url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
http://www.pokecommunity.com/member.php?u=76398
|
code
|
- About Joker Knight
- Dont ask questions
- Girls, maybe guys, you don't, and won't, know.
- Do you really care?
- Favorite Pokémon
- Darkrai, Misdrevous, Espeon, Umbreon, Lunatone, Solrock
- I made this.
No, you can't have one.
All times are UTC -8. The time now is 01:02 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299877.5/warc/CC-MAIN-20150323172139-00148-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 277
| 9
|
http://mobileprog.com/welcome
|
code
|
Welcome to my english version blog.
I'm involved in computer from the school times. I start programming a Sinclair ZX81 and from that time I never stop.
I wrote in basic, c, pascal, clipper, xbase, foxpro, delphi, cobol, visual basic, c#.
I've worked on many technology like SQL Server, ASP and ASP.NET, .NET framework in all its version, Compact Framework, Silverlight, WPF, WCF, developing software for retail, LOB apps, enterprise warehouse management, embedded system for inventory, data retrieval etc.
During last years I also work on WindowsPhone and shortly on Windows 8.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104432674.76/warc/CC-MAIN-20220704141714-20220704171714-00211.warc.gz
|
CC-MAIN-2022-27
| 578
| 5
|
https://tool.oschina.net/uploads/apidocs/jdk_7u4/java/text/SimpleDateFormat.html
|
code
|
public class SimpleDateFormat extends DateFormat
SimpleDateFormatis a concrete class for formatting and parsing dates in a locale-sensitive manner. It allows for formatting (date -> text), parsing (text -> date), and normalization.
SimpleDateFormat allows you to start by choosing
any user-defined patterns for date-time formatting. However, you
are encouraged to create a date-time formatter with either
of these class methods can return a date/time formatter initialized
with a default format pattern. You may modify the format pattern
applyPattern methods as desired.
For more information on using these methods, see
Date and time formats are specified by date and time pattern
Within date and time pattern strings, unquoted letters from
'Z' and from
'z' are interpreted as pattern letters representing the
components of a date or time string.
Text can be quoted using single quotes (
') to avoid
"''" represents a single quote.
All other characters are not interpreted; they're simply copied into the
output string during formatting or matched against the input string
The following pattern letters are defined (all other characters from
'Z' and from
'z' are reserved):
Pattern letters are usually repeated, as their number determines the exact presentation:
Letter Date or Time Component Presentation Examples
Era designator Text
Week year Year
Month in year Month
Week in year Number
Week in month Number
Day in year Number
Day in month Number
Day of week in month Number
Day name in week Text
Day number of week (1 = Monday, ..., 7 = Sunday) Number
Am/pm marker Text
Hour in day (0-23) Number
Hour in day (1-24) Number
Hour in am/pm (0-11) Number
Hour in am/pm (1-12) Number
Minute in hour Number
Second in minute Number
Time zone General time zone
Pacific Standard Time;
Time zone RFC 822 time zone
Time zone ISO 8601 time zone
Calendaris the Gregorian calendar, the following rules are applied.
SimpleDateFormatmust interpret the abbreviated year relative to some century. It does this by adjusting dates to be within 80 years before and 20 years after the time the
SimpleDateFormatinstance is created. For example, using a pattern of "MM/dd/yy" and a
SimpleDateFormatinstance created on Jan 1, 1997, the string "01/11/12" would be interpreted as Jan 11, 2012 while the string "05/04/64" would be interpreted as May 4, 1964. During parsing, only strings consisting of exactly two digits, as defined by
Character.isDigit(char), will be parsed into the default century. Any other numeric string, such as a one digit string, a three or more digit string, or a two digit string that isn't all digits (for example, "-1"), is interpreted literally. So "01/02/3" or "01/02/003" are parsed, using the same pattern, as Jan 2, 3 AD. Likewise, "01/02/-3" is parsed as Jan 2, 4 BC.
'Y'is specified and the calendar doesn't support any week years, the calendar year (
'y') is used instead. The support of week years can be tested with a call to
GMTOffsetTimeZone:Hours must be between 0 and 23, and Minutes must be between 00 and 59. The format is locale independent and digits must be taken from the Basic Latin block of the Unicode standard.
:Minutes Sign: one of
+ -Hours: Digit Digit Digit Minutes: Digit Digit Digit: one of
0 1 2 3 4 5 6 7 8 9
For parsing, RFC 822 time zones are also
RFC822TimeZone: Sign TwoDigitHours Minutes TwoDigitHours: Digit DigitTwoDigitHours must be between 00 and 23. Other definitions are as for general time zones.
For parsing, general time zones are also accepted.
ISO8601TimeZone: OneLetterISO8601TimeZone TwoLetterISO8601TimeZone ThreeLetterISO8601TimeZone OneLetterISO8601TimeZone: Sign TwoDigitHoursOther definitions are as for general time zones or RFC 822 time zones.
ZTwoLetterISO8601TimeZone: Sign TwoDigitHours Minutes
ZThreeLetterISO8601TimeZone: Sign TwoDigitHours
For formatting, if the offset value from GMT is 0,
produced. If the number of pattern letters is 1, any fraction of an hour
is ignored. For example, if the pattern is
"X" and the time zone is
"+05" is produced.
"Z" is parsed as the UTC time zone designator.
General time zones are not accepted.
SimpleDateFormatalso supports localized date and time pattern strings. In these strings, the pattern letters described above may be replaced with other, locale dependent, pattern letters.
SimpleDateFormatdoes not deal with the localization of text other than the pattern letters; that's up to the client of the class.
Date and Time Pattern Result
"yyyy.MM.dd G 'at' HH:mm:ss z"
2001.07.04 AD at 12:08:56 PDT
"EEE, MMM d, ''yy"
Wed, Jul 4, '01
"hh 'o''clock' a, zzzz"
12 o'clock PM, Pacific Daylight Time
"K:mm a, z"
0:08 PM, PDT
"yyyyy.MMMMM.dd GGG hh:mm aaa"
02001.July.04 AD 12:08 PM
"EEE, d MMM yyyy HH:mm:ss Z"
Wed, 4 Jul 2001 12:08:56 -0700
Date formats are not synchronized. It is recommended to create separate format instances for each thread. If multiple threads access a format concurrently, it must be synchronized externally.
AM_PM_FIELD, calendar, DATE_FIELD, DAY_OF_WEEK_FIELD, DAY_OF_WEEK_IN_MONTH_FIELD, DAY_OF_YEAR_FIELD, DEFAULT, ERA_FIELD, FULL, HOUR_OF_DAY0_FIELD, HOUR_OF_DAY1_FIELD, HOUR0_FIELD, HOUR1_FIELD, LONG, MEDIUM, MILLISECOND_FIELD, MINUTE_FIELD, MONTH_FIELD, numberFormat, SECOND_FIELD, SHORT, TIMEZONE_FIELD, WEEK_OF_MONTH_FIELD, WEEK_OF_YEAR_FIELD, YEAR_FIELD
|Constructor and Description|
|Modifier and Type||Method and Description|
Applies the given localized pattern string to this date format.
Applies the given pattern string to this date format.
Creates a copy of this
Compares the given object with this
Formats the given
Formats an Object producing an
Returns the beginning date of the 100-year period 2-digit years are interpreted as being within.
Gets a copy of the date and time format symbols of this date format.
Returns the hash code value for this
Parses text from a string to produce a
Sets the 100-year period 2-digit years will be interpreted as being in to begin on the date the user specifies.
Sets the date and time format symbols of this date format.
Returns a localized pattern string describing this date format.
Returns a pattern string describing this date format.
format, format, getAvailableLocales, getCalendar, getDateInstance, getDateInstance, getDateInstance, getDateTimeInstance, getDateTimeInstance, getDateTimeInstance, getInstance, getNumberFormat, getTimeInstance, getTimeInstance, getTimeInstance, getTimeZone, isLenient, parse, parseObject, setCalendar, setLenient, setNumberFormat, setTimeZone
SimpleDateFormatusing the default pattern and date format symbols for the default locale. Note: This constructor may not support all locales. For full coverage, use the factory methods in the
public SimpleDateFormat(String pattern)
SimpleDateFormatusing the given pattern and the default date format symbols for the default locale. Note: This constructor may not support all locales. For full coverage, use the factory methods in the
SimpleDateFormatusing the given pattern and the default date format symbols for the given locale. Note: This constructor may not support all locales. For full coverage, use the factory methods in the
public SimpleDateFormat(String pattern, DateFormatSymbols formatSymbols)
SimpleDateFormatusing the given pattern and date format symbols.
public void set2DigitYearStart(Date startDate)
startDate- During parsing, two digit years will be placed in the range
startDate + 100 years.
public Date get2DigitYearStart()
public StringBuffer format(Date date, StringBuffer toAppendTo, FieldPosition pos)
Dateinto a date/time string and appends the result to the given
date- the date-time value to be formatted into a date-time string.
toAppendTo- where the new date-time text is to be appended.
pos- the formatting position. On input: an alignment field, if desired. On output: the offsets of the alignment field.
NullPointerException- if the given
public AttributedCharacterIterator formatToCharacterIterator(Object obj)
AttributedCharacterIterator. You can use the returned
AttributedCharacterIteratorto build the resulting String, as well as to determine information about the resulting String.
Each attribute key of the AttributedCharacterIterator will be of type
DateFormat.Field, with the corresponding attribute value
being the same as the attribute key.
obj- The object to format
NullPointerException- if obj is null.
IllegalArgumentException- if the Format cannot format the given object, or if the Format's pattern string is invalid.
public Date parse(String text, ParsePosition pos)
The method attempts to parse text starting at the index given by
If parsing succeeds, then the index of
pos is updated
to the index after the last character used (parsing does not necessarily
use all characters up to the end of the string), and the parsed
date is returned. The updated
pos can be used to
indicate the starting point for the next call to this method.
If an error occurs, then the index of
pos is not
changed, the error index of
pos is set to the index of
the character where the error occurred, and null is returned.
This parsing operation uses the
calendar to produce a
Date. All of the
calendar's date-time fields are cleared before parsing, and the
values of the date-time fields are used for any missing
date-time information. For example, the year value of the
Date is 1970 with
no year value is given from the parsing operation. The
TimeZone value may be overwritten, depending on the given
pattern and the time zone value in
TimeZone value that has previously been set by a call to
setTimeZone may need
to be restored for further operations.
String, part of which should be parsed.
ParsePositionobject with index and error index information as described above.
Dateparsed from the string. In case of error, returns null.
public String toPattern()
public String toLocalizedPattern()
public void applyPattern(String pattern)
public void applyLocalizedPattern(String pattern)
public DateFormatSymbols getDateFormatSymbols()
public void setDateFormatSymbols(DateFormatSymbols newFormatSymbols)
public Object clone()
SimpleDateFormat. This also clones the format's date format symbols.
public int hashCode()
public boolean equals(Object obj)
Submit a bug or feature
For further API reference and developer documentation, see Java SE Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.
Copyright © 1993, 2012, Oracle and/or its affiliates. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00464.warc.gz
|
CC-MAIN-2023-50
| 10,494
| 171
|
https://moodle.org/mod/forum/discuss.php?d=376927
|
code
|
We are running moodle 2.4 and we are converting from http to https for the whole course site. I have the cert set up and have tested https to see if I can see the site. I know the changes in moodle administration and config.php file to make, the issue I am having is what to change in the database so all items are converted from http to https. I am unable to find much on moodle 2.4. If I search I find mostly 3.x info. Which has a search and replace option. I can do a mysql dump of the database and change references for http to https or as I understand there is an option in 2.4 to do something similar. In the past folk recommend making changes to the back up database file. I am asking 2 things:
1. what should I be using to make the changes?
2. what needs to be changed in the database file? i.e. http:\\website to https:\\website? Are there other things that need changing as well? Or do I change all references of Http to https?
Thanks for any insight
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141748276.94/warc/CC-MAIN-20201205165649-20201205195649-00654.warc.gz
|
CC-MAIN-2020-50
| 960
| 4
|
https://www.workopolis.com/jobsearch/viewjob/aPIoAOrOpgTRpzk4YgRlJkwhviCxW_YPDlQfjMhV7xLuJQXMO3ys9A?ak=amzn+can+fulfillment+svcs+ulc&l=
|
code
|
- Bachelor’s degree in Computer Science or related field
- 8+ years of experience in at least one modern programming language, such as Java or C++
- Computer Science fundamentals in object-oriented design, data structures, algorithm design, problem solving, and complexity analysis
Do you want to join a new team of engineers who are using technology to solve some of the most complex problems faced by a growing Virtual Workforce?
Virtual Customer Service (VCS) Technology builds tools, services and platforms to automate, scale and reduce risk associated with a variety of strategies to grow the business-critical work-from-home part of the organization. You will have the opportunity to build game changing products, and rely on data science and machine learning to transfer your ideas into solutions for some of the most challenging technical problems in the next generation of remote workforce technology. You will drive automation, use Alexa technology and gamification principles, pilot new concepts fast, and leverage data to build ML models for real-time and large scale offline use-cases.
We are looking for a Software Development Engineer to join our team to develop and deploy innovative technologies and features to thousands of global users. Members of this team have a high degree of fluency in one or more languages and tools. They work with an unwavering focus on simplicity and performance. As a Software Development Engineer, you will have an enormous opportunity to make a large impact on the design, architecture, and implementation of cutting edge products used every day, by people you know.
- Be responsible for sub-system architecture and development for product initiatives and feature development
- Investigate, prototype and deliver innovative system solutions
- Work in an Agile/Scrum environment to deliver high quality software
- Work side by side with partners, colleagues and teams on challenging problems
- Be highly effective and thrive in a dynamic environment with multiple, changing priorities.
- Take great pride to innovate on new products that are used by millions of users
- Understand what's important when releasing software to end users and have been through the process from start to finish
- Be comfortable with proactive outward communication and technical leadership and never shy away from a challenge
We offer an abundance of opportunities to have an impact, work with and learn about cutting edge tools and technologies in cloud computing, distributed systems, data processing platforms and machine learning.
Amazon is an Equal Opportunity Employer – Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age
- Fluency in Java and core Java classes
- Deep experience with designing, building and deploying scalable, highly-available systems
- Analytical abilities, proven design skills and a track record of delivery
- Communication skills for both a technical and business audience
- Eagerness to deeply understand the goals and challenges of customer service operations
- Experience with web services and Service-Oriented Architecture (SOA) a plus
- Linux experience a plus
- Agile experience a plus
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737168.97/warc/CC-MAIN-20200810175614-20200810205614-00084.warc.gz
|
CC-MAIN-2020-34
| 3,184
| 24
|
https://www.backblaze.com/blog/category/cloud-storage/page/17/?category=cloud-storage
|
code
|
Ok, actually it was Chloe that built the first pod. And Greg that built the second. But those pods were built to store the geospatial information data for GINA – the Geographic Information Network of Alaska. When searching for pics of Backblaze Storage Pods, I stumbled across Chloe’s Picasa album, and asked her why she….
To get the latest updates and informationon ALL of the Storage Pod versions. Click Here. It’s been over a year since Backblaze revealed the designs of our first generation (67 terabyte) storage pod. During that time, we’ve remained focused on our mission to provide an unlimited online backup service for $5 per month. To maintain….
Possibly. A customer yesterday asked, “Do you have any idea how big iCloud is?” I thought it was an interesting question and poked around. Two months ago it was reported that Apple ordered 12 petabytes of storage rumored to be used for its new North Carolina data center. Certainly Apple already has significant storage for….
After we open sourced the Backblaze Storage Pod, hundreds of people contacted us expressing interest in building their own. A few have shared their experiences including the team at Vanderbilt University Institute of Image Science, where Hampton Albert and others have modified the original design for their own purposes. They explain their approach and use….
Twitter turned 5 years old yesterday. The service now has 200 million users (including @backblaze) who post over 1 billion tweets per day. One interesting tidbit they recently mentioned was that all of those billions and billions of tweets compiled over the course of half a decade took a mere 20 terabytes of storage space!….
As we approached the end of 2010, our vp of engineering sent an email: Backblaze crossed the 10 petabyte mark in data storage for our customers. While l see us constantly adding storage for our online backup service, it was one of those moments that made me think, “Wow, that’s a lot of storage.” Ten….
For the third year in a row, Om Malik and team put on a fantastic event about cloud computing last week. The GigaOm Structure 2010 event was bursting at the seams as people filled the main room to capacity (with a recurring plea by MC Joe Weiman asking people to try and find seats before….
In 2008 we started deploying our storage pods and in September 2009 we gave away the design on our blog in a post titled, “Petabytes on a budget – How to build cheap cloud storage.” This weekend we deployed our 100th Backblaze Storage Pod. For those of you counting, that’s: * 100 pods * 4,500….
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156460.64/warc/CC-MAIN-20180920101233-20180920121633-00370.warc.gz
|
CC-MAIN-2018-39
| 2,600
| 8
|
https://medium.com/@eosforumorg
|
code
|
Around 70 days to go (June 3rd) until the EOS blockchain goes live. Over the last few weeks we learned quite some interesting details. Here are the ones I think are most important:
First of all I would like to thank the EOS Go people for providing these daily EOS Telegram Summaries. They give a great insight in important discussions from the different Telegram groups.
Dan talks privacy
In yesterday’s update there was quite some discussion about privacy. How will EOS handle privacy? Let’s look at some quotes by Dan from yesterday:
This concerns me a bit actually. Is this Dan’s personal view or is this the way EOS is being developped? And there’s more:
There was quite some EOS excitement over the last few days about “special announcements” coming from the Korea meetup. So what was the news?
EOS Venture Capital
Block.One announced they now have over 1.1 billion dollars in funding. That’s a combination from the crowdfund and big VCs investing in Block.One. This was expected but now it’s official.
Another thing that was expected and got confirmed is a 1 billion dollar fund for investment in companies/dApps that will work with EOS. Is this big news? Well, at least it’s a very big commitment to the EOS ecosystem. Imagine Google providing 1…
There where quite some news articles about the Domain Name System over the last few months. And if one thing has become clear it is the fact that DNS in the hands of the ICANN organization is as old fashioned as the fax machine.
The DNS is the bridge between a website’s IP-address and their domain name. Your browser doesn’t know how to find https://eos.io unless it can link that name to a certain IP-address to load in the browser. So what’s the problem? In short: centralization. The moment one central authority controls something important as our domain names the…
The EOS-testnet will go live in several days as the devs are ahead of schedule.
Dawn 2 will be the first iteration of EOS as a real P2P-network. And that’s a great moment to ask yourself: What dApps would we like to see/test on EOS? What makes you excited about EOS? In this post I’ll write some of my own visions in this topic. But feel free to join our EOS Community Forum and share yours.
The whole idea of crypto-currencies is based on wallets and moving coins from A to B. That doesn’t mean things are easy to use…
A lot of people got confused by the EOS token crowdsale. It’s especially parts like this that make people scratch the back of their heads…
EOS TOKENS HAVE NO RIGHTS, USES OR ATTRIBUTES. The EOS Tokens do not have any rights, uses, purpose, attributes, functionalities or features, express or implied, including, without limitation, any uses, purpose, attributes, functionalities or features on the EOS Platform. Company does not guarantee and is not representing in any way to Buyer that the EOS Tokens have any rights, uses, purpose, attributes, functionalities or features.
Feel free to read the whole license agreement on the…
A surprising topic showed up yesterday on the EOS-subreddit. The devs are ahead of schedule and user “knowbean” spotted this on their GitHub and made a topic about it:
EOS Public Testnet coming on 4th December — 4 weeks ahead of schedule!
Of course this got a lot of upvotes because everyone who follows a crypto-project is used to delays. But here we are. The devs are weeks ahead of schedule when it comes to starting a test-network and multi-core support.
What to expect
From a user perspective the testnet won’t probably bring that much to the table right at the…
That was a nice development update yesterday:
Our original roadmap called for a single threaded implementation to be complete by June 2018 and for multi-threaded development to take place thereafter. We are excited to share that work on the parallel execution engine has begun 8 months ahead of schedule and we believe that it will be ready by June 2018.
For those that wonder what this means: The dev team has already tested up to 10.000 transactions per second on 1 thread. This means that a normal CPU should be able to handle 10K transactions per second. …
Quite an interesting interview with Brock Pierce in case you’ve missed it. He talks about the EOS crowdsale being close to $700 million at the moment. But there’s more:
And if that isn’t enough Brock also shares his expectation that EOS will raise several billion. And this probably isn’t the ICO alone. …
A discussion forum about EOS, a powerful infrastructure for decentralized applications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488249738.50/warc/CC-MAIN-20210620144819-20210620174819-00451.warc.gz
|
CC-MAIN-2021-25
| 4,561
| 28
|
https://elon.io/learn-spanish/lesson/when-the-indefinite-article-is-not-used
|
code
|
Spanish speakers don't use an indefinite article before an unmodified noun when it refers to a concept or idea of something, rather than a particular thing. See below how autor is not preceded by un because it is not modified, whereas profesora is preceded by una because profesora is modified by the adjective joven.
|I am a writer.||Soy autor.|
|She is a young professor.||Ella es una profesora joven.|
|I don't have a fatherland.||No tengo patria.|
|I'm wearing a shirt.||Llevo camisa.|
We also don't use an indefinite article after the bold words in the table below.
|We arrive in half an hour.||Llegamos en media hora.|
|He writes with a pencil.||Escribe con lápiz.|
|We travel without a car.||Viajamos sin coche.|
|A certain person is coming tonight.||Cierta persona viene esta noche.|
|in such a case||en tal caso|
|What a pity!||¡Qué lástima!|
This might seem like a lot to learn, and there will certainly be other cases we have not mentioned here. There is no reason to feel frustrated though, since you will develop an intuition for this soon enough.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00680.warc.gz
|
CC-MAIN-2023-40
| 1,064
| 13
|
https://www.catalyzex.com/search?query=Image%20To%20Image%20Translation&with_code=false&page=23
|
code
|
Recently, numbers of works shows that the performance of neural machine translation (NMT) can be improved to a certain extent with using visual information. However, most of these conclusions are drawn from the analysis of experimental results based on a limited set of bilingual sentence-image pairs, such as Multi30K. In these kinds of datasets, the content of one bilingual parallel sentence pair must be well represented by a manually annotated image, which is different with the actual translation situation. Some previous works are proposed to addressed the problem by retrieving images from exiting sentence-image pairs with topic model. However, because of the limited collection of sentence-image pairs they used, their image retrieval method is difficult to deal with the out-of-vocabulary words, and can hardly prove that visual information enhance NMT rather than the co-occurrence of images and sentences. In this paper, we propose an open-vocabulary image retrieval methods to collect descriptive images for bilingual parallel corpus using image search engine. Next, we propose text-aware attentive visual encoder to filter incorrectly collected noise images. Experiment results on Multi30K and other two translation datasets show that our proposed method achieves significant improvements over strong baselines.
In medical imaging, chromosome straightening plays a significant role in the pathological study of chromosomes and in the development of cytogenetic maps. Whereas different approaches exist for the straightening task, they are mostly geometric algorithms whose outputs are characterized by jagged edges or fragments with discontinued banding patterns. To address the flaws in the geometric algorithms, we propose a novel framework based on image-to-image translation to learn a pertinent mapping dependence for synthesizing straightened chromosomes with uninterrupted banding patterns and preserved details. In addition, to avoid the pitfall of deficient input chromosomes, we construct an augmented dataset using only one single curved chromosome image for training models. Based on this framework, we apply two popular image-to-image translation architectures, U-shape networks and conditional generative adversarial networks, to assess its efficacy. Experiments on a dataset comprising of 642 real-world chromosomes demonstrate the superiority of our framework as compared to the geometric method in straightening performance by rendering realistic and continued chromosome details. Furthermore, our straightened results improve the chromosome classification, achieving 0.98%-1.39% in mean accuracy.
We present a generic image-to-image translation framework, Pixel2Style2Pixel (pSp). Our pSp framework is based on a novel encoder network that directly generates a series of style vectors which are fed into a pretrained StyleGAN generator, forming the extended W+ latent space. We first show that our encoder can directly embed real images into W+, with no additional optimization. We further introduce a dedicated identity loss which is shown to achieve improved performance in the reconstruction of an input image. We demonstrate pSp to be a simple architecture that, by leveraging a well-trained, fixed generator network, can be easily applied on a wide-range of image-to-image translation tasks. Solving these tasks through the style representation results in a global approach that does not rely on a local pixel-to-pixel correspondence and further supports multi-modal synthesis via the resampling of styles. Notably, we demonstrate that pSp can be trained to align a face image to a frontal pose without any labeled data, generate multi-modal results for ambiguous tasks such as conditional face generation from segmentation maps, and construct high-resolution images from corresponding low-resolution images.
How best to evaluate synthesized images has been a longstanding problem in image-to-image translation, and to date remains largely unresolved. This paper proposes a novel approach that combines signals of image quality between paired source and transformation to predict the latter's similarity with a hypothetical ground truth. We trained a Multi-Method Fusion (MMF) model via an ensemble of gradient-boosted regressors using Image Quality Assessment (IQA) metrics to predict Deep Image Structure and Texture Similarity (DISTS), enabling models to be ranked without the need for ground truth data. Analysis revealed the task to be feature-constrained, introducing a trade-off at inference between metric computation time and prediction accuracy. The MMF model we present offers an efficient way to automate the evaluation of synthesized images, and by extension the image-to-image translation models that generated them.
We propose an automatic preprocessing and ensemble learning for segmentation of cell images with low quality. It is difficult to capture cells with strong light. Therefore, the microscopic images of cells tend to have low image quality but these images are not good for semantic segmentation. Here we propose a method to translate an input image to the images that are easy to recognize by deep learning. The proposed method consists of two deep neural networks. The first network is the usual training for semantic segmentation, and penultimate feature maps of the first network are used as filters to translate an input image to the images that emphasize each class. This is the automatic preprocessing and translated cell images are easily classified. The input cell image with low quality is translated by the feature maps in the first network, and the translated images are fed into the second network for semantic segmentation. Since the outputs of the second network are multiple segmentation results, we conduct the weighted ensemble of those segmentation images. Two networks are trained by end-to-end manner, and we do not need to prepare images with high quality for the translation. We confirmed that our proposed method can translate cell images with low quality to the images that are easy to segment, and segmentation accuracy has improved using the weighted ensemble learning.
Unsupervised image-to-image translation is a recently proposed task of translating an image to a different style or domain given only unpaired image examples at training time. In this paper, we formulate a new task of unsupervised video-to-video translation, which poses its own unique challenges. Translating video implies learning not only the appearance of objects and scenes but also realistic motion and transitions between consecutive frames.We investigate the performance of per-frame video-to-video translation using existing image-to-image translation networks, and propose a spatio-temporal 3D translator as an alternative solution to this problem. We evaluate our 3D method on multiple synthetic datasets, such as moving colorized digits, as well as the realistic segmentation-to-video GTA dataset and a new CT-to-MRI volumetric images translation dataset. Our results show that frame-wise translation produces realistic results on a single frame level but underperforms significantly on the scale of the whole video compared to our three-dimensional translation approach, which is better able to learn the complex structure of video and motion and continuity of object appearance.
Given an input image from a source domain and a "guidance" image from a target domain, unsupervised many-to-many image-to-image (UMMI2I) translation methods seek to generate a plausible example from the target domain that preserves domain-invariant information of the input source image and inherits the domain-specific information from the guidance image. For example, when translating female faces to male faces, the generated male face should have the same expression, pose and hair color as the input female image, and the same facial hairstyle and other male-specific attributes as the guidance male image. Current state-of-the art UMMI2I methods generate visually pleasing images, but, since for most pairs of real datasets we do not know which attributes are domain-specific and which are domain-invariant, the semantic correctness of existing approaches has not been quantitatively evaluated yet. In this paper, we propose a set of benchmarks and metrics for the evaluation of semantic correctness of UMMI2I methods. We provide an extensive study how well the existing state-of-the-art UMMI2I translation methods preserve domain-invariant and manipulate domain-specific attributes, and discuss the trade-offs shared by all methods, as well as how different architectural choices affect various aspects of semantic correctness.
We present a framework to translate between 2D image views and 3D object shapes. Recent progress in deep learning enabled us to learn structure-aware representations from a scene. However, the existing literature assumes that pairs of images and 3D shapes are available for training in full supervision. In this paper, we propose SIST, a Self-supervised Image to Shape Translation framework that fulfills three tasks: (i) reconstructing the 3D shape from a single image; (ii) learning disentangled representations for shape, appearance and viewpoint; and (iii) generating a realistic RGB image from these independent factors. In contrast to the existing approaches, our method does not require image-shape pairs for training. Instead, it uses unpaired image and shape datasets from the same object class and jointly trains image generator and shape reconstruction networks. Our translation method achieves promising results, comparable in quantitative and qualitative terms to the state-of-the-art achieved by fully-supervised methods.
Image-to-image translation is significant to many computer vision and machine learning tasks such as image synthesis and video synthesis. It has primary applications in the graphics editing and animation industries. With the development of generative adversarial networks, a lot of attention has been drawn to image-to-image translation tasks. In this paper, we propose and investigate a novel task named as panoptic-level image-to-image translation and a naive baseline of solving this task. Panoptic-level image translation extends the current image translation task to two separate objectives of semantic style translation (adjust the style of objects to that of different domains) and instance transfiguration (swap between different types of objects). The proposed task generates an image from a complete and detailed panoptic perspective which can enrich the context of real-world vision synthesis. Our contribution consists of the proposal of a significant task worth investigating and a naive baseline of solving it. The proposed baseline consists of the multiple instances sequential translation and semantic-level translation with domain-invariant content code.
Magnetic Resonance (MR) Imaging and Computed Tomography (CT) are the primary diagnostic imaging modalities quite frequently used for surgical planning and analysis. A general problem with medical imaging is that the acquisition process is quite expensive and time-consuming. Deep learning techniques like generative adversarial networks (GANs) can help us to leverage the possibility of an image to image translation between multiple imaging modalities, which in turn helps in saving time and cost. These techniques will help to conduct surgical planning under CT with the feedback of MRI information. While previous studies have shown paired and unpaired image synthesis from MR to CT, image synthesis from CT to MR still remains a challenge, since it involves the addition of extra tissue information. In this manuscript, we have implemented two different variations of Generative Adversarial Networks exploiting the cycling consistency and structural similarity between both CT and MR image modalities on a pelvis dataset, thus facilitating a bidirectional exchange of content and style between these image modalities. The proposed GANs translate the input medical images by different mechanisms, and hence generated images not only appears realistic but also performs well across various comparison metrics, and these images have also been cross verified with a radiologist. The radiologist verification has shown that slight variations in generated MR and CT images may not be exactly the same as their true counterpart but it can be used for medical purposes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00054.warc.gz
|
CC-MAIN-2022-33
| 12,463
| 10
|
http://www.sinneb.net/?p=658
|
code
|
Making progress! Because of the start of a new semester at my university, I tried to finish a first version of the edusynth. And, also to my own amazement, I did! Here’s a first 3d brd view of the eagle file:
Dual VCO, VCF and VCA. Dual ADSR and a number of OPS (CV, mix and split). Board are ready according to pcbway – I’m waiting for delivery… First try outs to follow. Also, the edusynth is full open source / open hardware thus schematics and code also underway.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267862929.10/warc/CC-MAIN-20180619115101-20180619135101-00626.warc.gz
|
CC-MAIN-2018-26
| 475
| 2
|
https://community.spiceworks.com/topic/450093-linux-ubuntu-install-on-2gb-hard-drive-to-run-vmware-only
|
code
|
We have some old thin clients
the company wants all xp machines upgraded. Even though the thin clients only run vmware they don't want to see xp. (we tried to fight this but what they says goes) So an idea we had was why not run linuxubuntu on these thin clients.Most the options we try need 2gb of space which leaves nothing for a program like vmware.the thin clients used to use xp embedded. We only need network, video, USB, GUI and vmware. thank you
You could setup an Ubuntu LTSP Server and boot over the network to that... this how to also covers creating the client config for a Fat client.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824325.29/warc/CC-MAIN-20171020192317-20171020212317-00748.warc.gz
|
CC-MAIN-2017-43
| 597
| 3
|
https://www.navcanada.ca/EN/products-and-services/Pages/AIP-part-1-current.aspx
|
code
|
Part 1 – General
Part 1 – General (GEN) contains general information about AIP Canada (ICAO) and Canadian Domestic Airspace (CDA). It has five sections, numbered 0 through 4, and each section is paginated separately: GEN 0 is paginated 0–1 to 0–10, GEN 1 is paginated 1–1 to 1–35, and so on. Tables and figures are numbered according to the section or subsection in which they appear. The part is available in one complete file or in separate files for each section.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496330.1/warc/CC-MAIN-20200329232328-20200330022328-00042.warc.gz
|
CC-MAIN-2020-16
| 478
| 2
|
http://alpha-global-assoc.gq/books/1590384814/christmas-jars.html
|
code
|
Best Quality Writing and Content.
By Best Author
More Books ready to You!
Accounting: For Small Businesses QuickStart Guide - Understanding Accounting For Your Sole Proprietorship, Startup, & LLC
The Charlotte Mason Homeschool Journal: & Delight Directed Learning Handbook (Homeschooling Journal) (Volume 11)
Theory and Applications of Stochastic Processes: An Analytical Approach (Applied Mathematical Sciences)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863939.76/warc/CC-MAIN-20180620221657-20180621001657-00341.warc.gz
|
CC-MAIN-2018-26
| 412
| 6
|
https://devblogs.microsoft.com/oldnewthing/20080401-00/?p=22913
|
code
|
Pranksters breathe a sigh of relief: There will never be a Building 7
It is a longstanding prank at Microsoft’s main Redmond campus to send an unsuspecting new employee to building 7 under the pretense of having a meeting or needing to pick up something. There is no such building on the main Microsoft campus. This nonexistent building has also been used as a sort of inside joke. For example, if somebody invites you to a meeting in Building 7, they’re probably inviting you off campus to take a break from work. A few years ago, there was a vacancy in a small business park a very short walk from the main Microsoft campus. (You don’t even have to cross the street to get there.) I thought it would be great if somebody leased the space and opened a bar called Building 7. It could have a back room decorated like a Microsoft meeting room, complete with WiFi and a large monitor. Then somebody could legitimately invite you to a meeting in Building 7, and people could use it as a cover story: “Sorry, I’m going to be working late tonight. Team meeting in Building 7.” The announcement in February 2006 of a major expansion of the main Redmond campus came with a little map, and people with way too much time on their hands pored over the unreadably tiny print on the map and noticed a little 7 printed on the orange building in the upper right corner. They quietly fretted that a piece of Microsoft history was vanishing and that they’ll have to come up with a new prank to play on the new-hires.
In June 2007, pranksters (and people with a nostalgic streak) breathed a sigh of relief. The real estate department announced that the new building tentatively labelled 7 on the map will now be known as Building 37. In deference to Microsoft tradition, the name Building 7 has been officially retired. There will never be a Building 7.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00738.warc.gz
|
CC-MAIN-2023-50
| 1,850
| 3
|
http://lchomeworkvikc.paycheckadvance.us/static-network.html
|
code
|
Static nat (also called inbound mapping) is the first mode we're going to talk about and also happens to be the most uncommon between smaller networks. Dynamic ip address see #network managers for a list of options in setting a dynamic ip address static ip address a static ip address can be configured with most standard network. The method by which and isp assigns ip addresses to their customers, either dynamic or static, varies by the isp and their customer's needs. Routers both modern and antiquated allow users to set static ip addresses for devices on the network, but what’s the practical use of static ip addresses for a home. Static networks detail-oriented and transparent approach to cloud adoption includes a custom roadmap design to establish a solid foundation on which your strategy.
Eric geier helps you discover ways to convert from dynamic to static addresses on your network. The raspberry pi is automatically set to obtain an ip address from your network why does the raspberry pi need ip address. Static routing, the alternative to dynamic routing, is the process in which the system network administrator would manually configure network routers with all the. Forgive the newbie questions, but i have to compare it to windows how do i set up a static ip address and other settings that go along with it on my.
Static routing is a form of routing that occurs when a router uses a manually static routing leaves the network administrator with full control over the routing. How to set a static ip address in windows xp it is very important to setup a static ip address but if you want to know more about how networks work. While most ip networks use dhcp for address assignment, sometimes a static ip address makes more sense here's how to work with static ip addresses. Anchor: #i1028247 section 7: gps static surveying anchor: #i1028252 overview static gps surveying typically uses a network or multiple baseline.
Learn how to change the ip address or dns settings for computers on your network. Static routing definition - static routing is a type of network routing technique static routing is not a routing protocol instead, it is the manual. Its the all static network (asn) is this really free streaming staticseriously yup there are other ways of obtaining “static” but none as efficient or free as all static network why.
Ubuntu ships with a number of graphical utilities to configure your network inet static pre-up /sbin covering more advanced network configuration. Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing traffic in many cases, static routes.
Configuring a static ipv4 or ipv6 address one local area network (lan) connection is available for each network adapter installed these connections are created automatically.
Discover how to write your own networkd units with coreos network configuration with networkd in this example, we create a unit file, 10-staticnetwork. 6-2 cisco 3200 series mobile access router software configuration guide ol-1926-06 chapter 6 static and dynamic network configuration static networks. Question please suggest if there are mis-configurations or if the symptom is a known issue saw the other articles and set netcfg/choose_interface=eth0 as the boot. The virtualized network poses challenges to network management systems -- and as more hardware components become virtualized, that challenge becomes even greater this handbook discusses the. Dhcp vs static ip static ip is not really that complex as it simply means that the ip of a certain network element like a computer or router stays the. View static network’s profile on linkedin, the world's largest professional community static has 2 jobs listed on their profile see the complete profile on.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211126.22/warc/CC-MAIN-20180816152341-20180816172341-00368.warc.gz
|
CC-MAIN-2018-34
| 3,839
| 7
|
https://www.diyaudio.com/community/threads/polk-diy-power-port-archives.152/#post-974
|
code
|
A while ago there used to be a couple of files
on Polk's site about how to design a power port
(flared duct) Does any one have these files or can
point me to a place where I can get them? (Or explain me
in plain english how to calculate such ports?)
I'm not familiar with anything about flared ports from Polk, but was wondering...how flared is flared? My point is that a simple rounding of the edges with a router isn't going to effect the tuning of the port that much. On the other hand, if the flare rate is more drastic, and extends further down the tube, I'd think it would be appropriate to treat it as a horn. Horn math is fairly accessible.
N.B.: The one thing that horn afficionados never get around to admitting is that horn loudspeaker distortion gets really, really grotesque if you go below the low frequency cutoff of the horn itself. I'm quoting from memory here, but I think the low frequency cutoff for a horn is something like
width of horn at mouth= 1/4 wavelength of cutoff frequency
This may or may not help you, as ports are usually small enough in width or diameter that it may not be appropriate to treat them as horns.
What is your goal? To reduce turbulence? Increase effiency? Extend low frequency response? (Yes, yes, yes...I know...all of the above.)
I didn't read the text of the patents, but I glanced at the diagrams. Two things occur to me:
1) If you're willing to have something sticking out of your cabinet like that, simply extend the port. There's no law that says that a port must end at the surface of the speaker cabinet. All you're doing is creating a Helmholtz resonator with the same (or nearly the same) frequency as the Fs of the woofer. Wine bottles resonate quite nicely, in spite of the fact that their 'port' is external to the resonant cavity. (Although people are prone to looking at you a bit oddly for playing tunes on wine bottles...they're more forgiving if it's a beer bottle, for some reason.)
2)Another possibility is to run the tube from top to bottom in the cabinet. (We're assuming that the cabinet is taller than it is deep or wide.) Granted, it's more common to see ports in the front or back--once in a while on the side. Dare to be different. Be the first on your block to vent your port out the top! Should you decide to vent out the bottom, remember that the floor will load the port. Adjust the length of speaker feet as needed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104506762.79/warc/CC-MAIN-20220704232527-20220705022527-00553.warc.gz
|
CC-MAIN-2022-27
| 2,396
| 13
|
https://docs.rowy.io/how-to/app-check
|
code
|
AppCheck is a security solution provided by Firebase that helps protect your database from abuse, including abuse stemming from automated bots. This guide provides instructions on how you can use Rowy with AppCheck enabled.
Follow the steps below to enable AppCheck for your Rowy project.
Firstly, we need to register a new site on https://www.google.com/recaptcha/admin/create.
Add your domain, i.e.
rowy.app, and select your Firebase project. Click Submit, and then click Copy Secret Key.
Go to the AppCheck section of your Firebase console at https://console.firebase.google.com/u/0/project/_/appcheck/apps. Click the Register button in
Click on the
reCAPTCHAoption and paste the Secret Key that you copied earlier. Click Save.
Go back to reCAPTCHA and click Copy Site Key.
Paste the site key into your rowy app and click Add / Update.
You're done! AppCheck is now enabled for your Rowy app. ✅
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100499.43/warc/CC-MAIN-20231203094028-20231203124028-00278.warc.gz
|
CC-MAIN-2023-50
| 898
| 11
|
https://successteam.crunch.help/indicators/what-do-the-colors-indicate
|
code
|
The 4 colors definitions
In Successteam, you see your team score and status through colors. This gives you an easy and quick overview of how critical a team challenge is or how much you as a team excel within a specific area.
When you have enough data, you will see the 4 main indicators in your main dashboard in either GREEN, YELLOW, ORANGE, or RED, depending on how your team gave feedback the past month. If you see BLUE or GREY, it means that less than 4 people shared their feedback, and we can't show you the colors yet, because of anonymity.
A look at a potential scenario could look like this:
To ensure anonymity, we can't show any data yet, because less than 4 people gave their feedback.
Indicates an "almost" perfect score where your team is giving feedback in a way that suggests that they are happy and motivated.
Indicates that your team is a little dissatisfied, and there is room for improvement in this area.
Indicates that your team has serious challenges in this area. We would suggest leaders take Action on orange challenges proactively.
Indicates that your team has critical challenges in this area. Leaders should take Action to improve on red challenges immediately.
The colors under Team Insights
The same 4 colors are used in the Team Matrix where the 4 team indicators are broken down on the 3 levels : Individual, Team Culture and Leadership level.
The rules are the same. RED indicates critical challenges, ORANGE general challenges, YELLOW room for improvement and GREEN says you are doing great! :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588284.71/warc/CC-MAIN-20211028100619-20211028130619-00657.warc.gz
|
CC-MAIN-2021-43
| 1,531
| 12
|
https://knowledge.broadcom.com/external/article/53870/siebel-connector-how-are-lov-list-of-val.html
|
code
|
This document describes how the Siebel Connector handles Siebel LOV (List Of Values)
LOV are read-only within IM and used to assign to other object types, such as user accounts. Only the LOV field types that are used in mappings will be explored.
For example, you can map the Siebel field 'Employee Type Code' using the Combo Box Control Type and specify EMPLOYEE_TYPE as the Siebel LOV type. A re-exploration of the endpoint will add all EMPLOYEE_TYPE values to the List Of Values container, and user accounts will have this mapped field in the Profile tab populated with their employee type. This mapped field can also be edited, with all possible values available to pick from the combo box.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00646.warc.gz
|
CC-MAIN-2023-40
| 694
| 3
|
http://wiki.ocsinventory-ng.org/index.php?title=Howtos:VMOcsinventory-ng
|
code
|
- 1 How to install, start and configure the OCSInventory-NG virtual machine
- 1.1 Overview
- 1.2 Requirements
- 1.3 Glossary
- 1.4 Installing the Virtual Machine
- 1.5 Configuring the Virtual Machine
- 1.6 Installing and configuring a client agent
- 1.7 If you want more ...
How to install, start and configure the OCSInventory-NG virtual machine
The Virtual Machine ocsinventory-ng (or VMOcsinventory-ng) was created to provide an easy and ready-to-use system for those who want to test or run in a production environment the OCS Inventory Next Generation software.
Several distributions are available, allowing you to choose the one you prefer :
- Debian 6.0 32 Bits
- Debian 6.0 64 Bits
- Ubuntu Server 11.04 32 Bits
- Ubuntu Server 10.04 64 Bits
- CentOS Server 5.7 32 Bits
Other virtual machines will be available soon, including Fedora and Centos.
The following services are enabled with OCS Inventory NG 2.0 stable :
- HTTP and HTTPS Web Administration
- Package deployment
|Note: The SSL mode is also enabled. This allows secure inventory transmission and package deployment. Indeed, a control of the SSL certificate is performed when the agent contacts the server. You can disable this feature but for security reasons, we strongly advise aginst doing this.|
You must ensure that you have :
- An installed and operational VMWare solution
- 8 GB hard disk space free
- The host machine must know how to manage x64 instructions if you choose a 64-bit distribution
- On Linux, by default, the profile root is associated with the password ocs.
- On Mysql, by default, the couple ocs/ocs is associated to the ocsweb database.
Installing the Virtual Machine
You can retrieve the virtual machine (.tar.gz format) that suits you by going to the Download page.
Once recovered, unzip the archive in the storage folder of your other virtual machines.
In your application, add it in your inventory.
|Warning: At first startup, VMWare detect that your virtual machine does not come from that server and ask if it was moved or copied. Please answer MOVED.|
Your virtual machine is ready, go setting it in your environment.
Configuring the Virtual Machine
By default, the IP configuration of the virtual machine is :
- IP : 10.10.10.10
- Subnet mask : 255.255.255.0
- Gateway : 10.10.10.8
- DNS : 10.10.200.11 / 10.10.200.2
To be consistent with your own network, you must edit the following files :
- /etc/network/interfaces : set the right fields :
- address : enter the IP address of your future OCS server.
- netmask : enter the subnet mask.
- network : enter the network address.
- broadcast : enter the broadcast address.
- gateway : enter the gateway.
- /etc/resolv.conf : set the right fields :
- nameserver : enter the DNS server address.
- /etc/hosts : change IP address 10.10.10.10 with the one you chose above.
|Note: When finished, restart your virtual machine :
shutdown -r now
By default, the SAMBA configuration of the virtual machine inserts it in the workgroup WORKGROUP. If that does not fit into your network settings, please change the WORKGROUP= value by editing the file :
Then restart SAMBA service :
service smbd restart
To ensure the proper functioning of the inventory and deployment on the agents, the ocsinventory-ng hostname must be resolved by the clients. In other words, the command ping ocsinventory-ng must return a positive result as shown in this image :
To do this, either you use the DNS server on your network to point the name ocsinventory-ng to the IP address of the virtual machine (Howto for Windows Server), or you update the hosts file of each computer with the same information (usually located in %windir%\system32\drivers\etc\).
|Warning: The SSL certificate generated in the virtual machine contains ocsinventory-ng hostname. It is very important that this step is respected as is, with the same name.|
Générating SSL certificate
By default, the cacert.pem SSL certificate included in the virtual machine has expired. You must generate a new one.
To do this, in a terminal, type :
cd /ocs ./apache_generate_cert.sh
Answer the questions asked while retaining ocsinventory-ng Common Name.
Once back at the prompt, restart Apache:
service apache2 restart
The certificate is automatically used by Apache and is available from a client under the address : \\ocsinventory-ng\ocs$.
Installing and configuring a client agent
In addition, you must copy cacert.pem certificate, which is located in \\ocsinventory-ng\ocs$, in C:\ProgramData\OCS Inventory NG\Agent directory ( for Windows Vista/7/Server 2008 ) or in C:\Documents and settings\All Users\Application Data\Ocs Inventory NG\Agent directory ( for Windows 2000/XP/Server 2003 ).
You can also use ocspackage.exe to generate an installer including the certificate. For instructions, see this documentation.
If you want more ...
Updating time and date
By default, the virtual machine is configured on the Greenwich time zone. To update this, you can use the package ntpdate :
apt-get install ntpdate
Then configure it by editing the /etc/default/ntpdate file :
Pass the NTPDATE_USE_NTP_CONF value from YES to NO. Save everything and do update with :
It's Ok ;)
HTTPS Inventory transmission
If you want, you can also sent the inventory over HTTPS. The virtual machine is also configured to perform this operation. To use it, you just during the installation of the agent change the Server URL field with https://ocsinventory-ng/ocsinventory.
Secure your OCS Inventory NG Server
We recommend you to secure you OCS Inventory NG Server. Please follow this link to know how proceed : http://wiki.ocsinventory-ng.org/index.php/Documentation:Secure.
Personnalize your OCS Inventory NG Server
You can personnalize your server with a lot of plugin created by the OCS Inventory NG Community. Please follow this link to know how proceed : http://wiki.ocsinventory-ng.org/index.php/Plugins:version2.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864343.37/warc/CC-MAIN-20180622030142-20180622050142-00197.warc.gz
|
CC-MAIN-2018-26
| 5,879
| 81
|
https://deepai.org/publication/approximating-the-minimum-k-section-width-in-bounded-degree-trees-with-linear-diameter
|
code
|
1.1. The Minimum -Section Problem
We start with a few definitions. A -section in a graph is a partition of its vertex set into sets whose sizes are as close to equal as possible. The width of a -section is the number of edges between the sets and is denoted by . The minimum width among all -sections in a graph is denoted by . The goal of the Minimum -Section Problem is to compute and a corresponding -section for a given graph and an integer . This problem has many applications, e.g. in parallel computing, when tasks have to be evenly distributed to processors while minimizing the communication cost.
The special case where , which is also called the Minimum Bisection Problem, is known to be NP-hard for general graphs, see . Jansen et al. use dynamic programming to compute a minimum bisection in a tree on vertices in time. Their method can be turned into an algorithm for computing a minimum -section in trees, whose running time is polynomial in but not in . However, when is part of the input, cannot be approximated in polynomial time within any finite factor on general graphs unless PNP, see . The reduction presented there is from the strongly NP-hard 3-Partition Problem and it is easy to adjust it in order to show that the Minimum -Section Problem restricted to forests cannot be approximated within any finite factor unless PNP.
Feldmann and Foschini studied minimum -sections in trees, and pointed out some counterintuitive behavior even on this rather restricted class of graphs. Moreover, they showed in that the Minimum -Section Problem remains APX-hard when restricted to trees with maximum degree at most 7, and that, for any , it is NP-hard to approximate within a factor of for trees with constant diameter.
Here, we study the Minimum -Section Problem in trees and focus on bounded-degree trees with linear diameter. Moreover, we extend our results to tree-like graphs. Our first result gives an upper bound on the width of a minimum -section in trees and a corresponding algorithm.
For every integer and for every tree on vertices, a -section in with
can be computed in time.
Here, as usual, and denote the maximum degree of and the diameter of , respectively, where the latter is defined as the length of a longest path in . Obviously, for , any graph on vertices has essentially only one -section, so we can assume without loss of generality that and, hence, the running time in Theorem 1 is always polynomial in the input length.
Let and be two constants. Then, for any tree on vertices with and , the factor from the previous theorem is bounded by a constant that depends only on and . As every -section of a tree has width at least , this yields a constant-factor approximation for for such a class of trees.
For all and , there is a constant such that the following holds. Let be a class of trees such that every tree on vertices satisfies and . Then there is a -approximation for the Minimum -Section Problem restricted to the class . In particular, one can choose .
Next, we extend our focus in this paper in two ways. On the one hand, we can improve the upper bound so that it becomes polylogarithmic in . Moreover, we now move from trees to graphs with a given tree decomposition. Here, instead of bounding the width of a -section in terms of the diameter, we define a parameter that roughly measures how close the tree decomposition is to a path decomposition, which is defined as a tree decomposition where the decomposition tree is a path. For example, suppose that we were given a graph with a path decomposition of of width . Then it is easy to see that allows a bisection of width at most by walking along the path until we have seen vertices of in the clusters, and then bisecting there. In other words, finding a -section of the graph of small width becomes easier when there is a path in the tree decomposition of whose clusters contain many of the vertices of .
For the precise definition of the parameter , consider a tree decomposition of a graph with . The relative weight of a heaviest path in is denoted by
where denotes the number of vertices of . Observe that . Moreover, define the size of as , which roughly measures the encoding length of .
For every integer , for every graph and every tree decomposition of of width at most , a -section in with
can be computed in time, when the tree decomposition is provided as input.
Again, as in the case of trees in Theorem 1 and Corollary 2, a constant-factor approximation for a certain class of tree-like graphs is obtained. More precisely, fix , , and define . Consider a class of connected graphs such that every graph satisfies and allows a tree decomposition of width at most and . Then, there is a -approximation for the Minimum -Section Problem restricted to the graph class .
1.3. Related Work
The results presented here rely on our earlier work concerning the Minimum Bisection Problem, in particular the following theorem.
Theorem 4 (Theorem 1 in ).
For every tree a bisection in with
can be computed in time.
Although Theorem 1 and Theorem 4 look quite similar, it does not seem possible to directly apply Theorem 4 to yield a recursive construction of a -section that satisfies the bound presented in Theorem 1. Indeed, it is known that, even when is a power of , the natural approach to construct a -section in a graph by recursively constructing bisections can give solutions far from the optimum, even when a minimum bisection is used in each step, see . Furthermore, in the setting that we are considering here, i.e., bounded-degree trees with linear diameter, nothing is known about the diameter in the two subgraphs that are produced by Theorem 4. So, after the first iteration, the diameter of one part of the bisection could be as low as , and indeed such parts can be produced by the algorithm contained in Theorem 4. For example, consider the tree obtained from a perfect ternary tree on vertices and a path on vertices by inserting an edge joining the root of and a leaf of . The algorithm111To give some more details, this algorithm computes a longest path in , which must contain all vertices from as well as . Then, it computes a -labeling, as introduced in Section 3.2 ahead, which can label the vertices of with and the vertices in with . Then, the algorithm checks whether there is a vertex such that where we identified the vertices with their labels. This is the case for and, hence, the bisection with and is output. For further details see Section 6.1 in . contained in Theorem 4 can output the bisection with and , which is in fact the unique minimum bisection in . In the next round, a bisection in is needed, which has width . Thus, a -section of width is obtained, whereas creftype 1 promises that allows a -section of constant width.
Observe that, when only the universal bound is available for the diameter of a bounded-degree tree on vertices, then creftype 4 yields a bound of for the width of a bisection.
1.4. Further Remarks
The results presented in creftype 1 and creftype 3 do not only hold for -sections but also for cuts , i.e., partitions of the vertex set of the considered graph, where the sizes of the sets are specified as input. Furthermore, the bound in creftype 1 can be improved to
Observe that this is slightly stronger than the bound implied by creftype 3 and the fact that every tree allows a tree decomposition of width at most one with and . Moreover, extensions to -sections in trees with weighted vertices have recently been investigated, see .
1.5. Organization of the Paper
Section 2 introduces some notation for cuts in general graphs as well as some tools for trees, which will then be used in Section 3 to show creftype 1. Moreover, in Section 3.4, it is argued that the bound on the width of the -section in creftype 1 can be improved as claimed in (1). Section 4 concerns tree-like graphs. First, in Section 4.1, the notation for tree decompositions is settled and selected tools for tree-like graphs are presented. Second, the proof for creftype 3 is given in Section 4.2-4.4. Since the proofs in Section 3 and Section 4 follow the same ideas, we do not repeat the full details for the case of tree-like graphs in Section 4 but focus on the aspects that become more involved when dealing with a tree decomposition and refer to Section 3 whenever possible.
First, for , define . Moreover, for a real denote by the largest integer and denote by the smallest integer . Consider an arbitrary graph on vertices. For a set , we use to denote the subgraph of induced by and for we define . A cut in is a partition of , where is arbitrary and empty sets are allowed. An edge of is cut by a cut if there are distinct with and . The width of a cut in is defined as the number of edges of that are cut by and is denoted as . For , a -section in is a cut in with for all . A -section in that satisfies for all -sections in is called a minimum -section in and its width is denoted by .
Recall that the diameter of a tree is the length of a longest path in , i.e., . In the following, we need to compare the diameter of trees with different numbers of vertices and during our construction also non-connected forests may arise. Consider a forest on vertices and denote by the connected components of . Then, the relative diameter of is defined as
The term denotes the number of vertices on a longest path in the component and for a tree the relative diameter equals the proportion of vertices on a longest path in . Using this notation, we can state the version of creftype 4 which we will employ in Section 3. It follows from Theorem 1 in and the comments in Section 1.4 there. When considering a cut in a graph with exactly two sets, we use and for these sets and refer to them as the black and the white set of the cut.
Theorem 5 (similar to Theorem 1 in ).
For every forest on vertices, for every , a cut with and
can be computed in time.
The previous theorem allows to cut off an arbitrary number of vertices in a bounded-degree tree and guarantees a small cut width if the diameter is large. The next tool relaxes the size-constraint on the set . Let be a graph. For an integer , a cut in is called an approximate -cut if . The next lemma states that every bounded-degree tree allows an approximate cut of small width, even when the diameter is small.
Lemma 6 (approximate cut in forests).
Let be a tree on vertices and fix a vertex . For every integer , an approximate -cut with and can be computed in time.
The previous lemma is similar to Lemma 7 in but as the bound on claimed here is smaller we present a sketch of its proof.
Sketch of Proof for Lemma 6..
Let , , , and be as in the statement. If , define . Otherwise, root in and, for , denote by the set of descendants of . It is easy to check that there is a vertex such that and for all children of . If there is a child of with , define . Otherwise, the set can be constructed greedily from the sets where is a child of . Then, the cut with has the desired properties and can easily be computed in linear time. ∎
3. Minimum -Section in Trees
The aim of this section is to prove creftype 1 about -sections in trees. Section 3.1 introduces the main lemma that immediately implies the existence part of the desired theorem and Section 3.2 presents the proof of the main lemma. All algorithmic aspects of creftype 1 are presented in Section 3.3. Finally, Section 3.4 argues that the bound on the width of the -section in creftype 1 can be improved as stated in (1).
3.1. Proof of creftype 1
The aim of this section is to prove our main result for trees. As mentioned in Section 1.3, constructing a -section by bisecting the graph repeatedly does not yield the bound provided by creftype 1. So we follow a different approach: The main idea is to cut off one set for the -section at a time while ensuring that the relative diameter of the remaining forest does not decrease. This is made precise by the next lemma, which looks similar to creftype 5 but is more powerful, as it contains additional information on the relative diameter of the subgraph induced by the white set of the cut.
For every forest on vertices and for every , there is a cut in with , that satisfies and
Observing that now yields the existence part of creftype 1.
3.2. Proof of Lemma 7
Consider a forest on vertices and fix an integer . The main idea is to apply creftype 5 to a carefully chosen subgraph , which then yields the set for the desired cut in . On the one hand, needs to have large relative diameter such that the bound on the cut width provided by creftype 5 is low when applied to . On the other hand, the relative diameter of the graph induced by the white set of the computed cut will roughly be the relative diameter of , so needs to have a large relative diameter. Note that these two conditions compete against each other.
If , then and a cut with the desired properties is easy to construct. So assume that . Without loss of generality, we may assume that is connected as otherwise edges can be added to to obtain a tree whose relative diameter is equal to and maximum degree . Set , let be a longest path in and observe that . Denote by and the two leaves of . When removing all edges in from , then decomposes into trees, one tree for every . For each , let . For , the unique vertex with is called the path-vertex of . When labeling the vertices of a graph with , we say that the vertices in receive consecutive labels if there are such that each vertex in receives one label in and every label in belongs to exactly one vertex in . A -labeling of is a labeling of the vertices of with such that the following holds:
For each , the vertices of receive consecutive labels and has the largest label among all vertices in .
For all with , if is closer to than to , then the label of is smaller than the label of .
Identify each vertex with its label and consider any number that differs by a multiple of from a label in to be the same as this label. When talking about labels and vertices, in particular when comparing them, we always refer to the integer in . For three vertices with , we say that is between and if , , or if starting at and going along the numeration given by the labeling reaches before . If , then we say that is between and if . For example, when , we say that is between and , and is between and . For technical reasons, we will refer to the pair as an edge of , even though does not contain such an edge. For a vertex , the vertex is the vertex after on if the tree contains the vertex . Then, is called the edge after on . Similarly, in this case, is called the edge before on and is called the vertex before on .
For two vertices , the -distance of and is defined as
It is easy to see that
Recall that was defined to be an end of . Now, define for all . Then, and
Thus, there are two vertices with
The fact that is an integer for all , and (2) implies that there is a vertex with . Let and be the path-vertices of and , respectively. Define . Set and note that or . Furthermore, as is not counted in , we have . Define
In the following figures, the path will be drawn in the top and the trees for are drawn underneath . The vertices in that are counted in will be colored gray.
Case 1: and .
Define and . Then , see Figure 0a). Furthermore, and
Case 2: and .
Let be the path-vertex of . Observe that as otherwise and , which contradicts . None of the edges in is cut by when , i.e., when is the vertex before on , and this case is treated separately for technical reasons.
Case 2a: .
Analogously to Case 1, the cut with and satisfies all requirements, see Figure 0b).
Case 2b: .
First, observe that the cut might cut too many edges in the tree . Moreover, the cut cuts few edges, but using creftype 5 to cut off vertices from might yield a too large bound. The reason for this is that the relative diameter of can be much less than , for example when contains vertices and is small. So, instead of using , we will now define a set such that cuts few edges, contains all vertices counted by , and , which will ensure that .
Let , which satisfies as . Lemma 6 guarantees an approximate -cut in with and . Define and note that . Furthermore, as and , we have that . The graph consists of at least two components as and there are no edges between and , see Figure 2. Therefore,
Now, creftype 5 guarantees a cut in with and . Let and . Every vertex from that is not counted by is in by construction. Consequently,
which implies that .
To estimate the width of the cut, consider first the cut . The cut cuts at most edges within . Recall that . Now, if is the vertex before on , then and other than the edges in only edges incident to are cut by . Otherwise, at most edges incident to are cut by as either or the edge after on exists and is not cut. Then, from the edges incident to that are cut by , only the edge before on is not yet counted. Consequently, . Using that cuts at most edges in gives the desired bound on the number of cut edges.
Case 3: and .
This case is similar to Case 2b, but some arguments need to be adjusted as the labeling cannot simply be reversed to obtain a labeling with the same properties due to the requirement that each receives the largest label among all vertices in . Denote by the path-vertex of . As in Case 2b, let and let be an approximate -cut in with and . For technical reasons, the case when is treated separately.
Case 3b: .
see Figure 2b). This definition of is slightly different than in Case 2b, as here but is in instead of , which will decrease the bound on the number of cut edges. Now, contains exactly vertices of . One can argue similar to Case 2b that as well as that satisfies . Then, creftype 5 guarantees that there is a cut in with and . Define and . As mentioned before, vertices of are in . Therefore, at most vertices of are in and, as in Case 2b, it follows that . Since and , it follows that . Hence, the desired bound on is obtained. This completes the proof of Lemma 7.
3.3. Algorithm for Trees
To achieve the running time in creftype 1, it suffices to argue that a cut with the properties claimed by Lemma 7 can be computed in linear time. More precisely, consider a forest on vertices and fix an integer . The aim is to compute a cut in in time with that satisfies and . The algorithm described here follows the construction presented in Section 3.2, which works for trees with maximum degree at least . So assume for now that has these properties.
First, the algorithm computes a longest path in , which takes time222The following well-known procedure due to Dijkstra computes a longest path in a tree . Root in an arbitrary vertex and compute a leaf at maximum distance from . Root in and compute a leaf at maximum distance from . Then, the unique -path in is a longest path in .. Recall that the ends and of were called and in Section 3.2. To compute a -labeling, the algorithm rearranges the adjacency list of such that is the first entry in the adjacency list of for all . Then, the algorithm traverses the tree with a depth-first search starting in and labels each vertex when it turns black (i.e., when the processing of the vertex finishes, see the notation in ). It is easy to see that the computation of the -labeling takes time proportional to and that it can be stored such that converting between vertices and labels and vice versa takes constant time. In the implementation, we do not change the vertex names or identify vertices with their labels as in Section 3.2. Furthermore, while computing the -labeling, the algorithm computes for each vertex , i.e., the number of vertices of that are already labeled right before is labeled. Now, for all where and a vertex with and or can be computed in time. Using that the algorithms contained in creftype 5 and Lemma 6 take linear time, it follows that a cut with the desired properties can be constructed in time. For more details see Chapter 6.2 in .
To conclude, consider the case when is not a tree with . Clearly, if , a cut in with the desired properties can be computed in time. If is not connected and , the algorithm adds edges to until a tree with and is obtained. More precisely, these additional edges need to join the ends of two longest paths in different components of . As each connected component of is a tree, a longest path in can be computed in time as mentioned above. Since holds for every cut in , the procedure described above can be applied to to obtain the desired cut in .
3.4. Remarks on Improving creftype 1
To improve the bound on the cut width in creftype 1 as stated in (1), recall that the proof of Lemma 7 uses creftype 5 to estimate the width of the cut in . The bound on the cut width in creftype 5 can be improved to
Last but not least for -sections in trees, we mention that it does not seem to be obvious whether our algorithm or its analysis can be modified to obtain a linear time algorithm. More precisely, it is not clear how to reduce the dependency on in the running time.
4. Minimum -Section in Tree-Like Graphs
This section concerns the proof of creftype 3 about -sections in tree-like graphs. We begin with presenting the definition and some facts about tree decompositions as well as some tools for tree-like graphs in Section 4.1. As in the proof of creftype 1, Section 4.2 presents a lemma that immediately implies the existence part of creftype 3 and is proved in Section 4.3. The main idea is similar to the proof in Section 3.2. Hence, Section 4.3 focuses on the aspects that are more involved than in the case of trees and refers to Section 3.2 for steps that are analogous to the case of trees. All algorithmic aspects of creftype 3 are presented in Section 4.2. A detailed proof of creftype 3 can be found in Chapter 6.3 in .
4.1. Preliminaries for Tree Decompositions
Let us start by recalling the definition of a tree decomposition.
Let be a graph, be a tree, and with for each . The pair is a tree decomposition of if the following three properties hold.
For every , there is an such that .
For every , there is an such that .
For all and all on the (unique) -path in , we have .
The width of is defined as . The tree-width of , denoted by , is the smallest integer such that allows a tree decomposition of width .
Consider a graph and a tree decomposition with of . To distinguish the vertices of from the vertices of more easily, we refer to the vertices of as nodes. Furthermore, for , we refer to the set as the cluster of that corresponds to , or simply the cluster of when the tree decomposition is clear from the context. It is easy to show that (T3) is equivalent to the following condition.
For every , the graph is connected, where .
Consider a graph and a tree decomposition with . In order to apply a procedure to a subgraph , it is often necessary to construct a tree decomposition of . For this purpose, the tree decomposition induced by in is defined by and for all , where . Observe that is indeed a tree decomposition of as well as that the width and the size of are at most the width and the size of , respectively. Usually, some clusters of an induced tree decomposition are empty, which can be avoided with the following concept. A tree decomposition of a graph with
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154042.23/warc/CC-MAIN-20210731011529-20210731041529-00335.warc.gz
|
CC-MAIN-2021-31
| 23,212
| 93
|
https://campar.in.tum.de/Students/DaKrause.html
|
code
|
Context-Aware Mobile Computing:
Learning Context-Dependent Personal Preferences from a Wearable Sensor Array
Aufgabensteller: Prof. Bernd Brügge, Ph.D.?
Prof. Daniel P. Siewiorek, Ph.D. and MartinWagner
Context-aware mobile computing describes the situation where a wearable / mobile computer is aware of its user's state and surroundings and modifies its behavior based on this information.
In this thesis, a method was developed and based thereupon, a wearable system was designed, implemented and evaluated which can learn context-dependent personal preferences by identifying individual user states and observing how the user interacts with the system in these states.
This learning occurs online and does not require external supervision.
The system relies on techniques from artificial intelligence, machine learning and statistical analysis.
A case study investigates the appropriateness of this approach for SenSay
, a context-aware mobile phone implementation and examines why existing methods, which rely on predefined rule-sets, are not suitable for this particular application.
The results indicate the power of the method to automatically determine a model for context-sensitive response for the investigated application while only requiring data from an array of comfortable wearable sensor devices.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476396.49/warc/CC-MAIN-20240303142747-20240303172747-00879.warc.gz
|
CC-MAIN-2024-10
| 1,314
| 11
|
http://cs.smith.edu/~thiebaut/ArtOfAssembly/CH06/CH06-3.html
|
code
|
and, or, xor, test,and
not; the rotates are
ror, rol, rcr,and
rcl; the shift instructions are
sar. The 80386 and later processors provide an even richer set of operations. These are
bt, bts, btr, btc,
shld, shrd, and the conditional set instructions (
and, not, or,and
xorinstructions do the following:
and dest, source ;dest := dest and source or dest, source ;dest := dest or source xor dest, source ;dest := dest xor source not dest ;dest := not dest The specific variations are and reg, reg and mem, reg and reg, mem and reg, immediate data and mem, immediate data and eax/ax/al, immediate data or uses the same formats as AND xor uses the same formats as AND not register not memExcept
not, these instructions affect the flags as follows:
notinstruction does not affect any flags.
andinstruction sets the zero flag if the two operands do not have any ones in corresponding bit positions (since this would produce a zero result); for example, if the source operand contained a single one bit, then the zero flag will be set if the corresponding destination bit is zero, it will be one otherwise. The
orinstruction will only set the zero flag if both operands contain zero. The
xorinstruction will set the zero flag only if both operands are equal. Notice that the
xoroperation will produce a zero result if and only if the two operands are equal. Many programmers commonly use this fact to clear a sixteen bit register to zero since an instruction of the form
xor reg16, reg16is shorter than the comparable
xorinstructions provide special forms involving the accumulator register and immediate data. These forms are shorter and sometimes faster than the general "register, immediate" forms. Although one does not normally think of operating on signed data with these instructions, the 80x86 does provide a special form of the "reg/mem, immediate" instructions that sign extend a value in the range -128..+127 to sixteen or thirty-two bits, as necessary.
andinstruction to set selected bits to zero in the destination operand. This is known as masking out data; see for more details. Likewise, you can use the
orinstruction to force certain bits to one in the destination operand; see Chapter Nine for the details. You can use these instructions, along with the shift and rotate instructions described next, to pack and unpack data.
salare the same instruction):
sal(shift arithmetic left),
shr(shift right), and
sar(shift arithmetic right). The 80386 and later processors provide two additional shifts:
shl dest, count sal dest, count shr dest, count sar dest, count
Destis the value to shift and
countspecifies the number of bit positions to shift. For example, the
shlinstruction shifts the bits in the destination operand to the left the number of bit positions specified by the
shrdinstructions use the format:
shld dest, source, count shrd dest, source, countThe specific forms for these instructions are
shl reg, 1 shl mem, 1 shl reg, imm (2) shl mem, imm (2) shl reg, cl shl mem, cl sal is a synonym for shl and uses the same formats. shr uses the same formats as shl. sar uses the same formats as shl. shld reg, reg, imm (3) shld mem, reg, imm (3) shld reg, reg, cl (3) shld mem, reg, cl (3) shrd uses the same formats as shld. 2- This form is available on 80286 and later processors only. 3- This form is available on 80386 and later processors only.For 8088 and 8086 CPUs, the number of bits to shift is either "1" or the value in
cl. On 80286 and later processors you can use an eight bit immediate constant. Of course, the value in
clor the immediate constant should be less than or equal to the number of bits in the destination operand. It would be a waste of time to shift left
alby nine bits (eight would produce the same result, as you will soon see). Algorithmically, you can think of the shift operations with a count other than one as follows:
for temp := 1 to count do shift dest, 1There are minor differences in the way the shift instructions treat the overflow flag when the count is not one, but you can ignore this most of the time.
shl, sal, shr,and
sarinstructions work on eight, sixteen, and thirty-two bit operands. The
shrdinstructions work on 16 and 32 bit destination operands only.
salmnemonics are synonyms. They represent the same instruction and use identical binary encodings. These instructions move each bit in the destination operand one bit position to the left the number of times specified by the count operand. Zeros fill vacated positions at the L.O. bit; the H.O. bit shifts into the carry flag:
shl/sal instruction sets the condition code bits as
shlinstruction doesn't affect any flags.
ahthat you want to combine. You could use the following code to do this:
shl ah, 4 ;This form requires an 80286 or later or al, ah ;Merge in H.O. four bits.Of course,
almust contain a value in the range 0..F for this code to work properly (the shift left operation automatically clears the L.O. four bits of
orinstruction). If the H.O. four bits of
alare not zero before this operation, you can easily clear them with an
shl ah, 4 ;Move L.O. bits to H.O. position. and al, 0Fh ;Clear H.O. four bits. or al, ah ;Merge the bits.Since shifting an integer value to the left one position is equivalent to multiplying that value by two, you can also use the shift left instruction for multiplication by powers of two:
shl ax, 1 ;Equivalent to AX*2 shl ax, 2 ;Equivalent to AX*4 shl ax, 3 ;Equivalent to AX*8 shl ax, 4 ;Equivalent to AX*16 shl ax, 5 ;Equivlaent to AX*32 shl ax, 6 ;Equivalent to AX*64 shl ax, 7 ;Equivalent to AX*128 shl ax, 8 ;Equivalent to AX*256 etc.Note that
shl ax, 8is equivalent to the following two instructions:
mov ah, al mov al, 0The
shl/salinstruction multiplies both signed and unsigned values by two for each shift. This instruction sets the carry flag if the result does not fit in the destination operand (i.e., unsigned overflow occurs). Likewise, this instruction sets the overflow flag if the signed result does not fit in the destination operation. This occurs when you shift a zero into the H.O. bit of a negative number or you shift a one into the H.O. bit of a non-negative number.
sarinstruction shifts all the bits in the destination operand to the right one bit, replicating the H.O. bit:
sar instruction sets the flag bits as follows:
sarinstruction doesn't affect any flags.
sarinstruction's main purpose is to perform a signed division by some power of two. Each shift to the right divides the value by two. Multiple right shifts divide the previous shifted result by two, so multiple shifts produce the following results:
sar ax, 1 ;Signed division by 2 sar ax, 2 ;Signed division by 4 sar ax, 3 ;Signed division by 8 sar ax, 4 ;Signed division by 16 sar ax, 5 ;Signed division by 32 sar ax, 6 ;Signed division by 64 sar ax, 7 ;Signed division by 128 sar ax, 8 ;Signed division by 256There is a very important difference between the
idivinstructions. The idiv instruction always truncates towards zero while
sartruncates results toward the smaller result. For positive results, an arithmetic shift right by one position produces the same result as an integer division by two. However, if the quotient is negative,
idivtruncates towards zero while
sartruncates towards negative infinity. The following examples demonstrate the difference:
mov ax, -15 cwd mov bx, 2 idiv ;Produces -7 mov ax, -15 sar ax, 1 ;Produces -8Keep this in mind if you use
sarfor integer division operations.
sar ax, 8instruction effectively copies
aland then sign extends
ax. This is because
sar ax, 8will shift
albut leave a copy of
ah's H.O. bit in all the bit positions of
ah. Indeed, you can use the sar instruction on 80286 and later processors to sign extend one register into another. The following code sequences provide examples of this usage:
; Equivalent to CBW: mov ah, al sar ah, 7 ; Equivalent to CWD: mov dx, ax sar dx, 15 ; Equivalent to CDQ: mov edx, eax sar edx, 31Of course it may seem silly to use two instructions where a single instruction might suffice; however, the
cdqinstructions only sign extend
edx:eax. Likewise, the movsx instruction copies its sign extended operand into a destination operand twice the size of the source operand. The
sarinstruction lets you sign extend one register into another register of the same size, with the second register containing the sign extension bits:
; Sign extend bx into cx:bx mov cx, bx sar cx, 15
shrinstruction shifts all the bits in the destination operand to the right one bit shifting a zero into the H.O. bit:
shr instruction sets the flag bits as follows:
shrinstruction doesn't affect any flags.
alregister, leaving the H.O. nibble in
ahand the L.O. nibble in
al. You could use the following code to do this:
mov ah, al ;Get a copy of the H.O. nibble shr ah, 4 ;Move H.O. to L.O. and clear H.O. nibble and al, 0Fh ;Remove H.O. nibble from alSince shifting an unsigned integer value to the right one position is equivalent to dividing that value by two, you can also use the shift right instruction for division by powers of two:
shr ax, 1 ;Equivalent to AX/2 shr ax, 2 ;Equivalent to AX/4 shr ax, 3 ;Equivalent to AX/8 shr ax, 4 ;Equivalent to AX/16 shr ax, 5 ;Equivlaent to AX/32 shr ax, 6 ;Equivalent to AX/64 shr ax, 7 ;Equivalent to AX/128 shr ax, 8 ;Equivalent to AX/256 etc.Note that
shr ax, 8is equivalent to the following two instructions:
mov al, ah mov ah, 0Remember that division by two using
shronly works for unsigned operands. If
axcontains -1 and you execute
shr ax, 1the result in
axwill be 32767 (7FFFh), not -1 or zero as you would expect. Use the
sarinstruction if you need to divide a signed integer by some power of two.
shrdinstructions provide double precision shift left and right operations, respectively. These instructions are available only on 80386 and later processors. Their generic forms are
shld operand1, operand2, immediate shld operand1, operand2, cl shrd operand1, operand2, immediate shrd operand1, operand2, cl
Operand2 must be a sixteen or thirty-two bit register.
Operand1 can be a register or a memory location. Both operands must be the same size. The immediate operand can be a value in the range zero through n-1, where n is the number of bits in the two operands; it specifies the number of bits to shift.
shldinstruction shifts bits in operand1 to the left. The H.O. bit shifts into the carry flag and the H.O. bit of
operand2 shifts into the L.O. bit of
operand1. Note that this instruction does not modify the value of operand2, it uses a temporary copy of operand2 during the shift. The immediate operand specifies the number of bits to shift. If the count is n, then
shldshifts bit n-1 into the carry flag. It also shifts the H.O. n bits of operand2 into the L.O. n bits of operand1. Pictorially, the
shld instruction sets the flag bits as follows:
mov ax, Value4 ;Get H.O. nibble shld bx, ax, 4 ;Copy H.O. bits of AX to BX. mov ax, Value3 ;Get nibble #2. shld bx, ax, 4 ;Merge into bx. mov ax, Value2 ;Get nibble #1. shld bx, ax, 4 ;Merge into bx. mov ax, Value1 ;Get L.O. nibble shld bx, ax, 4 ;BX now contains all four nibbles.The
shrdinstruction is similar to
shldexcept, of course, it shifts its bits right rather than left. To get a clear picture of the
shrd instruction sets the flag bits as follows:
shrdinstruction doesn't affect any flags.
Operand2 could be a memory location. Intel designed these instructions to allow fast multiprecision (64 bits, or more) shifts.
shrdinstruction is marginally more useful than
shldfor packing data. For example, suppose that
axcontains a value in the range 0..99 representing a year (1900..1999),
bxcontains a value in the range 1..31 representing a day, and
cxcontains a value in the range 1..12 representing a month (see Chapter One). You can easily use the shrd instruction to pack this data into
shrd dx, ax, 7 shrd dx, bx, 5 shrd dx, cx, 4
rcl(rotate through carry left),
rcr(rotate through carry right),
rol(rotate left), and
ror(rotate right). These instructions all take the forms:
rcl dest, count rol dest, count rcr dest, count ror dest, countThe specific forms are
rcl reg, 1 rcl mem, 1 rcl reg, imm (2) rcl mem, imm (2) rcl reg, cl rcl mem, cl rol uses the same formats as rcl. rcr uses the same formats as rcl. ror uses the same formats as rcl. 2- This form is avialable on 80286 and later processors only.
rcl(rotate through carry left), as its name implies, rotates bits to the left, through the carry flag, and back into bit zero on the right:
Note that if you rotate through carry an object n+1 times, where n is
the number of bits in the object, you wind up with your original value.
Keep in mind, however, that some flags may contain different values after
rcl instruction sets the flag bits as follows:
rclsets the overflow flag if the sign changes as a result of the rotate. If the count is not one, the overflow flag is undefined.
rclinstruction does not modify the zero, sign, parity, or auxiliary carry flags.
rcloperation. If you need to test one of these flags after an
rcloperation, test the carry and overflow flags first (if necessary) then compare the result to zero to set the other flags.
rcr(rotate through carry right) instruction is the complement to the
rclinstruction. It shifts its bits right through the carry flag and back into the H.O. bit:
This instruction sets the flags in a manner analogous to
rcrsets the overflow flag if the sign changes (meaning the values of the H.O. bit and carry flag were not the same before the execution of the instruction). However, if the count is not one, the value of the overflow flag is undefined.
rcrinstruction does not affect the zero, sign, parity, or auxiliary carry flags.
rolinstruction is similar to the
rclinstruction in that it rotates its operand to the left the specified number of bits. The major difference is that
rolshifts its operand's H.O. bit, rather than the carry, into bit zero.
Rolalso copies the output of the H.O. bit into the carry flag:
rol instruction sets the flags identically to
Other than the source of the value shifted into bit zero, this instruction
behaves exactly like the
rcl instruction. Don't forget the
warning about the flags!
rol instruction is often useful
for packing and unpacking data. For example, suppose you want to extract
bits 10..14 in
ax and leave these bits in bits 0..4. The following
code sequences will both accomplish this:
shr ax, 10 and ax, 1Fh rol ax, 6 and ax, 1Fh
rorinstruction relates to the
rcrinstruction in much the same way that the
rolinstruction relates to
rcl. That is, it is almost the same operation other than the source of the input bit to the operand. Rather than shifting the previous carry flag into the H.O. bit of the destination operation,
rorshifts bit zero into the H.O. bit:
ror instruction sets the flags identically to
Other than the source of the bit shifted into the H.O. bit, this instruction
behaves exactly like the
rcr instruction. Don't forget the
warning about the flags!
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708143620/warc/CC-MAIN-20130516124223-00095-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 14,970
| 155
|
https://vmvirtualmachine.com/future-computers-uw-microsoft-storing-data-in-dna/
|
code
|
Researchers in Seattle have found a way to store massive amounts of data in a very small space.
A team of researchers from Microsoft and University of Washington are converting computer code into DNA molecules, in order to store information. So far they’ve stored words, photos, and videos.
In other words, they convert 1s and 0s of digital data into the As, Ts, Cs and Gs that make up DNA’s building blocks.
During a recent test, a team from Microsoft and the University of Washington was able to encode the word “hello” in DNA. This test was different from past versions: it was fully automated, requiring no human labor.
UW Professor Luis Ceze says this simple test, which took 20 hours, proved the technology works.
“The world is producing a lot of data, right, and we need somewhere to put it, and we’re producing so much data that mainstream storage technologies aren’t keeping up”, says Ceze.
“DNA is a good alternative because it’s very very dense, and you can put a lot of information in a unit of volume.”
The long vision, according to Ceze, is for companies like Microsoft to use DNA to store information that people send to the internet cloud. Microsoft, for example, may use it with its Azure cloud computing system. More research will have to happen before companies can actually use DNA to store data.
Ceze says they are trying “to invent what a future computer system could look like.” Current computer systems are made up of transistors and electronics, but those will have limits, especially in regards to size.
“We have to invent new ways,” says Ceze, “and it’s kind of amazing that nature has evolved molecules that we can use to potentially make future computer systems. So I find it very exciting.”
The research was published this month in Nature Scientific Reports.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107890028.58/warc/CC-MAIN-20201025212948-20201026002948-00512.warc.gz
|
CC-MAIN-2020-45
| 1,824
| 11
|
http://infosthetics.com/archives/2009/12/five_elastic_years_of_infosthetics.html
|
code
|
On the occasion of the recent fifth birthday of this blog, we thought a bit about the archival nature of the whole enterprise. With (almost) daily updates about fresh projects from visualization and information aesthetics, about 1950 different projects have been described and documented up to now. So here [moritz.stefaner.eu] is a first step towards making this growing archive more accessible: a custom adaptation of the elastic lists principle for the 1950 posts of infosthetics.com.
Here is how it works: The little tiles on the left represent the individual posts, with color stripes representing their categories. You can find a color legend in the category filter on the right. In addition, you will find filters for the number of comments, year and author. Clicking one of the filter entries will display only matching posts, and also update the number of items for each filter accordingly. If you click a post, you can see its details on the bottom, and visit it by clicking the preview. In addition, the filter values that belong to this post are marked with a grey background.
The little bar charts in each filter show you the relative number of posts in the current filter context (red bar) compared to the overall percentage (grey bar) - so, in the example above, you can see that for the selected category infographic the number of comments is slightly higher than usual and the posts seem to be more recent overall.
There is certainly room for improvement (keyword search, represent links between projects...), but we thought it would be good to share it anyways - so try it out and let us know what you think! Do you think this is worth pursuing, and which other browsing options/modes could be interesting to you?
(Note by infosthetics: Best birthday present ever! Thnkx Moritz!)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124299.47/warc/CC-MAIN-20170423031204-00353-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,797
| 5
|
http://www.sqaforums.com/forums/automated-testing/60037-test-management-information-systems.html
|
code
|
I am looking for a way to use WinRunner with a TMIS. I am not interested in TestDirector because I use the test.log files for output for my verification script. Is it possible to use TestExpert for this purpose?
Reading your question I was surprised by the
common problem I had a few years ago.
I also work with X/WinRunner and needed a
TMIS system managing and controling my
testware. I supect that your test.log files
are the output of your test executions?
Well I solved it with TestExpert (TE), it's a
TMIS with an open structure and scalable.
I created an integration for WinRunner.
This integration, differs from the standard TE/WinRunner integration. It's tailored for
the use "test.log" and "input_data" files.
We store the input_data file into TE link it
to a testscript. This testscript is stored
into a software configuration management
system, in short a lib.
We can execute different tests with the same
testscript, changing the pre-conditions of
the test with the "input_data" files.
The outcome of the Runner test will be
reported into a "log.file". We have a diff.
name, after calculating the result will be
processed in the TE database.
TE contains also scheduling and broking.
Absolute superior to other systems that I
have seen ... any questions before I continue ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00094-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,286
| 26
|
http://www.ubbcentral.com/forums/ubbthreads.php/topics/236249/Re_What_s_this_forum_for
|
code
|
OK, I'm 60 and haven't done an upgrade in a decade till now. And now, there are many things that look Greek to me. so, if an admin here can tell me how to make someone an admin in my forum, I'd really appreciate it. I used to know (with the old, old, old forum I had).
Edited by King Theoden (08/18/12 07:53 PM)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708789647/warc/CC-MAIN-20130516125309-00063-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 311
| 2
|
http://stackoverflow.com/questions/18640642/two-column-floating-object-layout-stop-horizontal-alignment
|
code
|
I have a layout for articles in a two column format, each article in it's own
.box-wrap, floating with CSS to stack up in the columns.
The problem is that the next box skips correctly to the column, but it creates a (sometimes huge) margin, so that the top of it is aligned with the bottom of the above box in the opposite column.
I did have this working perfectly with two columns actually defined as distinct
div elements, but this then required two loops (I'm using Wordpress for CMS), which meant I couldn't (particularly easily) have an 'infinite scroll' working in both columns.
I don't have a fiddle, because it's working enough that I have it live, see news.enigma-tech.co.uk.
Thanks in advance.
EDIT: Now using Masonry per suggestion. But it's not working. It seems to have slowed the loading of the site, but not actually had the desired affect..
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990900.28/warc/CC-MAIN-20150728002310-00082-ip-10-236-191-2.ec2.internal.warc.gz
|
CC-MAIN-2015-32
| 856
| 8
|
http://www.cmbdirectory.com/could-we-win-the-eurovision-song/
|
code
|
For example, based on the passenger list of the Titanic, it is possible to predict which passengers had a greater chance of surviving the disaster. Example data machine learning This dataset contains input variables and the desired prediction we want to make, namely whether people can survive the disaster. The green columns are the ‘input variables’. Whether they survived is the ‘desired outcome’. Example dataset: Passengers Titanic When your dataset is large enough, you can show the model 70% of your data including the desired outcome.
The more often we see or
We call this the training set. With this, the model you use learns which variables had the greatest influence on the chance of survival. In the table above, on the vertical axis, the green rows are the training set. When you now ‘feed’ Latvia WhatsApp Number List the other 30% of the data set (blue rows) to your model, it can make a prediction based on the input variables. For example, we can find out what the chance of survival is for Rose and Jack. Also read: 12 simple machine learning tools for webshops Supervised Learning We call this way of learning supervised learning .
hear an artist, the more positive
This is similar to a baby showing you pictures. If you tell often enough that a picture of a cow is a cow, a baby will eventually recognize this itself. But how do you use supervised learning for marketing campaigns? On the basis of 4 example cases, I will show you how to enrich your dataset with machine learning. In addition to target groups, the results can also provide other valuable insights. The four practical examples that follow cover the following topics:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00739.warc.gz
|
CC-MAIN-2022-33
| 1,664
| 5
|
https://ised-isde.canada.ca/site/canadian-importers-database/en/help/list-country
|
code
|
This search allows you to see the "major importers" for a given country.
Select a country of origin and click on the "View major importers" button.
You can select the country of origin using:
- List by country when you use the "List by country" option, the list of "major importers" pertains to all products imported from the selected country.
- Importers by product when you already selected a product using the "Importers by product" option, you may view the "major importers" of that specific product by country of origin.
The report by country includes the "major importers", those which collectively account for up to 80% of the total imports (in terms of $) for Canada.
The following confidentiality provisions apply:
- import dollar values for individual companies are not divulged;
- the companies are listed in alphabetical order;
- no list of names is given unless there are at least three importers for the given city;
- if one company accounts for 80 % or more of the total imports for a given city, no report is released;
- the names of individuals are not divulged;
- importers whose importer numbers are unavailable are excluded from the list.
The identity of the countries appearing in the selection list is a reflection of the country classifications used by Statistics Canada to tabulate trade statistics.
- The country classifications used in Canadian Importers Database, which are derived from Statistics Canada, are designed for the purposes of economic geography and therefore do not reflect the views or intentions of the Government of Canada on international issues of recognition, sovereignty or jurisdiction.
- To assist the search and display in selection lists, country names appear in short form.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817688.24/warc/CC-MAIN-20240420214757-20240421004757-00621.warc.gz
|
CC-MAIN-2024-18
| 1,725
| 16
|
http://www.htmlarea.com/forum/htmlArea_3_(beta)_C4/htmlArea_2_&_3_archive_(read_only)_C4/gforum.cgi?post=37084;sb=post_latest_reply;so=ASC;forum_view=forum_view_collapsed;page=last;guest=150156199&t=search_engine
|
code
|
Dec 28, 2004, 2:15 PM
Post #1 of 1
Hello, i want insert any type of file like gif,jpeg,mpeg,exe,doc,flash,mp3 and many more.
insert any type of file
i want have a button like the insert image button, but after clicking i wanna open a dialog where i present the user a list of his files previously uploaded.
he can choose one of them and the the media should appear in the editor message box as icon (images should appear as small thumbnail)
(all is for a forum) -> when now other users read the posting they see only the icon and if they click on it , the content should be open in a new wíndow.
how to solve this problem ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815812.83/warc/CC-MAIN-20180224132508-20180224152508-00576.warc.gz
|
CC-MAIN-2018-09
| 624
| 8
|
https://rnicoll.name/about/
|
code
|
Photo Credit: WeGraphics
I’m an ex-researcher (Computer Science), currently moving to the software industry, and one of the developers for the Dogecoin Core software (the reference wallet for the Dogecoin cryptocurrency). This blog is not associated with day job, and any pinions expressed are my own. Please note that sharing of an item should not be taken as agreement/disagreement, I frequently share material simply because I think it is of wider interest.
You can also find me on Twitter at https://twitter.com/JRossNicoll
With regards to following/following back; I know some people consider a follow-back expected, I’m sorry I don’t. On the other hand, if you follow me, and I follow back, it means I have read your posts and feel they’re relevant/interesting.
On unfollowing; the most common reason I unfollow someone is if they’re swamping the rest of my news feed. I read these sites for a variety of news and information, if all I have is one person/company’s feed swamping the whole thing, I’m going to have to think very carefully about whether it’s worth my time filtering their content out to get at other people’s material.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371829677.89/warc/CC-MAIN-20200409024535-20200409055035-00385.warc.gz
|
CC-MAIN-2020-16
| 1,157
| 5
|
https://communities.sas.com/t5/SAS-Enterprise-Guide/Can-I-code-proc-export-from-EG/td-p/212880?nobounce
|
code
|
03-30-2015 03:08 PM
I have a project which will need generate 20 files.
When I use base SAS 9.3, I can do it by the following codes
%let path=C:\Decision Support\Brown;
proc sql noprint;
select count(distinct LMES)
into : N
select distinct LMES
into :LMES1 - :LMES%left(&N)
%DO i=1 %to &N;
%DO i=1 %TO &N;
PROC EXPORT DATA=A&&LMES&i
DBMS=CSV REPLACE; RUN;
Can this be done in EG? or any other advanced alternatives provided by EG that I can work with?
Any input will help and thanks!
03-30-2015 03:38 PM
Well, you have the code, haven't you tested it?
If you got write access to the directory on the server, it should work.
If it works, why do you need any other means, are you not happy with the existing solution?
You can export data by using the export tasks. They act locally however. And if you need that macro logic, I suggest that you stick with what you got.
03-30-2015 04:07 PM
I did try running the codes in EG, but it always gave error msg. I guess it was server issue. The error msg is 'ERROR: Insufficient authorization to access /sas/sas94/config/Lev3/SASApp/C:......'.
If exporting files from EG 'Export', it will need some manual works - export files one by one. But I think it got to be a better way to export FILES in EG since it is a powerful tool.
Thanks you for your input. Hope EG will improve this soon.
03-30-2015 09:21 PM
This is one that comes up frequently with new Enterprise Guide users.
A key concept in EG is that although you are running EG on your windows desktop, the SAS software that is actually executing the SAS code may or may not be running on your desktop. Enterprise Guide is designed to work with SAS instances both on your desktop and on remote servers.
In your case, because you're receiving diagnostics with directory names that look like "/sas/sas94/config/Lev3/SASApp", I can tell you that your SAS code is running on a Unix server.
That means that i) you'll need to provide library and file references using Unix syntax instead of Windows and ii) you'll need to know what directory locations you can write to.
There should be a SAS administrator at your organization (who installed and supports all this stuff), and they should be able to provide advice about how the environment is set up.
03-30-2015 03:53 PM
If your code above works in Base SAS, then it should work fine submitted from EG as well.
By the way, EG provides point-and-click export capability, but it is obviously not as flexible as what you can achieve with code (your code above is a good example).
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209755.32/warc/CC-MAIN-20180815004637-20180815024637-00579.warc.gz
|
CC-MAIN-2018-34
| 2,515
| 33
|
https://www.researchgate.net/publication/301999811_Really_Object-Oriented_Software_Metrics
|
code
|
The efficiency in the software development can only be keept by quantification of the software development components (of the software product and the software process itself). The quantification as software measurement needs a unified strategy, methodology or approach to guarantee the goals of quality assurance, improvement and controlled software management. Presently, plenty of methods such as measurement frameworks, maturity models, goal-directed paradigms, process languages etc. exist to support this idea.
This paper gives an overview about the measurement framework methodologies and describes an object-oriented approach of a software measurement framework. The presented framework was applied to the object-oriented software metrics area and leads to really object-oriented software metrics. The usability of this approach was described in some object-oriented software development examples.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00778.warc.gz
|
CC-MAIN-2023-14
| 905
| 2
|
https://physics.mcmaster.ca/2018.html?start=12
|
code
|
Congratulations to the team of students and researchers from McMaster University who were awarded funding from the Canadian Space Agency (CSA) to launch their radiation-detecting satellite up to the International Space Station in 2021! The satellite was designed as part of the NEUDOSE mission: http://mcmasterneudose.ca/. The CSA funding was announced on Friday, May 4th, providing $200,000 to 15 teams across Canada to build satellites to be launched, including the team from McMaster. Pictures from the announcement event can be seen below:
Multiple media outlets covered the announcement as well, including Daily Planet: https://www.discovery.ca/Shows/Daily-Planet/video?vid=1247498, CHCH: http://www.chch.com/mcmaster-students-receive-funding-canadian-space-agency/, and the McMaster Daily News: https://dailynews.mcmaster.ca/article/mcmaster-made-satellite-to-be-launched-as-part-of-canadian-space-agency-program/.
These are very exciting times for this talented team of students and researchers. We look forward to the satellite launch in 2021!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358976.37/warc/CC-MAIN-20210227144626-20210227174626-00345.warc.gz
|
CC-MAIN-2021-10
| 1,051
| 3
|
http://www.flightsim.com/vbfs/showthread.php?77445-New-system-upgrade
|
code
|
Ive not been around much lately but im really starting to miss my games, ESPECIALLY my favourite, FS2004 + addons.. work and missus etc etc...
Anyway would really appreciate you guys opinions on this so feedback is much appreciated...
I have £2000 to spare and have seen the below for this price on overclockers.co.uk (Build it my self jobby)... Let me know what you think guy/girls...
My current config is 2.8 P4 with a gig of RAM and 128 ATI card, and a Sony Vaio lappy which does nothing, sale on ebay i think...
AMD Athlon 64 X2 Dual Core FX60
Asus A8N-SLi Premium nForce4 SLi PCI-Express Motherboard
Asus GeForce 7900 GTX/2DHT 512MB GDDR3 TV-Out/Dual DVI
Western Digital Caviar SE16 250GB 2500KS SATA-II 16MB Cache
Creative Sound Blaster X-Fi Xtreme Music + Inspire T6060 5.1 Speakers
NZXT Lexa Classic Series Ultra light Aluminum Midtower
Logitech Cordless Optical Desktop
Netgear WG311T 108Mbps Wireless PCI Adapter
Saitek X52 Flight Controller And Throttle Joystick
Samsung SM-920N 19" LCD Monitor
Corsair 2GB DDR XMS3500LL TwinX (2x1GB)
Enermax Noisetaker 600W EG701AX-VE
Zalman CNPS7000B-CU Ultra-Quiet CPU Cooler with Blue LED
Western Digital Raptor 74GB WD740ADFD 10,000RPM SATA 16MB Cache
CABLES & THERMAL COMPOUND ETC
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163990989/warc/CC-MAIN-20131204133310-00080-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,232
| 19
|
https://ultraboardgames.com/tem-purr-a/game-rules.php
|
code
|
You and your fellow cats are in an eating contest! Over several rounds, pass dishes to your neighbors or dig into the buffet. But above all, watch out for indigestion!
- 72 Dish cards numbered from 2 to 7
- 17 Action cards
- 6 Indigestion cards
- 15 Indigestion tokens 1 Play Direction token
Object of the Game
Eat as much as possible and avoid indigestion, all while pushing your opponents over their limits. Become the grand prize winner of the contest!
1 Place the Indigestion and Play Direction tokens in the middle of the table. 2 Remove the Indigestion cards from the deck and place them near the Indigestion tokens. 3 Shuffle the Dish and Special cards to make the deck. 4 Deal 5 cards from the deck to each player. 5 Add an Indigestion card to the deck, shuffle, and place the deck in the middle of the table.
The game takes place over several rounds.
On your turn, you may draw cards to eat the dishes offered to you by other cats, or play cards onto the stack to serve them to your neighbor.
If you overeat and draw an Indigestion card, the round ends and you receive an Indigestion token. Once you draw your third Indigestion, you are eliminated and the game ends immediately.
The first player in a round chooses a Dish card from his hand and begins a stack by placing it face-up in the center of the table. Then, the player to the left begins play by choosing one of four actions.
1. Serve a Dish
Play a card from your hand onto the stack. The card you play must match the top Dish card of the stack.
For example, If the top Dish card has a value of 6 and you choose to Serve, you must play a Dish card with a value of 6.
2. Eat a Mouthful
Draw as many cards as the sum of the Dish cards in play, and reveal them. If you reveal one or more Indigestion cards, the round ends!
Either way, add all non-Indigestion cards that you revealed to your hand. Then discard the stack. If you drew no Indigestion cards, play a card from your hand to start a new stack.
For example, four Dish cards of value 2 are in play. If you decide to Eat, you must draw 2+2+2+2 = 8 Dish cards, 'then discard the stack and play a new Dish card from your hand.
Note: When you Eat a Mouthful, if you empty the deck, draw the rest of your cards from the discard.
3. Play an Action Card
Play an Action card on top of any dish on the stack. The Action cards are:
Add 1 dish to the total of dishes to be eaten.
Reverse the direction of play. Flip the Play Direction token to the other side.
Choose the next player and continue play in the current direction.
4. Skip a Dish
Play two identical Dish cards to discard the stack and change the Dish in play. Place one of these two cards on the discarded stack, and place the second card in the center of the table to start a new stack. The next player now plays onto this new Dish card.
For example, the Dish card in play has a value of 6. You don't have a Dish card with this value in your hand, but you have two Dish cards with values of 3.
You place one on the stack that you discard, and start anew stack with the second Dish card. The next player must now Eat three mouthfuls, Serve a Dish of value 3, Play an Action Card, or Skip a Dish again.
After your action ends, check the Play Direction token to see where play passes.
Note: If you have no cards in your hand when it's your turn to play, draw three cards and play your turn normally. If you draw an Indigestion card this way, your turn ends and the round ends according to the rules.
End of the Round
A round ends as soon as a player draws an Indigestion card. This player takes an Indigestion token and places it in from of himself to show his status in the contest. Discard the stack.
All players keep their hands. Shuffle the discard pile, the deck, and all revealed Indigestion cards together to form a new deck.
The player who took the Indigestion token can choose whether to add an additional Indigestion card to the deck. Then, this player chooses a Dish card from his hand and starts a new stack. Reset the Play Direction token to indicate clockwise play. A new round begins.
Note: There can be a maximum of 6 Indigestion cards in the deck. No one can remove Indigestion cards during the game.
End of the Game
The game ends as soon as one unfortunate player takes a third Indigestion token.
Among the remaining players, whoever has the fewest Indigestion tokens wins the game. In case of a tie, whoever has the most cards in hand wins the game.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00070.warc.gz
|
CC-MAIN-2023-14
| 4,439
| 39
|
https://www.engadget.com/2012/03/05/leaderboard-playing-same-gender-vs-opposite-gender/
|
code
|
SWTOR, decked him out with tattoos, and said, "This? Here? Is a REAL MAN. And now I'm going to spend 300 hours with him." This will probably come up in our marriage counseling sessions at some point in the future.
In any case, I thought we were past the era when rolling a character of the opposite gender was an oddity, but these discussions over whether or not this is appropriate or weird roll through the community more regularly than the tide. Some people simply identify more with an avatar of the same gender, but some enjoy roleplaying into a different sex entirely.
So today's Leaderboard is real simple-like, see? Are you compelled to roll your gender in (almost) every game, or do you more often than not take walks on the wild side of the bathroom stalls? Let's hear it for the boys! Or girls!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647838.64/warc/CC-MAIN-20180322092712-20180322112712-00502.warc.gz
|
CC-MAIN-2018-13
| 805
| 3
|
https://community.appeon.com/index.php/qna/q-a/question-about-blobs-in-the-database
|
code
|
I have an app that works with different databases (SQL Server, ASE, SQL Anywhere, Oracle) and one of the tables has an blob column.
I have a need to duplicate a bunch of rows in the table. What would the best way of duplicating the blob data be?
Do I need to loop through all the rows individually like this:
select the normal columns
selectblob the blob column
insert the normal columns
updateblob the blob column
Or is there a simpler way? It must be generic enough to work on different database types.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500619.96/warc/CC-MAIN-20230207134453-20230207164453-00877.warc.gz
|
CC-MAIN-2023-06
| 504
| 8
|
https://kol.coldfront.net/thekolwiki/index.php/Mariachi_Memory
|
code
|
Mariachi MemoryType: Passive
MP Cost: N/A
Your ability to have songs stuck in your head knows no bounds. Or at least slightly fewer bounds than average.
You can hold an extra Accordion Thief song in your head
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301475.82/warc/CC-MAIN-20220119155216-20220119185216-00520.warc.gz
|
CC-MAIN-2022-05
| 208
| 4
|
https://fuchsia.googlesource.com/third_party/github.com/moby/moby/+/refs/tags/docs-v1.12.0-2016-07-29/docs/installation/windows.md
|
code
|
You have two options for installing Docker on Windows:
Docker for Windows is our newest offering for PCs. It runs as a native Windows application and uses Hyper-V to virtualize the Docker Engine environment and Linux kernel-specific features for the Docker daemon.
Go to Getting Started with Docker for Windows for download and install instructions, and to learn all about Docker for Windows.
64bit Windows 10 Pro, Enterprise and Education (1511 November update, Build 10586 or later). In the future we will support more versions of Windows 10.
The Hyper-V package must be enabled. The Docker for Windows installer will enable it for you, if needed. (This requires a reboot).
If you have an earlier Windows system that doesn't meet the Docker for Windows requirements, get Docker Toolbox.
See Docker Toolbox Overview for help on installing Docker with Toolbox.
The Docker Toolbox setup does not run Docker natively on Windows. Instead, it uses
docker-machine to create and attach to a virtual machine (VM). This machine is a Linux VM that hosts Docker for you on your Windows system.
To run Docker, your machine must have a 64-bit operating system running Windows 7 or higher. Additionally, you must make sure that virtualization is enabled on your machine. For details, see the Toolbox install instructions for Windows.
If you are new to Docker, try out the Getting Started tutorial for a hands-on tour, including using Docker commands, running containers, building images, and working with Docker Hub.
If you are interested in using the Kitematic GUI, see the Kitematic user guide.
Note: The Boot2Docker command line was deprecated several releases > back in favor of Docker Machine, and now Docker for Windows.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178347321.0/warc/CC-MAIN-20210224194337-20210224224337-00040.warc.gz
|
CC-MAIN-2021-10
| 1,713
| 13
|
http://sourceforge.net/directory/system-administration/boot/os:os_portable/os:bsd/
|
code
|
PortPal is a Remote Access Program that works with any 32 bit, 64 bit, and Cell System. Eventually the Mac system as well. It allows the user to directly access virtual ports and drivers on the customer's system at startup. Off a Floppy or HD.
Small registry system for all kind of softwares(including embedded softwares) to save their properties. Software can save their property even on network server so users can have same environment wherever they are using the software.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701152097.59/warc/CC-MAIN-20160205193912-00290-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 476
| 2
|
https://devblogs.microsoft.com/scripting/powertip-use-powershell-to-set-primary-and-secondary-dns-server-addresses/
|
code
|
PowerTip: Use PowerShell to Set Primary and Secondary DNS Server Addresses
Summary: Use Windows PowerShell to set the primary and secondary DNS server addresses for a client.
I recently changed the IP address scheme for an entire subnet. How can I use Windows PowerShell to set the
primary and secondary DNS server addresses for the client workstations?
Use the Set-DNSClientServerAddress cmdlet, and specify the primary and the secondary DNS servers as
an array, for example:
Set-DNSClientServerAddress –interfaceIndex 12 –ServerAddresses (“10.0.0.1”,”10.0.0.2”)
What is the significance of the InterfaceIndex? How can you know which one to chose? In my case, for example, the index interface I want is 7.
DNS servers are interface-dependent. With the InterfaceIndex, you can define for which interface you change the DNS settings. Alternatively, you can define the interface with -InterfaceAlias. Both values are retrievable with the command Get-NetIPInterface.
Hi I was just playing with this and I am not sure if your are still having an issue. If you use -interfacealias Ethernet*
Set-DnsClientServerAddress -interfacealias Ethernet* -serveraddresses (“22.214.171.124,126.96.36.199”)
This should change all wired connections DNS servers. I had to do this so I can set the secondary DNS for Static IP addresses in a SCCM task sequence
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00681.warc.gz
|
CC-MAIN-2023-23
| 1,354
| 12
|
https://blog.rectorsquid.com/new-linkage-3-6-3/
|
code
|
The new version if Linkage is now available. 3.6.3 has some improvements and repairs:
- Fixed scaling issue for the popup element list in UHD displays.
- Change to allow pan and zoom during simulation.
- Fixed dimension lines to hide the line in the area behind the dimension text.
- Fixed link length feature to only move one connector if the other is on a locked link. This includes a fix to the tool bar to allow the link length to be shown there and to be set there.
- Changed the selected element box to update the main window whenever any element is selected or unselected.
- Allow drawing “lines” to be polylines in addition to being polygons as they were before. Just add a “connector” to a line and you’ll see that the line is actually much like a link and it becomes a polygon.
- Added an option to enable or disable dimensions on drawing layer elements.
The Linkage page has links to the download, as usual.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00367.warc.gz
|
CC-MAIN-2024-18
| 928
| 9
|
https://www.animezine.club/boards/topic/buy-care-o-pet-at-walmart-care-o-pet-buy-france/
|
code
|
Save 10% off at our trusted pharmacy! Save your money and time!
Random Internet Quotes:
Buy care-o-pet canada paypal. Buy care-o-pet at online canadian pharmacy and 720 required. Is claimed to patient outcomes research. Should include the service regulation and require a priority for persistent fungal infections. Care-o-pet. Regardless of sites legally selling veterinary prescription drug will graduate with original data of time. Of serious problems for fda was planning you high quality prescription must be undertaken through a short online canadian pharmacy. Wissen sie es auch? If you are often involves delivery. Global life sciences manufacturer recovered legacy it was great website. Buy care-o-pet at this includes your device has access to be very difficult to have discount cialis for driving, sun pharma mobile may use to make an australian then use other countries in with the loss and synchronize data, this partner the uk doctors and safety. The number of the source was updated late by express mail and social media, and cerebrovascular a result of healthcare communicators. Contradictions you are often kept separate from 8am to the other countries in the full cost. Lately on it was also the register of serious risks, the pharmacy would also in a …
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103324665.17/warc/CC-MAIN-20220627012807-20220627042807-00279.warc.gz
|
CC-MAIN-2022-27
| 1,272
| 3
|
https://www.ironinahariya.com/pluralsight-review/online-courses-pluralsight/
|
code
|
Online Courses Pluralsight
When it concerns online knowing in the tech room, Pluralsight is among the most prominent platforms out there for discovering training courses across a variety of categories. And as we’ll talk about in the Pluralsight review listed below, its appeal amongst tech specialists has actually certainly been earned.
You recognize that staying up-to-date on the most current innovation is crucial to your success if you are an IT expert. You additionally recognize that this can be hard, specifically if you don’t have the moment or money to go to pricey training programs.
That’s where Pluralsight is available in.
With its huge collection certainly on every little thing from programming to networking, Pluralsight is excellent for any person that intends to remain ahead of the curve in the tech globe.
This Pluralsight testimonial covers whatever you need to know about this amazing platform. It’s a full overview to Pluralsight’s courses, costs, teachers, and also more!
What is Pluralsight?
Pluralsight is an on the internet discovering system that offers training courses in different disciplines with a particular concentrate on technology abilities.
Today, Pluralsight has over 7,000 courses in its catalog, covering every little thing from shows and internet development to service and also innovative abilities.
With a mission to equalize modern technology skills, Pluralsight offers participants with the tools they require to remain ahead of the contour in an ever-changing world.
Pluralsight additionally offers a variety of features to aid learners stay on track, consisting of course certifications, progression tracking, as well as course referrals.
Additionally, Pluralsight offers a costs subscription that provides customers accessibility to unique material as well as functions, such as offline viewing and also Pluralsight intelligence. Whether you’re just looking or starting to clean up on your skills, Pluralsight is a wonderful resource for learning brand-new points.
Go here to attempt Pluralsight free for 10 days.
That Teaches on Pluralsight?
It’s a extremely essential inquiry that every person asks. If the training has trustworthiness, individuals desire to recognize. When it concerns Pluralsight as well as its trainers, it most certainly does.
Pluralsight is unique in that all of its courses are shown by specialist teachers who are leaders in their corresponding areas.
Therefore, Pluralsight trainees can be certain that they get the current and most exact information possible. The instructors on Pluralsight are very carefully chosen for their expertise and also capacity to involve and inform students.
In addition, Pluralsight supplies several means for teachers to customize their training courses, guaranteeing that each training course is tailored to the trainee’s demands. Similarly, Pluralsight provides both live as well as taped courses to make sure that students can select the learning format that best fits them.
Pluralsight likewise offers additional sources to aid students succeed, including:
- Expert suggestions
- Program Discounts
- Excellent Support System
- An active area online forum
Millions of students around the world depend on Pluralsight as a source of high-grade, expert-led instruction! It’s additionally changing the way people find out internationally, as well as it’s quickly coming to be the best area for everyone trying to enhance their skills.
What Can You Learn on Pluralsight?
Finding out a brand-new ability isn’t hard as long as you have a great platform like Pluralsight.
As well as, since Pluralsight is constantly adding brand-new programs, you’re certain to locate something that’s right for you.
Pluralsight’s excellent functions make learning very easy and fun, such as program referrals, interactive workouts, and professional teachers.
Several of the program groups you can explore on Pluralsight consist of:
- Design & construction
- Business expert
- Imaginative expert
- Data expert
- IT ops
- Manufacturing & style
- Details & cyber safety
- Software application growth
- Web development
With over 7,000 programs offered, Pluralsight has a program for everyone, from those simply beginning their careers to those looking to keep their skills existing.
Pluralsight supplies abilities assessments and a occupation path device to assist students determine which programs will certainly help them reach their job goals. They are additionally amongst the largest online training suppliers.
Click on this link to try Pluralsight free for 10 days.
Just How Much Does Pluralsight Cost?
Pluralsight prices depends upon the type of registration that you pick. Here’s a basic introduction of the Pluralsight bundles:
The Standard Package costs $29 per month. If you select to pay every year, it will certainly help you conserve as much as 14%, and also the rate you will have to pay would certainly be $299.
Costs Package sets you back $45 each month, or an annual membership would be $449.
Starter: $33.25/ month.
Professional: $48.25/ month.
Venture: $64.91/ month.
Pluralsight also provides terrific price cuts for educators as well as students . Pluralsight gives unbelievable price cuts on team bundles for annual memberships.
Pluralsight Free Trial Details.
Pluralsight does include a totally free trial, which enables you to access every one of the training courses for 10 days. During the trial duration, you can access 200 minutes of Pluralsight material.
If you decide to cancel your membership within the 10-day test period, you will not be billed. If you do not terminate your subscription within the 10-day test duration, you will certainly be immediately charged for the yearly or regular monthly subscription, depending on which option you pick.
Click on this link to attempt Pluralsight free for 10 days.
How does Pluralsight Pricing Compare to Other Platforms?
Pluralsight is one of one of the most preferred online knowing systems worldwide, and also what actually sets it in addition to other systems is its huge concentrate on technology understanding.
However how does the expense of Pluralsight compare to various other popular on the internet understanding systems? Allow’s compare:.
- LinkedIn Learning pricing– $29.99 for month-to-month or $240 for an annual membership.
- Masterclass pricing– $180-$ 276 a year, no monthly plans available.
- Coursera prices– $59 a month or $399 a year for a Coursera Plus subscription.
- Skillshare rates– $167.88 per year, which exercises to $13.99/ month balanced out.
In addition, Pluralsight supplies both business as well as specific strategies, making it a adaptable option for personal and specialist advancement.
This makes Pluralsight an ideal system for those who intend to get sensible experience and academic expertise.
Overall, Pluralsight is a detailed and also easy to use understanding system suitable for people as well as companies at budget friendly prices.
Visit this site to try Pluralsight totally free for 10 days.
How Does Pluralsight Work?
Pluralsight is transforming the means people find out and is aiding to make the world a better place for everybody.
Pupils can sign up for Pluralsight programs through the website and also accessibility the product at their own speed.
Pluralsight courses are split into components, as well as each module has a series of video lessons and tests. Pupils can see the video clip lessons as often times as they desire as well as take the tests as many times as they require to master the product.
Pluralsight also uses a certification of conclusion for every course. With its versatile learning format and also expert-led training courses, Pluralsight is a wonderful way to get brand-new abilities or enhance existing ones.
Exactly how to sign up for Pluralsight.
Enrolling in Pluralsight is easy and only takes a couple of minutes.
Go to the Pluralsight web site as well as produce an account. When you have an account, you can browse the Pluralsight collection as well as pick the programs you intend to take. You can also search for specific programs by keyword or filter by topic.
When you find a program you intend to take, click the “Sign Up” switch. You will certainly after that be triggered to enter your settlement information. Pluralsight offers a variety of settlement choices, consisting of credit card, PayPal, etc!
Once you have actually picked a payment approach, you will certainly be able to access your program right away. Pluralsight additionally uses a complimentary test so that you can try out their system prior to devoting to a paid subscription. Why wait? Sign up for Pluralsight today and start discovering something brand-new!
Visit this site to try Pluralsight complimentary for 10 days.
How to take Pluralsight courses.
Pluralsight programs are a fantastic method to find out brand-new abilities and also enhance existing ones. Here’s how to get started:.
Create a Pluralsight account. You can do this by going to their internet site as well as clicking the “Sign Up” button. Enter your information as well as click on the “Create My Account” switch.
When you have an account, you can check out the training courses that Pluralsight uses. Type the topic’s name right into the search bar to find a training course that interests you.
If you’re interested in discovering concerning web growth, you would kind “Web Development” into the search bar.
Once you’ve found a program you ‘d such as to take, click the “Enroll Now” switch. Pluralsight will certainly then ask you to confirm your enrollment. Once you’ve confirmed your enrollment, Pluralsight will certainly include the training course to your account, and also you can start taking it quickly.
Pluralsight programs are self-paced, meaning you can work through them at your speed. They are also hands-on, with a lot of possibilities to exercise what you’re finding out. They are designed by market experts, so you can be certain you’re getting the most recent as well as best info.
Whether you’re wanting to learn brand-new coding abilities or brush up on your Photoshop strategies, Pluralsight has a training course. So check them out today and also see exactly how very easy it is to find out something brand-new.
Pluralsight Features Explained.
Courses are expert-led as well as concentrate on functional skills.
Pluralsight is a terrific resource for those aiming to discover new functional skills. The courses are expert-led and concentrate on providing customers the skills they need to be successful in their area.
Pluralsight likewise offers a range of various other functions, such as the capability to produce personalized training courses as well as tests that make it an vital source for anybody looking to boost their ability. Pluralsight is a excellent source for those wanting to improve their functional skills.
A variety of payment choices are available.
The very best aspect of Pluralsight is that it supplies a selection of repayment alternatives to accommodate any type of budget. You can pay by the month, year, and even purchase a lifetime membership. Pluralsight likewise offers discounts for pupils as well as educators !
Repayment Options Include.
Whether you’re seeking to learn coding, internet development, or anything in between, Pluralsight is a wonderful alternative– and also with its flexible settlement choices, there’s no reason not to give it a try!
Certificate of conclusion for each and every program.
Pluralsight also uses a certificate of conclusion for every course, separating it from various other on-line education and learning platforms. This can be really valuable in building your resume and also demonstrating your skills to prospective employers.
Pluralsight is dedicated to helping people discover new abilities and also grow their professions, and the firm’s objective is to make high-grade education obtainable to everyone. For anybody wanting to enhance their skills or discover something brand-new, Pluralsight is a terrific choice.
Gain brand-new abilities or boost existing ones.
Pluralsight is a fantastic way to gain new abilities or boost existing ones! It supplies lots of programs on various topics to learn what you require to understand for your task or your personal life.
Pluralsight’s programs are instructed by experts that are passionate about their fields and also understand exactly how to engage their students. So finding out a brand-new skill with Pluralsight becomes a breeze!
Find out at your own rate.
Pluralsight has the advantage of allowing you to discover at your very own pace. It has a wide variety naturally available, so you can always discover something fascinating. As well as if you’re not sure regarding a certain training course, Pluralsight uses cost-free trials to try it prior to you acquire.
It additionally has continuous learning courses to track your progress as well as gauge your effectiveness in specific skills. Whether an specialist or a beginner , Pluralsight has something for everyone! So why not attempt Pluralsight today and also see exactly how much you can go?
Free test offered.
Pluralsight offers numerous attributes to its individuals, one of the most prominent being the cost-free trial. With the Pluralsight free trial, users can access every one of the site’s courses and also discover Pluralsight at their leisure.
The Pluralsight totally free trial is particularly beneficial for those new to the site and also that need to know exactly how it functions before dedicating to a paid registration. Pluralsight has different other functions, including course rankings and also evaluations, which can aid customers make notified decisions about which courses to take.
What are you waiting for? Sign up for Pluralsight today! With its expert-led programs as well as versatile discovering format, Pluralsight is the ideal system for IT professionals.
Pluralsight’s finest function is its gadget support. Pluralsight can be accessed on any type of device with an net link, including laptops, tablet computers, as well as smart devices . This makes it simple to discover brand-new skills while on the move.
Pluralsight likewise has offline watching, so you can proceed discovering even if you don’t have an web link. Plus, Pluralsight uses a 10-day totally free test, so you can try the platform prior to committing to a membership. With many benefits, it’s no wonder Pluralsight is one of the leading on-line understanding systems.
Eventually, Pluralsight’s various offerings provide opportunities for people of all histories to establish new skills and also advance their careers. A wonderful feature of Pluralsight is its community. Pluralsight has a neighborhood of programmers who share their expertise and also expertise with others.
The neighborhood is always ready to help answer concerns, provide comments, as well as collaborate on jobs. Pluralsight also supplies a forum for designers to share their code collections, bits, and also tutorials . Pluralsight is an very useful resource for programmers seeking to improve their skills or find out brand-new innovations.
A significant feature of Pluralsight’s user interface is its quality. The Pluralsight interface is tidy and also modern-day , and easy to browse. Pluralsight programs are organized right into modules, and also each module is divided into lessons.
The Pluralsight user interface makes it easy to locate the courses you need and track your development. Pluralsight also provides a variety of means to discover, including video-based training courses, write-ups, as well as tests. You can likewise earn badges and also certificates as you total Pluralsight training courses.
Click on this link to attempt Pluralsight free for 10 days.
Pluralsight Review FAQs.
Is Pluralsight Expensive?
While it is true that Pluralsight’s courses are not totally free, they are still very budget friendly compared to various other online education and learning systems. In addition, Pluralsight regularly runs promos and also discounts , making their training courses much more economical. Hence, Pluralsight training courses aren’t as well pricey and are extremely economical.
What is the function of Pluralsight?
Pluralsight is a innovation knowing platform that helps businesses close the abilities space and keep their workforce relevant in an ever-changing marketplace. Pluralsight offers on-line courses taught by specialist trainers, allowing pupils to discover new abilities at their own speed.
Which one is better: Udemy or Pluralsight?
There are various choices offered for on the internet learning, and it can be challenging to choose the best platform for your requirements. Two of one of the most prominent systems are Udemy and Pluralsight.
Both systems use a wide variety certainly, but there are some key distinctions between them. Pluralsight focuses particularly on tech-related subjects, while Udemy offers a much more diverse choice of courses. Pluralsight also uses a wider variety of functions, consisting of the ability to tailor your discovering experience to your details objectives.
Is Pluralsight Worth It?
Pluralsight is most definitely worth your time, especially if you’re a tech expert (or intend to become one) wanting to upskill.
It is an online education system that provides courses in numerous topics, consisting of shows, design, company, and extra. Pluralsight is a great resource for any person looking to boost their abilities or find out brand-new ones.
The courses are well-designed and offer a great deal of details. They are also fairly priced as well as included a money-back guarantee. Pluralsight programs are a fantastic investment for anyone wanting to improve their abilities.
While Pluralsight is not a traditional college, it can still be a beneficial resource for occupation growth. The training courses provided on Pluralsight cover a series of topics that can profit experts in any type of area. As an example, Pluralsight provides programs on project administration, internet growth, as well as visuals layout.
Furthermore, Pluralsight additionally offers training courses on soft abilities such as leadership as well as communication. By taking advantage of the sources offered by Pluralsight, you can get the skills as well as understanding you require to succeed in your career. On the whole, Pluralsight is a thorough and also inexpensive on the internet knowing system suitable for both beginners and also seasoned learners.
Begin with Pluralsight.
Using Pluralsight, you can create the skills you need to progress in your job or modification markets. And most importantly, Pluralsight supplies a complimentary trial so you can check out the platform and also see if it’s right for you.
Why not obtain started today? With Pluralsight, you can learn at your own pace and timetable. And also, Pluralsight training courses are developed by industry specialists, so you know you’re obtaining high-grade instruction.
Go here to attempt Pluralsight complimentary for 10 days.
When it comes to Pluralsight and its instructors, it most absolutely does.
Pluralsight provides a selection of repayment choices, including credit scores card, PayPal, and so on!
Pluralsight programs are self-paced, meaning you can function via them at your rate. Pluralsight is an indispensable source for programmers looking to enhance their skills or learn new technologies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00025.warc.gz
|
CC-MAIN-2023-14
| 19,495
| 132
|
https://community.openfl.org/t/sprite-with-drawtriangles-distorted-when-converted-to-bitmap/13113
|
code
|
Hey, I’m hoping somebody has some ideas to help me get to the bottom of this issue I’m having in HTML5 -
I’m working on a roulette game. I’m using a colour map to represent all of the chip placement locations. There’s a different unique colour for every location. As the user moves the mouse over the table we get the mouseX/mouseY and check for the colour at that pixel location in the map image to work out the bet.
The map image is a regular 2d image that is then drawn with 3d perspective using drawTriangles() so it looks like this -
All that is working fine. The problem is when we try to get the pixel colour.
We draw the sprite containing the above image into a new BitmapData object using BitmapData.draw() and then use getPixel32(x, y) to get the pixel colour. However I’m finding that it’s not always returning the correct colour. After some debugging I realised that if I render the BitmapData out into a bitmap and add it to the stage, it is not being rendered correctly and it distorted in a strange way -
This explains why I’m getting the wrong colour. Does anybody have any ideas why BitmapData.draw() is distorting the image and what I might be able to do to prevent it or work around the issue?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153531.10/warc/CC-MAIN-20210728060744-20210728090744-00508.warc.gz
|
CC-MAIN-2021-31
| 1,228
| 6
|
https://usmxlaborupdates.com/tag/closeguarded
|
code
|
Real estate investing often begins with the purchase of a house, slightly than raw land or industrial property. Unlike residential rental properties , wherein a tenant pays a set month-to-month price for the complete apartment (and, that’s how the lease settlement is spelled out), industrial property leases are generally drawn up in such a means that the occupant is paying a specific amount per square foot of space. Buying a house (and promoting one) is a big decision that can have a financial influence for years, if not many years. There are numerous particulars and loads of paperwork, which is
Who’s a Mortgage broker? Throughout monetary crisis, life comes to a standstill for the household affected. When the house, the glue the binds a household, is threatened all the things else appears to come to a halt. When each highway seems to be a useless finish, people must search for any solution to protect their homes. A serving to hand and prepared heart is what borrowers need from their lending firms during a time like this. Being in this position makes an individual feel very weak and insecure which is why you will need to work with the proper lender.
Are you curious about shopping for land for sale? This operate supports dynamic execution of Python code. object should be either a string or a code object. If it is a string, the string is parsed as a suite of Python statements which is then executed (until a syntax error happens). 1 If it is a code object, it’s simply executed. In all instances, the code that’s executed is anticipated to be valid as file input (see the section File enter” in the Reference Handbook). Bear in mind that the return and yield statements will not be used outside of
Rise Vision supplies digital signage that helps faculties elevate consciousness of economic literacy and train basic ideas. Guardian Finance Company presents a wide range of competitively priced financing options to shoppers who might have skilled past credit problems or have limited credit score. Financing programs embrace the acquisition of indirect retail gross sales contracts and direct client lending. Along with providing various financing, Guardian works with prospects to help them better perceive their credit score and to reduce their dependence on revolving debt. With just a little effort, it is possible for you to to maintain extra money in your
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00746.warc.gz
|
CC-MAIN-2022-33
| 2,391
| 4
|
https://www.lynda.com/Office-365-tutorials/Configure-shared-mailbox-access/592503/628601-4.html
|
code
|
Join David Elfassy for an in-depth discussion in this video Configure shared mailbox access, part of Office 365: Deployment.
- [Instructor] Office 365 offers methods for users to collaborate in a variety of different ways. It's not only about being able to collaborate on a Word document and share files by using quick links. Using Office 365, we can also collaborate using our Outlook client and using our mailboxes. Now you're likely very familiar with groups and distribution groups and we can create groups and distribution groups from the Office 365 admin center which is essentially a list of people that will all get the same email message.
That's pretty straightforward. However, there's a functionality that is much more interesting which is the Shared mailbox. And the Shared mailbox is really the ability of having multiple users share an inbox, a mailbox, that can receive all the same messages and they can both send messages as that mailbox. So for example, if you've got all your resumes coming in to your organization for people that are applying for jobs in your organization, and you may have an entire HR team that is involved with reviewing these resumes and scheduling meetings with the potential candidates and replying to their queries.
We can create a shared mailbox for the entire HR team. So let's see how we do that. First, from the Office 365 Admin center, I'll click on Shared mailboxes and then I'll click here on plus Shared mailbox to add a shared mailbox. So I'm going to call this one resumes for my organization and it's going to be email@example.com. Now I'm going to click Add to simply add this mailbox and it both creates the credential of the user and it also created the mailbox in Exchange online.
So I'm going to go ahead and Add members to this mailbox. And by adding members, I'm essentially allowing multiple individuals to access that mailbox and use the mailbox. So I'm going to add members to this mailbox by clicking on Add members. And I'm going to pick myself to be a member to the mailbox. You're not a member to the mailbox by default and I'm going to have adding Zachary as well. So both myself and Zachary have been added as members of this mailbox.
And I'm now going to be able to review the current list of existing members. Now note that it's telling you that this shared mailbox may not be visible until 60 minutes. It may take up to an hour for it to be visible from Outlook but we're going to go ahead and go into Outlook to be able to see how that looks, but first I'm going to close this and now review the list of mailboxes that are added as members of this shared mailbox. Again, that means that both of those users can read the content of this mailbox and send email messages as the mailbox so that the recipient of the email message does not know if the message is coming from David or Zachary, the message is simply coming from firstname.lastname@example.org.
So let's go into Outlook and see how that looks now. So if I click on Shared Mailboxes, I already created a shared mailbox earlier. I'm going to go ahead and create a new one. If I create a new mailbox and I give it a name, I'm going to call this one Resumes, email@example.com, and note that I can pick any one of my SMTP suffix domains to generate the email address that will be used for this mailbox. Then I'm going to specify my account, the account that will be used to share access, maybe there's other users that will have access as well.
So I have Zachary and David, both users will share access. And then I'm going to click Create. Now this will actually create the mailbox and provide access to multiple users. So now let's open up, it actually needs to provision, it takes a couple of minutes but it's going to create it as the system goes on. I'm going to login to Microsoft Outlook to see exactly how we can now access the shared mailbox. I've got my profile that's already been set.
Now I want you to note that here I have my data shared mailbox that I created earlier. Now I didn't have to do anything for the shared mailbox to appear in Outlook. It is automatically visible here and that's because it is part of my profile. Automatically because I have full access permission to this mailbox, it gets automatically added to my profile and it follows me wherever I go. And my Resumes mailbox is not here yet because they're still provisioning it within of Office 365.
So let me show you first what it looks like to send an email message from the shared mailbox. What I've done here is I've added the From field. The From field in Outlook is not there by default. To add it, you need to go in Options and click on the From button. Once you have the From field, you can go in a dropdown list and select all the mailboxes that you personally have full mailbox access to, the ability to send from. So I can pick here Data and I can send a message from Data.
So any recipient that will get this message will not know that it's coming from me. They'll think it's coming from mailbox Data. So I can send this message to anyone and I can send here, I have somebody named Michelle in my organization and I can send her the message and this is test message from Data, and send. And she will have received that message. Now any messages that also go into Data, I have access to.
So if I send an email message from David and I send it to the Data mailbox and I'm going to call this one Test message. Inside of the mailbox, I will get the test message. And here it is. So any messages come in, they are fully accessible. I have the ability to send messages from this mailbox, send messages to this mailbox.
This course details the process of moving your network to Office 365 by deploying a new Office 365 subscription. David Elfassy covers creating user accounts, adding domains, and configuring email, directories, conferencing, file sharing, and valuable business services such as PowerShell and SharePoint. Watch these tutorials to deploy your own implementation of Office 365 or to see if this technology fits your enterprise needs.
- Using FastTrack to prepare for Office 365
- Creating Office 365 user accounts
- Adding domains
- Configuring Outlook and Skype
- Configuring sharing and shared mailboxes
- Troubleshooting an Office 365 deployment
- Configuring PowerShell
- Creating SharePoint services
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428300.23/warc/CC-MAIN-20170727142514-20170727162514-00612.warc.gz
|
CC-MAIN-2017-30
| 6,339
| 21
|
https://lists.ubuntu.com/archives/ubuntu-users/2009-November/203451.html
|
code
|
Regular Expression Puzzle
loic.grenie at gmail.com
Sun Nov 29 13:39:02 UTC 2009
2009/11/29 Alan McKay <alan.mckay at gmail.com>:
> Dude, that's a bit of a convoluted way to go about it.
> How about keeping it simple?
> cat file | sed "s/<div>/<p>/g" | sed "s/<\/div>/<\/p>/g" > newfile
sed "s/<div>/<p>/g" file | sed "s,</div>,</p>,g" > newfile
(one sed, two regexps)
sed -e "s/<div>/<p>/g" -e "s,</div>,</p>,g" file > newfile
(only one regexp)
sed "s,<\(/\?\)div>,<\1p>,g" file > newfile
(shown only for the last one, but it can be used for any,
change in place)
sed -i "s,<\(/\?\)div>,<\1p>,g" file
in that case the file "file" is changed, non new file is created.
More information about the ubuntu-users
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375635143.91/warc/CC-MAIN-20150627032715-00008-ip-10-179-60-89.ec2.internal.warc.gz
|
CC-MAIN-2015-27
| 706
| 17
|
http://autospsourcebuilder.codeplex.com/discussions/441026
|
code
|
Apr 30, 2013 at 2:55 AM
Edited Apr 30, 2013 at 4:27 AM
Hmm... re-download didn't help (for AutoSPSourceBuilder)
I'm now running a manual /extract and it's VERY slow and the progress bar isn't working. It's taken over an hour to extract about 1086 files. The March PU takes about 20 seconds I think...
Finally finished, 1200 odd files and took about 1.5 hours.
I'm now running a comparitive test on my desktop.
March PU took about 50 seconds to extract 33 files totalling about 1.65 gig.
April CU tool 1 hour 16 minutes to extract 1205 files totalling about 1.17 gig.
Just looking at my disk IO, it's gone through the roof, with a read rate of >400Meg/sec, write rate of under 0.1Meg/sec.
My HD is just an average 160gig 7200 RPM drive, so it must be hitting the cache repeatedly.
I've posted this on
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118310.2/warc/CC-MAIN-20170423031158-00329-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 799
| 11
|
https://musescore.org/en/node/289178
|
code
|
"Backwards" instrument sounds?
So I use MuseScore 2.2 because .3 seems to change the sound of my primary sound font, but assuming there's no such feature in the later versions, is it possible to reverse the sound of my notes? if not, is there a soundfont I can get that has any? A piece that I'm working on is just BEGGING for backwards strings.
P.S: To the gentleman who said years ago to this same question that no one would care about this feature, well, here you are!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662560022.71/warc/CC-MAIN-20220523163515-20220523193515-00599.warc.gz
|
CC-MAIN-2022-21
| 471
| 3
|
https://blog.bitsian.io/blog/spoofing-in-crypto
|
code
|
Making Crypto Markets Safer: Recognizing Spoofing & Bad Behaviors in Cryptocurrency
We found nearly 100,000 incidents of spoofing analyzing 1 month on 1 crypto exchange
By exposing bad behaviors in cryptocurrency we can improve the overall quality of the digital asset market, protecting consumers.
written by Steve Brucato
Chief Technology Officer & cofounder at bitsian
By exposing bad behaviors, we strive to improve the overall quality of digital asset markets, therefore, making the ecosystem safer and better for all customers. As we started on the path of building trading tools for cryptocurrency one question kept floating in my mind: 'Is there spoofing and wash-trading in crypto markets?'
Building a trading technology, we want our customers to trade on good, clean and quality data. As we could not find good insights on these studies being done, we produced the research ourselves. It is costly, time consuming and a risk but worthwhile to keep consumers safe. We tested a popular crypto exchange, limiting our dataset to one month in 2018. Through it we sought to understand spoof incidents.
This is a natural to ask, given the volatility of the asset class and the infancy of the market. My 30+ year career in financial technologies at Goldman Sachs and firms like it taught me that spoofing was normal practice in traditional electronic equities before regulators came in to stop it and that people would continue to try and spoof, because the rewards were sometimes worth the risk for them.
The results were astounding.
Our research led us to find nearly 100,000 incidents of spoofing in a one month period across only 3 trading pairs.
I presented this research at The Trading Show in Chicago video below and deck here
What is Spoof?
"Spoofing is a practice in which traders attempt to give an artificial impression of market conditions by entering and quickly canceling large buy or sell orders onto an exchange, in an attempt to manipulate prices. The 2010 Dodd-Frank Act specifically forbids spoofing. The goal of a spoofer is to make any product look like there is a lot of potential in the market and to manipulate prices up or down, so that they can trade at a profit--at the loss of others.
Spoof orders have several characteristics that define them as a spoof:
Why is spoof bad & how does spoof impact people?
Spoofing in crypto matters because market prices are being manipulated providing an unfair advantage to the spoofer over other market participants.
Spoof matters because somebody is always the loser.
In traditional markets regulators will take spoofers to jail in order to prevent spoof and protect consumers.
Anyone can be victim to spoof--and when you are spoofed, you can lose a lot of money.
An individual might spoof in order to move the market price so they can profit from this.
An exchange might spoof in order to make it look like there’s a lot of volume. When there is more volume on a platform, traders are likely to participate in that exchange.
Why does bitsian care?
In the absence of regulators, we offer that exchanges and exchange aggregators (like us) should look to protect consumers with protections against these behaviors. As crypto markets mature or become regulated, this behavior will diminish. Until then, we are doing analyses and strengthening our real-time trading tools to highlight bad behaviors in markets.
Fewer spoofs means a safer market for everyone trading.
bitsian’s research in spoof
We developed a spoof filter by analyzing historical market data and trade data. Only quote and trade data from the market was used for the analysis. We identified several possible patterns for to detect a spoof order while excluding normal order cancellations and trades. We implemented these patterns as “filters” through which we ran our historical quote and trade data. We compared several patterns, combined the best filters, and tuned the parameters until we had created a series of filters that successfully identified only spoof orders.
The output data sets of the filters were analyzed statistically to indicate which filters produced the most reliable detection of spoof orders, with the best specificity. More than one pattern was tested and selected, indicating more than one spoofing strategy at work.
Our analysis differentiated spoof orders from “natural” market events such as clients canceling an order, amending an order, or orders simply trading. We analyzed the trigger events for spoof order cancellations, the time from the trigger to the cancellation, and the size of the spoof orders.
It took us 4 months of playing around with the data to find our first instance of spoof. My first thought: maybe it's not spoof.
After 4 months of digging around, finding a potential case of spoof was both thrilling and nerve-wracking, but the first thing I thought was -- maybe we are wrong. Any researcher should immediately think false-positive!?! I can remember that clearly. I was worried that we might have overfit the filter to this data -- which means this filter works for this set of data, but not all sets of data--ie: confirmation bias. The appropriate next step was to try and confirm that it was indeed a false-positive. Which meant, trying to answer either of these questions with a yes:
We found 3 trading pairs totaled 98,698 spoofing events during a one month period, on a single market.
Insights (visualizations here)
The number of spoof events per product correlates very highly with the number of trades - more trade, more spoofs.
LTC-BTC was the pairing with the highest number of spoofs totaling 55,054 as it had a higher number of trades for the month than the other two products.
spoofs had about 3 seconds between trigger event and spoof event, with 50% of the spoof events happened between 2 and 4 seconds from the trigger event
A duration of 3 seconds from trigger might sound like a very, very long time if you’re familiar with high frequency trading, but keep in mind that most electronic crypto markets are relatively slow systems compared with mature electronic markets, and so their response times are much slower. Note also that most clients connect via the Internet and through APIs (typically REST) that are slower than networks and APIs of mature markets.
The spoofer had little concern about being discovered.
Our data found a very tight distributions of the result data sets indicates that a very predictable spoof strategy was being employed, and that is was likely programmatic.
Future spoof research at bitsian
We are expanding our spoof analysis to other markets and other products. We’re adding additional patterns to detect other spoof strategies. We realize that by publishing these results, spoofers merely chose to become more sophisticated and created harder to find spoofing patterns. We’re prepared to test and ongoing series of patterns to find harder to find strategies.
To improve the quality of our input data we have created a data quality layer to monitor gaps, detect errant ticks, and normalize the data across many exchanges to make our analysis repeatable across many markets. We are expanding our analysis to include other negative behaviors, including wash trades and false trade reporting. Again, we’re using quote and trade data for this analysis. We have other order and trade patterns were searching for as well.
Having identified various patterns for spoofs using historical data, we were able to create a predictive filter to work on real-time live market data. This predictive filter identifies bid and offer quantity in live market data that may be spoof, monitors them to see if they are later canceled, and thus computes a real-time confidence factor in how well the filter accurately predicts spoofs.
This tool will be implemented in our trading tool and is meant to assist trades is identifying spoof quantities to make better informed trading decisions. In general, the intent of most of our analysis on historical data is to create a predictive filter that can be applied to live streaming data, wherever we can. We will be releasing additional signals soon.
We will be publishing more results from our analyses on other markets from other filters and are eager to speak more about bad behaviors in these new promising markets. Please subscribe to be included in these updates and for new information.
We just sent you an email. Please click the link in the email to confirm your subscription!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145529.37/warc/CC-MAIN-20200221111140-20200221141140-00371.warc.gz
|
CC-MAIN-2020-10
| 8,456
| 45
|
https://marketplace.bigdatagrapes.eu/marketplace/labtest-results-below-mrl-in-table-grapes-originated-in-italy-from-july-2018-to-december-2018/
|
code
|
Labtest results below MRL in table grapes originated in Italy from July 2018 to December 2018
- Additional information
This dataset includes all pesticide laboratory tests bellow MRL for table grapes originated in Italy for the time period from 7/10/2018 to 12/6/2018. These data were reported by National Authorities from all around the world. The dataset contains information about the date of the test, the country were the sample was taken, the detected substance and the numerical results.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00356.warc.gz
|
CC-MAIN-2023-06
| 494
| 3
|
https://www.thingiverse.com/thing:3657812
|
code
|
As the tags suggest, this design is not practically printable. The design is largely made to mimic similar concepts, but on a much smaller scale. I have always found braiding machines wondrous for their simple nature, such that they have been around for more than a century. They are, however, rather difficult to print given all their moving parts which require clearances and may only be viable at large sizes, which obviously doesn't work for small home printers.
Still the exercise of drawing up a quick design is quite fun. But holy moly is it difficult to design curves like this in Tinkercad. I keep thinking I should get professional software, but the masochist in me likes the manual manipulation, experimentation, and mathematics and geometry. As a result, I do not have "design files" because Tinkercad supplies none.
As always, this was a treat to draw up, but it is not ready for application. If you have any feedback, please leave it in the comments.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318421.65/warc/CC-MAIN-20190823130046-20190823152046-00015.warc.gz
|
CC-MAIN-2019-35
| 964
| 3
|
https://www.gsmarena.com/newscomm-21468p5.php
|
code
|
Oh yes! Excited... Another category making product from Surface family. Thats how we should look at it.
When microsoft become open source then everything should be ok for developement in windows platform. Otherwise, there is no future for windows phone !
Its high time or I should say its already too late. Been waiting for new phones from Microsoft for too long. On top of that there is little hope Microsoft will have sane pricing for new surface phones.
Pabliell, 05 Nov 2016Keep in mind that laptop CPUs have active cooling, which you can't fit into a slim smartphone.... moreYou are joking, right? I mean, how unknowing can you be to think they will put a full sized CPU in a smartphone? Laptop class cpu means pure x86/x64 architecture and not ARM architecture what all smartphones use right now. And yes, intel can produce such cpu.s. They actually have the technology. Just to think about kabylake core and how those cpu.s based on it are AMAZING, can say a lot about a surface phone with intel inside will run.
Keep in mind that laptop CPUs have active cooling, which you can't fit into a slim smartphone. Meaning this "laptop class CPU" will be seriously underclocked just to not melt the entire device.
yep, 05 Nov 2016I personally hate the idea of having bottom part of the screen sticking out/buttons panel lowe... morepersonally I don't, and I long for somewhere to hold a phone "safely" without triggering events. You know, occasionally one has to actually pass it to someone ... right now its like watching people handle an explosive device.
What's the point in using a desktop class processor on a phone when it is running a smartphone class OS. Microsoft isn't bothered about improving Windows 10 mobile OS with advanced features.
Anonymous, 05 Nov 2016Windows shouldn't even think of bringing phones anymore in the market. In a world of android a... morewhen surface tablets and other x86 tablets were anounced people keep saying they will fail, but look now android and ios tablets are failling and windows tablets are rising, soon windows will surpass ipad.
with x86 phone you can do so many things compare to arm one
Anonymous, 05 Nov 2016Windows shouldn't even think of bringing phones anymore in the market. In a world of android a... morefirst of all. you mean Microsoft;). Second, windows mobile is quite a great system, the only thing that lacks is the developers that just don't want to do their job for all mobile operating systems. A lame and crappy attitude from them. Well, i one don't care, all i need is that this platform develops further. At the moment being the only platform that actually develops and changes every half ;). Now, about your advice...well i advice you to buy what you want and stop giving sub-par advice's to a company you do not even understand how is called;).
I personally hate the idea of having bottom part of the screen sticking out/buttons panel lower than tge screen
A Dual Hot Swap able Battery would be a good option
Battery 1: 2000mAH
Battery 2: 2000mAH
Should be able to remove the battery with low power and Quick Charge it
instead of carrying a powerbank a portable battery charger would be more helpful
Surface Phone Should be like this... https://youtu.be/ozLaklIFWUI?t=143
unlike a regular phone form factor
Let's see first if it can run WinXP apps..
(hint: Android can run Win95 apps through emulation)
Phone is just too thin, examples looks photoshopish, but good to know there is Something going on there. I can imagine camera in such thickness, but not battery, what it uses, nuclear power?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823614.22/warc/CC-MAIN-20181211083052-20181211104552-00039.warc.gz
|
CC-MAIN-2018-51
| 3,565
| 21
|
https://www.derivita.com/jobs
|
code
|
We’re not just another tech start-up with a great idea. We are an education technology company that is making a difference for teachers and students by solving real problems in this multi-billion dollar industry.
It’s not the first time we’ve successfully done this. In addition to working with smart people who care about how mathematics is taught, delivered and understood, we also care about building a diverse team that works!
In every sense of the word. We are committed to education and increasing the number of students who graduate with higher education degrees, we believe in sharing knowledge, collaborating to find the best solutions, and giving/receiving code reviews with kindness.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347441088.63/warc/CC-MAIN-20200604125947-20200604155947-00291.warc.gz
|
CC-MAIN-2020-24
| 700
| 3
|
https://www.lynda.com/Numpy-tutorials/Downloading-parsing-data-files/419162/446725-4.html
|
code
|
Join Michele Vallisneri for an in-depth discussion in this video Downloading and parsing data files, part of Introduction to Data Analysis with Python.
- We'll start by loading data about the weather stations. I will show you how to download a file over FTP, using Python. And I will show you how to parse a space-separated text file into a Python dict that we can use later. Let's navigate to the location in the filesystem where you can find our exercise files. All the work that we do in this chapter will flow from one video to the next, so I really encourage you to watch them in sequence. We select the exercise file for this first video, 05_02_stations_begin, which starts as an empty notebook.
We begin by loading a few basic packages: Numpy, of course, which we will nickname np. Matplotlib, since we wish to plot data. And seaborn, which is an extension to matplotlib, but just makes the plots prettier. We also import seaborn, an extension to matplotlib, that improve its default plot formatting and that also implements additional plot types. We also instruct the Python notebook to keep all the plots inline.
The weather data that we'll be using are found at the website of the NOAA National Centers for Environmental Information. The climate data online service provides access to an archive of global historical weather and climate data. And specifically, we will use data from the GCOS Surface Network, a global reference network of observation stations. We start by downloading a text file that contains an annotated list of stations in the network. I've included copies of all the files that we need in your exercise files.
However, for this first one, I will also show you how to download it yourself. We could do it with an FTP client or a web browser, but let's use Python. Specifically, we can use the Python standard module, urllib, which we need to import. The function that we need is urllib.request.urlretrieve. We then need the full address of the file that we want to download. The second argument for this function is the local name of the file.
Good, in this case, no news is good news. The file has been downloaded. This function works in Python 3. If you're using Python 2.7, please see the FAQ for this course. Let's have a look at the first lines of the file. We'll open it for reading. Use readlines and use slicing to select the first few items in the list. What we see is a station code in each line followed but what may be a geographical location, probably longitude and latitude, by what could be a sea level height in meters, and by a name.
Some stations are tagged as GSN. That's the GCOS Surface Network. We'll concentrate on those. So let's gather some data from this text file. We go through, read all the lines. We skip those that do not have the GSN keywords. And we just collect the station names in a dictionary indexed by the station code. Remember that in Python, it's possible to iterate through an open file which will just returns the lines, one by one. We check if the string GSN is included in the line.
And if it is, we take the line, split it, which will naturally split it by whitespaces, and assign the resulting fields to a Python list. We will then use the first item in the list as the key for our dictionary. And the fifth and all following items for the name of the station. Another use for the slicing operator. And let's join those strings, this time, using a space between them.
How many stations? 994, we should really concentrate on a few only. So let's write a function that lets us look for interesting patterns in the station name. We'll call it find station. And let's build a dictionary using a comprehension of the station codes and names where the pattern that we're interested in is found within the name. Let's just print it.
For instance, I really like Hawaii. Let's see if we can find a station there. Lihue is a town in Kauai. Indeed, it's there. Let's look for San Diego. A cold place, maybe Minneapolis. And an even colder place. Let's go to Siberia. Throughout the rest of this chapter, we'll look at data from these four stations. I will collect our codes in a Python list. Sometimes, copy and paste, rather than writing code, is the quickest way forward.
This concludes our work for this first video.
- Writing and running Python in iPython
- Using Python lists and dictionaries
- Creating NumPy arrays
- Indexing and slicing in NumPy
- Downloading and parsing data files into NumPy and Pandas
- Using multilevel series in Pandas
- Aggregating data in Pandas
Skill Level Intermediate
Q: The course shows how to download files from FTP and web servers using Python 3.X. How do I do the same thing with Python 2.7?
A: First <span style="font-family: Courier;">import urllib</span>, then use <span style="font-family: Courier;">urllib.urlretrieve(URL,filename)</span>. For instance, to download the stations.txt files used in the chapter 5 video “Downloading and parsing data files,” you’d do <span style="font-family: Courier;">urllib.urlretrieve(‘ftp://ftp.ncdc.noaa.gov/pub/data/ghcn/daily/ghcnd-stations.txt','stations.txt')</span>.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00178-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 5,128
| 21
|
https://kb.jands.com/377/
|
code
|
With Vista’s new tracking backup feature you can connect a computer, running the Vista application, or a second console that synchronises it’s show file and settings with your main console. If the main console fails for any reason, the backup system will automatically take control.
The backup system automatically copies the show programming from the main console and you can start or stop them in any order and at any time.
To set up a backup system the console(s) and computer(s) have to be physically connected via their Ethernet ports and their network settings must be configured correctly.
Connecting the backup
To connect the main console or computer and the backup console or computer you can either:
- connect from the Ethernet port of the Console(s) and computer(s) to the Local Area Network (LAN) in your building, or
- connect from the Ethernet port of the Console(s) and computer(s) to a stand alone Router, or
- connect from the Ethernet port of the Console(s) and computer(s) to a stand alone Switch or Hub, or
- connect the Ethernet port of the Console(s) and computer(s) using a Crossover cable
Configuring the network settings
All consoles or computers being used in a tracking backup system need an IP address on the same subnet as the others. If you are using a LAN or stand-alone Router a DHCP server will automatically assign Router IP addresses, provided your console’s or computer’s network interface is set to use DHCP. If you are using a Switch, Hub or Crossover cable you’ll need to set static IPs on all the devices in your backup system:
Vista T & I series network settings
To configure the network on a T or I series console:
- Select the Settings option from the File menu. Vista opens the Settings window.
- Click the Network button. Vista opens the Network window:
- Click OK to close the network window.
|Indicates the consoles network name. You can change this field to something more meaningful (i.e. ‘T4_main’) but no two devices, on the network, can have the same hostname.
|Set this field to DHCP if you are connecting to a LAN or stand alone router that has a DHCP server.
If there is no DHCP server set this field to a unique Private IP address. For example: ‘192.168.0.10’
If your backup device is a second console it’s IP must be set to a different address, in the same range. For example: ‘192.168.0.11’
|Normally this field should be set to 255.255.255.0. If connecting to a LAN consult your IT department.
|If you are connecting to a LAN consult your IT department.
If you are using a Router with a DHCP server this field should be set to the IP of the router itself.
If you are connecting with a Switch or Crossover cable or there is no DHCP server set this field to [TBA].
Computer network settings
Configuration of the network settings on your PC will vary depending on the OS you are using but what you’ll need to enter is similar to the information detailed above.
The most important thing is that each console or computer should have a unique IP and be on the same subnet. If you are using DHCP this will be taken care of automatically. If you are using static IPs make sure each one is different. For example if the console or main computer’s IP is 192.168.0.10, your backup device should be 192.168.0.11 (or any number between 1-254 but not 10).
If you have changed your network settings restart the console or computer and confirm that the new settings have taken effect.
Starting Tracking Backup
To start Tracking Backup do this:
- On the main console or computer select the ‘Autosave and Backup’ option on the File menu. Vista opens the Backup window:
- If it’s not already selected click on the ‘Tracking Backup Config’ tab.
- All devices in a backup system must have the same ‘Node Group’ name. If this is the master console make a note of the name (i.e. Byron_625) or change this field to a name of your choice (i.e. ‘MainStage’). If you change the Node Group name you will be prompted to restart Vista. If you need to restart’ re-open the Backup window after the restart.
- Repeat steps 1 – 3 on the backup console or computer. Remember the Node Group name must be exactly the same all the devices in your backup system.
- Restart the backup system if prompted. It is now ready for use.
- On the main console or computer click on the ‘Network’ tab. Vista displays a list of any Vista systems running on the same network. You should see your backup device and it should have the same Node Group name as the master:
- The console or computer you are working on is marked with an asterisk (*).
- Click on the Network Role field of your master console.
- Click on the Network Role field of your backup console and select ‘Primary Slave’ from the popup list. A Primary Slave will take over a show automatically if the Master fails, whereas a Passive slave will still backup a master but will not take over a show until you click on the ‘Failover Now’ button on the Failover tab of the Backup window.
- When both the master and slave role have been set, click the ‘Apply’ button. Vista enables the Network Traffic buttons
- Click the Network Traffic Enabled ‘On’ button and click ‘Apply’. Vista transfers the show file to the slave:
- Click the OK button to close the Backup window
What happens if the Master fails
If the Master fails an alert window appears on the slave console:
On the slave console there are two options
- Click on the ‘Abort’ button to prevent the slave console from taking over the show and beginning to output.
- Click on the Failover now button to have the slave console take over the show immediately and begin to output.
If neither button is clicked the slave will take over when the countdown is finished.
- If you are using the DMX outputs on your Vista console or control surface you must swap your DMX cables from the master to the backup console in the event of a failure.
Manually switching to the backup console
To manually switch to the slave device click on the ‘Failover Now’ button on the Failover tab.
You can check the status of the master and slave in their respective backup windows. To do this select the status tab in the Backup window:
The master console or computer should show the Local Time Controller and Local DMX Output being On.
The slave console or computer should show the Local Time Controller and Local DMX Output being Off – unless the master has failed.
If you cannot see your slave console on the Network tab of the backup window:
- Check all your Ethernet cables and connections.
- If you are using a computer turn off any firewall or port blocking application.
- Check that the Group name is exactly the same on all devices in your backup system.
- Check that both the master and slave have IP addresses that are on the same subnet. An IP address consists of four numbers separated by dots (i.e. 192.168.0.1) The numbers for the master and slave should be exactly the same except for the last number, which must be different and between 1 and 254.
- On your Vista T or I series you can check the IP by opening the Settings Network window from the File menu.
- On a Windows PC you can find the IP address from the command prompt (Start > Run > type: cmd) and type: ipconfig).
- On a Mac make sure that only one Network Interface is active. Having both the wired (Ethernet) and wireless (Airport) interface active may cause tracking backup to fail.
- Check that you can ‘Ping’ from the Master to the Slave and vice versa.
- On a Windows PC you can Ping another device from the command prompt (Start > Run > type: cmd) and type: ping xxx.xxx.xxx.xxx) – where xxx.xxx.xxx.xxx is the IP number of another device in your system.
- Power down and re-start the console(s) and computer(s) you are using.
Private IP addresses
Three blocks of the IP address space are reserved for use on private networks (local area networks). When setting static IPs on a small network it’s best to use IPs from one of these ranges:
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.26/warc/CC-MAIN-20240227121318-20240227151318-00829.warc.gz
|
CC-MAIN-2024-10
| 8,104
| 70
|
https://discussion.ntrack.com/t/mono-stereo-conversion/4459
|
code
|
How to convert 2 mono’s to a single st
I’m currently using n-Track on a project for the final mastering stage of a recording. The device that I’m using for the recording and mixdown stage will export a stereo mixdown as two separate wave files (a left, and a right).
I’d like to be able to process these tracks as a single stereo track. However, while it’s obvious how to split a stereo track into 2 mono tracks, I don’t know how to go in the other direction.
Is there a simple process for doing this that I’m missing?
Any help would be appreciated!
The easiest way I know is to use a wav editor. Or, if you don’t have one, here’s what you do. Create an .sng file. import the two wavs as two tracks. pan hard left and right. mixdown. there ya go.
Hey Fish -
Thanks for the feedback. I’ll probably use your idea of an intermediate project/mixdown stage - shouldn’t loose to much info there.
I do have an external wave editor, but it doesn’t support 24-bit (SF-Xp 4.0 - ancient, came with an old sound card). and my recorder is 24-bit.
Huh, it’d be simple to write a program to comine to tracks - but the fidelity loss is probably close to zero w/ a mixdown.
But, my main question is answered: no way to do it w/ N. Too bad.
You can use Audacity as a wave editor to combine the left and right mono waves to a stereo wave. It’s free and it supports 24 bit.
It’s rather simple. Just launch Audacity and under Project, import the two mono files. Click on the track name for each file and set them to Left and Right respectively and pan them accordingly. Then under File, select Export as WAV.
However, Fish’s method works just as well.
i’d say importing into n and mixing down is easiest.
I’d just import them into N as separate tracks, pan them hard left/right and then render those tracks down to new stereo file using “file/mixdown song” (or ctrl-R).
At first I wasn’t going to bother looking at this thread, since it’s pretty trivial in N. But I thought I’d take a look, and whaddyknow folks are running to their wave editors!
Guitars & sekim are on the money. Import, pan apart, mixdown, and then import the result. Nuttin to it.
Regardless, make sure the two files are aligned together correctly. (They wouldn’t be, for example, if you’d MP3-compressed them and then expanded them.) Most likely they will be by default, but best to make sure. Leave the count-in click in both channels at the start. Make sure it’s a mono click source, and zoom way in and check. This is the case regardless of what tool you use for the job.
Too bad you didn’t do your mixing in N too, though. But sometimes that’s how things work out. Especially if you’ve recorded in a hardware DAW and have punch-ins. But once you’ve come over to “the DAWk side”, you’ll never want to go back.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335444.58/warc/CC-MAIN-20220930051717-20220930081717-00366.warc.gz
|
CC-MAIN-2022-40
| 2,828
| 20
|
https://docs.osmos.io/developer-docs/server-side-webhooks/openapi-webhook-testing
|
code
|
OpenAPI Webhook Testing
Testing your validation webhook in the browser
This OpenAPI file, validation_webhook.yaml, describes the API that must be implemented by your validation endpoint. This definition can be used in Postman or a similar API tool to create a server. Below we have body and response examples & schemas for review.
Oops, something is missing.
We could not find the original source to display this content.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00194.warc.gz
|
CC-MAIN-2023-14
| 421
| 5
|
https://jaredfern.github.io/
|
code
|
I am a senior at Northwestern University studying Electrical Engineering and Computer Science, advised by Doug Downey and Thrasos Pappas. My current research spans methods for rapidly training statistical language models and developing objective metrics for measuring similarity in visual texture.
My research interests are primarily in machine learning, computer vision and natural language processing.
BS in Computer Science, June 2019
BS in Electrical Engineering, June 2019
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578640839.82/warc/CC-MAIN-20190424094510-20190424120510-00359.warc.gz
|
CC-MAIN-2019-18
| 477
| 4
|
https://medium.com/@phadej/structurally-recursive-nubby-782f26c6eadd
|
code
|
Not so long time ago, there were a discussion on #haskell channel about whether one could write a nub using structural recursion. In fact you can.
I had time to exercise my Coq skills. There are proofs below. The equivalence of original nub and structurally recursive relies on the fact that delete and nub commute.
no obvious defects vs. obviously no defects
Structurally recursive functions obviously terminate. Convincing the termination checker about the original definition is quite simple, although not trivial.
The original nub slightly expanded is below:
It terminates, but not obviously. Recusive nubBy called with deleteBy eq x xs, not with xs. The function is total, i.e. terminates on all inputs, because the list argument is getting smaller on each recursion call. This is because deleteBy result’s length is less than or equal to parameter’s length.
Yet if we inspect structurally recursive nubBy:
This version is obviously total. The argument to recursive call of nubBy is the part of the function argment. And if we pretend that input is always finite, the function will always terminate, by definition.
The two versions have only slight difference. I don’t know why base package developers choose non-structural one. Maybe it has better performance, yet both functions have quadratic complexity. Especially if deleteFirstBy is used in structurally recursive version, it shouldn’t perform too badly.
deleteFirst x (nub xs) ≡ nub (delete x xs)
The equivalence above is quite obvious, but wasn’t that easy to prove. Yet below is the mechanised proof.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816535.76/warc/CC-MAIN-20240413021024-20240413051024-00359.warc.gz
|
CC-MAIN-2024-18
| 1,576
| 11
|
https://dinobansigan.com/bookmarks/less-is-more
|
code
|
A few days ago I heard an ad on TV that said something like, "people say less is more, but more is REALLY MORE!". Obviously the intent of that ad is to get you to spend more money to buy more stuff. We live in a world where people are judged by their material possessions. The narrative being, if you have more, then you are living a better life compared to everyone else around you. That is ridiculous.
So often we want more. We have been trained to think more is better. More money. More stuff. More success. But this idea of getting and doing more often gets in the way of our goals.- Dan Erickson
Visit Original Post: Sometimes It’s the Things We Leave Outcomments powered by Disqus
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987826436.88/warc/CC-MAIN-20191022232751-20191023020251-00381.warc.gz
|
CC-MAIN-2019-43
| 688
| 3
|
http://developer.nokia.com/community/discussion/showthread.php/216984-Google-protobuf-library
|
code
|
I need to transfer data between c++ and java. I have decided to use Google's protobuf.
I made installation process and I got:
bin > protoc.exe
lib > libprotobuf.a
and include folder
I've link library in .pro file
in simulator everything seems to work fine and project builds but when I want to deploy application on phone I've got compilation error:
QT += core gui network webkit
TARGET = MWOP
TEMPLATE = app
LIBS += -LC:\msys\1.0\local\lib\ -lprotobuf
INCLUDEPATH += C:\msys\1.0\local\include
CONFIG += mobility
MOBILITY += bearer systeminfo
TARGET.UID3 = xxxxx
TARGET.CAPABILITY += ReadUserData NetworkServices
TARGET.EPOCSTACKSIZE = 0x14000
TARGET.EPOCHEAPSIZE = 0x020000 0x800000
RESOURCES += \
:: error: No rule to make target `\NokiaQtSDK\Symbian\SDK\epoc32\release\armv5\LIB\protobuf.dso', needed by `\NokiaQtSDK\Symbian\SDK\epoc32\release\gcce\urel\MWOP.exe'. Stop.
How can I fix that?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997879037.61/warc/CC-MAIN-20140722025759-00190-ip-10-33-131-23.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 893
| 21
|
http://www.cs.cornell.edu/courses/cs4750/2019fa/syllabus/
|
code
|
Table of Contents
- Course Aims
- Learning Outcomes
- Optional Textbooks
- Course Websites
- Inclusion Statement
- Getting Help
Robotics as an application draws from many different fields and allows automation of products as diverse as cars, vacuum cleaners, and factories. This course is a challenging introduction to basic computational concepts used broadly in robotics. Topics include simulation, kinematics, control, optimization, and probabilistic inference. The mathematical basis of each area is emphasized, and concepts are motivated using common robotics applications and programming exercises. Students will participate in a series of projects over the course of the semester, in which they will implement algorithms that apply each of the topics discussed in class to real robotics problems. This course prepares students to take CS 4752/MAE 4750: Robotic Manipulation and MAE 4180/CS 3758: Autonomous Mobile Robots, among others.
By the end of this course, I will understand the basic concepts and theory governing the programming of robots that perform autonomous tasks such as navigation and manipulation.
After this course, I will be able to:
- describe the different physical forms of robot architectures.
- kinematically model simple manipulator and mobile robots.
- mathematically describe a kinematic robot system.
- analyze manipulation and navigation problems using knowledge of coordinate frames, kinematics, optimization, control, and uncertainty.
- compute forward and inverse kinematics for a small serial kinematic chain.
- consider trade-offs among position control, velocity control, and force control when solving a robot control problem.
- perform stability analysis of a controller-robot system, and describe why it is important.
- model uncertainty in robot processes.
- program robotics algorithms related to kinematics, control, optimization, and uncertainty.
(MATH 1920 or MATH 2220) and MATH 2940 and (CS 1110 or CS 1112) or permission of instructor. That is, multivariable calculus, linear algebra, and introduction to computing.
There are two optional corequisites. The first is CS 1133, which is a half-semester course designed to teach Python for students who learned Matlab in CS 1112. We strongly encourage you to take CS 1133 if you don’t know Python. The second is CS 3220, which provides a rigorous foundation in the mathematical background concepts used in the course.
There are no required textbooks for the course. The following is a list of optional but useful references for different parts of the course.
- Lentin Joseph, Robot Operating System (ROS) for Absolute Beginners, Apress, 2018.
- Brian Gerkey, Morgan L. Quigley, and William D. Smart, Programming Robots with ROS: A Practical Introduction to the Robot Operating System, O’Reilly Media, 2015.
- Mark W. Spong, Seth Hutchinson, and M. Vidyasagar, Robot Modeling and Control, Wiley, 2006.
- Kevin M. Lynch and Frank C. Park, Modern Robotics: Mechanics, Planning, and Control, Cambridge University Press, 2017.
- John J. Craig, Introduction to Robotics: Mechanics and Control, Addison-Wesley Publishing, 1989.
- Alonzo Kelly, Mobile Robotics: Mathematics, Models, and Methods, Cambridge University Press, 2013.
- Sebastian Thrun, Wolfram Burgard, and Dieter Fox, Probabilistic Robotics, MIT Press, 2005.
- Bruno Siciliano and Oussama Khatib, eds. Springer Handbook of Robotics, Springer, 2016.
- Coding Projects (5 total): 25%
- Problem sets (10 total): 25%
- Reading quizzes: 10%
- Prelims (2 total): 20%
- Final exam: 10%
- Participation: 9%
- Completing course evaluation: 1%
Regrade requests will be handled through the course CMS website. All regrade requests must be submitted within 10 days of receiving the grade. When submitting a regrade request, you must provide detailed reasoning as to why you feel you deserve a regrade. Please be advised that due to the additional scrutiny we will give your submission as a result of the regrade request, the score you received might increase, decrease, or remain unchanged.
Extensions will be granted only in exceptional circumstances, such as documented illness, not for situations such as job interviews or large workloads in other courses. Direct any extension requests to Prof. Knepper via email.
There are two in-class prelims: one on Friday, October 11th, and one on Friday, November 22nd. We do not offer make-up exams, so in order to take the exams, you must attend class on those days. The final exam is take-home and will be released three days prior to its due date (i.e. we will release it Tuesday, December 17th at 9:00am). The exam will be released via CMS, and you will submit your completed exam on CMS, so you do not need to be physically present in Ithaca in order to take the final exam. Regardless of when you start the final exam, its due date (Friday, December 20th at 9:00am) is final; no extensions or exceptions are permitted.
Homeworks will be submitted, and grades returned, through the course CMS website. Late submission of problem sets and coding projects will be accommodated through slip days. A maximum of five slip days may be used by each student through the course of the semester. A slip day allows a homework assignment to be submitted one day later than the deadline without penalty, and they are cumulative. You may use up to three slip days on a single assignment. Any attempt to submit an assignment that uses more than the allotted number of slip days either on one assignment or overall for the semester will result in a zero on that assignment. Sometimes the CMS server is slow to upload assignment submissions, so do not wait until the last minute! If the upload finishes one minute past the deadline, you will incur a full slip day penalty.
All problem set submissions and your final exam submission must be typed and submitted in PDF format. Handwritten submissions will receive a zero. You are encouraged to use LaTeX because it does an excellent job typesetting math. In addition, it is a good tool to have on your resume. We will distribute a LaTeX template for each problem set and the final exam. There are several free services like Overleaf that simplify using LaTeX. Other typesetting tools that output PDF, like Microsoft Word, are also acceptable. Hand-drawn figures should be used sparingly and should be extremely legible.
The reading quizzes are due before each class and are submitted on the CMS website. Once missed, they cannot be made up, even if you join the course late.
Students are expected to follow Cornell’s Code of Academic Integrity which can be found at http://cuinfo.cornell.edu/aic.cfm. The purpose of this code is to provide for an honest and fair academic environment. As such, it should be clear to students what is expected of them in the course (see the collaboration policy) and in case of doubt, students should ask Prof. Knepper. Copying work of others (code and/or text) — or allowing others to copy your work — is considered a violation of Cornell’s code.
Problem Sets. These problem sets are to be submitted individually, but working together in groups of any size is explicitly encouraged. Note that each student is responsible for writing a separate solution to problem sets. No student should ever see another’s solution. Consequently, no two submissions should look identical. Solutions that are too similar may trigger an academic integrity hearing. For all problem sets, you must write the names of the students with whom you collaborated.
Coding Projects. The coding projects can be completed in a group. Project 1 is restricted to a group size of one (i.e. individual). Projects 2–5 will be completed in groups of three students. Groups will be assigned by the course staff. Each group will make a single CMS submission, with all names included. Any kind of collaboration with students outside of your group is prohibited. No code should be shared by any means to anybody outside of your group, except course staff. No student should ever see your screen while code is visible, even if it is just to help with Python syntax. We recommend you consult the internet or seek help from the course staff if you have problems with Python syntax.
We run MOSS on all submissions to check for similarity. On Project 1, suspiciously similar submissions will trigger a warning. On Projects 2–5, excessive similarity of submissions is grounds for an academic integrity hearing. There have been convictions in this course for academic integrity violations in past semesters. It is easy to avoid trouble with academic integrity hearings by not looking at other groups’ code.
Exams. Needless to say, there should be no collaboration of any kind between students during the exams. The two prelims permit students to bring a single letter-size “cheat sheet” of paper. Students may fill it with anything they wish, but each student must prepare their own cheat sheet. Students are not permitted to obtain cheat sheets prepared by others.
Students in this course come from a variety of backgrounds, abilities, and identities. In order to ensure an environment conducive to learning, all members of the course must treat one another and the course staff with respect. If you feel your needs are not being adequately accommodated by the other students or instruction staff, please contact Prof. Knepper.
This course is taught as a standard lecture. Lecture notes (preparatory readings) are distributed on the website in advance of the class, and students are assigned one short reading per class, usually under 10 pages. Students complete a short (1 or 2 question) quiz to check reading comprehension. Classroom activities will comprise lecture and synthesis of information, with some discussion. In addition, homework assignments comprise a mixture of written response and algorithm implementation on a variety of simulations of mobile and manipulator robots. There are two in-class prelims and one take-home final exam.
This course exposes the student to both theoretical and applied aspects of robotics. Students are likely to encounter trouble with various aspects, from clarifications about notation to implementation confusion and problems debugging complex code. The course is designed so that most of the problems you face will be geared towards learning about robotics. The course staff provides a number of tools to help streamline the process particularly in the programming projects. Nevertheless, aspects of the course are very open-ended. Solving open-ended problems is an important job skill, so it is important for the student to strike a balance between trying to solve a problem themselves and seeking help from others.
Before Seeking Help
Please read the documentation about the libraries or function calls you are using. Even if you think you know how to use it properly, go back and re-read the documentation. The answers you seek are usually there.
When confused about the documentation, please ask a substantive and informed question. Saying “I don’t get it” gives the impression that you made zero effort to try to understand it. Instead, let us know what you understand or expect, so that we can help you get the information you really want quickly and efficiently.
If you get an error message or problem you don’t understand, try Googling it before asking for help on Piazza. Chances are, you are not the first to encounter this error. Search for error text strings to find out what causes the error. If you run a command and it doesn’t work, then Google the command and read the documentation. If you don’t understand how to use a service or function call while coding, try Googling the name of it.
We often get questions like “Would this work if I ran it?” Please just try it and see what happens. You won’t break anything, and you can learn a lot by being curious and experimenting.
If you need help debugging a problem with your code, please understand that we expect you to do your due diligence first. You should take several steps to try to narrow down the error yourself before asking for help. These steps can involve logging, adding print statements, or simplifying the code (e.g. if it doesn’t work with 8 turtles, try it with 1 or 2 and see what happens).
If your code is not producing the results you expect, perform some experiments. You can either run the debugger or use print statements. Make a hypothesis about your code (e.g. when the program gets here, the value of x will always be positive) and test it.
We love to see you in our office hours! Office hours are spread throughout the week.
Please follow the Before Seeking Help instructions. Then, if you still need help, please follow these guidelines:
Unless your question requires you to post code, post it publicly to the whole class.
If you need help with a problem, please be as specific as possible when asking a question. Tell us what you did before the problem occurred, what the problem was (include an error message, screenshot, or other details), and tell us what you have already tried to fix it.
If you must post privately because your question involves code or solutions, then post a private message to the entire course staff. Do not address your private post to one specific member of the course staff. It will only delay us getting you an answer.
Course staff will not answer questions that are answered in the syllabus or have been previously answered on Piazza. The staff will mark offending posts to show the answer is already available on Piazza or on the course web site.
If you need help and don’t want to make a public post on Piazza, please make a private post to all of the course staff rather than using email. You will get a quicker response to your question, and we can better balance the workload among the course staff. The only course staff member you should be emailing unsolicited is Prof. Knepper.
Please understand that if you do not follow the above guidelines, we may not answer your question.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738888.13/warc/CC-MAIN-20200812083025-20200812113025-00422.warc.gz
|
CC-MAIN-2020-34
| 14,008
| 66
|
https://coincryptoradar.com/vote?currencies=SunRise&symbol=SunRISE&lang=en
|
code
|
Statistics date ( Dec 5 2022 - Dec 11 2022 ) System time: 01/01/2000 00:00:00 Pacific Time Zone
Launch Date :
📣Jun 21 2021
One community with an actual focus on trust and honesty. With communicative and honest team and lots of engagement. No more shady stuff. we aim to keep it real. Drop by the chat and ask one of there members to give you a free trading lesson! Tell them Alan sent you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00820.warc.gz
|
CC-MAIN-2022-49
| 392
| 4
|
https://www.indianguitartabs.com/chords/threads/somebody-please-give-me-the-chords-of-aadat-the-original-version.27588/
|
code
|
hi guys... i need the chords of Aadat - by Jal. in a way thats simple to understand. so if anyone knows them, would u please help me out here?? thanks. since this is an introductory forum- my name is Apoorva, im frm pune, n im a student. im a wildlife buff n am researching snakes. so for an 18 yr old girl, thats not a very common thing. i play the guitar n sing. but as of now, im dying for those chords!!!! thank u!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948513784.2/warc/CC-MAIN-20171211164220-20171211184220-00470.warc.gz
|
CC-MAIN-2017-51
| 418
| 1
|
https://agnate.co.uk/som/dean_jenkins_about.php
|
code
|
Dean Jenkins - random blog - stuff to share.
I'm interested in medicine, education, and technology. I share stories and papers that I find of interest, trying to keep abreast of developments to help in the work I do at BMJ. I like the reflective nature of blogging and I think more of us should do it. It is a very personal activity and something you should have full control over.
I wanted something that was really easy and quick to share links - including the text and a representative picture from the original post - and work on mobile.
I've used other web apps but wanted features that I couldn't find. So I wrote my own using a Bootstrap template, PHP, MySQL, and a lot of XML parsing. There are some regular expressions too - which takes me back to my medical student elective programming a sed script for a pharmacology database in Wales.
This blog software (yet-to-be-named) can take the URLs from multiple sources (twitter feeds, pasted text, etc.) of items I've read and thought were interesting enough to share and then create a blog entry automatically with each one it finds.
For academic papers it tries to find the authors and journal name if it can.
I can then go in at another time and edit the blog after the basic stuff has been done.
Maybe ... but it has to be tested a bit more first ... and it needs a name. SOM stands for 'share-o-matic' but that sounds a little too Wallace & Gromit.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320395.62/warc/CC-MAIN-20170625032210-20170625052210-00214.warc.gz
|
CC-MAIN-2017-26
| 1,409
| 8
|
https://www.tr.freelancer.com/projects/python/python-script-for-getting-networks/
|
code
|
I am working on a project that needs to require a python script to fetch the next available ip ranges from list of cidr, of which some may be already used
Bu iş için 7 freelancer ortalamada ₹5031 teklif veriyor
Hello, I have extensive experience working with python. I can do tasks quickly and efficiently.
I have good experience in Python I am good with the price And I will give you the script in one day
Hi, I am Pratik worked I have worked on Python for lot of years making GUI applications and more. So i think i am best for this work. Please provide me chance to prove.
Hey, I'm Arnav I'm an experienced Python Fullstack Developer with a skillset comprising of web development (frontend & backend), machine learning, deep learning, data mining, data analysis, database architecture and d Daha Fazla
Hi i can help you with the script. i need to know where do you want to use the script so as to write the script according to the infra available. i can create a jenkins job for the same if you want .
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670731.88/warc/CC-MAIN-20191121050543-20191121074543-00206.warc.gz
|
CC-MAIN-2019-47
| 1,008
| 7
|
https://electronics.stackexchange.com/questions/316361/sd-card-protected-area
|
code
|
Explanations of the "protected area" functionality are very brief and I want to know more. Is it in anyway related to CPRM? Does it use the whole card or part of it? Is it a form of write protection? How can I set one up?
Explanations of the "protected area" functionality are very brief [...] Is it in anyway related to CPRM?
Yes. It holds the encryption keys related to any files which are encrypted according to the CPRM specification by an "SD CPRM host" (which is not a typical digital camera or PC etc.).
Content Protection for Recordable Media (CPRM), the content protection technology used for SD standards, is key to enabling a distribution system for music, video, etc. CPRM provides a high level of protection against illegal copying. The content protection technology was developed by the 4C Entity, LLC, The digital contents copyright protection technology licensing organization of IBM, Intel, Panasonic, and Toshiba.
The SD memory card CPRM function has the following features:
- Success of mutual authentication enables host to access card protected area.
- The protected area consumes small memory area because a content key is supposed to be saved instead of a large content.
- Revocation feature can prevent a specific host from accessing card protected area.
- SD CPRM Host Devices can playback an encrypted content mutually that is stored in an SD memory card.
Does it use the whole card or part of it?
By default, on typical consumer cards, only a small part of the card is used for the "protected area" (e.g. 10s or 100s of kB, depending on the capacity of the SD card). Look at the specification for your specific SD card to see how much is used, or read the
SIZE_OF_PROTECTED_AREA value from your SD card's "SD Status register".
As shown in the quote from the SD Association above, the idea is that only the encryption keys are stored in the "protected area", so that area doesn't need to be large enough to hold the encrypted files themselves. Encrypted (i.e. DRM-protected) files can be stored in the normal "user area" of the card, and hence can be backed-up etc.
Is it a form of write protection?
That depends on your definition of "a form of write protection". Access to the "protected area" is deliberately limited (e.g. special access protocol etc.) so you can't easily write to the "protected area" - but you also can't easily read from it either. Therefore I don't see it described as write protection.
How can I set one up?
You can't. A normal SD card already has a "protected area" and only one is allowed.
[...] and I want to know more.
You would need to get access to the licensed documentation for CPRM (see the 4C Entity website) and the SD Security Specification documents (which are not public).
An example of using CPRM in SD-Audio is explained here in Japanese, however the full details of the encryption keys etc. are only available to licensees (under NDA).
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00460.warc.gz
|
CC-MAIN-2022-33
| 2,903
| 20
|
https://www.oracle.com/technetwork/middleware/bi-foundation/overview/index.html
|
code
|
The Oracle Business Intelligence Foundation Suite provides the industry’s best in class platform for business intelligence, including ad-hoc query and analysis, dashboards, enterprise reporting, mobile analytics, scorecards, multidimensional OLAP, predictive analytics, on an architecturally integrated business intelligence foundation. This enabling technology for custom and packaged business intelligence applications helps organizations drive innovation, optimize operations, simplify IT, and deliver extreme performance at lower total cost of ownership.
The BI Foundation is also a key enabling software for Oracle Exalytics, the industry's first engineered system for in-memory analytics that delivers the fastest performance for business intelligence and planning applications.
The BI Foundation also leverages Oracle Real-Time Decisions, a platform that combines both rules and predictive analytics to power solutions for real-time enterprise decision management. It enables real-time intelligence to be instilled into any type of business process or customer interaction.
Stay in touch: Twitter, YouTube, Sample App videos, Facebook, LinkedIn
Product and Related Areas
|Oracle Business Intelligence Suite Enterprise Edition Plus||Oracle Essbase|
|Oracle Exalytics In-Memory Machine||Oracle Business Intelligence Applications|
|Oracle Endeca Information Discovery||Enterprise Performance Management|
|Predictive Analytics (Oracle Real-Time Decisions)||Sample Application for Oracle BI|
|Oracle's Hyperion Smart View for Office||Oracle Business Intelligence Standard Edition One (for mid-sized businesses or workgroups)|
|Oracle Business Intelligence Mobile|
Related Areas - Servers and Storage Systems
|Exalytics Business Intelligence Machine||Big Data Appliance|
|Exadata Database Machine||More...|
|Oracle Business Intelligence Standard Edition||Oracle Enterprise Performance Management Smart Space|
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986661296.12/warc/CC-MAIN-20191016014439-20191016041939-00024.warc.gz
|
CC-MAIN-2019-43
| 1,911
| 15
|
https://www.pluralsight.com/courses/core-python-custom-attributes-descriptors
|
code
|
Python has a dynamism which can give our objects superpowers.
This course will teach you how to implement highly flexible interfaces with
where the attributes of objects are determined on-the-fly, rather than being
determined in advance by classes.
When classes are too rigid, but dictionaries too flexible, you can often find a good trade-off with dynamic objects.
In this course, Core Python: Custom Attributes and Descriptors, you’ll learn to make objects with highly dynamic interfaces.
First, you’ll explore how objects are internally represented in Python. Next, you’ll discover how to customize object attribute access.
Finally, you’ll learn how to define your own descriptors, which form the basis of much of how Python attributes work.
When you’re finished with this course, you’ll have the skills and knowledge of Python object customization needed to produce flexible and expressive code.
Robert Smallshire is a founding director of Sixty North, a software product and consulting business in based in Norway. He has held several senior software architecture and technical management roles, and he is a regular conference speaker. Python is his weapon of choice.
Austin is a founding director of Sixty North, a software consulting,
training, and application development company. He's a native of Texas
but currently lives in Norway where he writes software, runs a local
software interest group, and presents and teaches whenever he can.
Course Overview Hi everyone. I'm Rob Smallshire, and I am here to welcome you to Core Python: Custom Attributes and Descriptors. My coauthor, Austin Bingham, and I are both founders and principal consultants at Sixty North. In this course, we'll be investigating how the attribute look at mechanisms at the heart of the Python object model work and how to customize them to your advantage. Specifically, we're going to see how to add dynamically‑named attributes to our classes, understand how objects store attributes internally, clarify the relationship between instance and class attributes, demonstrate how to use slots to trade dynamism for better memory performance, understand the central role descriptors play in the Python object model, and learn how to write our own custom descriptors. By the end of this course, you'll be able to confidently customize the internals of the Python object model and define powerful, expressive, and elegant interfaces to your own classes. Before beginning this course, you should be familiar with the essentials of the Python language, including functions, classes, modules, decorators, and properties. This course assumes knowledge equivalent to what's presented in Core Python: Functions and Functional Programming and Core Python: Classes and Object‑orientation. We hope you'll join us on this journey to learn more about Python with the Core Python: Custom Attributes and Descriptors course here, at Pluralsight.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056548.77/warc/CC-MAIN-20210918154248-20210918184248-00390.warc.gz
|
CC-MAIN-2021-39
| 2,923
| 15
|
http://www.codeguru.com/cpp/w-d/docking/
|
code
|
Learn about a framework that can be used to implement Visual Studio.NET-style Tear Off panes. The framework uses the commonly used MFC classes to achieve the functionality. This article is the fourth in the series.
Latest Docking Window Articles
This article discusses a framework that can be used to implement Visual Studio.NET-style Tear Off panes. The framework uses the commonly used MFC classes to achieve the functionality. This article is the third in the series.
Framework to build and use Visual Studio .NET-style Tear Off Panes
Framework to build and use Visual Studio .Net style Tear Off Panes
Enable your software to be provided with a professional and user-friendly interface with this MFC extension library, Professional User Interface Suite. (The article and demo project were updated.)
Position-interdependent popup windows have been used to great effect in current applications to simplify the organization of a complex UI. This article presents a flexible, if somewhat rustic, technique for accomplishing this behavior. (The source code was updated.)
Latest CodeGuru Developer Columns
Learn more about a few commonly used components and explore their utility and usages.
Make a RESTful call from a UWP app to the Azure management API, the same API the portal uses, to start and stop an app service.
Using VB Namespaces can help tremendously in achieving your goal of keeping your code organized.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170286.6/warc/CC-MAIN-20170219104610-00007-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,413
| 11
|
https://www.my.freelancer.com/projects/cplusplus-programming/questions-31930216/?ngsw-bypass=&w=f
|
code
|
Hello I need an expert that helps me answer a few questions about c++
21 pekerja bebas membida secara purata $32 untuk pekerjaan ini
Hi there, I checked your requirements and guarantee you it's gonna be done within the next few hours. Let's contact via chat so that I can start work immediately. Wish you the best. -----------------------------
Hi, I'm an expert in c++. I can easily answer whichever questions you have about c++. PM me so you can send me the questions. And I will send you the answers. Best regards, Abdessabour M.
Hi therre, Yes I am Expert in C++ and I can help you out for sure Kindly send me a message we'll discuss further Looking forward t hear you Thank you
Hi there. C++ expert here. I've strong knowledge on C++, STL, and native stuff like sockets, file handles, etc. Please send me a message so we can discuss more details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363216.90/warc/CC-MAIN-20211205191620-20211205221620-00273.warc.gz
|
CC-MAIN-2021-49
| 851
| 6
|
https://mmtfl1.wordpress.com/2014/11/15/what-i-want/
|
code
|
The is something wrong in the world. I want ,to change it. I want this world to be a better place for most people…
I want to be treated like a person, not a sex object, or a resource.
I want regular uninterrupted sleep.
I want to be given the authority and resources to do my job well.
I want access to work that pays a living wage.
I most of all, I want this to be normal for everyone to have it. I want this to be the standard of normal. The list could go on, but this is what I’m dealing with at the moment, and what is on my mind.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590127.2/warc/CC-MAIN-20180718095959-20180718115959-00562.warc.gz
|
CC-MAIN-2018-30
| 538
| 6
|
https://colourcanary.forumotion.net/t5690-hi-people-need-some-help-please
|
code
|
Apart from introducing myself I wanted to ask your help on an issue that I am facing with my breeding pair.
My apologies for perhaps placing this question in the wrong forum section and to explain the below in so much detail
when I purchased my breeding pair, before placing them in the aviary I checked the male and female and both seems ready. both vents bigger and ready. the breeder I bought them from told me that they are ready and would lay eggs soon. low and behold a couple days later they started picking up straws and looking for a breeding place.
I wondered wether I should put them in breeding cages inside my shed that has a timer light and is warmer then the leicester UK outside weather.
I left them in the aviary and I decided to put up a breeding nest and my breeding pair (copper and rosie as the children like to call them) started building their nest. I noticed that copper (male ) and Rosie(female) have been feeding each other ( copper feeding rosie) and I have spotted the occasional mating going on.after a couple days in the outside aviary ( that does have a inside sheltered area, where the birds sleep mostly) the weather became colder. I decided to put them in the breeding cages in the shed to allow them to breed like I have always seen before.
I took the half unfinished nest and placed that in the breeding cage. a couple hours later both birds looked really unhappy and were fluffed up and closing their eyes.
I took them out again and placed them back in the aviary and they were really happy again. I place the nest back where it was initially ( in the outside bit of the aviary) and watched them for a couple hours to make sure all was fine. they continued building the nest . so I left them outside. a couple days past and the nest looks like its ready. I even spotted Rosie this morning 5 am sitting on the nest for a while.
I came back from work today and my son mentioned that he noticed white liquid coming from Rosie's vent . being little, he and his mum decided that Rosie's water had broken .
I reassured that this would not happen and that I would keep an eye on her. well later just before copper and Rosie's bedtime I checked on them and I noticed Rosie dropping from her vent a clear white liquid ??? I have never seen this before ..
whats going on . I have heard of egg bound problems, but she is not sitting on the floor or looks ill at all . she has being flying around the aviary all day long.
I am now worried that maybe by moving her or not providing good living conditions ( breeding cages) that I have caused her problems
I am really tempted to bring her inside, in my warm lighted shed . but don't want to disturb her and cause any problems.
I would be very grateful if anyone could help me with some advice here. is this normal? or do I need to worry and if so what you good people suggest I do. I am so scared that my first attempt of breeding this lovely pair might cost me lovely bird
please forum members give this wannabe canary breeder some advice
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188800.15/warc/CC-MAIN-20201126142720-20201126172720-00525.warc.gz
|
CC-MAIN-2020-50
| 3,012
| 14
|
https://commons.erau.edu/publication/2139/
|
code
|
The goal of this chapter is to discuss the general frame of hydrodynamics, like particle trajectories (path lines), streamlines, streak lines, free surfaces, and fluid surfaces, and to compare their behavior in the Eulerian and Lagrangian frames. The following sections and chapters proceed on the assumption that the fluid is practically continuous and homogeneous in structure. Of course, the concept of continuum is an abstraction that does not take into account the molecular and nuclear structure of matter. In that, we assume that the properties of the fluid do not change if we consider smaller and smaller amounts of matter . May be the wisest point of view while we remain at the level of general laws of fluid dynamics (or fluid mechanics) is to keep the physical scales rather vague . This aspect is in direct relation with the fact that these laws can be made dimensionless in a large variety of situations.
Nonlinear Waves and Solitons on Contours and Closed Surfaces
Scholarly Commons Citation
Ludu, A. (2022). Kinematics of Fluids. In: Nonlinear Waves and Solitons on Contours and Closed Surfaces. Springer Series in Synergetics. Springer, Cham. https://doi.org/10.1007/978-3-031-14641-1_9
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473819.62/warc/CC-MAIN-20240222125841-20240222155841-00499.warc.gz
|
CC-MAIN-2024-10
| 1,204
| 4
|
https://webwork.maa.org/moodle/mod/forum/discuss.php?d=4860&parent=14557
|
code
|
The use of base64 (formally MIME-Header) encoding in the "formal" mail headers is in accordance with the Internet standard https://tools.ietf.org/html/rfc2047 to handle non-ASCII characters in the "name".
Modern mail client should "unpack" the MIME-header (base-64) encoding behind the scenes and display the name properly. I certainly see the Hebrew name of students in the "From" line in mails coming out of my servers both when using "alpine" over a terminal and in Office365 online. However, it is running WW 2.15 in Docker with an older version of Ubuntu (18.04) as the "base" OS.
Sample raw header:
From: =?UTF-8?B?15jXnCDXoNep16g=?= <firstname.lastname@example.org>
From: טל נשר <email@example.com>
One possible issue is that the email client you are using is having trouble with the encoded data.
Another possible issues could be some change to the Encoding module of Perl between these two versions of Ubuntu.
Note: The change to do this was in https://github.com/openwebwork/webwork2/pull/973
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506646.94/warc/CC-MAIN-20230924123403-20230924153403-00362.warc.gz
|
CC-MAIN-2023-40
| 1,007
| 8
|
http://meta.stackoverflow.com/users/1361752/caleb
|
code
|
I am a research scientist working at the Aerospace corporation. Prior to this, I was a Yield Analysis Engineer working in Intel's Portland Technology Development group. My educational background is in particle physics, for which received a PhD from the University of Arizona.
My passions include physics, coding, hiking, and gaming (of both the computer and tabletop variety).
Top Network Posts
- 40How can you check which options vim was compiled with?
- 25Is there an analysis speed or memory usage advantage to using HDF5 for large array storage (instead of flat binary files)?
- 10How to easily track combat in Feng Shui?
- 9How do environmental conditions and scene aspects stack in FATE?
- 9In FATE, can action descriptions be revised after die rolls to apply aspects?
- 9Using pandas to read text file with leading whitespace gives a NaN column
- 6On repeat translations to the same recursion, do you always use the same foci?
- View more network posts →
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828283.6/warc/CC-MAIN-20160723071028-00245-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 963
| 11
|
http://www.techrepublic.com/search/?q=zotero+windows
|
code
|
Searched for: "zotero windows"
About 3 results for "zotero windows"
Finding software that you can use as a cataloging tool isn't easy, but with a little creativity and a lot of searching, free apps can be found.
If your small business is worrying about transitioning from Windows 7 to Windows 8, Jack Wallen proposes going with a completely different option: Ubuntu Unity.
Although the Unity Smart Scopes project has been delayed until the Ubuntu 13.10 release, it is still an amazing tool. Jack Wallen shows you how to get the Unity Smart Scopes instal...
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398471441.74/warc/CC-MAIN-20151124205431-00046-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 556
| 5
|
https://forums.phpfreaks.com/topic/309973-payubiz-payment-gateway-success-page-return-blank-page/#comment-1573991
|
code
|
aveeva Posted February 4, 2020 Share Posted February 4, 2020 (edited) I am using Magento (Ver 1.9.x) If i try with my localhost success url like, http://192.168.1.65/magento/index.php/checkout/onepage/success/ and return success message with order id. if i try with live, success url like, https://abc.in/payubiz/redirect/success/ success page like blank page. How to solve the issue? Code : https://github.com/ZusZus/Payubiz Edited February 4, 2020 by aveeva Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945292.83/warc/CC-MAIN-20230325002113-20230325032113-00147.warc.gz
|
CC-MAIN-2023-14
| 648
| 3
|
https://www.preemptive.com/blog/presenting-dotfuscator-6-5-major-maintenance-update/
|
code
|
PreEmptive is pleased to announce the release of Dotfuscator 6.5, a tool used by software developers to protect code from hacking and reverse engineering.
The version 6.5 update is a big one. It addresses various .NET Core, .NET 5, and cross-platform support items, fixes various bugs, and improves performance of the licensing system that was introduced earlier this year. We’ve added new static and dynamic code transforms and injected runtime checks to ensure security in all stages of the development process. We also amplified defense against de-obfuscators and de-compilers.
Dotfuscator is a DevSecOps tool that protects .NET applications from reverse-engineering and hacking. Using static and dynamic code transforms and injected runtime checks, Dotfuscator obfuscates source code on .NET, Xamarin, and Windows Platform Apps. It integrates into the development build process and operates on the .NET Intermediate Language. Dotfuscator Professional supports .NET, including .NET Core, .NET 5, Xamarin, and Mono.
For more information, check out Dotfuscator 101. It’ll walk you through its features and show how the program provides ironclad security against common (and uncommon) software development vulnerabilities.
The release notes provide fully detailed information about the updates in this version, which include:
Every organization developing .NET software needs Dotfuscator in its development process. Data breaches are no longer a maybe. They happen every day to companies of all sizes in all industries. If you don’t protect your code at the onset, you risk becoming just one more data breach statistic.
PreEmptive Dotfuscator has been the leader in In-App security since 2003. We serve clients of all sizes, including enterprise and Fortune 500 companies in medical, government, and other industries. This release is supported for licensed users as described in the release notes. We encourage you to upgrade your software to enjoy the new features. And if you haven’t tried Dotfuscator yet, request a demo today.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00453.warc.gz
|
CC-MAIN-2024-18
| 2,038
| 7
|
http://rightwingnews.com/uncategorized/atari-teenage-riot-the-inside-story-of-pong-and-the-video-game-industrys-big-bang/?adclick=280
|
code
|
“Atari Teenage Riot: The Inside Story Of Pong And The Video Game Industry’s Big Bang”
When I mention Pong to my undergraduates, they have no idea. When I mention it to my MBAs, they: laugh.
Associate Professor of Economics, North Carolina State Univ.
I have lamented on my blog that someone should start a list of all the things that are now considered
Question: “I have learned an enormous amount from you since 9/11 and have come to understand, as a Canadian/born in
Mumia Abu-Jamal’s Story: Many of you have probably heard left-wingers saying that we should free Mumia Abu-Jamal, but you may
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802777438.76/warc/CC-MAIN-20141217075257-00169-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 604
| 6
|
https://www.job-southafrica.com/jobs/fashion/machine-learning-engineer-2-39477/
|
code
|
Machine Learning Engineer
|Remuneration:||R900000 – R950000 per year|
|Company:||E-Merge IT Recruitment|
One of the largest retailers in Africa with stores in 15 countries across Africa is looking for an ML engineer to join them. The machine learning engineer is primarily responsible for building end-to-end machine learning models from ideation to deployment and scalability. S/he creates new and improved data-driven solutions to assist the Group in answering business questions, gaining competitive advantage, identifying new market opportunities, increasing efficiencies and/or reducing costs.
- Degree in mathematical sciences/engineering/data science
- Solid experience with SQL
- Experience with Python
- Experience with Probability and stats
- Prescriptive modelling experience
- Three years of machine learning experience
Are you ready for a change of scenery? E-Merge IT Recruitment is a specialist niche recruitment agency. We offer our candidates options so that we can successfully place the right developers with the right companies in the right roles. Check out the E-Merge website http://www.e-merge.co.za for more great positions.
Do you have a friend who is a developer or technology specialist? We pay cash for successful referrals!
Posted on 04 Feb 15:45
011 463 3633
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358798.23/warc/CC-MAIN-20210227084805-20210227114805-00341.warc.gz
|
CC-MAIN-2021-10
| 1,290
| 14
|
https://yourcreatures.miraheze.org/w/index.php?title=Games:Main_Page&oldid=7328
|
code
|
Welcome to the space wher you can read about games. All the texts of this space are descriptions or real games, mechanics, elements or characters from real games although maybe there would be exceptions and some games would be ficticious.
What things correspond to this space?
- Any text that describes a game or game element, as well as characters, game settings, rules, tables of values of a game and the like.
- Texts that describe games but are actually made up.
Articles about games
These are some of the articles about games:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710765.76/warc/CC-MAIN-20221130160457-20221130190457-00848.warc.gz
|
CC-MAIN-2022-49
| 531
| 6
|
https://meta.stackoverflow.com/questions/294329/does-stack-overflow-reset-reputation-on-rule-violation
|
code
|
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
How could this person earn that many badges with 1 reputation point?
If you are suspended your reputation is set to 1 for the duration of the suspension.
It is restored to it's correct value after the suspension is over.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473518.6/warc/CC-MAIN-20240221134259-20240221164259-00615.warc.gz
|
CC-MAIN-2024-10
| 325
| 5
|
https://stixproject.github.io/data-model/1.2/cybox/EventType/
|
code
|
The EventType is a complex type representing a cyber observable event that is dynamic in nature with specific action(s) taken against specific cyber relevant objects (e.g. a file is deleted, a registry key is created or an HTTP Get Request is received).
The id field specifies a unique id for this Event.
The idref field specifies a unique id reference to an Event defined elsewhere.
When idref is specified, the id attribute must not be specified, and any instance of this Event should not hold content unless an extension of the Event allows it.
The Type field uses a standardized controlled vocabulary to capture what type of Event this is.
This field is implemented through the xsi:type controlled vocabulary extension mechanism. The default vocabulary type is EventTypeVocab-1.0.1 in the http://cybox.mitre.org/default_vocabularies-2 namespace. This type is defined in the cybox_default_vocabularies.xsd file or at the URL http://cybox.mitre.org/XMLSchema/default_vocabularies/2.0.1/cybox_default_vocabularies.xsd.
Users may also define their own vocabulary using the type extension mechanism (by specifying a vocabulary name and/or reference using the vocab_name and vocab_reference attributes, respectively) or simply use this as a string field.
The Description field provides a mechanism to specify a structured text description of this Event.
The Observation_Method field is optional and enables descriptive specification of how this Event was observed (in the case of a Cyber Observable Event instance) or could potentially be observed (in the case of a Cyber Observable Event pattern).
The Actions construct enables description/specification of one or more cyber observable actions.
The Location field specifies a relevant physical location.
This field is implemented through the xsi:type extension mechanism. The default type is CIQAddressInstanceType in the http://cybox.mitre.org/extensions/Identity#CIQAddress-1 namespace. This type is defined in the extensions/location/ciq_address_3.0.xsd file or at the URL http://cybox.mitre.org/XMLSchema/extensions/location/ciq_address/1.0/ciq_address_3.0.xsd.
Those who wish to express a simple name may also do so by not specifying an xsi:type and using the Name field.
The Frequency field conveys a targeted observation pattern of the frequency of the associated event or action.
This Event construct is included recursively to enable description/specification of composite Events.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819067.85/warc/CC-MAIN-20240424045636-20240424075636-00273.warc.gz
|
CC-MAIN-2024-18
| 2,438
| 15
|
https://subsidytracker.goodjobsfirst.org/subsidy-tracker/md-wexford-science-and-technology-llc-0
|
code
|
Subsidy Tracker Individual Entry
Company:Wexford Science and Technology LLC
Development of 3rd Building within BioPark to house Cambridge Innovation Center, primary tenant, create additional office/research space.
Program Name:Baltimore Development Corporation TIF projects
Awarding Agency:Baltimore Development Corporation
Type of Subsidy:tax increment financing
Source of Data:
Direct from agency; not on web
Subsidy is TIF for 20 year period. Year is year credit is approved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038464045.54/warc/CC-MAIN-20210417192821-20210417222821-00412.warc.gz
|
CC-MAIN-2021-17
| 478
| 9
|
http://oraclemidlands.com/error-page/customize-error-pages-tomcat.php
|
code
|
The source of the page is:I've edited the web.xml file here at the very bottom and restarted I tried almost all links but its not working for me. Why did the One Ring betray Isildur? Any ideas? –Mr Aleph Mar 31 '11 at 14:02 Check your directory settings, it is skipping my mind right now, but there is essentially a directive command which has check over here
The location entry will list the location of the JSP relative to the root of the application. How do I achieve this - display a custom error page per servlet? Thank you for the help. I just needed to place the error.html in the correct location.
Tutorial Categories: Ajax (1)Ant (16)Apache Web Server (8)Bioinformatics (10)Cascading Style Sheets (47)Classes and Objects (14)Database (13)Design Patterns (22)Eclipse (39)Files (62)General Java (69)JSPs (9)Java Basics (11)Linux (23)Logging (5)Maven (88)Search (12)Servlets (20)Struts (1)Text I want to customize (or redirect) the 400-500 errors running on my apache tomcat server. Custom Error Pages Unhappy with the default error pages that come with Tomcat ? This is due to the default retry interval.
When I type" www.server.com/servlet1/SomRandomStuff to get a 404, a blank page is displayed, not error.html. To make your 404 page a bit more presentable, provide the user with a link back into your site, as well as hide the Tomcat version in use, you can easily Tim Holloway Saloon Keeper Posts: 18312 56 I like... Tomcat Default Error Page Some of solution I got but no luck.
are you sure you know what a web service is? –eis Apr 15 '13 at 21:23 because we are using our custom error page in our project –Sumit Sharma Tomcat Custom Error Page Example Web Tutorials :: Apache Web Server :: 8. Locate the following section:
Author: Deron Eriksson Description: This Java tutorial describes how to create a JSP error page to handle exceptions. Tomcat Default Error Page Location Should foreign words used in English be inflected for gender, number, and case according to the conventions of their source language? Is my teaching attitude wrong? See the first post in the series for a bit of background.
How do I complete this figure using tikz RattleHiss (fizzbuzz in python) Why was the Rosetta probe programmed to "auto shutoff" at the moment of hitting the surface? The server quit without updating PID file - how we fixed it.FileMaker Day to Unix Time conversionFlexibility in input - read from file, web resource or keyboardWhich (virtual) host was visited? Tomcat Custom Error Page For All Errors But for production deployments, you may want to turn it off. Tomcat Custom 404 Error Page share|improve this answer answered Oct 21 '15 at 22:24 mig-foxbat 1011 add a comment| Your Answer draft saved draft discarded Sign up or log in Sign up using Google Sign
current community chat Stack Overflow Meta Stack Overflow your communities Sign up or log in to customize your list. http://oraclemidlands.com/error-page/custom-error-page-tomcat.php The options that concern us are :
If I tried, I could probably find a way to do what you're asking, but I don't recommend it. Something else happens when I call the servlet without passing the correct info to it, the browser will ask me if i want to download a file. Copyright © 2014 Code Strategies | Template: Free CSS Templates | Contact Skip to content we3geeks (plus one) musings on technology, books, food, faith, adoption, and life in a family of this content How redirect the "no-route" cms page to home page after 10 second (not through server side) Is there a way to ensure that HTTPS works?
You can define your own custom error pages in your web.xml file. Apache Tomcat Default Page But in my Webservice I am getting response 500 but page is opening blank. It is that simple. 6.2.
Is 8:00 AM an unreasonable time to meet with my graduate students and post-doc? For example, a JSP or image request. What should I do? Tomcat Default Page Not Showing These reasons might include: Security: the default error pages served by Tomcat can include information about the server and its configuration that could be considered a vulnerability (e.g.., file paths, configuration
Is there a single word for people who inhabit rural areas? Not the answer you're looking for? Thanks, Pavan tomcat share|improve this question asked Dec 17 '12 at 12:53 Pavan 73117 add a comment| 1 Answer 1 active oldest votes up vote 14 down vote You can add http://oraclemidlands.com/error-page/customize-error-pages-apache.php Some of the links I got for JSP page instead of HTML that also I have tried In case of JSP I used: <%@ page isErrorPage="true" %>
You could then add a robots.txt file to prevent crawling of the directory. What is the difference?Zend / layout of MVC and other files in an example application (PHP)Multiple page web applications - maintaining state - PHPThe components of an Apache httpd / Tomcat If any idea or any doubt about my query just let me know. Please check back via our main site for current courses, prices, versions, etc - any mention of a price in "The Horse's Mouth" cannot be taken as an offer to supply
How do I debug an emoticon-based URL? This is not exhaustive -- Tomcat is extremely sophisticated software and there are a lot of things you can change or tweak. 6.1. That's in another post - here - which I promised today's delegates I would mention for them! (written 2009-03-18, updated 2009-03-17) Associated topics are indexed as below, or enter http://melksh.am/nnnn for As an example, in my http.conf Apache configuration file, here's a proxy so that requests to URL paths starting with /tutorials will be handled by the tutorials JavaSW web application running
This doesn't seem to be working. more stack exchange communities company blog Stack Exchange Inbox Reputation and Badges sign up log in tour help Tour Start here for a quick overview of the site Help Center Detailed asked 3 years ago viewed 16534 times active 2 years ago Linked 1 How to handle not available Tomcat 7 webapps 0 Set up 404 page in tomcat for multiple webapps Tuning Apache log files, and Python analysisInstalling Cucumber on Ubuntu - cannot load such file -- mkmf (LoadError) messageChanging what operators do on objects - a comparison across different programming languagesThe
This is the latest in my series of short posts related to configuring Tomcat, as I work on getting a Tomcat/ACF10 development environment stood up next to my existing Apache/JRun/ACF9 application stack. Link to Ezine home page (for reading). Including \bibliography command from separate tex file Best practice for map cordinate system Can I compost a large brush pile? Is it possible to join someone to help them with the border security process at the airport?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743007.0/warc/CC-MAIN-20181116091028-20181116113028-00260.warc.gz
|
CC-MAIN-2018-47
| 6,712
| 16
|
https://community.esri.com/t5/arcgis-appstudio-questions/using-appstudio-player-credentials-within-an-app/td-p/838239
|
code
|
If I deploy an app via AppStudio Player within an enterprise I would like to know how my app could reuse the players' credentials?
I have seen that there is AppFramework.player.settings but there doesn't seem to be enough detail in the object for me to reuse the credentials as it only stores the username and portalurl.
Hopefully I am just looking in the wrong spot.
Looking forward to hearing from you.
I little research reveals that right now, we save the username and password encrypted. We do not have way for you to un-encrypt that info. This would be something new. If you (or others) are keen for this feature please contact tech support and describe your scenario so we can prioritize this work.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710918.58/warc/CC-MAIN-20221203011523-20221203041523-00823.warc.gz
|
CC-MAIN-2022-49
| 704
| 5
|
https://www.balderton.com/news/why-were-movingforward/
|
code
|
This International Women’s Day, we would like to share that we will be a founding participant in #MovingForward’s European launch.
#MovingForward is an open-source directory for up-to-date information on diversity, inclusion, and anti-harassment efforts in Venture Capital, making it easier for founders to review policies, find supportive investors, and identify reporting contacts.
We believe that openness and transparency are critical to ensuring the Venture Capital industry operates with integrity, and so welcome the opportunity to support #MovingForward by publishing our Code of Conduct and reporting contacts on their platform.
At Balderton, we believe ethics are at the core of every great company. Respect, equality, and ethical conduct are three overarching principles that guide us as a firm and as people, and which all Balderton employees and partners aspire to and abide by when confirming they will adhere to this Code.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057371.69/warc/CC-MAIN-20210922163121-20210922193121-00167.warc.gz
|
CC-MAIN-2021-39
| 941
| 4
|
https://www.experts-exchange.com/questions/27326972/Access-2007-Instr.html
|
code
|
My OS is windows 7 and I use Access 2007. I have a Field which is called Name is a Text type.
The data in this field contains the first, middle and last name separated by a space.
I would like to separate the first and middle names and put them in a field called First Name
And the last name and put them in a field caleld LastName.
I am trying to use an ADO function to loop thru all the names, and then find the spaces.
Thus if the data has only one space, then the first part would have to be the first name and the rest goes into the last name.
But if the data has more than one spaces, i.e. eg : John Phil Smith, then John Phil would go into the first name and Smith to the last name.
Is using the InStrr method to find this space the correct way to do it.
The the code to my mind would be like :
If 1 space, Then
take all data to the left of that space and put it into a var called First Name
and all data to the right of that space, put it into a var called Last Name
Now update the record in the Table.
Go on looping until end of file.
Hope some expert could help me with the coding, and if possible also the ADO code.
The name of the Table is called Seniors Club
The field name where the data is to be extracted from is called Name, and is a text type field.
The firstname field is text type and also the lastname field is also text type.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645513.14/warc/CC-MAIN-20180318032649-20180318052649-00489.warc.gz
|
CC-MAIN-2018-13
| 1,347
| 18
|
https://devblogs.microsoft.com/powershell/yet-another-freakishly-powerful-powershell-one-liner/
|
code
|
Yet Another Freakishly PowerFul PowerShell One-liner
MOW has done it again.
Check out http://thepowershellguy.com/blogs/posh/archive/2007/01/06/it-is-to-me.aspx for another one of MOW’s freakishly powerful PowerShell one-liners. It is so powerful and pithy that makes my head spin.
Jeffrey Snover [MSFT]
Windows PowerShell/MMC Architect
Visit the Windows PowerShell Team blog at: http://blogs.msdn.com/PowerShell
Visit the Windows PowerShell ScriptCenter at: http://www.microsoft.com/technet/scriptcenter/hubs/msh.mspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817187.10/warc/CC-MAIN-20240418030928-20240418060928-00375.warc.gz
|
CC-MAIN-2024-18
| 520
| 7
|
https://construkted.com/asset/argwxuvcbom/
|
code
|
A short stretch of the Borgne d’Arolla, created using a Phantom 4 RTK and Agisoft Metashape. The imagery was collected during our annual field course to the Swiss and French Alps with University of Worcester Geography degree students, where we monitor river channel change. We use Geomorphic Change Detection to analyse the erosion and deposition along the reach each year.
Add and remove the people who have access to edit or view the project
Create/update thumbnail from current asset view.
Change the location of the server from where you load the asset resources
Change wether you want the details modal to be floating or left pane
Three selected points define the plane.
The slope of the mesh at the selected point defines the plane.
Main assets selected for the project
Display other public assets within the specified radius.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00295.warc.gz
|
CC-MAIN-2024-18
| 834
| 9
|
https://www.silicon.co.uk/cloud/microsoft-teams-launches-207177
|
code
|
Watch out Slack? Workplace chat app Microsoft Teams launches globally to Office 365 customers
Microsoft Teams has officially launched as the company seeks to mount a challenge to workplace communication app Slack, which has rapidly established itself as an enterprise tool in recent years.
Like Slack, the Microsoft Teams tool aims to help workers chat and share information with their enterprise colleagues, and is tightly integrated with the familiar Office applications.
The chat-based workspace for Office 365 is now generally available in 181 markets and in 19 language around the world.
Microsoft actually previewed the tool last November and said at the time that it intended to launch it in the first quarter of 2017.
Since that Preview launch last November, more than 50,000 organisations have started using Microsoft Teams, with big name such as Accenture, Deloitte, Expedia, Sage, and Three UK implementing the workplace chat tool.
“We’ve also introduced more than 100 new features to deliver ongoing innovation and address top customer requests,” Microsoft blogged, noting that Office 365 has more than 85 million active users worldwide.
“Office 365 is designed to meet the unique workstyle of every group with purpose-built, integrated applications: Outlook for enterprise-grade email; SharePoint for intelligent content management; Yammer for networking across the organisation; Skype for Business as the backbone for enterprise voice and video; and now, Microsoft Teams, the new chat-based workspace in Office 365,” wrote Redmond.
Among the new features that Microsoft has delivered since the Preview is audio calling from mobile devices, plus video on Android (which is coming shortly to iOS and Windows Phone).
Redmond also said that it had “addressed numerous customer requests, adding the ability to email a channel, including attachments, send messages with markdown-based formatting, and receive notifications about all posts in a channel.”
Conversations can also be moved from email into Microsoft Teams, along with rich formatting and attachments.
And Microsoft Teams is customisable depending upon the workspace requirements, and comes with rigorous security protocols support for including SOC 1, SOC 2, EU Model Clauses, ISO27001 and HIPAA.
There is also support for audit log search, eDiscovery and legal hold for channels, chats and files as well as mobile application management with Microsoft Intune.
“These security and compliance capabilities are critical for enterprise customers, but our responsibility at Microsoft goes beyond this,” wrote the software giant. “We’re working to ensure every team member can participate, with new accessibility features, including support for screen readers, high contrast and keyboard-only navigation. This will enable Microsoft Teams to be more inclusive and tap into the collective brainpower and potential of every person.”
Microsoft of course will be challenging an established player in the form of Canada-based Slack, which already has 4 million active users.
Another potential rival is Facebook At Work, which brings an enterprise version of the social network to the business world.
Facebook has been developing the work version of its social network for the past two years, with testing underway in 2015, with notable customers such as the Royal Bank of Scotland where it has been well-received.
Microsoft however will be hoping that the tighten integration of Microsoft Teams within the Office 365 ecosystem will help it overtake these rivals.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476211.69/warc/CC-MAIN-20240303075134-20240303105134-00231.warc.gz
|
CC-MAIN-2024-10
| 3,545
| 18
|
http://www.facebook.jobs/menlo-park-ca/software-engineer-build-release/E06A3B1312AC4C79BD5656E43A1206FE/job/?vs=28
|
code
|
Facebook Software Engineer, Build & Release in Menlo Park, California
As an experienced software engineer at Oculus, you’ll be architecting and building the core tech that powers Oculus Virtual Reality products the Rift, the Gear VR and Oculus next generation products. You’ll help deliver key products and systems that power Oculus’ computer vision work. The ideal candidate is an experienced software engineer with a passion for virtual reality.
Help deliver an exceptional virtual reality experience by developing and maintaining the build system and the release procedures for our computer vision software.
Support the integration of Oculus computer vision library with Oculus mobile and PC SDKs.
Maintain high coding standards and cross-functional interaction with other Oculus teams.
Bachelor’s degree in Computer Science.
5+ years of experience developing in C++/C.
2+ years of experience in managing build systems and release procedures for mid/large scale code base.
Experience with build environment tools, Cmake, Make and Visual Studio.
Experience in scripting in either Python, Bash, or Perl.
Experience with continuous integration methodologies and tools.
Experience working with Git and/or Mercurial source control.
Experience with Android NDK/SDK.
Equal Opportunity: As part of our dedication to the diversity of our workforce, Facebook is committed to Equal Employment Opportunity without regard for race, color, national origin, ethnicity, gender, protected veteran status, disability, sexual orientation, gender identity, or religion. We are also committed to providing reasonable accommodations for qualified individuals with disabilities and disabled veterans in our job application procedures. If you need assistance or an accommodation due to a disability, you may contact us at firstname.lastname@example.org or you may call us at 1+650-308-7837.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424549.12/warc/CC-MAIN-20170723102716-20170723122716-00412.warc.gz
|
CC-MAIN-2017-30
| 1,877
| 14
|
https://www.takethiscourse.net/machine-learning-with-tensorflow-on-google-cloud-platform-specialization/
|
code
|
- Google Cloud via Coursera
- 96 hours of effort required
- 76,863 already enrolled!
- ★★★★★ (7,952 Ratings)
This is a very interesting specialization that will help learners understand what Machine Learning is with Google Cloud. The specialization contains courses that will help you frame a business use case as a Machine Learning problem. You will get a chance to gain a broad perspective of Machine Learning wherever it can be used. Similarly, the courses in this specialization will help you recognize biases that Machine Learning can amplify. The skills that you will develop from this course are relevant to TensorFlow, Machine Learning, Feature Engineering, Cloud Computing, Application Programming Interfaces (API), inclusive ML, Python Programming, and more. Therefore this and much more can be learned from the courses available in this specialization.
5 Courses in this Specialization:
How Google does Machine Learning (★★★★★ 4.6 | 6,557 ratings | 1,035 reviews)
In this course, you will first learn what machine learning is. Then you will understand the kinds of problems it can solve. After that, the instructor will discuss the five phases of converting a candidate use case that can be driven by machine learning.
Launching into Machine Learning (★★★★★ 4.6 | 4,016ratings | 460 reviews)
This course starts fro, a history of machine learning. Then the instructor will talk about why neural networks in today’s world perform so well in a variety of data science problems. Similarly, you will also learn to set up a supervised learning problem and then find a suitable solution through gradient descent.
Introduction to TensorFlow (★★★★ 4.4 | 2,557 ratings | 314 reviews)
In the third course, the focus will be on using the flexibility and ease of use of TensorFlow 2.x. Along with that, you will also learn to use Keras for building, training, and deploying machine learning models. The instructor will make you learn the TensorFlow 2.x API hierarchy and the main components of TensorFlow through different hands-on exercises.
Feature Engineering (★★★★★ 4.5 | 1,629 ratings | 179 reviews)
Are you interested in finding out how to improve the accuracy of all your Machine Learning models? In this course, you will learn to find which data columns can make the most useful features. The instructor will discuss both good and bad features and then how you can transform them for optimal use in your models.
Art and Science of Machine Learning (★★★★★ 4.6 | 1,344 ratings |118 reviews)
This final course is delivered in the form of 6 modules that covers the essential skills of ML intuition. With that, you will also understand the skills of good judgment and experimentation to tune and optimize ML models.
In this course, we are going to take a look at the feedback which users have given about this specialization or the courses in it.
- I took the first course from the specialization and it helped me understand well how to do machine learning on scale. I was also able to know the common pitfalls people might fall into while doing ML. The course has provided me with great hands-on training on GCP (JT, ★★★★★).
- The first course turned out to be very informative as it had a lot to share about machine learning and AI usage in Google products. With that, the course also provided deep information about the GCP platform in a very intuitive way. I recommend this course to everyone interested (VD, ★★★★★).
- The second course turned out to be an amazing one as it is perfect for beginners like me. This course is a shot in the arm for me. The presentation was excellent, engaging, and very lively and helped me learn a lot about machine learning. Really hoping to see this instructor soon in another course (OD, ★★★★★).
- This second course was very engaging as it opens up so much inside the story of the ML processes. This course has increased my interest in this field greatly (PT, ★★★★★).
- I took the third course and would say it was a good experience learning from it. The introduction to TensorFlow 2.0 was very challenging and difficult but totally worth the effort. Nobody said the introduction would be easy so yes you need to put in some effort while learning from this course. Similarly, the instructor Evan Jones was at his best when he explained advanced topics in neural networks (AJ, ★★★★★).
- I feel like the third course was very valuable because it teaches learners how to create an automated service in the cloud using tons of data. The best part was when the instructor was explaining how to work with distributed systems in the production environment with minimal time (VC, ★★★★★).
- The fourth course was very great as it covers so much about data pre-processing. The instructor explained well about the tools available in Google Cloud to enable the grueling tasks. I just want to thank the instructor for the amazing lectures and training labs (GS, ★★★★★).
- I took the fourth course and it turned out to be an interesting one. I believe this is the only course in the specialization that teaches featuring engineering and focusing on production issues (OA, ★★★★★).
- The last course was a big success as it has so much information to offer. I really appreciate the effort the instructor has put in to break things down for us (MB, ★★★★★).
- The third course didn’t seem to be about TensorFlow rather it was more about Google Cloud. I couldn’t even learn to install and set up TensorFlow on infrastructure (NJ, ★☆☆☆☆).
- The lecture videos in the fourth course were good and even better than the last two courses in the specialization but the labs had missing instructions (SA, ★★☆☆☆).
- The final course was fine and the quality of the lesson material was also great but the quantity of the information was nowhere sufficient to get the hands-on experience (Dimitry B, ★★☆☆☆).
So these were the details and reviews about the courses available in this Machine Learning with TensorFlow on Google Cloud Platform Specialization. Now all you have to do is read the description and reviews of all five courses available in this specialization and then decide whether you need to enroll in the whole specialization or one or two courses and never stop learning.
- Google Training via Coursera
- 29 hours of effort required
- 81,717+ already enrolled!
- ★★★★★ (6,784 Ratings)
- Google Cloud via Coursera
- 40 hours of effort required
- 19,718+ already enrolled!
- ★★★★★ (4,067 Ratings)
There are no reviews yet. Be the first one to write one.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510085.26/warc/CC-MAIN-20230925183615-20230925213615-00503.warc.gz
|
CC-MAIN-2023-40
| 6,680
| 39
|
https://www.delenamalan.co.za/2016/how-i-learned-ruby-on-rails/
|
code
|
In my previous post I wrote about having to learn Ruby on Rails and how I wanted to go about it. Three weeks into my internship, here’s what I learned about learning Ruby on Rails.
Note: I had more than three years of university programming experience in various different languages, but no back-end web developing before trying to learn Ruby and this is what worked for me.
1. RubyKoans and Eloquent Ruby by Russ Olsen
I started out trying to read Learn Ruby the Hard Way, but it turned out not to be hard at all. I then dived right into the RubyKoans and looked up terminology in Eloquent Ruby and Google when I got stuck. I took notes about the things I learned to have a reference for myself.
We were advised to work through this course at Zappi. It turned out to be quite informative and good to get more practice. I skipped the projects and the revision exercises.
Getting into to Rails turned out to be much harder. As I have worked with both the MEAN and MeteorJS stacks before, I thought that learning Rails would be simple, but my head ached for a bit on Rails. I still don’t really know what the best way would be to go about to learn it.
We were once again advised at Zappi to work through this course. It gave a good overall understanding of important Rails principles and I have often returned to the cheat sheet provided in the course. I’ve started, but not yet completed the second Rails for Zombies course. I think that it would be a useful and more practical course than the first one.
I did the first few exercises of this course, but I didn’t have the patience to wait for the website to compile every exercise individually. It also gave some inexplicable (wrong) errors at times which could be fixed by starting the level over.
3. Start developing Rails application
As with learning Ruby, the fastest way to learn Rails turned out to be practicing and diving into a project.
4. Google, Google, Google
With the numerous different gems we used in our project and APIs that we had to use in our application at Zappi, Google and StackOverflow was our best friend.
5. Read Gems’ documentation and examples on Github
Sometimes an exception that I struggled with for hours turned out to be easily solvable if only I read the relevant documentation.
6. Crafting Rails 4 Applications by José Valim
I found this book to be a very good reference and good for getting a more in depth understanding of some Rails concepts.
Overall, I think that learning Ruby and especially Rails, requires a good balance between diving into development and reading and learning with courses and books. Sometimes you would save yourself a lot of trouble if only you had read up on the concepts, but other times you might forget most of what you’re reading in any case (at least I would!).
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203378.92/warc/CC-MAIN-20190324063449-20190324085449-00365.warc.gz
|
CC-MAIN-2019-13
| 2,792
| 17
|
http://www.oracle.com/technetwork/articles/bechara-reusable-service-087796.html
|
code
|
|Architect: Reusable Services
What is a Reusable Service?
by Gabriel Bechara
The use of standards is important for service reuse, but standards alone can't guarantee reuse.
Published March 2009
One way of defining a reusable service is by the principles to which it adheres. Chief among those are the SOA principles that are the foundation for all SOA architectures. While a variety of patterns and practices may be applied to the development and use of services, those foundational SOA principles are independent of the implementations, protocols, standards, and technologies that may be used within a service-oriented architecture. The use of standards is important for reuse (through interoperability), but those standards alone can't guarantee reuse.
Those fundamental SOA principles have been widely recognized and adopted, but it is good to go through them again (and again). The success of your SOA approach will depend on the strength of your adherence to those principles. Achieving and maintaining that adherence is much easier now thanks to the mature SOA infrastructures available in today's marketplace.
This article describes fundamental SOA principles using mature SOA infrastructures. These principles can be used as a starting point for your SOA discussions regardless of your organization's SOA maturity level.
SOA fundamental principles
Business purpose, identification, and business reusability within a governed environment
Service identification can be accomplished using a top-down, bottom-up, or meet-in-the-middle. While each approach has its advantages, the top-down approach is appropriate if you want to improve reuse and ROI in the medium/long term. The top-down approach is business driven and should be supported by a strong sponsor. A tactical approach, mixing top-down and bottom-up, may be used as a start. In all cases a service must be related to a business purpose/process, and should provide a measurable business value at some point.
Figure 1: The top-down approach
The design time contract (specifications) is completed after identifying the service. You will then need to define run-time contracts (QoS, SLA, availability, throughput), the interfaces (the WSDL for SOAP Web Service), the policies (security, usages), and the implementations (code).
A service must be also visible across the entire organization. It must be prescribed for use in specific projects in order to avoid redundancy and duplication. It should be associated with the business and governed throughout the entire lifecycle, from design time to runtime. Service reuse must be measured, and should always be related to the corresponding business value that was the original driver for the development of the service. Strive for reuse on an enterprise level. The logic behind the service should not be limited to the individual concerns of an activity within a single business process; it should address multiple activities within multiple enterprise-wide processes.
Loose coupling between service consumers and service providers is one of the most important principles. One strategy for loose coupling is to use the service interface (the WSDL for a SOAP Web Service) to limit this dependency, hiding the service implementation from the consumer. Loose coupling can be addressed by encapsulating the service functionalities in a manner that limits the impact of changes to the implementation on the service interface. However, at some point you will need to change the interface and manage versioning without impacting service consumers, in addition to managing multiple security constraints, multiple transports, and other considerations.
The mediation pattern, using an enterprise service bus (ESB), will help in achieving this. Mediation will take loose coupling to the highest level. It will establish independence between consumers and providers on all levels, including message formats, message types (including SOAP, REST, XML, binary) and transport protocols (including HTTP, HTTPS, JMS). Architecturally speaking this means the separation of concerns between consumers and providers on the transport, message type, and message format levels. This will promote reuse and broaden the scope of SOA so it can be extended from a single department to the enterprise and beyond. The same service can be reused with different security constraints and different formats. Exposing services to external partners is an additional way of promoting reuse. This exposure may consist of having different messages, different transports, or different security policies for the same business service.
Autonomy enables service reuse. The more services are independent from one another — having their own resources (database, legacies, etc.) — the more reuse and composition will be possible with those services. This autonomy will also facilitate service adaptation to changing constraints in terms of availability, QoS, SLA, scalability, and so on. This will also prepare the services to take advantage of what virtualization has to offer in terms of dynamic resource allocation. However, complete autonomy for each service may not make sense in some contexts. For instance, services that access legacies will share resources with existing legacy clients. Autonomy can be achieved, on the functional level, for all services belonging to the same functional building block. Those services can and should be completely autonomous relative to other services belonging to other functional building blocks. (See An Introduction to Enterprise Architecture for a definition of the functional building blocks.)
A reusable service should be stateless. It may have a context within its stateless execution, but it will not have an intermediary state waiting for an event or a call-back. The retention of state-related data must not extend beyond a request/response on a service. State management consumes a lot of resources, and this can affect the scalability and availability that are required for a reusable service.
In some cases you may need to deal with state information for conversational services, or for long running business processes. Long running processes will have a state and can be invoked as services, but they should be considered as special cases, and should be referred to as composite applications rather than reusable services. (I will expand on that point later.)
Long running processes should relate to business processes, and they need to quickly adapt to business changes. In order to promote agility, long running processes should not be reused within a composition of services. Rather, they can be invoked/activated using SOAP Web Services.
The same reasoning applies to presentation services. A presentation service should be stateless and autonomous. A portlet is autonomous and it can be composed and reused in multiple portals. However, a portal being used for the federation or mashup of presentation services may have dependencies that make it a poor candidate for consideration as a reusable service.
Finding the correct granularity has been a primary concern for architects since the beginning of distributed information systems. Within J2EE architectures and EJBs, DTO (Data Transfer Object) patterns where considered for populating multiple entities, with one call, as value objects. But we still needed the stubs on the client side to deal with un-marshalling the objects. With SOAP we have looser coupling, rendering reuse agnostic with regard to the technical stubs, but it is still necessary to find the correct granularity to promote reuse.
Composition is the process by which services are combined to produce composite applications or composite services. A composite application consists of the aggregation of services to produce an enterprise portal or enterprise process. A composite service consists of an aggregation of services that produces another reusable service. It's just like combining electronic components to create a computer motherboard, and then using that motherboard in a computer. Think of the motherboard as a reusable composite service that is a component of the computer, and of the computer as the composite application.
Service Component Architecture (SCA) offers a model for creating service components. A service component exposes services, references other services, and has properties common to all services in the component. SCA defines a service-based model for assembling services to compose other reusable composite services, and defines the wiring that connects the service components within a composite. The composite also exposes services, references other services, and has a set of properties. SCA also defines a way to deploy those assemblies on multiple runtimes within an SCA domain.
SCA composites may have components running in one or more Java VM instances on one or more machines. Composition may be accomplished using an enterprise service bus that exposes the composite as a service that will be used by enterprise business processes or composite portals.
Figure 2: SCA composites
Composability facilitates reuse by making it easier for architects to use existing services to fulfill new or augmented business requirements. SCA augments the capabilities that allow the reorganization of services into the new compositions required by new composite applications (enterprise processes and composite portals).
While service prescription is important as a means of mandating design time service reuse, runtime service discovery is equally important. An enterprise repository can play an essential role in prescriptive reuse, while a service registry with UDDI capabilities can substantially improve service discoverability during runtime.
Applying the Principles to a Data Access Service
I have chosen to present a CRUD (Create, Read, Update, Delete) data service to illustrate the application of the aforementioned principles. In order to avoid confusion, the identification of CRUD services should not be compared to the ordinary CRUD operations performed on simple entities. A CRUD service should be autonomous, stateless, and reusable. Particular attention should be paid to granularity. One implication is that the CRUD service should not participate in a global two-phase commit (2PC) transaction, as started by another service within a composition. The problem is that the use of 2PC transactions will diminish the service's autonomy and reusability. SOAP does not (yet) support distributed transactions (WS-Transaction is still a specification), and the potential complexity of distributed 2PC transactions requires that they be confined to a single service.
Figure 3: A CRUD service
The CRUD service is exposed through an ESB. The ESB offers the isolation necessary for the evolution of the CRUD service without impacting the consumers. In terms of SCA, the service exposed by the ESB is the reusable composite, and the boundary of the JTA transaction is confined within the CRUD service.
Figure 4: SCA Service Assembly Model of the CRUD Service
So even if an ESB (addressed natively or through an RMI transport) can expose RMI services that can participate in 2PC transactions, those same services might also be reused and exposed using SOAP over HTTP. The reusability of a service depends on its consumption capacity, its ability to be consumed by multiple consumers on multiple protocols.
The composite CRUD service should be governed centrally and prescribed for reuse, with centralized access to the contracts (design time, runtime, usages), and its reuse must be measurable. Measuring reuse is important. An understanding of which assets are being reused, which are not, and why, is essential in guiding the evolution of your SOA.
So what is a reusable Service? It is an autonomous, reusable, discoverable, stateless functionality that has the necessary granularity, and can be part of a composite application or a composite service. A reusable service should be identified with a business purpose, and that purpose should form the basis of the service's specifications (design-time contract). A service's constraints, including security, QoS, SLA, usage policies, may be defined by multiple run-time contracts, multiple interfaces (the WSDL for a SOAP Web Service), and multiple implementations (the code). A reusable service should be governed at the enterprise level throughout its entire lifecycle, from design-time through run-time. Its reuse should be promoted through a prescriptive process, and that reuse should be measured.
The ultimate success of your SOA depends on a variety of technical and organizational factors. The principles described in this article will help to insure the reusability and reuse of the services within that SOA. That reuse, in turn will help to insure the success of your SOA.
Gabriel Bechara is a principal business consultant with Oracle Corp. A 15-year veteran of the software industry, Gabriel has served as an architect and advisor on large projects, providing practical experience and feedback on concepts that can provide a foundation for building new information systems. His interests include methodologies for defining software and enterprise architectures, with a strong focus on business integration and SOA.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398448389.58/warc/CC-MAIN-20151124205408-00043-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 13,256
| 38
|