url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://forums.xbox-scene.com/index.php?/topic/279664-get-it-running-efficiently/page-25
code
Get It Running Efficiently! Posted 14 March 2008 - 01:28 AM Posted 14 March 2008 - 12:23 PM Posted 20 March 2009 - 01:37 PM If you poke through this thread and the rest of this forum looking for my posts you'll find my debunking of why various ideas are dumb, and an explanation of what would actually be required to make Windows run natively. It's a gargantuan amount of effort. Nobody with the required skills cares that much. Posted 20 March 2009 - 09:03 PM Posted 07 May 2009 - 07:25 PM Man that would be cool as hell. I'll fully support you on this, i know nothing about creating this but anything i can do to help i will. I would love to see something like this created. Posted 13 August 2009 - 05:41 AM Posted 22 August 2009 - 12:10 AM i know that might make you think of 'just another linux port', but wine is pretty good on different platforms at running windows based software. ultimately your going to have to enable the NIC. sounds cool tho. toss some screenshots sometime of your work. Posted 13 October 2009 - 02:01 PM "There's no source code for Windows. It has to not address some areas of the ram because this locks up the Xbox, and it has to not scan the pci bus otherwise, lockup. These are the major problems with Windows. Another thing are the drivers, there are none. The people who have Windows running use it through Bochs or Linux with VMWare. I'm not saying it can't be done, but it will be hard and without source code you will need a way to readdress the ramparts and stop the pci buxs scan. It's exactly the part where I am with my FreeDOS port. I'm just lacking the programming skills, but I'm learning right now at least FreeDOS is open source so I can rewrite it. A bios would be pretty complicated, but maybe load a program into memory that does this [forces the checks to pass] before the actual Windows bootloader kicks in. What I mean is some kind of a layer between hardware and Windows. I'm not experienced enough to write such code, but I think it should be possible." ~ Scan-C Exactly what memory region should we not access? Posted 19 February 2011 - 01:25 AM Posted 30 July 2011 - 11:10 AM Posted 17 August 2011 - 12:17 AM Edited by luther349, 17 August 2011 - 12:18 AM. Posted 25 October 2011 - 06:50 AM HELP HELP HELP!!!!!!!!!!!I'm sorry my Office 2007 can't open files and the office 2010 too,I don't know what happend to my computers,and all the datas in files can't open it, the information about coach handbags,quad,motorcyle,guitar,the price the quantity,all messed up. Put the pipe down 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982924605.44/warc/CC-MAIN-20160823200844-00295-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
2,608
24
https://www.cdrinfo.com/forum/tm.asp?m=145331
code
Ill start out by syaing im a compleet noob when it comes to technology and things... My problem is as follows. (Ive got Windows XP Home Edition on my PC in case that matters) I was frusterated with my Gigabeat because I couldn't figure out how to delete the songs (being the complete noob that i am) . I read a Yahoo! Answers post on how to delete songs via going into my computer while it's plugged in and deleting them from there. I plugged in, clicked music, and deleted all the folders with an artist's name (which was every file in the music folder). I unplugged, and the files were still there (It still said like 50 files under artist) So then I got really frusterated and I went back to my computer and i went into the Gigabeat, and just deleted a whole bunch of stuff. I unplugged, and it worked. All the songs were gone. To make sure it still worked, I plugged in the gigabeat and added one song to it via MediaMonkey. I unplugged and the song did not appear on the menu. When I plugged in the Gigabeat, my computer recognized that the one song that I added was on the Gigabeat, because my computer prompted me to select a program to play the files. I selected Real Player, and the file was fine. I'm pretty sure that I deleted something that I should not have deleted on the Gigabeat. The things I deleted are an XML file named Library, some DATA files, and a whole bunch of text files that just said things like "artist name" "song title" and things like that. If anyone has like all the folders and files that should be on a BLANK Gigabeat, and they could post them or something, that would be great. If you have any other solutions, they're welcomed as well. Also, it's a Gigabeat Model No. MEGF40
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00131.warc.gz
CC-MAIN-2024-10
1,711
6
https://practicaldev-herokuapp-com.global.ssl.fastly.net/arghyasahoo/pointers-4i2h
code
One of the fundamental concepts in computer programming is a variable. If you are studying computer science, or programming in general, chances are you know what a variable is. In simple terms, A variable is a container which holds a value A variable can hold values of certain datatypes, such as bool etc. Pointers are nothing but a special kind of variable. Instead of storing a value, it stores address of a variable. In case all of this jargon didn't make any sense, we will dig deeper into this. A computer primarily consists of two types of storage, Primary Memory and Secondary Memory, whenever we execute a program, all of the variables declared in it gets stored in the Primary Memory a.k.a the Main Memory a.k.a the RAM. Now the variables can be anywhere in the RAM, but how could we locate them? Lets say, you want to invite one of buddies to your house, but he has never visited your house before, then how would he find it? He will need an address. With an address he can locate your house exactly. But without one, he has to roam around the entire world until he finds your house. That doesn't sound like a fun task...does it? Similarly, every variable that is stored in the primary memory has a specific address assigned to it. Different variables can not reside in the same address. Just like, the address of your house and your friends house can not be same unless you both live in the same house. Now you need to send your address to your friend. How would you do that? Let's say, your send a text message to your friend containing your address. your friend receives it, and comes to your place by locating the address and making his way to it. Let's retrace his steps, first he receives the text message, which reveals your address, then he locates the specific address to find your house. This is an example of a pointer. Just like the text message contained the address of your house, a pointer contains the address of a variable. It does not contain the actual value of the variable, rather an address where to find it. Imagine if your text message contained your entire house in it. As the text message contained a reference to your actual house, a pointer contains a reference to an actual variable. Dereferencing the pointer reveals the value of the variable it is referencing. - In C Language, a pointer is declared as - The datatype of a pointer is same as the datatype of the variable it is storing. If a pointer referencing a variable which is storing integer value, the pointer will be an integer pointer, if the variable is storing a character, the pointer will be called a character pointer. int a = 5; int *ip = &a; // '&' is called the "address of" operator, and the '*' is known as "dereference" operator Here, the address of a is fetched and stored inside ip char c = 'c'; char *cp = &c; Let's dig deeper into the code. For the first example, let the assume that a is stored in memory location a has a value of ip contains the address of a. So, technically the value of ip will be 100. Dereferencing ip will result in the value of a which is Pointers can also hold address of another pointer. They are called double pointers int a = 5; int *ip = &a; // ip holds the address of a int **pp = &p; // pp holds the address of p, which holds the address of a In the above example, dereferencing ip once gives the value of a. As it directly points to a, but in case of pp to get the value of a you need to dereference twice. As, pp is holding the address of ip is holding the address of This way, pointers can be chained together. Whenever you execute a program, all the variables declared in it is stored in that programs stack frame which resides in RAM. Now, during the calculations, CPU fetches variables from the RAM into its internal registers. This memory access is not the fastest thing in the world. This process takes up quite a few nanoseconds. So, in case of directly accessing a variable, CPU needs to fetch the variable only once from the memory and it gets its value. But in case of pointers, multiple trips are required to the RAM from CPU to get a value. In case of single pointers, first the address of the variable is fetched and then again, the value variable is fetched from that specific memory address. In case of double pointers, it makes three trips to the RAM before it gets the value of the variable. So, longer the chain, the more time it will take to fetch the variable. Let's take the previous scenario. Instead of providing direct address to your house, you text your friend the address of your local grocery store, there a man hands him the address to your nearest rail station, there someone gives him the address to your house, This will surely take longer time, instead if he was given direct address to your house. That's all folks, hope this article gives you "yet another" viewpoint towards pointers. Pointers are often misunderstood by a lot of newbie programmers. When broken down to its basics, they are really simple and easy to grasp.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499524.28/warc/CC-MAIN-20230128054815-20230128084815-00383.warc.gz
CC-MAIN-2023-06
5,006
35
https://mensetu.info/forum.php?mod=viewthread&tid=2975
code
Gz tarzxvf bitcoin 0. Our first recommendation was to use a full node wallet like Bitcoin Core Bitcoin Knots. Net Stable Channel of bitcoin qt bitcoind for Ubuntu, their dependencies Note that you should prefer to use the official binaries, where possible to limit trust in Launchpad the PPA owner. Next, update Ubuntu s software package lists: sudo apt get update. Can we use the official bitcoin core wallet clientbitcoin qt) to connect to the blockchain generated from MC. This package provides Bitcoin Qt, a GUI for Bitcoin based on Qt. Diferenciar Bitcoin Core Cliente Satoshi Bitcoin Qt y Bitcoind. How to store your bitcoins. Counterparty To run with the standard GUI interface to run the daemon, start Bitcoin Core bitcoin qt on Linux execute bitcoind. Install some dependencies: For bitcoin core sudo apt get install build essential autoconf libssl dev libboost dev libboost chrono dev libboost filesystem dev libboost program options dev libboost system dev libboost test dev libboost thread dev. Why was the Bitcoin software previously called Bitcoin Qt. 2 bin bitcoind cp bitcoin 0. Can it run bitcoin qt. 99 Bitcoins Open source full Bitcoin client software that utilizes the Qt UI framework for a graphical user interface. It is the reference implementation for bitcoin nodes, which form the bitcoinFeaturesDevelopmentVersion historyBitcoin Improvement. Install Bitcoin CoreWallet) on Linux Knowledgebase IPXcore This article explains how to install Bitcoin Core to use your VPS as a Bitcoin wallet. Throughout this tutorial how to use cold storage for storing your bitcoins securely. Es decir, las personas que. Com service that help to download Bitcoin blockchain fast via torrent. Bitcoin Cold Storage Using a Bitcoin Core Wallet. Bitseed is intended for use as aheadless” device that runs automatically with a display. Any Related Addresses: N A. Bitcoin is a crypto currency. Bitcoin Core Bitcoin Wiki. 04 how do I completely remove uninstall bitcoin qt, the bitcoin wallet all the blocks that are slowly consuming my entire disk drive. Bitcoin Core Bitcoin. If you want the graphical. AURen) bitcoin core git. This wallet is the original wallet, created by the bitcoin core developers. Net Stable Channel of bitcoin qt bitcoind for Ubuntu, their dependencies Note that you should prefer to use the official binaries, where possible to limit trust in Launchpad the PPA owner. Next, update Ubuntu s software package lists: sudo apt get update. Can we use the official bitcoin core wallet clientbitcoin qt) to connect to the blockchain generated from MC. This package provides Bitcoin Qt, a GUI for Bitcoin based on Qt. Diferenciar Bitcoin Core Cliente Satoshi Bitcoin Qt y Bitcoind. How to store your bitcoins. Counterparty To run with the standard GUI interface to run the daemon, start Bitcoin Core bitcoin qt on Linux execute bitcoind. Install some dependencies: For bitcoin core sudo apt get install build essential autoconf libssl dev libboost dev libboost chrono dev libboost filesystem dev libboost program options dev libboost system dev libboost test dev libboost thread dev. So if you are completely new to crypto currencies do not have a few thousand dollars lying around that you can throw into BitcoinBTC there is a way to get into altcoinscoins other than Bitcoin) for very low cost: mining. The latest stable version of Bitcoin Core is now. How to run bitcoin corebitcoin qt) and litecoin qt. With a future roadmap of massive scaling Bitcoin ABC allows an immediate block size increase with a simple, sensible adjustable blocksize cap. Debian- Details of package bitcoin qt in sid Debian- Packages Bitcoin uses peer to peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by the network. Bitcoin core qt. Description: Bitcoin Core headless P2P node. Install brew cask Get node. Bitconnect bitcoin QT wallet The bitcoin QT wallet bitcoin core is the reference client. We will start by downloading finally, installing the bitcoin core qt desktop wallet for Windows; transferring your coins to your desktop s wallet addresses importing. We made a new snapshot of the Bitcoin Chain on the November 2nd. Operating System: ROKOS V7 System Hardware Specs: Raspberry PI 3. Dat file without. SelectFile" in the main menu clickSign message. Submitter: atweiden. Toimenpiteessä kuluu erittäin. Mam parę pytać dotyczących pulpitowego klienta bitcoin qt. Bitcoin cli calls only JSON RPC functions and does not perform any actions on its own on the blockchain. Ubuntu] How to remove bitcoin qt. These wallets store your private keys in a dedicated folder on your computer. Zipwhich was the latest version available when this tutorial was originally written) to a Windows 10 64 bit computer that did not have a Bitcoin Core wallet installed. When you get down to Bitcoin terminology, things can be very confusing. The advantage of bitcoin is that you sudo apt get install bitcoin qt”. Now you can install Berkeley DB version 4. Кошелек BitcoinBitcoin QT, Bitcoin Core) Страница 46. Bitcoin Qt core installation version 0. Fire up a terminal window CTRL ALT T run the following 3 commands to add the PPA, update local package index install Bitcoin Core wallet. It is the core of the Bitcoin system and anybody can download it for free to their desktops. Zacznę od zaszyfrowania portfela, co to znaczy. SegWit s Slow Rollout: Why Bitcoin s Capacity Hasn t Seen a Sudden. Next unzip the download, navigate to the bin folder double click bitcoin qt. Available software. Please understand however so I will not be able to give youthe definitive bitcoin windows guide. The original release used the wxWidgets C + libraries to build the user interface.HD wallet support is finally coming to Bitcoin Core Bitcoin News. Bitcoin core is available for windows as well. I m removing Bitcoin qt from my computer since my current setup doesn t require it anymore. We are writing the software that miners and users say they want. A simple web GUI is provided to allow the device to be monitored from an local PC or tablet. Installing Berkeley DB 4. Bitcoin qt is the bitcoin core client GUI. This is a bit advanced but if you follow the directions carefully, anyone can do this: Principles: You ve sent funds to a Bitcoin Core. Installing Bitcoin Core on Ubuntu Bitzuma. Bitcoin core qt. Download and install the Bitcoin Core clientpreviously named Bitcoin Qt. Ghans quote] Quite agree but the page he is following is for X86 BitCoin litecoin qt) My onlyPC" is an Asus ChromeBit running ChromeOS cloudcentric at its best. Bitcoin core qt how to move blockchain to new HDD. SOLVED] Bitcoin qt Randomly Crashing Okcash Forum Bitcoin Client Software and Version Number: Bitcoin Core QT 0. It has been bundled with bitcoind since version 0. Linux Hint In this article what a Bitcoin wallet is, how to install Bitcoin core on Ubuntu how to use it. Satoshi Nakamoto originally coded a graphical wallet application for Bitcoin using the wxWidgets. X version based on how Bitcoin Core organizes Litecoin features faster transaction confirmation times and Source. These 5 million addresses are able to claim BTX Bitcore for free. A Bitcoin Core kezdeti szinkronizációja hosszú időt vehet igénybe. Bitcoin core qt. You need a faster computer because as you download the blockchain Bitcoin core stopped sync The biggest pain point of using Bitcoin QtBitcoin Core) prior to v 0. 21 Q UNUSED eventType. You can but don t have to start the application.Bitcoin Reddit like title. EnterY” when asked asked for permission to continue: sudo apt get install bitcoin qt. Command sudo add apt repository ppa bitcoin bitcoin. For this reason, it is also known as the Satoshi client. Clients: net p2p bitcoin qt: Bitcoin client using the Qt toolkit. Bitcoin Coreformerly Bitcoin Qt) is the third Bitcoin client, developed by Wladimir J. Bitcoin core qt. I originally downloaded the entire blockchain, it fully syncs within a few minutes of starting up. Bitcoin core qt. Bitcoin core qt. Hello Can someone explain how the Bitcoin Core QT works why there are so many different wallets are. In The reference Bitcoin software. I want to remove the program, but also all the blockchain data that is taking up space on my hard drive. We will make sure it solves their needs help them deploy it gracefully upgrade the bitcoin network s. It was created by Satoshi Nakamoto. Bitcoin Core WeUseCoins. Otherwise return false. Bitcoin Classic Bitcoin Classic stands for the original Bitcoin as Satoshi described it A Peer to Peer Electronic Cash System. You can also call it a virtual currency as well. Boot into your Tails USB disk. Downloading and Compiling Bitcoin Core. Linux how to install bitcoin qt wallet on debian 7 Super User. Bitcoin core qt. Tutorial sobre cómo instalarlo, usarlo y recuperarlo El monedero Bitcoin Core o Bitcoin qtcomo se llamaba en sus primeras versiones) es el Wallet creado inicialmente por Satoshi Nakamoto. Tutorial How To Store Your Bitcoins Securely Using Cold Storage. This wallet is designed for use on desktop laptop computers stores the private keys in a file on your machine. Home Bitcoin ABC is a full node implementation of the Bitcoin Cash protocol. Начинаются они все наL" Скачал, синхронизировал core. Rozumiem że normalny nieszyfrowany plik wallet. Temporarily disconnect the computer s ethernet connection disable the Wifi connection. Bitcoin Core Linux. 5 Steps to Install Bitcoin Qt Faster Bitcoin en. BitCore BTX Claiming Service Airdrop for Bitcoin holders. Open a terminal and cd to the Bitcoin Core binaries directory: cd Persistent bitcoin x. Bitcoin Classic Bitcoin Classic stands for the original Bitcoin as Satoshi described it A Peer to Peer Electronic Cash System. You can also call it a virtual currency as well. Boot into your Tails USB disk. Downloading and Compiling Bitcoin Core. Linux how to install bitcoin qt wallet on debian 7 Super User. Bitcoin Blockchain Initial Sync Time Dramatically Reduced By. Org Legyen türelemmel. A fork of Bitcoin Core, Bitcoin ABC aims to build on this base with improved code quality. Sh sudo apt get install libevent dev wget4 org bin bitcoin core 0. A full list of options can be obtained like this: Bitcoin Core: go to Help Command line options or execute bitcoin qthelp bitcoind: run bitcoind help bitcoind. Package Base: bitcoin core git. Claiming of the first snapshotbitcoin block463604) has ended October 30th. GetBitcoinBlockchain. Rockchip Quad Core. Amennyiben tudja hogy hogyan lehet torrentfájlt letölteni, felgyorsíthatja a folyamatot a szoftver elindítása előtt . Bitcoin qt Si quiero Fotografía Bitcoin qt. Hi all, I am new to blockchain. Mining is the process of assisting in unencrypting the blockchain of a particular altcoin,. Bitcoin qt corepytanie) Polskie Forum Bitcoin Siema.Bitcoin qt provides a graphical interface, while bitcoind is. Bitcoin Core formerly called Bitcoin QT is going to be implementing Hierarchical DeterministicHD) wallet architecture. I have setup own bitcoin network using regtest mode. Bitcoin core qt. Description of Problem: Bitcoin qt will continuously crash at random times and the error log doesn t seem to say why. Bitcoin Core formerly Bitcoin Qt is a Bitcoin codebase based on the original code and framework published by Satoshi Nakamoto. Exporting a private key from Bitcoin Qt Bitcoin Core and importing to. This last command may take some time during which both Bitcoin Core all of its dependencies will be installed. Bitcoin Stable ChannelBitcoin” team Launchpad. Bitcoin core sync faster 0 Speeds Up Blockchain Syncing By 48. The wallet is a full node wallet as it requires a full. Co dokładnie się szyfruje. FAQ Bitseed Bitseed Core uses the Bitcoin Core implementation maintained by the Bitcoin Core development team. 2 arm linux gnueabihf. Bitcoin Core: src qt winshutdownmonitor. Bitcoinの公式クライアントです 利用するには インストール後 数時間 1日以上かけてすべてのブロックチェーン 取引履歴 をダウンロードする必要がある上 セキュリティ面のオプションが少ないため 海外での人気はあまり高くありません。 なお 海外で人気のあるセキュリティ面で改善されたArmoryというクライアント. To export a private key from your Bitcoin Qt Bitcoin Core client: Launch your Bitcoin client; Click onhelp' in the menu bartop right ; Click ondebug window ; Select theconsole' tab; If your wallet is protected by a passphrasei. Core released segwit without bitcoin qt support they should have included a gui to help adoption. There are also core coders who say you should not use segwit, because that would make it harder to run bitcoind on a raspberry pi. Initially the software was published by Satoshi Nakamoto under the name Bitcoin later renamed to Bitcoin Core to distinguish it from the network. Bitcoin core qt. With this container and its. Run Bitcoin Core in an Offline Tails Session. Dat może być użyty przez osoby trzecie, natomiast zaszyfrowany wymaga podania hasła po np. Bitcoin Gentoo Wiki. Bitcoin Core is currently run by more than 70% of Bitcoin nodes and all miners. Bitcoin Core wallet. Győződjön meg róla, hogy elegendő sávszélessége és tárhelye van a teljes blokklánc méretheztöbb mint 65 GB. Bitcoin Qt has been rebranded to Bitcoin Core since version 0. Coinbase vs Bitcoin Core vs Bitcoin Wallet Review What Is The. Today it is bundled with the Bitcoin Core client is collectively maintained. Bitcoin core qt. 0 YouTube Hello everyone just a quick video about the details around the newest bitcoin core QT wallet version why. In order to speed up the synchronization of the blockchain a file named bootstrap.Bitcoin Core Wikipedia Bitcoin Core is the reference client of bitcoin. This tackles the problem of bitcoin abc thus requiring ugly manual hacks to have them both installed , bitcoin core both providing a bitcoin qt binary running on the same machine. A Beginner s Guide to Claiming YourBitcoin Cash and Selling It). Configure the system for compilation; Compile. Then you saycore coders cannot be blamed.Conflicts: bitcoin cli bitcoin daemon, bitcoin qt, bitcoin core bitcoin tx. 1 has been released with a fix for a minor bug causing crashes when upgrading to 0. You can make a backup of this folder using the menu in your wallet select Backup wallet. How To Install Bitcoin Core on Ubuntu.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656665.34/warc/CC-MAIN-20190116031807-20190116053807-00591.warc.gz
CC-MAIN-2019-04
14,536
47
https://www.tr.freelancer.com/projects/php-anything-goes/whmcs-login-changes/
code
I have installed WHMCS on to my server and I am having trouble changing the login features to suit my website. I need to be able to login, stay logged in and be able to log out from any page on my website, not just WHMCS area. This will need a session to be started. Also when I am in the WHMCS area I would like to detect the language, so if I am in the Spanish area I will show a certain header and footer, else the normal English header and footer will be shown. If you know PHP and WHMCS then this is very easy.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592001.81/warc/CC-MAIN-20180720232914-20180721012914-00249.warc.gz
CC-MAIN-2018-30
515
4
https://legacy.forums.gravityhelp.com/topic/amazing-plugin-even-better-support
code
I've only been using the Gravity Forms plugin for a few days but already couldn't live without it - a custom solution to achieve the same functionality would have taken days / weeks to produce! I've tried other contact form plugins before, but none with this level of usability and some of the fastest support I've ever received! The minor issues I've had have all been resolved, and the 1 major issue I had has a temporary solution in place with a full solution coming later this week in version 1.1 Thanks for all your support to get my forms sorted out, well worth paying for. Examples of Gravity Forms in use:
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103917192.48/warc/CC-MAIN-20220701004112-20220701034112-00015.warc.gz
CC-MAIN-2022-27
613
5
http://www.getsymphony.com/discuss/thread/73527/3/
code
4 users online. Create an account or sign in to join them.Users This is an open discussion with 59 replies, filed under Extensions. Have a look at Force Download. I'm using it when I need to output PDFs. Can someone post the sample code of page? I don't know what I am doing wrong, but all my styles are ignored in output pfd file. Is it possible to change the page orientation? I modified the extension to use the dompdf library, which worked ok for simple layouts. But like (I guess) most of the libraries that implement their own layout and rendering engine you quickly get problems with more complex layouts, e.g. with floats and absolutely positioned elements. This weekend I played with the wkhtmltopdf library, which uses the webkit rendering engine. The downside is that you need to be able to install it on the server (it can be installed on Linux, Mac and Windows machines), but it produces superior results. I'm happy to release my modifications to the public after the current project that'll use it. Yes, Jonas. Please do! Echoing bauhouse, please release once your done! I'm in two minds with extension as URL to PDF, or just PDF generation in general, is a powerful feature, but the library that's required to make it all happen is very verbose and as Jonas mentioned, often produces unreliable results as the CSS gets more complex. Where Symphony is so lean, TCPDF is definitely not. Does anyone have a version of this extension working adequately in 2.3? If not, can anyone recommend a direction for me to go in trying to convert a Symphony html page to a PDF? Like David, I am looking for a glimmer of hope to getting this extension running in 2.3 at an adequate level of performance. Anybody? :) What error do you get in 2.3 with this extension? I haven't tried it myself but perhaps it's something simple that can be fixed quickly. Like Jonas, I've played with wkhtmltopdf, which delivers OK results (it is buggy, and development seems to be very slow). The good news, though, is that I've managed to get this running in the cloud. I am currently working on an extension that will allow all symphony users to use wkhtmltopdf in their websites, much like JIT. Currently I am thinking of doing this: request the url with the page you want pdf'ed in the parameters, along with a pair of amazon S3 keys, and the server will immediately respond with a piece of XML telling you what the pdf will be named when it is converted and uploaded to S3. You can then use this filename in your links and enjoy pretty pdf's without installing anything! I am definitely interested! Great! I am currently about 90% there, I'll let you take a peek when it's done! @bauhause: I've been able to generate PDF's and put them in my S3 account, all in the blink of an eye:) If you want to give it a try, this is the URL schema you can use: http://wkhtmltopdf.rs.af.cm/?key=KEY&secret=SECRET&name=this%20is%20awesome&url=http://getsymphony.com&bucket=BUCKET And the output should be something like this edit: currently all files are kept, so there is quite a big risk of flooding your S3 bucket with duplicates. I do like to have unique names, just to be able to use a CDN to distribute them - and to be sure it's always the latest file I am serving. How to move from here I do not know: maybe I should work in folders (name/identifier.pdf) where the folder is purged before a new version is uploaded. Or maybe it should be done with a redirect instead. Not sure... edit2 oh, and before you ask: no, I am not actively storing your amazon account details. For now there is no safe way to access this service; because the details are in the GET request, they will be transmitted over the open internet, and stored in the access logs. Please make a new pair, and discard them after testing. Thank you. @creativedutchmen: You should really use SSL. Transferring the SECRET over an unencrypted connection actually burns it. [EDIT]: Of course the credentials would still be in your logs. But they wouldn't be transferred unencrypted on the interwebs. (To anybody who is interested: If you use SSL, the "request" part of the URL — i.e. everything after the domain part — will be transferred after the encrypted connection has been established.) @michael-e: I know. The problem is that I am hosting this (for free) on appFog, and to be able to use SSL requires a paid plan. I plan on making a datasource type for this (using the providers) which will use a public/private key pair to encrypt the data before it is sent - working around the SSL limitation. However, since that will be a bit of work, I'd like to know who would be interested before I do so:) An update from my side: I think I got a pretty good solution in my head right now. Because the pdf generation is quite a time consuming task, and the S3 api isn't the fastest I've seen, I am pretty confident the pdf generation needs to happen in the background, and as infrequent as possible. One idea I had was basically to cache the response for a long period of time, but that would render stale pdf's when your content changes frequently. So, I am pretty sure a "push" model is more appropriate than a "pull" model. Because I want to keep this extension simple, I think the best way to go around this is by splitting the extension up into two parts: a background process which will send the requests to the wkhtmltopdf service, and a listener, which will add processing jobs to the background queue when their pdf need to be updated. Right now, it makes most sense to me to let the listener add a job when an entry is created or edited (from either the frontend or backend). To let the service know what URL it should fetch, I am thinking of using the entry_url field, which is made for exactly this. Now, because there will be use-cases for which this is not sufficient (editing an author, for example, should also regenerate all articles written by this author), I shall expose the functions to add jobs to the queue in a very simple API. If you want php background processes, there's an app for that :) Does that work with cheap shared hosting? You already know the answer don't you? Well, you probably could implement different drivers. Yep, I'd much prefer to use something rock solid but the whole point of this extension is that it can run on shared and small hosting packages, where you do not have access to the wkhtmltopdf application... But, fortunately I have some experience with this with the ENM, which uses a background process that works even on the cheapest hosting provider here in the NL, so I can just borrow code from there. Create an account or sign in to comment. Contact the team Symphony • Open Source XSLT CMS
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704986352/warc/CC-MAIN-20130516114946-00004-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
6,689
38
https://languor.us/positive-effects-firefox-spell-checker
code
Anyone else notice that people are typo-ing lesser and lesser nowadays? Considering that most people whose blogs and e-mails I read generally tend to have a geeky bent, I don't think it would be terribly far fetched to attribute this to the Firefox's inbuilt spell checker. Case in point, I can actually understand my niece's e-mails nowadays. She's a web mail user and a Firefox convert (thanks to me). While a few months back, I was barely able to understand all the fracking SMS-speak in her correspondence, now I no longer mentally wince while reading her e-mails. When questioned about the gigantic improvements in her diction, I was told that it was because of all the squiggly lines that Firefox adds during its spell-checks :P Such a simple solution. Such a widespread effect.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817158.8/warc/CC-MAIN-20240417142102-20240417172102-00338.warc.gz
CC-MAIN-2024-18
784
2
https://community.oracle.com/message/1641127
code
This content has been marked as final. Show 385 replies Sorry, too late today. Nearly right. It's rather the case that when x is null we have x - x null - null Hence it is not the case that x-x=0 if x may be null. Similarly, the law of the excluded middleIt's true, it doesn't contribute anything to this discussion, just like the Gauss law of normal distribution doesn't contribute anything to this discussion, but it is perfectly valid. That's all. I did't bring that law in this discussion. Andrew Max did. I've just said - yes, that's it, and shown that it's perfectly valid law in our 3VL world staying at the logical level of releational theory where NULL means that a value is missing, not that "proposition can be neither true nor false" (fuzzy-logic). does not hold for values that may be null -- apart from the operators IS NULL and IS NOT NULL. From this we conclude that the law of the excluded middle doesn't contribute anything meaningful to a discussion of the implementation details of NULL in one RDBMS or another. We didn't talk here about 3VL in the context of fuzzy-logic: "a proposition is neither true nor false at the same time, but may have a degree of truth between 0 and 1 (eg 0.1, 0.6 etc), so truth values are possible: 1) true, 2) false, 3) undecided degree of truth". UNKNOWN in relational theory doesn't refer to "UNDECIDED DEGREE OF TRUTH". It just means "the proposition is exactly true or false and nothing else, but we don't know the right value since information is missing" Here is a "practical example" as illustration of what you did: SQL> CREATE TABLE fuzzy (Believe me, there are many "fools" on the earth, who would argue that (X - X), when X is defined as NUMBER, must always be equal to 0 (zero), regardless of whether X is NULL (UNKNOWN) or NOT NULL (KNOWN). 2 X NUMBER NULL SQL> INSERT INTO fuzzy (X) VALUES (NULL); 1 row created. SQL> SET NULL NULL SQL> SELECT X FROM fuzzy; SQL> SELECT (X - X) FROM fuzzy; I think Albert doesn't understand the state of his own mind let alone the state of data.You said: What is domain of attribute (column) "AGE" in an employees table? I'd say 18-65 ages. If a scalar is UNKNOWN, is it "totally unknown" or just "partially unknown"? I'd say partially, since we exactly know that 250 years old man cannot be an employee in our company. The problem with your explanation here is that you are mixing database level concepts and business level concepts. Just because you create a column on your database that is called age, this will simply be a numeric datatype. The database has no concept of what "age" is and doesn't know that 250 would be an unreasonable value. The domain of reasonable values is something that is determined by business logic that is applied at a level above the database level. As far as the database is concerned if a value isn't entered for the age then it is just "unknown", not "partially unknown" or "totally unknown", just plain old "unknown". You obviously have some understanding of programming concepts but obviously a total lack of understanding or confusion when it comes to systems design concepts. I'd really be happy to convince you that I DON'T THINK that you don't understand the state of YOUR mind. I really DON'T THINK that. I KNOW that. And I'm going to explain this to you. Just consider an example from yesterday, not yours, but very illustrative to show that the overall confusion on this thread is constantly being made by people who don't understand what they are talking about . I'd say that (x - x) is always zero regardless of whether x is KNOWN or UNKNOWNSuppose x is ∞, Would you say infinity(∞) - ∞ is zero? Saying "x is infinity" is wrong. We can say then LIMIT (x - x) = 0 x -> ∞ Well, you can argue with this guy. I've just done it. Guy is OK. Here is his conclusion: "Woops! It is impossible for infinity subtracted from infinity to be equal to one and zero. Using this type of math, we can get infinity minus infinity to equal any real number. Therefore, infinity subtracted from infinity is undefined." Hence we should write the equation as I've already shown: LIMIT (x - x) = 0 As you see, the person, who knows NOTHING about Infinitesimal and Integral theory and calculus was trying to force discussion about it, and, of course, fell short of it - own pitfall (trap). The only result: the thread was expanded with 2 additional petties and nonsenses. Total confusion. So, please, don't do the same. I was not talking about database level concepts and business level concepts. And therefore I couldn't mixed them. I know that a database (software) cannot guess our thoughts. What I was talking about has nothing to do with it. So, please! Since the thread is no more interesting for anyone, allow me to "officially" close it by putting it in its "final version". As the "initial poster" and the "main maintainer" of the thread, I'm feeling an obligation to make a short resume and put some final words on it. First of all, I want to thank all of you who took part in the thread, either as passive watchers in background, or as active discussants and contributors. There were many nice points and many nice thoughts. My "special thanks" go to those who were constantly obstructing any decent discussion by posting only petties and nonsenses. Whenever they said the truth, it was something trivial; whenever they said something that was not trival, it was wrong - thus helping me to show the overall confusion dominating in this Forum in regards of the point we discussed. In this sense, although I totally failed regarding my initial intention, the thread itself can be considered as a great success for all of us. I was not here to blame Oracle. I knew Oracle was great and the most robust and sophisticated database in the world, capable of dealing with and solving the most complex business problems. Oracle has plenty of features all other databases on the market are still lacking and has the most robust, complex and systematic SQL implementation. Just because I knew that, the problem we discussed was awful for me. Important for you or not, it remains literally a stone in my shoe. All I wanted from you was to encourage most of you to post a collective request or so to Oracle to fix it, at least by implementing an option to bypass such a behaviour in the upcoming 11g version, now in beta. Obviously, I failed. The best and the most intelligent what happened on this thread was the point when Tony Andrews, in reply to someone's post, "I agree that Oracle does what it does and that we have to (and can) live with that, and indeed that it isn't a big deal to do so - maybe it even has some advantages. But you are wrong to suggest that '' and NULL really are the same thing conceptually. I'm confident that C J Date and J Celko would for once unite in their agreement on that point." I agreed with Tony and admitted it by responding him - "Well spoken". We should have stopped at this point and I would have been grateful to you saying goodbye. Instead of doing that, you were continuing along the road drilling my brain over and over again, trying even to rebut the Aristotle's law of the excluded middle. It was not permitted. I learned many things from you and realised many crucial points. This thread definitively convinced me of what I thought and believed all my life. The substantial difference between intelligent and non-intelligent people is, of course, in levels of their intelligence quotients (IQs). However, the perilous difference between them, with fatal consequences, is in the fact that Mr/Mrs "IQ" DOES KNOW he/she is the "IQ", whereas Mr/Mrs "non-IQ" DOES NOT KNOW he/she is the "non-IQ". It's by definition. I don't want to suggest anything here. In any case it should be clear that the second part of the second proposition does not point to people like Tony Andrews, Alessandro Rossi, Kamal Kishore, Scott.Swank, David Tyler and others reasoning alike. The democracy is probably the best thing ever happened in the history. Unfortunately, it has one big and fatal "design flaw": a vote of fool and a vote of smart one are equally worth and being counted. Once again, thanks a lot. I wish you all the best and lots of luck. >The substantial difference between intelligent and non-intelligent people is, of course, in levels of their intelligence quotients (IQs). However, the perilous difference between them, with fatal consequences, is in the fact that Mr/Mrs "IQ" DOES KNOW he/she is the "IQ", whereas Mr/Mrs "non-IQ" DOES NOT KNOW he/she is the "non-IQ". It's by definition. I don't want to suggest anything here. You do not want to suggest anything..!? But yet you make a statement like that, that do most definitely imply that you are suggesting something. Permit me to respond in kind. Stating something, without suggesting anything. Some people are born assholes. Then they grow bigger. Ohhhhh, my favourite bit has to be this: My "special thanks" go to those who were constantly obstructing anyThat's like saying "I'm going to take my subjective view (or should that be judgement) of people and state it as fact. Because I'm right!" decent discussion by posting only petties and nonsenses. Whenever they said the truth, it was something trivial; whenever they said something that was not trival, it was wrong Wouldn't your time be better spent finding a databaseThe issue is not about being capable of understanding something. There is null to understand. It is about believing weather something is implemented the best way. You seem to like throwing that one at people. you are capable of understanding and learning to use without whining and leave Oracle alone? I've whined earlier about having to write a trigger everytime I need a surrogate key because Oracle does not support the identity column. That does not mean I don't understand triggers. I've just said - yes, that's it, and shown thatYou didn't show anything. You just randomly claimed it. There is a difference. it's perfectly valid law in our 3VL world Then you selected to completely ignore a disproof by example of your claim. We didn't talk here about 3VL in the context of3VL has nothing to do with fuzzy logic. fuzzy-logic: "a proposition is neither true nor false at the same time, but may have a degree of truth between 0 and 1 (eg 0.1, 0.6 etc), so truth values are possible: 1) true, 2) false, 3) undecided degree It's not an "undecided degree of truth", you're missing the point. It is an unknown outcome. It represents the evaluation of a predicate to the value UNKNOWN, and doesn't represent a value in the predicate. You've managed to make yourself look like a fool. Now you are keeping to talk in order to dillute the fact. Actually it was me that said that but our "friend" is not very good at quoting things so it's obvious someone else said it. is determined by business logic that is applied at a The domain of reasonable values is something that level above the database level. Aside from which, this is completely incorrect. The correct place to restrict the domain of a type is in The point is that you may perform your restriction of the domain on the database itself, but it is Business logic and not something directly relating to data types on the database. Therefore, good design should ensure that database design and business logic are clearly distinct. Otherwise you'd spend all your time creating a whole set of datatypes to create your tables with and you'd see something like: Which would just be unrealistic to implement. CREATE TABLE mytable (person_id sequence, name name_domain, age age_domain, gender sex_domain . . )
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398462987.25/warc/CC-MAIN-20151124205422-00050-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
11,607
114
http://stackoverflow.com/questions/13454843/div-with-data-position-fixed-and-fullscreen
code
For my tablet app, I must have a layer which is Automaticaly, an event click on background is added for fullscreen feature see this example: click anywhere you want; both the header and footer will toggle visibility. My problem is I do not want this feature but even if I include data-fullscreen="false" in my div, the event is still created. I cannot directly add "position fixed" in CSS because it completely crashes the display. Have you come across this? How did you deal with it?
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826916.34/warc/CC-MAIN-20160723071026-00163-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
484
8
https://wordpress.org/support/topic/new-user-approve-does-not-work-with-social-login/
code
Support » Plugins and Hacks » New User Approve » New User Approve does not work with Social Login 3 years, 10 months ago I want to know if there is a way out to integrate New User Approve with Social Login. For WP user, it works very well but if i logged in via Social Login, the approval thing does not work. Your answers will be always be appreciated. 3 years, 6 months ago +1 same problem.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542695.22/warc/CC-MAIN-20161202170902-00050-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
395
6
https://man.linuxtool.net/centos6/u6/man/1_domainname.html
code
HOSTNAME(1) Linux Programmer s Manual HOSTNAME(1) NAME hostname - show or set the systems host name domainname - show or set the systems NIS/YP domain name dnsdomainname - show the systems DNS domain name nisdomainname - show or set systems NIS/YP domain name ypdomainname - show or set the systems NIS/YP domain name SYNOPSIS hostname [-v] [-a] [--alias] [-d] [--domain] [-f] [--fqdn] [-A] [--all- fqdns] [-i] [--ip-address] [-I] [--all-ip-addresses] [--long] [-s] [--short] [-y] [--yp] [--nis] hostname [-v] [-F filename] [--file filename] [hostname] domainname [-v] [-F filename] [--file filename] [name] nodename [-v] [-F filename] [--file filename] [name] hostname [-v] [-h] [--help] [-V] [--version] dnsdomainname [-v] nisdomainname [-v] ypdomainname [-v] DESCRIPTION Hostname is the program that is used to either set or display the cur- rent host, domain or node name of the system. These names are used by many of the networking programs to identify the machine. The domain name is also used by NIS/YP. GET NAME When called without any arguments, the program displays the current names: hostname will print the name of the system as returned by the gethost- name(2) function. domainname, nisdomainname, ypdomainname will print the name of the sys- tem as returned by the getdomainname(2) function. This is also known as the YP/NIS domain name of the system. dnsdomainname will print the domain part of the FQDN (Fully Qualified Domain Name). The complete FQDN of the system is returned with hostname --fqdn. The function gethostname(2) is used to get the hostname. When the hostname -a, -d, -f or -i is called will gethostbyname(3) be called. The difference in gethostname(2) and gethostbyname(3) is that gethost- byname(3) is network aware, so it consults /etc/nsswitch.conf and /etc/host.conf to decide whether to read information in /etc/sysconfig/network or /etc/hosts To add another dimension to this, the hostname is also set when the network interface is brought up. SET NAME When called with one argument or with the --file option, the commands set the host name, the NIS/YP domain name or the node name. Note, that only the super-user can change the names. It is not possible to set the FQDN or the DNS domain name with the dns- domainname command (see THE FQDN below). The host name is usually set once at system startup in /etc/rc.d/rc.inet1 or /etc/init.d/boot (normally by reading the con- tents of a file which contains the host name, e.g. /etc/hostname). THE FQDN You cant change the FQDN (as returned by hostname --fqdn) or the DNS domain name (as returned by dnsdomainname) with this command. The FQDN of the system is the name that the resolver(3) returns for the host name. Technically: The FQDN is the name gethostbyname(2) returns for the host name returned by gethostname(2). The DNS domain name is the part after the first dot. Therefore it depends on the configuration (usually in /etc/host.conf) how you can change it. Usually (if the hosts file is parsed before DNS or NIS) you can change it in /etc/hosts. If a machine has multiple network interfaces/addresses or is used in a mobile environment, then it may either have multiple FQDNs/domain names or none at all. Therefore avoid using hostname --fqdn, hostname --domain and dnsdomainname. hostname --ip-address is subject to the same limitations so it should be avoided as well. OPTIONS -a, --alias Display the alias name of the host (if used). -d, --domain Display the name of the DNS domain. Dont use the command domainname to get the DNS domain name because it will show the NIS domain name and not the DNS domain name. Use dnsdomainname instead. -F, --file filename Read the host name from the specified file. Comments (lines starting with a #) are ignored. -f, --fqdn, --long Display the FQDN (Fully Qualified Domain Name). A FQDN consists of a short host name and the DNS domain name. Unless you are using bind or NIS for host lookups you can change the FQDN and the DNS domain name (which is part of the FQDN) in the /etc/hosts file. See the warnings in section THE FQDN above, and avoid using this option; use hostname --all-fqdns instead. -A, --all-fqdns Displays all FQDNs of the machine. This option enumerates all configured network addresses on all configured network inter- faces, and translates them to DNS domain names. Addresses that cannot be translated (i.e. because they do not have an appropri- ate reverse DNS entry) are skipped. Note that different addresses may resolve to the same name, therefore the output may contain duplicate entries. Do not make any assumptions about the order of the output. -h, --help Print a usage message and exit. -i, --ip-address Display the IP address(es) of the host. Note that this works only if the host name can be resolved. Avoid using this option; use hostname --all-ip-addresses instead. -I, --all-ip-addresses Display all network addresses of the host. This option enumer- ates all configured addresses on all network interfaces. The loopback interface and IPv6 link-local addresses are omitted. Contrary to option -i, this option does not depend on name reso- lution. Do not make any assumptions about the order of the out- put. -s, --short Display the short host name. This is the host name cut at the first dot. -V, --version Print version information on standard output and exit success- fully. -v, --verbose Be verbose and tell whats going on. -y, --yp, --nis Display the NIS domain name. If a parameter is given (or --file name ) then root can also set a new NIS domain. FILES /etc/hosts /etc/sysconfig/network NOTE Note that hostname doesnt change anything permanently. After reboot original names from /etc/hosts are used again. AUTHOR Peter Tobias, <email@example.com> Bernd Eckenfels, <firstname.lastname@example.org> (NIS and manpage). Steve Whitehouse, <email@example.com> (DECnet support and manpage). net-tools 28 Jan 1996 HOSTNAME(1)
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337428.0/warc/CC-MAIN-20221003164901-20221003194901-00758.warc.gz
CC-MAIN-2022-40
5,898
39
https://businesslive.ng/2023/08/28/release-nnamdi-kanu-as-gift-to-ndigbo-abia-rep-tells-tinubu/
code
According to him, the insecurity in the South East region is due to the prolonged detention of the proscribed IPOB leader; the president should release him as a show of love to N’digbo. Ogah said Kanu’s release would expose criminal gangs using the detention to cover their act of terrorism in the South East. He appealed to the president to balance it, to show he really loved N’digbo as well as release Kanu, so that insecurity in the South East would reduce. “The issue now is that we don’t even know those who are behind the insecurity in the South East. “IPOB will tell you they are not the one, Eastern Security Network will tell you they are not involved. “But some will say the reason is because they are holding Nnamdi Kanu. So my prayer to Mr. President is that he should give him (Kanu) to us as a gift,” he said.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00553.warc.gz
CC-MAIN-2023-40
840
6
https://www.libhunt.com/topic/adblocking
code
Top 10 Adblocking Open-Source Projects Bromite a Chromium fork with ad blocking and privacy enhancements; take back your browser!Project mention: what can i do to improve my desktop? | reddit.com/r/Windows10 | 2022-01-18 The official repo for Blokada for Android and iOS.Project mention: Parental Control | reddit.com/r/jordan | 2022-01-19 To add to that, use a dns blocker app like Blokada or AdGuard. set up one of these apps on your child device (or your device) with extensive hosts lists to block ads, pop-ups, porn sites, phishing...etc. you can find host lists on any app of them or get one from here Less time debugging, more time building. Scout APM allows you to find and fix performance issues with no hassle. Now with error monitoring and external services monitoring, Scout is a developer's best friend when it comes to application development. EasyList filter subscription (EasyList, EasyPrivacy, EasyList Cookie, Fanboy's Social/Annoyances/Notifications Blocking List)Project mention: Youtube ads keep popping in from time to time despite having uBlcok origin, I do have some elements filtered out so could it be the cause of the problem? | reddit.com/r/uBlockOrigin | 2022-01-14 Did you try: https://github.com/easylist/easylist/wiki/Youtube-Issues Custom regex filter list for use with Pi-hole.Project mention: Blocking AMP pages | reddit.com/r/pihole | 2021-12-13 https://github.com/mmotti/pihole-regex/blob/master/miscellaneous/amp.list he suggests a regex (which I've been using): Ultimate Host List for Mobile Adblockers (Focused on iOS)Project mention: Best free iOS ad-blocker now that 1BlockerX costs money? | reddit.com/r/privacy | 2021-12-22 I doesn’t auto update on free but I use this list to block most if not all ads- link Convert adblock config files to privoxy formatProject mention: Nyxt Browser | news.ycombinator.com | 2021-03-18 All you're asking is already possible with Privoxy, which is even stronger than a browser adblocker. It's a very old software: it used to be unmaintained and lacking some essential features, but thankfully the development resumed and is now fully fuctional again with the modern web. It can be used as an adblocker based on domain, request path, HTTP headers, etc, but it can do much more. It can redirect requests (for example, replacing assets from a CDN with a local cache), modify headers (stripping or making cookies temporary, changing user agent, etc.) and even rewrite the content of web pages using regular expressions or any external program. By default, it has only a basic configuration that blocks tracking and ads, but there are tools that convert adblock rules to the Privoxy format, so it will be functionally equivalent to adblock. It acts as a CONNECT proxy, so you can run it locally or on a router and if combined with a NAT rule, it can also work transparently (obviously, you need to manually trust a CA certificate for https). Magisk module to block ads on androidProject mention: Which apps block ads on apps? | reddit.com/r/androidapps | 2021-11-11 Static code analysis for 29 languages.. Your projects are multi-language. So is SonarQube analysis. Find Bugs, Vulnerabilities, Security Hotspots, and Code Smells so you can release quality code every time. Get started analyzing your projects today for free. Android AdBlock Hosts file for /etc/hostsProject mention: How do I add this block list to Blokada? | reddit.com/r/blokada | 2021-04-19 My adblock rules for use in Adguard and other platformsProject mention: Join the new campaign taking on Murdoch | reddit.com/r/australia | 2021-10-25 I pasted the wrong one sorry Try this https://github.com/twcau/AdblockRules Eventually a search engine, but currently a filtering pipeline for HTML and soon WARC files. Adblocking related posts Why am I getting this ad in a linux subreddit? 1 project | reddit.com/r/linuxmasterrace | 18 Jan 2022 PSA: Blokada breaks SnapBridge WiFi 1 project | reddit.com/r/Nikon | 16 Jan 2022 1 project | reddit.com/r/ich_iel | 15 Jan 2022 Youtube ads keep popping in from time to time despite having uBlcok origin, I do have some elements filtered out so could it be the cause of the problem? 1 project | reddit.com/r/uBlockOrigin | 14 Jan 2022 Tiktok is practically malware! 4 projects | reddit.com/r/privacy | 4 Jan 2022 Adorama keeps popping up "verify you are human" and gets stuck 1 project | reddit.com/r/pihole | 2 Jan 2022 Steven Speilberg refusing to subtitle the Spanish parts of West Side Story is ridiculous and him just virtue signalling 1 project | reddit.com/r/unpopularopinion | 28 Dec 2021 What are some of the best open-source Adblocking projects? This list will help you: Are you hiring? Post a new remote job listing for free.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301488.71/warc/CC-MAIN-20220119185232-20220119215232-00435.warc.gz
CC-MAIN-2022-05
4,716
38
https://sourceforge.net/p/openev/mailman/openev-discuss/thread/3F140A6E.2030809@atlantis-scientific.com/
code
From: Gillian Walter <gillian.walter@at...> - 2003-07-15 14:13:56 Someone sent a message a while back with: BTW, I see some statements in openev like import gtk; _gtk = gtk; del gtk what's the meaning? It just occurred to me that this might have been done to avoid gtk being included in a from module import * type statement (I think anything starting with _ is not imported in from-style imports).
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944479.27/warc/CC-MAIN-20180420155332-20180420175332-00367.warc.gz
CC-MAIN-2018-17
398
8
https://www.naukri.com/job-listings-Tech-Lead-Infrastructure-Automation-Engineer-python-Nice-interactive-solutions-India-pvt-ltd-Pune-3-to-8-years-271119906654
code
Responsibilities /Essential Duties Automated deployment of AWS Infrastructure (Software Defined Data Center) Architect AWS Infrastructure to fit our solutions Monitor and Secure AWS Infrastructure Use and Enhance Configuration Management tools like Puppet and Ansible to facilitate guest management Mentor junior engineers in key technological areas such as Puppet, AWS, and monitoring. Collaborate closely with the application support, infrastructure, and product development teams Possible travel to other global locations Required Candidate profile Education and Experience Programming Experience: 3+ years of development experience in Python. Other languages, such as Java or C# will be considered. Experience with Powershell a plus. AWS Experience: AWS certification at associate or professional level and 1-2 years of hands on experience working in AWS using technologies such as Cloudformation or AWS APIs; Associate or Professional Certification a plus. Knowledge of Terraform Platform / Puppet / Ansible strongly desired Education Level: B.E/B.Tech/M.Tech/M.Sc in Computer Science/IT preferred (or any engineering field considered) or equivalent. 2-3 years' experience in technical leadership role. Knowledge, Skills or Abilities Good coding skills in major languages such as Java, Python or Perl Proven ability to learn new technologies quickly Ability to work effectively with distributed team Ability to work in high pressure, highly flexible environment against both short and long-term objectives Passionate about technology and solving IT operations-focused problems Must be detail oriented, task driven, and have excellent communication skills. Customer service focus is key Ability to work effectively with staff, peers, and others in and outside the organization to accomplish goals, objectives and to identify and resolve problems Salary: Not Disclosed by Recruiter / Software Services Functional Area: IT Software - Network Administration Role Category: Programming & Design Role: Team Lead/Technical Lead Employment Type: Full Time, Permanent
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540482038.36/warc/CC-MAIN-20191205190939-20191205214939-00440.warc.gz
CC-MAIN-2019-51
2,063
30
https://bitcoin-irc.chaincode.com/bitcoin-core-dev/2019-05-20
code
fanquake: Ah there's not much to read up on :-) It's just saying that because of the way Guix is designed, you can deterministically build packages as if Guix was a few versions ago, or this commit at this remote, _without_ doing a `guix pull`. It's good to make sure that people who are getting the latest Guix version won't have inconsistencies just because their Guix is newer. dongcarl fair enough. guix pull also seems to be fairly heavy, more so inside a vm, so sitting on an older version/not having to worry about staying too up to date is handy. I was testing out the multiple wallets UI stuff (on testnet) and managed to create new addresses in the wrong wallet I created them from the console and it wasn't obvious at the time that they where created in the 'other' wallet ossifrage: it's not necessarily totally intuitive, but the console has its own wallet dropdown, separate from the one in the main window if you have thoughts on how it could be made more intuitive, I encourage you to share, but since the console is mostly meant for power users, I think there is not a lot of push behind making it more user-friendly probably it should display it more prominently in the commands and responses, like a prompt or something, I don't recall off the top of my head whether or where it is shown other than in the dropdown [16:36:12] luke-jr #bitcoin-builds You have joined too many channels we don't need a channel for every little thing :/ I've joined, but agree, it's like this channel is super busy Well I expect sometimes it'll be cfields imparting his neckbeard wisdom in freeform poetry and me trying desperately to cram it in my head, so perhaps an alt channel for those specifics where others can still see the convo would be good :-) I'm gunna give it a try anyway
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00347.warc.gz
CC-MAIN-2023-50
1,786
11
http://search-lucene.com/m/qKLEk2NEvc02&subj=Parsing+large+xlsx+file+takes+much+longer+and+usually+crashes+with+tika+than+directly+with+POI
code
-Parsing large xlsx file takes much longer (and usually crashes) with tika than directly with POI nutch.buddy@...) 2012-04-11, 11:36 I'm trying to use tika-parsers to parse a 100mb xlsx file. I find myself waiting a lot of time (maybe an hour or two) and rarely have the file parsed. usually i get a "gc overhead limit exceeded" exception. When I parse the same file with a few lines of code using POI library, the file is pared successfully, and relatively fast. Any inputs on this? I use tika-core-0.10 and tika-parsers-0.10 when I use tika and poi-3.8-beta3 when I use POI. View this message in context: http://lucene.472066.n3.nabble.com/Parsing-large-xlsx-file-takes-much-longer-and-usually-crashes-with-tika-than-directly-with-POI-tp3902267p3902267.html Sent from the Apache Tika - Development mailing list archive at Nabble.com.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382503/warc/CC-MAIN-20130516092622-00041-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
835
13
https://bi1.caltech.edu/2023/tutorials
code
What are tutorials? Tutorials are weekly sessions hosted by the head GTAs on Tuesday evenings from 7-9pm in Chen 100. They are designed to supplement the rest of the course (lectures, recitations, and office hours), largely by introducing key computational skills relevant to each week’s content. Why is there programming in an introductory biology course? Computational skills are increasingly important in modern bioscience. Thus, many homework problems ask you to write code to perform calculations, simulations, and analyses. In turn, this allows us to get you working with real experimental data, which is typically a benefit only afforded to students in labs or higher level courses. Do I need prior programming experience? No! In fact, you will probably find tutorials more useful the less you already know. There is no CS prerequisite for the course; therefore, tutorials cover everything you need to succeed on the programming assignments. The goal is to introduce you to the fundamentals in a relaxed, low-pressure environment. What if I already feel comfortable programming? If you already feel prepared to tackle the programming questions, feel free to only attend the tutorials you want/need. Remember that some of your classmates have never written a single line of code before this class! We encourage you to help each other learn. What programming language(s) can I use? For a combination of pedagogical and logistical reasons, all of the programming in the course is done in Python using Google Colab notebooks. It is also the only language and format we accept for homework submissions. Will tutorials always be about programming? Some parts of the course call for less programming than others. At these times, tutorials may instead be host to live demos and experiments that build off of themes from class. These sessions will be announced beforehand in lecture so that you don’t miss them. Will tutorials be recorded? Tutorials are best attended live, but we will also upload recordings below as the course progresses. There is no live tutorial Week 1. Instead, there are two notebooks for you to read: - Tutorial 0: Introduction to Colab covers our approach to programming in this course, including instructions on how to submit your homework correctly. This is the only tutorial you are required to read. - Tutorial 0: Introduction to Python is a gentle, abridged introduction to the Python programming language. It’s far from comprehensive, but if you’re new to the subject, it pairs well with the other tutorials below. |2||Tuesday, April 11||Intro to Python for image segmentation.||[recording] [example image] [notebook]| |3||Tuesday, April 18||Computational sequence analysis.||[recording] [sushi samples] [fish reference]| |4||Tuesday, April 25||Plotting with Python.||[recording] [notebook]| |5||Tuesday, May 2||Exploring evolution with stochastic simulations.||[recording] [notebook]| |6||Tuesday, May 9||Gene expression I: exploring our dataset.||[recording] [notebook]| |7||Tuesday, May 16||Gene expression II: performing our analysis.||[recording] [notebook]| |8||Tuesday, May 23||Gene expression III: theory-experiment dialogue.||[recording] [notebook]| |9||Tuesday, May 30||Pizza & movie night: The Serengeti Rules||[notebook]| Below is a list of useful online resources for learning the Python programming language and principles of programming in general.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00508.warc.gz
CC-MAIN-2023-23
3,400
26
https://hsfhouseblogs.fsu.edu/2023/04/13/martha-cooper-using-motivational-psychology-to-understand-implicit-racial-bias/
code
My name is Martha Cooper, and I am a junior majoring in Psychology and Philosophy here at FSU. For the past year, I have been working in Dr. Irmak Okten’s research lab studying motivated social cognition. Developing skills in data collection and analysis has greatly improved my confidence in myself and my academic abilities. It has also equipped me with the necessary skills to investigate my own independent research interests, which I will be doing for this project. After completing my undergraduate degree at FSU, I plan on pursuing a graduate degree in Social Psychology. My end goal is to become a professor to teach and conduct research at a public university. I am interested in conducting further research in bias reduction, as well as intellectual humility. Both of these areas significantly shape how we interact with members of minority groups and how open we are to having conversations about highly polarized issues. My IDEA Grant project is focused on assessing motivational dimensions like perceived value and self-efficacy expectancy in individuals to predict their implicit racial bias. Ultimately, I want to establish this relationship to one day create a bias reduction intervention that reduces implicit bias by promoting relevant expectancies. This project will also set the foundation for my Honors in the Major project, which will assess the impact of intellectual humility on different forms of bias. I have been passionate about bias awareness for quite some time, but have often felt frustrated and powerless as blatant displays of racial bias continue to take place with no end in sight. Doing research in social cognition has shown me how I can productively address bias, and hopefully one day reduce it. I am also excited to work on a project that synthesizes ideas from my two majors: I will be formally assessing the dimensions that underlie prejudice (social psychology), but also informally assessing the moral implications of my findings (philosophy). This May, I will create a survey using the Bias Reduction Motivation scale to measure individuals’ expectancies in the context of bias reduction. More specifically, I will assess perceived importance (do people value being unbiased?), self-efficacy expectancy (do people think they can be unbiased?) and outcome expectancy (do people think the target of bias will perceive them as being prejudiced?). I will measure implicit racial bias using the Harvard Implicit Association Test. The IAT provides a subtle way of measuring negative biases towards minority groups that many people are unaware they possess. The IAT can measure implicit attitudes towards Blacks specifically by detecting automatic evaluation of different stimuli. The stimuli being used in my version will be Black and White faces paired with pleasant and unpleasant adjectives. So, someone who continues to quickly pair unpleasant adjectives with Black faces would be rated high in implicit racial bias. After data collection, I will examine the correlation between scores on the IAT and where individuals fall on each motivational dimension of bias reduction. I predict that people high in implicit racial bias will have significantly low self-efficacy expectancies. In other words, I anticipate that people who do not think they are capable of behaving in an unbiased manner will be more prone to having negative mental associations regarding targets of bias. If I can establish this relationship, that will be a major step towards creating an eventual bias reduction intervention. After analyzing my data in July, I will begin creating my research poster in August. I will present this poster in September with my fellow IDEA Grant recipients. Overall, I anticipate to grow as a young researcher this summer by independently collecting and analyzing data. I am particularly looking forward to data analysis, where I will finally learn if my hypothesis was accurate, and if motivational dimensions are a significant way to understand implicit racial bias.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00541.warc.gz
CC-MAIN-2023-23
4,018
7
https://mysteriousspace.com/2015/05/19/crashes-are-bad-mkay-0-7-2-features-a-crash-reporter/
code
my friend Stephen let me know tonight that Mysterious Space doesn’t start up for him AT ALL! this made me realize that I’m really going to need some kind of crash reporting software! after all, while I can probably convince my friend to go through his system error logs, or maybe send an stderr dump, I can’t ask anyone else! I imagined that this would have to be some EXTRA piece of software that kind of stood separately, and watched, waiting for a crash, and started googling on that premise… fortunately, nothing so complicated is needed! I found this delightful C# library: CrashReporter.NET it’s super-easy to set up, requiring very few lines of code, has a very permissive license, and seems – so far – to JUST WORK: it e-mails a stack trace, screenshot, and whatever the user chooses to type and send to whatever e-mail address you specify! awesome! I was planning on getting some more changes into 0.7.2 (including some much-needed translation work), but the addition of a crash reporter seemed significant enough to warrant an immediate release, so out it goes! there were a couple little gameplay fixes as well; check out the full changelog for details
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653071.58/warc/CC-MAIN-20230606182640-20230606212640-00690.warc.gz
CC-MAIN-2023-23
1,177
7
https://community.tes.com/threads/help.554748/
code
Iam due to start teaching teaching btec level2 extended performing arts in september 2012. Can I still use the 2010 spec or do I have to use the new 2012 spec which is currently still in draft form only??? I don't know how to start p;anning!! I have emailed edexcel to no avail....does anyone have the answer please?!!
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738905.62/warc/CC-MAIN-20200812141756-20200812171756-00312.warc.gz
CC-MAIN-2020-34
318
1
https://forum.phalcon.io/discussion/3820/pop3imap-with-phalcon
code
I have this picture host with a friend and for each picture can the user click on a button and submit a form for abuse of the picture. This will add it to a MySQL database. My plan is to make it look and function like a chat, because the end user will enter a email where they can reply on, kinda like a professional ticket system. My backend will look like https://cl.ly/image/2C251Z2W3E19 I guess i need to make a script that runs every XX min in cron to check for new emails and add them to the mysql table. But does this exist in phalcon or do i need to use clean php with imap? https://php.net/manual/en/book.imap.php And how should it be design architecture wise.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00754.warc.gz
CC-MAIN-2024-18
669
6
https://www.wyzant.com/resources/answers/92601/accounting_help_please
code
False. The balance sheet is a summary of the accounts on a specific day and has no relation to the future. It is a summary of the impact of past events on the accounts, but has no input from future events. If the business event occurred in the past, it's effect on the balance sheet will be accounted for already in the balance sheet. If it is a future event, it is irrelevant to that day's balance sheet. The balance sheet is NOT a record of events. The general ledger's journal entries are records of events, ie. transactions. Expected future events will be reported in the notes to the financial statements so long as they adhere to the requirements for materiality.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141653.66/warc/CC-MAIN-20200217030027-20200217060027-00185.warc.gz
CC-MAIN-2020-10
669
2
https://ko-fi.com/mmstudios
code
Currently a podcast network with plans for something just short of global domination, Miscellany Media Studios currently has two shows running: Miscellany Media Reviews and My #Hugot. Both shows focus on personal journeys and self-expression, which is a reflection of our larger goals. Welcome to my Ko-fi Page. If you enjoy my content, please consider supporting what I do. Thank you.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987822458.91/warc/CC-MAIN-20191022155241-20191022182741-00365.warc.gz
CC-MAIN-2019-43
385
2
http://selth2016.roger-univ.ro/html/paper-format.html
code
16th international scientific conference Society, Economy, Law, Technology and Humanity The papers will be written in English / German / French (if English / German / French is not your native language, please make sure that the papers are written in proper academic language) and will be between 6 and 14 pages long (always even pages). Papers must follow the guidelines described in 2016 Template. The organizing committee reserves the right to reject submitted papers that do not comply with this format. The organizing committee will not accept papers with more than 4 co-authors. One author can submit an individual paper or two papers in collaboration. All submitted papers will be subjected to a double blind review process as to the following elements: originality, significance, clarity, contribution, results. Accepted and presented papers will be published in: Paper template 2016 - version MS Word Paper submmission form 2016 - version MS Word
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218203536.73/warc/CC-MAIN-20170322213003-00620-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
955
7
https://cgcookie.com/questions/6713-i-dunno-how-to-close-the-circle
code
1 answer · asked April 6, 2018 3:54pm · Lesson: Modeling a Chain · Course: Modeling with Modifiers It looks to me like your mesh is not a perfect 1/3 of a circle and so the Auto-merge feature isn't detecting the seam. If you adjust the Distance setting in the Array modifier then you can increase the spacing at which the modifier will merge the vertices.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704800238.80/warc/CC-MAIN-20210126135838-20210126165838-00287.warc.gz
CC-MAIN-2021-04
358
4
https://greasyfork.org/en/scripts/456220-delicious-userscript-library/feedback
code
A library for userscripts on AnimeBytes which implements a settings page, among other things. Made by momentary0 on github (https://github.com/momentary0/AB-Userscripts/). I just uploaded here for use in my script since I couldn't get greasyfork to approve my require even with integrity checks. No discussions posted yet. If you think this script is breaking Greasy Fork's rules, please report it for removal.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00781.warc.gz
CC-MAIN-2023-14
410
3
https://forums.theregister.com/user/15894/
code
I remember when creating CDs under Windows NT, it would make a coaster usually 50% of the time. It was really touchy. Since I *never* made a coaster burning CDs under OS/2, I tried to see how far I could push it. I set up an FTP server on an OS/2 box and mapped the CD burner as an accessable drive. Then from four other computers I initiated a FTP connection and uploaded files directly to the burner, all simultaneously. Worked perfectly. I've never seen that trick duplicated under Windows. OS/2 was awesome.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178347293.1/warc/CC-MAIN-20210224165708-20210224195708-00016.warc.gz
CC-MAIN-2021-10
511
3
https://apjatinews.com/blog/452/minecraft-build-recreates-howls-moving-castle/
code
A Minecraft player has gone on Reddit to display their incredible build of the titular structure from Studio Ghibli’s Howl’s Moving Castle. Minecraft players continue to impress the online community with their amazing builds, with one incredible creation featuring the titular castle from the Studio Ghibli movie Howl’s Moving Castle. The Minecraft community is always finding new ways to wow its audience with its innovative ideas and artistic execution. This build that turns the viewer into a fish in a tank is a particularly avant-garde build, at odds with more traditionally impressive builds. Recreations of places or art pieces from real life, on the other hand, have become quite common, as well as builds from other popular games. One recent trend has been for savvy players to recreate scenes or locations from movies. Extremely intricate Star Wars builds are becoming increasingly popular and the impressive restaging of scenes from Monty Python have recently begun to be seen as well. With this new well of possibilities the Minecraft community has opened the door to a vast reservoir of builds that are now beginning to surface. This recreation of the French taunting scene from Monty Python’s Holy Grail is a prime example of these new types of builds. Today, a Reddit user posted their amazing build of Howl’s Moving Castle, the fantastical structure from the Studio Ghibli movie of the same name. Smoke rises out of the castle’s many chimneys, begging the question of whether there is a real fire inside playing the role of Calcifer, or if the builder was just particularly detail-oriented. See the original post on Reddit here. The castle appears to be in motion, partway through stepping across a river in the six posted screenshots. Though it would take some remarkable skill with Redstone to actually make the castle move, the structure itself perfectly captures the cobbled together appearance of the original, seemingly built entirely from pieces found in a scrapyard of some kind. The build features many of the castle’s defining traits, including the wing-like fans and the back entrance and small porch from the movie. With numerous Minecraft builds of Hogwarts out there this is by no means the first movie castle to be built in Minecraft, but it may well be the first of a castle that moves (at least in theory, if not in practice). Hayao Miyazaki has directed many beautiful movies, and Howl’s Moving Castle is often considered one of the most beloved. The film, as with many Studio Ghibli movies, evokes a magical feeling in its viewers while, while impossible to entirely capture in Minecraft‘s art style, is given a very respectable attempt in this impressive build, which still manages to very accurately capture the essence and form of Howl’s Moving Castle. Next: How Massive Minecraft Builds Have Changed In 10 Years Minecraft is available on all platforms. The Most Anticipated Movies of 2022
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00483.warc.gz
CC-MAIN-2022-40
2,947
10
https://forum.wiznet.io/t/topic/155
code
I am thrilled about the new W5500, the programming seems to be much cleaner than on the W5200 and it will me much easier for DIY production, too. I have a question about the different reserved pins though of the W5500 (23, 38, 39, 40, 41, 42) which need to be pulled down and the mode selection pins (43, 44, 45) and the invert-logic comm pins (32, 37) which I will select and therefore need to pull-up. In the reference schematic, each of those pins has its own pull-down or pull-up resistor. In the manual however, it is written that each pin has an “internal bias after reset”. What is this “internal bias after reset”. Is it an internal pull-down or pull-up resistor. If yes, why has the reference schematic additional pull-down and pull-up resistors on these pins? Can I safely tie the reserved pins directly to GND without an external pull-down resistor to lower the BOM?
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247500089.84/warc/CC-MAIN-20190221051342-20190221073342-00489.warc.gz
CC-MAIN-2019-09
885
5
https://www.wilderssecurity.com/threads/is-my-trusted-application-sending-unauthorized-data.191452/
code
Hello, I am using a program that checks an online database of license keys every time it is used. Presumably, this is to ensure that my copy of the program is licensed and genuine. Of course, this means that my firewall (currently McAfee) must be configured so that the program is granted access to the internet. I am somewhat concerned that the program may be using its "trusted application" status in the firewall settings to send data that I create in the program to the software publisher. While the program in question is not peer-to-peer and comes from a reputable company, it is nonetheless associated with a highly competitive industry. I would like to explore exactly what data the program is sending without simply taking the company's word for it. Is there any software that would enable me to examine exactly what data is being sent by the program? Also, is there a really advanced firewall that would enable me to grant the program internet access only for specific purposes, or send only a limited amount of data? I would be most grateful for any information or insights anyone may have on this topic.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514443.85/warc/CC-MAIN-20181022005000-20181022030500-00491.warc.gz
CC-MAIN-2018-43
1,115
1
https://solemnwarning.net/rehex/manual/plugins.html
code
REHex's functionality can be extended by writing plugins in Lua - for example the included exe plugin which can annotate the sections of a PE EXE/DLL file. Plugins are loaded from the following places on different platforms: Pluginsfolder alongside rehex.exe Contents/PlugInsdirectory in the application bundle. Additionally, the environment variable REHEX_PLUGIN_DIR can be set to a plugin directory. Each plugin should either be a single .lua file in the top-level plugins directory, or a subdirectory containing a plugin.lua file and any resources/assets needed by the plugin.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00273.warc.gz
CC-MAIN-2022-49
579
10
https://www.biostars.org/p/178093/#178205
code
I'm a Computer Science undergraduate writing my thesis which is about analyzing open source bioinformatics projects and extracting standalone modules. I need those projects to be written in Java and preferably be stable or mature. So far I've found a bunch of projects via SourceForge and I was wondering if there are any notable ones that are not hosted there. A different repository that has a bioinformatics category would be helpful too. Here's a list of the most promising projects I have so far: - RDP Classifier - The Chemistry Development Kit Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817670.11/warc/CC-MAIN-20240420153103-20240420183103-00281.warc.gz
CC-MAIN-2024-18
569
5
https://elifesciences.org/articles/03640/figures
code
(A) Sequence logo plot of regression coefficients of stop codon contexts (SCCs) in the LINiter model. Character size corresponds to regression coefficients. The model treats stop codons as one nucleotide position. Filled/upside-down letters correspond to positive/negative coefficients, respectively. (B) Consensus motif for high readthrough propensity (RTP) derived from the predictive model. The stop codon together with the nucleotide triplet following the stop codon provides the best predictor for RTP. The consensus was derived by feature selection: starting from LINiter, positions with the least contribution to prediction were successively eliminated as indicated by the gray arrow. Nucleotide positions on the x-axis mark the removed positions upon transition to a reduced model. LINfs3 (UGA CUA, stop codon underlined) represents the global minimum of regression error (filled circle). The model LINfs5, corresponding to a local minimum, additionally encompasses positions +7 and −6, indicating that these positions could also contribute to high BTR. (C) BTR determination of candidates from the genome-wide in silico screen. Dual reporter assays with Venus and humanized Renilla luciferase containing SCCs from AQP4 (UGA CUA G), SYTL2 (UGA CUA G), CACNA2D4 (UGA CUA T), and DHX38 (UGA CUU G). AQP4, SYTL2, and CACNA2D4 reveal high BTR in all tissues tested. HT1080, human fibrosarcoma cell line; U373, glioblastoma cell line. HEK, human embryonic kidney cells. Error bars, SD.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00838.warc.gz
CC-MAIN-2023-40
1,490
1
https://mail.kde.org/pipermail/kde-core-devel/2004-November/022334.html
code
KIO::listRecursive & link faure at kde.org Tue Nov 23 10:17:43 GMT 2004 On Tuesday 23 November 2004 10:58, Andras Mantia wrote: > I did it locally, so it follows the symlinks with the current > listRecursive (call a new listRecursive for each item that is a > directory and a link) *without* any guard against infinite recursion > and I *tested* it with infinite recursion. I suspected an infinite > loop. For my surprise it wasn't infinite at all. After some time it > simply didn't follow the link. I verified in Midnight Commander and > there as well, after some depth the links are not valid. Konqueror > gives an error as well: "The file or folder [long path comes here] does > not exist." I suspect this is because of the limitation of a path name > length on the file system. The question is if there are filesystems > with no such limitations, or in other words, can be there a real > infinite recursion? Even so, you certainly don't want to go to such depths.... You want to stop at the first recursion, to avoid listing the same files over and over again. Check what grep -r does: it detects the loop immediately. # mkdir foo # ln -s ../foo foo/foolink # grep -r test . grep: warning: ./foo/foolink: recursive directory loop David Faure, faure at kde.org, sponsored by Trolltech to work on KDE, Konqueror (http://www.konqueror.org), and KOffice (http://www.koffice.org). More information about the kde-core-devel
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991648.10/warc/CC-MAIN-20210511153555-20210511183555-00267.warc.gz
CC-MAIN-2021-21
1,422
27
https://www.samm.com/en/news/75/raspberry-pi-workshop-in-hackerspace-istanbul.html
code
Cart is empty. Date: 15.11.2014 Saturday 10:30 Duration: 4-6 saat - Arda: Raspberry Pi introduction. What is Raspberry Pi? How did he meet it? Device purposes, operative system distributions, web server & media center configuration, basic introduction to PHP/Python/Java programming languages - Ramazan: controlling GPIO (from the terminal, with Python, C-WirinPi, from web interface-WebIOPi) and information related with electronics - Jesus: Types of boards and their evolution, accesories that can be connected to the Raspberry Pi, project ideas The workshop will have presentations and case studies. The official distributor in Turkey SAMM will donate 15 Raspberry Pis to Hackerspace. NOTE: Maximum capacity: 30 people. You can send an email to root[at]istanbulhs[dot]org for the registration. Source: İstanbul Hackerspace
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337490.6/warc/CC-MAIN-20221004085909-20221004115909-00291.warc.gz
CC-MAIN-2022-40
826
9
https://www.experts-exchange.com/questions/20960313/Duplicating-Win2000-Domain-Server.html
code
We have a small office with 5 workstations and a Win2000 Server as domain controller.A new office is opening next month that is the same size and I have been told that a simple clone of the existing server will do for the other location. However, the two servers have to communicate through a wireless link and update the data on each. The IP of the server is 10.0.0.1. If I clone then the new server will have the same IP and will this not create a problem? What is the easiest way to get the new office going. The same data will be used for each.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887414.4/warc/CC-MAIN-20180118131245-20180118151245-00484.warc.gz
CC-MAIN-2018-05
548
3
https://dao.rocketpool.net/t/rewards-trees-v6/1705
code
I’ve got some proposals I’d like to see work their way into rewards tree generation: The minipool performance file should no longer track performance for a minipool during the portion of an interval where its node was not opted in. oDAO rewards should be pro-rata based on the time they accept the invitation, not the time the node was registered. Exiting a minipool during an interval should not make it ineligible for rewards until the following interval (it will receive a pro-rata share of eth for the attestations it made while still active, and a pro-rata share of RPL for the time it was active). I may have more, but I think these things all inch purely towards fairness and not away from it, so I wanted to put them on the table before I forgot. I believe the only one of these that can be included without a community vote is item 1, since it doesn’t change the rewards, just the artifacts. Items 2 and 3 require community votes, ergo, sentiment polls - oDAO Rewards should be pro-rated based on the time that they accept their invitation instead of the time they register their node. - Leave oDAO Rewards pro-ration as it is. - Minipools that exit in an interval should still receive smoothing pool and rpl rewards for the time they were active - Leave minipools that exit during an interval as ineligible for rewards for that interval
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644574.15/warc/CC-MAIN-20230529010218-20230529040218-00282.warc.gz
CC-MAIN-2023-23
1,352
11
https://stackoverflow.com/questions/26166433/how-to-prevent-request-that-returns-304
code
Firstly, the relevant HTTP spec is RFC 7234. If you look at the spec you will observe two things: The spec never requires, under any circumstances, that a cache serves a cached version of content without revalidating. There are plenty of places where the spec notes that a cache MUST NOT use cached content to satisfy a request, but none at all where it dictates that it MUST do so or that it MUST NOT revalidate. So browser vendors are always free to revalidate if they want to. Secondly, you're doing nothing wrong on your end. Browsers are free to cache responses and use those cached responses given the headers you're returning. The key point is in Section 4, where it is noted that one of the conditions for serving a cached response is that the response is either: fresh (see Section 4.2), or allowed to be served stale (see Section 4.2.4), or successfully validated (see Section 4.3). Since you're spitting out an Expires header that is far in the future, and that point in the future has not yet been reached, the response is 'fresh', and therefore revalidation is not required. So you're doing everything that the spec suggests you should be on your end. (Although using Cache-Control: max-age=foo is a more modern way of setting cache expiry times than using the So if you want to change the browsers' caching behaviour, you're out of luck. However, things might not be as bad as you think. You're probably only be seeing a request and 304 because you're refreshing the page in your browser when testing. Browsers handle cached resources differently depending upon how the request for them was triggered. I ran a simple test in which I created a HTML page that contained a <script> tag pointing to a JS file, an <img> tag pointing to an image, and a <link> tag pointing to a CSS stylesheet. All of these files were hosted on an Apache server configured to serve them with: - an E-Tag header, - a Last-Modified date, Cache-Control: max-age=172800 header Naturally, all resources were served with 200 codes on first page load. Thereafter, testing in Chrome or Firefox installs with default settings, I observed that: - If you refresh the page via the F5 key or the Refresh button, the page and all resources revalidate (i.e. a request is made to the server for each resource and a 304 returned). - If you return to the page via a link or entering the URL into the URL bar in a new tab, then no revalidation is done (i.e. no requests are made). - In Chrome, if you refresh the page by selecting the URL bar and pressing Enter, the page itself revalidates but no other resources do. In Firefox, neither the page nor resources revalidate. This page indicates that Internet Explorer has the same behaviour: There are a number of situations in which Internet Explorer needs to check whether a cached entry is valid: - The cached entry has no expiration date and the content is being accessed for the first time in a browser session - The cached entry has an expiration date but it has expired - The user has requested a page update by clicking the Refresh button or pressing F5 In other words, you're usually only going to see these revalidation requests if the user explicitly refreshes the page. Unless you have some very particular requirements about how you want the browser cache to behave, this behaviour seems perfectly reasonable. Google and Mozilla both have some documentation about HTTP caching (I can't find anything equivalent on MSDN or the Apple Developers site), but neither suggests the existence of any vendor-specific caching headers that can be used to modify the rules the browser uses to choose when to revalidate. What you want to do is simply not possible. If you truly need more control over this behaviour, you could look into the HTML5 Application Cache or roll your own caching logic using HTML5 Local Storage, like basket.js does.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587659.72/warc/CC-MAIN-20211025092203-20211025122203-00555.warc.gz
CC-MAIN-2021-43
3,863
30
https://www.ecs.soton.ac.uk/people/dr1e17
code
Ralph, David, Li, Yunjia, Wills, Gary and Green, Nicolas G. (2019) Recommendations from cold starts in big data. Chang, Victor, Ramachandran, Muthu, Walters, Robert, Munoz, Victor Mendez and Wills, Gary (eds.) In IoTBDS 2019 - Proceedings of the 4th International Conference on Internet of Things, Big Data and Security. Scitepress. pp. 185-194 .
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662555558.23/warc/CC-MAIN-20220523041156-20220523071156-00292.warc.gz
CC-MAIN-2022-21
346
1
http://rainbowfactory.net/spin-rewriter-70-crack-download-turbo-spin-rewriter.html
code
Rewriting is far more complicated than many would like it to be. Do you struggle with your rewriting skills and wish to excel at paraphrasing? More than a desire it’s a necessity to most people. It’s an essential skill that many people need to get through their schools, colleges, universities, and jobs, now and then. Many people have to do it quite often which makes it a dull and a difficult task to finish. Moreover, searching for the suitable synonyms or phrases and then rearranging all the sentences is not always a fascinating job. In a situation like that one can’t help but wonder what if there’s a paraphrasing tool that could do all the rewriting for them in the blink of an eye. Fortunately, it is no longer just a dream. Article rewriter, article spinner, paraphrasing tool or whatever you may call it; it is now a reality. An instant article spinner or an instant paraphrasing tool, as the name suggests, can paraphrase your article promptly. Imo it is not possible for google to detect properly spun content, it is not worth computing power it requires. They can do this using ngrams for example, but it is uses a lot of queries. And for example article spinner I coded beats this algo, so google cant detect that the content is spun. Manual spinning is also good but it takes more than 30 minutes per article. I've ranked websites in the past with spun content, and now they are still on #1 position of google. First year (2014) google found me because my spun was really bad, many paragraphs were just copied and my position drop from #2 to around #20 after a panda update. Later I cleaned all my text with better spun (I didn't buy any article!), my ranking went up again, and with more backlinks I reached #1 and it is still there Spin Rewriter 9.0 is available exclusively on their website from the 4th October 2018. If you test drive their software for free before the 4th Ocboter 2018 you will be testing version 8.0. Get a free consultation to see how the Spin Rewriter 9.0 can work for you. Their professionals are there to assist you with your article rewriting questions and concerns. Aaron and I have been doing business together since the summer of 2012 and coincidence or not, the revenue of my business has quadrupled in this time. We recommend Spin Rewriter to all our members in our newsletter and it's been by FAR the best performing affiliate product we recommend. I think we did over $4.60 EPC with one of our earlier mailings. We've never heard of anyone requesting a refund so all in all it's really a fantastic product which sells itself. This will no doubt seem very obvious to many people and for others it will send a shudder of fear down their spine! But if you want to make money online, be an affiliate marketer or a well known blogger, then there really is only one way to do it. The best way to get ranked and make money online is to do must things manually. Sure, there are legit shortcuts and additional tools that can make the process faster. But in general if you are looking to create content for your website, then you need to learn the correct way of doing it. WordAI automatically rewrites entire paragraphs and sentences – this functionality is offered by most content spinners nowadays, but not many are good at it. WordAI tries to understand in the best possible way, not just the words in the sentence, but the entire meaning of the sentence as well as its connection to subsequent sentences in the paragraph. He saw a trainer nearby and inquired why these animals made no effort to get away and just stood there. “Well,” trainer said, “when they are quite young and much smaller we use exactly the same size rope to tie them and, at that age, it’s enough to hold them. They are conditioned to believe they cannot break away, as they grow up. They believe the rope can still hold them, so they never try to break free.” It's a long, long job to research your keywords, keyword phrases, LSi's etc and then to write content for your chosen search term that has the perfect keywords, and the perfect density of those keywords. This plugin looks at the top 10 Google SERPS for your search term, compares them to each other, and then tells you the keywords that ALL the top 10 pages are using in their content, PLUS the density of those keywords. In less than a minute you will know EXACTLY which keywords and their relevant density to include in your website copy so that it matches Google's exact keyword expectations. Click here for more details. If you already have some blog or website content that you want to turn into fresh, rewritten content in a matter of seconds you should use our article rewriter tool. This free paraphrasing tool is available to you 24/7 to rewrite the text. Most of the text created by our article spinner is human readable and 100% unique which makes it suitable for creating mass blog posts and web content. 4. The SR team have rewritten all explanation & supercharged all “info buttons“. They've also added animations on the way to use specific elements of the user interface. Sweet! 12. Redesigned Control Panel Home Page! 13. Spin Rewriter Artificial Intelligence got a BOOST! SR team have improved its convolutional neural networks (that is a fancy scientific name for the Artificial Intelligence behind ENL Semantic Spinning) to determine how words & phrases work together to convey exact meaning. This means even more readable articles, with mind-blowingly good suggested synonyms. 14. Fixed Common Annoying Issues No more “baseding on”, or unwanted capitalization when spinning numbers into words. No more extra spaces when omitting a word from a sentence. And names of countries, cities, months, holidays & days of the week are now automatically capitalized. As they should be. It all just works. 15. Too many new features to write here LOL There is so many more delightful features! What makes Spin Rewriter DIFFERENT Because it can produce content you can actually use. The algorithm on this beast is so smart, it will spin you an article & you will think a human wrote it. It’s got over 100,000 users. It’s been around for years, constantly created & updated. It integrates with damn near every SEO tool available. How Does It Work? What Are Some Of The Biggest Names Of The Internet Marketing World Saying About Spin Rewriter 9? [wpsm_quote author="Chris Winters " float="none" width="100"]After years of using "Spin Rewriter" I found a spinner that's at least two years ahead of its time. Aaron's "Spin Rewriter" the ONLY spinner on the market to write readable spun content with the click of a button. The ONLY spinner I use & recommend.[/wpsm_quote] [wpsm_quote author="Chris Munch" float="none" width="100"]I first met Aaron in Washington at Yanik Silver's event & he was extremely humble about his seven figure tool product that had Seriously, if you have a blog or a collection of web 2.0 properties, you want to build some authpority to your additional tier 2 and 3 sites, you want backilinks and endless content for any purpose, then this tool is for you. No matter what business you are in, you are going to need content of some degree and spin rewriter 9 is the perfect solution with out any doubt. This time, WordAI calculates the spin it generated at 97% uniqueness which is basically completely unique. If you look at the text above, again, the first sentence of the quoted content is a bit confusing, but the rest is still good. I would even say that the last sentence came out better than the previous spin, but generally, yes, the above spin looks more like a human wrote it.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829140.81/warc/CC-MAIN-20181218102019-20181218124019-00076.warc.gz
CC-MAIN-2018-51
7,623
13
https://forum.bestpractical.com/t/users-groups-and-queries/18620
code
I create a user named “jimmo”. I then click "configuration-> users->select users. I have a list of “Privileged users” but this user does not appear. Digging through the documentation I discovered that that “Privileged users” means that the person is not only allowed to create tickets but actually use the product. It seems that the only way to get access to a non-priviledged user is to search for it. When I try to search without any criterial, I get the list of “Privileged users”. Is there any way to get a list of all users? When assigning group membership, the only way you can do it is through the group. That is, if you have 10 groups and you create a new employee (“Privileged user”) you must go through all 10 group individually to assign this user to all of the groups. Is that correct? Is there any way of assigning “all rights” on a particular queue to a specific group? Is there any way of assigning “blocks” of rights (other than selecting them individually) For example, it does not seem logically to me that someone can be the owner of call without being able to modify it. So I would like to be able to allow a user to assign a block like “administer ticket”, which would allow me to do thing to the ticket. I assigned a ticket to a particular user and now want to assign it to a different user. However, I get the message “You can only reassign tickets that you own or that are unowned.” This is assigned to the queue Network and members of the Network group have rights to Steal and Take the ticket. In fact, the group has all rights to the queue. I am doing this as the root user, so my assumption would be that by default this user has the right to do everything. In any event, the root user has all rights to this queue. I have tried to assign the ticket to both root and a different user with the same I googled on this error and found many others with the same problem (mostly older version). One refences pointed me to the TicketOwnershipPermissions page on the RTWiki. Reading through the page seems to indicate that I should be able to re-assign the call, but still I cannot. When I click on either “Tickets”, “New Query” or “Query Builder”, I am brought to what appears to be the exact same screen. This does not seem logical to me. Why would there be three links, one right after the other that brings you to the same screen? “Be more concerned with your character than with your reputation. Your character is what you really are while your reputation is merely what others think you are.” – John Wooden Be sure to visit the Linux Tutorial: http://www.linux-tutorial.info NOTE: All messages sent to me in response to my posts to newsgroups, forums or mailing-lists are subject to reposting.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500813.58/warc/CC-MAIN-20230208123621-20230208153621-00589.warc.gz
CC-MAIN-2023-06
2,774
39
http://forums.bigsoccer.com/threads/question-for-you-older-folks.1979548/
code
So I've only been following soccer with any depth for the past 6 years and I'm really interested in the history of the sport but have no real knowledge of it. For example, all I knew about Zinedine Zidan was that he headbutted the crap out Marco Matterazzi. I had no idea he was one of the greatest players to ever play the game. Messi breaking Gerd Muller's (another person I'd never heard of) goal record has really peaked my interest to actually learn about the past greats and such. I was hoping some of you folks could point me in the right direction? I'm a reader so books would be preferred, but I'll take whatever you've got.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989043.35/warc/CC-MAIN-20150728002309-00249-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
633
1
http://www.linuxquestions.org/questions/syndicated-linux-news-67/lxer-lxer-weekly-roundup-for-08-feb-2009-a-703269/
code
Published at LXer: LXer Feature: 08-Feb-2009 At the beginning of the week Debian went into a deep freeze until their announced release date for Lenny on Valentine's Day. A group of developers have brought the dark horse of file managers Midnight Commander back from a deep sleep. Jimf exposed me to midnight commander, it was way over my head at the time and in a related article Carla Schroder says you "You Get What You Pay For" that talks about projects having a hard time making ends meet. Both of which I will be talking about again soon..
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120338.97/warc/CC-MAIN-20170423031200-00623-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
544
3
https://www.dk.freelancer.com/projects/software-architecture/any-part-time-projects/
code
I have read your description carefully and I am sure I can finish your project. I am a new freelancer but history of this site is not skill. I think the skill is my ability. I have an experience of 4 years in deFlere I am glade to see your project. I think I can do it. I am a beginner in Freelancer.com, But I have full experiences in Visual Studio. You can test it with small program. I want to work with you. I need your details.Flere
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00140.warc.gz
CC-MAIN-2020-16
437
10
http://www.esrl.noaa.gov/gmd/publications/browse.php
code
GMD Publications for 2015 Click on page icon to view abstract. U.S. national and regional emissions of HFC-134a are derived for 2008–2012 based on atmospheric observations from ground and aircraft sites across the U.S. and a newly developed regional inverse model. Synthetic data experiments were first conducted to optimize the model assimilation design and to assess model-data mismatch errors and prior flux error covariances computed using a maximum likelihood estimation technique. The synthetic data experiments also tested the sensitivity of derived national and regional emissions to a range of assumed prior emissions, with the goal of designing a system that was minimally reliant on the prior. We then explored the influence of additional sources of error in inversions with actual observations, such as those associated with background mole fractions and transport uncertainties. Estimated emissions of HFC-134a range from 52 to 61 Gg yr−1 for the contiguous U.S. during 2008–2012 for inversions using air transport from Hybrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT) model driven by the 12 km resolution meteorogical data from North American Mesoscale Forecast System (NAM12) and all tested combinations of prior emissions and background mole fractions. Estimated emissions for 2008–2010 were 20% lower when specifying alternative transport from Stochastic Time-Inverted Lagrangian Transport (STILT) model driven by the Weather Research and Forecasting (WRF) meteorology. Our estimates (for HYSPLIT-NAM12) are consistent with annual emissions reported by U.S. Environmental Protection Agency for the full study interval. The results suggest a 10–20% drop in U.S. national HFC-134a emission in 2009 coincident with a reduction in transportation-related fossil fuel CO2 emissions, perhaps related to the economic recession. All inversions show seasonal variation in national HFC-134a emissions in all years, with summer emissions greater than winter emissions by 20–50%. Continuous measurements of total ozone (by Dobson spectrophotometers) across the contiguous United States began in the early 1960s. Here, we analyze temporal and spatial variability and trends in total ozone from the five US sites with long-term records. While similar long-term ozone changes are detected at all five sites, we find differences in the patterns of ozone variability on shorter timescales. In addition to standard evaluation techniques, STL-decomposition methods (Seasonal Trend decomposition of time series based on LOESS (LOcally wEighted Scatterplot Smoothing)) are used to address temporal variability and "fingerprints" of dynamical features in the Dobson data. Methods from statistical extreme value theory (EVT) are used to characterize days with high and low total ozone (termed EHOs and ELOs, respectively) at each station and to analyze temporal changes in the frequency of ozone extremes and their relationship to dynamical features such as the North Atlantic Oscillation (NAO) and El Niño–Southern Oscillation. A comparison of the fingerprints detected in the frequency distribution of the extremes with those for standard metrics (i.e., the mean) shows that more fingerprints are found for the extremes, particularly for the positive phase of the NAO, at all five US monitoring sites. Results from the STL decomposition support the findings of the EVT analysis. Finally, we analyze the relative influence of low- and high-ozone events on seasonal mean column ozone at each station. The results show that the influence of ELOs and EHOs on seasonal mean column ozone can be as much as ±5 %, about as large as the overall long-term decadal ozone trends.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298889.70/warc/CC-MAIN-20150323172138-00135-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
3,695
4
http://www.kohl.ca/2003/pairing-in-test-driven-development-day-one-report/
code
An area of Agile Development where testers are usually absent is in Test-Driven Development and other developer testing activities. Since I like to collaborate with developers as much as I can, I asked them what other areas I could support them in. (Brian Marick calls these types of activities Technology-facing programmer support.) They told me that an area they would like to see testers work with them was in unit test development, especially when using Test-Driven Development. While I have pair tested with developers to help generate unit testing ideas, I haven’t actually worked with them during development in a pair programming kind of role. They felt that pairing with a tester would help them generate test ideas, and that it would be a good fit. The developer is thinking about programming most of the time while the tester is thinking about tests most of the time. I encourage developers to use test-infected development techniques, so I decided to stop theorizing and actually give it a try. I can’t very well answer the question about how a tester can add value to Test-Driven Development unless I’ve tried it. Yesterday I paired with a senior developer who was developing an application in Java using the Intellij IDEA IDE which has JUnit integration. He kindly agreed to take me through the paces, but I have to admit I was a bit nervous. While I have basic Java programming skills, I am not a great coder and I usually work with scripting languages when I develop automated test cases. I wasn’t sure if I would be able to add any value to a programming activity or not. After we walked through the business problem the coding effort for the day was to address, and some of the code that was in place, we began looking at the test framework. In this case, the developer had already written the first test, and an implementation that worked well enough to get that test to pass. We picked up at this point, and looked at the business rules and designed a new test. When we ran JUnit, the test failed, so that told us that the code implementation needed some work. The developer added some more logic to get that test to pass, and then we added another test case. We continued on adding a test cases which would initially fail, and the developer would work on the implementation to get the test cases to pass. At a certain point, he felt that we had a good basic set of test cases that covered enough of the business logic. At the end of our session, we had an implementation that satisfied some basic test cases. I suggested test ideas, but was completely dependent on the developer to write the JUnit tests. I was absorbed in thoughts around more test ideas and what would seem feasible. I suggested a lot of test ideas that we could tackle the next day, and we discussed what tests we could justify doing. My intitial response was to test as much as possible, while the developer was thinking about the big picture and what time we could spend on testing. I realized this would be a trade-off; testing everything as robustly as possible would cause a lot of duplicated effort. I didn’t feel like I added a lot of value to this session. Granted, I was getting trained in how Test – Driven Development works. I caught some minor syntax errors as we paired; the developer caught a few in his own work as well. We both missed some coding errors, but the compiler and the unit tests caught those. My thoughts at the end of the day were that I had learned a lot, but added little value. Clearly, I need to learn more about the process and do this more in the hopes of adding value to a developer. The basic test ideas that I had generated were already ideas that the developer had thought of. I then started to think of more complex test ideas, and felt that we had very little coverage. The developer agreed that the coverage was light and we needed to work on more tests the next day. I left at the end of the day thinking about further tests we could write – I could add value there.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00027.warc.gz
CC-MAIN-2023-40
4,013
6
https://community.mcafee.com/t5/ePolicy-Orchestrator/Problem-to-get-the-epo-Console/td-p/356868
code
i have a problem to connect to the epo console. When starting the console i get the following message. What can i do? All services are working. Nothing on the system was changed. Rebooting the system was not successfull. Assuming you've substituted your server name in your screeen grab or your server is not named "<servername>" then first things is to look at your firewall settings on the server. thx for your answer. I substituted the original servername by <servername>. The firewall on this machine is not activated. This is not the problem. Have you any other idea?
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813712.73/warc/CC-MAIN-20180221182824-20180221202824-00407.warc.gz
CC-MAIN-2018-09
572
7
https://jise.org/Volume9/n3/JISEv9n3p7.html
code
Abstract: Determining what skills employers of new IS graduates desire is important in guiding IS educators in designing curriculum and in advising students. This study reports the results of a pilot study which attempts to gain insight into the previously mentioned question. The findings indicate that basic technical skills, such as systems analysis and design, and database concepts, and non-technical skills, such as teamwork and communications skills, are more important than specific technical skills. Download this article: JISE - Volume 9 Number 3, Page 7.pdf Recommended Citation: Van Slyke, C., Kittner, M., & Cheney, P. (1998). Skill Requirements for Entry-Level IS Graduates: A Report from Industry. Journal of Information Systems Education, 9(3), 7-11.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337663.75/warc/CC-MAIN-20221005172112-20221005202112-00407.warc.gz
CC-MAIN-2022-40
766
3
https://umilaelaarifin.wixsite.com/homepage
code
With Nasikabatrachus in Agumbe, Western Ghats, India (2015). Photo: U. Smart. Welcome to my personal homepage! :) Umilaela Arifin, Dr.rer.nat. (PhD) EU Researcher (Marie Curie Research Fellow) Center for Taxonomy and Morphology (ZTM) The Museum of Nature Hamburg Leibniz-Instute for the Analysis of Biodiversity Change Museum of Vertebrate Zoology (MVZ), McGuire Lab University of California Berkeley, I am a herpetologist (by training). I had never thought to become a scientist, especially who is studying amphibians and reptiles (herpetofauna). I didn't like them nor dare touching them. The three month herpetofaunal expedition in Sulawesi led by Prof. McGuire in 2004, which I ended up joining, has totally changed my life! This trip and many more expeditions afterward have shaped my decision after witnessing the beauty of Indonesian nature and its fascinating biodiversity through frogs and their friends. Thanks to this small living creature, I am now living my life as a scientist without regret! Check my research page to learn about the scope of my research. More about me? Check out this YouTube video and the following links :) My Academic Journey March 2020 - now EU Researcher My current postdoc position is funded by the European Commission under the Horizon 2020 program (Marie Sklodowska Curie-Individual Fellowship: Global Fellowship), hosted by the University of Hamburg, Germany (Centre of Natural History, Zoology Museum Hamburg, Haas Lab) and the University of California Berkeley, USA (Museum of Vertebrate Zoology, McGuire Lab) In this three years project (HighThroughFROGS), I am intended to obtain degraded genomic DNA sequence data from historical museum specimens of Southeast Asian frogs to assess the phylogenetic and taxonomic position of the Asian frogs with gastromyzophorous tadpoles. -> Due to covid19 pandemic, my project is not running the way it was planned. However, I finally managed to go to UC Berkeley, though it will be shorter than it should be. April 2019 - Jan 2020 Postdoctoral Researcher I was lucky enough to get a postdoc position at the Centre of Natural History (CENAK)-Zoology Museum, University of Hamburg, Germany, right after defended my doctoral thesis. My main task under supervision of Prof. Alexander Haas was to carried out an independent research on Asian ranids with belly-sucker tadpoles as well as to prepare my future research and to establish (and to expand) network for me and my institution. -> During this period, I had attended at least three international conferences (III International Conference on Island Evolution, Ecology, and Conservation; IBS 2019 Humboldt-250 Meeting & 2nd Latin American Congress of Biogeography; 9th World Congress of Herpetology). Also, one paper I (and my team) wrote during this time has been published. Oct 2013 - Jan 2019 Doctoral Researcher After having a break in formal education since I graduated from my Master degree in 2008, I finally went back to school. With a stipend from German Academic Exchange Program (DAAD-Indonesian German Scholarship Program) I started my doctoral degree in 2013 at the University of Hamburg, Germany (later I was granted the Merit Scholarship for International Student at the University of Hamburg to complete my study). I studied the phylogenetic systematics, diversity, and biogeography of the Sumatran ranids with gastromyzophorous tadpoles under the supervision of Prof. Alexander Haas. This study was mainly funded by the German Science Foundation (DFG Ha2323/12-1 to A. Haas). -> I defended my thesis on 25th January 2019 and graduated with distinction. Right after this, I got the Student Scholarship to examine tadpoles at the Lee Kong Chian Natural History Museum Singapore and my Marie Curie Fellowship application was approved. I also got a postdoc position at the University of Hamburg, Germany (CENAK). Aug 2006 - Oct 2008 M.Sc. I did my Master degree in Biology Program at the School of Life Sciences and Technology, Bandung Institute of Technology, Indonesia. My master thesis was about the phylogenetic relationship of the frogs genus Staurois, supervised by Prof. Dr. Djoko T. Iskandar. -> I graduated with distinction and three years afterward I published my first international scientific publication from this thesis project. Aug 2001 - Oct 2006 B.Sc. I did my undergraduate degree in Biology Program at the School of Life Sciences and Technology, Bandung Institute of Technology, Indonesia. My master thesis was about the morphometric study of Limnonectes frogs from Sulawesi, Indonesia, supervised by Prof. Dr. Djoko T. Iskandar. -> I joined three months expedition on amphibian and reptiles in Sulawesi led by Prof. Dr. Jimmy McGuire from the University of California Berkeley, USA. This trip was the point where I changed my life direction (to become a scientist/herpetologist). While crossing Alas River in Aceh province, Sumatra island, Indonesia to my field site in 2014. Photo: G. Cahyadi
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00788.warc.gz
CC-MAIN-2023-23
4,959
31
https://www.biostars.org/p/148522/
code
I need to draw the shape of peaks from different chip-seq samples. I want to get something like this picture, which I found on a Nature paper. Can you help me in doing that? For this sort of profiles I'm quite happy with deepTools (look at the computeMatrix and profiler tools). Also SeqMonk has and option to draw profiles but is more limited and you are bound to the GUI (maybe a plus?) I also a fan of deepTools for this. They also have a Galaxy server for those that want to avoid the command-line. Disclaimer: I have never used their Galaxy server. I've never done this before, but I think you could do something like the following: 1. Get the summit position of all the peaks in your sample and convert them to BED format. 2. Expand the summit position upstream and downstream by 2,500 bp (like in the figure), using bedtools slop. e.g. bedtools slop -i summits.bed -g my.genome -b 2500 > summits.2500.bed 3. Calculate the per base pair coverage for each peak region using bedtools coverage. e.g. bedtools coverage -counts -d -a summits.2500.bed -b sample.bam 4. Load the coverage data in R, modify it so that you take the average coverage for each position, then plot a scatter plot of position against coverage. Login before adding your answer. Use of this site constitutes acceptance of our User Agreement and Privacy
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103037649.11/warc/CC-MAIN-20220626071255-20220626101255-00759.warc.gz
CC-MAIN-2022-27
1,326
14
https://www.bleepingcomputer.com/forums/t/228199/hewlett-packard-computer/
code
I will probably buy it during the summer :] Anyways here are the specs. Please drop some comments, criticism, and your star rating (out of 5 stars) for these specs. My computer is customized for entertainment/gaming reasons. Current games I have are; The Settlers VI, Civilization III & IV, Counter-Strike 1.6 & Source, Sim City 4. I want to be able to play it at a stable speed without any performance issue/lag. Right now I have those issues since this computer, so to say.. Crap. Genuine Windows Vista Home Premium with Service Pack 1 (64-bit) AMD Phenom II X4 940 quad-core processor [3.0GHz] FREE UPGRADE! 4GB DDR2-800MHz dual channel SDRAM [4x1024] from 3GB 320GB 7200 rpm SATA 3Gb/s hard drive 1GB NVIDIA GeForce 9800GT [2 DVI, HDMI and VGA adapters] Primary optical drive: LightScribe 16X max. DVD+/-R/RW SuperMulti drive All this comes at about $1100. (Moderator edit: post moved to more appropriate forum. jgw) Edited by jgweed, 20 May 2009 - 07:52 AM.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824338.6/warc/CC-MAIN-20181213010653-20181213032153-00075.warc.gz
CC-MAIN-2018-51
962
13
https://issues.fluidproject.org/browse/SJRK-462
code
Currently the staging site built from the main looks identical to the floe stories production site. In fact the floe stories site uses the staging site to demo the storytelling tool. However, this is problematic because they look identical but when you change to the staging links to the browser stories are for those that are written in the staging site but not those from the floe stories site. It's confusing for a user. We should probably have a "nightly" build site deployed from main. The nightly should include all of the features like users accounts and etc. Each published site should have their own staging sites so that updates to them can be tested without effecting the published site.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320299894.32/warc/CC-MAIN-20220129002459-20220129032459-00354.warc.gz
CC-MAIN-2022-05
698
2
http://fentonia.com/wori10349.html
code
Foto: Shutterstock To je bilo pre sedam meseci. Incestuous Families: An Ecological Approach to Understanding and Treatment. That child is now 17. Attempts have been made to describe motivational categories of incest. — for help with English-Tamil and German-Tamil dictionary• It has often been argued that incest between age peers with neither partner more than 5 years older than the other is nonabusive, mutually desired, and often consists of nothing more than experimentation. ja ti se ne divim.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585120.89/warc/CC-MAIN-20211017021554-20211017051554-00270.warc.gz
CC-MAIN-2021-43
503
6
http://www.wowinterface.com/forums/showthread.php?t=42575&goto=nextoldest
code
When I played WoW on my windows box, I had an AddOns button on the game menu (what you get when you hit escape, or click the button next to the ? on the bottom). Now that I'm running Linux (long story) I've finally gotten around to installing addons again, and I have no clue how to get that button. Help? If it was in the game menu itself, it was an addon that put it there. Did this button bring up a menu to enable/disable addons? Then perhaps it was Addon Control Panel? "You'd be surprised how many people violate this simple principle every day of their lives and try to fit square pegs into round holes, ignoring the clear reality that Things Are As They Are." -Benjamin Hoff, The Tao of Pooh
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864191.74/warc/CC-MAIN-20180621153153-20180621173153-00327.warc.gz
CC-MAIN-2018-26
699
3
https://www.programmableweb.com/api/lottorisq
code
Sorry, no developers found for this API. Sorry, no mashups for this API. ||The Blackout Rugby API is designed for use in the integration of rugby data in applications. The RESTful API returns responses in JSON format. Blackout Rugby is a sports management game.||Sports||10.29.2017| ||Abios is a Stockholm-based esports company that provides engaging data and statistics services. The Abios Esports API provides access to the broad esports games database. Use the API to integrate...||Sports||10.20.2017| ||The Scryfall API supports the programmatic integration of the Scryfall card data. The API is a useful platform for exposing the information available on the regular site in easy-to-consume formats....||Games||10.19.2017| ||Interact is an AI based Tech Hiring Platform that allows enterprises to conduct Secure Assessments and Video Interviews, helping them build teams up to 5X faster. With Interact, you can create...||Software-as-a-Service||10.03.2017| ||The TRBMB API generates "That Really Blanks my Blank" phrases based on randomized words. The API returns JSON formatted arrays.||Text||10.02.2017|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806509.31/warc/CC-MAIN-20171122065449-20171122085449-00794.warc.gz
CC-MAIN-2017-47
1,110
7
http://meta.math.stackexchange.com/users/28682/pycthon
code
Top Network Posts - 27run python from atom - 20initialize a vector to zeros C++/C++11 - 20How do I invoke a text editor from the terminal? - 19Selecting multiple lines in Atom - 17What are the pros and cons of each way to initialize an expression? - 15hot code loading in haskell - 13Generate random number's in C++ at compile time? - View more network posts → Keeping a low profile. This user hasn't posted... yet.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00002-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
417
11
https://ciscomarketing.jiveon.com/thread/21364
code
I'm trying to find a replacement for L-UCSS-CMBE-1-50, the EOS announcement says that the parts for BE5K can be used instead but how transparent is this? If I select the L-UCSS-BE-KENH-1-1 (qty 50) then I would also have to select UCSS for voicemail L-UCSS-BE-KVM-1-1 (qty 50), just to replace part L-UCSS-CMBE-1-50, correct? What about those customers looking to add licenses to their older versions of Business Edition? For example this license -> CUCM-BE-10USR, the EOS announcement indicates the 5K as the new skus to use and it says that is just a change in name but not functionality. However, as far asI know if a customer buys any of the 5K licenses they would get 7.1.5 version not any of the older versions, correct? so in order to provide a 5K license we have to warn the customer that they should move to version 7.1.5. This is not just a direct replacement like the EOS implies. Any assistance would be greatly appreciated, I haven't had any luck with the UCSS team, they do not know what part numbers to use for the CMBE licenses since this L-UCSS-CMBE-1-50 is discontinued.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540491871.35/warc/CC-MAIN-20191207005439-20191207033439-00507.warc.gz
CC-MAIN-2019-51
1,088
4
http://www.perlmonks.org/?node_id=392763
code
in reply to The Great Computer Language Shootout I bet if we wrote everything in machine language, it would run really fast - but the programming time would be horrendous. PERL beats other languages not because of its speed - though it is quite fast - but because of its power and ease of use. There are very few things it can't do, and you can always use C or C++ modules for the parts that require more speed. I'd personally either ignore the benchmarks (nobody who uses PERL really cares), or go out and write better code to improve the language. Complaining about the situation isn't going to do much.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645538.8/warc/CC-MAIN-20180318052202-20180318072202-00336.warc.gz
CC-MAIN-2018-13
605
3
https://community.developers.refinitiv.com/questions/63670/significance-of-negative-count-data-in-get-timeser.html
code
When I request intraday historical data using the `get_timeseries` function, I occasionally receive entries with NaN prices, a count of -1 and some positive volume figure throughout the entire trading day. What is the practical significance of these data entries? You can replicate it using the following code examples (Note: time is UTC!): df = ek.get_timeseries('CRM', start_date='2020-07-24T20:00:00', end_date='2020-07-24T21:50:00', interval='minute') df.head() df = ek.get_timeseries('CREE.O', start_date='2020-07-24T15:40:00', end_date='2020-07-24T15:50:00', interval='minute') df.head() Unfortunately, I could not find any explanation on this forum as to what these rows represent. The value of -1 returned for the COUNT field, or the equivalent "#N/A" value returned by RHistory function in Excel for TRDPRC_1.Count field, signifies that there were no trades within the time interval that satisfy the criteria to be included into open, high, low, close summarization. For US stock exchanges the rules that govern which trades, times and condition codes affect open, high, low and close prices are published by Consolidated Tape Association. The types of trades that are excluded from open, high, low and close include odd-lots, average price trades and cash trades. You can find the complete rules here: https://www.ctaplan.com/tech-specs under CTS Binary Output Specifications. In your example for CREE.O on 2020-07-24 between 15:40 and 15:41 there was one trade, which was excluded from open, high, low, close summarization because it was an average price trade. This forum is not the best place to ask about content questions. For an authoritative answer to any content questions, the best resource is the Refinitiv Content Helpdesk. This forum is dedicated to things specific to the use of Eikon APIs. The moderators here do not have deep expertise in every type of content available through Eikon. The Refinitiv Content Helpdesk can be reached using Contact Us capability in your Eikon application. Or by calling the Helpdesk number in your country. Or at https://my.refinitiv.com/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057274.97/warc/CC-MAIN-20210921221605-20210922011605-00449.warc.gz
CC-MAIN-2021-39
2,094
12
http://www.ck12.org/biology/Water-and-Life/
code
A list of student-submitted discussion questions for Water and Life. To describe images using words using the Visual Literacy strategy. To stress understanding of a concept by summarizing the main idea and applying that understanding to create visual aids and generate questions and comments using a Concept Matrix. Presents the student with the challenge of designing an experiment to investigate a global phenomenon. Provides information on different and conflicting results from ocean acidification based on organismal response and latitude. Looks at water supply worldwide, how much is fresh and salt and where the reserves are located. Covers life in anoxic environments exploring the chemical basis of life, addressing exobiology, evolution, and ecology. Learn about one of the latest theories on how the Earth became the Earth. These flashcards help you study important terms and vocabulary from Water and Life.
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111612.51/warc/CC-MAIN-20160428161511-00031-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
918
8
https://martinsblog.dk/active-directory-move-fsmo-roles-with-powershell/
code
When moving FSMO roles the old fashioned way, you use MMC and move the roles each individually, it takes a little time, but it’s somewhat troublesome. BUT, this can be achieved much quicker with Powershell 🙂 Here is how to transfer all 5 FSMO roles: Move-ADDirectoryServerOperationMasterRole -Identity DC01 –OperationMasterRole PDCEmulator,RIDMaster,InfrastructureMaster,SchemaMaster,DomainNamingMaster Where “DC01” above is the TARGET DC. Check with netdom command afterwards:
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585186.33/warc/CC-MAIN-20211018000838-20211018030838-00354.warc.gz
CC-MAIN-2021-43
488
6
https://life-improver.com/englishusage/learn-english-is-it-alright-or-allright/
code
In practice I find both spellings being used. From a logical point of view, "allright" (as in: "all's right — everything is fine") seems correct. However, I recall hearing that "alright" is the preferable variant. Is there consensus over which to use? Do they possibly even mean something different?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00028.warc.gz
CC-MAIN-2023-50
301
2
https://blog.wolfram.com/2018/06/21/weve-come-a-long-way-in-30-years-but-you-havent-seen-anything-yet/?source=frontpage-latest-news
code
We’ve Come a Long Way in 30 Years (But You Haven’t Seen Anything Yet!) Technology for the Long Term On June 23 we celebrate the 30th anniversary of the launch of Mathematica. Most software from 30 years ago is now long gone. But not Mathematica. In fact, it feels in many ways like even after 30 years, we’re really just getting started. Our mission has always been a big one: to make the world as computable as possible, and to add a layer of computational intelligence to everything. Our first big application area was math (hence the name “Mathematica”). And we’ve kept pushing the frontiers of what’s possible with math. But over the past 30 years, we’ve been able to build on the framework that we defined in Mathematica 1.0 to create the whole edifice of computational capabilities that we now call the Wolfram Language—and that corresponds to Mathematica as it is today. From when I first began to design Mathematica, my goal was to create a system that would stand the test of time, and would provide the foundation to fill out my vision for the future of computation. It’s exciting to see how well it’s all worked out. My original core concepts of language design continue to infuse everything we do. And over the years we’ve been able to just keep building and building on what’s already there, to create a taller and taller tower of carefully integrated capabilities. It’s fun today to launch Mathematica 1.0 on an old computer, and compare it with today: Yes, even in Version 1, there’s a recognizable Wolfram Notebook to be seen. But what about the Mathematica code (or, as we would call it today, Wolfram Language code)? Well, the code that ran in 1988 just runs today, exactly the same! And, actually, I routinely take code I wrote at any time over the past 30 years and just run it. Of course, it’s taken a lot of long-term discipline in language design to make this work. And without the strength and clarity of the original design it would never have been possible. But it’s nice to see that all that daily effort I’ve put into leadership and consistent language design has paid off so well in long-term stability over the course of 30 years. It’s Grown So Much Back in 1988, Mathematica was a big step forward in high-level computing, and people were amazed at how much it could do. But it’s absolutely nothing compared to what Mathematica and the Wolfram Language can do today. And as one way to see this, here’s how the different major areas of functionality have “lit up” between 1988 and today: There were 551 built-in functions in 1988; there are now more than 5100. And the expectations for each function have vastly increased too. The concept of “superfunctions” that automate a swath of algorithmic capability already existed in 1988—but their capabilities pale in comparison to our modern superfunctions. Back in 1988 the core ideas of symbolic expressions and symbolic programming were already there, working essentially as they do today. And there were also all sorts of functions related to mathematical computation, as well as to things like basic visualization. But in subsequent years we were able to conquer area after area. Partly it’s been the growth of raw computer power that’s made new areas possible. And partly it’s been our ability to understand what could conceivably be done. But the most important thing has been that—through the integrated design of our system—we’ve been able to progressively build on what we’ve already done to reach one new area after another, at an accelerating pace. (Here’s a plot of function count by version.) I recently found a to-do list I wrote in 1991—and I’m happy to say that now, in 2018, essentially everything on it has been successfully completed. But in many cases it took building a whole tower of capabilities—over a large number of years—to be able to achieve what I wanted. From the very beginning—and even from projects of mine that preceded Mathematica—I had the goal of building as much knowledge as possible into the system. At the beginning the knowledge was mostly algorithmic, and formal. But as soon we could routinely expect network connectivity to central servers, we started building in earnest what’s now our immense knowledgebase of computable data about the real world. Back in 1988, I could document pretty much everything about Mathematica in the 750-page book I wrote. Today if we were to print out the online documentation it would take perhaps 36,000 pages. The core concepts of the system remain as simple and clear as they ever were, though—so it’s still perfectly possible to capture them even in a small book. How the World Has Changed Thirty years is basically half the complete history of modern digital computing. And it’s remarkable—and very satisfying—that Mathematica and the Wolfram Language have had the strength not only to persist, but to retain their whole form and structure, across all that time. Thirty years ago Mathematica (all 2.2 megabytes of it) came in boxes available at “neighborhood software stores”, and was distributed on collections of floppy disks (or, for larger computers, on various kinds of magnetic tapes). Today one just downloads it anytime (about 4 gigabytes), accessing its knowledgebase (many terabytes) online—or one just runs the whole system directly in the Wolfram Cloud, through a web browser. (In a curious footnote to history, the web was actually invented back in 1989 on a collection of NeXT computers that had been bought to run Mathematica.) Thirty years ago there were “workstation class computers” that ran Mathematica, but were pretty much only owned by institutions. In 1988, PCs used MS-DOS, and were limited to 640K of working memory—which wasn’t enough to run Mathematica. The Mac could run Mathematica, but it was always a tight fit (“2.5 megabytes of memory required; 4 megabytes recommended”)—and in the footer of every notebook was a memory gauge that showed you how close you were to running out of memory. Oh, yes, and there were two versions of Mathematica, depending on whether or not your machine had a “numeric coprocessor” (which let it do floating-point arithmetic in hardware rather than in software). Back in 1988, I had got my first cellphone—which was the size of a shoe. And the idea that something like Mathematica could “run on a phone” would have seemed preposterous. But here we are today with the Wolfram Cloud app on phones, and Wolfram Player running natively on iPads (and, yes, they don’t have virtual memory, so our tradition of tight memory management from back in the old days comes in very handy). In 1988, computers that ran Mathematica were always things you plugged into a power outlet to use. And the notion of, for example, using Mathematica on a plane was basically inconceivable (well, OK, even in 1981 when I lugged my Osborne 1 computer running CP/M onto a plane, I did find one power outlet for it at the very back of a 747). It wasn’t until 1991 that I first proudly held up at a talk a Compaq laptop that was (creakily) running Mathematica off batteries—and it wasn’t routine to run Mathematica portably for perhaps another decade. For years I used to use 1989^1989 as my test computation when I tried Mathematica on a new machine. And in 1989 I would usually be counting the seconds waiting for the computation to be finished. (1988^1988 was usually too slow to be useful back in 1988: it could take minutes to return.) Today, of course, the same computation is instantaneous. (Actually, a few years ago, I did the computation again on the first Raspberry Pi computer—and it again took several seconds. But that was a $25 computer. And now even it runs the computation very fast.) The increase in computer speed over the years has had not only quantitative but also qualitative effects on what we’ve been able to do. Back in 1988 one basically did a computation and then looked at the result. We talked about being able to interact with a Mathematica computation in real time (and there was actually a demo on the NeXT computer that did a simple case of this even in 1989). But it basically took 18 years before computers were routinely fast enough that we could implement Manipulate and Dynamic—with “Mathematica in the loop”. I considered graphics and visualization an important feature of Mathematica from the very beginning. Back then there were “paint” (bitmap) programs, and there were “draw” (vector) programs. We made the decision to use the then-new PostScript language to represent all our graphics output resolution-independently. We had all sorts of computational geometry challenges (think of all those little shattered polygons), but even back in 1988 we were able to generate resolution-independent 3D graphics, and in preparing for the original launch of Mathematica we found the “most complicated 3D graphic we could easily generate”, and ended up with the original icosahedral “spikey”—which has evolved today into our rhombic hexecontahedron logo: In a sign of a bygone software era, the original Spikey also graced the elegant, but whimsical, Mathematica startup screen on the Mac: Back in 1988, there were command-line interfaces (like the Unix shell), and there were word processors (like WordPerfect). But it was a new idea to have “notebooks” (as we called them) that mixed text, input and output—as well as graphics, which more usually were generated in a separate window or even on a separate screen. Even in Mathematica 1.0, many of the familiar features of today’s Wolfram Notebooks were already present: cells, cell groups, style mechanisms, and more. There was even the same doubled-cell-bracket evaluation indicator—though in those days longer rendering times meant there needed to be more “entertainment”, which Mathematica provided in the form of a bouncing-string-figure wait cursor that was computed in real time during the vertical retrace interrupt associated with refreshing the CRT display. In what would now be standard good software architecture, Mathematica from the very beginning was always divided into two parts: a kernel doing computations, and a front end supporting the notebook interface. The two parts communicated through the MathLink protocol (still used today, but now called WSTP) that in a very modern way basically sent symbolic expressions back and forth. Back in 1988—with computers like Macs straining to run Mathematica—it was common to run the front end on a local desktop machine, and then have a “remote kernel” on a heftier machine. Sometimes that machine would be connected through Ethernet, or rarely through the internet. More often one would use a dialup connection, and, yes, there was a whole mechanism in Version 1.0 to support modems and phone dialing. When we first built the notebook front end, we thought of it as a fairly thin wrapper around the kernel—that we’d be able to “dash off” for the different user interfaces of different computer systems. We built the front end first for the Mac, then (partly in parallel) for the NeXT. Within a couple of years we’d built separate codebases for the then-new Microsoft Windows, and for X Windows. But as we polished the notebook front end it became more and more sophisticated. And so it was a great relief in 1996 when we managed to create a merged codebase that ran on all platforms. And for more than 15 years this was how things worked. But then along came the cloud, and mobile. And now, out of necessity, we again have multiple notebook front end codebases. Maybe in a few years we’ll be able to merge them again. But it’s funny how the same issues keep cycling around as the decades go by. Unlike the front end, we designed the kernel from the beginning to be as robustly portable as possible. And over the years it’s been ported to an amazing range of computers—very often as the first serious piece of application software that a new kind of computer runs. From the earliest days of Mathematica development, there was always a raw command-line interface to the kernel. And it’s still there today. And what’s amazing to me is how often—in some new and unfamiliar situation—it’s really nice to have that raw interface available. Back in 1988, it could even make graphics—as ASCII art—but that’s not exactly in so much demand today. But still, the raw kernel interface is what for example wolframscript uses to provide programmatic access to the Wolfram Language. There’s much of the earlier history of computing that’s disappearing. And it’s not so easy in practice to still run Mathematica 1.0. But after going through a few early Macs, I finally found one that still seemed to run well enough. We loaded up Mathematica 1.0 from its distribution floppies, and yes, it launched! (I guess the distribution floppies were made the week before the actual release on June 23, 1988; I vaguely remember a scramble to get the final disks copied.) Needless to say, when I wanted to livestream this, the Mac stopped working, showing only a strange zebra pattern on its screen. Whacking the side of the computer (a typical 1980s remedy) didn’t do anything. But just as I was about to give up, the machine suddenly came to life, and there I was, about to run Mathematica 1.0 again. I tried all sorts of things, creating a fairly long notebook. But then I wondered: just how compatible is this? So I saved the notebook on a floppy, and put it in a floppy drive (yes, you can still get those) on a modern computer. At first, the modern operating system didn’t know what to do with the notebook file. But then I added our old “.ma” file extension, and opened it. And… oh my gosh… it just worked! The latest version of the Wolfram Language successfully read the 1988 notebook file format, and rendered the live notebook (and also created a nice, modern “.nb” version): There’s a bit of funny spacing around the graphics, reflecting the old way that graphics had to be handled back in 1988. But if one just selects the cells in the notebook, and presses Shift + Enter, up comes a completely modern version, now with color outputs too! The Path Ahead Before Mathematica, sophisticated technical computing was at best the purview of a small “priesthood” of technical computing experts. But as soon as Mathematica appeared on the scene, this all changed—and suddenly a typical working scientist or mathematician could realistically expect to do serious computation with their own hands (and then to save or publish the results in notebooks). Over the past 30 years, we’ve worked very hard to open progressively more areas to immediate computation. Often there’s great technical sophistication inside. But our goal is to be able to let people translate high-level computational thinking as directly and automatically as possible into actual computations. The result has been incredibly powerful. And it’s a source of great satisfaction to see how much has been invented and discovered with Mathematica over the years—and how many of the world’s most productive innovators use Mathematica and the Wolfram Language. But amazingly, even after all these years, I think the greatest strengths of Mathematica and the Wolfram Language are only just now beginning to become broadly evident. Part of it has to do with the emerging realization of how important it is to systematically and coherently build knowledge into a system. And, yes, the Wolfram Language has been unique in all these years in doing this. And what this now means is that we have a huge tower of computational intelligence that can be immediately applied to anything. To be fair, for many of the past 30 years, Mathematica and the Wolfram Language were primarily deployed as desktop software. But particularly with the increasing sophistication of the general computing ecosystem, we’ve been able in the past 5–10 years to build out extremely strong deployment channels that have now allowed Mathematica and the Wolfram Language to be used in an increasing range of important enterprise settings. Mathematica and the Wolfram Language have long been standards in research, education and fields like quantitative finance. But now they’re in a position to bring the tower of computational intelligence that they embody to any area where computation is used. Since the very beginning of Mathematica, we’ve been involved with what’s now called artificial intelligence (and in recent times we’ve been leaders in supporting modern machine learning). We’ve also been very deeply involved with data in all forms, and with what’s now called data science. But what’s becoming clearer only now is just how critical the breadth of Mathematica and the Wolfram Language is to allowing data science and artificial intelligence to achieve their potential. And of course it’s satisfying to see that all those capabilities that we’ve built over the past 30 years—and all the design coherence that we’ve worked so hard to maintain—are now so important in areas like these. The concept of computation is surely the single most important intellectual development of the past century. And it’s been my goal with Mathematica and the Wolfram Language to provide the best possible vehicle to infuse high-level computation into every conceivable domain. For pretty much every field X (from art to zoology) there either is now, or soon will be, a “computational X” that defines the future of the field by using the paradigm of computation. And it’s exciting to see how much the unique features of the Wolfram Language are allowing it to help drive this process, and become the “language of computational X”. Traditional non-knowledge-based computer languages are fundamentally set up as a way to tell computers what to do—typically at a fairly low level. But one of the aspects of the Wolfram Language that’s only now beginning to be recognized is that it’s not just intended to be for telling computers what to do; it’s intended to be a true computational communication language, that provides a way of expressing computational thinking that’s meaningful both to computers and to humans. In the past, it was basically just computers that were supposed to “read code”. But like a vast generalization of the idea of mathematical notation, the goal with the Wolfram Language is to have something that humans can readily read, and use to represent and understand computational ideas. Combining this with the idea of notebooks brings us the notion of computational essays—which I think are destined to become a key communication tool for the future, uniquely made possible by the Wolfram Language, with its 30-year history. Thirty years ago it was exciting to see so many scientists and mathematicians “discover computers” through Mathematica. Today it’s exciting to see so many new areas of “computational X” being opened up. But it’s also exciting to see that—with the level of automation we’ve achieved in the Wolfram Language—we’ve managed to bring sophisticated computation to the point where it’s accessible to essentially anyone. And it’s been particularly satisfying to see all sorts of kids—at middle-school level or even below—start to get fluent in the Wolfram Language and the high-level computational ideas it provides access to. If one looks at the history of computing, it’s in many ways a story of successive layers of capability being added, and becoming ubiquitous. First came the early languages. Then operating systems. Later, around the time Mathematica came on the scene, user interfaces began to become ubiquitous. A little later came networking and then large-scale interconnected systems like the web and the cloud. But now what the Wolfram Language provides is a new layer: a layer of computational intelligence—that makes it possible to take for granted a high level of built-in knowledge about computation and about the world, and an ability to automate its application. Over the past 30 years many people have used Mathematica and the Wolfram Language, and many more have been exposed to their capabilities, through systems like Wolfram|Alpha built with them. But what’s possible now is to let the Wolfram Language provide a truly ubiquitous layer of computational intelligence across the computing world. It’s taken decades to build a tower of technology and capabilities that I believe are worthy of this—but now we are there, and it’s time to make this happen. But the story of Mathematica and the Wolfram Language is not just a story of technology. It’s also a story of the remarkable community of individuals who’ve chosen to make Mathematica and the Wolfram Language part of their work and lives. And now, as we go forward to realize the potential for the Wolfram Language in the world of the future, we need this community to help explain and implement the paradigm that the Wolfram Language defines. Needless to say, injecting new paradigms into the world is never easy. But doing so is ultimately what moves forward our civilization, and defines the trajectory of history. And today we’re at a remarkable moment in the ability to bring ubiquitous computational intelligence to the world. But for me, as I look back at the 30 years since Mathematica was launched, I am thankful for everything that’s allowed me to single-mindedly pursue the path that’s brought us to the Mathematica and Wolfram Language of today. And I look forward to our collective effort to move forward from this point, and to contribute to what I think will ultimately be seen as a crucial element in the development of technology and our world. Great anniversary. I have been using Mathematica for 62% of my coding life (late starter; I got Mathematica 1.1 in 1989 and I started coding in 1971 at the age of 25). It is the oldest program I have used continuously since I started. BBEdit, which just crossed 25 years, is next. Looking forward to great things in the next 30 years. So, when does the new x.0 Version come out? It’s been a couple years since the last one… I assume it’s coming out this summer? Do you guys have a tentative or definitive date for it yet?? I’d love to buy an upgrade for the home/hobby desktop version if/when it’s available and/or on sale (limited funds)… Seems like every time I ask you guys are cagey and like “we don’t know, but buy a subscription.” I’d love it if you guys would like actually publish a rough roadmap of when minor/ major releases were tentatively expected to be out. I get that things are always ‘in development’ (until they’re not, and they ship), and things are “ready when they’re ready,” ’cause you don’t want ship buggy code. But, a rough timeframe for major releases would be nice… So, folks wouldn’t have to keep “asking” about it… Thanks for your comment! Yes, we intend to ship an integer release this year! However, we are in development building things that have never been built before, so we unfortunately can’t provide even a tentative ship date until all new features and functions have been built and tested. We are definitely not trying to keep the release date a secret by any means. When everything has been tested and are sure that the functions are going to operate appropriately, we’ll have a better idea of a timeline for it to ship. At this point though, the best we can say is that it will be sometime this year. Well, thanks for the somewhat update. :) Just always feels a bit like “Surprise! Here’s a new version we’ve told you nothing about ahead of time!” Would just be nice if there was a bit of foreshadowing / forewarning. Like “we’re working on version 12, and hope to have it done by late Q3 or early Q4, and here are some of the things we’re working on trying to build in or improve upon.” I mean, surely, as a company, you have internal [project management] roadmaps and goal posts for getting things done by such and such a date (else projects would take 5 years, or some unknown length of time, to ship, if ever). Would just be nice if we got some hint of upcoming anticipated “major mileposts” like x.0 releases & x.n releases. But, I get it that it’s not always 100% clear when a specific algorithm or piece of code will be ready to go. Still, it seems like many companies (say, Intel / AMD) will publish public roadmaps of anticipated products / features that are in development, and when they’re tentatively slated for, or update if some specific feature gets pushed back to a subsequent release, etc. Anyway, won’t beat a dead horse. Too much. :) Good to hear that a x.0 release is coming up shortly / eventually. Even if the specific date is still, perhaps, up in the air. Would just be good to know when, in case folks want/need to budget for purchases, license upgrades, etc. ^_^ Can’t wait to see what’s new/improved in v12.0 if/when it ships. I’m sure it’ll be leaps and bounds above v9.0, which I think is my current version at home? Can’t wait to try out the new/improved Style Transfer algorithms if/when I manage to upgrade to the latest version… Thank you for reaching out. At this time, the most accurate response we can give is that v.12 will release sometime in the fall/winter of 2018. Our development team is currently hard at work on new features for v.12 right now, (as you noted in your comment) it is impossible to say exactly when new features (and which features) are going to be completely ready to deploy. If you would like to get an inside look at some of the new features that are being developed for the next release, I would suggest that you check out some of Stephen’s livestreams via Twitch, YouTube, and Facebook. These are truly unique events designed to give the public an inside look at what we’re working on. Each livestream is an actual internal development meeting between Stephen and the development folks spearheading the creation of new functions to be included in the next release. Further, these livestreams are interactive! Each platform includes a chat feature where viewers can submit questions and comments related to the meeting’s topic. Most of these questions and comments submitted are discussed by Stephen and the developers during the live meeting. We’ve already had instances where viewers have actually named certain new functions or provided information that has led to our team creating a new function to address the needs of users. So if you want an inside look at what is being worked on for inclusion in the next version of Mathematica, check out one of these streams. All streams are archived on each of the platforms, so you can always visit Stephen’s website (http://www.stephenwolfram.com/livestreams/) to view past development meetings. Maybe I’ll track down some of the live streams. Sounds … interesting. ^_^ (Only a couple months left this year! Hope the new release will be interesting and full of sweet new / improved features. And, maybe a sale on “upgrades” or two would be nice, at some point. Will be neat to play with the Image Style Transfer function(s). Pretty sure I’m still on v9, so will be nice to eventually bump up to v12 functionality and all that brings… When I get around to it.) Nice. I hear that you give free licenses to celebrate :) We’ll go ahead and add that suggestion to our files :) Congratulations upon 30y! I use Mma 7.0 regularly. Mma’s methodical, modular and scalable approach to “doing mathematics by computer” has shaped my approach to analog circuit design. Thank you. I was thrilled when, in 1987, I learned that a new symbolic computation engine had been developed that would run on my 528K MacPlus. As soon as Mathematica became available, I bought a copy, started reading Stephen’s huge tome that described how to use it, prepared a presentation on Mathematica for my colleagues at work, and convinced my employer to purchase a copy. I’ve been a Mathematica enthusiast ever since. It would be cool if you were to publish Mathematica 1.0 on the Internet Archive so anyone could try it out: https://archive.org/details/softwarelibrary_mac So happy to have worked with Mathematica since 1992, approx. the 2.2 era. (When did we stop italicizing “Mathematica”?) Thank you for a quarter century of diversion and learning—among the things I’ve learned is that quality counts for something—and I look forward to seeing what’s next! Congratulations to Stephen and the Mathematica crew, I started with SMP in ’86 and every time I use Mathematica I can appreciate the evolution it has gone through in these years. I naturally expect great developments in the future of Mathematica. Best wishes. I have been using Mathematica on the Mac since the very early days, when you could actually talk to Stephen in the hall at Moscone Center. Love it! Cannot do without it. I used it TODAY as a matter of fact. A singular vision, and distinctly singularly projected – and we see how that can be a Very Good Thing! I’m pleased, if just for that. I was a bit delayed coming to the party. I could have sworn I’d seen Mathematica boxes and their contained real manuals and disks on other people’s desks at Whitbread back in 1984, but I suppose that can’t be possible. Used wolframalpha.com for the first time a few months ago. Please, please don’t forget your first love: math! Mathematica is my main software for researching the mysteries of math. Agreed. Love Mathematica! Running v9, I think? Can’t wait for v12 to come out, hopefully sometime soon? :) Really want to try the Deep Style (Style Transfer) algorithms. I use Mathematica all the time to plumb the mysteries of mathematics. I’ve even managed to solve (of a sort, to my own satisfaction) some inquiries of my own devising (one of which I worked on, on and off, for about a decade; a musing here, a graph there, trying to figure it out, taking long breaks, and coming back to it, then putting it down again, and coming back at it fresh months or more later). At some point, I should really write it all out and publish it somewhere, before I die. ;) Heh. I keep wanting to “solve” just a few more cases / applications. I guess I should just write little bits incrementally and publish them on viXra, or whatever… Anyway, truly a great math / computation / graphing / visualization engine… ^_^ What happens when you enter the linked Wolfram Cloud code into Mathematica 1.0 on one of those early era computers? https://mathematica.wolframcloud.com/app/objects/13b99f2f-ba91-485e-bcd4-b5544c79873b This is very difficult to say since some of features didn’t even exist in version 1.0. Further, we don’t have one of the old computers handy to test this out for you. What we can do though is ask some individuals who have had a hand in the evolution of Mathematica’s development over the years and see if they might be able to offer some insight. Most likely it simply wouldn’t understand what you’re talking about, since the cloud functionality wasn’t added to Mathematica until just a few years ago. So, putting “Cloud Access” code into an early (1.0) notebook wouldn’t do much of anything, since the Cloud, let alone functions to access data from it had neither been invented nor coded into Mathematica yet, back then. Most likely it would simply do nothing or generate an error of some kind? ;) Could not have done my work in the last 20 years without Mathematica. Congratulations! I can’t even imagine how it must feel to design something so robust and keep it growing and relevant for such a long time. The improvements over the last years, since I started using it at the end of highschool, have been amazing. (One of my math teachers was a contributor to the Wolfram Demonstrations Project). Today as a researcher in academia I still use it a lot and it is always very useful for many purposes. However, I can see that due to the problem of expensive licenses and heavy installation files (but especially due to licenses) it is losing a lot of ground to open source alternatives like Python and Jupyter notebooks. It would be nice if at some point Wolfram decided to release the Wolfram Language for free and then just charge for the cloud services, the industry integrations and some databases in the same way that other companies do around python. Otherwise I think it will never be a language of universal acceptance. Hi, Santiago. Thanks for your thoughtful comment! You may be interested to see all of the services that actually are available for free: http://www.wolfram.com/open-materials/ While the full version of Mathematica isn’t available for free, the Programming Lab actually is and that basically gives a cloud-based version of Mathematica. Additionally, as I’m sure you know, Mathematica is available for free on the Raspberry Pi. This was a very interesting presentation on the history and recent Mathematica developments and usage, and compliment included for the information that is provided in the sub-links too. I’ll add kudo’s for the company and the excellent employees who represent the software. Best regards and wishes for the future. Thank you for the kind words, Garry! Hi dears, Thanks a lot since from the time I used Mathematica 2 in Keele University on 1997-2001 while was doing my PhD in Appliied Mathematics. I used Mathematica on applying the asymptotics (WKB) method for solving the eigen-value problems arises in the finite elasticity theory. Apart from this interesting software i.e. Mathematica, the lengthy expressions (asymptotic expressions) may not be used. especially while we apply WKB method as a system of 3 or more equations & more than that while this method can be applied for solving a system of equations (the eigen-value problems arises from the theory of Finite Elsticity). with the best regards to all the members of the wolfram team & especially the Great person of Wolfram i.e. Stephen Wolfram Thumbs up for the incredible job! Although, I am not an expert programmer but I found this Mathematica tool very interesting. Congratulations to the team who made this journey possible and best wishes for the future too. I hope someone embeds Deep Learning within Mathematica to help build the repository of built-in or defined functional relationships if possible. Have you had a chance to check out all of our machine learning capabilities? http://www.wolfram.com/featureset/machine-learning/ Congratulations to Stephen and the Mathematica crew, I started with SMP in ’86 and every time I use Mathematica I can appreciate the evolution it has gone through in these years. I naturally expect great developments in the future of Mathematica. Congratulations upon 30y! I have been using Mathematica for my entire life from 1992. It is the oldest program I have used continuously since I started. I do really love Mathematica, the elegance and efficiency of its language and yes: it does make the world as computable as possible, and adds a layer of computational intelligence to everything. Thank you Stephen Wolfram and his incredible team.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00320.warc.gz
CC-MAIN-2023-14
35,337
122
https://hackaday.com/tag/fpc/
code
Seeed Studios has a new version of the Arduino that they’re calling the Seeeduino Film. Instead of the traditional fiberglass substrate they’ve used a resin material to produce a Flexible Printed Circuit (FPC). In addition to its flexibility their aim with this prototype was to keep it modular. From what we can see each of the four squares is a different component in the Arduino system. The photo above has the USB interface on the nearest node, then the power regulator, the microprocessor, and finally the remaining peripheral connections. This material can easily be cut with a pair of scissors so the programming section can be removed once the firmware is burned to the chip. It will be interesting to see final pricing and package options. We wouldn’t mind having an FPC ATmega168 breakout board around, but specifially this would fit nicely in a watch band if you were building your own wristwatch.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00411.warc.gz
CC-MAIN-2023-14
914
1
https://jollans.com/tiki/tiki-index.php?page=MultilangVB6MajorFeatures
code
Multi-Language Add-In for Visual Basic 6 Add localization support late in development All localization experts recommend planning localization right from the beginning of your software development project. Most software developers do not follow this advise. Often, the requirement to localize a project is not even raised before the development has been completed. Controls database to specify localizable properties The Add-In detects the localizable texts in the controls on your Forms, UserControls and UserDocuments based on information in a controls database. This database indicates exactly which properties require translation. It can easily be extended to handle additional controls which you use in your projects. Detect strings in your source code The Add-In scans the source code and detects all strings. Select texts for localization Not all texts in a project require translation. In fact, Visual Basic program often contain a lot of text strings which must not be translated. With the Multi-Language Add-In, the programmer can select exactly those texts which require translation. Hide lines which do not require translation Strings in the source code which do not require translation can be hidden, by adding the comment 'MLHIDE to the end of the line. This can be added via the Add-In, or using the code editor. It is good practice either to select or to hide each individual string in your project. This makes it easy to locate new strings which are added to the source code at some later stage. Filter using regular expressions A significant job for the programmer (and not the translator) is to identify exactly which texts in the source code require translation. Often you can use simple rules to select texts, or alternatively to hide them. Using this feature, you can specify a regular expression, which is used to match either: - a text string or - the complete code line containing a text string. By matching the complete code line, you can easily detect where strings are used in specific function calls, or for example, in a select case statement. Excel export and import If you are not able to translate the texts yourself, you will have to pass them on to a translator. The easiest way to do this is to export the texts to an Excel file, let the translator enter translations using Excel and then import the translations back into the Add-Ins's project database. The Add-In supports two different Excel formats: - a simple format using a single worksheet and no macros - a three worksheet format which provides more context information and uses Excel macros to ensure consistency between the worksheets and to provide additional features Global translations database and translation memory Aside from the individual project databases, the Add-In stores all translations in a global translations database, where they are indexed according to the words contained in the texts. When the Add-In detects an exact match with a string in the global database, then it will use the stored translation automatically. This is well suited to handling common terms such as OK and Cancel. When you edit a translation, you can use the translation memory feature to view previous translations of texts containing one or more of the same words. If you are able to translate the texts yourself, then this is a great help. In particular, it helps you to use technical terms in a consistent manner. Generation of single or multiple language versions - Generate multiple versions of your application, each for a single language or - Generate a single version supporting multiple languages Add support to your project to switch the language of the user interface when the program is running. Read resource strings in different languages The VB function LoadResString only reads resource strings in the current system language. The Add-In provides an alternative function, to read resource strings in a specified language. Switch language in separately compiled components The Add-In uses an event mechanism to indicate that the language has been changed. Even if your application is made up of separately compiled modules (.exe, .ocx or .dll), the event will still be received by all active components (Forms, UserControls or UserDocuments). The events are generated via the module MLRuntime.dll, which you can distribute freely with your application. Language selection form The Add-In provides a simple form to select the language in your application. The Add-In can add this form to your project and generate code to show the form the application starts. Switch the language used in the form designer window, to preview your Forms, UserControls and UserDocuments in a given language. Import projects which already use resources The Add-In detects existing calls to the VB function LoadResString and imports the associated resource strings. Support for far eastern languages The Add-In provides full support for far eastern languages. The grid editor works with an Input Method Editor (IME). The Add-In provides support for switching the font used in controls when the language is switched. The Add-In contains a flexible search function to find texts in the original language and in the translations. Exclude modules from translation Modules which contain no localizable texts can be excluded from the source code scan.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816070.70/warc/CC-MAIN-20240412194614-20240412224614-00065.warc.gz
CC-MAIN-2024-18
5,328
47
http://m0n0.ch/wall/list/showmsg.php?id=94/70
code
Hm... I was reading through the changelog, but must have missed this I'm curious: why not use the internal DHCP server if I'm doing a little PXE at home? I could, of course, run DHCP on my tftp/PXE server... but I'd rather use m0n0's DHCP if I can. is PXE a really abnormal use case? I find it quite useful at home, but I could be in the minority. As a hidden option, does this mean that I would need to just write it into the XML config directly to enable it? On Thu, 30 Sep 2004, Manuel Kasper wrote: > On 29.09.2004 23:22 -0700, Matt C wrote: > > I just finished testing a simple patch I built to add PXE server > > support to the DHCP server on m0n0wall-1.1. This trivial patch > > adds next-server and filename params to the DHCP zones in > > dhcpd.conf. > > I'd love to see it (in some form) in future versions if possible. > > It's useful to me to support diskless linux hosts here at home. > This is already in 1.2b1 as a hidden option (see the changelog). It > won't appear in the webGUI because I believe that people who run PXE > should not use the built-in DHCP server. > - Manuel
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423992.48/warc/CC-MAIN-20170722102800-20170722122800-00010.warc.gz
CC-MAIN-2017-30
1,092
19
https://support.veeva.com/hc/en-us/articles/4410554143259-Rule-Message-Translation-is-Not-Created-for-All-Languages-in-CRM
code
The Admin would like to have the Validation Rule Messages translated. However, Rule Message Translation records are not created for all languages which are loaded into the Org after the Validation Data Refresh. There should be at least one User with the given language for Rule Message Translation records to be generated for that language's Validation Error Messages. Make sure to have at least one User with the language you need the translation for. CRM Help Documentation: n/a
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00584.warc.gz
CC-MAIN-2023-50
480
4
https://pbskeirah.edublogs.org/2022/12/09/temprature/
code
Temprature is how hot and cold something is. First we learnt what temprature is measured in, it is measured in degrees and celceus, sometimes ferenhight. Then, I answers some word equasions adding degrees and celceus togeather. Lastly I chose some questions and made a DLO answering them. For example: The hottest place on earth is Death Valley.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00806.warc.gz
CC-MAIN-2023-40
345
4
https://communities.sas.com/t5/Base-SAS-Programming/macro-to-generate-series-of-let-statements/td-p/162084?nobounce
code
12-24-2014 02:36 PM i want to create a macro that takes current date and number of loopback months as input and create a series of macro variables capturing last day of each month number of look back months (n) =6 The output should be (6 statements to create 6 variable names) 12-24-2014 02:42 PM Use a data _null_ step with call symput instead: data test; *creating a data set for debugging purposes but can be changed to _null_ so no dataset is created; do i=1 to &nmonths; var_name=catx("_", date, i); var_value=put(intnx('month', &curr_dt, i, e), yymmddn8.); call symput(var_name, var_value); 12-24-2014 02:59 PM %local i inpdte; %do i=1 %to &n.; %let date_&i.=%sysfunc(intnx(month, &inpdte., %eval(&i.*-1), e),yymmddn8.); 12-24-2014 02:59 PM I want to get the %let statement as I will be using these later. When I use a do loop to get the %let statements, it does not recognize the ampersand in the variable name and in the sysfunc statement I was wondering if you can think of any other technique that will produce the % let statements 12-24-2014 09:09 PM May be you should give us the bigger picture especially why you want these %let statements generated explicitly so that we can propose an appropriate solution. If it's really about dynamically generating code then one way to go is a "data _null_" step with put statements where you generate the code and write it to an external file. You then can %include this file so that the generated code inside gets executed. 12-26-2014 10:33 AM Not sure why you need so many macro variables. Personally I do not like the idea of macro "arrays" as I find that most programs are easier to maintain if you use a different coding pattern. The problem with using a macro to generate macro variables that you want to use later is that by default the macro variables are defined in the scope of the sub-macro and so disappear when it ends. One way to deal with this is to force the macros to be made in the GLOBAL macro scope as others have posted above. This can cause trouble with other parts of your code that might want to use those same macro variable names for some other meaning. Here are two methods to allow you define the new macros in the current macro scope (not the scope of the sub macro and not necessarily the GLOBAL scope either). 1) Is to take advantage of a feature of the fact that if a sub macro does not have any macro variables at all then it will not generate a new macro scope. Note that this means that the macro cannot take any parameters either. So your number of months will have to placed into another macro variable first before calling the new macro. do i=1 to input(symget('months'),comma32.); %mend lookback ; 2) Another method is to have the macro return the text of the %LET statements (without actually running) them as quoted macro text. And then use %UNQUOTE() to execute the %LET statements in the calling environment. This will let you define the macro with parameters and local macro variables. %local i str; %if ^%length(&start) %then %let start=%sysfunc(today()); %do i=1 %to &months ; %let str=&str.%nrstr(%let )date_&i=%sysfunc(intnx(month,&start,-&i,e),yymmddn8.)%nrstr(;
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589573.27/warc/CC-MAIN-20180717051134-20180717071134-00389.warc.gz
CC-MAIN-2018-30
3,163
33
https://blogs.oracle.com/content/oracle-social-network-developer-challenge-winners
code
Now that OpenWorld 2012 has wrapped, I have time to tell you all about what happened. Without further ado, congratulations to Dimitri Gielis (@dgielis) and Martin Giffy D’Souza (@martindsouza) on their winning entry, an integration between Oracle APEX and Oracle Social Network that integrates feedback and bug submission with Oracle Social Network Conversations, allowing developers, end-users and project leaders to view and discuss the feedback on their APEX applications from within Oracle Social Network. Update: Bob Rhubart of OTN (@brhubart) interviewed Dimitri and Martin right after their big win. Money quote from Dimitri when asked what he’d buy with the $500 in Amazon gift cards, “Oracle Social Network.” Nice one. In their own words: In the developers perspective it’s important to get feedback soon, so after a first iteration and end-users start to test, they can give feedback of the application. Previously it stopped there, and it was up to the developer to communicate further with email, phone etc. With OSN every feedback and communication gets logged and other people can see the discussion immediately as well. For the end users perspective he can now communicate in a more efficient way to not only the developers, but also between themselves. Maybe many end-users (in different locations) would like to change some behaviour, by using OSN they can see the entry somebody put in with a screenshot and they can just start to chat about it. Some key technical end users can have lighten the tasks of the development team by looking at the feedback first and start to communicate with their peers. For the project manager he has now the ability to really see what communication has taken place in certain areas and can make decisions on that. Later, if things come up again, he can always go back in OSN and see what was said at that moment in time. Integrating OSN in the APEX applications enhances the user experience, makes the lives of the developers easier and gives a better overview to project managers. Incidentally, you may already know Dimitri and Martin, since both are Oracle Ace Directors. I ran into Martin at the Ace Director briefings Friday before the conference started, and at that point, he wasn’t sure he’d have time to enter the Challenge. After some coaxing, he and Dimitri agreed to give it a go and banged out their entry on Tuesday night, or more accurately, very early Wednesday morning, the day of the Challenge judging. I think they said it took them about four hours of hardcore coding to get it done, very much like a traditional hackathon, which is essentially a code sprint from idea to finished product. Here are some screenshots of the workflow they built. I love this idea, i.e. closing the loop between web developers and users, a very common pain point, and so did our judges. Speaking of, special thanks to our panel of three judges: Finally, thanks to everyone who made this possible, including: Sorry if I’ve missed some people, since this was a huge team effort. This event was a big success, and we plan to do similar events in the future. Stay tuned to this channel for more.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360293.33/warc/CC-MAIN-20210228054509-20210228084509-00272.warc.gz
CC-MAIN-2021-10
3,157
16
https://www.passmark.com.au/products/fragger/index.php
code
Fragger has been discontinued and is no longer supported. PassMark Fragger is a software tool that lets you fragment or defragment existing files in a controlled environment using user-selected settings. This utility is primarily used to benchmark the performance of third party defragmentation tools, or benchmark PC performance degradation due to file fragmentation. This software is unique to PassMark and is a world-first for fragmentation tools. Passmark Fragger lets you: Fragger includes a built-in, searchable help file and an uninstaller. PassMark Fragger uses standard file defragmentation APIs (introduced with Windows NT) to fragment and defragment files. As such, there should be a very low risk of any file corruption. Nevertheless, we strongly recommend keeping current backups of your files.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00809.warc.gz
CC-MAIN-2023-50
807
6
https://forum.rebol.info/c/development/naming/l/latest?no_subcategories=false&page=1
code
WORD!, PATH!, and URL!s as ERROR! ids The Question of Plain-old-? (and plain old !) TEXT! vs. STRING! Reverting UNTIL, and adding WHILE-NOT and UNTIL-NOT Taking ACTION! on "Function vs. Action" If at first you don't SELECT, TRY...TRY again? The misleading names of TRUE? and FALSE? Past, present, and future meaning of EXIT Tapping The Untapped Potential of Short Words Killing PRIN,PRINT/ONLY => WRITE-STDOUT (SPACED,UNSPACED) Enfixing ALSO, stylizing it after THEN and ELSE Retaking ++ and -- : how to get the old functionality? DIFFERENCE on DATE! What to call the anti-DEFAULT? Deprecating |> and <|, replacing with >> and << Length, size, num_bytes, num_chars...? Should literal BLANK! be one, or two underscores? PAREN! => GROUP! and NONE => BLANK SET/ANY and GET/ANY vs. SET/OPT and GET/OPT ENFIX vs LOOKBACK Naming logic variables with a ? at the end ← previous page next page →
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583739170.35/warc/CC-MAIN-20190120204649-20190120230649-00277.warc.gz
CC-MAIN-2019-04
890
23
https://pulp.plan.io/issues/2168
code
Task #1864: Plan a new plugin API Plan a download API to replace Nectar Nectar is a wrapper around requests which attempts to provide an asynchronous API while masking the true requests API. It's aim is to make downloading easier, but causes a great deal of problems in both ease-of-use and error handling/reporting. Furthermore, it offers very few useful features to Pulp developers since it attempts to be general. Below I include a sketchy plan for a download API. This needs to be fleshed out and a few choices need to get made, which is what this task is about. It then needs to be implemented as part of a plugin API. - An easy-to-use synchronous API that can handle HTTP/HTTPS and provides features like connection pooling, granular TLS configuration, etc. - An easy-to-use asynchronous API that can handle HTTP/HTTPS and provides features like connection pooling, granular TLS configuration, a callback system, etc. - Automatic handling of content validation (checksums, size, whatever) - Automatic handling of storage to an appropriate backend (local storage, some object store, a temporary file, etc). - Automatic creation of unit files that track where it is stored, how to validate it (in case of bitrot), all the places it can come from with optional priority weighting (this replaces both the lazy catalog and the alternate content source catalog) and network authentication information, etc. - Automatic progress reporting - Optionally creating the content units (maybe even associating them with a provided repository?) - Shared connection pooling across all repositories and plugins - Optional global concurrent connection configuration I think that this should simply be requests, with some wrapping code to handle where it's stored, post-download validation, and model creation. We should expose the session API as-is to the user. This API is the API that requires some research and choices. There are several asynchronous HTTP clients that I am aware of, and there may be others. - requests-futures (Python 3 only) - Twisted's web client grequests (https://github.com/kennethreitz/grequests) is a replica of the requests API powered by gevent. It is very simple and does not provide any sort of callback system to handle certain events. It is not actively developed. This is a small add-on to the requests library that uses Python 3.3's concurrent.futures (https://docs.python.org/3.5/library/concurrent.futures.html) or the backport for Python 2.6+. It provides one additional kwarg, ``background_callback`` which lets you work with the Response objects requests generates, which could do things like write the the data to disk. Twisted's web client provides a different API than the requests-based options. Instead, it uses the standard Twisted Deferreds and Failures (https://twistedmatrix.com/documents/current/core/howto/defer.html). Streaming is built-in and is handled by Twisted's Producers and Consumers (https://twistedmatrix.com/documents/current/core/howto/producers.html). - Connection pools (with configurable size and timeouts) - Automatic retries (limited to one retry according to the documentation) - Automatic redirect handling - HTTP proxy support - TLS (configurable trusted roots, client certificates, acceptable protocols, fine-grain control over the OpenSSL context via https://twistedmatrix.com/documents/16.4.0/api/twisted.internet.ssl.CertificateOptions.html) Of the three, Twisted is probably the most robust. It provides a well-documented callback system (which is already used in the Pulp streamer) and it looks like it offers all the features we need, although the configuration of timeouts and retries looks light currently (they, of course, accept pull requests!). Twisted's callback chaining system also offers a handy way for users of the asynchronous download API to hook additional functionality into the download process. One downside to Twisted is that it requires a great deal of configuration to match the feature set requests offers by default. However, this only needs to be done once and is, in the grand scheme of things, not terribly complicated. Another downside is that the users need to understand Twisted's callback system to add or modify download behavior, although this is probably not a common usecase. #7 Updated by firstname.lastname@example.org over 4 years ago After quite a bit of playing with Twisted, I think we might be better off not going in that direction. The Twisted API, while nice, is not necessarily easy to dive right into. Also, while there is support for redirects and proxies, it seems that (right now) you can't have both at the same time. I think we would be better off having a unified requests-style API. Please register to edit this issue
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989006.71/warc/CC-MAIN-20210509153220-20210509183220-00157.warc.gz
CC-MAIN-2021-21
4,737
31
https://github.com/Codepoints/awesome-codepoints/issues/13
code
It is a well-constructed paradoxon. If you believe, the irony mark is useless, then you have to agree to the irony of “A useful character⸮“, letting the mark do its work. If you believe the opposite, that it is a usefull mark, then “A useful character⸮”, you have to negate the sentence, which renders the mark useless. It’s a bit like the Crete Epimenides saying, “All Cretans are liars.” I may be missing something here but the description for the irony mark (1), when applying irony would be "Not a useful character". But it is useful right? Or is it not since it is so rarely used? The too options are: I was about to create a pull request but as I said I may be misinterpreting the irony. (1) "U+2E2E REVERSED QUESTION MARK - the “irony mark” to express irony/sarcasm. A useful character⸮" The text was updated successfully, but these errors were encountered:
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00504.warc.gz
CC-MAIN-2023-14
888
8
https://mail.python.org/pipermail/tutor/2005-October/042608.html
code
[Tutor] question about try & except kent37 at tds.net Thu Oct 27 11:47:40 CEST 2005 > Hey there, > i am writing some (for me) pretty complicated stuff for work that > really needs to work. > i have looked at exception handling in the Learning Python book. > and i am using some try / except statements. > the problem is, that even though my script does not crash, i dont know > the exact error. > is there a parameter that will allow me to use try and except but that > will also pring out the traceback statements that python usually does to > the terminal? If you put traceback.print_exc() in your exception handler it will print out the exception string and the full stack trace. This is very handy when you have unexpected exceptions as it will let you know where the problem occurs. More information about the Tutor
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864022.18/warc/CC-MAIN-20180621040124-20180621060124-00627.warc.gz
CC-MAIN-2018-26
820
15
https://www.foxyandfriends.net/forum/general-discussions/referencing-generator-tool-helps-you-to-citation
code
davidwalker007You frequently chase after literary theft instruments to guarantee the inventiveness of your paper for database assignment help and steer away from any information encroachments issue. Be that as it may, with so many applications flooding the web, picking the best assignment maker becomes troublesome. This element offers you assignment help uk with estimating the similarity of your paper with some other if exits. Generally, the similitude is dissected by fractioning the quantity of matched words from the all-out number of words information database management assignment help uk. An assignment writers says that most apparatuses analyze the size of similitudes with roughly 94% accuracy featuring it with shaded squares or underlines and rates. Some signify closeness focus in one region as the most noteworthy literary theft risk, do my finance assignment help, while others compute it on all out counterfeiting. Erroneous summarizing case study help should never be messed with. Utilizing rewording score ranges between 0 to 10 percent and oscola referencing generator device. Whether you compose tasks, articles, arcgis assignment help, expositions, or proposition, referring to assets is significant for fostering these papers. Tragically, you can observe a couple of chosen copyright infringement instruments with this component, top arcgis assignment helpers, featuring inappropriate references in hued blocks. The most conspicuous ones incorporate closeness investigation, paper writers, copyright infringement risk examination, rewording investigation, and ill-advised reference identification.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817153.39/warc/CC-MAIN-20240417110701-20240417140701-00714.warc.gz
CC-MAIN-2024-18
1,622
1
https://topic.alibabacloud.com/a/ipmt-function-usage-in-excel_8_8_10164365.html
code
First, IPMT grammar Returns a Double specifying the value of the interest paid for an annuity with fixed periodic payments and interest rates for a period of time. IPMT (rate, per, nper, pv[, fv[, type]]) The IPMT function has the following named arguments: Rate necessary. DOUBLE Specifies the interest rate for each issue. For example, if there is an annual percentage of loans (APR) of 10% and a monthly car loan, the interest rate for each issue is 0.1/12, or 0.0083. Per necessary. Double Specifies the payment period in range 1 between nper. NPer necessary. Double Specifies the total number of payment periods for an annuity. For example, if you choose a monthly payment for a four-year car loan, the loan has a total of 4 * 12 (or 48) payment periods. PV necessary. Double, specifying the present value of a future series of payments or receipts. For example, when borrowing money to buy a car, the amount lent to the lender is the present value for future monthly payments to the lender. FV Optional. A Variant specifies the future value or cash balance that is desired after a loan is paid. For example, the future value of a loan is 0 dollars after the loan is paid off. However, if you want to save 50,000 dollars for the Children's Education Fund in 18 years, then 50,000 dollars will be the future value. If omitted, the default value is 0. Type is optional. Variant Specifies the loan expiration time. If the loan expires at the end of the loan cycle, please use 0. If the loan expires at the beginning of the cycle, use 1. If omitted, the default value is 0. An annuity is a series of fixed cash payments over a period of time. An annuity can be a loan (such as a home mortgage) or an investment (such as a monthly savings plan). Rate and NPer parameters must be computed in the same unit during payment. For example, if rate is calculated in months, the nper must also be calculated in months. For all parameters, cash expenditures (such as savings deposits) are represented by negative numbers, and cash receipts (such as dividend cheques) are expressed in positive numbers. Second, IPmt function usage This example uses the IPMT function to calculate how much of the payment in each issue is interest, with the same amount for each period of payment. The calculation requires a given rate of interest (APR/12), the payment period of interest (Period), the total number of payments (TOTPMTS), the present value of the loan or principal (PVal), the future value of the loan (FVal), and the method of payment to indicate the beginning or end of payment (PayType). Dim fval, FMT, PVal, APR, TotPmts, PayType, Period, INTPMT, Totint, MSG Const endperiod = 0, Beginperiod = 1 ' payment method. fval = 0 ' is usually zero for a loan. FMT = "###,###,# #0.00" defines the amount format. PVal = InputBox ("How much does you want to borrow?") APR = InputBox ("What is the annual percentage rate of your loan?") If Apr > 1 Then APR = apr/100 ' Ensure the format is correct. TotPmts = InputBox ("How many monthly payments?") PayType = MsgBox ("Do I make payments in end of the month?", vbYesNo) If PayType = vbno Then paytype = beginperiod Else PayType = endperiod For Period = 1 to TotPmts ' sums all interest. INTPMT = IPMT (APR/12, Period, TotPmts,-pval, fval, PayType) Totint = Totint + INTPMT MSG = "You ll pay a total of" & Format (Totint, FMT) msg = msg & "in interest for this loan." MsgBox Msg ' displays results. The above code is used in VBA state.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986697760.44/warc/CC-MAIN-20191019191828-20191019215328-00397.warc.gz
CC-MAIN-2019-43
3,465
32
http://www.muffwiggler.com/forum/viewtopic.php?t=216210&amp
code
||Befaco Rampage Ch. B does not (really) work | br>Hello everyone, I'm in the need for some helping opinions. I have built a Befaco Rampage about 2 months ago (self-sourced parts), but when powered on, Channel B was not working. I had one, long trouble-shooting session some time ago with no results, but before I go further I'd like to ask for some help. When triggered, the Rise portion works as it should, however when it reaches the Fall stage, the OUT B signal stays high (at the peak) indefinitely or until the system is powered off. The cycle is definitely in the Fall stage as it also outputs a gate at the Falling output. Another strange symptom is that sometimes Ch. B outputs a constant Falling gate, without ever being triggered. In this case there's of course nothing at OUT B. This always happens when the shortest Range is selected, and is the case when the Fall slider is low enough for the two other ranges. If the Fall time is increased sufficiently the gate output vanishes I think everything works other than this (but I couldn't check Cycle B and In B obviously). What I've done so far: First I inspected all the joints, polarities, other "visible stuff" but everything looked fine. If one was suspicious I retouched that (I've actually done this a few times including during the build). Since Channel A works perfectly, I swapped the ICs from the two sides, resulting in no improvement whatsoever. Then I started checking continuity. In the first picture I highlighted the area that I definitely checked, but there were other joints checked, at Ch A, the control boards etc. But I'm quite sure the problem is on the Main Board. I have a feeling that the culprit is gonna be a resistor or something but I would appreciate any input on this problem! Here are some picture, including the schematic: I wanted to upload more pics but the service just died or something. Also when bracketing the schematics with the red lines, I realised that the problem might be in the CV summing and shape feedback bit which I have not checked at all. Anyway, please help! br> br> | br>I had a similar experience, chanel B failing too. I just reflowed the whole B section and VOILA!, it works. It will only take like 5/7 mins. I would start there. If that not works, then go for the logic puzzle of finding the resistor or cap br> br> Powered by phpBB © phpBB Group
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313589.19/warc/CC-MAIN-20190818022816-20190818044816-00495.warc.gz
CC-MAIN-2019-35
2,368
17
https://www.telerik.com/forums/how-to-mock-the-constructor-of-a-mscorlib-class
code
Unfortunately, this is not possible with JustMock 2013.1.507. A possible solution is to extract the construction of your " " into another method, like this: TextReader xmlTextReader = TextReader xmlTextReader = MyXMLTextReader(pathToFile); //some method logic //returns a string Then, you will be able to arrange against " Mock.Arrange(() => MyClass.MyXMLTextReader(Arg.AnyString)).DoNothing(); Note, you could also arrange its return value as desired. Finally, you will be able to call the " " method no matter the string passed as argument. However, in the latest internal builds we have included the Future Constructor Mocking feature. This will let you future mock the constructor of an instance (even to a MsCorlib member), the following way: With this approach, no refactoring to your existing system under test will be necessary. I hope this helps. Share what you think about JustTrace & JustMock with us, so we can become even better! You can use the built-in feedback tool inside JustTrace, our forums , or our JustTrace
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576345.90/warc/CC-MAIN-20190923084859-20190923110859-00001.warc.gz
CC-MAIN-2019-39
1,029
17
http://www.antionline.com/showthread.php?223208-Nuking-MS-Messenger&p=494278
code
April 4th, 2002, 02:05 PM Nuking MS Messenger I've read recently of the measure m$ have taken to ensure that Messenger stays resident on your m$ system(s) whether you want it or not. TheRegister has offered some advice to those who would like to say goodbye to the RAM sucking Passport offering peice of crap. The full article can be found here and below is the usfeful info for anyone who just wants rid of Messenger. First, if you're sure you'll never use it, you can take the flamethrower approach and delete the entire Messenger directory (C:\Program Files\Messenger). The problem here is that some future MS 'upgrade' may well re-create the directory for you. You know how helpful MS likes to be. Next, you might try re-naming the executable, msmsgs.exe to, say, msmsgs.bak, and then re-creating the executable with a blank file. This might (or might not) trick upgrade packages into assuming that your irritating little Messenger is up to snuff. Another method is to open Start/Run, and type in: RunDll32 advpack.dll,LaunchINFSection %windir%\INF\msmsgs.inf,BLC.Remove The following only applies to XP-Pro: If you only want to stop it running and prefer to leave it on the machine in case you ever decide to use it, you can go to Start/Run and enter gpedit.msc. Then go to: Computer Configuration/Administrative Template/Windows Components/Windows Messenger/ "Do not allow Windows Messenger to be run" and choose "Enabled". For XP Home Edition users, MS recommends the following rather complicated routine, which will persuade most users to delete the Messenger directory instead, we're sure. We quote: 1.. Start Registry Editor (Regedit.exe). 2.. Locate and click the following registry key: 3.. On the Edit menu, point to New, click Key, and then type Messenger for the name of the new registry key. 4.. Locate and click the following registry key: 5.. On the On the Edit menu, point to New, click Key, and then type Client for the name of the new registry key. 6.. Locate and click the following registry key: 7.. On the Edit menu, point to New, click DWORD Value, and then type PreventRun for the name of the new DWORD value. 8.. Right-click the PreventRun value that you created, click Modify, type 1 in the Value data box, and then click OK. And we'll note that you should always back-up your registry before hacking it, even with instructions from Redmond. Hope this helps, April 4th, 2002, 02:18 PM Even though I use Microsoft products, the fact that they don't have some of their own stuff under "Add and Remove" in the Control Panel kind of irks me. I used the "flame thrower" approach and just deleted it's folder from the Program Files. It will give you the "If you delete this some programs may not work message," but just ignore it. For the wages of sin is death, but the free gift of God is eternal life in Christ Jesus our Lord. (Romans 6:23, WEB) April 4th, 2002, 02:19 PM I was bitching about that command line (RunDll32 advpack.dll,LaunchINFSection %windir%\INF\msmsgs.inf,BLC.Remove) to put in whenever IM installs on XP on IRC the other day. Its sucks running updates when all it does is re-install the program I've had to remove 20 times. I suppose i could just run the updates myself. April 4th, 2002, 06:16 PM Ms have to get a better security if they whant to stay where they are now! Linux is comming!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123270.78/warc/CC-MAIN-20170423031203-00255-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
3,332
30
https://community.blokas.io/t/routing-lowest-highest-notes-to-different-outputs/3824
code
I am new to Midihub but have a reasonably good understanding of programming in general, so the whole block matrix is not too intimidating. But there is a preset I’ve been trying to make, but just can’t figure out how to do. I want to be able to receive a chord from an input, and then split that chord so that the lowest played note is sent to Output A, the full chord as played to Output B, and then the three highest notes through an arpeggiator pipe to Output C. But I cannot find the correct pipe to filter and prioritise single notes within a chord? I am sure I am missing something obvious here? Anyone with an idea how to achieve this? The Dispatcher pipe seems to not be able to prioritise notes, just randomly split a chord onto different channels. Yeah, I agree @Claire_Upz , interesting and something that would find a lot of takers. Like you, i can’t think of a way of doing it at present. My hunch is Currently Not Possible as it goes beyond the single-event-in model and would therefore be departure from the current approach as it would entail making a real-time comparison of a collection of events. Unless we’re wrong, @Jarly , maybe post it up as a feature request? PS. Going on from Claire_Upz’s suggestion, Jarly, the only workaround I can offer is to have your lowest note being played say 2 octave too low so that it can be filtered then transposed to re-constitute your proper chord. Hardly natural, I know, but it would allow you to do what you want. Thank you both for these thoughtful answers @resonotter and @Claire_Upz, it indeed seems more and more like a feature request and something that is not possible atm. I envision a pipe with a three simple options: include or exclude, begin selection from low-high or high-low, and finally how many notes to select. I might be wrong, but should be fairly straightforward, as it’s just sorting the array of currently playing notes based on note number and applying the inclusion/exclusion filter from there. As for the workaround of specifying ranges as you both suggested, while it is some kind of workaround, it also defeats the purpose of playing a single keyboard with two hands while splitting it into bass, chords and arpeggio. Yep, if I imagine mocking up a simple solution using python.mido, for example, I’d want to specify a max msec/ppqn period that would define a “chord set” then apply the arithmetic & branching to various midi_outputs. And there’s our departure from Midihub v1.x; we have a many-in/many-out scenario! For now, Midihub is entirely one-in/many-out; no none-in/many-outs either! My hunch is, the Blokas crew have already thought of this but are only going to bring out a suite of many-in/many-out pipes when they can get that extra functionality & generality without making Midihub a coders-only device! Actually there are already pipes that work based on time passage and consider many previously played notes, like Sustain in its Chord mode, or produce events without prior input, like CC LFO or BPM. The tricky bit with this ‘note priority’ pipe as others call it is to get it just right to meet everyone’s expectations. What I’ve found when discussing it is that people have slightly different vision of how it should behave in tricky scenarios. We might implement something eventually though. It’s that generalised issue of combining (let alone comparing!) multiple events that sometimes crops up when I’m building patches (ie. when I start thinking in aX + bY terms). Sometimes I’ve been able to shoehorn the scenario into an LFO Passive Mod solution but I sorta yearn for a CC mixer!
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711286.17/warc/CC-MAIN-20221208082315-20221208112315-00660.warc.gz
CC-MAIN-2022-49
3,625
17
https://draerex.wordpress.com/funny-pics/
code
That was heavy!!!!!! Using the walk on walls thing from the underwater party and my proppellor hat i could nub at the top! I took over Google! I took over the dollar (American money) I CANT REACH! I’m a mod? Uh oh! Theres a dynmite! Clap for me not the lame guy! It turned out just to be socks in there:
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591216.51/warc/CC-MAIN-20180719183926-20180719203926-00213.warc.gz
CC-MAIN-2018-30
305
9
https://blog.jetbrains.com/kotlin/2022/01/advent-of-code-2021-in-kotlin-winners/?utm_campaign=Android%2BBoss&utm_medium=web&utm_source=Android_Boss_290
code
Advent of Code 2021 in Kotlin: Announcing the Winners About Advent of Code Advent of Code is an annual event that publishes fun, holiday-themed puzzles every day from December 1 to December 25. Thousands of people each year take part in Advent of Code. We at JetBrains and on the Kotlin team have been taking part in Advent of Code for several years now. As a proud sponsor of Advent of Code 2021, we encouraged our community to join us in solving the puzzles in Kotlin. To boost morale, we announced a prize giveaway for the participants. It was lots of fun! - Almost 4000 repositories were created from the Advent of Code in Kotlin GitHub template - 1600 repositories were labeled with our aoc-2021-in-kotlin topic Sebastian Aigner shows how we extracted all the participants from GitHub in order to find our lucky 5 (out of more than 1600) submissions! Giveaway: kudos to participants and winners! At first, we wanted to award just 5 randomly selected participants from the community who followed the announced rules. But the level of community spirit we witnessed was awesome and we simply couldn’t let it go unacknowledged! So, kudos go first and foremost to our awesome community – there were so many posts, articles, discussions, and even a meetup for a Kotlin User Group dedicated to Advent of Code. That’s why we decided to extend the giveaway to 10 additional people – 3 of the winners from the Advent of Code in Kotlin leaderboard and 7 people who actively shared their solutions and helped others. Congratulations to the 15 Advent of Code in Kotlin winners! 5 randomly selected winners These are the 5 randomly selected the winners from over 1600 GitHub repository submissions: 3 winners from the Kotlin community leaderboard We didn’t have an official leaderboard, but the community still competed. So, excluding the champion Roman Elizarov, the 3 winners from the leaderboard are: 7 winners from the community The 7 Advent of Code in Kotlin community contributors are: Congratulations and bravo to all the participants, everyone who has been solving Advent of Code in Kotlin for several years, and those who ventured to do so for the first time this year! And a huge thank you to Eric Wastl and all the organizers of Advent of Code! We hope to see you again at Advent of Code 2022 – but until then, keep coding in Kotlin year round! If you're doing #AdventOfCode and learning stuff, but your code's a mess, you got the wrong answer, you're a few days behind, it took you several hours, you're in a language you're not familiar with…— Eric Wastl (@ericwastl) December 4, 2021 All I hear is that you're learning stuff. You're doing great!! 🌟❤️🎄🧑🎄 Subscribe to Kotlin Blog updates [Livestream] ICPC World Finals: Kotlin Heroes Blind Coding Challenge Join us for an exciting livestream event broadcast directly from the ICPC World Finals: Kotlin Heroes Blind Coding Challenge. This is going to be a very special event featuring world-level competitive programmers: Gennady “tourist” Korotkevich, Andrew “ecnerwala” He, Pavel “pashka” Mavrin, and Egor … Mastering Algorithmic Problem Solving: Insights From Kotlin Heroes Prepare for technical interviews and hone your algorithm skills during our special event featuring two ICPC World Champions, the most significant award in algorithmic problem-solving. During the livestream, they'll tackle problems from our last competition, Kotlin Heroes: Episode 9. Kotlin Roundup: Unveiling the New Compose Multiplatform Release, Amper Update, and More! Unveiling the New Compose Multiplatform Release, Amper Update, and other Kotlin ecosystem news. Become a Kotlin Google Summer of Code Contributor: Make an Impact! The Kotlin Foundation has been accepted as a mentor organization for Google Summer of Code 2024! GSoC is a global online program focused on bringing new contributors into open-source software development. Contributors work on a 12-week programming project under the guidance of Kotlin Foundation mentors from Google, Gradle, and JetBrains.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817222.1/warc/CC-MAIN-20240418160034-20240418190034-00212.warc.gz
CC-MAIN-2024-18
4,051
31
https://informationweek.com/author-bio.asp?author_id=605&piddl_month=7&piddl_year=2008&
code
Profile of Shawn Shell News & Commentary Posts: 13 Articles by Shawn Shell posted in July 2008 Most customers don't understand Microsoft licensing in general and SharePoint licensing specifically. In fact, most customers are pretty confused by the dizzying array of options... In particular, some customers got a nasty shock when they realized the (potentially expensive) difference between an Enterprise Agreement and an Enterprise License in MOSS. Microsoft has released a significant infrastructure update for SharePoint (and related technologies like Project Server that leverages SharePoint components). The update primarily addresses three areas: search functionality, content deployment bug fixes, and general interface and performance improvements.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988758.74/warc/CC-MAIN-20210506144716-20210506174716-00250.warc.gz
CC-MAIN-2021-21
756
6
https://videos.utahgunexchange.com/watch/george-floyd-from-other-side-of-the-car-new-angle-of-george-floyd-incident-officer-derek-chauvin_Xxdo5YiJI9RUPi6.html
code
George Floyd from other side of the car! NEW ANGLE of George Floyd Incident - Officer Derek Chauvin! George Floyd from other side of the car! NEW ANGLE of George Floyd Incident - Officer Derek Chauvin! Subscribe for everything breaking on this case Please subscribe to our channel! We appreciate your support !! 😊 (click here or above) SEND US AN EMAIL! COME SAY HI! MY URBAN FICTION BOOK – It went VIRAL on Facebook!! Check the reviews! :) EQUIPMENT I USE The microphone I use: https://amzn.to/36joUkH The microphone stand I use : https://amzn.to/36l7QuO Here is the camera I use: https://amzn.to/2sb84pz The SD Card I Use: https://amzn.to/2P8oQ1E Here is the Tripod I Use: https://amzn.to/2E8ro9n DISCLAIMER: Links included in this description might include affiliate links. If you purchase a product or service with the links I provide I may receive a small commission. There is no additional charge to you! Thank you for supporting ALERT CULTURE!
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655900335.76/warc/CC-MAIN-20200709131554-20200709161554-00385.warc.gz
CC-MAIN-2020-29
955
15
https://outlook.uservoice.com/users/257266801-moises-gil
code
Text message equals SMS? If the answer is "yes" so I would also like this feature SMS and WhatsApp We highly appreciate your feedback you’ve given us about this feature. Good news: We’re close to releasing it on Android. You can get a sneak preview here: https://blogs.office.com/2017/06/05/improving-people-in-outlook-for-ios-and-android/ Thanks for your patience as we make the final touches! All the best The Outlook Mobile Team PS: Please use the Help Section of the app for any questions, we are not able to see replies to this address. i liked of the to create and to edit contacts in my account Outlook or others accounts with support
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148163.71/warc/CC-MAIN-20200228231614-20200229021614-00550.warc.gz
CC-MAIN-2020-10
645
9
https://www.ruby-forum.com/t/rails-3-development-servers-is-mongrel-on-its-way-out/197674
code
Because life happened I had to put down rails/web development for a while. I am starting a new project on rails 3 and noticed that mongrel isn’t even included in the Gemfile which is required in order to get mongrel to load. What is the school of thought in rails 3 wrt to a development server? Have people moved on to unicorn or some other devel server? Any feedback is useful.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154089.68/warc/CC-MAIN-20210731141123-20210731171123-00459.warc.gz
CC-MAIN-2021-31
380
6
http://gloksgrotto.blogspot.com/2012/12/painting-dungeon-part-1.html
code
So after months of not being able to decide on the paintscheme of the new dungeon tileset I finally decided last week. Since then we (me and my girl) have been working on the painting of the dungeon! First of all I had to decide on a colorscheme, see this post for the results on that. With a colorscheme in hand it was time to pay the local paintsupply store a visit. Once there I got a very nice grey, three shades of wall color and the green to highlight the floor. I still have some black wash in a big pot, so that should not be a problem. The goal here was to make sure I chose paints that I would not have to mix, so it would be easy to reproduce the exact same color in a year or more. I also quickly nabbed a very nice paint-holder-thingey. After that it was back home! Remove everything from the bag and start painting like a roadrunner. I decided I wanted to do all the floor basecoating first. They will all need two layers at least, some of them three. After an hour or so my table looked sort of like this: The mini layout at the bottom of the picture was to get a quick feel for how it looks when put together (spoiler: quite nice so far). Notice the Fellowship of the Ring appendices that are good watching material while I paint. Assorted mini's also always seem to end up on this table. I considered adding durt and sand to all wall sections, but decided against it. Maybe for a cavern set or a specific ruined set. More to come!
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589251.7/warc/CC-MAIN-20180716095945-20180716115945-00186.warc.gz
CC-MAIN-2018-30
1,447
9
http://krajzewicz.de/index.php
code
As such, I've - contributed to the development of the open source traffic flow simulation SUMO, which is DLR's most successful open source development with some thousands downloads per month; - contributed to the development of the open source agent-based demand model TAPAS; - developed the open source accessibility computation tool UrMoAC what is quite a great tool as well; - wrote quite some publications about different sub-topics of mobility and traffic. If you are interested in SUMO, an open source traffic flow simulation package I contributed to, please visit the SUMO pages, because I am not longer involved in the development of this software. You may nonetheless find some information about my research topics. At these pages, you will find software packages, I wrote in my private time. They include: - PaletteWB (external pages), a color palette editor; - a tool that makes web pages nicer named degrotesque (github project pages); - a game for the c64 named BrainBreak (itch.io project page), and some notes about the BrainBreak game; - a library for parsing command line options, including implementations for Java (external pages) and cpp (external pages); - a tool for drawing “Mandalas”; - a Lindenmayer Systems tool named ALSOG (external pages). There are also some new things under development: - a tool for converting DocBook books to QtHelp named db2qthelp (github project pages); - a GLSL shader editor named ShaderWB. Above all, you'll find some blog articles about topics, such as: Many thanks to Nora and Ola for their help in designing these pages. Supporting an e-mail address allows us to answer. Your message has been sent. Thank you.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500304.90/warc/CC-MAIN-20230206051215-20230206081215-00199.warc.gz
CC-MAIN-2023-06
1,671
20
https://tv.panatimes.com/watch-russian-rocket-strikes-hits-pivdennoukrainsk-nuclear-power-plant-in-ukraine
code
Watch: Russian rocket strikes hits Pivdennoukrainsk nuclear power plant in Ukraine Telegraph, 22 Sep 2022 CCTV footage of a Russian missiles strike on a Ukrainian nuclear power plant. The Pivdennoukrainsk plant suffered only minor damage but power supplies were knocked offline for a short while. It is located in Mykolaiv province in southern Ukraine. Subscribe to The Telegraph with our special offer: just £1 for 3 months. Start your free trial now: Get the latest headlines: https://www.telegraph.co.uk/ Telegraph.co.uk and YouTube.com/TelegraphTV are websites of The Telegraph, the UK's best-selling quality daily newspaper providing news and analysis on UK and world events, business, sport, lifestyle and culture.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711200.6/warc/CC-MAIN-20221207153419-20221207183419-00264.warc.gz
CC-MAIN-2022-49
721
8
https://www.bijt.org/wordpress/tag/tradition/
code
I got this pic a little while ago from a colleague (thanks Tina!). I think it’s very funny. (source appears to be PersianHub.org). Today, 17 August 2007, Indonesia celebrated the 62th year of independence from Dutch colonial rule. Although my 3rd time in Indonesia, it’s the first time […]
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00367.warc.gz
CC-MAIN-2021-43
295
2
https://github.com/Mteheran/CSharpVersionsDemos
code
Demos about the features for each new C# version C# 1.0 released with .NET 1.0 and VS2002 (January 2002) C# 1.2 (bizarrely enough); released with .NET 1.1 and VS2003 (April 2003). First version to call Dispose on IEnumerators which implemented IDisposable. A few other small features. C# 2.0 released with .NET 2.0 and VS2005 (November 2005). Major new features: generics, anonymous methods, nullable types, iterator blocks C# 3.0 released with .NET 3.5 and VS2008 (November 2007). Major new features: lambda expressions, extension methods, expression trees, anonymous types, implicit typing (var), query expressions C# 4.0 released with .NET 4 and VS2010 (April 2010). Major new features: late binding (dynamic), delegate and interface generic variance, more COM support, named arguments, tuple data type and optional parameters C# 5.0 released with .NET 4.5 and VS2012 (August 2012). Major features: async programming, caller info attributes. Breaking change: loop variable closure. C# 6.0 released with .NET 4.6 and VS2015 (July 2015). Implemented by Roslyn. Features: initializers for automatically implemented properties, using directives to import static members, exception filters, indexed members and element initializers, await in catch and finally, extension Add methods in collection initializers. C# 7.0 released with .NET 4.7 and VS2017 (March 2017) Major new features: tuples, ref locals and ref return, pattern matching (including pattern-based switch statements), inline out parameter declarations, local functions, binary literals, digit separators, and arbitrary async returns. C# 7.1 released with .NET 4.7 and VS2017 v15.3 (August 2017) Minor new features: async main, tuple member name inference, default expression, pattern matching with generics.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743184.39/warc/CC-MAIN-20181116194306-20181116220306-00204.warc.gz
CC-MAIN-2018-47
1,769
10
https://www.bleepingcomputer.com/forums/t/131997/windows-start-up-page-then-flash-blue-screen/
code
It seems that you cannot boot into safe mode which means we cannot make the blue screen stay on the screen to diagnose it. If you cannot get into safe mode, there are a couple options since you cannot diagnose the blue screen. If the computer was working fine before you did the restore, then it "most likely" is not a hardware issue, but its good to be sure. First, try running a memory test http://www.memtest.org/download/2.00/memtest86+-2.00.iso.zip Here is instructions on how to use the tool. http://www.cpusolutions.com/mm8004744CPU/H...s/memtest86.htm You may also want to perform a hard drive test which will be provided per your specific hardware manufacturer. Since you JUST performed a restore and there is probably no important data on your drive, you may want to re-install windows. Just be sure to format the drive, do not leave the current file system intact when you get to that option in setup. A repair install would also work, but a full clean install is what I suggest since you seem to have no important data on the drive. Hope this helps.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823382.1/warc/CC-MAIN-20181210170024-20181210191524-00015.warc.gz
CC-MAIN-2018-51
1,061
8
https://discussions.flightaware.com/t/having-trouble-with-rpi-feeding/30829
code
I have an RPi that has been feeding FlightRadar24 successfully for over a year. Today, I followed the FlightAware instructions to enable it to also feed to FlightAware. Everything seems to have loaded properly and FlightAware is recognizing my system, but my Rpi is not sending any aircraft data. The FR24 feed still seems to be working fine. This is what I am seeing in my log: [2018-01-25 14:50 PST] no ADS-B data program is serving on port 30005, not starting multilateration client yet [2018-01-25 14:51 PST] 0 msgs recv’d from dump1090 (0 in last 5m); 0 msgs sent to FlightAware [2018-01-25 14:51 PST] no ADS-B data program seen listening on port 30005 for 311 seconds, next check in 60s [2018-01-25 14:51 PST] no ADS-B data program is serving on port 30005, not starting multilateration client yet When I try to look at my local live FA data via the direct IP address at port :8080, my browser says it can’t see it. When I look at the same Rpi at the same IP address at port : 8754 I have no problem reading the FR24 settings. Can any of you more experienced folks lend a hand?
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591140.45/warc/CC-MAIN-20180719144851-20180719164851-00240.warc.gz
CC-MAIN-2018-30
1,087
9
http://www.nvnews.net/vbulletin/printthread.php?t=1574
code
Newbie question about nforce.... I am totaly new at Linux and before making some mistake maybe someone can give me a clue, i have a Nforce system, i do plan to install redhat 7.3...so i would like to know if i have to install both Nforce driver and Graphic driver to see the integrated GPU ? Or will the Nforce driver take in charge everything ? Second question is : If i disable the integrated Gpu and put a regular Gforce2 card, do i need to reinstall something ? Third question is : May i setup a custom resolution ? I might need a special resolution, special Khz (less than 31) and Interlace, etc.... can i do it with Xfree86 ? Thank you for your support:confused: You will need the nvidia video drivers to get the GPU working. If you later switch to a normal AGP card you don't have to change anything. (both cards are nvidia ...) For sound (kernel has support now too, but take nvidia's drivers) and lan you will need nvidia's nforce drivers. You want to use your own modelines. (custom KHz, interlacing ..) All that is possible but not that easy. You'll need to look into XFree86 modeline programming. Thanks :) , things seems to be a little bit clear now, btw, any good link to teach me about "modeline" and xfree86 (maybe one dealing with Nvidia card) ? |All times are GMT -5. The time now is 12:55 AM.| Powered by vBulletin® Version 3.7.1 Copyright ©2000 - 2015, Jelsoft Enterprises Ltd. Copyright ©1998 - 2014, nV News.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989507.42/warc/CC-MAIN-20150728002309-00119-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
1,433
15
http://smartosworld.blogspot.com/2013/08/pipoialert-v106-r2-symbian-s60v5-s3.html
code
piPOIAlert is a POI (Point of Interest) warning system (eg: speed cameras, constructions sites, gas stations, ...) Local POI database --> no cell phone internet connection needed. A full feature list is provided on the projects homepage. The provided download doesn't contain any POI database/file. To create a POI file just visit my converter page n download piPOIAlert - Converter.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000266.39/warc/CC-MAIN-20190626094111-20190626120111-00427.warc.gz
CC-MAIN-2019-26
383
4
https://community.glideapps.com/t/sending-info-from-glide-to-google-sheets/57959
code
I created a WEB/APP from google sheets synced to Glide, and so far; it looked good until yesterday. In my google sheets: -One row contains information per user All columns are User Specific; that information should be visible only to the user, but if I create a new column in Glide (user-specific), that column won’t be created y Google Sheets. The point here, I need to send the info the user is entering in Glide back to Google Sheets because, in Google Sheets, I need to run Autocrat to populate that info in some documents. Dear @Darren_Murphy I saw a case similar to this in the community, I saw you have a clear Idea of a case similar to this but it was unclear for me how to send info from Glide to Google Sheets. If you have some feedback about this, it would be great. Hello @Darren_Murphy, you are a genius; it worked. But now I have an issue; my question is, when I put view as anyone, I should be able to see the input spaces in blank ready to fill them out, but I can not see the input spaces, and neither the label. What do you mean by this? After your previous solution, I do not need User Specific columns; I need to solve the problem of the blank inputs and labels. That little purple A tells me that column is user specific. You should not be using user specific columns, so you need to replace that column and any other columns in that table that are also user specific.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949181.44/warc/CC-MAIN-20230330101355-20230330131355-00630.warc.gz
CC-MAIN-2023-14
1,391
9
https://forum.virtualmin.com/t/creating-a-sub-server-help/45680
code
I follow the simple steps here: http://www.virtualmin.com/documentation/tutorial/how-to-create-a-sub-server to create a sub-server and I get a ‘Server not found’ message. Any ideas? thx guys Where is the nameserver for this particular domain… is it hosted on your server? Or at a third party? If the nameserver is hosted at a third party, you’d need to setup DNS records for it at that third party. I did add a sub-Server like two weeks ago, and it all worked fine, without any new steps other than the ones on the above instructions. I purchased my domain name from namecheap, sorry for my igonorance but I am not sure what u mean when u ask if the nameservers are host on a 3rd party server. I do know that when my ISP IP changes, I do have to update the IP at namecheap too. And that’s the only time I have to go to namecheap. But as I said before, I added a sub-server before, without any problems and without going to namecheap. Sounds like you are using your server as DNS server also. Also sounds like you are having this server at home. How is your router set up? Does it contact your server as first dns server? Does your ISP allow you to use ports from 1 - 1024? My setup is ( I wish we could have this info on like a signature so everyone know the specific syste one has ): Home Server with Ubuntu 10.04 FiOS as ISP I am able to use those ports (exept for the mail port) I have forward port: 10000, 443, 80, 21 I use namecheap for my domain name It is a home server ( personal computer ) I do think it does contact my server as the first DNS server cos when my IP I have to manually update it at namecheap Yes I am allow to use port 1 - 1024 I have the router setup as DMZ Host and Static NAT Are we talking about a TLD or subdomain? When you go to Webmin => Servers => Bind server does your Top Level Domain show? And if you are trying to setup a subdomain, open de TLD and see if the subdomain is also in there. From where do you try to see the subdomain? - From the server - From a different system in your LAN - From outside Which application tells you “Server not found” Can you try to ping to it and also try to ping to the IP if you setup a specific IP. I’m talking about a subdomain (boricuavps.com is my TLD and support.boricuavps.com is what I have setup as my subserver (subdomain). I did manage to add this same subdomain before and all I did was add a subserver and left all default settings and it worked, and for a dumm reason I decided to delete it ( can’t even remember why). FYI I’m in the mobile phone templete cos I’m not near my computer. When I go to Bind DNS Server only the TLD is there not the subdomain. Yes the subdomain does shows under the TLD I have try to access the support.biricuavps.com from the FF browser which tell me server not found I did not setup a different IP, as I created the subdomain I left all settings as default If you go into Edit Virtual Server -> Enabled Features for this particular sub-domain, is the BIND DNS Domain feature enabled? That option is not present there Hmm, are you logged in as the root user? The root user should be able to see the various available features for the Virtual Servers. Nop, no BIND Server option there not even in for the TLD. Here is what’s there Mail for domain I’m sorry, I got the feature name wrong The feature you want is “DNS Domain”, and not the “BIND DNS Domain” that I mentioned above. So if you go into Edit Virtual Server -> Enabled Features, is DNS Domain enabled? Yes I do thx have that enable Manage to add the sub-server after a clean install. Most of been a bad configuration tina some where.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335362.18/warc/CC-MAIN-20220929163117-20220929193117-00303.warc.gz
CC-MAIN-2022-40
3,640
41