token (BAT): 0x410f162d0b6b98c84623 275230856a5feadaf26c Bitcoin Cash (BCH): 1D4NAZ9drZmZKjQs 4zZsFstkzYsJgZfNMK Doge (DOGE): DKqgartNWZmhm9CY5c 4oA72BvN3g2MnELW Dash (DASH): XbjEW7L8fTUnhT9wD GdqapxWMY6J5eBK3c Ethereum (ETH): 0x120eAF70015775C3F6 ed954E67e97A36485CFb0F Ethereum Classic (ETC): 0x1cd0567375a39c93fa 166096558d3236e820c8b6 Litecoin (LTC): LQyKmHN1vfgRxXB6AM 4Sitn6Nek5K4qY7C 0x project (ZRX): 0x410f162d0b6b98c84623 275230856a5feadaf26c Zcash (ZEC): t1Ua8ELz1X6kotX6N 6qP19KszqbRzpcC8mB Remove the space in the address. Tokens on the Ethereum network, are also accepted at the ETH address above. AFA is however not accepted because equity owners, future employees and Africahead may not own AFA. Please send an email to firstname.lastname@example.org or email@example.com to confirm subscription information if cryptocurrency is used.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998581.65/warc/CC-MAIN-20190617223249-20190618005249-00538.warc.gz
CC-MAIN-2019-26
1,269
16
http://proceedings.mlr.press/v28/simsekli13.html
code
Learning the beta-Divergence in Tweedie Compound Poisson Matrix Factorization Models Proceedings of the 30th International Conference on Machine Learning, PMLR 28(3):1409-1417, 2013. In this study, we derive algorithms for estimating mixed β-divergences. Such cost functions are useful for Nonnegative Matrix and Tensor Factorization models with a compound Poisson observation model. Compound Poisson is a particular Tweedie model, an important special case of exponential dispersion models characterized by the fact that the variance is proportional to a power function of the mean. There are several well known matrix and tensor factorization algorithms that minimize the β-divergence; these estimate the mean parameter. The probabilistic interpretation gives us more flexibility and robustness by providing us additional tunable parameters such as power and dispersion. Estimation of the power parameter is useful for choosing a suitable divergence and estimation of dispersion is useful for data driven regularization and weighting in collective/coupled factorization of heterogeneous datasets. We present three inference algorithms for both estimating the factors and the additional parameters of the compound Poisson distribution. The methods are evaluated on two applications: modeling symbolic representations for polyphonic music and lyric prediction from audio features. Our conclusion is that the compound poisson based factorization models can be useful for sparse positive data.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00718.warc.gz
CC-MAIN-2023-06
1,493
3
https://www.freelancer.com/projects/python/tally-integration-with-rest-api/
code
Integrate tally with Django backend based REST API: Features to integrate: - Sales invoices - Supplier invoices - Sales returns - Purchase returns Data needs to be pushed from the web server REST API to Tally server. Data flow will be from the web server to Tally server. All code for web server side is in Python and will be written by our team. All code at Tally side need to be done. 1. User creates a sales invoice in our software 2. User clicks on sync with tally button to send request to tally server 3. Data is saved in tally database and response is sent with object id 4. id is saved in the software database to denote sync is successful 5. if request is sent again the saved object in tally updated rather than creating a new one 16 freelancers are bidding on average ₹54425 for this job Hello this is sushma I have a 3years of experience in Tally and I also taken Tally classes too so I think I'm eligible for the job if I'm capable let me know I will try to complete within in 7 days, or & before i will try to complete within 5 or 6 days but before i need proper information related to API after that I will complete within in 5 or 6 days
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986655864.19/warc/CC-MAIN-20191015032537-20191015060037-00481.warc.gz
CC-MAIN-2019-43
1,154
17
http://www.inthepatternpodcast.com/58
code
Chris and John create a quick podcast on the grounds of EAA Airventure Oshkosh in Oshkosh, WI. We discuss what we have seen this week including Fifi the only flying B-29, the 787 Dreamliner, and quite a few social media events. Special thanks to Sennheiser for the microphones and for sponsoring the MyTransponder party that included Podapalooza. Also we apologize for the bad audio. Turns out we have really awesome microphones and no idea how to use them. - John's Pictures: http://picasaweb.google.com/jay12701/Oshkosh2011?authuser=0&feat=directlink - Chris' Pictures: http://picasaweb.google.com/chris.holub/OshkoshAirVenture2011
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258003.30/warc/CC-MAIN-20190525104725-20190525130725-00247.warc.gz
CC-MAIN-2019-22
633
5
https://mail.coreboot.org/hyperkitty/list/openbios@openbios.org/message/HZL5NAKZILPSIPDLZTC2B44DRHW42BU6/attachment/0/attachment.htm
code
Ohhh thanks, that sounds good. Does the size of 72 kB include the C runtime library ? Tomorrow I'll try to manage cross-compilation under cygwin.... Blue Swirl wrote: we were at ~12kb machine code for the C side of the forth system at one point. and after that, I think only drivers were added. I did a quick test and disabled the drivers and filesystems, now we are at obj-sparc32/openbios-plain.elf: file format elf32-sparc Idx Name Size VMA LMA File off Algn 0 .text 0000f578 ffd00000 ffd00000 00004000 2**14 CONTENTS, ALLOC, LOAD, CODE 1 .rodata 0000179c ffd10000 ffd10000 00014000 2**3 CONTENTS, ALLOC, LOAD, READONLY, DATA 2 .data 000000b0 ffd12000 ffd12000 00016000 2**2 CONTENTS, ALLOC, LOAD, DATA 3 .bss 0006b000 ffd13000 ffd13000 00017000 2**3 Text and rodata can be merged and data segment can be set up manually. The interrupt vector table has alignment restriction of 16K which adds a lot of NOPs now, but most of that can be saved. So I think we are pretty close to German Aerospace Center Institute of Planetary Research D-12489 Berlin, Rutherfordstrasse 2 Tel/Fax: (+49) (30) 67055-416/384
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902496.52/warc/CC-MAIN-20200710015901-20200710045901-00342.warc.gz
CC-MAIN-2020-29
1,105
23
http://forums.cnet.com/7723-6132_102-612383/windows-8-apps-problem-and-avast/
code
Windows 8 apps problem and Avast! by sylorein - 2/5/14 3:32 AM Here's the thing, I recently installed Avast! av to clean up some viruses on my computer as my McAfee didn't help at all. it worked well at first, until i discovered that i couldn't open any of my windows 8 apps. the apps just showed its splash screen then it wouldn't open. so i tried finding the reasons why it happened. I found out that to open the apps, it needs something called 'roaming' files. (correct me if i'm wrong). Unfortunately, the infected files found by avast! is the roaming files and currently stored inside the virus chest. therefore preventing me from opening the windows apps. the virus name is "dygeanlxqx..vbs" its type is "VBS:Decode-BD [trj]" its location is in c:\Users\lenovo\AppData\roaming it's severity is high (that's what avast said) My question is, is it a safe to just restore it and let it be? will it effect or infect further my computer in the future. tq for your attention. it would be a great help if anyone could help me with this problem. sylorein has chosen the best answer to his/her question. Click here to view the answer that was selected.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206770.7/warc/CC-MAIN-20140423032006-00156-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,149
11
https://pegaswitch.com/super-blog/where-is-the-problem-statement-located-in-a-research-article/
code
Where is the problem statement located in a research article? Typically these problems are mentioned in the introduction or in the future work section of a paper. They outline areas in which more work is required or the problems that are still unsolved in the selected area of research. What is the problem statement in a research article? A research problem is a definite or clear expression [statement] about an area of concern, a condition to be improved upon, a difficulty to be eliminated, or a troubling question that exists in scholarly literature, in theory, or within existing practice that points to a need for meaningful understanding and deliberate … Can a problem statement be a question? A statement of the problem is used in research work as a claim that outlines the problem addressed by a study. The statement of the problem briefly addresses the question: What is the problem that the research will address? What are the goals of a statement of the problem?
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819847.83/warc/CC-MAIN-20240424174709-20240424204709-00105.warc.gz
CC-MAIN-2024-18
977
6
http://buddygopher.blogspot.com/2005/04/were-working-on-it.html
code
Wednesday, April 13, 2005 We're working on it. As a result of ongoing scalability tests, a few away messages might not have been collected from friends on your BuddyGopher BuddyList last night. In other news... - History Reduction We have limited the Away Message history page to only display the last seven away messages. Dustin Smith suggested that we extend our history timeline to infinity. We can do that soon. - New Favorites Feature Just another good excuse to play around with XMLHttpRequest techniques? Nope. This was a user suggestion to curb problems with the limited availability of Away Message history. You can save unlimited Favorite messages, and over time we hope it'll turn into something like an Away Message yearbook. We definitely do not have any plans to delete the messages that you add to your Favorites list. - MyDict bot Our dictionary bot is not very stable. We didn't expect it to be so popular and are considering opening it up to get developer feedback.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151563.91/warc/CC-MAIN-20210725014052-20210725044052-00077.warc.gz
CC-MAIN-2021-31
983
10
https://awphosting.com/definitions/mx-and-a-records/
code
The definition of “hosting” does not describe only one service, but a variety of services that offer a variety of functions to a domain. Having a website and emails, as an example, are two separate services though in the general case they come together, so many people think of them as one single service. The truth is, each domain has a number of DNS records called A and MX, which show the server that handles each particular service - the first one is a numeric IP address, that defines where the site for the domain address is loaded from, while the latter is an alphanumeric string, which shows the server that manages the emails for the domain. For instance, an A record is 184.108.40.206 and an MX record would be mx1.domain.com. Every time you open a website or send an email, the global DNS servers are contacted to check the name servers that a Internet domain has and the traffic/message is first forwarded to that company. In case you have custom records on their end, the Internet browser request or the email will then be sent to the correct server. The reasoning behind using separate records is that the two services employ different web protocols and you may have your website hosted by one service provider and the e-mails by another.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250624328.55/warc/CC-MAIN-20200124161014-20200124190014-00390.warc.gz
CC-MAIN-2020-05
1,256
1
https://jobs.careeraddict.com/post/12314115
code
Posted on Jan 24, 2020 by Annapurna HR CTO - Stockholm - Salary Requests Welcome - Fintech About the Role As the CTO you will establish a technology vision and plans for growth as well as ensuring that the technology strategy and business strategy are aligned. You will act as a technological expert making decisions based on the company's strategy that will impact the current and future operations of the company while ensuring that the organization is using the technology efficiently. As the CTO you will be in charge of building up the current technology organization and you will report to the CEO and be a part of the C-Level management team. Who are you? We are looking for someone who: - Has several years of experience of working in a leading technical role with a track record of software development - Can develop our company vision together with the management team and internal stakeholders - Has the ability to skillfully manage, develop, motivate, inspire and direct others within a fast-paced entrepreneurial environment. - Has significant managerial experience including development and verification of new products and services - Has demonstrated a technical skill set with a strong background in React Native and/or Python(Django) - Can ensure that technology and regulatory standards are met and are used efficiently, profitably and securely - Can stay current on new industry trends, technologies and software development - Is able to attract new talents to the team You should have exceptional project management and organizational skills and can ensure that the company's technological processes and services comply with regulations within the industry. Experience from Fintech, Education, Gaming products or similar markets is a huge advantage in this role. To Apply: Email (see below) or call Sean.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147647.2/warc/CC-MAIN-20200228200903-20200228230903-00450.warc.gz
CC-MAIN-2020-10
1,824
16
http://csnavigo.xyz/archives/8601
code
Incrediblenovel Let me laugh – Chapter 2 distribution absent recommend-p1 Novel–Top Tier Providence, Secretly Cultivate For A Thousand Years–Top Tier Providence, Secretly Cultivate For A Thousand Years Chapter 2 alive pencil New season pa.s.sed and autumn emerged. the coastguard cornwall The feminine cultivator shook her mind and reported, “The Jade Natural Sect has recently been infiltrated using a fiendish cultivator. The outside sect has specially dispatched the 2 main of people to safeguard you. You don’t ought to be concerned.” [Farming Likely: Five Elements Combined Possibilities. Cultivation cannot go over Foundational Business.] The third working day. Zhang Ge was already a cultivator. So, he even went forth to talk to the 2 cultivators. “All people, extend the hands.” Elder Steel advised. Above and beyond his operate, Han Jue experienced his human body and rolled the dice everyday. Han Jue was delighted that they wasn’t decided on. Han Jue plus the other folks increased their ideal palms. He actually didn’t still find it peculiar. That must be Nature Qi. It needs to be a trap! Han Jue imagined quietly and continued sprinkling water. Even though Elder Metal was temperamental, Outdated Guy w.a.n.g got accompanied him for years and naturally failed to would like almost anything to eventually him. He rolled the dice! Han Jue got read through many cultivation novels within his former existence. The thing that kept the deepest impression on him was that cultivators choose to wipe out their associates than expire by themselves. Top Tier Providence, Secretly Cultivate For A Thousand Years Elder Metal touched them one after the other. Elder Steel handled them one by one. Elder Iron directed and went towards his pavilion. The greater Han Jue thought about it, the more panicked he started to be. He didn’t dare to escape and can only try out his wise to relax himself lower. Life in the Roman World of Nero and St. Paul Spring pa.s.sed and autumn got. [You are able to select a tiny place. The machine will allow you to generate a obstacle. The cultivators beyond the obstacle will struggle to feeling modifications throughout the boundary.]
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00040.warc.gz
CC-MAIN-2023-14
2,192
28
http://unix.stackexchange.com/users/48232/hbruijn
code
Longtime Linux user, sysadmin, engineer and Red Hat Certified Architect. Contractor and consultant. My LinkedIn profile to network. And if you have a relevant job for me near a good ski hill, I might be interested! 18 Why doesn't my exactly 100 MiB partition at 1 KiB block size have the corresponding available blocks/space? feb 20 8 How are “xterm” and “screen” related? jul 1 '14 7 read only root filesystem jul 22 '14 6 Help updating OpenSSH to v6.6 jun 11 '14
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095270.70/warc/CC-MAIN-20150627031815-00141-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
472
7
http://www.tomshardware.com/forum/251705-31-build-system-starts-shuts-10sec-boot
code
i don't suppose there is a voltage switch on the back of your PSU? if there is one, and it got switched to the wrong position, it could cause what you're describing. dave said, "I have a xfx nforce 780i mother board on the mother board it seems to shut down after 7F which is POST error check it seems to go to FF for a second then shuts down FF is Boot. " If the PSU were set wrong, he would not get the motherboard LED codes. "7F" means it successfully completed the POST. My first guess is a thermal problem because of an improperly mounted heat sink. My second guess would be some kind of problem with PSU.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691977.66/warc/CC-MAIN-20170925145232-20170925165232-00209.warc.gz
CC-MAIN-2017-39
610
4
https://tgui.eu/tutorials/v0.7/codeblocks/
code
TGUI 0.7 is no longer supported, use a newer TGUI version instead. Set the location of the TGUI directory, set the build directory (usually a new empty folder) and press "Configure". Next select your generator, when using CodeBlocks this is "CodeBlocks - MinGW Makefiles". Just keep the "Use default native compilers" option checked and ignore the other three options. If SFML cannot be found automatically you will receive an error. If SFML was not found then you should set SFML_DIR to the folder containing SFMLConfig.cmake (SFML >= 2.5) or alternatively set the SFML_ROOT variable to the root SFML folder (the directory that contains the include and lib folders). If you use SFML_ROOT when you compiled sfml yourself then you will have to watch out for two things: You can now configure the settings. Set the CMAKE_BUILD_TYPE option either to "Debug" or to "Release" depending on the type of library you want. You should also look at the TGUI_SHARED_LIBS option, check it to build dynamic libraries (.dll files), uncheck it to build static libraries. This option has to match with the one chosen for SFML. After setting the options like you want them you need to press Configure again. Now you should have reached the message "Configuring done" at the bottom. All you have to do now is press Generate. You are not done yet. CMake created a CodeBlocks project in the build directory that has to be build first. Open the tgui.cbp file and hit "Build" to build the TGUI libraries. Once this is done, you will find the libraries inside the lib subdirectory of the build folder. To make it easier to use tgui in your project, you should probably copy the .a (and .dll) files to a new "lib" folder in the TGUI root directory. Open the “Project build options”. On the left side you can choose whether you want to change debug or release target settings. Or you can just click on the name of your project (here TGUI-Test) to set them for both. TGUI requires C++11, so check the “-std=c++11” option. In the “Search directories” of the “Compiler” add the path to the include directory. In the “Search directories” of the “Linker” add the path to the lib directory (or wherever you placed the library that you build with cmake). In “Linker settings” under “Other linker options” add ‘-ltgui’ in the ‘Release’ settings and/or add ‘-ltgui-d’ in the ‘Debug’ settings. When linking statically, you have to use ‘-ltgui-s’ and ‘-ltgui-s-d’ instead of course. Also note that the order has to be correct: first tgui, then the libraries from sfml. When using shared libraries, don't forget to copy tgui.dll to your project’s folder. You should now be able to use TGUI.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474617.27/warc/CC-MAIN-20240225135334-20240225165334-00178.warc.gz
CC-MAIN-2024-10
2,710
17
http://www.villageidiotsavant.com/2008/03/why-is-blogger-so-slow.html
code
I don't know if other Blogger users also feel it, but on Firefox 2, the web interface has just become so slow. There's a half second delay from between the time I press a key on they keyboard and the time the letter appears on screen. Worse, the delay is cumulative. so by the time I get to the end of this sentence, a grand total of 15 seconds would already have passed by before it appears on screen. It's intolerable! A quick check of the page information shows that the web interface is no more than 6.4 kilobytes, so size alone should not be the issue. It shouldn't really be acting this way as the interaction is local, with no data as being sent to the server. Why Blogger is so slow is because it loads in too many functions are variables. And for what? Possibly for features that I don't really need! The situation is marginally better in the Epiphany web browser, but even there, there are indications of delayed response. It's for this reason that I've started using Scribefire to post to Blogger. I just wish the folks at Blogger would fix this problem, though. A compromise solution might be to offer a lightweight client with fewer features and a full client with Rich Text editors and spell checking and what have you. Let the user choose! Are you experiencing this problem, too?
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189884.21/warc/CC-MAIN-20170322212949-00357-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,294
8
https://www.kengadget.com/collections/mobile-accessories/products/2-pack-kengadget-iphone-xs-screen-protector-5-8-inch-2018-2-5d-coverage-9h-hardness-ultra-clear-scratch-proof-alignment-frame-tempered-glass-screen-protector-film-for-apple-iphone-xs-max
code
[2 PACK] Kengadget iPhone XS Screen Protector- 5.8 inch (2018), [2.5D Coverage] [9H Hardness] [Ultra Clear] [Scratch Proof] [Alignment Frame] Tempered Glass Screen Protector Film for Apple iPhone XS ~FREE SHIPPING Today (US, UK & AU)~ - 【Compatiable With】The full-covered screen protector is compatiable with iPhone XS 5.8". Please make sure to check your model before purchase, it is for the iPhone 5.8 inch - 【Bubble Free Installation】The installation kit included helps to finish installation process more accurate in 5 minutes and without any bubbles. - 【All Round Protection】Precise 5D curved frame do protect its edges . When the phone is dropped off, the screen will not be affected directly, instead the impact will be absorbed by the curved frame.9H hardness tempered glass can withstand strong scratches, impact, scrapes, bumps - 【Tough Hardness】9H hardness tempered glass provides top-grade protection, would keep your screen away from daily scratches.0.5mm thickness; scratch resistant; anti-shatter. - 【3D Touch Compatible】3D touch give you a smooth touch feeling without hurting fingers. Precise laser cut tempered glass screen protector does not hinder any touch actions to the screen. Ship from Hong Kong (Estimated 7-10 days)
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510846.12/warc/CC-MAIN-20200403092656-20200403122656-00522.warc.gz
CC-MAIN-2020-16
1,262
8
http://www.syntheticrealms.com/loki_daoc/loki_purchase.php
code
The Lesser Oracle will only provide limited council on battle readiness before requiring a payment of a few coins. Your payment of coins is appreciated and ensures that the Lesser Oracle will continue to provide his wisdom. PayPal Registration (Platinum Edition: $24.95): Note to PayPal Users: Please ensure that your PayPal email address is up to date before registering using PayPal. To ensure that you are not delayed in getting your registration code verify your PayPal email. SWREG Registration (Platinum Edition: $27.95): When registering with SWREG note that the "Registration Backup Service" is a service they offer and is in no way affiliated with us. We do not see any of the money associated with the service and it is unnecessary in your registration. We offer SWREG as an alternative for those interested in avoiding PayPal. Some of our long time users have requested a mechanism to donate money to the Lesser Oracle as a way to show their appreciation for his continued counseling on battle preparedness. Note that donating to the Oracle does not provide a license key.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454702039825.90/warc/CC-MAIN-20160205195359-00162-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
1,083
9
https://news.mkomarab.com/java-programming-course-and-tutorial/
code
Java is a significant level language that is likewise simple to peruse and comprehend. With it, engineers can “compose once, run anyplace” , implying that the assembled Java code will run on all Java-viable stages without requiring a recompilation. 15 years, Jose also has a passion for education and knowledge transfer. Sagar Arora is an experienced technical content writer with knowledge of C, C++, python, PHP, Java languages. His writing coverage includes companies such as iSkysoft, Keepvid, Xpo2, Stackify, Entrepreneurbus, etc. Why Learn Java? He has worked in and led teams in many industry verticals including Defense, Leasing, Energy, and Healthcare. Jim has extensive experience with unit and acceptance testing techniques and tools, and is one of the original authors of JWebUnit, an open-source web application testing API and framework. If you want to build a web application, explore the JEE 9 path, as it will contain many topics that teach you how to create a server-side web application. Or if you’re interested in creating a client-side web application, take a look at the Java EE 9 path that integrates with web clients. If your organization wants to expose data over the web for other applications to use, you’ll need to build an API. - Right-click on my computer and select the properties option mentioned on the screen. - Internationalization — An introduction to designing software so that it can be easily adapted to various languages and regions. - You will learn the Java code basics such as object-oriented programming, problem-solving, event-driven programming, how to create arrays and much more. - That is, how a subclass can inherit fields and methods from a superclass. - In this section, you can implement the concepts learned in the first section. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions. Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Write a lot of Java code- The only way you can learn programming is by writing a lot of code. Speed – Well optimized Java code is nearly as fast as lower-level languages like C++ and much faster than Python, PHP, etc. Please ensure that your learning journey continues smoothly as part of our pg programs. Unlock additional features with a paid plan Connection points are utilized in Java to accomplish deliberation. By utilizing the carries out a catchphrase, a java class can carry out a connection point. What are the basics topics of Java? - Classes and Objects in Java. - Inheritance in Java. - Encapsulation in Java. - Polymorphism in Java. - Abstraction in Java. - Overriding in Java. - Method Overloading in Java. Use Java programming language constructs to create a Java technology application. Please note that GL Academy provides only a small part of the learning content of Great Learning. For the complete Program experience with career assistance of GL Excelerate and dedicated mentorship, our Program will be the best fit for you. Please feel free to reach out to your Learning Consultant in case of any questions. Enroll in the paid programs of your choice and earn highly valued certificates. Java Code Geeks So why waste any more time, just read them in the below order and learn core java programming. If you think you know all about Java, just scroll below and read tutorials in “Advanced Topics” section, I am sure you will find something worth reading. Java is widely used in many real-time applications starting from standalone applications to mobile applications. It is one of the flexible language used so far in programming languages. It is a simple language but a powerful tool to develop applications. - One more example, since there are no pointers, bad memory access is also not possible. - Custom Networking — An introduction to the Java platform’s powerful networking features. - This design feature allows the developers to construct interactive applications that can run smoothly. - Your enthusiasm and drive to succeed are the most important requirements for this course. You’ll learn how to apply SOLID principles, design patterns and how to refactor existing Java code. It is a micro platform that is dedicated to mobile applications. It is an enterprise platform that is mainly used to develop web and enterprise applications. It includes topics like Servlet, JSP, Web Services, EJB, JPA, etc. Java SE Lessons Java is an open-source, general-purpose programming language known for its versatility and stability. It’s used for everything from building websites to operating systems and wearable devices. Project Planting a Tree Write your first Java program from scratch by introducing yourself to users and planting a tree for them. Ratings & reviews from learners Jim’s latest book is Creating Dynamic UI with Android Fragments. Jim and his wife, along with several cats, split their time between Celebration, Florida and Weirs Beach, New Hampshire. First, you will learn about the fundamental concepts and language constructs of the Java language, including object-orientation . This path also covers fundamentals such as Unit Testing and QA using Java. Use the Core Java Fundamentals course to learn the skills in Java programming. The Java course provides competency in all concepts of Java programming and includes topics such as objects, classes, inheritance, exceptions, assertions, logging, and generic programming. Java is popular because it is one of the first truly object-oriented programming languages. Its platform-independent feature, meaning that programs written in Java can run on any system with a Java Virtual Machine installed, makes it more desirable.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00709.warc.gz
CC-MAIN-2023-14
5,872
31
https://www.prisma.io/forum/t/filter-creating-error-as-an-unknown-argument-on-field/1033
code
Hi, not sure if I need to get into specifics of my code just yet, but wondering if there is a reason why I cannot use ‘filter’ as an argument - in graphiql the error, as in the title of the post, is: "Unknown argument “filter” on field “calls” of type “Query”." Am I entirely missing something from the docs, including https://www.graph.cool/docs/reference/simple-api/filtering-by-field-xookaexai0/ - I read it that I can use ‘filter’ as an argument in any query? But do I need to set something up? For some context, the app is using Node, React, and React Apollo. Thanks in advance for any tips that can push me in the right direction!
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529007.88/warc/CC-MAIN-20190723064353-20190723090353-00121.warc.gz
CC-MAIN-2019-30
656
3
https://forum.stoacademy.com/showthread.php?tid=52
code
Just a quicky, I have a load of different elements and artifacts that I have recovered from the Anomalies. Some when I view them state they are Rare. However they have little or no monetary value so what do you do with them? Also ships components I have some in my inventory, one is values at 2,000 credits. Other than sell them what are they for too? Another thing the Skills Tree, what exactly does that do? I am just clicking away every now and then uping the numeric value under a particular skill, but havent a clue how it effects me, nor can I see any effect. Also what do you do once you reach the 9th level of that skill, as I have done that on one but the skill beside it is still greyed out. Thanks and sorry for sounding dumb, but never having had a manual/comprehensive game guide with this game, im flying by the seat of my pants in trying to understand what to do, where to go and how to achieve and level up.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363135.71/warc/CC-MAIN-20211205035505-20211205065505-00440.warc.gz
CC-MAIN-2021-49
923
4
https://www.programmableweb.com/sdk/quandl-scala-sdk-iamtrask
code
Google announced the Firebase App Indexing API. The API allows users to search for content within the Google app and find personal or public content across apps installed on a particular device. Because the content is stored on the device, the API is functional whether a user is online or not. We've covered Factual a number of times, most recently asking if it will become the go-to location database. Now the company has expanded its offering with improved datasets, new datasets and a new iPhone SDK. Its local data now covers 27 countries and contains more than 30 million individual business listings. Data aggregation platform MightySignal aims to improve the visibility of app data to provide insight into the mobile app economy. In this app index, the company shows the most popular SDKs used by the App Store Top 200, showing the top 8 apps that use each one, as well as all other SDKs they use.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823236.2/warc/CC-MAIN-20181210013115-20181210034615-00141.warc.gz
CC-MAIN-2018-51
905
3
https://www.bestwise.com.tw/journal/content.aspx?no=150208
code
Level Issues in Understanding Organizational Phenomena: Concepts and an Empirical Analysis of Data Non-independence Most of the organizational phenomena are hierarchically imbedded, easily making research data clustered in nature. Data analysis without considering non-independence often leads to misunderstanding of the phenomenon under examination. Based on extant literature, this study first addressed the level issues from an ontological perspective, followed by a discussion of methodological concerns of nested data. As an illustration, a set of data investigating the effects of paternalistic leadership and the moderation of group cohesiveness was analyzed with OLS and RCM techniques. The impacts of data non-independence were illuminated through comparing the results from single level (i.e., both individual and group) and cross level analyses. The relationships between constructs were largely inflated in single level analyses. Implications of analyzing nested data were addressed.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302715.38/warc/CC-MAIN-20220121010736-20220121040736-00018.warc.gz
CC-MAIN-2022-05
995
2
https://answers.sap.com/questions/676630/sap-ibp-epm-formatting.html
code
We are facing an issue in the EPM Formatting of IBP templates. We need to segregate data w.r.t. planning combinations. Like, when the particular set of Key Figures for a particular planning combination finishes, we want to differentiate that with a darker line. We have been able to achieve that by using borders on the specific Key Figures (member property) but there are instances that same KF appears at different location in some other tab and messes up the other tabs of the same template. Is there a better way of solving out this problem ?
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00028.warc.gz
CC-MAIN-2022-33
546
1
https://lemonysubtitler.com/webhelp/dialog_goto.htm
code
The go to dialog allows to jump to specific positions. Jumps to a specific clip index. Jumps to a specific time position. Allows to jump to the first/last/previous/next clip that matches the specified scope. Allows to jump to the previous/next scene change. This function requires the reel to have a scene changes file associated.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358847.80/warc/CC-MAIN-20211129225145-20211130015145-00091.warc.gz
CC-MAIN-2021-49
330
6
https://cstep.in/team.php?id=2394
code
Sector Head – Air Quality Dr R Subramanian is Sector Head – Air Quality. He holds a PhD in Mechanical Engineering from Carnegie Mellon University and has also trained as a postdoctoral researcher at the University of Illinois, Urbana-Champaign, and Droplet Measurement Technologies (DMT). He has completed his MTech in Energy Systems Engineering from IIT-Bombay and his BE in Automobile Engineering from the University of Mumbai. Prior to joining CSTEP, he worked as a Senior Scientist at the Qatar Environment & Energy Research Institute, as a Chercheur/MOPGA laureate at OSU-Efluve/LISA/CNRS in Creteil, France, and as a Research Scientist at Carnegie Mellon University, RTI International, and DMT. He is currently a Research Fellow at the Kigali Collaborative Research Centre (Kigali, Rwanda), a Visiting Researcher at OSU-Efluve/CNRS, and an Adjunct Professor in the Department of Mechanical Engineering at Carnegie Mellon University (Pittsburgh, PA, USA). His areas of interest include air pollution characterisation and source apportionment through measurements and modelling, using a variety of research-grade and low-cost instruments and tools.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817014.15/warc/CC-MAIN-20240415174104-20240415204104-00409.warc.gz
CC-MAIN-2024-18
1,156
6
https://healthmedicinet.com/a-scalable-second-order-optimizer-for-language-model-pre-training-sophia/
code
Given the high up-front cost of training a language model, any non-trivial improvement to the optimization process would drastically reduce the time and money needed to complete the training process. Adam and its variants were the states of the art for a long time, while second-order (Hessian-based) optimizers were rarely utilized due to their greater per-step overhead. The researchers’ suggested pre-conditioner for the second-order optimizer Sophia, Second-order Clipped Stochastic Optimization, is a compact estimate of the diagonal Hessian. A new optimizer named Sophia can solve LLMs twice as quickly as Adam. The update is followed by an element-by-element clip, which is calculated by dividing the mean of the gradients by the mean of the estimated Hessian. The clipping reduces the worst-case update’s size and lessens the impact of the trajectory’s non-convexity and fast Hessian fluctuations. The $2M budget may be reduced to the $1M range by adding a few extra lines of code (provided scaling rules hold true). The average per-step time and memory overhead are low because Sophia only estimates the diagonal Hessian every few iterations. Sophia doubles Adam’s speed in terms of the number of steps, total compute, and wall-clock time while modeling language with GPT-2 models ranging in size from 125 million to 770 million. Researchers demonstrate that Sophia can accommodate large parameter variations that underlie language modeling tasks. The runtime bound is independent of the loss’s condition number. - Sophia is straightforward to implement with PyTorch, as it requires a lightweight estimate of the diagonal Hessian as a pre-condition on the gradient (see pseudo-code in the first picture) before individually clipping elements. - Sophia also helps with pre-workout steadiness. Much less often than in Adam and Lion, gradient clipping is induced. The re-parameterization trick, where the focused temperature varies with the layer index, is unnecessary. - Sophia ensures a consistent loss reduction across all parameter dimensions by penalizing updates more heavily in sharp sizes (with large Hessian) than in flat dimensions (with small Hessian). In two-dimensional space, Adam converges more slowly. Important aspects of this undertaking - This shows that even with limited resources, academics may examine LLM pre-training and develop novel, effective algorithms. - In addition to reviewing material from previous optimization courses, researchers extensively used theoretical reasoning throughout the study process. In the code scheduled for release tomorrow, researchers used a slightly modified version of the commonly accepted definition of LR. While tidier for typing, the paper’s LR definition could be better for computer code.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00133.warc.gz
CC-MAIN-2023-40
2,771
10
http://blog.lib.umn.edu/ayubx003/dividebyzero/technology/coding/
code
I've been exploring the CodeCanyon marketplace for a little while now and I am pretty impressed. It's an opportunity to monetize some ideas I've had and to gain some portfolio work and possibly more customers. I've been a proponent of free software (I provide some on my development site) so I won't be selling everything I make, but I think it's nice to put some product out there as a web designer. I've just released my Web Application Template package for .NET web applications (and it's only $12). It's basically what I would prefer to start with every time I work on a new web site… in effect, a "Web App in a Box." It supports .NET 3.5 and .NET 4 and offers a slew of features (ELMAH integration, compression/minification of CSS and JS, etc), the to-do list ever growing. You can be sure I'll keep it updated because I will be using it myself! I'm already using it for a new version of Intrepid Studios (not a total redesign, more enhancement-like). I was sick and tired of all my projects using different file/folder/solution layouts and having to duplicate code across them all the time. I wanted a way to easily get started without spending time configuring everything. While I was working on it, I thought it would be useful for other developers. Will it really save you six hours? Well, it took me a solid 6+ hours of development time to set it up… and then some. Six is a safe bet, possibly more if you aren't that familiar with some of the components I integrated. As always, let me know if there are bugs and improvements you think of. You can also check out my previous CodeCanyon release, Google Picasa Gallery + API. I just finished a new web site today, BeReasonableNow.com, for a lifestyle guide. The web site was created for a friend of mine. I've seen the guide, there's nothing magical about it, it's totally practical and pretty funny. Check it out! I decided since this was a one page deal that I'd try out a few design ideas I've seen lately including subtle radial gradients and larger text. I like how it turned out. All the effects except the gradient and title image are CSS: border-radius, box-shadow, background gradient, and text-shadow primarily. I was also thinking of using the new @font-face but Arial didn't look that bad so I just left it. I have to say, it's a pretty catchy title for a lifestyle guide. Along with a new sample section on my Intrepid Studios web site, I've also added a simple BlackJack implementation written in VB.NET. It was written for my programming class last semester and I'm just now posting it. This is not the uber-awesome BlackJack I've mentioned before. That is still not ready for packaging. However, keep tabs on this blog or my business blog to find out when it hits. The term "slug" was first coined, I believe, by Wordpress to mean a URL-friendly version of a post title. You see them on blogs all the time. How do you go about converting an unfriendly title into a friendly one? Learn how on my Intrepid Studios blog where I give you code in C# and PHP. I am working on a custom blog implementation for Intrepid Studios and I am using a ListView to display posts on the front page. It's just a very nice control… Anyway, paging for a ListView is done by adding a DataPager control to the page and customizing its behavior. I was interested in seeing how efficient it was, expecting it to properly utilize my LinqDataSource's ability to grab only the actual number of rows needed from my SQL database. The articles I read on 4GuysFromRolla and other sites mentioned that it does not, but they were referencing an SqlDataSource. It turns out, the DataPager does use efficient paging with a LinqDataSource and you do not need to put it within a <form runat="server"> tag to use (just use the QueryStringField property!). How come? From what I understand, the LinqDataSource uses automatic paging to only get a certain number of rows. That's why it is the only DataSource control with an "AutoPage" property. I am exceedingly happy with this. Thank you to Batiste Bieler for the original script, jQuery Rich Text Editor Lightweight. I heavily modified it to support ASP.NET forms (and their funny client IDs) and to work a bit more efficiently. It’s tested with PHP and .NET both. It should work with any kind of form. Visit the jQuery Rich Text Editor project page for details. The Web.sitemap file stores only static URLs, so if you have a page like this: Your sitemap breadcrumb will not reflect the fact that you are viewing a an actual news item. If you're like me, you also reflect the breadcrumb in the title of your page. So instead of seeing: Breadcrumb: Home > News > A headline! Title: A headline! : News : My Site Home > News News : My Site Read on for how to solve it. Thanks to Dimitar over at Frag on how to create a wrapper for Firebug's console, I was able to implement better debugging in my jQuery plugin. The one quip I had was that I needed to directly pass everything to the log function. The way Dimitar did it, it wrote a log line for each argument. I was passing formatted strings. Here are the offending lines: for (var i = 0, l = arguments.length; i < l; i++) console.log(arguments[i]); And here's what you replace it with: BAM! Works like a charm. I am working on my new Intrepid Studios website and I came up against a CSS wall. I needed a sidebar that had a "main image" for a design and then list extra images or extra information. However, I wanted it to look cool, so I wanted the image to overlap the header and always appear in the same place. I needed the design to follow these guidelines: Read on fair reader, to see how I solved my problem I am currently working a WPF BlackJack implementation to further develop my object-oriented and .NET skills. I have a great book called VB 2008 Recipes. It’s all sorts of useful and I recently came across a super great way to manage my annoying collections of cards, players, etc. in the game. Instead of implementing interfaces like IList or IEnumerator for, say, a Hand of cards, you can create a variable/property called Cards with a type List(Of Card). This creates a generic list of objects of type Card (your card class, or any other type of class you want a collection of). Then, as in my case, you can perform some powerful functions that would otherwise take more lines of code to do. For example, in BlackJack an Ace can be valued as either 1 or 11, depending on whether or not it will make the Hand total over 21 (a bust). The way I calculate the total value for a hand, I calculate the total of all non-ace cards and then calculate the total of the Aces based on that other total. Here was the original code I used before implementing LINQ: Dim Cards() As Card Dim hasAces as Boolean = False ' Calculate total for non-Ace cards For Each myCard As Card In Cards Select Case myCard.Rank Case Card.RankType.Ace ' Aces hasAces = True Case Else intTotal += myCard.Value End Select Next If hasAces Then ' Do the same thing as above, only select case Ace ' and figure out the total End If That is a simplified version. Now, witness the power of LINQ combining that Select statement into a single line! Imports System.LINQ.Enumerable [...] Dim Cards As List(Of Card) ' Calculate total for non-Ace cards ' PS. I <3 LINQ intTotal = Cards.Where(Function(c) c.Rank <> Card.RankType.Ace).Sum(Function(c) c.Value) ' Any Aces? If Cards.Any(Function(c) c.Rank = Card.RankType.Ace) Then End If As you can see, WAY more manageable! The reason LINQ can do this is because the System.Linq.Enumerable namespace has Extension methods like Sum, Where, Average, Max, Min, etc. that work with any kind of collection. Previously, I was aware of LINQ to SQL and how great that was, but I didn't realize LINQ also worked with Objects (hence, LINQ to Objects). Like I said earlier, instead of making my Hand class implement an IList, etc. I can just make Cards a property so that when I need to add a card, retrieve a card, etc from an external class, all I need to do is: MyHand.Cards.Add(new Card) or MyHand.Cards(0) If you want more information about LINQ to Objects, check it out on MSDN! From my IDSC 3102: Intermediate Programming class, here is the second program we had to complete. It was a simple Database connection project, but I used and played with a strongly typed dataset. A grading program that allows you to input grades for a select number of students, save changes to the DB, and view a semester report. The report should show a list of students and their cumulative semester average calculated using a specific formula. It should also display a "printable list" for your students to view their grades, showing only the last 4 digits of their SSN. Download zip (165KB)
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929899.62/warc/CC-MAIN-20150521113209-00082-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
8,731
55
https://discuss.elastic.co/t/monitoring-of-private-method-and-other-method-that-are-not-directly-associated-to-an-http-endpoint/147348
code
First thank you for your amazing work on all your products. I've configured an APM server (6.4.0) and deployed the JAVA agent (0.6.2) on some of our apps. Everythings runs good, I have the stats on our HTTP endpoint (Controller). My question is : if I want a more detailled monitoring (for example, private method or method in Service class), should I use the API to create custom Transaction or is there going to be the functionnality in a future release? If the method you want to monitor is already part of a transaction, you can use the API to get the current transaction and add another span to it. We have thought about adding an annotation-based approach to that, but we don't have concrete plans. If you have any suggestions, feel free to voice them Thanks for your reply! An annotation-based approach to define custom span? That's sound great. I think we're going to implement something like that to see how it works I don't know how much infos is avaiable to the java agent, but I was thinking about having a sort of treeview to see the call hierarchy. JProfiler for example give this kind of infos when you ask it to monitor CPU usage : I don't know about the feasibility and the ressource consumption though. As the Elastic APM agent is primarily designed to run with very low overhead in production, I don't think it would be a good idea to create a span for every method call in the application. But we might integrate with a sampling-based profiler in the future. This topic was automatically closed 20 days after the last reply. New replies are no longer allowed.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104354651.73/warc/CC-MAIN-20220704050055-20220704080055-00128.warc.gz
CC-MAIN-2022-27
1,579
13
http://app-mariam-guindo-1.aidpage.com/
code
2 posts - more about me I am a high school graduate seeking for a scolarship.I am Mr. Salif Kouriba from Mali in West Africa.Please if there is any good result to my applications you can reach me through email (email@example.com) Thanks for your help.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860557.7/warc/CC-MAIN-20180618125242-20180618145242-00132.warc.gz
CC-MAIN-2018-26
251
6
https://technet.microsoft.com/en-US/library/ms942185.aspx
code
BizTalk Accelerator for HL7 Management Pack Guide. This document describes how to deploy and configure the sample HL7 Management Pack (MOM Pack). It also describes the integration of Microsoft BizTalk Accelerator for HL7 (BTAHL7) 1.0 Windows Performance Counters and Windows Management Instrumentation (WMI) events with Microsoft Operations Manager 2005 (MOM). BizTalk Server 2004: A Messaging Engine Overview. This document describes the architecture and internal workings of BizTalk Server 2004 as a messaging engine. BizTalk Server 2004: A Review of the Business Activity Monitoring (BAM) Features. This document introduces the BAM features in BizTalk Server 2004. The first two sections of this paper describe BAM and its uses; the last two sections provide more technical detail. BizTalk Server 2004 and Web Services. This paper discusses how BizTalk Server 2004 supports the use of Web services in building solutions. BizTalk Server 2004 Convoy Deep Dive. This paper discusses examples of business scenarios that require convoy message processing, explains convoy theory and messaging, and reviews each included sample. BizTalk Server 2004 Database Sizing Guidelines. This document describes sizing considerations for the Tracking (DTA) database in BizTalk Server 2004. It explains how to use equations and message variables to determine how large the DTA database will become over a given period of time. BizTalk Server 2004 Deployment Guide for Security. This document provides guidelines to help you assess the potential threats to your BizTalk Server implementation, a sample architecture for small and medium-size companies, and a sample Point of Sale solution. BizTalk Server 2004: Monitoring and Troubleshooting. This document describes tools and techniques for monitoring a Microsoft BizTalk Server system on a recurring basis. It also provides general troubleshooting techniques for when you find an anomaly, error, or other destructive behavior in the system. BizTalk Server 2004 Performance Characteristics. This document provides information about the performance characteristics of key BizTalk Server 2004 configurations and components, such as messaging, pipeline, and orchestration. BizTalk Server 2004: Performance Tuning for Low Latency Messaging. This document describes performance tuning for low latency messaging. It explains how to achieve the lowest latency possible for a messaging-only scenario using the HTTP adapter for sending and receiving. It provides details about the software and hardware configurations. BizTalk Server 2004 Technical Guide for Certificate Management. This paper provides detailed information about how to configure your BizTalk Server environment to use certificates for encryption, signing, and party resolution. BizTalk Server 2004 Technical Guide for High Availability. This document contains information to help you understand, plan, and implement a highly available BizTalk Server 2004 environment. Build Better Business Processes with Web Services in BizTalk Server 2004. This article focuses on one Web services specification that is critical, yet has been largely overlooked: the Business Process Execution Language for Web Services (BPEL4WS, or BPEL). Connecting to the Elemica Network with BizTalk Accelerator for RosettaNet. This document describes how to enable Microsoft BizTalk Accelerator for RosettaNet (BTARN) to connect to the Elemica Exchange Server Provider (ESP). Developing Integration Solutions with BizTalk Server 2004. This document provides developers with techniques for designing, developing, and deploying solutions within BizTalk Server 2004. How to Trigger a BizTalk Orchestration from SAP. This document describes the various processes, technologies, and tools involved in exchanging data between SAP and multiple applications. Detailed configuration scenarios are also provided. Implementing Service Contracts with BizTalk Server 2004. This document discusses some of the issues surrounding BizTalk Server's support for Web services, while providing helpful guidance and some practical techniques for implementing existing WSDL contracts in your BizTalk orchestrations. Implementing UAN on BizTalk Server 2004 to Integrate Siebel and SAP. This document presents the concepts behind Siebel UAN and discusses the details of how BizTalk Server 2004 orchestrates the integration between the Siebel CRM application and SAP R/3 to create an order by using the CME_ProcessOrder business process. Microsoft on the Enterprise Service Bus (ESB). This document provides a brief overview of the Enterprise Service Bus (ESB) category and clarifies Microsoft's position. BizTalk Server 2004 and Windows Communication Foundation (WCF) are introduced as a solution for both large and small customers. Risk Scoring with BizTalk Server 2004 and the Business Rules Framework. This document presents an example BizTalk solution in which an insurance company uses the Business Rules Framework to create a risk profile for qualifying applicants. RosettaNet and SAP Integration. This document presents a sample that shows how to integrate a RosettaNet PIP with an SAP system using a BizTalk Server 2004 solution. In particular, this document shows how the 3A4 Purchase Order Request integrates with the SAP ORDERS05 IDoc. Transactions Across BizTalk Server 2004. This document details transactional characteristics of BizTalk Server 2004 and how they apply across components, such as messaging, pipeline, and orchestration. It also describes how to construct business processes to guarantee message delivery. Understanding BizTalk Server 2004. BizTalk Server 2004, an integration server, lets you to develop, deploy, and manage integrated business processes and XML-based Web services. This version of BizTalk Server provides integration between messaging and orchestration, and enhanced security and support for industry standards. Understanding Microsoft Integration Technologies - A Guide to Choosing a Solution. This document provides scenarios for Microsoft integration solutions. With an understanding of the options available, you can simplify the process of choosing the best Microsoft technologies for your company. Using XML Schemas in BizTalk Server 2004. This document covers the basic concepts needed to create XML schemas and explains how they are used in BizTalk Server 2004. Working With BizTalk Adapter for SQL Server. This document provides general knowledge about the BizTalk Adapter for SQL Server. It gives suggestions about when to use the SQL transport and how to retrieve, insert, update, and delete data. It also includes code samples. Writing Effective BizTalk Server Adapters. This document is intended for readers who are familiar with BizTalk Server and have already read the existing adapter documentation included with BizTalk Server 2004. Service Station: An XML Guru's Guide to BizTalk Server 2004, Part II. This article describes BizTalk Server's improved tools and automated support for some of the most common XML integration tasks. BizTalk Server provides a message-oriented approach to connecting systems.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119120.22/warc/CC-MAIN-20170423031159-00354-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
7,110
28
https://www.builtinnyc.com/job/hr/senior-talent-acquisition-specialist/42005
code
Senior Talent Acquisition Specialist Our NYC team is expected to grow by over 100% in the near future and we're looking for an experienced, highly motivated team member to help us build and scale our dynamic US team. As a Senior Talent Acquisition Specialist, you will deliver full-cycle recruiting expertise and consulting by developing proactive strategies to source, attract, recruit and select top-tier talent. Riskified is the world's leading eCommerce fraud-prevention company. We use cutting-edge technology, machine learning algorithms, and behavioral analytics to outsmart eCommerce fraud and help our merchants grow. Riskified has reviewed hundreds of millions of transactions and approved billions of dollars of revenue for merchants across virtually all industries, including a number of Fortune 500 companies. - Manage full life cycle recruiting for senior level roles - sourcing, screening, driving offer process from developing competitive packages to extending and closing - Develop/execute innovative sourcing and recruiting plans; build successful candidate profiles, clarify required job skills/competencies and use the best strategies and techniques to build active and passive talent pipeline - Build strong relationships with senior leadership and hiring managers to understand current hiring needs, priorities and trends - Drive and manage top-notch candidate experience throughout the entire recruitment process - Assist in development and measurement of predictive recruiting metrics - Assess trends and data in the business and industry to continuously improve Riskified’s brand from a hiring perspective, scale recruiting processes and systems, and contribute to the broader talent acquisition strategic planning process. - Identify and manage recruiting events, meetups, conferences and build relationships with partners; represent and be the voice & face of Riskified at job fairs and industry events - Mentor and provide training to fellow peers to continuously develop our team Life at Riskified: We are a fast-growing and dynamic startup with 300 team members between our offices in Tel Aviv and New York City. We value collaboration and innovative thinking. We’re looking for bright, driven, and passionate people to grow with us. Some NYC Benefits & Perks: - Fully-covered medical, dental, and vision insurance from your first day - Stock options for all employees, 401(k) + matching, commuter benefits - Catered lunch, team events, healthy snacks, yoga, pilates, soccer league, and more In the News: Fortune Magazine: 25 Best Workplaces in New York Great Place to Work: Riskified Built In NYC: Best Places to Work in NYC Crain's: Best Places to Work in New York City Built In NYC: How Riskified Has Carried its Brand Across Continents TechCrunch: Riskified Prevents Fraud on Your Favorite eCommerce Site - 5+ years in-house startup experience recruiting for revenue-generating and customer-facing roles (Marketing, Sales, BD, etc) - SaaS is a plus - Solid knowledge of how to leverage various recruitment tools and Applicant Tracking Systems - Comeet is a plus - Strategic and analytical mindset, with a track-record of not only reporting and analyzing key recruiting metrics/data to improve recruitment flows but also contribute to developing a comprehensive recruiting plan and strategy - Excellent time-management and organizational skills and the ability to use independent judgment in prioritizing tasks to meet or exceed deadlines in an ambiguous, ever-changing environment - Demonstrates sense of urgency and effective speed to find and hire the best qualified talent - Possess effective negotiation skills to achieve results
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027331228.13/warc/CC-MAIN-20190826064622-20190826090622-00096.warc.gz
CC-MAIN-2019-35
3,671
30
https://documentation.cloud-iam.com/faq/rolling-upgrade.html
code
FAQ - Rolling upgrade What does zero downtime mean? It refers to the ability of an application to maintain uninterrupted operation, even when updates or deployments are performed. This involves the implementation of redundancy mechanisms to ensure that the application is always available for users, even during maintenance operations. This can improve the quality of service of the application for end users by ensuring that the application is always available for them, even during maintenance operations. Do not confuse zero downtime with hot reload, which is a feature that allows developers to reload modifications to the source code of an application without interrupting its execution. This means that developers can immediately see the results of their modifications on the running application, without having to restart the application or even leave their development environment. Zero downtime at Cloud IAM? We guarantee you zero downtime when using our service, for example when updating your configuration or custom extension. The only exception is when upgrading, where zero downtime is totally possible but cannot be guaranteed at 100%.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00025.warc.gz
CC-MAIN-2024-18
1,150
6
https://www.rutlandcountycollege.com/best-universal-sink-clips/
code
It is fairly typical to be perplexed regarding which universal sink clips to buy. This difficulty occurs because to the wide variety of universal sink clips available on the market. To help you choose the finest universal sink clips available on the market, we have produced a detailed guide. 10 universal sink clips: Editor Recommended Our Editor 10 universal sink clips Review: 1. Sink Clips Kit 12 Pack, Undermount Sink Clips, Sink Mounting Kit Bracket, Installation Repair Hardware Clips Fastener Support for Kitchen or Bathroom Sinks - 【Silver Colored Steel Materials】: the undermount sink brackets are made of zinc plated steel, heavy duty steel for longer usage, and elegant silver color to give a better sense of quality for home use - 【More sStable with 12 Pack Sink Clips】: the clips can hold up to 1000lbs sinks, package comes with 12 under sink slips which firmly clamp your kitchen or bathroom sinks(when using a set of 12), ensure the maximum safety - 【Universal Undermount Support】: long rectangle design for universal undermount bathroom sinks, undermount kitchen sinks or countertop vanity, the repair clips kits fix and secure an undermount sink in its place - 【Adjustable After Installed】: the sink mounting bracket set comes with a wing nut fixed design which make the sinks easier to be removed or adjusted, support small to large sinks in an adjustable way, making furnishing more flexible - 【Easy to Install】: each sink hardware set includes 1 x anchoring post, 1 x clip, 1 x wing nut; Epoxy may be required, no other tools or drilling needed for installation, easy to set up and use 2. Undermount Sink Bracket Clip, Universal Heavy Duty Epoxy Undermounting Sink Wash-Basin Support Clamps for Bathroom Kitchen Marble Granite Vanity Countertop Installation and Repair Kit ( 10-Pack ) - 【 Easier Installation Ever, NO Drilling 】 Easy and Quick Sink Installation or Repair, No TOOLS or DRILLING, use epoxy or 100% silicone or liquid nail adhesive - 【 Full Adjustment After Installation 】 Sink Clips can be easily adjusted to perfect positions after installing a undermounted ceramic bathroom sink or stainless kitchen sink - 【 Durable Steel Sturdy Construction 】 Zinc plated steel, 8-10 undermount sink installation kit support sinks weighted to maximum 320 lbs - 【 Universal Under-Mount Support 】 Designed for undermount bathroom sinks and undermount kitchen sinks, marble granite even laminate wood countertop vanity - 【 Saving without Compromising Quality 】 Package of 10 quality undermount sink clip kits for one bargain price. high quality with low cost for your home renovation or repair Additional Info : 3. Hercules Universal Sink Harness Kit 4. PF WaterWorks Universal Lavatory Pop-Up Drain Lift Rod, Linkage, and Spring Clip Kit, Polished Brass, PF0906-PB - Available in Ch, BN, PB, AB, orb finishes - Includes pull rod, linkage, and ball rod clip - Easy install - Country of Origin: China Additional Info : 5. Undermount Sink Clips, Sink Brackets, Epoxy Sink Clips – 10 Pack Kit – Kitchen & Bathroom Sink Supports - ❤DURABLE STEEL MATERIAL DESIGN – The sink clips are made of zinc plated steel with a longer service life; supports up to 300lbs. - ❤BREEZY INSTALLATION – It’s a easy to install by using an epoxy sink. No drilling or special tools required; prevents damage of cabinets and countertop. - ❤ADJUSTABLE TO BEST RESULTS – You can adjust the positioning of the epoxy sink clips both vertically and horizontally to ensure the best results you need. - ❤UNIVERSAL USE – Can be used for Undermount kitchen sinks, Undermount bathroom sinks and so on. - ❤ATTENTION – Make sure the stone top is clean and dry before placing the epoxy. Test fit before gluing to get the best placement. 6. Plumb Pak PP826-83L Clips for Elkay Sink, Stainless Steel - UNIVERSAL DESIGN SINK CLIPS: Ensure the rim of your sink is tightly sealed against your kitchen or bathroom counter - VERSATILE COMPATIBILITY: Universal design clips are made for use with Elkay sinks and other sinks - DURABLE STAINLESS STEEL: Stainless steel construction provides long-lasting durability that is built to last - EASY INSTALLATION: Clips use “U” channel brackets and come with easy-to-follow instructions for convenient installation - IDEAL SIZE: Compatible with up to 1.5″ countertops to create a perfect fit Additional Info : 7. Plumb Pak PP826-84L Sink Clips for Franke Stainless Steel Sinks ( Pack of 8 ) - Sink clips - For top mount stainless steel sinks - Fits most franke, kindred, and noble series sinks - 8 per pack Additional Info : 8. PF WaterWorks PF0903 Lavatory Replacement (Universal, Moen, Pfister) Clip Pop-Up Drain Repair Kit-Threaded Adjustable Center Pivot Rod, Gasket, 3 Sizes of Balls, Chrome and Gray Nuts - UNIVERSAL– Retrofits in most standard ball rod popup drains - ROBUST CONSTRUCTION – Long Lasting Metal Rod - THREADED ADJUSTABLE BALL ROD DESIGN – to Mount Ball Easily and to Adjust Length - EASY, NO TOOLS INSTALL – in Existing or New Pop-Up Drains - KIT INCLUDES –Ball Rod, 3 Nuts (Pfister/Plastic, Gray, and Chrome plated), Gaskets, Three sizes of Balls Additional Info : |Color||Chrome and Gray Nuts| 9. NETGEAR Wi-Fi Range Extender EX3700 – Coverage Up to 1000 Sq Ft and 15 Devices with AC750 Dual Band Wireless Signal Booster & Repeater (Up to 750Mbps Speed), and Compact Wall Plug Design - EXTENDED WIRELESS COVERAGE: Adds Wi-Fi range coverage up to 1000 sq ft, and connects up to 15 devices such as laptops, smartphones, speakers, IP cameras, tablets, IoT devices, and more. - AC750 WI-FI SPEED: Provides up to 750Mbps performance using dual-band and patented FastLane(TM) technology. - UNIVERSAL COMPATIBILITY: Works with any wireless router, gateway, or cable modem with Wi-Fi. - WIRED ETHERNET PORT: Simply plug in game consoles, streaming players, or other nearby wired devices using the one 10/100M port for maximum speed. - SAFE & SECURE: Supports WEP and WPA/WPA2 wireless security protocols. - SIMPLE TO SETUP: Press the WPS button to connect to your router. Use the NETGEAR WiFi Analyzer app for optimal location. Additional Info : 10. Brita Stainless Steel Water Filter Bottle, 20 Ounce, Stainless Steel, 1 Count - Brita’s Premium Filtering stainless steel bottle holds 20 oz of water, and is designed with a Brita filter that fits in the straw that makes water taste great and keeps water cold for 24 hours - Get great tasting water without the waste; by switching to Brita, you can save money and replace 1,800 single-use plastic water bottles a year - This 20 ounce Brita water bottle is made from durable, double wall insulated stainless steel to keep water, cold; this sleek, leak proof design is cup holder friendly; Height 10.5″; Diameter 3″; Weight 1 pound - The filter reduces chlorine (taste and odor) and more with every sip; compatible with Brita water bottle replacement filters - For the freshest-tasting water, the Brita water bottle filter should be replaced after 40 gallons or approximately every 2 months; 16.9 ounce water bottle Additional Info : Important Aspects to Consider When Choosing universal sink clips: How we Picked the Top universal sink clips Most of the items mentioned are not hand-picked. The list was generated by AI. But we can guarantee that every product included here has been tried and tested by real people, reviewed by experts, and recommended by real people. Cost and performance are essential factors to consider when acquiring a universal sink clips. More enterprises entering the universal sink clips market means more options for quality and performance. The most expensive universal sink clips does not always indicate the best decision for you and your money. Many low-cost models offer excellent performance and comfort. A brand with high-quality products and outstanding customer service is the ideal choice for universal sink clips. Good brand products are created with extreme care and precision, and they will always be available to answer your questions, correct any product flaws, or refund your money if any damage is found. Before you click the buy now button or add items to your shopping cart, make sure the product fulfills your requirements. Specs matter while choosing a product. They define the product’s capabilities. With so many options available, it’s vital to pick the correct one. Choose the universal sink clips precision-engineered to fit your demands. Performance, features, and affordability are the three primary factors to consider when comparing specifications. Each of these criteria has a role in your final choice. Considering all of them ensures you got the most value for money. The world is filled of great universal sink clips, making it difficult to choose. A decision can be made by looking at the design. Materials used in manufacture, color scheme, and even visual weighing all contribute to a product’s overall design. Knowing this can help you locate a product that exactly meets your tastes and demands. Many individuals consider customer reviews while making purchase selections. It’s easy to see why: who knows a product better than those who have used it? When deciding which product to buy, looking through customer reviews can give you a good indication of how others felt about their experience. Not everyone will enjoy every product, and some people will be more likely to post a review than others. Overall, customer evaluations are a good reflection of how happy people are with a product. Stability and Control We weighed the stability and control of a universal sink clips in determining its performance. Keep in mind the item’s stability and control. We consider the product’s impact on our lives and how we will feel when utilizing it. Nobody likes to be uncomfortable or constrained when doing what they love. When deciding whether to use a product, consider its comfort universal sink clips. There are various sorts of universal sink clips that provide stability, control, and comfort. If you buy a fishing kayak, you don’t want to spend the whole trip thinking about how badly you want to get out because your back hurts or your feet are tired. The manner a universal sink clips is designed and built, as well as the material used, determine its durability. Select the universal sink clips that can tolerate wear, pressure, and damage. Also, make sure it has a streamlined style that fits everywhere. A busy mom or a construction worker will appreciate this product’s durability. What Are Today’s Most Popular universal sink clips Models? There are many universal sink clips items accessible today for men and women seeking quality and reliability. Every universal sink clips model follows the same essential premise. But they appeal to various users. It’s no secret that certain products appeal to specific populations. What if you could see which products were the most popular across all consumers? You can, and we’ve got the list. Check out our collection of products that appear to appeal to all ages, genders, and locations. How to Choose the Most Popular universal sink clips The three most crucial criteria to consider are price, quality, and popularity. Price is an obvious factor to consider, as you want to ensure it is acceptable for your needs. Quality should also be examined because buying a low-quality goods will not help you achieve your main aim of obtaining the best product. Finally, while not as obvious as price or quality, popularity can be just as significant as both when it comes to attracting new customers. 1: How much is universal sink clips? universal sink clips come in a variety of designs and pricing ranges. It’s difficult to predict product costs nowadays. You don’t know how much something costs because the pricing range is so vast. For example, a pair of pants can range from $20 to $200 depending on where you buy them. Similarly, additional goods like as universal sink clips. 2. Is universal sink clips worth it? We are, without a doubt, a disposable civilization. We’re continually assaulted with ads advertising the latest and greatest universal sink clips. But are they universal sink clips worth our money? Some of them are if you pick wisely! Some, not so much. 3. Is it time to get a new universal sink clips You’re looking for a new universal sink clips. What do you think? It’s difficult to predict future price changes. If there are no signs of production slowing, it can be worth buying now to enjoy your investment sooner. But if output is declining and prices are predicted to rise, you might want to wait until the buzz has died down before making a choice. 4. What is the universal sink clips? Sorry if you’re perplexed. I know it’s not an easy choice! But it’s one of the most crucial choices you’ll ever make. If you’re still unsure which type of universal sink clips is best for you, I recommend comparing the characteristics and functionalities of the universal sink clips listed above. Each has advantages and disadvantages. 5. Why should I buy a universal sink clips? You can tell if you need or want a universal sink clips by looking at your existing inventory. You probably don’t need it and should reconsider buying it. If you can’t get go of the old one, you could sell it and use the proceeds to buy the new one. This is a fun and easy approach to finish your task. Let’s face it, we all want to feel good about our purchases. But there are so many! How can you know which is best? You need not be concerned because Aids Quilt has your back. Our trained staff is here to help you find what works for you. Before making a final decision, you can take advantage of our free consultations.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711064.71/warc/CC-MAIN-20221205232822-20221206022822-00287.warc.gz
CC-MAIN-2022-49
13,745
103
https://www.math.ubc.ca/~jfeng/Publications/Abstracts/12_PRE.htm
code
Hadi Mohammadigoushki, Giovanni Ghigliotti & James J. Feng Phys. Rev. E 85, 066301 (2012) Abstract - We report an experimental study on shearing a monolayer of monodisperse bubbles floating on liquid in a narrow-gap Couette device. The bubbles in such a "bubble raft" coalesce only if the shear rate exceeds a threshold value. This is in contrast to the conventional wisdom that bubbles and drops coalesce for gentler collisions, at shear rates below a critical value. Furthermore, the threshold shear rate increases with the bubble size and the viscosity of the suspending liquid, contravening reasoning based on capillary number. Through visualization and scaling arguments, we investigate several plausible mechanisms for the anomalous coalescence. None explains all aspects of the observations. The most promising model is one based on inertial forces that compress the bubbles radially inward and accelerate film drainage.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737289.75/warc/CC-MAIN-20200808051116-20200808081116-00397.warc.gz
CC-MAIN-2020-34
927
15
http://stackoverflow.com/questions/19226416/create-subclass-just-to-convert-between-different-subclasses
code
It's not the most elegant structure, but it can work--so long as you're dealing with only a few image types. Shifting conversions to be a generic capability of the common base class would be more elegant, and more scalable to additional image types. The downside is that introduces change, and carries some design tradeoffs of its own. Key architectural questions are: - Where? Where do you put the knowledge about how to convert type X to type Y? Inside type X? Inside type Y? Inside a common ancestor? Or within some separate conversion facility? - How? Should X know how to export directly to Y? Or should Y know how to import from X? Or should X export into a generic/common format, which Y then knows how to import from? You can find every one of these options in the wild. Your current design, with conversions inside each image class, mirrors fairly basic data types/classes in many languages; they are each expected to be able to serialize, represent, or convert themselves to several other formats (e.g. to string, to an over-the-wire format like pickle, etc). But if there are more than a few types, writing from-X-to-Y converters will quickly grow unmanageable. You will need n(n-1) conversion methods--"ain't nobody got time for that!" Does-it-all conversion and manipulation suites like netpbm and pandoc, on the other hand, often use a generic intermediate representation. The closest analog I know to your situation, imaging libraries like Python's PIL/Pillow, often define a generic base class (e.g. Image) that take on the role of a generic format / data model, even if they don't have their own on-disk format. Abstractions are invariably imperfect. When you're just dealing with X or Y, inheritance is dandy. But when you need to deal with the intricacies of type X and type Y simultaneously, there's no perfect answer. Decomposing with further classes won't help; nor will multiple inheritance. The paradigm and probably best overall answer is moving conversion up into a base class. But this isn't without its own tradeoffs. The base class then has to know about and accommodate conversions for all possible subclasses. So even when you're converting formats that don't have alpha channels, CLUTs, Z-buffers, gamma-correction tables, HDR-calibration information, and other data/metadata, the base class methods and data structures must know about and deal with such things if any of their subclasses have those things. Pushing conversion up-stack can also lead to ping-pong conversations between base and sub classes (both in the design and at runtime), as the base methods seek to interrogate, or delegate tasks to, the subclasses. But, these concerns about housing conversion up-stack are second-order issues. They aren't too vexing--unless and until you actually encounter them. So net advice is: For a few image types, conversion can reasonably live in each of the image classes. This is especially true if you already have "a bird in hand"--working, tested code that already takes this approach. But if you want to "clean up" the design, shifting import/export/conversion to a base class is more elegant and more scalable to additional image types. (Before you begin that march, make sure you have good unit tests on the existing implementation, so that you can readily qualify the second-generation code.)
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860127407.71/warc/CC-MAIN-20160428161527-00187-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
3,332
11
https://experienceleaguecommunities.adobe.com/t5/adobe-experience-manager/dispatcher-not-retrieving-content-with-vhost-but-will-display/qaq-p/280435/comment-id/55358
code
We have a domain resolving to our AEM environment and we are seeing this issue. A call using the domain "http://staging.thissite.com/page" will not retrieve the content at /content/site/en/page.html however we do get the site custom error page. If the content has been cached previously using "http://dispatcher.url.com/content/thissite/en/page.html" then it will be served correctly using the URL above. So our virtual host redirects are working and do point to the cache location but will not make the dispatcher retrieve the content if not already cached. Our dispatcher logs are set to debug(3) but we are not seeing any entries except for the single call and a 404. The one difference between the two calls that I can see is that during the 404 we are getting [publishfarm/0] and during a successful return we are getting [publishfarm/-]. We are on AMS in Azure. All Apache management is handled there. The process can write and does so for content retrieved from the front end URL. Short URL is created by Publisher with mapping. Using URLwith no cache: [Wed Oct 10 07:56:17 2018] [I] [pid 62524 (tid 139782076208896)] "GET /content/bcbs/ecards/en/viewall/nutrition/healthy-lunches.html" 404 5378 27ms [publishfarm/0] Using URL with previously cached content from the traffic manager URL: [Wed Oct 10 08:00:20 2018] [I] [pid 61026 (tid 140152978441984)] "GET /content/bcbs/ecards/en/viewall/nutrition/healthy-lunches.html" - + 51ms [publishfarm/0] Using traffic manager URL: [Wed Oct 10 08:00:47 2018] [I] [pid 61026 (tid 140153163081472)] "GET /content/bcbs/ecards/en/viewall/nutrition/healthy-lunches.html" - - 0ms [publishfarm/-] So is the issue identified by [publishfarm/0]? We have the domain in publish-vhosts.any and the custom 404 page from the site is returned.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519395.23/warc/CC-MAIN-20210119135001-20210119165001-00324.warc.gz
CC-MAIN-2021-04
1,777
15
https://www.odoo.com/groups/community-59/community-20968212
code
Community mailing list archives Re: Howto upgrade database in Dockerby 2016-10-24 16:01 GMT+02:00 robert rottermann <firstname.lastname@example.org>: > > > On 24.10.2016 14:42, Mario Gielissen wrote: > > Odoo docker image can be upgraded with 'docker run --volumes-from old-odoo > -p 8070:8069 --name new-odoo --link db:db -t odoo', but howto deal with > database upgrade? > > since the databse is not in the docker odoo container but in the one called > db, there is nothing to upgrade I thought the question was about the -u option of odoo. Correct ?
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864626.37/warc/CC-MAIN-20180522053839-20180522073839-00070.warc.gz
CC-MAIN-2018-22
552
3
https://www.mail-archive.com/git-users@googlegroups.com/msg07020.html
code
On Mon, 7 Apr 2014 19:41:27 -0700 (PDT) fpefpe <fpespos...@gmail.com> wrote: > One of my GIT repo got corrupted -- are there any tools to figure out > what when wrong? In addition to what John asked -- what do you mean by "corrupted"? The problem is that this word mean different things to different people. If you mean that Git behaves strangely on that repository and hence you might suspect a faulty storage or filesystem (or both) then the check 1) Copy (literally) the whole project directory onto a filesystem/storage which is in the known good state. 2) Copy it again somewhere else to have a "reference" "post-mortem" Any recovery procedures are then to be taken on the copy obtained on step (1). If you think you've spoiled it during the steps you'll be carying, just replace it with the copy obtained on step (2) and start over. Now the only thing Git provides for you to try to repare a damaged repo is `git fsck` ("fsck" is an ond Unix-y acronym of File System ChecK [*]). You can run this tool to try to recover as much objects as it will be able to. The usual way to call it is with the "--lost-found" command-line option -- see the manual page. After it finished, you'll be able to inspect what it resurrected and possibly scavenge something from that. If not, or it the tool failed you're most probably out of luck. In any case, if you have a clone somewhere it's better to just re-clone the repository. You should only mess with `git fsck` if your repo contained some precious unpushed data you'd like to recover. [*] Yet some people beleive it's named this way because it may fsck a filesystem up beyond any recognition; YMMV. You received this message because you are subscribed to the Google Groups "Git for human beings" group. To unsubscribe from this group and stop receiving emails from it, send an email For more options, visit https://groups.google.com/d/optout.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722459.85/warc/CC-MAIN-20161020183842-00044-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
1,888
32
https://dougpete.wordpress.com/2013/04/11/otr-links-04112013/
code
“Still not convinced Mobile Learning is something your organization should evaluate? Consider these eye-opening statistics published by different organizations such as ASTD, iPass, Towards Maturity and Ambient Insight. Data from their most recent surveys reveals some interesting facts that you might be interested in.” The content of this blog is generated by whatever strikes my fancy at any given point. It might be computers, weather, political, or something else in nature. I experiment and comment a lot on things so don't take anything here too seriously; I might change my mind a day later but what you read is my thought and opinion at the time I wrote it! My personal website is at: http://www.dougpeterson.ca Follow me on Twitter: http://www.twitter.com/dougpete I'm bookmarking things at: http://www.diigo.com/user/dougpete View all posts by dougpete
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991258.68/warc/CC-MAIN-20210517150020-20210517180020-00546.warc.gz
CC-MAIN-2021-21
866
6
https://www.londonscalling.net/sessions/get-hands-on-architecting-solutions/
code
Work with CTAs to understand how to break down and solution a business scenario. In this session we will get hands-on and work through a small business scenario used for CTA review board preparation. We will cover important architectural topics and considerations. Participants will walk away with a better understanding of how to approach architecting solutions and what constitutes an optimal solution. There are no assets uploaded yet for this session
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00737.warc.gz
CC-MAIN-2023-50
454
2
https://customers.worksforweb.com/index.php?/Knowledgebase/Article/View/102/5/activation-email
code
Posted by Lena Kosyakova on 15 September 2009 10:27 AM You changed the message in the Admin Panel -> Site Layout -> Module Templates -> Email Templates -> activation_email.tpl, but the email which you get does not have these changes. There are two templates for activation email. One activation_email.tpl you can see in your Admin Panel, and it is used when the system automatically sends an email to a new user. Another is at /admin/templates/default/email_templates/activation_email.tpl, and you can see it on your server only; it is used when the administrator manually click "Send Activation Email" link for a user. Please make necessary changes to both files.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865830.35/warc/CC-MAIN-20180523215608-20180523235608-00536.warc.gz
CC-MAIN-2018-22
664
6
https://encyclopedia2.thefreedictionary.com/asynchronous+protocol
code
We now describe a minimal set of extensions to the network interface that can be used to remove the need for asynchronous protocol processing from the Base (HLRC) protocol we used in the previous section [Bilas et al. In general, the stronger the agreement achieved by an asynchronous protocol , the easier it is to understand and use the protocol. This paper proposes a new asynchronous protocol named EP-MAC for small energy consumption and short end-to-end delay in wireless sensor networks (WSNs). Existing duty cycling energy-efficient MAC protocols can be categorized into two types: synchronous and asynchronous protocols attempt to conserve energy by allowing sensor nodes to operate independently with a minimum of complexity and without clock synchronization. The asynchronous protocols can be classified into two categories: sender-initiated such as B-MAC , X-MAC , and AS-MAC and receiver-initiated such as RI-MAC , A-MAC , PW-MAC , and CyMAC . This is why the Muller element (or C-element) is extensively used in asynchronous logic and is considered as the fundamental component on which is based the 4-phase and 2-phase asynchronous protocols Quorums, satisfying the Rotation Closure Property, guarantee the intersection even if the cycles of the CRs are not aligned and, therefore, can be used in asynchronous protocols . The torus QS , exploited in this work, represents an intuitive and simple method to employ where a quorum set is chosen by selecting a column of an r x s rectangular The SA switches can be controlled via synchronous or asynchronous protocols . The self-sensing Legacy Mode[TM] automatically recognizes the initialization sequence of previous LCD keys and configures the SA Switches to accept control by existing hardware and software systems.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487635920.39/warc/CC-MAIN-20210618073932-20210618103932-00518.warc.gz
CC-MAIN-2021-25
1,780
15
https://aas.aanda.org/articles/aas/full/1998/13/ds6310/node2.html
code
The notation used in this paper is the following: D Number of detectors in the array B Number of elements (pixels) in the reconstruction projection (measured) data emission density in the image (parameters to be estimated) fji Point Spread Function (PSF) or probability that an emission in pixel i in the source be detected at detector j background in the data readout noise in the data detector gain corrections (flatfield) corrected PSF total detection probability for an emission from pixel i forward projection or blurring operation Qi prior distribution density or default image (if any) let be the corresponding arrays. We shall work with the following imaging model: an object emits light with an intensity given by a spatial distribution . The light is focused by the optical system over a detector array consisting of individual, discrete, independent detectors. Each detector has a different quantum efficiency characterized by a gain correction distribution . A certain background radiation ,coming mainly from the sky but also from sources inside the detector system, is detected along with the spatial distribution . We assume that the detection process is Poisson distributed. Finally, the detector is read by an electronic process which adds a Gaussian readout noise with zero mean and known standard deviation . The imaging equation corresponding to this model is: Most imaging systems are described by Eq. (1), particularly those based on Charge Coupled Device (CCD) cameras, and Image Pulse Counting Systems (IPCS). The background in Eq. (1) is an input in our algorithm. Some authors (Bontekoe et al. 1994; Narayan & Nityananda 1986) have raised questions about the introduction of the background in Eq. (1). Bontekoe et al. demonstrated that the solution depends on the background in standard Maximum Entropy Method (MEM) algorithm. However, in our approach, the background term includes not only light from the sky but also light from sources inside the camera. In the case of a CCD camera, the background term b can be considered as: (Snyder et al. 1993). The term is the external background radiation. The term is the internal background radiation from luminiscent radiation on the CCD chip itself. The term is the number of thermoelectrons that are generated by heat in the CCD and is the number of electrons that are due to bias or "fat zeros". Those terms are all Poisson distributed random variables and their sum can be represented by a single background term. We have not observed in our algorithm the background dependence effect reported by Bontekoe et al. (1994). In our opinion, if the background is large and acurately known, it is better to include it in the equation and in the reconstruction algorithm. Otherwise, it is always possible to set it to zero in the algorithm and reconstruct the background as part of the image. Copyright The European Southern Observatory (ESO)
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487658814.62/warc/CC-MAIN-20210620054240-20210620084240-00317.warc.gz
CC-MAIN-2021-25
2,910
7
https://kibcg.biulandia.pl/dax-multiply-two-columns-from-different-tables.html
code
DAX operators are used to manipulate data in PowerPivot for Microsoft Excel. You can use these operators to add, subtract, multiply and divide. DAX operators are also used to compare values ... May 05, 2020 · I have an interesting challenge that I’m sure there’s a simple solution for, but I haven’t been able to solve it. I have a table from an Azure SQL database which tracks my team’s individual annual goals for billable hours. Different people have different goal amounts, and to further complicate it the goals might change over time. For example, a new hire might have a goal of 5 billable ... Geekvape aegis legend battery door replacement This article shows you how to Split Columns in Power BI with example. How to Split Columns in Power BI. To demonstrate this Power BI split columns option, we are going to use the Text Employee table that we imported in Enter Data article. To split columns in an existing table, please click the Edit Queries option under the Home tab. The two tables must have the same number of columns. Columns are combined by position in their respective tables. When data types differ, the resulting data type is determined based on the rules for data type coercion. The returned table will not contain columns from related tables. On the sales table the product will appear multiple times and so a table will be returned. Because this is a calculated column the row context is automatically defined to be the current row. So DAX says to its self, take the product from the current row, go to the related table sales and return a table of sales that contains only the product as ... Iphone 11 dual sim or not ALTER TABLE table_name ADD column_name column_definition; Example. Note that most databases have a slightly different syntax. Based on the customers table below, add two columns - one column called contact_name that is a char(50) datatype and one column called last_contacted...relationship between two tables under the “Data Modelling” tab. • As you can see above we don’t have any relationship between these two tables. The relationship can be created between these two tables by using the common column between these two tables, so in these two tables common column is “Product”. Question 5 – Multiple AND Criteria Different Column Question 6 – Multiple AND/OR Criteria There is no SUMPRODUCTIF function in excel, but you can use the SUMPRODUCT function to solve one criteria or multiple criteria questions, in the same column or different columns. Feb 07, 2012 · Then there’s a second table, listing Clients and the days that you called each of them: Calls Table: Multiple Clients, and Multiple Calls to Each Client. Desired Result. You want to add a calculated column to that Calls table which contains that client’s effective discount rate on the date of the call: This formula consists of two similar parts, one returns values from List1 and the other returns values from List2. This article explains how to extract values that exist in three different columns, they I am having issues with the listing formula, I have a table as below: S.no Month Date Session Name...Merging two columns in Pandas can be a tedious task if you don't know the Pandas merging concept. You can easily merge two different data These are some approaches to merge two columns in a Dataframe. You can apply the simple addition approach if the data contains numeric values.Nov 03, 2015 · DAX computed the formula for all the rows of the table and, for each row, it computed a different value, as expected. In order to understand the row context, we need to be somewhat pedantic in our reading of the formula: we asked to subtract two columns, but where did we tell DAX from which row of the table to get the values of the columns? SELECT column1, column2, column 3 FROM table WHERE (column1, columnn 2) IN (SELECT c1, c2 FROM table2 GROUP BY c1) ORDER BY column1. I think the problem is in where clause, because it cannot take two columns . DAX understands where these pairs start when you stop referring to column names in the table and enter a text value for a parameter denoted by double quotes. These name/expression pairs specify a column name as the first part of the pair and a DAX expression to evaluate as the second portion of the pair. Or, you can select a single cell in a table column, then invoke 'DigDB->Column->Rounding...', the entire column will be rounded, and the rounded values will show in a new column inserted next to the original column. Rounding is especially useful when you want a fuzzy match between two tables. For example, if one table's column has a value '2.4', and the other table's column has a value '2.2', and you only care if the two values match in the integer part, then you can round up the 2 columns ... How do i get my money back from paypal after 180 days Kubota glow plug relay You can use the Z-score table to find a full set of "less-than" probabilities for a wide range of z-values using the z-score formula. Below you will find both the positive z-score and negative z-score table. In figuring out statistics problems, make sure you understand how to use the Z- table to find the... See full list on docs.microsoft.com In the first table there are sales in our branches, which are in different countries. In the other table, there are countries, and we want to summarize the total revenue there. Lets upload the data to Power BI and create the relationship. Write this formula to a new column in a Dimension table: There is a major flaw in Notion that I hope gets fixed and that is incorporating column values into formulas. At least from what I gather, it requires Grabbing the value of a column is doable on Notion (ie. Count All, Count Values, Count Unique Values, Count Empty, Count Not Empty, Percent Empty... Creating calculated columns in tabular models is deceptively similar to creating formulae in Excel. Deceptively, because the underlying language (DAX) is completely different, and you can make use of functions like SWITCH which have no Excel equivalent. Cubic spline interpolation matlab A data frame is a list of vectors which are of equal length. A matrix contains only one type of data, while a data frame accepts different data types (numeric, character, factor, etc.). It is also possible to select the columns with their names. For instance, the code below extracts two columns: ID and store.Oct 27, 2011 · SQL & PL/SQL :: Multiply Rows From Different Tables? Oct 27, 2011. I have the task that I have to determine the number of parts that need to be produced based on the number of products sold for the day (each product consists of many parts). 4) use the new measure in combination with the new table/column in your visual. Step 1 – Create table with “Others” row. I used a DAX calculated table that does a UNION() of the existing rows for the TopN calculation and a static row for “Others”. I used ROW() first so I can specify the new column names directly. Dec 07, 2009 · In my previous post we looked at how Calculated Columns work in PowerPivot. One limitation you may have noticed though was all of the calculations were done using values in that individual table. What if you wanted to lookup a value in second table, based on a value in the first table, and return a value from that second table. Excel: Multiplying Two Columns? In excel, I want to take one whole column multiply it times another column and have the resulting number show in a third column. I don't want to have to repeat a formula for every cell, I don't want to know how to multiply individual cells- I know how to do that.Once I have the virtual table that’s filtered for customers with multiple product purchase, I’ll then use the COUNTROWS function. The COUNTROWS function will eventually give us the data under the Customers w/ Multiply Purchase column. Now, if I put in see you for customers. See you. You can see him. There you go, the customer table in yellow and it's got all the different columns. So that's how we create a formula. We're referencing each table and the column within the table, Back to products P R o. You can see all the product columns. Aug 21, 2015 · Is is possible to add multiple custom columns to a table in a single step? Especially if you're using a similar function? Say I have a table "Source" with three columns, A, B, C, and D, and I want to create custom columns like this: Webchat link: webchat.freenode.net. Guide on how to join and different IRC clients: /wiki/IRC. Essentially what I want to do is if column A is == small then a new column, lets say D, will be column small * column quantity. Same goes for if A == xsmall except now we multiply by column xsmall.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704847953.98/warc/CC-MAIN-20210128134124-20210128164124-00453.warc.gz
CC-MAIN-2021-04
8,729
22
https://www.inmotionhosting.com/support/questions/communities/1/topics/7274-can-i-control-the-order-of-my-blog-posts
code
Can I control the order of my blog posts? Using Premium Web Builder, I am trying to use blog pages as comment pages for my videos. There will be a dozen or so "posts" (comment headings to match videos) per page. Sometimes I need to change the order of the posts, to match the order of the videos. However, each page automatically places the most recent post at the top.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00481.warc.gz
CC-MAIN-2023-50
369
2
http://bicycles.stackexchange.com/questions/tagged/best-practice+repair
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Suitable remedy for chain damaged by bike shop I've got a fairly old Dawes Discovery 301 (not sure of the year); earlier today I took it to a shop to have a replacement bottom bracket fitted. I rode it 2 miles home, and noticed a slight ... Nov 7 '13 at 20:26 newest best-practice repair questions feed Hot Network Questions Is it bad if all my kittens starve? How can I plot the frequency of list items? How to deal with an advisor who wants a "friendlier" relationship with me than I do? BNF and Simultaneous Parsing Efficiently generating HTML CSS table using Java How do we know that hydrogen gas consists of two hydrogen atoms? Whose underwear is this? Using su - (user) to open privileged port not working Results true in a dimension and false for higher dimensions My employer wants me to write a guide for doing my job What is the correct expression to exactly divide \textheight into n rows? How the conjunctivitis virus spread just by seeing a person's eye who is infected Why do principal investigators not hire grant writers? Did Colorado replace any 420 mile markers with a 419.99 mile marker to deter theft? Getting the number of frequency in a list Can I improve my chess? Or am I too old? Rendering lilypond score into html page Why are Leicester & co pronounced as they are? IOC Containers break OOP Principles Do any clones refuse order 66? Why does the caps lock key have a down arrow as its icon? Cauchy Sequences, not converging to zero How bad is it really to install Linux on one big partition? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657133132.72/warc/CC-MAIN-20140914011213-00336-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
2,155
51
https://support.olafe.com/hc/en-us/articles/115000475247-Thin-Client-Control-Keys
code
The following keys can be used to mange the thin client session with specialized control key combinations: |Display the Zero Toolbar||Ctrl+Alt+UpArrow| |Open a selection box for toggling between the desktop and currently-active connections||Ctrl+Alt+DownArrow| |Lock the thin client|| |Keyboard shortcuts to menu commands|| |Capture the full desktop to the clipboard|| |Capture the active window to the clipboard|| Article is closed for comments.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00360.warc.gz
CC-MAIN-2023-23
446
8
http://ksi.cpsc.ucalgary.ca/KAW/KAW96/gil/node12.html
code
The previous section compared EXPECT with SALT as a prototypical representative of role-limiting approaches to KA using the propose-and-revise strategy. This section compares EXPECT with more recent work in knowledge acquisition. Some recent approaches to KA support knowledge-based system construction by offering libraries of smaller-grained role-limiting strategies that can be composed to create the overall problem-solving strategy. Such is the approach taken in PROTEGE-II [Puerta et al., 1992], DIDS [Runkel and Birmingham, 1993], and SBF [Klinker et al. , 1991]. Modifying a problem-solving strategy involves changing one component for another one in the library. These frameworks allow a wider range of modifications to a system than tools that use a monolithic, unchangeable problem-solving structure. However, the kinds of modifications are still limited to what the compositions of different components allow. EXPECT allows even finer-grained modifications to the problem-solving methods, by adding new substeps and defining new methods to achieve them as we showed in Section 5. The composable role-limiting approaches provide very limited support if at all to a knowledge engineer who is trying to write a new problem solving component for the library. EXPECT represents the methods in a language that the KA tool understands, so it can support the user in making these changes. In addition, EXPECT's approach requires building only one single KA tool. In fact, in working out the examples shown in this paper we did not need to change the KA tool or to add new errors to those that were already defined in EXPECT. The PROTEGE-II and DIDS research groups participated in Sisyphus and have implemented the propose-and-revise strategy [Schreiber and Birmingham, 1994]. This allows making a more detailed comparison here. The DIDS framework supports several interesting features that we do not currently support in EXPECT. DIDS uses the flow of control specified by the problem-solving strategy to determine in which order to acquire each type of knowledge. This order helps in coordinating the KA dialogue for each of the individual methods. We could extend EXPECT to impose an order on the requests to the user based on the subgoal expansion sequence for a method. Another interesting feature of DIDS is that it allows incorporating special-purpose KA tools, such as CAD-based acquisition tools that allow users to specify knowledge through drawings. EXPECT does not have a mechanism to integrate such tools. PROTEGE-II includes a suite of tools for editing ontologies. Using the ontological definitions, these tools can automatically generate customized editors that are accessible to domain experts. EXPECT currently has very limited capabilities to edit factual knowledge, and could benefit from tools that organized requests to the user using appropriate structures. The library of PROTEGE-II includes not only the problem-solving strategies but also method ontologies that describe the kinds of domain-independent knowledge used in the strategies. These method ontologies are then linked by hand to the domain-specific ontology of the application through a specific language that is used to compile the ontology links. In EXPECT, the method ontology would correspond to the upper part of Figure 1 and the domain-specific ontology to the lower part of the figure. EXPECT uses the same language to represent both, and both ontologies are linked when the domain-dependent terms are made correspond to the domain-independent ones. The KA tool can detect missing links because it can reason about the way factual knowledge interacts with problem-solving knowledge and detect when the appropriate subgoals are not invoked. A strong emphasis in both of these approaches is knowledge reuse, i.e., using the same component of the library for different problem-solving strategies and in different applications. Reusing a component in the library would be equivalent in EXPECT to invoking a top-level goal that corresponds to a whole problem-solving strategy (for propose-and-revise that goal would be (solve (obj (inst-of cs-problem)) (using (spec-of propose-and-revise)))). EXPECT could benefit from representing the methods that are currently part of these system's libraries so that they could be used to bootstrap the creation of new knowledge-based systems. TAQL is a knowledge acquisition tool for weak search methods, i.e., problem-solving strategies that are more generic than something like propose-and-revise [Yost, 1993]. TAQL is not targeted for domain experts, but for users that have programming skills. TAQL provides a language that allows users to define different kinds of problem-solving strategies. The knowledge roles that need to be filled out for these strategies are generic roles that are not dependent on the specific strategy defined but on the search framework underlying TAQL. Like EXPECT, in TAQL the KA tool is strategy-independent and can provide guidance that is based on principles that have broader application than role-limiting approaches do. Some of the errors that TAQL detects correspond to errors detected by EXPECT. For example ``forgetting to design a problem space'' in TAQL corresponds to an error in EXPECT that a method cannot be found to achieve a goal. Unlike TAQL, we believe that the guidance provided by EXPECT is accessible to an end-user that is trying to fill out knowledge roles. Other work in KA that has studied problem-solving strategies (including propose-and-revise) concentrates on knowledge modeling issues [Wielinga et al., 1992, Domingue et al., 1993]. EXPECT's KA tool is an implemented system to support users in knowledge base refinement and maintenance.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479838.37/warc/CC-MAIN-20190216024809-20190216050809-00578.warc.gz
CC-MAIN-2019-09
5,729
8
https://list.libresilicon.com/pipermail/libresilicon-developers/2019-April/000705.html
code
[Libre-silicon-devel] Device security - Help wanted Luke Kenneth Casson Leighton lkcl at lkcl.net Mon Apr 15 14:19:41 CEST 2019 On Mon, Apr 15, 2019 at 11:50 AM Philipp Gühring <pg at futureware.at> wrote: > So my conclusion back then was that if we cannot find a way to do it > reproducable in parallel, that we would need at least a reproduceable way > that is single-threaded, so that the user could choose between fast and > non-reproducable or slow and reproduceable. the design of alliance / coriolis2 lends itself to this approach, by being mostly programmable. configuration files are actually python code snippets, written with a syntax that is so basic that it might as well be a .txt file. by working recursively to create progressively larger cells - some of which may be programmatically generated (yes, using python to specify placement as well as routing), some of which may call on the assistance of the auto-router, some of which may have involved manual placement - it becomes possible to perform the reproduceability that you describe *and* also not end up in heavy compromise situations, because, overall, there are so many sub-tasks that even if some of them need to be single-processor tasks, the entire design does not. More information about the Libre-silicon-devel
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358203.43/warc/CC-MAIN-20210227054852-20210227084852-00134.warc.gz
CC-MAIN-2021-10
1,290
22
https://forums.funcom.com/t/cant-create-file/30676
code
When starting the SWL launcher / updater i get an error message saying it couldnt create a file and i should try again. When i try again I have to download 12+GB to start the game. Does anyone else have this problem ? Yesterday I had the same problem. After the download i can start the game normal without any issues. Edit: Restarting PC + launcher does nothing, I still have to download 12+GB.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369512.68/warc/CC-MAIN-20210304174506-20210304204506-00310.warc.gz
CC-MAIN-2021-10
395
3
https://learnit.itu.dk/local/coursebase/view.php?ciid=862
code
AbstractThis specialisation focuses on theories, practices and methods from Human Computer Interaction and Interaction Design and enhances the students ability to critically analyze, understand and develop interactive technologies through hands-on experiments in a studio workspace. In the first specialisation module, ‘Designing Interactions’, the students will engage in design and programming of interactive prototypes based on research areas in HCI and Interaction design. The specialisation offers an advanced approach to researching and creating interactive artefacts from digital, physical and hybrid points of view. The first part of the specialisation focuses on analysis and exploratory design of mobile, web, and physical technologies, exposing students to different technologies and design briefs. specialisation enables students to innovate existing interactive products, and take a lead role in defining features for products and systems and set product development strategies. Job profiles in interaction design include design product manager, creative technologist, design consultant, interaction designer, or industrial design researcher. will cover (for instance, but are not reduced to): • Physical Computing (Arduino and similar) • Networking Technologies (MQTT, PubNuB) • Ubiquitous Computing • Embodied Interaction • Speculative Design Formal prerequisitesThe course builds upon knowledge from the courses of the 1st semester of the KDDIT programme and students should have completed those courses or obtained similar knowledge elsewhere. This course is part 1 of the Designing Interactions specialization. Intended learning outcomes After the course, the student should be able to: - Identify and apply theories, methods, and tools for analysing interactive qualities of digital products and applications. - Design and program interactive prototypes. - Reflect and theorize on the nature of interaction with interactive systems and technologies. PART 1 : 'Designing Interactions' The first part of the specialisation focuses on historically important theories in interaction design, methods for developing and analysing product interaction, and hands-on interaction design projects in which novel interactions are programmed and prototyped. It will particularly emphasise designing and programming interactive web, mobile, and physical technologies. Designing Interactions provides students with a solid theoretical backbone, a vocabulary to articulate qualities of interactive artefacts, methods for approaching designing interactive systems, and the technical skills to analyse, explore, and demonstrate working interactive prototypes. Student Activity BudgetEstimated distribution of learning activities for the typical student - Preparation for lectures and exercises: 10% - Lectures: 25% - Exercises: 25% - Project work, supervision included: 30% - Exam with preparation: 10% Ordinary examExam type: D: Submission of written work with following oral, External (7-point scale) D22: Submission with following oral exam supplemented by the submission. Students will submit an individual portfolio Time and dateOrdinary Exam - submission Fri, 20 May 2022, 08:00 - 14:00 Ordinary Exam Wed, 8 Jun 2022, 09:00 - 21:00 Ordinary Exam Thu, 9 Jun 2022, 09:00 - 21:00 Ordinary Exam Fri, 10 Jun 2022, 09:00 - 21:00 Reexam - submission Wed, 27 Jul 2022, 08:00 - 14:00 Reexam Mon, 15 Aug 2022, 09:00 - 21:00
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301670.75/warc/CC-MAIN-20220120005715-20220120035715-00318.warc.gz
CC-MAIN-2022-05
3,434
38
https://libraries.io/go/github.com%2Fmikkeloscar%2Flis%2Flisc
code
lis - backlight daemon lis is a daemon to automatically dim/undim the screen backlight when a user is idling/active, thus conserving energy and improving battery life. - systemd >= 183 lisc set 50% lisc set -5% lisc set +5% lisc status lisc dpms off lisc dpms on SET 50% SET -5% SET +5% STATUS DPMS OFF DPMS ON Response: OK (optional msg) ERROR err msg Copyright (C) 2016 Mikkel Oscar Lyderik Larsen This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400274441.60/warc/CC-MAIN-20200927085848-20200927115848-00092.warc.gz
CC-MAIN-2020-40
1,005
10
https://mspoweruser.com/microsoft-makes-it-easy-to-write-drivers-for-windows/
code
In order to make it easy for developers to write drivers for Windows, Microsoft yesterday released an open source framework Driver Module Framework (DMF). This new framework will allow developers to write simple and structured Windows Driver Framework (WDF) drivers and share code amongst drivers. When developing drivers for Surface devices, Microsoft Devices team developed this framework for internal use. Microsoft is now releasing it as open source to help other OEMs in developing and maintaining quality drivers with maximum efficiency and maintainability. Microsoft also explained some key differences between a traditional WDF and this new DMF-based WDF driver, find them below. - WDF communicates with DMF, while DMF communicates with the driver. - The device context (shown in green) exists independently in each Module and in the client driver-specific code. Each smaller device context holds only the elements that are needed for that Module. No Module can access another Module’s device context. - The WDF callbacks (shown in red) now exist independently in each Module and in the client-specific code. WDF calls into the client driver. DMF intercepts that call and dispatches it to each Module in the tree of instantiated Modules. Each Module handles each callback as it sees fit. Finally, DMF dispatches the callbacks to the client driver’s callbacks. - Finally, note the arrows. The arrows specifically show the flow among Modules and the client-specific code. In this example, client-specific code can only communicate with three Modules: ACPI, Button, and Stream. It cannot communicate with GPIO, FIFO, List, or Thread. ACPI cannot communicate with FIFO, etc. Even without looking at source code, we have a good idea of how data flows in this driver. Learn more about this announcement from the source link below.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00416.warc.gz
CC-MAIN-2023-23
1,836
7
http://back2cloud.com/php-error/php-error-handler-email.php
code
The second parameter specifies where the error is logged: a value of 0 logs the error via PHP's standard error-logging mechanism; a value of 1 emails the error to the destination Specifies the line number in which the error occurred error_context Optional. Each level is represented by an integer value and named constant which can be used by the programmer. Instead, the user sees only the error message, as shown in Figure 13-1. http://back2cloud.com/php-error/php-error-handler-vs-exception-handler.php Alot of it contains many general warnings and notices which do not affect the execution of the code (ie: undefined varilables, or array keys without qoutes). Below is part of my error.php file which handles errors and exceptions in the application. Send an Error Message by E-Mail In the example below we will send an e-mail with an error message and end the script, if a specific error occurs: imp source James says: November 17, 2010 at 07:34 Hey, I'm just about to release an open source project that may interest you. This table shows some of the error-related directives. For more error levels, please check out the reference on PHP Error Levels. Default is localhost $aMParams["port"] = 25; // - The port to connect. The error suppression operator cannot trap parse errors, only the various types of runtime errors. It was really very useful. all mail() does is add the message to the queue(using sendmail or whatever you set in php.ini) there is no reliable way to check if the message has been sent in Php Error Types Hot Network Questions Why is AT&T's stock price declining, during the days that they announced the acquisition of Time Warner inc.? Generating Pythagorean triples below an upper bound What's the difference in sound between the letter η and the diphthong ει? It also provides you the flexibility to customize your error handling strategies by registering error handlers and using exceptions. In your shutdown_function you have the last chance to log PHP fatal errors to file. https://code.tutsplus.com/tutorials/quick-tip-email-error-logs-with-php--net-17322 Something like $this_mail = mail('[email protected]', 'My Subject', $message); if($this_mail) echo 'sent!'; else echo error_message; Thanks! On Linux if you use "sendmail" the "mail()" function just returns the exit status of that command: github.com/php/php-src/blob/PHP-5.6.25/ext/standard/mail.c#L404 There's no reliable way to get the error message afaik. Php Error_get_last Not whether it ultimately gets delivered, but basically whether the domain exists and the address is a validly formatted email address. In other words, errcontext will contain an array of every variable that existed in the scope the error was triggered in. The configuration directives can be set either in php.ini, in a web server configuration file (httpd.conf or .htaccess file), or at run-time in your script using the ini_set() function. asked 5 years ago viewed 2890 times active 2 years ago Linked 0 Notifying of PHP errors 413 How do I catch a PHP Fatal Error 8 Fatal error php Related http://stackoverflow.com/questions/7792394/how-to-email-php-fatal-errors-only PHP not only provides built-in functions for logging and displaying errors, but also for raising them. Php Custom Error Handler current community chat Stack Overflow Meta Stack Overflow your communities Sign up or log in to customize your list. Set Error Handler Php Example Once the full archive is reviewed by an admin, I envisaged it more often than not being cleared, or at least moved elsewhere. even if you have a useful resource please provide link plz share it for me. get redirected here Good job.. But unknown reason, this is always showing the error message on my page ( which the error message show on my question above and the error only able to view when Output buffering to handle errors You have a valid point though and particularly if a high traffic site has a lot of PHP errors, the log file could fill quite quickly. E_STRICT 2048 Not strictly an error, but triggered whenever PHP encounters code that could lead to problems or forward incompatibilities E_ALL 8191 All errors and warnings, except of E_STRICT prior to more stack exchange communities company blog Stack Exchange Inbox Reputation and Badges sign up log in tour help Tour Start here for a quick overview of the site Help Center Detailed http://back2cloud.com/php-error/php-error-handler-404.php If the function returns FALSE then the normal error handler continues. on file uploads) the custom error handler cannot be called since it is not registered at that time. Php Error Handling Best Practices There are three levels of conditions: notices, warnings, and errors. With print_r(error_get_last()) you get something like this: [type] => 2 [message] => mail(): Failed to connect to mailserver at "x.x.x.x" port 25, verify your "SMTP" and "smtp_port" setting in php.ini or ExampleDownload Now if you run the above script you will get Words that are anagrams of themselves To find the number of X completed, when can I subtract two numbers and when do I have to count? Changelog Version Description 5.5.0 error_handler now accepts NULL. 5.2.0 The error handler must return FALSE to populate $php_errormsg. Php Fatal Error Handler Why did they bring C3PO to Jabba's palace and other dangerous missions? share|improve this answer answered Sep 3 '14 at 15:29 demental 748519 add a comment| up vote 1 down vote Take a look at this If you where to set your error Not only does it mean the site visitor gets to see details of your flaws, the chances are that you'll never hear about the problem because users generally just click off Mike says: September 16, 2008 at 09:07 Thanks for putting the effort in to create this nifty utility. my review here James Duddy says: February 10, 2009 at 03:58 Hi, thanks for this - i assume it will work on MySql logs just the same, however what i would like is a Thanks it helped me sort out some issues with a school assignment. Human vs apes: What advantages do humans have over apes? If you set error_log to syslog, the system logger is used instead. Following evaluation by the Seeker, it was accepted and awarded. error_types Can be used to mask the triggering of the error_handler function just like the error_reporting ini setting controls which errors are shown. Examples might be simplified to improve reading and basic understanding.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210463.30/warc/CC-MAIN-20180816054453-20180816074453-00700.warc.gz
CC-MAIN-2018-34
6,401
14
https://release-notes.cloudbees.com/release/38/1.609.1.1
code
Upgraded Jenkins to the 1.609.1 LTS release. Most bundled plugins updated. See individual components for details. New license manager provides an easier-to-use license and evaluation experience and supports new plugin tiers. Job promotion allows you to test jobs on one client master and then promote them for use on another client master. Cluster-wide job triggers allow a job on one client master to trigger jobs on another client master. Shared configuration snippets allow CJOC administrators to centrally control master configuration and reduce duplication across masters. EC2 Shared Slave Configuration allows you to share EC2 cloud slave configuration between multiple masters. Docker Shared Slave Configuration allows Docker slave configurations to be shared between many masters connected to CJOC NullPointerException when promoting a job to CJOC's root RPM installer violates Linux packaging guidlines Verbose logging in CJOC when unconnected client masters post analytics. VMWare machine center renaming not reflected in general Clouds configuration HA may fail on IPv6 only machines Remote job picker doesn't display any details on the details link Configure analytics and reporter on JOC without specifying reporter feeder URL results in exceptions Docker Shared Cloud Configuration is not bundled in the war After promoting some plugins, I click on "Last complete Promotion" on an update center and receive a "promotion.log not found exception" Many exceptions are logged when CJE is connected to CJOC using "Push connection details" If you copy folders or jobs on client masters manually then you will need to ensure that you remove any unique-id.txt files that are present in the destination after the copy. Pre-flight validation may be false-positive if a job gets updated during the job promotion Promote-jobs: Pre-flight validation is too aggressive, promotion fails on default installation Promote jobs destination cannot be renamed Multiple communication errors in logs when connecting a client master
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540532624.3/warc/CC-MAIN-20191211184309-20191211212309-00351.warc.gz
CC-MAIN-2019-51
2,022
23
http://www.bjorn3d.com/forum/archive/index.php/t-42500.html?s=805ab1a4aeb66f1f0748ab3d27e5e11b
code
View Full Version : what about this one 12-06-2012, 02:40 AM 09:24:19:WARNING:WU00:FS02:Server did not like results, dumping what it mean 12-06-2012, 04:29 AM Possibly a bad work unit or a server glitch. 12-06-2012, 08:10 PM I have come across the "Server" error in a few other forums and most of the time is is associated with a bad project. Forgot to add this:http://fah-web.stanford.edu/pybeta/serverstat.html You might be able to see if server is screwing the pooch. Powered by vBulletin® Version 4.2.0 Copyright © 2013 vBulletin Solutions, Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00014-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
572
11
https://nybassfederation.com/forums/topic/buy-snovitra-super-power-online-cheapest-price/
code
The hottest news in the world of medicine – best drugs of the year! 10% off on ALL products Buy snovitra super power online, cheapest price! Random Internet Quotes: Sale of dollars, home. Which will also known about spam and more hmm, the electronic prescription service: none powerplant service eps from your power. At a clinical or operating from fake online pharmacies do not harming your privacy. Buy snovitra super power online steroids products to treat and organs by taking that there’s very few friends that those companies if you personal lamb your pets’ care pet loss in proteins. Vitamin d3 specially formulated in any necessary to be seen how the next international project and biologics regulation and its name alla. I think i like to file an approved treatment by no need a harvard professor, this piece takes its website. In adolescent pediatric endocrinology, the narcolepsy, said. Study design, italy, 1965 no longer being rewarded for pets’ care pet rx …
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103464.86/warc/CC-MAIN-20231211013452-20231211043452-00448.warc.gz
CC-MAIN-2023-50
982
4
https://sharepoint.stackexchange.com/questions/242844/how-can-i-get-the-form-to-just-be-on-the-page
code
I want to make it so that when you come to my page you see the form and fill it out not extra steps. I already created the list and generated a New, Display and Edit form in designer. What web part should I be using to do this? Im using 2013 You can add a Page Viewer Web Part. Display the form and copy the URL. Append "IsDlg=1" to the end of the URL or Query String. Modify the Source= parameter to point to the page you want the users to visit after completing the form.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251700675.78/warc/CC-MAIN-20200127112805-20200127142805-00335.warc.gz
CC-MAIN-2020-05
473
3
https://egeomate.com/supergis-first-impression/
code
In our Western context SuperGIS has not reached a significant position, however in the East, speaking of countries like India, China, Taiwan, Singapore -to name a few- SuperGIS has interesting positioning. I have planned to test these tools during 2013 as I have done with Manifold GIS and gvSIG, comparing its functionality; but for now I will just give a glance to the ecosystem in general. The scalability model denote this system root, which was basically born with SuperGEO, a company that, pretending to distribute ESRI products in Taiwan, realized it was easier to manufacture a product that sell one alien. It is now on all continents, with an internationalization strategy said in its mission: get to be among the Top 3 brands with global presence and leadership in technological innovation in the geospatial context. From there, it seems to be a clone of the ESRI most used applications, such that even the names are almost exactly alike with own adaptations that have come to give added value and of course with very interesting economic prices. The main lines now, they are about to launch the 3.1a version, are as follows: Here the main product is SuperGIS Desktop, which contains the basic routines of a generic GIS tool in aspects like capture, construction, data analysis and maps generation for printing. There are some add-ons that are free for this version, mostly to make the desktop version acts as a client on data served from other extensions. These add-ons include: - OGC client to stick to standards like WMS, WFS, WCS, etc. - GPS to connect a receiver and handle the data it receives. - The client to Geodatabase which supports download layers from Access MDB, Oracle Spatial, PostgreSQL, SQL Server, etc. - Map Tile Tool, with which you can create data that can be read with online applications SuperGIS mobile and Super Web GIS. - Server Client to connect to data served via SuperGIS Server and loads them as layers to the desktop version with the possibility of discussing about these as if it were a local layer. - Image Server Desktop Client, like the previous ones, to interact by overlapping, filtering and analyzing data served from the service images extension. In addition, excels the following extensions: - Spatial Analyst - Spatial Statistical Analyist - 3D Analyst - Biodiversity Analyst. This is striking because it has more than 100 assessment indexes for the animals’ spatial distribution in natural settings. - Network Analyst - Topology Analyst - And with application only in Taiwan there are CTS and CCTS, with which you can make changes to the projections used in this country (TWD67, TWD97) and connect to historical databases of spatial data from Taiwan and China. These are tools for publishing maps and data management in shared contexts. It also allows the desktop version support mobile customer services designed for web versions since SuperGIS Desktop, SuperPad, WMS, WFS, WCS and KML standards. To publish data you have the following applications: - SuperWeb GIS, here are interesting the wizards to create web services with predefined templates based on Adobe Flex and Microsoft Silverlight. - SuperGIS Server - SuperGIS Image Server - SuperGIS Network Server - SuperGIS Globe This is a library of components for application development using standard SFO OpenGIS with Visual Basic, Visual Studio .NET, Visual C++ and Delphi. In addition to the generic version called SuperGIS Engine are the extensions that similar to server versions are parallel to desktop extensions: - Network Objects - Spatial Objects - Spatial Statistical Objects - Biodiversity Objects - 3D Objects - SuperNet Objects In applications for mobile there are some with classic features, others with particularized for end user version: - SuperGIS Mobile Engine for developing applications for mobile devices. - SuperPad for conventional GIS management - SuperField and SuperSurv with capacities for application in the topography area - SuperGIS Mobile Tour very practical to create workflow oriented for tourist destinations including embedded multimedia material. - Mobile Cadastral GIS, this is a specialized application for cadastral managing although is only available for Taiwan - SuperGIS Online - Data Services - Function Services In conclusion, an interesting line of products that although do not fill the endless range of ESRI, represent an economic alternative for the user with more than 25 tools. Now joins the software list we have reviewed.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817187.10/warc/CC-MAIN-20240418030928-20240418060928-00809.warc.gz
CC-MAIN-2024-18
4,484
44
http://lepus.org.uk/about.xml
code
About LePUS3 and Class-Z LePUS3 and Class-Z are formal object-oriented Design Description Languages. They are formal specification lanaguges for modelling non-functional specifications representing the design of object-oriented class libraries, design patterns, and object-oriented application frameworks (What can be modelled with LePUS3). LePUS3 diagrams ('Codecharts', or simply charts) are axiomatized as decidable statements in the first-order predicate logic. LePUS3 is tailored for tool support in fully automated design verification (ie, checking conformance to Codecharts) and program visualization (ie design recovery from source code), as demonstrated by the the Two-Tier Programming Toolkit. LePUS3 and Class-Z are formal Design Description Languages tailored for the following purposes: - Scalability: To model industrial-scale programs using small Codecharts with only few symbols - Automated design verifiability: To allow programmers to continuously keep the design in synch with the implementation - Visualization (only LePUS3): To allow tools to reverse-engineer legible Codecharts from plain source code modelling their design - Pattern verification: To allow tools to determine automatically whether your program implements a design pattern - Abstraction in early design: To specify unimplemented programs without committing prematurely to implementation minutia - Genericity: To model a design pattern not as a specific implementation but as a design motif - Rigour: To be rigorous and allow software designers to be sure exactly what Codecharts mean and reason rigorously about them What can be modelled with LePUS3 LePUS3 and Class-Z relate to languages of the following broad categories: - Object oriented modelling languages (e.g., UML) are (mostly visual) notations that represent the building-blocks in the design of object-oriented - Unlike UML, LePUS3 and Class-Z a formal language that are unpacked in a subset of the (first-order) predicate logic - Unlike UML, Codecharts (specifications in LePUS3) and schemas (specifications in Class-Z) are automatically verifiable - Formal Specification Languages are mathematical languages (such as Z, B, and CSP) used to articulate properties of software systems in a language that lends itself to reasoning and verification. - Unlike these languages, LePUS3 is a visual language and charts therein are decidable formulas. - Unlike these languages, specifications in LePUS3 are automatically verifiable - Logic Visual Languages use diagrams to articulate sentences in mathematical logic. - LePUS3 is a logic visual language geared towards specifications of object-oriented design. - Architecture Description Languages are non-functional, [semi-]formal specification languages used to represent [architectural-]design decisions, normally associated with tools which integrate specifications with their implementations. - LePUS3 and Class-Z are Design Description Languages, not Architecture Description Languages. This means, among others, that LePUS3 is suitable for modelling Java programs and design patterns, not - Program Visualization Notations offer a graphical representation of the program in a higher level of abstraction, normally generated by reverse-engineering the source code of the program (see how this is done by the The building-blocks of object-oriented design Object-oriented programs written in languages such as Java, C++, C# and Smalltalk are encoded in text files ('source-code') which span across many files and directories. The size and complexity of these systems render code-level reasoning prohibitive; we cannot afford to design, understand, and use large systems by reading source code. Instead, we employ design abstractions: mental pictures of course-grained class hierarchies and sets of dynamically-bound methods and their interaction. These building-blocks can be coarse or refined, depending on the level of abstraction. A good specification language must allow us to represent these building-blocks at all levels of abstraction (example below). We contend that a minimal set of conceptual building-blocks of object-oriented design can be observed [Eden 2002], that these building-blocks are amenable to formal analysis (using mathematical logic and finite set theory), and that they can be adequately expressed in a visual formalism (LePUS3). These building-blocks include the following: - Individual classes ("classes of dimension 0") and methods ("methods of dimension 0") - Properties of individual classes and methods ("unary relations") and relations amongst them ("binary - Sets of classes ("classes of dimension 1") and methods ("methods of dimension 1"), in particular dynamically-bound methods Correlations between sets of classes and methods ("predicates") LePUS3 and Class-Z were tailored to model these building-blocks in a minimal vocabulary. - Visuality: Specifications are articulated using a visual language. - Verifiability: Design specifications can be verified fully automatically by a tool (see: the Two-Tier Programming Toolkit). - LePUS3 and Class-Z specifications are turing decidable, meaning that a design verification tool can determine fully automatically whether a given program satisfies the specification, calculating the result in polynomial time and space complexity. In contrast, the main difficulty with other languages has been in the task of proving correctness in practical applications. While formal verification of statements in the majority of formal specification/modelling languages, if possible at all (few specification languages are well-defined, fewer are turing-decidable) is generally a matter of laborious, error-prone manual process. - Scalability: Specifications should model industrial-scale programs using small Codecharts with only few symbols. - One of the biggest impediments to existing modelling notations is the attempt to model the minute details of programs, yielding highly-cluttered diagrams which do not scale. In contrast, the potent abstraction mechanisms in LepUS3 and Class-Z scale well and specifications do not clutter with the size of the program. In particular, small and highly abstract specifications (‘architectural charts’) can be serve as architectural ‘road-maps’ to large-scale software. - Rigour: A formal definition defines the semantics of specifications, the mathematical relation between specification and programs, and allows us to reason rigorously about - LePUS3 and Class-Z are formal specification languages. Each specification (in LePUS3: Class-Z: Schema) stands for a sentence in an axiomatized, recursive (turing-decidable) subset of the 1st-order predicate logic. A semantics is defined using finite structures in mathematical logic, a representation of which (i.e. a relational database of entities and relations) can be generated mechanically from pure source code in programming languages such as Java, C++, and Smalltalk. - Abstraction: A design description language should be abstract in the following senses: It should— - Support early design: A design description language should offer means for modelling unimplemented programs without prematurely committing to implementation - Support genericity: A design description language should distinguish between modelling a design pattern (a design motif) from modelling a specific implementation thereof. Unlike UML, LePUS3/Class-Z specifications distinguish between modelling design motifs (such as design patterns) and specific programs. Distinction is made using the standard mathematical distinction between - Minimality. A Design Description Language should restrict itself to a minimal number of symbols. It need not attempt to model "everything" and avoid the Symbol Safari Syndrome. The visual vocabulary of LePUS3 consists only of 15 visual tokens. - Object-orientation: A Design Description Language should offer expressive abstraction mechanisms that can capture and convey the design of programs and design motifs. - LePUS3/Class-Z specifications can capture and convey object-oriented design decisions in a wide range, - Generic design motifs, such as the 'Gang of Four' design patterns - Concrete programs, including open-source and widely-used large-scale software at varying levels of abstraction in a range of object-oriented programming languages, such as Java Foundation JGraph, Microsoft Foundation Classes (MFC), and Smalltalk-80. - Application frameworks, such as Enterprise JavaBeans and Java
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189472.3/warc/CC-MAIN-20170322212949-00292-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
8,479
124
https://ell.stackexchange.com/questions/195693/alternative-words-and-phrases-for-school-finishing-in-this-context
code
"My school finishes at 4pm." What can be the alternatives for "finish"? This question appears to be off-topic. The users who voted to close gave this specific reason: There's a few possibilities. Some are relatively local dialect things. The last two change the subject to the speaker, rather than the school, but in a lot of situations would be more natural, in my experience.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578624217.55/warc/CC-MAIN-20190424014705-20190424040705-00258.warc.gz
CC-MAIN-2019-18
377
5
http://hvacmarketingtoolbox.com/archives/2477
code
When I was a kid, we had dial-up internet. You would connect your phone cord to the back of your computer tower and it would tie-up the phone line while you stayed connected. That’s one reason some people had more than one phone line in their houses, but these days that’s becoming rare. Aside from the phone connection, you had to pay for an internet service like AOL or Netscape to actually connect to the world wide web. I’ll never forget the ear shattering sounds the computer modem would make whenever it was dialing the number to connect to the internet. When broadband internet was unveiled, it allowed people to pay a set fee for data access with their phone or cable provider while bypassing a web portal like AOL. This also coincided with the rise of wireless internet, or WIFI. Nowadays few people connect with actual cables when they’re browsing the internet. Amazingly enough, I have a thermostat that can communicate with my internet router through my home’s WIFI connection. Once it is recognized on the network, I can control it with my phone or computer. I can set the temperature remotely while I’m on vacation if I want to. However, I’m having issues getting it connected to the router because the menus aren’t as intuitive as I would like. Once I get my new smart thermostat working, I’ll be happy with my upgrade and the tools it puts at my disposal. You can let it run automatically on cycles generated by the system’s AI. This way you can let the system determine the most energy efficient temperatures from one hour to the next.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103037649.11/warc/CC-MAIN-20220626071255-20220626101255-00754.warc.gz
CC-MAIN-2022-27
1,572
3
https://www.mustang6g.com/forums/search/3011098/
code
Does anyone have any experience in getting remote start enabled on the EU/UK Mustang. It needs to be an automatic and from what I've see, you need to change the RTM antenna (located under rear parcel shelf) Get two new keys (with the additional buttons) Program/Pair the keys to the new RTM... If the Ford GT key fob is the same size as the 18-20 Mustang key fob? Where to get one? This is it (I think): Hoping to use the shell and swap out the circuit board from Mustang GT key fob :)
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499524.28/warc/CC-MAIN-20230128054815-20230128084815-00056.warc.gz
CC-MAIN-2023-06
485
8
https://www.trmconsulting.com/jobs/senior-java-engineer
code
Job discipline: Applications Development Job type: Contract (Consulting) Location: San Francisco, CA Sr. Java Engineer Must Have Qualifications: • 8+ years of Java development in backend and is strong with data structures, design skills and scaling • Experience with NoSQL database (Cassandra or Couchbase preferred) • Experience in Kafka is very important • Design, implement, ship and maintain highly visible consumer-facing features • Design and develop realtime, efficient and highly scalable APIs for the entire Playstation Network portfolio • Produce thorough design and development documentation • Work with limited supervision under tight time constraints and changing requirements • Help build a world class team committed to innovation in e-commerce, network advertising and immersive experiences • Lead junior team members and have a strong sense of end to end ownership • Adhere to key principle: code and design for best performance, scalability and resilience • Tackle big data issues with cutting-edge open source technologies. • BS/MS in Computer Science or a related technical field; 7+ years of coding experience in Java. • NoSQL experience, such as Cassandra, Redis, HBase, Couchbase, Solr, ElasticSearch • Experience building and developing Cloud-based applications or services, preferably in AWS • Experience developing high scale, distributed applications • Ability to handle periodic on-call duty as well as out-of-band requests • Strong foundation in computer science with an emphasis in algorithms, data structures, software design and cloud design • Ability to do technical deep dives into code, cloud networking, deployments and architecture, yet verbally and cognitively adept to be able to hold a discussion with various stakeholders
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00136.warc.gz
CC-MAIN-2023-50
1,798
8
https://howthingsworks.com/tutorials/understand-how-to-write-if-statements-in-python-21886/
code
How do you write an if statement in Python? Python Conditions and If statements - Equals: a == b. - Not Equals: a != b. - Less than: a < b. - Less than or equal to: a <= b. - Greater than: a > b. - Greater than or equal to: a >= b. How do Python if statements work? How do you write an if statement with and operator in Python? |and||Logical AND: True if both the operands are true||x and y| |or||Logical OR: True if either of the operands is true||x or y| |not||Logical NOT: True if operand is false||not x| How do you write an IF ELSE statement in Python shell? What does == mean in python? What is an example of an if statement? How is if statement different from if else statement? What is the IF ELSE statement? Is there else if in python? Can you have an if statement inside an if statement Python? How do you combine two IF statements in Python? How do you write an if statement with two conditions? How do you do an if statement inside an if statement? If condition returns true then the statements inside the body of “if” are executed and the statements inside body of “else” are skipped. If condition returns false then the statements inside the body of “if” are skipped and the statements in “else” are executed. Can we write else if statement into one line in Python Mcq? How do you end an if statement in Python? The break is a jump statement that can break out of a loop if a specific condition is satisfied. We can use the break statement inside an if statement in a loop. The main purpose of the break statement is to move the control flow of our program outside the current loop. Can you have 3 conditions in an if statement? What is the syntax of if statement? Do you need to end if statements in Python? How many arguments does an if statement have? Can an if statement have 3 outcomes? Nested IF statement is an IF statement within another IF statement. You can write an IF statement with as many outcomes as you want. What are the 3 arguments of the IF function? - Logical test. This is where we can compare data or see if a condition is met. - Value if true. Defining this argument tells Excel to return a certain value if the condition in the logical test is met. - Value if false.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104585887.84/warc/CC-MAIN-20220705144321-20220705174321-00679.warc.gz
CC-MAIN-2022-27
2,220
37
https://www.phonearena.com/news/Palringo-Gold-edition-for-BlackBerry-and-Pandora-Radio-for-the-Storm-available-now_id4794
code
We have good news for you, BlackBerry users! A Gold edition of the popular mobile IM client Palringo has been released. In short, Palringo Gold edition adds support for Facebook, iChat and QQ to the social possibilities the app is offering. For the ones that are not acquainted with the purpose of Palringo, it is a multi IM client that also supports popular messaging services, such as AOL, Yahoo! Messenger, ICQ, Windows Live and a few others.Next on the list we have the new version of Pandora Radio, specifically designed to run on the BlackBerry Storm . Pandora is a service that helps you enjoy your favorite songs, as well as to discover music you would like, thanks to a rich number of music analyses, carried out by the developers. So, what are you waiting for? Get yourself a Storm, if you don’t have one, and start exploring your favorite part of music. Palringo Gold edition for BlackBerry adds iChat, QQ and Facebook
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154897.82/warc/CC-MAIN-20210804174229-20210804204229-00359.warc.gz
CC-MAIN-2021-31
931
4
http://www.thinkpads.com/forum/viewtopic.php?f=18&t=5070&view=previous
code
I'm considering purchasing a ThinkPad R51 with the following specs: P M 735, 512MB RAM, 80GB 4200rpm HDD, 15 SXGA+(1400x1050) TFT LCD, 32MB ATI Radeon 9000, CD/DVD Multi-Burner, IBM 802.11a/b/g wireless(MPCI), Modem(CDC), 1Gb Ethernet(LOM), UltraNav, Secure Chip, IEEE 1394, 6 cell Li-Ion battery, WinXP Pro I really like every feature except I'm just not sure it would be any good for gaming with a 32MB Radeon 9000. I'm not a big gamer... but would like to have the option to play the newest games with moderate performance. How would this machine handle a game like Doom3 or Farcry? Would they even run? Any input is appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218195419.89/warc/CC-MAIN-20170322212955-00419-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
632
3
http://lists.scribus.net/pipermail/scribus/2005-November/023628.html
code
[Scribus] Required Versions of tkinter and python-imaging? Thu Nov 17 06:58:51 CET 2005 I am working on an Autopackage <http://autopackage.org> of Scribus 1.3 which I will release after Autopacakge 1.2 is out and hopefully find a Scribus developer to maintain it. Regardless, I need a little help getting the required versions of dependencies that Scribus requires. Specifically, I need the required versions of tkinter and python-imaging. Anybody know? Does anyone know how good at backwards compat. these libraries are? Thanks for your help! Need a GMail invite? Email me. Peace cannot be kept by force; it can only be achieved by understanding. -- A. Einstein More information about the scribus
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146066.89/warc/CC-MAIN-20200225110721-20200225140721-00160.warc.gz
CC-MAIN-2020-10
697
15
http://www.ee.columbia.edu/announcements/Bergman_IEEE/
code
Prof. Bergman achieves IEEE Fellow Categories: Research, In-the-news Congratulations to Prof. Keren Bergman for her elevation to IEEE Fellow with the following citation: "for contributions to development of optical interconnection and transport networks". Each year, following a rigorous evaluation procedure, the IEEE Fellow Committee recommends a select group of recipients for Fellow elevation, one of the Institute’s most prestigious honors.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704368465/warc/CC-MAIN-20130516113928-00088-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
447
8
http://support.irise.com/en/articles/73295-internet-explorer-issues-with-definition-center-v10-x
code
Multiple issues have been reported, (v10x) that have shown up in Internet Explorer 11. It was determined the issue is related to Internet Explorer's 'Enterprise Mode'. Check the list of issues reported below to see if turning off Enterprise Mode will work for you. These issues are not reproducible in Firefox or Chrome. Check your browser for 'Enterprise Mode' by finding the building icon in the URL bar: To turn off 'Enterprise Mode' locally, select Tools>Enterprise Mode. The page will refresh and the icon mentioned above will be removed. This step will need to be repeated if you navigate to a different page. Here is more information on how to turn off 'Enterprise Mode'. To remove your Definition Center from the web list, you will need to get your IT department involved. This link can provide further information. To learn more about Enterprise Mode, please see this article. The following are issues reported with 'Enterprise Mode': Group management, removing members: If a user is trying to remove a member from a group, by checking the box next to the user then click on More Actions -> Remove from Group. Nothing happens Group management, adding members: If a user is trying to add a member to a group, by clicking 'Add Members', then selecting the 'Add' button. Nothing happens. User permission management: If a user is listed as the Owner of a project, by clicking 'Add Users' while in the project detail page, then selecting the 'Add Users' button, nothing happens. User permission management: If a user is listed as the Owner of a project, and while in the project details pane, changes the permission level of one of the users. Nothing happens File management: For a file that a user is NOT listed as 'Owner' for, a user who checks the box next to the file and selects 'More Actions' -> 'Rename'. The page skipps all the way to the bottom and they are not able to rename the file. The 'Rename' option was displaying as enabled. File management: For a file that a user is NOT listed as 'Owner' for, a user checks the box next to the file and selects 'More Actions' -> 'Delete'. The page skips all the way to the bottom and they are not able to delete the file. The 'Rename' option was displaying as enabled.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00331.warc.gz
CC-MAIN-2023-23
2,225
12
https://thenewstack.io/the-best-ci-cd-tool-for-kubernetes-doesnt-exist/
code
The Best CI/CD Tool for Kubernetes Doesn’t Exist There is no single, best set of tools for continuous integration/continuous development (CI/CD) with Kubernetes — each organization will use the tools that are best suited for its specific use case. For this reason, the Cloud Native Computing Foundation (CNCF) does not advocate for one toolset over another when it comes to building, deploying and managing applications on Kubernetes, says Ihor Dvoretskyi, developer advocate at the CNCF. However, they do analyze what integrations and support are needed in the Kubernetes core and identify CI/CD trends in the process. “The hardest thing [about running on Kubernetes] is gluing all the pieces together. You need to think more holistically about your systems and get a deep understanding of what you’re working with,” said Chris Short, a DevOps consultant and CNCF ambassador. “There [must be] a greater understanding of what your business is considering key metrics, or some people call it true north, and bringing that into the operations and development world more closely.” In this podcast, we talk with Dvoretskyi and Short about the trends they’re seeing in DevOps and CI/CD with Kubernetes, the role of the Kubernetes community in improving CI/CD and some of the challenges organizations face as they consider the plethora of tools available today. In this Edition: - 1:39: The technical understanding gap in a continuous integration environment. - 5:34: With the changes that these companies are making internally to try and develop a DevOps mindset, where do you see that intersection, what are the technical challenges, and what do you recommend? - 11:27: What’s the complexity that companies are facing in binding these components in a microservices context? - 18:22: Is there a difference in the architecture for spinnaker that’s forcing it to be adapted to Kubernetes? - 21:19: The issues to address and build upon in working with CI/CD and Kubernetes - 27:49: Exploring the concept of operators in CI/CD. Alex Williams: Hello, Welcome to The New Stack Makers, a podcast where we talk about at-scale application development, deployment, and management. I'm Alex Williams, Founder and Editor-in-Chief here at The New Stack, this episode is a part of our upcoming Ebook CI/CD With Kubernetes. I had the pleasure of being joined by CNCF Cloud Native Ambassador Chris Short and CNCF Developer Advocate Ihor Dvoretskyi at KubeCon plus CloudNativeCon earlier this month in Copenhagen, Denmark. Before we begin, I'd just like to say a huge thank you to KubeCon plus CloudNativeCon, our sponsor for the Ebook and podcast. KubeCon plus CloudNativeCon conferences gather adopters and technologists to further the education and advancement of cloud native computing. The vendor neutral event features domain experts and key maintainers behind projects such as Kubernetes, prometheus, gRPC, Envoy, OpenTracing, and more. KubeCon plus CloudNativeCon is a conference under the Cloud Native Computing Foundation, a project of The Linux Foundation. Now, on to the show. Alex Williams: It's Alex Williams with The New Stack, here for another episode of The New Stack Makers. Joining me today are Chris Short ... Hey, Chris, how are you? Chris Short: Doing good, how are you doing? Alex Williams: Good, and the famous Ihor of the CNCF. How are you? Ihor Dvoretskyi: I'm doing good, how are you? Alex Williams: Good. I'm here to talk about CI/CD in Kubernetes. You guys are with the Cloud Native Computing Foundation, because the Cloud Native Computing Foundation is the sponsor of our ebook series on Kubernetes, and this last book we're doing is on continuous integration and continuous delivery. I was just chatting with you guys about what is this shift that we're seeing? What is this that is apparent with Kubernetes that it's forcing enterprises to think through? I hear one thing is this technical gap, this technical understanding is there, but it's just totally different in a continuous integration environment. You used to describe the artifact and then load it up, essentially, Chris, isn't that right? Chris Short: Yeah. The trend I'm seeing is there's a lot of ... not necessarily misunderstanding but this nebulous thing that you're trying to codify now. You're going from this pipeline of the build server builds your artifact, your delivery pipeline grabs this artifact and then deploys it somewhere. Well, now you're grabbing a container, or you're grabbing a configuration, that calls on all these other things, like a Kubernetes deployment, you pull in all these disparate pieces, put it all together, and then off it goes. It's kind of a shift. You're going from nothing to a fully running application, essentially, where before, it used to be, you've got to put in a ticket with infrastructure to get some VMs, you've got to put in a ticket with networking to get all this load balancing and VLANs and everything else configured. Now, it's just ... your boxes are ready to go. If they're running a Kubernetes distribution of some sort, they're already set up. They can talk to the world. All you have to do is plug in your deployment, check in your code, and then off you go. Excuse me. The hard point is that mind shift of ... Okay, now we have to say we care about networking as an operations team and as a development team, now we have to do these things like load balancing and all these other bits and pieces that we never really considered or had expertise in. How do they pull in all these different pieces into one functional group and then send it off? Alex Williams: That's the shift. Everything's ready to go, all you have to do is just basically build out the platform to make it go, don't you? That's the problem, right? That's the issue. What is this new system that you built? How are you seeing this from a community perspective, helping change that kind of ... helping companies adapt and change as social constructs to be able to think from a contextual point of view about how you think of this socially, and how you think about actually enabling and making this process work? Ihor Dvoretskyi: From the general perspective we have to move back to the early ages of devops and pre-devops days and the pre-container days when the operators had to deploy almost everything manually. Switching to the different paradigm with the early and first CI/CD systems with the monolith applications was a big step forward from the previous experience, when again, the operators had to deploy everything manually, and the general operations partners were all completely manual. Today, with the containerized technologies and with the cloud-native technologies, we can see how the general market of the CI/CD systems, how the general ecosystem of the CI/CD systems, devops tools, and devops-related tools is totally different. As Chris mentioned, today you simply build a container. You can build locally, you can build it remotely, you can build some configurations and simply go to a different direction, or you can simply transfer some predefined configuration that you can build in some different place. It's a big shift, and within the ecosystem, we can notice how many new projects have been born during the last few years that satisfy today’s operators and devops engineers that are strongly designed to work with the containers, to work with the containerized technologies, to work with the cloud technologies, and they are totally different from the previously born technologies of 10 or 15 years ago. Alex Williams: The changes, then, that these companies are making internally both try and develop that devops mindset. Where do you see that intersection, Chris, with customers, and what are the technical challenges they're trying to tackle first? What do you recommend? Chris Short: A lot of the technical challenges are easily solved nowadays. Five years ago, it was hard to overcome some of the technical challenges, but now, because of things like Kubernetes and a wide and growing field of CI and CD tools, it's more of narrowing down what works best for you to solve your problems, as opposed to the actual process of change. The harder part, I think, is the cultural shift that's required with it in the sense of, we're not going to wait around on tickets to get done, we're not going to wait around on someone to finish this thing, it's literally everybody's moving as fast as they can towards pushing something out into production. One of the clients I'm working with at the moment is trying very hard to push a full-on ELK stack out into production today. The idea of doing that ... They've had some pieces and parts put in place, but the idea of doing that in a matter of one sprint would have been a completely foreign concept three, four, five years ago. Now you can do it in two weeks, and easily do it in two weeks. Ihor Dvoretskyi: I'd also second the cultural shift, and also, for example, comparing ... I'm coming back to history again. You can probably remember if you've been using some operating systems, some desktop software, 15 or 20 years ago, do you remember how often you received updates to your software? For example, if you'd been using Windows 95, how often have you received Windows updates to your operating system? Today, we are all using mobile phones with their mobile operating systems, for example, and we are using the web applications, and today, we are not receiving updates to these software technologies once per year or once in a few months, but we can receive a few updates in a single day. That significantly changes the culture, the culture of development, the culture of operating these environments, and that is truly one of the major areas where the typical operations and development became devops. Kubernetes and CI/CD Alex Williams: There's this thinking that there's this initial challenge with containers, right? They've historically affected organizations and how they think about translating their current development solutions into Dockerized development solutions, right? We saw that emerge, we saw that people started to understand that better. Now we're starting to see, I would say, more of a sophisticated look, and we're starting to see that adoption spread at organizations. It seems like the social issue is a big one. Now it also seems like there's this gap in the technologies themselves where there's been a long reliance on continuous integration using platforms and technologies like Jenkins, but now, in this new world of Kubernetes and CI/CD, we're looking at a lot more raw data that's available, and we're seeing the use of graph databases like Prometheus to help provide some better monitoring and observability. What are the gaps that you're seeing in the tool sets now that are going to be important to be addressed as continuous integration, continuous delivery spreads more to the mainstream IT organization? Ihor Dvoretskyi: I can notice one ... I'm not speaking right now about the technology gaps, but I'm speaking on the gap from the open-source world perspective. Speaking about the cloud-native world and about the projects that landed with the Cloud Native Computing Foundation, today, we have almost every project for every single purpose that you may have in the container world. Fortunately, we have CI/CD-specific projects in this ecosystem. That moves the consumers, operators, and the companies that like to use these technologies to select some proprietary technologies, probably to use some open-source technologies, but they can be ... nobody from the open-source world can guarantee that they will, despite their desire in the real cloud-native compatibility. I would say that is the market, the open-source market gap. Alex Williams: Okay. Chris? Chris Short: The hardest thing is gluing all the pieces together. I think CNCF is doing a good job of finding projects that can work very well together, adding them to the CNCF landscape, bringing them into the sandbox and saying these things should work together with each other very well in their specific functions. You mentioned Prometheus. You can feed anything into Prometheus. I've seen people using Prometheus to feed in AWS billing data and correlate that with their usage, traffic, other metrics to get their business logic out of Prometheus faster. They understand what their business needs, what metrics are very important to them and their applications, and to do that out of the box, that's pretty hard. There is a knowledge gap that exists as far as going from that traditional, you mentioned Jenkins, deployment model, I mentioned deploying Java apps, for example, to this new world of ... whether you're running a cloud inside your own datacenter or cloud with a provider of some sort, taking all that data and actually correlating it with all these different business metrics, there is a greater understanding of what your business is considering key metrics, or some people call it true north, and bringing that into the operations and development world more closely makes for a more challenging job for the typical people that for years were like, "I do the Linux," or, "I do the network." Chris Short: The hard part for a lot of people is that they've had these huge support contracts with one company that, for a lack of a better term, was some kind of value-added reseller or a big service provider. That company did all the gluing together for them. Now it's very much they have to get down and understand how to communicate with different APIs, the different tooling that is required is ... it's no longer, "Oh, I have to have this thick client installed to interface with this huge application that does all of our orchestration for us," now it's just in cURL, Postman, or whatever API integration tool you want to use to just test things out and say, "When this event occurs, push it this way. When this change comes into the infrastructure, do this." You need to think more holistically about your systems and getting a deep understanding of what you're working with. That is the biggest challenge. The glue is very much a ... it could be a simple, "This API needs to send this data to this API when this event happens," to, "How do we move from Jenkins to some kind of different CI/CD tool that can better manage these cloud-native primitives simpler and more effectively?" That's where I think things like Kubernetes is great at helping you make things live in production, but there needs to be that understanding on the backend to come in and say, "You can't just take your own tooling and expect it to work the same way." Tooling on Kubernetes Alex Williams: Ihor, that must be leading to a lot of new tools that you're seeing emerge, isn't it, to help with this process? Ihor Dvoretskyi: Exactly. The market is growing. The landscape of the open-source tools related to CI/CD, and CI/CD systems through the last years. Alex Williams: What are specifically some of these tools trying to solve ... that help solve this problem that Chris is talking about, where you might have previously been working with one organization, maybe it's a consulting group or a systems integrator who was doing this for you, and now you're responsible for it yourself? What are the tools that you're seeing them use? One thing we're hearing is there's a lot more need for tools that have better observability. Ihor Dvoretskyi: I would say that all these tools today have two major requirements. First of all, they have to work natively with version control systems, especially with Git. Almost every organization is using Git in some different way, so it can be GitHub, for example, for some open-source projects, or GitLab for the private projects. I would say that more than 90 percent of source control systems today in the market are related to Git, and all these systems have to work with it natively. Another challenge, as Chris mentioned, is about native compatibility with the containerized technologies, especially Kubernetes. Again, to see Kubernetes as highly dominating technology in the container world. It could be even more dominating in terms of the share, comparing even to Docker, because Docker, it's usually been used as simply a daemon and the container runtime, while Kubernetes is much bigger. Kubernetes is not only the technology, not only the project, it's the huge ecosystem itself. I would say that these are two major areas where these technologies have to be native enough and have to work in a desired way if they'd like to be successful today. Alex Williams: Chris, do you see any other requirements that are critical? Making it native with Git seems critical. Almost every organization is using Git in some way. Any other thoughts on what's going to be needed? Chris Short: I think the biggest thing is that whatever you're deciding to use for your cloud infrastructure, whether it be AWS, Google Cloud, Pivotal, the tooling has to work with that very well. You're not going to take something that's designed specifically, and not many people are making tools designed specifically for one cloud provider, and they're trying to shoehorn them in with another. They're going to look to, can you work with Git, GitHub, GitLab? Can you work with AWS? Can we push our tooling and infrastructure changes out through these disparate tools? They're not going to say, "We have these favorite darlings any more," they're going to say, "These are our requirements specifically," based off the choices they've made. If it doesn't support that, it's not even going to get looked at, which is, I think, a big shift than when I first got started in IT. If it didn't come from HP, Microsoft or Dell, it didn't even get looked at, whatever organization your company decided to pair up with, that was it, that was the Holy Grail. Now you can do anything you want so long as it works with the choices you've made in the past. Alex Williams: What are you seeing as popular? What are some of the use cases you're starting to see emerge, Chris? Chris Short: I see a lot of people that are trying to move from 100 percent on-prem into more of a hybrid environment or a cloud environment that's on-prem. I see a lot of people latching onto GitLab CI. I see a lot of people latching onto more lightweight CI tools. The idea of the CI pipeline having some overarching team that admins it is gone. Everybody's contributing equally to improving that pipeline delivery platform so that it enhances services to users, and those users are often paying customers, in that case. The tooling that's emerging is from the on-prem side. It's a lot of stuff that you can run in your infrastructure as-is. On the cloud side, it's so expansive now. You're seeing a lot of tools like Spinnaker and other thing coming out of companies getting open-sourced and then pushed into either CNCF or some other open-source forum of some sort to get an adoption that the community then forms around and improves those products respectively. It's an interesting world to live in now with everything just kind of saying, "Okay, we can develop this internally, but what if we open-source it? That'll make it better." Ihor Dvoretskyi: Spinnaker is one of the best examples of this. Ihor Dvoretskyi: Spinnaker is one of the best examples of this when the single company is using some technology internally, but they are open-sourcing it, and it becomes valuable to everyone in the market. Today, Spinnaker’s technology is one of the most popular technologies in the CI/CD world today. Alex Williams: We write a lot about Spinnaker in the book. One of the criticisms I hear about Spinnaker, though, is that it's built with a different type of ... It was built in a different context, right? It doesn't fit exactly into the architecture that represents Kubernetes. As I understand, it's more of individual identity versus the identity of the node and everything else. Is that correct? Is there a difference in the architecture for Spinnaker that's forcing it to be adapted to Kubernetes? To take it a step further, we're working integrated with Kubernetes better. The Spinnaker open-source that allows for that thing to happen, the change to happen, the Kubernetes tooling, it's going in its direction, Spinnaker's going in its direction, but they meet somewhere, gracefully, sometimes, in the middle. Sometimes it needs to be shoehorned in, for lack of a better term. The idea that it's ... Yes, it was developed out of a different need and maybe even a different era in cloud computing. That doesn't mean that it's not an effective tool. It just means that your thought process has to shift a little bit. Everybody needs to be a little more flexible nowadays and be willing to be more flexible faster, because that's the world we're living in. No-one waits around for the perfect tool to show up to release their products. They release what's available. Alex Williams: This speaks to the direction, then, of CI/CD and Kubernetes, doesn't it? We're kind of going through the evolution right now, and we're seeing the maturity of these CI/CD environments. If you're going to look at the current state of the market, and then looking forward, what are some of the core issues that you want to address and build upon the success that Kubernetes has had? Chris Short: I think for me, I want to build systems that are, of course, loosely coupled, but easier to use. People say Kubernetes is complex, and it's hard to use, and it's hard to manage. Well, that's kind of fading into the background. That might have been the case two, three years ago, but it's getting easier, especially if you're using a cloud service offering. Even if you're using it internally, it's, okay, you got a problem with the node, well, shouldn't your node be somewhat ephemeral? Unless it's the master, it should be easily replaceable. The idea of making IT and general technology easier to use is something that I've kind of built my life around. Technology should not make our lives harder. Choosing a specific technology should not change the way you do something very basic so drastically that it's harder to use, as opposed to easier to use. That's the whole point of technology. Pacemakers exist to keep people alive. Kubernetes exists to speed up infrastructure changes and change systems more quickly. I think it makes it easier to do that when you look at the overarching goal of what Kubernetes is here to do. Alex Williams: Ihor, we're starting to see interesting developments that come with this evolution of Kubernetes. You were talking about Git and how these systems have to be native with Git, and we're starting to see concepts emerge such as Gitops. Maybe you could help our listeners here understand what Gitops intends to do. Ihor Dvoretskyi: Gitops is pretty simple. It's probably one of the simplest technologies and the simplest concepts in this complex world. It's been originally developed and initiated by Weaveworks, one of the major contributors to Kubernetes ecosystem. The idea of Gitops is pretty simple. It's operations by pull request. So for an operator, the only thing that you should do on the front end is to submit a pull request to your Git system, so with a single action, you can trigger some different actions that will trigger different actions, and so on. It's pretty simple for almost any kind of developers and operators that are using Kubernetes today. It doesn't require some extremely specialized […] as we probably would see before the devops era, when we had the group of people that had been working on operations, and they would then be working on the operations full time. We had a group of people that had been simply developing code. Today, with the tools like Gitops and similar tools, we can have the ability for the developers and for the people who contribute to simplify their typical working time. Alex Williams: Great. That speaks to that Gitops story emerging. I'm curious on how those practices, then, end up affecting the tool development itself, Chris. Do you see that the devops practices like something that I think is really manifested in what we see in Gitops, and do you see that affecting the tool development itself? Chris Short: Potentially. I think Gitops may be ... To me, it's the holy grail of software and infrastructure management. I make this change, I push it, and off it goes. When I say off it goes, I mean there's very little that you have to do to intervene between it and the code or infrastructure change going into customers' hands. It's a little new to say that it's changing the tooling quite yet. I think the premise of it has always been in the background, like that's what people want. A lot of my life has been dedicated to making it possible to do that, and now it's getting down to the point where it's going to become the standard. I need to be able to Git push, and it just handles the rest all on its own. The it is irrelevant to some people, whether it's Jenkins, Spinnaker, Kubernetes, or magical faeries with unicorns running around, they really don't care as long as that Git push gets tested, gets checked for any vulnerabilities or infrastructure changes that are unsafe, and then ends up in customers' hands within minutes, hours, not, "Oh, yeah, we've got to put it through change review, and we've got to do all these things, and it's got to go ... we have to build these Jenkins jobs around it, and all this other tooling has to come out of the Git push. Gitops, to me, I think, has been the underlying state of where we need to be for a while. The tooling that will emerge from what is now possible I think will be simpler, easier to use. Maybe you can tweak some things, but out of the box, it'll fit most use cases very easily. Alex Williams: Looking ahead, we are seeing this shift, Gitops is a great representation of that, but we're also seeing the evolution of these resource ... I call it resource-driven event processes, almost, which is serverless, essentially. We will see, more deeply, integration of serverless into the CNCF, into Kubernetes, and there's a lot of open-source projects out there. You guys now have a serverless working group focused on these efforts. What are the things that we're starting to see with serverless affecting how we think about continuous integration, continuous delivery in Kubernetes? Ihor Dvoretskyi: One of the biggest benefits of having, of using the serverless technologies is almost zero operational cost to use it. From the concept standpoint, it really can be compared to Gitops […], where you can simply trigger some action, something happens behind the scenes, and you simply receive the desired result, or undesired result, probably, but you can work with that. Again, serverless technologies allow your organization, your team and yourself to have almost zero extra operational charges. If you are a developer, you can simply focus on developing the code and pushing one magic button and everything will happen […] and CICD systems that will be focused on serverless and are focused on serverless will globally satisfy this request, this demand. Alex Williams: How about the development of ... We're starting to see ... At KubeCon in Copenhagen, we saw the emergence of this concept around operators. The concept of operators were essentially kind of a ... If I'm managing a very complex Java application, or if I'm a database provider, the controller serves as almost like that Kubernetes control play. Does that have any material impact on how we think about continuous integration, continuous delivery in the context of where we are today? Chris Short: It certainly provides a lot of that glue that we were talking about earlier. It definitely eases that transition, or simplifies the management of those various services. I see this happening very quickly, but the idea of all these operators coming out, especially around KubeCon, the state that I want to be in is these operators are just becoming the standard. We updated MySQL version X, well, here's the new operator for it. We released this new tool, well guess what, it comes out of the box with a Kubernetes operator of some sort. People don't have to figure out, "We've got to use this latest version, but it doesn't have this Kubernetes operator, so now we've got to reconfigure all this stuff or retool some things." No, give us the operator out of the box and make that part of your development and release platform. That way, that glue becomes a Kubernetes primitive, essentially. You're talking SQL or Kubernetes, you're not talking this weird middle layer that you have to configure the two together. Alex Williams: That seems to speak for what's to come. We're going to see more of these declarative environments, such as these operators, that will continue to force us to think about how we look at the overall Kubernetes infrastructure and thinking then about that raw data that's coming out of it and how you can better understand it through monitoring, alerts, and everything else. Chris Short: The integration of operators into the environment as they are—It’ll allow for a lot tighter and potentially faster changes to infrastructure and the underlying services themselves. When I say services, I mean if you have an operator for Kafka or a new database or whatever, you'll be able to have those things running a lot smoother, I think, and the ability for you to accidentally put edge cases into your infrastructure goes away, or gets significantly diminished. The idea of speeding up development, I think, is a huge gain in some of these operators. The evolution of CI/CD and Kubernetes Alex Williams: In conclusion, the CNCF role, you guys' role in the evolution of CI/CD and Kubernetes, what is your mandate for the community? Ihor Dvoretskyi: It's a good question. Chris Short: I think as far as the community goes, as an ambassador, I'm not here to say, "Use this tool, use that tool," I'm here to say, "This is how you can use the CNCF tooling together and solve problems with it in your organization." As far as mandates go, I don't think there's anything specifically saying we need some kind of blessed, perfect, cloud-native, computing foundation solution to CICD. That's not why we're here. Alex Williams: Your job is to be the guide and testing the tools. I guess you mostly spend a lot of time looking at the ... I could probably talk to you for hours on how you go through the process of defining all these tools, their roles, and how you assess them, but we can save that for another time. That seems like a big part of your work, isn't it? Alex Williams: ... understanding the technologies out there and then providing people guidance about them? Ihor Dvoretskyi: It is, not only the guidance but also provide the general understanding and sharing the knowledge, as Chris mentioned. CNCF, we all here are not pushing someone to do something, but we can strongly recommend, provide and advise why this technology is better for your specific use case compared to the different technology can be better for someone else, for the different use case. The second technology still exists in the market and is still available and for some reason, some other people are using it. Chris mentioned that technology A is better than technology B, because all these technologies have some value in this world. Alex Williams: Wonderful. Thank you, Chris, thank you, Ihor, for taking the time to talk to us about CI/CD and Kubernetes from your perspective at the CNCF. We appreciate your support with the ebook. Look forward to seeing you soon in the coming months. There's lots happening in this world, and we'll be looking to you guys for some guidance and perspective. Thanks for your time. Ihor Dvoretskyi: Thank you, Alex. Chris Short: Thank you, Alex. Appreciate it. Alex Williams: You bet. Have a good day. Alex Williams: Huge thank you to KubeCon plus CloudNativeCon, our sponsor for the Ebook and podcast. KubeCon plus CloudNativeCon conferences gather adopters and technologists to further the education and advancement of cloud native computing. The vendor neutral event features domain experts and key maintainers behind projects like Kubernetes, Prometheus, gRPC, Envoy, OpenTracing, and more. KubeCon plus CloudNativeCon is a conference under the Cloud Native Computing Foundation, a project of The Linux Foundation. Listen to more episodes of The New Stack Makers at thenewstack.io/podcasts. Please rate and review us on iTunes, like us on YouTube, and follow us on SoundCloud. Thanks for listening, and see you next time.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00850.warc.gz
CC-MAIN-2023-50
32,652
82
https://innovationwomen.com/event/national-women-in-technology-conference-witcon2020/
code
These events have booked Innovation Women members. Want to see some of our speakers in action? Check out the list below for events near you. The conference features career & leadership, technical, and innovation topics to an audience of 850+ women, ranging from software delivery roles, leadership & management, technical & engineering, and recruiting & sales roles, all supporting technology industries and the amazing people who work in them. This event celebrates the contributions that women have made to computing and other STEM fields, while continuing to focus on how we can work together to improve opportunities for women of all backgrounds to contribute to the next era of innovation. That means you!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00641.warc.gz
CC-MAIN-2023-50
710
3
http://folding.stanford.edu/home/blog
code
In our simulations, we use models (aka “force fields”) of how a protein’s atoms interact physically. Recently, we’ve made an important advance in how to make these models, which will, in time, have a huge positive impact on Folding@home’s ability to make even more accurate predictions. Our paper “Activation pathway of Src kinase reveals intermediate states as targets for drug design” in Nature Communications has just come out. As with Nature journals, it’s unfortunately behind a pay wall, but per NIH rules, it will become open access in a year. The key results in this paper is the use of FAH simulations to understand a key protein target in cancer (src kinase), especially to find new ways to target it for novel drug design. A more technical summary is given in our abstract: Unregulated activation of Src kinases leads to aberrant signaling, uncontrolled growth and differentiation of cancerous cells. Reaching a complete mechanistic understanding of large-scale conformational transformations underlying the activation of kinases could greatly help in the development of therapeutic drugs for the treatment of these pathologies. In principle, the nature of conformational transition could be modeled in silico via atomistic molecular dynamics simulations, although this is very challenging because of the long activation timescales. Here we employ a computational paradigm that couples transition pathway techniques and Markov state model-based massively distributed simulations for mapping the conformational landscape of c-src tyrosine kinase. The computations provide the thermodynamics and kinetics of kinase activation for the first time, and help identify key structural intermediates. Furthermore, the presence of a novel allosteric site in an intermediate state of c-src that could be potentially used for drug design is predicted. The Biophysical Society, an international group that brings together researchers taking a physical perspective on biology, just had its annual meeting in San Francisco. A number of us involved with Folding@home gave talks and/or posters and there was tremendous interest in what we’re doing. So, thanks to all of you for your help in facilitating great science! Through a collaboration with Google, the Huang lab at UST Hong Kong, and the Pande Lab at Stanford University, we’ve been working on a new way to run Folding@home –– through the browser. The primary goal here is to make folding much easier to run, especially for non-expert computer users. Open beta. We are happy to announce that we now ready to release a first open beta test of the web client. It uses Google’s Native Client (aka NaCl) technology, allowing one to run Folding@home in a browser. If you’re curious to check it out, you can go to the FAH Chrome Store link. Note that this only runs in Chrome (minimum version 31). For support questions, we have created a new subforum at foldingforum.org. Requirements. In order to use the Folding App, you need to cover these three basic requirements: 1) Use the Chrome Browser (Details) in Windows, Linux, or MacOS-X 2) Install the Folding App from the Chrome Web Store (Details) 3) Launch the Folding App and you are now folding! Please note that there are some additional options which you can use to enhance your Folding experience: 1) You may configure the Folding App with a username (Details), Team number (Details) and a passkey (Details) though none of these are required. Please note that passkey is needed if you want to earn additional points for successfully finishing the Work Unit (WU) quickly. 2) If you don’t want to install the Folding App, you can always use the direct link in any Chrome Browser installed on Windows, Linux and OSX (Details). Open source. This is the first F@H Client that is fully open sourced. The F@H Native Client (NaCl) uses a new Assignment Server (AS) and a new version of the Work Server (WS) which exposes a JSON interface with additional security for third party developers. The folding is done on a Gromacs (version 4.6.5) based FahCore which is closed-source for security reasons. Third party developers are encouraged to participate in the development (Details) and users can also keep track of open issues (Details). Developers can view the log file generated from NaCl by choosing the console view from the DevTools Window. Next steps. Finally, as many will probably notice, this opens the door to naturally moving Folding@home from the browser on a computer to a browser on a phone or tablet. We are actively investigating those possibilities. Some links to additional related material: I’ll be presenting a webinar on Folding@home open to the public on Tuesday, May 27, 2014 9:00 AM – 10:00 AM PDT. You can register on this link: https://www2.gotomeeting.com/register/688201986. The goals are to talk about what we’ve been able to do so far and where we’re going. Summary. Folding@home is a large-scale volunteer distributed computing project, started in October 1, 2000. For over a decade, new types of hardware (such as GPUs, multi-core CPUs, and PS3) and algorithms have been pioneered in order to make significant advances in our ability to simulate diseases at the molecular scale. Join Professor Vijay Pande from Stanford University for a brief introduction to the goals of Folding@home, followed by the successes so far. Prof. Pande will end with a discussion of what’s being done today, as well as the plans for greatly enhancing what Folding@home can do through new initiatives currently under way. Please note that this webinar starts at 9:00 AM Pacific, 12:00 PM Eastern, and 5:00 PM BST. We’ve been suspicious that the stats system has been undercounting ATI/AMD GPUs for some time now and we have found the issue. We’ve rolled out an update to the stats code and so we expect to see more ATI GPUs showing up in osstats. I recently gave a webinar on OpenMM, the heart of our Core17 for GPUs (and also now more recently, high performance computing on multi-core CPUs as well). Here’s a link if you’re curious to learn more: Our recent work on simulating kinases on Folding@home and the simulation’s use in identifying potential new cancer drug targets has been just accepted for publication in Nature Communications this morning. I’ll post more in the coming weeks with more details after the paper is past Nature’s embargo period. We’ve added a few papers to the Papers page. The most important application result is our work on GPCR intermediates as new possible drug targets. We also have several new methodological advances which are proving important for our work going on right now. Coming up (hopefully) soon will be a paper on new drug targets involving kinases, key protein targets involved in fighting cancer. I’ll be speaking at the NVIDIA GTC on our recent work in cancer. Specifically, it’s talk S4133, entitled “OpenMM Molecular Dynamics on Kinases: Key Cancer Drug Targets Revealed with New Methods and GPU Clusters” and it is scheduled for 50 minutes on Tuesday, 3/25/2014 at 2:30:00 PM in Room LL21E.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999638988/warc/CC-MAIN-20140305060718-00006-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
7,110
27
https://webproxy.diladele.com/docs/install/windows/
code
In order to install Web Filtering Proxy, first download the package installer, double click on the MSI file and follow the installation wizard as shown on the following screenshots. Read and accept the license agreement, provide the Administrator's password and click Install. Wait couple of seconds until the application is installed. Click Finish to complete the installation process. Changes to the System The installer will unpack the executable binaries of the application into C:\Program Files\Diladele\Web Filtering Proxy folder. A working folder will also be created in the ProgramData application directory with path C:\ProgramData\Diladele\WebFilteringProxy. This folder contains application configuration, definition files, temporary folder and logs of the application. The installer will register the Web Filtering Proxy service in standard services snap-in. The installer will also add two firewall rules to built-in Windows Defender Firewall allowing TCP connections from within your local subnet to IP address of the system (ports 8080 and 8443). These rules are required if you need to connect to the proxy from within other machines on your lan. To start the Administrative UI, use the application shortcut in Start / Web Filtering Proxy / Web Filtering Proxy as shown on the following screenshot.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514796.13/warc/CC-MAIN-20210118123320-20210118153320-00144.warc.gz
CC-MAIN-2021-04
1,314
10
https://myitforum.com/sysinternals-sees-first-updates-for-2017/
code
The last time SysInternals tools were updated was in November of 2016. But, despite the delay, the first update release of 2017 is a big one. Microsoft has officially released version 6.0 of Sysmon to coincide with a RSA talk by Mark Russinovich. Here’s what’s new: - Sysmon v6 This release of Sysmon, a background monitor that records activity to the event log for use in security incident detection and forensics, introduces an option that displays event schema, adds an event for Sysmon configuration changes, interprets and displays registry paths in their common format, and adds named pipe create and connection events (thanks to Giulia Biagini for the contribution). Check out the related presentation from Mark’s RSA Conference, “ How to Go From Responding to Hunting with Sysinternals Sysmon.” - Autoruns v13.7 Autoruns, an autostart entry point management utility, now reports print providers, registrations in the WMI\Default namespace, fixes a KnownDLLs enumeration bug, and has improved toolbar usability on high-DPI displays. - AccessChk v6.1 This update to AccessChk, a command-line utility that shows effective and actual permissions for file, registry, service, process object manager, and event logs, now reports Windows 10 process trust access control entries and token security attributes. Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in San Francisco in 2017!
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998986.11/warc/CC-MAIN-20190619123854-20190619145854-00156.warc.gz
CC-MAIN-2019-26
1,468
9
https://mail.scipy.org/pipermail/ipython-dev/2014-February/013279.html
code
[IPython-dev] Embedding IPython in C using Python/C API Sun Feb 23 16:13:58 CST 2014 You may want to look at the various high-level entry points here: It may be more convenient for you to put all the python code you'll need in a file and use one of the file-oriented C API functions. But overall, you're on the right track: IPython has no pure C API, only Python. So you'll need to use the functions to call Python source code from On Sun, Feb 23, 2014 at 1:58 PM, Filipe Saraiva <email@example.com> wrote: > I would like to develop an IPython backend for Cantor, a IDE from > KDE-edu project for several mathematical softwares like Python 2, > Scilab, Maxima, Octave, etc. You can see the Python 2 backend info in > I searched for info on the web about the use of Python/C API and IPython > but I can not find anything. I am thinking in to use PyRun_SimpleString > to send commands to IPython and get the commands output using > stdout/stderr to show this outputs in C side. > I will appreciate any reference to use of Python/C API in IPython. > Thank you; > Filipe Saraiva > IPython-dev mailing list Fernando Perez (@fperez_org; http://fperez.org) fperez.net-at-gmail: mailing lists only (I ignore this when swamped!) fernando.perez-at-berkeley: contact me here for any direct mail -------------- next part -------------- An HTML attachment was scrubbed... More information about the IPython-dev
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861735203.5/warc/CC-MAIN-20160428164215-00080-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
1,397
25
https://www.efinancialcareers.lu/emploi-%C3%89tats-Unis-NY-New_York-Python_Developer.id04005890
code
- New York, NY, États-Unis New York NY US - CDI, Plein-temps - Bank of America Corporation - 21 juil. 18 2018-07-21 Overview & Job Description Bank of America Merrill Lynch is one of Computerworld's top 100 places to work in IT, and Global Markets Technology is undergoing a large organisational and software change. We are moving from traditional application aligned software delivery methods to a highly agile cross functional and component teams. This is one of the most interesting and exciting times to join an organisation like ours. Our culture is one of excellence, teamwork, learning, delivered value and believing in our people. We look for new team members that love to learn and take initiative. If working amongst people who are committed to leading the industry appeals to you, then you need to apply for this role. Our new systems are constructed in Python using Agile & Scrum delivery methodologies with a focus on Test Driven Development. You will be a developer joining our Fixed Income FX Risk technology team in New York. You will be working within an Agile team, developing strategic risk management tools and maintaining existing code for the FX asset class. The code is written in Python leveraging an internally developed framework that supports an internal IDE for developers and offers various foundational components such as messaging, grid computing and true object oriented database for building high quality applications. The next phases of developing risk platforms includes opportunities to be involved in HTML5, React framework and Open Fin amongst other evolving technologies. Our ideal candidate will be responsible for supporting modern agile software development methods. They will contribute effectively in a team atmosphere, connected to the needs of customers and will develop relationships with clients (trades, data consumers). Must haves (in order of priority) - Development experience on Python (preferably) or on any other OO technology (e.g., Java, C#) - Understanding of Fixed Income Products with respect to basic Position/Risk management and P&L attribution - Excellent communicator who runs well in a collaborative team environment - Follows clean code principles (e.g., test driven development) - Experience of Agile methods - Understanding of FX products (FX Spot, Forwards & Options) with respect to Position/Risk management and P&L attribution Enterprise Job Description Responsible for developing, enhancing, modifying and/or maintaining applications in the Global Markets environment. Software developers design, code, test, debug and document programs as well as support activities for the corporate systems architecture. Employees work closely with business partners in defining requirements for system applications. Employees are expected to have in-depth capital markets product knowledge, and manage a high level of risk. Employees typically have in-depth knowledge of development tools and languages. Is clearly recognized as a content expert by peers. Individual contributor role. Typically requires 5-7 years of applicable experience. This job code is only to be used for associates supporting Global Markets. 1st shift (United States of America) Hours Per Week:
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593223.90/warc/CC-MAIN-20180722120017-20180722140017-00252.warc.gz
CC-MAIN-2018-30
3,227
21
http://excelblackbook.com/how-to-highlight-negative-numbers-in-red-using-conditional-formatting/
code
The practice of highlighting the negative numbers is good if you work with a lot of numbers in Excel. This practice makes the data easier to read. There are various methods to highlight negative numbers in Excel. - Conditional Formatting - Inbuilt Number Formatting - Custom Number Formatting Here we will know the procedure to highlight negative numbers in excel through conditional formatting. Procedure To Highlight Negative Numbers in Red Using Conditional Formatting The conditional formatting rules of excel are applied to a cell based on the basis of value. In the conditional formating method, we will check whether the value in a cell is less than 0 or not. If the value is less than 0 then the cell can be highlighted in a specified color, in this case, which would be red. - Go to Home - Select the cells in which the negative numbers are to be highlighted in red. - Conditional Formatting, Highlight Cell Rules, Less Than. - Specify the value in the less than value dialog box. Use the custom format option if you want to use formatting other than the ones in the drop-down. - Then click OK. All the cells selected with values less than 0 would get highlighted in Light Red color with dark red text in it or in the custom format. Using conditional formatting is also helpful to print the reports. The significant difference might not be visible in the font color in a black and white printout, since conditional formatting highlights the entire cell, which makes the highlighted cells stand out. Conditional formatting recalculates whenever there are changes made in excel. The impact is less with a small data set and the impact will be more with a large data set
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00829.warc.gz
CC-MAIN-2023-40
1,676
13
https://www.sciencenews.org/node/15556
code
Older workers vanquish foes in toxic, self-sacrificial burst The likelihood of a worker exploding in a burst of toxins increases with age, at least in a species of tropical termite. Sudden, toxic self-rupture is a mutually destructive move in fights with enemies of the South American termites Neocapritermes taracua, reports ethologist Robert Hanus of the Université Libre de Bruxelles in Belgium. Biologists have described some other termite species with an explosively self-sacrificing caste. But the N. taracua workers blow up in a way researchers have never seen before, Hanus and an international team report in the July 27
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524111.50/warc/CC-MAIN-20190715195204-20190715221204-00398.warc.gz
CC-MAIN-2019-30
630
3
https://docs.edge-technologies.com/docs/appboard-cgi/
code
AppBoard runs on an Apache Tomcat server that can be configured to run CGI scripts. However, enabling CGI can introduce additional load on the AppBoard server and raises it’s own security concerns. This document simply covers enabling CGI but thought should go into the issues mentioned. An alternative is to set up a separate web server environment for custom applications and then include the content via enPortal proxy channels. The default CGI options are as follows: For more information on CGI in Tomcat please refer to the Tomcat CGI How To documentation.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655879532.0/warc/CC-MAIN-20200702142549-20200702172549-00219.warc.gz
CC-MAIN-2020-29
564
4
https://www.tonymacx86.com/threads/guide-install-high-sierra-or-mojave-on-the-dell-optiplex-7010-9010-desktop-pc-revision-ii.251736/page-45
code
No.You mean that i still have to boot from USB ? Could you explain what "select the folders and it showed 0KB means" ?when i run Kextbeast and select the folders it showed 0KB. Is that normal ? Mojave now converts all HDDs to APFS. Sorry.One other thing. I installed mojave in hard disk, not SSD. I formatted the disk in HFS Journalled and proceed with install. After installation i open Disk Utility and see that the hard disk is formatted in APFS. I thought it formats only SSD's. Load Optimized Defaults thanks: Bill888 for pointing this out.after you've flashed the BIOS and before you make any other changes to it. There is a "Load Defaults" tab in the lower central part of the window. Click on that and then click Apply. Go to Boot Sequence and set the Boot List Option to UEFI.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578610036.72/warc/CC-MAIN-20190423174820-20190423200820-00101.warc.gz
CC-MAIN-2019-18
785
10
https://www.prnewswire.com/news-releases/artificial-intelligence-improves-control-of-prosthetic-hands-300929447.html
code
DALLAS, Oct. 2, 2019 /PRNewswire/ -- Scientists from the University of Texas at Dallas announced a groundbreaking new approach for improving control of prosthetics with the use of artificial intelligence (AI) at the 2019 IEEE International Symposium on Measurement and Control in Robotics Symposium this month. The research findings show a huge leap forward in the goal of fully end-to-end optimization of electromyography (EMG) controlled prosthetic hands. There are more than 40 million amputees across the globe, according to the World Health Organization. Recent advances in prosthetic hand and limb technology have greatly improved the quality of life for upper-limb amputees. However, gaps remain in the control of prosthetic hands, specifically in using naturally generated electric signals from the patient's muscles. Natural muscles provide mobility in response to nerve impulses. EMG measures the electrical activity of muscles in response to a nerve's stimulation. This controlling function is currently the most effective and convenient way of controlling prosthetic hands. EMG signals have been used extensively in the identification of user intention to control assistive devices such as smart wheelchairs, exoskeletons, and prosthetic devices. However, the performance of conventional assistive devices is still unsatisfactory. New EMG-based control system research from the University of Texas at Dallas led by researcher Mohsen Jafarzadeh utilizes an advanced form of artificial intelligence and deep learning to control prosthetic hands with raw EMG signals. A major step forward, the research's proposed convolutional neural network without preprocessing results in faster and more accurate data classification and faster hand movements for the user. Researchers also used specific user data to re-train the system, personalizing actions based on user requests. The new control system is implemented in Python with TensorFlow deep learning library and runs in real-time on an embedded general-purpose graphics processing unit developer kit. "Our solution uses a novel deep convolutional neural network to eschew the feature-engineering step," said Mohsen Jafarzadeh, lead researcher, University of Texas at Dallas. "Removing the feature extraction and feature description is an important step toward the paradigm of end-to-end optimization. Our results are a solid starting point to begin designing more sophisticated prosthetic hands." For the study, titled "Deep-Learning Approach to Control of Prosthetic Hands with Electromyography Signals," University of Texas at Dallas researchers led by Mohsen Jafarzadeh used data from two subjects for testing and six subjects for training and validation. Findings showed the proposed convolutional neural network runs in real-time and transmits the user command (signals) to the prosthetic hand low-level controller, with the error probability of zero, making the final product error-free and functional. The research was presented at the 2019 IEEE International Symposium on Measurement and Control in Robotics in Houston this September and published by IEEE. This symposium focused on various aspects of international research, applications and trends of robotic Innovations for the benefit of humanity, advanced human-robot systems and applied technologies in the fields of robotics, telerobotics, simulator platforms and environment and mobile work machines, as well as virtual reality, augmented reality and 3D modeling and simulation. SOURCE Mohsen Jafarzadeh
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662556725.76/warc/CC-MAIN-20220523071517-20220523101517-00559.warc.gz
CC-MAIN-2022-21
3,528
8
http://www.askmehelpdesk.com/3222725-post5.html
code
Originally Posted by f010244 I had a friend of mine (cop) check this guy out before anything, his job is legit. Officers can meet people online, just like any other place, and they have to be just as careful as anyone else. I am trying to be even more careful with this guy than with anybody else, given his profession. Where is this? In my State he cannot be a working Police Officer AND own his own Detective Agency. I'm sure you can see the possible conflict. And would I still be hanging around and waiting for his call? No. What does "be even more careful ... given his profession" mean?
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704368465/warc/CC-MAIN-20130516113928-00023-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
592
5
http://openepolicy.com/openict.htm
code
What Are Open Technologies? Open technologies (or Open ICT), in the most simple terms, are tools of transformation. Open ICT refers to technologies and methodologies such as open standards, open source software, open architectures and open processes. Collaboration. Cost. Control. These are the key benefits that open technologies offer. Standards are basically technical blueprints for designing something. For technology, standards are the blueprints used by developers to design hardware and applications. What makes a standard "open"? At a minimum, open standards are ... - Not controlled by any entity with a vested interest. - Platform independent, vendor neutral and usable for multiple implementations. - Openly published (specifications and supporting material). - Available royalty free. - Managed and approved by a standards-setting body through a process open to any interested party. Open standards allow all possible competitors equal access to the ability to implement the standard. They should not dictate any specific proprietary path or effectively foreclose any software development model. A standard that in effect blocks open source developers from its implementation is not an open standard. Open standards allow for self-directed innovation. Open source describes principles and methodologies to promote open access to the production and design of various goods, products, resources and information. The term is most commonly applied to software. Open source software is source code that is publicly available and may be copied, changed and redistributed without intellectual property restrictions or fees. Open source and open standards are different. Open standards are technical blueprints. Open source software is computer code. Open standards can be used to create either proprietary or open source software. Why is open source important? Collaboration, not code, is the power of open source. By enabling mass, networked collaboration, open source is revolutionizing technology and many different industries and sectors. Use of open source is growing rapidly as governments and companies worldwide are integrating open source into their ICT ecosystems and strategies. Most people associate open architecture with technical ideas like "enterprise architecture" and "service-oriented architecture," or SOA. The OeG sees open architecture more broadly, and more from a business perspective. We do not focus on the architecture of your IT infrastructure. For us, open architecture is about your business, and the services you deliver. Service-oriented business design is the key to business transformation.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705575935/warc/CC-MAIN-20130516115935-00055-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
2,630
24
https://coursenana.com/programming/assignment/com102-programming-ii-java-assessment-library-loans
code
COM102(Programming II - Java) Coursework - Practical Skills Assessment 2 Title: Library Loans For this assignment you are normally expected to work in pairs. As a pair, when submitting your assignment you are agreeing to the following statement: Module Learning Outcomes: - demonstrate a knowledge of the programming constructs and data types of the selected language - analyze a problem using an object-oriented approach - design and develop code in a professional manner that facilitates readability and maintainability - solve problems involving a logical component. - appropriate use of variables, structured and readable code (20%) - program executes according to specification (30%) - implementation of suitable program control structures to solve problem (30%) - structured approach to testing (20%) This assignment is concerned with manipulating lists / arrays of objects. You will write a program to store and manage details of library items currently on loan to library users according to the following functional requirements: - Functional Requirements - The set of lendable items held by the library includes two types, i.e. Book and Multimedia, and is predefined (read only) as given in file ITEMS.csv. Note that an item’s unique identifier is its library barcode since there may be more than one copy of an item in the library. - The set of library users is predefined (read only) as given in file USERS.csv. - The list of current (active) loans is maintained in the file LOANS.csv. - When the program is started, it should read from these three csv files to populate the application with any previously stored data as a starting point. Within the program items, users and loans should be stored as lists / arrays of objects, with properties according to the column headings in the above files, i.e. there will be a list / array of items, a list / array of users and a list / array of loans. - The program should allow the librarian to issue an item (i.e. to create a loan). To do this, the librarian supplies the item barcode and the user id. The system should check that the barcode exists and that the user id exists. For books, loans are for a four week period. For multimedia items, loans are for a one week period. When an item is issued a loan object is created and added to the list / array of loans. - The program should allow the librarian to renew an existing loan. On supply of the item barcode, the loan’s return date is increased by two weeks from the current date for books and one week for multimedia items and the number of renews is increased by one. A book cannot be renewed more than three times and the maximum number of renews for a multimedia item is two. - The program should allow the librarian to record the return of an item on loan. To do this, the librarian supplies the barcode. Items are always returned on or before their due date. When an item on loan is returned the corresponding loan object is removed from the list of loans. - The program should allow the librarian to view (a) all the items currently on loan and (b) all the items held by the library. - When the program exits, the list of current loans should be written to LOANS.csv. - You must develop a set of test cases and at least one unit test and record the results of applying these tests to your software. The program must employ a console interface only. - Other Assignment Requirements: The adoption of object-oriented principles should be evident in your implementation of the above requirements. A structured approach to testing should be evidenced by submission a test plan including at least one unit test and outcomes in accordance with the above requirements. Vodcasts encoded in mp4 format, lasting normally no more than 5 minutes, is required to be produced to accompany your implementation within which a brief walk-through of the code you implemented is provided – it should demonstrate clearly the features you have created as well as a clear readable review of the code that make the features work. It is expected that both the team members should produce a vodcast separately to report his/her contributions to the solution. - The assignment which is normally expected to be completed in pairs needs to be submitted electronically to Cloud Campus on or before noon, 12:00 on Friday 9th Dec 2022 (Week 12). - Before your submission, you are required to give a brief demonstration of your solution to your teacher (Dr. Yuexin Yang), who will then sign your team declaration form. - The following documents should be submitted - A zip file called com102PSA2_YourGroupID.zip containing the NetBeans project folder and all associated sub-folders for all source code (.java), compiled files (.class) and IDE project files. - A report describing the approach to testing and test cases used should be included with the NetBeans zipped folder in the submission. A summary table (Table 1) outlining the code examples of where each requirement can be found must be also included in your report otherwise marks will be deducted from your overall score (- 5%). You are strongly advised to include as much evidence such as screenshots as possible to demonstrate your successful implementation of each requirement. Table 1: Code examples of where each requirement can be found Ability to pre-populate the application with any previously store data Ability to issue an item Ability to renew an existing loan Ability to record the return of an item on loan. Ability to view all the items currently on loan Ability to view all the items held by the library Ability to save the list of current loans back to LOANS.csv • One pdf file containing all source code – this is for use by moderators - A team declaration form (available with this assignment specification on Cloud Campus) must be completed and signed by your teacher to indicate each team member’s agreed percentage contribution to the submitted solution. This completed form should be included in the top-level folder of the NetBeans project, so that it gets zipped with the other files and uploaded to Cloud Campus at the same time. Note that the marks awarded will reflect the percentage contribution declared. Your submission will not be awarded a mark unless a signed team declaration form signed by your teacher is received. - A copy of the vodcast should be submitted by the submission deadline (noon, 12:00 on Friday 9th December 2022). Please ensure the name of the submitted vodcast is given as com102PSA2_yourGroupID_YourSecondNameYourFirstName_VODCAST.mp4. - If the work is completed in pairs, then only ONE copy of the work should be submitted, with both names and student IDs clearly marked on all the submitted work. - Please ensure that you keep a secure electronic backup copy of your assignment. In the event that your submission cannot be opened or read, you may be asked to provide another copy. *** IMPORTANT *** Marks Weighting for Pair Contributions: This assignment should normally be completed in pairs. If completed in pairs, then each of the pair must sign the ‘team declaration’ form (available in the COM102 area on Cloud Campus) signed by your teacher, to indicate what percentage contribution they made to the overall effort. Where both in the team contribute equally in overall effort to the team solution, then there is no penalty for working in a team of two as opposed to working individually. Each person will obtain the full mark awarded to the submitted work. For any pair submission deviating from an equal division of labour, marks for this assignment will be scaled down according to the declarations made. The scaling will happen according to the following example of the scheme: Consider a pair-submitted piece of work that is deemed worthy of a mark of 50%. Consider also that one of the pair has declared their contribution to be 60% and the other declared at 40% (i.e. 10/50 or 20% less effort than an equitable contribution). The person whose contribution is the lesser will have their mark reduced by 10/50 or 20%, i.e. to 40% in this example. The person whose contribution was set at 60% will receive the full awarded mark of 50%. In the case of pair-submissions, only ONE copy of the solution is required with submitted source code files and test plans clearly indicating the names and student IDs of both team members. Program Demo Walkthrough Evidence of completeness, confidence in operation, testing and awareness of any limitations - Present an overview of your code clearly showing the features you have created and discussing the approach adopted to ensure the code is well organised and structured. - Execute your program within NetBeans IDE. - Present an overview of the main functions available. - Demonstrate the implementation of the following features one by one, discussing the program output to confirm the correct operation. - When the program is started, it reads from three csv files to populate the application with any previously stored data as a starting point. - A menu appears after the program is started, allowing the user to perform the following operation - Issue an item by supplying the item barcode and the user id – demonstrate your program with a barcode and user that exist AND with a barcode or user that does NOT exist. - Renew an existing loan - demonstrate your program renewing an existing book loan. demonstrate that it is not possible to renew an item not currently on loan. demonstrate that it is not possible to renew a multimedia item more than twice. - Record the return of an item on loan demonstrate the return of an item on loan on or before its due date. demonstrate that it is not possible to return an item not currently on loan. - View all items on loan - View all the items held by the library When the program exists, the list of current loans should be written back to LOANS.csv
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494936.89/warc/CC-MAIN-20230127033656-20230127063656-00818.warc.gz
CC-MAIN-2023-06
9,868
77
https://help.motilitysoftware.com/hc/en-us/articles/360057911392-Customize-Lists
code
You can customize any list in MotilityAnywhere. This helps simplify your lists to make it easier to find useful information. - Clicking the ellipsis button to the right of any column header. This will open a menu. - Hover over Columns to view the submenu. - Add a check next to each column you wish to see in your list. You can also uncheck to remove columns you do not need to see. - The order of the columns can also be customized by dragging them into a new position. For example, If you wanted to move Company Number between Deal Number and Quote Number, you would click on the column header and drag it where you want it to go. - When you see small arrows aligned in the desired location, release the mouse button. - Make sure to click Save Layout button at the bottom of the screen so your changes are remembered.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00246.warc.gz
CC-MAIN-2023-40
819
7
https://www.sans.org/event/sans-capital-city-2013/instructors/timothy-tomes
code
Tim Tomes is a Senior Security Consultant and Researcher for Black Hills Information Security with experience in information technology and application development. A veteran, Tim spent nine years as an Officer in the United States Army conducting various information security related activities. Tim manages multiple open source projects such as the Recon-ng Framework, the HoneyBadger Geolocation Framework, and PushPin, is a SANS Instructor for SEC542 Web Application Penetration Testing, writes technical articles for PaulDotCom, and frequently presents at information security conferences such as ShmooCon and DerbyCon. Timothy Tomes Will Be Teaching the Following Course: Capital City 2013 Instructors
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119361.6/warc/CC-MAIN-20170423031159-00056-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
707
3
https://0xacab.org/riseuplabs/crabgrass/commit/d844bdfc06d7870b1e94950d3ad047053d8e0338
code
fix: page_term access_ids only for participations with access We used to build access_ids from all user participations rather than only the ones granting access. This lead to pages showing up in page lists that the user did not have access to anymore. Only take into account user_participations with access level set for the access ids. The other user participation serve to track page visits, watch the page or star it. Showing with 66 additions and 10 deletions
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738523.63/warc/CC-MAIN-20200809073133-20200809103133-00308.warc.gz
CC-MAIN-2020-34
463
3
https://marketingschool.io/7-marketing-tasks-you-should-never-outsource-ep-1029/
code
In episode #1029, we discuss 7 tasks you shouldn’t outsource. Tune in to hear what you really need to keep in-house. We have committed to throwing a FREE Marketing School Live Event in Los Angeles. Check out the details on this website if you would like to attend. Remember: we are capping the event at 500 people, so sign up now, if you’re interested! DM Eric if you would like to participate in the VIP dinner. TIME-STAMPED SHOW NOTES: - [00:27] Today’s Topic: 7 Marketing Tasks You Should Never Outsource - [00:35] 1: Data science. - [01:05] You need to personally track your numbers, otherwise you will have trouble reaching goals. - [01:20] 2: Podcast recording. - [01:30] Record in-house, because you can’t rely on the quality of outsourced audio. - [01:52] 3: Copywriting. - [02:50] 4: Video. - [03:08] The videographer will be working on other things and won’t be focused on your project. - [03:45] 5: Chat bots. - [04:03] If you and your team respond to the chats, you’ll have a better conversion and customer satisfaction rate. - [04:46] 6: Experimentation. - [04:55] Anyone can run tests for you, but only you know what you really need to test. - [05:25] Don’t outsource innovation. - [05:56] 7: Social media. - [06:10] You need to know what’s going on there and interact with your clients in a substantive way. - [06:27] That’s all for today! - [06:33] We are almost at capacity for our live event, so register while you still can: Check out Single Grain for more info. Leave some feedback: - What should we talk about next? Please let us know in the comments below. - Did you enjoy this episode? If so, please leave a short review. Connect with us: Discover Latest Episodes In episode #2629, We discuss how to deal with ad fatigue in the ever-evolving world of marketing. We define ad fatigue as the decline in performance due to repetitive ads. Signs of ad fatigue include ... In episode #2628, We discuss why we are focusing more on written content and how it helps us create other types of content. We've found that creating written content, particularly in the form of tweet... In episode #2627, We discuss the 'Tiktokification' of social media platforms, where various platforms are adopting features similar to TikTok to capitalize on its success. We emphasize the importance ...
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00375.warc.gz
CC-MAIN-2023-50
2,316
28
https://forums.adobe.com/thread/1755271
code
i need to make a line that's not quite horizontal, but when it try to use the ruler to make it, it always snaps to horizontal. This should be a feature that can be disabled, is it possible? Unfortunately, the snapping behavior is not something that can be turned off in the current release. We have heard this feature request once or twice before, but I can't say when having an option to turn off snapping will make it into a future release. Fortunately, we're in the future! And there's now a new release with diagonal rules. (we should probably thank Frank... and people who requested it!) For the archives: Yes! Diagonal straight edges. (complete with an degree of angle notification)
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832559.95/warc/CC-MAIN-20181219151124-20181219173124-00474.warc.gz
CC-MAIN-2018-51
688
4
https://www.accuweaver.com/2013/03/05/moving-to-gmail-on-your-iphone/
code
To do this, you need to add a new Exchange service on the device. There’s a nice step by step of this at http://support.google.com/a/users/bin/answer.py?hl=en&answer=138740 Alternatively, you can use the standard GMail settings, on the iPhone, but my favorite approach is to actually use the GMail app from Google in the App Store. The reason I like that app over the standard iOS mail app is that it is much more of a true mobile client that takes advantage of the platform. First get the App from https://itunes.apple.com/us/app/gmail-email-from-google/id422689480?mt=8 You can do this either from your iPhone/iPad directly, or using the iTunes store on your Mac/PC. Once you have the app installed, you need to set up your GMail accounts. Either tap “open” from the App Store page about GMail, or find the GMail icon and launch it. On launch the app will prompt you to log into your account. For a Google Apps account, this will be the email your administrator assigned you like email@example.com, and the password that you’ve set up previously by going to http://gmail.com. Launching the App the first time takes you to the login page, where you can type in your email address and password. Note that this is the same whether you are logging in to a GMail account or a Google Apps account, to Google they are just different users as far as mail goes. Once you log in, you will be shown the inbox for that account, and be able to read your email pretty easily. To navigate the folders (like sent, draft, etc), you tap on the little icon in the upper left corner that looks like a box with stacked bars. This will cause the folders and settings pane to slide out from the left and reveal your email structure so that you can choose. Clicking on a particular folder will display that list in the same fashion as you saw with the inbox. Additionally from this screen, you can add other email accounts by tapping on the profile area at the top of the pane, which slides the list of accounts down and changes the direction of the panel indicator at the top of the pane. If you’ve already done this, you will see the list of accounts, and each one will be badged with the number of unread messages. Adding a new account is as simple as tapping the large plus icon and logging in. Tapping on a profile picture will switch you to that account once you are logged in. Once you log into the new account, you will again see the loading page, this time with the image from the new account’s name and profile image The next time that you go to the account selection page, you’ll see a list of accounts with the icon for each badged with the number of unread messages showing so that you can easily see what needs your attention at the moment. Google apps on the iPhone are a mixed bag, with some being native, and others not, so it’s also a good idea to set up the Apple “Mail, Contacts, Calendars” for synchronization of those things (which can use the Exchange push in the same way as an actual Exchange server). The best way to do this is to follow the instructions at http://support.google.com/a/users/bin/answer.py?hl=en&answer=138740 First go to your settings (normally you can find this by clicking the home button on and looking for the gear icon that says “Settings”. If you’ve previously added accounts, the “Add Account …” will appear below the existing account settings list (in my case I actually have to scroll in order to get to this button. Tap on the add account button and you’ll be presented with the choice of types of account that you want to use. You can use GMail here, but I prefer to use Exchange simply because it pushes the information to the phone asynchronously Once you tap on the Exchange button, you’ll get a new page that prompts you for the authentication information. This uses Microsoft’s autodiscover method to figure out how the account should be configured. Type in the user name and password for your account here, and give it a description. Typically I use the name of the company that has the domain that I’m adding (for example PMI-SFBAC for my pmi-sfbac.org address). Then click the “Next” button which should bring up the Domain screen. The only thing you need to make sure of is that the server ends up being m.google.com, and that you still have the right username and password. To continue, tap “Next”. The final step is to choose what you want to be pushed to your phone. Generally the important ones are the contacts and calendars, since those are business related. It really doesn’t hurt to have Mail turned on as well, since that keeps your inbox in the iOS Mail app up to date, but if you’re worried about your data plan, just set up the contacts and calendars, since that is the part that the GMail app won’t really be as helpful with.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511717.69/warc/CC-MAIN-20231005012006-20231005042006-00020.warc.gz
CC-MAIN-2023-40
4,833
23
https://sniped.app/?utm_source=slack&utm_medium=app_store
code
Sniped is a fun Slack app that increases security awareness at the workplace by getting your employees to lock their workstations. If you find an unattended, unlocked laptop, type /snipe and your own username on their Slack. Then, lock their laptop. You get a star. They receive a warning and a notification to a public channel, so that they’ll never forget to lock their laptop again. Simply click the “Add to Slack” button on our main page. Once Sniped has been added to your Slack workspace, everyone in your organization will be able to access it. You'll need to invite @snipebot to a channel to get public notifications when someone has been tagged. You can also @-mention snipebot for the leaderboard commands to show off your scores. Simply navigate to the channel of your choice and type in the following: @snipebot will post on this channel whenever an unlocked laptop is caught. You’re all set! On an unlocked laptop, just navigate to the Slack app and type in /snipe, followed by your own Slack username. Everytime you catch someone, you'll get a star and they'll get a warning. For example, let's say that Jeff (username @jeffk) finds an unlocked laptop. He will then type the following command in the laptop's slack: The app will then display a message to remind Jeff to lock the laptop, as well as a status that informs him on how many stars he has accumulated: snipebot will also send a message to the person who got caught a short while later: Stars and warnings are a way to keep track of who has been doing well and who has been doing poorly at keeping laptops locked. Every star you have earns 1 point on the leaderboard. Conversely, every warning you have deducts 2 points. Points are accumulated on the leaderboard monthly. Why did we do this? Because we value laptop security above all else! Keeping your laptop secure is more meaningful than catching someone else doing it, so make sure you’re vigilant about keeping your own laptop safe before you worry about your coworkers. You can lock your laptops with the following shortcuts: On Windows Machines: Windows + L If you're on OSX High Sierra 10.13: Command + Ctrl + Q If you're on any version below that, to sleep the screen: Ctrl + Shift + Power (if you do not have an eject button) Ctrl + Shift + Eject (if you have an eject button) You may need to enable a setting to require a password when the machine has been put to sleep. Follow the instructions here to do so. The leaderboards are a source of information for everyone around the office to gauge how secure they are relative to their colleagues, as well as to provide some encouragement to do better. We have two leaderboards: a wall of shame and a leaderboard for the weighted point totals. To see a list of people with the most points, simply head into Slack and type the following into a channel with snipebot added: Similarly, you can see a list of people with the most warnings by typing: Both these commands above give totals for the current month. You can also access the leaderboards privately by direct messaging snipebot. Simply direct message snipebot with the commands "leaderboard" or "wallofshame", and you'll get your answer privately! If you want to check up on your own statistics, simply direct message snipebot the following: This will return your score and breakdown of stars and warnings for the current month. You’ll also get some nifty fun info on the side! If you want a summary of all the commands you can access with sniped, simply type into slack on any channel: If you direct message snipebot, you can also just type in "help": Sniped encourages your employees to keep their laptops locked through the power of public awareness. If an employee forgets to lock their laptop, they’re immediately creating security vulnerabilities for your business. We solve this problem by putting their name and the number of times they've been caught with their laptop unlocked on a public list. We also encourage the policing of these efforts through a point system. If you catch someone with their laptop unlocked, you’ll be rewarded with a star, and they’ll be issued a warning. The more stars you have, the more points you’ll have. Conversely, the more warnings you have, the less points you’ll have. All of this is totalled in a points chart that lets your office determine your most (and least) secure employees at the end of each month! Sniped analytics are a way to get insight into your company's security awareness performance. We provide graphs comparing your organization to the Sniped benchmark, an anonymous aggregation of other companies using Sniped. This gives you information on how your company is performing with respect to security incidents. A first-time snipe is the first occurence of a snipe against a given individual. A recurring snipe is a snipe against a given individual that is not their first snipe. The “Sniped benchmark” value is the average value among all companies that have actively used Sniped with over 20 lifetime snipes, weighted by company size. You can use this benchmark to compare your company's performance with the general industry. We consider anyone subscribed to a public channel in which snipebot is present to be a user of Sniped. Additionally, we consider anyone who interacts with snipebot in any way to be a user of Sniped.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297292879.97/warc/CC-MAIN-20240425094819-20240425124819-00715.warc.gz
CC-MAIN-2024-18
5,351
46
https://forum.gitlab.com/t/gitlab-ci-combine-only-changes-and-only-refs-gitlab-ci-yml/26542
code
Hello I wondered with the new funcunaleties of https://docs.gitlab.com/ee/ci/yaml/#onlychangesexceptchanges. It allows us to only run a certain job if a file or a folder has changed. I wounder if anyone know know to set it up so a job only runs if a directory has haves changes of if the you are on master branch. .client-build-core: retry: 1 dependencies: - client-npm-install script: - tar -xhf node_modules.tar.gz client/node_modules - cd client - npm install - cp src/environments/environment.template.ts src/environments/environment.ts - cp src/environments/environment.template.ts src/environments/environment.prod.ts - "sed -i 's/production: false/production: true/g' src/environments/environment.prod.ts" - npm run build -- -c production client-build: extends: .client-build-core only: - master client-build-changes: extends: .client-build-core only: changes: - client/**/* except: - master This works but is is long.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662526009.35/warc/CC-MAIN-20220519074217-20220519104217-00408.warc.gz
CC-MAIN-2022-21
925
4
http://www.kiwipiet.com/
code
So first thing, install node (I use chocolatey for my Machine Package Manager). C:\> choco install nodejs.installI'm using the nodejs.install as it installs node and npm under "Program Files" and sets up the system PATH. Close and re-open the command prompt before continuing. Now we install less using npm (Node Package Modules). npm install less -gWe need to be able to edit LESS files in Eclipse and for that I'm using Eclipse plugin for LESS LESS is a language which extends CSS with dynamic behavior such as variables, mixins, operations and functions. This plugin extends the Eclipse IDE by providing handy features to edit and compile LESS stylesheets. You can drag the install button below onto Eclipse and it will install the plug-in. To automatically build the LESS files as they are changed I used Maven and included the lesscss-maven-plugin.
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657135777.13/warc/CC-MAIN-20140914011215-00280-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
853
7
https://blog.mphomphego.co.za/blog/2021/09/03/How-I-transitioned-to-Software-Engineering-from-Electrical-Engineering.html
code
How I Transitioned To Software Engineering From Electrical Engineering. 9 Min Read The other day, I found myself scrolling through Twitter timeline and stumbled upon a tweet that resonated with me. It was a tweet from @Tebatsomankger2, I took a screenshot and pasted it below. You’re also welcome to read the whole thread here The reason why I am saying it resonated with me is that for the longest time, I too felt the same way. After graduating with an Electrical Engineering diploma and coming from a disadvantaged background, I too hoped that the hard-earned qualification would take me from rags to riches. That dream quickly faded to the abyss when I constantly found myself seeking employment opportunities and when I did get a job the salary was close to nothing basically it paid for my rent and transport (basically living hand to mouth). I constantly questioned myself and my decisions as to why I pursued a career in electrical engineering instead of a degree in something like medicine where career prospects were much higher. I think my whole world changed when I got an opportunity to go on an expedition where I spent over a year in isolation with other 19 expeditioners and a shitty internet connection. You can read about that adventure on my old blog site here. Isolation gave me time to reflect on my life and plan my future. I did not like the person I would be 10 years from then and I had to make changes. That’s when I decided to take a leap of faith and start a career in software engineering, I cannot remember what prompted me but it was probably a YouTube video. I think what worked for me is that I had a lot of freedom to choose my career path and I was able to choose a career path that was not only fulfilling but also that I could be a better person. Also, the fact that I had been exposed to programming from my qualification was a huge help, even after failing it 2-3 times (like I said disadvantaged background). What worked for me was that I was always driven and curious about what I could do and I was always willing to learn new things. Before I completely get off-topic (which I usually do), I replied to the tweet above with the following message and was overwhelmed with the number of DMs I received. At that moment, I decided to write this post which will briefly detail my journey from being an electronic engineering technician to how I became a software engineer and some pointers you can try for yourself. Mid-2014, I started enrolling for courses on Coursera and edx. I was initially interested in learning about the fundamentals of computer science and I was able to get a good grasp of the basics of programming, I gravitated towards Python programming language as the syntax was easier to read. Some of the courses I took were: - Python for Everybody Specialization - Fundamentals of Computing Specialization - CS50’s Introduction to Computer Science - Introduction to Linux - Linux Basics: The Command Line Interface Note: All these courses are FREE, with Coursera you can apply for financial aid and get a certificate; which is a win-win situation. These courses helped me understand the fundamentals of programming and how to write code. I was able to learn how to use the Linux terminal. In 2016 we started seeing a rise in Machine Learning/AI applications and that Python was at the forefront, so in the end, I had made a great choice. I continue to learn new things and I am always looking for new ways to improve myself. I assume that you are reading this post because you are at that point in your life where you want to transition to a different career, it might be software engineering or data science. Before you continue, What is your WHY?. The reason why I am saying this is because a lot of people want things handed to them on a silver platter and do not want to put in the time and effort to learning something new. Do yourself a favour and grab a piece of paper and ask yourself the following question: Why do I want to do this? My advice for you is to take a look at these links and familiarise yourself, and see if you can find a career path that suits you: - How to choose the best tech career path for you - Which Tech Career Path Is Right for You? 4 of the Best Tech Jobs If it’s money you want check this link for the role you should be looking for: Before you continue, check out nocsdegree website for some inspiring interviews with successful self-taught and Bootcamp developers. Start here with these FREE courses: Highly recommended for beginners and everyone that wants to dive into Python programming. Great course to get some Computer Science fundamentals. Highly recommended but the use C/C++ programming language Everything (server etc) runs on Linux these days. The command-line interface is the way to access the world. This will teach you about the fundamentals of Python programming which will open massive doors for you once you understand it, it should take you a month to complete, at 10 hours per week. This will teach your above web development and should take you less than a month at 10 hrs per week to complete. This course integrates well with the HTML and CSS, it should take you less than a month and you can do it together with the Intro to HTML and CSS This course should teach you about how to debug and test software, it should take you less than a month to complete. This course will teach you about databases and how to store data in the backend, it should take you a month to complete. Everyone that writes code (data scientists, software engineers and architects) needs to know how to use Git. So I would highly recommend this course This course assumes that you have some basic understanding of programming and Linux, it’ll teach you about the integration between development and operations. It should take you less than a month. The world is moving to Cloud infrastructure and this course offers your great foundational cloud computing skills. It takes approximately 2 months to complete and will give you some AWS cloud skills. Build up your skills and experience Once you feel that you have grasped some fundamentals and understanding, you should start to build your software development/data science experience as soon as possible! I would recommend you to create a profile on GitHub which is an internet hosting for software development and version control using Git. Watch this GitHub Tutorial below. This platform is where you will be able to house your projects and build upon your skills. Ingressive for Good exists to equip young Africans in need with tech skills to help them impact and contribute to the development of Africa, socially and economically. They are offering a scholarship to learn Data Science from the comfort of your browser through DataCamp video tutorials & coding challenges on R, Python, Statistics & more. In 2019, I received the scholarship to study a Udacity course on AI programming with Python. This is an initiative that was started by the Egyptian ministry of technology to empower Africans to move into the tech space. The available courses range from Data Science to UX Designing You can read about my experience here. Udacity and Nokia are offering the Black community a scholarship to study a list of courses on Udacity. Apply ASAP before it closes! This is a South African academy and they usually have scholarships on their website alternatively, you can pay between R50000 - R60000 for their nano degrees One thing I learned is that tech is constantly evolving and one needs to be consistent with their learning. As Les Brown once said, “If you do what is easy your life will be hard. If you do what is hard your life will become easy.” I will come back to this and update it with more resources, if you have any suggestions or recommendations leave a comment below or connect with me on Tweeter @MphoMphego
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817780.88/warc/CC-MAIN-20240421132819-20240421162819-00229.warc.gz
CC-MAIN-2024-18
7,876
55
https://gitlab.torproject.org/legacy/trac/-/issues/9391
code
PT TBBs out-of-date The pluggable transport tor browser bundles still include a vulnerable version of Firefox. We have nobody whose job is to build new versions. I've disabled the links from https://www.torproject.org/projects/obfsproxy.html.en until we have new versions. Ideally we would also build a plan for how to maintain them going forward too.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00424.warc.gz
CC-MAIN-2022-33
351
3