url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://forum.openmp.org/viewtopic.php?t=567
|
code
|
Use this forum to discuss the book: Using OpenMP - Portable Shared Memory Parallel Programming, by Barbara Chapman, Gabriele Jost and Ruud van der Pas Read the http://openmp.org/forum/viewtopic.php?f=8&t=465
for book info and to download the examples. Post your feedback about the book and examples to this forum
Is there a place on the web where errata feedbacks can be found ?
Thanks for asking. We do not have a formal errata mechanism in place, but I'm definitely interested in hearing your feedback.
Just running through the book (well written, concise, and complete) and just wanted to let you know of a small typo prior to the release of a future edition. Page 111, first sentence contains an undesired "is".
- Posts: 3
- Joined: Sat Sep 07, 2013 1:41 am
It's something I was looking for, thanks for this info
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363641.20/warc/CC-MAIN-20211209000407-20211209030407-00051.warc.gz
|
CC-MAIN-2021-49
| 816
| 8
|
https://nlp4breakfast.com/posts/1904.05862/
|
code
|
Link to paper: https://arxiv.org/abs/1904.05862
Creating speech recognition models is hard. The data are dense, noisy, and labels are expensive to generate at scale. Schneider et al. provide a scaleable approach to overcome these problems by encoding a large amount of audio data into an information-rich subspace. Once their encoder is trained, they can use it to represent audio data that is transcribed as a rich feature vector, and build speech recognition models that are really just decoders. Their results from this method are cutting-edge, cutting the word error rate by more than 20% compared to baseline models.
A major difficulty for creating vector representations of audio data is that the data is dense – your network needs to accurately model a continous distribution. The authors avoid this by training two networks:
The encoder network, that performs a lossy compression of the input audio data. As someone who has lost the better part of a year of his life to creating compression pipelines for dense data, this might be the most fascinating part of the paper to me. They train a convolutional neural network where each layer’s kernels have strides proportional to their size — wider convolutions take wider steps across the input data — with the resultant vector containing a feature representation of the data at a lower temporal frequency that the input. Essentially, they’re combining time steps of audio data in an information-dependent way.
Each encoded audio sample is fed into the context network, which mixes the latent feature representations together into a single
wav2vecvector. This means that a vector generated from time t in the audio file contains contextual information from t ± 90s around it.
To train this layered network, they employ a contrastive loss function. This means that the total network needs to distinguish a vector from the encoder layer at k steps in the future, from an encoded distractor audio sample where the distractor is drawn at random from somewhere else in the audio recording.
As mentioned above, encoding speech data in this way creates information-rich input to speech recognition models that really knock it out of the park. Using 1,000x less training data than the best known speech recognizer in the literature, they demonstrate several percentage-points better on standard test data. The fact that their network is fully convolutional means that their method can be performed at scale. Very exciting work!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056752.16/warc/CC-MAIN-20210919065755-20210919095755-00627.warc.gz
|
CC-MAIN-2021-39
| 2,484
| 8
|
http://www.coderanch.com/t/242477/java-programmer-SCJP/certification/imply
|
code
|
Yup. If B inherits from A, and A has an inheritable member c of type C, then B inherits that member and, therefore, B "has a" C. In the second case, however, the member is private so it is not inherited. Therefore, in that case, B doesn't have a C. [ July 18, 2003: Message edited by: Corey McGlone ]
Thank you Corey. I am getting is-a and has-a confused with class diagrams. I was thinking is-a is the inheritance arrow and has-a is the aggregation symbol. I first saw the terms is-a and has-a in the UML User's Guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398460263.61/warc/CC-MAIN-20151124205420-00228-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 519
| 2
|
https://pnysupport.freshdesk.com/support/solutions/articles/43000499541-is-there-a-utility-that-can-tell-me-if-my-video-card-is-operating-correctly-
|
code
|
DirectX Diagnostics is an application that can help check to see if there are any issues associated with your video as well as other devices. Click on the task bar where it says, "Type here to search," and then type dxdiag, and then click the dxdiag Run command. Now click the Display tab to look for any indication of video issues. Click the Exit button when finished. Also, SPECviewperf is a benchmarking application that may be downloaded for free from www.SPEC.org
Is there a utility that can tell me if my video card is operating correctly?
Modified on: Wed, 2 Feb, 2022 at 5:04 PM
Did you find it helpful?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474893.90/warc/CC-MAIN-20240229234355-20240301024355-00554.warc.gz
|
CC-MAIN-2024-10
| 611
| 4
|
https://www.sparrho.com/p/challenges-in-targeted-nanomedicine/288368/
|
code
|
I am enthusiastic and hard working person with a broad interest in health and disease related topics
Targetted drug delivery by nanocarriers is highly studied and some progress has been made. However only a few drug loaded nanoparticles have reached the market and the average target efficiency is still relatively low.
Nanocarriers for targeted drug delivery is extensively studied. But most of the nanocarriers does not reach its target and ends up in the liver or spleen where it is internalized by the phagocytes....
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300934.87/warc/CC-MAIN-20220118152809-20220118182809-00310.warc.gz
|
CC-MAIN-2022-05
| 520
| 3
|
http://cracklefeedback.com/about
|
code
|
Crackle Feedback is a website dedicated to independent artists, records and labels. I write reviews of albums that I like, I don't really bother with the stuff I'm not fussed over (hence the generally positive notices). I also write things about gigs and get bands that I like to write little articles for the site. That's it really. If you want to send us something then you can do it here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810617.95/warc/CC-MAIN-20200408041431-20200408071931-00120.warc.gz
|
CC-MAIN-2020-16
| 391
| 1
|
https://www.excelforum.com/excel-programming-vba-macros/926091-array-grouping.html
|
code
|
Actually, I decided I only need the Min and Max values in the array. I am uploading all of my workbook and including the code in the post: Example.xlsx As you can see in the Security List tab, I have sorted the table by Sub Industry Name by "Metal & Glass Containers". For each day, I want to find the min and max value for PE_RATIO, PX_TO_BOOK_RATIO etc. of each sub industry. The way Bloomberg sends the data: For each ticker (in my code it is k) it will get each day's data in each row (which is b in my code) and each column (a in my code) for the row. Then it will move to the next row (the next day). At the end it adds one k (the next ticker) and repeats the process. I need to find the tickers (k) with the max and min values for each day and display the ticker along with the price (PX_LAST) for the corresponding day for the securities which are the min and max. I need to do this for every sub-industry in the table on the Security List.
This is DataControl2:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00699.warc.gz
|
CC-MAIN-2022-40
| 970
| 2
|
http://chorasimilarity.github.io/chemlambda-gui/dynamic/fredkin.html
|
code
|
This is a universal gate which is reversible. It has three boolean inputs and 3 boolean outputs.
The mol file is fredkin.mol, which can be found in the gh-pages/dynamic branch of the repo.
In this demo the outputs are big circles coloured with green, purple and red and the interesting inputs are boolean terms, as translated from lambda calculus to chemlambda, with the termination nodes coloured with green and red. It is interesting to see how the small green and red circles arrive near the big green and red ones and how generally the Fredkin gate is destroyed after it achieves the goal.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526560.40/warc/CC-MAIN-20190720173623-20190720195623-00176.warc.gz
|
CC-MAIN-2019-30
| 593
| 3
|
http://pzwart3.wdka.hro.nl/wiki/User:Janis
|
code
|
How the visual representation of dreams has changed due to new technological possibilities in moving images? How media shapes our perception?
+ Aesthetic complexity
+ Viewers’ perception
How to visualize the shift between a dream and reality?
What kind of technological and aesthetic solutions can be used?
- changes in the content area
- changes of objects in the space
- changes of perspective
- changes of light
- double exposure, overlying images
- slow shutter, motion
- infinite zoom
- dolly zoom
- green screen
- 2.5 dimension
Setting up the sub questions
1)What kind of research material am I analyzing?
2)What are the visual tricks that I am going to examine and create a dictionary of?
3)How are the tricks and technology improved during the time?
My research is praxis and theory based. I am writing a description about my work process and development of it. During this trimester I am interested to explore the vocabulary of visual tricks that are used in moving images to make somebody believe that they are looking into a dream. Cinema is a visual language that shapes our perception of reality and fantasy, basically everything what is around us and also inside us. However, moving images presents only the illusion of the reality. It is very important to know the conceptual tools of visual story telling to represent ideas and stories. The shift between reality and a dream can be interpreted very differently but representation of it is more or less limited by cinematographic tools. The sublanguages of cinema are: the lens, visual design, composition, lighting, continuity, image control, movement, and point of view. It is a life long learning process to examine all of them in every detail that’s why cinematographers choose subjectively the ones that are more convenient and interesting for them to represent an idea. All the techniques and methods of filmmaking are adding layers of meanings to the content. In my case the content are dreams that are sort of our illusion already.
It is interesting to find out how technology and tricks in moving images have been used to make the viewer believe that the displayed content is a dream. Dream world is subjective for everybody but cinema has united the way, how do we interpret the shift from reality to the dream world with technical tools. We perceive the world in a film fundamentally different comparing to our eye perception.
For to understand how cinema makes us think I will create a dictionary of the visual tricks and tools. I am analyzing concrete movies that I have chosen in an time based way for to have the possibility to compare specific visualizations of dreams from 1930s 1960s and 2000s. In the practical part I am testing some tricks with my camera. Finally, I would like to collect single photographs or maybe make a series whose content will be inspired from the reality shift to a dream.
Brown B., Cinematography: theory and practice. Image making for cinematographers and directors. Second Edition, 2012 Oxford
Un Chien Andalou by Luis Buñuel and Salvador Dali (1929) http://vimeo.com/25076950
Spellbound by Alfred Hitchcock (1945) http://www.youtube.com/watch?v=xeldyzWF6zQ&feature=related 0:49-3:13
Vertigo by Alfred Hitchcock (1958) http://vimeo.com/14854451 5:40 - 7:00
Matrix by Andy Wachowski (1999)
Inception by Christopher Nolan (2010)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709224828/warc/CC-MAIN-20130516130024-00090-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 3,343
| 28
|
https://support.yeeflow.com/hc/en-us/articles/900001620823-Attachment
|
code
|
The Attachment field control enables your users to upload one or multiple files while submitting their data through your form. Your users can select the file from their device (in the device's local storage). The following is how a file upload field looks on a form:
Yeeflow allows all types of files to be uploaded and downloaded then. However only these type files, including Microsoft Office Suite and PDFs, can be viewed from web browser. The files that your users submit through your form are counted towards your account’s storage limit.
Add Attachment to the form
Firstly, find the Attachment control in the controls add panel. Then, drag and drop it into a section or container on your form.
Basic of the Attachment field
Open the Content > Basic block and set the Title's text of this Multiple Metadata control. For more information about Title for field control, please refer:
Understand the Title of field controls
Set the Associated variable for this Attachment control. When you add a new Attachment control, a default variable will be generated automatically. You can click the Edit Button to change the ID and name, or click the Reset button to bind this Attachment control to other existing variables. For more information, please refer:
Understand form controls and the associated variables / fields
Appearance of the Attachment field
Open the Content > Appearance block to set the appearance and layout of this Attachment control.
Show file type icon: Turn this ON to show the icon based on the file type.
Upload multiple: Turn ON this option to allow users upload multiple files.
Max count: Set how many files are allowed to be uploaded.
Display Title: Choose display or hide the label of this control. For more information, please refer: Understand the label of field controls
Allow comment: Turn on this option will allow users to add comments on this control.
Validation of the Attachment field
Open the Content > Validation block to set the properties of this Attachment control.
- Readonly: Turn this ON will make this field control as view only status.
- Required: Make it mandatory for your users to upload files in this field.
- Single file size limit (MB): Set the maximum size of one file that are allowed to be uploaded. 50MB is the maximum size allowed for a single uploaded file.
- Restrict file types: Use this option to restrict the types of files users may upload. If turn this option ON, the file picker will not allow files to be uploaded that do not match the specified filetypes.
- Default Value: You can update default file(s) here. If the attachment field is set as read only, users cannot change those default file(s), while if it's editable, users can remove the default file(s).
- Custom Validation: Set the custom validation rules. An error message that will display under your field when specified conditions become true. It will allow you to add any number of rules for validating your field. Learn more about the Custom Validation.
Action call of the Attachment field
Open the Content > Action block to call a pre-defined action from the dropdown list. This action will be triggered once the value of this image field is changed.
Style the Attachment field
- Columns Gap: Control the amount of space between each column.
- Rows Gap: Control the amount of space between each row.
- Width – Set the Width of the file container.
- Height – Set the height of the file container.
- Padding – Set the Padding of the file container in PX or %.
- Typography - Change the default typography options for the file name.
- Icon Size – Set the size of the icon for file type.
- Normal / Hover: Set different styles for normal state and hover state of the file containers. Styles below are supported to be set separately for Normal and Hover state.
- Color: Choose the color of the file name.
- Background Color: Set background color of the file container. By default, the background color is set as transparent.
- Border Type: Select the type of border, choosing from none, solid, double, dotted, dashed, or grooved.
- Radius: Set the border radius to control corner roundness.
Operation button – Set the custom styles for operation button
- Normal / Hover: Set different styles for normal state and hover state of the operation button. Styles below are supported to be set separately for Normal and Hover state.
- Color: Choose the color of the operation button.
- Background Color: Set background color of the operation button. By default, the background color is set as transparent.
- Margin: Set the Margin of the button in PX or %.
- Padding: Set the Padding of the button in PX or %.
- Typography: Change the default typography options for the button’s text
- Normal / Hover: Set different styles for normal state and hover state of the textbox. Styles below are supported to be set separately for Normal and Hover state.
- Color: Select the color of the button’s text
- Background Color: Select the button’s background color.
- Border Type: Select the type of border to use around the button
- Shadow: Set options to apply a box shadow on the button
- Alignment: Align the button to the left, center, right, or justified in relation to its column.
- Position: Select Start to display the upload button before the images, while select End to display the button after the images.
Style of title
Set the Title of field controls that are applicable to this control.
Set the Advanced options that are applicable to this control.
Please sign in to leave a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00382.warc.gz
|
CC-MAIN-2023-14
| 5,518
| 57
|
https://math.stackexchange.com/questions/2988411/monoid-in-the-category-of-endofunctors-and-monoid-as-a-category-with-one-object
|
code
|
All told, a monad in X is just a monoid in the category of endofunctors of X, with product × replaced by composition of endofunctors and unit set by the identity endofunctor.
At the same time a Monoid is a category with one object. Given a Monoid in the category of endofunctors of X as above, how do we get a category with one object from there? Please specify exactly what the object and the morphisms of this category are.
Followup question: Elements of the Monoid in the category of endofunctors
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.54/warc/CC-MAIN-20240418124808-20240418154808-00578.warc.gz
|
CC-MAIN-2024-18
| 500
| 3
|
https://jobalertshub.com/tcs-pune-data-engineer-or-analysts-posts/
|
code
|
Tata Consultancy Services (TCS) Pune Data Engineer/Analysts Posts | Bachelor's of Engineering/BCA | Apply Now
Tata Consultancy Services (TCS), a leading Information technology consulting company.
In the latest job announcement, TCS careers India announces job vacancies for Data Engineer/Analysts posts, with work location in Pune.
Under TCS Pune Hiring Data Engineer/Analysts 2021 Jobs, candidates having required skills in Data Analytics can apply.
The selected candidate will be recruited with a permanent and full-time job.
An Interested and qualified candidate has to apply through online mode.
Job Designation: Data Engineer/Analysts.
Job Code: 217314.
Education Qualification: Bachelor's of Engineering/BCA.
Experience Level: 3 to 10 years.
Job Location: Pune.
Apply Mode: Online.
- Experience in BIG Data technologies (Hadoop, Spark, Hive etc.) and scripting language like Python Scala etc. :
- Data engineering having Data Visualisation experience using tools like Power BI etc. :
- Create and maintain optimal data pipeline architecture,
- Assemble large, complex data sets that meet functional / non-functional business requirements.
- Identify, design, and implement internal process improvements: automating manual processes, optimizing data delivery, re-designing infrastructure for greater scalability, etc.
- Build the infrastructure required for optimal extraction, transformation, and loading of data from a wide variety of data sources using SQL and AWS ‘big data’ technologies.
- Build analytics tools that utilize the data pipeline to provide actionable insights into customer acquisition, operational efficiency and other key business performance metrics.
- Work with stakeholders including the Executive, Product, Data and Design teams to assist with data-related technical issues and support their data infrastructure needs.
- Keep our data separated and secure across national boundaries through multiple data centers and AWS regions.
- Create data tools for analytics and data scientist team members that assist them in building and optimizing our product into an innovative industry leader.
- Work with data and analytics experts to strive for greater functionality in our data systems.
How to apply:
Interested and qualified job applicants have to apply through online mode, by initially registering with TCS career portal and login in to apply.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103920118.49/warc/CC-MAIN-20220701034437-20220701064437-00198.warc.gz
|
CC-MAIN-2022-27
| 2,377
| 25
|
http://www.dotnetspark.com/links/8209-excel-2007asp-net-exception-using-workbooksadd.aspx
|
code
|
Hi,I am receiving the following exception when using the xlApp.Workbooks.Add() method with ASP.NET and Office 2007. Server Error in '/ExcelTest'
Microsoft Office Excel cannot open or save any more
documents because there is not enough available memory or disk space.
. To make more memory available, close workbooks or programs you no longer
. To free disk space, delete files you no longer need from the disk you are
unhandled exception occurred during the execution of the current web
request. Please review the stack trace for more information about the
error and where it originated in the code.
Exception Details: System.Runtime.InteropServices.COMException:
Microsoft Office Excel cannot open or save any more documents because
there is not enough available memory or disk space. There is plenty of disk space and memory on the servers. What's really strange is that it works OK when I specify a template with the Add method: .Workbooks.Add(Server.MapPath("~") & "\ReportTemplate.xls")So that's a workaround anyway...Below is a small sample I'm using to try and debug this problem.In a new web project, add a reference to Microsoft Excel 12.0 Object Library, add a button named btnGenerateReport, a label named lblStatus, and a Hyperlink named lnkExcelReport to Default.aspx and paste the
View Complete Post
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189534.68/warc/CC-MAIN-20170322212949-00400-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 1,313
| 12
|
http://stackoverflow.com/questions/8242320/smart-pointers-why-use-them-and-which-to-use
|
code
|
Now I've been reading quite a bit about smart pointers, and shared pointers seem like "perfect" in many cases. However I also read about cyclical reference or something like that? Where
shared_ptr can't be used? I'm having a difficult time undestanding this, can someone give a trivial example showing this?
Also I'm really wondering, what do weak_ptr's provide that normal pointers don't? - As they don't increase the reference count they give no guarantee that the memory they point at is still valid?
my personal project:
In a project I've 2 "global" containers (both containers are soon to be moved inside a class), both are filled with "objects". However both should "point" to the same object. An object can not exist outside those containers, and it should not be possible that one container does contain it, while the other doesn't.
Currently I simply use normal pointers for this, and have a
destroyObject method to manage the memory.
Is this good design? Should I use smart pointers?
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299877.5/warc/CC-MAIN-20150323172139-00213-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 993
| 8
|
http://www.geekstogo.com/forum/topic/32056-installedran-spybot-now-no-internet-help/
|
code
|
Came up with many items recommended for deletion.
(which I did)
Now I can't connect to the internet by network or by phoneline.
I tried to undo the work of spybot, but it comes up empty when I try to restore what was deleted. I thought I had saved the stuff it recommended deleting.
Any advice ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860570.57/warc/CC-MAIN-20180618144750-20180618164750-00482.warc.gz
|
CC-MAIN-2018-26
| 295
| 5
|
https://forums.miniscript.org/d/124-pig-dice-game-in-try-it
|
code
|
I thought some people might find this a bit of fun: Pig Dice game in your browser.
In case you don't know the game, it's very simple: you take turns rolling a die, and accumulating points for your turn. You can stop at any time and keep the points you've rolled, but if you roll a 1, your turn is over and you gain nothing. First player to the goal (currently 32 points in this version) wins!
There's a version of Pig Dice in Mini Micro (in /sys/demo), but not all MiniScript users use Mini Micro. And anyway, I needed a version of the code that was considerably simpler — I'm working on a book for new programmers, and for this place in the book, I haven't introduced lists or maps yet. So I had to do the whole game with only
The result is a refreshingly simple bit of code that plays a fun little game. Give it a try!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655921988.66/warc/CC-MAIN-20200711032932-20200711062932-00025.warc.gz
|
CC-MAIN-2020-29
| 822
| 4
|
https://icefoxzettai.itch.io/by-the-bonfire
|
code
|
By The Bonfire -BATTLE SYSTEM PROTOTYPE-
A downloadable game for Windows and Linux
-WORK IN PROGRESS-
This project is still in development, currently only the basic combat cycle (victory, defeat and escape) with the basic commands (Act - Attack and Defend) are implemented, it's a prototype meant for testing, any feedback about the system is appreciated!
- Arrow Keys: Move
- Z: Accept
- X: Cancel
- Download the .zip, extract the files and open ByTheBonfire.exe.
- Download the .zip, extract the files, change ByTheBonfire.x86_64 's executable permissions in its properties, then open it.
- Testing!May 22, 2019
Leave a comment
Log in with itch.io to leave a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347425148.64/warc/CC-MAIN-20200602130925-20200602160925-00255.warc.gz
|
CC-MAIN-2020-24
| 669
| 12
|
https://liniya-udachi.ru/4092wallpaper-not-updating-in-domain.html
|
code
|
NOTE: You may copy and paste the repository links below from this page into Kodi's File Manager.
up one page / level (parent) option, the following will work:1) Right Click in an empty space on the page you are on 2) Left click the page / path title in the top left corner of the page 3) Press the Backspace button on the keyboard 4) Press the Escape (esc) key on the keyboard NOTE: Some fixes for issues resulting from repo sites being gone.
For a guide to Installing Kodi in Ubuntu (Linux), See the section on doing exactly that, at the bottom of this very page.
Repositories are where all the Add-ons which give kodi it amazing abilities are.
Taught by MVP Stephanie Locke with a decade of BI and data science experience. For SQL Server Integration Services (SSIS) professionals responsible for developing, deploying, and managing data integration at enterprise-scale. Ever wanted to automate your busy work away, but you weren’t sure where to start?
Taught by Andy Leonard, published author, Data Philosopher, and Biml Hero from Farmville, Virginia. Drew Furgiuele’s done automation for over a decade, and he’ll teach you Power Shell in two days of hands-on labs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657176116.96/warc/CC-MAIN-20200715230447-20200716020447-00525.warc.gz
|
CC-MAIN-2020-29
| 1,173
| 6
|
https://www.osnn.net/search/222459/
|
code
|
I am behind the 8-ball. I like Quake & Quake 2.
I have just acquired the Quake2 Mission packs;The Reckoning and Ground Zero, but cannot install them.
I have Winquake ;patch-runs well.
Quake2 - but now can't play saved games (??)
I have visited Activision site to find solution, but 'manual...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058552.54/warc/CC-MAIN-20210927211955-20210928001955-00631.warc.gz
|
CC-MAIN-2021-39
| 292
| 5
|
https://nw-digital-radio.groups.io/g/udrc/message/2849
|
code
|
I know of a timing problem in paclink-unix but the file sizes are in thetoggle quoted messageShow quoted text
10k to 20k byte range. Could you please send the file you are trying to
send as an attachment to my personal email address, not the udrc
group. Also copy/paste the entire console session output so that I can
replicate your problem.
The AX.25 frame size is set in /etc/ax25/axports configuration file and
should be 255 bytes.
I only use direwolf as a sound modem. You should NOT be setting any
AX.25 parameters there.
Regarding Winlink message file sizes:
From a google groups thread (Adam KF7LJH)
ARES typically recommends no more than 5KB winlink messages. More than
than can risk your radio (and the gateway's radio) since the output
finals can get so hot because of the long transmission time.
Attachments are generally a bad idea with winlink. Keep it plain text
From the Winlink site:
Message size maximum, including Attachments: 120000 bytes (compressed)
I am sending/receiving Winlink messages using a Raspberry pi with the
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038060927.2/warc/CC-MAIN-20210411030031-20210411060031-00047.warc.gz
|
CC-MAIN-2021-17
| 1,040
| 18
|
http://stackoverflow.com/questions/19754375/why-does-zsh-send-fail-midway
|
code
|
I'm trying to copy a 600GB zfs thus:
zfs send -Rv backup@20131101 | zfs receive -vF nov13
It starts fine, but 3 hours into the process fails thus:
18:17:10 8.50G backup@zfs-auto-snap_hourly-2013-10-30-1817 18:17:12 8.51G backup@zfs-auto-snap_hourly-2013-10-30-1817 18:17:13 8.52G backup@zfs-auto-snap_hourly-2013-10-30-1817 TIME SENT SNAPSHOT 21:05:07 41.3K backup@zfs-auto-snap_hourly-2013-10-30-2117 21:05:08 41.3K backup@zfs-auto-snap_hourly-2013-10-30-2117 21:05:09 41.3K backup@zfs-auto-snap_hourly-2013-10-30-2117 21:05:10 41.3K backup@zfs-auto-snap_hourly-2013-10-30-2117 21:05:15 41.3K backup@zfs-auto-snap_hourly-2013-10-30-2117 cannot receive new filesystem stream: invalid backup stream warning: cannot send 'backup@zfs-auto-snap_hourly-2013-10-30-2117': Broken pipe TIME SENT SNAPSHOT warning: cannot send 'backup@zfs-auto-snap_hourly-2013-10-31-1017': Broken pipe TIME SENT SNAPSHOT warning: cannot send 'backup@zfs-auto-snap_hourly-2013-10-31-1117': Broken pipe TIME SENT SNAPSHOT warning: cannot send 'backup@zfs-auto-snap_hourly-2013-10-31-2117': Broken pipe .... warning: cannot send 'backup@zfs-auto-snap_hourly-2013-11-01-1317': Broken pipe TIME SENT SNAPSHOT warning: cannot send 'backup@zfs-auto-snap_hourly-2013-11-01-1417': Broken pipe TIME SENT SNAPSHOT warning: cannot send 'backup@20131101': Broken pipe 19292 broken pipe zfs send -Rv backup@20131101 | 19293 exit 1 zfs receive -vF nov13
I tried it again, with the same result.
Is there a size limit for pipe?
This is on ubuntu linux, using zsh.
Finally, why is the following not an acceptable title:
zfs send/receive fails midway
It's possible but not certain that zsh is the problem. However it's also possible that send and receive have a maximum size,or some other problem. I posted here in order to get people's accumulated wisdom about that.
Even info of the form, "I transferred 10TB with csh", or, "try mbuffer to prevent a rare resource starvation in the kernel", would be useful.
The general problem is that my hardest problems tend to occur when several systems are combined. The fun starts when each system, considered in isolation, has no bugs. However, they make some slightly different assumption (and don't document that because their assumption is obviously, to them, the only way to go). So, the combo fails. However, handling that is outside this group's charter.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736680773.55/warc/CC-MAIN-20151001215800-00037-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 2,359
| 12
|
http://cloudcomputing.sys-con.com/node/2454920
|
code
|
|By Business Wire||
|November 20, 2012 03:07 PM EST||
Linden Lab, the makers of shared creative spaces including Second Life® and PatternsTM, today announced that Creatorverse is now available for AndroidTM devices on Google Play. Linden Lab recently also released the app for iPad on the App Store, and for Kindle Fire and Kindle Fire HD on Amazon.
Creatorverse is a two-dimensional shared creative space, a digital canvas on which you can build unique creations, set them in motion, and share them with the world to enjoy and remix. You become an inventor as you draw, stretch, shape, and color your creations, and then add joints, forces, motors, teleporters, and inputs that change how your inventions come to life on the screen. You can save your inventions locally or share them to the cloud for other users to enjoy and remix into their own unique creations. A video introduction and screenshots are available at Creatorverse.com and LindenLab.com.
“It’s been gratifying to see the positive response to Creatorverse since we first launched it,” said Rod Humble, CEO of Linden Lab. “Creatorverse users on iPad and Kindle Fire have already made and shared some incredible and fun things, from games to interactive art, and we’re excited to now make the app available on Google Play so that even more people can enjoy this shared creative space.”
Creatorverse is now available for Android devices on Google Play for $4.99 at: https://play.google.com/store/apps/details?id=com.lindenlab.creatorverse
Android and Google Play are trademarks of Google Inc.
iPad, iPhone, and iPad touch are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.
Amazon and Kindle Fire are trademarks of Amazon.com, Inc. or its affiliates.
About Linden Lab
Founded in 1999 and headquartered in San Francisco, Linden Lab makes shared creative spaces that inspire and empower users to explore and share their creativity with others.
In 2003, the company released Second Life, the pioneering virtual world filled by the unique creations of its users, who can build anything they can imagine, socialize with others from around the world, and share or sell their creations in a thriving real-money marketplace.
In 2012, Linden Lab is expanding its portfolio to include four new digital entertainment products, including Patterns, a new 3D universe for users to shape, and Creatorverse, a tablet game that allows user to set their creativity in motion.
For more about Linden Lab, its products, and career opportunities please visit LindenLab.com.
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Jan. 20, 2017 08:45 PM EST Reads: 4,356
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jan. 20, 2017 06:30 PM EST Reads: 5,449
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
Jan. 20, 2017 05:45 PM EST Reads: 2,089
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at Logz.io, will explore the value of Kibana 4 for log analysis and will give a real live, hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He will examine three use cases: IT operations, business intelligence, and security and compliance. This is a hands-on session that will require participants to bring their own laptops, and we will provide the rest.
Jan. 20, 2017 05:15 PM EST Reads: 4,949
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Jan. 20, 2017 05:15 PM EST Reads: 3,805
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
Jan. 20, 2017 05:15 PM EST Reads: 3,534
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, will highlight the current challenges of these transformative technologies and share strategies for preparing your organization for these changes. This “view from the top” will outline the latest trends and developm...
Jan. 20, 2017 04:45 PM EST Reads: 1,077
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Jan. 20, 2017 01:30 PM EST Reads: 5,235
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Jan. 20, 2017 01:30 PM EST Reads: 3,596
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Jan. 20, 2017 01:30 PM EST Reads: 5,732
SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...
Jan. 20, 2017 01:00 PM EST Reads: 2,577
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Jan. 20, 2017 12:30 PM EST Reads: 4,348
Discover top technologies and tools all under one roof at April 24–28, 2017, at the Westin San Diego in San Diego, CA. Explore the Mobile Dev + Test and IoT Dev + Test Expo and enjoy all of these unique opportunities: The latest solutions, technologies, and tools in mobile or IoT software development and testing. Meet one-on-one with representatives from some of today's most innovative organizations
Jan. 20, 2017 12:30 PM EST Reads: 1,651
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Jan. 20, 2017 12:30 PM EST Reads: 3,189
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and E...
Jan. 20, 2017 12:15 PM EST Reads: 5,839
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
Jan. 20, 2017 11:30 AM EST Reads: 775
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
Jan. 20, 2017 10:45 AM EST Reads: 6,093
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
Jan. 20, 2017 10:45 AM EST Reads: 3,705
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Jan. 20, 2017 09:45 AM EST Reads: 2,936
"This week we're really focusing on scalability, asset preservation and how do you back up to the cloud and in the cloud with object storage, which is really a new way of attacking dealing with your file, your blocked data, where you put it and how you access it," stated Jeff Greenwald, Senior Director of Market Development at HGST, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jan. 20, 2017 09:45 AM EST Reads: 5,521
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280899.42/warc/CC-MAIN-20170116095120-00509-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 12,385
| 54
|
https://www.leonardobighi.com/how-i-organize-my-life-in-plain-text/
|
code
|
Yesterday I talked about my dislike for proprietary formats for my notes. Now it’s time to explain how I organize my notes, documents, tasks, etc.
If you didn’t read the previous post, here’s the summary: I use only plain text for my notes and tasks, saved in a Documents directory synchronized by Dropbox.
In my system I store the following information:
- Notes that I check all the time
- References that I may need someday (about my house, my car, etc)
- Notes about completed/abandoned projects
- Tasks I have yet to do
- Tasks I’ve done
- My personal and professional journal
- Important documents (invoices, contracts, etc)
How I organize my notes
I have a lot of notes. I write down every information that I (may) have to remember (even if just for a couple days). My license plate, my phone’s IMEI, ideas for a new book, a TV show suggested by a friend, terminal commands that I learned, how I solved a hard problem. The list goes on.
The most important thing is that all my notes are inside my directory
Kinds of notes
I classify my notes under two categories: notes and references.
References are information that I save to check someday, but I don’t access regularly. Examples: my license plate number, the IP address of every device in my own network, the measurements of every room in my house, what shoe size my wife wears.
Notes are more general that are not only reference. Notes are the ones I am going to view and edit more frequently, and may not last that long. Examples: lists of ideas, movies recommended to me, my grocery list, books I want to buy.
My notes and references can also be related to a specific project that I’m working on.
When I’m writing down information relative to a specific project, there’s no reason to leave it in the middle of my general notes. I have a Projects folder, and inside it I create a folder with the name of the project. This I where I save these notes.
I do that for projects on my day job, but also my personal projects. If a project needs its own notes, that’s where I keep them. I don’t need to see these notes all the time.
When the project is done (or is abandoned) and I don’t need the notes anymore, I don’t delete the folder. I move the entire project folder to my Archive folder.
I will probably never need those notes again, but you never know. This way I can keep them for future reference if needed, while keeping my Projects folder uncluttered.
I am talking about all that organization, but it’s important to make it clear that the majority of my notes is just sitting directly under my documents folder, not inside any project. I have much more general notes than I have project notes.
There is one thing that is true for all my notes, no matter if Notes or References, general or related to a project. All of them are written in Markdown.
Markdown is not a specific format. We can say it’s a syntax, a style of writing plain text files. If you follow the Markdown syntax, your text can be transformed into a pretty HTML rich-text file when needed.
Markdown is just plain text with some unobstrusive markup, like *double asterisks to bold*, or _underscores_ to italicize. There are also markups for headers, links, images, tables, etc.
This is the best of both worlds. You can have a readable and organized plain text file, while also having the option to turn it into HTML or DOC if you need formatting (bold, italics, images, headers, etc).
How I organize my tasks
After reading all that, it shouldn’t surprise you that I also keep my task list in plain text.
Similar to Markdown, I use what we could call “rich plain text”, or plain text created in a specific way to allow apps to read it too.
The idea is simple: every line in the text file is a task. Tasks can have a context marked like @context, and they can be assigned to a project by writing +project.
You can also start the line with (A), or (B) or any other letter in the alphabet to define the priority of that task. And that’s mostly it. Simple and easy, readable to humans and machines.
(A) Clean blood stains on the floor @home +body (B) Hide the body in a bag @home +body (C) Sell my chainsaw on ebay @computer +body Look for a new room mate on craigslist +apartment Buy new lamp @errands
Using that simple markup I can read and edit my tasks on any text editor available to me. Or I can use Todo.txt apps that present the information in a more organized manner.
Whatever the case, I can always see what my tasks are, no matter what device I’m using.
This is a great example of how I can use an app to help me do stuff (The Todo.txt compatible apps) while still having control over all my files and its contents.
There is one more nice Todo.txt feature that I use all the time. When a task is done, all you have to do is put an “x” at the beginning of the line. And then apps can move that task to a done.txt file (or you can do it manually if not using an app).
This way your task list stays clean, and you have a history of all the tasks you have done in the past.
If you do weekly or monthly reviews, it helps a lot.
How I organize my journal
One more thing: my journal is also a plain text file. Shocking!
My journal is a single journal.txt file with all the entries one after the other.
And just like the above examples, this is also handled by an app but in a format that I can read and edit manually if needed. I use a terminal app called jrnl. It offers a handful of terminal commands to write to my journal, review previous entries, and even find by tags or date.
But in the end it’s a simple plain text file, giving me the peace of mind of knowing I never lose the information I saved in there.
Last but not least, there is one more thing I save in my Documents folder: scanned versions of paper documents.
I have a scanned copy in PDF of all of my documents. My ID, driver’s license, and the many documents the Brazilian government expect you to carry with you.
I also scan and save purchase receipts, invoices, bank statements, contracts I signed. Every important document that I have on paper I also have on my Documents folder.
And for those files, there’s no way to use plain text. For them, I use a file format that is so supported by so much open source projects that there’s no way it’s going to fall out of the Earth any time soon: PDF.
PDF files allow text and image. I can annotate it, I can highlight text. But the important thing is that it has images and doesn’t take much space.
So all my paper documents are scanned, OCR’d and saved in PDF.
Apps that I use
Everything is a few clicks away
There are some things in commom between all those kinds of documents I keep:
1) All of them are always available to me, no matter if I’m at home or out on the streets.
2) I can access any of those files from any device. A desktop, laptop, phone, tablet, or even someone else’s computer with a web browser.
3) They will be readable for years to come, no matter what companies die, what servers are turned off, what services become too expensive for me to pay.
If the most important characteristic of a notes system is being available when you need (and I think it is), then this is a great system.
Keeping my notes for decades
I’m only going through all this trouble of making my own system because I want to keep all my notes for as long as I can. I want these notes to serve as a history of my life. I wish I started doing this much sooner, so I could look back in time to what kind of information I was recording when I was younger.
But now I know that I can look back, five years from now, and see what tasks I was doing, what I was worried about, what were my dreams and troubles in my own words.
Whatever I want to do with the information, I know it will be there waiting for me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00846.warc.gz
|
CC-MAIN-2023-50
| 7,802
| 61
|
https://laptop-support.co/how-to-resolve-outlook-sync-issues/
|
code
|
How To Resolve Outlook Sync Issues
The main motive of Outlook sync is that it allows the user to work in an offline mode or when the user faces any issues with respect to the network connectivity, it keeps all data saved in an OST file that synchronized with MS Exchange Server automatically. In some situations, the OST unable to synchronize itself and does not update any change in the offline mode and display an error message “cannot open the Outlook” or “the set of folders cannot be opened”. This error occurs if the .ost file is corrupted. Follow the steps below to resolve outlook sync issues.
- First, check whether the offline folder is being synchronized correctly or not. Right-click the folder that you want to verify and click the Properties option. Click the Synchronization tab and verify the settings under the Statistic for this folder.
- If the synchronization is working accurately, the number of items in the Server folder and in the Offline folder should be same. If it is not exact, follow the steps below and resolve outlook sync issues.
- For Outlook 2003 version, click E-mail Accounts on the Tools menu. The E-mail Accounts dialog box opens. Check whether the View or change existing e-mail accounts option is selected under the E-mail section and click Next.
- Assure that Mailbox-account name is selected in the Deliver new mail to the following location list. Click Microsoft Exchange Server object and click Change. Make sure the Use Cached Exchange Mode is selected and click Next. Click Finish and Ok. Finally, exit and reopen the outlook.
- For Outlook 2007 version, click the Account Settings option on the Tools menu. Assure that the Mailbox-account name is set to default in the Data Files tab. Click the E-mail tab. Click Mailbox-account name and click the Settings option.
- Verify that the Use Cached Exchange Mode is selected in the Advanced tab and click Ok. Click Close to exit the Account Settings dialog box. Exit the outlook and reopen the Outlook and check if the process to resolve outlook sync issues is solved.
- For Outlook 2010 version, select the Account Settings on the File menu. Choose Account Settings from the list. Check whether the Mailbox-account name is set as default in the Data files. Click the E-mail tab. Select the Change option from Mailbox-account name.
- Make sure the Use Cached Exchanged Mode is selected in the account dialog box and click Close to exit the account settings dialog box. Exit the outlook and open the Outlook and check the issue is solved.
- After you check the above settings, synchronize the folder again either by manual or by automatic synchronization. To do manually, click the folder to synchronize in the Folder List pane. Click Send/Receive on the Tools menu and click This Folder to synchronize.
- To synchronize automatically, click Options on the Tools menu. Click the Mail Setup tab. Select the Send immediately when connected checkbox in the Send/Receive section. Click Send/Receive. Assure that Perform an automatic send/receive when exiting option is selected. Click Close and Ok to resolve outlook sync issues.
- Create a new .ost file and synchronize the folders. To create a new file, rename the old file and then synchronize the new .ost file with the computer that is running Microsoft Exchange Server. After creating a file you will notice the new synchronization in the lower-right part of the screen.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057861.0/warc/CC-MAIN-20210926114012-20210926144012-00264.warc.gz
|
CC-MAIN-2021-39
| 3,421
| 13
|
https://lzu.wapt77.space/wpf-project-source-code.html
|
code
|
GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together. If nothing happens, download GitHub Desktop and try again. If nothing happens, download Xcode and try again. If nothing happens, download the GitHub extension for Visual Studio and try again. WPF supports a broad set of application development features, including an application model, resources, controls, graphics, layout, data binding and documents.
WPF applications are based on a vector graphics architecture. This enables applications to look great on high DPI monitors, as they can be infinitely scaled. WPF also includes a flexible hosting model, which makes it straightforward to host a video in a button, for example. See the WPF Roadmap to learn about project priorities, status and ship dates.
WinForms is another UI framework for building Windows desktop applications that is supported on. NET Core. They are part of the Microsoft. WindowsDesktop SDK. We have published few tests and have limited coverage for PRs at this time as a result.
We will add more tests in andhowever, it will be a progressive process. Some of the best ways to contribute are to try things out, file bugs, join in design conversations, and fix issues. Issues with. They should not be filed on this repo. This code base is a fork of the WPF code in the. NET Framework. NET Core 3. NET Framework version.
Over time, the two implementations may diverge. The Update on. NET Framework 4. NET Core and. This update states how going forward. NET Core is the future of. This project uses the. Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting a project maintainer at conduct dotnetfoundation. You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message.Automatically switches between the dark and light theme of Windows Learn your custom layout quickly and easily by displaying your ErgoDox layout right from your desktop!
Sample WPF application using the new csproj format. NET Framework 4. Allows the traversal of inaccessible file systems. Socket hook is an injector based on EasyHook which redirect the traffic to your local server. Add a description, image, and links to the wpf-application topic page so that developers can more easily learn about it.
WPF Tutorial : Beginning
Updated Aug 8, C. RedBlue commented Oct 8, Read more. Updated Apr 10, C. Updated Mar 8, C. Updated Apr 9, C. Updated Aug 20, C. Updated Jan 4, C.GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Esp32 reset wifi credentials
If nothing happens, download GitHub Desktop and try again. If nothing happens, download Xcode and try again. If nothing happens, download the GitHub extension for Visual Studio and try again.
This repository accompanies Pro WPF 4. Download the files as a zip using the green button, or clone the repository to your machine using Git. Skip to content. Dismiss Join GitHub today GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together. Sign up.
Source code for 'Pro WPF 4.
C Other. Branch: master. Find file. Sign in Sign up. Go back. Launching Xcode If nothing happens, download Xcode and try again. Latest commit. Latest commit fcce Mar 28, Releases Release v1. Contributions See the file Contributing. You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Pro WPF 4. First commit. Oct 16, Updated Readme. Mar 28, First time here? If you are a developer or are interested in Microsoft tools and technology, please consider subscribing to the latest posts.
You may also be interested in my blog archivesthe articles sectionor some of my lab projects such as the C64 emulator written in Silverlight. In no particular order, here's a selection of interesting and recently maintained WPF projects I've found on CodePlex.
This is by no means a complete list, so if you have some favorites, please mention them in the comments. Using design patterns that embody important architectural design principles, such as separation of concerns and loose coupling, Prism helps you to design and build applications using loosely coupled components that can evolve independently but that can be easily and seamlessly integrated into the overall application.
These types of applications are known as composite applications.Consiglio regionale gl-©t-ig -0 -4310120g/
Prism includes reference implementations, QuickStarts, reusable library code the Prism Libraryand extensive documentation. This version of Prism targets the Microsoft.
NET Framework 4. Because Prism is built on the. The framework implements a variety of UI patterns for solving real-world problems. Designed to aid in the development of WPF and Silverlight applications, Caliburn implements a variety of UI patterns for solving real-world problems. It is a light and pragmatic framework that contains only the essential components needed. Chronos WPF I really like the look of this one. AvalonDock is a WPF controls library which can be used to create a docking layout system like that is present in VisualStudio.
It supports fly-out panes, floating windows, multiple docking manager in same window, styles and themes and it can host WinForms controls. It includes controls that are missing from the WPF Toolkit, or that have been ported over from the Silverlight Toolkit.
It also contains controls that I think are just nice to have. Visifire is a set of open source data visualization components - powered by Microsoft Silverlight and WPF. With Visifire you can create and embed visually stunning animated Charts within minutes.
Visifire is easy to use and independent of the server side technology. Being able to render and interact with webpages within WPF opens up some great opportunities.I have already put up a few articles on this topic, which basically deal with some specific problems.Tabulation method solver
As this is an article for beginners to intermediate level programmers, I will try to give as many basic examples as I can. I will also put a few reference links to each article of the series to make you navigate the other articles easily. As the name says all, WPF is actually a new framework introduced with.C# WPF Material Design UI: Dashboard
NET framework 3. It uses Direct3D rendering which employs graphics cards to render the output on the screen. Thus the drawing in the form will be smooth and also there is a chance to utilize the hardware capabilities installed in your machine. In case of traditional GDI forms application, it is not possible to use advanced graphics capabilities and hence Windows Forms application will always be inefficient in comparison to WPF.
Another important thing that I must address in this regard, GDI Windows forms application uses Operating system controls to build its application.
Thus it is basically very hard to customize them in your own application. WPF controls are actually drawn over the screen, and hence you can customize controls totally and modify their behavior when required. This is generally dependent on the hardware device and operating system in which the application runs and also how the DPI settings is applied on the Device.
Any user can easily customize these settings and hence make the application look horrible. Windows forms application uses pixel based approach so with changing DPI settings, each control will change its size and look. Let's look at how it is possible:. Let's say you have drawn a box, just like the one in the figure, which is 1 inch long in 96 dpi screen.
Now if you see the same application in dpi settings, the box will appear smaller. This is because the things that we see on the screen are totally dependent on dpi settings.
In case of WPF, this is modified to density based approach.Sequelize update association
That means when the density of pixel is modified, the elements will adjust them accordingly and hence the pixel of WPF application is Device Independent Pixel. As you can see in the figure, the size of the control remains the same in case of WPF application and it takes more pixels in case of DPI application to adjust the size properly.
WPF applications as being rendered within DirectX environment, it has major support of graphics and animation capabilities. A separate set of classes are there which specifically deal with animation effects and graphics. The graphics that you draw over the screen is also Vector based and are object oriented. That means, when you draw a rectangle in WPF application, you can easily remove that from the screen as rectangle is actually an object which you always have a hold on.
In a traditional Windows based application, once you draw a rectangle, you can't select that individually.GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together. If nothing happens, download GitHub Desktop and try again. If nothing happens, download Xcode and try again. If nothing happens, download the GitHub extension for Visual Studio and try again.
This repo contains the samples that demonstrate the API usage patterns and popular features for the Windows Presentation Foundation in the. NET Core for Desktop. All the samples have been retargeted to.Zag mer
NET Core 3. You can also find an archive of samples targeting. NET 4. The samples in this repo are generally about illustrating specific concepts and may go against accessibility best practices. However, the team has spent some time illustrating accessibility best practices in a subset of these samples. Please note that the documentation on the repo is still being updated, so all links might not point to the right location.
Unless otherwise mentioned, the samples are released under the MIT license. Help us improve out samples by sending us a pull-request or opening a GitHub Issue. These samples require Visual Studio to build, test, and deploy, and also require the. WPF on.
The easiest way to use these samples without using Git is to download the zip file containing the current version using the link below or by clicking the "Download ZIP" button on the repo page.
You can then unzip the entire archive and use the samples in Visual Studio For more info about the programming models, platforms, languages, and APIs demonstrated in these samples, please refer to the guidance available in MSDN. These samples are provided as-is in order to indicate or demonstrate the functionality of the programming models and feature APIs for WPF.
Skip to content. Dismiss Join GitHub today GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Jinja set global variable
Sign up. Repository for WPF related samples.
WPF MVVM step by step (Basics to Advance Level)
Rich Text Format Branch: master. Find file. Sign in Sign up. Go back.To develop the application, you'll use Visual Studio. By the end of the tutorial, you'll have built a standalone Windows application that allows users to view expense reports for selected people.
The application is composed of several WPF pages that are hosted in a browser-style window. You can toggle the code language of the sample code between C and Visual Basic by using the language selector on top of this page.
Visual Studio with the. NET desktop development workload installed. For more information about installing the latest version of Visual Studio, see Install Visual Studio. The first step is to create the application infrastructure, which includes an application definition, two pages, and an image. Open Visual Studio and select Create a new project under the Get started menu.
In the Language dropdown, select either C or Visual Basic. Select the WPF App. NET Framework template and then select Next. Enter the project name ExpenseIt and then select Create. Visual Studio creates the project and opens the designer for the default application window named MainWindow.
You also use this file to specify the UI, in this case MainWindow. This XAML file is the main window of your application and displays content created in pages.
The Window class defines the properties of a window, such as its title, size, or icon, and handles events, such as closing or hiding. This app navigates to different content depending on the user input. This is why the main Window needs to be changed to a NavigationWindow. NavigationWindow inherits all the properties of Window.
For more information, see Navigation overview. Remove the Grid elements from between the NavigationWindow tags. Set the Title property to " ExpenseIt ". Set the Height property to pixels. Set the Width property to pixels. This file is a code-behind file that contains code to handle the events declared in MainWindow. This file contains a partial class for the window defined in XAML. Your C code should now look like this:.
Enter the name ExpenseItHomeand then select Add.
Tutorial: Create your first WPF application in Visual Studio 2019
This page is the first page that's displayed when the application is launched. It will show a list of people to select from, to show an expense report for. Set the Title to " ExpenseIt - Home ". This sets ExpenseItHome. You can also set the Source property in the Miscellaneous category of the Properties window.
- Olx tractor moga
- C# .net
- Call of duty modern warfare 2019 random class generator
- Install sql injection tool for ios
- 3vze engine specs
- Waja modified
- Nfl datasets csv
- Hobbit pinball mods
- Reddit hacker thread
- Clp solver
- Metal slug 5 apk obb download
- Taccuino a5 pagine bianche
- Kerala house construction cost per square feet 2019
- Wreck on highway 61 mississippi 2020
- Cara download apk film semi
- When an aries man says i love you does he mean it
- Diy 48v power supply
- Trichome treats gummies
- Mbux engineering mode
- Kitov buyout
- Uppvidinge single
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057421.82/warc/CC-MAIN-20210923104706-20210923134706-00640.warc.gz
|
CC-MAIN-2021-39
| 14,133
| 69
|
https://chooselocalmc.com/new-events/2018/1/26/oil-painting-class-cx2fs-799nl-hdlyd-se6a9
|
code
|
This is for anyone who has a few photos they wish to do, but aren't sure how to approach. Sometimes what is left out is as important as what is in! How can we do backgrounds? How do I accomplish value? Etc..... Bring a few of those photos and each will choose one to be the challenge of the day.
For more information about this class and other classes we offer, visit our website!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647777.59/warc/CC-MAIN-20180322053608-20180322073608-00310.warc.gz
|
CC-MAIN-2018-13
| 380
| 2
|
http://www-01.ibm.com/support/docview.wss?uid=swg1JR51642
|
code
|
JR51642: /REST/BPM/WLE/V1/PROCESSAPPS API HAS POOR PERFORMANCE DUE TO A COMPLEX QUERY THAT IS EXECUTED
Direct links to fixes
Closed as fixed if next.
/rest/bpm/wle/v1/processApps API has poor performance due to a complex query that is executed multiple times. The individual query can take 5 to 10 seconds to run and it is executed multiple times to complete the task. The details about the REST API can be found in the infocenter: http://www-01.ibm.com/support/knowledgecenter/SSFPJS_8.5.5/com.i bm.wbpm.ref.doc/rest/bpmrest/rest_bpm_wle_v1_processapps_get.htm The query gets the details for all snapshots and process apps in the system. I also gets details about the instance counts even though they are not part of the REST API output. The query is executed multiple times even though it gets all of the data with one query. Frequently the query will slow down due to the number of instances in the system. The following warning message is printed to the SystemOut.log file if the call takes more than 60 seconds. The elapsed time for the following REST request was 65.51 seconds, which exceeds the warning threshold of 60 seconds: http://www.myhost.com:9080/rest/bpm/wle/v1/processApps You may see that multiple EJB calls are made to getInstalledSnapshots which contains a slow query. . .-------------------------------------------------- This is the query that is run select projects.name as projectName, projects.short_name as projectShortName, snaps.snapshot_id as snapshotID, snaps.branch_id as branchID, snaps.name as snapshotName, snaps.is_active as isActive, snaps.is_default as isDefault, snaps.is_installed as isInstalled, snaps.is_archived as isArchived, branchs.name as branchName, snaps.created_on as snapshotDeployedOn, bpds.name as bpdName, (select count(*) from lsw_bpd_instance i where i.execution_status in (1,6) and i.snapshot_id=snaps.snapshot_id and i.cached_bpd_version_id=bpds.cached_bpd_version_id and i.tip != 'T') as instancesRunning, (select count(*) from lsw_bpd_instance i where i.execution_status=3 and i.snapshot_id=snaps.snapshot_id and i.cached_bpd_version_id=bpds.cached_bpd_version_id and i.tip != 'T') as instancesFailed, (select count(*) from lsw_bpd_instance i, lsw_bpd bpd where i.execution_status in (1,3,6) and i.snapshot_id=snaps.snapshot_id and i.cached_bpd_version_id=bpd.version_id and i.tip != 'T') as snapshotInstancesRunning, projects.project_id as projectID from lsw_snapshot snaps inner join lsw_project projects ON snaps.project_id = projects.project_id inner join lsw_branch branchs ON snaps.branch_id = branchs.branch_id left outer join lsw_favorite bpds ON (snaps.snapshot_id = bpds.snapshot_id and bpds.item_type = 25 and bpds.exposed_process_type = 0) where snaps.name is not null and projects.is_toolkit='F' and (bpds.tip != 'T' or bpds.tip is null) order by snapshotDeployedOn DESC, projectName ASC, snapshotName ASC, bpdName asc
This problem will be fixed in next release.
Reported component name
Reported component ID
NoSpecatt / Xsystem
Last modified date
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Applicable component levels
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255182.37/warc/CC-MAIN-20190519221616-20190520003616-00494.warc.gz
|
CC-MAIN-2019-22
| 3,151
| 12
|
http://mharrschtechtimes.blogspot.com/2008/10/sharing-creativity-key-to-innovation.html
|
code
|
I found this article about Mr. Lee's spectacular creativity using the Wiimote extremely interesting. What impressed me most was his willingness to share his ideas. I hope his current employer (Microsoft) does not rein in this enthusiasm.
"IN December, Johnny Chung Lee, then a Ph.D. candidate, posted a five-minute video on YouTube that became an Internet sensation.
Contrast this with what might have followed from other options Mr. Lee considered for communicating his ideas. He might have published a paper that only a few dozen specialists would have read. A talk at a conference would have brought a slightly larger audience. In either case, it would have taken months for his ideas to reach others.Small wonder, then, that he maintains that posting to YouTube has been an essential part of his success as an inventor. “Sharing an idea the right way is just as important as doing the work itself,” he says. “If you create something but nobody knows, it’s as if it never happened.” - More
Although I have much more affinity for software applications than hardware applications, I couldn't help but admire the Wiimote VR project and hope Nintendo (or Microsoft) moves forward with its development. Some years ago at Comdex I evaluated several different VR headsets and most of them depended on manipulating the color spectrum in a way similar to the classic 3D glasses of the 50s did. Mr. Lee's approach is quite revolutionary. I wonder if the wearer experiences headaches or nausea like the old-style approach?
I also visited Mr. Lee's Wiimote Project discussion forum and watched a fascinating video about a guitarist using a Wiimote strapped to a guitar to create an instrument that uses the player's movement to modulate the frequency of the notes generated when the strings are plucked. If amateurs are coming up with these kinds of applications, I wonder what the pros at Nintendo have in store for all of us?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794870082.90/warc/CC-MAIN-20180527190420-20180527210420-00438.warc.gz
|
CC-MAIN-2018-22
| 1,928
| 5
|
https://lists.whatwg.org/pipermail/whatwg-whatwg.org/2009-August/064342.html
|
code
|
[whatwg] small element should allow nested elements
remy at leftlogic.com
Sat Aug 15 04:08:03 PDT 2009
On 14 Aug 2009, at 10:09, Ian Hickson wrote:
> I wouldn't bother wrapping any of the above as small print. If you're
> structuring this enough that you have numbered lists and paragraphs
> everything, then it's either not small print, or it shouldn't be.
As Aryeh said, my experience has been the inverse, this is small
print. I've got the terms and conditions for a competition, which is
small print for the whole thing. Currently I'm manually wrapping
every sentence in a small tag (as per my example).
For example, the BBC's web site is using the 62.5% rule, then by
default pages are shown in 1.2em. The exception being their terms
pages, which overrides the font size to 1em in a terms.css style
sheet. This is because they want the text to appear as small print.
Random blog post on the BBC (most, if not all pages are the same font
They're using CSS to visually create the small print effect on a large
amount of text. From my understanding of the HTML 5 spec, the right
semantics to use is the small element, but if they used it on their
existing terms page, in the way that the spec current outlines it
would bloat the page with the extra nested small element.
Wrapping the entire block in small (or individual blocks) would be
much more maintainable, and it would give the copy the right semantic
meaning. Is that correct?
> Allowing elements to wrap both inlines and blocks is a huge can of
> which has caused all kinds of problems for <ins>, <del>, and <a>. I
> don't want to start adding more elements to this list of complexity.
Is there any record of these issues. I know of 1 rendering issue that
Firefox has with nesting the section element inside the a element (but
I'm sure you're referring to previously solved issues).
I'd be happy to go through those issues and see if I can run tests
against the small element through each of the browser engines to see
if the issues still apply to small element.
I'm running a conference in Brighton on 20-Nov called:
More information about the whatwg
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358118.13/warc/CC-MAIN-20211127043716-20211127073716-00020.warc.gz
|
CC-MAIN-2021-49
| 2,111
| 35
|
https://stason.org/TULARC/os/linux-faq/082-How-Do-I-Keep-Track-of-Bookmarks-in-Netscape.html
|
code
|
This article is from the Frequently Asked Questions for Linux, the Free/Open Source UNIX-like operating system kernel that runs on many modern computer systems. Maintained by David C. Merrill with numerous contributions by others. (v1.0).
A: This probably applies to most other browsers, too. In the Preferences/ Navigator menu, set your home page to Netscape's bookmarks.html file, which is located in the .netscape (with a leading period) subdirectory. For example, if your login name is smith, set the home page to:
Setting up your personal home page like this will present you with a nicely formatted (albeit possibly long) page of bookmarks when Netscape starts. And the file is automatically updated whenever you add, delete, or visit a bookmarked site.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626008.14/warc/CC-MAIN-20210616190205-20210616220205-00126.warc.gz
|
CC-MAIN-2021-25
| 759
| 3
|
https://bugs.freedesktop.org/show_bug.cgi?id=4986
|
code
|
Can you add the following restrictions to the Apache configuration for the
openclipart site? It appears that .htaccess does not allow adding these
# Serve HTML as plaintext
AddType text/plain .html .htm .shtml
# Don't run arbitrary PHP code.
php_admin_flag engine off
# Disable other script types
<Files ~ "\.(php|php3|php4|phps|phtml|shtm|shtml|cgi|pl|pm|asp|cfm|js|jse|
deny from all
While we check that uploaded files are .svg's during upload, this would give a
stronger measure of security by preventing them from being executed.
To test the change, this URL: http://openclipart.org/incoming/contact.php
should return the php as non-executed plain text, not as a web page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703518201.29/warc/CC-MAIN-20210119072933-20210119102933-00407.warc.gz
|
CC-MAIN-2021-04
| 676
| 13
|
https://static.quibblo.com/quiz/9OEaNcY/Mary-Mary-Quite-ContraryPart-5Please-Read-Intro
|
code
|
Mary Mary Quite Contrary....Part 5~Please Read Intro
Sorry I haven't been able to make one in a long time. First I was grounded, then I had 5 model united nations speeches to write, then i was sick,on top of all my "Murder At The Prom" rehearsals, ect........lol. But here's part 5 and thanks for holding out for more than a week!
Hope you enjoy!!!!! :^D
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540548544.83/warc/CC-MAIN-20191213043650-20191213071650-00539.warc.gz
|
CC-MAIN-2019-51
| 354
| 3
|
https://www.udemy.com/master-angularjs/
|
code
|
The course covers all the basic and advanced topics.
We will be also developing a Single Page Course Based Website during this course.
Section wise code samples are also provided
So let's start learning...
Learn about Expressions and ng-bind directive
Learn about ng-model,ng-bind directives & Expressions
An introduction to Directives and Expressions
Learn about Built-in directives
Learn about ng-repeat and ng-src directive
Learn about various built-in filters
SkillBakery is one of the fastest growing online education company.
Our vision is to provide high quality education which is affordable and accessible to everyone
We believe that every one has their own way of learning and grasping things and that's why we provide self-paced HD quality contents,so you can learn what you love at your convinience
We currently offer courses in web development and will soon be publishing new courses in other categories as well
We are committed to bring courses on new topics and we try to release one new course every month
So keep visiting us, you will surely find something for yourself here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687447.54/warc/CC-MAIN-20170920194628-20170920214628-00590.warc.gz
|
CC-MAIN-2017-39
| 1,092
| 16
|
https://paragon2.livejournal.com/5695.html?nojs=1
|
code
|
Foreign addresses will be posted tomorrow morning. Delivery will depend on the speed of yak train, camel or shiny van used by the various mail carriers between Sheffield and the afore mentioned exotic parts.
One copy is being sent to each Adult and junior Member. Children and infants do not get a copy.
There are a small number of people (mainly walkins) for whom we do not have postal addresses. If you believe yours is one of these please email me on members[at]paragon2.org.uk obviously replace the [at].
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947421.74/warc/CC-MAIN-20180424221730-20180425001730-00388.warc.gz
|
CC-MAIN-2018-17
| 508
| 3
|
https://getrfc.com/keyword/2115
|
code
|
Documents related to 'jitter'
2002, RFC3246: An Expedited Forwarding PHB (Per-Hop Behavior)
2002, RFC3247: Supplemental Information for the New Definition of the EF PHB (Expedited Forwarding Per-Hop Behavior)
2006, RFC4696: An Implementation Guide for RTP MIDI
2020, RFC8802: The Quality for Service (Q4S) Protocol
2023, RFC9331: The Explicit Congestion Notification (ECN) Protocol for Low Latency, Low Loss, and Scalable Throughput (L4S)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00524.warc.gz
|
CC-MAIN-2023-40
| 438
| 6
|
https://briankeating.net/2013/06/default
|
code
|
- I’ve gotten my hands dirty,
- I’ve published v1.0 to the store
- I’ve gotten the best support I’ve ever seen from Xamarin
- I’ve gone back to Objective-C, BOOM!
Bindings drove me daft
The reason I walked away was that I found some nice Objective-C widgets I wanted to use. In order to use these in Xamarin I needed to either
- Port the source to c# (estimated 1 day)
- Create a library in XCode and a component binding in Xamarin Studio
The first option seemed like an approach I could achieve but did I really want to do this every time I found a nice new control.
The second option proved painful, there were some tools that didn’t work (beta tools of course), I wasn’t quite clear about the multi targeted library I was building etc. It was the straw that broke this camel’s back.
Now I’ve previously indicated that I’m not a seasoned ObjectiveC developer, but I’ve written a few app and some of them even made it to the app store, so for me it didn’t seem daunting…
I had a few obstacles to overcome:
Basic Auth: I’ve posted before when I started my Xamarin rants that it was a little painful to do Basic Auth, I wanted to use blocks as I like this approach and not the delegate approach, but this was a little painfully or at least it meant that I had to write my own classes, what I did in the end was revert to my old friend AFNetworking that supported exactly what I needed.
KeyStore: The Obj-C code is bloated and verbose and not intuitive, the Xamarin approach is so much easier.
Too many options or being a polyglot can be a PIA (and i’m not talking primary interop assembly), If I didn’t know objectiveC then I would have just figured out the Bindings faster and been happy.
What would I recommend to my fellow C# programmers…. Use Xamarin! I haven’t, but I’ve already invested many hours/days/weeks the language and 3rd party libraries, the mono stack gives you a lot of
this for free and you will be familiar with it from your .net background.
Also the app I’m currently working on is just collecting Json and displaying it, so it’s not very code intensive on the client. If when an Android version is done it will be in Java because I’ve programmed in Java for years too (hey I’m looking for an excuse (and the time) to try this new Android Studio).
Given a different use case I we may well have an even more compelling reason for using C# for both platforms with something like MVVM Cross and achieve a more DRY approach.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817033.56/warc/CC-MAIN-20240415205332-20240415235332-00514.warc.gz
|
CC-MAIN-2024-18
| 2,485
| 19
|
https://equipboard.com/items/arturia-v-collection-software-synthesizer-bundle
|
code
|
Found 0 artists
Analog Sound In A Digital Shell
I suppose it was just a matter of time before a software developer bridged the gap between the lush warmth of analog swells filling the room and the plasticity of algorithmic software synths, Arturia did this in spades. I was fortunate enough to check my email during the 2018 Black Friday sale and to my astonishment, They were offering the entire collection for the price of the Arp 2600 that I committed myself to. Now, I am not a mathmagician in any form or function but this was promising to be on the up and up. Since then in all honesty I've not really dived into the Buchla as I had anticipated, Rather I fell in amazment with the Yamaha CS-80 and on proper monitors sounds SICK AF.
I like the possibilites. If you are used to the original synths I recommend you check the manual before going in. If you aren't used to you still need to go into the manuals. Arturia did a great job adding functions and modulation options.
Close enough to the real thing
Having the actual hardware synths included in this bundle could run you tens of thousands of dollars. This is a great place to start, it's great for inspiration, the presets are actually good, easy to use, and my go-to synths for producing anything.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178365186.46/warc/CC-MAIN-20210303012222-20210303042222-00335.warc.gz
|
CC-MAIN-2021-10
| 1,259
| 6
|
http://haiweb.org/what-we-do/global-snakebite-initiative/
|
code
|
The Global Burden of Snakebite
Snakebite envenoming is a major—and massively neglected—public health challenge for many countries. The lack of reliable in-country data makes it difficult to know the true impact of snakebite, but at least 5.5 million people are bitten by a venomous snake every year. Of these, 2.7 million are serious cases that result in 400,000 disabilities and 125,000 deaths.
People who live in rural communities in some of the poorest countries on the planet are, by far, most greatly affected by the debilitating, even deadly, effects of snakebite. The cost of snakebite—to the social, economic and political fabrics of communities and countries—is enormous. Agricultural workers, who are often family ‘breadwinners’ and help drive local and national economies, are most often injured or killed by snakebite.
Effective antivenoms exist to treat snakebite, but the triple burden of poor availability, high prices and substandard quality of antivenoms prevent people from getting treatment. Access to good quality, robustly tested, safe and effective antivenoms is desperately needed.
To ignite international action on snakebite prevention and treatment, as well as the rehabilitation of snakebite survivors, the Global Snakebite Initiative (GSI) was established. Health Action International is the secretariat for GSI. Together, we are building support for snakebite to once again be recognised by the World Health Organization (WHO) as a highly neglected tropical disease. We are also urging the WHO and national governments to design and implement policies that improve snakebite data gathering and analysis, prevention and treatment. Our work also involves building capacity amongst civil society organisations and healthcare systems in snakebite-affected countries so they are better equipped to combat snakebite morbidity and mortality.
PREVIOUS EVENT: Health Action International and the Global Snakebite Initiative worked with the Government of Costa Rica to coordinate the first-ever member state side event on snakebite at the 69th World Health Assembly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463613738.67/warc/CC-MAIN-20170530011338-20170530031338-00238.warc.gz
|
CC-MAIN-2017-22
| 2,096
| 6
|
https://www.mpi-magdeburg.mpg.de/3562201/ARB-Klamt
|
code
|
Analysis and Redesign of Biological Networks
Major research interests
Research in my group lies at the intersection of biology, mathematics, informatics, and the engineering sciences. We develop and apply novel computational methods to better understand structure and function of biological networks eventually enabling us to modify cellular behavior in a rational manner. As one particular focus, we are interested in modeling and computational design of metabolic networks for (systems) metabolic engineering of microbial cell factories. To test model-based predictions, our group performs wet-lab experiments (genetic modifications, bioreactors fermentations etc.) with Escherichia coli, one of the most important model organisms serving as host in many biotechnological production processes. Our group developed the comprehensive MATLAB package CellNetAnalyzer which provides a graphical user interface and numerous algorithms for analyzing and designing biological networks. Overall, a long-term vision of the ARB group is to help pave the way for routine use of mathematical modeling and network analysis in biology, biotechnology, and biomedicine.
"We are currently looking for talented students interested in methods for the model-driven analysis and optimization of metabolic networks. He or she should have an excellent degree in Computational/Systems Biology, Biosystems Engineering, (Bio)Mathematics, Bioinformatics or related fields and ideally have some experience with kinetic modeling as well as wet lab experiments."
Current PhD students in the IMPRS programm
(Nov. 7, 2018)
(Apr. 23, 2020)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00461.warc.gz
|
CC-MAIN-2023-14
| 1,607
| 7
|
https://gov.yearn.fi/t/voting-ui-suggestions/220
|
code
|
Voting page should have link to this governance forum.
The proposals should have a title/link to some place where you can see the proposal
Proposal should show when voting ends for a proposal so you know how long you have to vote.
Thanks for feedback! It is all in the list – takes time to implement.
Looking at the governance contract, it would be nice in future versions to have an emit for the voteFor and voteAgainst functions so it would be easier to construct a graph showing cumulative vote count over time (or at least do this in Dune Analytics easily).
Currently been looking at all vote events then working backwards to find the corresponding stake events
it would be nice in future versions to have an emit for the voteFor and voteAgainst functions
Escalated this problem, already. Thanks for feedback
Talking about Dune, have you seen this one?
the new UI is dope!
Everything I wanted and more.
Also love that it is very clean - and details are shown only when necessary.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00507.warc.gz
|
CC-MAIN-2023-50
| 985
| 12
|
http://www.lispworks.com/documentation/lw61/KW-W/html/kwprolog-w-30.htm
|
code
|
Forward chaining rule bodies are defined by:
<forward-condition>* --> <expression>*)
is the name of a context which has already been defined (see Control Flow) defaulting to
is a number (see
) defaulting to
The syntax for forward-conditions is
| (test <lisp-expr>)
| (not <forward-condition>+)
| (logical <forward-condition>+)
(<class-name> <variable> [<object-slot-condition>]*)
is an object-base match where the variables (introduced by "?") in
are bound (via destructuring) to the corresponding data in the slot named by
is a single variable bound to the object matched.
Note: "?" on its own denotes an anonymous variable which always matches.
is a Lisp test where
is any Lisp expression using the variables bound by other conditions, and which must succeed (return non-nil) for the condition to match. Computationally cheap Lisp tests can frequently be used to reduce the search space created by the object base conditions. Lisp tests, and any functions invoked by them, should not depend on any dynamic global data structures, as changing such structures (and hence the instantiations of the rule) will be invisible to the inference engine. Lisp tests can depend on the values of slots in objects matched by preceding object-base conditions only if the values are bound to variables in the rule using the
syntax. They cannot depend on values obtained by calling
or a reader function.
is simply a negated condition. A negated condition never binds any variables outside its scope. Variables not bound before the negation will remain unbound after it.
is used to indicate clauses that describe the
amongst objects. See Logical Dependencies and Truth Maintenancefor more details.
Note that if a forward chaining rule contains any conditions at all then it must contain at least one object base reference of the form
(<class-name> <variable> ...)
The syntax for expressions is:
|(assert (<class-name> <variable>
is a forward condition which must succeed for execution of the action part of the rule to continue.
removes the instance bound to
from the knowledge base. It is an error if
is bound to anything but a KnowledgeWorks instance.
(assert (<class-name> <variable> [<slot-name> <term>]*))
is an assertion which modifies the contents of the object base, where if
is unbound a new object of the given class with the given slot-values is created, and if it is bound, the object to which it is bound has its slots modified to the given values.
adds the given list of contexts to the top of agenda (see Control Flow).
passes control to the top context on the agenda and removes it from the agenda (see Control Flow).
binds the result or results of calling
s with execution of the rule terminating if any bindings fail (if no
s are given execution will always continue).
may be any backward chaining goal expression (see Backward Chaining).
Note that in the action part of a rule, only backward chaining goals and object base matches invoke the backward chainer.
KnowledgeWorks and Prolog User Guide (Windows version) - 6 Dec 2011
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558030.43/warc/CC-MAIN-20220523132100-20220523162100-00493.warc.gz
|
CC-MAIN-2022-21
| 3,030
| 40
|
https://www.insanelymac.com/forum/topic/342386-bcm94352hmb/
|
code
|
m.2 DW1707/AR9565 shows yellow wifi indicator in network applet when turned on in 10.13.6, 10.14.6 and yellow ethernet in 10.15.2.
Icon in desktop panel indicates looking but not find networks in all three. Same wifi card detects available networks in linux without issue.
The attached kext is labeled particularly for 10.13.6, but wifi is not being detected even in that version. In all cases Atheros 40 kext is installed S/L/E as plugin in 80211 family kext with reparied permissions.
Can anyone who has this working in sierra, high sierra, mojave or catalina please post what you did including any dsdt/config.plist mods?
From what I have read in these forums the modded atheros 40 kext is supposed to work. Is this failure to detect networks specific to any particular brand(s) of laptops?
I will be using ASUS ROG STRIX B360-I GAMING (mini-ITX) for my new build, and I'm trying to figure out the best solution for WiFi & Bluetooth. I understand that it should be possible to replace the WiFi/BT card that comes with the motherboard, but I'm confused about with what kind of card exactly. What connector will I need to be using? There are cards with miniPCI, M.2, some solutions require adapters, ...
Updated to Catalina, and also have a new Apple Watch. Upgrade from Mojave went great, only updated some kexts for the Wifi/bluetooth to make bluetooth work.Airdrop, Handoff etc. all work like a charm. Sidecar is also enabled (but I don't have the iPad, so can't test).
However, the Apple Watch features are not there. I've went to System Report, and noticed in my Wifi that "Auto Unlock: True" isn't there at all. How come? I've read some success stories with my Wifi/BT chip, which is:
Broadcom BCM94352Z NGFF Dual Band 802.11ac 867M Wifi BT 4.0 Lenovo FRU 04X6020
I'm using these kexts from Headkaza, which were needed to get Bluetooth to work:
Wifi is working great, 5GHZ, full speed. So I'm pretty lost on how to get this "Auto Unlock: True" enabled.
Extra info about my system:
Processor: Intel Core i5 8400
Videocard: Radeon RX 570 4GB
Motherboard: ASRock Z370M-ITX/ac
Replaced my Intel wifi chip with the BCM94352Z
SMBIOS: Retina 5K 27" 2017
Hello, I am posting this show how I adapted the BCM94360CS2 M2 NGFF board on my Lenovo L440.
I have some guides about this notebook over here and previously used Dell DW1560 (BCM94325Z).
The DW1560 worked almost perfectly Handoff, Continuity, Universal Clipboard and AirDrop with the kexts: AirportBrmFixup.kext, BrcmBluetoothInjector.kext, BrcmFirmwareRepo.kext, BrcmPatchRAM3.kext and BT4LEContinuityFixup.kext, but the Instant Hotspot doesn't work.
So, I decided to grab a M2 NGFF adaptor (because this notebook only have mPCIe) and the BCM94360CS2 and put inside this notebook:
Previously with DW1560
Moved the battery and removed DW1560
Obviously don't fit
Need to cut this piece of plastic and remove the CMOS battery conector
Maybe I removed too much plastic (hehe) and soldered the battery wires directly in motherboard
Now the adapter fits
Instant hotspot now working without any Kexts, yeah!
Important! Just remember: this notebook have whitelist in BIOS/UEFI that need to be patched to allow other wireless cards.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370519111.47/warc/CC-MAIN-20200404011558-20200404041558-00559.warc.gz
|
CC-MAIN-2020-16
| 3,178
| 29
|
https://bhavyanshu.me/tutorials/linked-lists-queues-and-other-nightmares-part-ii-queues/07/16/2014/
|
code
|
Linked Lists, Queues and other nightmares (Part II - Queues)
16 July 2014 By Bhavyanshu Parasher
This is in continuation to Part I in which I showed the use of pointers in implementing stack. I also talked about various concepts on pointers. Now we can move further.
Unlike stacks, queue follows the rule of FIFO (first in first out). So our job is to construct a program that keeps track of the head which is nothing but the first element and the tail which will represent the empty space next to the last element. Why so? Because when we need to add a new element to the end of queue, we need an empty space. Say for example our queue is | 4 | 5 | 2 | 3 | _ | _ |. So our head should point to 4 and tail should point to the empty space next to 3. The queue has two operations : Enqueue & Dequeue Enqueue: When we want to add a new element. Dequeue: When we want to remove an element. Keep in mind that the first element must be removed and the position of head must be moved to next element.
NOTE I will not write the complete code for queue here as most of it is similar to stack. I will just write the initialization of the variables and pointers and functions of enqueue and dequeue. For complete code visit this repository.
Concept : In stack we only required top to represent top of stack. In queue we need two things, head and a tail.
So our stucture would have
After this in
main() we use:
The two important functions are
We need to send the limit as parameter as well because we need to check if the tail has reached the limit or not.
That’s it. This is the code snippet to implement queue using arrays and pointers concept. There is one more type of queue. It is called circular queue but that requires the concept of linked lists. So we must first take a look at linked lists.
blog comments powered by Disqus
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474744.31/warc/CC-MAIN-20240228175828-20240228205828-00361.warc.gz
|
CC-MAIN-2024-10
| 1,822
| 13
|
https://www.dornerworks.com/blog/open-source-business-cases/
|
code
|
“When I saw ‘open source,’ I thought, ‘nope.'”
That was a June FACE F2F attendee’s response to the announcement of DornerWorks’ Virtuosity OATM (Open Architecture) meeting The Open Group’s FACETM Technical Standard requirements. Virtuosity OA, an open source platform-enabling technology, is already in use by major defense organizations such as DARPA, the US Navy, and the US Army. Yet, eight words was all it took to make it clear that maybe not everyone was convinced.
Hours before, DornerWorks COO grabbed members’ attention with a clever joke and held it with the story of RedHat, a company that initially made a name helping its customers understand and leverage open source systems like Linux.
Red Hat has been around since 1993, and there is yet great potential in developing business models around open source technology. In fact, Red Hat isn’t even at the top of the list when it comes to for-profit companies that create products for or at least contribute to the open source community. Among some of the most well known and the projects they’ve helped along, are the following:
DornerWorks has likewise been supporting the open source community since 2001. One of the company’s latest releases, Virtuosity OA, is based on open source Xen Project technology. Open source licensing, like Virtuosity OA’s GPLv2, occurs below the application layer. This means that the product(s) a business decides to create with Virtuosity OA are not subsequently free and open source unless that business decides they should be.
What an organization makes with open source software belongs to that organization, and they can distribute that system as they see fit.
There are many different flavors of open source technology, and little doubt those products will continue to innovate for years to come. Microsoft’s acquisition of GitHub in 2018 showed the world just how important open source solutions can be to an already massive tech business. Meanwhile, new initiatives in cross-platform development, machine learning, and containerization applications are further expanding the potential for innovation in the open source space.
Along with Virtuosity OA and the Xen Project ecosystem, DornerWorks engineers have built a number of products with open source technology, using open source tools.
DornerWorks test engineers often rely on the automation capabilities of a Jenkins continuous integration server, GitHub repositories for maintaining code bases, and now Gerrit, a web based code review system, for project verification.
It’s also not uncommon, in “brown bag” events where engineers share their knowledge with others at DornerWorks, to hear about some popular and useful open source technology supported by a growing developer community. Some of those conversations continue in published material. DornerWorks Engineer Nate Studer shared his thoughts on the company’s migration from Buildroot to Yocto Project in 2017, followed by Chief Software Engineer Anthony Boorsma’s advice on the advantages and challenges of building Linux with Yocto Project.
In 2018, DornerWorks enabled Single Instruction-Multiple Data (SIMD) capabilities in the open source KISS FFT library. Engineers Kevin Kredit and Boorsma took a process that already greatly improved upon the efficiency of fixed point Fast Fourier Transformation and supercharged it with vectorized instructions, allowing for parallel processing on a single core, maximizing processor throughput.
According to Kredit, “Vectorization enables your software to get the most performance possible from your hardware. The days are over when clock frequency alone drove CPU performance; gains increasingly come from data width and core count. Getting the most out of your chip means taking advantage of its supported vector instruction sets.”
The updated library is proving effective at optimizing processor-limited, time-critical applications often found in the embedded solutions.
Open source doesn’t have to be scary. Like any technology, there are advantages and challenges to adopting it, but the rewards are often well worth the investment.
There is a misconception that open source tools and code seemingly “infect” a proprietary solution, rendering it valueless to its creator. But open source does not work that way. There’s no “infection” being spread, and no need for a cure.
According to RedHat-supported opensource.com, “It is true that under GPL, all code in a single program must be either be subject to GPL or not subject to GPL. So if a developer were to combine GPL code with proprietary code and redistribute that combination, it would violate the GPL. But the likely worst-case consequence of this violation is that the author of the GPL code could exercise their right to bring a claim for copyright infringement. The remedy for copyright infringement is either damages (money) or injunction (stop using the GPL code). Critically, copyright law supports no remedy that would force the offending developer to license their proprietary code under GPL or to put that code into the public domain. Combining GPL code with proprietary code does not therefore ‘infect’ the proprietary code or convert it into GPL code.”
Again, open source software belongs to the organization using it. That organization has the prerogative to distribute that software, whether that furthers its own ends or not.
While some will undoubtedly still approach open source thinking, ‘Nope,’ there are many, many more who have since changed their minds, now embrace the possibilities, and actively contribute to the open source community.
If you have not considered open source technology for your project yet, now is a good time to give it a chance. It will take time to familiarize yourself with the same tools and processes already being used by developers around the world, but those developers can likewise be your greatest resource.
Depending on a project’s needs, setup and operational costs can also be a concern. But, if a business can be made stronger or more valuable after training, implementation, maintenance, and support are taken into consideration, there are few reasons left arguing against open source.
When you’re ready to start integrating powerful open source solutions into your next project, call DornerWorks, start a conversation, and we will help you get back to what you do best–growing your business.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474795.48/warc/CC-MAIN-20240229071243-20240229101243-00090.warc.gz
|
CC-MAIN-2024-10
| 6,439
| 21
|
https://www.ingrammicrocloud.com/marketplace-legal/vendors/microsoft-csp-terms/
|
code
|
Additional Terms and Conditions for Microsoft's CSP Subscriptions
The following additional terms and conditions apply to Your purchase of Microsoft's ("Vendor") cloud service and software subscriptions available under Microsoft's CSP Program, excluding Microsoft Azure ("Services") and to the use of such Services by You and Your customers. These terms and conditions are in addition to other terms you agree to through the Ingram Micro Cloud Marketplace (the "Site"), including but not limited to the Ingram Micro General Terms of Service, acceptable use policy, and other terms.
- Term and Termination
Services start once provisioned through the marketplace. You may cancel the Services through the marketplace so long as no Service commitments are active hereunder (i.e. You or one or more of Your customers are employing any active Services). You may only terminate the Service if there are no existing term commitments for Services. If You or Your customer terminates its use of a Service prior to the expiration of the term commitment for the selected service, You will remain responsible to Ingram Micro for all remaining and accrued charges for such Service pursuant to the selected term commitment.
Services are available for minimum commitment of one year. Services will auto renew for an additional one year, unless You cancel the Services prior to the expiration of the term commitment for the selected Service.
- Fees and Taxes
You agree to pay the fees and charges for the Services as outlined in the registration process and that appear on the Site, as may be amended from time to time. If You or Your customer exceeds the usage limits applicable to the Service subscription, You agree to pay for the fees and charges for such over usage. For any extension of a subscription term or the provisioning of a Service upgrade, the then-current price will apply, unless otherwise mutually agreed in writing by You and Ingram Micro. Ingram Micro, may, from time to time in its sole discretion, change the fees it charges for the Service. Any increase in the fees will take effect at the beginning of the new subscription term. Ingram Micro will notify You of any such changes by updating the Site or sending notice by e-mail or regular mail.
PSTN Services - Taxes
Amounts You must pay Ingram Micro for certain PSTN Services may be inclusive of taxes and fees. Amounts inclusive of taxes and fees will be specified as such on the invoice. The tax and fee amounts included are being billed on behalf of Microsoft Regional Sales Corporation. You are responsible for paying any applicable taxes and fees on or with respect to your activities in connection with the Agreement.
If You mark up the price of a PSTN Service (e.g. PSTN Conferencing or PSTN Calling), You will likely be responsible for calculating and remitting PSTN taxes and fees. You should contact your tax and legal counsel to understand their specific situation with regard to PSTN Services' regulation, taxes and fees, and their potential liabilities.
All purchases are subject to the sales terms set forth in the Ingram Micro General Terms of Service, as well as service setup information set forth in the Site, including but not limited to pricing (where applicable). For the avoidance of doubt, notwithstanding the presence or acceptance by Ingram Micro of Your order, such shall be for administrative purposes only and the parties agree that the governing terms and conditions shall be those set forth in the Ingram Micro General Terms of Service unless otherwise agreed to in writing by Ingram Micro and You.
The Services are provided by Vendor.
Ingram Micro may modify these terms and conditions at any time. You and Your customers must regularly monitor the Site for any such modifications. The modified terms and conditions will be effective immediately after it is posted on the Site. Your purchase and resale of the Services and You and Your customers' use of the Services after any such modification will be deemed acceptance of such modification.
- Important Information About Emergency Calling
This section contains important information for partners who sell Microsoft CSP products that bundle Skype for Business PSTN Calling.
Emergency Services calling operates differently with Skype for Business PSTN Calling services than on traditional telephone services. It is important that you understand these differences and communicate them to all users of the Skype for Business PSTN Calling service. You acknowledge and agree that you have read and understand the differences in our Emergency Services calling and will provide this notice to each user of Skype for Business PSTN Calling services.
The differences in our Emergency Services calling capabilities include the following: (i) Skype for Business may not know the actual location of a caller making an Emergency Services call, which could result in the call being routed to the wrong Emergency Services call center and/or emergency services being dispatched to the wrong location; ((ii) if the user's device has no power, is experiencing a power outage or, for any reason, cannot otherwise access the Internet, the user cannot make an Emergency Services call through Skype for Business PSTN Calling services; and (iii) although Skype for Business PSTN Calling services can be used anywhere in the world where an Internet connection is available, users should not make an Emergency Services call from a location outside their home country/region because the call likely will not be routed to the appropriate call center in that country/region.
- Microsoft Government Subscriptions
The terms and conditions in this section apply only to subscriptions purchased via the Site under Microsoft government licensing (the "Microsoft Government Subscriptions").
BY ORDERING, RESELLING, OR USING ANY OF THE MICROSOFT GOVERNMENT SUBSCRIPTIONS, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTAND, AND INTEND TO BE BOUND BY ALL OF THE TERMS AND CONDITIONS CONTAINED HEREIN JUST AS IF YOU HAD SIGNED THIS AGREEMENT.
If You do not accept this Agreement, You are not permitted to use the Microsoft Government Subscriptions.
You acknowledge and understand that:
(a) the Microsoft Government Subscriptions are only available for use by customers that meet the respective eligibility requirements for a qualifying government entity, as published by Microsoft at http://www.microsoftvolumelicensing.com/DocumentSearch.aspx?Mode=3&DocumentTypeId=6; and
(b) the Microsoft Government Subscriptions are provisioned through Microsoft's public cloud and are not suitable for users that must have services provisioned in private cloud environments (collectively, the "Eligibility Requirements").
You represent and warrant that if You use the Microsoft Government Subscriptions, You meet the Eligibility Requirements. You further represent and warrant that if You resell or otherwise make available the Microsoft Government Subscriptions to any third parties including, without limitation, Your customers, (collectively, "Customers"), such Customers also meet the Eligibility Requirements.
You acknowledge that You and Your Customers may receive certain benefits, such as discounted pricing, if You and Your Customers use the Microsoft Government Subscriptions. Ingram Micro reserves the right to verify Your and Your Customers' compliance with the Eligibility Requirements and, if such Eligibility Requirements are not met as determined in Our sole discretion, in addition to any other remedies available under law or contract: (a) suspend the Microsoft Government Subscriptions; and (b) recover any discount You and Your Customers' received but were not entitled to.
You further acknowledge that Ingram Micro has entered into this Agreement in material reliance on the following representations: You agree and certify that You have not made, and will not make, any direct or indirect payment, offer to pay, or authorization to pay, any money, gift, promise to give, or authorization of the giving, of anything of value to any government official, or the family of any such official, or any other person or firm while knowing or having reason to know that all or a portion of such money or thing of value may be offered, given or promised, directly or indirectly, to any government official, for the purpose of influencing an act or decision of the government or such individual in order to assist, directly or indirectly, You or Ingram Micro in obtaining or retaining business, or securing an improper advantage.
YOU AGREE TO DEFEND, INDEMNIFY AND HOLD HARMLESS INGRAM MICRO, ITS AFFILIATES, AND THEIR RESPECTIVE DIRECTORS, OFFICERS, SHAREHOLDERS, EMPLOYEES, AGENTS, LICENSORS AND ADVISORS FROM AND AGAINST ANY CLAIM, DEMAND, LIABILITY, DAMAGE, LOSSES, JUDGMENTS, SUIT, ACTION, COSTS AND EXPENSES (INCLUDING, WITHOUT LIMITATION, REASONABLE LEGAL FEES AND COSTS OF INVESTIGATION) ARISING OUT OF OR RELATING TO YOUR BREACH OF THIS AGREEMENT.
Ingram Micro may at any time modify the terms and conditions of this Agreement. Any such modification shall be effective immediately after it is posted on the Site. Use of the Microsoft Government Subscriptions after any such modification will be deemed acceptance of such modification. If any modification is unacceptable, You may terminate this Agreement, subject to the terms and conditions contained herein. The Agreement may not otherwise be amended except in a writing signed by You and by a representative of Ingram Micro.
- Microsoft Academic Subscriptions
To order and resell Microsoft academic-priced products:
You must be a member of the Authorized Education Provider program. For more information about the program, see https://www.mepn.com/MEPN/FAQ.aspx.
You must provide Ingram Micro with your AEP authorization number and you must receive our authorization to transact academic-priced products. If you haven’t received authorization, your orders for academic-priced offers will fail. For more information, contact us at email@example.com.
You must confirm that your customer qualifies for educational pricing, as per the eligibility requirements for http://www.microsoftvolumelicensing.com/DocumentSearch.aspx?Mode=3&DocumentTypeId=7.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304947.93/warc/CC-MAIN-20220126101419-20220126131419-00600.warc.gz
|
CC-MAIN-2022-05
| 10,202
| 34
|
https://programcodelib.com/2016/02/agar-io-game-languages-used-to-make-it/
|
code
|
Agar.io Has been a really addictive game for many game lovers. People are curious to know which language has this game been written. The Game was developed by Matheus Valadares.
Frequently asked questions:
Q: Which language has Agar.io been written in?
Q: Which language is used to code Agario Client Side
Q: Which language is used to program Agar.io Server Side.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948599549.81/warc/CC-MAIN-20171218005540-20171218031540-00042.warc.gz
|
CC-MAIN-2017-51
| 363
| 5
|
http://stackoverflow.com/questions/19748721/how-to-find-and-replace-data-in-a-column-via-rails-migration
|
code
|
I have a column called "meta" in a table called "Notifications". The data in the column looks something like this:
--- :full_name: Dude :user_id: 1 :update_id: 10 :update_type: want :update_name: Some name here
and I want it to be changed to something like this:
--- :full_name: Dude :user_id: 1 :post_id: 10 :post_type: want :post_name: Some name here
What would a migration to achieve this look like?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500811913.46/warc/CC-MAIN-20140820021331-00462-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 402
| 5
|
http://onrails.org/2010/09/20/moving-again-http-onrails-org-from-heroku-to-ec2.html
|
code
|
If you read this then this blog is now running Typo 5.5 on Rails 2.3.9 on EC2.
I really love the ease of deployment to heroku and the fact that they manage the whole stack. However I receive regularly emails from Heroku stating that I get a specific number of “backlog too deep errors” indicating the app is receiving more requests than it is capable of responding to, or in other words that that my blog is outgrowing their developer instance. So I have the option to increment the number of requests my application can handle, which is easy thanks to the the heroku command line: heroku dynos +1 —app onrails. So I can increase the HTTP performance by cranking up the “dynos” to 2 which would be an additional $36 a month. I still think it’s a good deal for a managed environment.
However you also saw on my last blog entry that there are other issues with running Typo on Heroku and therefore I started playing with running Rails on EC2. And I like what I see and now that Amazon has an official and secured Amazon Linux AMI, I’ll be using that. Here are a few notes on how I did set it up.
I started with the new Basic 32-bit Amazon Linux AMI 1.0 (http://aws.amazon.com/amazon-linux-ami/). I take basically only a few clicks to get a server started. You can use the ec2 console (https://console.aws.amazon.com/ec2) to create and connect to the server, however you need to use ec2-user instead of root to connect due to the way the Amazon Linux AMI is setup.
Note Lee is right that if I continue to moving host I should create a Chef recipe for this.
Install dev tools
$ sudo yum install git
$ sudo yum install make gcc-c++ zlib-devel openssl-devel
$ sudo yum install ruby-devel ruby-libs ruby-mode ruby-rdoc ruby-irb ruby-ri ruby-docs
$ sudo yum install mysql mysql-server
$ sudo /etc/init.d/mysqld restart
$ sudo yum install mysql-libs mysql-devel
$ sudo gem install mysql —no-ri —no-rdoc
$ wget http://production.cf.rubygems.org/rubygems/rubygems-1.3.7.zip
$ tar xzvf rubygems-1.3.7.tgz
$ cd rubygems-1.3.7
$ sudo ruby setup.rb
$ cd ..
Install Rails (note I use 2.3.9 for Typo )
$ sudo gem install rails —no-ri —no-rdoc
$ sudo gem install rails —no-ri —no-rdoc -v=2.3.9
Install Apache (2.2.15)
$ sudo yum install httpd
$ sudo gem install passenger —no-ri —no-rdoc
$ sudo yum install httpd-devel
LoadModule passenger_module /usr/lib/ruby/gems/1.8/gems/passenger-2.2.15/ext/apache2/mod_passenger.so PassengerRoot /usr/lib/ruby/gems/1.8/gems/passenger-2.2.15 PassengerRuby /usr/bin/ruby
Suppose you have a Rails application in /somewhere. Add a virtual host to your
Apache configuration file and set its DocumentRoot to /somewhere/public:
<VirtualHost *:80> ServerName www.yourhost.com DocumentRoot /somewhere/public <Directory /somewhere/public> AllowOverride all Options -MultiViews
Installing Typo (from source)
$ wget http://rubyforge.org/frs/download.php/71779/typo-5.5.zip
then unzip, that’s it. That’s your typo instance, now let’s configure it’s database.
Note I moved it to /var/www/typo/
Create config/database.yml i.e.
Change the Rails version in config/environment.rb, replace 2.3.8 with 2.3.9
RAILS_GEM_VERSION = ‘2.3.8’ unless defined? RAILS_GEM_VERSION
setups gems required for Typo:
$ sudo rake gems:install
Note I migrated my blog so I need to copy the database to the new server.
$ scp -i .ssh/linux_ami.pem onrails_org.sql email@example.com:onrails_org.sql
$ mysql -u yourusername -p
create database onrails_prod;
$ mysql -u yourusername -p onrails_prod < onrails_org.sql
As I also update Typo to a new version I had to run a migration:
$ rake db:migrate RAILS_ENV=production
Note if you want a clean install you can just to a rake db:create and rake db:migrate.
Et voila! Well Heroku made it simpler but I always have fun playing with EC2.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189583.91/warc/CC-MAIN-20170322212949-00034-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 3,804
| 47
|
http://www.sqlserverf1.com/informix-error-messages-and-error-codes-from-error-211-to-214/
|
code
|
Informix Error Messages and Error Codes From Error 211 to 214
Informix Error Code -211 Cannot read system catalog catalog-table.
The database server refers to the tables of the system catalog while it processes most statements. When it cannot read one of these important tables, a serious error results. Check the accompanying ISAM error code for more information. The effect of the error depends on the statement that is being executed and the particular table, as follows:
CREATE TABLE statement, systabauth not read; the table is created, but PUBLIC is not granted authorization as it normally is.
DROP TABLE statement, systables not read; no action taken.
DROP TABLE statement, sysviews not read; the table is dropped but any views that depended on the table were not automatically dropped.
DROP VIEW statement, sysviews not read; no action taken.
DROP INDEX statement, sysindexes or systables not read; no action taken.
DROP SYNONYM statement, systables or syssynonyms not read; no action taken.
DROP DATABASE statement, systables not read; no action taken.
START DATABASE statement, systables not read; no action taken.
DATABASE statement, systables or sysusers not read; the database was not selected (no current database; for subsequent operations, see error -349).
Other statements may be partially complete before the error is detected. Roll back the current transaction and then investigate the cause of the error. Use the bcheck or secheck utility (tbcheck with INFORMIX-OnLine or oncheck with INFORMIX-OnLine Dynamic Server) to check and repair indexes. If necessary, restore the database from backup and logical-log tapes.
Informix Error Code -212 Cannot add index.
This statement attempts to add an index, either explicitly with CREATE INDEX or implicitly as part of processing a SELECT on multiple unindexed tables. In any case, some error prevents the index from being created. For more information, check the accompanying ISAM error code. Insufficient disk space is a common cause of this problem.
Informix Error Code -213 Statement interrupted by user.
The database server received an interrupt signal from the user, probably because the user pressed the interrupt key (usually Delete or Control-C). The statement ended early. A program should roll back the current transaction and terminate gracefully. If the statement could modify a table, an interactive user should execute the ROLLBACK WORK statement to remove any partial modifications.
Informix Error Code -214 Cannot remove file for table table-name.
The database server cannot completely remove the table. Check the accompanying ISAM error code for more information. Problems with operating-system file permissions, read-only files, or hardware might cause this error.
Above are list of Informix Error Messages and Errors Codes or Status Codes or Exit Codes along with Error and Warning messages received while performing certain operation against Informix applications or related products.
What are Informix Error Messages?
All Informix messages returned by the Informix server are assigned an error code.
In general, each Informix error contains the following information:
• The Informix Error Code or Informix Error status
• The message text. This text is usually returned with the Error code. Some messages employ word substitution, where the word substituted represents the system-replacement of a term more specific to the occurrence.
• An explanation of how the error may have occurred.
Hope this was helpful.
Information about Informix Error Codes or Status Codes or Exit Codes and Error Messages on Windows, Linux Operating Systems.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891980.75/warc/CC-MAIN-20180123151545-20180123171545-00346.warc.gz
|
CC-MAIN-2018-05
| 3,625
| 28
|
https://meta.stackoverflow.com/questions/276733/uhhh-what-kind-of-answers
|
code
|
How on earth did this happen,
The title of the question is "convert bytes to GB in php". When searching for that particular task, this question may come up. Regardless of the topic of the question or strangeness of the answer, the answer does describe how to convert bytes to GB. Those searching for a way to do this likely found the answer helpful.
and how should this be handled?
- Leaving a well-written (e.g. not bold or all caps...) comment asking for clarification.
- Down-voting the answer if you feel it is truly not helpful.
- Calling it out on meta, which generally leads to unfortunate bandwagoning, which at 161k you should know.
Other ways to handle dubious answers, which do not necessarily apply to your specific example:
- Flagging as NAA if you truly believe the answer is not an answer, which this one does not qualify as, since it does attempt to answer the question.
- If you are unsure how to handle an answer you find questionable, search meta first for related discussions. For example, for more information on what to do with wrong answers, you may also be interested in this discussion.
There are many answers on SO that are less-than-great. We have the voting and comment system to take care of these. Use them. Meta is not the place to deal with these types of answers†.
† My thoughts on Patrick's comment below:
... bringing this discussion to meta is exactly what he should do. This is about answers that are not salvageable and should be deleted, but the high upvote count prevents that. It is a totally legit question.
Valid points; but there are two things that, in my opinion, should be considered:
More research into existing topics (e.g. I found How to handle historical, highly upvoted but completely incorrect answers) on this matter could have been done to find existing discussions. This is expected of any question, including ones on meta.
This question, which is generally legit (re: non-salvageable answers that cannot be deleted due to upvotes) could have been asked without a specific example to jump on.
At first I was not sure why this question received so many down-votes. After I thought about it more, I liked it a bit less, for the given reasons. In the end I gave it no-vote.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818711.23/warc/CC-MAIN-20240423130552-20240423160552-00237.warc.gz
|
CC-MAIN-2024-18
| 2,230
| 16
|
https://www.techthirsty.com/microsoft-could-soon-be-able-to-track-and-influence-gamers-emotions/
|
code
|
Microsoft is taking a giant leap by investing in machine learning technologies to track and influence the emotions of gamers while they are playing. It is also on the road to acquiring Activision Blizzard which is a leading game developer.
Patent filed recently
It is nothing new to know that Microsoft always makes substantial investments in the R&D of video games and related technologies. The company filed a patent recently to verify physical games for Xbox Digital Library.
The tech conglomerate is contemplating filing the patent for a system that would monitor the feelings and emotions of gamers in real-time to offer them a more positive gaming experience.
The patent would employ complex machine-learning algorithms and heuristics to modify the gaming experience by influencing the emotions of gamers. The company would build on the current practice utilized by developers through background music, threats, loot, and NPC behavior to induce definite feelings in gamers.
The proposal suggests game-agnostic and engine-agnostic techniques to improve the player’s experience using machine learning algorithms for NLP (Natural Language Processing) based on earlier game events. The game events could be produced by the player like pressing a combination of controls or a particular button and making other in-game choices.
By using an API (Application Programming Interface) to link specific letters, numbers, phrases, or words to particular game events, developers know to translate game events into text strings.
The above figure shows a block illustration of a system for processing games that let coordinating game selections by employing a semantic NLP machine learning algorithm.
In some systems, the mapping is kept in a text log or table comprising a series of text strings corresponding to game events happening during the game. According to the patent by Microsoft, the text strings are added to the text log once the corresponding game event happens.
One or more curves represent the target player’s experiences related to the game’s progress. Curves can define different experiences like intensity, calm, good luck, bad luck, and ideas like victorious or failure.
As per gaming experts, the finalization of the patent would pave the road to a new kind of reward system in the world of video games. The new system would be influenced by the feelings and reactions of gamers during the games and the rewards would be designed on the information collected following the pattern.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100308.37/warc/CC-MAIN-20231201215122-20231202005122-00341.warc.gz
|
CC-MAIN-2023-50
| 2,499
| 11
|
https://community.phones.nokia.com/discussion/57723/1-april-2020-patch-idea-sim-network-issue
|
code
|
I had installed a new security patch of 1 April 2020.
I had installed a new security patch of 1 April 2020. Immediately after my Idea Postpaid sim (now automatically migrated to vodafone because of idea vodafone collaboration) lost the network.
I have tried following things,
I tried resetting the factory settings - didn't worked.
Tried another idea (Prepaid) sim in my phone - Worked
Tried putting my postpaid sim in another (samsung) phone - worked
Tried changin sim to another slot - didn't worked,another sim (jio) is working perfectly in both the slots.
Tried setting idea sim as data sim with network type 4G
Tried to play with #*#4636#*# - didn't worked
please help me to solve this issue
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141203418.47/warc/CC-MAIN-20201129214615-20201130004615-00431.warc.gz
|
CC-MAIN-2020-50
| 696
| 10
|
http://stackoverflow.com/questions/3274095/append-tuples-to-a-list/3274116
|
code
|
How can I append the content of each of the following tuples (ie, elements within the list) to another list which already has 'something' in it? So, I want to append the following to a list (eg: result) which isn't empty:
l = [('AAAA', 1.11), ('BBB', 2.22), ('CCCC', 3.33)]
Obviously, the following doesn't do the thing:
for item in l: result.append(item) print result
I want to printout:
[something, 'AAAA', 1.11] [something, 'BBB', 2.22] [something, 'CCCC', 3.33]
Please help. Many thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257825366.39/warc/CC-MAIN-20160723071025-00162-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 502
| 7
|
http://hfx-ben.livejournal.com/?skip=10
|
code
|
I've been grappling with the "theism" thing since I was in my early 20s.
I found things made no less sense when I took a nearly animistic / a-theistic view of things.
Here, try this: call "gravity" by another name, come up with whatever wierd name and concept you want ... then drop something from your hand.
Did the thing fall up to the ceiling? Over to one of the walls? (Freak the hell out of the cat doing that would, I promise.)
I don't need "intelligent designer" to know the world will be a worse place if I indulge my worst temptations, and a better place if I made an effort to follow my best impulses.
I don't need any external agent to realize at least the humblest of my aspirations.
What /really/ requires the grey-haired God sitting in the high throne?
Hatred ... self-righteous condemnation. That sorta thing needs absolute truths, and absolute authority.
*just wanted to jot this down*
p.s. A little note about the Bible's "literal truth".
To set the stage: let's say you have a choice of 2 jobs. In 1, you get minimum wage, basic food, not a lot of extras, you have work assigned to you and you have to do that work ... but you pretty much live your life. In the 2nd, you're a slave. In the real sense of being a slave.
So ok: in Egypt, people were often forced to labour on public works. And yes, there were slaves, too.The Jews in Egypt weren't slaves
. Bad translation from the original. In the original (No, I don't have the freakin' term, step off my foot!) it clearly states that they were put into forced labour.
Now you gonna say that the two jobs are the same? That words don't mean what they mean? That human beings can't think? or write? or read?
So mebbe "literal truth" is a way for zealots to band together, to group against all others. To recruit others who will do the hack work and provide money. (Which, BTW, is precisely
the foundation of fascism.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00562-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,884
| 16
|
https://www.scalefour.org/forum/search.php?author_id=1499&sr=posts
|
code
|
ben mason wrote:Thanks for the information, I have accessed Templot but as a Mac user I have only 2 weeks free use with CrossOver.
You need to check out Wine. Or if you have a Windows licence, VitualBox
Daddyman wrote:If only some nice person would do an etched replacement cab for it - and, say, for the J39 and B1 too! Wink wink, nudge nudge.
davebradwell wrote:I'm told there was also a drg prepared showing all the frames - all dimensioned of course - that were attached to the boiler first but this hasn't turned up.
davebradwell wrote:The exceptions are the Thomson Pacifics - look at A2/2 and A2/3 to see a horrible link to model with the lifting arms passing through another layer of it.
Noel wrote:I've got what is possibly [probably?] the same chassis under a non-corridor third acquired a few years ago, Mike, and am not particularly impressed.
grovenor-2685 wrote:The profile is in the Standards digest.
Andy W wrote:Powerflow flux is wonderful stuff but be careful it’s very difficult to clean off and can eat through paint.
Jeremy Suter wrote:Another step forward toward the kit has arrived from Slaters who have done some lost wax casting for me in nickel silver.
Le Corbusier wrote:probably a naive question ... but aren't there any facsimiles of the original shop drawings available?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188899.42/warc/CC-MAIN-20201126171830-20201126201830-00187.warc.gz
|
CC-MAIN-2020-50
| 1,302
| 10
|
https://freddysblog.com/2021/01/
|
code
|
There are 2 kinds of apps: AppSource Apps and Per Tenant Extensions (PTEs). These apps can be installed in two kinds of environments: Sandbox and Production. In Production, AppSource Apps are installed in the global scope and Per Tenant Extensions are installed in the Tenant Scope. In Sandbox environments you can also install apps to the development scope (like what VS Code does).
This blog post will describe how you can use BcContainerHelper 2.0.2 to install apps in any of those combinations.
The latest version of BcContainerHelper (BcContainerHelper version 2.0.1 | Freddys blog) comes with a new concept called a BcAuthContext. A BcAuthContext is really just a hashtable with authentication information for a Business Central online tenant.
This blog post describes the concept and how to obtain and refresh a BcAuthContext. Subsequent blog posts will describe how to use them.
When releasing the first version of Run-AlValidation in BcContainerHelper, i did a quick blog post about the function here. This blog post serves to explain some common scenarios of how to run the function. The blog post will also explain the parameters of Run-AlValidation a bit more in depth, for people to have a good chance of using the function before submitting for AppSource Validation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00403.warc.gz
|
CC-MAIN-2023-14
| 1,280
| 5
|
http://askubuntu.com/questions/190430/accessing-network-shares
|
code
|
I'm looking for some help on how to connect and mount network shares on my current install of 12.04. The fileserver shares that I'm trying to access are on a Solaris 11 system using ZFS. Just wondering what I need to change/add to the fstab in order to be able to access them? I can access them fine from windows by just mapping them as \hostname\sharename.
Am I missing something or do I have to install an extra packages?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824624.99/warc/CC-MAIN-20160723071024-00295-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 423
| 2
|
http://caveatron.com/software.html
|
code
|
Post-processes the Caveatron LIDAR scan files and survey files to produce a point cloud. It allows the user to review each scan, remove erroneous rangefinder data, and adjust processing and filtering parameters. The survey data can be reviewed for loop closure and absolute coordinates set for a chosen reference station. The output files are in plain text coordinate format with normal vectors and are compatible with many point cloud viewers.
Current Version: 2.2.1
Changes 2.2.1: Added menu item to update point clouds from CloudCompare using new station coordinates.
Changes 2.2: Added support to convert Caveatron SV points to point cloud and LRUDs to Compass format. Bug fixes.
This software is only compatible with the Rev A Caveatron and is not used with the Rev B Caveatron which connects using MTP (Media Transfer Protocol).
Provides for connecting to the Caveatron from a PC via the USB port to view, download, and delete stored files.
Current Version: 1.1
Changes: Adds ability to upload IMU file to load new calibration parameters to the Caveatron. Requires Caveatron firmware v1.4
To install: Open the zip or dmg file and drag the contents to any location on your hard drive. Note for Windows users, the "Libs" folder must stay in the same directory as the .exe.
Built with Mobirise - See here
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00730.warc.gz
|
CC-MAIN-2023-40
| 1,307
| 10
|
https://kinetic-color.com/blogs/news/kinetic-color-foundry-on-youtube
|
code
|
I've starting making some videos documenting the processes that go on in the studio. Currently up are Making a Spinner Ring, and a more indepth Spinner Ring Finishing in Detail. Have a bunch more planned, ranging from more "how it's made" types and some demos of the actual fidgets. (And once I get a good microphone set up, there'll be a "how it sounds" section as well.) Enjoy!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00404.warc.gz
|
CC-MAIN-2023-50
| 379
| 1
|
http://stackoverflow.com/questions/2265527/how-to-create-an-apache-cxf-simple-web-service-consumer
|
code
|
I'm able to generate a client from a wsdl file. Now I need to run it in Eclipse.
When I create a Axis2 Client using Eclipse, I just create an DynamicWebProject and it automatically adds the neccessary libraries to the ClassPath.
What about ApacheCXF? Does anyone have the list of all the neccessary libraries one needs to add to the BUILD PATH manually?
On the apache web site they recommend to use Maven to achieve that functionality, but I guess, is there a simpler way?
As far as I see, the creation of Axis2 client by means of Eclipse WTP is less painful, in a few steps I get all the neccessary libraries added to the project folder.
WHAT IS the most simple step-by-step solution how to bind the generated by WSDL2Java Apache CXF client stub with the neccessary libraries TO RUN THE CLIENT?
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131310006.38/warc/CC-MAIN-20150323172150-00146-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 795
| 6
|
https://docs.microsoft.com/en-us/previous-versions/visualstudio/visual-studio-2008/bb513875(v=vs.90)?redirectedfrom=MSDN
|
code
|
How to: Debug while Running a Smart Device Unit Test
Automatic debugging is not supported for smart device unit tests because the test code runs on a device or emulator instead of on a desktop computer. Selecting Start Debugging in the Debug menu, Debug Selection in the Test View window, or Debug Checked tests in the Test List Editor only runs a test and does not debug a test. This topic describes how to debug by manually attaching the debugger to a running smart device unit test.
In the following procedures, you create a smart device unit test, prepare the device for debugging, add breakpoints to the test, and debug the test.
Your computer might show different names or locations for some of the Visual Studio user interface elements in the following instructions. The Visual Studio edition that you have and the settings that you use determine these elements. For more information, see Visual Studio Settings.
To debug while running a smart device unit test
Create a smart device application that you want to test and a smart device unit test to test it.
For more information, see Walkthrough: Creating and Running a Smart Device Unit Test.
To enable managed debugging on the device, use the Visual Studio Remote Registry Editor to create the following items in the device's registry:
A new Key under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETCompactFramework named Managed Debugger.
A new DWORD value under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETCompactFramework\Managed Debugger with the name AttachEnabled and value 1.
Set breakpoints by adding the statement System.Diagnostics.Debugger.Break() to the smart device unit test.
Breakpoints in your code will be hit only if they follow this System.Diagnostics.Debugger.Break() statement.
Start your test.
To do this, in the Test View window, right-click the test you want to run and then click Run Selection.
Wait for the test host to hit a breakpoint that you added to your unit test. When this occurs, your device will display the message: "A user break has occurred in SmartDeviceTestHost.exe."
Attach to the smart device test host process:
On the Debug menu, click Attach to Process.
Change the Transport to Smart Device.
Change the Qualifier to the device that is running the test.
Click SmartDeviceTestHost.exe in the list of Available Processes.
Visual Studio will attach to the process with execution paused at the System.Diagnostics.Debugger.Break() statement. You can click Continue on the Debug menu or press F5 to enable execution to continue to your next breakpoint.
Remove the System.Diagnostics.Debugger.Break() statement and Managed Debugger registry key when you have finished debugging. Otherwise, the breakpoint dialog box will appear every time that you run the test.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540528457.66/warc/CC-MAIN-20191210152154-20191210180154-00008.warc.gz
|
CC-MAIN-2019-51
| 2,750
| 22
|
http://tics-para-todos.blogspot.com/2013/02/how-to-resume-download-after-lost.html
|
code
|
Just because you temporarily lost your connection doesn't mean you permanently lost a download in progress. Resume a download after a lost connection with help from a computer programmer in this free video clip.
Expert: Omar Butt
Filmmaker: Omar Butt
Series Description: Knowing how to use a computer involves a lot more than just knowing how to check your email. Get tips on computer science and find out how to use a wide variety of different types of computer software with help from a computer programmer in this free video series.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945484.57/warc/CC-MAIN-20180422002521-20180422022521-00041.warc.gz
|
CC-MAIN-2018-17
| 535
| 4
|
https://support.hyland.com/r/Other/Hyland-Clinician-Window/23.1/Hyland-Clinician-Window/Configuration/Configuring-Clinician-Window/Settings-Configuration/Configuring-Cache-Expiration-Times
|
code
|
You can configure cache expiration times for the sliding cache and absolute cache.
A sliding cache expiration time defines how many seconds it takes from when the cache was most recently retrieved until the cache expires.
An absolute cache expiration time defines how many seconds from when the data was first cached until the cache is forced to be cleared.
The minimum and maximum expiration times you can enter are defined in the Clinician Window BFF configuration file. For more information on configuring the minimum and maximum expiration times to enter, see your system administrator.
To configure the cache expiration times:
Open the Settings page by doing one of the
Click the Settings option on the home page.
Click the main menu button in the upper-left corner of the Hyland Clinician Window Configuration application and select Settings.
The Settings page is displayed.
In the Caching section, enter the amount of seconds in which each type of cache should expire in the Sliding Cache Expiration Time field and the Absolute Cache Expiration Time field.
You must enter expiration times that are between the minimum and maximum expiration time thresholds defined in the BFF server configuration file. For more information on configuring the minimum and maximum expiration time thresholds, see your system administrator.
You can also press Ctrl + S to save your changes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476432.11/warc/CC-MAIN-20240304065639-20240304095639-00601.warc.gz
|
CC-MAIN-2024-10
| 1,378
| 12
|
https://www.infoplease.com/dictionary/significantdigits
|
code
|
Meaning of significant digits
— Math. Math.
- all the nonzero digits of a number and the zeros that are included between them or that are final zeros and signify accuracy:Also called The significant digits of 0.01230 are 1, 2, 3, and the final 0, which signifies accuracy to five places.
- significant digits (Thesaurus)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463615105.83/warc/CC-MAIN-20170530124450-20170530144450-00477.warc.gz
|
CC-MAIN-2017-22
| 322
| 4
|
http://www.tenacious.ninja/2016_06_03_archive.html
|
code
|
We like to thank everyone that has backed our project on Kickstarter. This is our the first trading card game by Erick Scarecrow and we are truly grateful for all the feedback so far. As we enter into the final hours of the campaign, please help us reach our goal so this project can happen.
The 9DKP trading card project features artwork from Hato Moa, Erick Scarecrow,and many others. To support this project please clink on this link here- https://www.kickstarter.com/projects/731983185/9dkp-trading-card-game
Posted by: Your Ninja Blogger Gavriel Discordia
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189680.78/warc/CC-MAIN-20170322212949-00381-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 560
| 3
|
http://anshullabs.xyz/how-to-change-color-of-address-bar-in-mobile-browser.html
|
code
|
Many popular websites like youtube and Facebook use their own brand colors for address bar in mobile browser. Recently, one of our users asked us if we could write about how to change the color of address bar in mobile browser to match their WordPress theme? In this article, we will show you how to change the color of address bar in mobile browser to match your WordPress site.
Matching the color of address bar to your WordPress site, gives it a native app-like feel. This improves user experience, which ultimately boosts sales and conversions.
Please note that currently it only works for Google Chrome web browser on Android devices.
Step 1: Using By html code
You need to add a
<meta> tag in your
name="theme-color", with your HEX code as the content value. For example:
<meta name="theme-color" content="#999999" />
You actually need 3
meta tags to support Android, iPhone and Windows Phone
<!-- Chrome, Firefox OS, Opera and Vivaldi -->
<meta name="theme-color" content="#4285f4">
<!-- Windows Phone -->
<meta name="msapplication-navbutton-color" content="#4285f4">
<!-- iOS Safari -->
<meta name="apple-mobile-web-app-status-bar-style" content="#4285f4">
Step 2: Using by WordPress plugin.
There is a very easy and simple way to change address bar color in mobile browser for wordpress site is use a plugin Mobile Address Bar Changer
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267162385.84/warc/CC-MAIN-20180925202648-20180925223048-00295.warc.gz
|
CC-MAIN-2018-39
| 1,343
| 18
|
https://www.gojane.com/132965.html
|
code
|
Looking to dress up your outfit a little? Well, a pair of these and you're golden. Open-toe vegan leather heels feature skinny toe, vamp, and ankle straps that are embellished with bubble-like dome studs. Shoes are finished with a stiletto heel, a ridged sole, and a rear zipper for easy on and off.
Heel height: 4.5" Man made materials Made in China Final Sale
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742483.3/warc/CC-MAIN-20181115033911-20181115055911-00418.warc.gz
|
CC-MAIN-2018-47
| 361
| 2
|
https://cycling74.com/forums/topic/mac-maxmsp-patches-zoomed-on-win-pc/
|
code
|
I’ve been composing MaxMSP patches on and for Mac over the past decade but, recently, have had a few users wanting to run these on a PC. I had them download and install the Windows runtime but, when they open my patches, all of the controls appear zoomed to 200%. Is there any way I can ensure my patches appear the same size and resolution on a PC as they do on the Mac?
All of the screens are of different resolutions. I run three Macs ranging from 1680×1050 to 2560×1440, and my PC is 1920×1080. While my MaxMSP patches all maintain their control size on the three Macs, the same file opened on the PC is significantly larger, having a zoomed appearance.
I did screen caps of my simplest app running on both Mac & PC (see files attached), opened them in Photoshop and did some measuring. On the Mac screen cap, the widest control in my app is 225 pixels wide (which is what I'd specified for both its patching and presentation rectangles) whereas, on the PC cap, this same control comes to 338 pixels wide, as if the MaxMSP runtime under windows automatically scaled everything up 1.5x.
I'd opened precisely the same patch file on both platforms, so why the discrepancy in size between the two? Any ideas on how I can get the controls in my patches to maintain their specified dimensions in pixels would be most appreciated. TIA if you've got any ideas…
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00573-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,363
| 4
|
https://encyclopedia2.thefreedictionary.com/equilibrium+ratio
|
code
|
iota]] is the vapor-liquid equilibrium ratio for component [iota], which is a function of temperature, pressure, liquid mole fraction, and vapor mole fraction.
iota]] vapor-liquid equilibrium ratio L liquid flow from flash condenser (mol[hr.
Mr Nickell said the equilibrium ratio
of house prices to earnings could now be higher than the average ratio since 1982, while it was very uncertain how long it would take for house prices to return to their equilibrium level.
The changes in Lerner ratios are computed by subtracting the premerger Nash equilibrium ratio
from the postmerger Nash equilibrium ratio
21) incorporating random combinations of each input variable resulted in a mean equilibrium ratio of 92 deer per wolf (CV = 15.
The difference between this ratio and the deterministic result of 90 deer per wolf indicates the level of conservatism that should be applied to the equilibrium ratio as a consequence of uncertainty surrounding the input variables.
Specifically, rewriting Equation (5) we can see that the unemployment rate increases monotonically in the equilibrium ratio
[Mathematical Expression Omitted] and is zero at [Mathematical Expression Omitted].
Under the assumption of worldwide balanced growth in the long run, the equilibrium ratio of real nonfuel merchandise imports to real domestic spending is set by the ratio of the import price deflator for nonfuel goods to the price deflator for nonfuel domestic output.
The equilibrium ratio of the inventory stock to domestic sales depends on the cost of holding inventories, which is mainly determined by the ex ante short-term real interest rate.
However, the over-expansion of 1992 disrupted the equilibrium ratio
If the equilibrium ratio
for the stock of overseas assets fails from A to (A-S) and if the rate of growth of nominal income is x per cent then the equilibrium current account surplus falls from (x/l00)*A to (x/100)*(A-S).
Under the assumption of a perfectly elastic supply of unskilled labour, a bold assumption of course, and imposition of the restrictions, similar to those imposed by Uzawa--that the skilled labour producing sector is a less intensive user of skilled labour--the system is shown to converge to a balanced growth path at an equilibrium ratio
of physical capital to human capital.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645830.10/warc/CC-MAIN-20180318165408-20180318185408-00511.warc.gz
|
CC-MAIN-2018-13
| 2,289
| 17
|
http://csharp.net-informations.com/language/task.htm
|
code
|
Task Vs Thread differences in C#
- In computer science, a Task is a future or a promise.
- A Thread is a way of fulfilling that promise.
In C#, you have the ability to utilize Tasks to define the desired operations, and subsequently associate those Tasks with Threads. In .NET 4.0, a Task represents an asynchronous operation, while Threads are employed to execute and complete these operations by dividing the workload into smaller portions and assigning them to separate threads. This parallel processing approach allows for efficient utilization of resources and improved performance by concurrently executing multiple tasks.
What is a Task?
A task represents a specific objective or set of program instructions that are loaded into memory for execution. In modern usage, the terms "task" and "process" are often used interchangeably to refer to a program instruction loaded into memory. By default, a task utilize the Threadpool, which offers resource efficiency as creating threads can be resource-intensive. Tasks provide the capability to monitor the completion of work and retrieve results if the operation yields any. From a conceptual standpoint, tasks can be perceived as higher-level abstractions built upon threads, enabling developers to work with a more abstract and streamlined approach to concurrent programming.
What is a Thread?
A thread is a fundamental component of CPU utilization, comprising essential elements such as a program counter, a stack, and a set of registers. Each thread operates within its own designated program and memory area, allowing for independent management by a scheduler. It is important to note that threads are not exclusive to the .NET framework but are inherent to the underlying operating system. In .NET, the Thread class serves as a means to create and control threads. Threads have the capability to bifurcate into multiple concurrently executing tasks, enabling parallelism and efficient utilization of system resources.
Differences Between Task And Thread
- Task is more abstract then threads. It is always advised to use tasks instead of thread as it is created on the thread pool which has already system created threads to improve the performance.
- The task can return a result. There is no direct mechanism to return the result from a thread.
- Task supports cancellation through the use of cancellation tokens. But Thread doesn't.
- A task can have multiple processes happening at the same time. Threads can only have one task running at a time.
- You can attach task to the parent task, thus you can decide whether the parent or the child will exist first.
- While using thread if we get the exception in the long running method it is not possible to catch the exception in the parent function but the same can be easily caught if we are using tasks.
- You can easily build chains of tasks. You can specify when a task should start after the previous task and you can specify if there should be a synchronization context switch. That gives you the great opportunity to run a long running task in background and after that a UI refreshing task on the UI thread.
- A task is by default a background task. You cannot have a foreground task. On the other hand a thread can be background or foreground.
- The default TaskScheduler will use thread pooling, so some Tasks may not start until other pending Tasks have completed. If you use Thread directly, every use will start a new Thread.
Tasks provide a higher-level abstraction with built-in support for resource management, synchronization, exception handling, and integration with asynchronous programming patterns. They offer more convenience and flexibility compared to working directly with threads. However, threads provide lower-level control and are suitable for specific scenarios where fine-grained control is required.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817153.39/warc/CC-MAIN-20240417110701-20240417140701-00164.warc.gz
|
CC-MAIN-2024-18
| 3,839
| 19
|
https://forums.macrumors.com/threads/system-preferences-hanging-in-snow-leopard.780795/
|
code
|
my System Preferences sometimes hangs when i open it in Snow Leopard and i have to force quit it and then reopen to use it properly. trashing its cache seems to relieve it temporarily but it soon starts to happen again and ive tried trashing its preferences file. is anyone getting this problem? is there a fix? ive tried reinstalling System Preferences but no luck.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203548.81/warc/CC-MAIN-20190325031213-20190325053213-00285.warc.gz
|
CC-MAIN-2019-13
| 366
| 1
|
https://www.firstattribute.com/en/news/access-based-enumeration-traverse-folder-service/
|
code
|
Access Based Enumeration Traverse Folder Service
Access Based Enumeration (ABE) by Microsoft exists since Windows Server 2003 SP1. On Windows Server 2003 it still had to be installed seperatly. Operating systems starting from Windows Server 2008 have it already included – but it still needs to be activated.
To grant access to a single (deep) subfolder without making the whole path visible, you can set a Traverse Folder permission. The permission must be set to all folders from the parent folder to the target folder.
Together with ABE and Traverse Folder Service of FirstAttribute you can easily build and manage an intuitive folder authorization structure.
ABE is used to hide folders and files to users which do not have an appropriate access permission. The benefits are:
- improved clarity of the directory trees for the user
- enhanced data security
- user can’t see folders without read-permission
- not knowing the name of a folder means not being able to guess the folders content
When ABE is enabled, a file system access is registered by the file server. Whether a user can access or not is based on the security token of the user and the Access Control List (ACL) of each file system object. Therefore, the ABE relates exclusively to the NTFS permissions.
ABE can also be activated for shares and DFS. Therefore, the ABE relates exclusively to the NTFS permissions.
In NTFS, it is possible to authorize a user to a subfolder, even though the user has no access permission to the parent folder.
The user can directory access the desired folder with the full path name. But there is no chance to “walk” through the directory tree step by step or to access a parent folder.
To make that possible each parent folder needs the traverse folder permission for the user. Maintaining these authorizations meeans to check all permission for the parent folders and to adjust them manually. This results in considerable effort for the admin.
The Traverse Folder Service is a service by FirstAttribute. It helps you to manage and monitor access permission for single folders but also for full DFS structures.
The service can build an initial Traverse Folder permission structure in the directory. After that is keeps running in monitor mode. In the case there is a change of any permission the Traverse Folder permissions are adjusted automatically.
For each directory level, a Traverse Folder group is automatically created and authorized. The user is then added to the authorization group. With the withdrawal of permissions the user is also automatically removed from the group. The service also works for DFS.
With the traverse folder service ABE alsways shows the correct directory structure for each suer. Another great benefit is the considerable simplification of the permission assignment because the user (or his role) needs to be assigned to desired folder only.
FirstAttribute will also support you in creating a permission and role concept or with the implementation of a DFS structure.
For further information, please feel free to contact us.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703547475.44/warc/CC-MAIN-20210124075754-20210124105754-00104.warc.gz
|
CC-MAIN-2021-04
| 3,067
| 20
|
https://communities.mentor.com/thread/4296
|
code
|
I'm having problems wrapping my head around the COM for Dx, I have a good amount of exposure to the expedition COM and maybe thats why Im getting stuck thinking that they should work similarly.
I want to get a specific symbol out of my schematic and then parse through each pin and collect the associated data. I feel like this should be do able but nothing in appDx, vddoc, or vdview appear to give me what I need. What am I missing?
Dim WithEvents appDX As ViewDraw.Application
Dim vddocColl As ViewDraw.Documents
Dim vddoc As ViewDraw.Document
Dim vdview As ViewDraw.View
Private Sub getfpga()
vddoc = appDX.ActiveDocument
vdview = appDX.ActiveView
Dim comp As ViewDraw.Component
comp = ???
Dim pin as ViewDraw.ComponentPin
pin = ???
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402131777.95/warc/CC-MAIN-20201001143636-20201001173636-00796.warc.gz
|
CC-MAIN-2020-40
| 736
| 13
|
https://www.tripleringtech.com/our-team/thomas-nocon/
|
code
|
MEET Thomas Nocon
Throughout his career, Thomas held various positions including network and systems engineer, architect, and developer. In his most recent assignment at Micro Focus (previously Hewlett-Packard Enterprise), Thomas worked in a leadership position for their public Cloud Center of Excellence team and as a Technical Engagement Manager for their private cloud SaaS environment. Before Micro Focus, Thomas was the IT Manager for DiscoverX (acquired by Eurofins), where he managed and participated in all IT operations.
Thomas has a B.S. in Business Administration, IT Management from California State University – East Bay.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664439.7/warc/CC-MAIN-20191111214811-20191112002811-00487.warc.gz
|
CC-MAIN-2019-47
| 637
| 3
|
http://www.programmableweb.com/mashup/junctionvox
|
code
|
Instantly call everyone in your team using group call and toll-free conference calls for team leaders. Call at any time with no need to schedule, or hold scheduled calls with up to 20 participants.
Your Mashup not listed on ProgrammableWeb yet? Tell us about it and get listed.
Lottery Results on Cell Phone
Writing a Mobility Mashup using Ringful API
RFacebook Ruby Gem
Python for SMS and Voice using BT API
Twilio Client for Zend Framework
Twilio WCF REST Client Library
Twilio "Contact Me" Page
Click to Call for Microsoft Dynamics CRM 2011
APIs, mashups and code. Because the world's your programmable oyster.
Executive Editor, ProgrammableWeb. Author, Map Scripting 101. Lover, APIs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526311.33/warc/CC-MAIN-20140416005206-00115-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 688
| 12
|
https://maze.co/use-cases/content-and-copy-testing/
|
code
|
Research & Testing
How to test content like a pro: A step-by-step guide
Ryan Williams • Nov 5, 2020
Test everything from website messaging to product copy with real users and get early feedback on things like clarity, tone of voice, and overall perception.
Run 5-Second Tests
First impressions count. Discover if your ideas deliver by sharing quick images and concepts with users.
Create different test paths based on your users’ responses and gather more contextual data.
Ask Open Questions
Remove biases and empower users to share their honest feedback.
Run Opinion Scales
Easily identify trends by asking users to rate ideas on a numeric or emotion-based opinion scale.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00311.warc.gz
|
CC-MAIN-2022-33
| 676
| 11
|
https://forum.boltiot.com/t/delay-in-certain-topics-of-python-training/23732
|
code
|
I have taken your Placement Preparation Training in python . There are certain courses that were supposed to go live on 31 October 2022. These chapters are not available yet. Kindly do the necessary arrangements so that I can complete the training at the earliest and proceed with the internships. Please mention a date by which these topics will be available.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710789.95/warc/CC-MAIN-20221201021257-20221201051257-00854.warc.gz
|
CC-MAIN-2022-49
| 360
| 1
|
http://greatis.com/appdata/d/PROGRAM_FILES/f/free%20opener_redist_install_flash_player_ax.exe.htm
|
code
|
INSTALL_FLASH_PLAYER_AX.EXE - Dangerous
%PROGRAM FILES%\FREE OPENER\REDIST\INSTALL_FLASH_PLAYER_AX.EXE
Manual removal instructions:
|%PROGRAM FILES%\FREE OPENER\REDIST\INSTALL_FLASH_PLAYER_AX.EXE||Win.Trojan.Swrort-9441|
|%PROGRAM FILES%\FREE OPENER\REDIST\INSTALL_FLASH_PLAYER_AX.EXE||Dangerous|
|%PROGRAM FILES%\FREE OPENER\REDIST\INSTALL_FLASH_PLAYER_AX.EXE||High Risk|
INSTALL_FLASH_PLAYER_AX.EXE is known as: Win.Trojan.Swrort-9441
MD5 of INSTALL_FLASH_PLAYER_AX.EXE = ee7a80287bb56cccd13306bec562a843
INSTALL_FLASH_PLAYER_AX.EXE size is 2871968 bytes.
Full path on a computer: %PROGRAM FILES%\FREE OPENER\REDIST\INSTALL_FLASH_PLAYER_AX.EXE
%Program Files%\Free Opener\Raw\dcraw.exe
%Program Files%\Free Opener\Redist\DotNetFx35ClientSetup.exe
%Program Files%\Free Opener\Redist\install_flash_player_ax.exe
%Program Files%\Free Opener\Redist\K-Lite_Codec_Pack_700_Standard.exe
%Program Files%\Free Opener\Redist\klcp_standard_unattended.bat
by NightWatcherINSTALL_FLASH_PLAYER_AX.EXE Dangerous Rating: 5 out of 5
My PC had gotten a bad rootkit that my ISP antivirus software (powered by McAfee) could not detect, nor could fix.
I sought a solution on the Internet and discovered your product and tried out the trial of UnHackMe.
You quickly found the rootkit and SAVED my PC!
I haven't had any problems since, and I'm extremely grateful.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120092.26/warc/CC-MAIN-20170423031200-00334-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,342
| 20
|
https://www.tech-invite.com/y15/tinv-ietf-rfc-1701.html
|
code
|
Network Working Group S. Hanks Request for Comments: 1701 NetSmiths, Ltd. Category: Informational T. Li D. Farinacci P. Traina cisco Systems October 1994 Generic Routing Encapsulation (GRE) Status of this Memo This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies a protocol for performing encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. Introduction A number of different proposals [RFC 1234, RFC 1226] currently exist for the encapsulation of one protocol over another protocol. Other types of encapsulations [RFC 1241, SDRP, RFC 1479] have been proposed for transporting IP over IP for policy purposes. This memo describes a protocol which is very similar to, but is more general than, the above proposals. In attempting to be more general, many protocol specific nuances have been ignored. The result is that this proposal is may be less suitable for a situation where a specific "X over Y" encapsulation has been described. It is the attempt of this protocol to provide a simple, general purpose mechanism which is reduces the problem of encapsulation from its current O(n^2) problem to a more manageable state. This proposal also attempts to provide a lightweight encapsulation for use in policy based routing. This memo explicitly does not address the issue of when a packet should be encapsulated. This memo acknowledges, but does not address problems with mutual encapsulation [RFC 1326]. In the most general case, a system has a packet that needs to be encapsulated and routed. We will call this the payload packet. The payload is first encapsulated in a GRE packet, which possibly also includes a route. The resulting GRE packet can then be encapsulated in some other protocol and then forwarded. We will call this outer
protocol the delivery protocol. The algorithms for processing this packet are discussed later. Overall packet The entire encapsulated packet would then have the form: --------------------------------- | | | Delivery Header | | | --------------------------------- | | | GRE Header | | | --------------------------------- | | | Payload packet | | | --------------------------------- Packet header The GRE packet header has the form: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |C|R|K|S|s|Recur| Flags | Ver | Protocol Type | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum (optional) | Offset (optional) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Key (optional) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence Number (optional) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Routing (optional) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Flags and version (2 octets) The GRE flags are encoded in the first two octets. Bit 0 is the most significant bit, bit 15 is the least significant bit. Bits 13 through 15 are reserved for the Version field. Bits 5 through 12 are reserved for future use and MUST be transmitted as zero.
Checksum Present (bit 0) If the Checksum Present bit is set to 1, then the Checksum field is present and contains valid information. If either the Checksum Present bit or the Routing Present bit are set, BOTH the Checksum and Offset fields are present in the GRE packet. Routing Present (bit 1) If the Routing Present bit is set to 1, then it indicates that the Offset and Routing fields are present and contain valid information. If either the Checksum Present bit or the Routing Present bit are set, BOTH the Checksum and Offset fields are present in the GRE packet. Key Present (bit 2) If the Key Present bit is set to 1, then it indicates that the Key field is present in the GRE header. Otherwise, the Key field is not present in the GRE header. Sequence Number Present (bit 3) If the Sequence Number Present bit is set to 1, then it indicates that the Sequence Number field is present. Otherwise, the Sequence Number field is not present in the GRE header. Strict Source Route (bit 4) The meaning of the Strict Source route bit is defined in other documents. It is recommended that this bit only be set to 1 if all of the the Routing Information consists of Strict Source Routes. Recursion Control (bits 5-7) Recursion control contains a three bit unsigned integer which contains the number of additional encapsulations which are permissible. This SHOULD default to zero. Version Number (bits 13-15) The Version Number field MUST contain the value 0. Other values are outside of the scope of this document.
Protocol Type (2 octets) The Protocol Type field contains the protocol type of the payload packet. In general, the value will be the Ethernet protocol type field for the packet. Currently defined protocol types are listed below. Additional values may be defined in other documents. Offset (2 octets) The offset field indicates the octet offset from the start of the Routing field to the first octet of the active Source Route Entry to be examined. This field is present if the Routing Present or the Checksum Present bit is set to 1, and contains valid information only if the Routing Present bit is set to 1. Checksum (2 octets) The Checksum field contains the IP (one's complement) checksum of the GRE header and the payload packet. This field is present if the Routing Present or the Checksum Present bit is set to 1, and contains valid information only if the Checksum Present bit is set to 1. Key (4 octets) The Key field contains a four octet number which was inserted by the encapsulator. It may be used by the receiver to authenticate the source of the packet. The techniques for determining authenticity are outside of the scope of this document. The Key field is only present if the Key Present field is set to 1. Sequence Number (4 octets) The Sequence Number field contains an unsigned 32 bit integer which is inserted by the encapsulator. It may be used by the receiver to establish the order in which packets have been transmitted from the encapsulator to the receiver. The exact algorithms for the generation of the Sequence Number and the semantics of their reception is outside of the scope of this document. Routing (variable) The Routing field is optional and is present only if the Routing Present bit is set to 1.
The Routing field is a list of Source Route Entries (SREs). Each SRE has the form: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Address Family | SRE Offset | SRE Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Routing Information ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The routing field is terminated with a "NULL" SRE containing an address family of type 0x0000 and a length of 0. Address Family (2 octets) The Address Family field contains a two octet value which indicates the syntax and semantics of the Routing Information field. The values for this field and the corresponding syntax and semantics for Routing Information are defined in other documents. SRE Offset (1 octet) The SRE Offset field indicates the octet offset from the start of the Routing Information field to the first octet of the active entry in Source Route Entry to be examined. SRE Length (1 octet) The SRE Length field contains the number of octets in the SRE. If the SRE Length is 0, this indicates this is the last SRE in the Routing field. Routing Information (variable) The Routing Information field contains data which may be used in routing this packet. The exact semantics of this field is defined in other documents. Forwarding of GRE packets Normally, a system which is forwarding delivery layer packets will not differentiate GRE packets from other packets in any way. However, a GRE packet may be received by a system. In this case, the system should use some delivery-specific means to determine that this is a GRE packet. Once this is determined, the Key, Sequence Number and Checksum fields if they contain valid information as indicated by the corresponding flags may be checked. If the Routing Present bit
is set to 1, then the Address Family field should be checked to determine the semantics and use of the SRE Length, SRE Offset and Routing Information fields. The exact semantics for processing a SRE for each Address Family is defined in other documents. Once all SREs have been processed, then the source route is complete, the GRE header should be removed, the payload's TTL MUST be decremented (if one exists) and the payload packet should be forwarded as a normal packet. The exact forwarding method depends on the Protocol Type field. Current List of Protocol Types The following are currently assigned protocol types for GRE. Future protocol types must be taken from DIX ethernet encoding. For historical reasons, a number of other values have been used for some protocols. The following table of values MUST be used to identify the following protocols: Protocol Family PTYPE --------------- ----- Reserved 0000 SNA 0004 OSI network layer 00FE PUP 0200 XNS 0600 IP 0800 Chaos 0804 RFC 826 ARP 0806 Frame Relay ARP 0808 VINES 0BAD VINES Echo 0BAE VINES Loopback 0BAF DECnet (Phase IV) 6003 Transparent Ethernet Bridging 6558 Raw Frame Relay 6559 Apollo Domain 8019 Ethertalk (Appletalk) 809B Novell IPX 8137 RFC 1144 TCP/IP compression 876B IP Autonomous Systems 876C Secure Data 876D Reserved FFFF See the IANA list of Ether Types for the complete list of these values. URL = ftp://ftp.isi.edu/in-notes/iana/assignments/ethernet-numbers.
References RFC 1479 Steenstrup, M. "Inter-Domain Policy Routing Protocol Specification: Version 1", RFC1479, BBN Systems and Technologies, July 1993. RFC 1226 Kantor, B. "Internet Protocol Encapsulation of AX.25 Frames", RFC 1226, University of California, San Diego, May 1991. RFC 1234 Provan, D. "Tunneling IPX Traffic through IP Networks", RFC 1234, Novell, Inc., June 1991. RFC 1241 Woodburn, R., and D. Mills, "Scheme for an Internet Encapsulation Protocol: Version 1", RFC 1241, SAIC, University of Delaware, July 1991. RFC 1326 Tsuchiya, P., "Mutual Encapsulation Considered Dangerous", RFC 1326, Bellcore, May 1992. SDRP Estrin, D., Li, T., and Y. Rekhter, "Source Demand Routing Protocol Specification (Version 1)", Work in Progress. RFC 1702 Hanks, S., Li, T., Farinacci, D., and P. Traina, "Generic Routing Encapsulation over IPv4 networks", RFC 1702, NetSmiths, Ltd., cisco Systems, October 1994. Security Considerations Security issues are not discussed in this memo.
Acknowledgements The authors would like to acknowledge Yakov Rekhter (IBM) and Deborah Estrin (USC) for their advice, encouragement and insightful comments. Authors' Addresses Stan Hanks NetSmiths, Ltd. 2025 Lincoln Highway Edison NJ, 08817 EMail: firstname.lastname@example.org Tony Li cisco Systems, Inc. 1525 O'Brien Drive Menlo Park, CA 94025 EMail: email@example.com Dino Farinacci cisco Systems, Inc. 1525 O'Brien Drive Menlo Park, CA 94025 EMail: firstname.lastname@example.org Paul Traina cisco Systems, Inc. 1525 O'Brien Drive Menlo Park, CA 94025 EMail: email@example.com
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499695.59/warc/CC-MAIN-20230128220716-20230129010716-00192.warc.gz
|
CC-MAIN-2023-06
| 11,378
| 8
|
https://www.doomworld.com/profile/13035-dobu-gabu-maru/?status=1732289&type=status
|
code
|
Single Status Update
These were two of the draft sheets I used while making my last puzzle map, Perplexed!. The top section had me trying to figure out what ways I can gate the player from reaching the exit as well as all the mechanics I had planned to thwart the player. Originally I thought about gating off the tower of hanoi switches in each section, since if the player completed that, they'd be able to exit the map. I ended up deciding against that however, since it would more or less offer a "suggested path" to the player, since they'd see certain switches as easy to hit and others as much harder, which would naturally make them want to find a way to the hard switches. So instead I broke the exit up into two sections (move the tower of hanoi to the middle & raise the flunnies), and found ways to incorporate the mechanics into achieving both ends.
The bottom of the sheet isn't my original draft of the map, but instead the outline intended for the in-game map. There was a lot of text so I had to find ways to shorten everything and try and represent concepts by their in-game visuals instead of their names, which was interesting. It was way more dificult coming up with the "step by step" guide on skill 2, since I barely had room to write in a 256x256 space, and had to leave off most of the details (like leaving the blikblok facing east if you go to exit).
This was definitely the busiest map I've made to date, and part of the reason why I didn't go out of my way to really spruce up the visuals and add a lot of unique lighting is that I spent foreverrrr planning and writing dialogue that I was done with the map by the time it all worked.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902377.71/warc/CC-MAIN-20200709224746-20200710014746-00127.warc.gz
|
CC-MAIN-2020-29
| 1,663
| 4
|
https://www.qwiklabs.com/focuses/8390/reviews?parent=catalog
|
code
|
Build a Serverless App with Cloud Run that Creates PDF Files
PDF converter app seems to not work. It fails witj JS error shown in logs.
The service account was different than in the transcript. And I had some issue with the code - was getting "Cannot read property 'data' of undefined" errors
It would be very helpful to write up a sequential action list to specify what each command is doing and why The time allocated is too short for most users. Arguably this is much more complicated than AWS Lambda. I guess the point is to let the developer focus on writing code than infrastructure. The cloud run seems to defeat the purpose. There are so many steps that has nothing to do with application logics but pure infrastructure.
The format is great but I hit an issue with enabling my project to create Cloud Pub Sub Authentication tokens which I could not resolve. I was able to progress but the checks did not realise this was missing and files did not get processed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360107.7/warc/CC-MAIN-20210228024418-20210228054418-00087.warc.gz
|
CC-MAIN-2021-10
| 969
| 5
|
https://redmine.gc.cuny.edu/issues/313
|
code
|
Create Plugin/Widget for Hero Image Space on Commons Homepage
Please see discussion on Basecamp.
#2 Updated by Boone Gorges over 11 years ago
I've installed Ron's plugin on the wp-3.0-upgrade branch with https://github.com/castiron/cac/commit/7003dbe818f601a1a8ab83f12e7db0bca30f4b36. Still needs some styling and bugfixing to make it work with our theme.
#3 Updated by Boone Gorges over 11 years ago
- Status changed from Assigned to Resolved
I've made the changes necessary to make the widget look right on the front page.
For some reason there were some weird styling conflicts between Ron's release version and the Commons style. I stared at the CSS and markup for a long time, guessing at a lot of stuff, before I finally got it to look right. It needs cross-browser checks, and I encourage you not to look at the code, as it is messy and sucky. But as of now it looks right, at least.
Ron, I was having problems with the way that the plugin was feeding inline height/width attributes on the images. I changed line 114 to
<?php echo apply_filters( 'pgw_image_markup', $p->tag ); ?>
Then I put a filter in our theme's functions.php that grabs the height/width attributes in the markup and changes them to the correct values. Again, this is probably a stupid way to do it, but for the life of me I couldn't get it to work with CSS, and a stupid working method is better than a proper non-working one :)
There is also a slight issue with the way that the widget loads. It seems as if there's a hiccup before it loads the plugin's stylesheet. You can see it at http://cdev.gc.cuny.edu. This seems like an issue beyond Ron's plugin, so I'll open a separate ticket for it.
A note to myself and anyone else who manages the Gallery Posts data type. Don't put images directly into the post, as they'll show up double. Just upload them from the post edit screen, so that they're associated with the plugin. Also, when launching on the real site, choose "Large" as the image size on the widget.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662556725.76/warc/CC-MAIN-20220523071517-20220523101517-00786.warc.gz
|
CC-MAIN-2022-21
| 1,988
| 13
|
http://datablog.is.ed.ac.uk/
|
code
|
This is guest post from Giacomo Peru and the EdCarp Committee (https://edcarp.github.io/committee/). Sections of this post were published previously on the EPCC blog.
The Edinburgh Carpentries (EdCarp) is a training initiative, which offers the Carpentries computing and data skills curriculum in Edinburgh. The workshops train researchers on fundamental skills needed for conducting efficient, open, and reproducible research. The EdCarp team comprises staff and student volunteers from across disciplines, academic units, and career stages.
Since 2018, EdCarp has organised 25 workshops across the academic institution, training over 300 staff and students in data cleaning, manipulation, visualisation and version control methods using tools such as R, python, Unix shell, Git, SQL and OpenRefine. Courses are free to participants and are oversubscribed very quickly. We are now rolling out our 2020 schedule and announcing workshops.
EdCarp are working to establish collaborations with other organisations, external and internal to the university: the Scottish Funding Council, the Institute for Academic Development and the Data Driven Innovation programme.
EdCarp can work with your academic unit or doctoral training program to help promote the fundamental data skills that your colleagues need.
A crucial aspect of EdCarp and their training model is the participation and voluntary commitment of the community, where trainees go to become helpers, helpers to instructors and so on. EdCarp are always looking for new people willing to help, in any capacity; please sign up here if you would like to be kept updated and/or get involved: https://eepurl.com/gl4MsX.
This is a guest post from Dr. Tamar Israeli, who completed a work/study internship with the Research Data Support team last Autumn. A link to her report is available below.
Recently, there has been a rumor in Israel that research data should be managed. As a librarian and information specialist working in an academic institution, I decided to check if this was true.
When looking for a place for an internship on the role of the library in research data management (RDM), I was happy to find out that the University of Edinburgh RDM support team has a good reputation. I remember enjoying very much my visit to Edinburgh 30 years ago so I was very happy to get Robin Rice & Martin Donnelly’s kind invitation so I could boldly go where… I had already been before.
During September 2019, I worked with the RDM support team, attended some of the staff meetings and participated in one of the RDM trainings. As part of my internship we carried out a small scale study. The purpose of the study was mainly to understand what are the barriers that prevent researchers from using tools and services provided to them by the university when collaborating with data.
For that purpose, I interviewed six researchers from different schools and disciplines. The researchers were open and cooperative and the interviews were very interesting and insightful. If you’d like to learn about the way researchers collaborate and what influences their decision to use a particular tool or service, here is a link to our report: http://dx.doi.org/10.7488/era/2
Many thanks to the support team for their invitation and warm hospitality. It was one of the most pleasant months of my life.
Librarian and information specialist
Western Galilee College
The Edinburgh DataVault is a secure long-term retention solution for research data.
Thanks to the hard work of our software developers in the Digital Library and EDINA, the Edinburgh DataVault now facilitates five different user roles. This means busy PIs can delegate the work of depositing and retrieving data, to members of their team or other collaborators within the University. It also allows PIs to nominate support staff to deposit and retrieve data on their behalf, or grant access to new members of their team.
Diagram representing a PI and two postdocs using the roles of Owner and Nominated Data Manager to share access to data in the DataVault
There are five user roles:
- Data Owner
Usually the Principal Investigator. Can add/remove other users to their vault(s).
- Nominated Data Manager (of a given vault)
Can view and edit metadata fields, deposit data and retrieve any deposit in the vault. May add/remove Depositors to the vault.
- Depositor (of a given vault)
Can view the vault contents, deposit data and retrieve any deposit in the vault.
- School Support Officer
Acting on behalf of the Head of School, may view all vaults and associated deposits belonging to the School.
- School Data Manager
Assigned only with the express permission of the Head of School, may view, deposit into and retrieve data from any vault belonging to the School.
Full details of the permissions associated with each role:
Roles and permissions
Support staff who need to view reporting data for their School, or admin access to their School’s vaults, should attend our training – Edinburgh DataVault: supporting users archiving their research data.
Further information on why and how to use the DataVault is available on the Research Data Service website:
DataVault long-term retention
If you have any questions about using DataVault please don’t hesitate to contact the Research Data Support team at email@example.com.
Pauline Ward, Research Data Support Assistant
Library and University Collections
Information Services aims to offer a research data service that meets most of the data lifecycle needs of the majority of UoE researchers without interfering with their freedom to choose tools and technologies which suit their work. In some cases cloud tools that are free to individual users are offered commercially as enterprise versions, allowing groups of researchers (such as lab groups) to work together efficiently.
The service’s steering group has agreed a set of criteria to apply when a tool is put forward by a research group for adoption. The criteria were developed after our two-year trial of the electronic lab notebook software, RSpace, and have been most recently applied to protocols.io. The protocols.io trial begins this month and will run for one year. An evaluation will determine whether to continue the enterprise subscription and how to fund it.
protocols.io is an online platform for the creation, management, and sharing of research protocols or methods. Users can create new protocols within the system, or upload existing methods and digitise them. Those with access to a protocol can then update, annotate, or fork it so that it can be continually improved and developed. There is interoperability with Github and RSpace, and long-term preservation of protocols through CLOCKSS.
Users can publish their protocol(s) making them freely available for others to use and cite or, with the enterprise version, keep them private. The tool supports the Open Science / Open Research agenda by helping to ensure that methods used to produce data and publications are made available, assisting with reproducibility.
Subscribing to the University plan will allow research groups to organize their methods and ensures that knowledge is not lost as trainees graduate and postdoctoral students move on. There are currently over 70 University of Edinburgh researchers registered to use protocols.io. You may follow these instructions to move your current protocols.io account to the premium university version. For more information contact firstname.lastname@example.org.
Kerry Miller and Robin Rice
Research Data Support team
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371637684.76/warc/CC-MAIN-20200406133533-20200406164033-00361.warc.gz
|
CC-MAIN-2020-16
| 7,554
| 43
|
http://dev.mysql.com/doc/mysql-utilities/1.4/en/connector-j-fabric-connect.html
|
code
|
When using Connector/J with MySQL Fabric, you must provide the
host name and port of the MySQL Fabric server instead of the
database server. The connection string must follow the same form
it normally does, with the addition of the
fabric keyword, as follows:
The user name and password provided to the connection are used for authentication with both the MySQL Fabric server and the individual database servers.
If you are using Java 5, you must manually load the driver class before attempting to connect.
Connection now proceeds normally.
Connection conn = DriverManager.getConnection( "jdbc:mysql:fabric://fabrichost:32274/database", user, password);
To use the Connector/J APIs that support MySQL Fabric, you must
Connection object to the public
interface that provides the necessary methods. The interfaces are:
JDBC3 interface, compatible with Java 5 and later
JDBC4 interface, compatible with Java 6 and later. This
interface must be used to access JDBC4 APIs on the connection.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653402/warc/CC-MAIN-20140305060733-00001-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 986
| 15
|
https://www.vn.freelancer.com/projects/mysql/sql-database-data-minning/
|
code
|
sql database and data minning.
35 freelancer đang chào giá trung bình $155 cho công việc này
I'm powerful database manager. Well designed SQL will make your project useful and powerful. I can make nice SQL for your project. Please shake with me for your project.
I'm oracle certified SQL Expert and have worked on enterprise application. I would like to discuss the details of the project and after that I will be able to tell you the deadlines and details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257767.49/warc/CC-MAIN-20190524204559-20190524230559-00545.warc.gz
|
CC-MAIN-2019-22
| 465
| 4
|
http://stackoverflow.com/questions/2463714/google-app-engine-how-can-i-improve-my-cold-start-jvm-time/2749722
|
code
|
I'm not new to improving my cold start time, I've spent many hours trying different things. I'd like if possible to know exactly what the Google App Engine does during a cold start.
I have a log statement as described here http://code.google.com/intl/nl/appengine/kb/java.html#performance to show when my code first gets control.
I have two apps that I have been testing, one is simple, and my code first gets control after about 1 second.
The other one has lots of files and stuff and my code first gets control after about 2 seconds. This one doesn't use any more libraries than the other one, however it does have a lot more jsps and java classes.
Could simply having more java and jsp classes cause slower cold start, even if the class isn't used?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828010.65/warc/CC-MAIN-20160723071028-00288-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 751
| 5
|
https://data.openei.org/search?q=cross-section&ra%5B%5D=Energy%20Analysis
|
code
|
Search OEDI Data
Showing results 1 - 3 of 3.
Show results per page.
Clear All Filters ×
Midtown Passive House
To further define its market position on high performance homebuilding, Brookfield worked with IBACOS and the Building America program to design and construct a Passive House (PH) certified model home to evaluate advanced building technologies and to use as a marketing tool for...
Beach, R. et al Ibacos Innovation
Apr 27, 2016
Demand-Side Grid Model (dsgrid) Data from the Electrification Futures Project (EFS)
This data set contains the full-resolution and state-level data described in the linked technical report (https://www.nrel.gov/docs/fy18osti/71492.pdf). It can be accessed with the NREL-dsgrid-legacy-efs-api, available on GitHub at https://github.com/dsgrid/dsgrid-legacy-efs-api a...
Hale, E. et al National Renewable Energy Laboratory
Jul 08, 2018
Solar-to-Grid Public Data File for Utility-scale (UPV) and Distributed Photovoltaics (DPV) Generation, Capacity Credit, and Value for 2012-2020
Lawrence Berkeley National Laboratory (Berkeley Lab) estimates hourly project-level generation data for utility-scale solar projects and hourly county-level generation data for residential and non-residential distributed photovoltaic (PV) systems in the seven organized wholesale m...
Seel, J. et al Lawrence Berkeley National Lab
Oct 01, 2021
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943750.71/warc/CC-MAIN-20230322051607-20230322081607-00133.warc.gz
|
CC-MAIN-2023-14
| 1,361
| 16
|
https://yo-dave.com/2011/02/06/literate-programming/
|
code
|
Ever since Donald Knuth published “Literate Programming” back in 1984, I’ve been a fan. Telling a computer how to run a program and helping a human understand it are two different but very necessary things.
Of course all programming languages have a commenting facility. But often that is just not sufficient to explain what is going on in a program. In my own work, the typical commenting facilities simply do not have the power to describe algorithmic details efficiently, particularly in the area of mathematics. Knuth addressed the problem with his WEB, and later, CWEB programs. He invented the TeX typesetting system and LaTex document preparation system in pursuit of this goal. His efforts have been embraced by the scientific community, particularly in the area of mathematics.
Others have been inspired to take up the cause as well. For example, the FWEB system provides literate programming tools for FORTRAN. The Racket project has created a very powerful new tool to create documents for their Scheme-like group of languages. The Scribble system provides a very comfortable tool for creating documentation and doing literate programming in the Racket environment. The article “Scribble: Closing the Book on Ad Hoc Documentation Tools” describes this system briefly. As you might expect, detailed documentation exists elsewhere and is updated regularly.
Another recent tool is Marginalia for Clojure created by Michael Fogus. Graphically, this tool takes a different approach. As the name suggests, it presents the program and commentary as two columns, sort of like you might annotate a book in the margins. I haven’t used it seriously yet and it may not support the description of complex math (or maybe it does), but it is certainly a pleasure to read the output.
There doesn’t seem to be a canonical system or tool for literate programming in Lisp, although there are a few examples with noweb. This site (Dead Link) seems to promise a new “system real soon now”. The report (Broken Link) on the system looks promising.
However, of all the systems out there, the real champion for literate programming is Mathematica®. Mathematica is a computer mathematics systems at its heart. You can do extensive and sophisticated symbolic mathematics as well as create numerical results. Programming is done using a language that has some very Lisp-like characteristics. But the thing that makes it so useful for literate programming is the notebook interface. You can do everything you want in the notebook: write text with mathematics, do symbolic math, do numerical math, program, plot results and so on. The notebooks are “live”, so you can make changes and recalculate at any time. You can send the notebooks to others with a Mathematica system so they can change arguments, fiddle with settings, and experiment as they see fit. The notebooks can be converted to high quality PDF files for those who don’t have Mathematica, although they won’t be able to do the same manipulations.
My favorite use of Mathematica is working through new algorithms that appear in the literature. I can create what I call “walkthroughs” of the paper describing the math, noting my interpretation, creating functions that implement the algorithms, plotting results, and so on. When completed, these can be shared with colleagues to help their understanding or to check my assumptions and interpretations. For example, I once worked through an unsupervised color deconvolution method for a project I was working on. It turned out that the algorithm did not work robustly for what we needed. However, a colleague at another site of my company was trying to get the same algorithm to work for a different purpose, but having difficulty with the implementation. A third colleague knew of my previous work and sent them a copy of the notebook. It produced the desired “Aha!” moment and someone got some use of my work.
Mathematica has been around for a long time and is constantly improving. It’s a great thing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103639050.36/warc/CC-MAIN-20220629115352-20220629145352-00497.warc.gz
|
CC-MAIN-2022-27
| 4,032
| 8
|
https://thomasgauvin.com/blog/micro-web-application-azure-functions-sqlite
|
code
|
Recently, I read about the utility of SQLite for web servers and was intrigued by the possibility of using SQLite and an Azure Function to host an effectively free web application. Since an Azure Functions app comes along with an Azure Files storage account by default, the Azure Function should be able to store and read an SQLite file.
Researching into this concept, I found that it had been tried in the past but I was still curious about the scalability and performance of such a solution. I also wanted to validate the possibility of hosting an entire application on an Azure Function rather than just an API, with the goal of offloading the frontend SPA-like processing from my old device. This is the project I built to achieve this objective.
Personal Finance Tracker is a proof-of-concept application demonstrating the possibility of hosting an entire application within an Azure Functions application. The NodeJS Azure Function dynamically generates HTML for the interface, processes API requests for any CRUD actions, and stores data in an SQLite database file.
The application allows the manual entry of statements of accounts and shows a graph of the history of the total of the amounts in every account.
The Azure Function app was scaffolded using Visual Studio Code's Azure extension. 5 HTTP Trigger functions with anonymous authorization were created.
GET /api/Home generates and returns the HTML to be rendered by the browser.
POST /api/CreateAccount and
DELETE /api/DeleteAccount are REST API endpoints that allow the creation and deletion of an account (column).
POST /api/CreateStatements and
DELETE /api/DeleteStatements are also REST API endpoints that allow the creation and deletion of statements (row). A shared database access helper file is also created in the
Note that Azure Functions are typically used as APIs, and have their routes prepended with
/api/. However, since we are using Azure Functions in a manner counter to intended, the
/api/Home route will return an HTML page.
The helper file
/Home/renderHTML.js is responsible for generating the HTML file. Styles and scripts are included within the HTML since they cannot be referred to as files as this is not a typical web server. Additional configurations would have had to be done to serve these static files. This makes the
renderHTML.js file somewhat busy, and an area for potential improvements.
The database contains 2 tables:
accounts represent the accounts identified by their title, and
statements represent the amount in an account on a specific date.
If you want to deploy the application as a Windows Function App, keep reading. If you prefer to deploy as a Linux Function App, jump to the note in the Additional Notes section below.
- Clone the source code of the application locally. Run
func startand ensure the application is working locally.
- Create an Azure Function resource in the Azure Portal, configured as a Consumption app with Windows as the OS. Take note of the name of the Function App you just created. This step will create the accompanying storage account which will store the SQLite database.
- Deploy the application using the
func azure functionapp publish <FUNCTION_APP_NAME> --nozip. This deploys the local source code to the Azure Function resource, and the
--nozipoptions turns off Run-From-Package mode. This will allow us to manually install npm packages in the Azure portal.
- From the Azure Portal, navigate to the Azure Function. In the left menu pane of the Azure Function, navigate to Console.
npm install sqlite sqlite3in the console to install
sqlite3npm packages for the Azure Function. This may take a few minutes.
- Try out the application! Navigate to
https://<FUNCTION_APP_NAME>.azurewebsites.net/api/Homeand test it out!
sqlite3 must be installed within the Azure portal to ensure that the native bindings used by
sqlite3 correspond to the OS version of the host machine running the Azure Functions. Those packages only need to be installed once. Future deployments will only update the source code being used.
Performance & benchmarking
My main concern with such a usage of SQLite on Azure Functions would be the performance. Since this is not an intended usage of Azure Functions, the file locking and concurrency of the SQLite file could slow down the response times of the Azure Function. Therefore, I benchmarked the response times under varying loads using Apache Benchmark. Note that this benchmarking was done on functions that were 'warmed-up' to avoid the response delay caused by a function cold-start.
ab -n 100 -c 10 "https://FUNCTION_APP_NAME.azurewebsites.net/api/home"
Connection Times (ms) min mean[+/-sd] median max Connect: 75 96 11.2 94 152 Processing: 266 613 209.6 570 1435 Waiting: 242 582 209.2 541 1409 Total: 356 708 209.0 664 1524 Percentage of the requests served within a certain time (ms) 50% 664 66% 781 75% 849 80% 887 90% 974 95% 1068 98% 1327 99% 1524 100% 1524 (longest request)
These results demonstrate the response times if 10 users concurrently made 10 requests each. With a mean of 0.7s and a longest time of 1.5s, we can see that these response times are decent.
As expected, increasing the concurrency count increases the response times. With a concurrency of 100 users, the application response times make for a poor user experience.
ab -n 100 -c 100 "https://FUNCTION_APP_NAME.azurewebsites.net/api/home"
Connection Times (ms) min mean[+/-sd] median max Connect: 89 233 166.7 208 1174 Processing: 310 5538 1167.8 5648 7071 Waiting: 250 5509 1164.6 5623 7037 Total: 399 5771 1184.4 5991 7350 Percentage of the requests served within a certain time (ms) 50% 5991 66% 6563 75% 6657 80% 6754 90% 6964 95% 7123 98% 7280 99% 7350 100% 7350 (longest request)
These results show that the SQLite-backed Azure Function has mean response times of 5.8s under a load of 100 concurrent users, which would result in a poor user experience.
For comparison's sake, I decided to benchmark an Azure Function API that uses CosmosDB as storage. Here are the results for 100 concurrent users:
ab -n 100 -c 100 "https://<FUNCTION_APP_NAME>.com/api/getMeetingInfo?meetingId=meetingID"
Connection Times (ms) min mean[+/-sd] median max Connect: 140 187 15.5 188 227 Processing: 116 851 303.1 934 2657 Waiting: 114 850 303.9 933 2657 Total: 271 1038 304.4 1115 2812 Percentage of the requests served within a certain time (ms) 50% 1115 66% 1184 75% 1246 80% 1263 90% 1312 95% 1342 98% 1357 99% 2812 100% 2812 (longest request)
As we can see, CosmosDB performs much better. CosmosDB-backed Azure Functions managed 1.0s mean response times with 100 concurrent users, compared to the 5.8s of the SQLite-backed Azure Functions used in this project. Response times of an SQLite-backed Azure Function are about 5-6 times those of a CosmosDB-backed Azure Function.
Cold starts are also much worse with an SQLite-backed Azure Function than a CosmosDB one. My experience is that CosmosDB-backed functions have 4-6s response times for cold functions, compared to 10-15s response times for cold SQLite-backed functions. I would hypothesize that additional time is required to mount the storage to the Azure Function compute which isn't required when using an external database such as CosmosDB. Clearly, Azure does not intend for the file system to be used in this way.
SQLite with Azure Functions is possible, but it is slow for 100 concurrent users (~6s response times). It also aggravates the cold-start delay by a factor of 2-3x. Building an application with Azure Functions and SQLite would only make sense for a personal project with a handful of users, and even then, other options such as CosmosDB/Azure Table/Azure SQL should be considered.
The deployment of SQLite was complicated because of the need to get correct native bindings for SQLite file access.
If I were to rebuild this application, it would be as a static web application (React or HTML/JS), with Azure Functions providing REST API endpoints and CosmosDB providing storage. The development process would be simplified, more reliable, and officially supported by Azure Static Web Apps.
This project was a proof-of-concept of SQLite on Azure Functions. While the concept is proven, the poor performance of the solution is a limiting factor for any serious use cases. This approach could only be considered for personal projects, but even then, Azure Static Web Apps and Cosmos DB should be strongly considered for their superior performance and better developer experience.
Linux Function Apps do not provide read access to files after deployment, unlike Windows Function Apps. This means that Windows Function Apps would be a better candidate for an Azure Function/SQLite deployment since the db.sqlite3 could be downloaded and viewed at any time. However, Linux Function Apps allow remote build (with the
func azure functionapp publish <FUNCTION_APP_NAME> -b remote command), which facilitates the deployment as the build process downloads the correct SQLite3 native bindings.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100229.44/warc/CC-MAIN-20231130161920-20231130191920-00696.warc.gz
|
CC-MAIN-2023-50
| 8,994
| 53
|
https://www.npmjs.com/package/wkhtmltopdf
|
code
|
A Node.js wrapper for the wkhtmltopdf command line tool. As the name implies, it converts HTML documents to PDFs using WebKit.
First, you need to install the
wkhtmltopdf command line tool on your system.
The easiest way to do this is to download a prebuilt version for your system. DO NOT try to use the packages provided by your distribution as they may not be using a patched Qt and have missing features.
Finally, to install the node module, use
npm install wkhtmltopdf
Be sure the
wkhtmltopdf command line tool is in your PATH when you're done installing. If you don't want to do this for some reason, you can change
require('wkhtmltopdf').command property to the path to the
wkhtmltopdf command line tool.
wkhtmltopdf(source, [options], [callback]);
var wkhtmltopdf = ;// URL;// HTML;// Stream input and outputvar stream = ;// output to a file directly;// Optional callback;// Repeatable options;// Ignore warning strings;// RegExp also acceptable;
wkhtmltopdf is just a function, which you call with either a URL or an inline HTML string, and it returns
a stream that you can read from or pipe to wherever you like (e.g. a file, or an HTTP response).
There is also an
output option that can be used to write the output directly to a filename, instead of returning
npm test and manually check that generated files are like the expected files. The test suit prints the paths of the files that needs to be compared.
TODO - Find a way to automatically compare the PDF files.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371858664.82/warc/CC-MAIN-20200409122719-20200409153219-00144.warc.gz
|
CC-MAIN-2020-16
| 1,476
| 18
|
https://www.stackquestions.com/questions/14/secure-hash-and-salt-for-php-passwords
|
code
|
It is currently said that MD5 is partially unsafe. Taking this into consideration, I'd like to know which mechanism to use for password protection.
I'm using PHP. I want a safe and fast password encryption system. Hashing a password a million times may be safer, but also slower. How to achieve a good balance between speed and safety? Also, I'd prefer the result to have a constant number of characters.
- The hashing mechanism must be available in PHP
- It must be safe
- It can use salt (in this case, are all salts equally good? Is there any way to generate good salts?)
Also, should I store two fields in the database (one using MD5 and another one using SHA, for example)? Would it make it safer or unsafer?
In case I wasn't clear enough, I want to know which hashing function(s) to use and how to pick a good salt in order to have a safe and fast password protection mechanism.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783000.84/warc/CC-MAIN-20200128184745-20200128214745-00129.warc.gz
|
CC-MAIN-2020-05
| 884
| 7
|
http://str8jocktalking2.blogspot.com/2011/05/snagged.html
|
code
|
So we talked here about getting caught jacking off. But a reader wanted to know if anyone else (probably besides him lol) has been caught measuring. Either by your wife, your college roommate, your brother, or (god forbid) your sister. And if your caught, what did you do? The weird thing about being caught was when I was a kid, the worst thing I could imagine is getting caught jacking off by my parents. Now one of the hottest things I can think of is jacking off while another dude watches.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590493.28/warc/CC-MAIN-20180719031742-20180719051742-00536.warc.gz
|
CC-MAIN-2018-30
| 494
| 1
|
https://tropicalessays.co.uk/itech-7409-software-testing-assignment-2-working-in-agile-environment/
|
code
|
ITECH 7409: Software Testing
Assignment 2: Working in Agile Environment and Developing Detailed Test
Plans with a Test Management Tool
Due Date: Thursday, September 26, 2019 – 16:00
Submission: via Moodle
Special Remark: The description of the assignment is the continuation of Assignment-1. This assignment is a GROUP assessment, where one submission is made per group and all individuals in the group receive the same grade. There should be 2-3 students in each group.
Refer to Course Description, especially in regard to: Extensions, Special Consideration, Late Submissions, and Plagiarism.
***Beware about the late penalty mentioned in the course description***
The purposes of the assignment:
• Practice and improve your team working skills
• Write professional level testing documentation
• Develop a good understanding of professional industry standards for software testing
• Practice an Agile Testing environment and use of Agile toolchains
Consider the following Class Diagrams of Figure 1. The class (called Repository) contains 3 types of data for multiple persons. The attributes are Name, Phone, and Address, and they are grouped as Info. That is, the class Repository contains the array (Vector) of Info. The private member variable of the Info class is a list in the Repository class. There are various public methods to access and mutate the list variable of the class (Repository).
Figure 1: Class Diagram of Repository and Info classes
Sample information stored in an object of the Repository class is shown in the following table:
Name Phone Address
Josh +61728382818 VA, USA
Kevin +16456712345 Hobart, Australia
Andy +61423456134 Sydney, Australia
John +16456712345 Melbourne, Australia
Albert +61231212312 Canberra, Australia
Andy +61728382811 VA, USA
Phillip +61428382819 Brisbane, Australia
John +61341231239 Brisbane, Australia
Here is the detailed description of the Repository class:
i) list: Vector Into – the list is a vector of Info class where info class contains three private variables and 6 public functions. Since the scope of the assignment is restricted to Repository class, the description of Info class’s methods is skipped here. Please note that, a person will have one name with exactly one phone number and address. The Name, Phone Number pair uniquely identifies a person. However, a phone number can be used by multiple persons and multiple persons may have the same address. A person must have a name and the phone number, but the address field might be empty.
ii) Add (Info): String – Adds the information about a person and returns the success message (“Successfully Inserted”) when the insertion is successful. If the insert is unsuccessful, it returns (“Error in Insertion”).
iii) EditInfo (String, String, String, String): String – Edits the information about a person. The first and second string contains the Name and Phone Number, respectively, that uniquely identifies a person. The third string is the attribute to change and the fourth string is the modified value of that attribute. For example, if the function call is EditInfo (“John”, “+16456712345”, “Address”, “NY, USA”), then it will replace the address to “NY, USA” of the person whose name is “John” and the phone number is “+16456712345”. The function call will return “Successfully Edited”, however, if no such data is found, it will return “No Such Data Found”.
iv) Delete (String, String): String – This function will simply delete the entry from the list. The name and the phone number are the arguments of the function. If the information is deleted successful, it will return the string “Successfully Deleted”, otherwise “Error in Deletion”.
v) Count(): Int – This function returns the number of persons on the list.
vi) Count(String, String): Int – This function returns the number of persons having a common attribute. The first string indicates attribute to search and the second string indicates the value of the attribute. For example, Count (“Name”, “John”) will return 2 as there are 2 persons with the name John in the current list.
vii) IsAvailable (String, String): Bool – Checks whether a particular attribute has a given value. The first string contains the attribute and the second string contains the value of the attribute.
viii) IsMultipleName(String): Bool – Checks whether a name is available multiple times in the list. The string parameter contains the name of the person.
ix) Show (String, String): vector Info – Searches for a particular attribute. The first string is the attribute and the second string is the value of the attribute. The functions return a vector so that it may contain multiple records. For example, if the call is Show(“Name”, “John”), it will return two records in the vector.
x) CountNoAddress(): Int – Returns the number of records that have no address.
Consider that the above classes are already implemented and the unit testing is already done. Now a different group of the developer is implementing a software based on the aboveimplemented classes. The software will be deployed in a cloud service and will be accessible for any number of users. In addition, the software is synced with your phonebook. The features of the Software include:
1. The user will first create an account in the deployed site (say www.phonebook.com)
2. The user will be allowed to create multiple sheets in a phonebook and each sheet can contain information about 10000 persons (The structure of information of a person is discussed in Info Class).
3. In the phone set, user have to log in to that website [or a dedicated app using user’s credential (username and password)]
4. After that, both the phonebook and the account in www.phonebook.com will always remain synced. That is, whatever you add/edit in the phone book will be synced in the website and vice versa.
5. A user can share a sheet with his/her friend using the friend’s email address and that email address must be used to log on to the system (www.phonebook.com)
6. If a user (say A) provides a ‘write’ access to his/her friend (say B), then B will be able to modify any contact information, otherwise, B can only see the information of the sheet(s) (read-only)
7. A user will be able to select any number of the sheet from his account to be synced with the phone number.
8. The user will be able to import a set of information in a sheet from any CSV (Comma Separated Values) file and that information will be stored in a selected sheet.
9. The user will be able to export a sheet in a CSV file.
[Of course you need an app to be installed in your mobile, but for simplicity, we avoid testing that app. Assume that the app is installed and you have finished login activities for the app]
As mentioned earlier, the classes, along with the methods (I-X) and the features of the website (1-9) are already developed by two different group of software developers. The Unit tests for the methods of the classes are already tested by the developers of the first group and you need not to worry about the correctness of the classes/object. Now the website will be deployed on a server and then will be opened for all.
As a group of Software Engineers in Test, your group in assigned to perform the black box testing for the developed website.
For the deployed site (say www.phonebook.com), what you need to do:
1. Develop a detailed test plan for functional testing using Test Rail Software/Website. Your Test plan (Suit) should contain multiple test cases for each of the 9 scenarios
2. Develop integration and acceptance testing with the plan for Performance Testing (Stress testing, load testing, volume testing). You should also use TestRail* for writing the test cases and scenarios
3. Maintain your splitted work through your Trello Board, prioritize them and estimate their size (Big/Medium/Small). Also, maintain each of your timing using punchtime, and submit the printout of everyone’s punchtime log in pdf format. You should also submit the printout of your Trello board in pdf format
4. Take the printout of all the test cases (summary) and submit the pdf with your assignment
5. In a text file, provide your login credential so that the tutor can log in directly to check the work
A. Test Rail: https://www.gurock.com/testrail
B. Trello and Punchtime
Assessment Components Marks
Developing Unit Test Modules
i) Test Plan (Functional) 50
ii) Test Plan (Integration) 10
iii) Test Plan (Acceptance) 10
iv) Test Plan (Performance) 10
v) A printout (in pdf) of Trello board and Punchtime log 20
Assignment Weight 20%
Special Remarks: Since the assignment submission requires you to work in the Agile environment and then you have to submit the pdf for Trello and Punchtime, you must give at least 2 weeks to complete the assignment. You should immediately start understanding the Punchtime and Trello to complete the task properly.
Marks will be uploaded in fdlGrades and a completed marking guide provided in Moodle within 2 weeks of assignment submission.
Plagiarism is the presentation of the expressed thought or work of another person as though it is one’s own without properly acknowledging that person. You must not allow other students to copy your work and must take care to safeguard against this happening. More information about the plagiarism policy and procedure for the university can be found at http://federation.edu.au/students/learning-andstudy/online-help-with/plagiarism.
– Essay bishop assignment writing help.
ITECH 7409: Software Testing
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00619.warc.gz
|
CC-MAIN-2023-50
| 9,590
| 70
|
http://linlap.com/asus_u80v
|
code
|
View more guides at Linux Wiki Guides
This is a compatibility guide to running Linux with the Asus U80V laptop.
This page is just for discussing using Linux on the Asus U80V. For a general discussion about this laptop you can visit the Asus U80V page on LapWik.
If you would like to edit this page please first view our Editing Guidelines.
For full specifications see the Asus U80V specifications page.
|Processor||Intel® Core™2 Duo Processor T9400/P8600/P8400/P7450/P7350/T6500/T6400/T5900/T5800 : 2.53 GHz - 2.0 GHz,
Intel® Pentium® M Processor T4200 : 2.0 GHz
|Screen||14“ HD (1366×768) Widescreen|
|RAM||Up to 4GB|
|HDD||250GB to 500GB|
|Graphics||ATI Mobility™ Radeon® HD 4570|
Intel® Wireless WiFi Link 5100 ABGN
|Processor||Tested works||No issues, even powerlevels are supported|
|Screen||Tested, works||Works quite nice, might have to update configs for correct resolution|
|HDD||Tested, works||No known issues|
|Optical Drive||Tested, works||No known issues|
|Graphics||Tested (on ubuntu 9.02), works||Works, download the closed source driver|
|Sound||Tested, partially working||Some issues concerning the microphone, sound in general works as it should|
|Ethernet||Tested, not working||Must compile driver from source…|
|Wireless||Tested, works||Most distros get this up right away, although some have some driver issues|
|Bluetooth||Tested, working||No known issues|
|USB||Tested, working||No known issues|
|Card Reader||Not Testet|
|Webcam||Tested, working||Need to update driver. webcam will show up side down, but solution for this problem can be found on the internet.|
Depending on how updated your distro is you might run linux on this latop easily or it will be somewhat more trouble. For instance, archlinux failes to load network drivers for the enternet card, ubuntu has the same issue although can easily be installed and load a custom driver later and backtrack 4 has a built in driver that supports the wireless (injection AND listening) but has the same issues as arch when it comes to the wired card.
In my experience the linux support on this model was somewhat varied, some things work and some things dont. This is to be expected when considering that this is a completly new model, I recon most of these issues will be ironed out in a few months.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122726.55/warc/CC-MAIN-20170423031202-00605-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,291
| 26
|
https://www.newimagecollege.com/kids-animation-course-8-12-years-old/
|
code
|
Kids Animation Course. 8 -12 years old
- Level 1: An introduction to animation through 12 principles of animation.
- Level 2: Basic concepts of physics and how they apply to animated motion, emotion and acting, and body mechanics.
- Level 3: How to tell a story—everything from basic story structure to staging and cinematography.
- Level 4: Combines concepts learned from Levels 1-3 to help students create their own animated short film.
- C.A.T. (Continual Animation Training): Students work together just like a real animation crew to complete a joint film project.
Module 1. What is coding?
Coding for kids will be easy after this course. In the simplest form coding or programming for kids, are directions for how to do something. If you want to tell someone how to get from point A to point B, you must give her a clear set of instructions. If your directions are not clear and precise, she’ll end up in the bushes.
At Teens Computer School kids who are interesting in coding for kids can learn coding basics—and have fun while doing it!
Using free software created specifically for young people, this course teaches 8- to 12-year-olds how to create their own games and animated, interactive stories using coding. Following step-by-step explanations from instructors, kids will get a real introduction in one of the most prestigious and well-paid careers.
Android programming for kids
Have your children ever thought how apps for Android are made? Or maybe they have great ideas for such applications that make them famous? Do you have a great idea for an app that you want to make a reality? This course can teach your kids how to create apps for any Android device, even if they have never programmed before. With App Inventor, if they can imagine it, they can create it. Using this free, friendly tool, they can decide what they want an app to do and then click together colorful jigsaw-puzzle blocks to make it happen. App Inventor turns their project into an Android app that they can test on their computer, run on a phone, share with friends, and even sell in the Google Play store.
Coding Projects in Python
Using fun graphics and easy-to-follow instructions, this straightforward course shows young learners how to build their own computer projects using Python, an easy yet powerful free programming language available for download.
Perfect for kids ages 10 and over who are took two introductory courses and who a ready to take this more advance step to a coding world. Our experienced instructors will teach kids how to build fun games, useful apps and amazing graphics. All they need is a desire to learn, desktop or laptop computer, and a Python 3.
This 24 weeks course will start on November 17, 2018. Click below for registration
Duration and costs:
The course lasts for 24 weeks. Classes are held once a week and the duration of each session is 1 hour.
Tuition is $59 for a week.
For kids from 8 to 12 years old. Students must have a laptop with Windows operation system and bring it to class
New courses start November 17, 2018. New students take a placement test and are placed in a group at a suitable level.
The number of students:
10 – 12 students per class. Two teachers per group.
Who this course is for:
This course is for children who love computers and are interested in modern technologies and modern electronic devices. This course does not require any level of computer knowledge and will be interesting to newcomers as to “experiences” kids.
Schedule and place:
Check our calendar for classes schedule
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653930.47/warc/CC-MAIN-20230607143116-20230607173116-00390.warc.gz
|
CC-MAIN-2023-23
| 3,550
| 27
|
https://polyaxon.com/faq/i-cannot-fetch-logs/
|
code
|
Polyaxon provides several ways for storing the logs, the default method uses a local path on the host node. This is option is sufficient if you are trying the platform and don’t want to deal with extra configuration steps, however, when using Polyaxon in a production mode, you should definitely look at the other persistence strategies.
When the user uses a local path to store logs, a couple of things could happen:
- The host node might be deleted, or replaced, and all logs will be deleted as well.
- After an upgrade, all your components might be scheduled on a different node.
Polyaxon provides several options to make robust persistence of your logs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817670.11/warc/CC-MAIN-20240420153103-20240420183103-00590.warc.gz
|
CC-MAIN-2024-18
| 659
| 5
|
http://airsoftcanada.com/showpost.php?p=1175974&postcount=7
|
code
|
Originally Posted by L473ncy
I had "toys" on the shipping manifest before. Keep in mind that it's also a felony to open other people mail except in certain circumstances (ie. Police have a Warrant, or you haven't picked up your package for X number of months and it can't be returned or there's no return address or something).
Just don't lie if they ask you what it is. Just say it's "private" or "toys" or "models".
cuz if its a long cylindrical object and labelled "private toy"- no CP employee will open it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863811.3/warc/CC-MAIN-20180520224904-20180521004904-00257.warc.gz
|
CC-MAIN-2018-22
| 511
| 4
|
http://news.sys-con.com/node/2450678
|
code
|
|By PR Newswire||
|November 16, 2012 12:07 PM EST||
GREENBELT, Md., Nov. 16, 2012 /PRNewswire-USNewswire/ -- A remote sensing instrument that will peer into the ultraviolet to offer clues to how Mars might have lost its atmosphere has arrived at Lockheed Martin for integration into NASA's Mars Atmosphere and Volatile EvolutioN (MAVEN) spacecraft.
"The Remote Sensing package team built a system that meets all technical requirements and delivered it on schedule and on budget," said David Mitchell, MAVEN project manager from NASA Goddard Space Flight Center in Greenbelt, Md. "I look forward to the instrument's next level of integration onto the spacecraft and ultimately the science it will provide."
The Remote Sensing package consists of an Imaging UltraViolet Spectrograph (IUVS) and its control electronics box, the Remote Sensing Data Processing Unit (RSDPU). The Remote Sensing package was conceived, designed and built by the University of Colorado's Laboratory for Atmospheric and Space Physics (CU/LASP) at Boulder, under contract to NASA Goddard.
The Imaging UltraViolet Spectrograph collects the light and spreads it out into spectra and records the spectra using imaging detectors. IUVS is the eyes of the instrument. The Remote Sensing Data Processing Unit is the main electronics box that controls IUVS, and communicates with the spacecraft. RSDPU receives and executes the commands sent to tell IUVS when and where to look. RSDPU is the brain of the instrument.
"The IUVS performs 'remote sensing', meaning we can study the planet and its atmosphere at a distance through the light it emits," said Nick Schneider, IUVS lead scientist from CU/LASP. "Ultraviolet light is especially diagnostic of the state of the atmosphere, so our instrument provides the global context of the whole atmosphere for the local measurements made by the rest of the payload."
The Remote Sensing package will be turned on for its initial checkout 21 days after launch. Later in the cruise phase of the mission from Earth to Mars, the package will be powered on twice more for state-of-health checks and in-flight calibration.
"With the delivery of this package, we are shifting from assembling the basic spacecraft to focusing on getting the science instruments onto the spacecraft," said Bruce Jakosky, MAVEN principal investigator from CU/LASP. "This is a major step toward getting us to launch and then getting the science return from the mission."
Launching late next year, MAVEN will be the first mission devoted to understanding the martian upper atmosphere. The goal of MAVEN is to determine the history of the loss of atmospheric gases to space through time, providing answers about Mars climate evolution. By measuring the current rate of escape to space and gathering enough information about the relevant processes, scientists will be able to infer how the planet's atmosphere evolved in time.
The MAVEN spacecraft will carry two other instrument suites. The Particles and Fields Package, built by the University of California at Berkeley Space Science Laboratory with support from University of Colorado at Boulder's Laboratory for Atmospheric and Space Physics (CU/LASP) and NASA Goddard, contains six instruments that will characterize the solar wind and the ionosphere of the planet. The Neutral Gas and Ion Mass Spectrometer, provided by NASA Goddard, will measure the composition and isotopes of neutral ions.
"Three of the big milestones in an instrument builder's life are the day you get selected to fly on a mission, the day you deliver the instrument to the spacecraft to get ready for launch, and the day that it gets where it's going and data starts flowing back from space," said Mark Lankton, Remote Sensing package program manager from CU/LASP. "The Remote Sensing team is really happy to have gotten to the second milestone, and we can hardly wait to reach the third."
MAVEN's principal investigator is based at CU/LASP. The university will provide science operations, build instruments, and lead Education/Public Outreach. NASA Goddard manages the project and is building two of the science instruments for the mission. Lockheed Martin of Littleton, Colo., is building the spacecraft and is responsible for mission operations. The University of California at Berkeley Space Sciences Laboratory is building science instruments for the mission. NASA's Jet Propulsion Laboratory, Pasadena, Calif., provides navigation support, the Deep Space Network, and the Electra telecommunications relay hardware and operations.
For more information on MAVEN, visit:
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Oct. 22, 2016 09:30 AM EDT Reads: 1,244
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Oct. 22, 2016 09:15 AM EDT Reads: 1,408
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
Oct. 22, 2016 09:15 AM EDT Reads: 688
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
Oct. 22, 2016 08:45 AM EDT Reads: 2,038
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service.
Oct. 22, 2016 08:30 AM EDT Reads: 925
SYS-CON Events announced today that Cemware will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Use MATLAB functions by just visiting website mathfreeon.com. MATLAB compatible, freely usable, online platform services. As of October 2016, 80,000 users from 180 countries are enjoying our platform service.
Oct. 22, 2016 08:30 AM EDT Reads: 715
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Oct. 22, 2016 08:15 AM EDT Reads: 3,751
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Oct. 22, 2016 08:15 AM EDT Reads: 2,091
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 22, 2016 08:15 AM EDT Reads: 422
SYS-CON Events announced today that eCube Systems, the leading provider of modern development tools and best practices for Continuous Integration on OpenVMS, will exhibit at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. eCube Systems offers a family of middleware products and development tools that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Oct. 22, 2016 08:00 AM EDT Reads: 4,429
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Oct. 22, 2016 07:45 AM EDT Reads: 3,094
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Oct. 22, 2016 07:00 AM EDT Reads: 2,253
So you think you are a DevOps warrior, huh? Put your money (not really, it’s free) where your metrics are and prove it by taking The Ultimate DevOps Geek Quiz Challenge, sponsored by DevOps Summit. Battle through the set of tough questions created by industry thought leaders to earn your bragging rights and win some cool prizes.
Oct. 22, 2016 07:00 AM EDT Reads: 3,558
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Oct. 22, 2016 06:45 AM EDT Reads: 381
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
Oct. 22, 2016 06:30 AM EDT Reads: 2,230
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718987.23/warc/CC-MAIN-20161020183838-00074-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 12,082
| 44
|
http://www.courtneyschwarting.com/education
|
code
|
PROJECT IN PROGRESS-
Preliminary mood boards in the beginning stages of creating a digital education platform. The client currently runs an in-school program for inner-city students, and hopes to build a web interface to bring their curriculum online so students, teachers and administrators can all interact.
For this first step, the goal was to show different styles of web buttons, mobile interfaces and image gallery layouts. I did this while keeping in mind certain functions the client needs, like attendance calendars, popup notifications and location mapping.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948618633.95/warc/CC-MAIN-20171218161254-20171218183254-00105.warc.gz
|
CC-MAIN-2017-51
| 567
| 3
|
http://www.linuxine.com/story/there-any-opensuse-minimal-cd-install
|
code
|
I want to install a minimal openSUSE system on a couple of spare computers, but I'd really like the high res console that you get in the desktop installations of openSUSE with the background. I don't absolutely need it, but it's the one thing that makes me choose openSUSE over other distro's and I don't want to give it up without a fight.
OpenSUSE 13.2 minimal server InstallationThis is a detailed description about how to set up an OpenSUSE 13.2 64bit (x86_64) minimal server. This setup will be used as basis for various other OpenSuSE tutorials at howtoforge like our perfect server series.
OpenSUSE 13.2 minimal server Installation
This is a detailed description about how to set up an OpenSUSE 13.2 64bit (x86_64) minimal server. This setup will be used as basis for various other OpenSuSE tutorials at howtoforge like our perfect server series.
Hello, anyone had try the minimal install? I gonna try it after this, the ram needed is super low for instaling...is it possible to installing minimal install, and after that download applications (whole) and become 100% similar like Lubuntu desktop packages?
I mean I can add any apps i want like Mozilla Firefox,flash etc.
Can OpenSUSE work on a laptop with only a 500 MHz processor and 256 MB of RAM? A minimal Ubuntu with GNOME installation runs at a reasonable speed on such an ancient computer even though the full installation is too heavy. (The process involves starting off with a command line only installation and adding just the necessary packages.)
I have some problems, with a new samba configuration.
I want to setup a SAMBA PDC with ldap authentification, following an HOWTO found on the web.
I used this howto with success on OPENSUSE 10.1 with a X86 processor and I have used it a lot of time (windows 2000 clients).
Now I use OPENSUSE 11.3.
And I test this new configuration with two new PC running X64 processor running linux.
I have installed squeeze 6.0.0 as a base install from: Network install from a minimal CD.
Debian -- Network install from a minimal CD
i do see a lot of information on the various #apt commands , yet is is all garble goop as far as trying to make sense of where to begin at to install commands/programs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447544596.14/warc/CC-MAIN-20141224185904-00034-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 2,203
| 15
|