url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.instructables.com/community/3D-Motion-Tracking-System-Plug-and-Play/
|
code
|
3D Motion Tracking System - Plug and Play Answered
We're working on developing an electronic personal trainer. When we started, we couldn't find an easy to use, plug and play system that could collect all the data and give us the measurements we needed... so we built one ourselves.
It's comprised of three 3-axis MEMS sensors to provide 9 channels of data, an onboard microcontroller, rechargeable battery system, and bluetooth module to make a complete 3D tracking system. Is anyone else out there working on motion projects that could use something like this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038083007.51/warc/CC-MAIN-20210415035637-20210415065637-00563.warc.gz
|
CC-MAIN-2021-17
| 562
| 3
|
https://ai.nimbletank.com/language/
|
code
|
Spoken language, or voice, is fast becoming the main focus for research into how we interact with our tech. Natural Language Processing and Natural Language Understanding, usually shortened as NLP/NLU, is a branch of artificial intelligence that deals with the interaction between computers and humans using natural language.
A typical human-computer interaction based on NLP might go as follows:
1. The human says something to the computer
2. The computer captures the audio
3. The captured audio is converted to text
4. The text’s data is processed
5. The processed data is converted to audio
6. The computer plays an audio file in response to the human
Virtual assistants like Amazon’s Alexa and Apple’s Siri use NLP to understand our voice requests. The ultimate aim here is for AI to understand language as successfully as humans do – not just the words but also the context-based meaning of them. Most NLP techniques also rely on machine learning to derive meaning from human languages, even adopting, and mirroring, users’ speech patterns, use of slang, and accents.
With these advances, it’s no surprise that eConsultancy is predicting that 50% of all search traffic will be driven by voice in 2020.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665809.73/warc/CC-MAIN-20191112230002-20191113014002-00388.warc.gz
|
CC-MAIN-2019-47
| 1,219
| 10
|
https://zephyrproject.org/zephyr-meetup-the-1st-open-source-iot-projects-seminar-in-china/
|
code
|
Written by Jocelyn Li, Zephyr Community Member and Intel Zephyr Engineering Team Senior Manager
The 1st Open Source IoT Projects Seminar, hosted by the Intel Corporation, was held in Shanghai at the Intel Zizhu Office from June 11 -12. As one of the host projects, Zephyr project delivered 7 technical speeches, 2 demos and 1 hands-on workshop. More than 20 people, including developers and technical managers, attended the Zephyr technical sessions. Half are community customers including China Mobile, Shenzhen DJI Tech, Neusoft, National Intelligent Sensor Innovation Center, Beijing Yuanxin Technology, OFILM, TOP CHIP and Shenzhen startup Fei Kai Te, from 7 cities in China (Shanghai, Beijing, Shenzhen, Suzhou, Chengdu, Nanjing and Wuhan).
- Zephyr project overview – how developers can use the Zephyr SDK for development and debug environment set-up
- Zephyr memory protection – implementations for thread isolation, stack overflow prevention and critical kernel data safekeeping
- Open source and functional safety – how Zephyr is achieving the open source compatibility with safety standards
- A softPLC reference solution with WebAssembly (WASM) built upon Zephyr
- Utilizing the Zephyr POSIX mode to accelerate pre-silicon software development
- A FW testing solution based on Zephyr test framework to accelerate the development of FW test cases
- The fundamental technical concepts of Bluetooth mesh, and key points of Bluetooth mesh implementations on Zephyr project (presented by Kai Ren, Bluetooth SIG leader)
Zephyr™ OS is being used in an increasing number of embedded use cases such as automotive and industrial where product developers benefit from the reduced cost and increase in functionality provided by running multiple operating systems on a system on a chip (SOC). This functionality allows a single piece of hardware to manage tasks of varying levels of criticality and gives product makers the full benefit of miniaturization and portability provided by multi-core SOCs. The demo shows that on top of ACRN (a lightweight hypervisor) a Clear Linux-based service operating system starts a privileged virtual machine running Zephyr OS and a standard virtual machine running another instance of Clear Linux.
The demo shows smart badge with Zephyr running on reel board. Smart badge joins a Bluetooth Mesh networking. Short click of the button on smart badge navigates each page. Long press of the button on “Name” page sends “Hi”.
The demo is from the startup company named as Fei Kai Te in Shenzhen, showing a full Swift compiler and runtime that runs on top of Zephyr. The product will be launched in August.
The workshop provided a hands-on opportunity to set up the Zephyr SDK and customize the display on reel board.
This was the first Zephyr meetup in China. We have attracted significant attention and interest on Zephyr. Zephyr’s top 3 strengths from the community perspective are: multiple-architecture support, Bluetooth support, and Functional Safety are the top 3 strengths from community perspective. We are excited about the collaboration and discussions we had at the meetup and look forward to next meetup in China!
This is an exciting time to get involved with the Zephyr Project! If you’re new to Zephyr, take a look at our Getting Started Guide or our Contributor Guide. Or, you can join the conversation or ask questions on our Slack channel or Mailing List.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817095.3/warc/CC-MAIN-20240416124708-20240416154708-00496.warc.gz
|
CC-MAIN-2024-18
| 3,422
| 15
|
http://androlicious.com/details/com.simonjudge.wordnet
|
code
|
WordNet - FREE
by Simon Judge, Version: 1.0.0 , 12 KB
Package name: com.simonjudge.wordnet , Last Update: 2012-09-03 17:36:59
44 ratings (2.795 average)
Dictionary application using online WordNet database. Includes UI that remains responsive during lookups (so you can back up or change your mind and look up something else). The server URL and data parsing is data driven to allow future change without reinstall. Similar app in Market is already broken due to server change.
Last comments from Android Market
Does not work for me since I updated from 1.6 to 2.2.
This application is not as good as thw web based or stand alone pc based version.
Broken unfortunately. Uninstalled
Wot da fk happen it not workin,
It's an ok app does what it says but just wish it would auto check for me at times.
Slow to search,no voice prounacation to speek words correct,uninstalling
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121644.94/warc/CC-MAIN-20170423031201-00100-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 870
| 12
|
https://ahmdtaha.medium.com/proxy-anchor-loss-for-deep-metric-learning-24f4a1509248
|
code
|
Proxy Anchor Loss for Deep Metric Learning
Metric learning learns a feature embedding that quantifies the similarity between objects and enables retrieval. Metric learning losses can be categorized into two classes: pair-based and proxy-based. The next figure highlights the difference between the two classes. Pair-based losses pull similar samples together while pushing different samples apart (data-to-data relations). Proxy-based losses compute class representative(s) during training. Then, samples are pulled towards their class representatives and push away from different representatives (data-to-proxy relations).
The next table summarizes the pros and cons of both proxy-based and pair-based losses. For instance, pair-based losses leverage fine-grained semantic relations between samples but suffer slow convergence. In contrast, proxy-based losses converge faster but with an inferior semantics between samples. This happens because proxy-based losses can leverage only data-to-proxy relations while pair-based losses leverage the rich data-to-data relations.
This paper presents a new proxy-based loss that takes advantage of both pair- and proxy-based methods. The proposed Proxy-Anchor loss allows data points, in a training mini-batch, to be affected by each other through its gradients. Thus, unlike vanilla proxy-based losses, the proxy-anchor loss utilizes data-to-data relations during training like pair-based losses. The next figure illustrates how the proposed proxy-anchor loss is different from a proxy-NCA (a typical proxy-based loss).
The main four differences between proxy-NCA and proxy-anchor are summarized in the paper as follows: (1) Gradients of Proxy-NCA loss with respect to positive examples have the same scale regardless of their hardness. (2) Proxy-Anchor loss dynamically determines gradient scales regarding relative hardness of all positive examples so as to pull harder positives more strongly. (3) In Proxy-NCA, each negative example is pushed only by a small number of proxies without considering the distribution of embedding vectors in fine details. (4) Proxy-Anchor loss considers the distribution of embedding vectors in more detail as all negative examples affect each other in their gradients.
The proxy-anchor loss converges much faster compared to other metric learning losses.
The proxy-anchor loss eliminates the requirement for an efficient mini-batch sampling strategy. Thus, it is computationally cheaper during training. The inference cost is the same for all losses.
The next figure presents proxy-anchor loss quantitative evaluation on two standard retrieval datasets: CUB-200–2011 and Stanford CAR196. Proxy-anchor loss achieves state-of-the-art results.
- The official repository of the paper is available on Github. The code implementation is well-organized and uses the PyTorch metric learning library.
- The paper is well-written and easy to read.
- The paper claims that the proxy-anchor loss is robust against noisy labels and outliers. Yet, this claim is neither supported nor rejected by any experiments in the paper.
- The paper assumes a single proxy (class representative) per class. It is a valid assumption on datasets with small intra-class variations. Yet, large intra-class variations break this assumption. This problem is clear when working with imbalanced datasets. Should a minority class have the same number of class representatives as a majority class?
Proxy Anchor Loss for Deep Metric Learning.
No-fuss distance metric learning using proxies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494852.95/warc/CC-MAIN-20230127001911-20230127031911-00057.warc.gz
|
CC-MAIN-2023-06
| 3,537
| 14
|
http://forums.codeguru.com/search.php?s=f4f396ac658e0090984f74259cf070cc&searchid=9160201
|
code
|
Type: Posts; User: gsmurthy30
Search took 0.01 seconds.
March 1st, 2013, 11:32 AM
Thank you Mur! any code snippet would be greatly helpful.
February 26th, 2013, 12:30 PM
I have one GUI in .NET 2.0
based on user giving all the required initial inputs, I would like to expand in an animated fashion the GUI to take advanced inputs.
Pl Guide me to achieve this.
August 22nd, 2012, 11:50 PM
Not sure whehter this is the correct place to post this question. but let me start here.
Is there any tool to detect How much RAM is sought of an EXE, and how much...
June 25th, 2012, 02:56 AM
Pl excuse me if this is not the right place to post my query. If that is the case, pl suggest which is the best forum to post it.
I was handed over a legacy code...
January 30th, 2012, 10:46 PM
Thanks, curt. I will try it, and will update the forum.
January 29th, 2012, 05:44 AM
Yes, please. Please give some guidelines on how to achieve the same.
January 27th, 2012, 10:37 AM
I am working on automation project for a 3rd party Application. This application has given APIs for various automation tasks (like, Menu automation, toolbar automation, etc)
My code is in...
August 25th, 2011, 01:19 AM
Some good findings to share with the people who helped me in the cause.
We did raw timing somewhat similar to the suggestion above. Timing went this way:
File1->Thirdparty API-> File2 (...
August 24th, 2011, 09:13 AM
Details on 'why' File2:
File1 (external format) ->Use an API that could read File1 and output File2 in a (industry wide) known and fixed-length-per-line format->Use translators of MyApplication to...
August 24th, 2011, 05:56 AM
I think we are converging to a solution to my issue. Here I give some more details to help analyse the situation, and combine some of the earlier quotes, and give my understanding. pl correct me.
August 23rd, 2011, 09:14 AM
Here I give some more details (which I missed in my initial posting) which may help us converge to a solution.
As I said in my earlier post, Input to my application is an intermediate TXT file...
August 23rd, 2011, 06:30 AM
I have an extreme conditions of file I/O. Most of the cases, input files to my application (ASCII txt files) will contain lines of the order of 7 million. For each such a line, one object...
July 27th, 2011, 09:10 AM
Thanks a lot.
I will use it in code and will get back for any issues.
July 27th, 2011, 08:50 AM
To understand existing code, I would like to capture functions being visited by the execution flow at run time in the sequence that they are visited in a neat tree manner. Any ideas?
It may sound...
April 9th, 2010, 09:28 AM
Many thanks to the codeguru community for interacting with us and giving us relevant directions to analyse the situation.
#1 of Paul McKenzie April 7th, 2010 02:42 PM gave some thoughts to us in...
April 7th, 2010, 02:34 AM
please refer to #2 of my query. i have defined RIV in ProjectProperties.
April 7th, 2010, 02:07 AM
1. recently i have upraded my application from VS 2005 to VS 2008.
2. I have a preprocessor directives defined in ProjectProperties | C/C++ | PreProcessor Definitions.
3. I used...
January 27th, 2010, 10:44 PM
1. my app is built using VC++ compiler in VS 2008. my vendors dlls are built using VC++ compiler in VS 2005.
2. i link to my vendor's dlls implicitely ( i.e i have *.lib and corresponding...
January 22nd, 2010, 04:15 AM
My vendors dlls are compiled in VC 2005. I am migrating my application to VS 2008 though my vendors' dll are still compiled in VS 2005. when i am working in debug mode in VS 2008 with my application,...
December 2nd, 2009, 12:17 AM
i am getting following error while building my application:
November 10th, 2009, 07:27 AM
one more way of blocking your window capture...
When you sense that mouse action is with MOUSE_DOWn, and MOUSE_DRAG kind of attributes, simply draw your window extents lying within the Dragged...
November 10th, 2009, 05:07 AM
Essentially you need to capture the mouse move over your window. i think you could do it. then you need to get access to the clip area which would be put in some kind of buffers. if that clip area is...
November 9th, 2009, 09:03 AM
I think this is not possible. Even if other tools are blocked from caturing your screen to, yet you cannot prevent 'Print Screen' keyboard event from capturing your screen.
November 8th, 2009, 12:52 AM
1. My application is in QT 3.0 and C++ (VS 2005).
2. its output is images in TIFF/JPG format.
3. My customer wants me to provide a print/plot facility to print/plot these images to Windows based...
September 10th, 2009, 11:42 PM
yes, i did the same thing all along - i.e put the DLLs that Product 3 needs in the same directory where Product 3's EXE is present.
But, before posting the query, i wrongly...
Click Here to Expand Forum to Full Width
This a Codeguru.com survey!
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828010.65/warc/CC-MAIN-20160723071028-00224-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 4,815
| 73
|
https://www.slideshare.net/isselgroup/employing-machine-learning-and-intelligent-information-management-techniques-for-efficient-software-requirements-elicitation
|
code
|
Proper definition of functional requirements is a prerequisite for succesful software project development. Inaccurate and/or missing functional requirements are among the top reasons that lead to failure of the software development process, since incomplete definition of functional requirements results in erroneous scheduling of necessary tasks and subsequently failure in the implementation of the software project. This dissertation initially builds a dataset of functional requirements of software projects from various sources, which is missing from bibliography. Then an ontology is defined, that captures the static view of a software project. The functional require ments of the dataset are mapped to the defined entities and the data is efficiently stored using the ontology format. In the next step, machine learning algorithms are employed in order to extract recommendations for better software requirements elicitation. For the evaluation of their performance the models are fed with take a new software project with incomplete functionality as input and the extracted recommendations are evaluated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644867.89/warc/CC-MAIN-20230529141542-20230529171542-00282.warc.gz
|
CC-MAIN-2023-23
| 1,113
| 1
|
https://docs.epw-code.org/doc/GaN-II.html
|
code
|
Author: Samuel Poncé
The following tutorial is based on an automatic test from the test-suite and is intended to be run quickly. Careful convergence is required to obtain physically meaningful results.
This is a new tutorial which include code features not yet available in the stable version of EPW/QE. Therefore you need the developer version to run it at the moment:
git clone https://gitlab.com/QEF/q-e.git
Linearised Boltzmann transport equation (BTE)¶
In this tutorial, we will show how to compute the intrinsic electron and hole mobility of hexagonal wurtzite GaN using the linearised iterative Boltzmann transport equation (IBTE) and the self-energy relaxation time approximation (SERTA).
The theory related to this tutorial can be found in the review First-principles calculations of charge carrier mobility and conductivity in bulk semiconductors and two-dimensional materials.
In particular the IBTE mobility refers to Eqs. 40, 41, 42 and 43 from the review while the SERTA mobility refers to Eqs. 41, 51 and 53. Note that an alternative formulation of the IBTE mobility is also given by Eqs. 63 and 64 by removing the magnetic field (B=0 limit).
In addition, the paper Towards predictive many-body calculations of phonon-limited carrier mobilities in semiconductors is the recommanded citation for the transport implementation in EPW.
The tutorial files can be found in
q-e/test-suite/epw_mob_polar which also include the pseudopotentials.
We first compute the dynamical matrix and electron-phonon matrix element using density functional perturbation theory on the irreducible Brillouin-Zone.
To do so, we first compute the ground-state electron density using 4 cores:
mpirun -np 4 ../../bin/pw.x < scf.in | tee scf.out
For polar materials as is the case of GaN, the dielectric constant converges very slowly with the k-point grid (linearly). As a result, the k-point grid should be very dense (e.g. 20x20x20). In this example we use 2x2x2 for fast calculation.
We then compute the phonons:
mpirun -np 4 ../../bin/ph.x < ph.in | tee ph.out
Try looking in the ouput and locate the dielectric constants. You should get 23.12 in-plane and 17.23 for the out of plane direction. Those values are strongly overestimated due to the coarse k-point grid. The calculation should take about 5 min.
The input variable responsible to produce the electron-phonon matrix element is
fildvscf. Always make sure that this variable is present.
Finally, we need to post-process some of the data to make it ready for EPW. To do so, we can use the following python script
The script will ask you to enter the prefix used for the calculation. In this case enter “gan”. The script will create a new folder called “save” that contains the electron-phonon matrix elements and dynamical matrices on the IBZ.
The script should be compatible with python 2 and python 3.
If you are using python 2, the script might ask you to install the “future” library. If so, type:
pip install --user future
For information, the converged phonon bandstructure of GaN should look like this:
Interpolation of the electron-phonon matrix element in real-space with EPW¶
Because the earlier phonon calculation modified the density file, we have to do another DFT self-consistent calculation
mpirun -np 4 ../../bin/pw.x < scf.in | tee scf.out
Followed by a non-self consistent calculation
mpirun -np 4 ../../bin/pw.x -npool 4 < nscf.in | tee nscf.out
The reason for the non-self consistent calculation is that EPW needs the wavefunctions on the full BZ on a grid between 0 and 1.
For the nscf calculation the number of pool
-npool has to be the same as the total number of core
Since we are also interested in electron mobility, we will need the conduction bands. Notice that we added the
nbnd = 30 in
We then run EPW:
mpirun -np 4 ../../EPW/src/epw.x -npool 4 < epw1.in | tee epw1.out
The number of cores and pool have to be the same as for the
The following EPW input variables are important in our case:
vme = .true. ! Compute exact velocities using Wannier interpolation lpolar = .true. ! This is a polar material lifc = .false. ! Do not use external IFC asr_typ = 'simple' ! Use the simple acoustic sum rule use_ws = .true. ! Use the optimal Wigner-Seitz cell nbndsub = 14 ! We Wannierize only 14 bands nbndskip = 12 ! We skip the first 12 bands dvscf_dir = './save/' ! Directory where the save folder generated by the @pp.py@ python script is stored band_plot = .true. ! We want to plot the electronic and/or phonon bandstructure (i.e. we do not use homogeneous fine grids) filkf = './MGA.txt' ! K-point path from M to Gamma to A filqf = './MGA.txt' ! Q-point path from M to Gamma to A efermi_read = .true ! Because our fine grids are non homogeneous, the code cannot determine the Fermi level fermi_energy= 11.80 ! We need to provide the Fermi level manually. fsthick = 100.0 ! States that we want to take around the Fermi level. We want all states so we put a large value.@]
Because our k and q coarse grid are so coarse, we need
use_ws. However it makes the calculation heavier (more vectors).
If your fine grids are big enough (6x6x6 or more), you probably can use Gamma centered WS cell and use
use_ws = .false.
You can provide the k/q-point path either in crystal or Cartesian coordinate. To do that, modify the second element of the first line of the
To have an idea of which Fermi level you should use, you can first do a calculation with a homogeneous fine grids by removing
nk1 = 12 nk2 = 12 nk3 = 12 nq1 = 12 nq2 = 12 nq3 = 12
Finally, notice that at the end of
epw1.in you need to provide the IBZ q-point list:
4 cartesian 0.000000000 0.000000000 0.000000000 0.000000000 0.000000000 -0.306767286 0.000000000 -0.577350269 0.000000000 0.000000000 -0.577350269 -0.306767286@]
This list has to be exactly the same as the one reported in the output of the phonon calculation at the begining of
ph.out that we did earlier.
The calculation should take about 1 min to run. At the end, the code should have produce two files
phband.freq which contain
the interpolated electronic and phonon bandstructure along the M-G-A path.
You can post-process those file yourself or used the
plotband tool from Quantum Espresso by typing
Then follow the instruction. Read the
plotband.x documentation if you have an issue. This will create a file which is
gnuplot and should give you the following:
and the phonon bandstructure:
Given that we have been using a 2x2x2 k-point and q-point grid and a low energy cut-off, such bandstructure quality is remarkable. Comparing with Figure 1, one can see that the only qualitative issue is related to the highest phonon-mode along the G-A direction, which improves with more converged results.
The electronic bandstructure can be compared to the following converged one:
The main difference with the calculation that we just did is that we did not include SOC in this tutorial for speed reasons. You can add SOC by adding
noncolin = .true., lspinorb = .true.
Calculating the intrinsic drift mobility tensor of GaN with temperature¶
We are now ready to compute the electron and hole mobility tensor with temperature. For this, run the following command to compute the hole mobility:
mpirun -np 8 ../../EPW/src/epw.x -npool 8 < epw2.in | tee epw2.out
In this case, the code does a restart by reading the electron-phonon matrix element in real-space from the file
gan.epmatwp1 and interpolate the
matrix element on a fine k/q-point grid.
In case of such a restart, you can use an arbitrary number of cores (.e.g. we used 8 instead of 4). The maximum you can use corresponds to the maximum number of k-points on the fine grid.
Before looking at the output, let us first discuss the specific input variable to perform transport calculations:
kmaps = .true. ! Required for a restart epwread = .true. ! Tels the code to read the gan.epmatwp1 file wannierize = .false. ! The Wannierization cannot be redone for a restart scattering = .true. ! We wish to compute scattering rates iterative_bte = .true. ! We wish to do IBTE and not just SERTA mob_maxiter = 200 ! Maximum number of iterations for the IBTE broyden_beta = 1.0 ! Linear mixing between iterations int_mob = .false. ! We do not want to do electron and hole at the same time carrier = .true. ! We want to specify carrier concentration ncarrier = -1E13 ! We want 1E13 carrier per cm^3. The negative sign means hole mp_mesh_k = .true. ! Use k-point symmetry to reduce the calculation cost restart = .true. ! We want to create restart point during the interpolation restart_freq = 50 ! A restart point is created every 50 q-points selecqread = .false. ! If .true. allows for reading the q-points within the fsthick epmatkqread = .false. ! Once the transition probabilities have been written to file, allow for a restart to compute the mobilities nstemp = 2 ! We are considering 2 temperatures. tempsmin = 100 ! Initial temperature tempsmax = 300 ! Final temperature degaussw = 0.00 ! Broadening of the Dirac deltas in the BTE. A value of 0 means adaptative broadening.
There is a starting global and unique Fermi level given by
fermi_energy or computed by the code.
This Fermi level is used for initialization of quantities and energy window determination.
However the real Fermi level used for the transport calculation is determined automatically by the code depending on the
required carrier concentration and temperature. There can even be up to two such real Fermi level (for electron and hole).
We can take a look at the output of this second EPW calculation. We see the following:
Using uniform q-mesh: 12 12 12 Size of q point mesh for interpolation: 1728 Using uniform MP k-mesh: 12 12 12 Size of k point mesh for interpolation: 266 Max number of k points per pool: 34
which tells us that we have a q-point grid with 1728 q-points (no symmetry) and a k-point grid with 266 k-points (IBZ). Since we are doing a parallelization on k-point, we will have 34 k-points per core.
Next, the code will try to reduce the number of q-points we need to compute by taking the one that contribute to the
energy window. A file called
selecq.fmt will be created and can be read later to avoid recomputing.
Number selected, total 50 148 Number selected, total 100 1443 Number selected, total 150 1715 We only need to compute 162 q-points
The code then reports the VBM and CBM as well as the Fermi level for the hole calculation for each temperature:
Valence band maximum = 11.381872 eV Conduction band minimum = 13.076046 eV Temperature 100.000 K Mobility VB Fermi level = 11.517589 eV Temperature 300.000 K Mobility VB Fermi level = 11.804356 eV
The code also reports which states are included given the energy window:
Fermi Surface thickness = 0.400000 eV This is computed with respect to the fine Fermi level 11.481872 eV Only states between 11.081872 eV and 11.881872 eV will be included
The code then computes the transition probabilities but only saves the one that are large enough:
Save matrix elements larger than threshold: 0.372108862978E-23
Note that the threshold is computed automatically based on the size of the system and is very conservative. The total error made by neglecting those matrix elements is lower than machine precision.
Because we are using adaptive smearing, the code reports the min and maximum value of broadening for that q-point.
This information is printed every
Progression iq (fine) = 50/ 162 Adaptative smearing = Min: 1.414214 meV Max: 293.598353 meV Progression iq (fine) = 100/ 162 Adaptative smearing = Min: 28.908200 meV Max: 319.312222 meV Progression iq (fine) = 150/ 162 Adaptative smearing = Min: 48.994246 meV Max: 149.060946 meV
At the end all the transition probabilities are stored in the file
gan.epmatkq1 as well as the support files
sparset. Note that the file size is 28 Kb, orders of magnitude smaller than
without matrix element threshold.
The interpolation and storing of transition probabilities to file can take a lot of time. If the calculation crashes
during runtime (due to time-out for example), just put
selecqread == .true. `` to avoid recomputing the ``selecq.fmt
and relaunch. The code will automatically continue.
Once all the transition probabilities are compute, you can always restart the calculation by using the
epmatkqread == .true.
Note that here the code did that for you automatically:
epmatkqread automatically changed to .TRUE. as all scattering have been computed.
Then the code computes the SERTA mobility:
============================================================================================= Temp Fermi Hole density Population SR Hole mobility [K] [eV] [cm^-3] [h per cell] [cm^2/Vs] ============================================================================================= 100.000 11.5176 0.10000E+14 0.12925E-25 0.767956E-02 0.000000E+00 0.000000E+00 0.000000E+00 0.767956E-02 0.000000E+00 0.000000E+00 0.000000E+00 0.573540E+04 300.000 11.8044 0.10000E+14 0.00000E+00 0.585711E+01 0.000000E+00 0.000000E+00 0.000000E+00 0.585711E+01 0.000000E+00 0.000000E+00 0.000000E+00 0.184230E+03
The GaN in-plane mobility (xx and yy components) is 0.767956E-02 and the out-of plane one (zz) is 0.573540E+04. Those values are totally not converged and physically wrong because of the very coarse fine grids that we used. Typical grids are larger than 100x100x100. One would always expect the mobility at higher temperature to be lower than at low temperature. This is correctly the case of the out-of plane component but not for the in-plane.
The population sum-rule is simply the sum of all change of population due to external electric field which should be 0. If this value is large, there is probably something wrong in the calculation.
Finally, the code starts solving the IBTE and converges after 36 iterations to:
Iteration number: 36 ============================================================================================= Temp Fermi Hole density Population SR Hole mobility [K] [eV] [cm^-3] [h per cell] [cm^2/Vs] ============================================================================================= 100.000 11.5176 0.10000E+14 -0.12824E-25 0.896091E-02 0.000000E+00 0.000000E+00 0.000000E+00 0.896091E-02 0.000000E+00 0.000000E+00 0.000000E+00 0.374318E+04 300.000 11.8044 0.10000E+14 0.13235E-22 0.757728E+01 0.000000E+00 0.000000E+00 0.000000E+00 0.757728E+01 0.000000E+00 0.000000E+00 0.000000E+00 0.185868E+03 0.806237E-06 Max error
To conclude this tutorial, we launch the last calculation with:
mpirun -np 8 ../../EPW/src/epw.x -npool 8 < epw3.in | tee epw3.out
In this case, we compute the electron mobility.
Take some time to analyse the differences between
epw2.in to understand how to do such calculations.
It should be quite self-explanatory.
For information, by using much denser grids as well as SOC and GW corrections on the eigenvalues, one can get a fair agreement with experiment as shown on the following figure:
Suggestions for efficient transport calculations¶
Transport calculation are computationally heavy as they require a very fine sampling of both the k-point and q-point grids. However, various schemes have been implemented in EPW to reduce the computational cost.
1) The memory scales linearly with the number of temperature
nstemp. Try decreasing it if you have memory issues.
The cpu times scales strongly sub-linearly with the number of temperature. Therefore try to do as many temperatures as your memory allows.
2) Low temperatures span a smaller energy window and are therefore more difficult to converge. You can decrease
fsthick to make the
calculation more efficient. Note however that a single
fsthick is used for all temperature so that your
fsthick needs to be large
enough to accommodate the largest temperature.
int_mob == .true. is convenient because it allows for the calculation of both electron and hole at the same time.
However, the code consider only the element within an energy window given by
fsthick around the starting Fermi level given by
fermi_energy. As a result you might need to use a larger than needed
fsthick. The recommended way is therefore to compute
electron and hole mobility in two separate runs.
4) Transport properties only require states very close to the band edge and significant speedup can be achieved
by using a small
fsthick. Note that you need to converge your result with increasing values of
fsthick and that larger values
are required for higher temperature. For example in this tutorial we used a 0.4 eV
fsthick but we placed our Fermi level
0.1 eV above the valence band maximum (VBM). As a result we are considering only the states up to 0.3 eV above the VBM.
This is a typical order of magnitude.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363229.84/warc/CC-MAIN-20211206012231-20211206042231-00513.warc.gz
|
CC-MAIN-2021-49
| 16,651
| 147
|
https://deadvcr.com/other/projects/
|
code
|
I gave up on posting on my Instagram account because A) it's dead and B) I don't have any will to post on it anymore. It's got about 800 followers so it's good for experimenting on. Anyways, I made a Python script that uses the Instagram-API repo on GitHub to shitpost for me. It pulls a random image from the folder and feeds it to the API script. Super simple. Check the bot out here.
Check my Git Repo. I usually store my projects there, if you want to have a look.
Generated Trump is a Twitter bot that reads over Donald Trump's tweets and outputs what it's learned during the process on twitter.
Check it out here! It still has some little kinks to work out (such as this)
but for the most part it generates (somewhat) understandable sentences!
MIDI Man is a Discord bot that I created using the Discord.py library for Python. It can play MIDIs, it shows a random image from my collection, shows a random Eric Andre video and other neat stuff. I'm still working on it, so there's a few more features planned as of writing this, but god knows when I'll get around to actually making them.
If you want to check it out, you can join Cyber 8's official Discord server using this link.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823322.49/warc/CC-MAIN-20181210101954-20181210123454-00107.warc.gz
|
CC-MAIN-2018-51
| 1,185
| 7
|
http://thesecessionists.blogspot.com/2008/02/introducing-sleech.html
|
code
|
Sunday, February 17, 2008
Hey, I'm Sleech (Anders). Thanks for inviting me to this little collective. Cool concept.
I'm breaking your chain of digital greyscales with a little traditional pencil. It's a month old, but I thought It'd make a nice introductory post.
So, thanks again. Nice to meet y'all.
(Edit: Also, I'll make my images smaller next time :P )
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867977.85/warc/CC-MAIN-20180527004958-20180527024958-00415.warc.gz
|
CC-MAIN-2018-22
| 357
| 5
|
http://www.sunniforum.com/forum/showthread.php?9128-The-Times-of-Devastation&p=80410&mode=threaded
|
code
|
Bismillahi Rahmani Rahim
Sorry, i am not attacking you. If you read the post i linked to, your article is mentioned in there.
I mean, not too many people care about the thread Paradise. Read what i wrote in the post that i linked, and you will see what i mean.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699238089/warc/CC-MAIN-20130516101358-00003-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 260
| 3
|
https://forums.cocoaforge.com/viewtopic.php?t=4531
|
code
|
An instant messenger which can connect to AIM, GTalk, Jabber, ICQ, and more.
I just downloaded 0.83 and when I logged in, it only shows about 1/3 of who's online on my AIM list. All the other services seem to work fine, but when I log in using the official aim client it shows about 3x as many contacts online as the new adium does.
I believe this problem occurs because they fixed something about AIM loading faster now, as far as the connection happens. If you watched the 0.82 load the buddy list, there would be 2-3 waves of buddies being loaded into the contact list, but now there is simply 1 wave instantly. With 0.82 it usually takes about 2 seconds to load the whole buddy list, but now there is no lag, and I feel like the new adium is not accepting the second set of buddies after the first one. Anyone notice the same thing?
Who is online
Users browsing this forum: Majestic-12 [Bot]
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347458095.68/warc/CC-MAIN-20200604192256-20200604222256-00437.warc.gz
|
CC-MAIN-2020-24
| 895
| 5
|
https://www.stoutner.com/3-x-series-roadmap/
|
code
|
The release of Privacy Browser 2.17 marks the end of the 2.x series (unless a serious bug is discovered that needs to be addressed). The 3.0 release will implement the long awaited tabbed browsing. Following that, all other features that can be implemented without Privacy WebView will makeup the body of the 3.x series. At any time, users can see which features are planned for the next release and the list of all remaining features for the 3.x series.
With the 4.x series, the plan is to create a rolling fork of Android’s WebView, called Privacy WebView, that will add missing privacy features. Once the 4.x series is implemented, I plan to start working on Privacy Browser for other platforms. My initial thought is that I can develop it using the Qt framework and QtWebEngine, which will allow me to use one code base for Linux, Windows, and macOS. However, I will do a deeper investigation of the options and make a final decision when we get closer to that point.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473735.7/warc/CC-MAIN-20240222061937-20240222091937-00047.warc.gz
|
CC-MAIN-2024-10
| 973
| 2
|
http://gtaforums.com/topic/390533-using-the-ps3-controller/
|
code
|
Using the PS3 Controller
Posted 06 January 2009 - 04:14 AM
Posted 06 January 2009 - 02:26 PM
|QUOTE (Chargr @ Jan 5 2009, 23:14)|
|I just got GTA Vice city, and I'm wondering how can I use my PS3 controller to play GTA Vice City. Any links?|
I'm not sure what your problem is....
Is your PS3, PS2 game compatible???
The PS3 controller is not compatilble with a PS2 console.
On my PS3 the controller acts the same way as on PS2-- I do believe when the PS2 disk starts, it shuts the controller off-- you will have to push the PS button on the controller to turn it back on.
Do you need to transfer saves or something??? your post has confused me?
Posted 21 January 2009 - 06:13 PM
Posted 21 January 2009 - 06:45 PM
Posted 24 January 2009 - 01:55 AM
Posted 24 January 2009 - 02:32 PM Edited by Spuds725, 24 January 2009 - 02:37 PM.
If the logitec works on the PS3 without any add ons, then the driver for it for PC might allow the PS3 (sony's) to work on PC as well...
(This thread is like pulling teeth)
Guess I should actually search-- PS3 Sixaxis controller driver for PC--- http://dl.qj.net/SIX...11679/catid/518
Says it need XP or higher
Here is another with a vid http://www.metacafe...._sixaxis_on_pc/
I don't think you can use the PS3 controller wirelessly though
Posted 24 August 2009 - 07:23 AM
Posted 24 August 2009 - 07:32 PM
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825510.59/warc/CC-MAIN-20171023020721-20171023040721-00602.warc.gz
|
CC-MAIN-2017-43
| 1,406
| 24
|
https://www.dk.freelancer.com/projects/php-xml/xml-airport-transfers-script/
|
code
|
I am looking for a web script that I can place within a wordpress page.
This script will use xml / soap and allow customers to book airport transfers online, paying via [url removed, login to view] or [url removed, login to view] (TBC)
The script will generate a price based on the distance (road distance not straight line) and a price per mile + a booking fee and profit margin.
The script will send booking confirmation to relevant partner so if transport is from Edinburgh then script will e-mail Edinburgh Taxi Partner.
The script will allow the booking of inbound, outbound and return journeys.
Inbound = From airport to hotel
Outbound = From hotel to airport
Inbound Return = From airport to hotel then hotel to airport
Outbound Return = From hotel to airport then airport to hotel
If customer selects inbound journey they then select airport. From their select all taxi partners covering that airport will be chosen. A quote is calculated and the cheapest taxi partner's price is displayed.
If a customer selects an outbound journey then they enter a pickup postcode. That post code is then checked against the ones covered by the taxi partners. If that post code is covered then the taxi partners covering it will be chosen and quotes calculated. The cheapest price is then displayed.
If we do not cover area e.g. London then an apology message will be displayed.
See attached file for details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947822.98/warc/CC-MAIN-20180425135246-20180425155246-00638.warc.gz
|
CC-MAIN-2018-17
| 1,403
| 13
|
http://www.newschool.edu/parsons/faculty_pt.aspx?id=91598
|
code
|
Ryan Raffa is an designer, musician, and artist interested in what and how we learn through technology.
Raffa is currently Part-time Faculty at Parsons The New School for Design teaching creative coding, physical computing, prototyping, and integrative studio. He has toured throughout the US, performing live at the High Museum, Radio New York, KEXP, and NPR. Raffa’s work has been shown in Dumbo Arts Festival, Temp Art Space, Aronson Gallery, and featured in blogs including Engadget, Gizmodo, and Creative Applications. He is the recipient of the Michael Kalil Endowment for Smart Design Award, and he has given talks and presented work in art, design, and technology at SIGGRAPH, ACM Conference on Creativity and Cognition, Critical Themes at SVA, Maker Faire, Open Hardware Summit, and the inaugural New School Arts Festival, Noir.
sound, design and education, visual music, psychogeography
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775404.88/warc/CC-MAIN-20141217075255-00008-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 898
| 3
|
https://cryptocurrencyes.com/currencies/peercoin/5
|
code
|
Peercoin Stocks, USD price, market cap
24 hour USD price graph
7 day USD price graph
Last month USD price graph
Lasts 3 months USD price graph
SymbolPPC Rank825 Price USD0.32 Market Cap USD8,929,694 24H volume USD5,855 Circulating Supply27,549,994 Total Supply27,549,994 % last hour -0.085 % last 24 hours -3.22 % last seven days -3.091
More News +
Peercoin, also known as PPCoin or PPC, is a peer-to-peer cryptocurrency utilizing both proof-of-stake and proof-of-work systems.Peercoin is based on an August 2012 paper which listed the authors as Scott Nadal and Sunny King. King, who also created Primecoin, is a pseudonym. The Peercoin source code is distributed under the MIT/X11 software license.In the proof-of-stake system, new coins are generated based on the holdings of individuals. In other words, someone holding 1% of the currency will generate 1% of all proof-of-stake coin blocks. This has the effect of making a monopoly more costly, and separates the risk of a monopoly from proof-of-work mining shares.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531779.10/warc/CC-MAIN-20220520093441-20220520123441-00205.warc.gz
|
CC-MAIN-2022-21
| 1,019
| 8
|
http://www.blackberryforums.com/general-8100-series-discussion-pearl/129023-speed-dial-help.html
|
code
|
05-09-2008, 12:29 PM
Join Date: May 2008
Post Thanks: 0
Thanked 0 Times in 0 Posts
Thanks for the the replies.
This makes no sense to me. If you have to type or perform 2-3 clicks to get to the list, what is the point?
On my old Treo I could assign a button on the screen to each frequently dialed number/contact and all I had to do was touch the screen to dial the number.
Typing or clicking 2-3xs is a hassle when you are driving or otherwise preoccupied. It's one thing if the number you want is in your call log, but if not, it is a pain to retrieve. I don't get why they don't give you the ability to use one of the shortcut keys to access the list?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646375.29/warc/CC-MAIN-20180319042634-20180319062634-00281.warc.gz
|
CC-MAIN-2018-13
| 654
| 8
|
https://www.programmableweb.com/sdk/python-wikitools
|
code
|
Our API directory now includes 46 research APIs. The newest is the Globus Online Transfer API. The most popular, in terms of mashups, is the Mendeley API. We list 3 Mendeley mashups. Below you'll find some more stats from the directory, including the entire list of research APIs.
Scrazzl, social discovery platform for research materials, offers the Scrazzl API which grants developers access to research product information. Scrazzl develops tools that enable scientists to make informed decisions about research products and connect with other scientists to solve technical problems.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221214702.96/warc/CC-MAIN-20180819051423-20180819071423-00161.warc.gz
|
CC-MAIN-2018-34
| 586
| 2
|
https://tug.org/pipermail/pdftex/2003-November/004512.html
|
code
|
[pdftex] \pdfmapfile -- test if the mapfile could be found?
pragma at wxs.nl
Tue Nov 4 21:58:23 CET 2003
At 17:06 04/11/2003, Martin Schröder wrote:
>is there any way in pdfTeX or for the caller of pdfTeX to find
>out if the mapfile specified by \pdfmapfile was found and could
>be read without errors by pdfTeX?
>pdfTeX only prints out a warning if it can't find the file and
at the end of the log file:
Warning: pdfetex.exe (file f:\minimal\tex\texmf-local/pdftex/config/context/ori
ginal-vogel-symbol.map): entry for `fmvr8x' already exists, duplicates ignored
so, there is at least a test for duplicates (actually dups should overload
More information about the pdftex
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991772.66/warc/CC-MAIN-20210517115207-20210517145207-00003.warc.gz
|
CC-MAIN-2021-21
| 673
| 13
|
https://hackdefense.com/publications/birdwatching/
|
code
|
I’ve been looking into the MySQL authentication protocol for my thesis. In this research I looked into the implementation used in OpenCanary. This is a honeypot written in Python created by Thinkst. During testing I noticed a small difference in the error returned by Mysql and by OpenCanary which made me curious.
When you try to login to a MySQL server with incorrect credentials, an error is returned together with an SQL state. As is defined in the developer documentation here, this section of the packet should start with a hashtag (
#) and should then be followed by exactly five bytes describing the SQL state. However, an error in the implementation by OpenCanary put two hashtags there. Something you’d miss if you weren’t comparing error messages to each other.
Standard MySQL error:
OpenCanary error (the hashtag changes the syntax highlighting):
The Code Behind It
So the code powering this mock-mysql service is quite simple:
The error is essentially in the
\x23#, as ASCII character 23 already is a hashtag. There was another error with the access denied state which was defined as
2800 while it should’ve been
28000. This is also the reason why the double hashtags didn’t mess with the format as code was one character too short making the effective length six again.
A honeypot can be used for multiple purposes, it’s a device that acts as if it were a real server making it a potential target for hackers. A honeypot’s purpose however, is to be attacked. This has a couple of advantages:
- You know there are hackers poking around your network leaving you able to act on them.
- You can potentially figure out what exploits they’re using by examining the data sent to the honeypot.
- They waste time on your honeypot instead of attacking real production servers in your network.
To put it simply: if your honeypot is attacked, it will be able to notify you and you can stop the attackers dead in their tracks. So it’s pretty essential that your honeypot isn’t found out. The error in the implementation shows us that we’re not dealing with a genuine MySQL server. We do need to interact by logging into the server however, which would make the honeypot notify the system administrators. So we’d know that we were dealing with a honeypot, but the owners of the network are alerted to you presence which is something attackers want to avoid.
So is there a way to look at this error message without triggering the alarm? As it turns out: yes! MySQL’s protocol requires packets to be numbered. When a connection is established the Mysql server will initiate the conversation by sending a packet with its banner and capabilities. This is packet zero:
The client will then send an answer back to the server with its own capabilities and the username it wants to login with. The packet number has to be one now:
Whenever the client sends a packet that doesn’t have the right packet number MySQL will return an error saying
Got packets out of order with an SQL state of
08S01. But due to the double hashtag in OpenCanary, we can notice two things:
- The double hashtags.
- The error message starts with the last digit of the full error code
The code behind this one is the following:
This code is part of an
if statement, it checks whether the received packet has the correct sequence id. If not, an out of order error will be returned. The problem is that the code for logging a login attempt is after that check. So when a packet is sent out of order, no logging will be done but an error message will be returned. So an attacker is able to scan a compromised network and detect canaries without raising suspicion.
I created a patch which consisted of 2 small changes to the MySQL module:
An extra zero was added to
SQL_STATE_ACCESS_DENIED and the
\x23 version of the hashtag was removed from the
data byte string.
I reached out to the people at Thinkst and the patch was published within 2 days.
A way was found in OpenCanary running the MySQL module to detect that they were honeypots. This detection could be executed without raising an alarm and therefore bypassing the benefits of using a honeypot.
The team over at Thinkst responded quickly to my mail and we had the issue resolved in two days. It’s best to upgrade to OpenCanary 0.6.1 or if that’s not possible for you at this time, disable the MySQL module.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988696.23/warc/CC-MAIN-20210505203909-20210505233909-00360.warc.gz
|
CC-MAIN-2021-21
| 4,359
| 34
|
https://www.evs.ee/en/iec-62605-2021
|
code
|
IEC 62605:2021 specifies the interchange format for e-dictionaries among publishers, content creators and manufacturers.
This document does not address the following aspects:
• data formats for reading devices;
• elements necessary for final print reproduction only;
• rendering issues related to physical devices;
• security issues such as DRM for documents.
IEC 62605:2021 cancels and replaces the second edition published in 2016. This edition constitutes a technical revision.<
This edition includes the following significant technical changes with respect to the previous edition:
The format described in Annex B was significantly enhanced in the following ways:
a) elements to enhance uses of data (e.g. web-related usage);
b) attribute for accessibility-related functions;
c) attributes for more detailed markup for data reusability.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588102.27/warc/CC-MAIN-20211027053727-20211027083727-00523.warc.gz
|
CC-MAIN-2021-43
| 848
| 12
|
https://www.catalyzex.com/paper/arxiv:1903.12136
|
code
|
In the natural language processing literature, neural networks are becoming increasingly deeper and complex. The recent poster child of this trend is the deep language representation model, which includes BERT, ELMo, and GPT. These developments have led to the conviction that previous-generation, shallower neural networks for language understanding are obsolete. In this paper, however, we demonstrate that rudimentary, lightweight neural networks can still be made competitive without architecture changes, external training data, or additional input features. We propose to distill knowledge from BERT, a state-of-the-art language representation model, into a single-layer BiLSTM, as well as its siamese counterpart for sentence-pair tasks. Across multiple datasets in paraphrasing, natural language inference, and sentiment classification, we achieve comparable results with ELMo, while using roughly 100 times fewer parameters and 15 times less inference time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703509104.12/warc/CC-MAIN-20210117020341-20210117050341-00519.warc.gz
|
CC-MAIN-2021-04
| 966
| 1
|
https://www.stackshare.io/lerna
|
code
|
What is Lerna?
Who uses Lerna?
Here are some stack decisions, common use cases and reviews by companies and developers who chose Lerna in their tech stack.
Our whole Node.js backend stack consists of the following tools:
- Lerna as a tool for multi package and multi repository management
- npm as package manager
- NestJS as Node.js framework
- TypeScript as programming language
- ExpressJS as web server
- Swagger UI for visualizing and interacting with the API’s resources
- Postman as a tool for API development
- TypeORM as object relational mapping layer
- JSON Web Token for access token management
The main reason we have chosen Node.js over PHP is related to the following artifacts:
- Flexibility: Node.js sets very few strict dependencies, rules and guidelines and thus grants a high degree of flexibility in application development. There are no strict conventions so that the appropriate architecture, design structures, modules and features can be freely selected for the development.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00467.warc.gz
|
CC-MAIN-2022-33
| 1,001
| 15
|
https://coronavirussurvey.portsmouth.gov.uk/introduction-and-methodology-wave-2/public-health-behaviour/barriers-to-vaccinations/
|
code
|
Base – Those unlikely to get a vaccination:122
|wdt_ID||Responses (showing key themes)|
|1||Vaccine has been developed too quickly|
|2||The long term side effects are not known|
|3||Already have had Covid-19|
|4||People with severe allergies and on prescription medication|
|5||Not in a high risk category|
|6||Don’t like injections as a whole|
|7||Vaccine does not offer immunity|
|8||Fear of having to leave the house|
|9||Lack of trust in the government|
|Responses (showing key themes)|
Key differences by demographic
Younger age groups are more likely to think they do not need to get a vaccine because they are not in a high risk group.
Females are more concerned about the long-term effects to their fertility. Males are more likely to lack trust in the government and want more transparency about how the vaccine has been developed. Although less common than females, some male respondents also express concern about the impacts to fertility.
BAME respondents are slightly more likely to reference the lack of trust in the government as a barrier to vaccination compared to white respondents. It is important to note here the small number of responses to this question from BAME groups.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101195.85/warc/CC-MAIN-20231210025335-20231210055335-00804.warc.gz
|
CC-MAIN-2023-50
| 1,198
| 16
|
http://washesp.deviantart.com/art/Smoking-Death-The-Reaper-373209975
|
code
|
This is my Make it Ugly Entry
I used to be an addict for 3 years. Smoking about half a pack a day.
I was turning my life in the wrong direction
I was losing good friends , Attracting negative friends,
My Health was getting worse , I'd get a minor cold and stay sick for about 2-3 Weeks
I looked at myself when I spit out black mucus and said "Im fu**** up"
I knew it was time to quit I made various attempts to quit finding myself coming back to cigarettes.
Eventually I made the quit and I've been off them for about 1 year now
I've lost few family and friends off cigarettes. The one that made a major impact on me was when my best friend's dad past from cancer. He was diagnosed with lung cancer he quit afterwards but eventually the cancer spread to his brain and he passed away.
It not easy getting a friend to quit , You can tell them to do it but its not easy to put it down.
Like the quote "You can lead a horse to water , But you can't make him drink it."
The Japanese lettering on him says
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461848.26/warc/CC-MAIN-20150226074101-00299-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 999
| 12
|
https://doc.dataiku.com/dss/latest/hadoop/dynamic-emr.html
|
code
|
Dynamic AWS EMR clusters¶
Tier 2 support: Management of dynamic EMR clusters is provided through a plugin and is covered by Tier 2 support
Although DSS supports EMR, we strongly advise against setting up new deployments with EMR.
DSS does not support the latest EMR versions, security options are limited, and our experience is that EMR deployments are associated with a higher complexity and tend to generate higher administration workloads.
We recommend that you use a fully Elastic AI infrastructure based on EKS. Please see Elastic AI computation, or get in touch with your Dataiku Customer Success Manager, Technical Account Manager or Sales Engineer for more information and studying the best options.
DSS can create and manage multiple EMR clusters, allowing you to easily scale your workloads accross multiple clusters, use clusters dynamically for some scenarios, …
For more information on dynamic clusters and the usage of a dynamic cluster for a scenario, please see Multiple Hadoop clusters.
Support for dynamic EMR clusters is provided through the “EMR Dynamic clusters” plugin. You will need to install this plugin in order to use this feature.
Like for other kind of multi-cluster setups, the server that runs DSS needs to have the client libraries for the proper Hadoop distribution. In that case, your server needs to have the EMR client libraries for the EMR version you will use. Dataiku provides a ready-to-use AMI that already includes the required EMR client libraries
The previous requirement implies that the server that will run DSS and start the EMR clusters cannot be an edge node of a different kind of cluster. For example, you cannot manage dynamic EMR clusters from a DSS machine primarily connected to a MapR cluster.
When working with multiple EMR clusters, all clusters should run the same EMR version. If running different versions, some incompatibilities may occur.
It is not possible to create secure dynamic clusters
We strongly recommend that you use our “dataiku-emrclient” AMI which contains everything required for EMR support.
This AMI is named
dataiku-emrclient-EMR_VERSION-BUILD_DATE, where EMR_VERSION is the EMR version with which it is
compatible, and BUILD_DATE is its build date using format YYYYMMDD.
At the time of writing, the latest version of this AMI supports EMR 5.30.2 (“dataiku-emrclient-5.30.2-20220126”). It is available in the following AWS regions:
eu-west-1 (AMI id: ami-0a3edce0134083c4f)
us-east-1 (AMI id: ami-0cda7552753449447)
us-west-1 (AMI id: ami-0c4d7c638ac4a9097)
us-west-2 (AMI id: ami-00846b24187673dd2)
This AMI can be copied to other regions as desired.
EMR versions earlier than 5.30 are based on the Amazon Linux 1 Linux distribution, which is not supported by DSS any more. Although “dataiku-emrclient” images are still available for these EMR versions, they should not be used for new deployments.
Dataiku may periodically rebuild this image to incorporate new updates or support new EMR versions. It is recommended to check for its latest versions, as follows:
using the AWS EC2 console: select the “AMIs” display in the leftmost column, select “Public images” in the drop-down menu at the left of the search field, and search for “dataiku-emrclient”.
using the AWS CLI:
aws ec2 --region eu-west-1 describe-images \ --owners 067063543704 \ --filter 'Name=name,Values=dataiku-emrclient-*' \ --query 'Images.[ImageId,Name]' \ --output table
The AMI does not include DSS. You need to install DSS using the regular DSS installation procedure.
The user account running DSS must have the required credentials in order to create EMR clusters.
The two main ways to accomplish this are:
Make sure that your machine has an IAM role that grants sufficient rights to create EMR clusters
Make sure that your
~/.aws/credentialsfile has valid credentials. This can be achieved by running
aws loginprior to starting DSS
From Administration > Plugins, install the “EMR dynamic clusters” plugin.
Most of the time, when using dynamic EMR clusters, you will store all inputs and outputs of your flows on S3. Access to S3 from DSS and from the EMR cluster is done through EMRFS.
Go to Administration > Connections, and add a new HDFS connection
Enter “s3://your-bucket” or “s3://your-bucket/prefix” as the root path URI
Unless the DSS host has implicit access to the bucket through its IAM role or default credentials in
~/.aws/credentials, define connection-level S3 credentials in “Extra Hadoop conf”:
Add a property called “fs.s3.awsAccessKeyId” with your AWS access key id
Add a property called “fs.s3.awsSecretAccessKey” with your AWS secret key
Go to Administration > Cluster and click “Create cluster”
In “Type”, select “EMR cluster (create cluster)” and give a name to your new cluster. You are taken to the “managed cluster” configuration page, where you will set all of your EMR cluster settings.
The minimal settings that you need to set are:
Your AWS region (leave empty to use the same as the EC2 node running DSS)
The EC2 instance type for the master and worker nodes
The total number of instances you require (there will be 1 master and N-1 slaves in the CORE group)
The version of EMR you want to use. Beware, this should be consistent with the AMI you used.
The VPC Subnet identifier in which you want to create your EMR cluster. This should be the same VPC that the DSS machine is running. Leave empty to use the same as the EC2 node running DSS
The security groups to associate to all of the cluster machines. Make sure to add security groups that grant full access between the DSS host and the EMR cluster members.
Click on “Start/Attach”. Your EMR cluster is created. This phase generally lasts 5 to 10 minutes. When the progress modal closes, you have a working EMR cluster, and an associated DSS dynamic cluster definition that can talk to oit
In any project, go to Settings > Cluster, and select the identifier you gave to the EMR cluster. Any recipe or Hive notebook running in this project will now use your EMR cluster
Go to Administration > Clusters > Your cluster and click “Stop/Detach” to destroy the EMR cluster and release resources.
Note that the DSS cluster definition itself remains, allowing you to recreate the EMR cluster at a later time. Projects that are configured to use this cluster while it is in “Stopped/Detached” state will fail.
For a fully elastic approach, you can create EMR clusters at the beginning of a sequence of scenarios, run the scenarios and then destroy the EMR cluster, fully automatically.
Please see Multiple Hadoop clusters for more information. In the “Setup Cluster” scenario step, you will need to enter the EMR cluster configuration details
In addition to the basic “Start” and “Stop”, the Dynamic EMR clusters plugin provides the ability to scale up and down an attached EMR cluster.
Go to the “Actions” tab of your cluster, and select the “Scale” action. You will have to specify the target number of instances in the CORE and TASK groups. We recommend that you never scale down the CORE group (which contains a small HDFS needed for cluster operations), and instead scale up and down the TASK group
You can scale up/down a cluster as part of a scenario
Add a “Execute macro” step
Select the “Scale cluster up/down” step
Enter the DSS cluster identifier, either directly, or using a variable - the latter case is required if you setup your cluster as part of the scenario.
Select the settings
In this kind of setup you will generally scale up at the beginning of the scenario and scale down at the end. You will need two steps for that. Make sure to select “Run this step > Always” for the “scale down” step. This way, even if your scenario failed, the scale down operation will be executed.
In addition to the basic settings outlined above, the Dynamic EMR Clusters plugin provides some advanced settings
Path for logs
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818999.68/warc/CC-MAIN-20240424014618-20240424044618-00203.warc.gz
|
CC-MAIN-2024-18
| 7,972
| 67
|
https://meyehealth.com/specialty-service/emergency-eye-care/
|
code
|
What Is an Eye Emergency?
An eye emergency is any instance in which your sight is at immediate risk.
- Sudden, unexplained eye pain
- Sudden loss of vision
- Blunt force trauma to the eye
- Unknown debris in eye
- Punctures or abrasions of the eye (scratches)
- Chemical exposure
- Red eye
- Severe allergic reactions or ocular discharge
- Sudden onset of flashes of light or floating spots
- Any other situation in which your vision is in immediate danger.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00417.warc.gz
|
CC-MAIN-2024-18
| 457
| 12
|
http://wbemservices.sourceforge.net/WBEMSDKDG_html/p3.html
|
code
|
Overview of Solaris Web-Based Enterprise Management
This chapter provides an overview of Solaris Web-Based Enterprise Management, and includes the following topics:
Note - This chapter provides a general overview of Web-Based Enterprise Management (WBEM) and the Common Information Model (CIM). For more in-depth information about WBEM and CIM, refer to the Distributed Management Task Force's (DMTF) website at http://www.dmtf.org.
About Web-Based Enterprise Management
Web-Based Enterprise Management (WBEM) is a set of management and Internet technologies that unify the management of enterprise computing environments. With WBEM, you can deliver an integrated set of standardized management tools that leverage emerging web technologies. By developing management applications according to WBEM principles, you can create compatible products at a low development cost.
The Distributed Management Task Force (DMTF), an industry group that represents corporations in the computer and telecommunications industries, is leading the effort to develop and disseminate standards for the management of desktop environments, enterprise-wide systems, and the Internet. The goal of the DMTF is to develop an integrated approach to managing computers and networks across platforms and protocols, resulting in cost-effective products that interoperate as flawlessly as possible.
About the Common Information Model
The Common Information Model (CIM), developed by the DMTF, is an industry standard used to manage systems and networks. This standard provides a common conceptual framework that classifies and defines the parts of a networked environment and depicts how these various parts interact. The CIM captures notions that are applicable to all areas of management, independent of technology implementation.
CIM consists of the following:
CIM Specification - Defines the language and methodology for integration with other management models.
CIM Schema - Provides the actual model descriptions for systems, applications, local area networks, and devices. The CIM Schema consists of the following:
Core Model - Provides the underlying, general assumptions of the managed environment. This model comprises a small set of classes and associations that provide a basic vocabulary for analyzing and describing managed systems.
Common Model - Captures notions that are common to particular management areas, but independent of a particular technology or implementation. Provides a basis for the development of management applications.
Extension schema - Represents technology and platform-specific extensions to the Common Model. These schemas are specific to environments, such as operating systems. For example, the Solaris Schema is an extension schema. Vendors extend the model for their products by creating subclasses of objects. Applications can then transverse object instances in the standard model to manage different products in a heterogeneous environment.
About Solaris WBEM Services
Solaris WBEM Services is the Solaris implementation of WBEM and CIM standards. The following components are included with Solaris WBEM Services:
CIM Object Manager
The CIM Object Manager manages CIM objects on a WBEM-enabled system. When a WBEM client application accesses information about a CIM object, the CIM Object Manager contacts either the appropriate provider for that object, or the CIM Object Manager Repository. When a WBEM client application requests data from a managed resource that is not available for the CIM Object Manager Repository, the CIM Object Manager forwards the request to the provider for that managed resource. The provider dynamically retrieves the information.
WBEM client applications contact the CIM Object Manager to establish a connection to perform WBEM operations, such as creating a CIM class or updating a CIM instance. When a WBEM client application connects to the CIM Object Manager, the WBEM client gets a reference to the CIM Object Manager, which it then uses to request services and perform operations.
Managed Object Format Compiler
You use the Managed Object Format (MOF) language to specify CIM schema. You define classes and instances using ASCII text, and place them in a file that you submit to the MOF compiler, mofcomp(1M). The MOF compiler parses the file and adds the classes and instances defined in the file to the CIM Object Manager repository. See Chapter 2, Creating JavaBeans Using the MOF Compiler for information on how to use the MOF compiler to automatically generate JavaBeans from MOF files.
Because you can convert MOF to Java, applications developed in MOF can run on any system or in any environment that supports Java.
Note - For more in-depth information about the MOF language, files, and syntax, see http://www.dmtf.org/education/cimtutorial/extend/spec.php.
An extension schema of the Common Model, the Solaris Schema specifically describes managed objects running in the Solaris operating environment.
When you install Solaris WBEM Services, the CIM Schema and the Solaris Schema MOF files populate the /usr/sadm/mof directory. These files are automatically compiled when the CIM Object Manager starts. The CIM Schema files, denoted by the CIM_ prefix, form standard CIM objects. The Solaris Schema extends the standard CIM Schema by describing Solaris objects. The MOF files that make up the Solaris Schema have the Solaris_ prefix.
Note - The CIM and Solaris Schema is installed at file:/usr/sadm/lib/wbem/doc/mofhtml/index.html.
Solaris WBEM SDK
The Solaris WBEM SDK is a set of APIs that contain the components necessary to write management applications that communicate with WBEM-enabled management devices using XML and HTTP communication standards.
Solaris WBEM applications request information or services from the Common Information Model (CIM) Object Manager through the WBEM APIs. These APIs represent CIM objects as Java classes. You use the APIs to describe managed objects and retrieve information about managed objects in a system environment. The advantage of modeling managed resources using CIM is that those objects can be shared across any system that is CIM-compliant.
Note - The Solaris WBEM Application Programming Interface (API) documentation is in Javadoc format and is installed at file:/usr/sadm/lib/wbem/doc/index.html during a Solaris installation.
The Solaris WBEM APIs are described in the following table:
Table 1-1 Solaris WBEM APIs
Includes common classes and methods that represent the basic CIM elements. The CIM APIs create objects on the local system.
Applications use the CIMClient class to connect to the CIM Object Manager, and use the other classes and methods to transfer data to and from the CIM Object Manager.
The new Batching APIs, a subset of the Client APIs, enable clients to batch multiple requests in one remote call, reducing the delay introduced by multiple remote message exchanges.
The CIM Object Manager uses these APIs to pass application requests for dynamic data to providers.
Contains classes and methods that you use to formulate and manipulate queries using the WBEM Query Language (WQL).
Using CIM Workshop to Develop WBEM Applications
You can develop WBEM applications using CIM Workshop, a GUI-based development tool included with the Solaris WBEM SDK. You use CIM WorkShop to do the following:
View, add, delete, and search for classes
View, add, and delete namespaces
Add properties, qualifiers, and methods to new classes
Modify instance values
Subscribe to events
Note - CIM guidelines prevent you from modifying the properties, methods, and qualifiers of CIM Schema and Solaris Schema classes, and from changing the values of inherited properties, methods, and qualifiers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806832.87/warc/CC-MAIN-20171123123458-20171123143458-00551.warc.gz
|
CC-MAIN-2017-47
| 7,708
| 45
|
http://support.sendserver.net/quick-start/creating-email-content
|
code
|
Depending on your needs, you can edit the contents of your email template in one of two editors: WYSIWYG and Drag and Drop. This Quick Start topic introduces you to some of the basic WYSIWYG capabilities, only. For detailed information about the Drag and Drop editor, see Drag and Drop Editor section articles.
Creating an email newsletter is one of five general campaign creation steps:
Your First Email Campaign
- Setting up an email marketing campaign
- Selecting email campaign recipients
- Choosing an email campaign design
- Creating email content
- Scheduling an email campaign
To create an email newsletter:
In the Create Email screen, edit the newsletter in any way you desire. While you edit paragraphs and headings, experiment with some of the tools in the toolbars.
Here are some basic examples:
Headings: Select some text and apply a heading to it, by clicking then selecting Heading 1 in the list.
Fonts: Change the font of some text by selecting it, then clicking and selecting a font in the list.Bold, italic, underline: Select text and click, and.
Bulleted and numbered lists: Type three simple words one beneath the other, for example:
Select them all, then click bullet icon (for bullets) or numbering icon (for numbers).
Text colors: change text color by selecting text, then clicking the arrow on the icon, and selecting a color from the list.
Click Next at the bottom right side of the screen.
If you wish, insert a link to another web page.
For example: Select some text, then click. In the Link URL field of the window that appears, type in http://www.example.com, then click Insert.
When you are satisfied with your edits, click Next in the bottom right corner.
The following message appears:
The Create Mail screen displays the converted plain-text email message.
Send yourself a test of the email campaign, but clicking at the bottom of the screen.
Click Yes in the following notification message:
Before you conclude your campaign creation, check your spam score by clicking at the bottom of the screen.
The SpamScore check window appears. Scroll down to the end to inspect the spam score:
Click Close to dismiss the window.
Click Next in the bottom right corner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066613.21/warc/CC-MAIN-20210412053559-20210412083559-00358.warc.gz
|
CC-MAIN-2021-17
| 2,191
| 28
|
http://proencltd.com/proencs-projector-enclosure-success-july-2017/
|
code
|
ProEnc’s outdoor projector enclosures have been selected from a number of competitors due the build quality and cost effectiveness, read on to discover more and find their discount coupons.
ProEnc’s outdoor hotel solution.
In January 2017 ProEnc had been selected to propose a solution for an outdoor projector enclosure to be used at a test hotel in Florida. The environment was rather hostile, with the hotel being near the beach, so a regular enclosure was not suitable.
After a site visit a solution was offered for 25,000 ANSI Lumens projector and in March 2017, ProEnc received the order.
What did the ProEnc projector enclosure offer? V
ProEnc always offer their solutions so the product works right out the box, no having to pay for upgrading to include a heater, ProEnc’s standard solution includes a heater.
In the beach front hotel solution, they offered a stainless steel projector enclosure complete with thermostatic cooling and heating that also featured ProEnc’s compact air conditioning unit as the internal temperature of the enclosure would be high.
The project housing was secured to an outdoor stand with ProEnc’s patent pending anti-theft solution that mounts the enclosure to the stand and is used in high risk areas thought impossible previously.
The large viewing window had a built in wiper, so any sea mist or rain could be wiped off automatically and not affect the visual presentation from the projector.
Result of ProEnc’s stainless steel projector enclosure solution.
After the enclosure was installed and tested for 2 months in varying weather conditions, the hotel group gave ProEnc the order for a further 32 hotels on the East Coast of America. The project is set to be completed late September.
ProEnc’s projector enclosure in 7 working days.Vizbox
A world renowned theme park with a character of a Mouse in Florida contacted ProEnc for an urgent replacement projector enclosure for one of their attractions. The criterial was that the enclosure had to be a custom unit a set size to fit into a pre-existing mounting structure.
The real challenge was the client only had 14 days for the down time. ProEnc was the only projector enclosure manufacturer to step up to the plate. ProEnc got the order and manufactured the custom enclosure including powder coating in 7 working days and the enclosure was delivered to the client on the 13th working day, just in time!
Obviously the custom enclosure was quoted on an expedited rate are more expensive than enclosure made on a 4 week lead time, if not a stock item. Vizbox
ProEnc’s stock projector enclosures.
ProEnc have a limited stock of outdoor projector enclosures, which can be dispatched within 2 working days, depending on couriers. The range of housings available, the range covers projectors from 10,000 to 20,000 ANSI Lumens. In the past 6 months ProEnc has sold on average 12 enclosures per month due to them being in stock.
ProEnc are always looking for innovative ways to make a solution for, so if you have a requirement call (862) 234-5981 to discuss your projector enclosure requirement.Vizbox
Vizbox projector enclosures, Vizbox outdoor projector enclosure
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986649841.6/warc/CC-MAIN-20191014074313-20191014101313-00513.warc.gz
|
CC-MAIN-2019-43
| 3,169
| 19
|
http://arkadiaforum.com/threads/entropia-tracker-ctd-on-my-windows-8-machine.8960/#post-66381
|
code
|
Anyone who has any ideas on how to solve this problem, it would be greatly appreciated. When running Entropia Tracker with the Entropia client under Windows 8, which normally works fine, at random times, usually after I have played for awhile, the client will crash to the desktop and tell me Entropia did not shutdown correctly and ask to send information to Mind Ark. After letting the client send the information, I still cannot restart Entropia, but am forced to do a repair of my installation under the Tools options and tell it to remove unexpected files two of which, the dmp file and one other, it is unable to delete regardless, but at least it will then allow me to restart the client. The only solution so far has been to uninstall Entropia Tracker completely and not run it. If I do that then the Entropia client does not crash. At least that is the way things seem to appear. Is there a way around this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473524.88/warc/CC-MAIN-20240221170215-20240221200215-00414.warc.gz
|
CC-MAIN-2024-10
| 916
| 1
|
https://www.npmjs.com/package/yarn-check-webpack-plugin
|
code
|
When working in a large codebase it's likely someone else will add a new package or upgrade an existing package. This often leads to a convoluted webpack error or runtime error as a result of a missing or outdated package.
The intent of this plugin is to be run in development with webpack so as you checkout different branches or recent changes in version control this plugin can remind you when there are missing or outdated packages.
Install the package:
yarn add -D yarn-check-webpack-pluginnpm install --save-dev yarn-check-webpack-plugin
And add the plugin to
const YarnCheck = ;moduleexports =// Additional configuration...plugins:;
;;;module.exports = config;
webpack as normal.
How do I verify it's working?
Find a random
ls node_modules) and remove it (eg:
rm -rf node_modules/lodash) and trigger a rebuild (by changing a file if in watch mode) or by running webpack again.
The output should include something that looks like:
Missing packages: - lodash Please run `yarn install --check-files` to update.
All configuration is optional. Pass a configuration object when initializing to change any of the options.
Description: The root directory to run the commands. This should be the directory that contains
node_modules. By default, it will run in the current directory. This option only needs to be set if this plugin is being run in a different directory.
Description: Ignore warnings for any missing or wrong version packages that match this regex expression.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337490.6/warc/CC-MAIN-20221004085909-20221004115909-00553.warc.gz
|
CC-MAIN-2022-40
| 1,473
| 18
|
https://jaythornton000.com/refocusing-due-to-pandemic-an-exciting-new-chapter/
|
code
|
So it’s been a pandemic since I posted last and a lot has gone down. No, we didn’t stop exploring entirely. It turns out, most of the world is cleaner than our fine Untied States, but that’s another conversation all together. Travel did slow with boarder closings and such, and focus definitely shifted through these trying months to keeping the new restaurant afloat, working with clients to keep their wheels spinning, and adjusting overall focus to new projects revolving around remote work, emerging tech, & new locations.
…oh, and we bought a beach house to start our AirBnB empire. Stay tuned for details there & cheers from Melbourne Beach!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948235171.95/warc/CC-MAIN-20240305124045-20240305154045-00138.warc.gz
|
CC-MAIN-2024-10
| 655
| 2
|
https://www.rocketsoftware.com/openappdev-for-z?utag_campaign=ADM&utag_channel=3P&utag_platform=CS&utag_content=OpenAppDevDevops.commicrosite&utag_location=WW&utag_name=ADM_3P_CS_OpenAppDevDevops.commicrosite_2020-01_WW
|
code
|
Give your developers the open software they want through a system that combines an easy user experience with the security and support IBM® zSystems® customers demand
Rocket® Open AppDev for zSystems helps you bring applications to market faster, at lower cost and with less risk. We make it easier to implement modern application development practices by automating processes while ensuring compliance to organizational standards and business rules.
Rocket Open AppDev for zSystems provides:
- 20 ported open-source tools and languages for IBM zSystems, bundled for the AppDev experience (with more to be added over time)
- Secure, controlled and easy deployment, with a package management system that also serves as an environment manager (SMP/E install option also available)
- Rapid delivery of CVE patches and version currency updates
- World-class 24x7x365 global support
Rocket Open AppDev for zSystems is much more than a collection of software ports. Rocket has years of investment into automation infrastructure, packaging and delivery options, and an experienced support team. This system combines the high security that mainframe customers demand with an easy user experience for sysprogs and end users.
Compliance and security
Many of the world’s largest banks, insurance companies and government agencies rely on Rocket Open Source Languages and Tools for zSystems/OS. That’s why we feel it's essential that we check our deliverables for vulnerabilities and follow proper licensing requirements.
All of our products are:
- Continuously kept up to date against the NIST National Vulnerability Database
- Scanned for both security vulnerabilities and conformance to proper open-source licensing prior to release
Our Open-Source Support packages are based on the same world-class, customer-centric principles as our other support offerings. When it comes to open-source support, we're offering support and fixes for open-source development tools as opposed to consultancy or solution engineering services.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337490.6/warc/CC-MAIN-20221004085909-20221004115909-00350.warc.gz
|
CC-MAIN-2022-40
| 2,022
| 14
|
https://www.terraforums.com/forums/threads/wtb-darlingtonia-cultivars.144065/
|
code
|
Looking for all red clones of Darlingtonia Californica ( aka D californica f. atropurpurea/The Ponds, Del Norte location) and D Californica “Othello” (anthocyanin-free). Willing to buy or trade for Heliamphora, rare Drosera, etc.
There is only one Darlingtonia cultivar, and that's 'Othello' (also the only described variant as var. viridescens). Otherwise there are coastal and mountain population variants; not sure if anyone here has any of the redder mountain lineages.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652149.61/warc/CC-MAIN-20230605153700-20230605183700-00315.warc.gz
|
CC-MAIN-2023-23
| 477
| 2
|
https://research.tue.nl/en/publications/discontinuous-fold-bifurcations-in-mechanical-systems
|
code
|
This paper treats discontinuous fold bifurcations of periodic solutions of discontinuous systems. It is shown how jumps in the fundamental solution matrix lead to jumps of the Floquet multipliers of periodic solutions. A Floquet multiplier of a discontinuous system can jump through the unit circle, causing a discontinuous bifurcation. Numerical examples are treated, which show discontinuous fold bifurcations. A discontinuous fold bifurcation can connect stable branches to branches with infinitely unstable solutions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00124.warc.gz
|
CC-MAIN-2022-40
| 521
| 1
|
https://www.eurocircuits.com/guide-to-the-eurocircuits-pcb-calculator-calculate-prices-get-quotations-analyse-your-data/
|
code
|
Useful information to prepare for your order:
- See the Eurocircuits PCB Design Guidelines
- See our latest Classification Table on the PCB Design Guidelines – Classification page.
- Explore the Eurocircuits guidelines to make panels
- DRC settings and guide lines for CAD packages
- The entire Eurocircuits Technical Terms and Abbreviations explains the names and descriptions
- What do PCB fabricators do with your data before they make your PCB”s White paper
- The PCB production process explained here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00174.warc.gz
|
CC-MAIN-2023-23
| 510
| 8
|
https://discourse.nodered.org/t/bluetooth-testing-on-raspberry-pi/44494?page=2
|
code
|
with this Raspberry Pi are you able to communicate with Different BLE device? instate of Ipad.
I am able to communicate & data received.
I have used the same Software LightBlue for Custom Value as my name.
So you have it working? Great!
Some where I have a Bluetooth keyboard no if I can only remember where it is.,,
yes, it is working
My observation with Bluetooth node according to version -
- Bluetooth node-red-contrib-generic-ble version 4.0.3 - tested but not working
- If I used this version for Bluetooth communication sometimes it showed connected but not showing GATT information, Data not receiving & gives error. below screenshot for reference.
- Bluetooth node-red-contrib-generic-ble version 3.1.0 - I have used in my application
- It is working. The only one issue with this version it is disconnecting after around 3 minutes & it gives a timeout error. To start again Bluetooth communication I need to restart my node-red, then again it starts communicating & data receiving, again after around 3 minutes it gives the same timeout error. I have to do repeat procedures, need to do restart node-red to establish Bluetooth communication again. Again & Again same issue I am facing.
How to resolved this timeout error?
I would report this to the author on the node's GitHub page. Open an issue there.
Are you sure it is NR or is it bluetooth on the Pi or the iPad? Does the iPad go to sleep?
no, not going to sleep. Another node-red flow working continuously, & I already tested this iPad with my Bluetooth headset continuously. on iPad LightBlue App & screen continues ON.
I am facing one issue with Bluetooth node-red, this Select from scan result option not enabling.
In docker node-red container after writing command sudo bluetoothctl getting error as below screenshot.
Ohh you are using Docker! That would have been a good thing to mention in the beginning. There could be permission issues going on...unfortunately, I do not have any experience with Docker and will not be able to offer any assistance.
Indeed - the container will require both extra permissions and maybe extra software libraries installed inside it in order to access the hosts hardware.
What type of extra permission is required & extra software libraries in host hardware, could you please help guide me.
Thanks for your support in advance.
Not sure - I have never done it - maybe this thread will help - linux - Accessing Bluetooth dongle from inside Docker? - Stack Overflow
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989030.87/warc/CC-MAIN-20210510033850-20210510063850-00623.warc.gz
|
CC-MAIN-2021-21
| 2,466
| 22
|
https://davidleutgeb.at/
|
code
|
Hi there, I'm happy that you found my corner of the internet! My name is David and I'm from Austria. I work as a system engineer in information technology. I'm a strong advocate of using free open source software. My hobbies are photography, spending time outdoors and doing all kinds of fun stuff with technology.
Zabbix Templates: Nextcloud
This is a list of awesome free open source software I use myself and can highly recommend. If you want to learn more about free open source software and why it is important, then feel free to visit the homepage of the Free Software Foundation: Link
A-4552 Wartberg an der Krems
Feel free to write me an email: contact (at) davidleutgeb (dot) at
Here is my PGP key if you want to send encrypted mail: PGP Key Link
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00246.warc.gz
|
CC-MAIN-2023-23
| 755
| 6
|
http://atariage.com/forums/topic/263905-need-guidance-for-first-project/
|
code
|
So hey there^^ I've decided to pick up and start learning bB and using the visual tool recently. To be honest,I've got more of a background in art, I've never programmed a day in my life before recently. Unfortunately, all of the information I've found so far seems really disorganized and I haven't found any sort of hub or directory that shows examples of code and explaining how the information actually works. I've had a few problems so far, but I know how to do part of what I want. If anyone could point me in the right directions when it comes to specific tutorials/ part of guides and such, that would be great.
The project itself is called "Magnificent Heist" it's a top-down, Zelda-style, stealth based dungeon crawler where you play as a thief and have to evade lasers, spotlights, and security guards as you go deeper through a building to burgle treasure.
Things I can do/ know I can do:
- Create and place sprites (multiple copies of one as well) on a playfield
- sprite animation
multicolor sprite/pfcolor kernels (also the no_blank_line)
- missile creation (I won't it for this project, however)
- programming lives/ how to lose them
- sound effects
- items (temporarily invisibility cloaking device)
Things I've struggled with:
- creating working controls for the player
- proper playfield dimensions/structure (how to form a "good" screen that's big and isn't cut off when emulated, how to design a level for the 2600)
- Keeping Code Organized ( as the project gets bigger, I'm wondering how I'm going to keep everything straight/in their own sections)
Things I'll need to figure out/learn eventually for this project
- Title Screen
- moving from one screen to another
- applying a transition animation to that screen change (similar to the Zelda transition when you move screens)
- Enemy logic (A spotlight/ guard chasing you if you get to close to a guard or touch a spotlight it and lose health/ a life to it once)
- multiple "floors" with a few rooms on each floor, possibly the need to search the rooms for a key to get to the next floor
- progressive difficulty with each floor
- end goal that sends back to title screen
So yeah, if anyone could give me some advice or point me in the right direction that would be great. As of posting this, my current issue is the inability to get the player character to move.
I'm at work on my phone, so I'll have to wait until later to share the file/code, but If anyone has more advice, thoughts, scathing criticism, etc. I'd love to hear that as well ^^
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865702.43/warc/CC-MAIN-20180523180641-20180523200641-00391.warc.gz
|
CC-MAIN-2018-22
| 2,517
| 24
|
http://forums.cgsociety.org/archive/index.php?t-447368.html
|
code
|
This on the face of it appears to be a relatively simply question, but I cannot find the solution. In fact I'm beginning to believe it's not possible.
If some could tell me if this is possible or not that'd be great! Also, I'm using Motion Builder 5.5. If this is possible in the latest version that would be very useful to know, as we may upgrade.
I want to be able to take the animation on some User Channels (actor face) I have in one .fbx file across to have another fbx file that has the same set up (character/actor face) and all the same user channels, so that the new file has animated User Channels (actor face).
There, pretty simple! :)
The user channels are driving face bones in my character. Sure, I could plot down to the bones and take that across to any fbx file, that works... but I want to take the User Channels (actor face) data across. I could also import into the file with the animated user channels, but I'd like full 2 way functionality with this before our project really gets going!
I've tried Story mode which refuses to have either character face or actor face as a track.. plus appending, importing....no joy.
We're using Motion Builder 5.5
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866733.77/warc/CC-MAIN-20180524170605-20180524190605-00242.warc.gz
|
CC-MAIN-2018-22
| 1,170
| 7
|
https://www.gradesaver.com/textbooks/math/prealgebra/prealgebra-7th-edition/chapter-9-vocabulary-check-page-682/4
|
code
|
linear inequality in one variable
Work Step by Step
A linear inequality is based on a linear function, "In one variable" means the inequality references x or y (or any one chosen variable) but not both. All other terms are constants.
You can help us out by revising, improving and updating this answer.Update this answer
After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668782.15/warc/CC-MAIN-20191117014405-20191117042405-00288.warc.gz
|
CC-MAIN-2019-47
| 482
| 5
|
http://www.sailnet.com/forums/951782-post391.html
|
code
|
Originally Posted by Hthoni
ok... another picture.
you have to pass through this old fortress gate to get into the village.
the place was attacked twice by the dutch and once by the french during XVII and XVIII centuries.
It was a Portuguese fortress and even if the ones that defended it were heavily outnumbered neither the French neither the Dutch had any luck. right?
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246662032.70/warc/CC-MAIN-20150417045742-00140-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 371
| 5
|
https://indifitsolutions.co.uk/portfolio/helpdesk-application/
|
code
|
To develop a web based application that would integrate with an existing email system. The system would need to display emails sent to a specific email inbox. IT users would log into the system, pick up the emails and create virtual "tickets" that would be used to track progress as the IT users work on the issues raised by the email sender.
The solution developed integrates into Microsoft Exchange (the client's chosen email server) and displays emails received to the helpdesk email inbox. Tickets can then be raised and categorised according to configured categories and assigned to IT users. The application can be granted permissions to insert events into the calendar of IT users so that they will be reminded about tickets that have been assigned to them. It uses a custom developed authentication server to identify the logged-in user.
The solutions is also responsive so that it can be accessed on a range of screen sizes.
The solutions was developed using a combination of Angular JS and .NET Web API (RESTful APIs).
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529175.83/warc/CC-MAIN-20190723085031-20190723111031-00233.warc.gz
|
CC-MAIN-2019-30
| 1,028
| 4
|
https://www.mail-archive.com/pkg-java-maintainers@lists.alioth.debian.org/msg65017.html
|
code
|
I have now managed to get the updated package to install by renaming
/etc/tomcat8 and /etc/default/tomcat8 so that the installer didn't see
the previous configuration, but the installer did not then create new
configs, which prevented tomcat from starting up. (It failed with the
error "tomcat8: Starting Tomcat servlet engine: tomcat8cat:
/var/lib/tomcat8/conf/policy.d/*.policy: No such file or directory")
After restoring my old config files to their original names, I am now
able to start tomcat and it appears to be working properly. Looks like
the package has some problems in how it handles config files, though.
This is the maintainer address of Debian's Java team
debian-j...@lists.debian.org for discussions and questions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744750.80/warc/CC-MAIN-20181118221818-20181119003818-00281.warc.gz
|
CC-MAIN-2018-47
| 732
| 11
|
https://www.tripadvisor.ie/ShowUserReviews-g2548798-d2589549-r655834105-Nelijarve_Holiday_Centre-Aegviidu_Harju_County.html
|
code
|
The staff is unfriendly and not willing to use English language. The prices in the bar and the reception bar are changed depending on who is buying. Children are not given the exact change after payment. The food is tasteless and low quality. All in all, a very unfriendly place.
- Free Wifi
- Free parking
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363290.39/warc/CC-MAIN-20211206042636-20211206072636-00632.warc.gz
|
CC-MAIN-2021-49
| 306
| 3
|
https://softwarerecs.stackexchange.com/questions/24930/tool-to-identify-the-sources-of-compile-time-memory-consumption
|
code
|
TLDR; What kind of tools are available in a Unix environment to help me identify where time and memory are being spent at compile-time?
I have a small C++ hobby project which contains no template declarations, makes sparse use of headers and has (almost) all function definitions in separate compilation units for each class.
I was surprised to find that compile-time memory usage exceeded 1GB per core. I suspect this is due to my reliance on various boost libraries (but not preprocessor, mpl, fusion, or any other TMP wizardry), but have no way of knowing for sure. Compile-time is also suspiciously long.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038101485.44/warc/CC-MAIN-20210417041730-20210417071730-00338.warc.gz
|
CC-MAIN-2021-17
| 608
| 3
|
http://www.you-first.com/2015/04/10/announcement-anthony-obtains-his-cfp-designation/
|
code
|
Please join us in congratulating Anthony on completing the Certified Financial Planner certification.
After 3 long years of courses, while working full time, and 9 exams, Anthony has passed the final Certified Financial Planner exam. He just received his diploma this week. Congratulations Anthony! We are very proud of you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593438.33/warc/CC-MAIN-20180722174538-20180722194538-00156.warc.gz
|
CC-MAIN-2018-30
| 324
| 2
|
https://www.freepaidcourse.com/latest/
|
code
|
Udemy is an online learning and teaching marketplace with over 213000 courses.udemy,udemy courses,udemy coupon,udemy coupon code,udemy coupons,free udemy courses,udemy python,udemy free courses,udemy coupon code 2022
Latest Free Paid Course
⬇️Latest Free Paid Course Cick Here⬇️
Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00894.warc.gz
|
CC-MAIN-2023-40
| 427
| 4
|
http://doctorpenguin.com/2021-07-08_43_summary/
|
code
|
In Journal of medical systems ; h5-index 48.0
Medical image segmentation has seen positive developments in recent years but remains challenging with many practical obstacles to overcome. The applications of this task are wide-ranging in many fields of medicine, and used in several imaging modalities which usually require tailored solutions. Deep learning models have gained much attention and have been lately recognized as the most successful for automated segmentation. In this work we show the versatility of this technique by means of a single deep learning architecture capable of successfully performing segmentation on two very different types of imaging: computed tomography and magnetic resonance. The developed model is fully convolutional with an encoder-decoder structure and high-resolution pathways which can process whole three-dimensional volumes at once, and learn directly from the data to find which voxels belong to the regions of interest and localize those against the background. The model was applied to two publicly available datasets achieving equivalent results for both imaging modalities, as well as performing segmentation of different organs in different anatomic regions with comparable success.
Almeida Gonçalo, Tavares João Manuel R S
Computer vision, Deep learning, Medical imaging, Segmentation
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585321.65/warc/CC-MAIN-20211020121220-20211020151220-00632.warc.gz
|
CC-MAIN-2021-43
| 1,334
| 4
|
https://moodle.org/mod/forum/discuss.php?d=134039
|
code
|
I have been planning to do this for a while; but in the deluge of things, it keeps slipping. So I am posting it to both invite people, and to force myself to get it done (or face the public shame...).
My plan is to create a branch (using git) tracking MOODLE_19_STABLE, and to add merge into that branch various things:
- José Cedeno's timeline courseformat, set to be the default. This exists today.
- TinyMCE with a simplified set of buttons (bold, italics, colour, fontsize)
- PaintWeb -- got to get in motion with Mihai to get a workable hack on 1.9.x for the img storage...
- Enable AJAX in the course page.
- Easier course creation -- imagine: "create course"-> all settings to default, creator is enrolled as teacher, and... -> straight into "enrol students".
- Enrol-into-course screen has a bug "DONE" button that takes you to course.
- Whatever curly hack is needed to only allow the "natural" role/context-types enrolments in the usual UI. When enrolling to a course, show only teacher and student.
- A simplified set of default blocks.
- Other simplifications we can come up with, targetted at lowering barriers to entry for teachers and students using Moodle a little bit every day.
The result will be an experimental, unsupported Moodle. I do plan to use it for OLPC's XS but that's because I am a bit insane.
And before anyone panics, it is not meant to be for inclusion in 1.9.x. It is a way to get something good for OLPC today, and to see what sinks, what swims, and what we can polish for a 2.x
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036176.7/warc/CC-MAIN-20220625220543-20220626010543-00710.warc.gz
|
CC-MAIN-2022-27
| 1,514
| 13
|
https://apppage.net/preview/com.server.auditor.ssh.client
|
code
|
Termius is the best way to manage, UNIX and Linux systems, whether that would be a local machine, a remote service, Docker Container, VM, Raspberry Pi, or AWS instance. In other words, Termius is Putty for Android but with awesome design.
· SSH client with support of ECDSA, ed25519, and chacha20-poly1305
· Desktop app for Windows, Mac, and Linux
· SSH, Mosh & Telnet protocol support
· Local terminal with bash
· Built-in RSA/DSA/ECDSA key generator and Putty keys importer
· XTerm-256 colors, VT100 and vanilla terminal types support
· Local, Remote, and Dynamic port forwarding
· Automatic OS recognition, e.g., Raspberry Pi, Ubuntu, Fedora
· Hardware keyboard support
· Password, key, and 2FA authentication
· 12 awesome color schemes
· Terminal Touch with the support of arrow keys, Ctrl and Alt.
· Organize hosts into groups to share settings among them
· No ads or banners
Premium Features, $99,99 annually. This subscription can be used on any platform where Termius is available.
· Cross-device sync *
· SSH key agent forwarding
· SFTP client
· Terminal tabs
· HTTP/SOCKS proxy
· CLI tool to export ~/.ssh/config
· Fingerprint protection
· Home Screen Widget
· AWS EC2 and Digital Ocean host import
· Host chaining (hop host)
· Save and run snippets on multiple hosts
· Env variables
* Using zero-knowledge cloud storage with 2FA protection. All the data encrypted on the client-side using AES-256.
There’s a lot you can do on GitHub that doesn’t require a...
The PRO version of Spck Editor with Node Terminal access. Spck Editor...
HackenAI - All-in-one Hacken Foundation community applicationHackenAI - the main functional application...
Access your Android's built-in Linux command line shell. Unleash your inner geek!This...
This is an updated version of SocksDroid by PeterCxy to support modern...
TrebEdit is an HTML editor for web design.Start your web projects with...
Created with AppPage.net
Similar Apps - visible in preview.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00096.warc.gz
|
CC-MAIN-2023-50
| 1,976
| 37
|
https://forums.balena.io/t/balenasound-suggestion-plugin-for-internet-radio-or-a-separate-project/161930
|
code
|
I have just started playing with BalenaSound as a quick way of adding Bluetooth to an existing system using tech I have lying around - yes, I am one of those people who have Pis just lying around waiting for something to do.
The ability to sync multiple devices is of great interest to me especially if BalenaSound could handle streaming Internet radio stations. This could be in the form of a plug-in or possibly even an idea for a stand-alone app (“BalenaInternetRadio” ?) but I don’t have the technical savvy to go off and code this myself.
Could I please ask if someone would like to pick this up as an idea ?
As a starting point I would particularly like to be able to stream Greatest Hits here in the UK (http://edge-bauermz-03-gos2.sharp-stream.com/net2national.aac) and the BBC high quality streams (https://garfnet.org.uk/cms/tables/radio-frequencies/internet-radio-player/).
I am guessing that ideally the user would be able to upload a list of required radio station URLs and be able to select which one was to be played via the cloud interface and have it remember the last one played.
If parsing a list was a problem then I would be happy copy and pasting a URL into the web user interface.
Thank you, everyone.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738816.7/warc/CC-MAIN-20200811150134-20200811180134-00015.warc.gz
|
CC-MAIN-2020-34
| 1,230
| 7
|
https://onefexindustrial.com/io-control-mode.html
|
code
|
IO Control Mode mainly have the below 4 types.
Program direct control method
The CPU sends a read command to IO module, and CPU will read the status of IO device from status register. If it is busy, it will continue to poll and check the status. If it is ready, it means that the IO device is ready and can read data from it. After reading the CPU in CPU register (IO->CPU), CPU also writes data to the memory (memory). After writing, execute the next set of instructions.
Frequency of CPU intervention: Very frequent. CPU intervention is required before IO operation starts and after completion, and CPU needs to constantly poll and check while waiting for IO to complete.
Advantages: Simple to implement. After read and write instructions, add some series of instructions to implement the loop check.
Disadvantages: CPU and IO devices can only work serially. The CPU needs to be polled and checked all the time. It is in a busy state for a long time, and CPU utilization rate is very low.
Interrupt driven method
IO device and CPU processing speed is very fast, so after CPU issues a read and write command, the process waiting for IO can be blocked and first switched to another process for execution. When the IO is completed, controller will send an interrupt signal to CPU. After CPU detects the interrupt signal, it will save the running environment information of current process and go to execute the interrupt handler. This enables CPU and IO devices to work in parallel.
Advantages: IO controller will actively report that IO has been completed through interrupt signal, and CPU no longer needs to constantly poll. CPU and IO devices can work in parallel, and CPU utilization is significantly improved.
Disadvantage: The transfer of each word between IO device and memory needs to go through CPU. And frequent interrupt processing will consume a lot of CPU time.
DMA (Direct memory access)
Before reading and writing, CPU needs to indicate how much data to read, where the data should be stored in memory, and where the data should be placed on external disk.
The DMA controller will complete read and write operations of data according to the requirements kicked out by CPU. After the transmission of entire block of data is completed, CPU will send an interrupt signal.
The unit of data transfer is in blocks, and one or more blocks are read and written at a time (it should be noted that only continuous blocks can be read and written, and these blocks must also be continuous in the memory after being read into the memory)
The flow of data also no longer requires CPU intervention.
Advantages: The data transfer efficiency is in units of blocks, and the involvement of the CPU is further reduced. The parallelism of CPU and IO devices is further improved.
Disadvantage: The CPU issues an instruction that can only read or write one or more contiguous blocks of data. If the data blocks to be read or written are not stored continuously but discretely, then CPU has to issue multiple IO instructions respectively and perform multiple interrupt processing to complete.
Channel Control Mode
A channel is a kind of hardware, which can be understood as a “weak version of CPU”. A channel can only execute one type of channel instruction.
Because the channel is compared with CPU, CPU can process more types of instructions than the channel, that is to say, the channel executes a single instruction, and it shares the host’s memory with CPU.
Specific processing process: The CPU informs the channel of operation steps, and the channel program will list the operation instructions in a “task list” similar to that. Then CPU will not participate in the rest. After the channel has executed the instruction, an interrupt is issued to tell the CPU that I have finished processing, and then the CPU is processing the subsequent operations.
Advantages: CPU channels and IO devices can work in parallel, and resource utilization is extremely high.
Disadvantages: complex implementation, requires dedicated channel hardware support.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100172.28/warc/CC-MAIN-20231130062948-20231130092948-00443.warc.gz
|
CC-MAIN-2023-50
| 4,045
| 23
|
https://forums.comodo.com/t/cfp-v-3-two-horror-stories/215925
|
code
|
I hate to be the bearer of bad news. I appreciate the efforts here, and look forward to using Comodo products sometime in the future, however…
[QUOTE]Comodo V3 is gone from my PC, not to return.
Without warning I was locked out of all my folders, did not have permission to access, could not even shut down.
I was able somehow to get into Control Panel and Remove Programs and uninstall Comodo (sort of) and reboot.
I deleted the Comodo Folders from \Program Files\ and elsewhere, cleaned it out of the registry, rebooted, and yet Windows Security Center still reports it as active.
How did you fix it, in case I run into problems? (This was 2 days ago. Comodo on my system was running fine, I thought, but crashed 12 hours ago)
[QUOTE]I found this (on the Comodo forum) , although I did not install or run GMER, I did run the BAT file (after looking into it) and did the hidden non-PNP Device Drivers, too.
I had the same lock out problem described above, but thought it was BOClean since I had been running it only a few hours. From a hard boot, I needed to do a system restore in safe mode and did so to a point prior to installing BOC. I couldn’t get to add/remove.
Note: Prior to restoring in safe mode I tried last know good config (from a hard boot). I still couldn’t access any programs, restart or shut down. The only icons on my systray were time and speaker. No Intel wireless, no AV, no CFO.
Thinking everything was fine, I tried to submit some files from Defense + to Comodo when the program froze. After a reboot, I exited CFP yet did not see Windows Security popup in systray. I uninstalled CFP and had the same behaviour (windows thinking I had a firewall) before using the above fix.
Lastly, this morning was the 1st time since I installed CFP v 2.4 about a month ago that my system was in hibernation, as it should have been. I can’t directly blame it on the firewall but it appears so.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00769.warc.gz
|
CC-MAIN-2023-23
| 1,912
| 11
|
http://sourceforge.net/p/minidlna/bugs/158/
|
code
|
Learn how easy it is to sync an existing GitHub or Google Code repo to a SourceForge project! See Demo
Im using minidlna on ubuntu 12.04 it works perfect but after resuming from suspend i have to restart minidlna service to get it to work again. process is there, but my tv just wont connect to it. any info i can provide to help ?
as a workaround i added
up service minidlna restart
works so far
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430454709311.96/warc/CC-MAIN-20150501043149-00062-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 396
| 5
|
https://www.microfocus.com/documentation/mss/12-7-2/admin-guide/authentication-method.html
|
code
|
Authentication validates the user's identity based on some credentials, such as a username/password combination or a client certificate. Select a method to authenticate users:
. Management and Security Server does not present a login screen. Any user can access their assigned sessions without being prompted for credentials. Session authorization is not available.
. Management and Security Server makes a read-only connection to your existing LDAP (Lightweight Directory Access Protocol) server to verify usernames and passwords. You can also use LDAP to authorize session access. LDAP is an industry standard application protocol for accessing and maintaining distributed directory information services over a network.
NOTE: You can enable more than one LDAP server.
For security reasons, this option, which uses the NT LAN Manager version 2 (NTLM v2) protocol to authenticate users, is not recommended..
For details, see Knowledge Base article 7024851.
- X.509 is a standard for managing digital certificates and public key encryption. When you use certificate-based authentication, you can specify the certificate source and setting for LDAP failover if certificate-based authentication fails.
- To enable this option on a Windows system, install both MSS and a SiteMinder web agent on the same machine as IIS, and set up the server to use your IIS web server.
- MSS provides an optional Add-on to use Advanced Authentication™, a separate Micro Focus product that provides a multi-factor authentication solution that uses a chain of authentication methods.
- SAML (Security Assertion Markup Language) is an xml-based open standard format that exchanges authentication and authorization data between an identity provider and a service provider.
The setup options vary based on your selection.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817153.39/warc/CC-MAIN-20240417110701-20240417140701-00547.warc.gz
|
CC-MAIN-2024-18
| 1,798
| 11
|
http://www.apexcalculus.com/other-texts
|
code
|
Here are some links to other open texts that I have some manner of affiliation with. (See the American Institute of Mathematics site for a good list of good open texts.)
APEX PreCalculus: A precalc book written by my colleague Amy Chapman, with Meagan Herald & Jessica Libertini. It matches the look of APEX Calculus and covers introductory material well. Available at Amazon.com for under $8. Source files are available on Github.
Active Calculus: A full calculus text written by Matt Boelkins with David Austin and Steve Shlicker, written in an "active learning" style. This is intentionally not a traditional calculus text. It is very well written with Geogebra and WeBWorK support. It is very popular; the .pdf's have 70,000+ downloads and a number of schools use it as their calc text. Available at Amazon.com for under $20; find out more at activecalculus.org.
Fundamentals of Matrix Algebra: A text I've written for students needing a background in matrix operations without most of the theory included with "Linear Algebra" courses. The text covers Gaussian Elimination, matrix algebra, determinants, eigenvalues/vectors and a few other topics. Available at Amazon.com for $10; download a pdf version here.
An Introduction to MATLAB and Mathcad: A text written by my colleague Troy Siemers that covers the basics of using MATLAB and Mathcad, along with basic programming principles/structures such as if/then, loops, etc. Available at Amazon.com for $8; download a pdf version here.
Essential Precalculus: Another precalculus book produced in the APEX Calculus style, by Sean Fitzpatrick, based on the precalculus text by Stitz and Zeager. He has also adapted the APEX Calculus texts to better suit the needs of his classes/students at the University of Lethbridge; see more of his work here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664437.49/warc/CC-MAIN-20191111191704-20191111215704-00113.warc.gz
|
CC-MAIN-2019-47
| 1,800
| 6
|
http://www.coderanch.com/t/518552/java-programmer-SCJP/certification/function-remove-Set
|
code
|
This week's book giveaway is in the OO, Patterns, UML and Refactoring forum. We're giving away four copies of Refactoring for Software Design Smells: Managing Technical Debt and have Girish Suryanarayana, Ganesh Samarthyam & Tushar Sharma on-line! See this thread for details.
Have a look on the API of remove() method of the HashSet and the equals() method of the Integer class.
|BSc in Electronic Eng| |SCJP 6.0 91%| |SCWCD 5 92%|
Joined: Jun 02, 2010
thanks Abiraman for the pointer!
I added boolean conditions to test whether the elements are actually being removed or not.
And found that i2 here is not being removed!
then is it that i2 can now never be removed? i added new statements for remove and size and still the size is shown as 1.
Please help! I am getting confused..
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988305.14/warc/CC-MAIN-20150728002308-00049-ip-10-236-191-2.ec2.internal.warc.gz
|
CC-MAIN-2015-32
| 781
| 9
|
https://developer.arm.com/docs/dui0225/d/g-configuring-a-usb-debug-connection
|
code
|
When you install the RealView® ICE Micro Edition software that is provided with RVDS version 2.1 or higher, various features are added to the RealView® Debugger. This appendix tells you how to use these additional features to configure the Versatile/AB926EJ-S USB debug port connection, and how to connect RealView Debugger to the Versatile/AB926EJ-S. It contains the following sections:
This chapter assumes that you are familiar with how to use RealView Debugger to connect to a target, and to configure a connection. For details, refer to the RealView Debugger documentation suite (see the RealView Debugger v1.7 Target Configuration Guide).
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251690095.81/warc/CC-MAIN-20200126165718-20200126195718-00506.warc.gz
|
CC-MAIN-2020-05
| 646
| 2
|
http://www.marketingshift.com/2006/5/msn-adwords-updates-windows-live.cfm
|
code
|
Monday, May 01, 2006
MSN, Adwords Updates, Windows Live SearchLooks the same for the most part, a few minor GUI changes and a faster page http://beta.msn.com
Adcenter Blog annouces that they have opened the Digital Media Lab to the public. It is really impressive and there are a lot of useful tools for any Search Engine Marketersuch as the Demographic Prediction Tool, Keyword Mutation Detection, Acronym Solution, Keyword Group Detection, and everyone's favorite Search Volume Forecasting. The research tools alone are worth the click but as my friend pointed out, "Digital Advertising" is soo 90's
Adwords Blog annouces you'll now be able to select your Time Zone in Google Adwords.
As I said back in January, Adcenter will be live in June. There is another scheduled update coming in May that will have "major changes" according to an adCenter official.
In the first Major success of Window Live Search, Amazon.com has dropped Google as the engine behind its A9 and Alexa searches in favor of Windows Live Search. Google Operating SYstem has some screenshots if the rollout hasnt reached you yet. A9 searches also powers Amazon.com and IMDB.com
Google has annouced a "quality change" to the adwords Ad delievery system. SEJ has a few helpful links on the topic. Essentially if a keyword is more educational in nature, less ads will be displayed, and if a keyword is more commercial in nature, more ads (up to 11) will display on the SERP..
CLickZ is reporting that Yahoo local is offereing flat fee ads rather then auction based.
By Jason Dowdell at 10:34 AM | Comments (1)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347398233.32/warc/CC-MAIN-20200528061845-20200528091845-00430.warc.gz
|
CC-MAIN-2020-24
| 1,578
| 9
|
https://www.usenix.org/legacy/events/smartcard99/full_papers/macaire/macaire_html/pnds6.html
|
code
|
To demonstrate the PNDS features and capabilities, we have developed a personal address book as an example of an application (figure 5). This PNDS-based application contains two parts.
Figure 5 - The Personal Address Book
This application is an appropriate PNDS demonstration. It must be available from anywhere whatever the terminal used. As opposed to the address book application code, address book data are personal. This requires features showing the advantages of PNDS and smartcards.
Via the PNDS, the address book application accesses data located on external naming server without being aware of requests to remote servers. Actually, as the address book data are distributed over the network, the PNDS opens the door to a worldwide personal address book.
The PNDS provides information which enables users to browse their address book over a hierarchical structure of entries, from a directory entry to another. Users can select a person entry (a leaf of the structure), to retrieve its related information. A person entry consists of a set of attributes such as the common name (cn), given name (gn), phone number (pn), e-mail (mail) and photo (jpegphoto).
The PNDS can be viewed as an opened and powerful secure data server, not only as a simple and closed secure data provider such as in a traditional file system. The PNDS is a full naming and directory server.
In addition to the lookup(), the PNDS provides a search() command to find out person(s) into the directory structure according to conditions on attributes. For example: gn=Pierre or pn=+33 4 42*.
Furthermore, the semantics of some entries may be different. For instance, Gemplus corporate directory has not to be stored inside the smartcard because it is provided and supported as part of the Gemplus' information system on the network. Thus in our case, just a referral entry is stored in the PNDS for Gemplus R&D directory entry. When this entry is selected, PNDS provides all necessary information to the JNDI naming manager to transparently forward requests to Gemplus' server (REFERRAL_THROW). If the mode is set to REFERRAL_IGNORE, PNDS provides the Reception Desk entry (pn).
Finally, some attributes of a person entry may be too large with respect to smartcard features. For example, attributes such as pictures or home-pages cannot be stored on the smartcard. However a picture attribute is bound as a remote attribute to the picture provided by a content server on the Internet.
The PNDS smartcard is one part of a personal address book distributed on the Internet. PNDS acts as a federation component.
PNDS provides also an appropriate support to personalize an anonymous terminal with user profiles. We have decided to manage two levels of user profiles:
In our example, the general profile is implemented by a directory entry created as a subdirectory of the PNDS root. This entry named UserProfiles (UP) provides information attributes related to the PNDS holder such as his/her common name (cn), given name (gn), and preferred language (lg) (figure 5). All these data describe the user.
We chose to store user profile information related to the address book directly as attributes to the PersonalAddressBook entry (AB). These attributes consist of the information to personalize the address book user interface according to the user's preferences such as foreground color (fgcolor), and background color (bgcolor) (figure 5).
Also, when services themselves are not part of the PNDS smartcard, user service profiles can be specified by creating new UserProfile subdirectory entries (e.g., S1, S2 on figure 5).
As an extension to our demonstration, we plan to integrate our personal address book in an e-mail manager such as Netscape Communicator which supports access to LDAP directory servers on the Internet. In the latest 4.5 version, this application supports the notion of Roaming Access for roaming users to retrieve user profile information from any place on the network.
At each new connection from an anonymous terminal (e.g. a public network computer), users must manually enter an LDAP server address along with a distinguished name (dn), in order for the application to retrieve their profile and set their preferences accordingly. However, since relatively few users know their distinguished name, and probably fewer can type it correctly, this manual configuration may be tedious and can easily be replaced by just inserting a smartcard into a smartcard reader.
Also, accessing the Internet from anywhere at anytime should allow users not only to retrieve their personal preferences but also to benefit from features and services which are available locally, provided as part of the local network or service provider.
A plugin can allow Netscape Mail to access the address book service from the PNDS, and update the current configuration. Thus, when users insert their card into a terminal, the Netscape mail address book will be personalized from the PNDS.
[Section 7] [Table of contents]
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476452.25/warc/CC-MAIN-20240304133241-20240304163241-00068.warc.gz
|
CC-MAIN-2024-10
| 4,991
| 19
|
http://pairlearnpresent.blogspot.com/2012/01/lets-pair-learn-and-present.html
|
code
|
A fail safe environment to learn online presentation skills.
Pair with a partner, learn and present to the world.
An excellent opportunity to collaborate with other testers.
How is this useful to me?
This is a good chance to share your knowledge on software testing, learn from other testers and practice your presentation skills. The only investment we ask from you is your time. It is similar to www.weekendtesting.com with the focus on presentation and pairing.
How can I join this movement?
Please send an email to PairLearnPresent[AT]GMAIL[DOT]com
We will inform you about the schedule.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589404.50/warc/CC-MAIN-20180716154548-20180716174548-00421.warc.gz
|
CC-MAIN-2018-30
| 591
| 8
|
https://forum.snapcraft.io/t/classic-confinement-request-dlang/9391
|
code
|
DLang is general-purpose programming language, I have ported the whole development environment to snap (dmd, standard library, dub and tools useful for use with IDE/editors).
I has been released (https://snapcraft.io/dlang) to edge now using my upstream repo https://github.com/ErnyTech/DLang-Snap and https://github.com/ErnyTech/DLang-SnapcraftParts, I’ve created a pull request (https://github.com/ErnyTech/DLang-Snap/pull/1) for the transition to classic that will be merged by me once this request is accepted by the snap team.
I think it’s right to ask permission for the classic confinement to my package (https://snapcraft.io/dlang) because as all the compilers need the access to arbitrary filesystem paths.
I tag those responsible for approving requests on the snap store that have already helped me in the past to solve similar technical requests: @jdstrand and @reviewers.
Sure to receive an answer thanks to your availability, I kind regards
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529962.12/warc/CC-MAIN-20190420180854-20190420202854-00538.warc.gz
|
CC-MAIN-2019-18
| 957
| 5
|
https://lensvid.com/post-processing/using-layers-and-masks-in-photoshop/
|
code
|
Using Layers and Masks in Photoshop to Improve Exposure
On this video photographer Tony Northrup looks at working with layers and masks in Photoshop to create a better exposure landscape image.
Now the interesting thing which Northrup suggest here is to not use a regular mask with a selection but instead use a mask with a gradient and later on he also adds a bit of selection tool (for a specific object such as the balloon). In this way we get a much more realistic looking image and exposure which does not look overly processed.
You can check out other advanced videos we have published demonstrating the use of layer masks in Photoshop.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541310970.85/warc/CC-MAIN-20191215225643-20191216013643-00345.warc.gz
|
CC-MAIN-2019-51
| 642
| 4
|
https://www.saunderslog.com/2008/09/29/squawk-box-september-29-the-credit-crunch/
|
code
|
Today we talked economics. The credit crunch in the US has lead to talk of depression. As the banks have failed, we’ve seen folks like Jason Calacanis and Om Malik publishing viewpoints as well. So, how will that hit technology markets? That was our topic.
To add a little structure to this discussion we split the discussion into a couple of phases. First we discussed the impact on larger players — the giants like Microsoft, the carriers, the cable companies and so on. And then we discussed the impact on the startup environment — does it make it harder to raise funds, what about exits, etc.
You will note that I’ve bleeped out the name of a company that was referenced early in the call. This was at the request of one of the participants.
On today’s Calliflower Conference Call: Brad Jones, Jim Courtney, Bill Volk, James Body, Phil Wolff, Randall Howard, Dan Rockwell, Tom Orr, Sergio Meinardi
Related articles by Zemanta
- Jason Calacanis missive unpublished by Silicon Alley Insider [Great Moments In Journalism]
- What’s going on with Jason Calacanis emails posted then removed?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824471.6/warc/CC-MAIN-20171020230225-20171021010225-00426.warc.gz
|
CC-MAIN-2017-43
| 1,101
| 7
|
http://extremeprogrammingclub.blogspot.com/2007/01/first-meeting-of-extreme-programming_05.html
|
code
|
First meeting of the Extreme Programming Club
I have been interested in Extreme Programming for quite a while, and have been using various agile methods in my day-to-day job for the last two years. While I am not an expert, I consider myself to have some domain knowledge, and a desire to learn more.
My employers Erudine (www.erudine.com) are also fanatical about good software development methods and they have agreed to sponsor an Extreme Programming Club where it is hoped people can come together, network, and generally discuss IT issues related to Extreme Programming. (Although not necessarily exclusively XP - if someone wants to wax lyrical about the joys of Ruby then I for one will listen). Drinking real ale in one of my favourite pubs is something I am willing to endure for the greater good.
Initially, we are thinking of holding the meeting once a month in Leeds.
So the first meeting of the Extreme Programming Club will happen on:
Thursday 8 Feb at
Great George St
The meeting starts at 7.00pm and finishes when we are all too tired to talk.
So I can get some ideas of the number of people that might turn up, can I ask anyone who is intending to come to email firstname.lastname@example.org
FEEDBACK ON THE IDEA
I would love some feedback. Do people think this is a good idea/a bad idea, would people like short talks (maybe 20 minutes) about aspects of Extreme Programming, or just an informal gathering? If you would like talks/presentations, what topics are of interest? Is anyone interested in doing a talk?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122167.63/warc/CC-MAIN-20170423031202-00122-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,530
| 11
|
https://bugzilla.redhat.com/show_bug.cgi?id=580863
|
code
|
Red Hat Bugzilla – Bug 580863
NFS: Update lockd to fully support GFS2 (or other cluster filesystems)
Last modified: 2016-09-20 01:20:48 EDT
Using NFS lockd with GFS2 in clustered mode is problematic at the moment. There are probably a number of issues which need to be looked at, including the VFS, lockd and GFS2/dlm/dlm_controld.
This is a bug to track the work required to make this work as intended. There will probably be a number of sub tasks before the work is complete.
Bruce's seven patches:
Thread on linux-nfs:
Issues to address:
- BKL removal in locks.c
- Sharing of fcntl locks between NFS & local/remote processes
- Lock cancellation interface
Anything I missed?
See also this patch:
Where are you at on this Steve?
Well some pieces of the work are done in upstream now. The BKL removal, for example. Also there have been some other updates relating to fcntl locking which have improved the base from which we have to work.
There is still the issue of how we deal with lock recovery though (for fcntl locks that is). We don't currently have a solution to that problem, and I suspect it will be a while yet before we do. Any suggestions are very welcome though.
Would this bug report if addressed allow a GFS2 filesystem to be used concurrently with NFS and local (Samba for example) access? Without causing potential filesystem corruption?
If so great, any update on this?
The short answer (comment #7) is yes, however this is actually a very complicated question and this is not just going to be a case of "here is a patch which provides this feature" but something that we'll be working towards over a period of time.
Both NFS and Samba do locking in their own, mutually incompatible ways. So we'll be making steps towards this eventual goal over a period of time.
The first step is to allow clustered samba exports from multiple nodes - that is already working, and we support that in RHEL 6.2 and above.
There are other tasks which are going on at the same time, to fill in a few more pieces of the puzzle. It is likely to be some time before we finally get to the eventual goal you outlined in comment #7.
In the mean time, we would be very interested in collecting use case info from people, since that will help us prioritise certain aspects of the design. So if you have any potential applications for such a system that you could share with us, we would be very interested.
A lot of the problem with NFS stems from nfsd being in kernel space instead of userspace where it should be.
As one of the people responsible for that (back in ~1993-4) all I can do is apologise. Samba didn't exist then and lock races/compatibility weren't issues that were considered (we did it to speed up access for 8-bit PCnfs clients).
I _strongly_ suggest that an effort be made to move NFS back into userspace.
On comment #8, ack'd I know it's quite a long process to get all the pieces that will be required.
Basically I want to have a clustered Intranet server providing HA for file and print services to both Windows and Linux clients via Samba and NFS respectively.
Normally sharing a file system with both of these should work on other file systems but locking issues between them could cause the file level corruption. But on GFS2 this can result in File System corruption. My information came from a very helpful support reply I received last year (copied to the end of this post). The only way around this from RH was to re-export the NFS.
Interestingly a thread on a Samba mailing suggests locking should work between NFS and Samba and you shouldn't re-export NFS on Samba:
so still a bit confused.
I can't imagine anyone nowadays who has a workstation environment with NFS exports wouldn't want to also re-export to CIFS now.
So basically back to the main point GFS2 should be a filesystem with "no surprises" and allow me to re-export on CIFS and NFS without causing filesystem corruption.
On comment #9, I couldn't agree more, I have always wanted NFS back in userspace. It just locks up or stops local fs umounts way to often. It would nice to be able to free everything simply by killing a process (to be honest like Samba).
Original support info:
"Exporting NFS and Samba from the same directory tree is unsupported regardless of the filesystem in question, be it GFS, GFS2, EXT3, EXT4, or NFS. The reason that it is unsupported is because NFS and Samba use different locking systems. NFS uses BSD style locks (flock) and Samba uses POSIX locks (fcntl.) The flock and fcntl locking systems are not compatible. So if NFS takes out an exclusive-write flock on a file (because an NFS client is making a change to that file) Samba could come along read-from or write-to the file though NFS expects the file to be exclusively locked. The obverse could happen as well where Samba could ex-lock a file and NFS could come along and read, write, or even delete that file. The end result will be file corruption.
The situation is even more complex on GFS2 as GFS2 employs its own locking layer called "glocks." The conflict between flocks, plocks, and glocks can result not only in file corruption (as you'd see on other filesystems) but filesystem metadata corruption resulting in withdraws or panics and necessitating a filesystem check and repair. The situation is further complicated as the only correctly way to export NFS from GFS2 requires modifying the behavior of the GFS2 locking layer and thus making the possibility of filesystem corruption or lock contention even more pressing; this is why when exporting NFS from GFS2 one isn't even supposed to access the filesystem via any method other than NFS"
Has this progressed in any way since last year?
Well at least the BKL removal has been done now in locks.c (and the rest of the kernel) so we are at least one step along the way.
Bruce may be able to give more information on the current plans for locks.c - he was working on a solution to unify the locking between NFS and Samba (and, I hope userspace too), but I'm not sure of the current status.
This is however still very much on our todo list. We have been working on some similar (i.e. important for NFS/Samba integration) issues recently. Since none of these items is standalone, and they all require cooperation between multiple subsystems, implementation is not simple, unfortunately.
Complete change of tactic:
Why not just ditch Kernel NFSD entirely and replace it with NFS-Ganesha? It's entirely in userspace and plays nicely with other disk access, including Samba.
It saves trying to bang square pegs into round holes.
(In reply to Alan Brown from comment #13)
> Complete change of tactic:
> Why not just ditch Kernel NFSD entirely and replace it with NFS-Ganesha?
> It's entirely in userspace and plays nicely with other disk access,
> including Samba.
We're following Ganesha with interest. For now I suspect its consistency with other filesystem access is actually less tight than knfsd's, but the details here are fairly complicated.
There are also a number of things we can do (such as kernel support for rich ACLs and delegations, for example) that benefit both projects.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859766.6/warc/CC-MAIN-20180618105733-20180618125733-00550.warc.gz
|
CC-MAIN-2018-26
| 7,114
| 51
|
https://www.vehemence.info/civb/how-to-find-ip-address-on-iphone-mobile-data/
|
code
|
How To Find Ip Address On Iphone Mobile Data. And, the number in that field is your iphone’s ip address. It is similar to how a phone number is used to place a call.
How to check your ip address on android. Find the network the iphone is connected to in the list. Follow these instructions to enter a static ip address for your ios device:
It Is Similar To How A Phone Number Is Used To Place A Call.
Find the network name of the router you are currently connected to, and tap on the blue (i) info button next to the active networks name. Assuming you are usually a dhcp address, scroll down and find the ip address in the format of x.x.x.x, for example “192.168.1.2”. Here are instructions on how to find the ip address of your iphone:
The One You're Connected To Is Noted With A Blue Checkmark.
You'll see your public ip displayed at the top of the search results. I have a security camera at home on a network with a static wan address to my isp. Follow the instructions above to find iphone address to see if it has changed.
Then, Click On The Security Tab And Go Down To Devices Section Of The Page To View Access History.
The mobiletracker service brings a unique, functional and fully gdpr compliant addition to common free and premium advanced ip address tracking and website visitor location tracing services. When on the road, my program needs an internet connection as well as the gps data, so i need to pair to my iphone to get internet. Now you will see a page that displays various information.
Find The Public Facing Outside Ip At The Very Top Of The Screen, Without Interacting With Any Search Results.
There you will find the ip address of the iphone, ipad, or ipod touch. You can also set a static ip address as at the point of step 2 above. Once the lease is renewed it will assign a new dynamic ip address to your iphone, in essence resolving the ip address conflict.
The Process Of Locating Your Public And Private Ip Addresses On Your Android Device Is Very Similar To The Iphone.
So, when you use a static ip address like many other cases at home, you left a trace about the ip in your emails or whatever. First, press the windows key and the “r” button. After doing this, however, my program can't determine my iphone's ip address so i can't get the location data.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00271.warc.gz
|
CC-MAIN-2023-14
| 2,298
| 12
|
http://bigwww.epfl.ch/palm/
|
code
|
In PALM/(d)STORM, molecules are stochastically imaged, in order to temporally separate molecules which would otherwise be indistinguishable.
The position of each molecule is localized by fitting the measured photon distribution. The information from multiple imaging repetitions
is then combined to form a composite super-resolution PALM/(d)STORM image that contains the locations of many single molecules, even those
sharing a single diffraction-limited region.
The purpose of this website is to provide simulated and experimental data for the comparison and validation of PALM/(d)STORM localization,
reconstruction and visualization software packages.
Sharing standard data sets will help to allow clear comparisons between different analysis approaches.
We have made available one real biological dataset and one synthetic dataset.
The results of localization of some open-source software are also available.
Suliana Manley, Julia Gunzenhäuser and Nicolas Olivier, A starter kit for point-localization super-resolution imaging, Current Opinion in Chemical Biology, vol. 15, no 6, December 2011, pp 813-82.
Localization Microscopy • 2013 ISBI Challenge
Benchmarking of Single-Molecule Localization Microscopy Software
Comprehensive review of the single-molecule localization microscopy software based on ground-truth synthetic image sequence simulating biological structures and image formation process at the nanoscale resolution.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706628306/warc/CC-MAIN-20130516121708-00058-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,436
| 13
|
https://www.freelancer.com/job-search/linux-set-vlc-server/
|
code
|
Looking for Linux set vlc server Freelancers or Jobs?
Need help with Linux set vlc server? Hire a freelancer today! Do you specialise in Linux set vlc server? Use your Linux set vlc server skills and start making money online today! Freelancer is the largest marketplace for jobs in the world. There are currently 17,764 jobs waiting for you to start work on!
I need someone to install a VideoLan (VLC) to my Linuxserver. VideoLan is supposed to be a media streaming...streaming solution for non-windows server. http://www.videolan.org has detailed information about the program...enough for this. I need for you to install it to my server, which I'll give access to, and also to create
...coder to develop an extension to VLC (videolan client) so that the amino set top box (RTSP over UDP) can work...work in a VOD manner. Currently VLC does not support RTSP over UDP.
1) Complete and...the deliverables):
a) For web sites or other server-side deliverables intended to only ever exist in
i need a debian linux(vlc and ffmpeg installed only) which must pxe boot
x264 / AVC Codec (libav)...installed.. new codecs must be installed.
simple web server with php support. and a cron to run after reboot
Parameters in config file :
1. CMS SERVER ( ip address )
2. SECRET KEY ( text & numbers...the ADMIN commands. No other way.
I will give a set of available commands and how to manage those commands
I am a windows developer new to the world of linux...using ubuntu...I have a task at hand that I need...think it should be a pretty simple thing. I am using VLC to capture video from my analog camcorder. I can...each file. I would like a script that would launch VLC, capture from the imput card, and then stop after
The server is at present sat up with CentOS Linux NX Nomachine remote desktop.
The server is going...following.
Apache web server
ImageMagick...Hosting Controller 8
An of course secure the server.
After finishing we should receive full documentation
I need someone to install and set a streaming script on my Linuxserver to stream Windows media player...player content.
I am quite familiar with VLC player since I use it on one of my servers, but I would like
...programming experiance also may have knowledge of linux to embed the vlc media player found here (http://www.videolan...Blissta skin found here(http://www.videolan.org/vlc/skins.php). Must be able to show screenshots of video...(myiset.com) this is the website where I need the vlc player embeded.
1) Complete and
I need a VLC plugin or fork that will mute the audio when the overall hue/lumia of a user definable area...the deliverables):
a)? For web sites or? other server-side deliverables intended to only ever exist in...Seller Legal Agreement).
XP or linux
Linuxserver admin -
Main task -
I require a mail server to be setup and configured on my dedicated...dedicated server. The client connecting to the server will be via my own php web mail app.
The OS of the server can be either of the above - which ever is preferred
...happy to be advised which server to use, e.g Darwin streaming, Helix , VLC
1) Complete...the deliverables):
a)? For web sites or? other server-side deliverables intended to only ever exist in
...It sounds like you might have the required skill set to help with my project. I am interested in setting...several Linux servers, probably using Tarsnap.
On an ongoing basis I need occasional Linux configuration
...and server setting...
Hello dear developers,
i need urgent help for setting up my linuxserver.
i...i ve uploaded to server all files for a domain but browsers doesnt show the data and error type is so:
...component "Zend Optimizer" is not installed on the Web Server and therefore cannot service encoded files. Please
I Have just got a server from superb.net and I need to get it set up.
I am running Centos 4.5 and Cpanel
I have gotten this message when I tryed to set it up my self.
Zone for the root domain enloecustom
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464253.80/warc/CC-MAIN-20151124205424-00060-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 3,938
| 45
|
http://forums.pinstack.com/f10/radio_stations-79462/
|
code
|
Peaple plz post ur fav or jus Random stations that are compatible with xplayer.....thnxs yall... 3rd Party BlackBerry Software forum
Peaple plz post ur fav or jus Random stations that are compatible with xplayer.....thnxs yall
Try this site for Radio stations:
Recently I've started to use Moodio.fm rather than Xplayer, you might want to try that and see if you like it as well. No downloads needed.
As much as I enjoy finding a new app that is truly useful, memory limits are becoming a problem, so anything I can do that uses built in functions without taking additional space is at the top of my list of preferences. Moodio.fm fulfills that beautifully.
Here is a radio station that works with x player. The URL is http://126.96.36.199:8038
The radio station is Dirty South Radio.. Urban music. Hope it helps.
Take care. ~via BB (wap.pinstack.com)~
I think if you need station IP addresses then shifting through the shoutcast site should help. They have a HUGE selection.
How do I get the IP's off of shoutcast? I am on there and found the station i want, but I need the IP because xplayer's radio doesn't really use any other.
Tags for this Thread
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721595.48/warc/CC-MAIN-20161020183841-00435-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,152
| 11
|
https://blenderartists.org/t/duplicate-with-children/428810
|
code
|
I want to build python code to populate a scene with duplicates of architectural building objects according to an input file.
Up until now I could make it work for single objects that get duplicated and then linked to a “super” parent where I collect all duplicate objects of the same type.
But now I need to duplicate Object groups where there is a “main” object that has child objects.
The following code worked fine for single objects but now I am stuck with the children.
ob_act = Blender.Object.Get('10205') scn.objects.selected = ob_act.sel = 1 # select children for ob in bpy.data.objects: if ob.parent == ob_act: ob.sel = 1 Blender.Object.Duplicate() #Duplicate linked ob_act = scn.objects.active ob_act.LocX = float(ar.replace(",",".")) ob_act.LocY = -float(ar.replace(",",".")) p10205.makeParent([scn.objects.active])
I am guessing that the line
ob_act = scn.objects.active
no longer is the right thing to do as all the children in the duplicate are selected as well.
The result of the program right now is, that the main object gets duplicated and put into the super.parent group but the child objects get duplicted in the original “main” parent object.
I start with
column + column.top (child)
after running the script i have
column +column.top +column duplicates ... and column.grp.parent + column.top duplicates ...
but what i want to have is
column +column.top (child) and column.grp.parent + column.001 duplicate ++ column.top.001 duplicate + column.002 duplicate ++ column.top.002 duplicate ... etc.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178375274.88/warc/CC-MAIN-20210306162308-20210306192308-00382.warc.gz
|
CC-MAIN-2021-10
| 1,529
| 15
|
http://statistics-assignment-hel36898.blogofoto.com/10717374/new-step-by-step-map-for-stata-project-help
|
code
|
forcing you to definitely wrestle with inconvenient file formats to your knowledge or try to set up an internet server, we now deliver the option of loading your knowledge from a deck of ISO 6586:1980 punch cards. Only punch your knowledge on to a deck and mail the deck to us.
Right after uploading a custom keep track of, push the "visit variant annotation integrator" button. The consumer's tutorial is at the bottom with the web page, less than "Using the Variant Annotation Integrator."
Similar to other Genome Browser monitor shows, clicking about the graph will deliver up a description web page that displays a detailed box-and-whiskers plot of the RPKM information, and a description of the strategies utilized to make the info.
Remember to notice the ailments to be used when accessing and applying these knowledge sets. The annotation tracks for this browser ended up produced by UCSC and collaborators around the world. Begin to see the Credits website page for a detailed listing of the companies and individuals who contributed to this launch.
margin of the line. To set a marker: mouse: right simply click while in the margin of the road menu: use Watch/Established Marker find: The Discover dialog can set markers in any way strains
keep track of type=bigNarrowPeak visibility=entire db=hg19 title="nPk" description="AWG ENCODE narrowPeak Case in point" bigDataUrl=
plots the actual values of the choice in different graphs and closes the dialog. Scatter plot (YX)
The leading challenge in employing the MIT OCW initiative had not been school resistance, but instead, the logistical issues presented by deciding ownership and obtaining publication authorization for i thought about this the massive amount of mental property things which might be embedded while in the system elements of MIT's college, Besides the time and specialized work needed to change the academic resources to an on-line format.
When there is an Lively range, it demonstrates the selected sample. For graphics it's the Y coordinate of the mouse cursor.
funding help of NHGRI, we offer hands-on Genome Browser teaching onsite at your establishment, customized to the viewers's amount of expertise.
The key new capabilities in OxMetrics six are: Output dealing with is faster underneath Linux, and really considerably faster under OS X. Usual QQ plots can now include pointwise asymptotic 95% normal mistake bands. A variable can be utilized so as to add Shading to the graph:
Credits web site for an in depth list of the organizations and people who contributed to this release.
By default, only the Common SNPs (146) are noticeable; other tracks has to be produced visible using the track controls. You will find another SNPs (146) tracks on the two pop over here of GRCh37/hg19 and GRCh38/hg38 browsers in the "Variation" team.
Profile plots and interaction plots in Stata, component four: Interactions of constant and categorical variables
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823710.44/warc/CC-MAIN-20181212000955-20181212022455-00025.warc.gz
|
CC-MAIN-2018-51
| 2,931
| 14
|
https://research.bangor.ac.uk/portal/cy/researchers/stuart-jenkins(266218d3-59ab-4717-9338-fb7598a56f4c).html
|
code
|
Professor Stuart Jenkins
Room: 404 Westbury Mount Phone: 01248 382896
I graduated in Zoology from Cambridge University in 1990 and undertook my PhD in intertidal ecology at Port Erin Marine Laboratory, on the Isle of Man between 1991 and 1995. I remained at Port Erin for a further 6 years, undertaking two post-doctoral research posts, the first, within the EUROROCK project, addressing ecological questions on intertidal rocky shores over a European scale and the second, examining the impacts of demersal fishing techniques on benthic communities. In 2001 I was appointed a Research Fellow at the Marine Biological Association where I developed a research group in experimental benthic ecology. In 2007 I moved to the School of Ocean Sciences, in 2009 was appointed Reader in Marine Ecology and was awarded a personal chair in 2015.
I am an experimental benthic ecologist and over the past 25 years I have addressed questions in both fundamental and applied ecology in intertidal and shallow sub-littoral habitats. Particular areas of interest include: the transport, supply and recruitment dynamics of benthic invertebrate larvae; the role of ecosystem engineers and key herbivores in intertidal systems and the generality of their effects over large geographic scales; the role of biodiversity in marine systems; the ecology of non native species and practical biosecurity interventions; anthropogenic impacts in the marine environment. I take an empirical approach using a combination of field / mesocosm experiments and long term surveys.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00216.warc.gz
|
CC-MAIN-2023-50
| 1,545
| 4
|
http://create3000.de/users-guide/components/particlesystems/boundedphysicsmodel/
|
code
|
BoundedPhysicsModel provides user-defined geometrical boundaries for particle motion. A child geometry node specifies boundaries that constrain the location of the particles.
The BoundedPhysicsModel node belongs to the ParticleSystems component and its container field is physics. It is available since X3D version 3.2 or later.
SFNode [in, out] metadata NULL [X3DMetadataObject]
Metadata are not part of the X3D world and not interpreted by the X3D browser, but they can be accessed via the ECMAScript interface.
SFBool [in, out] enabled TRUE
Enables/disables node operation.
SFNode [in, out] geometry NULL [X3DGeometryNode]
The geometry node provides the geometry used for each particle when the parent ParticleSystem node has geometryType=GEOMETRY.
Include <component name='Geospatial' level='1'/>
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662510117.12/warc/CC-MAIN-20220516104933-20220516134933-00216.warc.gz
|
CC-MAIN-2022-21
| 800
| 9
|
http://www.hardwaresoftwarearticles.com/archive/index.php/t-5544.html
|
code
|
When I open a IE page and try to access the address bar by clicking on its
dropdown button, the page will hang for a while and if I try to press
anything on the tool bar (ie Stop button), or try to close the window, i
will get a 'Not Responding' message. This problem only happens once on each
new page that is opened, then address bar operates normally.
I'm using XP Home edition and AFAIK(or at least Windows tells me), i have
all the latest updates for XP and IE.
Any help would be appreciated.
07-09-2005, 10:15 PM
This might be an Autocomplete problem- a corrupt History folder or index.dat
Login as another user with administrator privileges, or from the machine's
default administrator account (from safe mode) and delete the affected
History folder from Windows Explorer. A new folder will be created on
You would not be able to delete this History folder when logged in as
yourself- it's "In use." You should be able to delete it from the
If this doesn't help, I would conduct a very thorough search for malware.
No one program can remove all malware. Start by downloading and running
CWShredder, Ad-aware and Spybot. Check for updates before running Ad-aware
Also note the security tips and other important information on that page.
Additional information at:
The Parasite Fight http://www.aumha.org/a/quickfix.htm
More security tips at http://www.aumha.org/a/parasite.htm
Bugs, Glitches & Stuffups: http://inetexplorer.mvps.org/darnit.html
What you can do about spyware and other unwanted software:
If unsuccessful with those programs, you may have to post a HijackThis log
for analysis. Start at
http://forum.aumha.org/viewtopic.php?t=4075 Then go to
http://www.aumha.org/a/quickfix.htm Work through the preliminary cleaning
steps then post a HijackThis log to the forum at
Be patient. It's a busy forum.
HijackThis logs are also analyzed at these (and other) forums. Look for the
proper forum and an "Important- Read This First" message so that you follow
Hope this helps,
[MS MVP- IE/OE]
"Elie" <qelie[at]hotmail.com> wrote in message
> When I open a IE page and try to access the address bar by clicking on its
> dropdown button, the page will hang for a while and if I try to press
> anything on the tool bar (ie Stop button), or try to close the window, i
> will get a 'Not Responding' message. This problem only happens once on
> new page that is opened, then address bar operates normally.
> I'm using XP Home edition and AFAIK(or at least Windows tells me), i have
> all the latest updates for XP and IE.
> Any help would be appreciated.
> Thank you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211185.57/warc/CC-MAIN-20180816211126-20180816231126-00104.warc.gz
|
CC-MAIN-2018-34
| 2,570
| 44
|
https://bigprof.com/
|
code
|
Hiring a developer or writing your business application code from scratch can be costly and time-consuming. However, using the right nocode tool can save you up to 90% of the time and cost involved.
AppGini is a nocode tool that empowers you to create secure and robust web database applications in hours (or even minutes) without writing code. So spend less effort, reduce development costs and stop wasting your time!
Since AppGini was released in 2002, we've continually enhanced it by adding features, improvements, and fixes.
And because these improvements are all based on the valuable feedback of thousands of users, AppGini has become an outstanding data management product essential for small businesses, freelancers and database developers.
Online rental property manager (ORPM) allows rental property managers to manage landlords, rental properties, units, applications, leases and tenants. This also includes all details related to the tenants, i.e. references, rental history, employment history and income overview.
ORPM was created using AppGini. So you can easily customize it to add/remove details or any extra functionality to fit your own requirements. ORPM is a responsive, multi-user web-based application that you can access from your PC, tablet, mobile or any other device.
Easy and lean invoicing for small businesses, consultants and freelancers. Some of the features include:
OIS was created using AppGini. So you can easily customize it to add/remove details or any extra functionality to fit your own requirements.
OTCM is an AppGini-generated web application that offers you a user-friendly, feature-rich training center management application. It assists you in tracking and managing trainees, instructors, courses and labs. You can print training certificates, as well as easily customize the application to add reports and extra functionality.
A web-based application that can be used as a database for storing patients data, diseases, and symptoms. Most of the code was automatically generated by AppGini. Using it is as simple as defining diseases, symptoms and patients.
RUView helps visualize all the resource utilization data of your teams and projects in one simple chart that instantly shows you who's working on what and when.
This is our blog, where we share various thoughts on AppGini, as well as web development and programming in general. Feel free to explore, and share/comment!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300805.79/warc/CC-MAIN-20220118062411-20220118092411-00499.warc.gz
|
CC-MAIN-2022-05
| 2,424
| 12
|
http://www.tatu.us/directory/index.php/Science/Math/Statistics/
|
code
|
Click here to Remove Link to your site
|This category in other languages:|
Describes adaptive statistical designs and their benefits, and some programs for optimizing and analyzing such designs.
Advanced statistics and optimization including Response and Yield Surface Modeling.
Analysis of Multiple Informant Data
Statistical methodology for the analysis of multiple informants/sources with applications to child psychopathology and gerontology.
Biostatistics Resources on the World Wide Web
Links to departments, associations, data, software, teaching resources.
Calculation for the Sobel Test
Interactive calculator performs tests of mediation in path analysis or structural equation models.
Chance Database Welcome Page
This data base contains materials designed help teach a Chance course or a more standard introductory probability or statistics course.
The Chart of the Week
Graphical display of social, economic, and political statistical data
Chebyshev's inequality with one-tailed and unimodal versions, putting statistical limits on the dispersion of probability distributions.
Effect Size Calculator
On-line calculator for Cohen's d and r, presented by Lee A. Becker.
Entropy in Science
Specializing in the uses of entropy in statistics and science.
An index of free statistical software, data and resources.
Glossary of Statistical Terms
Explains trade words used in the field. Includes resource links.
History of the Monte Carlo Method
The Monte Carlo method provides approximate solutions to a variety of mathematical problems by performing statistical sampling experiments on a computer.
Interactive Statistical Calculations Page
Collection of over 300 links to web pages that perform statistical calculations.
The Interdisciplinary Inversion Group.
The focus of the research is on statistical aspects of inverse problems. Courses, publications and other resources.
The Internet Glossary of Statistical Terms
Glossary of terms organized according to learning order for those unfamiliar with the subject, and also an alphabetical list for already familiar with statistical procedure.
Item Response Theory (IRT) tutorial from the University of Illinois, Urbana-Champaign Psychology Department.
Item Response Theory and Its Applications
Scientific resources for item response theory approaches to measurement.
Latent Class Analysis
Directory of software for this statistical technique for modeling unmeasured categorical variables.
Latent Class Analysis and Latent Class Models
Resource for applied researchers and statisticians interested in the statistical method, Latent Class Analysis.
MediaChannel.org: Numbers Game
The media's use of statistics in a culture where public policy is often based on "scientific" findings is more than a topic for journalism-school debates. Links to in-depth articles from a variety of perspectives.
Handbook for the understanding and practice of Meta-Analysis.
Non Symmetrical Data Analysis
Discusses methods of how to use structured information for multi-dimensional data analysis. From the University of Naples.
Power Analysis for ANOVA Designs
On-line demonstration which runs an SAS program that calculates power or sample size needed to attain a given power for one effect in a factorial ANOVA design.
Protein Structure Theory Group - Analysis Tools
Online tool can be used to analyze frequency, equi-probability, general random, and point mutations.
Rainer's Home Page for Statisticians
Information and links on WWW servers in Statistics, mailing lists and newsgroups, statistical associations and departments, statistical software, miscellaneous, statistical quotes, and a directory of professional statisticians worldwide.
A free web-based service that offers instant random sampling and random assignment for researchers. Also has a user-friendly tutorial for students.
Academic research and resources for industry analysts and businesses interested in applying the latest statistical and analytical tools and technology.
Frequently asked questions about structural equation modeling.
A framework for organizing computations around image-like, analogue representations of physical processes in data interpretation and control tasks.
Spatial Statistical Sites Source
This site provides links to many pages with primary or secondary relevance to spatial statistics.
An online system for finding statistical tests that would best suited to a specific dataset.
Principles of mixed model analysis. Includes discussion of REML estimation of variances, BLUEs and BLUPs, fixed and random effects, and inference space; with small examples.
Statistical Inference on the TI-83/86/89
Contains problems and solutions on general topics of probability distributions, confidence intervals, hypothesis testing, analysis of variance, and correlation analysis. Detailed survey sampling projects are also included.
Statistical Linkage Programs
Information about statistics for genetic analysis.
Statistical Methods for Rater Agreement
Resources for researchers who want to analyze data on agreement among raters or diagnostic methods. Includes raw agreement indices, kappa coefficient, weighted kappa, latent class and latent trait models, and tetrachoric and polychoric correlations.
Free formulae of rules for the expectation of mean, variance, covariance, correlation coefficient, proofs available for purchase.
Statistics Every Writer Should Know
Basic statistical concepts described in plain English. Designed for journalists or other beginners.
Statistics on the Web
Clay Helberg's annotated list of statistical method resources on the web.
A collection of resources: software, FAQs, papers, books, links. Ranges from elementary to advanced. Compiled by Stephen Soldz.
Sidney Tyrrell's Resources' page, part of the National Grid for Learning.
Statistics to Use
Online statistics demos.
Searchable database of statistical information and data sources on the internet.
Statoo Resource links
Directory of statistical links, organized by specialty.
Virtual Laboratories in Probability and Statistics
Interactive, web-based resources for students and teachers of probability and statistics.
The World-Wide Web Virtual Library: Statistics
Well-organized, comprehensive list of web Statistics resources.
The content of this directory is based on the Open Directory and may have been modified by DWodp
Powered by DWodp live version 1.1.4 Copyright © 2003 Dominion Web
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038062492.5/warc/CC-MAIN-20210411115126-20210411145126-00254.warc.gz
|
CC-MAIN-2021-17
| 6,404
| 80
|
https://community.spiceworks.com/canonical_answer_pages/135750-ie-11-wont-open-html-attachment-from-outlook-this-page-can-t-be-displayed
|
code
|
Fix: “IE 11 wont open html attachment from outlook - "This page can't be displayed"”
Below are 3 related topics aggregated from across the Spiceworks Community with their most helpful replies.
The President decide to purchase a MacBook Air (running Version 10.8.4) and wants me to setup his company mail on it. (For home use) Using the Apple Mail client to connect via IMAP to our company Exchange 2003 server.
When he receives an email with an attachment (PDF, DOC, XLS, JPG) every attachment gets renamed to Mail Attachment (With no extension at the end). When I try to open the attachment the MAC OS doesn't understand how to open, even when I download the attachment it appears as Mail Attachment -##. The attachments only opens in textedit. Even trying to open a PDF in adobe errors (Corrupted file)
I'm new to using a MAC and need help with this mail attachment issue. I tired looking in the community and cannot locate (so far) anyone else with this issue. I don't if it's a simple as a compatibility issue between 10.8.4 and Exchange 2003 or a check box that needs to be checked some where.
Most helpful reply to this topic
Will Outlook 2011 connection to exchange 2003?
Silly question - how to purchase outlook 2011 for a MAC?
The IMAP part will work — but for optimal performance you'll want Exchange 2007 or 2010.
Entourage 2008 will work well, too.
You can purchase from http:/
Users who log into OWA can't open attachments. The environment is Exchange 2010 on SBS Server 2011. When a user logs into OWA and opens a message that has an attachment, such as a PDF, the attachment name is greyed out and is unclickable. Next to the attachment there is a link: "[Open as Web Page]".
Most helpful reply to this topic
not sure if its IE issue or outlook issue...
when i try to open an email with html attachment in outlook 2016 the IE browser gives an error:
"This Page can't be displayed"
the file does exist in the path:
and if i set chrome as my default browser it works , but i need it to open in IE.
this happens on some computers and on others it opens fine (same mail with same attachment)
workstation is Windows 10 1607, IE 11
Most helpful replies to this topic
I have seen something like this before after installing Chrome on a computer. The fix was to reset IE as the default browser, but you have to do it using "Set default Programs" from Control Panel. Select IE, then "Set this program as default" so that IE will be used to open all file types and protocols it can open.
I know this has been answered already, but FWIW I had the same issue with our corporate SOE, and found that the IE setting 'Enhanced Protected Mode' was at fault. This setting was set on our workstations through Group Policy. I wonder whether the fix for the issue here wasn't resetting defaults as such, but resetting your IE settings, which may have turned this setting off.
One of the things this setting does is restrict the locations that IE can read from the local file system, so despite the fact that when opening the attachment from Outlook that file exists in the user profile path displayed in the address window, IE is restricted from reading from that location and the failure occurs.
just wanted to update - the solution marked previously did not last for long and returned after a few days.
the proper solution that solved for me was this GPO setting:
Domain PCs IE Settings
thanks all for the help!
This page was compiled from hundreds of thousands of questions and answers posted in our Community.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573289.83/warc/CC-MAIN-20190918131429-20190918153429-00343.warc.gz
|
CC-MAIN-2019-39
| 3,513
| 29
|
https://aws.amazon.com/public-datasets/landsat/
|
code
|
Landsat 8 data is available for anyone to use via Amazon S3. All Landsat 8 scenes from 2015 are available along with a selection of cloud-free scenes from 2013 and 2014. All new Landsat 8 scenes are made available each day, often within hours of production.
The Landsat program is a joint effort of the U.S. Geological Survey and NASA. First launched in 1972, the Landsat series of satellites has produced the longest, continuous record of Earth’s land surface as seen from space. NASA is in charge of developing remote-sensing instruments and spacecraft, launching the satellites, and validating their performance. USGS develops the associated ground systems, then takes ownership and operates the satellites, as well as managing data reception, archiving, and distribution. Since late 2008, Landsat data have been made available to all users free of charge. Carefully calibrated Landsat imagery provides the U.S. and the world with a long-term, consistent inventory of vitally important global resources.
AWS has made Landsat 8 data freely available on Amazon S3 so that anyone can use our on-demand computing resources to perform analysis and create new products without needing to worry about the cost of storing Landsat data or the time required to download it.
Learn more about how Landsat data is used on NASA's Landsat Science site.
All Landsat 8 scenes from 2015 are available along with a selection of cloud-free scenes from 2013 and 2014. All new Landsat 8 scenes are made available each day, often within hours of production.
Landsat on AWS makes each band of each Landsat scene available as a stand-alone GeoTIFF and the scene’s metadata is hosted as a text file.
The data are organized using a directory structure based on each scene’s path and row. For instance, the files for Landsat scene LC81390452014295LGN00 are available in the following location: s3://landsat-pds/L8/139/045/LC81390452014295LGN00/
The “L8” directory refers to Landsat 8, “139” refers to the scene’s path, “045” refers to the scene’s row, and the final directory matches the scene’s identifier, which uses the following naming convention: LXSPPPRRRYYYYDDDGSIVV, in which:
- L = Landsat
- X = Sensor
- S = Satellite
- PPP = WRS path
- RRR = WRS row
- YYYY = Year
- DDD = Julian day of year
- GSI = Ground station identifier
- VV = Archive version number
In this case, the scene corresponds to WRS path 139, WRS row 045, and was taken on the 295th day of 2014.
Each scene’s directory includes:
- a .TIF GeoTIFF for each of the scene’s up to 12 bands (note that the GeoTIFFs include 512x512 internal tiling)
- .TIF.ovr overview file for each .TIF (useful in GDAL based applications)
- a _MTL.txt metadata file
- a small rgb preview jpeg, 3 percent of the original size
- a larger rgb preview jpeg, 15 percent of the original size
- an index.html file that can be viewed in a browser to see the RGB preview and links to the GeoTIFFs and metadata files
For instance, the files associated with scene LC81390452014295LGN00 are available at:
A gzipped csv describing all available scenes is available at
If you use the AWS Command Line Interface, you can access the bucket with this simple command:
aws s3 ls landsat-pds
The following ARN is for an Amazon SNS topic that provides notifications whenever a new Landsat scene has been added to Landsat on AWS:
This topic publishes an Amazon S3 event message whenever a scene-level index.html file has been created, which is the last step in the process to make scene data available on Amazon S3. It will only accept subscriptions via Amazon SQS or AWS Lambda.
||U.S. Geological Survey
|Category||GIS, Sensor Data, Satellite Imagery, Natural Resource
|Format||GeoTIFF, txt, jpg
|License||There are no restrictions on the use of data received from the U.S. Geological Survey's Earth Resources Observation and Science (EROS) Center or NASA's Land Processes Distributed Active Archive Center (LP DAAC), unless expressly identified prior to or at the time of receipt. More information on licensing and Landsat data citation is available from USGS.
|Storage Service||Amazon S3|
|Location||s3://landsat-pds in US West (Oregon) Region
|Update Frequency||New Landsat 8 scenes are added regularly as soon as they are available|
MathWorks has created a freely-downloadable tool for accessing, processing, and visualizing Landsat on AWS data in MATLAB. With this tool, you can create a map display of scene locations with markers that show each scene’s metadata.
EOS Data Analytics has created a web application for quick search for Landsat scenes on AWS with support of various filters and viewing any scene with any scale (zoom factor) using any of the band combinations, as well as calculation of spectral indexes on the fly.
Planet Labs uses Landsat on AWS for image rectification, as a reference point for its own Earth observing satellites, and to create accurate and timely mosaics.
If you would like to show us what you can do with Landsat on AWS or would like to receive updates on Landsat on AWS, please fill out the form below.
Educators, researchers and students can also apply for free credits to take advantage of the utility computing platform offered by AWS, along with Public Datasets such as the Landsat on AWS. If you have a research project that could take advantage of Landsat on AWS, you can apply for an AWS Grant.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190753.92/warc/CC-MAIN-20170322212950-00552-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 5,382
| 43
|
https://imagej.net/plugins/jfilament
|
code
|
JFilament is an ImageJ plugin for segmentation and tracking of 2D and 3D filaments in fluorescenece microscopy images. The main algorithm used in Jfilament is “Stretching Open Active Contours”.
For user instructions go to http://athena.physics.lehigh.edu/jfilament.
This work was supported by NIH and by the Biosystems Dynamics Summer Institute at Lehigh University.
The code was developed by Matt Smith, firstname.lastname@example.org
M. B. Smith, H. Li, T. Shen, X. Huang, E. Yusuf, and D. Vavylonis, “Segmentation and Tracking of Cytoskeletal Filaments using Open Active Contours,” Cytoskeleton 67:693-705 (2010) 1
H. Li, T. Shen, M. B. Smith, I. Fujiwara, D. Vavylonis, and X. Huang, “Automated Actin Filament Segmentation, Tracking, and Tip Elongation Measurements based on Open Active Contour Models,” In Proc. of the IEEE International Symposium on Biomedical Imaging: From Nano to Macro, ISBI-09, Boston, 2009 2
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711390.55/warc/CC-MAIN-20221209043931-20221209073931-00608.warc.gz
|
CC-MAIN-2022-49
| 931
| 6
|
https://twittercommunity.com/t/account-blocked-for-suspicious-activity-crud-lists/84918
|
code
|
We’ve started using the Twitter REST API to manage lists based on user accounts in our application.
These accounts can contain twitter handles and based on accounts leaving/joining we’re updating the list for a set of accounts. Twice now however in a couple of days, our account has been blocked for “suspicious activitiy”.
I’ve checked the rules and read under the SPAM section that updating lists (regularly) can be regarded as suspicious activity. Which makes me wonder why they open it up to an API endpoint in the first place… (?)
So my question is, how can we avoid having our account blocked by using the REST API to manage the Twitter list. If we limit the amount of calls done to the lists, the only thing we can do is bulk update…which probably will have the same effect. I don’t really see a fixed number on the rate limit in order to get a “back-off” response, most numbers are estimates based on real life use cases.
Any response with regards to dose the usage or to counter this effect would be very much appreciated!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824675.15/warc/CC-MAIN-20181213101934-20181213123434-00479.warc.gz
|
CC-MAIN-2018-51
| 1,051
| 5
|
https://forum.bubble.io/t/as-i-use-a-page-on-my-app-performance-drops-significantly-caching-issue/180700
|
code
|
When I load one of the pages of my app it performs very well. That said, after executing just a couple interactions, performance drops SIGNIFICANTLY, and very quickly, the app becomes un-usable.
You can check it out on this page: Takeside NBA Trends
- If you go the the ‘Player Trends’ Section and add a few players then delete them then add some, the entire page just turns to molasses. Please let me know if anyone has a solution.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00592.warc.gz
|
CC-MAIN-2022-33
| 436
| 3
|
https://vvvv.org/documentation/tutorial-geometry-morphing
|
code
|
French | Russian | Italian | Mandarin | Japanese
TOC: Of Effects and Shaders
be it image or geometry. morphing is cool. since morphing/blending geometry is actually quite simple to achieve with vvvv if you understand the basics here comes a little tutorial.
there are basically 2 approaches.
- the slower cpu based way (good enough for simple things)
- the cooler gpu based way (cool for many other things)
for a basic understanding best start with the cpu based approach!
don't be fooled by the boring screenshots! load your own meshes with XFile (EX9.Geometry Load) to have more fun during the tutorials!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100677.45/warc/CC-MAIN-20231207153748-20231207183748-00272.warc.gz
|
CC-MAIN-2023-50
| 607
| 8
|
https://fmenolascina.wordpress.com/2008/09/21/usbtex-portable-latex-distribution/
|
code
|
USBTex: portable LaTEX distribution
Today I would like to point you out a quite interesting tool for latex dox editing. It is a portable latex distribution: this means that you can install it on your usb memory (well it’s not a tight distribution…it requires no less than 200 MB) and you can start editing your dox from there without having to install the whole system on your hd. Nice, isn’t it?
This is the link, enjoy!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124371.40/warc/CC-MAIN-20170423031204-00491-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 427
| 3
|
https://help.redcanary.com/hc/en-us/articles/17798648636951-Playbook-action-reporting-as-INCOMPLETE
|
code
|
We recently had a playbook action not execute. When we investigated the playbook's configuration, we noticed that it was reporting as "INCOMPLETE". How can we resolve this issue?
Check the email addresses that notifications are being sent to. Remove any email address of users that are not Red Canary users.
The "INCOMPLETE" label may be added to playbooks if one or more validation checks fail. In most cases, it may be due an invalid user being specified in the Send notification... field. The two playbook actions that have this particular validation check are Collect Forensics and Delete and Capture File.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476532.70/warc/CC-MAIN-20240304200958-20240304230958-00153.warc.gz
|
CC-MAIN-2024-10
| 610
| 3
|
https://forum.m5stack.com/topic/2157/atom-light-atom-matrix-and-hats-with-atom-mate
|
code
|
Atom Light/Atom Matrix and Hats with Atom-Mate!!
Skink last edited by
Hello dear M5Stack friends,
what I miss in the latest UIFlow software version V1.6.1 beta is for the Atom Light and the Atom Matrix that I can only select units but no hats there where there is now the possibility to connect hats to the Atom Light/Matrix through Accessory Atom Mate (SKU:A086) !
Which Atom hats were you planning to use, perhaps you can program them with micropython for the time being.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738351.71/warc/CC-MAIN-20200808194923-20200808224923-00019.warc.gz
|
CC-MAIN-2020-34
| 473
| 5
|
https://www.avforums.com/threads/yamaha-rx-v640rds-code-needed-for-nemos-32.207284/
|
code
|
I have bought a new TV: a Loewe Nemos 32. I have tried all the Loewe codes, but I cannot manage to get the "TV input" button on the Yamaha remote control to work. With my other TV, a Philips, everything worked fine all with the Yamaha remote control. Now with certain codes the volume can be changed, switched on and off, change channels, etc...but not that "TV input" button. Can someone help me with this, does someone know which factory code should make all buttons work with the Loewe? The receiver has no learning possibility.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860089.13/warc/CC-MAIN-20180618070542-20180618090542-00069.warc.gz
|
CC-MAIN-2018-26
| 531
| 1
|
https://docs.microsoft.com/en-us/answers/questions/38838/issue-with-logging-in-microsoft-from-2-computers.html
|
code
|
I have 2 laptops. Every time l log into 1 with the One drive and try to log into the other days later, it keeps wanting me to change my password saying that there is a breech when its just me and it is getting annoying. It will not let me bypass the change password on my login. I should be able to log onto my computers and my Iphone with the same login. How to stop that?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363301.3/warc/CC-MAIN-20211206133552-20211206163552-00488.warc.gz
|
CC-MAIN-2021-49
| 373
| 1
|
https://www.dumez.nl/blog/ict-tips/look-before-you-click/
|
code
|
Think before you link.
Personal and professional computing has always been threatened by malicious parties wanting to do nasty things to you. Mostly to their own profit but not seldom just for the sake of bullying. There are many ways they try to enter your systems and a lot of software has been developed to guard us against them.
In addition to this security software I believe that common sense is a good means of defense. Today I will focus on how to regard your incoming E-mail.
The practice of sending you unwanted mail is called scam and has many subcategories like spam, spoofing and phishing.
The first measure you should take is configuring your E-mail client not to open any mail before you want it. The screen of your client is usually made up from several areas. Many times one area shows the content of the currently selected mail (if you didn’t make a selection yet, this will be the top item in the listing of you inbox). Some clients come with such a screen layout as a default. And even reset it after an update.
This gives any script present in a malicious mail the opportunity to run without your consent. So you should get rid of this so called preview pane.
If you use Thunderbird (which I recommend for PC’s – it’s free) you just have to remove the check mark in front of the “Message Pane” option in the “View”/”Layout” menu, or just hit the F8 key.
You can download Thunderbird for Windows from here.
For other brands or web mail you’ll have find out the settings on your own. To my dismay, the web mail client of my ISP (KPN) doesn’t offer a layout option without a preview pane (you can only choose for a preview below or next to the list).
Usually you can spot spam mail easily. In fact it ‘s easier for you than it is for most spam filters. If your provider has a filter installed or your ant-virus packages checks for it, you still my encounter spam in your Inbox. Usually can can spot it by looking at the subject. Also pay attention to the “From” column for senders you don’t trust.
If you’re sure an entry in the list is spam (or a worse form of scam) just select and delete it. Use the Shift-Delete key combination, rather than just Delete, to bypass the recycle folder.
By spoofing a malicious sender pretends the mail is sent from a more trustworthy source. Spoofing e-mail is easy because the cheating is done in the header of the mail, before someone sends it out to an SMTP server. When the content of the mail lures you to a webpage where you’re asked to enter some sensitive information, like passwords or pin-codes this is called phishing. Below is an e-mail I received a while ago, opened in Thunderbird, that spoofs to be a message from Twitter.
As you can see, the spam filter of my provider marked this mail as spam (prefixed the subject). Also, upon receipt, Thunderbird marked it as scam (hence the warning).
Before clicking on a link, you should just hold the mouse pointer over it and notice the real address the link refers to, in the status line at the bottom of the window.
(If in any doubt, Google for the domain).
You should also check the address of links that offer you to unsubscribe from newsletters and the like.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138752.92/warc/CC-MAIN-20200712144738-20200712174738-00025.warc.gz
|
CC-MAIN-2020-29
| 3,209
| 16
|
https://help.nextcloud.com/t/what-is-the-pruposes-of-all-these-full-text-search-app-modules/44120/3
|
code
|
Sick or drunk ? either way, get better.
fulltextsearch does not get access to your files.
files_fulltextsearch is defined as a content provider and feed the
fulltextsearch with the content of your files that will be sent to
fulltextsearch_elasticsearch for indexing.
Which means that yes:
files_fulltextsearch will get any content from unencrypted files, so any app that generate file(s) available to the Nextcloud Files will see their content indexed (based on the mimetype/format).
Which also means that yes: apps that store content in database won’t have their content indexed by
Which finally means that if your app generate contents that are not stored in files, you will need to provide a content provider within your app if you want the content to be indexed by
If by metadata, we’re talking name of file, sharing rights, …, when available they are indexed and used during the search.
If your talking about the metadata app, this should be doable by making a small extension of
files_fulltextsearch. I know someone started working on this but fulltextsearch was still alpha by the time and the tools were missing. But, with today’s API, you should be able to do something within few hours.
files_fulltextsearch provide some hooks when indexing files/search for content that allow any 3rd party app to ‘complete’ the indexing process with its own data (ie. the
files_fulltextsearch_tesseract app that will OCR your files and help fill the content to be indexed during the process)
If an app can get the content, it can index it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316785.68/warc/CC-MAIN-20190822064205-20190822090205-00450.warc.gz
|
CC-MAIN-2019-35
| 1,546
| 15
|
https://pulp.plan.io/issues/3409
|
code
|
Write unit tests for task code
CLOSED - WONTFIX
We have some task functionality that I don't think QE can test with pulp-smash:
We need similar tests for Publications.
Also, it would be good to have a test to test out Task cancellation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710972.37/warc/CC-MAIN-20221204104311-20221204134311-00246.warc.gz
|
CC-MAIN-2022-49
| 236
| 5
|
https://geekhours.com/1117/lesson/active-directory-history-what-is-azure-active-directory/
|
code
|
Azure AD is Microsoft’s cloud-based directory and identity management service. It combines core directory services, advanced identity protection, and application access management. Azure AD delivers single sign-on (SSO) access to on-premises and cloud applications, helping users to stay productive. By using Azure AD, developers can quickly integrate identity and access management(IAM) into their applications. The […]
Let’s start with some history. Active Directory was first released by Microsoft in the year 2000 as part of it’s Windows 2000 Server edition. Active Directory, usually referred to by it’s short form AD, is essentially a database that helps organize company’s users, computers and more. It also provides authentication and authorization to applications, file services, printers, and other on-premises resources. To provide those services, AD uses protocols such as Kerberos and NTLM for authentication and LDAP to query and modify items in the AD databases.
In order to understand Active Directory completely, one would need to understand the basics of a Domain Controller as well. A Domain Controller is a server on the network that centrally manages access for users, PCs and servers on the network. Active Directory Domain Services runs on the Domain Controller and has the following key functions:
- Secure Object store, including Users, Computers and Groups
- Object organization – Organisational Units (OU), Domains and Forests
- Common Authentication and Authorization provider
- LDAP, NTLM, Kerberos (secure authentication between domain joined devices)
- Group Policy – for fine grained control and management of PCs and Servers on the domain
To summarize, if John Smith is an employee of Company A and the company uses Active Directory services for authentication and authorization of it’s resources, Active Directory knows that John Smith is in the Sales Group and is not allowed to access the HR folder on the file server. It also allows control and management of PCs and Servers on the network via Group Policy (so for example you could set all users’ home page on their browser to be your intranet, or you can prevent users from installing other software etc).
Azure Active Directory
Well, when Microsoft introduced Azure, they just did not put the same windows active directory in the cloud. Though Azure active directory performs some of the same functions as Windows AD, it is quite different.
Azure Active Directory is a secure online authentication store, which can contain users and groups. Users have a username and a password which they can use to sign in to an application that uses Azure AD for authentication.
All of the Microsoft Cloud services such as Office 365, Dynamics 365, and Azure use Azure AD for authentication. Azure AD also manages access to applications that work with modern authentication mechanisms like SAML and OAuth. Azure AD allows you to create an identity for your applications (or 3rd party ones) that you can grant access for users to. Besides seamlessly connecting to any Microsoft Online Services, Azure AD can connect to thousands of SaaS applications like Salesforce, Slack, ZenDesk etc., using a single sign-on.
Azure Active Directory management screen on Azure portal :
Now that we understand what an Azure Active Directory is, in the next lesson, let’s explore in detail, why we would need one.
Why is Azure Active Directory used?
You might be interested in the following courses:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506832.21/warc/CC-MAIN-20210116165621-20210116195621-00096.warc.gz
|
CC-MAIN-2021-04
| 3,479
| 17
|
https://www.speakingtree.in/blog/where-is-the-present
|
code
|
Where is the PRESENT ?
With a breakneck speed Present moment is being converted to PAST before we notice it. We perceive the Outside world through our 5 sensory organs. But by the time we perceive the present world it is already past.
The light travels at an unimaginable fast speed but still it is finite. Therefore by the time it falls on some object and gets reflected towards our eyes the present is already past, past by only millionth of a second, but still PAST.
Sound travels at a still slower speed than the speed of light.
So what we perceive NOW in the outside world is already PAST. Then where is the PRESENT.
Now coming to the inside world. Our thoughts are only based on our past experiences. On basis of this memory either we plan for the future or reminiscence the days lived by. So the Mind also is never in the PRESENT.
All great masters have said to be in the Present, to be with the moment.
Where is this PRESENT that they all have talked about ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816942.33/warc/CC-MAIN-20240415045222-20240415075222-00070.warc.gz
|
CC-MAIN-2024-18
| 966
| 8
|
http://spinrewriter9.com/spin5/7-things-that-you-never-expect-on-article-rewrite-tool-read-reviews.html
|
code
|
In simple terms, if we define the term spinning, then it is all known as about rewriting of the paragraph or even the whole of the paper straight in your own words. Unlike into the concept of the summarizing, you will be keeping every single thing as rough and in the same length as the original one. You can easily perform this task as by means of going through the original and hence changing every other word for the purpose of the synonym by means of using the thesaurus. You should be finding yourself as all the time repeating on with the portions of the original document.
X-Spinner has been tested on Windows XP, Vista, Windows 7, Windows 2003/2008 and Windows 8, Windows 10 and MacBook with Windows VM; it's advisable to have a screen resolution larger than 1024x768px for optimal interface display due to the large amount of functionality. For using X-Spinner on Mac Computer, you need instal a windows virtual machine on your Mac computer.
I've ranked websites in the past with spun content, and now they are still on #1 position of google. First year (2014) google found me because my spun was really bad, many paragraphs were just copied and my position drop from #2 to around #20 after a panda update. Later I cleaned all my text with better spun (I didn't buy any article!), my ranking went up again, and with more backlinks I reached #1 and it is still there
Finest spinner in the market today and more for me because saves a lot of my time... Earlier i have used the best spinner but this spinner is 10 times better faster, easy to use, and articles make more sense, unique, also helps in preparing new articles and spins same article into hundred of more articles for back-linking, etc. 2 thumbs-up... simple and easy to use...
The word is out ... there are potentially unlimited opportunities for making money online! But, at the same time, there is a lot of competition for these potentially lucrative opportunities. Not to worry, though. With the help of Article Rewriter Tool, the game has now changed -- in your favor. Before you might have been limited by your time or energy to market your website to major search engines, but now the results of your hard work can be multiplied by this free content rewriting service.
I wanted to add some phrases in the text to see if the spinner will understand them and possibly replace them with similar phrases. As you see, this is just a simple short story that blew out of my head just a minute ago. As a final note of the intro section, I want you to understand that “thesaurus” simply means a database of words and their synonyms. Let’s see how this goes.
This article rewriter has its own database of over half a million synonyms which let it work more fluently and accurately. With just a single click all the words or phrases that our smart article spinner tool finds worth replacing are replaced with an equally suitable synonym or phrase. For user convenience, all the replaced words are highlighted with different colors. To revert user can just click on the replaced word or choose a different synonym. If none of the given synonyms fulfill the expectations, then the user can add his own word. This article rewriter with its vast collection of synonyms, allows users to carry out their writing activities effortlessly. This free article spinner tool is indeed a blessing to all those who wish their rewritten content to be up to the mark and free of plagiarism. By using this handy article rewriter, you can create an entirely different version of an already existing article. It is particularly useful for the people who often end up stuck with the plagiarism issue in their write up and want to put away the plagiarism problem while they get their article rephrased.
Readable And Unique Content – the recommended settings for this one are the same as for the one above with the only difference being the change of the 1st input to “Readable”. This will create more unique versions of your content while still keeping a high level of readability. Generally, this is the best setting as it gets a good balance between human readability and uniqueness of the content generated.
Article Spinner or Article Rewriter, as the name itself gives you an idea, is a rewriting tool or a paraphrasing tool that allows people to rewrite their content while saving significant amount of time. Many such article rewriter and article spinner tools are available over internet. Some article spinner tools are completely free, requiring no installation or fee while some article rewriter tools can ask you to sign up or pay.
I’m new on this of online business thing, and English is not my native language. In spite of that, I have written my first pages and posts by myself. I totally agree with what you say here. There is nothing more satisfactory than to produce your own content, even if it is not perfect or excellent in the beginning, but with time and practice, it will surely improve.
Our browser made a total of 48 requests to load all elements on the main page. We found that 73% of them (35 requests) were addressed to the original Spinnerchief.com, 23% (11 requests) were made to Whitehatbox.com and 2% (1 request) were made to Js.users.51.la. The less responsive or slowest element that took the longest time to load (2 sec) belongs to the original domain Spinnerchief.com.
It is a simple process where the user will simply copy and paste their article into the text box. The spinner will do the rest as it produces an entirely new article on the spot. Users are also able to include words that should be ignored by the spinner. This is in case you have specific keywords that should not be taken out. This is a fantastic tool for those who are on the go and need quality content right away. Instead of spending hours on producing content and/or spending money outsourcing to writers, it is easier to employ this spinner instead.
The most common way for people to find products or services online is to use search engines, especially Google, Bing or Yahoo. These search engines have certain criteria for giving websites more (or less) opportunity to be returned in search results. The way to obtain dependable, long term search engine optimization is to post as much quality content to your website as possible. The more unique readable text your site contains, the more logical area search engines will have to index and thus refer people to your site. More quality content means more opportunities for your website or blog to receive traffic from major search engines.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583831770.96/warc/CC-MAIN-20190122074945-20190122100945-00301.warc.gz
|
CC-MAIN-2019-04
| 6,556
| 13
|
http://paladindivineplea.blogspot.com/2011/08/my-raiding-ui.html
|
code
|
This isn't the post I was planning, but it's what I've got available today. This is a fairly basic UI layout I think, and it does have some double information, specifically ICE HUD and the standard portrait info. I use ForteXorcist for multi-mob DOT tracking, and Power Auras to track DOTs on my current target. I added scrolling damage text so I could get an idea of how hard I'm hitting, but I'm pretty sure that's going to be coming off soon - it's just too confusing.
There's really no need as far as I can tell to keep scrolling damage on my screen. Maybe if it was BWL and I needed to see if a mob was resistant/immune to a certain type of damage, but that's not the case with anything really. Plus, I think I'd figure it out after a few seconds. IceHUD is probably going to be following it pretty quickly as well, though I have gotten pretty used to having that up there. I think if I add an aura for < 35% mana, boss < 25% HP, and no Soul Link - I can completely remove that.
I'd also like to get rid of Recount, or just set it to only show after combat - it's just one more thing taking up space, and it's not like I'm going to change my rotation mid through the fight. Omen is already disabled, thanks to the change in tank threat. Since I open CoE>BoD>Corr - it takes a few seconds before I'm even dealing damage - more than enough time for the tank to secure agro.
So there you go - my delicious, overcrowded, needs some work UI.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589172.41/warc/CC-MAIN-20180716021858-20180716041858-00040.warc.gz
|
CC-MAIN-2018-30
| 1,441
| 4
|
https://printerlogic.com/blog/changes-to-printing-in-windows-server-2019/
|
code
|
Originally published on Feb 22, 2019
Server 2019 is Here!
For those of us who have been operating in the Windows server space for a while now, it may feel odd that a new server version is already being released! Since 2003, IT organizations have had almost 4 years between the stress of server upgrades. But starting with Windows Server 2016, Microsoft has moved from releasing a new server version every few years to a semi-annual release cycle.
Microsoft is targeting Windows Server releases during Spring and Fall about every 18 months. This new release cycle will be consistent with the rest of the major release cycles coming out of Redmond, including Windows 10 and Microsoft Office 365. This new release strategy will bring cutting-edge features to customers much faster, but it may also cause strain on IT departments to keep up with the update cycle and changes in each release.
I wanted to help anyone who is curious about how Server 2019 may impact their print environment, so I put on my scuba suit and did some TechNet diving for you. Here are the most important changes to Server 2019 and printing.
On, Then Off, Then On Again
Most organizations that are taking advantage of Server Core desire a server OS that is lean and stripped of any unnecessary functionality. In Server 2016 Microsoft started enabling print server components by default. However, in 2019 Microsoft has done another 180 and again disabled print server components by default in Server Core.
If you would like to enable the print feature in Server Core 2019, you can do so by running the cmdlet “Install-WindowsFeature Print-Server.”
Removal of Common Type 4 Drivers
Starting in Windows 10’s version 1809 release in October, we saw that Microsoft removed common type 4 drivers that were previously shipped with the OS. Microsoft has removed the built-in type 4 driver repository in order to “reduce the Windows footprint and provide more storage.” This was somewhat burdensome for users who would have to run Windows Update service to load the print drivers they needed for their specific printers.
With the release of Server 2019, we see that Microsoft has taken the same approach by removing the common type 4 drivers that were shipped with Server 2016. This has left many IT departments in a bind when standing up a new Microsoft 2019 Server that will be running as a print server. IT departments now must locate and load the type 4 drivers they need to support their printer fleet. This problem is amplified for an organization that has many different types of printers in their fleet.
Still No Spooler Clustering
One of the implications of Server 2019 and print servers isn’t so much a feature that was added or a feature that was removed, but the rather a feature that is still missing. Starting with Server 2012 Microsoft removed the ability to cluster print server spoolers. This has forced organizations to accept their print servers as a single point of failure. Many organizations were hopeful that print server clustering was going to be reintroduced with Server 2016, but were sadly disappointed. The continued absence of this feature in Server 2019 makes me wonder if Microsoft is paying any attention to their own print server spooling service.
With the faster release cycle of Microsoft server versions, we all may ultimately benefit from Microsoft’s ability to react to market demands quickly and release features that benefit enterprise IT environments. Here at PrinterLogic we will keep gladly sifting through and finding the most relevant changes to printing and bubble them to the top for anyone interested. Subscribe to this blog for the latest updates.
If you want to keep your server core as “lean” as possible, why not completely remove the print server role? Or if you are stressing about building out a type 4 driver repository, or want to completely eliminate print servers and the single point of failure, let PrinterLogic show you how to modernize your print environment and eliminate the need for print servers. Download a free 30-day trial today.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474617.27/warc/CC-MAIN-20240225135334-20240225165334-00316.warc.gz
|
CC-MAIN-2024-10
| 4,080
| 15
|
https://www.appletorchard.com/python-how-to-program-pt-1/
|
code
|
Best Python Book :
Part 1 of my Python How to Program series. If you have never written a program before, this is for you. I walk you step by step on how to program in Python. By the end of this tutorial, you’ll be able to create a 100% automated website, that will make you money.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00552.warc.gz
|
CC-MAIN-2023-14
| 283
| 2
|