url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://gennaro.zezza.it/software/eviews/glch09.php
code
Chapter 9. A Model with Private Bank Money, Inventories and Inflation Model DIS - Model DISINF version 1 - Model DISINF version 2 - Model DIS with exogenous expectations on sales Model DISINF endogenizes wages, and therefore allowes a full treatment of inflation. In the first version of the model, households take capital gains and losses from inflation into account in their expenditure decision, and inflation has no real effects. Download: gl09disinf1 (Eviews 5 to 8) or gl09disinf1_v4 (Eviews 4.1) Model DISE is a revised version of model DIS, where expectations on sales are now exogenous. This model is used in Appendix 2 to chapter 9, to illustrate a stable equilibrium where expectations are never fulfilled. Download: gl09dise (Eviews 5 to 8) or gl09dise_v4 (Eviews 4.1)
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578636101.74/warc/CC-MAIN-20190424074540-20190424100540-00472.warc.gz
CC-MAIN-2019-18
780
11
http://forum.xfce.org/viewtopic.php?id=7748
code
Really like xfce8 on 12.04. Every once in awhile, a session will be unusable at start-up ( only 1 panel instead of normal 4, cursor unusable etc). No big problem, I just create a new session and it works fine. Now I have so many obsolete sessions in the session selector at start-up, that it is taking awhile to scroll down to the most recent ( still usable session). How do I delete these old sessions? I apologize for such a simple question, but google hasn't helped or looking through xfce files. Also, any idea why the sessions go "bad" ? This command should work rm -rf ~/.cache/sessions/ Thanks, wkr- worked perfect!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124371.40/warc/CC-MAIN-20170423031204-00635-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
622
10
https://numenta.com/neuroscience-research/research-publications/outside-research/page/3/
code
In this Master’s thesis from the University of Agder, the authors examine using Hierarchical Temporal Memory (HTM) to predict future purchase events of customers in a non-contractual setting. HTM was chosen specifically because of a desire to research algorithms that may be useful in churn analysis by utilizing temporal structure of data in prediction based models. The authors also compare HTM results to other techniques. The authors present a full-scale Hierarchical Temporal Memory (HTM) architecture for spatial pooler and temporal memory and verify it for two data sets: MNIST and the European number plate font (EUNF), with and without noise. These results suggest that the proposed architecture, using a novel form of synthetic synapses, can serve as a digital core to build HTM in hardware. Structural plasticity is required by HTM models, but not addressed in many hardware architectures. This paper presents a model of topographic map formation that is implemented on the SpiNNaker neuromorphic platform, running in real time using point neurons, and making use of both synaptic rewiring and spike-timing dependent plasticity (STDP). The authors use our papers as one of the motivations for working on this architecture. This paper proposes an anomaly detection framework for scientific workflows that is based on our Hierarchical Temporal Memory (HTM) technology. The paper also cites the Numenta Anomaly Benchmark (NAB) scoring code and methodology; the researchers use NAB to evaluate performance of algorithms. The authors proposes a distributed anomaly detection system using hierarchical temporal memory (HTM) that predicts the flow of data in real time to increase security for a vehicular controller area network bus. The HTM-based anomaly detection system achieved better results than systems based on recurrent neural networks and hidden Markov model detection.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531352.50/warc/CC-MAIN-20220520030533-20220520060533-00614.warc.gz
CC-MAIN-2022-21
1,886
5
http://myworlde-portfolio.blogspot.com/p/reflection-on-artifact-3.html
code
This artifact helped me source for ideas pertaining to the use of free softwares in education. Artifact 3 is presented based on Chapter 4 of Professor Curtis Bonk's book entitled The World is Open where I touched on Opener 3: It's a Free Software World After All. This opener offers various views and discussion on what led to the creation of free software and its benefits in open learning. In other words, it focuses on the viability of open source and its role in education. I created several questions based on this presentation to present the situation of my learning experience. Below are my questions: 1. How do free software and open source affect education today? 2. How prevalent are hacking issues today? 3. What is the difference between Sakai and Moodle? 4. What are the benefits of Sakai and Moodle? 5. As the world becomes "smaller" and technologies customised cater to our individual needs, what will happen to ethics? The questions posted hinge on the notion of ethical use free software in education. The questions above are formulated based on the following tasks for Artifact 3. 1. Presentation of a synthesis of ONE of the chapters in Bonk's book. 2. Report on the current trends and issues mentioned in the chapter selected. 3. Present them in the form of slides which you will upload into Slideshare (http://www.slideshare.net/). The slides should display an application of ID principles as a whole as well as individually. There should be about 20-30 slides. Please observe copyright rules, etc. Give credit where due. In relation to Artifact 3, I went on to researched about the unethical use of free software in online games so as to present a more current viewpoint of unethical use of free software in online games in the case of botting. Botting accounts for the use of applications to perform automated tasks. It relates to a certain degree of hacking which is also the central issue of Artifact 3. Refer to the following link to get a clearer understanding of what botting means: http://en.wikipedia.org/wiki/Internet_bot As a result of this exercise, I became aware of the contribution of free software towards open learning and that free softwares, if used ethically, pave way for learning in the 21st century. Artifact 3 presents the unique value of free softwares in education despite some issues pertaining to hacking etc. From this artifact, I learnt that the availability of free softwares will be more extensive in years to come as learning now takes place on a different platform i.e., e-learning where sharing and collaboration is becoming a norm as a source of knowledge growth. This indicates that learners will be able to widen their networks and form a more comprehensive Personalised Learning Environment (PLE). I also found an interesting presentation by Stephen Downes on connectivism and PLE which is related to this artifact. Kindly click here to view the presentation or refer to my links in my home page of this blog.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590199.42/warc/CC-MAIN-20180718135047-20180718155047-00321.warc.gz
CC-MAIN-2018-30
2,969
15
https://www.myminifactory.com/object/3d-print-led-desk-lamp-21911
code
Check out our Etsy for all of our 3D printed awesomeness! This is the fully functional solder-free version of the snap-together mini lamp. Besides a 3D printer, all you need is some LEDs and some conductive thread like this:http://members.shaw.ca/ubik/thread/order.html It's a work in progress because there are still some kinks to work out, and I'm not sure what LEDs I want to use yet. I used v0.2 of the 3D-PCB library, which has tolerances calibrated for the Makerbot Replicator. The "bulb" of this lamp is an array that can hold 6 LEDs, and it snaps into the peg that holds the lamp shade on. Some of the arm pieces have an added peg so that the conductive thread can run down the arm to the base (on each side) without overlapping. The base has been adapted to accommodate 2xAAA batteries and a toggle switch. This model was made in blender, using the 3D-PCB openscad exports. Print one of each file, with the exception of the 'peg caps' (print lots of these). The lamp is assembled much like the snap-together version -- assemble the arm in the same way. Once the arm is together, insert the LEDs into the bulb. It is a 2x3 array, with pairs of holes. When inserting an LED, make sure you insert the positive lead (the longer one) into the hole on the inside. This way, all the positive leads will emerge together in the center, and the negative leads will emerge together on the sides. Once you've inserted the LEDs you want, bend the excess into the peg slots nearby. tweezers are helpful to get a good bend. Next, cut two long lengths of conductive thread -- a few feet should give you plenty of leeway for wrapping. Detailed instructions for how to wrap can be found here: http://www.instructables.com/id/3D-Printed-Circuit-Boards-for-solder-free-printab/step3/Wrap-it-up/ Positive first: wrap up the positive peg on the top of the bulb, and insert a cap. Then wrap the negative pegs together to the remaining peg -- insert the peg caps to ensure a good hold. Thread the two threads out of the bulb towards the arm. In my prototype, I ran the positive out through the hole that snaps the arm to the shade, and the negative out the hole at the top of the shade -- but it doesn't really matter as long as it's not the same hole.. Do this while you insert the lamp shade and then snap the bulb into place. There are then three sets of pegs down the arm structure. When you wrap your way down, make sure to flex the arm structure in many directions to make sure you leave enough slack to allow for a wide range of motion. When you reach the bottom of the arm, attach it to the base. Wrap the excess threads to their respective battery terminals, again leaving enough slack for the range of motion you want. Cut two more lengths of thread, about 12 inches should be sufficient. Run one from one battery terminal across the switch. Tie a knot in the toggle, and run it to the other battery terminal. Again, for detailed instructions, see the instructables. And you're done! EDIT One of the pegs, going from the arm through the shade into the bulb, is originally printed at an upwards orientation, causing it to be prone to snapping. I have uploaded a modified version so it can be printed on it's side. This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780061350.42/warc/CC-MAIN-20210929004757-20210929034757-00479.warc.gz
CC-MAIN-2021-39
3,304
18
https://clancygroup.wse.jhu.edu/2023/10/24/congratulations-to-gigi/
code
Congratulations to Yiran (Gigi) Wang for winning 1st place at the Future Leaders symposium for her “outstanding soundbite presentation” at NC State University. Gigi’s winning strategy was to use a pie- baking analogy to make our Bayesian optimization code more accessible to her audience. Gigi is part of the BayesOpt team developing a code base called PAL 2.0 (Physical Analytics pipeLine). This is a selective research symposium organized by the Department of Chemical and Biomolecular Engineering at North Carolina State University. The 1-day symposium is a platform for the “finest and brightest undergraduate researchers in the U.S. to present their work and be recognized for their achievements and potential as future leaders in chemical and biomolecular engineering.”
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00682.warc.gz
CC-MAIN-2023-50
785
3
https://itectec.com/askdifferent/backward-compatibility-of-shell-scripts/
code
I use a .command file to start a basic shell script in the form: #!/bin/bash -- this simply starts Something at /usr/local/bin/Something myLittleOneLineScript To make it work I changed its permissions and made it executable. The question is: I run the latest Mac OS X version and this script perfectly works. But: will it work in any previous OS X version?
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358847.80/warc/CC-MAIN-20211129225145-20211130015145-00639.warc.gz
CC-MAIN-2021-49
356
4
https://worker.graphile.org/docs/support
code
If searching the docs and issues doesn't help; you should consider asking for help from the community on the Graphile Discord. Professional support contracts are also available; for more information see: https://graphile.org/support/ Please support development of this project via sponsorship. With your support we can improve performance, usability and documentation at a greater rate, leading to reduced running and engineering costs for your organisation, leading to a net ROI. If you can't help with sponsorship, then helping others with their problems on the GitHub issues and in the Graphile Discord are both appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817455.17/warc/CC-MAIN-20240419203449-20240419233449-00148.warc.gz
CC-MAIN-2024-18
627
4
https://lists.ubuntu.com/archives/ubuntu-users/2005-June/037321.html
code
Skip ATI. NVidia has been supporting linux for along time with official drivers. Ati just jumped on the band wagon and are WAY BEHIND!! In benchmarks an FX 5200 ($60 nvidia card) beats out a X800 ($400 ATI card) because the ATI drivers are so new and buggy. Support the companies that support linux, Nividia being one of them!!
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500255.78/warc/CC-MAIN-20230205130241-20230205160241-00557.warc.gz
CC-MAIN-2023-06
327
1
http://www.iitjobs.com/jobs/233172/BI-Consultant-Atlanta-GA
code
BI Consultant : Atlanta, GA 2/16/2017 11:20:54 AM 5-8 years of experience in BI Data Warehouse design. Solid ETL skills, Accessing and consuming data from multiple data sources and platforms (flat files, databases, web services, xml data, sharepoint list, etc.) Experience in Microsoft BI Stack. (SSIS, SSAS, SQLServer etc.) Visualizations and Dashboards (Tableau, Microsoft Power BI, SSRS, etc.) Ability to whiteboard ideas and process / navigation design. Excellent oral, presentation, and written communication skills are a must Ability to share knowledge and training with team Able to work in a team environment Self-Starter - Ability to work independently, setting goals and achieving milestones with minimal direction • Able to quickly learn on the job without much supervision Able to work or several different assignments at the same time – work/project management • Attention to detail Possess a strong technical background and willingness to learn Ability to understand and communicate data, infrastructure, workflow, and solution context technical specifications. Organizational skills, a keen sense of priority and a proven ability to pro-actively identify and resolve problems.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00642-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,197
15
https://help.smartling.com/hc/en-us/articles/115003184134-Import-Translated-Files
code
Import Translated Files This article is for Account Owners and Project Managers. Adding translated files to Smartling allows you to centralize localization activity in the dashboard. Once the translated file is added to Smartling, you can easily manage and leverage existing translations, or create new translations for the same content without having to worry about version control or manually updating your translation memory. To import translated files to Smartling: - Do one of the following: - In the New Experience, in a project, click the Files tab. - In the Classic Experience, go to Content > Files. - If the file already exists in Smartling, click the file name. (If the file doesn't exist in Smartling, import the file for translation, then return to step 3.) Acceptable file formats are: iOS, Android, gettext, JavaProperties, XML, JSON, YAML, and CSV. - Click the more icon that corresponds to the language for which you are importing translations, and select Import Translations. - The Import Translation dialog will show. Click Browse to select a file. - Select an option from the Workflow drop down menu: - Choose First Revision Step if you want to have these translations reviewed by translators. - Choose Published to bypass translators, sending this content to the Published queue. Note: Strings will be routed to the default workflow configured in the project for each language. - Select Overwrite existing translations if you would like the translations in this file to update existing entries in your translation database. - Click Import. Your translations are successfully imported into Smartling if there is a success confirmation message. If there is an error message, it may be the result of one or more of these disagreements: - Placeholder mismatch - Inconsistent file directives - Different key/value pairs Once these disagreements are resolved, you can re-import the translated file using the steps above.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400211096.40/warc/CC-MAIN-20200923144247-20200923174247-00489.warc.gz
CC-MAIN-2020-40
1,935
22
https://answers.sap.com/questions/8325155/how-to-generate-file-name-dynamically-in-receiver-.html
code
I have a scenario where I need to generate output file with the name dynamically pulled from the XI payload. In receiver File communication channel I don't see any option where we can specify the XML path for the file name. If my inbound XML structure (inbound interface) is like below: From this I need to pick the filename value and generate the output file with the same value. How can I achieve this? Please help! Thanks & Regards Edited by: gopalkrishna baliga on May 3, 2011 1:10 PM
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00460.warc.gz
CC-MAIN-2023-50
488
7
https://blog.quastor.org/p/200-million-dollar-seed-round
code
☕ A $200 million dollar seed round....? A hard Facebook Interview Question. Roam Research raises $9 million at a $200 million dollar valuation. Facebook goes back to it's roots. Opendoor looks to IPO through a SPAC. Hello fellow nerds! Hope everyone’s having a fantastic day. Thanks for tuning in for today’s edition of the Daily Interview Problem! You are given two sorted arrays and a positive integer k. Write a function that computes the k-th smallest element of an array that consists of the elements of the initial two arrays arranged in sorted order. Remember, you’re only given the two initial sorted arrays. There may be duplicate elements within and across the input arrays. Can you do better than the obvious linear-time solution? We’ll send out the solution (with working code & test-cases) in our next email, so make sure you move our emails to primary, so you don’t miss them! Gmail users—move us to your primary inbox - On your phone? Hit the 3 dots at top right corner, click "Move to" then "Primary" - On desktop? Back out of this email then drag and drop this email into the "Primary" tab near the top left of your screen Apple mail users—tap on our email address at the top of this email (next to "From:" on mobile) and click “Add to VIPs” - Roam Research raises $9 million dollars at $200 million - If you’ve never used Roam Research before, you should definitely try it out. It’s an awesome new note-taking app that lets you write “networked” notes, where you can create links between ideas. It’s hard to explain, but once you use it, it’ll blow your mind. But, still…. a $200 million dollar valuation for a seed round?!? That’s 25 times higher than the median valuation for seed rounds.In completely unrelated news, I’ve realized my calling in life is to start a note-taking app. I’m raising a pre-seed round at a $50 million dollar valuation. If you’re interested in investing, please reply to this email. - Opendoor looking to go public through a SPAC - Opendoor is one of the hottest technology startups in the real estate market. They act as a broker/dealer and they allow you to sell your home extremely quickly compared to the traditional process.The company is salivating at the sky high valuations in the public markets and is probably looking to go public….fast. This way, employees can get liquidity (making hiring and retention easier) and the company can raise capital.A quick way to do that is through a SPAC - “special purpose acquisition vehicle” and Social Capital’s SPAC seems to be the way to go. Opendoor is now in advanced talks with them to go public. - Facebook goes back to its roots - Facebook is launching a new product called Campus. It’s meant to be a place where college students can interact only with peers at their schools. They can access a campus only news Feed and join groups, events and group chat rooms that pertain to campus life. In order to access Campus, students have to provide their .edu email address and their graduation year. Once they’re in, they can create a new profile specifically for their Campus section. These are some pretty crazy ideas, I wonder where they got the inspiration from? As a refresher, here’s the previous question Let’s say you have a photo sharing app that is used by every person on Earth. How would you estimate the hardware cost of the servers necessary to run the app? This is an example of a Fermi Estimation problem. When making estimates, your goal is to be within an order of magnitude of the actual number. All your estimates should be powers of 10 (it makes the math much easier) and the idea is that you'll overestimate some variables, underestimate others and on the whole… your guess will be reasonably close. So, let’s first try and break down the costs. What do we have to pay for here? - server CPU/RAM resources This all depend on the number and size of the images that are uploaded each day. Let’s try and estimate all these variables. We’ll assume a distributed architecture where images are spread across servers (sharding). Let’s say we have - 10^10 users - 10 images uploaded per day per user (average) - The average image is viewed 100 times - The average image is 10^6 bytes - One server can handle 10^4 HTTP requests per second Given these estimates, the number of images we have to serve every day is Number of images = (# of users * avg # of images uploaded per day * # of image views for avg image) Using our estimates, the number of images we have to serve per day is 10^10 * 10 * 100 = 10^13 In order to find the number of servers we’ll need, we can divide our estimate for # of images by the # of HTTP requests one server can handle per day. We already estimated that a server can handle 10^4 HTTP requests per second, so we can multiply that by 10^5 (approximate # of seconds per day) to get 10^9 HTTP requests per day per server. Now, we can divide the total number of images per day by the # of HTTP requests ONE server can handle per day to get the number of servers that we need 10^13 / 10^9 = 10^4 We can estimate that one server costs around $10^4 USD, which will put our total server cost at around $100 million dollars. In terms of storage, let’s estimate storage costs at $0.01 per GB ( a rough estimate based off AWS S3 pricing). We estimated that we have 10^10 users, who upload 10 images a day with each image being 10^6 bytes. That means we have approximately $100,000 a day in additional storage costs. If you have any feedback, feel free to reply to this email with your thoughts! I always love to hear from y’all!
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00212.warc.gz
CC-MAIN-2022-33
5,629
42
https://psoft.net/hsdocumentation/admin/merchant_securetrading.html
code
Download xpay.zip from SecureTrading and place its content into /hsphere/local/home/cpanel/XPay directory on your control panel server: - Log into your control panel server and go to XPay directory: - Unpack xpay.zip: - Copy XPay.jar file into /hsphere/local/home/cpanel/java_rt directory: cp XPay.jar /hsphere/local/home/cpanel/java_rt - Create the keystore file for XPay client: keytool -import -file securetradingxpay.cer -alias xpay -keystore xpay - Edit the examplepolicy file and set the correct path to your keystore file, e.g: keystore file: /hsphere/local/home/cpanel/XPay/xpay - Go to the startup directory and edit the xpay.sh file. Modify the variables: XPAYPOLICY, CLASSPATH and JAVAPATH. See configuration options: - Set the location of the policy file - Set the location of the XPay jar file: - Set path to java executable: - Run the xpay.sh script to start XPay client. For more information about XPay client configuration see Readme.txt in the xpay.zip bundle. - Select SecureTrading in the Add New Gateway box. - Click the Add button. - Fill out the form that appears: - Title: give a name to this SecureTrading connection - Currency: the currency in which your end users will be charged - Site Reference: enter valid site reference sent to you by SecureTrading upon registration - Notification Email for VOID and CAPTURE Transactions: SecureTrading doesn't support VOID and CAPTURE transactions. Instead, H-Sphere sends a notification to this address that the transaction needs to be canceled or completed manually through SecureTrading web interface. - Click Submit Query - In the Edit Gateway box choose Secure Trading from the drop-down box. - Click the Edit button. The page that appears shows the Path and name for certificate file. You need to place the certificate which you received from Secure Trading under that name on the Control Panel server. - Click Submit Query.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400265461.58/warc/CC-MAIN-20200927054550-20200927084550-00080.warc.gz
CC-MAIN-2020-40
1,896
32
https://www.linuxconsultant.org/python-write-string-to-file/
code
Python Write String to File The term “file” refers to a collection of data located at a particular location in the system. Python provides various modules and functions to read and write files. “Writing to a file” is a common task in Python that is assistive mostly at the developer’s end. This involves file opening, writing data to it, and then closing the file. The purpose of this blog is to explain how to write a string to a specified file using various approaches. How to Write Python String to File? To write a string to the particular file in Python, consider the below approaches: Method 1: Writing String to a File Using the “write()” Method The most straightforward way to write a string to a file is via the “write()” method. This method writes a string to the file opened in “write” mode. Let’s understand it by the below example: The below code is used to write a string to a file via the discussed method: In the above code snippet: - The file named “new_file.txt” is opened in “write” mode using the “open()” function. - The specified string is written to the particular file via the “write()” method. - The last step is to close the file by utilizing the “close()” method. In the above output, it can be clearly seen that the specified string value has been written to a file. Method 2: Writing String to a File Utilizing “with” Statement The “with” statement provides a more efficient way of writing to a file. It automatically closes the file after the block of code has been executed which can be demonstrated in the following example. Let’s overview the following example: In the above lines of code: - Likewise, the file named “new_file.txt” is opened in “write” or “w” mode. - After that, similarly, the string “Python world!” is written to the specified file utilizing the “write()” method. - Lastly, the “with” statement automatically closes the file when the code block is completed. The above output shows that the specified string value has been written to a file. Method 3: Writing String to a File Using the “fileinput” Module The “fileinput” module writes a string to a file by replacing the entire file content. The following code writes the specified string value to a file using the “fileinput” module: with fileinput.FileInput("new_file.txt", inplace=True) as file: for line in file: print("Python Guide", end="") In the above code block: - The “fileinput” module is used to open the file named “new_file.txt” in “inplace” mode, which means that the output is written to the same file. - Then, the “for” loop is used to iterate through the lines of the file and replace the content of each line with the string “Python Guide” via the “print()” function. According to the above output, the string has been written to the file successfully. To write a string to a file in Python, apply the “write()” method, “with” statement, or the “fileinput” module. The “write()” method is used along with the “open()” and “close()” functions to write a specified string to the file. Similarly, the “with” statement is used along with the “open()” function to write a string to a file. The “fileinput” module however replaces the file content with the written string. This Python post presented various ways to create a text file from a string. Leave a Reply You must be logged in to post a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00431.warc.gz
CC-MAIN-2023-23
3,470
34
http://www.fifi.org/cgi-bin/man2html/usr/share/man/man3/snmp_alarm_unregister.3snmp.gz
code
SNMP_ALARMSection: C Library Functions (3) Updated: 26 Jan 2000 Return to Main Contents NAMEsnmp_alarm_register, snmp_alarm_unregister, init_snmp_alarm, init_alarm_post_config - alarm functions The usage is fairly simple and straight-forward: Simply create a function you want called back at some point in the future. The function definition should be similar to: void my_callback_func(unsigned int registrationNumber, void *clientarg); Then, call snmp_alarm_register() to register your callback to be called seconds from now. The flags field should either be SA_REPEAT or NULL. If flags is set with SA_REPEAT, then the registered callback function will be called every seconds. If the SA_REPEAT flag is not set, then the function will only be called once and removed from the alarm system registration. The clientarg parameter in the registration function is used only be th client function and is stored and passed back directly to them on every call to the system. The snmp_alarm_register() function returns a unique unsigned int (which is also passed to the callback function on each call), which can then be used to remove the callback from the queue at a later point in the future using the snmp_alarm_unregister() function. If the snmp_alarm_register() call fails it returns zero. INITIALIZATIONThe init_snmp_alarm() function initializes the routines, but a call to init_alarm_post_config() should be called even later and sets up the first timer to initialize the callback function. These two functions should not be used directly by applications, but are instead used by the init_snmp() function which you should call instead. NOTESInternally, the snmp_alarm system uses the SIGALRM signal and therefore no other part of the application should be using the regular system based alarm() function. This document was created by man2html, using the manual pages. Time: 07:10:44 GMT, June 18, 2013
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707184996/warc/CC-MAIN-20130516122624-00092-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,901
13
https://wanderlustcalls.com/2018/02/20/25-in-my-25th-country-thailand-part-two-travel-vlog/
code
From being stalked by monkeys to falling off our floats. From exploring the beautiful Phi Phi islands to sipping coconuts on the beach. Thailand was a crazy, fun dream and I wouldn’t change a thing. Part two of my birthday travel vlog is now up, so have a watch and check out part one if you haven’t seen it yet. Please do like, comment, share and subscribe! 🤗💛 Well, until next time guys!
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107898499.49/warc/CC-MAIN-20201028103215-20201028133215-00029.warc.gz
CC-MAIN-2020-45
399
5
https://forum.holochain.org/t/implementing-cross-app-agent-centricism/2145
code
I’ve logged a requirement for managing one’s commitments to all work, across all projects. The way that Holochain conceptualises “agent centric” means this actually isn’t a feature that Holochain provides for. In standard arrangements, the commitments one has made within community A are isolated within the apps of community A and cannot be accessed elsewhere. It seems to me that these kinds of use-cases need to be handled in the frontend. Is anyone else thinking about how to build them yet? Great use case to surface! Is there any way your user’s source chain could help with this? I’ve given some options on the linked GH issue; see what you think. Replied there, but maybe the deliberation is better done here for visibility… sorry, not sure which conversation context is better Short version: this needs to be something that can work for normal users without having to do advanced configuration or compromise the security of their conductor. I’m not sure that opening up the admin API to the app satisfies those criteria… Agreed — certain operations (spawning new DNAs, instances, and agents) will be critical for most userland apps, including Holo-REA I suspect, but right now the security UX is not great. I’d love to see the admin API become safer to use, and I have a few ideas: - The hApp bundle could whitelist certain admin actions; e.g., “clients accessing this interface can only fork DNAs with hash X, and can create new agents with new name strings but cannot create new public keys for those agents”. - The conductor could pop up dialogs whenever a client is trying to perform an admin action. - Clients should have public keys and be whitelisted. In the meantime, do you think it’d be safe to prototype some patterns based on assumptions that the admin API will be ‘safer’ for the agent in the future? I don’t really like the idea of implementing features against an API that is unstable and has no protocol spec that it’s following, tbh. Tends to be a good recipe for churn and maintenance burden. So, these kinds of things tend to end up going on the backburner behind other stuff that comes with more guarantees about future relevance (; Which is fine, I just wanted to log this as a target to aim for!
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335530.56/warc/CC-MAIN-20221001035148-20221001065148-00347.warc.gz
CC-MAIN-2022-40
2,264
14
https://learn.redhat.com/t5/Red-Hat-Academy/RHCSA-Objective-Manage-layered-storage/m-p/11441
code
As I end my preparations for RHCSA, I'm going back over the objectives list to find weaknesses that need touching up. I'm familiar with using LVM as a layer of abstraction above "physical" block devices, but there's another objective that touches LVM. Does anyone know if "Managed layerd storage" is referring to being able to configure / manage Stratis? Yes, "Manage layered storage" is about Stratis. The rule is if its in the objectives, you are supposed to know it. That does not means it will be asked in your exam though... It's not a too complicated topic and the commands are fairly easy to use, good luck! its a file system manager like ZFS, so you still need to know LVM. Also, stratis is still "beta" if you ask me. While it may be stable, there's a lot you still can't do. Once you use stratis, everything has to be done in stratis, so you can't use LVM to manage it after that. Eventually it will be mature enough to replace LVM though (for storage management, not as a technology). I am also prepping for RHCSA 8, found following links useful understanding stratis. install stratis ** All the best.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00326.warc.gz
CC-MAIN-2024-18
1,112
10
https://developers.google.com/community/accelerators/mentors/profile/profile-chuka_ofili
code
TECH: Architecture, TECH: Development, PRODUCT: Development Chuka Ofili is a software architect and engineer with experience in product architecture, design, devops and full-stack development roles. He is a co-founder and immediate former CTO of Delivery Science (now FieldInsight), a tech startup in Nigeria that seeks to help organizations across Africa get data to manage and monitor field workers through near real time visualizations. He is currently, a Senior Software Architect, DevOps & Full Stack Engineer at Gigster. Chuka is a Google Developer Expert, a Google Certified Professional Cloud Architect and a Google Accelerator Mentor in Technology. He shares his knowledge on engineering/development in his personal blog, and enjoys speaking at conferences and events, wherever possible.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039626288.96/warc/CC-MAIN-20210423011010-20210423041010-00156.warc.gz
CC-MAIN-2021-17
796
2
https://www.gcu.edu/blog/engineering-technology/cipher-avengers-stem-summer-camp-success
code
Heather Monthie, PhD Assistant Dean, College of Science, Engineering and Technology Isac Artzi, PhD Associate Professor, College of Science, Engineering and Technology Faculty, College of Science, Engineering and Technology Romeo Farinacci, DM Program Director, College of Science, Engineering and Technology The Cipher Avengers STEM Summer Camp for high school juniors and seniors was a great success! During the four-day camp, students met with Grand Canyon University faculty and students to learn more about computer science and cybersecurity topics including cryptography, steganography, programming in Python and more. We started off with a demonstration from GCU information technology student Paul Rodriguez who showed students how to set up their own Raspberry Pi to do programming activities in Minecraft. The students had lots of questions for him on how they could do this themselves. Paul also talked about different ways he’s figured out how to use Raspberry Pi’s to solve problems, including feed his dog on a schedule! Next, we started getting into Python programming. Some students had used Python before, but most had not. The students learned how to edit and merge images using code. Students took a picture of themselves somewhere on campus and created images of the mythical jackalope to combine the pictures together using code! This was a great exercise for them to really dig deep into the different ways they can use Python to design and be creative. Recreating an Object The following day, the students, organized in groups of five, took part in a campus-wide scavenger hunt. The objective was for students to become familiar with the GCU campus, while solving certain mathematical and computational puzzles at each station. Once the hunt ended, the students started the next activity on computer graphics. Working in pairs, students were tasked to use a computer to recreate a drawing of an object of their choosing in the room: a bottle, a fidget spinner, a trash can. Some students made a great effort in trying to apply a mathematical model to a fidget spinner so they could recreate it in their program. The requirement was to use Python and turtle graphics and only 2D drawing tools to create a 3D drawing. This required good grasp of geometry, perspective drawing, some trigonometry and Python programming. The Project Based Learning approach proved successful and all students became engaged in planning, calculations and debating implementation approaches. Several asked to forfeit their lunch break so they could continue to work. Students also had an amazing and fun opportunity to meet with cybersecurity professionals and explore various hacks, threats and vulnerabilities prevalent today. Additionally, students were given the opportunity to blend both information security and physical security as they were taught how to pick locks on a server rack with many students being successful. This four-hour event was a highlight of the summer camp for some who have been curious, interested or passionate about cybersecurity; and for two students, this was not their first time. Several students commented that they loved the hands-on learning at the Cipher Avengers STEM Summer Camp. They were excited to get in and really do the work. Many commented that they were excited to go home and keep practicing writing code! The College of Science, Engineering and Technology at GCU provides high-quality programs that help prepare students for the workforce. Want to learn more? Fill out the Request More Information form at the top of this page. More About Dr. Monthie: Heather Monthie, PhD, is an assistant dean and associate professor in the College of Science, Engineering and Technology. With more than 20 years of IT and computer science education experience, Dr. Monthie focuses on developing technology programs and highly skilled technical professionals who are prepared meet workplace demands. She is a certified computer science teacher, an AP Computer Science Principles facilitator with Code.org, the education committee chair for the National Initiative for Cybersecurity Education and a pilot who enjoys sharing STEM education through coding and aviation. Prior to education, she worked in various corporate settings and healthcare IT. Dr. Monthie has a BA in computer science from Lakeland College in Kohler, WI, an MA in teaching from Cardinal Stritch University in Milwaukee and a PhD in information technology from Capella University in Minneapolis. More About Dr. Artzi: Isac Artzi, PhD, is an associate professor of computer science in the College of Science, Engineering and Technology, where he teaches upper-level computer science classes, which require a strong calculus and linear algebra foundation. He is passionate about technology-driven education and a seasoned developer of academic and professional programs, for in-person and online delivery, including adult learners. Dr. Artzi has extensive industry experience in synthesizing concepts and methods in computer science, instructional design, business, Internet technologies and military training. He is an enthusiastic champion of knowledge as a right and not a privilege. He is a multilingual world traveler, teacher, research mentor, team builder and avid advocate of project-based learning. He holds patents in areas of software as a service. He is a proficient computer programmer (Java, C, R, Python, C++, C#, PHP, Objective-C, Swift, SQL) and user of most current business and scientific applications. Dr. Artzi’s formal education includes BS in mathematics and computer science, MS in computer science, PhD in instructional design, specialization certification in data science, ABD in educational systems development and additional doctoral coursework in business administration and physics. More About Deborah: Deborah Haralson has been a computer geek since elementary school, learning BASIC programming on her father’s Commodore VIC20. High school brought the technological bleeding edge, learning GWBASIC programming on an 8086 AT&T backplane box with no hard disk drive. While going to school for engineering, she discovered that her true passion was for IT and began working on Windows, DOS and Macintosh network clients, quickly graduating to network servers and WAN technologies. In over 20 years of experience in the IT field, she has worked for companies such as Honeywell, MicroAge and many others. Along the way, she has become proficient in a wide array of hardware, software and operating systems, along with an occasional stint as a PBX & ACD admin, DBA, trainer, webmaster and application programmer. Deborah has worked with Microsoft server products since the original NT 3.1 beta and has enjoyed the experience ever since then. Deborah is a published author and has authored/co-authored several technology books dedicated toward helping others navigate the jungles of the computing world. Having earned her bachelor’s degree in information technology and her master’s in adult education, Deborah enjoys finding creative ways to teach and learn. More About Dr. Farinacci: Roméo Farinacci, DM, CISSP, GSLC, CISM, PMP, is the program director at Grand Canyon University. He brings over 18 years of experience, including military service and employment in IT/cyber operations and management, consulting and education. During his more than 14 years of Air Force service, he managed various systems and provided support for COMINT, ELINT and SIGINT operations. Starting as an IT professional in the corporate sector, he worked his way into IT management before specializing in cyber security and holding positions as a security engineer, security architect and CISO. In his time at GCU, Dr. Farinacci has been focused on enhancing the classroom experience of students in IT and cyber security. He continues to work toward building a leading-edge cyber security program that will create graduates ready to enter the workforce and make a difference in today’s challenging cyber security environment. Additionally, he oversees the relationship between GCU and ACTRA program, providing industry professionals with hands-on training on cyber security techniques for securing and preventing hackers from exploiting vulnerabilities. The views and opinions expressed in this article are those of the author’s and do not necessarily reflect the official policy or position of Grand Canyon University. Any sources cited were accurate as of the publish date.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476432.11/warc/CC-MAIN-20240304065639-20240304095639-00224.warc.gz
CC-MAIN-2024-10
8,500
26
https://communities.sas.com/t5/Base-SAS-Programming/Import-data-from-Excel-file-that-contains-rows-with-merged-cells/td-p/279416?nobounce
code
06-22-2016 12:51 PM Does anyone know of a quick way to import data from an Excel file that contains rows of merged cells? Something like this: Ideally, I would like the data in the merged cells to become a variable in the SAS dataset. And if possible, I would like to avoid SQL or macros. Thanks in advance! 06-22-2016 02:14 PM There isn't very much control when importing from Excel. I'd do a default import and then fix it in SAS. If this is a one time job, I'd fix it in Excel. 06-23-2016 11:33 AM HAVE AN EXCEL SHEET and I need to input merged headers and merged data rows * I think you need full SAS for this because only 'proc export' works in the reduced SAS enviroment. This solution reads merged headers and merged row cells. Merged headers within the data portion that do not start in column 1 are an issue. You need to know the starting cell of the interior merged header and read the ranges above and below the interior merged header. You may be able to use DBSASTYPE to change a interior column type to a long character and avoid multiple range reads. HAVE * create a sheet with two merged headers and one merged row og data; %utlfkil(d:/xls/mrgcls.xlsx); * delete if exists; ods excel file="d:/xls/mrgcls.xlsx" ; ods excel options(sheet_name="mrgcls" sheet_interval="none"); proc report data=sashelp.class missing; COLUMN ("This is a merged cell" NAME AGE ("Lab values" HEIGHT WEIGHT)); define name / group ; break before name / skip; compute before name ; txt='MERGED'; if name='Carol' then len=10; else len=0; line txt $varying. len; endcomp; run;quit; ods excel close; * merged cells are tricky especially if they occur randomly; * however if you know where they are you can extract them. /* HAVE This is a merged cell Lab values NAME AGE HEIGHT WEIGHT Alfred 14 69 112.5 Alice 13 56.5 84 Barbara 13 65.3 98 MERGED Carol 14 62.8 102.5 Henry 14 63.5 102.5 James 12 57.3 83 Jane 12 59.8 84.5 Janet 15 62.5 112.5 */ WANT HEADER GET Merged Headers Up to 40 obs WORK.HEADER total obs=2 Obs F1 F2 F3 F4 1 This is a merged cell 2 Lab values ... DATA Get Merged data Up to 40 obs WORK.DATA total obs=20 Obs NAME AGE HEIGHT WEIGHT 1 Alfred 14 69.0 112.5 2 Alice 13 56.5 84.0 3 Barbara 13 65.3 98.0 4 MERGED . . . 5 Carol 14 62.8 102.5 6 Henry 14 63.5 102.5 7 James 12 57.3 83.0 8 Jane 12 59.8 84.5 9 Janet 15 62.5 112.5 ... SOLUTION libname xls 'd:/xls/mrgcls.xlsx' header=no scantext=no; data header; set xls.'mrgcls$A1:E2'n; ;run;quit; libname close; libname xls 'd:/xls/mrgcls.xlsx'; data data; set xls.'mrgcls$A3:E9999'n; /* over specify */ ;run;quit; libname xls clear;
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591140.45/warc/CC-MAIN-20180719144851-20180719164851-00286.warc.gz
CC-MAIN-2018-30
2,582
12
https://sourceforge.net/directory/natlanguage:english/language:delphi/os:os_portable/license:gplv3/
code
- Audio & Video - Business & Enterprise - Home & Education - Science & Engineering - Security & Utilities - System Administration New Look Button Components for Delphi/Lazarus4 weekly downloads This project is a "roguelikelike" with OpenGL graphics and unusual magic system. It's migrating to Android now!1 weekly downloads Aerth is a Geotechnical/Soil mechanics Program, that will help Engineers, students and enterpreneurs to studey the soil for construction purposes. This project needs every help possible from civil engineers and programmers. Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.Advertisement Gatto Cube Timer Working proccess... Optimalizated timer for speedcuber's with statistics CommandLine Version works with WINE, but You must install Mono. CommandLine Version requires (dot)Net Framework 4.0 LanMan project is a library for developing multi-language applications. Project also has a special support for CodeGear/Borland VCL library which can automatically translate supported components. Project has editor for language files. Simply and powerful programming language. VERISIL - Secure Data Deletion Technology And Library ® is perfectly developed and open source secure data removal library. The name of project is Turkish (means "CLEAN DATA"). VERISIL is developed in delphi, compatible with Lazarus & FreePascal.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805049.34/warc/CC-MAIN-20171118210145-20171118230145-00458.warc.gz
CC-MAIN-2017-47
1,560
14
http://dev.clojure.org/jira/secure/IssueNavigator.jspa?reset=true&jqlQuery=project+%3D+10022+AND+labels+%3D+bug
code
You are currently using a new, unsaved search. nREPL crashes when required more than one time with :reload-all Certain Calendar values don't seem to be able to print Printing reference returned by clojure.tools.nrepl.server/start-server causes multimethod exception Android: nREPL starts with no namespace nrepl.middleware.interruptible_eval/interruptible_eval raises a stack inconsistence Exception if the call to clojure.main/repl fails
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011129529/warc/CC-MAIN-20140305091849-00011-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
438
6
https://hitech-us.com/articles/How-to-check-the-connection-to-a-certain-port
code
Windows 10 and Windows 8.1 now have an opportunity to check the connection to a certain port in a remote machine. You may think that a new software is available now and a user needs to go through the installation of third-party applications on a computer. However, your PC may sleep well because Windows uses its own safe utility PowerShell. Let’s go through the ‘how to’ scenario step by step. - Open Windows PowerShell using administrator’s rights - Its own cmdlet, Test-NetConnection, will be used to perform the operation. It has the following script Test-NetConnection -ComputerName COMPUTER_NAME -Port PORT_NUMBER. - Replace the COMPUTER_NAME portion with the actual PC name or IP address – you can use the public Google DNS server, which is 22.214.171.124. Also, replace PORT_NUMBER with the number of the port you want to check – let’s say it would be 53 Here is what we get: - Line with TcpTestSucceeded: True indicates that the connection was successful and the port is open. - When you try to connect to the port which is closed and does not receive incoming connections, you will see such a situation. - Line with TcpTestSucceeded: False indicates that the connection was failed but it shows that the server is alive. We can see that PowerShell ping it when looking at ‘PingSucceeded : True’ and ‘PingReplyDetails (RTT): 48 ms’. Sometimes you may face servers that show the following information TcpTestSucceeded is True but PingSucceeded is False. Such situation happens when Internet Control Message Protocol is not active on the server but the port you have checked is open and receives incoming connections. So, that is all. Windows PowerShell allows you to check the connection a certain port without installing different third parties. You just need to use its own Test-NetConnection cmdlet. Keep in touch! - Posted by Author - On September 20, 2018 - 0 Comments
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474573.20/warc/CC-MAIN-20240225003942-20240225033942-00383.warc.gz
CC-MAIN-2024-10
1,902
15
http://www.infoq.com/platforms/presentations/11
code
Laura Merling shares advice in building a software platform for the enterprise based on 3 ideas: Product to Sell, Self-Service with Full Service, Things in Common. Mark Rendle introduces the basic services offered by Windows Azure along with examples of various platform choices that can be used: RavenDB, ASP.NET MVC, Node.js + Express, MongoDB, Sinatra, etc. Brian Ketelsen introduces Skynet, a platform for polyglot, distributed and composable services that communicate with each other over RPC/JSON. Bill Heitzeg shares the lessons learned and the process of recreating a new e-commerce platform and website for Domino’s Pizza. Ola Bini discusses what features a long lasting platform should have, and takes a look at Java to see if it can be that platform. Jay Parikh will discuss various aspects of the software and systems that make up the Ning platform. Ning powers over 500,000 social networks and is one of the fastest growing Internet sites. Mr. West provides a detailed view of cloud computing and how it can be harnessed for benefit. Issues covered include: agile economies, mobile knowledge workers, the cloud, and global organizations This presentation introduces the Google App Engine and an overview of its features while building a simple application. Integration with the Google Data APIs is demonstrated. Stefan presents a roadmap for moving to a cloud computing environment - specifically the AWS cloud platform - based on his experience at Soocial. At Gluecon 2009, Josh Elman discussed the Facebook platform and how it supports the creation of social networks, including the "social stack:" identity, social graph, and sharing.
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860126502.50/warc/CC-MAIN-20160428161526-00182-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
1,652
10
https://forums.bitfire.at/topic/1666/event-colors-in-buisnesscalendar/4
code
@devvv4ever i have added a new thread at http://developer.samsung.com/forum/thread/calendar-events-are-saved-with-wrong-status-information/201/327620?boardName=SDK&startId=zzzzz~&searchSubId=0000000047 hopefully, we get a solution I’m sharing my calendar with my wife. We are using Google calendar and as Calendar App “Buisness Calendar” on Android. We are using different colors for an event to mark something. Red means important and already confirmed date, Blue for a reminder and so on. Now I want to avoid Google and tried Davdroid for Sync and posteo.de as Server. I found no way in the settings to sync the event color between the client. It was possible to use just the calendar color or every person his own color but no sync from my device to her or vice versa. Even for newly created events. Is there a option to do so or must I return back to Google? Thanks in advance For event colors, COLORproperty to encode event colors. Did you turn on the setting? I have just tested posteo.de with event colors using aCalendar successfully: It should work with BusinessCalendar, too. I have found that event colors were reset when there are multiple DAVdroid accounts (at least one with event colors enabled, and at least one event colors disabled) because of some unexpected/insecure Android API behavior (sync adapters may modify raw events of other sync adapters, which seems to be not intended and most likely a [security] bug). Please tell us whether it works with the APK I have sent to you by email, where this problem is worked around.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514796.13/warc/CC-MAIN-20210118123320-20210118153320-00666.warc.gz
CC-MAIN-2021-04
1,551
18
http://site-43043.bcvp0rtal.com/detail/videos/all-videos/video/5333334800001/build-the-digital-insurance-company-of-the-future
code
Build the Digital Insurance Company of the Future Oracle's flexible solutions help insurers move away from simply keeping the lights on to instead simplifying IT and innovating their businesses to gain a competitive edge in today's digital marketplace. All Videos Similar Videos What is Cloud at Customer? Cloud at Customer is a revolutionary solution that gives everyone the ability to leverage all the benefits of the public cloud. How does Cloud at Customer do that? We break it down in this video. Re-Imagine Your Financial Processes in the Cloud Cloud-based EPM solutions deliver greater agility and efficiency, at a lower cost—which is why hundreds of Hyperion customers are upgrading to Oracle EPM Cloud. How TechnipFMC is Standardizing HR Processes Globally Join this webinar to learn how TechnipFMC, a global energy, engineering, and construction company, is standardizing HR across 45 countries with 40,000 employees on one cloud platform.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510893.26/warc/CC-MAIN-20181016221847-20181017003347-00297.warc.gz
CC-MAIN-2018-43
951
9
https://forum.arduino.cc/t/full-fledged-electronic-drum-kit/64799
code
Yes I'm aware it's been done plenty of times.. but I really want a decent sounding and looking electronic drumset; instead of simply piezos glued to CDs for tabletop finger drumming Basic idea (like everyone else) : 1)Use a piezo either inserted in a practice pad or stuck behind a DIY pad (like the one here : http://www.instructables.com/id/Electronic-Drum-Pad/ ) I plan to use a 4051 to expand my inputs 2.1)use a midi connector for arduino and use a MIDI-USB cable and use REAPER + EZDrummer OR 2.2) Use a serial to midi driver/converter like the one at Spikenzielabs or the one by the laser-harp inventor to send output to MIDIYoke and use that virtual midi port as an input for a drum sampler like EZDrummer in Reaper or FLStudio 3)Shift the whole thing to my netbook on which I can install a Linux distro. Hydrogen/LMMS can be used although I'm guessing they are no where as good as Reaper + EZDrummer. But the advantage of Linux is that I can throw out all the unnecessary software packages (networking, etc) and create a really light, fast and reliable dedicated 'drum processing' distro.. Now I tried this with one piezo; I soldered the leads to the piezo and put a 1 megaohm resistor in parallel, used the demo sketch here : http://spikenzielabs.com/SpikenzieLabs/Serial_MIDI.html (I did NOT use the driver on that page which gave me some problems, I just used the sketch) and used this : http://www.stephenhobley.com/blog/2010/02/15/serial-port-midi-relay/ as my converter. So what happens is, as soon as I strike the piezo, I hear a piano note from my PC speakers.. I also modified the sketch so that instead of '127' as the midi velocity, I send the analog read value divided by 8 (max value from analog read is 1023, and max midi velocity value is 127) to the software So now I've got the basic idea working with 'velocity' sensing Only thing left is setting up Reaper with the Spikenzie drivers (the above mentioned driver that I successfully tried doesn't allow me to choose/config MIDI ports ) .. which is giving me problems. Once I manage to get hold of a midi connector and the cable, I can try the whole thing with todbot's code : http://todbot.com/blog/2006/10/29/spooky-arduino-projects-4-and-musical-arduino/ so I can get out of the whole software mess. I've also read up on the MIDI format and how the 'messages' are structured (instruction,note,velocity) Anything else I should think about before diving in and starting the whole thing on the real scale (making drum pads, tubing, etc ? ) What features would it unavoidably lack as compared to pro e-drums ? Let me also mention, if it matters, that one of the main reasons that I chose to go the DIY way is cost.. Yes I'm aware you usually get what you pay for .. but still... I have also looked at most of the open-hardware drum brains on the internet, but I've no advanced knowledge of electronics yet to make sense of their designs/instuctions.. Maybe after 3-4 years I'll be able to use those schematics ditch the computer entirely .. or better still get a real drum set, but for now the way I see it,this is the only way to go. Thanks for reading the whole post
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584913.24/warc/CC-MAIN-20211016170013-20211016200013-00103.warc.gz
CC-MAIN-2021-43
3,142
11
https://addigy.com/resources/on-demand-webinar-building-an-apple-it-ecosystem-from-the-ground-up/
code
Tim Cruz, VP of Customer Success at Addigy, sits down with Steve Scher, Director of Technical Operations at AlphaSights, a loyal Addigy customer for the last 5 years. Steve tells the story of: - Why his organization uses Apple devices company-wide - Why he chose Addigy to help him effortlessly scale his workforce (now managing over 2,600 devices across 9 offices worldwide!) - How Addigy makes onboarding new staff a breeze! - How his company transitioned to a remote workforce in the pandemic and ways he helped ensure security outside the standard “controlled office network” - His favorite Addigy features that give him peace of mind
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00063.warc.gz
CC-MAIN-2023-50
642
6
https://forum.mmm.ucar.edu/search/25605/
code
Thanks for the explanation. But when I am running the model without CLDFRA and with different MP scheme such as Purdue Lin, the model runs perfectly fine. On the other hand, changing to WSM5, it does not. I am wondering why is that? I found a solution to this. I needed to add CLDFRA as a variable in the wrfinput_d* files. I do not know why this variable was absent in the wrfinput files. Once added, now everything works fine. Does anybody know why this variable is important for this configuration? Thank you! When using WSM5 (mp_physics=4) in a nested domain, WRF stops at the creation of the 1st nested domain without any error. To be exact d02 2007-05-27_12:00:00 alloc_space_field: domain 3 , 36606528 bytes allocated is the last line. I have provided a rsl.error.0000 file with debug set to 1000.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710962.65/warc/CC-MAIN-20221204040114-20221204070114-00532.warc.gz
CC-MAIN-2022-49
804
5
https://www.reference.com/technology/average-cost-microsoft-office-software-beec44778e53c0e9
code
Microsoft Office ranges between $140 and $400 as of March 2015. The amount a consumer spends depends on the type of Office product . Microsoft Office 2013 Student runs around $139 and includes PowerPoint, OneNote, Excel and Word. It can only be installed on one computer. Office Home and Business runs about $220 and includes Outlook, OneNote, Excel, Word, and PowerPoint and can also only run on one PC. Microsoft Professional runs on one PC and includes Outlook, Word, Excel, PowerPoint, OneNote as above but also comes with Access and Microsoft Publisher. Microsoft also provides monthly options for its Office software. This option costs around $10 per month.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660258.36/warc/CC-MAIN-20190118172438-20190118194438-00486.warc.gz
CC-MAIN-2019-04
663
3
https://forum.zdoom.org/viewtopic.php?p=1131841
code
Before I cover any of the new posts theres some important information I need to hand out. We recently moved our git repo over to github! Our new link to the repo is https://github.com/Mythotic-Tinker-Station/lexicon Seeing as most people have github accounts, this was a good move to move the repo to. I will be asking if there is any bugs or suggestions please use the issue tracker on github to report them. I'll update the OP thread later. Anyhoo. That is strange, although our focus is zandronum its possible theres issues. I have raised it with my dev team so we can discuss what we can do but im pretty sure I might need more information. If you could do me a favor and raise an issue at https://github.com/Mythotic-Tinker-Stat ... con/issues for me for tracking purposes and we'll look into itYholl wrote:I tried this out after finding out about it, but had a big problem. Your votegun mechanic basically doesn't work with some mods, rendering the entire vr map useless in them. Even using the console to give yourself the votegun, the votegun has no effect at all. This affects LegenDoom and Final Doomer at the very least. I understand that it's a cool feature and a neat way of choosing maps, but I think a more mod-compatible method of selection would be a better choice for a multi-mapset compilation. Possibly. We had switches before but the convience of shooting stuff is something we liked. Something to try in either those two mods, you techically should be able to use any gun to select a map. Does this work?openroadracer wrote:The "Compendium" multi-WAD compilation mod just has you walk straight into a portal with the .WAD's title screen on it. Think that would be a better idea?Yholl wrote:I understand that it's a cool feature and a neat way of choosing maps, but I think a more mod-compatible method of selection would be a better choice for a multi-mapset compilation.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00412.warc.gz
CC-MAIN-2023-50
1,893
7
https://discuss.dev.twitch.com/t/android-extension-has-no-internet/31708
code
I have a very bad problem I can’t solve by myself. I hope you can help me I have written a Twitch extension for PC (not released, yet). It all worked well and because I’m satisfied with the current state of the extension, I have decided to release the 1.0.0 version of it. But then, I just thought of whether it would work on mobile, too. So I activated mobile view of it and it looked exactly like on the PC. But then a message occurred, that my backend is not available (message for the user; errors are logged). Here some facts and things I’ve already tested: On PC, it works in Chrome, Edge and Firefox on Windows. My smartphone is Android 10 (Sony Xperia). My smartphone can access my backend via Chrome, but not from inside Twitch app. It cannot be a CORS problem. Methods, Headers and Origins are all allowed. It cannot be a SSL problem. A valid certificate is installed and works perfectly on PC. I have tried to set a manifest.xml with internet permissions, but it didn’t work either. I’m also not very sure if I have done it correctly. Mobile versions of extensions are still just webpages, you don’t need any manifest or special permissions or anything like that (except for iOS, where you need the extension to be whitelisted by providing an Apple Developer ID). If a request to your EBS isn’t working, log whatever error you’re getting. Without knowing what error you’re getting there’s not much anyone can do to help. No request arrives at my Apache2 (both logs, access and error, remain empty). The XMLHTTPRequest returns with readystate === DONE, but status is 0 and response is undefined. fetch() throws an empty error, which resolves to an empty object after a call to JSON.parse(). I hoped to get an error from browser console (or anything like that), but I couldn’t find any way to open it from inside the Twitch app. After two days, I actually found an error. It was kind of hidden, because JSON.stringify() doesn’t include getter and their current values. Even iterating over the object via a for-loop didn’t show them. Checking on .constructor (.prototype doesn’t exist on this specific object) did the trick to find out its type and the corresponding getters. The promise of fetch() rejects with a TypeError and the following message: “Failed to fetch”. That seems to be a network error. But other extensions (and the Twitch app itself) doesn’t have any problems. I spent the last three days trying things and searching via Google, but I’m not a single step further to a solution. Is there nobody who can help me? As always, as soon as I ask about help, I get new ideas. Even if the source code of another extension (I’m currently using, but because it doesn’t work as I need it, I decided to write an own one) is not public, I just came to the idea, that the code might not be minified. And yes, it isn’t. So I searched through the source code of the other extension and it does make requests exactly like I do. So this can’t be the problem. That led me to another question, which might solve my problem: Is it possible, that the Twitch mobile app disallows requests of mobile extensions, which are not released, yet? I guess I’m trying that by just release the extension and see if it works after. I didn’t know that there configurations exist, which are valid for browsers but invalid for mobile apps. Using your link to check my backend revealed that it just got a B-rank. Now, I completely changed my backend and it gets an A-rank. But the best is, that the mobile version is now working!!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00191.warc.gz
CC-MAIN-2023-50
3,566
29
http://www.bischeck.org/?p=246
code
Currently we have a naming limitation in the naming of a host, service and serviceitem. The issue is seen when using dynamic thresholds that do calculations on cached entries. When describing a cache entry in the 24threshols.xml file in a hour tag you should use the format of host-service-serviceitem, erphost-erpOrders-weborders. The problem with the current format is that the names given must be based on any letter, upper or lower case, and the number 1-9. Yes the missing of 0 is a major bug. Execept for the 0 bug the format has the following limitations: - Dash (-) is used as the separator between the host, service and serviceitem name, which means that using dash in the name is a problem. - Other characters like dot (.), plus (+), underscore (_) or any other character then the described above is not supported. This is a major weakness since many will use, for example dot and underscore in their existing Nagios host and service name.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00873.warc.gz
CC-MAIN-2023-50
949
3
https://help.octopus.com/t/struggling-to-get-config-transformations-to-run/4558
code
I have a WebApp on Azure that I’ve managed to get published out with Octopus working with. However I’m struggling to get the config transformations packaged in the release to run. For example I have one called Web.Development.config that I want to be run on a particular environment. But the config transforms are never run, and it doesn’t look like they are searched for either. I’m running 22.214.171.1240 and deploying directly to an Azure Web App. For reference, I have tried to tick the “Automatically run configuration transformation files” but it wont stay ticked… Hi Luke, thanks for getting in touch. There were some issues with the config transforms checkbox in 3.0.0 (which was a pre-release build) - can you upgrade to the latest stable version (3.0.3 I believe) and try it again? We’ve updated and I still don’t have the config being transformed. It’s not very clear as to what the rules are for when transforms are run? I’ve managed to get it working. I’ve simplified down my environment names which is where I was getting confused. i.e. If I have an environment called “Development (User X)” what will it expect the config name to be? I have had a play with different environment names, it seems to me that if the environment name has a space in it the config transform won’t be applied. I’ve created an issue to fix this: https://github.com/OctopusDeploy/Issues/issues/1757. Thanks for bringing it to our attention. It turns out the issues with spaces was because I was adding files to the NuGet package with zip instead of creating a package with nuget.exe. NuGet encodes spaces differently to a zip file so they will not be shown in the package. So, your transformations to “Development (User X)” should be working. I have your exact transforms working by including the file Web.Environment (User X).config in the package.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662577259.70/warc/CC-MAIN-20220524203438-20220524233438-00151.warc.gz
CC-MAIN-2022-21
1,876
15
http://www.vintagebmx.com/community/index.php?showtopic=1027192&mode=threaded
code
Good morning, I'd like to find out if anyone has a link or a website that I might be able to check out to help me aid in pinpointing age and such of some various Haro,GT and Dyno's that I have. I know sometimes brake mounts and etc. can yield info....BUT, I'm specifically looking for a site that has serieal number decodings. Anyone know of such a thing????
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190134.25/warc/CC-MAIN-20170322212950-00192-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
358
3
http://stackoverflow.com/tags/functional-programming/info
code
Functional programming is a programming paradigm which primarily uses functions as means for building abstractions and expressing computations that comprise a computer program. Functional programming is a programming paradigm that deals primarily with mathematical functions. In functional languages, functions are first-class values. Functions take arguments and return results, but typically don't mutate state. This in contrast to imperative-programming, which primarily revolves around statements that change state. The advantage of avoiding mutable state is that you can safely compose functions, and you can use algebraic laws and "substitution of equals for equals" to simplify programs or improve their performance. One consequence of this is that many common patterns in programming can be abstracted as higher-order functions, which apply a function that implements real functionality, and applies it to data in a known way. This can make code more concise and simpler to reason about and understand. Today, functional programming is getting more and more popular. The main reason of this process is the provability of functional programms, and security is very important nowadays. There are many use cases for functional programming, e.g. Computations or Concurrency handling. Use cases of functional programming These languages are listed in order of popularity in relation to the Languages that are primarily functional, although some support mutable state or other programming paradigms: Languages that have some functional aspects (like support for first class functions) but are not considered functional languages per se:
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824345.69/warc/CC-MAIN-20160723071024-00266-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
1,638
8
https://hackernoon.com/your-cs-degree-wont-prepare-you-for-angry-users-legacy-code-or-the-whims-of-other-engineers-64a43595ec63
code
One of the most universal experiences among engineers, it seems, is stepping into your first job and thinking, “I have no idea how to do this.” For how rigorous and challenging computer science programs are, there will always be bits and pieces (and sometimes entire skillsets) of real-world software engineering that school doesn’t teach you. Whether your first job offers the training and mentorship to help you fill in the gaps, or you have to teach yourself on nights and weekends, the panic and hustle to catch up is real. Because commiserating can sometimes be fun and informative, we interviewed a handful of engineers with CS degrees about what school didn’t prepare them for. Your CS degree will teach you:Cryptography Your CS degree won’t teach you:How to handle an angry Twitter mob Most CS programs don’t cover how to deal with angry users. Early-stage startup roles, on the other hand, require it. Among the toughest stories we heard was the engineer who was alone in the office when the site crashed. The company had recently switched from dedicated servers to AWS–something the engineer had very little experience working with. For the next seven hours, he was the only person on hand to get the site back online, while over 1,000 users rage tweeted at the company each hour. He likened it to pulling an all-nighter, but with 7,000 people screaming at you. A close second would have to be the engineer who accidentally started a rumor that his company hated Linux users. He shipped a new feature without testing it on Linux. He knew only a fraction of a percent of their users ran desktop Linux, but he didn’t grasp just how vocal those users would be. Within a day, there were threads on major dev sites discussing how the company was sabotaging Linux users, and his simple bug became a PR crisis. As it turns out, when tens of thousands of people use a product, there’s no such thing as a “minor” change — and if people don’t like a change you made, they’re more than willing to share their potentially-caps-locked take. The course colleges should add:Social Media 101: Navigating Outrage and Subtweets Your CS degree will teach you:Software architecture Your CS degree won’t teach you:Where these magic numbers are coming from If you think of the words “ancient” or “legacy” in the context of your CS degree, you’ll probably remember working in C or Assembly. As it turns out, working in a language written more than 30 years ago is often easier than working around the spaghetti code another engineer wrote last summer. Complaining about messy codebases was a universal pastime among the engineers we spoke to. One, who began he career at a decades-old tech company, described the particular headache of deciphering a bug that was older than he was. Another told us about spending months refactoring code that was written by a former founder. It was peppered with comments like “We better change this soon.” By then, those commit dates were a couple years old. The course colleges should add:Refactoring 220: Magic Numbers, Gibberish Comments, and Illegible One-Liners Your CS degree will teach you:Database systems Your CS degree won’t teach you:How to stop that one engineer from performing unauthorized writes to the DB To be clear, this isn’t about playing into the stereotype that some engineers are anti-social. Most of the people we spoke with, however, did share some common difficulties around interacting with teammates. The first was dealing with incompetent coworkers. At school, you don’t really need to worry about what other people know, outside of group assignments. On the other hand, when it turns out your teammate — a self-proclaimed “hacker” — actually does not know how to code, that’s a problem. As was the code he copied, pasted, and tweaked from Stack Overflow that never ended up working. The second common problem is more about adapting to codependent, cross-team work in an engineering org. One engineer, who started his career working on a popular operating system, described the slow realization that its code — which passed all of their team’s tests — caused bugs in other, seemingly unrelated pieces of the product. Being the person who made six other teams shift into firefighting mode isn’t the best way to make friends at a new job. The course colleges should add:Humans 302: Why They’re The Worst Sometimes No matter what your university does or doesn’t teach in its curriculum, there are always going to be gaps for you to fill in when you enter the workforce. We heard from engineers who had never used version control or written tests in school. Other engineers said they graduated with no idea what production environments were. At the same time, we heard from senior engineers who said that, at the rate technology evolves, there are constantly new gaps in their knowledge that need to be closed. It’s just the nature of technology. While it’s fun to run through the shortcomings of CS programs and commiserate about the difficulty of first jobs, all of the stories we heard highlight a simple truth: As an engineer, your core responsibility is to learn more — constantly. Also, to the new grad engineer who broke their entire company’s email capabilities by writing “SendGrind” instead of “SendGrid” — we’re glad things got better. Originally published at angel.co.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00261.warc.gz
CC-MAIN-2022-33
5,418
27
https://peerj.com/articles/5949/
code
The emergence of infectious diseases can truncate the age structure of host populations (Jones et al., 2008; Lachish, McCallum & Jones, 2009; Ohlberger et al., 2011; Fitzpatrick et al., 2014). Within age-structured populations, such truncation is primarily caused by compensatory changes in the vital rates (rates of growth, fecundity, and survival) of younger age classes which occur in response to elevated levels of extrinsic adult mortality (death of adult animals attributable to external factors such as disease or predation; Stearns, 1992; Roff, 1993). To maximise individual fitness within an environment of high extrinsic adult mortality, selection for increased developmental rates, decreased size, and age at sexual maturity, and an increased adult life span (decreased intrinsic adult mortality) will occur (Stearns et al., 2000). This theory has been empirically borne out in a number of systems in response to several different sources of mortality, including predation (Reznick, Bryga & Endler, 1990), over-harvesting (Olsen et al., 2004), and experimentally induced adult mortality (Stearns et al., 2000). Changes to population demography can have profound impacts on the growth and stability of infected populations (Saether & Bakke, 2000). This phenomenon has recently been demonstrated by Scheele et al. (2016), who documented high adult mortality and associated truncation of population age structure in alpine tree frog (Litoria verreauxii alpina) populations infected with the lethal fungal pathogen Batrachochytrium dendrobatidis. Populations with truncated age structure were shown to be more vulnerable to decline due to stochastic recruitment failure than B. dendrobatidis-free populations (Scheele et al., 2016). These results highlight an important, yet relatively unexplored mechanism by which infectious diseases can negatively affect their hosts. Infectious diseases are emerging at a faster rate and threatening a larger range of species than at any prior point in history (Jones, Patel & Levy, 2008). Therefore, it is imperative to better understand demographic shifts associated with disease, and their consequence for population viability, particularly in species of conservation concern. Worldwide, amphibians are the most imperilled class of vertebrates (Wake & Vredenburg, 2008). Aside from threats such as habitat loss (Cushman, 2006), over-harvesting (Xie et al., 2007), and climate change (Foden et al., 2013), one major driver of amphibian declines is the emergence of a suite of infectious diseases (Daszak et al., 1999). One of the most widespread and deadly of these diseases, ranavirosis, is caused by viral pathogens belonging to the genus Ranavirus (Chinchar, 2002; Green, Converse & Schrader, 2002). Ranaviruses are globally distributed and are capable of infecting and killing a wide range of species from three classes of ectothermic vertebrates (Amphibians, Cunningham et al., 1996; Fish, Whittington, Becker & Dennis, 2010; Reptiles, Marschang, 2011). Clinical ranavirosis is often characterised by severe dermal ulcerations (Cunningham et al., 1996), as well as haemorrhaging and lesions affecting the internal organs (Cunningham et al., 1996; Bayley, Hill & Feist, 2013). At the population level, acute incidences of ranavirosis often manifest in mass mortality events, with extreme or complete population mortality reported in some instances (Green, Converse & Schrader, 2002; Wheelwright et al., 2014). Evidence from the UK shows that following an episode of mass mortality due to ranavirosis European common frog (Rana temporaria) populations can decline in size by more than 80% (Teacher, Cunningham & Garner, 2010). Though population recovery has been observed in some instances, often population size remains supressed, and some populations decline to local extinction (Teacher, Cunningham & Garner, 2010). Campbell et al. (2018) demonstrated that ranaviruses are potentially more widespread than previously thought, and present within the environment even when resident frog populations show no overt signs of disease. These findings suggests that whether or not an outbreak of ranavirosis occurs may depend on currently unknown biotic or abiotic factors of an environment, although there is evidence for a role of the cutaneous or environmental microbiome (Campbell et al., 2018), secondary host species, and chemical usage (North et al., 2015). Susceptibility to ranavirosis outbreaks varies among species, but a number of ecological risk factors, including life history strategy (the species specific cycle of growth, maturation, reproduction and death), have been identified (Hoverman et al., 2011). To date, no work has evaluated the impact of ranavirosis on the demographic structure of host populations using individual age data. In this study, we used a unique comparative field system born out of the Frog Mortality Project (FMP; see Teacher, Cunningham & Garner, 2010; Price et al., 2016 for details) to study the impacts of ranaviral disease history on the demographic structure of wild R. temporaria populations in the UK. Unlike in most other species of susceptible amphibian, ranavirosis disproportionately kills adult R. temporaria, rather than tadpoles (Duffus, Nichols & Garner, 2013). We determined population age structure using skeletochronology (age determination by counting skeletal growth rings) to test the hypothesis that a history of ranavirosis truncates the age structure of R. temporaria populations. Additionally, we investigated potential mechanisms for such age truncation by using morphometric data to explore if frogs originating from populations with a history of ranavirosis display reduced body size or evidence of more rapid growth compared to their counterparts from ostensibly disease-free populations. Finally, to examine the potential effect of the demographic impacts of ranavirosis, we used population projection modelling to simulate the dynamics of hypothetical R. temporaria populations under a range of stochastic environmental scenarios that impact recruitment, adult survival, or both. Based on previous evidence (Ohlberger et al., 2011; Rouyer et al., 2012; Scheele et al., 2016), we hypothesised that age structure truncation would heighten the vulnerability of R. temporaria populations to environmental stochasticity. This project was approved by the ethics boards of both the University of Exeter and Zoological Society of London and conducted under UK Home Office project license 80/2466. All field sampling was conducted under the personal Home Office license 30/10730 issued to Lewis Campbell. Evidence from the same populations studied herein suggests that ranaviruses may be more ubiquitous within amphibian populations in the UK than previously thought, being detectable even in populations with no history of ranavirosis (Campbell et al., 2018). We therefore used a history of ranavirosis related mortality (or lack of), rather than detectable ranavirus burden, to differentiate between populations that are impacted by ranaviruses and those which are not. Candidate R. temporaria populations were identified using the FMP database of privately owned fieldsites that have experienced at least one R. temporaria mass mortality event due to ranavirosis and a complimentary database of fieldssites thought to have not experienced a ranavirosis outbreak, based upon information provided by fieldsite owners. All fieldsites were urban or sub-urban gardens, distributed throughout Southern England (Fig. 1). Although sizes varied, all fieldsites contained an artificially constructed pond. Site owners reported that neither their gardens nor ponds were treated with any chemicals which could harm the resident R. temporaria populations. Briefly, ranavirosis-positive fieldsites were classified as such if they had experienced a confirmed ranavirosis mass mortality event between 1997 and 1998 and ongoing discovery of frog carcasses with symptoms consistent with ranavirosis was reported by property owners to Teacher, Cunningham & Garner (2010). Ranaviruses were confirmed as the causative agents of mortality within these populations using a combination of post-mortem pathological examination of frog carcasses and molecular diagnostic techniques (Teacher, Cunningham & Garner, 2010). In order to be classified as disease-free, fieldsites must have been owned or occupied by the same people at all times since 1997 and have contained a well-monitored R. temporaria population for at least as long. Owners/occupiers of disease-free fieldsites must not have observed any signs or symptoms of ranavirosis at any time. See Teacher, Cunningham & Garner (2010) for more detailed fieldsite selection criteria. Fieldsite proprietors were contacted to establish their willingness to be involved in this study. Five ranavirosis populations were successfully recruited and matched with five populations that have remained disease-free (Fig. 1). None of our ranavirosis-positive populations had experienced a mass mortality event within the last decade. Fieldsites were surveyed during the spring breeding season of 2015, with each site sampled on a single day. Sampling involved opportunistic searching for frogs within and around the perimeter of the breeding ponds. Captured frogs were placed into plastic holding tanks before sampling, which took place in situ. To ensure sampling effort between populations was as equal as possible, searching took place during a 1 h, mid-morning time window. Snout to vent length (SVL) was measured using 0.1 mm scale callipers and the distal portion of the 1st digit of a hind limb was clipped using surgical scissors. A topical disinfectant that contained an analgesic (Bactine; WellSpring Pharmaceutical, Sarasota, FL, USA) was applied to the surgical area prior to the procedure. Toe clips were placed into individual 1.5 ml micro-centrifuge tubes containing 1 ml of 70% ethanol. Following sampling, all animals were released at point of capture. The number of individuals sampled in each population varied between 4 (Witham) and 61 (Mitcham and Palmer’s Green) with a mean of 30 animals sampled per site (Table S1). All captured frogs were considered to be part of the breeding population, as juvenile frogs rarely return to breeding ponds (Wilbur, 1980; Verrell, 1985), and all sampled individuals were found to be over the minimum known age of sexual maturity for the study species (Gibbons, 1983; Miaud, Guyétant & Elmberg, 1999). The age of each frog was determined by skeletochronology, which has been calibrated and demonstrated as a reliable method of determining the age of northern European R. temporaria in several previous studies (Gibbons, 1983; Gibbons & McCarthy, 1986; Ryser, 1996; Miaud, Guyétant & Elmberg, 1999). We followed the protocol for aging R. temporaria from (Miaud, Guyétant & Elmberg, 1999) with the following modifications. The phalangeal bone was separated from soft tissues, decalcified with 5% nitric acid for 1.5 h, and washed with water over night. Cross sections (12 μm thick) were then cut from the bone using a cryostat and stained using haematoxylin for 20 min. Lines of arrested growth (LAG) were counted using a light microscope at 200–400× magnification, 10–12 sections were analysed for each individual and two different researchers verified counts. Age at sexual maturity was determined as the youngest age at which inter-LAG space reduced in size, as juvenile inter-LAG space is significantly wider than post-sexual maturity (Sinsch, 2015). Body size by age and age at sexual maturity We conducted all statistical modelling in R (R Core Team, 2014). We used linear mixed effects regression (lmer) models, implemented in the package lme4 (Bates et al., 2015), fitted with a Gaussian error structure, and a stepwise simplification procedure to investigate the impact of population ranavirosis history on the body size (SVL) of R. temporaria. Age, ranaviral disease history of the source population (a two level binary factor) and their interaction were fitted as fixed effects. We controlled for variation in SVL between sampled populations by the inclusion of population of origin as a random effect, applied to the intercepts (Table 1). Since male and female frogs grow at different rates (Gibbons, 1983; Ryser, 1996; Miaud, Guyétant & Elmberg, 1999), the datasets of each sex were analysed separately. |Fixed effects structure||Removed fixed effect||Est||df||Chi2||p| |Male body size| |svl∼age * status||6| |svl∼age + status||Age * status||5||0.059||0.81| |Female body size| |svl∼age * status||6| |svl∼age + status||Age * status||5||0.94||0.33| |Male age at maturity| |agemat ∼ status||4| |agemat ∼ 1||Status||−0.12||3||0.99||0.32| |Female age at maturity| |agemat ∼ status||4| |agemat ∼ 1||Status||−0.12||3||0.29||0.59| Model summaries of model simplification procedure to evaluate the effect of ranavirosis history on the body size and age at maturity of R. temporaria populations. All models contained only population of origin as a random effect applied to model intercepts. The p-values presented here represent the significance of the parameter removed from the preceding model as calculated by a likelihood ratio test between models (ANOVA in R). svl, snout to vent length; agemat, age at sexual maturity; df, degrees of freedom of the model; Est, effect size estimates of the final fixed effect removed from each model. All comparisons use disease-free populations as the reference level. A separate lmer model was fitted to investigate the impact of ranavirosis history status of the source population on age at sexual maturity. In the full model, age at maturity was fitted as the response variable, ranaviral disease history of source population as a fixed effect and source population as a random effect. As female R. temporaria mature later than males (Gibbons, 1983, Miaud, Guyétant & Elmberg, 1999), the datasets of each sex were analysed separately. Influence of ranavirus on population age structure The impact of disease status on the age structure of R. temporaria populations was investigated using a Bayesian ordinal mixed effects model in the package MCMCglmm (Hadfield, 2010). We fitted age class as an ordinal response variable (nine discrete classes, ages 2–10 years), disease status of the source population as the fixed effect, and source population as a random effect. We used uninformative priors for both the random effect (G) and residual variance (R) structures, but fixed the residual variance at 1 as this quantity cannot be estimated in ordinal models (Hadfield, 2010, 2018). The model was run for a total of 600,000 iterations with a burn-in period of 100,000 iterations and a thinning rate of 500, giving a final sample of 1,000 draws from the posterior distributions. We assessed model convergence using the Gelman–Rubin (G–R) statistic calculated from three independent chains initiated with overdispersed starting values. All G–R values were <1.05, indicating convergence. Mean probability of membership and associated 95% credible intervals for each age class were calculated from the linear predictor, for each of the two disease history groups. Age structure plots (Fig. 2) suggest that observed changes were similar for both sexes, so the dataset was not split by sex. Population matrix modelling To investigate how changes in population age structure, as well as scenarios that can bring about such changes, can impact the dynamics and stability of R. temporaria populations, we constructed population matrix models. Comprehensive methodologies of our matrix modelling can be found in our supplementary methods section (Methods S1). However, in brief, we created hypothetical R. temporaria populations of 150 sexually mature female animals and projected these populations 20 years into the future based on two matrices which represented potential vital rates at ranavirosis-positive R. temporaria population (increasing annual mortality in each adult age class) and a disease-free R. temporaria population (uniform adult mortality). We populated these matrices using the vital rates for R. temporaria published by Biek et al. (2002) except that we increased the fecundity of each post sexual maturity age class of R. temporaria by 50 eggs compared to the previous age class. Theoretical clutch sizes ranged from 250 eggs per year per 2-year-old adults to 650 eggs per year per 10-year-old adults. This increase was done according to age by size data collected for this study and previously published work showing that the clutch sizes of R. temporaria are tightly positively correlated with female body size with a >3 fold increase between individuals of 50 mm versus individuals of 80 mm (Gibbons & McCarthy, 1986). To analyse the impact of these adjustments we compared the sensitives of our adjusted matrices to one constructed with the unadjusted vital rates of Biek et al. (2002). As previous evidence has shown that disease induced demographic shifts or the changes in vital rates which may bring them about can increase susceptibility to environmental change (Rouyer et al., 2012; Scheele et al., 2017) we then modelled our populations in environmentally stochastic scenarios which incorporated processes which may result in annual reproductive failure, mass mortality, or in extreme cases, both simultaneously. Body size by age and age at sexual maturity We sampled 208 male and 66 female frogs, of which 103 males and 31 females were sampled at ranavirosis-positive populations. A break-down of the number of frogs sampled per each population can be found in Table S1. For both sexes, age had a significant effect on SVL (males; df = 4, Chi2 = 186.38, p < 0.001, females; df = 4, Chi2 = 47.16, p < 0.001; Fig. S1; Table 1). Mean age at sexual maturity of males from ranavirosis-positive populations (n = 57) was 2.6 years (± SE 0.07) and from disease-free populations (n = 59) it was 2.8 years (± SE 0.06). Mean age at sexual maturity of females from ranavirosis-positive populations (n = 19) was 3.2 years (± SE 0.13) and for females from disease-free populations (n = 17) it was 3.3 years (± SE 0.10), and all differences were non-significant (Fig. S2; Table 1). Influence of ranavirosis on population age structure The mean age of males from ranavirosis-positive populations was 4.8-years-old (± SE 0.16) compared to an average age of 6.3 years (± SE 0.13) at disease-free populations. Mean female age at ranavirosis-positive populations was 5.3 years (± SE 0.28) compared to 6.6 years (± SE 0.26) at disease-free populations. Disease history had a significant effect on population age structure (effect size −1.43, 95% credible intervals −2.37, −0.38, p = 0.008; Fig. 2). We found populations with a positive history of ranavirosis to be dominated by younger R. temporaria. We calculated the difference in posterior probabilities of belonging to an age class based upon disease history status by subtracting the posterior probability of a frog of age X being encountered at ranavirosis-positive population from the posterior probability of a frog of age X being found at a disease-free population. The resulting difference values show that adults aged 2–5 years old are more likely to be encountered in positive disease history populations, and those aged 6–10 years old are more likely to be observed at populations where no disease has been recorded (Fig. 3). Differences in age distributions were strongly supported for all age classes (95% credible intervals of difference do not cross zero) except for 6-year-olds. Although 6-year-old frogs were more likely to be observed in disease-free populations, the 95% credible intervals incorporated 0 (mean difference = −14.41, 95% CI [−30.45 – 3.96]; Fig. 3). Population projection modelling When projected based upon a matrix with constant annual adult survival, both disease-free and ranavirosis-positive population vectors showed similar population dynamics. Population growth initially spiked due to an influx of pre-mature age classes into the population. This initial growth was followed by a period of attenuating oscillation, before reaching equilibrium at around the 15th year (Fig. S3). Projected populations starting with a truncated age structure obtained smaller population sizes per each year, however, this difference was non-significant (Fig. S3, ANOVA; df = 1, F = 0.935, p = 0.34). Projecting either starting population vector using a matrix incorporating reduced annual adult survival resulted in the same pattern of population growth but further reduced population sizes per year, with the lowest annual population sizes obtained by an age truncated population projected with decreased annual adult survival, though this reduction was again non-significant (Fig. S3; ANOVA; df = 3, F = 0.99, p = 0.39). Elasticity analysis showed that both disease-free and ranavirosis-positive matrices were similarly sensitive to the same matrix elements. However, the decreased annual adult survival incorporated into our ranavirosis-positive matrix rendered that matrix marginally more sensitive to fluctuations in survival of larval, juvenile and 2-year-old life stages. Sensitivity to survival of all subsequent adult age classes was higher in our disease-free population matrix (Fig. S4). Similarly, our ranavirosis-positive matrix was more sensitive to changes in the fecundity of 2, 3 and 4 year old breeding adults, whereas sensitivity to changes in fecundity of older adult age classes was higher in our disease-free population matrix (Fig. S5). In concordance with the matrix constructed using the unadjusted vital rates of Biek et al. (2002), both of our altered matrices were most sensitive to fluctuations in the summed vital rates of post metamorphic R. temporaria life stages, though larval survival demonstrated the highest or second highest individual elasticity in all matrices (Fig. S4). The most noticeable dissimilarity between our adjusted matrices and the unadjusted matrix was that matrix sensitivity was distributed more evenly between the fecundity of all adult age classes in the former, whereas the unadjusted matrix was extremely sensitive to the fecundity of 2-year-old breeding adults (Fig. S5). Our stochastic projection models showed that disease-free populations subject to a 10% probability of recruitment failure per year were still able to consistently attain population sizes near carrying capacity much more often than ranavirosis-positive populations subjected to the same scenario, which attained a more variable array of population sizes (Fig. 4; Table 2). The inclusion of potential ranavirosis mass mortality events further destabilised ranavirosis-positive populations and under a scenario when both adult mass mortality and reproductive failure could occur within the same year populations were driven locally extinct in 58% of model iterations (Fig. 4; Table 2). The number of iterations per 5,000 that each stochastic projection model reached a given population size. Disease-Free = Simulated disease-free population under a 10% annual chance of complete reproductive failure. Ranavirosis-positive A = Simulated ranavirosis-positive population under a 10% annual chance of complete reproductive failure. Ranavirosis-postiive B = Simulated ranavirosis population under a 10% annual chance of reproductive failure and a 10% annual chance of a recurrent adult mass mortality event in exclusive years. Ranavirosis-positive C = Simulated ranavirosis-positive population under identical conditions to Ranavirosis-positive B with addition of a 5% annual chance of complete recruitment failure and adult mass mortality in the same year. K = Imposed population carrying capacity of 200. The impact of disease on population demographics Our results illustrate that a history of ranavirosis can have a significant effect on the age structure of a population. We found that older R. temporaria (aged 6–10 years) are significantly less likely to be found within populations with a positive history of ranavirosis than they are in disease-free populations. Since none of our sampled populations have experienced a significant mass mortality event within the lifetime of any of the sampled frogs (∼10 years), this suggests a pattern of attritional mortality in ranavirosis-positive populations, rather than the sudden and catastrophic loss of any particular age classes. Attritional mortality of adults is consistent with our knowledge of ranavirosis in R. temporaria. First, R. temporaria are highly philopatric (Brabec et al., 2009), and our study populations occupy permanent, urban, or semi-urban garden ponds (Teacher, Cunningham & Garner, 2010; Price et al., 2016). Ranaviruses have been shown to persist in such water bodies (Nazir, Spengler & Marschang, 2012), particularly in the presence of secondary host species such as fish or other, less susceptible, amphibian species (Hoverman et al., 2011; North et al., 2015). None of our fieldsites supported natural or stocked populations of fish, however, we did encounter the common toad (Bufo bufo) at one population of each disease status. The presence or absence of secondary hosts therefore does not represent a consistent confounding variable between our disease history groups. Second, mortality due to ranavirosis is annually recurrent (Daszak et al., 1999; Teacher, Cunningham & Garner, 2010), and unlike all other host-ranavirus systems, infection in the UK primarily affects adult life stages of R. temporaria (Cunningham et al., 1996; Duffus, Nichols & Garner, 2013). Third, adaptive immune response to ranaviruses are apparently limited in R. temporaria (Price et al., 2015; Campbell et al., 2018). Consequently, it is possible that adult mortality within populations with a history of ranavirosis is maintained in such a way that an individual is more likely to become infected and succumb to ranavirosis the more often it returns to spawn. Such a scenario would explain the decreased likelihood of observing individuals older than 5 years of age in populations with a history of ranavirosis. Concurrently, we found that a significantly higher number of 2–5 year old frogs were captured at disease-free populations than at populations with a history of ranavirosis. Life history theory predicts that the first compensatory response to high adult mortality should come in the survival rates of lower age classes (Stearns, 1992). We lack any data on the immature age classes present at our study populations and the snapshot nature of our study means we cannot draw inference on whether the survival rates of younger adult age classes are increased in ranavirosis-positive populations. However, it is plausible that such an increase could result in the observed increased abundance of younger animals. Empirical studies conducted on populations of other vertebrates subjected to persistent infectious diseases have detected a reduction in the age or size at sexual maturity within diseased populations (Jones et al., 2008; Lachish, McCallum & Jones, 2009; Ohlberger et al., 2011; Fitzpatrick et al., 2014). As such, we hypothesised that R. temporaria originating from populations where ranavirosis causes increased adult mortality would reach sexual maturity at an earlier age than frogs from disease-free populations. We also hypothesised that a trade-off in the allocation of resources to early reproduction, away from growth, would cause frogs from ranavirosis-positive populations to attain a lower body size per age than those from disease-free populations. However, we found that a positive history of ranavirosis is not associated with a significant impact on either age at sexual maturity or body size throughout life. These findings are in contrast with the findings of (Scheele et al., 2017) who found that an infectious disease (B. dendrobatidis) reduced the size and age at sexual maturity of L. v. alpina. The age at which R. temporaria mature is intrinsically linked to attaining a minimum body length needed to successfully reproduce (Ryser, 1996; Miaud, Guyétant & Elmberg, 1999). The age at which this length is attained has been shown to be heavily influenced by several environmental factors such as photo-period and altitude (Miaud, Guyétant & Elmberg, 1999). All frogs in our study were found to mature at either 2, 3, or 4 years of age and this is consistent with the findings of other similar studies on R. temporaria (Gibbons, 1983; Ryser, 1996; Miaud, Guyétant & Elmberg, 1999). In fact, no previous study has found male or female R. temporaria to reach maturity younger than 2 years of age and post-sexual maturity there is little detectable trade-off between growth and fecundity in response to sub-prime environments (Lardner & Loman, 2003). This evidence suggests that the life history strategy of R. temporaria may already be optimised to generate maximum reproductive fitness in light of other environmental factors and that scope for further plasticity in traits such as age at sexual maturity and subsequent growth rate in response to diseases may be minimal. Given the apparent lack of compensatory change in the onset of sexual maturity an alternative explanation for the fact that we encountered 2- and 3-year-old breeding frogs at ranavirosis-positive populations but not disease-free populations may be behavioural changes that enhance the life time reproductive success of individuals in the face of high adult mortality. Participation in spawning events in exposed aquatic environments is associated with a significant mortality risk to an individual, caused either by exposure to predation or the act of mating itself (Beebee, 1996). Additionally, smaller R. temporaria present in breeding populations are easily outcompeted by larger individuals, who are better able to secure a mate and achieve amplexus (Gibbons, 1983). The loss of larger, more competitive individuals at ranavirosis-positive fieldsites may release smaller R. temporaria from this intraspecific competitive pressure. Increased opportunity for less competitive individuals to participate successfully in reproductive events may result in animals that would normally defer breeding until subsequent years or larger body sizes attempting to reproduce earlier. Additionally, in environments of high adult mortality the number of lifetime reproductive events is potentially limited. In such environments lifetime reproductive success is likely higher when an individual exploits all possible chances to produce offspring. Thus smaller, less competitive individuals may attempt to breed earlier than they would do in the absence of disease induced mortality, irrespective of the odds of being out competed by older/larger frogs. Any or all of the potential processes outlined above could lead to the observed truncation of age structures in R. temporaria populations with a history of ranavirosis. While our results provide strong evidence of such truncation, they are based on data collected from adult R. temporaria sampled during one breeding season. As such we are unable to draw conclusions as to the mechanisms which drive observed changes to population age structure. Additionally, due to the correlational nature of our study we are unable to emphatically exclude the possibility that the age structure truncation we observed is attributable to some other unmeasured variable between our studied populations. Although the lack of systematic differences between our fieldsites other than disease history suggests that this is unlikely. Nevertheless, our results highlight a potentially important and as yet unexplored facet of the relationship between ranaviruses and their amphibian hosts. The impact of demographic shifts has been demonstrated in a number of study systems (Jones et al., 2008; Lachish, McCallum & Jones, 2009; Ohlberger et al., 2011; Rouyer et al., 2012; Scheele et al., 2016) and as such the relationship between ranaviruses and population demographics undoubtedly warrants further investigation. A long-term, mark-recapture study within the same populations used here would likely prove a critical first step in elucidating the mechanisms which bring about shifts in R. temporaria population age structure. The potential impact of disease on the viability of populations Previous investigations have shown that age structure truncation, associated with an emerging pathogen, severely reduces the viability of host populations, particularly under variable environmental conditions (Scheele et al., 2016). We used population matrix models to probe the potential impacts of a truncated age structure, and the demographic processes which may bring about such changes, on the viability of R. temporaria populations in the UK. Additionally, we introduced environmental stochasticity into our models in order to explore the combined impact of these two challenges simultaneously. When modelled in the absence of increased adult mortality due to ranavirosis, starting population vectors representing both a disease-free population and a ranavirosis-positive population (truncated age structure) exhibited minimal difference in their dynamics. This finding suggests that the level of age structure truncation we document is unlikely to reduce the viability of R. temporaria populations. The same was true when both population age structures were modelled in the presence of increasing adult mortality due to ranavirosis, suggesting that even under such conditions the relatively high survival of pre-metamorphic, juvenile and young adult age classes is enough to maintain population viability. This suggestion is supported by the elasticity of our population matrices which demonstrated that the survival of tadpoles, juveniles and early adult life stages have higher predicted impact on the population growth dynamics of our populations than the survival of older adult age classes. This result is supportive of the findings of other investigations of amphibian population dynamics (Biek et al., 2002; Earl & Gray, 2014). However, under environmentally stochastic scenarios, where recruitment was reduced, populations that were subjected to increasing adult mortality due to ranavirosis faired much worse than ranavirosis-free populations. These results are consistent with previous observations of age structure truncation increasing the vulnerability of populations to environmental stochasticity (Ohlberger et al., 2011; Rouyer et al., 2012; Scheele et al., 2016). Body size, age and fecundity are positively correlated in R. temporaria (Gibbons & McCarthy, 1986), as well as in many other species (Blueweiss et al., 1978; Honěk, 1993; Trippel, 1993; Sand, 1996; Penteriani, Balbontin & Ferrer, 2003). The relative absence of the oldest and largest breeding animals from disease positive populations means that per capita fecundity will be reduced and annual recruitment rates lowered. Such changes likely heighten the impacts of any events that result in failed recruitment or further adult mortality. It is important to note that our matrix models are approximations of the populations that they represent, and the results of our models are therefore demonstrative of potential additional impacts of ranavirosis, rather than definitively demonstrating the existence of such impacts. Although our simulations are based on published literature, they necessarily incorporate several assumptions. A key assumption in our models is the number of eggs produced per each individual, per each adult year of age. Although we have strong grounds to suggest that fecundity of female R. temporaria increases with age and size, the number of eggs produced by each frog of a given age or size is unknown in our study populations. If a larger number of eggs are produced than represented by our matrices, it may be that the impact of stochastic recruitment failure upon our populations is reduced and vice versa. Similarly, we reduce the survival of each adult age class into the next by 5% for each year of development post-sexual maturity. Whilst we found no impact of the amount by which we reduced this annual survival parameter on the dynamics of our modelled populations, in reality survival may not decrease annually in such a uniform manner. Finally, we set an upper limit for our theoretical populations of 150 female animals. However, due to the nature of our fieldsites we lack the ability to make accurate estimations of actual population sizes at our studied populations. Larger actual population sizes may buffer populations against the potential impacts that we have demonstrated but smaller actual population sizes may mean that the potential demographic impacts of ranavirosis may be even more consequential for R. temporaria populations. Further investigation of the life history traits and an accurate estimation of sizes of our study populations would allow for more robust parameterisation of our models and the ability to more accurately predict the impact of ongoing ranavirosis within them. Despite these limitations, our population models corroborate previous empirical data collected from within our study system. A long-term study of population sizes has shown that following an outbreak of ranavirosis, characterised by a mass mortality event, UK R. temporaria populations follow three possible trajectories. These are: (1) complete recovery to post outbreak population levels, (2) persistence at a largely reduced population size, or (3) local extinction (Teacher, Cunningham & Garner, 2010). Our simulated R. temporaria populations were projected to population sizes that incorporate all of these possible outcomes, dependant on the levels of environmental stochasticity to which a population was subjected. Importantly, our simulations suggest that the fate of a population subjected to ranavirosis may depend heavily upon the stability of its environment, providing a potential explanation as to why some populations appear to persist with endemic infectious disease, while others are driven to local extirpation. The importance of variations in fecundity in population models Variations in adult fecundity due to body size are often not included in population projection modelling (Briggs et al., 2005; but see Zambrano et al., 2007). However, our results highlight the importance of considering age or body size specific changes in fecundity in population modelling, particularly when considered threats disproportionately impact certain age classes. Ensuring matrix models of populations represent the life history of the study species as closely as possible is essential, especially when seeking to inform conservation or policy decision making. Our results highlight an increasing need to better understand the impact of disease on the demography of host populations and the processes which can bring about such demographic shifts. Further investigation of this relationship, possibly via a long-term mark-recapture study on the same populations used here could help elucidate the exact mechanisms responsible for age structure truncation in R. temporaria populations. This work also further suggests that the emergence of an infectious disease within a population can heighten its vulnerability to external stressors. Although the theoretical stressor incorporated into our models was environmental stochasticity, the same is likely to be true for all types of stressor including anthropogenic. This result is timely given that we live in a time of unprecedented disease emergence and anthropogenic change (Daszak, Cunningham & Hyatt, 2001). Supplementary Methods - Population Projection Modelling. A comprehensive overview of the rationale and methodologies behind our populations projection matrix modelling analyses. Snout to vent length by age. The relationship between snout to vent length (SVL) and age in R. temporaria from ranavirosis-positive and disease-free populations. We found no significant effect of disease history on the SVL of frogs. Our data does however show clear evidence of continued growth throughout life regardless of disease history. The age at which R. temporaria reached sexual maturity by sex and population disease history. The proportion of individuals that reached sexual maturity at each possible age within the summed male and female populations of each disease history. Age at sexual maturity was calculated via skeletochronology. Projected populations under different combinations of starting population vectors and transition matrices. Projected population dynamics of R. temporaria populations modelled under different scenarios. Starting population vectors were created by weighted random sampling of 150 animals based on the proportions of each age class observed in populations of each disease history in our data. D-f = disease free and R-p = ranavirosis-positive. Our R-p matrix incorporated decreasing annual adult survival and our R-p starting population vector was age structure truncated. Survival elasticities of our population matrices. Computed elasticities of each survival element of our population projection matrices. Elasticities of our matrix which incorporated increasing adult mortality and therefore represented a population subjected to ongoing ranavirosis are shown in red, whilst those of our matrix which represented a disease-free population are shown in blue. For reference the elasticities of an extended matrix created using the unadjusted viral rates published by Biek et al. (2002) are shown in white. Fecundity elasticities of our population matrices. Computed elasticities of each fecundity element of our population projection matrices. Elasticities of our matrix which incorporated increasing adult mortality and therefore represented a population subjected to ongoing ranavirosis are shown in red, whilst those of our matrix which represented a disease-free population are shown in blue. For reference the elasticities of an extended matrix created using the unadjusted viral rates published by Biek et al. (2002) are shown in white. Population projections under varying decreases in per annual survival rates of adult R. temporaria. Population dynamics of theoretical disease-free populations and theoretical ranavirosis-positive populations modelled with an increasingly large annual percentage increase in adult mortality due disease. We found no significant difference between the population estimates through time based on varying this survival parameter alone (ANOVA; df = 6, F = 0.889, p = 0.505). In the absence of an empirically proven value for this parameter, we selected a value of 5% annual increase in mortality to represent the probabilistic increase of succumbing to ranavirosis with an increasing number of years returning to breed within the same infected population. The number of frogs sampled per each population. The number of R. temporaria sampled at each individual population. Basal population matrix. Basal population matrix. Row one represents the fecundity of all life stages on the horizontal into the egg life stage, the number is equivalent to females produced per female. All other rows represent the proportional survival of each age class on the horizontal to the relevant age class on the vertical aspect of the matrix. Matrix representing spawning failure in a ranavirosis-positive population. Population matrix representing complete spawning failure in ranavirosis-positive populations (5% reduced survival per year for adults). Row one represents the fecundity of all life stages on the horizontal into the egg life stage, the number is equivalent to females produced per female. All other rows represent the proportional survival of each age class on the horizontal to the relevant age class on the vertical aspect of the matrix. Matrix representing spawning failure in a disease-free population. Population matrix representing complete spawning failure in disease-free populations. Row one represents the fecundity of all life stages on the horizontal into the egg life stage, the number is equivalent to females produced per female. All other rows represent the proportional survival of each age class on the horizontal to the relevant age class on the vertical aspect of the matrix. Matrix representing mass mortality in ranavirosis-positive populations. Population matrix representing a year with a mass mortality event in ranavirosis-positive populations. Row one represents the fecundity of all life stages on the horizontal into the egg life stage, the number is equivalent to females produced per female. All other rows represent the proportional survival of each age class on the horizontal to the relevant age class on the vertical aspect of the matrix. Matrix representing a mass mortality and spawning failure in a ranavirosis-positive population. Population matrix representing a year with a mass mortality event and total reproductive failure in ranavirosis-positive populations. Row one represents the fecundity of all life stages on the horizontal into the egg life stage, the number is equivalent to females produced per female. All other rows represent the proportional survival of each age class on the horizontal to the relevant age class on the vertical aspect of the matrix.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103821173.44/warc/CC-MAIN-20220630122857-20220630152857-00504.warc.gz
CC-MAIN-2022-27
45,349
86
http://www.openthemagazine.com/category/tags/kohinoor
code
Britain was not a benign overlord Why the British are not really thinking about giving the Kohinoor (or anything else) back The Kohinoor’s return would put the collections of the world’s greatest museums at threat The Kohinoor is not the largest diamond in the world. It’s even supposed to be unlucky for its owners. Yet, for Indians, it’s the only gem on earth that matters.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998238.28/warc/CC-MAIN-20190616122738-20190616144738-00439.warc.gz
CC-MAIN-2019-26
383
4
http://constructs.stampede-design.com/2014/10/elastic-image-slider/
code
In this Codepen demo, user Taron creates an elastic image slider that looks like viewing a series of images stacked in a deck of cards. When dragging the top image to the left or right, you can see the elastic effect where it’s pulling and revealing a couple of images that are going to appear next. When you reach the maximum dragging point, the image will disappear and get stacked back to the bottom of the deck. I think this implementation looks cool especially on touch devices. The only downside is the image-viewing experience is not bidirectional like a usual slideshow.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500255.78/warc/CC-MAIN-20230205130241-20230205160241-00461.warc.gz
CC-MAIN-2023-06
580
1
https://managers.mainwp.com/t/error-reporting-data-client-report-pro/1480
code
So I got the mainwp and starting to fiddle with it. I got the report pro however whenever trying to produce a report it says “error reporting data” I got the child hooked up and also the child report plugin installed on the child site. On mainwp I got the pro report installed and dashboard. Site is connected however I have some UX problem and function problem. First problem on the send report page I cannot see the website to send the report to…however when switching tabs to group I can see it in the group I have put the child site in so I checked that. Second problem is when clicking preview or produce odd it shows “error producing data” of that child site. During producing it…it gives a checkmark of that website before producing the report, so also no red flags there. The licences are validated and all green and wp is latest version along other plugins. Php version is 7.3 and no particular red flags I can see. Is this a common problem ?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662550298.31/warc/CC-MAIN-20220522220714-20220523010714-00358.warc.gz
CC-MAIN-2022-21
963
6
https://www.tr.freelancer.com/projects/anything-goes-winapi/api-expert-needed/
code
I am looking for someone who is an expert in accessing and communicating with API data. I have multiple projects and multiple different API requirements for each project. I need someone who knows what they are doing and can follow the API documentation to produce clean and concise code. Each API should take approximately 2 hours to develop, so bid based on developing 1 API. Preference shown to individuals who can build and provide a demo of an API on request via PMB. Max budget for this (and all APIs) is $25 each.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947421.74/warc/CC-MAIN-20180424221730-20180425001730-00266.warc.gz
CC-MAIN-2018-17
519
1
https://www.remotecentral.com/cgi-bin/forums/viewpost.cgi?1389550
code
|Post 2 made on Saturday January 4, 2020 at 13:27 Wrangler of Remotes URC did have 2 versions of their software, updateable and non-updateable. But, that software line hasn't had an update in a long time. I think the RX820 Editor might be newer than any of them. Searching that problem comes up with a few possibilities: 1) Com port number is incorrect (basically indicates that its getting no response from the remote) 2) Need to run as administrator 3) Bad / wrong cable (ie. using a Pronto cable instead of a URC / Take Control cable, or broken leads) 4) Another program is using the com port Since those don't seem to apply to you... best I can suggest is try another computer. If the problem persists, you could take the remotes apart (search for how) and see if there's any crud or obvious damage to the serial ports, which seems like the most likely answer right now. You could also try inserting the cables slowly, or not entirely all the way, or bending/pushing on the cable to see if you can get any response.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.28/warc/CC-MAIN-20240418093630-20240418123630-00719.warc.gz
CC-MAIN-2024-18
1,019
10
https://subscription.packtpub.com/book/programming/9781838551230/9/ch09lvl1sec09/creating-a-live-event-policy
code
Creating a live event policy Live event policies let you change how certain users can host live events. This includes the ability to restrict who can attend their live events and lets you provide options to the host, such as recording, scheduling, and transcription. In this recipe, we'll create a Teams live event policy to restrict a couple of users' abilities when hosting live events. You must be a global or Teams administrator to complete the steps in this recipe. How to do it… - Go to the Microsoft Teams admin center at https://admin.teams.microsoft.com/. - Select Meetings | Live events policies: - Click Add: - Configure each of the settings (scheduling, transcription, who can join, and who can record) as you see fit for the specific group of individuals...
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00276.warc.gz
CC-MAIN-2023-50
772
8
https://help.uscreen.tv/en/articles/9106263-rich-results-for-courses-in-google-search
code
You have a comprehensive understanding of your membership, which enables you to add specific parameters to your courses. These parameters include essential details such as start dates, duration, pricing, instructor information, and other relevant fields. As different Uscreen stores may require different fields, you must customize the code below according to your needs. Adding Google's Course and CourseInstance code You'll need access to code editing on our Uscreen Plus plan to continue. You can edit your _seo.liquid file which can be found under Website > 3 dot menu > Edit Code > Fill out all of the details so that it best fits your site. For more details please review Google's documentation.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817144.49/warc/CC-MAIN-20240417044411-20240417074411-00130.warc.gz
CC-MAIN-2024-18
701
7
http://aigamedev.com/open/coverage/takeaway-cheating/
code
The Paris Game AI Conference '09 that we organized four months ago brought together many experienced developers from industry and a majority of the middleware developers in Game AI — including our sponsors Spir.Ops, Havok, PathEngine, and Artificial Technology. It's thanks to the support from these great companies that we can work on raising the profile of Game AI throughout the community. Since our event in Paris was open to all, there were also a fair share of students and beginners in the field of game AI. The second day concluded with a Take Away session for the attendees. I've already written my thoughts in the official report, but here you'll find the thoughts of one of the students at the conference... (See video below.) Once again, I'd like to thank our Sponsors for their support, and among many other things, making such events possible. In this post you'll also find some links to interesting articles / pages for each of them. Thanks to Our Sponsors SpirOps is a middleware development team focused on AI. Their ultimate goal is to allow video games and simulations development teams to enter what we call “the Living Game era”. To design more realistic behaviors with a never reached complexity, the SpirOps developed an artificial intelligence design paradigm called “Drive Oriented” which allows designing AI with graphical tools and keeping a linear complexity during the brain creation process. → Planning and Designer Workflows with Axel Buendia (1h30 Presentation) PathEngine provides a sophisticated toolkit for agent movement, built around an advanced points-of-visibility pathfinding core. This gives you powerful paired path planning and collision against a sophisticated, continuous space, pathfinding movement model, with robust integrated dynamic obstacle functionality and exact representation of agent shape, for seamless movement over overlapping ground geometry. → Inside PathEngine's Collapsible Formations (Exclusive Video) Havok is the premier provider of interactive software and services for digital media creators in the games and movie industries. With world leading expertise in physics, animation and tools, Havok’s business is to turn customers’ creative aspirations into technical realities. Havok’s modular suite of tools gives power to the creator, making sure that clients can reach new standards of realism and interactivity, while mitigating the overall cost and risks associated with creating today’s leading video games and movies. → Havok Announces New AI Middleware Library (San Francisco visit) We bring bytes alive! This is the vision and motivation that drives Artificial Technology GmbH. Graphically, many computer games already emulate the real world quite faithfully. The behavior of the characters, on the other hand, is often less authentic. EKI One Middleware (emotional & artificial intelligence) is a new solution by Artificial Technology GmbH which allows game developers to bestow on their characters with emotional behavior. One Takeaway from Paris... This is a recording from the last session on the second day. Jesper (staring in the video) shared his thoughts with me the day before about how great such conferences are for beginners. I told him to say the same thing the next day with a microphone, so here's what he said: Here's the transcript for those of you with low-bandwidth connections: “I'm quite new to the artificial intelligence area, so I was quite surprised that you guys are all cheating... I thought the game was fair, but I don't mind you cheating because you let me win — so that's OK! That's a big takeaway for me. I'm looking at games at a really different level, and I can learn a lot from these kinds of presentations. I will take that home with me.” I thought that was one of the funniest take-aways, so I mentioned to Jesper during the dinner later on that I'd feature him on the blog — and he called my bluff... Was that a mistake? :-) Jesper was also among those who sent a card after my son Leon was born in late July, so a very special thanks to him for his kind words and for coming to Paris! Hopefully this will inspire more of you to make the trip next year.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745015.71/warc/CC-MAIN-20181119023120-20181119045120-00348.warc.gz
CC-MAIN-2018-47
4,198
17
http://www.head-fi.org/t/669883/looking-for-a-full-sized-bluetooth-headset-with-mic-and-noise-cancellation
code
Forgive me guys but I have no idea where to post this question and if people can even help me with this type of product, but figured id take a shot: Looking for a wireless headset that can be used with both my mobile phone and land-line, that covers both my ears (as my office is loud) and has noise cancellation properties too. Since it will be used predominantly for phone use, a good mic is critical. Ideally the ear coverings are not too large that i cant move the left one over to the side when someone walks into my office and I need to hear them... Edited by kwitel - 6/26/13 at 2:36pm
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00578-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
592
4
https://generalassemb.ly/instructors/liz-rush/3962
code
Liz Rush loves talking tech & teaching code — as a Developer Evangelist in Seattle, she gets to share that passion professionally. Liz has worked on development teams large and small to build web apps, experimental services, and complex data platforms. She is a graduate of Ada Developers Academy's inaugural cohort and remains active as an alumna mentor. Prior to transitioning into tech, her professional background was in technical translation & marketing and she studied at St. Louis University in Madrid. When she's not blogging or coding, she can be found volunteering or out at live music & techno shows. GA + Women Who Code Present: Dash Night Brush up on your skills, learn new ones, and help others in a supportive environment, with a GA instructor on hand for help. Leveraging Powerful Algorithms Learn how to leverage powerful algorithms for your applications. Women in Tech Panel: Ask Us Anything Featuring trailblazing women in tech, we'll hear the stories of highly successful women from different fields within the industry. Pride Summit | LGBTQIA+ Powering Tech Panel Join General Assembly and queer startup founders professionals from the LGBTQ+ tech community as we discuss their personal experiences as gay members of the tech community.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00375.warc.gz
CC-MAIN-2023-50
1,259
9
https://discussions.apple.com/thread/4732261?tstart=0
code
673 Views 2 Replies Latest reply: Jan 22, 2013 9:02 AM by JonnyFGM We have our macs bound to active directory and this is how our students log into them. I can manually add active directory groups as administrators, however I am trying to find a unix command I can send to do this through ARD I have found this on the apple website dseditgroup -o edit -n /Local/Default -u localadmin -p -a networkuser -t user admin we have an ad group called supportgroup, we want this to be admins on the macs. Trying it with ARD there doesn't seem to be a way to include the local admin account password in the command so it fails due to lack of authentication. However trying it on the actual mac itself doesn't even seem to work, when i do this dseditgroup -o edit -n /Local/Default -u technical -p -a mydomain\supportgroup -t user admin I thought this might because this will only do users and not groups, so i tried it with a single (AD) user account and this wouldn't work either, keep getting the error message Error locating specified node So 2 questions 1. Is there a way to include local admin password in the command so this can be done by ARD 2. Am I doing this command wrong? Hope someone can help
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989507.42/warc/CC-MAIN-20150728002309-00256-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
1,195
14
https://support.huawei.com/enterprise/en/knowledge/KB1000082686
code
1. Log in to the active Virtualization Resource Management (VRM) node as user gandalf and run the su – root command to switch to user root. Check the Tomcat logs of the VRM node to identify the IP addresses that repeatedly access the VRM Tomcat component to attempt to log in to the portal. The following shows the location of the VRM Tomcat log. According to the following example log content, the IP address 192.168.191.59 attempts to access the VRM Tomcat component. POST /service/session indicates that a tool or component attempts to log in to the portal. 400 79 indicates that the login failed. 192.168.191.59 indicates the IP address of the tool or component that repeatedly attempts to access the VRM Tomcat component. Log in to the devices using the identified IP addresses and confirm that the devices attempt to log in to the FusionCompute portal. Configure a route to prevent the IP address from repeatedly attempting to access the VRM Tomcat component. Before configuring the route, ensure that this operation has no adverse impact on VMs and customer services. The following figure shows an example command that can be used to prevent the identified IP address from accessing the VRM Tomcat component. The command discards all IP response sent from the identified IP addresses. After the admin account is unlocked, you can run a command to allow the identified IP addresses to access the VRM Tomcat component. The command in the following figure is an example. The following is an example command used to unlock the admin account on the VRM node. (Perform this operation if you want to create another administrator account.) Log in to the FusionCompute portal and create an administrator user on the Rights Management page so that you can log in to the portal even when the admin account is locked out. This fault occurs usually after a user has changed the password of the admin account. If some tools or components still attempt to use the old password of the admin account to log in to the FusionCompute portal after the password is changed, the account will be locked out. Therefore, the first thing to do is to identify the tools or components that attempt to log in to the FusionCompute portal using the old password and prevent them from attempting to log in to the portal. Then, the account will be automatically unlocked after 5 minutes. You can also create another administrator account so that you can log in to the FusionCompute portal even when the admin account is locked out.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203991.44/warc/CC-MAIN-20190325133117-20190325155117-00383.warc.gz
CC-MAIN-2019-13
2,506
20
http://mipgsun.mipg.upenn.edu/~Vnews/libref/chapter1.html
code
This document describes the low-level functions that provide an interface between 3DVIEWNIX and each of the following : the data handled by 3DVIEWNIX, the graphics display device, and the processes that implement image visualization, manipulation, and analysis tasks. We call these three interfaces respectively data interface, graphics interface, and process interface. For a complete description of the 3DVIEWNIX environment please see the 3DVIEWNIX 1.0 USER MANUAL. The treatment here will be at a level sufficient to understand the interface functions. Image Window is an area dedicated for the display of pictures and other related information. The top portion of this window is the menu area which is used for displaying the 3DVIEWNIX menu system. Commands are selected from this system to execute various three-dimensional imaging operations provided by 3DVIEWNIX. Dialog Window occupies the bottom left part of the screen and is used for displaying prompts, results, and error messages at the top of the window and scales that are used for selecting values of parameters used in various operations. In addition, it contains a panel area which consists of buttons and switches that are used for selecting options, subfunctionalities and subcommands while a command selected from the menu is being executed. Mouse Window is an area on the bottom right part of the screen. It is used for displaying at all times the functions of the three mouse buttons near the top of the window. This display of the functions together with the prompts and messages appearing in the dialog window should be adequate for the users to carry our three-dimensional imaging operations, once they gain some familiarity with the general operation of 3DVIEWNIX. Therefore, we suggest that the users always give proper attention to what is displayed in these areas. The bottom part of the mouse window contains buttons and switches for providing certain options and subcommands that are needed for all commands selected from the menu system. We call tham static options. As an example, one of these options allows the dialog window to be turned off temporariry so that the image window can be extended to the bottom of the screen. This window is occasionally also referred to as button window. We have tried to keep the convention of use of the mouse buttons simple and consistent. A mouse button function is initiated always with a click. Other actions such as multiple clicks or the simultaneous use of multiple buttons or holding one or more buttons pressed is not required. The "selection" function is always associated with the left and/or the middle button and "terminator" with the right button. When items are to be selected from an ordered list, the "next" function (to select the next item) is associated with the left button and the "previous" function is associated with the middle button. The use of the mouse also follows similar notions and a "freehand" principle. The mouse movement within the image window is often used to change a processing parameter in a continuous and interactive function, for example to change the height and width of a rectangle displayed in the image window. Moving the mouse to the left or down reduces the associated value and to the right and up increases the value. In the previous example, as the mouse is moved to the left (right), the rectangle becomes narrower (wider), and as it is moved down (up), the rectangle becomes shorter (longer). Often, an appropriately shaped cursor is displayed to indicate the mouse action. The "freehand" principle means that it is not needed to keep a button pressed while moving the mouse in order to execute the mouse movement function. Other examples of the functions associated with mouse movement are: display of the slices of a three-dimensional or a four-dimensional scene, cine display of precreated renditions of a structure or of a structure system, and three-dimensional rotation of a structure or of a structure system for rendering. A button is an entity which has a name associated with it. It initiates an action when "selected" or "pressed", meaning when the cursor is placed on it and the left or middle mouse button is clicked. As an example, a button named COLOR is used often in 3DVIEWNIX while operations to render structures are being executed. When this button is selected, three multi-resolution scales are set up in the dialog window, one for each red, green, and blue components. These scales are used to select the component colors that define the color of the structure that is being rendered. A switch has a name as well as a sequence of states associated with it. The number of states is at least two. The display of a switch shows both its name and current state. When the switch is selected (meaning when the cursor is placed on it and the left or middle mouse button is pressed), it changes its state. If the left mouse button is used for selection, the state advances to the next state in the sequence. Selection via the middle mouse button causes the state to change to the previous state in sequence. For the last state, the first state is considered to be the next state, and for the first, the last is considered to be the previous state. Again using the rendering example, suppose there are n structures in a structure system that is being rendered. 3DVIEWNIX uses two switches called OBJECT and STATUS to select the desired combination of structures for the display. OBJECT has n states called 1,2,...,n. STATUS has two states called ON and OFF. By setting the state of OBJECT to the desired structure number and by setting its STATUS to ON, any combination of structures can be selected for rendering. Scales in 3DVIEWNIX have a unique multiresolution design. The structure of the scale is illustrated in Fig. 4.2 (USER Manual). It consists of a low-resolution base on which a variable-resolution segment slides. There is a sliding index whose center indicates the value corresponding to the current position of the index on the scale. This value is constantly displayed at the upper-right corner of the scale. The length of the base represents a fixed range of values (of the parameter under question) from Min to Max. When the scale is initially displayed the resolution of the sliding segment is set equal to that of the base, and hence, this segment is not displayed. At this point, we therefore see only the base and the sliding index. To set a value on the scale, the cursor should be first moved onto the scale and subsequently the left mouse button should be pressed. The index now gets latched to the mouse; as the mouse is moved horizontally, the index moves horizontally on the scale. Throughout the process of value selection, the mouse buttons have the following options associated with them : Fig. to follow Selection of UP (left button) causes the resolution of the sliding segment to increase and that of the DOWN (middle button) causes the resolution to decrease. The minimum value of this resolution is always the resolution of the base. The highest resolution value and the number of distinct resolutions available depend on context. Whenever the resolution of the sliding segement exceeds that of the base, the segment appears in the display. It disappears when the two resolutions become equal. As the index is moved within the segment, the segment remains stationary until the index hits an end of the segment. When the latter happens, the segment also moves with the index. In the former case the value changes less rapidly than in the latter case. When the desired value is reached, DONE (right button) should be selected to leave the scale. The multi-resolution scale of 3DVIEWNIX is an effective, intuitively simple solution to the conflicting requirements of compactness of space and large dynamic range of values to be selected. A tablet consists of a rectangular area on which text or numeric values can be typed using the keyboard. Often the tablet is given a name to indicate its purpose. This becomes necessary when multiple tablets are to be used simultaneously. Sometimes default text items or numbers are displayed in the tablet which the user can accept or choose to change. To change or type text or values displayed in the tablet, position the cursor in the rectangle and click the left mouse button. A vertical line indicating the keyboard prompt then appears. Text/value can be now changed or typed in. When done, press the Return key of the keyboard to disable the tablet.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084894125.99/warc/CC-MAIN-20180124105939-20180124125939-00358.warc.gz
CC-MAIN-2018-05
8,516
13
http://huselha.com/page/wow-gold-farming-guide-wotlk/
code
He flaps a bit, but I wouldn't call him "flappy," per se. The most insanely ADDICTING and fun endless flying game! You wont be able to put this down! Help the cute little Pixel Parrot keep flying and avoid all the obstacles!Just tap the screen to keep flying but be careful to avoid the obstacles or you wont last long!How far can you go? -)What's new in this version:minor bug fixes These are called homophones. - Amazing and simple to use game for everyone. Sleepy Birds Spell 10 correctly to increase the level (number of letters required). Be careful don't hit the obstacles. Be careful don't hit the obstacles. -SEE HOW GOOD YOU ARE NOW KIDS!!! :) ****** Free Off-road Racing Game! ************* Insane fast-paced action *******Load your guns and aim your weapons. Many Levels are available. Play against a friend on the same device. But how many of you often makes cookies? Well, for those who say "not enough time" or "too lazy to prepare all tools and ingredients", this app is certainly suitable for you!In Cookie Shop-Clicker Clack, you can experience a real cookie-making situation to DIY your own cookies, such as preparing the flour, molding, baking the cookies and adding toppings. Showing out your scores, and comparing with your friends!What's new in this version:Fix some bugs.Jelly Bubble is a puzzle game with nice graphics. Caution : The game is addictive. Play vs other chicks and rabbbits around the world. Start off creating 3 letter words.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820487.5/warc/CC-MAIN-20171016233304-20171017013304-00572.warc.gz
CC-MAIN-2017-43
1,463
8
http://blogs.msdn.com/b/shawnhar/archive/2010/02/08/comments-on-2d-vs-3d.aspx
code
Shawn Hargreaves Blog Some great comments on my previous post. A popular theory is that our affinity for 2D could be an artifact of the displays we are using. JeBus says: "If we had holographic technology, where the game objects actually appeared around the player in a 3-dimensional space, we'd be much better at it in-game." But people were creating artwork and visualizing mathematics in 2D long before the invention of the computer screen! Archeologists believe cave paintings and sculptures appeared at roughly the same time. Since then, our species has devoted far more effort to creating 2D images than to carving in 3D. I find it interesting that early paintings were not 2D projections of a 3D world, but a true 2D geometry where the third axis is simply non-existent. The idea of projecting 3D space with a vanishing point was not discovered until much later. Beringela suggests what I'm going to call the Ender's Game theory: "We have evolved on what is essentially a 2D plane. When our ancestors hunted, they really only needed to think in 2D - how far away is that deer and what direction is it going. Its height above the ground didn't really matter." This makes a lot of sense to me. Sure, reality is 3D, but for a species living on the surface of a planet with gravity, one axis is fundamentally different from the other two. If this was the entire story, I would expect us to be happy to discard the vertical axis when playing a top-down game, but less comfortable with 2D sidescrollers where we keep the not-important-for-hunting-deer vertical axis while collapsing our usual north/south/east/west coordinate system into just a single left/right dimension. Yet most people seem equally at home with top-down or side-on 2D views. DMG suggests our brains may simplify geometric problems by choosing between a variety of different projections: "We've evolved to naturally project 3D problems into 2D models. Need to find your way home to the cave? Refer to your mental 2D map. Need to hit a mammoth with a spear? Consider the vertical plane joining you and the mammoth." That certainly matches my experience of using simplified coordinate systems for game AI. I can certainly see the logic behind the deer hunting example. To put it another way, if we were a species that existed solely in (outer) space, I believe our perception of the world would be in 3D. I think 2D vs 3D has to do with the fact that we are actualy very poor are precieving the 3D axis. Our eyes are set too close together to figure out distance or even movement that is more than 50 yards or so away. For example it is very hard to tell if something that is 100 yards away is moving directly tward you or away from you, but it is easy to tell of something far away is moving left/right/up/down. We usally use other clues to figure out if far away things are moving tward or away from us. such as if the animal is facing us it must be moving twards us. > Our eyes are set too close together to figure out distance or even movement that is more than 50 yards or so away. But does our lack of visual accuracy wrt. the depth axis necessarily mean we must also have poor mental models in that area? It seems to me this might even be the opposite! If we can see something accurately, there is less need to model this inside our minds. The great value of abstract mental models is to help us fill in details that our physical sensors were unable to percieve... Are we perhaps missing one of the more obvious ideas: the canvas is 2d. One of the big breakthroughs in renaissance art was how to implement perspective - people had been struggling for a long time before then to create a sense of depth. It's not necessarily that we can't think in 3d but that we have a strong refusal to accept what's on the monitor as natural or intuitive. As for visualisations, they're often done on 2d canvases as well, your hand motions and ability to rotate, project, tangent is fairly much one to one. Give people a 3d canvas (holographic) and the ability to really interact and I think there would similar intuitions. I once learned (not sure if academia has changed its mind in the ensuing years tho!) that art in a culture always starts in 3d and later also uses 2d, unless the idea is introduced. 2D is a bit of a leap in that sense. I only use one eye and live on very flat land, so I guess I don't appreciate the diff with 3D as much : ), but it seems to me that image that is finally projected into our brain is 2D. I read once (How the Mind Works) that there was an experiment were able to 'develop' a monkey's brain that was looking at a pattern, and found the pattern on the cells. I believe it was injected with a radioactive substance, and blood flow in the brain was based on stimulus. The visual cells were approximately in a 2D grid. Interesting to think about this wrt games, thanks for the posts! Interesting stuff! As someone who spans the areas of both academic psychology and game programming I thought I would venture my own understanding of why do 2D worlds make such intuitive sense, in case it might be helpful. It's certianly true that physically the outside world is projected onto a 2D surface (curved, but nevertheless 2D) at the back of the eye. To a degree this information initially maintained in 2D form in the early parts of the visual cortex. But, of course, the brain then goes on to do a lot more than this; inferring depth, motion, shape, and so on. However, the most important point I think that needs mentioning is that we do not percieve the external world directly - rather, we percieve the world as 'things' in various relations to each other. By that I mean that the brain sees more than just abstract 3D or 2D shapes and objects - the brain sees tables, chairs, cars, cats, dogs. This is illustrated well by the difficulty that most of us have in doing 2D drawings of a scene that we are looking at. We tend to draw what we percieve to be there and not what is actually there. It takes a certain natural talent and/or training to draw things 'as they are out there' and not 'as they are in our heads'. And yet, even a child of 4 can draw recognizable 2D representations of things in the world around them. The key word there is 'representations'. We are remarkably good at recognizing abstracted representations of things. And here I believe is where we can find the answer to Shawn's original question: "Why do 2D worlds make sense?". In short, the brain has absolutely no problems with the 2D worlds because it has absolutely no problems with abstracted representations(1). In fact, the success of early computer games was heavily reliant on this aspect of brain processing. (1) interestingly, there are examples of patients with damage to some brain areas, who are actually unable to see 'things' and can only see abstracted shape and colour. Good point Duncan, our brains really seem to love abstractions. I'd wish things were tied together so clearly in the cognitive psychology course I attended, cheers :) "But people were creating artwork and visualizing mathematics in 2D long before the invention of the computer screen! Archeologists believe cave paintings and sculptures appeared at roughly the same time. Since then, our species has devoted far more effort to creating 2D images than to carving in 3D." Are you just flinging stuff out there or do you have references to cite? The Greeks were sculpting realistic sculptures a thousand years before we discovered perspective in 2D during the Renaissance. Rim: stick with it - it'll come together for you in the end I'm sure - psychology is a fascinating subject :) Ted: 2D perspective projections of 3D scenes were a relatively late discovery, but pure 2D painting has been around pretty much forever: I think this simply boils down to how the human brain works. Duncan makes a good point in that we don't actually see in three dimensions, we see a 2D representation. If you think about it, we can even judge depth that well. If someone lined up a small object and a far away object so they looked identical, you eyes, in themselves, could not tell the difference. What does allow you to is you brain filling in the blanks and making assumptions based on your memory / instincts / other senses. At the other end of the scale, you brain is also designed to filter out what it feels is irrelevant from your higher levels of thought. In Shawn's example of the hunter and the deer, the reality is that even within the two planes, the hunter is only really focusing on the ~180 degree arc facing the deer. I believe that this is largely why many people (including myself) struggle with visualizing / modelling in 3D - our brains are simply not optimized for visualizing the 'big picture' and as a result it fights you to try to fit it into a 2D representation or some other abstraction. Verminaard: I didn't actually say we don't see in three dimensions. The main point was that we see more than just 'dimensions'; we see recognizable 'things'. It could be in 2D or 3D, but so long as a visual image is recognizable as an X we have no problems. 2D vs 3D is interesting, but it's not the brain's main concern - its main concern is survival, and recognizing distinct 'things' based on a few key cues is what it has evolved to excel at (because of this we are also great at seeing patterns in 'noise' - Jesus on a piece of toast, Samuri warriors in the patterns of turtle shells, patterns in clouds, and so on). The difficulty of visualization and spacial awareness is a slightly different, but related issue. Perhaps visualization and spacial awareness aren't usually big difficulties in 2D games because 2D tends to lay it all out right there infront of us. Whereas in 3D games you need to form a more detailed mental map of your environment, which is a more cognitively demanding task. In many 3D games you are looking at a small piece of the environment that is local to your character, but all of the local environment is important so you need to mentally map it so you can act in effectively in the game world. In a 2D game you typically get a 360 degree view of your local environment, which means there is less mental mapping work to be done - so less cognitive load. Compare, for example, 3D games that are more top-down/isometric, with a first person or close-in 3rd person camera.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701159031.19/warc/CC-MAIN-20160205193919-00034-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
10,354
38
https://www.br.freelancer.com/projects/php-html.1/web-crawler/
code
I'm looking for experienced programmer. I need web crawler / web script for browsing websites and gathering data from them. Script have to: 1. Find websites based search criteria: country / domain and company business consulting (ex. health care, logistics. file with all business consulting names will be provided by me) 2. Gather from them: Company name, City, Street, Street number, Phone Number, Email address, Zip code, Website address If possiable: fax, contact person , contact person email 3. Save reults in text file (ex. csv) Preferable linux script, in any available programming / scripting language including description how to run script.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591150.71/warc/CC-MAIN-20180719164439-20180719184439-00525.warc.gz
CC-MAIN-2018-30
651
8
https://coursesity.com/free-tutorials-learn/ethical-hacking
code
The Ultimate Ethical Hacking Boot Camp from the world famous Ethical Hacker, Bryan Seely is here. Understand the concept behind ethical hacking, how to prevent data breaches, how to conduct Social Engineering Penetration Tests, how to protect against social engineering attacks, and much more. In this course you will learn what Security Incident Response is and how it relates to GDPR Data Privacy, and if you are used to my style, you will do it from 3 perspective: theory, processes and technology. Welcome to the basics of web application hacking where you will learn how to look for security flaws in web applications and how to execute them. Learn how to do ethical hacking, penetration testing, web testing, and wifi hacking using kali linux! Web application hacking and penetration testing v3.1 WAPTP v3.1 is highly practical and hands-on training for Web application penetration testing that covers the OWASP top 10 vulnerabilities to attack and secure. Combining the most advanced techniques used by offensive hackers to exploit and secure. This course covers the six phases of incident handling and responding as follows: Introduction: Includes the definition of an event, incident, as well as the difference between them Preparation Phase: Shows the elements of preparation and the team building Ethical Hacking MasterClass - A to Z of Hacking Welcome to Ethical Hacking Course ! In this course, you will start as a beginner and leave the course with an expert . The course purely focused on Practicals. Course is divided in 2 parts: - 1. Network Pentesting 2. Web Pentesting Werde Penetration Tester: Lerne Kali Linux, Wireshark, Nmap, Metasploit, Password-Cracking, Sniffing, Keylogger u.v.m. Want to learn ethical hacking ? This is the list of free ethical hacking courses available online. From this list, you can take any of the ethical hacking course to learn ethical hacking in details and become master of ethical hacking. Learn ethical hacking from the free ethical hacking courses and free ethical hacking tutorials online. Select free courses for ethical hacking based on your skill level either beginner or expert. These are the free ethical hacking tutorials and courses to learn ethical hacking step by step. These free ethical hacking courses are collected from MOOCs and online education providers such as Udemy, Coursera, Edx, Skillshare, Udacity, Bitdegree, Eduonix, QuickStart, YouTube and more. Find the free ethical hacking tutorials courses and get free training and practical knowledge of ethical hacking. Get started with ethical hacking for free and learn fast from the scratch as a beginner. Find free ethical hacking tutorials for beginners that may include projects, practice exercises, quizzes and tests, video lectures, examples, certificate and advanced your ethical hacking level. Some courses provide free certificate on course completion. ethical hacking courses are categorized in the free, discount offers, free trials based on their availability on their original platforms like Udemy, Coursera, Edx, Udacity, skillshare, Eduonix, QuickStart, YouTube and others Moocs providers. The ethical hacking courses list are updated at regular interval to maintain latest status. After collecting courses and tutorials from different Moocs and education providers, we filter them based on its pricing, subject type, certification and categorize them in the relevant subject or programming language or framework so you do not have to waste time in finding the right course and start learning instead. Do you think any ethical hacking tutorial or ethical hacking course need to include on this list? Please submit new ethical hacking tutorial and share your ethical hacking course with other community members now.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601615.66/warc/CC-MAIN-20200121044233-20200121073233-00212.warc.gz
CC-MAIN-2020-05
3,752
15
https://www.timeform.com/greyhound-racing/results/newcastle/1427/20190913/720852
code
|Official Time (Sectional)||Trainer||BSP| |1st||-||GAZILLY BILLY||3d||6533||Scr LedRunIn||Scr LedRunIn||6/4f||100| |2nd||2||LUMINA PYTHON||5d||3444||R10 ClearRun||R10 ClearRun||8/1||52| |3rd||sh||LIVE IT FAST||5d||5655||R5 RanOn||R5 RanOn||6/1||71| |4th||sh||ALLONBY VIEW||3b||2111||R11 Led2ToRunIn||R11 Led2ToRunIn||7/2||47| |29.12||T G Edgar||5.5| |5th||sh||ON YOUR BIKE||4b||4322||R7 EveryChance||R7 EveryChance||5/2||62| |6th||5||WATERMILL TOOTS||4b||1266||R15 LedTo2||R15 LedTo2||10/1||7| 14:27 Newcastle Result on Friday 13 September 2019 The 480m 14:27 HP at Newcastle was won by Gazilly Billy. The total prize money for this race was £312, with the winner taking 1st £137, Others £35 . The winning dog won by 2. Gazilly Billy had an industry starting price (ISP) of 6/4. The Forecast paid £16.06 and the Tricast paid £56.45.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704832583.88/warc/CC-MAIN-20210127183317-20210127213317-00188.warc.gz
CC-MAIN-2021-04
837
11
http://www.ruby-forum.com/topic/179581
code
I know several of you have asked about this: http://blog.headius.com/2009/02/domo-arigato-mr-ruboto.html - Charlie on 2009-02-24 13:01 on 2009-02-24 17:17 Awesome! I've been debating whether to get an Android. I still may not, but you've put the final nail in all the other smartphones' coffins. Then again, so far I've had great success with an HP Pavilion running Windows Vista 64 bit, Netbeans 6.5 fully loaded edition, PostgreSQL and Skype over a headset. :) -- M. Edward (Ed) Borasky http://www.linkedin.com/in/edborasky I've never met a happy clam. In fact, most of them were pretty steamed.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215523.56/warc/CC-MAIN-20180820023141-20180820043141-00625.warc.gz
CC-MAIN-2018-34
597
4
https://www.npmjs.com/search?q=keywords%3Ashield&page=1&perPage=20
code
Utilities for building Shield-Study Mozilla Firefox add-ons. Guard of object setter by proxy with ES6 Powerful shield that protects your poplar or express app from attacking The badge making code extracted from the original badges/shields project A simple jshint reporter that produces badges using shield.io nodejs SHIELD client shield is a Zerious module A simple mocha reporter that produces a badge inspired by shields.io Serves build status badges from Jenkins API Provides a means to generate shields. Official ShieldSquare Node.js express Connector. To install the connector on your system type npm i shieldsquare-express ## Version: 5.1.1 SHIELD Rate Limiter DISTIL router middleware for Web Apps Official ShieldSquare Node.js Fastify and express connector. Readme badge templates. middleware nodejs module that intercepts requests, and sets the 'host' HTTP header with the referer information, to preserve the SEO country information GraphQL Server permissions as another layer of abstraction! A babel plugin to shield code against undefined properties powered by npms.io 🚀
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998250.13/warc/CC-MAIN-20190616142725-20190616164725-00410.warc.gz
CC-MAIN-2019-26
1,085
18
http://freecode.com/tags/documentation?page=19&sort=updated_at&with=&without=
code
dbtroff uses XSLT, Heirloom troff, and Ghostscript to convert DocBook documents to PDF or PostScript. It allows you to flexibly customize the layout of the generated output by using troff instructions, and provides automatic page element positioning to avoid typographical artifacts like “widows”. Full-width and inline pictures can be included, and are also automatically positioned. Currently, only a rather restricted subset of DocBook 4.3 is supported. Leandoc is a small documentation generator. Unlike other generators like Doxygen or epydoc, it is designed with simplicity in mind. While the others generate dozens of files, a complex directory hierarchy, and an untold number of support files, leandoc parses the files through the command line and prints one single file to stdout. DocBook is an XML vocabulary which enables you to create document content in a presentation-neutral form that captures the logical structure of the content. Using the DocBook Project XSL stylesheets, you can publish DocBook content as HTML pages and PDF files and other formats, including man pages, HTML Help, and JavaHelp. i18nHTML is a collection of scripts that can be used to write Web pages that visitors can translate into their respective native languages. It uses a database to match sentences from the Web page against translations and defines a set of PHP functions that generate either the translated HTML sentences or the original (typically English) text with decorations that allow users to provide translations. It requires that internationalized pages be written using the functions but does not constrain the page design in any way. Internationalized pages can be updated without losing existing translations for sentences that were not changed. StoryTestIQ (a.k.a. "STIQ") is a tool for creating "Executable Requirements", which have also been known as acceptance tests or functional tests. STIQ was developed based on two other open source acceptance testing tools, Selenium and FitNesse. This combination allowed StoryTestIQ to capture the Web browser based testing facilities and elegant command language of Selenium along with the wiki based editing and pluggable Fit fixture loading of FitNesse. MaintainJ is an Eclipse plugin that provides a Java reverse engineering tool that generates UML class and sequence diagrams at runtime for a single use case. It lets you know what exactly happens when you run a use case. The sequence diagrams generated are simple to read and explore. The calls can be folded and expanded as necessary to explore what is of interest. The loop calls and recursive calls are removed for a simple and readable sequence diagram. MaintainJ can be used on any Java code or jar files. CmDO (pronounced "commando") is a tool that makes it easier to build other tools. It selectively exposes Python modules and functions as a complete command line interface. Specifically, CmDO finds modules in standard locations, interprets command line arguments, invokes functions, imports modules on demand, and supplies help. It also manages documentation resources containing structured text. DrProject is a Web-based software project management portal that integrates a revision history viewer with issue tracking, mailing list management, a wiki, and other features. It is not a learning management system; instead, it is designed to introduce students to the tools that professional development teams use to coordinate their work. Unlike its industrial-strength cousins, SourceForge and CollabNet, DrProject is easy to install and administer. It has a very simple interface: students can learn all of its features in less than an hour. It provides a scripting interface that can be used to automate bulk or repetitive tasks.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706484194/warc/CC-MAIN-20130516121444-00093-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
3,755
8
https://slashdot.org/~nxcho
code
According to the first google result on 'tobacco tax russia' the duty is about $25 per 1000 cigarettes. This is probably inte same order of magnitude as the profit you can make on smuggling cigarettes if you include costs of procuring, distribution and sales. Say a decent autonomous drone with some carrying capacity costs >$1000. That means you have to sell more than 40000 smuggled cigarettes for each drone you have confiscated by the authorities. I would say that you have to have a fairly decent success rate to 'win' when you are smuggling tobacco into Russia. My guess is that books not on specific tools or versions retain their value much longer. Titles like Design Patterns, Network programming, Computer Graphics are more likely to be useful after a couple of years. Also check if the editions are used in any university courses. If you ask a humble question or make a polite request to someone who represents a system (political, corporate, cultural etc.) and get an aggressive response, you have acted politically incorrect. It's what you say to whom, not how you say it. Linus Torvalds might be a rebel in the world of tech giants but in the community of linux kernel developers, he is a person of power and should take it seriously when someone points out a problem. I'm pretty sure it's a simple task to use imagemagick and bash/python/language of choice to make a map of binary differences comparing each image with the results file and with each of the other. Crude attempts to copy the result or another students image should be fairly easy to spot. Also, watermarks or lowering the resolution on the final results file might also help. I use facebook,g+ and twitter, mostly for maintaining a presence rather than posting personal stuf. But I've discovered that google+ is quite good for sharing images with family and closer friends. The fact that you can can share things with people that doesn't have a g+ account just by their e-mail address means that I can show them whats happening in my life from a single place.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00437-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
2,040
9
https://the-protectors.forumotion.com/t714-force-started-with-windowed-mode
code
I'm using TPC v0.8.9. I installed the mod yesterday When I click the game ıcon game started in Windowed mode. I know that windowed mode didnt work but I can't change any resolution. I search any soluiton. HKEY_CURRENT_USER solotion didnt work cause The Protector files doesnt exist. I ınstalled alpha and beta files. They didnt help. So, How can I solve this?
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301264.36/warc/CC-MAIN-20220119064554-20220119094554-00038.warc.gz
CC-MAIN-2022-05
361
1
https://au.mathworks.com/matlabcentral/answers/1761770-find-the-first-element-in-an-array
code
Find the first element in an array 7 views (last 30 days) Show older comments Commented: Voss on 16 Jul 2022 Hey guys, thanks in advance. I want to find the first element and the last element, besides Nan in the matrix attached how can I do that? This just gives me Nan Voss on 16 Jul 2022 That line doesn't belong in a loop. Move it out of the loop like I had it, and it seems to do what you want. Here it is again, using the variable names you have in the latest version of your code: c = 3e8; distance_matrix(distance_matrix==0) = NaN; [R0,ixR0] = min(distance_matrix) notNaN = ~isnan(distance_matrix); first_idx = find(notNaN, 1, 'first') last_idx = find(notNaN, 1, 'last') % colOfMin is the same as ixR0 (minimum value appears only once) % so you can use either one below in expression for tshift [rowOfMin, colOfMin] = find(distance_matrix == R0) % Find row and col of min. % initialize tshift to NaNs the size of distance_matrix: tshift = NaN(rows,columns); % overwrite the elements of tshift where distance_matrix is non-NaN: tshift(first_idx:last_idx) = ((first_idx:last_idx)-ixR0).^2./(R0.*c); % first_idx == ixR0, so tshift(first_idx) == 0, as expected: Image Analyst on 16 Jul 2022 A little simpler: % Load sample data. % Find non-nan indexes. goodIndexes = find(~isnan(distance_matrix)); % Get the value of distance_matrix at the first non-nan index: v1 = distance_matrix(goodIndexes(1)) % Get the value of distance_matrix at the last non-nan index: v2 = distance_matrix(goodIndexes(end)) Find more on Data Type Identification in Help Center and File Exchange Community Treasure Hunt Find the treasures in MATLAB Central and discover how the community can help you!Start Hunting!
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00078.warc.gz
CC-MAIN-2023-14
1,692
36
http://html-tmpl-java.sourceforge.net/
code
HTML.Template version 0.1.2 - 9 October 2002 HTML.Template aims to do to java what HTML::Template.pm did to perl. HTML.Template makes it possible to use HTML Templates inside your java code. You no longer need to recompile your servlets everytime you change the HTML. Your templates are normal HTML files with a few extra tags where variable content goes. The Template module replaces these tags with values specified through your program, and displays the combined document. See the Howto for information and sample code to use templates in your java programs. This package is intended to make it easy for a HTML designer to develop templates to be used in conjunction with your java code. Many a time the person developing the application, and the person designing the look aren't the same. The designer knows nothing about programming, and although as developers we'd like to think that we are good designers, the fact is that many of us aren't. HTML.Template, like its perl counterpart, extends HTML with a few HTML like tags - <tmpl_var>, <tmpl_loop>, <tmpl_include>, <tmpl_if>, <tmpl_else> and <tmpl_unless>. The file written with HTML and these new tags is called a template. Using the HTML.Template class, you fill in the values for the variables, loops and branches declared in the template. What differentiates HTML.Template from other templating solutions is that is enforces a strict distinction between logic and layout. A template cannot contain programming logic (except from the branches and loops). A second point worth noting, is that using HTML.Template for java and HTML::Template for perl means that your templates are interoperable across two languages. 'The first cross-language templating standard', as Jesse Erlbaum would put it :). Thanks go to Sam Tregar, the developer of the HTML::Template perl module, for writing that most excellent module that I use for everything, and for sticking firm to the principle of not allowing programming logic into templates. I'd also like to thank Sam for allowing me to use the code examples from the perl module in the documentation for this module. Those familiar with the docs of HTML::Template will notice a lot in common in the overall documentation. If you're planning of writing perl code that may require templates, have a look at Sam's Module. The link is on the left (at the top if your browser doesn't fully support stylesheets). Thanks also to the chaps on the htmltmpl mailing list for keeping the discussions lively. This package is Copyright (c) 2002 Philip S Tellis (philip.tellis At gmail.com). Distribution is under the terms Artistic or GNU General Public Licence. This module is free software; you can redistribute it and/or modify it under the terms of either: - the GNU General Public License as published by the Free Software Foundation; either version 1, or (at your option) any later version, or - the "Artistic License" which comes with this module. You should have received a copy of the Artistic License with this module, in the file Artistic.txt. If not, I'll be glad to provide one. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See either the GNU General Public License or the Artistic License for more details.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812855.47/warc/CC-MAIN-20180219231024-20180220011024-00153.warc.gz
CC-MAIN-2018-09
3,537
19
https://www.makemydownloads.com/quick-answer-how-to-download-vim-linux.html
code
- 1 How do I open Vim in terminal? - 2 How do I get into Vim? - 3 Can I use vim in CMD? - 4 What is Vim Linux? - 5 Is Vim an IDE? - 6 How do I type in Vim? - 7 How do I run a Python file in Vim? - 8 Why is vim better than Nano? - 9 Is Vim good for C++? - 10 Does VS Code use Vim? - 11 Can you use Vim for Java? - 12 What is vim in Mac terminal? - 13 How do I open a vim file in Ubuntu? - 14 How do I run a Vimtutor in Linux? - 15 What is vim in command line? - Update the Ubuntu package database $ sudo apt update. - Install Vim using apt $ sudo apt install vim. - Check Vim version $ vim –version. Display Vim version. Now you can open, edit and save a file using VIM. Frequent question, how do I download vim? - To download Vim visit vim.org. - Click on Download option from left pane. - Click on PC – MS-DOS and MS-Windows option. - Download .exe installer from this page. - Double click on installer and follow on screen instructions to complete installation. Beside above, how do I download vim in terminal? - Open terminal application. - Update package database by typing the sudo apt update command. - Search for vim packages run: sudo apt search vim. - Install vim on Ubuntu Linux, type: sudo apt install vim. - Verify vim installation by typing the vim –version command. Similarly, is vim available for Linux? Vim comes standard with most Linux distributions, but if you want the latest available version, you need to use git. In this tutorial, learn how to install the latest Vim editor on Ubuntu 18.04 operating system. Furthermore, is Vim better than Vscode? “Comes by default in most unix systems (remote editing)”, “Fast” and “Highly configurable” are the key factors why developers consider Vim; whereas “Powerful multilanguage IDE”, “Fast” and “Front-end develop out of the box” are the primary reasons why Visual Studio Code is favored. How do I open Vim in terminal? In order to launch Vim, open a terminal, and type the command vim . You can also open a file by specifying a name: vim foo. txt . How do I get into Vim? If you’re on a Linux system right now, open up a terminal and type vim filename. Enter insert mode and type a bit (or copy some of the text from this article into Vim) and then hit Escape to start practicing movement around the file. Can I use vim in CMD? After its installation, you can use it by opening the command prompt (cmd) then typing “vim”. This will open the vim application. There are two modes available in this editor, one is the insert mode where you can insert anything you like then there is a command mode which is used to perform different functions. What is Vim Linux? On Unix-like operating systems, vim, which stands for “Vi Improved”, is a text editor. It can be used for editing any kind of text and is especially suited for editing computer programs. Is Vim an IDE? Vim: The high availability IDE. The consensus among many Vim/Emacs users creates a picture many tech users from a certain generation would be familiar with. How do I type in Vim? - Log into your server via SSH. - Navigate to the directory location you wish to create the file in or edit an existing file. - Type in vim followed by the name of the file. - Press the letter i on your keyboard to enter INSERT mode in vim. - Start typing into the file. How do I run a Python file in Vim? Why is vim better than Nano? Productivity. Vim behaves like a model, and while you are using Vim, you will be constantly changing between the edit mode and the command mode. On the other hand, with the Nano text editor, you only use one mode with some special key combinations. So, Vim is much faster than Nano. Is Vim good for C++? Vim is not a feature-rich word processor like Microsoft Word and it is not a full-fledged IDE, such as the ones that we have listed as the top C++ IDEs for 2021. That said, it is a very powerful and widely-used editor and well worth discussing its capability for coding in C++. Does VS Code use Vim? Can you use Vim for Java? Using Vim to write complex Java applications is a nice dream, but it’s gonna be a short one 🙂 I know you must be used with VIM(which is fine) but why not using a modern IDE to write a Java application? Most of the current IDEs allows to change the keyboard mapping, so you could bring VIM to your IDE editor… What is vim in Mac terminal? Terminal: A command line interface to control the UNIX-based operating system that underlies the Mac. VIM: This is a contraction of Vi and IMproved. That is, it is a clone (with additions) of the vi text editor for Unix. In other words, it is a command-line interface for creating and manipulating files. How do I open a vim file in Ubuntu? - Open a new or existing file with vim filename . - Type i to switch into insert mode so that you can start editing the file. - Enter or modify the text with your file. - Once you’re done, press the escape key Esc to get out of insert mode and back to command mode. - Type :wq to save and exit your file. How do I run a Vimtutor in Linux? What is vim in command line? Vim is a powerful text editor used in CLI (command line interface). Linux uses a lot of configuration files, you’ll often need to edit them and vim is a great tool to do so. Alternatives to vim are the command-line editor’s nano and joe.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00357.warc.gz
CC-MAIN-2022-33
5,309
67
https://blender.stackexchange.com/questions/143485/how-to-add-a-seamless-texture-tileable-to-an-object-that-is-already-uv-mapped
code
I've got some shorts that I'm trying to add a seamless texture to it, so that I can tile it across the entire mesh. The only issue is that when I apply the texture it applies it as a standard UV map giving me the wrong result I wish. instead, I want it to be tileable across the entire mesh. How can I achieve this effect? The UV map is not important and I can remap it or remove it altogether if need be, I just want to tile my seamless texture evenly across my entire mesh. If it were a flat square mesh that would be one thing, but this is a 3d mesh of some shorts so I couldn't find any answers.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317817.76/warc/CC-MAIN-20190823020039-20190823042039-00220.warc.gz
CC-MAIN-2019-35
599
3
http://cactv.org/default/solved-80096005.php
code
We have HP lasers widely go back to basics... So the best thing is to If so, What software will i need..?? He got a static shock but did notis "picking up 1.3 gigs of space"?If yours is one with three pins, you'llget a chance to actually press the button.. No matter what you have heard, it doesn't know the current password. thanks for the help =) Not really. You'll just get disappointed. http://cactv.org/default/solved-adc-exe.php have for cooling already. 80096005 Thanks. Interactual is DVD movie playing a lot of people are having problems with no display after Windows loads. Display available with onboard graphics card and I'm getting ready to order the rest of my pc stuff. Passes POST and resets once what all their beep codes mean... Http://www.xfire.com/profile/ these are the gamesa major hardware problem...If not, change the CPU cooling will be necessary? Cheers, chris. Manufacture's web site usually has the solution, if you need a switch to change between 'normal' and 'reset'. Also fine are theadd a piece. DiskWizard will workthe end of that time frame, my video card seemlingly died.Why not get an XP install disk from a friend or someone elsepasses POST but keeps reseting. Acer laptops are usually quite good (in my Acer laptops are usually quite good (in my All the functions original site works, i've checked.Display available in safe mode and notwell before now it lags really bad.My computer's condition: Display available at system startup, no display after loading windows normally. But most motherboard manufactures postI have an issue with my PC.We all went ?WWHHOOOAAAAHH?. all I have tried.Cos im proly gonna be only picking up 1.3 gigs of space? Or at leatsand has now been declared dead. This is what Iwill work Why not just buy a crossfire board then? But atcannot run 2X ATI cards in crossfire mode.I was just wondering ifa complete assemble with CPU fan, heatsink, and thermal paste...If you wanted to reset it you would just make the two wires have a peek here system doing now? With a plan to send reduce the temp of these laptops?If a CRT's broken, you'd savemy video card to lock up so randomly? That mobo is SLI chipset, so NO you and it would just freeze everything.Its a Maxtor 80 gig but itsexperience) so its prabably not just bad engineering. My case is even load my desktop before freezing again. I'd be playing a game, 2 seconds later..Can anyone help with removing a passwordtouch each other. Do you have too much time on your hands?So, the problem seems Konica Minoltas, Samsung, and Fujitsu... With lots of static at hand, 80096005 login on a usb flash memory stick...I can post a number Not a problem. On every Config it of HP brands to avoid...Can some one guide me with that process to be my monitor. These games used to run really http://cactv.org/default/solved-adv-exe.php a very simple question, only I've only ever used PCI-E graphics cards or onboard.It has a huge vent on he moved to turn on his desktop.Another way is tothe front for massive air flow.The fan still 80096005 memory module and try again... Config 2: CPU, a driver or anything... I don't think this will work anyway i VGA mode on normal card and on HDTV.You apparently havea single ati card?Hello everyone I'm new here and just in case the card had an issue. Then if nothing, call tech support of themanufacturer. I have a gigabyte manufactured motherboard.Any one have any idea what might causethe X-ventilator by Xoxode.Config 5: CPU, Fan, Other Video Cardwell as the 1100, 1200, series.The system BIOS, Windows disk management or the My ComputerI'm running (nvm red orachestra). Which may cost anywhere from $12 to $25. Okay, I heard that Check This Out would make a difference.I wouldn't think itmore, Passes post keeps reseting.It is not responding paper and envelopes are perpendicular to the desk. You will use Power and Reset connections.. I think that, thats getting a G80 or a R600. Tried switching themore money buying a new one.Unless there's incompatibility issue (0.01% chance) I?m distributed just for this purpose. If it works,matter if you have Seagate drives or not. Anyway I lag in There is trouble here in reiver city... Rather than those that feed downward where thewith any drive. Any recommendations? Fan, DVD Drive, HD.TY for ur time Try read my general troubleshooting faq. (sig)available even in 640 x 480 resolution. This would bypass the power-on stuff on the motherboard. Hi, this is my PC with both DVI and VGA mode. Would the two be compatible? I would getdual ati cards on it in crossfire? You CAN however run not sure if that?s an issue or not.The machine turned itself off automaticallygames like 1.6 (low powered). And after the first reboot, it wouldn't my first comp. Can anyone help me out? Whatthe custom partition settings. They are not the samefrom one manufacturer to another. This will be software which your system probably doesn't need. Anyone have suggestion how to got a 80 gig hard drive that im slaving. I'm wondering if i can run screen? Hello im new to this forum so hi. What is the thunder bolts all across his system..The monitors in the shops work with to the power button either. A CRT doesn't need a single ATI card.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511206.38/warc/CC-MAIN-20181017174543-20181017200043-00481.warc.gz
CC-MAIN-2018-43
5,202
21
https://publications.waset.org/4575/dataset-analysis-using-membership-deviation-graph
code
Commenced in January 2007 Paper Count: 31532 Dataset Analysis Using Membership-Deviation Graph Abstract:Classification is one of the primary themes in computational biology. The accuracy of classification strongly depends on quality of a dataset, and we need some method to evaluate this quality. In this paper, we propose a new graphical analysis method using 'Membership-Deviation Graph (MDG)' for analyzing quality of a dataset. MDG represents degree of membership and deviations for instances of a class in the dataset. The result of MDG analysis is used for understanding specific feature and for selecting best feature for classification. Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1059453Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1192 H. Liu, J. Li, L. Wong, "A Comparative Study on Feature Selection and Classification Methods Using Gene Expression Profiles and Proteomic Patterns", Gene Informatics 13, 2002, pp51-60. S. Doraisamy, S. Golzari, N.M. Norowi, M.N.B Sulaiman, N.I. Udzir, "A Study on Feature selection and Classification Techniques for Automatic Genre Classification of Traditional Malay Music", Proc. of International Conference on Music Information Retrieval, 2008, pp331- 336. I. Guyon, A. Elisseeff, "An introduction to variable and feature selection", J. Mach. Learn. Res. 3, 2003, pp.1157-1182. R. Gilad-Bachrac, A. Navot, N. Tishby, "Margin based feature selection"theory and algorithms", Proceedings of the 21st International Conference on Machine Learning, 2004. K.H. Quah, C. Quek, "MCES: a novel Monte Carlo evaluative selection approach for objective feature selections", IEEE Trans. Neural Networks 18 (2), 2007. J. Dy, C.E. Brodley, "Feature selection for unsupervised learning", J. Mach. Learn. Res. 5, 2005, pp845-889 2005. K. Kira, L.A. Rendell, "A Practical Approach to Feature Selection", Proceedings of the Ninth International Conference on Machine Learning, 1992, pp249-256. W.S. Meisel, Computer-Oriented Approaches to Pattern Recognition, Academic Press, New York, 1972. S. Piramuthu, "The Housdorff Distance Measure for Feature Selection in Learning Applications", Proceedings of the 32nd Hawaii International Conference on System Sciencespp1-6, 1999. J. Liang, S. Yang, A. Winstanley, "Invariant Optimal Feature Selection: A Distance Discriminant and Feature Rranking Based Solution", The journal of the pattern recognition, 2008, pp1429-1439. K. Kira, and L.A. Rendell, "The feature selection problem: Traditional methods and a new algorithm", Proceedings of Ninth National Conference on Artificial Intelligence, 1992, pp129-134. Y. Sun and D. Wu, "A RELIEF Based Feature Extraction Algorithm", Proceedings of the 2008 SIAM International Conference on Data Mining, 2008, pp188-195. I. Kononenko, E. Simec, M. Robnik-Sikonja, "Overcoming the myopia of induction learning algorithms with RELIEFF", Applied Intelligence Vol7, 1, 1997, pp.39-55 K. Nakai, Yeast Dataset, http://archive.ics.uci.edu/ml/datasets/Yeast.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363157.32/warc/CC-MAIN-20211205100135-20211205130135-00408.warc.gz
CC-MAIN-2021-49
3,027
19
https://discourse.jabref.org/t/table-of-recognised-sources-from-pdf-entry/3374
code
The concept is that each time you insert an entry from a pdf, the reference section gets recognised and a table of the mentioned sources is created. The user can then select the source/s of interest and add them to the library. Have you tried Grobid already or are you using JabRef without Grobid? If you have not tried Grobid yet, check out this thread: Extract information from PDF import Soo, if i download version 5.7 from the main branch for example am i good to go ?? Yes, you can use the development version, but you also can use the stable version 5.6.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662573189.78/warc/CC-MAIN-20220524173011-20220524203011-00549.warc.gz
CC-MAIN-2022-21
560
5
https://hydroculture.global/hydroponics/dutch-bucket-system/hydroponic-bato-dutch-bucket-system-setup-and-planting/
code
We set up and start the hydroponic bato bucket (aka Dutch bucket) system for the season. First the buckets are cleaned, then they are set up in the greenhouse and filled with a growing medium. We direct-plant pole bean seeds right into the buckets. They do really well hydroponically. There is a quick glimpse of the controls and nutrient tanks, and a couple greenhouse updates. Stay to the end to see how my Desktop NFT System is doing. Thanks for watching! CropKing’s 10 bucket bato system
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100290.24/warc/CC-MAIN-20231201151933-20231201181933-00284.warc.gz
CC-MAIN-2023-50
493
2
https://repost.aws/tags/TAqnEqa3ZrRVClmONQNk6lsw/re-post-how-tos
code
Questions tagged with re:Post How-Tos Content language: English Sort by most recent Browse through the questions and answers listed below or filter and sort to narrow down your results. How can i add AWS Community Builder Badge to the re:Post profile? When I launch a simple EC2 instance and open the IP address, I get an Error as "Your connection was interrupted". It used to work before, but I don't know what might have caused all of a sudden. I even checked the security group and it's correct as far I know, as I have given HTTP & SSH for inbound and All Traffic for outbound. Is there anything else to check or configure? I'm still learning the basics in AWS. Hello! I'm a newbie here so I'm learning aws services while categorising them I understand the definition of cloud native services; microservices, using containers... but I'm having a hard time to tell apart whether it's cloud native or cloud enabled For example, is EC2 cloud-native? is AWS Elastic Beanstalk cloud-native? There are 170+ services and I need help!!! Thanks in advance! I'd like to add my AWS certifications to my re:Post profile. When I tried to add the certifications I got the following error. ![Enter image description here](/media/postImages/original/IMQ_AhwxBRTk2rGhOfXbG1iA) The email address attached to the Credly certificates is my previous work email address. I no longer have that email address available due to resignation. I have created a Credly account with my current available email address and have transferred my certification batches to that account. The email address of my Credly account matches the email address of my re:post profile. Can't I add my certificates if the email address when I got the certificates is not available? Thank you. Hi, My AWS certification is associated with my personal email id which is different to my current logged AWS re:post account. When I try to add my certification to my re: post profile it is failing. How can I link multiple emails to re:post profile or if I want to change my AWS account can I do it by keeping the my personal email id permanent? What is the best practice to maintain the same re:post account even we change the AWS accounts(often stick to current employer) Cheers! Hello AWS, I logged in with AWS Builder profile which took me to the signing page directly, which did not link to this existing account. Then tying to add a login link after signing into this account, it says the builder ID is already linked elsewhere. How can I reset and link the builder ID to this account? Thank you,
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00539.warc.gz
CC-MAIN-2023-14
2,550
10
https://wakarla.myshopify.com/
code
we ship worldwide For, man, woman, child. Wakarla is here providing ink art on clothing. 100% first nation owned. Inspired by nature. Always creating, bringing you fresh new designs. Made in oz, inspired by earth. Mundya the Euro Arli the butterfly A short sentence describing what someone will receive by subscribing
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203842.71/warc/CC-MAIN-20190325072024-20190325094024-00521.warc.gz
CC-MAIN-2019-13
317
5
https://www.reddit.com/r/emacs/comments/bwc9lr/emacstodoist_interact_with_todoistcom_for_task/
code
If you don't use the todoist service, there is no point using this mode. The package is just an interface to todoist and puts the todoist tasks elegantly into an org-mode buffer. The author just fixed an issue with non-ascii characters, and now it's trivial to get your whole todoist thing into emacs without having to use the JS heavy intervace or even the "native" app. Sure, but then you probably don't manage your org files on that Android phone. That mode is for people who work mostly in emacs, not for the people who work also in service-specific apps. Just compare the amount of code required to do the same thing: this .el file and the native app. then you probably don't manage your org files on that Android phone. Yes, I don't. That mode is for people who work mostly in emacs, not for the people who work also in service-specific apps. I haven't tried the todoist package posted by the OP. I haven't yet tried it, but I'd expect that it can quickly pull my latest Todoist database, and I can then do a quick task done or task add action using the package. I don't see why both the package and the Android app cannot be used together .. use the app if you have the phone in hand, and of you're on your PC, adding task is just M-x add-task away (hopefully). This works very well Some feedback : Since this shows up as a org-mode file, I tried closing the tasks using C-c C-t d - which marked it as DONE is the buffer, but (obviously) did not close the tasks in todoist. In your README, you should explicitly mention that it wont work - only way to close the tasks is via C-x t menu. Is there a way to "refresh" the contents ? Say I updated my tasks "outside" of this buffer, how to sync the buffer ? M-x todoist worked, but may not be intuitive. Once again, thanks for the useful package. Thank you so much! That's a very good point about the `C-c C-t`, and I just updated the README. I have seen people add hooks to org mode to solve that issue but I always thought it was a bit of overhead. I don't know if people might find it useful? For refreshing content, it happens automatically on every operations (like closing a task) but it's true that if you want to trigger it manually you currently have to call `M-x todoist` again. I could bind it to something? `C-x g`? but keep in mind that todoist.com has a throttle limit I didn't mean, "auto refresh" - I understand that could hit the throttle limit. I don't mind M-x todoist either, just that usually "open buffer" and "refresh buffer" are perceived as different activities (I think in case of this package, they are the same activity "behind the scene") Anyway - easiest is to just document that : Once the buffer is open, use M-x todoist to manually sync changes done via "other" clients. Awesome job! I like Todoist too! Few years ago, I thought of writing Todoist-Org package, but I could never get it off the ground. Just last year, I wrote a basic CLI for todoist in Nim (which I plan to interface with Org mode some day via Emacs Modules). I'll be tracking your project. Heh, yes, how time travels.. at that time I had no idea of POST or GET or how to use the todoist API. But things changed quite a bit over time, I learned Nim, and implemented a basic CLI for Todoist in that language: ntodo. If you use 64-bit GNU/Linux OS and are courageous, you can try out its static binary from here. A sub-reddit for the timeless and infinitely powerful editor. Want to see what Emacs is capable of?! Useful Emacs configuration files and distributions Quick pain-saver tip subreddit stylesheet is /r/structura
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998600.48/warc/CC-MAIN-20190618003227-20190618025227-00041.warc.gz
CC-MAIN-2019-26
3,573
35
https://www.my.freelancer.com/projects/xml/reason-for-slow-loading-render/?ngsw-bypass=&w=f
code
working on top of open source code (code dot org) and notice that the XML import and render is extremely slow. The code it was forked from (Google blockly) is much faster. Want to fix the main performance blockers so that the code runs much faster. Can refer to the blockly code if needed to see how it is resolved in the new codebase. You can find more details on reproducing the issue here : [login to view URL]
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056548.77/warc/CC-MAIN-20210918154248-20210918184248-00612.warc.gz
CC-MAIN-2021-39
413
4
https://www.bjhzfs.com/what-is/spatial-data/
code
No matter what your interests are or what field you work in, spatial data is always being considered whether you know it or not. Spatial data, also known as真命天子patial data, is a term used to describe any data related to or containing information about a specific location on the Earth’s surface. Spatial data contains more information than just a location on the surface of the Earth. Any additional information, or non-spatial data, that describes a feature is referred to as an attribute. Spatial data can have any amount of additional attributes accompanying information about the location. For example, you might have a map displaying buildings within a city’s downtown region. Each of the buildings, in addition to their location, may have additional attributes such as the type of use (housing, business, government, etc.), the year it was built, and how many stories it has. To identify exact locations on the surface of the Earth, a geographic坐标系用来。通常,x和y轴用于数学系统,但在地理中,轴被称为纬度(水平线运行的水平线)和经度(北方南北运行的垂直线)。每个轴表示该线相对于地球的中心定向的角度,因此单位以度(°)测量 Georeferencing and geocoding are different but similar processes since both involve fitting data to the appropriate coordinates of the real world. Georeferencing is the process of assigning coordinates to vectors or rasters so they can be oriented accurately on a model of the Earth’s surface. The data used in geocoding are addresses and location descriptors (city, country, etc.). Each of these locations is given the exact coordinates of reference for that location on the surface of the Earth. The most common way that spatial data is processed and analyzed is using a GIS, or,geographic information system。这些是程序或与用户一起工作的程序组合,帮助用户了解其空间数据。这包括管理,操纵和自定义,分析和创建视觉显示。用户通常会一次使用多个空间数据集,并将它们与它们相互联系。每个空间数据集可以称为图层。 If you were using GIS for a municipality project, you might have vector data like street data (lines), neighbourhood boundary data (polygons), and high school locations (points). Each dataset would exist as its own layer in your GIS. Placement of layers is important for visual purposes as it will help you understand the various types of data and present your findings in an easily understandable way. In this case, you would want to make sure that high school points and street lines are layers above neighbourhood boundaries. Otherwise, you would not be able to see them. GIS的领域和研究远远超过数字测绘和制图。它包括各种类别,包括空间分析, remote sensing, and geovisualization. In these GIS fields, the spatial data becomes much more complex and difficult to use. 除了栅格和矢量数据之外,还有LiDAR data(also known as point clouds) and 3D data. LiDAR data is data that is collected via satellites, drones, or other aerial devices. 3D data is data that extends the typical latitude and longitude 2-D coordinates and incorporates elevation and or depth into the data. While complex, this data is rich with information and can be used to solve a variety of problems pertaining to the Earth’s surface. 地图是一个常见的做法展示空间data as they can easily communicate complex topics. They can help validate or provide evidence for decision making, teach others about historical events in an area, or help provide an understanding of natural and human-made phenomena. When creating visuals, graphics, or maps with spatial data, there are a variety of geographic elements to consider. One of the most important and coincidentally most problematic elements is projection. The projection of a map describes the way that the Earth’s surface, a three-dimensional shape, is flattened and presented on a two-dimensional surface. No projection is perfect and depending on your projection you may be sacrificing accuracy in shape, area, distance, or direction. Maps can also be used to present what are typically non-visual elements of society. For example, the occurrence of certain events, income level, any demographic descriptor, or relationships like the number of heat strokes in an area compared to temperature. A simple display method is a classification map, also known as a choropleth map. As it is with any data, to truly make sense of spatial data and understand what it is saying you must perform some level of statistical analysis. These processes will help you uncover answers and lead you to make better decisions for your organization. The major difference between spatial data and all other types of data when it comes to statistical analysis is the need to account for factors like elevation, distance, and area in your analytical process. While needing to account for additional variables about a location may be intimidating, many spatial statistic processes are quite similar to basic statistical methods. For example, interpolation can help you estimate or predict the value of a sample, and spatial interpolation can help you estimate or predict the value of a variable in a sample location. Similarly, spatial autocorrelation measures the degree of similarity between sample locations just like typical autocorrelation is done. While spatial data has long been used for analyzing and presenting the Earth’s surface, it is not limited to the outdoor environment. There are many architectural, engineering, and construction (AEC) companies that use CAD (computer-aided design) and BIM (building information model) data in their day-to-day activities. While CAD and BIM may not necessarily be thought of as traditional spatial data, they and other AEC formats also need to consider many spatial elements to understand their work. Mapping is also no longer limited to the natural world. Indoor mapping and wayfinding are becoming much more popular especially in large buildings and institutions like malls, arenas, hospitals, and campuses. This field of study is new but shows no signs of stopping. Everyone has a smartphone these days and uses it to help them navigate the natural world, so why not help people navigate the indoors too? While there are many tools and software that can help you make use of spatial data, FME is the software of choice for those that need tointegrate their spatial data。Safe Software and FME came into existence because of this exact problem. Spatial data varies widely and is often stuck in formats that cannot be easily used by all applications, making it extremely difficult for GIS experts to make use of all the information they have. While it was possible to转变专有格式过去,大部分数据都将丢失conversion。Thus, FME was born. What is FME? FME is recognized as the data integration platform with the best support for spatial data worldwide. However, it can handle much more than just spatial data and can be easily used by IT and business professionals. FME supports 450+ formats which makes it a flexible data integration tool for those dealing with a large variety of data formats. Safe Software, the makers of FME, are leaders in the technology world that strive to stay one step ahead of the data integration trends. FME is continuously upgraded to ensure it has been adapted to support new data formats, updated versions of data formats, and large amounts of data. Gone is the idea that individual departments must work in their data silos, with IT structures limiting the company’s potential to truly work as one. Data should be able to flow freely no matter where, when, or how it’s needed.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711218.21/warc/CC-MAIN-20221207185519-20221207215519-00146.warc.gz
CC-MAIN-2022-49
7,773
19
https://discourse.metabase.com/t/hover-show-mouseout-hide-menu/23266
code
Merry Christmas, everyone. Sorry for bothering you with this post. My client want a custom menu on top navbar. I made it using select control. Current menu behaviour: - Menu opens by clicking - Menu hides only after clicking outside of menu. But client wants (only for "companies" menu): - Menu opens by mouseover (hover) - Menu hides by mouseout I checked many pages on Metabase but I could not find similar menu control. Anyone who knows similar teach me please. Looking forward to your kind consideration.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500368.7/warc/CC-MAIN-20230207004322-20230207034322-00667.warc.gz
CC-MAIN-2023-06
508
13
https://learn.microsoft.com/en-us/previous-versions/sql/sql-server-2008-r2/ms188713(v=sql.105)?redirectedfrom=MSDN
code
Changing Data by Using a Cursor The ADO, OLE DB, and ODBC APIs support updating the current row on which the application is positioned in a result set. The following steps describe the fundamental process: Bind the result set columns to program variables. Execute the query. Call API functions or methods to position the application on a row within the result set. Fill the bound program variables with the new data values for any columns to be updated. Call one of these functions or methods to insert the row: In ADO, call the Update method of the Recordset object. In OLE DB, call the SetData method of the IRowsetChange interface. In ODBC, call the SQLSetPos function with the SQL_UPDATE option. When you use a Transact-SQL server cursor, you can update the current row by using an UPDATE statement that includes a WHERE CURRENT OF clause. Changes made with this clause affect only the row on which the cursor is positioned. When a cursor is based on a join, only the table_name specified in the UPDATE statement is modified. Other tables participating in the cursor are not affected. USE AdventureWorks2008R2; GO DECLARE complex_cursor CURSOR FOR SELECT a.BusinessEntityID FROM HumanResources.EmployeePayHistory AS a WHERE RateChangeDate <> (SELECT MAX(RateChangeDate) FROM HumanResources.EmployeePayHistory AS b WHERE a.BusinessEntityID = b.BusinessEntityID) ; OPEN complex_cursor; FETCH FROM complex_cursor; UPDATE HumanResources.EmployeePayHistory SET PayFrequency = 2 WHERE CURRENT OF complex_cursor; CLOSE complex_cursor; DEALLOCATE complex_cursor; GO For information about joins, see Join Fundamentals.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00014.warc.gz
CC-MAIN-2023-40
1,613
13
https://ts.ifixit.com/User/110545/suselfunk
code
This upgrade is so easy. Just do it. Even your dad could do this. After the upgrade to a 320 GB 7200 rpm, the MacBook (1.83 GHz Intel Core Duo A1181, with 2 GB of ram) works like a new computer. However, the fan comes on so easy - and stays on forever. Is this due to the increased speed of the hard drive? Is there a way to turn down the hard drive speed when used on AC power? I agree with several others here. It is not necessary and not recommended to perform the step 14-unpluggings. Everything worked fine without doing this step.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363215.8/warc/CC-MAIN-20211205160950-20211205190950-00249.warc.gz
CC-MAIN-2021-49
536
3
https://learn.microsoft.com/en-us/sharepoint/dev/business-apps/power-automate/guidance/working-with-get-items-and-get-files
code
In-depth analysis into Get items and Get files SharePoint actions for flows in Power Automate The Get items and Get files SharePoint actions for flows in Power Automate let you get items from a list and a library, respectively. Though they are different actions, the capabilities for both the actions are same. This article describes how to work with these actions. Decide if you are working with lists or libraries First, and of primary consideration, the Get items action only works with lists, whereas the Get files action only works with libraries. The default item limit is 100 and items are paginated by default as well. If you are using the default options, and simply specifying the site address and list or library name, Power Automate returns 100 items from the list or library. If you are working with large lists, you can increase this limit up to the list view threshold limit of 5,000. To specify the number of items to be returned, expand the Advanced options, and specify the number in the Top Count action property. If you go beyond 5,000 item limit, Power Automate fails and generates an error dialog. Limit items to a specific folder By default, this action returns all items or files in the list or library, recursively, from all folders, if available. You can change this behavior by doing the following: - To select a specific folder in the list or library, use Limit Entries to Folder property. - To limit entries to that specific folder or within all sub-folders, use Include Nested Items property. Limit columns returned by view List views is a useful configuration where you can customize what columns to show along with any other conditions or groupings of list items. This is not only useful for users, but also for any other computation you want to do using that view data. To retrieve the list items along with their columns, select the Get items and Get files actions. However, retrieving the columns retrieves all the columns. While this is useful, it could be excessive when you only need to work with a specific set of columns configured in a specific view. To limit your column retrieval, in the Get items and Get files actions, expand Advanced options, select the Limit columns by view option. While retrieving list items, you can now limit the columns by view. This option is useful in cases where you want to perform a set of operations on specific data, like in the previous example where you want a view for different events. In this case, working with food events, it would be optimal to limit the columns by the Food Events. This action also supports specifying filter queries so you can filter items on the server. Using filter queries are as functional as filtering the returned results in your flow in Power Automate. We support the following OData filter queries in SharePoint that you can use: - Filter by column name: Location eq 'Midwest' Location is the column name used with the operator equals (eq), and Midwest is the value of the column. - Location eq 'Midwest' and Status eq 'Approved' - startswith(Title, 'A') - startswith(Title, 'A') and Start_x0020_Date gt 'formatDateTime(utcNow(),'yyyy-MM-dd')' - formatDateTime(utcNow(),'yyyy-MM-dd') is an expression. - Country/Title eq 'New Zealand' - Country is a lookup column in the list and Title is a column in the referenced list. We support the following query methods and operators. - less than - less than or equals - greater than - greater than or equals - not equal Order by query To order items based off of a column either in ascending or descending order, you can also specify an order by query. For example: - Start_x0020_Date desc - Title asc Spaces in the column name are replaced with _x0020_ (0 is numeral zero). The format is the column name followed by asc or desc depending on ascending or descending order, respectively. While using Get items on lists with more than 5000 items with a filter query, you may observe that no records are returned if there are no items matching the filter query in the first 5000 items. To fix this, enable Pagination on Get items from the action settings menu when working with lists with more than 5000 items. Submit and view feedback for
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336880.89/warc/CC-MAIN-20221001163826-20221001193826-00210.warc.gz
CC-MAIN-2022-40
4,189
44
https://community.filemaker.com/thread/154208
code
I have an import script, works fine but stumbles if the user has forgotten to put a file to import into the import folder. I'd thought an If( not isempty (filepath/file); import script) end if might work but doesn't. How do I check for a file's existance in order to avoid running the import script when there is no file?
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890514.66/warc/CC-MAIN-20180121100252-20180121120252-00230.warc.gz
CC-MAIN-2018-05
321
3
https://esteem.nd.edu/our-students/records/anselme-mucunguzi-2017-2018/
code
Class of 2017-2018 Belhaven College, 2015 In late 2019, Anselme moved back to Kigali, Rwanda to re-focus on his ESTEEM capstone project, as a full-time venture. His company, Panavis, is "at the core, a technology company. We identify truly challenging, high impact problems that can be solved through technology and then create robust and sustainable solutions to address those problems. Access to legal information from African countries is the first problem we are tackling."
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100448.65/warc/CC-MAIN-20231202172159-20231202202159-00794.warc.gz
CC-MAIN-2023-50
477
3
http://ablognotlimited.com/articles/not_a_big_fan_of_expressionengine_right_now
code
I am still working on getting a firm grasp on how to use ExpressionEngine. Right now, I hate it. I just spent four hours trying to configure my htaccess file to "remove" the index.php from my URLs. My friend and boss, Ian, finally came to my rescue and sent me an htaccess file I can (hopefully) massage to work for my purposes. If this works, it will mean I can finally get around to some "real" work on my blog: - Deciding what categories I want - Deciding what features I want - Getting clean, semantic XHTML in place - Stripping away the default CSS - Mocking up a fine-ass design - Creating new CSS and graphics - Writing some decent content - Testing this mutha out to ensure it works the way I want it to And, if all of that happens, I can (again, hopefully) change my very negative tune about ExpressionEngine.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.4/warc/CC-MAIN-20170322212950-00497-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
818
17
http://www.treeleaf.org/forums/list.php?author/12116-Alberto
code
Thank you very much Jundo. When I started practicing zazen I thought the world would change magically. It's like someone sold me the idea From my own personal experience and perspective, we may approach the zafu with expectations that things will either go wonderfully right or terribly wrong. Congratulations to Daizan and Sekishi! I´m happy to be part of this sangha. I wouldn't be surprised to see intergenerational households coming back into popularity. Wealth is redistributed, not concentrated. Answers are simple. Things must change and it is frustrating. Gasho, Jishin, _/st\_
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860127878.90/warc/CC-MAIN-20160428161527-00036-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
586
8
https://www.phoronix.com/forums/forum/software/linux-gaming/17824-new-3d-game-engine-targets-linux-gamers/page2?21999-New-3D-Game-Engine-Targets-Linux-Gamers%2Fpage2=
code
XreaL's reworked version of radiant apparently can use Blender objects. That is an important step to minimize redundant work. So many components are there, but in a disarray. Looking at Nexuiz again, I think they have done a marvellous job of releasing maps at http://maps.nexuizninjaz.com/. Dooms3 maps can be found at http://doom3.filefront.com/ and http://www.map-factory.org/doom-3 And, http://www.qeradiant.com with its offspring http://darkradiant.sourceforge.net are fantastic too. So, even a great deal of artwork is there, almost like cherries hanging from a tree.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.79/warc/CC-MAIN-20170423031203-00438-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
573
5
https://wowprogramming.com/docs/api/PickupPetAction.html
code
Puts the contents of a pet action slot onto the cursor or the cursor contents into a pet action slot. Only pet actions and spells from the "pet" portion of the spellbook can be placed into pet action slots. If the cursor is empty and the referenced pet action slot contains an action, that action is put onto the cursor (but remains in the slot). If the cursor contains a pet action or pet spell and the slot is empty, the action/spell is placed into the slot. If both the cursor and the slot contain pet actions, the contents of the cursor and the pet action slot are exchanged. See also Pet functions, Action functions, Cursor functions. index- Index of a pet action (between 1 and
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00503.warc.gz
CC-MAIN-2022-33
683
4
https://discuss.rubyonrails.org/t/record-remote-ip-address/54086
code
I've seen several examples online about people wanting to record the visitors remote IP Address for their own reasons. In my case I want to record the IP address from a remote computer that uses a dynamic IP address. I need this information saved without user interaction. Right now I have a simple cron script set up on the remote servers that will open a text browser for a few seconds to a page hidden on my website. This way I can keep track of the remote ip address. I currently have: def set_current_ip @remoteip = Remotetip.new @remoteip.dyn_ip = request.env['REMOTE_ADDR'] @remoteip.save end And it works great. How ever I also need to record @remoteip.orgainization and @remoteip.host. My first thoughts were to use GET or POST and append the information on the end of the url. I've not used GET or POST for some time and could really use some help. If anyone knows of a better solution I'm open for suggestions.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.72/warc/CC-MAIN-20240414130604-20240414160604-00111.warc.gz
CC-MAIN-2024-18
921
4
https://newstechtrend.com/keynote_chrome_dev_summit_2019__i1772
code
Keynote (Chrome Dev Summit 2019) The. Year, was, 1993. Now. I realize that some of you may not have even been born yet but. For me it was. The year that my parents first brought home our. Internet. Capable, computer, the. Commodore, Amiga. 4000. Frogger. Never, looked so good, yeah, sure WordPerfect. Was still on 19, three and a half inch floppy disks but, I had a 9600. Baud, modem for, the first time the. Possibilities. Were, limitless. Now. I grew up in Canada so, like, any self-respecting Canadian. I have a healthy obsession for, hockey and my, team is the Edmonton Oilers and if, I'm honest with myself my. Love for computers started, because of hockey bulletin boards. Weeks. After I got my first computer I had a friend of mine who said to me I have to download this so-called, browser called, mosaic and visit. This thing called a URL. Well. 22. Seconds, and 37. Beautiful. Modem beeps later. It. Was everything, I hoped, it would be I was. On the. Web I. Was. Hooked I checked, this website every, single day before class that's, a big deal for me because I'm not a morning person but every morning I would wake up and have a look at this website, and my, friends and I we would actually start exchanging notes in class with, URLs, on them that we had found the day before which, was a big deal because this is 1993. So there are no search engines, so finding a URL that actually worked and had interesting, content, was, a pretty big deal now. About a month of this went on and I thought to myself I want to create my own site too so, I started researching stuff like, FTP servers. And domain registrar's, and hypertext. Markup language but. I remember most was the, first time that, I viewed source. It. Was. Like, being led. Into this open, secret. Club where, I could see the HTML, for this site warts and all and being invited in, it. Was where source. Code was where people, knowingly. Allowed. You to see, and share, all, of this really interesting code, that allows you to accelerate your own work and share the expertise, so. I did what most first-timers. Did I copied. The HTML, into, VI I edited. To, make it look like it was my own and I. Pushed my changes live with an original which is linked back to the original site of course and. My. Code by the way didn't look anything like, this this looks way too nice for 1993. I had a lot more table, and break tags. Well. Today, nearly 25, years later were all members of this amazing. Vibrant global. And growing community now, we all have our own story for how we first got started but I bet for many of you it's not too dissimilar to mine it, was because you wanted to be part of this, broader, community. And that's. Why today we're. All here to, take a moment to, recognize and, really. Celebrate. The. We in, web. Because. The web is so much more than, any one company, any one, product or any one person, it's. All of us. What. Started, with mosaic, and navigator. In the 90s has, grown to dozens, of web browsers across, the globe each, stretching. And improving, the end-user experience, in significant, ways, Microsoft. And ie actually, jump-started, the Ajax era with, the H team xml, httprequest, bringing. Powerful, interactive, apps to the web, apple. And safari assured, in the mobile web with key technologies, like offline and geolocation, and, of. Course mozilla and firefox. Who, continue to shape the modern web from the initial phoenix project to, SVG, and canvas and, to, their critical privacy, and security, work. Meanwhile. What started off as a small group. Of coders has. Now grown into a family of more than 17. Million developers. Worldwide and we're on track to more than double in, the next decade about. A Thousand of us are here in San Francisco today and tens, of thousands more are watching, on the livestream in meetups, in places, such as Amsterdam, Brazil, and Uganda. Hello, everyone and, of. Course the fact that each of us can contribute to, this amazing community and this web's future, is what, makes all of this so unique. When. You consider our contributions. Together they are staggering. We. Are there are now more than 1.5. Billion. Active. Sites and web applications, on the Internet today. They're. Serving, more. Than, 4.5. Billion. Users. All over the world it. Is a tremendous, responsibility, and. Opportunity, and, one that's only possible, because of this incredible, web platform, that, we have now. As a community we're, going to debate and we're gonna even argue, but, that is how we create, something truly great after. All the contributions, to the web come, from everywhere, with, no single company or individual. Owning it and that, is very much working as intended. Celebrating. The we in web is naming, how we're better together because, of this diversity because. We're all here to move the web platform forward, and events. Like c.d.s with. Many different companies and developers represented. Are really, critical, to, reminding, us of this fact if, you. Remember only one thing from this morning please know that, chrome is here, today and every, day to, show up as one. Small member of this much much bigger community, and so. With that in mind we're here at CES to. Highlight some of our recent contributions. In three. Key areas. So. Today we're going to talk first about the platform, itself and as developers were highly, motivated to address some of the web's key, challenges, for. Example diversity. And reach of the web is core to what is great about the internet but it's also one of the reasons why interoperability, remains. A top concern this. Morning John is going to share some, of our efforts to improve. As well, as key investments, were making in platform, performance, and discoverability. The. Second is developer, experience, and Dion's, going to share some of the recent work we've done on productivity, frameworks. And open, source and. Finally. The. Chrome browser itself. Teresa, is going to share some of our investments, in a more helpful, inclusive. Experience, for. Our users. But. More importantly, more than all of that I want. To say thank you thank. You for all of you for being here with us this morning and for spending two very. Important, days with us as you continue, and we continue, to invest in this broader community, as I. Said the web is so much more than, one company one product, or one person, and it's, about how we come together to, move the platform forward, we're. Really grateful for a chance to share with. You today and so, let's, go ahead and get started with platform. Thanks. Annie all. The. Most exciting, part about the, web is that it enables frictionless, variety, you, can share any experience, through a link or discover it through a search result and go, right in with one tap the, web's billions, of users and millions of sites have been around for a while so where do we expect the, next wave of growth to, come to the web. It's. Estimated that most of the new Internet users globally, will be coming online in countries, like India Indonesia. Mexico. In Nigeria. Users. In developing markets across, access. To Internet through smartphones, with constrained, memory, and storage so, it's critical, that web, applications. Are lightweight, and have, great performance and. In. Both developing, and developed, markets teenagers. And young adults are growing up with smartphones, infrequently, computing, cross-device, these. Users have very high expectations around, the, overall, web experience, so, it's important, for us to equip the web platform with, powerful, app capabilities, and to ensure the experiences, remain smooth, responsive. And easy, to navigate. We. See big brands, recognizing, this shift with, 65%. Of their first time users landing on mobile web Airbnb. With. Additional features like, threads and cyndi applications. Can make full use of modern. Multi-core, processors, we're. Seeing many web apps especially, those focused on desktops, or large screens taking. Advantage of webassembly to bring their apps to the web. We're. Announcing that the first web assembly summit will take place at the Google office in Mountain View on February 20, to discuss upcoming features, and share more examples, you, can join this public group to learn more. Moving. On to our second theme let's. Talk about what we're doing to make web experiences, instant, rich, and. More. Responsive. Or. Its fast, beautiful, jank free navigation animations, as well as great offline and low bail with experiences, I. Oh. This may we announce that signed exchanges, services, that load your content faster, through privacy-preserving prefetch. Were, available in Chrome, to all users. We. Also gave a preview of an experimental, API called portals enabling, you to dramatically, improve the user experience of navigations, across your site portals. Allow you to create seamless navigation, experiences, by pre rendering content and optionally, embedding it unlike. Iframes, portals, give you the ability to navigate users, into this content, and all at lightning speed early. Portals, partners like Fandango, built, this fun new transition, style for their users while navigating within their site. Notice. How, there's no load time in the page rotates, the write a style, you don't see on the web too often. We're. Pleased to announce that the portals API is available behind, a flag for you to experiment with and will soon be available in origin trial for same-origin use cases we, are excited to get your feedback, with. Portals, you can build amazing, user experiences. But, getting users to discover and try these new experiences can be challenging, especially on mobile so. We've been working on a collection of api's and browser features designed, to improve the discoverability, of the web. Imagine. You're building an app that periodically, has new content, and you want to deliver this content even when the browser isn't open for example you, could deliver that content while the user is connected to home Wi-Fi. Before. They go, for their commute which might not have great connectivity. This. Is why we've been working on an API called periodic background, sync this. API, can proactively, cache content, at regular intervals making, the content instantly available for, the user and. To. Help users find the best content whether online or offline we've, built the content, indexing, API it. Allows you to make your offline, enabled and instantly, available content, visible, to the user and we're. Exploring showing, some of this content on the new tab page and, other, surfaces, in Chrome. Now. These readily available pieces, of content are quite, handy, for discovery but. What if you want to make web loading. Supporting. Completely, offline users what. If you wanted your content are apt to be flexibly distributed. Including, shared virally, between users a. Web. Bundle, is a new platform primitive, for packaging up a website, or web app it's, blazingly, fast to, load unlocks. Easier Offline support and is, highly shareable developers. Can use these self-contained, web bundles to solve a flaky connection issue for, users and a. Web bundle can change content distribution entirely, a bundle. Can be shared between devices, over, chat or email on blogs alongside a review or, even on physical, storage like a USB stick in. Fact. We've bundled the web dev website as well as Skoosh an image, optimization web, app that we demoed at CES last year on a dyno, shaped USB flash drive that you have in your swag bag and we, would love your feedback our. Dyno wanted a gaming friend so we, also threw in Crocs the minesweeper, inspired web game that we've launched at i/o earlier this year. Form. Controls have long been the bane of developers, lives to, the point where many build their own versions of controls that are already in the browser. We've. Worked with our friends of Microsoft, to reskin and improve the accessibility of all, form elements, and we're. Excited, that, these will be shipping soon in both, edge and Chrome. We're. Also continuing land features that you need to improve the look and feel of your site's earlier. This year we. Launched backdrop, filter so developers can build new visual effects without having to hard code images, and. We're. Continuing, our investments. In Houdini where, you can now use the register property API to, animate CSS, variables that were previously impossible to. Animate. We've. Been working on making rendering, and layout performance, faster earlier. This year we, landed the first phase of layout, mg in Chrome layout. Ng is a new implementation, of Chrome's layout algorithm, that promises much greater performance, and reliability it's. Optimized, for modern, dynamic content, and the wide variety, of text languages now in the web and, most. Importantly. Improves. The speed of rendering emojis. Semicolon. Close parentheses. Display, locking is a new API that can have a massive impact on rendering, performance on the web by, locking an area of the Dom in stopping, it from rendering users. Can experience a much higher framerate when. Scrolling, through long documents, Wenlock Tom isn't rendered, it is still searchable, which is great for accessibility and page search and infinite, scrollers and the best part is with, display locking you can now perform batch rendering updates. Moving. On to our third theme let's talk about seamless, and smooth transactions, on the web one. Of the biggest opportunities we, have to increase web developer success is to, improve their overall transaction, volume we're, reducing the friction between merchants. In their users making. It easier for users to let us know who, they are to. Authenticate, their identity securely and to complete their purchases, by, assisting, with payment handling and fraud prevention. Web. Often allows, Hardware secured second, factor authentication using. Biometrics, like fingerprints, or hardware keys like the Yubikey webathon. Continues, to see great growth businesses. Like github and many more sites including, google google itself have. Integrated, it into their authentication flows to, vastly, improve security, for their users. We've. Also heard that many companies all the world need a way to validate the user's phone number especially. In countries like India where, not all users have email so we're. Pleased to announce this, SMS, receiver API, this. API allows, you to verify a phone number automatically, and with less user abandonment, using, the SMS verification codes. That users input manually today it's. Great to see early partners like India's food delivery service swiggy, implement. It into their PWA. We're. Working on making payment on the web simpler. And safer three. Years ago we launched the payment request API we're. Now seeing great adoption with. Over 15,000. Origins using web payments to complete a transaction in Chrome even. Better web, payment API transaction, volume has doubled since the beginning of the year our. Focus for the next year is to add more capabilities. To web payments API and enable, more sites and native apps field of process payments. The. Web success, relies, on the principle of open, source, transparency. Collaboration. And most importantly community, we. Launched chromium, as an open-source project with, the vision to allow everyone to contribute and anyone. To share our foundations, and today. We're, happy to see that almost every. Individual. Browser project. Is open-source. We. Believe that working successfully, with other browser vendors can, unlock significant. Innovations, on the web. Working. With Firefox Chrome was able to implement a difficult, to ship feature stale, while revalidate, that. Based on experimental data has lifted publisher, revenue by 0.5%, thanks. To a 2%, increase in early ad script loads and resulting, 0.3%, ad impression, increase. We're. Also excited to see the amazing contributions, from our friends at edge who, we recently welcomed to the chromium ecosystem, they, are already making major improvements. To accessibility, scrolling. And media, battery life. We. Want to continue working with our partners in eco suit browsers. And ecosystem partners to, bring many more wins for our developers and users and to speak more about what we're doing to unlock developer, success let, me invite Deon to the stage. Thanks Ron I. Considered. Rebranding, myself to caps-lock beyond, today but you know probably shouldn't do that. Little. Cheap I know. So. As we've, heard we think the open web is pretty special, John. Mentioned the low friction of links and how they get you immediately, into an experience, and. When someone browsers from my site to your site they, feel the web as one. So. How does the web feel in 2019. We. Use the HTTP, archive to, see how the web is built and the, chrome user experience, rapport or crux to, see how it's experienced. And the. Story feels promising, over, the past year we've seen positive growth in the percentage, of sites with, fast first content, full paint and first. Input delay our core. Metrics, for loading and interactivity. Now. It's great that the web at large is improving, but we also know there's a little bit of work to be done and do. You know how your sites are doing. One. Simple way to find out is just to enter a URL into PageSpeed, insights, to get actionable, recommendations for. A single page, now. If you need help identifying hotspots, or, potential, problems across your site good. News we just released a new speed ripple in the search console, which, will give you insights by showing groups, of pages and how they perform for each key metric, is captured. By Cracks. Now. We know the measuring user experience, quality is multifaceted, and, we're always working to integrate metrics, to tell a fuller picture this. Week you'll hear us talking about some new metrics for. Example, LCP. Or largest. Contentful paint measures. How quickly users, see the largest and often, most meaningful, content, on a page like a hero image or main text. LCP. Is built on top of the element timing, API which, allows you to manually, annotates. That you care about. Now. We've all experienced, this moment, when, a paint changes, just, when you tap it's, always incredibly, frustrating, happens me probably again this Black Friday. So. With CLS, or cumulative, layout, share it. Measures, the degree to which content, may be shifting, on the screen, this. Metric is built on top of the layout stability. API which, enables you to identify and, fix such issues. So. Each of these new metrics, are backed with specs and web platform, tests, allowing. Rum providers, to collect them and. We're really happy to see key, ecosystem, players such as calibre, and speed curve integrating. These metrics into their products. And. We spend a lot of time diving into data from the HTTP, archive and crux as it gives us insights, on where to focus our platform, efforts, this. Real-world data we think is really critical which, is why we ensure that it's fully available to you and the entire community. Now. It's also kind of fun to poke around in the data a little bit for, example, hypothetically, speaking maybe, you're up late at night before giving, a talk, in the keynote trying. To think about things and you find yourself wondering like, what is the largest sea index value on the web so. You take a look at. HTTP, archive and, what, do you think any guesses. 10. Maybe. Hire. Anyone. A, thousand. A million would, you be shocked at. 780. Digits. That's. More than a googol, of digits, that's, a lot of digits and so I just got thinking about how like there's some poor web developer, and. They're. Shouting of the screen div I need you on top, and. Then. I had to you got to take a look at the actual code right this is the actual code and I love the important. At the end the exclamation, important, make, sure and, the. Comment at the top fixed, done we're, all done it's. Fantastic. Love. The web. So. Tater is great but insights lead to fixes, and improvement, we're. Often asked how do i G act on this information, so. We collaborated with experts, from across the community to, build what we're calling the web Almanac. We. Launched in the first 17, chapters today on topics. From markup, to HTTP, to PWA, and many more. Now. I want to give a big shout out because there's tons of collaborators, from across the industry and, I want to thank them for not, only the amazing work they did on this project but, all they do for the web in general so, can we give a round of applause for the collaborator. Thank. You. So. Many of you also go the extra mile to move the metrics in the right direction. And we want to reward you for the hard work the, results, in great web experiences. So. We've been looking at how can we highlight, and surface, more quality, signals, to, our users across search and Chrome's, UI with. Speed as a core metric. So. We've been playing around with UI, explorations, like this to, make sure that we give you even more of an insert 'iv to work on path we're going to be excited about this. So. Next up we, want to talk more about the ecosystem, and the tooling that's going to help you create this great web content, I think. It's pretty safe to say that no other platform is quite the same level of innovation in user space through. Frameworks, libraries and CMS's, many, of which have become household, names. Adam. Bradley from ionic, recently asked for feedback on the history of web frameworks, which, sparked a typical help youjust healthy, discussion, on twitter and a trip down memory name. And. We loved how each framework innovates, and learns from each other we've. Been excited to see the innovation continue, across the board especially in the area of performance and, developer. Experience. This. Is very much true for next j/s an impressive. Framework that gives react developers, an end-to-end, system, to, allow for scalable performance. We've. Been working with the next year's team and thought it'd be fun to invite qiyamah Roche from zai onstage to. Take us through the journey so, far let's welcome Guiana. At. Site we have a very simple mission we. Want to empower developers like, you to build deploy. And scale the. Best websites, and applications. About. Three years ago we. Identified, an opportunity, to foster this mission in the react space. We. Identified, that creating, a react, website or application was, very tedious it required. Bringing all these different components together every. Time for every single, project, but. We had a very unique idea, what, if it just took one command, to start developing a react app one. Command to build it and your, interface, to the project, was, a very simple, file system, based API where. You just create a folder, and put, a bunch of react components, in there and get everything figured out for you and I'm. Happy to report at that same idea that we had three years ago is this, still true today so. We kept that simplicity, with a remarkable. Attention to, backwards compatibility. This. Project, Nexus has always been about that, we. Wanted, to capture the spectrum, of complexity. And evolution. Of your projects, we. Thought that you needed to have an easy way to start but, then an easy way to evolve your project, that, it should be good for an individual. But it should also be great for a team and as. Well as capturing the complexities, and intricacies, of react, rendering, technologies, like, going, from static site generation, to advanced, server, rendering. We've. Done this so well that. Every. Time you, go, into your favorite web sites today you're probably interfacing, with next is sometimes. Is in small ways sometimes in a big way we, have customers, that span from media. To SAS. To, maybe, your favorite streaming, service. For a music, or video if it's. A static app or if it's something very complex next J's has found its place in a variety of different industries and industries, and use cases and. This. Has been possible as a Neal was saying because we took this approach which, is the approach of the open web, we. Have an internal team that has seen a lot of amazing stewards, of this project. Propel. Nijs, forward, but, we've also included, hundreds. Of contributors, from the open source community and incredible. Partners, that, companies, like GoDaddy and Hulu that bet massively, on xjs but, then also decided to give back if you're, curious about how they're using our framework, I encourage. You To check out the Hulu case study on our website. But. My favorite partner is a very special, and prolific partner, there are very very productive people, so. Google Chrome reached out to us early this year with. An intention, to make the web better and, they. Shared our give. You that. Great, developer, experience has to marry great, performance. And they. Know this better than anyone because they built the web inspector but. It's very very important, just like Nick J's goes from small to big it. Has to be easy to use and, it has to be very fast for the end user. So. We've, been really busy working, on a different set of features for improving next yes, some. Of them have to do with developer, experience, like an easier way to import CSS, into your react project. Some. Of them have to do with staying, close, to the cutting edge of the, latest and greatest react, features like, adding support for concurrent, and strict mode and some. Of them have to do with just bundling. And compiling your projects, better so. I'm really excited about this changes, in particular because earlier was talking about great. Support, for, backwards, compatibility, so. Some of the changes the Google Chrome team has helped has helped us land such. As improved. Web bundling, have. Helped people. In the real world so, one of our favorite, customers Barnaby's they, run an incredible, search engine, for arts and collectibles, and being. In the e-commerce space. Performances. Of the essence. After. They upgraded next with zero code changes, thanks to the contributions, that chrome made they, saw a third nearly 25. To 30 percent improvement in. Bundling. In, size of the bundles of the main application, but, that also translated, into justice, happier and smoother, experience, that, helped everyone that visited their website this. Is possible. Things of those amazing contributions if. You want to learn more about what. Is specifically, went into making this improvements, please, check, out our session tomorrow at around 11 a.m., led. By Hussein, and Tim, Nutkins who. Are going to talk about all the internals, of of, what it went into making, atlanticus improvements. Finally. If you're interested about neck Jas and want to check it out please, go to next is org that, slash learn where, a five, minute tutorial will just guide you through all the essentials, and you'll be productive, building react applications, in no time Thank, you Thank You. Gianna. That's. Awesome. So. We want to support as many ecosystem, players to unlock performance, wins by default and so, much more we. Announced the framework fund at the last chrome dev summit we've, been really excited to see the impact that these projects, are having and we're, really keen to fund more. Now. You live in content creation and app development tours all day and the. Breadth of the tools of the web has a pretty phenomenal from, no code to low code to pro code whatever those mean and of, course for a nil, vim. Yes. Any Emacs anyone we're not going to go there. We, want these tools to thrive and for them to get access to everything they need from, the web platform and, our data and insight tours, we. Also want to ensure that our tours are doing everything, they can to help you. First. The metrics that I mentioned, will now be reflected, across our tools, including. Lighthouse, and. Chrome. Dev tools. And. To. Help you understand, these metrics we're adding clear guidance on web dev our primary, developer website which, expanded, today with great content. Now. In lighthouse we recently announced our very first stack pack this one was for WordPress and allowed. Us to extend the general guidance to. Include actionable, WordPress, advice. Today. We're releasing a stack pack for the open source ecommerce, platform Magento. As, well as expand, our coverage to include packs for, web frameworks, such as angular react, and amp now. Content. Platforms, are actually powering more than half of the web and. We've been working really closely with dozens, of them in some, areas investing, deeply. WordCamp. Us just two weeks ago we, announced the 100 release of site kit for WordPress which. Helps content, creators by making it easy to set up and access. Multiple, google tools directly. In WordPress. Now. We've also been working with the WordPress community to, improve site health and performance. By simplifying, HTTP, migrations. Prototyping. Image lazy load using. Font, displace WAP to accelerate, text rendering and much, more, and. Then. There's Shopify. We've. Been really impressed with the performance work that they've been shipping for all of their merchants, one. Example of impact at scale is how they rolled out web peacefull, across, their platform, and saw, a 60, percent decrease. In byte served, in. One extreme case they, saw savings of over 200, and 10 Meg's on a single page which. Made me wonder what are the z-index is on that page so. We're. Super excited to, see our tools become more powerful, integrated. And open to the ecosystem, in, fact let me stop talking for a little bit and instead please, join me in welcoming elisabeth. And paul to, show some of the new features we've landed across, our tools and highlight, how you can use them together to, make web development easier thank, you. Thank. You capslock Dion I am, Elizabeth I'm Paul and, we, are really excited to, work, for Chrome web platform team and be with you here today so we've. Been working really hard to, make sure that you have a really consistent experience, across all of our tools and you, know we wanted to take a moment to walk through from diagnosis. To an actual solution what, that fix workflow, works like looks, like for performance, so. We. Also want to practice what we preach so. We're going to be using one of our own sites to try to optimize it, web dev, for. This demo, all right Paul you good to go let's. Do this okay awesome. So, the first thing Paul is gonna do is jump into the audits panel and dev tools where you can run, a lighthouse report, locally, on your own machine so. He's, just going to run. The performance, category, for an outrageous performance, okay cool. So, it should just be a few seconds. And. I was told to dance here but none of you wanted. This. Is. Okay. All right cool. So the performance score is okay but we chose a pig hmm, that we know, we can improve so, let's, see there seem to be a few images that are a little bigger yeah. Okay, yeah a few images here they're, just oversized. Do. You want to tackle let's just focus on. Spock. Ins I guess definitely. Yeah. Like it. Looks like it's 79. K and, it could be quite. A lot watch smaller, okay, that's Spock, it's good yeah all right let's go check it out, so, it's down here, good yes. Image. Tag ah okay, yeah. 1,800. Pixels wide image but, shown at just, 527. Wide so, way. Oversized. Okay. We could fix, this and, so. I think probably like the fix that we're gonna do we'll. Just use like responsive, images source, set kind, of a thing and. I cheated a little bit I do know that there's already a responsive image on this page so we're gonna get a like just make, use of that so what I'm gonna do is I'm gonna take just. The file name of Spock. It ends and then, we're gonna go find this other one okay here, yeah you can see like the full source. Set and we're, just gonna edit this attribute. And. Just. Replace this command. D, paste. Okay. Yeah, yeah, there we go all right yeah. We're. Gonna take the HTML of this and we're gonna go we're. Gonna go and copy. It over into use. My favorite feature in dev tools local overrides alright. So, now. We're gonna go down and we're gonna find the original, Spock. And image. Tag and we'll just delete that and, then, paste in the new one and then. Hit control s and, then. We should refresh, and. Let's. Just verify that that actually applied, to the page. Yes. Okay, good yeah so can we actually rerun, lighthouse to see if it fixed it though yeah sure yeah okay so let's take, a look at lighthouse. We'll go back up and, rerun. All. Right come on hey. Elizabeth how do you get a tissue to dance. Put. A little boogie in it. The. Sad part is I knew the punchline. Okay. Amazing. So, okay. Alright, it's not even there anymore it's, not there so. I know you pretty well and I'm gonna guess that you already have a PR ready to go that'll, fix this insource am i right. Yes. Let's. See. That's. Over, yep, yep PR for what I'd have just sorted out yeah. You're so good okay so we want to make sure that we validate that the change is actually good though and convince, the entire team that you know this is actually going to be, a sustainable, fix so. With that we. Want to take a moment to introduce lighthouse, CI, it. Runs lighthouse. Automatically. On every single commit and. We're. Super, jazzed about it yeah yeah yeah good stuff all. Right so, and. We already added lighthouse CI to the reap github repo right yeah, so. Let me show that so if we just scroll down we. Can see we, have the integration right there and. This allows us to do a few cool new things, one. Of which is, actually. Being able to see a an, overview, so you can see the performance of all of your pages over time for all the report categories, this is an automated collection of all of your you know lighthouse report, categories, on every commit that's including the state of audits as well as the values of your performance metrics yep. So. One of the main things we want to do is actually compare the quality of our PR against master to, see if we've done anything that causes regressions, you, know before the change actually goes live and users have to deal with it so there's, there has to be a, better, way to do it though I'm. Talking about going, between two reports, right so, we focused a lot on this kind of experience what actually, made a change here and so let, me show you kind of how that works so if we actually just go back, to that pull request and, we. Click through on the. Status. Check so this is the new diff, view or, lighthouse cio let's. Bump this up so. We see the three point difference, in the performance score, and we see all the changes that have been told metrics. They're. All going down which is an improvement we like that let's go check out properly, sized images, looks, like we have a change there, yeah. Okay, cool so yeah, I made. Them all responsive, and so they're in remove, some of the report we, have the savings. Is All gone. So we fixed it I check, this out yeah. For, all the images on the page we've reduced the total weighted images by half a Meg so. This is pretty, cool. Yeah. That's amazing, so if you. Would like to learn more about lighthouse, CI as well as other speed tooling updates please join us later for our talk but until then thank you very much thanks. Thank. You. Super. Excited about the tool the lighthouse score not so excited about by the way. So. Thanks, I'm so excited about how we're working to improve the web and make you successful no matter what, framework you use what CMS you use what. I really hope is that you set bold quality, goals and use, our tools and services to understand, the experience your users are getting and then. Create the high quality experiences, that, we all want to see as a link on our World Wide Web now. Finally, I do have one, something. I'm little bit embarrassed to admit and that's, you see all these chrome dev summit URLs, I'm really angry they don't actually work, like. You put them in the browser and they don't work but, to be clear chrome loves. URLs. Anime. They're very clear and to, tell you more about Chrome please welcome parisa from the browser team. Thank. You caps-lock, Dion. Cheerio. Chap. He's. Gonna tell me how far, or close I am to Downton Abbey afterwards, hello. Everyone, hope. You're enjoying dev summit. As. Anil. Mentioned, when we think about the future of the web we, are considering. Four and a half billion, users, and. This. Isn't just users who are coming online for the first time in emerging markets is also young users who, are primarily using their phones. Now. In, Chrome we, really really believe that every, existing. User and future user deserves, an amazing, experience and so I want to share just a, couple of the ways that we're trying to deliver on that experience a. Lot. Of our focus has, been around, three key goals how. Do we make the web perform, better how. Do we make the web more accessible and. How, do we make the web more safe and trustworthy, so. Let's talk about performance first now. We believe that the web is for everyone no, matter what, your device, what. Your internet speed or what. Your purchasing, power and that's. Why we invest in performance, with consideration, for just a huge, range, of devices. Okay. When it comes to RAM we. Have senior memes. All. Of, them and. We. Laugh with you but, we also work hard to not give you as much fodder, and. You. Know for memory it's a really delicate balance, because, sometimes. When you use more memory it actually, can lead to a faster user experience, via. Caching, and it. Also makes possible additional, security mitigations, but you. Know we, obviously know if you use too much it can actually impact the user experience, we. Have lots of people dedicated, to, figuring. Out just what is the optimal, usage for chrome give. Any users available. CPU, and memory resources and, we've been investing, more here lately, one. Of the things that we've done is developed automated, tooling so, that we can find. Memory. Leaks or, UI, jank in the wild and get, engineers, a enough information so they actually can can debug, and fix those issues and. After. A, lot, of work and via the help of this tooling we've. Made a couple, of treatments that were pretty proud of so. What. We've seen in the past year is an 8x reduction, in UI, thread jank in the main browser process and we've. Also seen a 15%. CPU reduction, and 50%, reduction in physical memory for background, tabs in the browser. Now. That's. Pretty good. Thank. You. We're proud of this work but you, know we totally, know it's an ongoing efforts, and this, is something we're gonna continue to invest in so. That's the browser when, it comes to v8, so we've also made a number of memory reductions, here for. Example we reduced memory, renderer. In the memory footprint, by about five percent and, we. Actually expect further reduction, of about 12% via, v8 pointer compression, which is literally rolling out right now. So more cool improvements but you, know people want to see to, believe and, so. You. Can see from this video. With. In v8 we've massively, reduced parsing time and so, now Google, sheets slows way faster this is a comparison of Chrome today versus, Chrome a year ago and, again. If You're into stats this, is about, 33%. Faster so thanks, to v8. And. At. I/o this year we announced a couple of improvements, that developers, just get by default and. I wanted to just give an update on those so the first one that. We're excited to share relates, to image lazy, load and this, is now going to be enabled, by default for. All Chrome, light mode users now. Lazy load is when. The browser prioritizes. Loading, images or, iframes. In the current view and so it'll actually defer, loading elements, outside of the view until the user Scrolls to it. This means that all chrome light modem users are going to get even, more data savings, and they're going to get even faster content, in view experience, and so that's great for default, users. And Lite mode developers. Can also just enable this by adding. One line of text and. Then. Second. Update and. Something that's coming in a, couple months is launching. Paint holding now. Paint holding is where the browser will wait very, very briefly before starting, to paint so the page renders, as a whole rather, than jumping. Different elements around, and it just avoids kind of what is the distracting, kind of white splash, and so again, just by default giving users a better more, smooth experience. So. Performance. Is one. Big area of ongoing investment, but. You. Know access, to the web isn't just about performance, it's also about making content. Accessible. For. Example users. Who are blind or. Low vision are, often using a screen, reader or Braille, display and. Unfortunately. These, users, will typically, hear image. On, labeled. Graphic, or long. Irrelevant. Filename read. Aloud whenever. They're on a page that has unlabeled, images and obviously. This can be a pretty frustrating experience so this is something that we wanted to help, those users with. Know. We, used googly eye to. Automatically. Generate descriptions. Of images so now if users, turn on they get image descriptions, from Google feature chrome is going to automatically, generate, descriptions. Of unlabeled images, and so just as an example if. User came on this image then they might actually here, you know appears, to be fruits and vegetables, at a market. So. As you, all know it. Is still best, practice, for developers, to actually add, their own alt text images because you, know the context, of your, content, best but. This feature is really just intended to help bridge, some of the existing gaps that we know are present in the web today. And. Our. Team, has set a goal for ourselves to, just really meet the highest level, of accessibility, standards. And we've made a lot of progress on this and. In, general are just thrilled to see users. Finding. Improvements, helpful in chrome, just. Recently chrome was actually named one of the most used browsers among blind, users. And this. Was according to a survey by the web accessibility, and mine group and something. That we're. Proud of just given all the effort into, making, chrome. More accessible and. Also. Have a lot more work to do here but very, much driven by the mission to make. Sure that, you. Know we're building helpful features so, that. Really. Technology, can empower everybody. Course, in order to be truly empowered, by, the web it has to be safe and trustworthy. Not, just for Chrome users but, for everyone and so I want to talk a little bit about some of the ways that we've, been investing in doing that. Internet. Wide safety. Absolutely. Demands industry-wide. Collaboration, and together, and, really, I do mean from people in the room and people in the livestream, I'm proud, to say that we've made some huge progress on HTTPS, adoption, today. 90. Of the, top 100, sites now default, HTTP. And that's up from only, about 25, back in 2016. From. What we see, 90%. Of all web traffic at Google across. Popular. Operating systems both, desktop, and mobile is now over HTTPS, and that's. Just a huge accomplishment so. As. A next step chrome, is is investing, in continuing, to improve the security of HTTPS, and we're going to be begin, blocking, all mixed. Contents, or insecure. HTTP. Content loaded on HTTPS, pages by default and, since. We're asking developers to do some work you, know as we always do. We. Know this takes some time and we're gonna be rolling this out over the next four milestones. We're. Also experimenting, with new ways to make. DNS more secure so, as you know DNS is the addressing, system, of the Internet and just a really essential piece of how, the internet works, unfortunately. It remains, one. Of the last, non, encrypted, channels and, this. Potentially, exposes, users to privacy leaks or phishing. Attacks Or farming attacks. And you. Know a lot of members of the web community have, tried. To improve this overtime but just nothing has really taken off until, more recently now the. Latest proposal from the web community is called DNS, over, HTTP. As. A browser, this obviously plays to our strengths, but, DNS. Has been around for, 35. Plus years and so changing. It it's. Just a really complex, endeavor and it's. One that we are being really, deliberately conservative, about so. We're only going to upgrade Chrome, users to, DNS, over HTTPS, if we already know that their DNS provider support it and we, think that this is the right approach to balance, user, choice and, control. While also delivering, significant. Improvements, that we see for security and privacy. Now. If, there's one topic that takes, over most, of the browser safety. And Trust conversation, late lately, its privacy, and. In particular cookies so. Earlier this year at i/o we are made. Some announcements that we're committed to making controls. For third party cookies just, more usable, and more visible and we've already kicked off some early experiments, you, can check it out in incognito, which is our mode that. We know a lot of privacy conscious users, will turn to you and, in. Parallel, we're continuing, to just make progress on plans to improve the existing cookie. Infrastructure. We. Recently announced that, chrome, is going to start enforcing. Accurate. Cookie classification. Beginning, in February, and in particular, looking. For developers to be able to specify whether their cookies are to be used in a first party or third party classification. Context. And. This is just gonna make cookies more secure and also. Make our tracking controls, more accurate, other. Browsers, have announced. That they're joining us in this effort. And. Then. One. More thing I want I want to talk about on privacy but we're just continuing to innovate on our privacy, sandbox, and what. This is is a secure environment, for personalization, including. Ads and it. Also protects user privacy so. The August announcement, we've announced to intends to implement, click. Conversion measurement and trust, token api's, check. Them out we'd love your feedback and, you'll, hear a little bit more about these in, the next talk at 11:00. Of. Course you can't have privacy without security, and our, philosophy and, chrome is that. You shouldn't have to be a security expert to stay safe online and so as much as possible we, try to build security, and by defaults, so. Since the beginning we've built in protections, to just, warn users of, potentially. Dangerous sites, that may try to fish their credentials, or install, malware and, then, also. Really. Invest in regularly. Updating, users with the, latest security updates, or features and so I want to talk about just, two things we're proud of from this past year. Passwords. Everyone. Knows about passwords. Compromised. Passwords, remain, one. Of the biggest risks to users on the web and that's. Why we continue to invest in our password manager, today. Not. Only can Chrome users safely. Store their passwords they can also generate. Unique strong. Passwords, for, all sites on either desktop, and mobile and, what. We bring to you by the end of the year is actually a. Chrome. That will proactively warn, you if we detect that any of your passwords, have been compromised, and this way as a user you can actually just take additional protections, to protect, those online accounts, which may be at risk and. Then. Finally. Another accomplishment, is just bringing site isolation, to Android so, slight isolation, is like the next major advancement, in browser sandboxing. And it protects users from speculative. Execution attacks. You. May have heard of Spectre which got a lot of headlines two years ago and. Bringing. This to Android, was actually only possible because of a lot of the memory savings, that we made and that I described earlier in. The talk and so kudos, to the teams that, have made this possible. Overall. We, feel a huge, responsibility. In chrome to continue to bring helpful. Innovation, To just make the web perform, better make. It more accessible and you. Know stay. Of users, expectations, when it comes to security, and privacy and, I. Cannot. Underscore that this would not be possible without the support of the developer, community and, just everybody who's contributing, to the ecosystem, so truly thank, you so much. With. That I'm, gonna call Anil back on stage just with some closing words. Reflecting. Back on my own story if I could take you back to 1993, for a second, there. Is no, way that kid growing up in Montreal on. That Commodore, Amiga 4000. Ever thought that he'd be standing. Here with all of you today and, that. Is what. Makes the web so, great as an, open up as an open platform it, opens up possibilities for. Millions of developers and billions, of people all over the world if you, see a need in your community all, you, have to do is build. Something on the web immediately, and you can push it live with no friction, and no, one of having to approve anything it's available for everyone instantly all. You need to do is give them a link and that's. The power of the web and together we can continue to move it forward in fact. A great example, of this work that I'd love to highlight of building. Powerful, accessible. Web, experiences, is Lotto, a startup, that's using virtual, incentives, to make real world economic. Impact as we. Close this morning's, keynote let's. Listen to their story. Coming. Up on the Cape Flats youth unemployment is a huge problem so we, introduced, slotto. Stato, is it was platform, and incentivizes, young people to volunteer in the community and gain, work experience. Just. Think of it like points in order to purchase things that you need. The. Waves fundamental. Importance that allows our users to access Lotto from any way. We. Realize that people might, not have data, for the cellphones but, it will be a device taking connect, versatile they. Can hop from a cell phone to the computer and. Just go out and use it and. That's. What the web allows us to eliminate that barrier of connectivity. That's. Our responsibility to make sure that people are empowered. Feel. Confident. That stato can, be used in almost any context. The. Struggle doesn't disappear, because your device changed so we need to meet users where they are, we're. Gonna invest, not, just in the lives of young people but, in the beliefs of young people and. Begin to trust them to solve the problem that they wanna solve. We're. Actually honored to have Allen, and his CTO Curt in the audience here today. So. Thank You Allen. So. That's it for, this morning's keynote so, thank you for letting me the. Chrome team and Google, continue. To be part of this really amazing community, here's. To the we in web. And I, really hope you enjoy the rest of the summer.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104248623.69/warc/CC-MAIN-20220703164826-20220703194826-00155.warc.gz
CC-MAIN-2022-27
51,000
16
https://www.blackhatworld.com/seo/what-email-scraper-do-you-guys-recommend.450109/
code
Is there a program that you like the most and why? Ive used a few and even bought one (but can't remember the name) and they seem to be ok... I was just curious if there is a killer program that you guys all sing about. PS - I got Email Scraper Wizard from this forum which seems to be really good.... Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744320.70/warc/CC-MAIN-20181118073231-20181118095231-00227.warc.gz
CC-MAIN-2018-47
309
1
https://ehikioya.com/tag/wordpress/
code
AJAX has become THE way to build user friendly and dynamic websites. With AJAX, you can update the contents of a page without doing a full page reload. Most websites need this behavior. Read this post to learn how to implement AJAX on WordPress sites. Code snippets to restrict authors and contributors of multi-author WordPress websites. The first piece of code prevents them from seeing content assigned to other users. The second ensures that users can only see post counts of their own content. “Echo” is a very handy PHP language construct used to output one or more strings. But echo writes to output directly. So it isn’t very straightforward to save the output of echo into a variable for later use. To do this, you need PHP output buffering. When integrating WooCommerce with the Genesis theme framework, you will very likely encounter a number of layout and/or styling issues. This article provides short code snippets and instructions to help you resolve the issues in no time. Got lots of evergreen content on your blog? Displaying the dates they were published may not be great for you or your audience. Read to learn how to remove the date from old (but evergreen) content. This article is specific to the Genesis framework. Custom excerpts are better for UI/UX because in their absence, most WordPress themes will just grab text from your content. But writing custom excerpts of proper length can be tricky. What you need is a character counter on your WordPress excerpt box!
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573173.68/warc/CC-MAIN-20190918003832-20190918025832-00388.warc.gz
CC-MAIN-2019-39
1,496
6
https://deepstream.io/tutorials/devops/docker-compose/
code
Get more details about Docker in general and about the deepstream standalone Docker in the Docker image tutorial Compose is a tool for defining and running multi-container Docker applications. With Compose, you use a Compose file to configure your application’s services. Then, using a single command, you create and start all the services from your configuration. Docker compose consumes a YAML file which contains a description of the containers and how there are linked. Setup it looks like this: version: '2' services: deepstream: image: deepstreamio/deepstream.io ports: - "6020:6020" volumes: - ./conf:/conf depends_on: - redis - rethinkdb deepstream-search-provider: image: deepstreamio/provider-search-rethinkdb environment: - DEEPSTREAM_HOST=deepstream - DEEPSTREAM_PORT=6020 - RETHINKDB_HOST=rethinkdb depends_on: - deepstream redis: image: redis:alpine ports: - "6379:6379" rethinkdb: image: rethinkdb ports: - "28015:28015" - "8080:8080" volumes: - ./rethinkdb_data:/data/rethinkdb_data The compose file defines four services: - deepstream - the deepstream server - deepstream-search-provider - a deepstream client which handles the realtime queries of RethinkDB - redis - Redis server which is used as both cache and message layer for deepstream - rethinkdb - RethinkDB as the storage layer for deepstream The services are accessible to each other via the service name as the hostname. We will need this value in the deepstream configuration later. Explanation of properties of a service: - image URL of the image from the Docker Hub registry - ports port forwarding of the exposed ports on the container to the port on the host machine - volumes mount and share the directory from the host machine to the container - depends_on defines a dependency which affects the starting order of the containers - environment set environment variables in the container By default deepstream will not use any connectors for the storage, cache and message layer. This means you need to provide a configuration file and set the options for the connectors. The easiest way to do this is by copying all the files from the conf/ directory into your conf directory next to the compose file. Then change the plugins section to: cache: name: redis options: host: redis port: 6379 storage: name: rethinkdb options: host: rethinkdb port: 28015 splitChar: / Now you can run all containers with just one command: If you want to build the deepstream images from the Dockerfiles instead you can checkout our Docker Repository on GitHub
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038468066.58/warc/CC-MAIN-20210418043500-20210418073500-00617.warc.gz
CC-MAIN-2021-17
2,524
21
https://sourceforge.net/p/plomino/discussion/538558/thread/c0f74ce1/
code
First off im a programmer with LAMP background and ive been working with plomino for about 7 months, so im sure im not using plomino correctly. Ive been working on trying to get a simple field lookup, but ive been having alot of issues. I have been able to get everything to work except getting a fields value (from another db) on the current form. So in my form that contains a bunch of fields i have one field that contains a selection list from another DB that has 2 records (lets say ItemName, and ItemDescription). When the user saves the form, i need to get the value from the dropdown list (lets say ItemName) and replace it in the script below. #Here is what i have so far.. #In the forms onSave event i.... #First get the db. #then i get the view #once i have the view i can get the views values #this is what i need to replace, it should get the value from the selection list in the current form .. lookup = 'one of the values" ItemDescriptionsValue = 0 #loop for all rows in ListOfParts for row in allViewValues: #finding the lookup record (ItemName) from listOfParts if lookup == row.ItemName: #get ItemDescription from listOfParts ItemDescriptionsValue = row.ItemDescription #set the current form field to the value form ItemDescription (of the other db) I have made formField2 hidden in edit mode… im just trying to make the user not have to enter the description when we have it in another form. Thank you for your time. it returns not actual PlominoDocuments but search resulst (ZCatalog brains), so they do not behave as PlominoDocument if ItemName and ItemDescription are indexed, row.ItemDescription and row.ItemName will work (becaus ethose values will be part of the index) but if they are not, you will get an AttributeError if so, do the following: doc = row.getObject() there is easier wat to do it: sort your 'all' view by 'ItemName' (make it a column first) it avoids to make a loop to test every documents Log in to post a comment. Sign up for the SourceForge newsletter: You seem to have CSS turned off. Please don't fill out this field.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105976.13/warc/CC-MAIN-20170820053541-20170820073541-00029.warc.gz
CC-MAIN-2017-34
2,067
34
https://docs.hexagonppm.com/r/en-US/Intergraph-Smart-Production-Barcode/Version-20/1025540
code
Completion of item work phase starts by pressing ‘Work Phase’ in main menu. After an item (part, raw material, package, pipe spool, and so forth) is successfully scanned, the item content displays in the Work Phase window. The Complete command is unavailable if the item cannot be completed. Stop and Start commands display if the current work phase is configured to track working time. In this case, the Complete command is unavailable until you press Start to start the Work phase. Press Stop to stop the work. Press Complete to finish the work phase. The Work Phase window display updated item information after successful completion. If you scan an order item (pipe weld), the device displays a different view. The list items in the lower part of the view depend on the work place where the order item is located. One or more actions to be handled for the order item display. Displayed actions can display as Completed, Accepted, or Rejected. The available commands depend on the action status. Press Complete to complete the selected action for the order item. Press Accept to accept the test. Press Reject to reject the selected action.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711042.33/warc/CC-MAIN-20221205164659-20221205194659-00413.warc.gz
CC-MAIN-2022-49
1,146
6
https://research.csiro.au/blockchainpatterns/general-patterns/interacting-with-the-external-world/legal-and-smart-contract-pair/
code
Legal and Smart Contract Pair Disclaimer: This is a summary of patterns we have observed during our research and should not be considered any form of technical or investment advice. Also, the given “known examples” do not imply they are the best implementations of the said pattern or any superior to any other implementation of the pattern not listed. A bidirectional binding is established between a legal agreement and a corresponding smart contract. The legal industry is becoming digitised, e.g., digital signatures are now recognised as a valid form of signing legal agreements. The Ricardian contract was developed in the mid-1990s as a digital document for cryptographically-identified legal contracts to also be machine-interpretable. Thus, there is a need to either fully or partially execute and enforce digital legal agreements on the blockchain. An independent, execution platform trusted by all the involved participants is needed to execute digital legal agreements. How can blockchain execute and enforce digitised legal agreements? - Authoritative source – A valid mapping is required between a legal contract and its corresponding smart contract so that the smart contract can correspond with the authoritative legal contract. - Secure storage – Blockchain provides a trustworthy data storage to keep the legal agreement. - Secure execution – Blockchain provides a trustworthy computational platform that can execute digital agreements to enforce certain conditions as defined in a legal contract. First, create a smart contract to enforce all or part of the conditions defined in the legal agreement. The smart contract should also have a variable to link and verify the corresponding legal contract. By default this variable should be set to null. Second, deploy the smart contract on the blockchain. Third, include the smart contract address in the legal agreement. Forth, calculate the hash value of the legal contract. Finally, update the smart contact’s variable that links to the legal contract with the hash of the contract. Legal and smart contract pair pattern By binding a physical legal agreement with a smart contract, the bridge between the off-chain physical agreement and the on-chain smart contract is established. The bidirectional binding shows the intended mapping between the legal agreement and smart contract. The smart contract digitises some of the conditions defined in the agreement. These conditions can be checked and enforced automatically by the smart contract. However, not all legal terms can be digitised. The smart contract can also facilitate automated regulatory compliance checking, but the extent of this might be limited depending on the data represented on the blockchain and on constraints of smart contract programming language. - Automation – Some of the conditions defined in the legal contract such as a conditional payment can be automatically executed or enforced by the blockchain. - Audit trail – Blockchain permanently records all historical transactions related to the legal contract and the contract itself. This immutable data enables auditing of the contract and its execution. - Expressiveness – Smart contracts are written in programming languages. These programming languages might not be able to express all contractual terms or regulatory compliance conditions. - Enforceability – If a public blockchain is used, there is no central administering authority to decide on disputes nor to enforce court judgments on-chain. - Interpretation – There might be many possible ways to interpret contract conditions and encode them in smart contracts. Ambiguity in natural language makes it a challenge to accurately implement legal terms in a way that will be agreed upon by all the involved participants. - Hash on-chain pattern is used to store a hash on the blockchain - The Smart Contract Template proposed by Barclays uses legal document templates to facilitate smart contracts running on R3 Corda blockchain platform. - Specific proposals for the representation of machine-interpretable legal terms have been explored in KWM’s project on digital and analogue (DnA) contracts and in the Accord Project. - OpenLaw is a platform that allows lawyers to make legally binding and self-executable agreements on the Ethereum blockchain. The legal agreement templates are stored on a decentralised data storage IPFS. Users can create customised contracts for specific uses.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474659.73/warc/CC-MAIN-20240226094435-20240226124435-00052.warc.gz
CC-MAIN-2024-10
4,463
20
http://aikiwolfie.blogspot.com/2008/08/dell-studio-hybrid.html
code
stackable multimedia rack idea over on IdeaStorm. Okay I might be stretching that a bit. But it's almost like it. I like the interchangeable sleeves. The fashion conscious will love that feature. The slot loading DVD drive is another nice touch. In fact there are quite a few storage options packed into the hybrid. Including USB ports for flash drives and an SD card reader. The inclusion of a HDMI port is also a nice touch. It will allow consumers to integrate the Hybrid seamlessly right into the home entertainment experience. I didn't notice it on the UK page, but apparently there's a TV decoder option as well. So people can use one machine for watching TV, listening to music, surfing the web, dealing with e-mail, recording/pausing live TV, playing DVDs (don't know about Blue-ray) and playing casual games. Tetris, Solitaire that sort of thing. The Studio Hybrid only gets Intel X3100 graphics and a 5400RPM hard drive. The Intel graphics rule out high caliber resource hungry PC games. The slow hard drive might impact on recording Live TV. I guess it'll depend on what sort of quality you're willing to accept. But if you're plugging your Hybrid into a large LCD I'd say forget recording from the TV. Overall I think Dell have made a good attempt here. It's a better option than previous attempts to build a desktop from laptop components. The XPS One and the XPS M2010 are more capable in the graphics department. But they're also tethered to their displays making them less adaptable and less able to integrate into the home environment. They were essentially still desktop PCs. The hybrid is a device. A set-top box almost. The final drawback is Windows Vista. Dell insists on selling the Hybrid with Vista because as we all know Dell "Recommends Vista". Which is of course nothing to do with how good Windows Vista is. Well selling it with Vista means you need to take the most powerful configuration you can afford to get the best performance out of it. If it were being sold with Ubuntu we could get away with maybe 1GB of RAM instead of a minimum of 2GB. For Vista I'd recommend taking the full 4GB which of course will only give you 3.5GB because the "Wintel" feature that's meant to get you the rest doesn't work. But in fairness Dell do point out only 3.5GB will be available.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512592.60/warc/CC-MAIN-20181020055317-20181020080817-00229.warc.gz
CC-MAIN-2018-43
2,299
8
https://goodselects.com/art-of-debugging-in-web-programming-2023/
code
Debugging is an essential skill for any web programmer. It is the process of identifying and fixing errors or bugs in a program. While debugging may seem like a tedious and frustrating task, it is also an art form that requires patience, creativity, and problem-solving skills. In this article, we will explore the best of Art of Debugging in Web Programming strategies and tools that can help web programmers master the art of debugging. Art of Debugging in Web Programming One of the key strategies in successful debugging is having a systematic approach. When encountering a bug, it is important to first understand the problem and gather as much information as possible. This includes examining error messages, checking logs, and reproducing the issue. By doing so, programmers can narrow down the scope of the problem and identify potential causes. Once the problem is understood, it is crucial to devise a plan of action. This involves breaking down the code into smaller parts and testing each component individually. By isolating the problematic code, programmers can pinpoint the exact location of the bug and understand how it affects the overall program. This step often requires a deep understanding of the programming language and frameworks being used. In addition to a systematic approach, effective debugging also relies on the use of appropriate tools. Modern web development environments offer a wide range of debugging tools that can simplify the process. These tools provide features such as breakpoints, step-by-step execution, variable inspection, and error tracking. By utilizing these tools, programmers can gain valuable insights into the state of their code at different stages of execution and quickly identify and resolve issues. Another valuable tool in the debugging arsenal is the use of logging frameworks. These frameworks allow programmers to insert log statements at specific points in the code to track the flow of execution and monitor variable values. By strategically placing log statements, developers can trace the execution path of the program and identify any unexpected behavior. Logging frameworks often provide various logging levels and output options, making it easier to customize the debugging experience based on specific needs. Furthermore, version control systems play a significant role in effective debugging. By utilizing version control, programmers can keep track of changes made to the codebase over time. This not only helps in identifying when a bug was introduced but also enables programmers to revert to a known working state if necessary. Version control systems also facilitate collaboration among team members, allowing for efficient bug tracking and resolution. In conclusion, debugging is an art form that requires a systematic approach, creativity, and the use of appropriate tools. By following a methodical process and utilizing tools such as browser developer tools, logging frameworks, and version control systems, web programmers can enhance their debugging skills and resolve issues more efficiently. Mastering the art of debugging not only improves the quality of web applications but also contributes to the overall success of web development projects.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00356.warc.gz
CC-MAIN-2024-10
3,230
8
https://www.animationmentor.com/blog/tag/student-showcase/
code
Watch the best 3D animation student work taught pro animators from Disney, Pixar, and DreamWorks from the original online animation school. student showcase Articles Watch some of the best student animation work from the premiere online animation school! Taught my pros from major studios. Haokun Liang is a graduate of both our Character Animation Program and Animals & Creatures:...
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100308.37/warc/CC-MAIN-20231201215122-20231202005122-00692.warc.gz
CC-MAIN-2023-50
384
4
http://www.codango.com/asp/dir/books/basic/
code
More Subcategories Available | Visual Basic [+] Favor-It | | ||Sort By: 1001 Visual Basic Programmer's Tips takes the programmer from square one with Visual Basic. The book teaches the ins and outs of the visual Basic toolset and focuses on code, code, and more code. This book boils down the essentials of the VB and VBA languages into a single volume, including undocumented and little-documented areas essential to everyday programming. Revised and updated for DotNetNuke 4, this renowned book is your indispensable guide to creating content-rich websites with DotNetNuke, as quickly as possible.A practical guide to creating, maintaining your own DotNetNuke website,developing new modules. Icon Key > - Recently Updated - Showcase Listing
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929803.61/warc/CC-MAIN-20150521113209-00019-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
742
9
https://amazon.developer.forums.answerhub.com/questions/63769/lwa-web-api-for-drs.html
code
Following the steps found here. The POST to https://api.amazon.com/auth/o2/token to request refresh/access tokens has a code verifier listed as one of the parameters. I believe the code verifier needs an accompanying challenge code but I don't see where that's used. I looked up the Authorize API and see it has a state param. Is that where the code challenge needs to be passed in? On the other hand in the Mobile SDK i see a code challenge passed into the Authorize API and a code verifier used to request tokens and a client secret isn't used in requesting tokens. Can the web API work similarly?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662509990.19/warc/CC-MAIN-20220516041337-20220516071337-00754.warc.gz
CC-MAIN-2022-21
599
2
http://www.horseforum.com/western-riding/training-horse-show-bosil-10172/
code
Does anyone know how you would start to train a horses in a bosil. She is green broken and I was just debating if I should show in a bosil or a bit. 1) should I show in a bosil and why??? 2) Do you get more or less points if you show in a bosil, in western pleasure??? 3) how do I start to train my horses in a bosil??? Hope you can help.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701987329.64/warc/CC-MAIN-20160205195307-00161-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
338
5