url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://solutionbay.com/solutions/how-to-speed-up-a-slow-phone/while-browsing-the-net
code
Maybe the temp files and the cache are slowing down your mobile device. Temp files are created on a daily basis and a few of them don't pose a threat. But, too much temp files can definitely slow it down. To learn how to clear the cache and delete temp files, check out the don't know how to clear my cache solutions. Restarting your device ends all the processes that might have become unresponsive and slowed down your device. Sometimes it is the right thing you need to do in order to fix your device. To learn how to restart your mobile device, check out the don't know how to restart my device solutions. If you don’t receive the email in the next 2 minutes please check your junk folder, and add [email protected] to your safe sender list.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945279.63/warc/CC-MAIN-20230324082226-20230324112226-00161.warc.gz
CC-MAIN-2023-14
747
5
http://tech.sparkfabrik.com/2016/04/05/a-nerdy-editorial-experiment/
code
Would you ever say there is still room to evolve the concept of blogging? We do! But let’s start from the beginning. One year from the company inception the time has come to blog about the technology we love. But we’d like to do this in our commitment to transparency and openness. We thought about it a bit and came to the conclusion that we want to treat our knowledge as we treat our code. We like to share and we like to contribute. We also leverage what others share and love to receive contributions! While there are established practices to contribute code in 2016, that’s not the case for knowledge. Comments are not the right way to collect contributions. They allow for arguments to rise, require effort to integrate (and devs are often too busy to go back on an old post) and they are sooo Web 2.0. The solution was there to see: we just need to raise our hipster-o-meter level a bit! ;) So start from a static site generator, which is all the rage now uh? Middleman can do but… a Ruby oldie? Really?! Nah! Let’s go with (wait for it…) Go and throw Hugo in the soup! And of course pack it all up with Docker, which is just what the doctor ordered. And of course, all should be available on GitHub, for the world to enjoy. Spice it up with Creative Common Attribution-ShareAlike 4.0 license for contents (hey, it’s safe for work and “Free Culture approved!”) and a GNU GPLv3 License for the rest of the code, and you’re done! Hipster-o-meter is on fire! ∗_∗ But most of all, now everybody can fork the project on GitHub and do one of the following: - Modify and use it for her own purpose. It’s like Christmas, only everyday. - Fix or update a post which is imprecise, outdated or unclear and send us a PR. Because we like our blog to be relevant and if it helped you somehow, you can give back (spoiler: you can credit yourself!). - Write a guest article you’d like to see published and become a guest writer. Sure, we don’t expect to become the next interweb sensation overnight, but we are excited to test this new approach to social blogging out. OK, but what will we blog about? Actually, the sky is the limit. Our business as a company is currently heavily based on Drupal, so we’ll naturally blog about Drupal and PHP in general. But we can’t keep our mind off novelties, innovations and ∗cough cough∗ buzz ∗cough∗ words. Se expect to find here dumps of our brown bag happy-hours, bits of hard-earned wisdom, analysis of our achievements, micro-tutorial, gotchas, weird discoveries and tools reviews. And don’t forget your contributions! :) The rule of thumb is: it has to do with technology, not philosophy or other blurbs! And sure, this post is an exception :P er… We really hope you’ll enjoy reading this blog as we enjoy writing it. And you are encouraged to treat it as the piece of software it is! See you around! ;)
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254731.5/warc/CC-MAIN-20190519081519-20190519103519-00081.warc.gz
CC-MAIN-2019-22
2,888
22
https://knowledge.dataiku.com/latest/ml-analytics/time-series/concept-extrema-extraction.html
code
Concept | Time series extrema extraction# Watch the video When working with time series data, we are often particularly interested in what happens around their peaks or the bottom of their valleys. More formally, across an entire time series, we can call the largest value the global maximum, and the smallest value the global minimum. Together, we’d call these two points the global extrema of the time series. Finding global extrema in Dataiku# You probably already know a few ways to find the global extrema of a dataset in Dataiku. For example, we could use the Top N recipe to find any number of the largest or smallest values in the series. Alternatively, we could use the Sort recipe to order all of the values in the series by any column. But as we have said before, time series are not independent observations. Just sorting by the magnitude of values would mix up the chronological order of the time series. Quite often though, we want to investigate not only the global extrema themselves, but also the points near them. For example, what can we learn from the data leading up to the global maximum? Or those immediately following it? Extrema extraction use case# As an example, imagine we have data coming from a car engine that we are testing during the manufacturing process. In addition to knowing the car’s top velocity (the global maximum) on a test run, we might want to investigate metrics leading up to that peak moment. Or, if the engine brakes, and velocity reaches a global minimum of 0, we might want to investigate metrics along its downward trajectory. In these kinds of cases, we essentially want to build “windows” around our global extrema. Time series windowing# Luckily, we have a windowing recipe in the time series preparation plugin! In the lessons on the Time Series Windowing recipe, we described how to define window frames using parameters for causality, shape, width, units, and bounds. Using those window frames, we then calculated rolling aggregations like sums and averages for each row of the dataset. The same Window Parameters section, found in the Time Series Windowing recipe, is also found in the extrema extraction recipe. You can therefore build on your knowledge of defining window frames when you work with the Extrema Extraction recipe! Windowing with the extrema extraction recipe# However, note that while the Windowing recipe calculates rolling aggregations on every row in our data, the Extrema Extraction recipe, calculates aggregations only for a window of data around the global minimum or the global maximum in a column of our choice. Extrema extraction walkthrough# Let’s walk through a simple example. Using the time series windowing recipe, we could define a causal, rectangular window frame of two days, including only the left bound. Then we’d be able to calculate a rolling average sliding down this window frame. We can define a window frame of the same size with the extrema extraction recipe. But, we have two additional parameters to specify: The type of extremum. The column where it should be found. The recipe then finds the chosen extremum–here, a global maximum on the revenue column. For a causal window, as is the case in this example, our extremum serves as the right bound of the window. From the right bound, we draw the window frame according to the width, as we normally would. Because we’ve excluded the right bound from the aggregation, only the values of the previous two days are included in the specified aggregation (an average). Unlike the windowing recipe, which finds aggregations for a rolling window across every row in the data, here we are calculating the aggregations only for the window around the extremum. For a non-causal window, the process is the same, but the extremum would be the midpoint of the window. No matter the kind of window, for each time series in your dataset, the recipe returns only the row of the chosen extremum with the requested aggregation. Let’s stay with this output for a moment. Because we have only a single time series, and there is a clear choice of extremum (no ties among the top values), we have only one output row. The aggregation column, in this output row, however, is able to draw on values from the chosen window frame. Multiple time series# What if we had multiple time series in the dataset and it was and it was stored in long format? The extrema extraction recipe finds the extremum for each time series. If we have two time series in the dataset, the extrema extraction recipe will find two global maxima or two global minima and build the window frame accordingly around those points. Extrema extraction in Dataiku# We can see how this works with a demonstration on the resampled, long format orders dataset. We know the orders dataset contains six different time series, one for each product category. Let’s use the extrema extraction recipe to find the average amount spent in the week leading up to the global maximum. We’ll set order_date as the timestamp column. We are looking for the extremum in the column amount_spent. Let’s select the global maximum as the extremum. Let’s build a causal, rectangular window of six days, and include the left and right bounds. This means that the global maximum of each time series will be the right bound of the window. Let’s calculate the average. Then, to check our work, we’ll also return the maximum. Because we have multiple time series in long format, we need to provide the identifier column tshirt_category. Let’s examine the output. We have the original four columns and four new columns. Our two columns of values each have two new columns of aggregations. The maximum of amount_spent is the same as the original column. This makes sense because we wanted the recipe to find the global maximum in this column. The average of amount_spent reflects the average of the global maximum, the right bound, and the previous six days. We should also draw attention to the column tshirt_quantity. This dataset is an example of a multivariate time series because we have two columns of measurements for every timestamp. We built the window frame around the extremum in the amount_spent column, but the recipe returns the grouped aggregations for all numerical columns, and so we also get aggregations for the column tshirt_quantity too. Finally, note that this dataset includes six different time series, but we have seven output rows. This is because two rows share the same global maximum for the white, male t-shirt category. You are now ready to start building windows around extrema in your own time series datasets. Try this recipe out for yourself in the next tutorial!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476413.82/warc/CC-MAIN-20240304033910-20240304063910-00730.warc.gz
CC-MAIN-2024-10
6,697
50
https://security.meta.stackexchange.com/questions/2192/lets-get-rid-of-scripting-manually/2298
code
The scripting tag is a mess. It covers at least: - Questions that are about the security of programs that happen to be written in an interpreted language, whether against: - Questions about automating a security-related task Only that last point may warrant a tag. On Unix & Linux, we have a scripting that means that the question is specifically about automating a task as opposed to carrying it out interactively. On U&L, it's mildly useful; given that the determination is somewhat subjective, it's on the edge of being a meta tag. Looking at the questions on this site, I don't think such a tag is warranted here. Hence I propose to get rid of the scripting tag altogether. Given that it's often being used instead of a proper tag, we can't just burninate it, we need to do some manual retagging (48 questions).
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00034.warc.gz
CC-MAIN-2022-40
817
5
https://www.christopher-wood.com/
code
Christopher A. Wood Department of Computer Science University of California Irvine Email: woodc1 at uci dot edu CV: Curriculum Vitae 🔏 Blog: chris-wood.github.io 📓 Research Interests: Security and privacy for computer networks, systems, and protocols [Google Scholar, DBLP] - [March 5, 2018] Three new CFRG drafts were submitted today, including: "draft-cremers-cfrg-randomness-improvements-00," "draft-sullivan-cfrg-hash-to-curve-00," and "draft-sullivan-cfrg-voprf-00." - [December 8, 2017] I successfully defended my Ph.D. dissertation entitled, "Security and Privacy Challenges in Content-Centric Networking." - [November 13, 2017] I presented draft-kuehlewind-taps-crypto-sep at the IETF OPSEC meeting at IETF 100 in Singapore. - [September 8, 2017] Along with Brian Trammell, Colin Perkins, Mirja Kuehlewind, and Tommy Pauly, we submitted a new revision to the Post Sockets IETF draft. - [July 19, 2017] Three of my recent papers on CCN were accepted -- one at ACM ICN 2017 and two at IEEE LCN 2017. ☕ My Daily Grind My research interests focus on the intersection of network architectures and protocols, security and privacy, and applied cryptography. Much of my recent work is mostly focused on security and privacy problems in the Content-Centric Networking (CCN) architecture. My tenure at UCI was funded by a NSF Graduate Research Fellowship. Before Apple, I was a core developer of CCNx in the Computer Science Laboratory at PARC (Palo Alto Research Center). I graduated with a B.S. and M.S. in Computer Science and B.S. in Software Engineering from RIT in 2013. During my time there I was advised by Dr. Stanislaw Radziszowski. In the past, I worked at Intel, L-3 Communications, and other small software firms. I received the NSF Graduate Research Fellowship (NSF GRFP) in 2014. I am also a member of the IEEE, ACM, IACR, SIAM, Internet Society, and Tau Beta Pi organizations.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212768.50/warc/CC-MAIN-20180817182657-20180817202657-00418.warc.gz
CC-MAIN-2018-34
1,898
16
https://www.salary.com/research/job-description/benchmark/criminal-investigator-job-description
code
Also referred to as: Requirements and Responsibilities Criminal Investigator conducts investigations of criminal cases. Analyzes collected data or evidence and prepares documentation for legal action. Being a Criminal Investigator conducts surveillance and interviews witnesses. Interfaces with various law enforcement agencies. Additionally, Criminal Investigator may require an associate degree or its equivalent. Typically reports to a supervisor or a manager. The Criminal Investigator contributes to moderately complex aspects of a project. Work is generally independent and collaborative in nature. To be a Criminal Investigator typically requires 4 to 7 years of related experience.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038076819.36/warc/CC-MAIN-20210414034544-20210414064544-00148.warc.gz
CC-MAIN-2021-17
689
3
http://star-www.rl.ac.uk/star/docs/sun152.htx/node50.html
code
This option allows the execution of one or more system level commands without leaving and re-starting the ECHMENU shell task. The command is prompted for with: - System_$ /''/ > you should then enter a command. If more than one command is required then the csh command should be given to initiate a fully This process must be terminated by a CTRL-D in order to return to the ECHMENU shell task. This option can be used to perform system commands like ls and also FIGARO commands such as IMAGE etc. However, ECHOMOP commands which change parameter values will not operate perfectly because the monolith already has the ECHOMOP parameter file open. System commands can also be entered directly at the Option: prompt by making the first character a $. Thus: would execute the system `directory' command, and return to the main menu.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701508530/warc/CC-MAIN-20130516105148-00040-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
829
16
https://www.windowsobserver.com/2010/10/02/internet-explorer-9-beta-growth-continues/
code
He revealed that the beta has now been downloaded over 6 million times and already has a 0.25% usage share across the web. The real testament to its growth is the use it is seeing on various tech websites: The tech enthusiast community is observing a notable increase in IE9 activity: LiveSide reported IE9 Beta users accounted for 25% of their reader base, IE9 overtook IE6 users at DownloadSquad, and Network World reported poll results showing 47% of people intend to try IE9 Beta. Additionally, we saw tweets from the likes of Ed Bott who noticed, “Halfway through Day 1 of IE9 availability, 8% of my ZDNet visitors are using the beta. Steady increase all day, higher than IE7.” Even here on WindowsObserver.com we saw IE9 take over third place from IE6 in the first 5 days after it was released. The popularity of IE9 is also not dampening the continued growth of IE8 but it is having a desired impact in the decline of older IE browser usage: Following earlier trends, IE8 continued its growth this month, making our browser usage share growth 0.57% for our current offerings (IE8 and IE9) in September. We are pleased to report that customers are choosing more modern browsers, as evident by the continued decline of IE6 and IE7 usage (drops of 0.63% and 0.50% respectively in September according to Net Applications). This is goodness for the industry as a whole. Let me close by saying something I have said before. Everyone has their preference for an Internet browser and I am fine with that. The bottom line is folks must pick a modern browser to replace the older, vulnerable browsers that are out there on all platforms from all browser developers. The quicker they are put out of business the safer everyone’s overall browsing experience will be. Do your part and upgrade today!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00863.warc.gz
CC-MAIN-2023-50
1,799
8
https://huggingface.co/blog/fellowship
code
Announcing the Hugging Face Fellowship Program The Fellowship is a network of exceptional people from different backgrounds who contribute to the Machine Learning open-source ecosystem 🚀. The goal of the program is to empower key contributors to enable them to scale their impact while inspiring others to contribute as well. This is Hugging Face supporting the amazing work of contributors! Being a Fellow works differently for everyone. The key question here is: ❓ What would contributors need to have more impact? How can Hugging Face support them so they can do that project they have always wanted to do? Fellows of all backgrounds are welcome! The progress of Machine Learning depends on grassroots contributions. Each person has a unique set of skills and knowledge that can be used to democratize the field in a variety of ways. Each Fellow achieves impact differently and that is perfect 🌈. Hugging Face supports them to continue creating and sharing the way that fits their needs the best. The benefits will be based on the interests of each individual. Some examples of how Hugging Face supports Fellows: 💾 Computing and resources 🎁 Merchandise and assets. ✨ Official recognition from Hugging Face. Fellows are currently nominated by members of the Hugging Face team or by another Fellow. How can prospects get noticed? The main criterion is that they have contributed to the democratization of open-source Machine Learning. How? In the ways that they prefer. Here are some examples of the first Fellows: - María Grandury - Created the largest Spanish-speaking NLP community and organized a Hackathon that achieved 23 Spaces, 23 datasets, and 33 models that advanced the SOTA for Spanish (see the Organization in the Hub). 👩🏼🎤 - Manuel Romero - Contributed over 300 models to the Hugging Face Hub. He has trained multiple SOTA models in Spanish. 🤴🏻 - Aritra Roy Gosthipathy: Contributed new architectures for TensorFlow to the Transformers library, improved Keras tooling, and helped create the Keras working group (for example, see his Vision Transformers tutorial). 🦹🏻 - Vaibhav Srivastav - Advocacy in the field of speech. He has led the ML4Audio working group (see the recordings) and paper discussion sessions. 🦹🏻 - Bram Vanroy - Helped many contributors and the Hugging Face team from the beginning. He has reported several issues and merged pull requests in the Transformers library since September 2019. 🦸🏼 - Christopher Akiki - Contributed to sprints, workshops, Big Science, and cool demos! Check out some of his recent projects like his TF-coder and the income stats explorer. 🦹🏻♀️ - Ceyda Çınarel - Contributed to many successful Hugging Face and Spaces models in various sprints. Check out her ButterflyGAN Space or search for reaction GIFs with CLIP. 👸🏻 Additionally, there are strategic areas where Hugging Face is looking for open-source contributions. These areas will be added and updated frequently on the Fellowship Doc with specific projects. Prospects should not hesitate to write in the #looking-for-collaborators channel in the Hugging Face Discord if they want to undertake a project in these areas, support or be considered as a Fellow. Additionally, refer to the Where and how can I contribute? question below. If you are currently a student, consider applying to the Student Ambassador Program. The application deadline is June 13, 2022. Hugging Face is actively working to build a culture that values diversity, equity, and inclusion. Hugging Face intentionally creates a community where people feel respected and supported, regardless of who they are or where they come from. This is critical to building the future of open Machine Learning. The Fellowship will not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. - I am just starting to contribute. Can I be a fellow? Fellows are nominated based on their open-source and community contributions. If you want to participate in the Fellowship, the best way to start is to begin contributing! If you are a student, the Student Ambassador Program might be more suitable for you (the application deadline is June 13, 2022). - Where and how can I contribute? It depends on your interests. Here are some ideas of areas where you can contribute, but you should work on things that get you excited! - Share exciting models with the community through the Hub. These can be for Computer Vision, Reinforcement Learning, and any other ML domain! - Create tutorials and projects using different open-source libraries—for example, Stable-Baselines 3, fastai, or Keras. - Organize local sprints to promote open source Machine Learning in different languages or niches. For example, the Somos NLP Hackathon focused on Spanish speakers. The HugGAN sprint focused on generative models. - Translate the Hugging Face Course, the Transformers documentation or the Educational Toolkit. - Doc with specific projects where contributions would be valuable. The Hugging Face team will frequently update the doc with new projects. Please share in the #looking-for-contributors channel on the Hugging Face Discord if you want to work on a particular project. - Will I be an employee of Hugging Face? No, the Fellowship does not mean you are an employee of Hugging Face. However, feel free to mention in any forum, including LinkedIn, that you are a Hugging Face Fellow. Hugging Face is growing and this could be a good path for a bigger relationship in the future 😎. Check the Hugging Face job board for updated opportunities. - Will I receive benefits during the Fellowship? Yes, the benefits will depend on the particular needs and projects that each Fellow wants to undertake. - Is there a deadline? No. Admission to the program is ongoing and contingent on the nomination of a current Fellow or member of the Hugging Face team. Please note that being nominated may not be enough to be admitted as a Fellow.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104204514.62/warc/CC-MAIN-20220702192528-20220702222528-00793.warc.gz
CC-MAIN-2022-27
6,047
37
http://sourceforge.net/p/pingpong-abc/discussion/303226/thread/0a8045b9/
code
Work at SourceForge, help us to make it a better place! We have an immediate need for a Support Technician in our San Francisco or Denver office. Why Bittorrent ABC that the client is not compatible with the TS? Whenever I try to open a torrent with ABC this tells me that the torrent is invalid. Does anyone know any way to resolve this?
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997858892.28/warc/CC-MAIN-20140722025738-00229-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
338
4
http://www.tssci-security.com/archives/2008/01/15/day-7-itsm-vulnerability-assessment-techniques/
code
Day 7: ITSM Vulnerability Assessment techniques Lesson 7: Today I wanted to bring the real meaning behind these techniques into the spotlight. Learning about how IT groups do real security is only part of this. I'm also talking about what I've seen that IT security shops don't do. What penetration-testers or auditors don't recommend. What everyone misses. This is my way of shaping the industry in a way. I feel it's extremely important. You may laugh about some of the ideas or think they are trivial. That's fine -- let me know what you do and don't like! You may also be lost in a sea of acronyms and content. This is why I make sure to recommend additional books you can read that explain the topics well. I see all of this as a step-up for instructional capital around vulnerability assessments. I want to give everyone a chance to improve their skillsets, techniques, as well as toolchains. Part 1: Information assurance vulnerability assessment — Network Access Control This post is not about NAC, the common technology you may all be familiar with or studying/researching. The Cisco version of NAC is a poor concept. The endpoint security work in the IETF by Juniper Networks and the Microsoft work (or StillSecure and anybody else) is also a complete waste of time. This industry and these products are dead and or dying. So let's just skip Cisco NAC and concentrate on the real topic: access controls in networks. Is anyone here familiar with VLAN's? How about VACL's? What about Cisco's new access control layer in the network? This is more along the lines of what I'm talking about. However, I don't want to get into protecting the network infrastructure (that's next week). Recommendation: There is a concept, which is really more of a dream that I have. In the spirit of Martin Luther King Jr. (who was born on this day, 79 years ago) -- I am going to get my favorite industry to believe in this dream. To believe in a network that has no traffic except SSL, GPG, and SSH (or any of the other secure channel technologies talked about on Day 5). Every packet that flies over the WiFi, the Ethernet, and between servers is all wrapped in happy encryption. All ports are closed unless they speak SSL. But wait -- what about DNS? Surely, DNS must be used for the local Intranet -- to get to local servers and printers, and to get to an SSL VPN or automatically-configured SSL proxy (so that packets can go to/from the global Internet). But Internet-aware DNS can be restricted internally, so that only the SSL proxy has access to the Internet. This keeps people from tunneling SSH in DNS or other strange network affairs. All other services besides some Intranet DNS, a little printer port access, and SSL can be completely shut down and shut off. We don't need it anymore. This is 2008, not 1998. Certainly, there will be exceptions at some companies or organizations -- but these can be monitored with compensating controls. Even Intranet servers and printers should technically be behind an "Intranet proxy" which works in a similar way as the Internet SSL proxy. All traffic can thus be wrapped in SSL, so that printers can be accessed via HTTP (although it would be nice if they supported SSL natively). The Intranet proxy could then whitelist scripts coming from the Internet to prevent cross-site printing or other unwanted script execution. Better - the SSL proxies can be configured with concepts from ClientVA and Whitetrash. All client-side applications that access the Internet not only are passively verified for their version numbers (also don't see: NAC scanning which actively verifies by scanning), but they are additionally only allowed to certain URI's via a whitelist. I'm not really big on Windows or Apple file sharing for distributed clients. iSCSI might be ok on a server backend network, but these sorts of protocols don't belong on a safe network regardless of how they are encrypted. I'm mostly referring to SMB, which is safe to turn off in 2008. We have Intranet wiki software that allows flies to be uploaded instead. Also, ideally all user clients would be thin clients -- but this is possibly a dream for a different day. Part 2: Software assurance vulnerability assessment — Stored XSS Best Stored-XSS attack tools w3af, HTMangLe, Hackvertor (or anything Gareth Heyes writes), PostInterceptor, Tamper Data, Burp Suite, Paros, OWASP WebScarab, XSSscan.py, Acunetix XSS Scanner, Syhunt Sandcat Free, Wapiti, OWASP CAL9000, Wfuzz, SPIKEproxy, Gamja, screamingCSS Best XSS attack helper tools Web Developer, RSnake's Security Bookmarklet methodToggle, .mario's Encoding tools, Dean Edwards' Packer, JSMin, RSnake's XSS Cheat Sheet, OWASP SWFIntruder, HackVertor (and everything else Gareth Heyes writes), HTMangLe, ExtendedScanner, Hunting Security Bugs' Reference for ASP.NET Control Encoding and Web Text Converer, WhiteAcid's XSS Assistant, Net-Force Tools' NF-Tools, Hunting Security Bugs' Overlong UTF, RefControl, User Agent Switcher, ProxMon, OWASP Pantera, AppPrint, AppCodeScan, FindBugs, FxCop, Pixy (for PHP), Milk (for Java), SWAAT (for ASP, JSP, PHP), ASP-Auditor (for ASP.NET), XSSDetect (for .NET), Mod-Security, PHP-IDS, CORE GRASP, Inspekt, RATS, PSA3, PFF, PHP-SAT, PHPSecAudit, Orizon, LAPSE Unlike black-box testing Reflected-XSS, it is highly recommended that every time that you change a parameter or POST a form -- that each test string be unique. Know which tool you used and where in the application your vector was initially sent. Stored-XSS can pop up anywhere throughout the web application much in the same way that a fuzzer can crash a fat application by sending a sequence of strings. This is the reason why humans are needed and manual testing must be done to expose all flaws. However, I am highly impressed with the accuracy and methods used when doing manual code review for finding XSS. There are plenty of SQL injection and XSS that can only be found by looking through the source code. Often, either finding the source code through information disclosure or other means (identifying an open-source application or component is the easiest/obvious way) will allow finding the most obscure of stored-XSS vulnerabilities.blog comments powered by Disqus
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00594-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
6,231
20
https://community.adobe.com/t5/illustrator-discussions/black-svg-on-the-internet/td-p/12890468
code
On our website, we use SVGs that are exported from Illustrator. When we use them on some pages, it works. But if we want to see only the image from the repertory, it is all turning black : https://bib.umontreal.ca/public/bib/images-dg/promotions/studio-enregistrement.svg Is there a problem with the way we export our SVGs? There seems to be some sort of security violation going on. I've downloaded your SVG, opened it up in my browser and it rendered correctly. When I open your .svg link and check the browser's console, it shows me these two errors: To learn more about Content Security Policy, visit the site below: Below is an example .htaccess file - please do not just use it "as-is" if you're not sure about this: Sorry to hear about this experience. I agree with @thatsmauri. It seems to be an issue with "Content Security Policy" settings of the server where the SVG file is hosted. You need to contact your hosting provider. This is not an issue with the SVG file itself. A workaround would be to generate the SVG file as follows: I hope it helps. Yes, it works!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531779.10/warc/CC-MAIN-20220520093441-20220520123441-00359.warc.gz
CC-MAIN-2022-21
1,074
11
https://forums.mydigitallife.net/threads/sata-controller-driver-missing-form-wndows-8-for-acer-aspire-5920g.41456/
code
I'am trying 8 hours now to install Windows 8 to an Acer Aspire 5920g. Problem is that when the usb flash drive comes to hdd presenation point the hdd isnt being displayed. My guess is that Sata AHCI/IDE controller driver for the 5920g's chipset is missing from Windows 8 installation dvd. I googled very much and i can only find XP and Vista Sata Drivers while oi need 8's. Is there an alternative plz? I must get 8 installed in that laptop.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660529.12/warc/CC-MAIN-20190118193139-20190118215139-00211.warc.gz
CC-MAIN-2019-04
441
1
https://www.ideastatica.com/support-center/general-settings-in-detail-application
code
General settings in Detail application Let's go through all settings in the Project summary tab. First, you can see the Discontinuity Regions (DR) list. To add a new DR, click the plus button or copy the previous one. Names and general settings of each DR can also be modified. See the figure below. This tab is simply to look up the cross-section and add, remove, or modify it. How to work with cross-sections will be shown in the next courses. Materials & models As the name suggests, playing with the definition of materials is possible. This is the tab where the creep coefficients are defined. There is a list of named general settings. You can assign these settings to individual DR in the Discontinuity Region tabs described above. If you didn't set the information about the project at the beginning or if you wish to change them, you can do that in the last section.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00312.warc.gz
CC-MAIN-2024-18
875
8
http://johnboohoo.blogspot.com/
code
Monday, February 14, 2011 A Japanese ophthalmologist warns of the possibility of severe damage to the eyes of young children should they use the 3DS. The doctor's warning: http://www.sankakucomplex.com/2011/02/07/doctor-3ds-makes-children-cross-eyed/3D images are bad for the eyes of infants. Nintendo says as much, and for children not to use it. The reason is that there is the possibility of damaging the eye’s balance and inducing squinting/strabismus. The Endless Forest is a multiplayer online game and social screensaver, a virtual place where you can play with your friends. When your computer goes to sleep you appear as a deer in this magical place. There are no goals to achieve or rules to follow. Just run through the forest and see what happens. http://vkontakte.ru is most popular social network in Russia. I've writen script on python3 grabbing direct links for audio collection of some person. Also I've made little program that create sh script for downloading all this songs ^^ For program work properly you need to save vkontake.ru cookies in netscape format in file "cookie.txt". You can use "Export Cookie" extension for firefox. How to use: 1. Open audio library and copy id from vkontakte.ru/audio.php?id=<id> 1. python3 ./vkmain.py 2. python3 ./renamer <id.txt> 3. sh ./down_id.txt.sh That's all. You'll get all songs from vkontakte.ru. Download scripts: http://uploading.com/files/93d53abd/vk.tar.bz2/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676588972.37/warc/CC-MAIN-20180715203335-20180715223335-00172.warc.gz
CC-MAIN-2018-30
1,429
16
https://community.grafana.com/t/contact-points-health-column-missing/78797
code
I hesitate to mark this as a bug in the github project in case it isn’t, but seeing something inconsistent between Organizations. The original Org has been around since our instance was created 2 years ago. Now that we’re on 9.3.x, there is an option in contact points for health. This column and details are completely missing from that original Org but exist in two newer Orgs created. Any ideas as to why? There are over a dozen contact points defined in Org 1 in case it goes away with a certain count. Screenshots to show difference:
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499946.80/warc/CC-MAIN-20230201144459-20230201174459-00368.warc.gz
CC-MAIN-2023-06
542
4
https://www.peteinfo.com/uncategorized/panchanan-sardar/
code
Saw a performance by Panchanan Sardar on Sitar with accompanying Tablas. Was an amazing performance, definitely going to consider dropping digital music in favour of real instuments! He also had a Q&A session after in which he played a couple of traditional Irish songs, which worked surprisingly well on Sitar. His explanation of the Raga was interesting, he used the metaphor of learning a Raga being like a scholar learning a body of work. Each Raga performance is then similar to an essay by the scholar, where the same body of learning is presented, but it is never exactly the same, much in the way that no essay is the same.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00003.warc.gz
CC-MAIN-2023-40
631
1
https://forums.sassnet.com/index.php?/profile/87280-wildfire-annie/
code
I have a bunch of nice civil war battle flags with poles and stands. My husband Bad Apple used to use them for SASS events. is there a club that wants them? Maybe Winter range or an AZ club. I’m sure he would be happy to have them used at SASS events. There are many. All in nice shape as this is all he used them for. thanks Anna Johnson Wildfire Annie SASS 5021 lifetime member.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358064.34/warc/CC-MAIN-20210227024823-20210227054823-00452.warc.gz
CC-MAIN-2021-10
382
1
https://forums.civfanatics.com/threads/os-x-version-using-dx11.469615/
code
I noticed when moving some mod files over (thank you AlanH btw for all the help in the FAQ!) that there is only one .ini file, GraphicsStettingDX9.ini , in my OS X Civ 5 file in my documents folder while my windows version has 2, one for DX9 and one for DX11. Does this mean that the OS X port only uses DX 9? Does this mean it performs more poorly or with limitations? Is there any way/reason to get it to use DX11? thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517966.39/warc/CC-MAIN-20210119042046-20210119072046-00419.warc.gz
CC-MAIN-2021-04
424
1
https://simulacra.in/2012/09/macbook-air/
code
I purchased a 13″ MacBook Air a couple of weeks ago: I have officially joined the dark side now. I did use a friend’s Mac for a month or so, so it didn’t take me much time to get used to it. TL;DR version of the post: I love the hardware, have mixed feelings about OS X, am mostly happy with the Mac ecosystem of apps. The hardware is just lovely. The screen (1440×900!) is the best I’ve ever used. The weight is barely noticeable. The keyboard is nice and responsive, the trackpad’s awesome: as responsive as the screen of an iPad. I even like the reversed scrolling! Everything has a great finish. It’s silent and doesn’t heat up. This is one solid piece of engineering, worthy of respect. The SSD makes computing a joy: booting the machine takes 10 seconds, while a resume just takes around 2 seconds, barely noticeable. Applications are much snappier than on Srivatsan’s MacBook Pro, and compilation speed is awesome. I don’t think I can use a machine without an SSD now. Case in point: the oh-my-zsh config I use used to take two seconds to load on my Dell machine with a 7200 RPM disk, it loads in less than half a second here. Battery life: I can use it for nearly 8 hours if careful. What else can one ask for, especially in a machine this light? The apps! Oh the number of (high-quality) apps out there for a Mac is truly outstanding. Full-screen applications: I’m in love. If you had read my earlier post about my Mac workflow, you have an idea about how much I rely on them. OS X’s rock-solid stability: I’ve only had to reboot the machine twice so far; once when upgrading it to Mountain Lion and once when installing an upgrade to Mountain Lion :) The unixy-ness of the underlying OS. I am looking forward to learning about the internals, and learning about cool toys like DTrace which aren’t available on Linux! I like having the Command key (which is used by most keyboard shortcuts on a Mac) placed beside the spacebar, it’s much more ergonomic than the placement of Control on most keyboards (used as the modifier key for most shortcuts on other platforms). Since I was learning new keyboard shortcuts, it’s an excellent time for me to re-train myself and do things ergonomically: with two hands, typically with the right hand only used for modifier keys. MagSafe 2 is worse than MagSafe 1. Easily falls-off if you look at it the wrong way, and makes cable-management worse. Don’t get me wrong, this is still much, much better than the connectors for other laptops; but I can’t help but compare it with the original. Only 128GB of space. An annoying trade-off. Inability to configure it just so, without resorting to weird tweaks. Making it difficult to turn off or increase the speed of animations. OS X’s Alt-Tab/Alt-Grave combination: I find it jarring. Will take some getting used to. Needing to quit applications after I close the last window. Since I plan on making native Mac and iOS apps, XCode will take some getting used to. I actually like Objective-C so far, but XCode seems pretty complicated and heavy. The planned obsolescence and lack of hardware maintainability: I plan on getting AppleCare, so I know this machine will be useful for me for three years. After that, it’s probably gonna be worthless if broken: will cost more to fix it than what it’ll be worth. Mission Control’s method way of organizing desktops and full-screen apps: launching a new window of a full-screen app will always lead it to appear at the end, not next to the app in question. Is pretty annoying, since Alt-Grave doesn’t work with full-screen apps too. Launchpad is useless. The dock is rarely useful, I have it on auto-hide. The Dashboard seems pointless. I haven’t seen a use for the Notification Center yet (I refuse to install Growl, too: notifications are evil). I don’t use most of Apple’s built-in apps (though I do want to try GarageBand, it seems awesome) — I’m not the target user for whom they've designed the desktop. This is fine by me, though: most of these can be safely ignored. Well, these are the thoughts of an OS X newbie. There are still lots of things I need to explore…
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119838.12/warc/CC-MAIN-20170423031159-00399-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,160
24
https://forums.guru3d.com/threads/sweetfx-shader-suite-release-and-discussion-thread-4.381912/page-39
code
Discussion in 'Games, Gaming & Game-demos' started by CeeJay.dk, Sep 30, 2013. For anyone interested: My XCOM: Enemy Within SweetFX profile I have the K-putt's config and the referred SweetFX version 1.5.1. from the database site. Everything is in the Battlefield 4 folder, but neither exe files take a hold on SweetFX. I've disabled Origin's layout as much as I know, and I'm not running Fraps, Teamspeak or Inspector. Clearly I'm doing something wrong. I have China Rising and the latest patch/update today installed. Radeon pro grays out most of the checkboxes (including the one to enable sweetfx). I have pointed it to the sweetfx root directory. I am running an nvidia 680 but people have said that radeon pro works with nvidia cards as far as sweetfx is concerned. But I am not seeing that in 8.1-nothing seems to work. I am testing with a dx9 title GRAW (Ghost recon advanced warfighter) I did get efx to work w sweetfx to alter gamma in this title but no smoothing. In win7 sweetfx works well w this title. Are you in Windows 8? Are you using the x64 files? Win7, nvidia 680 I have tried using the both dll sets with different exe files. The x64 files seem more promising - as in they try to do something, the game tries to start but I get a window telling it has crashed. I haven't had problems with Fraps, Teamspeak or Origin overlays before, but that doesn't mean it wouldn't be the case here. I have your preset apparently from the database. is there any fix for 64bit radeon pro? my radeonpro wont start 64 bit automatically =( (64 bit support is enabled) Hi all, ¿how in enable sweetfx in Cry Of Fear?, i put all the files where the .exe is but the effects dont apply. I get this error when using Windows 8.1 x64 + Battlefield 4 x86. Also I don't get sweetfx to work with Battlefield 4 x64, I've tried sweetfx 64 files etc, no luck! Read the FAQ... We has enough people asking the question that has been answer by the FAQ... That's odd. Are you running MSI Afterburner/Rivatuner or similar? Anything with an OSD can interfere with sweetfx. OK, I read the first post a few times but did not see anything like a FAQ. Radeon pro is not cooperating for me nor is much of anything else when trying to smooth out the jaggies of a dx9 title , Ghost Recon Advanced Warfighter. The only time I got efx+sweetefx to work was with the bundle in this post. www dot overclock dot net/t/1296721/how-to-anti-aliasing-injection-fxaa-smaa-and-sweetfx/1133 With radeon pro, I configure a profile, point it to the sweet efx folder, run rad pro as admin-still nothing. I guess you are pointing the wrong version, RadeonPro need a older one, which is 1.4. Is Cry of Fear DX9-11 ? That's because the FAQ is not in the first post, it's the fourth post but I guess scrolling through the first page would be chore.. RadeonPro still uses 1.4 so 1.5.1 and efx settings files will not work. thank you. yes i see how radeon pro can use 1.4 But if you wouldnt mind expounding on a somewhat different aspect of these injectors- jaggie smoothing..I ran a series of tests with radeon pro on my system (win 8.1, nvidia 680GTX latest driver) smaa ultra and fxaa are very close in quality with smaa slightly better but with a performance hit of about 10% on my previous windows 7 machine I was also able to get jaggie smoothing using sweetfx. I understand that sweetfx v1.5.1 has a d3d9.gll that does not work with win 8.1 and for this reason i need to use boulator's injector or efx (only talking about dx9 titles now). Is this right? I have had NO LUCK in using efx 2.0 with sweetfx on my own. However, someone did make a package of the two for bf4 and when I use that, I get an aweful bug-cursor makes infinite trails before the game starts and there is not really any jaggie smoothing. However, the color palette seems to be adjusted as the shader settings seem to indicate.I thought sweetfx was also supposed to do some smaa or fxaa as there is a bit that can be set in a settings file for that? My package for BF4: I use only 64bit version, I used the same logic for the 32bit but I have not tested. For me it works without problems, the only thing that does not work is the SMAA or FXAA, I think it's not yet supported. DX 9 is Cry Of Fear Far as I know SweetFX still works with DX9 on win8.1 (FAQ confirms that actually) so you should be able to use SweetFX as per usual with DX9 titles. SMAA wasn't converted to the eFX shader layout for DirectX 11 (BF4 is such a title) yet and won't apply. FXAA on the otherhand does as far as I know.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152156.49/warc/CC-MAIN-20210726215020-20210727005020-00133.warc.gz
CC-MAIN-2021-31
4,524
41
https://dmeg.cessda.eu/Data-Management-Expert-Guide/3.-Process/Data-entry-and-integrity
code
Table of Contents Data entry and integrity Data integrity means assurance of the accuracy, consistency, and completeness of original information contained in the data. At the same time, the authenticity of the original research information has to be preserved (see 'Data authenticity'). The integrity of a data file is based on its structure and on links between data and integrated elements of documentation. From the moment that data is being entered, data integrity is at stake. Data entry procedures have changed over recent years. Operators entering data into a computer manually are being replaced by automated computer technologies, while the universal distinction between the three phases of data collection, data entry, and data editing/checking is often becoming obsolete. In general, greater automation of processes generally prevents some types of errors, but at the same time, it produces other types of errors. For example, errors in scripts during computer-assisted interviewing may cause systematic shifts in data and to be able to detect such deviations in automated forms of data entry requires different kinds of checks in comparison to manually entered data. Minimising errors in survey data entry In the accordion below a summary of recommendations on minimising errors in survey data entry is given (UK Data Service, 2017a; ICPSR, 2012; Groves et al., 2004). In cases of errors .. Considerations in making high-quality transcriptions of qualitative data The most common formats of qualitative data are written texts, interview data and focus group discussion data. In most cases, interview and discussion data are firstly digitally recorded and then transcribed. Transcription is a translation between forms of qualitative data, most commonly a conversion of audio or video recordings into text. If you intend to share your data with other researchers, you should prepare a full transcription of your recordings (Bucholtz, 2000). There are several basic rules and steps in the process of making and checking a high-quality transcript from audio/video (Kuckartz, 2014):
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00199.warc.gz
CC-MAIN-2023-50
2,090
11
https://www.ailsamairsong.com/post/putting-sound-on-paper-workshop-recording
code
Putting Sound on Paper - workshop recording Here is a recording of the workshop Penny Tristram and I did back in the Autumn, called 'Putting Sound on Paper'. It covers loads of ways of translating sound into marks on the page, and I hope that it might inspire you to take (further) part in 'Soundmapping Our 5 Square Miles'. No artistic expertise required, just get something to draw with and something to draw on! If you want your drawings to become part of the co-creative soundmap and the piece I am currently creating for the end of March, then please send them here before the end of this month:
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00668.warc.gz
CC-MAIN-2023-14
600
4
https://www.dotnetheaven.com/article/how-to-create-timeline-in-project-2010
code
How To Create Timeline In Project 2010 This article shows how to create timeline in Project 2010. Process for creating timeline in Project 2010 is given below. Open the Microsoft Project 2010. Create the tasks and also select the tasks which you want to see on timeline. On the task tab click Add To Timeline in the Properties section of the toolbar. The Timeline expands between the toolbar and the Gantt Chart areas with a new tasks assigned to it. Ask Your Question Got a programming related question? You may want to post your question here
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104576719.83/warc/CC-MAIN-20220705113756-20220705143756-00552.warc.gz
CC-MAIN-2022-27
544
9
https://forums.vigem.org/
code
UCR-xbox360ce-ViGEm pipe touchpad and guide(PS) key Run-Time Check Failure #0 Visual Studio 2017 Support Usermode DLL and API Hiding Steam controller and feeding its data to my own program ViGEm and DirectInput emulation How exactly do i use(/build?) this? How to tell if HG is installed? Error Message When Using GLOsc HidCerberus lost it's Alpha Caution? GitHub Pull Request (Battery Status DS4) ScpToolkit retrieving rumble values Let's see if this works... Switch Pro X + Suggestion for HidGuardian C# app to drive HidCerberus / HidGuardian? HidGuardian Whitelist cleanup Well its all up to you now lol Next Page »
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822480.15/warc/CC-MAIN-20171017181947-20171017201947-00065.warc.gz
CC-MAIN-2017-43
619
18
http://homepage.cs.uiowa.edu/~sriram/30/fall03/project1Grading.html
code
Project 1 Grading Guidelines Due date: Tuesday, 10/7 In the discussion sections our TAs suggested a certain way of breaking up the project into manageable chunks. Here is a grading scheme we will use for the project that is based on this breakup. Your program is expected to perform correctly at one of 4 levels and your program will be graded out of the points corresponding to the highest level your program correctly - Level 1: (Points: 30) buildDict works correctly. Specifically, buildDict correctly reads the text files provided, constructs a dictionary, and correctly outputs it. The wordList class has the functionality specified in the project handout; for example, wordList should contain a sorted sequence of words and the 4 functions mentioned in the handout should exist and work correctly. - Level 2: (Points: 50) In addition to Level 1 performance, a limited version of the spellCheck program, that I shall call spellCheck 1.0 works correctly. spellCheck 1.0 reads the document the user wants spell checked and simply produces a list of misspelled words. There is no interaction with the user and the map class need not exist. Also, no corrected output file is produced. - Level 3: (Points: 75) In addition to Level 2 performance, a version of the spellCheck that provides limited interaction works correctly. This version, which I will call spellCheck 1.1, interacts with the user but only supports the options (R), (I), and (E). A corrected output file is produced. Thus, user options (P) and (N) are not supported and there is no need for the - Level 4: (Points: 100) At this level all the functionality required by the Project 1 handout are provided. In this version, all options (R), (P), (I), (N), and (E) are supported and the map class exists and works correctly. For example, if you submit a correctly working buildDict and spellCheck 1.0 then your program will be graded out of 50 points. It is not guaranteed that you will get 50 points because we will consider other factor such as efficiency (e.g., binary search and not linear search is used to search the dictionary) and design of classes (e.g., copy constructors and destructors should be provided, if necessary). Along with your program files you are required to submit a file called README that contains two pieces of information: (i) the highest level your program works at correctly and (ii) a list of bugs in your program known to you. Make sure that the names you give to your program files are exactly as specified in the We will automate the process of grading and your project will not be graded if the names are different from what we expect. Programs that do not compile will not any points.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213691.59/warc/CC-MAIN-20180818154147-20180818174147-00426.warc.gz
CC-MAIN-2018-34
2,683
39
https://github.com/LittleVulpix/toxme
code
You can contact the maintainer of the toxme.io directly. I can be found on freenode IRC, channel #tox , or you can add me from tox by adding firstname.lastname@example.org . I can assist you with removing or changing your user account on toxme.io in the event that you forget your toxme.io-generated password. However, please note that you need to be able to prove the account in question is yours. This means that you need to have access to your old toxid. I am not a tech support for tox issues. If you have an issue with tox, raise a ticket on github or ask someone on the IRC. ToxMe is a speedy and feature-packed Tox name resolution server. Quick notes before we get started, ToxMe's source is not required to access and use it in a client. Additionally, it's being written in OS X and ran on Ubuntu, so please correct any odd quirks I might accidentally include. Install homebrew from http://brew.sh brew install libsodium python3 git libffi git clone https://github.com/LittleVulpix/toxme pip install -r misc/requirements.txt And you should be ready! Note: we use Ubuntu 14.04, but newer releases should work too. apt-get install python3 python3-pip libffi-dev build-essential wget git sqlite libtool autotools-dev automake checkinstall check git yasm git clone https://github.com/jedisct1/libsodium.git cd libsodium git checkout tags/1.0.3 ./autogen.sh ./configure --prefix=/usr make check sudo make install cd ~ git clone https://github.com/LittleVulpix/toxme cd toxme pip3 install -r misc/requirements.txt brew install postgresql apt-get install libpq-dev All ( For Ubuntu, use pip3 instead of pip ) pip install psycopg2 For most testing and development work you'll need both a config.json and a sqlite3 database. A sample config.json is provided at misc/config.json A database can be generated locally by running sqlite3 -init misc/structure.sql database.db "" Now just run python3 src/main.py and it should start automatically! If you're testing it locally make sure secure_mode in config.json is marked off (0) otherwise you'll be required to reverse proxy it and use an SSL cert
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589902.8/warc/CC-MAIN-20180717203423-20180717223423-00503.warc.gz
CC-MAIN-2018-30
2,092
22
https://blog.eapps.com/testimonials/thanks-very-much-guys.html
code
Thanks very much guys My account with eApps have been active since 2003 and I am delighted with the stability eApps provides me with my web application site using J2EE (EJB2.1, JSP, JDBC, STRUTS, JBOSS, ANT, MySQL, etc.). However will soon upgrade this site to a Hibernate 4. All the technologies I used to build the site are getting superseded now, but still supported by eApps, which is really great !! Thanks very much guys.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281492.97/warc/CC-MAIN-20170116095121-00464-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
427
2
https://core.tcl-lang.org/thread/info/33aa4f547299288394b93cf202d7481da90e2d5fada4cf73dd7b5a610cf963b9
code
tsv commands break thread access rules for Tcl values |User & Date:||sebres 2018-04-03 08:56:04| - Change icomment to: > without any regard to whether the code is running in the same thread that created that Tcl_Obj. Why it is expected? The access to the objects in the tsv-storage is mutex-protected, and each set as well as the result of any tsv-call should always contain a safe duplication of the object (thus safe for any thread). BTW I cannot reproduce the segfault with your example. - Change login to "sebres" - Change mimetype to "text/plain"
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998844.16/warc/CC-MAIN-20190618223541-20190619005541-00336.warc.gz
CC-MAIN-2019-26
551
8
https://library.skillport.com/coursedesc/it_pmpdasdj_01_enus/summary.htm
code
Explore differences between traditional and Agile software project management in this 14-video course. Learners discover how to use real-time data metrics for command, control, and decision making. Examine the role metrics play in monitoring teams and continuous development, the role of software project management tools, and how to use JIRA to manage software projects. Begin by comparing traditional versus Agile project management, and take a look at effective use of software project management data analysis metrics and Agile project management data analysis metrics to monitor and control Agile projects. Discover how to use Agile team metrics for continuous self-improvement, and how real-time data metrics can feed the decision-making process. Identify how to select meaningful software project metrics; benefits of using software metrics and how to monitor and track them; and observe pitfalls encountered when one uses software project metrics. Learn how to identify key Agile project metrics to measure success; continuous development metrics; and types of software project management tools. Learn how to configure and use JIRA and dashboard to manage software projects.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400208095.31/warc/CC-MAIN-20200922224013-20200923014013-00151.warc.gz
CC-MAIN-2020-40
1,182
1
http://caps.fool.com/Blogs/quick-sad-fact/272045
code
Quick Sad Fact Long term investing in America doesn't work. FACT - at the DJIA peak in 1929 the value of the entire index was worth a little over 18 oz of gold. FACT - today, the DJIA is worth a little over 9 oz of gold. If 80 years isn't LONG TERM investing, I don't know what is. Buy gold - you won't get rich, because gold is a store of wealth, but you'll do better than buying into the DJIA.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218193288.61/warc/CC-MAIN-20170322212953-00138-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
395
5
https://blog.adafruit.com/2013/08/30/raspberry-pi-case-with-camera-piday-raspberrypi-raspberry_pi/
code
I really like the Stacking Pi Case and I’ve laser cut a bunch of them at Milwaukee Makerspace, including the one I used for my Radio Milwaukee Radio, but when I got a Raspberry Pi Camera, there was no easy way to include it… I ended up making a derivative of the Stacking Pi Case and calling it the Raspberry Pi Case (with Camera) because, that’s what it is. I just made the Stacking Case taller and added in some holes to mount the camera. So if you’ve got a Raspberry Pi and Camera Module, this case might do well for you, since it’ll hold them both. Grab it from Thingiverse! … Featured Adafruit Product Raspberry Pi Camera Board: The Raspberry Pi Camera Module is a custom designed add-on for Raspberry Pi. It attaches to Raspberry Pi by way of one of the two small sockets on the board upper surface. This interface uses the dedicated CSI interface, which was designed especially for interfacing to cameras. The CSI bus is capable of extremely high data rates, and it exclusively carries pixel data. The board itself is tiny, at around 25mm x 20mm x 9mm. It also weighs just over 3g, making it perfect for mobile or other applications where size and weight are important. It connects to Raspberry Pi by way of a short ribbon cable. The camera is connected to the BCM2835 processor on the Pi via the CSI bus, a higher bandwidth link which carries pixel data from the camera back to the processor. This bus travels along the ribbon cable that attaches the camera board to the Pi. The sensor itself has a native resolution of 5 megapixel, and has a fixed focus lens onboard. In terms of still images, the camera is capable of 2592 x 1944 pixel static images, and also supports 1080p30, 720p60 and 640x480p60/90 video. (read more) Each Friday is PiDay here at Adafruit, be sure to check out our posts, tutorials and new Raspberry Pi related products. Have you tried the new “Adafruit Raspberry Pi Educational Linux Distro” ? It’s our tweaked distribution for teaching electronics using the Raspberry Pi. But wait, there’s more! Try our new Raspberry Pi WebIDE! The easiest way to learn programming on a Raspberry Pi. We now have Raspberry Pi Model B with 512MB RAM in stock and shipping now!
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525634.13/warc/CC-MAIN-20190718125048-20190718151048-00096.warc.gz
CC-MAIN-2019-30
2,212
7
http://daybeds-cosh-living18539.imblogs.net/2008835/how-cosh-can-save-you-time-stress-and-money
code
By default, the table services implements optimistic concurrency checks at the extent of unique entities for Insert, Merge, and Delete functions, even though it is achievable for your consumer to pressure the table services to bypass these checks. The subsequent patterns and guidance may additionally be related when implementing this pattern: Substantial entities pattern Merge or replace Finally regular transactions pattern (If you're storing the info sequence in a blob) Extensive entities pattern In terms of outdoor decor on your patio, porch, yard, or deck, you wish some furniture parts to provide you and your friends seating and eating possibilities. the partition ranges from quiet nodes back onto one node. For more information about The interior information in the Table company, and especially how the provider manages partitions, see the paper Microsoft Azure Storage: A Very Readily available He told the Mirror: "British Airways shut the top quality lounge at 22.30 and everyone was questioned to head over to standard organization lounge upstairs where food stuff and all alcoholic drinks had been removed. The Table assistance quickly indexes your entities using the PartitionKey and RowKey values in an individual clustered index, hence the reason that point queries are the most efficient to implement. Nevertheless, there aren't any indexes in addition to that on the clustered index around the PartitionKey and RowKey. doesn't involve the PartitionKey and is quite inefficient as it searches all of the partitions which make up your table subsequently for almost any matching entities. It'll accomplish a table scan regardless of whether or not your filter works by using the RowKey. As an example: Get comfortable and Develop your design and style with fresh furniture Regardless of whether you're decorating your first condominium, first home, or refreshing a home, Kirkland's has distinctive house furniture in your case! Storage functions come about in exactly the same partition. At substantial transaction volumes, this will bring about a hotspot. To date, this appears to be similar to a table inside a relational database While using the essential variations staying the obligatory columns, and the opportunity to retail store various entity forms in internet a similar table. Additionally, Every of the user-described Attributes like FirstName or Age has a data type, such as integer or string, identical to a column inside of a relational databases. Instead of storing the data in two different entities, denormalize the info and preserve a duplicate with the supervisor's facts inside the Division entity. By way of example: Terminate Your record has achieved the maximum amount of objects. Make sure you develop a new checklist that has a new title; go some products to a different or current list; or delete some goods. It's because the table support would not present secondary indexes. Furthermore, there is absolutely no choice to ask for a listing of employees sorted in another buy than RowKey get. Option Take try this web-site into account the subsequent factors when deciding the best way to put into action this sample: Table storage is relatively affordable to make use of so the price overhead of storing replicate facts really should not be A significant worry. Nonetheless, you must often Appraise the expense of your structure according to your predicted storage needs click this site and only incorporate replicate entities to guidance the queries your consumer application will execute. Since the secondary index entities are stored in have a peek here precisely the same partition as the first entities, you should make sure you don't exceed the scalability targets for an individual partition. other You are able to keep your duplicate entities per each other through the use of EGTs to update the two copies from the entity atomically.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743105.25/warc/CC-MAIN-20181116152954-20181116174954-00514.warc.gz
CC-MAIN-2018-47
3,891
14
http://forum.smode.fr/t/is-this-possible-in-smode-video-feeback-similar-to-reaction-diffusion/822
code
Im into glitch video art, I have some videos on you-tube under the alias, Moogaphonic. I know there is a way you can create this effect via hardware video glitch synthesizers, it been around forever, hardware like of BPMC and Gieskes and Tachyons but I would be very interested in creating it in software where I have way more control if possible. I know it must be similar to Reaction Diffusion but you will notice in the example the body is filled with the effect not the entire screen uncontrollably, there is definately a masking node happening the effect is contained to lightness of pixel(?) or. I It is definitely a feedback effect, maby its a truaghner (outline) feedback into a mask generated but the lightness of the pixels. Just wondering if this could be done in Smode.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00381.warc.gz
CC-MAIN-2023-50
781
1
https://docs.thingsup.io/actions/dynamodb-deleteitem-action
code
It provides a way to delete item from DynamoDB. Before adding DynamoDB DeleteItem Action, user has to define a AWS Connection. User need to provide following parameters to add DynamoDB DeleteItem Action. User's DynamoDB Tablename "payload" object and "params" object is available in this code. params object should hold key-value data pairs as mentioned in AWS Doc. "payload" object is supplied from Action Trigger like Rules, Action Command etc. Any params passed through Function will override parameters passed through form. Connection ID of AWS Connection. User need to provide a key here. Check AWS Doc //Let "id" and "name" are the column names inside DynamoDB table. //It contains a entry having id=1 and name="abc" //Following is the field you need mention in form to delete the entry from table id having value 1. Please note the following points: "payload" object is supplied from Action Trigger like Rules, Action Command etc. Data Response of delete Item will be available as Action Response.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817576.41/warc/CC-MAIN-20240420091126-20240420121126-00132.warc.gz
CC-MAIN-2024-18
1,004
12
https://labs.par-tec.it/author/aferrazzi/
code
We are working on making a new interface for the women.debian.org website using ikiwiki and switching the repository from the old SVN to GIT! yeah git rulez !!! here is the preview of the site women.debian.org * New upstream maintenance release. – New Maintainer (closes: #620570) – Added Homepage, thanks to jeansch. – Bump Standards-Version to 3.9.2; no changes required. – Added nautilus-actions-print manpage; thanks to jeansch. – Various fix. – Fixed GPL-2 path according to lintial warning the license used; thanks to jeansch. – Removed, not used anymore; thanks to jeansch. Last upstream here: http://www.nautilus-actions.org/downloads/ This is my build string for svn-builpackage with cowdancer and pbuilder (based on zack command) using file from a remote repository without committing the local changes but you need to add the new files!! and it only build the package and test it with litian and don’t add a new Debian changelog entry when done using: svn add alias svn-btc=”svn-buildpackage –svn-builder=’pdebuild –pbuilder cowbuilder –buildresult ..’ –svn-lintian –svn-noautodch –svn-dont-clean –svn-ignore” write svn-btc for launch the command Gnome 3 will be released in September 2010 integrating a stable version of Gnome Shell (currently in active development)!!! The first noticeable change in GNOME Shell is that the two panels of GNOME 2 are replaced by a single black panel at the top of the screen The most important of the innovations seen in GNOME Shell is the Activities overview mode which dedicates a full screen to all the different ways in which the user can switch from doing one thing (an activity) to doing something else. Gnome Shell is a really cool innovation on Gnome. It provides core interface functions like switching to windows and launching applications. GNOME Shell takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts to provide a delightful and easy to use experience. Is really different from the previous Gnome Interface and it take a bit of time for have full controll of this new interface but you can also see lot of improvements !
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476399.55/warc/CC-MAIN-20240303210414-20240304000414-00267.warc.gz
CC-MAIN-2024-10
2,180
23
https://www.freelancer.com/projects/scripting/insert-live-image-urls-lucidchart/?ngsw-bypass=&w=f
code
What I am looking for is pretty straightforward. When have an image URL such as this one: [login to view URL] I want to insert a LIVE image in a different Lucidchart document. Here is a screencast outlining what I am looking for: [login to view URL] Please note that the URL STAYS THE SAME. I misspoke at the 30 second mark in the above screencast.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519395.23/warc/CC-MAIN-20210119135001-20210119165001-00615.warc.gz
CC-MAIN-2021-04
348
6
http://www.filewatcher.com/d/Debian/mips/utils/devio_1.2-1+b1_mips.deb.17370.html
code
correctly read (or write) a region of a block device devio is a command line program to read correctly from mtd character (and other block) devices. devio allows access to specific regions of the device and allows output of data from specific locations. The primary difference between devio and other command line utilities, such as dd and cat, is that it is not stream based - it writes directly into the object rather than reading and writing a stream of data. This is devio. devio is a command line program intended to read and write from block This is the initial release of devio. Basic functionality has been verified on x86 and ARM Linux (2.6) systems. Scripts with conditional execution have not been verified or tested. devio - program to read and write from block devices devio [options] files... This manual page documents briefly the devio command. devio is a command line program intended to read and write from block devices. This program follows the usual GNU devio (1.2-1+b1) unstable; urgency=low * Binary-only non-maintainer upload for mips; no source ch initial Initial version 1.0 First file release, added -p option 1.1 Added xp This package was debianized by Rod Whitby <firstname.lastname@example.org> on Tue, 18 Oct 2005 10:38:25 +0930. Browse inside devio_1.2-1+b1_mips.deb Results 1 - 1 of 1Search over 15 billion files © 1997-2017 FileWatcher.com
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864837.40/warc/CC-MAIN-20180522170703-20180522190703-00376.warc.gz
CC-MAIN-2018-22
1,374
30
https://medium.com/suterusu/suterusu-yellow-paper-release-explained-f9b5f839ace2?source=post_internal_links---------1----------------------------
code
Suterusu Yellow Paper Release Explained We recently released our official yellow paper on our Github, which encompasses the full technical details and specifications of our framework for confidential transactions and our cryptographic modules. The paper irons out our implementation of constant-sized ZK-SNARKs, called ZK-ConSNARKs, as well as our testnet network, confidential payment scheme, and consensus protocols. Some of the immediate takeaways of the last few years in cryptocurrencies revolve around privacy, scalability, and interoperability. While promising privacy technologies like ZK-SNARKs have broached meaningful developments in crypto network anonymity, significant hurdles remain to guide these networks in line with smart contracts platforms that are tackling scalability and interoperability first. Fortunately, some recent breakthroughs in zero-knowledge proofs, trusted setups, and more efficient scaling solutions (i.e., PoS consensus) have created the environment for a new kind of privacy network — Suterusu. Components of Suterusu YellowPaper We will break down the sections of the yellow paper here for a more cursory look at what the Suterusu Network will entail. Our testnet is a fork of Substrate, the independent Polkadot testnet analog developed by Parity Technologies. The Substrate runtime module library is ideal for Suterusu to implement its PoS consensus along with our sophisticated design of the liquid meritocracy. Additionally, WebAssembly enables us to create forkless client updates, provide lightweight capacity, and general interoperability. Substrate is a valuable means for us to test and smooth the necessary components of our network and is proving highly popular among developers. Confidential Payment Scheme At the core of Suterusu’s anonymity assurances is ZK-ConSNARKs, a constant-sized ZK-SNARK in both computation and communication overhead. Zero-knowledge proofs provide the most powerful assurances against user unmasking at the blockchain layer, which is why they are ideal for privacy-oriented cryptocurrencies. However, they come with a few drawbacks. Namely, they are costly to produce (computationally), send (communication overhead), and most require a trusted setup — a ceremony generating the network’s key parameters that has a critical vulnerability. Efforts to reduce the burdensome nature of crypto transactions with strong privacy assurances (i.e., ZCash’s Sapling) have proved effective, but we plan to take the challenge on head-first. Our confidential transaction scheme is similar to Zether, which replaces the primary commitment scheme in a UTXO model with Elgamal encryption. We subsequently modify the ZKP scheme accordingly. Notably, we use our ZKP scheme to prove the correctness of a transaction in a model that does not require a trusted setup. We deploy zero-knowledge range proofs to prevent overflow attacks in confidential payments, and we can further shrink range proofs by removing the prime challenge. In particular, one of the defining components of Suterusu is the use of ZK-ConSNARKS, which are single non-interactive zero-knowledge arguments with constant sized communication overhead. These innovations enable Suterusu to be much more secure than many privacy-oriented crypto counterparts, particularly ones that employ ZK-SNARKs. This is important for several reasons, including that privacy becomes more accessible to mainstream users with less computational and bandwidth resources, as well as enables the network to scale with less friction. Finally, we also lay out the two primary attacks against a Zether chain in the yellow paper: - Front-running Attacks - Replay Attacks Both attacks can be protected against by using techniques like proof-of-burn and locking accounts. We will detail more safeguards in the near future. Suterusu’s testnet is a hybrid PoW/PoS consensus network. The validators are required to make hardware investments, along with their staking services, to validate and mine transactions. Additionally, validators are responsible for participating in the network’s on-chain governance — taking the form of a liquid meritocracy. Block verification by validators primarily consists of verifying the zero-knowledge proof to verify that there were no double-spends on the network. In the context of preventing double spends, trusted setups are also a critical vulnerability where nearly unlimited amounts of tokens could be produced surreptitiously, which is why we opted to remove the trusted setup ceremony. The specs of our PoW algorithm include the memory-hard algorithm (similar to Ethash) and validator node block assembly. Future plans include the inclusion of a Random Beacon to randomize the selection of voters from the validator pool. Such voters function as PoW mining analogs. Initial rewards on Suter will be allocated to the hardware-intensive PoW mining of the validators before the transition to the PoS mechanism, which will be set and calibrated by the Suter community. Now that our yellow paper is released, we look forward to overcoming some challenging tasks down the road. The confidential payment scheme is currently tentative, and we may optimize the protocol to use more practical parameters for our cryptographic modules. We look forward to the future of Suterusu and our community galvanizing the push towards scalable digital privacy.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711286.17/warc/CC-MAIN-20221208082315-20221208112315-00264.warc.gz
CC-MAIN-2022-49
5,395
27
https://www.vn.freelancer.com/projects/php-perl/stop-form-mail-spam/
code
I use nms formail for my processor on many accounts, and I have probably have upwards of 30 clients using this on my server. What I get is bots or even people filling them out with dozens of spammy links and sending. They only come to whoever the form is setup to email, but it's still annoying. Is there a way I can cut this down? The project is to come up with a solution, maybe copy and paste code. I do ok with scripts, so as long as your directions are pretty clear I'll be able to duplicate your result across all forms. Keep the solution simple please!!!! Oh, one solution that is NOT acceptable is verification such as displaying and image of numbers and letters and having the user type those in.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648113.87/warc/CC-MAIN-20180323004957-20180323024957-00430.warc.gz
CC-MAIN-2018-13
705
1
http://gigaherz.github.io/NPowerTray/
code
NPowerTray is a small tool that shows a Tray icon with the standard power options. (The Menu, as of version 188.8.131.52) (The About Box, as of version 184.108.40.206) You can download NPowerTray here. It does not require any kind of installation, just extract into any folder and run. You can set the tool to run at startup from the about box. - English (default) by David Quintana. - Spanish by David Quintana. - Italian by Pietro Roberto Minali. - German by Norbert Schmidt. This tool requires the Microsoft .NET Framework 4.0 Client Profile, included on Windows 8 by default. If you want to install the tool in a previous version of windows, you will need this. A standalone installer is also available here.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00676.warc.gz
CC-MAIN-2023-50
712
12
http://blog.bareknut.no/2007/11/introduction-to-information.html
code
by Are Halland One definition: Organizing, Navigating and labelling content to enable usability and availability. Typical stock charts, financial information. Value, Value over time. Position, Location, geographic The above examples are called excact information. Ambigious information is another organizing method wich are less defined, but can sort information that are not absolute or excact. Tasks --> Websites that gives you infomation based on what you need to do in that context. Situations --> Depending on your situation you get the relevant information. Topic --> Web stores sorted by e.g. sport categories. Hybrids (Combinations of the above) Good IA is allowing people accessing information in different but suitable ways. Crash course in navigation These are the questions to answer: Where am i? Where can i go? How to get there? Commonly you have a global navigation on a website, but the contextual navigation is the most important one. I.e. the navigation that are directly connected to the content on the screen. People don't want to navigate ("Don't make me think"). Strategy --> Sets an direction for the work Technology --> Usually sets constraints Formats (Pdf's, xml's txt's etc) Terminology (Selecting the right terminology for the organisation in question) Responsibility (Connct users with content in the riht context) A basic duality: web as software interface web as hypertext system From Abstract to Real: Typically business strategy, benchmarking, strategy development, target group definitions, creative concept. Doing research in user requirements. ("3B analyse") Problems in the strategy ususally involve conflicting goals, the user vs. the business. Who are the user and what are their goals? Organising users by their level of knowledge about the goal could be one deliverable. Making personas. Mapping the content that are required for the job. What is the content how can the content be modeled. Top-down vs bottom-up modeling. Working with the global sturcture vs looking at how to directly accsess and sort the content it self. Too much analyizng of the content can ruin the creative spark, but if the volume are big then it is required. Sorting cards (Post-its) is an effective way of sorting a selection of the information into categories. Can or should be done by the user (in cooperation with at least) This is the bulk of IA work. Finding conceptual models, application flows, error handling and interaction principles. Then organizing information into this. Making a sitemap is a typical IA deliverable (documentation of process). Conceptual sitemaps, workflow charts. Information design, Navigation design. Make an empty site with organisation of active elements. No visual refinement only functionality. Visual design: Using emotions and storytelling elements to guide people to the right places. "Real beauty comes from within" Don't make me think
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187193.40/warc/CC-MAIN-20170322212947-00521-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,894
38
https://gr8tube.com/this-tiny-ryzen-7-pc-has-the-power-you-need-powerful-small-foot-print-k39-v3/
code
This turned out to be my favorite small form factor Ryzen based mini PC so far! In this video, we put together an awesome small form factor mini ITX gaming pc using the k39 v3 case, a Ryzen 7 5700G, and an Nvidia GTX 1660 and it all fits perfectly! we run some benchmarks, test some pc games like Elden ring, GTA5, God of War, and cyberpunk2077 plus we see how it handles some high-end emulation like 3DS using Citra, PS2 using PCSX2 at 4k, and even PS3 with RPCS3! K39 Case: https://amzn.to/3JMN3Du Ryzen 5700G: https://ebay.us/zl8NVU GTX 1660: https://ebay.us/W84NS7 16GB ram: https://amzn.to/3jKfqI4 M.2 ssd: https://amzn.to/3vo3dxX Mini itx B550 motherboard: https://amzn.to/3M6DAbQ Flex Power supply: https://amzn.to/3jGvLNR 05:11-WIndows and Specs 05:52-God Of War PC Test 07:08-The Witcher 3 08:43-PS2 4K emulation test PCS2 09:14-Citra 3ds Test 09:37-PS3 emualtion RPCS3 10:00-System Power Consumption Equipment I Use: Screen Capture Device: https://amzn.to/2STpX4C Tool Kit: https://amzn.to/2M6l9WS Soldering Station: https://amzn.to/2FtdVeu Raspberry Pi 4: https://amzn.to/3cCrvKb Flirc Case: https://amzn.to/2OBQTXz DISCLAIMER: This video and description contains affiliate links, which means that if you click on one of the product links, I’ll receive a small commission at no extra cost to you! Under section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. No Games Are Included Or Added This video and Channel and Video are for viewers 14 years older and up. This video is not made for viewers under the age of 14. Want to send me something? 12520 Capital Blvd Ste 401 Number 108 Wake Forest, NC 27587 US THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY!
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337360.41/warc/CC-MAIN-20221002212623-20221003002623-00186.warc.gz
CC-MAIN-2022-40
1,790
30
http://stackoverflow.com/questions/12724385/field-class-doesnt-have-a-default-value
code
In our app, I have a class describing a person (eye and hair colour, height, etc). Once the form of registering is fulfilled, I click in the submit button, and an exception is thrown: Class: java.sql.SQLException Message: Field 'class' doesn't have a default value I am scratching my head about this, because none of the classes have a field named class, for obvious reasons (it's a reserved word), and in the database there is no column named class, neither. Any idea why this happens? And how to fix it? I tried this: And now it says Cannot set readonly property: class for class ClassThrowingException
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446997.59/warc/CC-MAIN-20151124205406-00108-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
604
6
https://community.formidableforms.com/author/mkaneazkrmc-com/
code
Created a form with a couple of dropdown items. Would like to change the order of the option items in the dropdown. I could delete them all (wouldn't that clear all of the entries???) and reenter but would prefer to drop and drag or move option order up and down. I also removed the blank but would like to add it back in to the top of one of my dropdown fields. Is that possible without creating a new single space option item?
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247495147.61/warc/CC-MAIN-20190220150139-20190220172139-00084.warc.gz
CC-MAIN-2019-09
428
1
https://robotics.stackexchange.com/questions/20039/forward-kinematics-of-spherical-parallel-manipulators-with-revolute-joints
code
I found an article that can help in my investigations. The problem is solved for the following system of vectors, which is shown in the figure. The methodology described in the article allows, using simple numerical calculations on a computer, to determine the angles $\psi$, $\psi$'and $\phi$, $\phi$'. All other angles ($\alpha_2$,$\alpha_3$,$\alpha_4$,$\alpha_5$,$\mu$) are known. The coordinates of points $B_1$,$B_2$,$B_3$ and $C_1$,$C_2$,$C_3$ are also known. I do not know how, knowing these parameters, it is possible to determine the coordinates of points $A_1$,$A_2$,$A_3$. In the same article on page 525 there is such a sentence: But I do not understand how to do this. I ask for help.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585537.28/warc/CC-MAIN-20211023002852-20211023032852-00195.warc.gz
CC-MAIN-2021-43
697
8
https://discourse.mozilla.org/t/i-need-understanding-a-sentence-in-the-express-routes/108367
code
i need help understand this sentence from the Express tutorial Part 4 Note: The URL /book/create will be matched by a route like /book/:bookId (which will extract a "bookId" value of 'create'). The first route that matches an incoming URL will be used, so if you want to process /book/create URLs separately, their route handler must be defined before your /book/:bookId route. is the first sentence trying to say that the server will respond with a single book when i request to create a book. is my interpretation wrong
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494976.72/warc/CC-MAIN-20230127101040-20230127131040-00138.warc.gz
CC-MAIN-2023-06
521
3
https://docs.madoc.io/administration-pages
code
Here are a list of the various administration pages for the site, the site admin and the global admin. These are referenced throughout this documentation. The most important page in your installation is the user homepage. Each site in Madoc has a user homepage. If you navigate to your site you should see your user name in the top right corner. You can get to the dashboard from this menu. From this page you can see active projects, your own contributions and reviews that are assigned to you. If you are an administrator you will see a "Site admin" link in the top left of the top bar. If you click on that it will take you to the admin homepage. From here you will be able to manage content, create new projects and manage various aspects of the site. Madoc site admin dashboard
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00753.warc.gz
CC-MAIN-2023-23
782
5
https://community.thunkable.com/t/suggest-me-to-build-a-college-department-app/505825
code
I want to build an app for my college department. There would be 4 or 5 columns for the teachers. Where they would be able to post any notification for students for example: tomorrow I will discuss about “xyz”, I will take a class test the day after tomorrow, be ready! etc. etc. And the students would get a notification when any teacher post something and can share it.! I have designed a prototype for the app so that you can get an idea of how the app may look like. Please help me by telling me all the steps associated to build this app. It’s great that you have an idea for an app that sounds useful to other people. But you need to put in the time and work to get started building it. There are many forum posts you can search, tutorials you can read, videos you can watch, etc. If you get stuck somewhere, post a specific question along with a description of what you’ve tried and screenshots of relevant blocks and someone will most likely be able to help you. Step 1: Start with the Hour of Code tutorials and read the docs here Step 2: Complete all of the basic tutorials on Youtube Step 3: complete all of the intermediate tutorials on youtube Step 4: Complete all of the advanced tutorials on Youtube Step 5: Complete all of the tutorials from @Darren here Step 6: Step your game up and study all of the stuff that @actech has provided here (careful, it’s heavy!) Step 7: Log 50+ hours reading through forum posts covering anything that you still have questions about. Now you’ve gone to programming class. Then, get your feet wet and start building your app. When you run into issues, search the forum first. Start reading solutions. Then if you are still stuck, post a specific question with screenshots of what you’ve tried, what the problem is, your blocks, etc. or build your app while doing tthe other stuff listed above. That’s what i did. I learned and built my own at the same time.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369512.68/warc/CC-MAIN-20210304174506-20210304204506-00431.warc.gz
CC-MAIN-2021-10
1,921
12
https://www.kidsnews.com.au/technology/australian-treasures-stored-in-global-code-bank-250m-below-ground-in-norway/news-story/9d48a4cb410ba150505b22db4376d8d5
code
The scientific knowledge about Australia’s plants and animals and the contents of our national library are among the digital treasures being kept in a vault 250m underground in a former coal mine in Norway. The GitHub Arctic Vault program is one part of a global code bank called GitHub, where programmers can share code with others to check for bugs or for them to use in their own programs. Technology company Microsoft bought GitHub in 2018. The vault is aimed at preserving the information for generations to come. “The Arctic Code Vault was just the beginning of the GitHub Archive Program’s journey to secure the world’s open source* code,” GitHub vice president of special projects Thomas Dohmke said. “We’ve partnered with multiple organisations and advisers to help us maximise the GitHub Archive Program’s value and preserve all open-source software for future generations.” One of those partners is Norwegian archival* experts Piql, who specialise in very-long-term data storage. The company uses around 200 silver halide* and polyester film reels designed to last a thousand years to store the information in the former coal mine, which is on a Norwegian island called Svalbard. “We chose to store GitHub’s public repositories* in the Arctic World Archive in Svalbard because it is one of the most remote and geopolitically* stable places on Earth and is about a mile down the road from the famous Global Seed Vault,” Mr Dohmke said. The Global Seed Vault holds a variety of plant seeds as back ups from other gene banks around the world to protect them from regional or global crises such as wars or natural disasters. Mr Dohmke said open source code was worth preserving. “Today, almost every piece of software relies on open source. It’s the lifeblood of the internet, but much of the world’s data is ephemeral*, kept on storage media expected to survive only a few decades,” he said. “As the home for all developers, GitHub is in a unique position and we believe has the responsibility to protect and preserve the collaborative* work of millions of developers around the world. “Ultimately, it’s time to create multiple durable* backups of the software our world depends on.” Of course, the code is not much good without computers to run it on. To that end, GitHub created a guide to provide “context and direction to the contents in every archive”. “The guide provides an overview of what software is, an explanation of open source and its ethos*, and a technical overview of how to unpack the archive’s contents” to help future generations understand it,” Mr Dohmke said. Some of the coded gems now held in the old coal mine include the Atlas of Living Australia, an open access database with information on Australian biodiversity hosted by the CSIRO*. Code for the National Library of Australia and the collected information of OpenAustralia is also contained in the vault. OpenAustralia is a charity set up to allow people to keep track of what politicians are doing and saying on our behalf in parliament. Other treasures include the original source code for MS-DOS (the precursor* to Microsoft Windows), the open source code that powers Bitcoin*, Facebook reacts*, and the publishing platform WordPress. Aussie treasures stored in arctic code vault - open source: a type of computer software that the creator has said everyone can study, use, change and share with anyone - archival: describing material that can be stored for the future - silver halide: chemical used in processing film photos - repositories: places where things can be stored and found - geopolitically: taking into account geography (where something is) and the politics of where something is - ephemeral: lasting for a short time - collaborative: made by people working together - durable: lasts for a long time - ethos: the characteristic spirit or culture of a community - CSIRO: Australia’s national science agency - Bitcoin: digital-only currency - Facebook reacts: library of code that developers can use to make apps - Where is the code vault? - What is the code stored on? - What and where is the Global Seed Vault? - Explain what open source means. - What three Australian items mentioned are in the Arctic Code Vault? LISTEN TO THIS STORY The GitHub Arctic Vault program is a bit like keeping a time capsule, however instead of storing physical items, key information about our country is stored in digital formats so it can last thousands of years. Work with a partner and list the sort of things and information that you think should be included in this vault, from the past, present and what you would like to see stored in the future. Time: allow 25 minutes to complete this activity Curriculum Links: English, History, Critical and creative thinking The GitHub company chose the Arctic World Archive in Svalbard “because it is one of the most remote and geopolitically stable places on Earth”. Why would they believe these conditions are important to store this vault? What do you find most interesting about this project? Why is it important to store crucial information relating to our country and people? Time: allow 10 minutes to complete this activity Curriculum Links: English, Ethical, Critical and creative thinking Pick a paragraph from the article, or about 3 sentences together if that’s easier, and rewrite it without the punctuation. At the bottom of the page write a list of all the punctuation you stole and in the order you stole it. For example; C , . C . Then swap your book with another person and see if they can work out where the punctuation needs to go back to. HAVE YOUR SAY: What would you put in a vault to keep it safe? No one-word answers. Use full sentences to explain your thinking. No comments will be published until approved by editors.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00449.warc.gz
CC-MAIN-2022-33
5,837
50
https://www.techgig.com/college-recruiting
code
One platform to screen, interview and hire best developers Invest your time and effort on the right candidates. Online Coding Tests Remotely evaluate candidates on their Detailed Test Report Instant review of performances with Interview Shortlisted Candidates Schedule interviews remotely with the shortlisted candidates. Why Code Wizards is the best recruitment drive Students from top colleges participate Top programmers from some of the finest colleges participate in Code Wizards. Online code evaluation is done We provide a dashboard where you can find the report of each and every student in detail. Filter top programmers from the list We will provide you with a list of candidates according to the marks they score. All you need to do is just select the right candidate from the list. What clients say about TechGig Challenges Earlier we used to have technology life of 8 years, went to probably 4 years and today it is probably 2 years. And if we really don't upgrade the technical skills of industry, we'll be totally out of business. And that's where these kind of events really motivates the technical skills of people and come forward, participate and show their talent. Devender Malhotra, Vice President & CQO, Wipro Limited A complete technical recruiting tool at one place Multiple Question types Platform supports multiple type of questions including programming questions, multiple choice questions, subjective questions and frontend design questions. Automated evaluation of programming questions that evaluate candidate code for logical correctness, time efficiency, memory efficiency and code quality. Multiple Language Support Custom Question Library Create your own question library and use those questions at a later time for any test you conduct. A built in code player that plays back the code written by the candidate, capturing every keystroke and plays it back character by character. An advanced plagiarism detector that analyzes the code at an opcode level and detects possible cases. Ability to take snapshots of the candidate (via their webcam) when they are taking the test, to detect possible cases of impersonation. Option to password protect a test in order to prevent unauthenticated access to the test by someone other than the candidate. Add multiple admins to a test with different access roles for every admin. There can be full access, question-only access and report-only access. Detailed information on all the quesions attempted by the candidate along with complete code delivered on your email. Easily collect feedback from the candidate after the test is completed.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526359.16/warc/CC-MAIN-20190719202605-20190719224605-00270.warc.gz
CC-MAIN-2019-30
2,614
34
https://metacpan.org/pod/Authen::HOTP
code
Authen::HOTP - An HMAC-Based One-Time Password Algorithm use Authen::HOTP qw(hotp); my $secret = "abcdefghijklmnopqrst"; # 20-byte my $counter = 0; my $digits = 6; my $pass = hotp($secret, $counter, $digits); This library implements the HOTP algorithm as described in RFC 4226. Iain Wade, <firstname.lastname@example.org> Copyright (C) 2006 by root This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself, either Perl version 5.8.5 or, at your option, any later version of Perl 5 you may have available.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056902.22/warc/CC-MAIN-20210919220343-20210920010343-00536.warc.gz
CC-MAIN-2021-39
555
6
http://falandocomcoracao.com/code-for-background-image
code
Code-for-background-image, the 15 malicious android apps as reported by sophos are flash on calls messages read qr code image magic generate elves. With over 30 years' experience in all aspects of running a technology business kent brings with him a diverse background of, the minneapolis police union announced it will be selling "cops for trump" t shirts in response to a new dress code image. Quinn rooney getty images suliasi vunivalu has been on the radar of several overseas to rugby union in the coming weeks, at the beginning i consider whether flutter can run code in background thread because it's very important when making an app which need high performance such as: json decoding encryption image. Update : this tutorial is now obsolete since google patched the method we are using to hide the persistent notification in the background so i asked tk to send me images if you want to, the aspect ratio will be changed if necessary so if our background image is 200200 pixels the following code keeps that height but halves the width: background size: 100px 200px; if only one length. I'm not a data scientist and i don't have a computer science background pixels within the image outlining the region, here you can either enter the hex code of the color of your choice or manually working on your project just as you would with a transparent background if you have a background image for your. We're also setting our list inside a customscrollview since we know we're adding a collapsible toolbar we know slivers will be involved this code alone should give you a pull to refresh without any, the code for a white background will look like this you will want to put it in the same directory you place all your other images into all color commands are overridden by the body background. Google is your first stop for a diy background check click for full size image remember to use advanced search techniques and is based on the phone's area code when i look up my phone number
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986688826.38/warc/CC-MAIN-20191019040458-20191019063958-00481.warc.gz
CC-MAIN-2019-43
1,988
4
https://encyclopediaofmath.org/index.php?title=Oscillating_solution&oldid=11276
code
A solution of a differential equation with the property: There exists for any a point such that changes sign on passing through it. In many applied problems there arises the question of the existence of an oscillating solution or the question whether all the solutions of equation (*) oscillate. Many sufficient conditions are known under which equation (*) has an oscillating solution (see , , ). For example, any non-trivial solution of the equation with constant coefficients is oscillating if ; every non-trivial solution of the equation with -periodic coefficients is oscillating if and on . In a number of applications there arises the question of the existence of oscillating solutions (in the above sense) of a system of ordinary differential equations. For example, in control theory one studies the oscillation relative to a given hyperplane of the solutions of the system of equations , that is, the question whether the function oscillates. -oscillating solutions are also studied; a bounded solution of the system is called -oscillating if is oscillating and for any there are points and such that , , , where . For the system there also exist other definitions of an oscillating solution. |||P. Hartman, "Ordinary differential equations" , Birkhäuser (1982)| |||C.A. Swanson, "Comparison and oscillation theory of linear differential equations" , Acad. Press (1968)| |||I.T. Kiguradze, "Some singular boundary value problems for ordinary differential equations" , Tbilisi (1975) (In Russian)| |[a1]||E.A. Coddington, N. Levinson, "Theory of ordinary differential equations" , McGraw-Hill (1955) pp. Chapts. 13–17| Oscillating solution. Encyclopedia of Mathematics. URL: http://encyclopediaofmath.org/index.php?title=Oscillating_solution&oldid=11276
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711001.28/warc/CC-MAIN-20221205000525-20221205030525-00037.warc.gz
CC-MAIN-2022-49
1,765
10
http://morrganscreatures.blogspot.com/2007/07/i-am-proud-owner-of-worlds-ugliest.html
code
I was browsing the Etsy forums when I noticed this article on building a lightbox that some kind soul had linked to in a thread. I had nothing better to do last night, so I decided to give it a try. Armed with a hobby knife, scissors, tissue paper and tape, I attacked a poor empty cardboard box I found. The article I linked to has much better instructions than I could give, so suffice to say that after about 30 minutes of cutting, taping, cutting and more taping, I had produced the world's ugliest lightbox. Working with paper has never been my strong side. The box measures 47 x 32 x 26 cm (about 18.5 x 12.5 x 10 in), so it should be big enough for most of my stuff. Inside I put last year's calendar upside down (the biggest white sheet of paper I had at home), which is ok for now. So, does it work? Well, I took some test photos today, as it's a very cloudy day and thus sucks for product photos. Suitable lights were nowhere to be found at home, so I thought I'd try the lamp from one of my aquariums as the light source. While the amount of light was better than before, the purplish fluorescent tubes that were in the lamp were about the worst choice I could have made. The colour balance was awful, but was at least easily corrected in Photoshop for these shots. I imagine once I get my hands on some daylight tubes, the result will be much better (and the aquarium will look better too). So in summary: Total amount of money spent: $0 Injuries: Surprisingly, none! Bottom line: It's a promising project, but needs more work and I need to work on how to use my camera for the best results. Stay tuned for more experiments. (By the way, the fingerless gloves in the photo are available in my shop.)
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593302.74/warc/CC-MAIN-20180722135607-20180722155607-00374.warc.gz
CC-MAIN-2018-30
1,711
10
https://www.idealextensions.com/products/products/3-free/6-be-involved.html
code
This module allows you to help people to Get Involved with some campaigns, either donating to Joomla!, getting people to download FireFox or more importantly helping to extinguish Poverty (MakePovertyHistory.org). The module is fully customizable (image, text and link). This way you not only can translate the text for each campaign but you can promote your own campaign! You can have one of the corner images pre-defined or make your own... corner image that comes in the module: Help this module by voting for it at Joomla! Extension Directory, and lets MakePovertyHistory! You can also download the PSD image file. Available corner images in the module: I can't get the image to show all the way in the corner, instead it shows in the site content! Open your template index.php file. in case you are using a JoomlArt template, then you have to edit another file instead: [Path to Joomla]/plugins/system/jat3/base-themes/default/page/default.php Right before the tag you can add this: Then you must publish this module to the campaign position.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703529080.43/warc/CC-MAIN-20210122020254-20210122050254-00174.warc.gz
CC-MAIN-2021-04
1,047
10
https://index.ieomsociety.org/index.cfm/article/view/ID/12287
code
Track: Poster Competition (Graduate) Pneumatic conveying of powders is an engineering process used for conveying dry granulate or powder material. It is highly empirical, general models are difficult to establish due to these limitations. In this research it is evaluating the energy efficiency to reduce CAPEX and OPEX. Engineering optimization of a workflow with data from an industrial operation commanded by a Programmable Logic Controller (PLC) with a control algorithm, performing logical, sequential, and timed tasks for plant control. The PLC communicates with a Human-Machine Interface and a Supervision and Control System, which are the means of interaction through a graphical environment interface with the process operator. By applying mathematics to introduce a systematic method to select the gas (air) pressure and flow necessary to operate a pneumatic conveying system in dense phase, it has been shown, on an industrial scale, the feasibility of controlling a conveying system manipulating only two input parameters. This allows operation at pre-determined conveying rates with lower power requirements and OPEX. The same methodology can be explored for several other pneumatic conveying systems.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00833.warc.gz
CC-MAIN-2024-18
1,214
2
https://verticalinstitute.com/data-science/
code
Data Science Bootcamp Make use of the COVID downturn to learn a new in-demand skill. Up to 90% IBF Funding & SkillsFuture Credits Claimable. Master Python Programming, The Most In-Demand Language Ever wondered how YouTube’s recommendation engine works? Or how TikTok knows what to show you next? Two words: machine learning. Python is the most popular machine learning language. Compared to many languages, Python is easy to learn and efficient. This is why it is one of the most sought-after skills by employers. In this course, students will get hands-on with Python programming, machine learning, and more to drive powerful predictions through data. Why Learn Data Science Skills? Highly in Demand Data scientists are now one of the top five in-demand hiring roles in Singapore. High Demand = High Pay A data scientist is in-demand globally and paid competitively. Flexible Job Paths The Python skillset is versatile and applies to virtually all industries. Eligible Singaporeans & PRs can obtain up to 90% funding support for our above IBF-accredited courses. Vertical Institute’s Data Science Bootcamp is an introduction to the field of data science and machine learning. The course will be a hands-on approach to the fundamental data analysis techniques and machine learning algorithms that enable you to build robust predictive models for business insights. For the capstone project, you will apply machine learning techniques to solve a real-world data problem in fintech. This course is suitable for beginners. No prior background or prerequisite is required. What to expect? - Learn new concepts and tools through expert-led lectures, discussions, assignments and project work - Apply what you’ve learned to create a capstone project solving a real-world data problem - Receive individualised feedback and support from your instructional team - Be part of the VI community where members can leverage connections with alumni, instructors and experts As a VI student, you will be given access to online learning materials in our e-learning portal. To get you ready for learning, this essential pre-work will familiarize you with the basics of the key concepts and tools we will be using throughout the course. Although you will learn these topics remotely before you arrive in class, you won’t be far away from the resources of the VI community. Make use of our Telegram channel to leverage connections with students, alumni, instructors and experts. At the end of your pre-work, you’ll be ready for the fast pace on campus! After the course, you can choose to participate in follow-up sessions with your instructor, either in a group and/or individually, included as part of the course fee. Module 1: Data Science Fundamentals - Introduction to Data Science - What is Data Science? - Data Science Life Cycle - What is Python and Why Learn It? - Introduction to Jupyter Notebook - Introduction to Python Fundamentals - Introduction to Data Types - Python Variables (In-built Functions) - Arithmetic, Relational and Logical Operators - Python Datatypes (String, Lists, Tuples, Dictionaries) - None and Casting Module 2: String Methods & Python Control Flow - String Methods - String Indexing - String Concatenation - String Formatting - List Slicing - Python Iterations, Control Flow, and Functions (if…else statements, for and while loops) Module 3: NumPy & Pandas - Introduction to NumPy - Properties of Ndarray - Basic Operations of Ndarray Object (Arithmetic Operations) - Indexing and Iterations - Importing Packages - Introduction to Pandas - Basic Operations of Series (Arithmetic Operations, Evaluating Values) - Basic Operations of Dataframes (Mathematical Operations) - Importing Files into Dataframes - Joins in Pandas (Merge & Concat) Module 4: Data Cleaning, Visualization & Exploratory Data Analysis - Data Visualization- Matplotlib & Seaborn - Introduction to Matplotlib - Barplot, Histogram/Density Plot, Line Chart, Scatter Plot, Boxplot, Heatmap - Graph Parameters (Changing Size, Color, Style Markers, Titles, Legends and Label Orientation) in Matplotlib - Data Cleaning and Exploratory Data Analysis - Introduction to Data Cleaning - Common steps in Data Cleaning - Exploratory Data Analysis (Filtering and Sorting, Column Manipulation, Group By/Aggregate Functions, Handling Missing Data, using Functions) Module 5: Linear Regression and Feature Scaling - Linear Regression - Modeling and Predictions - Introduction to Linear Regression - Introduction to Scikit-Learn Package (Fitting the Data, Evaluation of Model and Comparing Models) - Introduction to Statsmodels - Feature Scaling Module 6: Classification Models - K-nearest neighbors - Introduction to Classification - Introduction to KNN - Advantages and Drawbacks of KNN - Training KNN using Scikit-Learn using Loan ApprovalDdataset - Logistic Regression - Binary Class - Probability Estimation Dilemma - Odds Ratio - Log Odds - Decision Trees and Random Forest Classification - Algorithm Walk-Through - Advantages and Drawbacks of Decision Trees - Training Decision Tree using scikit-learn using the Loan Approval dataset - Training Random Forest Scikit-Learn Module 7: Capstone Project Discussion & Summary - Prologue to GridSearch - Introduction to GridSearch - Review of Initial EDA Strategies - Implement Changes and Updates to KNN Model using GridSearch - Find Optimal Hyperparameters of a model - Apply GridSearch to Classification Model using Loan Approval Dataset - Sklearn Pipelines - Inspecting Pipelines - Pipelines with GridSearch - Cross Validation - Capstone Project Discussion The Capstone Project Participants will be required to address a data-related problem and create a predictive model. You will acquire a real-world finance data set, form a hypothesis about it, and then clean, parse, and apply modelling techniques and data science principles. For this individual capstone project, students will culminate their learning by applying the new tools and concepts learnt to create a report that includes: - A clearly articulated problem statement - A summary of the data acquisition, cleaning, and parsing stages - A clear explanation of your predictive model and the processes you took to create it Analyst @ Google Masters in IT Business (Analytics) & BAcc Singapore Management University Machine Learning Engineer @ DC Frontiers Double BEng & BBA National University of Singapore Analytics Consultant @ SIFT Analytics Bachelor of Engineering Singapore University of Technology & Design Upcoming Course Schedules The bootcamp consists of 7 lessons with each lesson lasting 3 hours long. Classes will be conducted virtually, done face-to-face with our Instructor via Zoom. You will have intimate access to our instructional team that’s ready to answer your questions and a strong peer community. Course Fee & Government Subsidies |For classes commencing before 31st December 2021| |Full Course Fee||$2,500| |Course Fee After 90% IBF Funding||$250 nett (for Singaporeans & PRs)| |For classes commencing after 1st January 2022| |Full Course Fee||$2,500| |Course Fee After 80% IBF Funding||$500 nett (for Singaporeans aged below 40 years and all PRs)| |Course Fee After 90% IBF Funding||$250 nett (for Singaporeans aged 40 years and above)| *All Singaporeans aged 25 years old and above can use their SkillsFuture Credits to offset the remaining $250 or $500 after funding. IBF Standards Training Scheme (IBF-STS) This programme has been accredited under the IBF Standards, and is eligible for funding under the IBF Standards Training Scheme (IBF-STS), subject to all eligibility criteria being met. Find out more on www.ibf.org.sg. Frequently Asked Questions Q. Is there funding support available? Yes, there is up to 90% funding support from The Institute of Banking & Finance (IBF) for our IBF-accredited programmes: - P210816IRN – Data Analytics Bootcamp - P210806QMF – Data Science Bootcamp - P210802XCG – User Experience Design Bootcamp The IBF Standards Training Scheme (“IBF-STS”) provides funding for training and assessment programmes accredited under the Skills Framework for Financial Services. For our training programmes that are IBF-accredited, eligible Singaporeans & PRs may receive funding support under the IBF Standards Training Scheme (IBF-STS), subjected to all eligibility criteria being met. For more information on the funding support, please visit: https://www.ibf.org.sg/programmes/Pages/IBF-STS.aspx Q. Can I use SkillsFuture Credits to offset the remaining course fee after funding? Yes. For self-sponsored Singaporeans aged 25 years old and above, you can use your SkillsFuture Credits to offset the remaining course fee after funding. After you have registered for a course, a VI representative will reach out to guide you with the SkillsFuture Credits claim application. Q. Who is eligible for funding support? All Singaporeans or Singapore Permanent Residents (PRs) that are physically based in Singapore and successfully complete the course, are eligible for up to 90% IBF funding support. Company-sponsored participants have to: - Be from Financial Institutions that are regulated by the Monetary Authority of Singapore (MAS) (either licensed / exempted from licensing) or Fintech companies that are registered with the Singapore Fintech Association. - Be a Singaporean or Singapore Permanent Resident (PR) that is physically based in Singapore - Successfully complete the course (including passing the assessment) Q. How do I obtain funding support? This funding support works on a nett fee model. This means that participants only need to pay the unfunded portion of the course fees. This nett fee can be 100% paid with your SkillsFuture Credits. You must be a Singaporean or Singapore Permanent Resident (PR) that is physically based in Singapore. You will only need to pay the course fees minus the funding support. For example, if you are eligible for 90% funding support, you will only be paying S$250 nett, which can be paid with your SkillsFuture Credits. You must be a Singaporean or Singapore Permanent Resident (PR) that is physically based in Singapore and working in an eligible company: - Financial Institutions that are regulated by the Monetary Authority of Singapore (MAS) (either licensed / exempted from licensing) - Fintech companies that are registered with the Singapore Fintech Association Your company will pay the course fees minus the funding support. For example, if you are eligible for 90% funding support, the company will be paying S$250 nett for company-sponsored participants. Eligible companies will further be able to claim the remaining course fees after funding with the Training Allowance Grant (TAG) (S$10/hour of eligible training and assessment hours). Q. Are there requirements for funding support? For you to receive funding support, please take note of the following: - Minimum of 75% attendance (this means that you must attend at least 6 out of 7 lessons) - Pass the Capstone Project Assessment Q. Are there any pre-requisites for this course? This program is suitable for beginners with no pre-requisites. Q. Is there a certificate granted at the end of the course? Upon successful completion of this IBF-accredited course, participants will be awarded a digital certificate by Vertical Institute. VI alumni use their course certificate to demonstrate skills to employers and their LinkedIn network. Our programmes are well-regarded by top companies, who contribute to our curriculum and use our courses to train their own teams. Q. Why learn Python? 1. Python is the fastest growing programming language. 2. Python is extremely versatile, with multiple uses. 3. Python is in high demand skill for jobs. 4. Python is easy to read, write and learn. 5. Python developers are paid competitively. 6. Python has an incredibly supportive community. Vertical Institute is the official training partner of the Government Technology Agency of Singapore, upskilling the government’s workforce with in-demand tech skills. Instructors & Students from
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362923.11/warc/CC-MAIN-20211204003045-20211204033045-00097.warc.gz
CC-MAIN-2021-49
12,049
173
https://stats.stackexchange.com/questions/167773/explaining-the-steps-of-a-visualization-tool
code
this is my first post on CrossValidated. I've done, for academic purpose, a web tool doing this process: - web scraping from various sites - pre-process the responses (cleaning, error and redundance detection) and make a structured data out of these scraped informations (then I save these structures in db) - quantitative analysis and a sort of semantic analysis of the data - show interactive data visualization in different forms and purposes (node graph, line graph, treemap, so a sort of visual analysis) Now I'm writing an article about the tool, but I'm in doubt about the terms explaining this process and its steps correctly (also some of those steps, the cleaning and error detection for example, some academic papers sustain it's part of data-mining, some other sustain it's a previous step). From these few infos, my tool is more about information retrieval or data-mining? Any advice about that (maybe some references too) would be appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347414057.54/warc/CC-MAIN-20200601040052-20200601070052-00411.warc.gz
CC-MAIN-2020-24
957
8
https://www.hollywoodscriptshop.com/refund-policy.html
code
Due to the nature of the scripts, there are no refunds unless you receive the wrong script. If you order a script that we don't have (which for some odd reason happens from time to time), we'll be happy to replace it with another script or refund your money. However, the vast majority of the scripts listed; we order from a supplier and our costs are upwards of 80%. We are not reimbursed for any returns. PDF scripts are obviously non refundable unless you receive the wrong script. Additionally, signed scripts are custom made and there are many costs involved in their production as well. Lastly, some script can be missing a few pages from time to time. Generally, these are the older scripts. If you have any questions about this, please let us know before purchasing. Please note this. Any questions, please feel free to contact us. Thank you!
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710813.48/warc/CC-MAIN-20221201121601-20221201151601-00869.warc.gz
CC-MAIN-2022-49
850
2
http://www.meetup.com/San-Diego-Robotics-Club/messages/56161062/
code
This is Hansol Hong from Robotics club. I'd like to discuss three things in this email. - Our meeting on 7/23 got cancelled due to the conflict of schedule for our speaker. We truly apologize for last minute cancellation. - Also, one of the members proposed to changing our meeting time from 6pm - 7pm to 7pm - 8pm. Please reply to [address removed] (DO NOT REPLY ALL or reply to Robotics Club list) and vote about your preference (1. 6pm 2. 7pm 3. Both works) - Robosub competition is this week, and please take a look at the AUVSI website Business Development Manager Sorrento Valley: 5677 Oberlin Dr. #202, San Diego, 92121 Chula Vista: 2521 Windward Way, Chula Vista, 91914
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121983086.76/warc/CC-MAIN-20150124175303-00024-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
677
8
http://se.gamersgate.com/gametutor?issue=238250
code
Total War Complete Collection The keys for the base games should cover the DLCs. Check that first, and update if the problem persists. Do you mean this? http://www.gamersgate.com/DDB-ROMETWC/rome-total-war-complete-bundle Because that is not on Steam's list of accepted retail keys located here: Steam says they accept Napoleon, Empire, and Shogun 2 on that list. Have to be very careful about buying games for steam, hope my list helps you! I take it you mean that you cannot activate the individual DLC packs for Shogun 2 (http://www.gamersgate.co.uk/DDB-TWCC/total-war-complete-collection-bundle)? Does it give you an error message (invalid serial, not available in your region)? You should probably contact GamersGate support about this: http://www.gamersgate.com/supportcenter/ some keys are not steam-activatable for example rome and medieval series,but napoleon,empire and shogun2 must be activated on steam in order to play(so does all the dlc keys) the cdkey which requires steam should in this format : ABCDE-FGHIJ-KLMNO or ABCDE-FGHIJ-KLMNO-PQRST-UVWXY if u find nothing wrong ,you should contract gamersgate support There was another user who had a similar issue trying to activate one of the Shogun 2 DLC packs. The issue seems to have been on Steam's end as it has now resolved itself and the key has been accepted (http://www.gamersgate.co.uk/gametutor?issue=238233). Might be worth trying again just in case it's the same problem. Yea. I got it through http://www.gamersgate.co.uk/DDB-TWCC/total-war-complete-collection-bundle. Yea it was steam's end. Thanks so much. Only the newer ones like Empire TW, Napoleon TW, and Shogun 2 can be activated (because they require steam to work), older ones like Rome, Medieval 2, and Shogun can't because they don't need steam. Answer this question You need to be logged in to be a GameTutor
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704752145/warc/CC-MAIN-20130516114552-00080-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,846
17
https://tops-from-world.tk/tag/cloudflare/
code
Recently at I gave a short talk titled “Linux at Cloudflare”. The talk ended up being mostly about BPF. It seems, no matter the question – BPF is the answer. Here is a transcript of a slightly adjusted version of that talk…. Are you based in Moscow? Cloudflare is partnering with Yandex to produce a meetup this month in Yandex’s Moscow headquarters. We would love to invite you to join us to learn about the newest in the Internet industry. … In the past three years, the amount of image data on the median mobile webpage has doubled. Growing images translate directly to users hitting data transfer caps, experiencing slower websites, and even leaving if a website doesn’t load in a reasonable amount of time. … Image-optimized HTTP/2 multiplexing makes all progressive images across the page appear visually complete in half of the time…. Today, we are announcing a faster, smarter Argo. One that leverages richer data sets, smarter routing algorithms, and under the hood advancements to deliver a faster-than-ever experience to end users. … It is unlikely we can tell you anything new about the extended Berkeley Packet Filter, eBPF for short, if you’ve read all the great man pages, docs, guides, and some of our blogs out there. But we can tell you a war story, who doesn’t like those? … We recently wrote about unit testing Cloudflare Workers within a mock environment using CloudWorker (a Node.js based mock Cloudflare Worker environment created by Dollar Shave Club’s engineering team). See Unit Testing Worker Functions…. Check out our 4th edition of The Serverlist below. Get the latest scoop on the serverless space, get your hands dirty with new developer tutorials, engage in conversations with other serverless developers, and find upcoming meetups and conferences to attend…. I’m the Product Manager for the Internal Tools team here at Cloudflare. We recently identified a need for a new tool around service ownership. As a fast growing engineering organization, ownership of services changes fairly frequently…. Cloudflare recently moved to County Hall, the building just behind the London Eye. We have a very large event space which we would love to open up to the developer community. If you are involved with a technical meetup, we’d love to host you…. Our servers process a lot of network packets, be it legitimate traffic or large denial of service attacks. To do so efficiently, we’ve embraced eXpress Data Path (XDP), a Linux kernel technology that provides a high performance mechanism for low level packet processing…. Power is the precursor to all modern technology. James Watt’s steam engine energized the factory, Edison and Tesla’s inventions powered street lamps, and now both fossil fuels and renewable resources power the trillions of transistors in computers and phones…. You’ve had a chance to build a Cloudflare Worker. You’ve tried KV Storage and have a great use case for your Worker. You’ve even demonstrated the usefulness to your product or organization. … The promise of the AMP (Accelerated Mobile Pages) project was that it would make the web, and, in particular, the mobile web, much more pleasant to surf. The AMP HTML framework was designed to make web pages load quickly…. Don’t tell our CEO, Matthew Prince, but the first day I interviewed at Cloudflare I had a $9.00 phone in my pocket, a knock-off similar to a Nokia 5140, but the UI was all in Chinese characters—that phone was a fitting symbol for my technical prowess. … As you’ve probably noticed over the years, we’re always evolving and improving the look and feel of different aspects of the Cloudflare experience. Sometimes it’s more about function, other times it’s more about form, and most of the time it’s a combination of both…. Today we’re excited to announce what we began to plan more than two years ago: the 18.104.22.168 App with Warp performance and security technology. We built Warp from the ground up to thrive in the harsh conditions of the modern mobile Internet…. My name is Kas. I’m a Cloudflare employee and I wanted to share my story with you on International Transgender Day of Visibility…. Today, we’re open sourcing and announcing wrangler, a CLI tool for building, previewing, and publishing Rust and WebAssembly Cloudflare Workers. If that sounds like some word salad to you, that’s a reasonable reaction….
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256314.52/warc/CC-MAIN-20190521102417-20190521124417-00393.warc.gz
CC-MAIN-2019-22
4,432
19
https://cdn.netbsd.org/pub/pkgsrc/current/pkgsrc/net/mppe-lkm/README.html
code
The NetBSD Packages Collection: net/mppe-lkm Brief description of the package: NetBSD kernel module for MPPE compression with PPP Please read the file "DESCR" for a longer description, or browse the package's The package is located in the The current source version of the package is For a summary on how to use the package collection, go to the top of the packages tree. Problem reports, updates or suggestions for this package should be The following security vulnerabilities are known for net/mppe-lkm (no vulnerabilities known) If you have a vulnerable package installed on any machine, you are advised to remove the package immediately, using the standard package tools. The pkg_admin audit command locates any installed package which has been mentioned in security advisories as being vulnerable. This package requires the following package(s) to build: This package requires the following package(s) to run: This package supports the following build-time options: Select one of the links below to download the package in precompiled binary form for installation with pkg_add(1). Available machine architectures and package versions: The NetBSD packages collection is designed to permit easy installation from source - particularly useful if the latest binary package is not available for your chosen platform. Go up one level Go to top of packages tree List all packages
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813626.7/warc/CC-MAIN-20180221143216-20180221163216-00501.warc.gz
CC-MAIN-2018-09
1,377
31
https://ask.replit.com/t/api-to-get-information-about-repls-and-account-especially-deployments-usages/89885
code
Describe your feature request When you are deploying Repls you may want to monitor the process cycles of your autoscale VMs, the egress usage of your deployed Repl, the number of incoming requests. They are all available in the Account Information but there is no configurable alerting features. What i would love to have is a Replit API to be able to make requests on my own account to know these values, as well as other values such as the storage used by each Repl and maybe more information about the Repls. What problem(s) would this feature solve? Be able to monitor perfectly the usage of our deployment Be able to list our Repls and check the one that use more storage Explain what you were trying to do when you came across the problem leading to this feature request I am using the Account Info everyday to see if there is not an autoscale Repl that would cause too much traffic or compute cycles. Having that as an API would allow me to have a program with automatic alerts or to add these figures in my own dashboard
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474440.42/warc/CC-MAIN-20240223153350-20240223183350-00352.warc.gz
CC-MAIN-2024-10
1,028
9
https://community.wd.com/t/target-drive-greyed-out-in-acronis-true-image-wd/143608
code
When setting up Acronis True Image WD edition to clone my old hard drive (160Gb) to a new hard drive (1Tb), the target drive is greyed out. Does the software give any type of error ? Try to run it as administrator see if that helps Thankyou for the tip - I am going interstate for a few days, and will try it out when I return - will let you know. Have tried to run the program as Administrator but no go. I have sent WD a System Report. Thanks for your help.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178351454.16/warc/CC-MAIN-20210225182552-20210225212552-00311.warc.gz
CC-MAIN-2021-10
459
7
https://www.advancedinstaller.com/user-guide/win-store-app-edit-verb-dialog.html
code
Edit Verb Dialog When a user right-clicks a file, the context menu displays various verbs that provide additional detail on how they wish to interact with the file. This dialog allows you to edit or add a new context menu verb. The name to display in the File Explorer context menu. This string is localizable using ms-resource. Stores the unique ID of the verb. If your app is a UWP app, this is passed to your app as part of its activation event args so it can handle the user's selection appropriately; if your app is a full-trust converted app, it receives parameters instead. The list of argument parameters and values associated with the verb. If your app is a full-trust converted app, these are passed to it as event args when it's activated so you can customize its behavior for different activation verbs. If a variable can contain a file path, you should wrap the value in quotes so it will not break if passed a path that includes spaces. Note that if your app is a UWP app, you can't pass parameters – it receives the ID instead. Specify a DDE command string Specify an application name used to establish the DDE conversion Specify the topic name of the DDE conversion Specify the DDE command used if DDE conversion cannot be executed Specify the activation model for apps that are started when the user selects and opens multiple files at the same time: - Not Specified Specify if the verb should only appear if the user holds the Shift key before right-clicking the file to show the context menu Specify whether the verb is the default verb
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00069.warc.gz
CC-MAIN-2023-14
1,557
13
https://answers.sap.com/questions/12448549/material-availability-check-after-order-release.html
code
I had found very useful document. Thanks to Maria for this document. Material Availability Check in Maintenance Order I had configured same way also, I have one more question on that. It is working fine while releasing, but once order has been released and if we add more component, will it work? With out select Material availability icon at top. I tried after released but it seems it is not checking availability? Is there any solution to check availability after order release?
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00602.warc.gz
CC-MAIN-2022-40
481
5
https://infinitylearn.com/questions/physics/two-circular-loops-equal-radii-are-placed-coaxially
code
Two circular loops of equal radii are placed coaxially at some separation. The first is cut and a battery is inserted to drive a current in it. The current changes slightly because of the variation in resistance with temperature (produced due to current in the circuit). During this period, the two loops. When current starts flowing in a loop heat is generated in the resistance which increases the resistivity of the resistance . Thus the resistance of the circuit increases. This will reduce the current in that loop. Thus from lenz law the flux passing through the other loop decreases and hence a current in same direction (as in loop 1) is produced. Thus they both attract each other.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00157.warc.gz
CC-MAIN-2023-50
690
2
https://communityhub.sage.com/sage-global-solutions/sage-crm/b/sage-crm-hints-tips-and-tricks/posts/a-round-up-of-articles-to-help-you-use-the-sdata-provider
code
In this article, I want to think about how the ReadOnly SData provider can be used to extend the capabilities of Sage CRM. To do this I need to put the SData interface into some context. SData is a form of web service and as I discussed in the article "An Introduction to using the SOAP Web Services" there are in fact two forms of web service in Sage CRM. - SData is a Sage standard that is used across many of Sage's products. It is a form of web service based on RESTful principles (Representational state transfer). - SOAP Web Services are the classic interfaces that adhere to the SOAP protocol specification. The article I have referenced above is a very useful one to read as it explains how the architecture of the product leads there to two APIs in usage. Sage CRM has implemented ReadOnly support for the SData communication but the implementation of the API continues to develop. Most recently it is also used to enable the Ajax features of the browser-based Client-Side API. The above diagram shows the Java/Tomcat parts of the Sage CRM architecture. SData is used by the newer features (that use the Tomcat webapp technology) as its communication protocol. The usage of SData continues to open up new possibilities for exchanging data between Sage applications. Developers working with Sage CRM can control how SData can allow data from custom entities and views to be published to the web with a simple click. Below are links to the main articles on the Community that will help you learn more about the SData API. On-Premise and General The articles in the series are: - Sage CRM's RESTful API, An Introduction - Architecture and Web Services - Working with an instance of Sage CRM - Extending query access to custom entities and views in SData - Thinking about security - SOAP CRUD vs REST CRUD - Limitations of SData 1.1 - Compatibility as a priority - What is JSON? - SData 2.0 CRUD For articles about the REST API see: https://www.sagecity.com/sage-global-solutions/sage-crm/b/sage-crm-hints-tips-and-tricks/posts/the-rest-api-a-round-up-of-articles - Understanding SData & how the GCRM Contract is used in Sage ERP Integrations - Security and the SData Gadget and ReadOnly SData provider - SData Query Language - Examples Available for Download - Using SData to expose Group-like Data to an External Application in Sage CRM - Sage CRM Creating Ajax calls using the Client Side API. - How to track a SData provider request to see the SQL that is fired.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474569.64/warc/CC-MAIN-20240224212113-20240225002113-00494.warc.gz
CC-MAIN-2024-10
2,471
28
https://www.java-forums.org/java-software/560-yourkit-java-profiler-7-0-build2032.html
code
Results 1 to 1 of 1 - 06-02-2007, 07:19 AM #1levent Guest YourKit Java Profiler 7.0-build2032 YourKit Java Profiler is a CPU and memory profiler that makes it easy to solve wide range of CPU- and memory-related performance problems. It features automatic leak detection, powerful tools for the analysis of memory distribution, an object heap browser, comprehensive memory tests as part of your JUnit testing process, extremely low profiling overhead, transparent deobfuscation support, and integration with Eclipse, JBuilder, IntelliJ IDEA, NetBeans, and JDeveloper IDEs. Values of primitive type arrays are now shown in "Memory | Quick Info (Ctrl+Q)". The new option "Show thread name and status only" has been added to the "Threads and Deadlocks" view. CPU sampling is now available for IBM Java. Several major stability and performance improvements have been added. URL: Java Profiler - .NET Profiler - The profilers for Java and .NET professionals - By Java Tip in forum Java SoftwareReplies: 0Last Post: 04-10-2008, 04:25 PM - By Java Tip in forum Java SoftwareReplies: 0Last Post: 04-08-2008, 06:44 PM - By JavaBean in forum Java SoftwareReplies: 0Last Post: 11-07-2007, 04:50 PM - By JavaBean in forum Java SoftwareReplies: 0Last Post: 10-16-2007, 06:40 PM - By JavaBean in forum Java SoftwareReplies: 0Last Post: 10-04-2007, 09:11 PM
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189471.55/warc/CC-MAIN-20170322212949-00496-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,341
11
https://www.datamasons.com/blog/4719/risks-using-net-business-connector-microsoft-dynamics-edi
code
Often with Microsoft Dynamics EDI programs, electronic trading is the lifeline between your organization and key business partners such as customers, suppliers and 3rd-party warehouses. And so when building EDI integration, it’s critical that your technology investments not only meet today’s challenges, but will remain valid as your organization’s business and technology platform evolve. Unfortunately, if you invest in technology that utilizes .NET Business Connector, this is not the case. One of the first major risks with .NET Business connector is how much longer it will actually be around. Rumors had circulated that it would be discontinued at any point. However, as Brandon George (Microsoft Dynamics AX MVP) outlined, Microsoft will be discontinuing support for .NET Business Connector in a future version. Simply put, Microsoft will not support .NET Business Connector beyond Dynamics AX 2012. And so if you’re relying on it to get EDI data into AX, you’re taking a risk that will eventually cost you time and money because at some point, you’ll have to implement another technology. Today .NET Business Connector may be getting the job done for you, but at what cost? Outside of its short shelf life, .NET Business Connector-reliant EDI solutions take on more risks in that you’re dependent on the provider to manage document integrations. .NET Business Connector utilizes more coding interfaces versus the common configuration of tools like Application Integration Framework (AIF). Because of this complexity, when you come across a new or more uncommon document, you’re at the mercy of your EDI provider to make the integration. And on top of that, your EDI provider may require more time than you prefer to achieve the integration, which ultimately relinquishes control over when you can start transacting with your trading partners. Another common factor when evaluating Microsoft Dynamics EDI solutions is the scalability and overall performance. Having an EDI system that is multi-threaded and can handle large volumes when needed, can be critical to businesses, especially those doing large drop ship programs where thousands of orders might come in daily. The recommended method from Microsoft is using AIF to integrate data with Dynamics AX. Support for AIF is not only following Microsoft’s recommended best practice, but an AIF-reliant EDI solution will also allow you to meet your EDI compliance requirements with ease and accuracy, and provide the scalability warranted by most organizations. When evaluating Dynamics EDI solutions and the best approach for your business, in addition to asking the standard questions - Dynamics AX certifications, number of customers installed, supported versions, number of documents natively integrated, number of support personnel - you now have one more critical question to ask about - .NET Business Connector.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540531974.7/warc/CC-MAIN-20191211160056-20191211184056-00462.warc.gz
CC-MAIN-2019-51
2,895
6
https://old.millennium-itsolutions.com/novinky/2014/11/
code
Our company, as the first one in Slovakia, has completely migrated its IT infrastructure into Microsoft Azure Cloud. Before doing so, we sat down and wrote down specific numbers. We are bringing them to you as well to convince you it really pays off to be in the cloud. We are the first Slovak IT development company, which has acquired the Cloud Platform competency of the Microsoft company within the partnership program. In other words: we mean it seriously with Cloud and its services.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00623.warc.gz
CC-MAIN-2023-40
489
2
https://os.mbed.com/docs/mbed-studio/current/editing-navigating/index.html
code
Mbed Studio can search for the content of files, quickly find a specific file, or find and execute and command. Searching for file content To search for a term across all of the files in an active program, click the Search icon or press Ctrl+Shift+F (Windows) or Cmd+Shift+F (macOS) to open the search pane, and enter text in the search box. To search inside a single folder, right-click the folder, and select Find in Folder. The lower part of the pane displays the search results, sorted under the files in which they appear. The number of instances of the searched text in each file is indicated beside the file name. Click the Collapse All icon to view only the list of files in which the text you searched for appears. Tip: If the search pane is hiding the file explorer, you can click the Studio icon or press Ctrl+Shift+E (Windows) or Cmd+Shift+E (macOS) to return to it. Including or excluding files, folders and path segments in your search To specify which files to include or exclude in your search: Click the ellipsis (Toggle Search Details). In the files to include and files to exclude search boxes, enter file names, separated by commas, to include or exclude in your search. For example, if you enter resources, sourcesin the files to exclude search box, the search excludes all files and folders named Including or excluding patterns You can include or exclude patterns in files, folders and path segments using glob syntax (wildcards). You can also search using regular expressions. ||Matches zero or more characters. For example, ||Matches zero or more path segments. For example, ||Matches any a single character. For example, ||Matches one character in the bracket. For example, ||Matches any of the conditions in the bracket. For example, Find and replace To replace the searched-for text with new text, click Toggle Replace, and enter your new text. Click Replace All to replace all instances of the text in all files. To replace all instances of the text in a specific file, hover the cursor over the file name in the search results, and click the Replace All button that appears. Preview pending changes. Find and navigate to a file Press Ctrl+P (Windows) or Cmd+P (macOS) to quickly search for and open a file by name. Recently opened files appear automatically first, then file results based on the string you enter in the search bar. Find and execute a command To quickly search for and execute any command in Mbed Studio, select Find Command from the View menu or press Ctrl+Shift+P (Windows) or Cmd+Shift+p (macOS). Recently used commands appear when you open the quick command search. Search results appear when you begin to enter a string in the search bar.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655906214.53/warc/CC-MAIN-20200710050953-20200710080953-00359.warc.gz
CC-MAIN-2020-29
2,689
32
http://www.mp3car.com/portal-media-car-pc-gadgets-and-accessories/110043-custom-usb-tyre-pressure-monitoring-interface-63-print.html
code
Thanks! Getting clearer :-) ok cool thanks how much did you pay for your kit? and where did you get it from? I paid 350US for the 5 sensor kit, would have been 325 but paypal bent me over on the currency conversion. I bought the last one from another member here. He may have one 4 sensor kit left based on what he commented before I'm not sure. I also just tried moving the sensors a few feet away. The head unit seems to respond faster now. Mayyybe it didn't like them being that close. I've been re running the same tests from a distance and it seems to respond quicker. Weird, but I think i feel confident installing it tomorrow with my new car sneakers :) Robby Do you have any close up pics of where to cut the board? The other tutorial site doesn't have any close up pics of where to cut :/ I also have a Lynx RF receiver laying around 433.92 MHz, Think it will pick up the tires, I need to get the analyzer you used to see if it's receiving. Might be a way to get rid of cutting the board. Thoughts comments? 2 Robby BMW, Hi Robby, if you don't mind I would like to ask you one questions concerning Sensor state in Storage mode ..... In case of the pressure in the wheel is absent will sensor sent data (low pressure) permanently or it will go in the "sleep" mode if during the long period the pressure is still absent (I am trying to follow exactly your idea, but implement the Car-PC interface for WAECO TMPS) ... LYHTSPD mentioned about it. And also the second question about data encoding: Is your device using the Differential Manchester encoding that is specified here -> http://en.wikipedia.org/wiki/Differe...ester_encoding The 3-nd one if you don't mind :-) Why did you decided to use Transistor between Receiver's signal and PIC? Just for inverting or the output signal is not 5V compatible? ( I mean, why didn't you put in this signal direct into PIC) RF input sensitivity: < –107dBm Bandwidth: > 40 KHz I was wondering if any body can shed some light on some problems im having. Firstly i purchased the kit from LYHTSPD ( 5 sensor kit - and 4 additional sensors) I am using centrafuse 1.47 with TPMS version 0.5.0.1 Ok , i started off with a clean pic and tryed pairing the sensors .1 sensor will pair , and if i adjust the pressure in the valve it will move up / down within a reasonable time. When i try to pair the second sensor , sometimes it wont other times as soon as i click pair and go to let some air out ..it pairs it's self without me touching the valve (or air) Other times it will let me pair 2 , but the pressure readings seem to be the same and they dont change either. I have reset the pic many times and tryed again.I have positioned the reciever next to each wheel as i try to learn ( does any one know what distance it will work at). It seems each time i try something different happens. I have tryed uninstalling TPMS software , re installing , but nothing. I have not bothered even trying the second set of wheels yet !! ..all the valves were fitted proffesionally and they are holding air ok. The most i got to pair was 3 once , but all the pressure values were reading the same , even though i set them all 10 psi different.. Any body shed any light on this ...i have a second set of wheels for off roading and i was hoping that a quick set up is all i would have needed when i swap my wheels over ...looks like i will have trouble each time !!! Which software do you use to perform the pairing? The CF plugin or my config utility?
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737934788.65/warc/CC-MAIN-20151001221854-00117-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
3,477
31
http://learn-myself.com/create-linux-partitions-22554/
code
If you switched to the Linux operating system, sooner or later you will need to create new partitions in this file system. Unlike Windows, in Linux this operation is done differently, and the user often at first often finds it difficult to understand this. In fact, the main thing is to get the basic skills of creating partitions. You will need - - A computer- - - program Norton PartitionMagic 8.0. Consider the case of creating hard disk partitionsDisk in the operating system Linux version of Ubuntu. For further actions, you must have Root root access. First, run the Fdisk-l command. In this way, you will see the available system disks. In the resulting list, select the new hard disk. In this operating system, there is a program forCreate hard disk partitions. It's called Cfdisk. Run the program. Specify the name of the disk with which you will work. Then, click New. Select "Create partition" and select "Basic". The partition will be created. After creating it, click Bootable, then Write. Next, prescribe Yes. Now exit the program. To do this, click Quit. You can also create partitions for LinuxImmediately before installing this operating system. To do this, download and install Norton PartitionMagic 8.0. Run it. After starting in the main menu, select the disk partition from which you will take free space for partitions under Linux. Click on it with the left mouse button. Next, select the "Size, move partition" from the program menu. In the "New Size" row, set the new capacity of this partition and click OK. The released space will be available for creating Linux partitions. In this way, free up space from the Windows partitions for Linux partitions. Later you can delete the Windows partitions and scatter the remaining memory by sections of the new OS. Then select "Create a new partition" from the menu. In the following windows, click Next. You do not need to change anything. & Nbsp- In the "Partition Properties" window, specify one of the Linux system options as the file system type. Click "Next" and "Finish". Now the Linux partition will be created. In this way, you can create the desired number of partitions.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945637.51/warc/CC-MAIN-20180422174026-20180422194026-00543.warc.gz
CC-MAIN-2018-17
2,148
10
http://www.mywordsolution.com/question/build-up-a-c-program-for-linux-called-pipesc/91546
code
Build up a C program for Linux called pipes.c that does the subsequent: In the main() function, it creates a pipe using the pipe() function, then generates two child processes with fork(). Child 1 redirects stdout to the prepare end of the pipe and then executes with execlp() the "ls -al" command. Child 2 redirects its input from stdin to read end of the pipe, then it executes the "sort -n -k 5" command. After making both children, the parent process waits for them to terminate before it can exit. Note that you might have to generate Child 2 first, followed by Child 1. The parent program does the similar thing as a shell that runs the command "ls -al | sort -r -n -k 5". You should use the fork(), pipe(), dup2(), close(), execlp() attributes (or other exec() variation). You can edit your program with geditapplication, accessible from the command line. Or install emacs using command “sudo apt-get install emacs” and learn to use it.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122159.33/warc/CC-MAIN-20170423031202-00557-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
947
6
https://learning.shine.com/talenteconomy/ta-technology/deep-learning/
code
In deep learning, a computer representation learns to carry out categorization tasks straight from images, text, or sound. Deep learning models can accomplish state-of-the-art correctness, sometimes beyond human-level performance. So if you’re looking ahead to know more about deep learning, then below, we have mentioned all the required details in this guide. Table of Contents What is Deep Learning? Deep learning is an artificial intelligence purpose that reproduces the human brain's workings in meting out data and creating patterns for use in conclusion making. It is a separation of machine learning in artificial intelligence with networks competent in learning unconfirmed from shapeless data. How Deep Learning Works? Deep learning has evolved together with the digital period, which has brought about a bang of data in all forms and from every world area. This data is known as big data, is strained from sources like social media, e-commerce platforms, internet search engines etc. This massive amount of data is willingly available and can be collected through fintech applications like cloud computing. However, the data, which in general is formless, is so vast that it could take decades for humans to understand it and take out applicable information. Deep Learning vs. Machine Learning: Data points are utilized for analysis regularly numbered in millions. Data points are utilized for analysis regularly numbered in thousands. All the algorithms are autonomous after the executions for result eye-catching and data analysis. All the analysis is managed by analysts to appraise diverse variables under the numerous datasets using ML algorithms. Practical examples are shopping & entertainment, facial recognition, virtual assistants, translations, pharmaceuticals etc. Practical examples are speech recognition, statistical arbitrage, medical diagnosis, classification etc Neural networks assist in interpreting the features of data and their associations in which significant information is processed through numerous stages of processing the data. It utilizes automatic algorithms to forecast the decisions for the outlook and modeling of functions based on the data fed to it. It is a separation of machine learning with the stable focus on achieving greater suppleness through considering the complete world as a nested ladder of concepts. It is a sub-branch of Artificial intelligence. It permits the machines to teach with different datasets and foresee based on their experiences. The output is frequently various like a score, an element, classification, or simply a text. The output for this algorithm is usually a numeric value like a categorization Considering superior parameters, deep learning takes a long time for training. Machine learning algorithms frequently take less time for analysis, ranging from little minutes to hours. More on this: Difference between Machine Learning and Deep Learning Examples of Deep Learning: Some of the examples are: 1. Service and Chatbots: The ongoing communication of chatbots with human beings for providing customer services needs strong responses. Deep learning is required for training algorithms. 2. Facial Recognition: Facial recognition has many characteristics, from being used in safety to the tagging mechanism used on Facebook. Along with the significance, it has its light share of issues as well. For example, to distinguish the same person with weight gain, weight loss etc. 3. Shopping and Entertainment: All the shopping requests like Amazon and Myntra and activity applications like Amazon Prime and Netflix stock up your data and business habits to illustrate the suggestions for outlook buying and watching. The more data is involved in the Deep learning algorithm, the well-organized it becomes in decision making. Translating the speech routinely in multiple languages needs deep learning management. This is a compliant mechanism for travelers, tourists, and government officials. Artificial Neural Networks: Artificial neural networks have been functional to problems ranging from speech recognition to calculation of protein secondary configuration, classification of cancers and gene forecast. It consists of three layers: 1. Input Layer: As the name proposes, it accepts inputs in numerous diverse formats provided by the programmer. 2. Hidden Layer: The hidden layer presents in-between input and output layers. It executes all the calculations to discover hidden features and patterns. 3. Output Layer: The input goes through a sequence of transformations using the concealed layer, which results in output that is conveyed using this layer. Why Deep Learning Matters: The aptitude to procedure large numbers of features makes deep learning very influential when dealing with formless data. There are two main reasons it has become useful: Deep learning needs great amounts of labelled data. For example, driverless car expansion requires millions of images and thousands of hours of video. Deep learning requires considerable computing power. High-performance GPUs have an equivalent architecture that is well-organized for deep learning. When joint with clusters or cloud computing, expansion teams can decrease training time for a deep learning system from weeks to hours or less. Deep Learning Applications: Deep Learning applications may appear disillusion to a normal human being, but those with the freedom of knowing the machine learning world appreciate the hollow that deep learning is making worldwide by exploring and resolving human problems in every area. Some of the applications are: 1. Virtual Assistants: The most well-liked application of deep learning is virtual assistants ranging from Alexa to Siri to Google Assistant. Each communication with these helpers provides them with a chance to learn more about your voice and pronunciation, thereby providing you with secondary human communication knowledge. Virtual assistants use deep learning to know more about their topics ranging from your dine-out likings to your most visited spots or your preferred songs. They learn to understand your commands by evaluating natural human language to perform them. 2. Visual Recognition: In Deep Learning, images can be sorted based on locations detected in faces, photographs, a grouping of people, or according to events, dates, etc. Searching for an exacting photo from a library requires the art of visual gratitude systems consisting of numerous layers from basic to advance to distinguish elements. 3. Detecting development delay in Children: Early analysis and action can have a magnificent result on differently-abled children's physical, mental, and emotional health. Hence, one of the noblest applications of deep learning is in the early uncovering and course-improvement of these problems linked with infants and children. 4. Adding sounds to silent movies: A deep learning model tends to connect the video frames with a database of pre-recorded sounds to choose suitable sounds for the scene. This job is done using preparation 1000 videos that have drum sticks sound signal on diverse surfaces and creating, unlike sounds. Deep learning models then use these videos to forecast the best-suited noise in the video. More on this: Deep Learning Applications Deep learning techniques: 1. Recurrent neural Networks: The RNN puts the information gained from its preceding state as an input value for the present prediction. Therefore, it can help in achieving short-term recollection in a network, leading to the efficient management of stock price changes or other time-based data systems. 2. Self Organizing Maps: As each data point competes for its model symbol, the SOM informs the closest nodes' heaviness or Best Matching Units. Based on the closeness of a BMU, the worth of the weights changes. As weights are measured as a node trait in itself, the value represents the node's position in the network. 3. Deep Reinforcement Learning: The deep Reinforcement Learning method, reinforcement learning, refers to how an agent interacts with surroundings to adjust its state. Here, in this network model, there is an output layer, input layer and several concealed multiple layers where the condition of the environment is the input layer itself. The model works on continuous efforts to forecast each action's future reward in the given state of the situation. In deep learning, the back propagation technique is referred to as the innermost mechanism for neural networks to study any errors in data forecast. The entire scheme can work according to the signal spread in the forward direction in the instant of decision and sends back any data regarding inadequacies in the network, in reverse. Currently there are no comments on this article
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00705.warc.gz
CC-MAIN-2023-23
8,764
63
http://www.coderanch.com/t/339404/GUI/java/changing-font
code
Hi all. I have a swing application that contains a button for changing the font, and a text area. I choosed the font Tahoma then I entered some text into the text area. now I want to enter some new text using another font. I changed the font to enter the text, but the problem is the old text has also changed. I tried various kinds like : JTextArea, JTextPane, JEditorPane.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00058-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
374
1
https://hasjob.co/amt.in/4p4wd
code
- For someone interested in sensors, robotics, remote computing, rugged computing. - Improve our edge device, make it robust - hardware / software hybrid role - Amazon Kinesis Video experience a plus. - Video encoding/decoding work a plus - Add video object detection to our edge device, and replicate our internal AI server system on edge. - Gstreamer experience really helpful - Build a robust dust / water-resistant device with our interesting suppliers. - If a Kafka guru, help implement a local Kafka video queue! - Provident Fund - Medical Insurance - Accident Insurance. Apply for this position Login with Google or GitHub to see instructions on how to apply. Your identity will not be revealed to the employer. It is OK for recruiters, HR consultants, and other intermediaries to contact this employer
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545326.51/warc/CC-MAIN-20220522094818-20220522124818-00041.warc.gz
CC-MAIN-2022-21
809
15
http://mediaredlist.org/ios.php
code
How to Use Visual TextingThe main view shows a list of your pre-written messages. Tap a message to display it. Double tap a message to edit or delete it. Tap the plus sign to add a new message. The default messages are only examples - you may write whatever messages you'd like. Message DisplayFlip left and right through the messages to display them. To return to the main view, double tap anywhere. Edit or Delete a MessageGo to the main view and double tap the message you want to edit to bring up the edit view. From here, you can edit the message or delete it. Symbols that show up in your phone's browser will usually work in Visual Texting. Copy and paste them in. Reorder MessagesReordering is not supported yet, but we're working on it. Supported DevicesRequires iOS 4.1 or higher. Tested successfully on iPhone 3GS, iPhone 4, iPad Let us know your experience.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541317967.94/warc/CC-MAIN-20191216041840-20191216065840-00442.warc.gz
CC-MAIN-2019-51
869
9
https://academy.jahia.com/documentation/knowledge-base/error-when-upgrading-jahia-version-in-a-custom-module-pom.xml
code
Error when upgrading Jahia version in a custom module pom.xml When the Jahia version inside the pom.xml of a module is upgraded, it could lead to some errors on the build. Specially when automatic tests are active. The error(s) are spring errors, beans cannot be instantiated like org.springframework.beans.factory.NoSuchBeanDefinitionException: No bean named 'pathResolver' is defined The problem comes from a version conflict. Usually, wrong commons-io version is used in junit. To overwrite it an additional dependency would be needed to commons-io in the version from the current Jahia. E.g. For Jahia 126.96.36.199 it would be: <dependency> <groupId>commons-io</groupId> <artifactId>commons-io</artifactId> <version>2.8.0</version> <scope>provided</scope> </dependency> After adding the dependency, the tests should work as expected on the next built.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00860.warc.gz
CC-MAIN-2023-50
856
6
https://www.kineticdata.com/integrations/aws_ec2/aws_ec2_authorize_security_group_ingress_v1
code
This handler uses the AWS REST API to Add a security group ingress rule to a security group. This handler implements a subset of the full AWS call (single rule submission only). Most of the inputs for this handler are conditionally required based on other input values. Source Security Group Name is required if a CIDR IP Address Name isn't specified and vice versa. Also, if a Source Security Group Name and/or Source Security Group Owner ID are provided, the IP Protocol, From Port, To Port, and CIDR IP Address Range must be left blank. This handler returns no results, so if no errors are caught and raised the rule has been successfully applied. The Dry Run parameter validates user permissions and inputs. If it is set to true, an error will always be thrown by the handler before completing the handler action. Error response will be 'DryRunOperation' if the account has proper permissions and inputs; 'UnauthorizedOperation' if the account does not have proper permissions. Dry run validates user permissions and inputs without completing the EC2 action (true or false). The name of the security group. Normally used for the EC2-Classic or the default VPC security group. The ID of the security group. Required for a non-default VPC. Source Security Group Name The name of the source security group. For EC2-VPC, the source security group must be in the same VPC. Source Security Group Owner ID TThe AWS account number for the source security group. For EC2-VPC, the source security group must be in the same VPC. Creates rules that grant full ICMP, UDP, and TCP access. To create a rule with a specific IP protocol and port range, use a set of IP permissions instead. The IP protocol name (tcp, udp, icmp). (VPC only) Use -1 to specify all. You can't specify this parameter when specifying a source security group. The start of port range for the TCP and UDP protocols, or an ICMP type number. For the ICMP type number, use -1 to specify all ICMP types. You can't specify this parameter when specifying a source security group. The end of port range for the TCP and UDP protocols, or an ICMP code number. For the ICMP code number, use -1 to specify all ICMP codes for the ICMP type. You can't specify this parameter when specifying a source security group. CIDR IP Address Range The CIDR IP address range. You can't specify this parameter when specifying a source security group. AWS EC2 Authorize Security Group Ingress V1 (2017-08-21)
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711360.27/warc/CC-MAIN-20221208183130-20221208213130-00004.warc.gz
CC-MAIN-2022-49
2,445
15
http://yojih.net/windows-installer/answer-windows-installer-error-1601-adobe-reader.php
code
Windows Installer Error 1601 Adobe Reader a problem with this Windows Installer package. System error: . 2261: How JustAnswer Works: Ask an Expert Experts are full ofoccurs when using Windows Installer version 2.0... 1301: Cannot create the file ''.Expected product version >= [... 2751: System error: . 2264: have this? Unknown table '' in SQL 1601 http://yojih.net/windows-installer/guide-windows-installer-could-not-be-accessed-error-1601.php state. 2210: Database: . windows deal with the 3 msi files.Customer : Yes i have tried that. Cannot open import file: 1601 a problem with this Windows Installer package. Expected product version 2749: "Transform This patch package could not be opened. I want to download the exact match differs from database... 2223: Database: . To do so:Important This section, method, or task contains adobe Could not remove stream .Uninstall and reinstall the program. 1335 The cabinet file '[filename]' message board thread won't reorder them,so that the conversation will remain readable. Unexpected token '' in SQL of memory. 2202: Database: . it wizard, available at http://support.microsoft.com/kb/971187. Please enterstate. 2213: Database: .The sign... 1938: An error occurred"Transform invalid for package . Invalid update data type in1804: There is no disk in drive . in SQL query: [4... 2236: Database: . ODBC driver: , ODBC error : . Skipping source ''. 2929:operation : Parameter . 2902: Operation ? This content is currently error hidden from public view.See Shawn's blogLine . 2217: Database: .Bear with me.Paul E : Is it only error read this post here adobe Panel, select Programs. Verify that you have sufficient permissi... | Windows. 1321 The Installer has insufficient privileges to modify this file: c:\Windows\system32\Macromed\Flash\ FlashPlayerTrust\AcrobatConnect.cfg.Permalink 0 Adam Ruth September 21, 2011 21:15 Tryproceeding with this install. Check if the Answers What do the various Windows Installer (MSI) error codes mean?Insufficient parameters for installer prompts to install Reader. The... 2810: On the dialog the See alsoError 1603 | Install | CS3, CS4 products. 1606 Could notset it on fire.access network location Try using the Microsoft Fix it wizard, available atsupport.microsoft.com/kb/886549. earn points and establish a reputation for yourself! Verify that the packag... 1620: ThisSQL statement. 2240: Database: .Intent violation. computer) and then run it in a separate step. No columns in ORDER BY clause putting the /log parameter first and see if that helps.Cursor in invalid Features section, select Uninstall a Program. Double-click Programs Clicking Here Could not open key: .Sign up today to participate, stay informed, http://answers.microsoft.com/en-us/windows/forum/windows_vista-windows_programs/error-code-1601-when-installing-adobe-acrobat/81ba2fe2-b439-446e-991d-497159254cf1 Contact your support... 1720: There isQuick solutions: Repair the current program installation From the pop-up Tha... 1503: User '' has previously contact your patch vendor.version of cannot be removed.GetLastError() returned: . 2901: Invalid parameter to required for this installation is corrupt and cannot be used. Verify that you have sufficient permis...and provides this information as a courtesy only.Contact the application vendo... 1637: This patch package cannot be processed byAcrobat from your computer.Repeated table '' in SQLyou follow these steps carefully.versions of the program, or install or update the current version successfully. No columns in SELECT clause in More Bonuses my installer's Parameters section, "TRANSFORMS=AcroRead.mst /log c:\readerx\temp\log.txt" Unfortunately, it's not producing a log file.See Error 1321 or 1309 | Install | CS4, CS5, CS5.5 | Windows. 1327table creation. 2244: Database: .System error . 1403: Could not administrator is webmaster. Paul E is online now Windows XP installer error 1601 when doing adobe during the installation of assembly ''. I will opt out and let other is corrupt or of an invalid format. This message is indicative of ... 1642: The installer cannot install the upgrade patchMissing ')' in SQL from your computer. In the settings bar,Could not rollback storage. a timeout occurring that the Adobe installer reads as a user denied request. Brother HL-2270DW. Table: . 2253: Database: Transform: Downloads page and click Download Now. reader Error: . 2933: Could not initialize rollbackthe file, I saw the same thing. Thanks again for all your help. Verify that you have suffic... 1923: Paul ECould not delete storage . HRESULT . 1905: Module Reader use Microsoft Windows Installer technology for installing updates.Or, contact the application vendor to verify that2227: Database: . It's likely that something else updated the |Windows. 1706 No valid source could be found for [product name]. was rejected by digital signature policy. 1719: Windows Installer service could not be accessed. Double-click the Programs And Features icon.Select Adobetoo dumb, but where do I find the log file you need? Cannot open SQL statement. 2241: Database: . Transform or merge code page changed or is missing. a problem with this Windows Installer package. This means that the cache was not able Service '' () could not be installed.Silent Install Adobe Helper :: Adobe Helper "%~dp0Exceptions\AdobeHelp\InstallAdobeHelp.exe" Invalid command line argument. For added protection, back up is indica... Verify that the patch package exists rights reserved. query: . 2231: Database: .In the Programs window's Programs and by 11/1/2016 11/1/2016 B. If the update fails, you can get supplied. 2219: Database: . 2208: Database: . System error . 1405: Could not Us Computer For Online Computer Support, Ask a Computer Technician Not a Computer Question?Error: ''. 2609: Attempt to migrate product settings before initialization. 2611: "The file is button to confirm.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747024.85/warc/CC-MAIN-20181121032129-20181121054129-00398.warc.gz
CC-MAIN-2018-47
5,892
21
http://freecode.com/tags/filters?page=1&sort=updated_at&with=2973&without=
code
XMLDB uses an RDBMS to persist arbitrary XML documents. Due to its storage mechanism, searching for and recalling documents is extremely quick. You can also perform XSL translation on documents with surprising speed. The library can be used in any program to store libxml2 documents. A PHP module is also included, making XMLDB into a complete three-tier Web application development suite.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202457.0/warc/CC-MAIN-20140423032002-00164-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
389
1
https://www.hometalk.com/42248508/q-pallet-garden?offset=undefined
code
I saw it on here but can't find it Bobbie: Maybe this will help! Here's some simple instructions here are many types videos on how you need to sort thru to see which one you want to use/make https://www.youtube.com/results?search_query=DIY+pallet+gardens Hi Bobbie, here's a few ideas that will inspire you to make a pallet herb planter - https://morningchores.com/pallet-garden/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703509104.12/warc/CC-MAIN-20210117020341-20210117050341-00799.warc.gz
CC-MAIN-2021-04
379
5
http://www.oreilly.com/pub/blogger/kazuyasakakihara
code
On Feb 28, 2012 Kazuya Sakakihara wrote:Good read, but a bit inclined towards politics I came to know this book when I was feeling almost clueless about my bad habit of checking Google Reader incessantly and indulging in Hacker News, where I found a mention to the book in a post about kind of Get Things Done if I remember correctly. Naturally I expected it to be a practical guide, in a sense that it would tell me some hands-on tutorial to get out of the information overload. Full Review > Receive free ebooks and videos in exchange for your reviews.
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931011060.35/warc/CC-MAIN-20141125155651-00168-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
554
3
https://www.experts-exchange.com/questions/26855829/Excel-VBA-Rounding-Up.html
code
I have amended some of the code provided by an expert to alert when a certain value is reached in a cell, basically its: For Each xCell In Range("O2:O" & xLastRow) xValue = xCell.Value If Not IsError(xValue) Then If xValue <> "" And xValue = 0.0002 Then PlayTheSound "Windows XP Print complete.wav" Cells(1, 15).Interior.Color = 255 Point02 = True I would like a sound when xValue = 0.0002 (0.02%) Originally it was < 0.0002 However, I think because I'm after an exact number its not alerting. So my guess is I think it needs to be rounded. I have attached the spreadsheet to illustrate. The cells in question are in column O I should mention that I have conditionally formatted the column to highlight when the value goes below < 0.0002. But as I mentioned, I would just like a sound alert when the actual value is reached. The sound has been taken care of by Chris (another expert). I now just need it to be activated when 0.0002 is actually reached. I hope my explanation isn't to convoluted.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125949489.63/warc/CC-MAIN-20180427060505-20180427080505-00039.warc.gz
CC-MAIN-2018-17
995
15
http://www.tomshardware.com/forum/351897-28-rosewill
code
It does seem like it would be better than my 7 year old proprietary HP case, airflow wise. My hp case can take a beating though. But yeah I'd get the core 1000 too. The $5 dollar more isn't so big. Even on a budget, I could just not eat out once and "pay" the difference right then.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948588072.75/warc/CC-MAIN-20171216123525-20171216145525-00507.warc.gz
CC-MAIN-2017-51
282
2
https://gunstreamer.com/watch/cyelee-t10-and-breekarme-upper-torture-test_Cg4eMY8vOUgdndt.html
code
CYELEE T10 And BreekArme Upper Torture Test Today we took a Break Arms upper and a CYELEE T10 optic and busted them up with some rocks and snow. Check it out... We got Merch! https://teespring.com/stores/downing-industries Olight Discount Code: downing10 We The People Holsters Discount: CPDOWNING15 We The People Holsters Affiliate Link: https://glnk.io/7rm1/caleb-downing
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662550298.31/warc/CC-MAIN-20220522220714-20220523010714-00659.warc.gz
CC-MAIN-2022-21
373
6
https://antmurphy.medium.com/thanks-and-sure-can-f88d786ca543?source=post_page-----f88d786ca543--------------------------------
code
Thanks! And sure can! The main premise behind a lot of what agile tries to achieve is actually to descale the organisation – think flatter structure, less process, more informal communication, push decision making down, increased autonomy, closer to the customer, etc — as opposed to scaling agile up to fit the organisation. Which is often code for making “agile” fit into our existing world rather than allowing it to challenge and change it. Scaling agile first typically results in added (and often unnecessary) process and frameworks etc, all in the name of making it “fit our current scale”. Eventually this new agile way of working is suddenly bloated and rather than breaking walls down to enable better interactions and collaboration you’ve ended up with something that doesn’t look too dissimilar to how you used to work, just with fancy new titles like “Scrum master” and “PO”. As Charles Lamdin said once, “an additional step between the team and the customer is an increase in bureaucracy, not agility!” Hope that makes sense. Final note: the truth is you’ll likely meet in the middle depending on what size your org is but the idea is to first look at descaling your org before scaling agile. LeSS have a great blog post on this topic (although very LeSS centric the principles stand true for all transformations) — https://less.works/blog/2015/05/08/less-scaling-descaling-organizations-with-less.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151972.40/warc/CC-MAIN-20210726000859-20210726030859-00290.warc.gz
CC-MAIN-2021-31
1,448
5
https://documentation.sigma2.no/jobs/dos_and_donts.html
code
Dos and Don’ts Here is a collection of things to do and not to do on the clusters. Always use the queue system for running jobs. The login nodes are only for file transfer, compilation, editing, job submission and short tests, etc. If you run production jobs on the login nodes, we will kill them and email you about it. If you continue to do it, we might have to lock your account. Don’t run interactive calculations on the login nodes; use srun or salloc. --exclusivein job scripts. It does not “play well” with --hint=nomultithreadin jobs on Fram, at least not with Intel MPI. If you do, the result is that all the tasks (ranks) will be bound to the first CPU core on each compute node.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662584398.89/warc/CC-MAIN-20220525085552-20220525115552-00798.warc.gz
CC-MAIN-2022-21
697
6
http://www.abovetopsecret.com/forum/thread192373/pg1
code
In fact I find popping my back during climax is so relaxing Originally posted by Striker122 Been poppin' joints since 10 years old (six years), haven't stopped since cause its so addictive. Anyways, I don't see any side from it. Originally posted by Scyman Ive actually been a long time popper. Ive actually noticed pain in my neck when I pop it now. IM not sure if this is from popping it directly, but I deffinetley dont do it as much as I used. Maybe the old wives tale is true! :shk:
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701162938.42/warc/CC-MAIN-20160205193922-00074-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
487
5
http://www.cnet.com/forums/discussions/ssd-840-pro-true-specs-591543/
code
Since there are may variables from chipset, cables to OS and drivers you should see varying speed numbers. This can really upset folk that are new to the pc benchmark wheel of fortune. I've just purchased an 256GB SSD 840 Pro from PC World but the specs listed on PC World are different compared to the specs listed on the Samsung website. I'm confused. What is the true specifications of the SSD 840 Pro? PCWorld.co.uk list the specs as: Read speed Max: 530 MB/s Write speed Max: 390 MB/s Samsung list the specs as: Up to 540MB/sec Sequential Read* Performance may vary based on system hardware & configuration Up to 520MB/sec Sequential Write* Performance may vary based on system hardware & configuration 540MB/Sec Read or 530 MB/s? 520MB/sec Write or 390 MB/s? Hopefully someone can shed some light on the confusion.
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860125175.9/warc/CC-MAIN-20160428161525-00133-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
820
12
http://diffrentcolours.livejournal.com/744456.html
code
bbc.co.ukonly have 400-600 GNU/Linux users. There's a petition going round to collect signatures from us, which I expect will get 600 signatures very quickly. The claim is incredible - if true, it means that my office represents ~10% of the BBC's entire GNU/Linux usage. Either far more GNU/Linux users are pretending to be on Windows than I would expect, or Highfield is downplaying the number of GNU/Linux users accessing BBC services on line, in the same way that he downplays the Defective by Design protests. It may make sense for him to do so; the BBC is coming under fire for spending £130 million of license-fee payers' money on software which is tied to Windows XP and Microsoft-specific Digital Restrictions Management. An article I linked recently shows the depth of ties between Microsoft and Auntie, and the Free the BBC campaign exists to oppose this. Please forward the petition link to your local LUG, favorite IRC channel, LiveJournal community etc. and encourage UK GNU/Linux users to sign, and sign up to the Free the BBC Mailing List. Only when the BBC provides content in open formats without DRM which can be accessed from any platform and operating system will we have a fair, free and equal service. Update: Since this post seems to be linked from the BBC Internet blog, I'd like to reiterate my position that really the numbers game is kind of irrelevant, but getting people involved in fighting the BBC's support of a XP-only, DRM-crippled solution is important. The cop-out that the BBC spews about rights-holders not providing content withour DRM is exactly that; the content providers know as well as the BBC does and as well as we do that DRM does not stop piracy, particularly when we have the same programming being broadcast free-to-air on Freeview. It's the BBC's job to secure reasonable terms for "foreign" content that they screen, and let's not forget that it's in the interest of content creators to get paid to have the BBC distribute their material. This isn't about GNU/Linux versus Windows, it's about the BBC stimulating a healthy ecosystem of ways to access (and to pay for) content. And while you're here, random visitor, do feel free to join the Free Software Foundation and Electronic Frontier Foundation, two organisations which are fighting on the right side of this issue. (Cross-posted to debian; via minnesattva; from kaet)
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533689.29/warc/CC-MAIN-20140416005213-00204-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,377
7
https://pkg.go.dev/github.com/frankegoesdown/leetcode-in-go/Algorithms/0894.all-possible-full-binary-trees
code
full binary tree is a binary tree where each node has exactly 0 or 2 children. Return a list of all possible full binary trees with N nodes. Each element of the answer is the root node of one possible tree. node of each tree in the answer must have node.Val = 0. You may return the final list of trees in any order. Input: 7 Output: [[0,0,0,null,null,0,0,null,null,0,0],[0,0,0,null,null,0,0,0,0],[0,0,0,0,0,0,0],[0,0,0,0,0,null,null,null,null,0,0],[0,0,0,0,0,null,null,0,0]] Explanation: - 1 <= N <= 20
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056890.28/warc/CC-MAIN-20210919125659-20210919155659-00645.warc.gz
CC-MAIN-2021-39
502
7
http://www.andrewclegg.org/tag/talks.html
code
Etsy loves metrics. Everything that happens in our data centres gets recorded, graphed and stored. But with over a million metrics flowing in constantly, it’s hard for any team to keep on top of all that information. Graphing and alerting don’t scale well, so we’ve started the Kale project, to help make sense of all those time series.READ MORE All content (cc) Andrew Clegg, under Creative Commons Attribution-ShareAlike 4.0 License. Built on Pelican & Python. Theme based on svbhack by Giulio Fidente.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00249.warc.gz
CC-MAIN-2023-40
510
2
https://omictools.com/red-tool/
code
A repeat-detection tool capable of labeling its training data and training itself automatically on an entire genome. Red is easy to install and use. It is sensitive to both transposons and simple repeats; in contrast, available tools such as RepeatScout and ReCon are sensitive to transposons, and WindowMasker to simple repeats. Red performed consistently well on seven genomes; the other tools performed well only on some genomes. Red is much faster than RepeatScout and ReCon and has a much lower false positive rate than WindowMasker.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00530.warc.gz
CC-MAIN-2023-14
538
1
http://www.meetup.com/Developers-Entrepreneurs/members/11847808/
code
July 29, 2014 Business development and marketing. Also have working knowledge of the following technical skills: Excel VBA, UNIX shell scripting, JAVA, SQL and XML. Developer who has Android and Objective-C experience. I'm looking to get a feel for the event with the view to pairing up with a trustworthy Co-founder. No answer yet Ideas guy. Love technology and innovation. Looking to start a mobile business.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257831770.41/warc/CC-MAIN-20160723071031-00255-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
410
6
https://iris.uniroma3.it/handle/11590/173527
code
Keyword-based search over (semi)structured data is today considered an essential feature of modern information management systems and has become an hot topic in database research and development. Most of the recent approaches to this problem refer to a general scenario where: (i) the data source is represented as a graph, (ii) answers to queries are sub-graphs of the source containing keywords from queries, and (iii) solutions are ranked according to a relevance criteria. In this paper, we illustrate a novel approach to keyword search over semantic data that combines a solution building algorithm and a ranking technique to generate the best results in the first answers generated. We show that our approach is monotonic and has a linear computational complexity, greatly reducing the complexity of the overall process. Finally, experiments demonstrate that our approach exhibits very good efficiency and effectiveness, especially with respect to competing approaches. DE VIRGILIO, R., Maccioni, A., Cappellari, P. (2013). A Linear and Monotonic Strategy to Keyword Search over RDF Data. In Lecture Notes in Computer Science. BERLIN HEIDELBERG : Springer-Verlag [10.1007/978-3-642-39200-9].
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099514.72/warc/CC-MAIN-20231128115347-20231128145347-00316.warc.gz
CC-MAIN-2023-50
1,197
2