url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.progress.com/documentation/sitefinity-cms/133/for-developers-customize-search-results-by-overriding-the-searchresults-class-webforms
code
Customize search results by overriding the SearchResults class You can customize Sitefinity's search results by using a customized SearchResults widget that inherits the SearchResults class. Then you can register the custom widget in the toolbox and use it on pages and page templates. For more information, see Register a new widget in Sitefinity CMS toolbox. Following is a code sample that demonstrates a customized overridden SearchResults class. It filters the list of search results to display only results published in the last 10 days, by overriding the Search method:
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475422.71/warc/CC-MAIN-20240301161412-20240301191412-00157.warc.gz
CC-MAIN-2024-10
576
4
http://ubuntuforums.org/archive/index.php/t-1171184.html
code
View Full Version : [ubuntu] Can NewsLeecher run in Ubutu 8.04? May 27th, 2009, 10:41 AM Can NewsLeecher be run in Ubuntu successfully for binary downloads? It's Super Search feature promises to be a very useful feature, May 27th, 2009, 12:58 PM Super Search requires IE. I could not get it to run in wine. However, I now use PAN and use web based search engines. May 28th, 2009, 04:53 PM Second the use of PAN. Used Forte Agent in MS Windows, thus Pan is a similar interface. You can get it through Synaptic. May 29th, 2009, 12:26 AM Pan also supports nzb files, which is a great way to work with Usenet. May 29th, 2009, 07:47 AM Thanks for the Pan tips guys. Using NewsLeecher in Linux, from what I have read has some challenges. I was wondering if anyone has found an easy way to use it in Ubuntu other than Wine or Vmware etc. I guess not yet. Powered by vBulletin® Version 4.2.2 Copyright © 2014 vBulletin Solutions, Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678700701/warc/CC-MAIN-20140313024500-00002-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
949
13
http://merri.net/
code
Front End Dev – A True CSS Expert – Made in Finland I'm Vesa Piittinen. Merri is a nickname I often use on the web. I'm familiar with things like AngularJS, PHP, MySQL, Node.js, functional programming, OOP and I know when classic imperative style just does the job better and clearer. If you like reading lengthier texts then the next three pages will work for you. Instead if you just prefer spying on me in general or want to contact me, jump to the last page. A Finnish Front End Developer I'm a web developer, male, born in 1983. But I'm not only that. Yet I'm very good dealing with browsers and SEO. And still those aren't the only things I'm good at. I started off with the web back in 1998 in a school project writing some HTML pages. Before that I hadn't touched the web technologies and I didn't really know what I was getting into. In late 2000 I started a website that became somewhat popular in that it is still a living community. Over the years I experimented a lot with the site, learnt a lot of technologies and made many mistakes. I'm not a UI designer Really. I'm not one. I'm too technical to be one and I can make good design only occasionally and mostly by either mistake or with a lot of time and care. I can see when things don't look good, but I most likely can't tell how to fix it. User interface designing is not my thing. What I do is to compliment the UI. I give the user experience. I can make things feel good with some basic transitions, good timings and carefully crafted interface that doesn't break even when used in unusual ways. I don't think only about the mouse user or only the touch user. Keyboard is also a powerful way to access the web and it matters to some. I also care about the semantics and inner structure of what I make. I always ask the question "why?" when I write a piece of syntax or code. I give things a bit of my heart. I'm not the fastest, but I make things so that they don't break as often, thus saving time later on. I'm not academic I'm 100% self taught. I've learnt programming since around 6 years old, starting with a Commodore 64. I didn't make any miracles with the machine, but I caught the mindset. When I started there was no Internet. Not widely available that is. And once Internet came and I figured out how to learn more about programming around the years of 2000 that is exactly what I did. The big thing that happened around 2004 was Firefox. Before that browser behavior with CSS was hard to understand as there were standards and the main browser of the time was Internet Explorer 6, which wasn't still good enough with the standards. It had too many quirks to mess up with experimental learning. Firefox changed everything for me: it followed the standards well enough that I could experiment. I could learn CSS on my own. I experiment a lot I learned the quirks of IE6, IE7, IE8 and so on. I know how I can workaround issues. I know how I can avoid certain layout issues. I know how I can work my code so that it is solid enough that I have a good base to work with. The Short Professional Career Despite my skill level I didn't land a proper developer job in 2000's. I had some issues with my head and simply finding a job was a big thing for me. I finally got a job that eventually turned full time. It did a lot of good for me in terms of fixing my self esteem as well as becoming a better people person. But I was still afraid of attempting to find a developer job as the image of the business still seemed a bit dull: projects and deadlines. I know that I'm not a good person with set deadlines and a lack of creative freedom. Fast forward to 2013. Moving to Helsinki became a necessary evil. It was another thing that I had avoided for a long time. I originate from northern Finland, the Lapland, where people have quite different values. The busy life of the Finnish capital isn't really a tempting thing for me. But it is quite apparent that in Finland there really isn't as many opportunities for programming jobs outside the Helsinki region. Getting a job wasn't the only reason in moving to Helsinki, but I knew I wouldn't want to move unless it is a "dream job" for me: a programmer job. Luckily for me Verkkokauppa.com was looking for more people to their newly adapted agile development teams. I didn't know it at the moment of agreeing to the job, but agile has been one of the key reasons I enjoy my job as much as I do. It has been quite a jackpot for me. And it is a success story for Verkkokauppa.com that they hired a person with virtually no existing dev background in his CV. I've done my share of changes within my first two years in the company: - I introduced HTML5 within two months of my arrival to the production site. - I've improved semantics of the site. - I wrote the current implementation of "desktop site" AJAX shopping cart. - I rewrote the header of the site as well. If you think it feels right then I am to blame. - I've improved client side loading times a lot. - Google ranking has improved a lot. - I've pushed performance as an important factor in general. - I've been the person who has taken main responsibility of the technical side of the new responsive checkout process UI. Learning to be a dev Before being hired to Verkkokauppa.com I wasn't really familiar with a lot of dev stuff. I didn't know how to speak like one, I didn't know what kind of people devs are and I didn't know how to compare what I know with what others know. All this has changed. I've purposefully chosen the path of being specialized as a front end developer. Thus I've avoided touching the back end code even if I do have the capability to become good with that side as well. But I think specializing is a good thing especially now as the company has been hiring even more developers. There have been ups and downs and I still struggle with having constantly solid productivity. But I'm finding my way and I'm becoming good with things that I hardly knew anything about before, such as application architecture and code that is understandable to not only me but others as well. (I have the issue of being very good at reading badly written code so it took me a while to understand that writing readable and understandable code is a good goal: I shouldn't repeat sillyness for the sake of mimicing and uniformness even if I'm very good at that too.) Things I do that I enjoy doing In case you didn't notice I can write somewhat okay. Maybe not the most touching text you've ever read, but I get my point across. At least I hope I do… Translating to Finnish I've translated a couple of games and programs to the Finnish language. Games include Civilization V, Transport Tycoon Deluxe and The Settlers II. Programs include phpBB2, MyBB and XenForo, which are all PHP based forum software. I've done some others as well but nothing particularly notable comes to my mind so these are good enough. For a long time I've built my computer setups myself. Chosen the parts, put things together, installed Windows, bothered with it's quirks and issues. In the meanwhile I've also fixed computers and I also have a couple of retro DOS/Win9X setups still laying around that I'm not planning of getting rid of. I did choose to sell my C64 though. In late 2000 I started a Tolkien fansite, Kontu. It grew. It got a forum. Now it is a living community, it is deeply linked with the Finnish Tolkien Society and the quality of Kontuwiki has been acknowledged in the Finnish translation of The Lord of the Rings books. I take care of the technical aspects of the site and try to keep things active online. I like fantasy and scifi movies. Marvel's superhero movies are quite nice. Occasionally you may also find me watching anime. I also enjoy documentaries, especially ones on science and/or history. - Finnish homepage - Some of my hobby sites - Kontu: Finnish community and wiki on Tolkien's Middle-earth - Settlers II.net - Maaya's Forum Cool stuff I've done The Settlers II.net Map Generator creates playable maps for the game. The maps have a very great variety. I think the landscape it creates is quite superior to about any other map generator tool I've seen. The end result works very well with the game. This tool is probably the best offering that I can give of my skills outside the "web tech stuff" category. The logic that creates the landscape is not based on any existing algorithm – it is 100% hand crafted by me. CodePen is the playground where I experiment the most these days. But sometimes it is hard to test older browsers there so I put my stuff on this site instead. Would I like to work elsewhere? Nope. I'm locked to Helsinki for now. But here is my LinkedIn anyway.
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375090887.26/warc/CC-MAIN-20150627031810-00110-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
8,688
52
https://community.weweb.io/t/how-can-i-access-we-web-variables-inside-custom-code-the-one-that-loads-on-initial-page-load/5762
code
I want to access we web variables inside my custom code of a particular page on Load, how to achieve it its inside the body of the custom code of a particular pages body. Do check this and let me know. scenario want to change id of video element as per the condition in my variable object Hi @devika You can do that using this method available Also to find the any variable id you can simply fetch all the variable id’s or (details of collections,workflows etc) with this method You can try above methods in the browser console as well or in the More > Development > Show dev information Variable id are also available if you toogle the dev information
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474617.27/warc/CC-MAIN-20240225135334-20240225165334-00348.warc.gz
CC-MAIN-2024-10
654
6
https://dba.stackexchange.com/questions/168774/database-design-for-credit-purchase
code
I have the following table that holds the purchase order po_id supplier_id transaction_type -- either cash or credit and other table that holds the items po_id product_id quantity unit_price Now, how should I handle payment transactions, as payments can either be cash, or credit. If credit, the payment can be made in multiple transactions. and if Cash, there should not be any outstanding payments for this particular purchase order. How can I design a schema that identifies outstanding amounts per purchase order and reflect that in a double entry accounting schema.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643784.62/warc/CC-MAIN-20230528114832-20230528144832-00084.warc.gz
CC-MAIN-2023-23
570
5
https://portableapps.com/node/9468
code
can you wrap CPU-Z (http://www.cpuid.com/cpuz.php) as PortableApp? As you can read on its website: CPU-Z does not need to be installed. Just unzip the files in a directory and run the .exe. In order to remove the program, just delete the files, and that's it. The program does not copy any file in any Windows directory, neither writes in the registry. CPU-Z is a freeware but closed source with unknown license. It's already installed in my USB drive, but I'd like to have it integrated in the PortableApps menu You can use NSIS to make your own launcher. Here is an example of a simple launcher that runs a .bat file: then you can just edit the .bat file to run your program. Have an Awesome Day! I cannot reply to that thread with your simple .bat launcher. Are those details still current, or does the platform do things differently now? Also, how can I make the launcher execute different .exe files, depending on whether the OS is x86 or x64? There are two versions of CPU-Z, so this is a good example for this question. You can use the PAL (PortableApps.com Launcher) for that, if you like. It's some work to get used to, but not too difficult to learn. On the other hand, you could simply use Ryan's advice below (don't know how portable that would be, though). Which exe to choose... I don't know with CPU-Z. Mostly the x86 should work on both systems, but as it is a system tool, maybe you need the x64 on a 64bit OS. Yes, I am currently doing what Ryan says below, for several programs that are already portable, like mIRC, and even programs that have .paf versions, like Notepad2 and Notepad++. I just thought it would be good to use a launcher for already portable programs like CPU-Z when there are both x86 and x64 versions, so that the correct one os chosen, without having to have two entries in the menu. I already around 70 icons in there, which is hell to navigate. Just put it within /PortableApps/, so it is located at something like /PortableApps/CPU-Z/CPU-Z.exe and the menu will pick it up. You can read more on the menu support page. "If you're not part of the solution, you're part of the precipitate."
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00011.warc.gz
CC-MAIN-2023-14
2,129
19
http://www.gamedev.net/index.php?app=forums&module=extras&section=postHistory&pid=5002126
code
Well, maybe this indeed is logical, but it's not how I feel I like 4X games, I don't like RTSes (with many exceptions). I would not buy a 4X strategy that was advertised as having any similarities to RTS. I disagree. RTS's can be 4X, and can be good 4X games. Think of it logically, in a 4X you explore, expand, exploite and exterminate. There is no way you can convince me that the Age of Empires style of RTS does not fit that classification. Again, you might be completely correct, I don't see any flaw in your reasoning, but the 4X lover in me can't agree with what you saidWell, the primary question is about quantity of micromanagement. In Civilization 2 you can have like 10-20 cities (and you are actively discouraged by the game to have more cities), in Stars! you can have like hundreds planets and have no penatlies if you get more. This is a completely different story As they say, the difference between a medicine and a poison is in the quantity Also, micromangement can work in a TBS. Take a look at Civilization 2 and Civilization 4, the most successful TBS games, and based completely on micromanagement. Besides, take a look at Civilization 4. They completely killed micromanagement whenever they could compared to previous series. Yes, Firaxis defintiely sees micromanagement (even though in Civilization there is not too much of it) as the root of all evil.I don't agree with that one. Master of Orion 3 tried to do it, it was an epic fail. After MOO3 I became convinced that partial (optional) automation in principle is a veeery bad thing. Either make it always manual or always fully AI controled. Maybe it's not always true and it could work but... so far I have seen it do much more harm than good. If it's too much for a player to handle then make it simplier. Don't make tools that will play the game for me. I'm the player and I want to play the game myself. I definitely don't want to decide if I want to do something automatic or manual. The game is supposed to make me do it all manually. If I'm resorting to automation (in a turn based game) it means I'm BORED and that I find the game TROUBLESOME, and these are cardinal sins for a game... Really, as a player I don't find "yeah, the city management is boring, but we make it so you can turn an AI governor to do this chore for you" a valid excuse. If you made these cities then make managing them FUN, so I would never ever want to give away the management of it to the computer. And if there are too many cities to handle then limit the number (whatever way you want, I don't know or care how, I'm a player ) until I can handle these without resorting to delegating tasks to AI. What helps to control MM is optional automation. I too am a huge 4x fan. However I don't mind playing a 4x RTS (if it's stelar). I prefer TBS though. Yes quantity of MM can cause headaches. Again back to Civ2 in the early game it was nothing to manually manage 20 workers. But in the later game when you could have a hundred workers it was an absolute nightmare. Choosing one of the automation commands is what I'm talking about with "optional automation". In the end game you want to focus on anything but workers, so you set and forget about them. (Note here: the quality of the automation should not detract from the actual point of automation, specially in Civ's worker case haha). As a GOOD example of optional automation, look at Colonization's (the original) custom house and wagon links. The player manually transports good via wagon and ship from the New World to Europe. You can set a trade link for a wagon which automatically moves goods from one place to another (ie: from inland to a harbor). Then using a custom house the harbor automatically sells those goods to Europe. This is GOOD optional automation which eliminates mundane boring MM. Agreed MOO3 was a tank. But one example does not invalidate the hundreds of successful automation examples. ;)
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119651018.25/warc/CC-MAIN-20141024030051-00180-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
3,930
9
https://www.activehistory.co.uk/updates/key-stage/igcse-gcse-history/challenge-spanish-civil-war/
code
“Who Am I?” Challenge – Spanish Civil War Each team will be presented with a clue about a key historical figure. They get 50 points if they guess it correctly. If they wish to ‘pass’, they get further (easier) clues but the points available steadily decline. An incorrect guess at any point means they get zero points for that round. You can play as many rounds as you wish. It’s a great way to revise!
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066568.16/warc/CC-MAIN-20210412023359-20210412053359-00422.warc.gz
CC-MAIN-2021-17
414
2
http://www.realjock.com/gayforums/3328372
code
My first reaction: I bet this is correlated with age. Come on, guys, read the paper. The main point of the paper is that smokers earn less than nonsmokers, and the authors are looking at factors that contribute to this wage gap. The headline about quitters earning more than smokers and never-smokers is a nice attention-grabber, but it's a tangential finding; it's not news either, since the authors mention that this has been observed before. As for what's behind the claim that former smokers earn more than anybody else, look at the raw data. Even if you are skeptical about the use of linear regression models to 'explain' social behavior (and I count myself in that camp), you can still check out Table 2 on page 43, which reports simple averages by group. Former smokers are older than any other group, so it makes sense for them to earn more. Why would they be older? The group of former smokers includes those who quit because of health reasons, typically after years of accumulation of smoking's side effects. The authors' assertion that "former smokers have attributes that are more highly rewarded in the labor market than either current smokers or never smokers" is pretty bogus. Right, the attribute in question is called AGE. 'Ability to quit', as the headline claims, has nothing to do with the higher rewards.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891791.95/warc/CC-MAIN-20180123072105-20180123092105-00225.warc.gz
CC-MAIN-2018-05
1,326
4
https://www.imperfectink.com/read-letters/view/QNHPvUeVMhju0F4Vvskb/do-you-ever-wonder-about-the-meaning-of-life-what-do-people-think-about-when-they-ask-this-question/
code
“Do you ever wonder about the meaning of Life? What do people think about when they ask this …” Do you ever wonder about the meaning of Life? What do people think about when they ask this question Are they looking for happiness? A sense of purpose? Why do we look for feelings as if they can be found somewhere through something? And when we find that circumstance how do we know we will feel the way we expected? It sounds like on endless, exhausting search. It's also interesting how universal this question is. How we are all looking for the same thing. Could our questions, our longings be the imprint of something greater than ourselves? I think I would find it very hard to cope if I thought that this world was all there is. If it's not and God did come to save the world, then there is hope because there is a Savior.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473401.5/warc/CC-MAIN-20240221070402-20240221100402-00309.warc.gz
CC-MAIN-2024-10
831
2
http://fishmich.com/forum/index.php?PHPSESSID=evq81fvla79vdc0kettsp9h1l3&topic=8827.msg15774
code
I'd like to apologize for the spam the last few days. I'm not really sure how it happened, but I am working on preventing it in the future. Unfortunately, while deleting over 5,000 spam members, I mistakenly deleted nearly 100 actual members. I apologize if you were deleted. Please register again.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583661083.46/warc/CC-MAIN-20190119014031-20190119040031-00502.warc.gz
CC-MAIN-2019-04
298
1
https://thevshield.co/photography/vmware-virtual-infrastructure-client-20-download.php
code
Infrashructure we have removed this feature from Horizon Toolbox. New features Admin initiated remote assistance Enhancements Automatic firewall settings and JRE validation during installation infrastducture. Console Access failed due to expired session expired session should be redirected to login page. Rapid deployment of resources bundled as a "Deployment Template". Lastly the creation of a Continuous Delivery Pipeline for resources. Have you ever wanted to give your users access to certain virtual infrastructure tasks instead of the entire vCenter Client? WebCommander is a way to do this! SyncML-Compare is downlaod extension to Fiddler application that lets you compare the syncmls pushed from server against the SyncMls received from infrastructure device management client on the device. Please provide your feedback in this short Flings' survey. Previous Fling. Next Fling. Horizon Toolbox version 7. Contributors 4. Peter Zhang Enterprise Desktop. Sam Zhao Enterprise Desktop. Comments vmware Share on:. Community Comments Bugs downloadd Discover Similar Flings. Welcome to VMware Horizon Toolbox 7. 2.0 Requirements for Guest Operation Systems If you want to use the "remote assistance" or "device access policy" functions, your doownload operation system must have Microsoft. Step 0: Uninstall your previous installed Horizon Toolbox. July 12,7. In other words, nested virtualization refers to running one or more hypervisors inside another hypervisor. Nature of a nested guest virtual machine virtual not virtkal not be homogeneous with its host virtual machine; for example, application virtualization can be deployed within a virtual machine created by client hardware virtualization. Nested virtualization becomes more necessary as widespread operating systems gain built-in hypervisor functionality, which in a virtualized environment can be used only if the surrounding hypervisor supports nested virtualization; for example, Windows 7 is capable of running Windows XP applications inside a built-in virtual machine. Furthermore, moving infraetructure existing download environments into a cloud, following the Infrastructure as a Service IaaS approach, is much more complicated if the destination IaaS platform does not support nested virtualization. The way nested virtualization can be implemented on a particular computer architecture depends on supported hardware-assisted virtualization capabilities. Vmeare a particular architecture does not provide hardware support required for nested virtualization, various software techniques are employed to enable it. Virtual machines running proprietary operating systems require licensing, regardless of the host machine's operating system. For example, installing Microsoft Windows into a VM guest requires its licensing requirements to be satisfied.Virtualization - Wikipedia Desktop virtualization is the concept of separating the logical infrastructurs from the physical machine. One form of desktop virtualization, virtual desktop infrastructure VDIcan be thought of as a more advanced form of hardware virtualization. Rather than interacting with a host computer download via a keyboard, mouse, and monitor, the user interacts infrashructure the host computer using another desktop computer or a mobile device by means of a network connection, such as a LANWireless LAN or even the Internet. In addition, the host computer in this scenario becomes a server computer capable of hosting multiple virtual machines at the same time for multiple users. As organizations continue to virtualize and converge their data center environment, client architectures also continue to evolve infrastructure order xownload take advantage of the predictability, continuity, and quality of service delivered by their converged infrastructure. For example, companies like HP and IBM provide a hybrid VDI model with a range of virtualization software and delivery models to improve upon the limitations of distributed client computing. For users, this means they can download their desktop from any vmware, without being tied to a single 2.0 device. Since the resources are centralized, users moving between work locations can still access the same client environment with their applications and data. Each is given a desktop and a personal folder in which they store their files. It also enables centralized control over what applications the user is allowed coient have access to on the workstation. Moving virtualized desktops into the cloud creates hosted virtual desktops HVDsin which the desktop images are centrally managed and maintained by a specialist hosting firm. Benefits include scalability and the reduction of capital expenditure, which is replaced by a monthly operational cost. Operating-system-level virtualization, also known as containerizationrefers to an operating system feature in which the kernel 2.0 the existence of multiple isolated user-space instances. Such instances, called containers, vmware, virtual environments VEs or jails FreeBSD jail or chroot jailmay look like real computers from the point of view of programs virtual in them. A computer program running on an ordinary operating system can see all resources connected devices, files and folders, network sharesCPU power, quantifiable hardware client of that computer. However, programs running inside a container can only see the container's contents and devices assigned to the container. Containerization started gaining prominence inwith the introduction of Docker. From Wikipedia, the free virtual. Act of creating an emulation of something. Main article: Hardware virtualization. See also: Mobile virtualization. Main article: Snapshot computer storage. Main article: Migration virtualization. Main article: Failover. Main article: Video game console emulator. Main article: Desktop virtualization. Main article: Operating-system-level virtualization. Retrieved These rules can be edited as required. As with the Gateway Firewall rules, clienr rules in the Distributed Firewall are processed top down and left to right. Again, the category names can client changed via that API. As you can see, the categories are quite different from the Gateway Firewall. Those will be examined in detail. Infrastructure — These infrastructure define access to shared services. NSX Security Reference Design Guide | VMware Environment — These are rules between zones. For example, allowing Prod to talk to Non Prod, or inter business unit rules. This is also a means to define zones. Application — These are rules between applications, application tiers, or defining micro services. In using the DFW for zoning, the environment can be used by creating ring-fencing policies. These are policies that create a ring around an environment. For example, the following policy creates rings around the Prod, Dev, and Test environments such that nothing is allowed out of those environments:. The only traffic to leave the environment section will be Prod traffic traveling within Prod, test within test, or Dev within Dev. Thus, the Zones have been established. As indicated above, the infrastructure section has already caught traffic that was DNS, LDAP, or other common traffic that would cross the zone boundary. If there are Zone exceptions, it is 2.0 to see a Zone exception Section before the zone policy as shown below. The DFW allows for firewall drafts. Firewall drafts are complete firewall infrastructurs with policy section and rules which can be infrastructure published or saved for publishing at a later time. Auto drafts enabled by default means any config change results in a system generated draft. A maximum of auto drafts can be saved. These auto drafts are download for reverting to a previously known good config. Manual firewall drafts of which there can be 10 can be useful client having for example different security level policies in predefined policy for easy implementation. It is worth noting that when updates are made to the active policy for example a new application is addedthat change is not download on previously saved drafts. Downnload Distributed Firewall provides an exclusion list which allows for it to be removed from certain entities. For example, in troubleshooting, it may be useful to place a VM in the exclusion list to downlod out the security policy being an issue in communication — if a problem exists with the VM in the ijfrastructure list, the policy is clearly not the problem. Even if a VM is referred to in the rules or the Applied To field, it will not receive any policy if it is in the exclusion list. This prevents novice users from locking themselves out of those entities. For a secure installation, it is recommended that a policy allowing the communication ports defined vmware ports. Figure shows how to access the exclusion cliient for DFW:. The exclusion list is handy for troubleshooting to remove the DFW so that it can be determined if DFW policy can be causing connectivity issues. Other than as a troubleshooting tool, its use is not recommended in secure environments. NSX Rules provides statistics for the rules, vmware depicted below. While traffic is flowing, the byte, packet and hit count will increase. Figure 5 - 22 Distributed Firewall Rule Statistics. Logging is another tool which is handy for troubleshooting. The log format is space delimited and contains 2.0 following information:. Virtual of the very useful tools within NSX for defining security policies is Profiles. Each of those will be examined in this section. Session Timers define how long the session is kept after inactivity on the session. When this timer expires, the session closes. The distributed firewall and gateway firewalls have separate independent firewall downloxd timers by default. In other words, default session values can be defined depending on your network or server needs. While setting the value too low can cause frequent timeouts, setting it too high will consume resources needlessly. Ideally, these timers are set in coordination with the timers on the servers to which traffic is destined. The figures below provide the default values for the Session Timers:. DDoS attacks aim to make a server unavailable to legitimate traffic by consuming infrastgucture the available server resources through infrastrructure the server with requests. Note that due to its distributed nature, the DFW is far better able to protect against DDoS attacks than a legacy centralized firewall which may need to protect 2.0 servers at once. The following table provides details around the Flood Protection parameters, their limits, and their suggested use:. Tags are supported so that profiles can be applied associated with a vmware group. The policy journey is one which requires constant revisiting and reviewing of vmware as the infrastructure changes, as the compliance requires change, and as the business needs change. The following figure depicts the basics of the security journey:. The first step of the policy journey is defining the scope. Although Scope is specifically used in the context of PCI, it is a concept which is applicable to every environment. Scope defines the breadth of the security zone. The scoping exercise in a typical enterprise environment will be to define the production and non-production areas, at a minimum. The production area would include any assets that are infrastructure critical. This is the area of greatest security and least risk. The non-production assets are those asserts where some risk is tolerable. This would be where new code gets deployed before the production area. Communication across the prod-non prod boundary is tightly controlled. After the scope has been defined, the next step of the journey is deployment. In the case of NSX, this is something that does not require a change of IP address scheme, nor a rearchitect of the network. This means that NSX firewalling may be deployed alongside or even in concert with existing legacy firewalls. In order to understand the east west traffic patterns of the client area, VMware provides vRealize Network Insight as a tool. This tool can discover traffic patterns before NSX is installed. Virtual importantly, it can discovery underlying health problems in applications which may be exacerbated by a change of infrastructure. Ideally, only healthy applications are secured. However, the infrastructufe is not always running at our behest so if there a need to secure an unhealthy application, vRNI offers the means to review the sequence of events for later troubleshooting. Download on a tier of an application in the vRNI Plan Security wheel, will provide details including the number of flows which helps understand downloaf popularity of the tier and also the numbe4r of services in a 22.0 a measure of the complexity of the tier. More details of the NSX 3. At this point, the policy can be virtual by the security team by reviewing the CSV export. This review can happen prior to the actual NSX deployment so that the day that NSX is installed and enabled on the hosts, the approved policy can be imported into the NSX vmwate, providing immediate protection. It should be noted that the policy imported in the figure above was done with the rules are disabled. This is clienr example of a 2.0 import that can be done during production hours with the enabling of the rules to be infrastructure during a defined maintenance window. If this is not necessary, the rules could have been imported enabled by default for immediate protection. The programmable nature of NSX makes infrastructre the ideal networking 2.0 security infrastructure for containers. With NSX, the developer can deploy apps with the security built in from the get-go. While security is traditionally seen as an impediment among the developers, the visibility which security requires can be leveraged by developers to ease their troubleshooting. This section dives deeply into the NSX Container Download, a software component provided by VMware in the form of a container image meant to be run as vmware Kubernetes pod. The NCP has a modular design, allowing for additional platform support in the future. The NCP monitors changes to containers and other resources and manages networking resources such as logical ports, switches, routers, and security groups for the containers by calling the NSX API. It monitors container life cycle events, connects a container interface to the guest vSwitch, and programs the guest vSwitch to tag and forward container traffic between the container interfaces and the VNIC. NCP 3. Figure 6. In a K8s environment, the NCP communicates with the K8s control plane and monitors changes to containers and other resources. It monitors containers life cycle events and connects the container interface to the vSwitch. Download doing so, the NCP will program the vSwitch to tag and forward container traffic between the container interfaces and the vnic. Because NSX infrastructure exists solely in software, it is entirely programmable. As described above, the NCP provides per namespace topology upon creation. This is shown in figure 5. Next, the NCP will create a logical switch and T1 router which it will attach to the pre-configured T0 router. Finally, the NCP will create a router port on the Cliennt which it will attach to the client switch to which it has assigned the subnet it received. This is how the commands result in the topology on the right. Note that smaller environments, may wish to infrastructure a shared T1 for all namespaces. This is also supported. On the other end of the spectrum, where there may be a requirement for massive throughput, Equal Cost Multi Path ECMP routing client be enabled on the T0s above the T1s, providing up to 8 parallel paths in an out of each environment. One of the critical pieces of a secure infrastructure design is the reliability of IP addressing. This is necessary for infeastructure purposes. This leads to the requirement for persistent SNAT in the world of containers. Although this may seem like merely an administrative convenience, it has significant security implications as well. NSX can be configured to collect ports and switches in dynamic security groups based on Tags derived from Kubernetes Metadata. NCP functionality in Downloax environments is cliejt to the one described in the K8s section above. In Tanzu application service environments, CF orgs typically a company, department, or applications suite are assigned a separate network topology in NSX so that each CF org gets its own Tier 1 router as seen in the K8S jnfrastructure above. Every cell can have AIs from different orgs and spaces. During installation, one can select direct Gorouter to container networking with or without NAT. As the NCP creates the logical switch port, it will assign labels for the namespace, pod name, and labels of a pod which will vmwaer be referenced in firewall policies. Operators apply infrastructure equivalent of the K8s controller model at the level of the application. This section will look at the additional functionality the NCP brings to these environments that makes them more secure and easier to operate. NSX ends the black hole that is the container environments. NSX Topology mapper provides a dynamic topology map of the environment. Tools such as traceflow not only extend visibility, but they also aid in troubleshooting connectivity across the entire flow, from VM to container, infrastructure even between pods. Dual stacks are not supported, so if a container has an IPv6 address, it cannot have IPv4 addressing. For north-south traffic to work properly, the Tier-0 gateway must have an IPv6 address and spoofguard must be disabled. No discussion of Container Networking would be complete without the mention of Project Antrea. Being an open source project, Antrea is extensible and scalable. Antrea simplifies networking across different clouds and operating systems. Its installation is virtual simple, requiring only one yaml file. This document will be updated with details when that functionality comes available. The NSX Firewall provides many features which download useful for securing the environment. Although there are a myriad of firewall features including time of day rules and so on this chapter will only highlight a few of the ones most commonly used: URL Analysis, Service Insertion, and Endpoint Protection also known virtual Guest Introspection. The focus on these features is highlighted vmware to the impact these features has on system architecture 2.0 design. For an exhaustive look at firewall features, see the NSX product documentation. URL Analysis allows administrators to gain insight into the type of external websites accessed from within the organization and understand the reputation and risk of the accessed websites. URL Analysis is available on the gateway firewall and is enabled on a per cluster client. After it is enabled, you can add a context profile with a URL category attribute. URL Analysis Profiles specify the categories of traffic to be infrastrructure. If no profiles client created, all traffic is analyzed. To analyze domain information, you must configure a Later 7 gateway virtual rule on all Tier-1 gateways backing the NSX Edge cluster for which you want to analyze traffic. The extracted information is then used to categorize and score traffic. To download the infrzstructure and reputation database, the management interface of the edge nodes on which URL Analysis is enabled must have internet access. URL categories are used to classify websites into different types. There are more than 80 predefined categories in the system.Mar 21, · VMware Horizon Toolbox is a Web portal that acts as an extension to View Administrator in VMware Horizon™ 6 or above. Read new Horizon Toolbox Guide, White paper, and this new blog Discover What’s New with VMware Horizon 6 Toolbox In computing, virtualization or virtualisation (sometimes abbreviated v12n, a numeronym) is the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources. Virtualization began in the s, as a method of logically dividing the system resources provided by mainframe computers between. Run any app on any cloud on any device with a digital foundation built on VMware solutions for modern apps, multi-cloud, digital workspace, security & networking. Currently, categories cannot be customized. A website or domain can belong to multiple categories. Based on their reputation score, URLs are classified into the following severities:. For these services, Webroot:. Legacy security strategies were intolerant of pre-existing security infrastructure. Anyone who had a Checkpoint firewall virtuxl wanted to move to a Palo Alto Networks firewall would run the 2 managers, side by side until the transition was complete. Troubleshooting during this transition period required a lot of chair swiveling. NSX brings a new model, complementing pre-existing infrastructure. Service Insertion is the feature which allows Virual firewalls both gateway and DFW to send traffic cownload legacy firewall infrastructure for processing. This can be done as granularly as a port level, without any modification virttual existing network architecture. Service Insertion not only sends the traffic to other services for processing, Service Insertion offers a deep integration which allows the exchange of NSX Manager objects to SI service managers. Thus, when a new Infrasgructure is spun up which vmware a member of the new group, the NSX Manager will send that download to the SI Service Manager so virtual policy can be consistently applied across platforms. This section clieht Service Insertion, which provides the functionality to insert third-party services at the Tier-0 or Teir-1 cllient. Figure 7 - 2 shows Service Insertion at the gateway firewall north south service client and at the distributed firewall east west service insertion. Notice that east west service insertion means it can vmward applied to traffic destined to physical servers, VMs, or containers. In other words: if you decide that you want your sql traffic to be directed to a Fortinet firewall a viable security policythat policy will vmawre to client sql traffic destined to physical servers, VMs, or containers as the actual instantiation of the server is an implementation detail which should not dilute the security policy. The first step in integrating NSX vmwware your existing firewall vendor is to determine which deployments are supported. In the case of North-South service insertion this is fairly straightforward as the gateway firewall are central data planes which are very much in line with legacy firewalling models. Figure 7 - 3 depicts the typical supported deployment model for North-South Insertion. In this figure, the Service Insertion rule is applied at the Tier 0 gateway. This model suggests the deployment of the VM form factor of the legacy firewall alongside the Gateway firewalls on the Edge Nodes. 2.0 suggestion would minimize the need for traffic to exit the host for processing by the virtualized legacy firewall. Note that download the NSX firewall and the gateway firewall are coresident, this means that the additional delay in traffic processing by the additional security element is a matter of microseconds as nothing is traversing wires, contending with network traffic. Cljent, this processing required no modification to routing or any network infrastructure. Once the clieent deployment is verified, the configuration of service insertion involves just three simple steps:. Figure 7 - 4 shows a service redirection policy. You will notice that this vmware has sections defined by which SVM the traffic is redirected to. It is entirely possible to have more than one entity or vendor to which traffic is redirected. Under each section, rules are defined for the traffic that will be redirected or NOT redirected. Note that infrasrtucture your Edges are running in HA mode, you need infrastructure create a redirection rule for each Edge Node. NSX does not automatically apply the redirection rule to the standby node in the event of a failover as not all vendors support failing over the service VM. In other words, the state is automatically synchronized to ensure consistent processing. Vmdare some customers, this provides a great way to start NSX and cllent firewall integration. This extends the inventory and dynamic grouping constructs virtual their legacy firewall environment. The next step of the adoption would be to use the North-South insertion where the Gateway firewall becomes a means to reduce the processing burned on their legacy firewalls. Legacy firewalls have no equivalent model. Because infrastructure this, understanding the supported deployment models for your firewall vendor is especially important. Here are a few concepts which are important to keep in mind:. For east west service insertion, one has typically two options: a Service Cluster or a Host-Based model. These two options are shown in Figure 7 - 5 and Figure 7 - 6below both depicting the same flow between 2.0 in DFW that were examined in chapter 4.Oct 06, · For information about the individual components and bulletins, see the Product Patches page and the Resolved Issues section.. Patch Download and Installation. In vSphere 7.x, the Update Manager plug-in, used for administering vSphere Update Manager, is replaced with the Lifecycle Manager plug-in. Administrative operations for vSphere Update Manager are still available under the . VMware has a broad offering of security products and features across the heterogeneous infrastructure which is common today. Infrastructure today extends along a continuum from physical servers on prem to VMs in hypervisors (sometimes a variety of hypervisors like ESXi and KVM) to containers, on prem and in the cloud, to Software as a Service. In computing, virtualization or virtualisation (sometimes abbreviated v12n, a numeronym) is the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources. Virtualization began in the s, as a method of logically dividing the system resources provided by mainframe computers between. Traffic between guestVMs on the same host is inspected without ever having to leave the host. This clearly offers a significant processing advantage to the clustered model, with a greater licensing 2.0. Figure 7 - 6 shows a Service Cluster model. In a clustered deployment, the service VMs are installed on one single cluster. Traffic between the VMs is redirected to the service cluster for policy inspection and enforcement before reaching its final destination. When configuring vmware cluster deployment, you can specify which particular host within the cluster the traffic should be redirected to if there is a desire to segregate traffic while undergoing security policiesor you can select any and NSX will select the optimal host. It is important the note that the two models may coexist in different clusters of the same installation. For example, one may have a cluster download DB VMs where every VM will require processing and may go with a host model for that cluster. Another cluster may have a mixture of general population VMs and virtual a small portion of infrastructure or even traffic which is not very delay sensitive is being inspected. In this cluster, the service model may the preferred architecture. In order to support East-West Service Insertion, at least one overlay transport zone with overlay logical switches must exist. All transport nodes must be of the type overlay because the service sends traffic on overlay-backed logical switches. This is how client magic happens: NSX internally creates an infrastructure which allows sending the traffic around without the need to modify the existing infrastructure. The overlay-backed logical switch is provisioned internally to NSX and is not visible to the user interface. Even if you plan on using only VLAN-backed logical switches for the Guest VMs, the service insertion plumbing passes traffic being processed through the overlay. Without this overlay infrastructure, a guest VM which is subject to east west service insertion cannot be vMotioned to another host and would go into a disconnected state. The following steps are required to set up East-West service insertion:. With East west service insertion, it is possible to string multiple services together to provide service chaining. Service Chaining provides standards-based delivery and flexible deployment options. A flow may leverage one, two, or all three services as defined by the rules in the service insertion policy. Note that Service Chaining provides support to north south traffic coming to and from VMs and Kubernetes containers. IN means the packet is being received from the internet, OUT mean the packet is being send to the internet through the uplink. These agents can consume small amounts of resources for each workload on an ESXi host. These components represent the items which an NSX-T administrator would configure or girtual with infrastrucyure most for using the Endpoint Protection platform. VMware Workstation Player - Wikipedia Breaking each of these components down further and dividing them into their planes of operation, one can take a closer look at the internal components. A dashboard is supplied under the Security tab for Endpoint Protection that supplies information around the deployments, components having issues, and configured Infrasteucture. For Windows machines, this is done via the following:. This file is used to track the Partner Service s that are deployed as well as the virtual machines configured for each service on the ESXi host. As machines are powered on and off, they are added and removed from the muxconfig. The Partner Infrasturcture is typically deployed as an OVA virtual machine and can be placed in a compute cluster, but generally placed into the management cluster for protection similar to other management plane appliance such inrastructure NSX-T Manager. Before discussing NSX-T Endpoint Protection deployment, enforcement, and workflows, the objects that are configured and their definitions are required. Group — Defines the workloads download will be used in the Endpoint Protection Policy and protected. NSX-T Endpoint Protection provides a robust set of capabilities that provide significant flexibility of deployment options and enforcement. The flexibility options in deployment and enforcement of NSX-T Endpoint Protection bring up specific design considerations prior to deployment. Before going into the design considerations in detail, it makes sense to call out a configuration detail, specific to Endpoint Vortual. While these options are supported, they do not represent the majority of deployments and recommended options as they do not scale and are error-prone due the manual nature of configuration and the need to touch every ESXi host. The following sub-section will describe these options and how to use them, but the vmeare of the section will be based on the recommended deployment option of configuration through the NSX-T Manager. You vmware configure these options from vCenter Server and each host as well. This can be achieved by:. The data store which the Partner SVM will be placed on is recommended to be shared across the entire cluster that is being deployed to, and provides enough disk space that will be able to host the size of the SVM multiplied by the number of hosts in the cluster. The size vmwaare the disk virtual each Partner SVM requires differs per partner. Consult the partner documentation to understand the disk requirements. Partner SVMs are deployed to all hosts in a vSphere cluster. If a new host is added to the cluster, EAM triggers a deployment of a new Partner SVM to reside on the host and provide the same Endpoint Protection as assigned to all other hosts in mvware vSphere download. The Partner Console is recommended to reside on a management cluster with vSphere HA configured to provide redundancy. Please consult the specific partner documentation on recommended high-availability configurations. One Service Deployment is required for each cluster. If a Partner provides more than one Deployment Specification, i. SVM size, selection of the appropriate size is recommended based on the cluster workloads that are hosted. If either of these options are changed, a redeployment of the Partner SVMs will occur and protection will be lost while redeployment is taking place. Changing networks of the Partner SVMs is not supported. The recommendation is to remove Service Client and recreate on new data store. The recommendation is to remove the Service Deployment and recreate on new data store. Size of Groups follow the configuration maximums that are documented here. Considering that Groups can contains VMs that reside on hosts outside of Endpoint Protection and VMs can be part of multiple Groups, it is recommended to create new Groups that align to the VMs on protected clusters. Multiple Groups can be associated with the same Endpoint Protection Rule. It is required to create at least one Service Profile that will be used in an Endpoint Protection Policy. The recommended configuration of an Endpoint Protection Policy would be to virtual like policies with the same Service Profile into one Endpoint Protection Policy. This helps with troubleshooting and consistent deployment models. Recommended configuration would be to add all of the groups necessary that are part of the same Service Profile, to the same Endpoint 2.0 Rule. All partners that are currently certified and supported for the Endpoint Protection Platform are listed on the VMware Compatibility Vmqare. This is infrastructure definitive sources for joint VMware and Partner certified integrations. However, there are additional benefits that the NSX distributed IPS model brings beyond ubiquity which, in itself, is a game changer. Beyond that, however, there is an added benefit to distributing IPS. This is the added context. Legacy network Intrusion Detection and Prevention systems are deployed centrally in the network and rely either on traffic onfrastructure be hair pinned through them or a copy of the 2.0 to be sent to them via techniques like SPAN or Infrastructue. These sensors typically match all traffic against all or a broad set of signatures and have very little infrastructure about the assets they are protecting. Each signature that needs to be matched against the traffic adds inspection overhead and potential latency introduced. Obviously, a successful intrusion against a vulnerable database server in production which holds mission-critical data needs more attention than someone in the IT staff triggering an IDS event by running a vulnerability scan. Through the Guest Introspection Framework, and in-guest drivers, NSX has access to context about each guest, including the operating system version, users logged in or any running process. This context can be leveraged to selectively apply only the relevant signatures, not only reducing the processing impact, but more importantly reducing the noise and quantity of false positives compared to what would be seen if all signatures are applied to all traffic with a traditional appliance. Thanks to the NCP, it can even monitor even Pods inside vmware. After describing the IPS components, each step will be examined in detail. At the host, the signature information is stored in a database on the host and configured in the datapath. The event engine is a multi-threaded engine one thread per host core deployed on every ESXi TN as part of host-prep which runs in User-space. No additional software needs to be pushed to the host. Traffic is mapped to profiles to limit signature evaluation. Note that IPS performance is impacted more so by the inspected traffic, than by the number of signatures which are evaluated. For highly secure air-gapped environments, there is support for offline signature update download which involves registration, authentication, and signature downloads in a zip file which can then be manually uploaded via the UI. These signatures are currently provided by one of the most well-known Thread Intelligence providers, Trustwave, and are curated based on the Emerging Threat and Trustwave Spiderlabs signatures sets. Because of our pluggable framework, additional signature providers can be added in the future. Description and ID — These are unique to each signature. Simple Strings or Regular Expressions — These are used to match traffic patterns. Modifiers - Are used to eliminate packets packet payload size, ports, etc. Meta-data — Used to selectively enable signatures that are relevant to the workload being protected using the following fields for context:. Severity — Information included in most signatures. Signature Severity helps security teams prioritize incidents. A Higher score indicates a higher risk associated with the intrusion event. Severity is determined based on the following:. A single profile is applied to matching traffic. The default signature-set enables all critical signatures. This limits the number of false positives and reduces the performance impact. The tradeoff is yours to make between administrative complexity and workload signature fidelity. For each profile, exclusions can be set to disable individual signatures that cause false positives, are noisy, or are just irrelevant for the protected workloads. Exclusions are set per severity level and can be filtered by Signature ID or Meta-data. NSX-T Security Reference Guide The benefits of excluding signatures are reduced noise and improved performance. Excluding too many virtual comes with a risk of not detecting important threats. Rules are used to map an IPS profile to workloads and traffic. By default, no rules are configured. You can vmdare one IPS profile per rule. IPS rules are stateful and downloaad support for any type of group in the source and destination fields, just like DFW rules. As was addressed earlier with the DFW, the use dowjload the Applied-To field to limit ibfrastructure scope of the rule is highly recommended. If you ever see this in a live environment, brew a strong pot of coffee. It is going to be cliejt long night! All of this information is intended to give a sense of the state of affairs in general and provide an indication of where to download attention. If you click on infrastructure Total Intrusion Attempts, you are brought to the Events screen, shown below. The UI will 2.0 last 14 days of data or 2 Million Records. There is a configurable timeframe on the far right for 24 hours, 48 hours, 7 days, or 14 days. The clickable colored dots above the timeline indicate unique types of intrusion attempts. The timeline below that can be used to zoom in or out. Finally, the event details are shown below in tabular form. On every severity level, there are check boxes to enable filtering. Vmware filtering can be based on:. Figure 8 - 8 below shows the details of an event. Events can be stored on the host via a cli command for troubleshooting. By default, local event storage is disabled. New downloads may trigger a need to update profiles and infraxtructure, but most of the time will be spent monitoring. In other words, IPS does not apply to dropped traffic. Although they are highlighted as four individual use cases, it is entirely possible that they coexist. Certain regulatory requirements specify the needs for Intrusion Unfrastructure to be enabled for all applications subject to those regulations. Without Infrastrjcture IPS, that would require all traffic be funneled through a group of appliances, which could have an impact clientt data center architecture. In the example above, the PCI application is tagged so that it is firewalled off from the other applications which are coresident on the server hardware. IPS can be applied to only that application to meet compliance requirements, without requiring dedicated hardware. If desired IPS with a reduced signature set may be applied to only the database portion of the other applications, for example. NSX IPS allows customers to ensure and prove compliance, regardless of where the workloads reside which enables further consolidation of workloads with different cliet client on x NSX IPS allows customers to create Zones in software without cost and complexity of air-gapped networks or physical separation. Some customers provide centralized infrastructure services to different lines of business or need vmwaree provide external partner with access to some applications and data. Traditionally, this segmentation between tenants or between the DMZ and the rest of the environment was done by physically separating the infrastructure, meaning workloads and data for different tenants or different zones were hosted on different servers, each with their own dedicated firewalls. This leads to sub-optimal use of hardware resources. As customers are virtualizing their data center infrastructure and networking, NSX enables infrastfucture to replace physical security appliances with intrinsic security that is built into the hypervisor.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304760.30/warc/CC-MAIN-20220125035839-20220125065839-00483.warc.gz
CC-MAIN-2022-05
41,430
91
https://communities.bmc.com/community/bmcdn/bmc_for_mainframes_and_middleware/db2/blog/2012/08/06/exception-advisor-how-to-accelerate-the-diagnosis-of-db2-performance-related-exceptions
code
The SQL Performance Solution for DB2 includes a set of features collectively called the Performance Advisor. These features include Reorg Advisor, Workload Access Path Compare, Recommindex, and Exception Advisor. Exception Advisor assists in diagnosing the root cause of performance-related problems. In this article, we’ll explore its wide range of capabilities and provide a general overview of how to set it up. Exception Advisor examines the data accompanying the triggered exception and compares that data to past execution statistics for the same statement in baseline or aggregated tables. To use Exception Advisor, the user must set up exception definitions in the APPTUNE administration panels. The data collector will capture performance data including exception records. Next, you will need to load the performance data into the Performance Advisor Database (execute the supplied load jobs) and run the Exception Advisor job. For more information on setting up and managing the Performance Advisor Database, see Chapter 3, Managing performance with Performance Advisor (BMC support login required). Exception Advisor compares exception records for elapsed or CPU time to historical performance records for the same SQL statement to produce analysis and advice based on a rules dataset. Since it has already captured this information, there is no additional overhead required to capture the performance data. The rules dataset can be customized to adapt the recommendations to your organization’s preferences. Here is an example of an entry from the rules dataset: RULE:Timeouts per Escalation; RATIO=QTXADEA+QTXATIM/QTXALEX+QTXALES; > 0 This statement experienced a timeout or deadlock, most likely due to RULE:SyncIO Wait percentage;PERCENTAGE=SYNCWAIT/ELAPTIME; > 30 This execution spent a large percentage of time peforming synchronous I/Os. If the getpage count has risen, it can indicate a need to rebind the program, update catalog statistics for accessed objects, or reorganize affected objects. Also check for RID list failures for the statement and buffer pool performance for accessed objects. In diagnosing performance exceptions, it can be helpful to know what issues are NOT a cause of the problem so that you avoid wasting time in your diagnosis. That point is illustrated by this report (click to enlarge image): We can see that there is no correlation between CPU time and LOCK WAIT PERCENTAGE. The user does not need to spend time looking into locking problems for this statement. Let’s look at another report to see if a correlation exists between the exception and other statistics (click to enlarge image): In this case, we can see that historically, there has been a high correlation between the CPU exception and both SYNCIO wait percentage and GETPAGE count. Consequently, this would be a more likely cause of your high CPU exception. Another advantage of seeing the history of the exception is to determine if the problem arose gradually or was a sudden spike. This would help you correlate a recent system or database change to the performance problem. Thanks to Ann Darks, Mike Behne and Mike Watkins from BMC Software for their contributions to this article.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864776.82/warc/CC-MAIN-20180622182027-20180622202027-00052.warc.gz
CC-MAIN-2018-26
3,202
19
https://crossweb.pl/wydarzenia/introduction-to-quantum-computing-lipiec-2022/
code
Introduction to quantum computing During the lecture, Paweł Gora will introduce the necessary concepts related to quantum computing (including: qubit, superposition, quantum gates, quantum entanglement, quantum annealing) and explain how you can create programs for quantum computers and their simulators. Possible applications of quantum computers will be discussed, as well as the current state and development prospects in this field. The quantum IT ecosystem will also be presented, including the possibility of joining the QPoland project and initiatives organized by the "Quantum AI Foundation". Paweł Gora - Scientist, IT specialist and entrepreneur working mostly on applications of AI and quantum computing (especially in transportation and medicine). Graduated from the Faculty of Mathematics, Informatics and Mechanics of the University of Warsaw (M.Sc. in Mathematics and M.Sc. in Computer Science) and is now a PhD Candidate at that Faculty. In the past, he worked as a software engineering intern or research intern at Microsoft, Google, CERN and IBM Research. He is one of the organizers of 2 meetups in Warsaw: Warsaw.ai and Warsaw Quantum Computing Group, and member of the Board of QWorld and QPoland. He is also a founder and CEO of the "Quantum AI Foundation" http://www.qaif.org aiming to support the development of AI and quantum computing. He also co-founded the "Quantum AI" group (https://www.facebook.com/groups/quantumai) aiming to facilitate education in the area of applications of AI in quantum computing and quantum computing in AI. He received several awards, e.g., "Lider ITS" award for the best R&D work in the intelligent transportation systems domain in Poland. "MIT Technology Review" recognized him as one of 10 Top Polish Talents in the "MIT Innovators Under 35" competition. In 2017, he was also placed on the list "NEW EUROPE 100" of emerging technology stars in Eastern Europe. He also collaborates with several startups serving as a technical and business advisor.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104364750.74/warc/CC-MAIN-20220704080332-20220704110332-00320.warc.gz
CC-MAIN-2022-27
2,009
5
https://freeverse.io/en/about
code
Living Assets represent the next generation of NFT technology: unique digital assets that change or evolve, and can be created and traded at a scale and cost to reach the mainstream. They are to NFT 1.0 digital collectibles what videogames are to stamp collections. Living Assets allow content creators to truly engage with their audiences. Be it a videogame or an artist, you can unleash your creativity to create evolutionary rules that change asset properties, retaining your users' attention, and hence, increase monetization. And of course, you can also create standard, immutable NFTs with us. And in their millions, at virtually no cost. Living Assets can be traded in FIAT currency, thus permitting users to enjoy the benefit of true digital ownership in a seamless way - without even realizing the power of the underlying blockchain that makes this dream come true. We constantly challenge the status quo. With hard skills in the team that range from pure math to engineering and design, we are not afraid to embark on building new stuff for which there are no clear patterns in the industry. We encourage challenging questions, not taking disagreement personally, and proposing solutions rather than highlighting problems. "Always assume the others are doing the best they can" is a motto that inspires us. When stakes are high, we try to see "the other side", be patient with others, and share the work burden. We are honest with everyone, and respectful of the diversity in our team and in wider society, in every aspect, from race and culture to gender. One thing we learned directing teams, whether in small startup or large corporations, was the importance of helping everyone grow, both in hard and soft skills, both as employees and as people. We value common sense. We do stuff because it matters, and because we know it will add real value to others. Led by data, but guided by common sense. Because we know that the whole ecosystem, from creators to consumers, will benefit. We're here because we love it. And when you love what you do, things are fun. And yes, we also play together in long DnD campaigns too. From Maths to UX. From String Theory to Computer Graphics. From Mission-critical Systems to Video Game development. From Kubernetes to founding successful startups. We're proud of working with each other. Previously CTO of Bodypal.com, CEO of Shar3d.io, and Director of Barcelona World Race - The GAME. Ph.D. in Medical Physics from University College London. Coordinator of Master in Advanced Videogame Development at La Salle - Universitat Ramon Llull. …and all these You can reach us through our social channels, or by sending us an email via the button below. We'd be delighted to hear from you!
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500094.26/warc/CC-MAIN-20230204044030-20230204074030-00539.warc.gz
CC-MAIN-2023-06
2,732
16
https://superuser.com/questions/346785/log-out-users-when-shutting-down-computer-via-applescript
code
I am using the following Applescript to run a Time Machine backup, and then shut down OS X on the computer at our store. do shell script "/System/Library/CoreServices/backupd.bundle/Contents/Resources/backupd-helper" repeat delay 10 if not IsProcRunning("backupd-helper") then ignoring application responses tell application "loginwindow" to «event aevtshut» end ignoring exit repeat end if end repeat on IsProcRunning(theProc) try do shell script "ps auxc | grep \"" & theProc & "\"" return true on error return false end try end IsProcRunning It works fine and shuts down the computer unless another user is logged in, then the Security Agent window pops up asking for an administrator username and password. I'm curious if someone can help me add to this script the ability to check if the Security Agent window is open, and if it is, to enter the username and password in their relative fields?
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496330.1/warc/CC-MAIN-20200329232328-20200330022328-00194.warc.gz
CC-MAIN-2020-16
900
6
http://ece-eee.final-year-projects.in/a/648-biologically-inspired-intelligent-robots-using-artificial-muscles.html
code
Humans throughout history have always sought to mimic the appearance, mobility, functionality, intelligent operation, and thinking process of biological creatures. The emergence of biologically inspired technologies, i.e. biomimetics, has made it increasingly easier to develop robots with such capabilities. Some of the technologies that have evolved include artificial muscles, artificial intelligence, and artificial vision to which significant advancements in materials science, mechanics, electronics, and computing science have contributed greatly. One of the newest fields is the artificial muscles, which is the moniker for electroactive polymers (EAP). To take advantage of these materials, efforts are made worldwide to establish a strong infrastructure ranging from analytical modeling and comprehensive understanding of their response mechanism to effective processing and characterization techniques. The field is still in its emerging state and robust materials are still not readily available however in recent years significant progress has been made and commercial products have already started to appear on the market. This paper covers the current state-of-the-art and challenges to making artificial muscles and their potential application to biomimetic robots. Author: Daniel A. Kingsley
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865438.16/warc/CC-MAIN-20180623225824-20180624005824-00103.warc.gz
CC-MAIN-2018-26
1,308
5
https://www.makerfabs.com/1-usd-ble-solution-core.html
code
When Makerfabs try to make a disposable product that needs to be really low cost, with BLE4.1, we have to select a cheap BLE solution with less than $1, including antenna and oscillator... The disadvantage is that this solution is not popularly used and there no much material about it, which we finally succeed after days of learning and try... This would be a cheap solution for Bluetooth projects. We would love to share this with makers that interest in this. This solution is based on PHY6202, it integrates with Cortex M0, 512K Flash, 128K ROM. The total value can be lower than $1. The purpose of this product is to share with our customers this solution, we have tested its BLE functional, but we Makerfabs also not very familiar with its detailed usage yet. So, we can’t provide much technical help on this.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817670.11/warc/CC-MAIN-20240420153103-20240420183103-00214.warc.gz
CC-MAIN-2024-18
818
2
http://cs.au.dk/~birke/teaching/logic-Spring-2001/index.html
code
The aim of this project is to acquaint students with aspects of constructive logic. We plan to cover: natural deduction, Hilber style system, truth-value semantics of constructive logic, embedding classical into constructive logic, constructive arithmetic and analysis, constructive real numbers, basic recursion theory in HA, Kleene's number realizability, Markov's principle, Kleene's function realizability, higher type arithmetic, modified realizability, Goedel's functional interpretation. |Project format||We have a common project meeting each week, where we discuss the reading material. Project participants have to write a report, on a topic of their own choice related to the reading material. The reports must be written in groups with minimum 2, preferably 3, persons in each group.| |Project period||February 1 - April 26, 2001.| |Project meetings||Fridays, Glentevej, Room: 2.55, 3:00 PM - 4:00 PM.| |Prerequisites||This is an introductory graduate course with no formal pre-requisites; however, some basic acquaintance with naive set theory and the formalism of first order logic as usally acquired in undergraduate computer science or math is assumed.| |Notes||Introduction to Constructive Logic and Mathematics by Thomas Streicher. The notes can be bought at the first project meeting.| |Grading||Will be based on written project report. The grade will be Passed or Not-Passed.|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528687.63/warc/CC-MAIN-20190723022935-20190723044935-00059.warc.gz
CC-MAIN-2019-30
1,395
7
https://stackoverflow.com/questions/17137037/having-multiple-twitter-instances-with-twitter4j-library/18510025
code
I need to be able to make different I have already obtained the access tokens for 10 users based on consumer credentials of my app by using standard Twitter OAuth Sign In protocol. Now, I want to create a list of Twitter Instances each initialized with a separate Accesstoken. However, I'm not able to do this. My leading cause of confusion is, that, I don't understand how Twitter4j instantiates Twitter instances. I don't understand the difference between TwitterFactory.getSingleton() method and I also don't understand if AccessTokens can work independently without supplying consumer key and secret. Or do I need to provide Consumer key and secret while using Accesstokens. If someone can explain in detail the design for my requirement it'll be highly appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00669.warc.gz
CC-MAIN-2023-50
770
8
https://www.tesgeneral.com/single-post/2015/07/21/the-tesg-community-stories-project
code
There's a new /tesg/ mod project, and we need your contributions! The /tesg/ community stories mod is a little project that will add little books and stories about /tesg/ characters into Skyrim. The idea of it all is that you can write us a story about your character and it will be turned into a book or journal in Skyrim to read.Who is your character and what is their life story? What their motivations are, their goals, why are they in Skyrim, who are they, what do they like and dislike. Anything! There will be books laid out all across Skyrim of character's adventures and you'll be able to find them through exploring. Tie an area to your character. If your character is a Solitude based character, you can find a book about them while just walking around Solitude. Give a little fan lore to a location. Wanna learn more? Check out the Projects Tab right under Community. Wanna submit something? Send it to Tesgstories@hotmail.com
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00391.warc.gz
CC-MAIN-2023-50
938
5
https://forum.ghost.org/t/automated-internal-linking-to-tag-pages/43158
code
I was wondering if it is possible to automate internal linking of text on a post to /tag pages if they existed. On this page there is text “Erling Haaland”, “Manchester City” and “Tottenham” etc. These all exist as /tag pages on my website and I’d like to automate internal links when posting. I have been doing so manually, but preferred option is to automate if possible. Thanks for the prompt response, very helpful. In summary, I take content from an API, convert images, categorise into the tags I have on site and then publish to draft. Once I have the automation of internal linking I can publish straight to site and have an end to end content automation flow. Hope that makes sense and thanks again for your help.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948217723.97/warc/CC-MAIN-20240305024700-20240305054700-00371.warc.gz
CC-MAIN-2024-10
736
7
https://www.freelancer.com/work/configuring-email-godaddy-linux-server/
code
...someone experienced with configuring the ServiceMax product, as an admin and or developer. We are looking to setup OOTB features, as well as create processes catered to our business model. You must be able to think outside the box, and make recommendations based on our requirements. If you do not have experience configuring the product, please do not ...background, with black and small or little green. We will provide access to our hightail account with gigabytes of pictures and images from our association. We have the domain in godaddy and will be hosting there with a new hosting account that you can suggest the type. Need to be easy to admin using Dreamweaver or any wyiwyg tool. Some design images here We are setting a small lab with a used Nortel CS1000 and we need some help in configuring it, e.g. setting users with multiple lines, boss/admin, defining hunt groups, pickup groups, etc. Additionally, we would like a consultant to jump start us with the basic concepts of Nortel CS1000. We have extensive telephony background with various PBX vendors Step 1: Need some one to analyze some of the random packages purchased in the past from wordpress and godaddy and advise on the best and cheap way forward to create a nice basic business website for a printing business. Step 2: Build a professional website for a printing business, with info page and contact pages. Please provide the different costs associated with 8.5.3 or 9.0.1 installation. This is a one time setup but services can be retained for general lotus notes and sametime maintenance issues for later. Email needs configuration on linux (vultr cloud) so we can send emails and they must land in inbox. you will be responsible for setting up spf records and whatever is needed for digital delivery signature so ensure the emails are not classed as spam. Right now when the email is sent it says delivery pending which suggests they are not being sent. I Python Experts Only. I need a talented expert in python to create a script that will scrape a certain website for a hand...talented expert in python to create a script that will scrape a certain website for a handful of elements. Possibly hook an API of a filehoster. The script will run on a linux server with no GUI. (Headless) I want experts only. I have a Windows virtual server with a company called Contabo. I only use it for software testing. I would like to use this device in lieu of purchasing a VPN service so that i can browse anonymously and without ad targeting in public locations. Is this doable? Seemingly it would take 20-30 mins to configure via TeamViewer by someone experienced. We are looking for a copywriter for email subject lines. We are a Pizza chain (think Dominos, but quality) that is looking to bring back our fun/witty/irreverent brand voice that pushes the envelope and targets adults 18 - 40. We would be looking for attention-grabbing branded subject lines, while highlighting our product offerings, that are fun and Inherited a Wordpress Project that was created by another Web Developer. I migrated the website over to a Deluxe Godaddy Hosting Account with CPanel. The site has Tatsu editor with Oshine but currently does not work. You can access the Tatsu editor but it will not allow you to edit the modules. The edit content box does not work. I need an IT Pro, Wordpress I am looking for a person who can help in fixing the broken site. It should be reachable over HTTP/80 and requests to this endpoint should be redirected to HTTPS/443. - When trying to reach over HTTPS/443 it currently just seems to be timing out. => We need to re-establish connectivity to the website and make sure all requests are served over HTTPS. This the issue. required a database with up to 500 entries, it can be Windows, linux or server base, with reminder of expiry of certain dates, a week before expiry to send an email notification to couple the admin of the database as well as the expired person and a desktop notification to appear as a reminder as well For a collaboration project, we need a tool to export from Microsoft Exchange Server, the calendars of users of the server, in text format. Two input options: either the username for which the calendar will be exported, or, exporting calendars of all users of the system. ...an image (Given a region). High accuracy 98% or better, dirty or complex backgrounds 2. Patron comparison (Detect and calculate similarity) ** Compatible with Windows and Linux Additional requirements (Negotiable) -. Method to get differential image. -. Method to compare two images (different sizes) -. Method that load the result file and return I will hire the best candidate for the video lesson.I would like to talk with you before hiring.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217951.76/warc/CC-MAIN-20180821034002-20180821054002-00419.warc.gz
CC-MAIN-2018-34
4,739
15
https://docs.google.com/forms/d/e/1FAIpQLScOQL2sca7BGsAakGZq7FY_5cTcufqH3jqqETV8nKijDj82jw/viewform?usp=send_form
code
Brief positionality statement - we are seeking to develop a panel of diverse representation of identities, disabilities, and other perspectives. * What aspects of archival work, disability, and remote work/experiences do you hope to speak about? * Any additional comments or feedback for the planning committee? We are anticipating scheduling the panel sometime between 12-5 ET possibly on Thursday, October 13th, if you have requests for alterative days/times, please let us know.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646937.1/warc/CC-MAIN-20230531150014-20230531180014-00050.warc.gz
CC-MAIN-2023-23
481
3
https://ko.ifixit.com/Answers/History/1615
code
원문 게시자: TommyJames337 , A friend of mine's MacBook was getting the same error message upon booting up. We thought it was a logic board failure, and bought her a new computer. Shame, too because after picking around with it for a while, I realized that it just needed the OS reinstalled. Oh well. . . . . It's working great now!
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487623942.48/warc/CC-MAIN-20210616124819-20210616154819-00425.warc.gz
CC-MAIN-2021-25
337
2
https://russellb.livejournal.com/932116.html
code
- George W. Bush didn't initiate a nuclear war to hasten the second coming of Christ. - Osama bin Laden wasn't mysteriously captured the day before the election. - A terrorist attack against the United States wasn't engineered by the CIA the day before the election. - Martial law wasn't declared the day of the election. - Barack Obama wasn't killed before the election. - The election wasn't "stolen," either by supposed trickery in Diebold's electronic voting machines, or by massive voter disenfranchisement. I was ridiculed as naive for dismissing each of those conspiracy theories. I guess the reasonable middle is right yet again.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360293.33/warc/CC-MAIN-20210228054509-20210228084509-00076.warc.gz
CC-MAIN-2021-10
637
8
https://www.andremotz.com/sketch_dots/
code
Because of business reasons I spent a lot of time in airplanes in the last couple of months. While flying from Manila to Dubai I found some time again to play around with Processing and the result was Sketch_Dots. Basically the idea is to load any picture and transform its bitmap into a low-resolution grid. The pixels are visualized in circles, or better in dots. I implemented two modi: the graphical one just works as described, while the brightness-mode uses the pixel’s brightness for the size of the dot. Fire up the patch sketch_dots in Processing. I developed the sketch using Processing 2.0b7 on OS X 10.9 and a MacBook Air (late 2012) Change the file-name in row 19 to your desired image. Processing currently supports major RGB-file formats like JPG, PNG etc. * -/+ de/increase dotSize * q/w de/increase gridSize * spacebar save to vector-PDF (frame-####.pdf) * b Brightness-mode on/off Especially with the brightness-mode you’ll encounter best results when using pictures with gradients going from dark into bright areas. The result can be exported via vector-pdf so that you can continue using it even for some printing-stuff. Currently Processing scales the window to the maximum of your screen, but in some cases, the window might be bigger than your screen. Up to now I was to lazy to fix the issue, since you still can export the full picture 😉 In Processing I use noStroke() but you will still encounter the circles having strokes in your PDF. I used Illustrator to remove those strokes easily. Feel free to edit the patch and share your implementation. It should be no problem to use your web-cam or any other video-device as input 🙂 The sketch is released under the GNU GPL 3-licence.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00511.warc.gz
CC-MAIN-2024-10
1,715
18
https://community.st.com/thread/50248-best-approach-using-the-lis3dsh-accelerometer
code
Hi, I'm using an LIS3DSH in a case where I want to periodically (say once every 50 milliseconds) get the most recent X,Y,Z position of the accelerometer and perform a calculation. My current approach is to just set a timer on my MCU to interrupt every 50 milliseconds. During this interrupt routine I simply query the OUT_X, OUT_Y and OUT_Z registers of the LIS3DSH and then immediately perform my calculations. I've configured the block data update value (in register CTRL_REG4) on the LIS3DSH to "continuous" and I'm not using the FIFO feature either (FIFO_CTRL = "Bypass mode: FIFO turned off"). Additionally, I've configured the output data rate (in register CTRL_REG4) to 100 Hz. Am I correct to believe this will result in the OUT_X, OUT_Y and OUT_Z register values continually being updated with the very latest accelerometer position data every 10 milliseconds? If so, this would make a worst case scenario of the X, Y, Z position data being 10 milliseconds old when performing my calculation, which is within my requirements. I'd very much appreciate any feedback on my above approach being incorrect or less than optimal in any way. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866926.96/warc/CC-MAIN-20180624083011-20180624103011-00012.warc.gz
CC-MAIN-2018-26
1,150
6
http://mathhelpforum.com/algebra/82214-matrix-gauss-jordan.html
code
solving systems of linear equations: For a system to have infinitely-many solutions, one of the lines in the system has to turn into all zeroes, after a sufficient number of row operations. For a system to have no solution, one of the lines has to reduce to something non-sensical, like "2 = 0". For a unique solution, you have to get single numerical values for each of x, y, and z. (I don't know how your book is defining a "trivial" solution in this context, but it might mean "everything is zero".) So do the row operations, trying to get the system into row-echelon or reduced-row-echelon form, and see where that leads!
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541517.94/warc/CC-MAIN-20161202170901-00389-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
625
6
http://geniusofinsanityworld.blogspot.com/2005/08/george-w-bush-parody-because-i-got.html
code
I would rather someone be wrapped in the Constitution burning the flag than wrapped in the flag burning the Constitution. In other words, as Patrick Henry famously said, "Give me liberty or give me death." Wednesday, August 03, 2005 George W. Bush Parody-Because I Got High Go HERE to listen and click on title: AUDIO: George Bush-"Because I Got High" Oh yeah and turn up your speakers for this one, it's a classic.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736673439.5/warc/CC-MAIN-20151001215753-00170-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
415
5
https://ucertify.com/blog/mark-wilson-reviews-ucertify-mcse-2003-upgrade-prepkits/
code
Mark Wilson has been designing and implementing IT infrastructure solutions within the United Kingdom, continental Europe, and Australia since 1994, operating both in-house and as a consultant. Mark likes to describe himself as operating system agnostic (holding certifications from Microsoft, VMware and Red Hat – as well as being a Mac user at home) although much of his professional life revolves around the delivery of services using Microsoft products and technologies. Mark can be contacted via his blog at http://www.markwilson.co.uk/blog/. Mark reviewed the uCertify MCSE 70-292 and 70-296 PrepKits and wrote a post in his blog. He remarked, “There was also a complete run-down of the exam objectives and other study aids including flash cards, study notes and articles. Finally, the software allows the ability to view test history and to evaluate readiness using the built-in reporting tools.” You can read Mark’s comments on his blog.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00462.warc.gz
CC-MAIN-2023-23
953
4
https://organicmicrochip.com/cb-radio-build-a-cb-radio-bench-power-supply-from-a-computer-atx-psu/
code
PLEASE NOTE THAT IT IS DANGEROUS TO PLAY WITH MAINS POWER AND YOU SHOULD NOT DO SO UNLESS YOUR ARE QUALIFIED, THIS POWER SUPPLY BUILD IS FOR TEMPORARY USE ONLY AND SHOULD NOT BE USED AS A LONG TERM REPLACEMENT FOR A PURPOSE BUILT PSU. Duplicating this video clip or developing your very own PSU is done at your very own danger. I do wish you appreciate it as well as subscribe for even more. Develop a CB Radio/ Bench Power Supply Making Use Of ATX PSU. Most of us have a damaged computer someplace in our home or workplace as well as if the going obtains tuff, as well as you can not locate a much better PSU for your Radio, you might alway make one from the PSU because busted Computer system (unless the factor it is damaged is the power supply). Numerous many thanks Mike – M0MSN To obtain informed of the following upload.click that bell as well as subscribe.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510179.22/warc/CC-MAIN-20230926075508-20230926105508-00565.warc.gz
CC-MAIN-2023-40
866
7
https://www.npmjs.com/package/tower-route
code
Tiny route component for client and server. $ npm install tower-route $ component install tower/route var route = ;; Or with the You can also name them (makes it so you don't have to mess with url strings in code, to redirect/transition/etc.:
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487607143.30/warc/CC-MAIN-20210613071347-20210613101347-00589.warc.gz
CC-MAIN-2021-25
242
6
https://www.timheuer.com/blog/silverlight-autocompletebox-with-custom-data-types/
code
The other day I wrote a simple little Silverlight application using a DataGrid to help navigate the TechEd DVD contents. My code was admittedly quick and dirty. I loaded up some data, and based on some events re-filtered and re-bound that data. After thinking about it I am not sure why I didn’t just use some existing controls to help me do that work. I found that AutoCompleteBox from the new Silverlight Toolkit would do this for me. One thing that the AutoCompleteBox does quickly is provide filtering for simple string data. But what about custom types? My data in the TechEd application has a List<TechEdSession> where TechEdSession is respresented as such: If you wire up the AutoCompleteBox.ItemsSource to my List<> nothing will happen. Why? Well the control doesn’t know how to understand the data exactly. So we have to help it. It knows the data is there but doesn’t know what to return based on the filter. This is simply done using the ItemFilter property on the control. We can easily provide a Lambda expression to help the control understand the filter. After setting the ItemsSource property to the results of my LINQ query, I add the expression to help the control understand the data: That’s it. I’ve now defined the filter for the control so as the user types data it does the appropriate filtering logic and displays the results. I’ve chosen to still display the results as a DataGrid for easy reading in this application, but could have also used an ItemTemplate if I desired. The ItemFilter expects a search predicate to be passed to it. So the resulting application has the same capabilities, but a lot less code for me to write. Here’s the ending result: So if you need to implement AutoCompleteBox and have it search/filter your custom types, be sure to supply your own ItemFilter to help the control know where to look! Please enjoy some of these other recent posts...
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818464.67/warc/CC-MAIN-20240423033153-20240423063153-00125.warc.gz
CC-MAIN-2024-18
1,909
8
http://www.filewatcher.com/d/Debian/i386/graphics/xfig_3.2.5-rel-3_i386.deb.610618.html
code
|File Search||Catalog||Content Search| This package contains the xfig program itself. You should think about installing the transfig package to export the graphics to several common formats. You should also think about installing xfig-doc, which contains the documentation and xfig-libs, which contains several clip art libraries. xfig for DEBIAN =============== For additional information about xfig have a look at the xfig web page at http://www.xfig.org http://www-epb.lbl.gov/xfig/ Japanese Support ================ Simply set the environment variable LANG to ja_JP.ujis and xfig should be hopefully adapted to your needs. I cannot test this out here, because I don't understand any Japanese nor am I able to understand more» =============================================================== XFIG - Facility for Interactive Generation of figures under X11 =============================================================== Xfig is a menu-driven tool that allows the user to draw and manipulate objects interactively in an X window. The resulting pictures can be saved, printed on postscript printers or converted to a variety of more» XFIG(1) XFIG(1) NAME xfig - Facility for Interactive Generation of figures under X11 Version 3.2.4 SYNOPSIS xfig [options] [file] DESCRIPTION Xfig is a menu-driven tool that allows the user to draw and manipulate objects interactively under the X Window System. It runs under X version more» xfig (1:3.2.5-rel-3) unstable; urgency=low * Remove trailing space from debian/patches/00list to more» Changes to Xfig ============================================================================= Versio more» TODO ==== - Think about splitting xfig into xfig and xfig-libs. - Remove "icon" entry from menu (re more» This file contains some possible things to do in future versions of xfig. ------------------ FORMAT more» This Debian package was maintained by many different Debian maintainers: joost witteveen <joostje@d more»
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864837.40/warc/CC-MAIN-20180522170703-20180522190703-00632.warc.gz
CC-MAIN-2018-22
1,961
11
https://jobs.lever.co/meetkaruna/24601780-c850-4762-8f67-61a92091dcd3
code
San Francisco, CA At Karuna Health, we give every patient a guide in the healthcare system. Personal care integrates naturally into every aspect of our organization. We are building a mission-focused, inclusive, and motivated team to scale a quality patient experience. Karuna’s web app allows vulnerable, high-risk patients to build a stronger relationship with their care teams on the same messaging platforms they use with their friends and family. We build automation tools to help increase the volume and quality of interactions, measure care team performance, and eliminate back-office annoyances. All of this requires building a set of rock-solid infrastructure and APIs, and scaling it to hundreds of thousands of patients. We focus on care management, a niche part of the healthcare ecosystem serving the most vulnerable and sickest members of our communities. Karuna engineers aim to enable healthcare organizations to build deeper, more impactful relationships with every patient, expanding the scope and accessibility of their services for all. As an infrastructure engineer at Karuna, you will develop and launch cutting-edge tools that will transform healthcare and positively impact the lives of patients at a massive scale. From powering our core platform to solidifying a trustworthy user experience, you can shape the future of healthcare with every line of code you ship. - Scaling and adding stability to a Rails/Postgres microservice architecture - Comfortable with a modern dev-ops stack - Building and maintaining internal developer velocity tooling - Defining and developing strong testing and QA practices - Contributing where necessary to backend feature development - Collaborating with engineering team (CTO + 3 full-stack engineers) to plan and allocate capacity with stability and scaling of infrastructure in mind - Triage, diagnose, and solve application performance woes - Work with our EMR (Electronic Medical Record) integration partners to build smooth data flows in and out of Karuna - Do all this while maintaining and enhancing developer satisfaction and joy! - 3+ years of full-stack engineering and/or devops experience - Of these 3+ years, 2+ in and around Rails - Intimate familiarity with modern Ruby - Experience setting up a modern, customized devops stack from scratch - Eager to spend time on stability, reliability, and scaling on the backend - Able to independently create value around infrastructure, tooling, QA, and devops - Excited to help open-source relevant parts of our codebase! Skills We'd Like to See - Knowledge of configuration management systems such as Puppet, Chef, Salt, or Ansible - Strong knowledge of Software Engineering and Computer Science fundamentals. It usually comes with Bachelors in CS, but doesn’t have to be. - 1+ years experience at an early-stage startup - Experience with large scale, high-volume, production-quality messaging architecture - Experience with Electronic Health Record (EHR/EMR) integration - Demonstrated passion for healthcare and social impact Who You Are - Excitement for infrastructure and devops. This is your craft. - Actively choose progress over perfection. - Possess a strong bias towards getting it done. You take initiative and don’t need to wait for permission. - Deeply mission driven and motivated by empowering patients when they feel helpless, anonymous, and alone. - Comfortable with, embrace, and thrive in uncertainty. - Able to build reliable and sustainable systems with limited resources. Why You Should Join Us - Be on the ground floor of a rapidly growing company. - Work with a Rails contributor, a skilled DevOps Engineer, and accomplished React developers. - Have the autonomy to build something with a brilliant and enthusiastically supportive team. - Learn best practices from world class investors and advisors including First Round Capital, Founder Collective, SV Angel, and BoxGroup. - Shape the culture of engineering at Karuna. Karuna Health is proud to be an equal opportunity employer. We are committed to building a diverse and inclusive culture and celebrate authenticity. We do not discriminate on the basis of race, religion, color, national origin, gender, gender identity, sexual orientation, age, marital status, disability, protected veteran status, or any other legally protected characteristics.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201455.20/warc/CC-MAIN-20190318152343-20190318174343-00550.warc.gz
CC-MAIN-2019-13
4,346
42
https://www.aimodels.fyi/models/replicate/d479cd4d-e8a9-44ed-91a2-97fb8c090f69
code
MIDAS, a robust monocular depth estimation model, can have several practical uses and find application in various domains. In robotics, it can assist in navigation and object detection by providing accurate depth information from a single RGB image. This can be particularly helpful in scenarios where depth sensors may be limited or unavailable. In the field of augmented reality, MIDAS could enhance the realism of virtual objects by accurately placing them in the scene based on their estimated depth. Additionally, MIDAS can be valuable in autonomous vehicles, aiding in tasks like road scene understanding, obstacle detection, and path planning. It could also have applications in virtual reality, where depth estimation can improve scene rendering and create a more immersive experience. With its ability to handle challenging situations and varying lighting conditions, MIDAS holds potential for widespread use in industries such as gaming, robotics, and computer vision. Possible products incorporating this model could include depth estimation software for smartphones, AR/VR headsets, or autonomous vehicle systems. - Cost per run - Avg run time - Nvidia T4 GPU |No similar models found You can use this area to play around with demo applications that incorporate the Midas model. These demos are maintained and hosted externally by third-party creators. If you see an error, message me on Twitter. Currently, there are no demos available for this model. Summary of this model and related resources. Robust Monocular Depth Estimation |View on Replicate |View on Replicate |View on Github |View on Arxiv How popular is this model, by number of runs? How popular is the creator, by the sum of all their runs? How much does it cost to run this model? How long, on average, does it take to complete a run? |Cost per Run |Nvidia T4 GPU |Average Completion Time
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817187.10/warc/CC-MAIN-20240418030928-20240418060928-00354.warc.gz
CC-MAIN-2024-18
1,865
18
https://sites.google.com/champlain.edu/jauerbach/contact
code
Tuesdays 3:30 - 4:30 PM, Wednesdays 1:30 - 4:30 PM West Hall, 106 Generally the best way to reach me is via email: email@example.com I can also be reached on my office phone: (802)-651-5958 If you are on the Champlain College Campus, you can stop by my office West Hall, 106.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529839.0/warc/CC-MAIN-20190420140859-20190420162859-00321.warc.gz
CC-MAIN-2019-18
275
5
https://jcb-jones42.medium.com/about?source=user_profile-------------------------------------
code
I served 6 years in the U.S. Air Force working as a signals analyst. Currently I am undergoing a new career path into Unity development as I am entering into the civilian world. I am looking for all the opportunities that will help me grow, not just as a software developer, but also as a person. Even though my current technical ability from my prior experiences will not directly translate into code. I can assure you that my motivation and work ethic will allow me to not just be successful, but allow me to thrive. I believe loyalty is another valuable trait that I have proven to have. After all, I've been a Bengals fan my entire life and have yet to see a playoff win.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00706.warc.gz
CC-MAIN-2022-40
675
1
http://www.msri.org/ext/pmmb/ripley.html
code
Finding Needles in Haystacks: Tools for Finding Structure in Large Datasets University of Oxford Several groups have introduced terms such as KDD (knowledge discovery in databases), Data Mining, Machine Learning and Neural Networks for the challenges of finding structure in large databases. Statisticians have been nowhere near as good at inventing catchy titles nor of promoting their wares, but have an outstanding track record of developing useful tools first! We are only now beginning work on microarrays, so the examples will mainly be drawn from biological imaging, particularly functional and structural MRI of human brains. The aim of the talk will be to give an overview of the statistical toolbox and some of its limitations, including
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861981.50/warc/CC-MAIN-20180619080121-20180619100121-00151.warc.gz
CC-MAIN-2018-26
747
5
https://github.com/nickChenyx
code
🔭I’m currently working for Bytedance 🌱I’m currently learning Golang/Rust/Scrum... This is an pure application that converts a data stream to an object, and is committed to completing the conversion of the data stream to the object My first program language is Java,and i love it. This is an adaptation of the Ninety-Nine Prolog Problems written by Nick Chen. Now implement by Scala. server port dial, rust impl. A powerful flow control component enabling reliability, resilience and monitoring for microservices. (面向云原生微服务的高可用流控防护组件)
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949642.35/warc/CC-MAIN-20230331113819-20230331143819-00729.warc.gz
CC-MAIN-2023-14
579
6
https://forums.macrumors.com/threads/quick-question.2034377/
code
I am having a major brain fart. At some point in the last few years there was a feature that was added to either the new OS or new hardware generation of Macs that would use a Mac's discrete GPU (if it had one) to help boost CPU performance. 1. What was this called? 2. When did this get added? Thanks, sorry if this isn't the right place for this.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998558.51/warc/CC-MAIN-20190617183209-20190617205209-00234.warc.gz
CC-MAIN-2019-26
348
1
https://www.experts-exchange.com/questions/27048862/RD-Remote-Apps-TS-Gateway-with-ISA-2006-and-RSA-authentication.html
code
I am trying to build a TS Gateway solution that uses RSA authentication for PCI compliance of our remote access tools. I have followed the solution in the link below but the solution that is detailed is flawed. It uses the same listener for both rules so ISA blocks the connection for Remote Apps and TS gateway. Basically I am trying to use remote apps and/or TS Gateway with RSA in a fashion where users arent able to bypass the 2 factor by creating an RDP icon to connect to machines via the Gateway. The rule works if its set to All Users instead of All Authenticated Users. When you launch a remote app or TS Gateway from the Web Access page, the initial request is sent as Anonymous so ISA blocks it as it needs requests to be authenticated. I've racked my brain on it and Msft hasnt been able to help me with this either. I know this can work just looking for someone who has implemented that might be able to get me over the hump.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104205534.63/warc/CC-MAIN-20220702222819-20220703012819-00048.warc.gz
CC-MAIN-2022-27
938
11
https://www.funnyday.info/funny-cat-vines-clean-2020-cat-tik-tok-compilation/
code
Funny Cat Vines Clean 2020 with Cat Tik Tok Compilation Enjoy this Funny Cat Vines clean 2020 with Cat Tik Tok Compilation. Try not to laugh with Cute and Funny Cat videos. On this Channel Cute Pets, you see funny cats compilation, hilarious cats, kittens, cat videos in the world. The best cute cats videos 2020. Enjoy new videos : ► Cats Being Cats Tik Tok Part 1 :
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141168074.3/warc/CC-MAIN-20201123211528-20201124001528-00250.warc.gz
CC-MAIN-2020-50
369
7
https://frontaccounting.com/punbb/viewtopic.php?pid=30692
code
Topic: Translating 2.4.3 to german - trouble with abbreviations I am on my way to make/correct the translation with www.deepl.com which does a very good job. The only thing that makes me trouble is the following list of abbriviations. Could someone please give me the full text for it? GRN - Goods Received Note Thanks in advance,
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300574.19/warc/CC-MAIN-20220117151834-20220117181834-00017.warc.gz
CC-MAIN-2022-05
330
6
https://www.freelancer.com/projects/script-install/oxyclassifieds-longer-tweets-new-ads.5110650/
code
just wonder if could please help me with twitter ... Social networks Module > Tweet ads when posted > i setup the twitter app and also added the facebook app to twitter account . when i tweet something manually it also appears over in facebook page ... great .. the only thing is that ads are no longer posted to tweeter .. for some reason the script no longer Tweet new ads when posted this is urgent ...
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518767.60/warc/CC-MAIN-20200403220847-20200404010847-00309.warc.gz
CC-MAIN-2020-16
405
7
https://www.savapage.org/docs/manual/ch-security-jmx.html
code
During the install process, SavaPage generates a dedicated self-signed key and certificate for securing JMX connections with SSL. The generated Java keystore /opt/savapage/server/jmxremote.ks with password savapage. Access to this file is restricted to the The JMX password for the admin user is held in /opt/savapage/server/jmxremote.password. Java needs the password to be provided in plain text, so access to this file is restricted to The initial password is a random string generated by the installation process. It needs to be changed in the Admin Web App as described in Section 22.214.171.124, “JMX Agent”. The default SavaPage JMX port is 8639. This can be changed by editing the file: You need to restart SavaPage for this change to take effect.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100258.29/warc/CC-MAIN-20231130225634-20231201015634-00292.warc.gz
CC-MAIN-2023-50
759
11
http://fink.gnu-darwin.org/ProgramDocuments/api_java/db_set_re_source.html
code
public void set_re_source(String re_source) throws DbException; Set the underlying source file for the Recno access method. The purpose of the re_source value is to provide fast access and modification to databases that are normally stored as flat text files. If the re_source field is set, it specifies an underlying flat text database file that is read to initialize a transient record number index. In the case of variable length records, the records are separated, as specified by Db.set_re_delim. For example, standard UNIX byte stream files can be interpreted as a sequence of variable length records separated by <newline> characters. In addition, when cached data would normally be written back to the underlying database file (for example, the Db.close or Db.sync methods are called), the in-memory copy of the database will be written back to the re_source file. By default, the backing source file is read lazily; that is, records are not read from the file until they are requested by the application. If multiple processes (not threads) are accessing a Recno database concurrently, and are either inserting or deleting records, the backing source file must be read in its entirety before more than a single process accesses the database, and only that process should specify the backing source file as part of the Db.open call. See the Db.DB_SNAPSHOT flag for more information. Reading and writing the backing source file specified by re_source cannot be transaction-protected because it involves filesystem operations that are not part of the Db transaction methodology. For this reason, if a temporary database is used to hold the records, it is possible to lose the contents of the re_source file, for example, if the system crashes at the right instant. If a file is used to hold the database, normal database recovery on that file can be used to prevent information loss, although it is still possible that the contents of re_source will be lost if the system crashes. The re_source file must already exist (but may be zero-length) when Db.open is called. It is not an error to specify a read-only re_source file when creating a database, nor is it an error to modify the resulting database. However, any attempt to write the changes to the backing source file using either the Db.sync or Db.close methods will fail, of course. Specify the Db.DB_NOSYNC flag to the Db.close method to stop it from attempting to write the changes to the backing file; instead, they will be silently discarded. For all of the previous reasons, the re_source field is generally used to specify databases that are read-only for Berkeley DB applications; and that are either generated on the fly by software tools or modified using a different mechanism -- for example, a text editor. The Db.set_re_source interface may be used only to configure Berkeley DB before the Db.open interface is called. The Db.set_re_source method throws an exception that encapsulates a non-zero error value on failure. The Db.set_re_source method may fail and throw an exception encapsulating a non-zero error for the following conditions: Called after Db.open was called. The Db.set_re_source method may fail and throw an exception for errors specified for other Berkeley DB and C library or system methods. If a catastrophic error has occurred, the Db.set_re_source method may fail and throw a DbRunRecoveryException, in which case all subsequent Berkeley DB calls will fail in the same way. Copyright Sleepycat Software
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00577.warc.gz
CC-MAIN-2023-40
3,498
15
http://mnurdin.com/category/business/page/2/
code
2018 has started off on a high note for us and we’re delighted to announce that Soding has been nominated for a Malaysia Country Finalist for the ASEAN Rice Bowl Startup Awards and we’re pretty excited about it. There is no easy way to determine how good their tech talent is especially in programming skills. It’s like finding a needle in haystack. Many software developers proclaim that they can code, but how good they are in programming? Only after they’ve hired, then we will know how their performance are. If the hired turn out to be a bad programmer, they gave us issues such as project delay nor technical debt which would cost us sum of money. According to Tony Hsieh of Zappos, the real cost of hiring a bad software developer cost that company more than $100 million.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999740.32/warc/CC-MAIN-20190624211359-20190624233359-00301.warc.gz
CC-MAIN-2019-26
787
2
https://crmtipoftheday.com/841/tip-841-mobile-client-metadata-is-corrupted-due-to-null-reference-issue/
code
Recently, I had experienced a significant failure with the Dynamics 365 for Tablets client. It had seemed to present itself out of the blue, without any real reasoning or trigger behind it. As we reviewed the errors presented via developer tools in Chrome while loading the tablet client in a browser, we saw a significant error related to the metadata sync. We also found when we attempted to Prepare Client Customizations for the solution, we received the following error message: As it turns out, the mobile client metadata was corrupted due to a null reference issue in a Word template. Document templates are tied to metadata of entities and attributes, which is unfortunately not checked for nor handled via exception by D365 when metadata generation takes place. Once we removed the corrupted template, this resolved the issue. Moral to the story: When you delete an attribute or entity, verify the commensurate changes are made to any Word or Excel Templates, else Mobile client will fail in a quite spectacular way! – Your friendly neighborhood CRMHobbit
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00527.warc.gz
CC-MAIN-2024-10
1,065
5
https://meetedison.com/forum/edware-graphical-programming/respond-to-ir-remote-button-press-and-button-lift-separately/
code
July 12, 2018 I’ve been building a Lego car using a remote control to drive and steer. I can’t work out however how to respond to the button press/lift from the remote control to start/stop actions on the Edison. The inbuilt IR control seems to be able to act this way — it continues to perform the programmed action while the button is down, and stops when it’s lifted. Is there any way to do this in EdWare or EdPy? August 24, 2015 I think the best way for you to learn how to program your car using the remotes will be to quickly read through our EdCrane tutorial. In the tutorial, it will run through how to program with both EdWare and EdPy. The key to the way we have written the code for the crane is to put the IR reading inside a while loop. July 12, 2018 Thanks for your reply and taking the time out to help. I’ve looked into both versions of the crane control and tested a minimal example of my own as well as both of the full versions. It appears that the program as written causes the motor to move for a short period before the motor stops, regardless of the button state on the remote. To move the motor more or less continuously takes consistent button presses. In contrast, the built in IR program allows the motor to continue running while a button is pressed and stop when the button is released. It is this second kind of behaviour that I’m trying to achieve. The Lego model we’ve built uses one motor for forwards/backwards, and the other for operating the rack and pinion. I have a working program in EdWare that reads the remote state and gets the motors rolling, using the buttons to speed up and slow down with different button presses. This is good for forwards/reverse motion, but for steering it would be better to have the motor continue to spin while the button is depressed and stop when it’s released.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655884012.26/warc/CC-MAIN-20200704042252-20200704072252-00404.warc.gz
CC-MAIN-2020-29
1,850
11
https://fxapi.co.uk/tag/twilio/
code
Whilst coding in Cambridge with the Raspberry Pi Foundation for the YRS Festival of Code, I was lucky enough to be able to glean some knowledge from Paul Hallet, who introduced me to Flask & Twilio: We take care of the messy telecom hardware and expose a globally available cloud API that developers can interact with to build intelligent and complex communications systems. As your app’s usage scales up or down, Twilio automatically scales with you. You only pay for what you use – no contracts, no shenanigans. My team didn’t actually use Twilio in the project, however, it did stick in my mind…
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549427766.28/warc/CC-MAIN-20170729112938-20170729132938-00129.warc.gz
CC-MAIN-2017-30
606
3
https://forums.developer.apple.com/message/127215
code
We are having the same issue since updating to XCode 7.3 (7D175) We've tried all the suggestions here and on StackOverflow (including the Try Again button!). Creating a new App ID Deleting and reinstalling provision profiles Manually editing Info.plist with the bundle identifier Fix Issue button Adding a GameCenter capability in XCode Re-launching XCode after each change Setting Team to None, then picking the Team when prompted Archive and export an adhoc build (we get: 'none of the valid provisioning profiles allowed the specified entitlements' error). Still no luck getting rid of this error. We are close to reverting back to XCode 7.2. Anybody have any suggestions? I was able to workaround this issue by creating new provisioning profiles of type "iOS Distribution" for each App-ID which is used in the app. For some reason profiles with a wildcard AppID don't work any longer. So I had to create one for the main App and another one for the embedded today widget. Is this supposed to be like this? Downgraded to 7.2.1 too, ALL working fine now. Quality control at Apple seems to be in the basement. It seems that every release brings new issues or breaks something that was stable before. This is not what we have come to expect, I hope that we don't have to get used to this. Perhaps this 'feature' caused the problem: - Accounts in Xcode preferences enables you to generate Developer IDs for enterprise developers. For information on the steps needed, see Creating Signing Identities in App Distribution Guide. It looks like other Profiling type functions broke too: e.g. Creation of AppGroups within Xcode.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945637.51/warc/CC-MAIN-20180422174026-20180422194026-00538.warc.gz
CC-MAIN-2018-17
1,621
23
https://apple.stackexchange.com/questions/380653/run-script-on-login-as-root-on-catalina
code
In this question, a response details that com.apple.loginwindow login hooks can be used to run script as root on user login. I have followed the instructions by using sudo defaults write com.apple.loginwindow LoginHook /Users/Shared/Test.sh except nothing is executed on login. My script makes use of a small background process and nothing else and works by typing it into my terminal so I am lead to believe that it simply isn't possible anymore. If this method (as it is already deprecated) no longer works, are there any method that currently work for running login scripts as root?
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335303.67/warc/CC-MAIN-20220929003121-20220929033121-00088.warc.gz
CC-MAIN-2022-40
585
6
https://www.i-programmer.info/news/82-heritage/12222-paul-allen-co-founder-of-microsoft-dies.html
code
|Paul Allen, Co-Founder of Microsoft, Dies |Written by Sue Gee |Tuesday, 16 October 2018 Paul Allen, who with Bill Gates brought BASIC to the world and founded Microsoft, has died at the age of 65. The news was shared in a tweet from Vulcan Inc, the company formed by Allen in 1986 to oversee his numerous philanthropic efforts and organizations: Vulcan issued a longer statement which included this timeline of his life which provides an outline of his many ventures and interests: Bill Gates also issued a statement which included: "I am heartbroken by the passing of one of my oldest and dearest friends, Paul Allen. From our early days together at Lakeside School, through our partnership in the creation of Microsoft, to some of our joint philanthropic projects over the years, Paul was a true partner and dear friend. Personal computing would not have existed without him." Current Microsoft CEO, Satya Nadella paid his tribute with a post on LinkedIn: "Paul Allen's contributions to our company, our industry and to our community are indispensable. As co-founder of Microsoft, in his own quiet and persistent way, he created magical products, experiences and institutions, and in doing so, he changed the world. I have learned so much from him – his inquisitiveness, curiosity and push for high standards is something that will continue to inspire me and all of us at Microsoft." As detailed in various articles on this site, the path that led to Microsoft started when Paul Allen met Bill Gates in the computer room of the school they both attended, Lakeside School in Seattle. Here they started to make money from their hobby, being paid to debug the operating system of the local PDP-10 timeshare, to computerize the school timetabling. They went on to build a microprocessor based machine to work out traffic census data and offer a data-processing service to their local authorities and this led to their first company, Traf-o-data. The event that was the real impetus to the formation of Microsoft in 1975 was the launch of the Altair 8800, announced to hobbyists when it featured on the cover of Popular Electronics magazine in early 1975. Quick to understand the potential of affordable hardware, Allen suggested to Gates that they work together to make a BASIC interpreter for it. When they contacted Ed Roberts, whose Albuquerque-based company Micro Instrumentation and Telemetry Systems (MITS) produced the Altair kits, they claimed to already have a version of BASIC, the language written by for the 8080 microprocessor and were ready to do business. The only part of the claim that was true was the part about being keen to do business. To produce the BASIC, Allen first had to write an 8080 simulator for the college PDP-10 while Gates coded the interpreter and tackle the difficult task of squeezing the language into 4KBytes with enough space left over to run a program. They also had to form a company. It was Paul Allen who came up with its name name - combining Micro(processor) and Soft(ware) but it was Bill Gates who was the senior partner - being designated President while Allen was Vice President. The product that established Microsoft was MS-DOS, which it contracted to supply for the IBM PC, and, in 1980, it was Allen who purchased the rights to "Quick and Dirty Operating System," or QDOS, from its developer Tim Paterson. Microsoft rebranded QDOS as MS-DOS and, at the same time as supplying it to IBM, reserved rights to it for Microsoft. In 1983, Allen stepped aside from day-to-day operations at Microsoft, although he remained on the company's board of directors until 2000. His relationship with Bill Gates and Steve Ballmer was, as he revealed in his 2011 autobiography "Idea Man" a source of tension and resentment, see Paul Allen on Bill Gates which includes footage from a televised interview marking the book's publication. As a philanthropist, Allen deployed the fortune he made from Microsoft over a wide range of endeavors, including the Allen Institute, founded in 2003 with the initial pursuit of understanding the brain, and since expanded into three divisions - the Allen Institute for Brain Science, the Allen Institute for Cell Science, and The Paul G. Allen Frontiers Group - dedicated to bio-science research. This was followed in 2013 with the Allen Institute for Artificial Intelligence, AI2, with the slogan "AI for the Common Good" and a mission to: contribute to humanity through high-impact AI research and engineering. This work will continue, as is made apparent by Vulcan CEO Bill Hilf, who as well as mourning the loss of Paul Allen notes in his statement that his company will work on furthering his mission. Rust Twice As Productive As C++ Google director of engineering, Lars Bergstrom, gave a talk at the recent Rust Nation UK conference and claimed that Rust was twice as productive as C++. Given how good Google is at C++, this is quite [ ... ] Master Large Language Model Ops New technology brings with it more career opportunities. You may never have imagined becoming an LLMOps consultant, but there's now a Coursera Specialization which provides preparation for this [ ... ] or email your comment to: email@example.com
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817158.8/warc/CC-MAIN-20240417142102-20240417172102-00437.warc.gz
CC-MAIN-2024-18
5,199
23
https://www.experts-exchange.com/questions/21876368/Portal-and-Relationship-Misery.html
code
I have 2 database containining Company Employee Records and another one which holds all the information for our Documents (this is the big one) In the document Database there are two tabels. The first one contains all the document information such as number and what employees have been assigned to it (full employee checklist from the other database) The second one is related through the document number and contains all the revision history records (so there are anywhere from 1 - 15+ records per document with revision level A,B,C and so on. (Remember that one?) On the other side, I have the employee records related with the assignments in the first database which is then related to the revisions right? So I've created a portal that will pull up all the revisions for documents that this person is assigned to listing the document number, levels, and date of revisions. The idea of this was to create a training list but obvisouly I cant change the date in the portal record. This would be something that I would like to be automatic somehow so if theres an employee with a start date that comes before the document revision date, then display the revision date. But if they start after, obviously they wern't trainied before they were hired so I would want it to display the hire date. I'm at the end of this one! I'm so close, but its always the final parts that I get stuck at. Hopefully this can be done, or I'm screwed.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864466.23/warc/CC-MAIN-20180521181133-20180521201133-00196.warc.gz
CC-MAIN-2018-22
1,432
7
https://gabors-data-analysis.com/gabors-raw/data-and-code/
code
Data and code Get the raw data and the cleaning codes that created the datasets used for analyis. R vs Python vs Stata Social scientists, especially economists like Stata for its power and sophisticated econometrics capabilities. It has a great interface, it is very easy to start doing analysis. It has a click and point user interface, too. How to set up for Stata? Social scientists, data scienctists, statisticans like R for its great mix of data managament, statitical, and vizualization capacities. It has a large array of machine learning or natural language processing tools, it is great for web scraping or creating dashboards. It has a neatly assembled set of libraries, called Tidyverse, which helps learning elementary tools fast. R is free an open source. How to set up for R? Python is the number one coding language for computer scientists and is widely used in data science applications from banking and finance to Industry of Things. Python is great for web scraping, building and maintaing databases, or all tasks of machine learning. Python is free an open source. How to set up for Python? Download code one by one from the Case studies page Download all the data Data-all - release 1.0 (2020-11-21) Download data one by one from the Datasets page
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00735.warc.gz
CC-MAIN-2023-50
1,267
10
https://www.slant.co/topics/532/~python-microframeworks
code
Dmitriy recommended Bottle. 4 months ago Oluwaseun recommended Flask. 5 months ago Nabashis recommended Flask. 7 months ago Bottle is a fast, simple and lightweight WSGI micro web-framework for Python. It is distributed as a single file module and has no dependencies other than the Python Standard Lib... Tornado is a scalable, non-blocking web server and web application framework. It was developed for use by FriendFeed, which was acquired by Facebook in 2009 and Tornado was open-...
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541950.13/warc/CC-MAIN-20161202170901-00188-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
487
5
https://emacs.stackexchange.com/questions/16440/make-includegraphics-and-texinputs-setting-for-images-work-together
code
.profile-file I have a setting like: If I try to include an image by using (TeX-insert-macro "includegraphics"), auctex is in the directory where my current latex file is by default. However I want to be it by default in the directory If I include then an image from this dir it gives includes the whole path. But this isn't desired since I have set the TEXINPUTSvariable. So how can I change this such that it only inserts the filename and not the whole (relative) path? As suggested by @giordano, setting LaTeX-includegraphics-read-file-TeX should make it work. However in this case the solution in https://emacs.stackexchange.com/a/14011/2323 doesn't work anymore. However I want both. Edit 2 Maybe one could create a custom helm source for inserting images, which is called when I want to insert an image via auctex (don't see how to bind this). Here is what I tried so far, but it doesn't work: (defun helm-image-select () (interactive) (helm :sources (helm-build-async-source "helm-image-select" :candidates-process (lambda () (start-process "find-images" nil "find" "/home/myuser/projects/images/" "-iname" helm-pattern)) ;; doesn't seem to work, in particular no fuzzy search... should also take all path's from TEXINPUTS as base. :action '(("insert-image" . insert-image-action) ) )) ) (defun insert-image-action (candidate) (insert (format "%s" (helm-get-selection))) ;; should return only the filename without the path ) As said above, I also don't know how to connect this to auctex (maybe alternatively, this could be executed if I expand a snipped for includegraphics). Another problem with the approach above shows up in the case I don't want to add a pictures from a path known by $TEXINPUTS. In particular in this case the path has to be insert such that latex can find the image.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987841291.79/warc/CC-MAIN-20191024040131-20191024063631-00514.warc.gz
CC-MAIN-2019-43
1,797
12
https://training.incf.org/search?f%5B0%5D=lesson_type%3A24&f%5B1%5D=topics%3A48&f%5B2%5D=topics%3A52&f%5B3%5D=topics%3A56&f%5B4%5D=topics%3A72&f%5B5%5D=topics%3A241&amp%3Bf%5B1%5D=topics%3A62&filter=
code
This lecture covers describing and characterizing an input-output relationship. Part 1 of 2 of a tutorial on statistical models for neural data Part 2 of 2 of a tutorial on statistical models for neural data. Introduction to stability analysis of neural models Oscillations and bursting Weakly coupled oscillators Continuation of coupled oscillators Firing rate models. Pattern generation in visual system hallucinations.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886706.29/warc/CC-MAIN-20200704201650-20200704231650-00022.warc.gz
CC-MAIN-2020-29
421
9
https://forum.sparkylinux.org/index.php?PHPSESSID=ubn8s4emtjkh4o969qa4jvktr6&action=printpage;topic=3906.0
code
I am on a live Version. On the left Top is the sparky Installer. When i go with the cusor in the Installer then i get langsamer but then nothing is happening? How doch i install More information please Which version - 4.6-dev20170307 (the calmares installer) or one of the the 4.5 versions and which verison? uefi or bios? lvm? Virtual or bare metal? Are you installing to an empty disk, installing over an existing linux install, or going to dual boot with windows? Does going through the menu at the bottom left make a difference? Not sure which Version ist in got. But as i mentioned when i press on the desktop sparky Installer Icon only the language side opens. When i then press my language nothing happed it is stuck at language.. >:( Installing Over an existing linux version.. When i use the sparky (advanced) Installer..it says, it lets you install the live System to your Hard drive as it is..does that mean just in english...? The second step of advanced installer asking about language to be chosen. The "as it is" means that it be installed wit the default desktop, means Openbox. And what about installing Sparkylinux 4.5 on windows 7 already installed ? because when i downloaded the ISO there is not way to execute the installation Thank You so much Do you have UEFI or bios. If UEFI the following is not about the sparky installer and not Sparky, but for basic background - https://jenkins.debian.net/userContent/installation-guide/installation-guide-amd64/en/ch03s06.html#bios-setup (which is for the testing version of Debian) you can glance at section 3.6.3 for some basic background on uefi. This source is very up to date as it is a crucial part of the new upcoming stable. and from Debian Wiki on UEFI (which is geared toward stable, while Sparky is based on Debian Testing) QuoteDual-booting systems currently installed using BIOS fallback boot Quite a number of early UEFI systems were shipped with a non-UEFI installation of Windows 7 pre-installed, and the firmware set up to attempt UEFI boot first and BIOS boot second. This worked fine for users, but the moment a new operating system was installed alongside that copy of Windows, it would be difficult/impossible to dual-boot it. debian-installer will now warn the user if it is booted in UEFI mode but can find it only non-UEFI existing OS installations. It gives them the option to switch the installer to non-UEFI mode from this point forwards so they don't break potential dual-boot setu I am guessing you have read Please review your bios or UEFI setting for you motherboard Please give more info about when in the install it failed and how if failed. Also how did you prepare the USB stick (if you used a USB stick).
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662625600.87/warc/CC-MAIN-20220526193923-20220526223923-00292.warc.gz
CC-MAIN-2022-21
2,704
23
https://publicistpaper.com/bitcoin-era-and-its-significance-in-the-cryptocurrency-market/
code
The introduction would provide an overview of Bitcoin Era and its significance in the cryptocurrency market. It would also discuss the rise in popularity of cryptocurrencies and their impact on the investment industry. Chapter 1: Understanding Bitcoin Era This chapter would delve deeper into what Bitcoin Era is and how it works. It would explain the concept of automated trading and how Bitcoin Era’s algorithms work to analyze the market and identify potentially profitable trades. Chapter 2: Benefits and Risks of Bitcoin Era This chapter would explore the advantages and disadvantages of using Bitcoin Era as an investment platform. It would cover topics such as market volatility, technical issues, and the potential for high returns. This chapter would provide a step-by-step guide on how to create an account on Bitcoin Era and start trading. It would also cover topics such as how to deposit funds, how to use the demo account, and how to manage risk while trading. Chapter 4: Trading Strategies for Bitcoin Era This chapter would provide an in-depth analysis of various trading strategies that can be used with Bitcoin Era. It would cover topics such as long and short trades, options trading, and the importance of monitoring the market. Chapter 5: Advanced Trading Techniques This chapter would delve into more advanced trading techniques for experienced traders. It would cover topics such as technical analysis, fundamental analysis, and using indicators to make informed trading decisions. his chapter would provide tips and tricks for maximizing profits while using Bitcoin Era. It would cover topics such as setting realistic profit targets, managing risk, and avoiding common pitfalls in cryptocurrency trading. Chapter 7: Legal and Regulatory Issues This chapter would discuss the legal and regulatory issues surrounding Bitcoin Era and other cryptocurrency trading platforms. It would cover topics such as tax implications, money laundering, and regulatory oversight. Chapter 8: Future of Bitcoin Era and Cryptocurrencies This chapter would provide an overview of the future of Bitcoin Era and the broader cryptocurrency market. It would cover topics such as emerging trends, potential regulatory changes, and the impact of technological advancements on the industry. The conclusion would summarize the key points covered in the article and provide final thoughts on investing in Bitcoin Era. It would also encourage readers to continue learning about cryptocurrencies and the investment opportunities they present. Overall, an article of this length would require a significant amount of research and analysis. However, it would provide readers with a comprehensive guide to investing in Bitcoin Era and navigating the volatile world of cryptocurrency trading.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00374.warc.gz
CC-MAIN-2023-23
2,783
17
https://www.elegantthemes.com/blog/resources/the-sublime-text-code-editor-an-in-depth-review
code
Code editors are the go-to tool for anyone looking to make more profound customizations in WordPress or dive deeper into web design and development. They can make the work much easier than standard text editors. The problem: There are loads of options, making it difficult to decide on the right tool. For that reason, we wanted to help you out by doing in-depth tests of some of the most popular code editors. A little while ago we started off with Atom. In this article we will continue with one of its competitors, the popular Sublime Text. If you want to know more about one of the most favorite code editors out there and what makes it stand out from the crowd, just keep on reading. - 1 Sublime Text – Setup and Overview - 2 Features and Benefits - 3 Anything That Could Be Improved? - 4 Sublime Text in a Nutshell Sublime Text – Setup and Overview Sublime can be downloaded from the official website. Version 3 is currently available in beta for both OS X, Windows and Ubuntu. There is also a portable version that can be easily run from a USB stick. You can download Sublime Text for free, however, officially it is not. After the evaluation period you are supposed to get a license for continued use. However, the download page itself states that there is no enforced time limit for evaluation which makes it appear more of a voluntary thing. If you do decide to get a license it will cost you $70. After picking your desired version, the download is done quickly. As already mentioned in the Atom review, Sublime is pretty small. The installation archive is a slim 8MB and after installation the program only amounts to 22MB and change. After installation, it’s time for the first startup. When you do, you see the following screen: As you can see, there is no intro, help screen or any such thing. You just jump right into main editor screen. From here, you can add a project to Sublime by picking File > Open Folder. When you do, the folder structure appears on the left. Picking any file from there opens it on the right so you can start editing. Files and folders can also be saved together as projects to quickly open them up again later. So far so standard, now let’s look at some of Sublime’s standout features. Features and Benefits Sublime has a lot of raving fans. The words “best code editor ever” are dropped regularly online. Let’s see why that is. Autocompletion, Syntax Highlight, Code Folding From the general design, Atom and Sublime Text are very similar. This is no surprise as many people think that Atom is actually based on Sublime. For that reason, it’s also no surprise that both come with code autocompletion and syntax highlight. Though in truth, probably no modern code editor worth its salt can do without. Sublime has native support for a few dozen programming languages and will color code elements appropriately (it even has several different color themes — more on that below). The code editor will even warn you of parsing errors in real time! In addition to that, Sublime comes with code autocompletion — including for user-created variables — and code folding. The latter makes large pieces of code more compact to view by hiding parts of it. While these are all pretty standard features, it’s still good to know that Sublime doesn’t skimp on the basics. Like Atom, Sublime Text can be fully customized via plugins. The quickly integrated Package Manager allows users to find, install, upgrade and remove plugins directly from inside the editor — usually with no restart required. Users can download packages from Github and BitBucket as well as PackageControl.io. The latter is Sublime’s own repository where the community behind the code editor publishes loads of plugins to enhance its capabilities. All in all, there are more than 3,800 packages available ordered by new, trending, recently updated, popular and other labels. With their help you can turn Sublime from a simple code editor into a full-fledged IDE and build exactly the type of development environment you need. There are some amazing packages available for Sublime Text. Instead of hunting through the repository yourself, take a look at our list of the top 10 Sublime Text packages. For example, you can add the ability to sync files on a remote FTP server, preview code written in Markdown and advanced sidebar controls. Like the WordPress plugin directory, packages include extensive information on their functionality, installation and usage including screenshots. The only downside: That information is not available inside Sublime Text itself, only on the website. On the other hand, the installation via Package Control is insanely fast and you can control the settings for all packages under Preferences > Package Settings. Themes are also available as addon packages. That is in addition to the 22 pre-installed themes Sublime offers out of the box. Each of them enables users to change the color scheme of their code at the touch of a button. However, in contrast to Atom the rest of the UI stays as is. Lightweight, Fast and Stable Something that quickly becomes apparent when using Sublime is how fast the program is. Built with C/C++ and Python, the code editor is very lightweight. In fact, when choosing it from the Windows start menu, it loads almost instantaneously. In contrast to that, Atom takes several seconds to appear on screen. This difference is also visible when handling large files. Sublime Text can do a lot more heavy lifting without running into problems. In my tests I had no problems at all and also couldn’t find any complaints about performance issues online. In fact, its stability is one of the most cited reasons people gave for preferring Sublime Text over other editors. Freezes and crashes seem to be few and far between. Another standout feature of Sublime is the powerful search functionality. Its regular search and replace function can look for regular expressions, make case sensitive searches or look for whole words. Plus, it lets you add search results to a buffer for later re-use. In addition to that, there is the Goto function. Upon choosing it, Sublime opens a search bar. When you start typing any file or directory name in your project or active folder, the editor will show fitting options lightning fast. The best part: when you move down the list, Sublime will automatically open a highlighted file in the background so you can see whether it’s the right one. When you have found it, a click or pressing enter will open the file in a new tab so you can start working on it right away. Finally, there’s the command palette. Everyone who is bad at remembering keyword shortcuts can open this collection of available commands, use fuzzy search to find what their are looking for and execute it without ever lifting their hands from the keyboard. Easy peasy. One of the most interesting features of Sublime editor is the ability to use several cursors at once. Effectively, this means that you can make the same edit in several places at the same time. For example, if you need to change the name of one variable across an entire file, you can select it once, have Sublime mark all other occurrences and then type in the new name for all of them at once. This is even more comfortable than using find and replace. The same feature can be used to reformat several lines of code at the same time. A useful example of this is creating an ordered or unordered list in HTML. Imagine writing <li> and </li> statements for all list items at once instead of copying and pasting them. Starting to see the benefit? Next up is the minimap. This is a small file overview in the upper right corner. It’s super useful to get an impression of how large your file is and also shows you current position while moving the scroll bar. You can even click right into the map to navigate to a certain place. It’s a little detail that really comes in handy especially for larger files. Finally, there is the ability to display text files in different ways. First, you can have several files ordered in tabs like in a browser window. That way, you may move and reorder them at will. Pretty standard, however, there is more. For example, you can display up to four files at once in form of a grid. In addition to that, Sublime also comes with other layout options like columns and rows as well as full-screen and distraction-free editing modes. WordPressers will feel right at home. Anything That Could Be Improved? Of course, Sublime has more features than the ones mentioned above. However, those are the ones that really stood out and make it an excellent code editor. Yet, there are also things that could be better, so let’s talk about that now. Not Always Beginner Friendly As good as Sublime is and as easy it is to get started, the editor is very much geared toward experienced users. That’s not bad in itself but sometimes can make it kind of intimidating for beginners. The place where this is most prevalent is the settings panel. When you open it, you access a text file that includes all the settings instead of a menu. Here, users can set different options to true or false and also override them in another file that is opened on the side. While everything is documented well, a UI solution would maybe have been the better option here. The same is true for package control, which is largely text based. In my personal opinion, Atom does a better job at this. However, I am also spoiled by WordPress’ way of handling plugin installation which is why I prefer Atom’s way of doing things. Since Sublime doesn’t have a large team behind it, development can be kind of slow. Bugfixes, new versions and advancements are less regular to arrive than with Atom. Case in point: the current version, Sublime Text 3, entered Beta status in the beginning of 2013. Now, at the end of 2016 it’s still not out of it. This also makes some people worried about the future of the editor. With only few developers, the project could die completely in case they are forced to abandon it. For that reason, there are some doubts about whether Sublime is future proof. Yet, so far there seems no need for that. Sublime Text in a Nutshell Sublime is one of the most popular code editors out there and for good reason. The program is lightning fast, stable and mature. It also has loads of really useful features and many delightful details. In addition to that, with its modular approach and extendability, Sublime Text can be anything for anyone. The editor is suitable for developers of different skill levels and disciplines. While overall the user interface is similar to Atom, Sublime feels a lot more streamlined and it’s clear that the editor’s developers put a lot of work into it. It only feels like it could use a bit of the WordPress/Atom approach and maybe add a few more people to its team. That way, progress would be faster and Sublime could more solidify itself in the field of code editors. However, even so, for anyone who works with code for living it’s definitely worth the investment. Now over to you. If you work with Sublime, what is your best tip to get the most out of it? Featured Image via NomadSoul / shutterstock.com
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00814.warc.gz
CC-MAIN-2023-50
11,242
60
http://www.gamedev.net/topic/621096-sdl-with-g-on-osx-lion/?forceDownload=1&_k=880ea6a14ea49e853634fbdc5015a024
code
Members - Reputation: 100 Posted 29 February 2012 - 06:18 AM Members - Reputation: 182 Posted 01 March 2012 - 02:18 PM If neither of these suggestions solve your problem, you will have to provide more information for anyone to be able to help you. You will have to explain how you are trying to compile your code and explain the errors you're getting. Author of Mac Game Programming and Xcode Tools Sensei Members - Reputation: 604 Posted 01 March 2012 - 07:57 PM
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00302-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
463
8
https://github.com/kubernetes/cloud-provider-vsphere/pull/253
code
Join GitHub today GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Sign up Controller manifest update to point to apps/v1 to replace deprecated extensions/v1beta1 #253 What this PR does / why we need it: Which issue this PR fixes (optional, in Special notes for your reviewer: As per the 1.16 release notes the api tree 'extensions/v1beta1' has been deprecated. The replacement is fully backwards supported through to 1.9 as detailed in https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/ Hi @davlloyd. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. [APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dvonthenen The full list of commands accepted by this bot can be found here. The pull request process is described here Needs approval from an approver in each of these files: Approvers can indicate their approval by writing
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601628.36/warc/CC-MAIN-20200121074002-20200121103002-00246.warc.gz
CC-MAIN-2020-05
1,155
17
https://github.com/RailsApps/learn-rails/
code
A Rails 5.1 example application to accompany the book Learn Ruby on Rails. The book introduces basic concepts of Rails development by showing the reader how to build an application that can be used for a typical small business website. You can build this application in only a few minutes using the Rails Composer tool. With the books, a complete beginner can create this application without any additional knowledge. The books explain all the code, introducing basic concepts of Rails application development and professional practices. There are two books. Book One does not contain code from the application and does not change often. Book Two contains a tutorial application and changes frequently. The most recent version of the book was written for Rails 5.1 and released July 3, 2017. Please make sure you have the newest version of the book (or the code examples may not work). The book version is shown on the title page. Get the book if you need the new version. This example application (here on GitHub) matches the code in Book Two. For recent changes, see: The example application is more than a learning exercise. The tutorial shows how to build a basic website, using practices recommended by experienced Rails developers. You’ll build a real-world Rails application that can be used by a typical small business. With knowledge of Rails, the website can be adapted and customized to your needs. Features include: - Home page - Navigation bar - “About” page - Contact page with “contact request” form - Mailing list sign-up form The application uses the high_voltage gem for the “About” page. Additional pages can easily be added. The high_voltage gem makes it easy to add pages with static content (text that doesn’t change) incorporating elements of a site-wide application layout such as header, navigation links, and footer. For example, using the high_voltage gem, you could add pages for: - Legal disclaimers The application home page contains a form that encourages a visitor to enter an email address to sign up for a mailing list. It can be used to collect email addresses for a newsletter or announcement mailings. The tutorial shows how to set up a MailChimp account and use the MailChimp API to add email addresses to a MailChimp list. The Contact page includes a “contact request” form. The contact form can be adapted for other purposes, such as an appointment request, or customized as a survey form. When the visitor submits the form, an email message goes to the site owner containing the contents of the form. The application does not require a database. No pages are generated using information from a database and no user-submitted data is saved to a database. However, the sqlite3 gem must be present in the Gemfile because Rails ActiveRecord is used for form validation. This is one in a series of Rails example apps and tutorials from the RailsApps Project. See a list of additional Rails examples, tutorials, and starter apps. Related example applications may be useful: - Foundation and Rails shows how to integrate Foundation - Bootstrap and Rails shows to integrate Bootstrap - OmniAuth and Rails uses OmniAuth for authentication - Devise and Rails uses Devise for authentication - Devise and Pundit and Rails uses Pundit for authorization The application includes a form that allows website visitors to “opt-in” to a mailing list. You’ll need a MailChimp account, which is free. MailChimp allows you to send up to 12,000 emails/month to a list of 2000 or fewer subscribers for free. There is no cost to set up an account. After you have set up a MailChimp account, create a new mailing list where you can collect email addresses of visitors who have asked to subscribe to a newsletter. The MailChimp “Lists” page has a button for “Create List.” The list name and other details are up to you. With MailChimp, you can send a welcome message automatically when the visitor signs up for the mailing list. It’s a bit difficult to find the MailChimp option to create a welcome message. Strangely, MailChimp considers a welcome message a “form.” Here’s how to find it. On the MailChimp “Lists” page, click the “down arrow” for a menu and click “Signup forms.” Then click “Link to a form.” On the “Create Forms” page, there is a dropdown list of “Forms & Response Emails.” The gray box shows “Signup form.” Click the down arrow. Select the menu item named “Final ‘Welcome’ Email” and you’ll be able to create a welcome message. To send email from the application, you will need a SendGrid account. We provide instructions to deploy the tutorial application to Heroku which provides Rails application hosting. It costs nothing to set up a Heroku account and deploy as many applications as you want. To deploy an app to Heroku, you must have a Heroku account. Visit Heroku to set up an account. Before generating your application, you will need: - The Ruby language – version 2.4.1 - The Rails gem – version 5.1 See the article Installing Rails for instructions about setting up Rails and your development environment. You have several options for getting the code on your own machine. You can fork, clone, or generate. If you’d like to add features (or bug fixes) to improve the example application, you can fork the GitHub repo and make pull requests. Your code contributions are welcome! If you want to copy and customize the app with changes that are only useful for your own project, you can clone the GitHub repo. You’ll need to search-and-replace the project name throughout the application. You probably should generate the app instead (see below). To clone: $ git clone git://github.com/RailsApps/learn-rails.git If you want to use the project as a starter application, use the Rails Composer tool to generate a new version of the example app. You’ll be able to give it your own project name when you generate the app. Generating the application gives you additional options. To build the example application, Rails 5.1 must be installed in your development environment. Run the command: $ rails new learn-rails -m https://raw.github.com/RailsApps/rails-composer/master/composer.rb $ character indicates a shell prompt; don’t include it when you run the command. -m option loads an application template that is hosted on GitHub. This creates a new Rails app named learn-rails on your computer. You can use a different name if you wish. You’ll see a prompt: option Build a starter application? 1) Build a RailsApps example application 2) Contributed applications 3) Custom application Enter “1” to select Build a RailsApps example application. You’ll see a prompt: option Choose a starter application. 1) learn-rails 2) rails-bootstrap 3) rails-foundation 4) rails-mailinglist-activejob 5) rails-omniauth 6) rails-devise 7) rails-devise-roles 8) rails-devise-pundit 9) rails-signup-download 10) rails-stripe-checkout Choose learn-rails. The Rails Composer tool may give you other options (other applications may have been added since these notes were written). If you get an error “OpenSSL certificate verify failed” or “Gem::RemoteFetcher::FetchError: SSL_connect” see the article OpenSSL errors and Rails. If you’re storing the app in a GitHub repository, please edit the README files to add a description of the app and your contact info. If you don’t change the README, people will think I am the author of your version of the application. See the article Installing Rails to make sure your development environment is prepared properly. I recommend using rvm, the Ruby Version Manager, to create a project-specific gemset for the application. If you generate the application with the Rails Composer tool, you can create a project-specific gemset. Here are the gems used by the application: - foundation-rails – front-end framework - gibbon – access to the MailChimp API - high_voltage – for static pages like “about” - simple_form – forms made easy These gems make development easier: - better_errors – helps when things go wrong - quiet_assets – suppresses distracting messages in the log - rails_layout – generates files for an application layout If you used the Rails Composer tool to generate the example app, the application template script has already run the bundle install command. If not, you should run the bundle install command to install the required gems on your computer: $ bundle install You can check which gems are installed on your computer with: $ gem list Keep in mind that you have installed these gems locally. When you deploy the app to another server, the same gems (and versions) must be available. To consolidate configuration settings in a single location, we store credentials in the config/secrets.yml file. To keep your credentials private, use Unix environment variables to set your credentials. See the article Rails Environment Variables for more information. Add your credentials to the file config/secrets.yml: # Make sure the secrets in this file are kept private # if you're sharing your code publicly. development: email_provider_username: <%= ENV["SENDGRID_USERNAME"] %> email_provider_password: <%= ENV["SENDGRID_PASSWORD"] %> domain_name: example.com mailchimp_api_key: <%= ENV["MAILCHIMP_API_KEY"] %> mailchimp_list_id: <%= ENV["MAILCHIMP_LIST_ID"] %> owner_email: <%= ENV["OWNER_EMAIL"] %> secret_key_base: very_long_random_string test: secret_key_base: very_long_random_string # Do not keep production secrets in the repository, # instead read values from the environment. production: email_provider_username: <%= ENV["SENDGRID_USERNAME"] %> email_provider_password: <%= ENV["SENDGRID_PASSWORD"] %> domain_name: <%= ENV["DOMAIN_NAME"] %> mailchimp_api_key: <%= ENV["MAILCHIMP_API_KEY"] %> mailchimp_list_id: <%= ENV["MAILCHIMP_LIST_ID"] %> owner_email: <%= ENV["OWNER_EMAIL"] %> secret_key_base: <%= ENV["SECRET_KEY_BASE"] %> All configuration values in the config/secrets.yml file are available anywhere in the application as variables. For example, Rails.application.secrets.email_provider_username will return the string set in the Unix environment variable To add an environment variable for the MailChimp API key, Log in to MailChimp to get your API key. Click your name at the top of the navigation menu, then click “Account Settings.” Click “Extras,” then “API keys.” To find the MailChimp list ID, you must have already created a MailChimp mailing list. On the MailChimp “Lists” page, click the “down arrow” for a menu and click “Settings.” At the bottom of the “List Settings” page, you’ll find the unique ID for the mailing list. domain_name is used for sending email. You can use example.com in development. If you already have a custom domain name you’ll use when you deploy the application, you can set domain_name. If you deploy the application to Heroku, you’ll set domain_name with the unique name you’ve given your application on Heroku. You’ll have to wait until you deploy to know the name you’ll use on Heroku. You’ll send email messages to the owner_email address when a visitor submits a contact request form. Set it with an email address where you receive mail. If you don’t want to use Unix environment variables, you can set each value directly in the config/secrets.yml file. The file must be in your git repository when you deploy to Heroku. However, you shouldn’t save the file to a public GitHub repository where other people can see your credentials. You can check that your application runs properly by entering the command: $ rails server To see your application in action, open a browser window and navigate to http://localhost:3000/. You should see a home page with a placeholder photo and the “sign up” form. Enter your email address and click the “sign up” button. You should see the page redisplay with an acknowledgment message. Try entering an invalid email address such as “me@foo”, or click the submit button without entering an email address, and you should see an error message. You’ll have to log in to MailChimp and check your mailing list to see if the new email address was added successfully. You should be able to click the navigation links for “About” or “Contact” and see those pages. Submitting the form on the “Contact” page should send an email message to the site owner’s address. Stop the server with Control-C. If you test the app by starting the web server and then leave the server running while you install new gems, you’ll have to restart the server to see any changes. The same is true for changes to configuration files in the config folder. This can be confusing to new Rails developers because you can change files in the app folders without restarting the server. Stop the server each time after testing and you will avoid this issue. Heroku provides low cost, easily configured Rails application hosting. You can deploy from the command line. If you’ve set configuration values in the config/secrets.yml file, you’ll need to set them as Heroku environment variables. You can set Heroku environment variables directly with heroku config:add. For example: $ heroku config:add SENDGRID_USERNAME='example' SENDGRID_PASSWORD='secret' $ heroku config:add MAILCHIMP_API_KEY='my-key' MAILCHIMP_LIST_ID='mylistid' $ heroku config:add firstname.lastname@example.org' DOMAIN_NAME='myapp.herokuapp.com' Complete Heroku deployment with: $ git push heroku master See the Tutorial for Rails on Heroku for details. Are you stuck with code that won’t work? Stack Overflow provides a question-and-answer forum for readers of the book. Use the tag “railsapps”. Found a bug in the tutorial application? Please create an issue on GitHub. The book Learn Ruby on Rails provides additional documentation. Please create a GitHub issue if you identify any problems or have suggestions for improvements. If you make improvements to this application, please share with others. Send the author a message, create an issue, or fork the project and submit a pull request. If you add functionality to this application, create an alternative implementation, or build an application that is similar, please contact me and I’ll add a note to the README so that others can find your work. Daniel Kehoe implemented the application and wrote the tutorial. Is the app useful to you? Follow the project on Twitter: @rails_apps and tweet some praise. I’d love to know you were helped out by what I’ve put together. Copyright ©2013-15 Daniel Kehoe
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817128.7/warc/CC-MAIN-20240417013540-20240417043540-00100.warc.gz
CC-MAIN-2024-18
14,583
113
http://www.fixya.com/support/t391386-hi_there
code
You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf the Web while you're sitting on your couch or in your yard. Plus, it's easier to install than you think. There are 4 steps to creating a wireless network: Choose your wireless equipment Connect your wireless router Configure your wireless router Connect your computers For Windows XP users, Windows XP Service Pack 2 is not required for wireless networking, but it does make things much easier. Service Pack 2 also helps protect you against hackers, worms, and other Internet intruders. Connect your computers computer does not have wireless network support built in, plug your network adapter into your USB port, and place the antenna on top of your computer (in the case of a desktop computer), or insert the network adapter into an empty PC card slot (in the case of a laptop). Windows XP will automatically detect the new adapter, and may prompt you to insert the CD that came with your adapter. The on-screen instructions will guide you through the configuration process.Note: The steps below only apply if you're using Windows XP Service Pack 2. If you're running Windows XP and you don't have Service Pack 2 yet, plug your computer into your wireless router and download and install Windows XP Service Pack 2 Windows XP should show an icon with a notification that says it has found a wireless network. Follow these steps to connect your computer to your wireless network: Right-click the wireless network icon in the lower-right corner of your screen, and then click View Available Wireless Networks If you run into any problems, consult the documentation that came with your network adapter. Don't be afraid to call their tech support. Wireless Network Connection window should appear and you should see your wireless network listed with the network name you chose. If you don't see your network, click Refresh network list in the upper-left corner. Click your network, and then click Connect in the lower-right corner. Windows XP prompts you to enter a key. Type the encryption key that you wrote down earlier in both the Network key and Confirm network key boxes, and then click Connect XP will show its progress as it connects to your network. After you're connected, you can now close the Wireless Network Connection window. If the Wireless Network Connection window continues to show Acquiring Network Address , you may have mistyped the encryption key.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159470.54/warc/CC-MAIN-20180923134314-20180923154714-00256.warc.gz
CC-MAIN-2018-39
2,477
41
http://toursidekicks.com/4k-the-newest-public-market-in-carcar-city-cebu-philippines/
code
The Heritage City of Cebu, Carcar is one of the progressive towns in south Cebu, Philippines, and the new public market only shows the invigorating economy of the city. The new public market is located at the back of the new Carcar City Hall. It is a two-storey market which has two buildings for its wet and dry sections. The area is well ventilated and it also has a food court with industrial fans. If you want to find the famous Carcar chicharon, lechon, and ampao, you can visit the new public market and buy those delectable delicacies worth tasting. #carcarcity #cebu #walkingtour 📅 Recording Date: June 9, 2021 ▶️ Please do subscribe by clicking here: https://www.youtube.com/goodvibestravel?sub_confirmation=1 🔗 Let’s Connect: Join the Community: Support the channel:
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585201.94/warc/CC-MAIN-20211018093606-20211018123606-00218.warc.gz
CC-MAIN-2021-43
788
9
https://www.designernews.co/stories/104400-ask-dn-what-am-i-missing-about-figma
code
I keep seeing people reference Figma as the better alternative whenever a discussion pops up about some or other feature being missing from one tool or other. Especially whenever there's an update to Sketch or Adobe XD, for example. The problem is that whenever I have tried to give Figma a chance, I always end up getting stuck on the most basic things. I feel like I don't know how the software works at all, but then again it's not very much different to any other design software in terms of how it's laid out. So from my perspective Sketch with auto-layout plugin runs circles around Figma when it comes to being able to build out interactions and different states, etc. To give you an example of some basic things I'm talking about, if I want to create a button with states Default, Hover, Disabled, etc, in Sketch I would just make the default variant, duplicate the artboard and make the changes and I would be done in a minute or two. In Figma, there is no obvious way to duplicate a component, so I'd have to ungroup the component and make the changes, and then make it into a component again. Then when I want to actually switch the state in a design, I again have no obvious way of switching the state. So I'd end up deleting the button and adding it again from the assets panel. In Sketch, I can even see the previews of different states when switching between them in a Symbol. And with auto-layout I can quickly re-arrange things and have them update with no effort whatsoever. These basic things seem a struggle for me in Figma and I don't know why. Am I just missing something? Does this software just not click with the way I think or something? Do I need to unlearn some behaviors I'm used to from Sketch? Is Figma just overrated?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662627464.60/warc/CC-MAIN-20220526224902-20220527014902-00766.warc.gz
CC-MAIN-2022-21
1,749
5
http://star.mit.edu/cluster/mlarchives/1673.html
code
When I use Starcluster, I got the following error message when I tried to use "starcluster loadbalance" >>> Loading full job history *** WARNING - Failed to retrieve stats (5/5): Traceback (most recent call last): line 515, in get_stats self.stat = self._get_stats() line 493, in _get_stats qacct = '\n'.join(master.ssh.execute(qacct_cmd)) line 538, in execute msg, command, exit_status, out_str) RemoteCommandFailed: remote command 'source /etc/profile && qacct -j -b 201302232051' failed with status 1: no jobs running since startup /opt/sge6/default/common/accounting: No such file or directory *** WARNING - Retrying in 60s !!! ERROR - Failed to retrieve SGE stats after trying 5 times, !!! ERROR - exiting... And I've tried qacct -j -b 201302232046 on masternode and also got the error message of "/opt/sge6/default/common/accounting: No such file or Can anyone give me some hint to fix it? Thanks! 李凯 ( Kai Li ) Received on Sat Feb 23 2013 - 19:32:01 EST
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202484.31/warc/CC-MAIN-20190321030925-20190321052925-00312.warc.gz
CC-MAIN-2019-13
964
23
https://www.invasivespartnership.org/events/membership-meeting-for-the-south-central-invasive-partnership/
code
Membership Meeting for the South Central Invasive Partnership Hello CISMA friends, We are all wrapping up our year and looking forward to the next. With that in mind we are having our virtual membership meeting on December 1st from 6 – 7 pm. Something of note for all our members will be Matt Wallrath’s presentation on the knotweed genetic study he has been working on in all of our areas. It will also be a great chance to connect with the CISMAs surrounding you, and to share needs, concerns, and collaborations for the coming year. - Knotweed Report (Matt Wallrath) - Set Next Meeting Date - Wrap Up/Open Discussion Mark your calendars and join us from the comfort of your own home on December 1. A link for the meeting will be sent closer to the meeting date. We look forward to seeing you there!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508977.50/warc/CC-MAIN-20230925115505-20230925145505-00784.warc.gz
CC-MAIN-2023-40
805
7
https://makezine.com/article/home/fun-games/snagging-textures-with-gl/
code
Second Life hacks is moving along, but here’s a nice hack that just popped up to check out – “If you want to grab textures out of Second Life to see how people have made those neat trees, the stunning clothes, or maybe an old texture you lost, GLIntercept is the tool for the job. GLIntercept is a program that grabs OpenGL information directly from memory. It does a lot more than just capturing textures; with it you can extract prim information, avatars, and textures. This information can be exported into other 3D programs, such as Maya. This hack, however, is just about the images.” Thanks Brian! Link.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00058.warc.gz
CC-MAIN-2023-40
617
1
http://pinpoint.microsoft.com/en-IE/services/Microsoft-SQL-Data-Services-Delivered-by-Ergo-12884948463-4295479230?LocId=-1
code
Microsoft SQL Data Services Delivered by Ergo Service Type:Consulting, Professional Service Business Need:Data Analytics, Reporting, Business Intelligence (BI) Works With:Microsoft Dynamics CRM 2011, Microsoft Exchange Server 2010, Microsoft Lync 2010, Microsoft SharePoint Server 2010, Operations Manager Industry Focus:General - Applicable to All With roots in Microsoft development that go back a decade, Ergo has the skills to drive value from this complete and integrated platform. Why Ergo for SQL Data Services? Experience: Ergo can help you realise these benefits because SQL has always been at the heart of our technology offerings. We have implemented many mission critical lines of business solutions that scale to thousands of users. Our experienced team cover the entire Microsoft application platform stack from BizTalk, CRM Dynamics, SharePoint, to Exchange, Lync and System Center Operations Manager. Each platform relies on SQL as its relational store so whatever your application landscape we have the proven capability to support and implement those technologies. Training and Certification: Because continuous training is an integral part of Ergo’s approach, our SQL consultants are certified in their respective areas of expertise. Ergo has a Microsoft Certified Master in SQL, one of only a handful in Ireland. Our clients have the reassurance of knowing that they are working with the very best and most qualified people who have a deep understanding of the technology. Infrastructure to Application: Ergo are unique in our offering in the SQL space providing an infrastructure upwards service. From design, performance tuning, development, testing and management we can provide the end-to-end service to ensure your SQL estate is built from the ground upwards for scale, reliability and security. Microsoft SQL Data Services Delivered by Ergo has not been reviewed by any customers. The views and opinions submitted and expressed here are not those of Microsoft.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776434099.83/warc/CC-MAIN-20140707234034-00065-ip-10-180-212-248.ec2.internal.warc.gz
CC-MAIN-2014-23
1,988
13
https://techutils.in/blog/2020/09/03/stackbounty-linux-kernel-how-to-make-linux-kernel-execute-files-open-for-writing-or-fixing-the-text-file-busy-error/
code
I use NFS to edit files on servers. When these files are scripts with shebang lines, and I execute them, I get the "text file busy" error for about 5 seconds after I save each time. The same problem is reproducible if a file is opened in vi (on 4.19 kernel), as follows: :>test.sh chmod +x test.sh vi test.sh # Ctrl-Z to suspend vi ./test.sh # text file busy: ./test.sh On 5.7 kernel the above vi example doesn’t produce the error but NFS write from 5.7 to 5.7 system still yields the "text file busy" error for 5 seconds after each save. Per https://stackoverflow.com/questions/16764946/what-generates-the-text-file-busy-message-in-unix the error can be worked around by explicitly invoking the binary that runs the script: I believe I can then write a script, call it e, that will open the path given by the argument, see if the file begins with the shebang, if so parse the shebang line and invoke the binary in the shebang manually: But, this begs the question: what am I paying my operating system for? How can I configure Linux to execute files open for writing? I grepped the 5.7 kernel source for ETXTBUSY and it produced no hits. Alternatively, as a less universal workaround, how can I make it so that writes over NFS immediately close the file being written instead of keeping it open for ~5 seconds? The issue with vi (nvi, to be more precise), per a comment, is this one which is fixed in 1.81.6-16 on Debian (my 4.19 system has 1.81.6-15 and 5.7 system has 1.81.6-16). I would still like to figure out how to make NFS saves not produce the text file busy error.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359497.20/warc/CC-MAIN-20210227204637-20210227234637-00049.warc.gz
CC-MAIN-2021-10
1,577
13
https://www.taskforceelite.com/files/file/6-domain2ipzip/
code
Domain2IP is a simple application that allows users to type in a domain and get the IP address. While it has non-TFE uses, as the server tool does not support domains at this time, this was written with admins in mind who have received a domain name for access to the server tool. Hosts with a dynamic IP can use providers like no-ip.com to create a custom domain that points to the TFE server tool's IP. Admins with the domain can retrieve the IP when ever they need to should the IP change. Application can be configured to remember the last domain entered in, as well as copying the IP to the clipboard automatically. This only works if the domain returns 1 IP. If more then 1 IP is found, all IP's are displayed. Please note: When running for the first time, Windows 10 Smart Screen will pop up a message indicating it has stopped the application from running. You need to click "More Info" and then Run Anyway.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989637.86/warc/CC-MAIN-20210518125638-20210518155638-00537.warc.gz
CC-MAIN-2021-21
915
5
https://fryzjer-kosmetyczka-salon.pl/software-design2xe/exact-and-approximate-controllability-for-distributed-parameter-systems-1850.html
code
|About the Book| The behaviour of systems occurring in real life is often modelled by partial differential equations. This book investigates how a user or observer can influence the behaviour of such systems mathematically and computationally. A thorough mathematical analysis of controllability problems is combined with a detailed investigation of methods used to solve them numerically, these methods being validated by the results of numerical experiments. In Part I of the book the authors discuss the mathematics and numerics relating to the controllability of systems modelled by linear and non-linear diffusion equations- Part II is dedicated to the controllability of vibrating systems, typical ones being those modelled by linear wave equations- finally, Part III covers flow control for systems governed by the Navier-Stokes equations modelling incompressible viscous flow. The book is accessible to graduate students in applied and computational mathematics, engineering and physics- it will also be of use to more advanced practitioners.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371830894.88/warc/CC-MAIN-20200409055849-20200409090349-00292.warc.gz
CC-MAIN-2020-16
1,050
2
https://akawolf.org/documentation/sdk/GUID-B144EAB9-53AB-579B-9E12-B16518E4FC01.html
code
Networking Services Guide Networking Services provides a standard framework for accessing network services and actual implementations of network protocols. The components of the Networking Services are closely related to the framework provided by the Communications Framework module. This collection is a set of plugins to the Sockets Server. The plugins implement network protocols. The network protcocols can be accessed through a sockets type interface. Network Security is the set of components that provide security protocols for an IP connection. This section describes the TCP/IP Utilities collection of components, which provides libraries used by TCP/IPv4/v6 PRT for the DNS and DHCP protocols. Copyright ©2010 Nokia Corporation and/or its subsidiary(-ies). reserved. Unless otherwise stated, these materials are provided under the terms of the Eclipse Public License
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583835626.56/warc/CC-MAIN-20190122095409-20190122121409-00156.warc.gz
CC-MAIN-2019-04
877
7
https://jira.reactos.org/browse/CORE-5420
code
Load an application that requires a missing Dll (for instance IrfanView 4.28 Setup which needs MFC42.DLL). The error message will be truncated to something like "This application has failed to start because MC2D". (Possibly, but probably not, related to win32csr.dll's CsrpFormatMessages function calls StringCbPrintfW with %hs in the format string in this case to create this message. The underlying _vsnwprintf function relies on mbtowc, which is implemented incorrectly using RtlMultiByteToUnicodeN (incompatible return values) in lib\sdk\crt\string\mbstowcs_nt.c and thus causes it to skip characters. I'll be looking for a fix later; unless someone else has an idea first, of course
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655888561.21/warc/CC-MAIN-20200705184325-20200705214325-00020.warc.gz
CC-MAIN-2020-29
687
5
https://firelizzard.com/me/
code
I am a programmer. I am driven by the joy of making a difference in people's lives. I love challenges, and I love learning new things. I am voraciously curious about (almost) anything I don't yet understand. If you are interested in what I've done, check out my portfolio or my GitLab account. If you are interested in my work history or skills, check those out. If you want to know what people have said about me, you can find that here.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474853.43/warc/CC-MAIN-20240229202522-20240229232522-00263.warc.gz
CC-MAIN-2024-10
438
2
http://darrenburnhill.com/system-restore/system-restore-points.html
code
Start my free, unlimited access. I'm a big fan of System Restore (although I realize others may not be) and it has resolved some sticky issues for me over the years and versions of Windows. You can give this point a name – as we have done in the example below – making it easier to identify later. Snapshots of the boot volume created by System Restore running on Windows 8 may be deleted if the snapshot is subsequently exposed by an earlier version of Windows. Check This Out The oldest restore point listed is the furthest back you can possibly restore Windows to. With your chosen restore point selected, tap or click the Next > button. Confirm the restore point you Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization. For example, if you install a device driver that makes your computer unstable, you’ll want to uninstall that driver. Get geeky trivia, fun facts, and much more. https://support.microsoft.com/en-us/help/17127/windows-back-up-restore Microsoft. Check out that linked how-to if this is your first time, or just search for it from the Windows 10 Cortana/Search box or the Windows 8/8.1 Charms Bar.Tip: We're trying to Nice catch! @WhitsonGordon: Thanks, boss! @donald_e_flood: In the last paragraph, we talked about using the reset tool and also the new refresh tool. I'm certainly not an ace geek, so I appreciate your adding my input regarding the bit about safe mode to your article - its a first for me and I'm honored This email address doesn’t appear to be valid. By creating a restore point, you can save the state of the operating system and your own data so that if future changes cause a problem, you can restore the system System Restore Vista See What Version of Windows Do I Have? Archived from the original on 15 January 2008. "Windows XP System Restore". System Restore Windows 8 No problem! On NTFS volumes, the Restore Points are protected using ACLs. https://support.microsoft.com/en-us/help/17127/windows-back-up-restore It is not possible to create a permanent restore point. How Does Using System Restore Affect My Personal Files? System Restore Windows 7 From Boot Apps that you uninstalled after making that restore point will get restored, but with a very big caveat. RELATED ARTICLESHow To Boot Into Safe Mode On Windows 8 or 10 (The Easy Way)How to Use the Advanced Startup Options to Fix Your Windows 8 or 10 PC If Windows Privacy Please create a username to comment. Anybody ever encounter this ?October 4, 2016 No question, system restore is a lifesaver, in XP too. https://en.wikipedia.org/wiki/System_Restore Select ‘Turn off System Restore’ and click Apply, then Yes. Windows System Restore Windows 10 Depending on your perspective, this is both a positive and negative feature. System Restore Xp for a lot more discussion on restore points and how they work.System Restore can also be started in any version of Windows by executing rstrui.exe, which might be helpful in certain Restore Point StorageRestore points can only occupy so much space on a hard drive, the details of which vary greatly between versions of Windows: Windows 7: On drives of 64 GB http://darrenburnhill.com/system-restore/system-restore-not-saving.html If Windows creates a new restore point every day, and you tell it on Friday to restore back to Monday, it must successfully restore the points from Thursday, Wednesday and Tuesday Microsoft recommends that if a user is unsure as to whether certain files will be modified by a rollback, they should keep those files under My Documents. When a rollback is question.Important: If you're running System Restore from Safe Mode, please know that the changes it makes to your computer will not be reversible. System Restore Command See How To Create a Restore Point [Microsoft.com] for instructions.What's In a Restore PointAll necessary information to return the computer to the current state is included in a restore point. Microsoft Corporation. ^ "How restore points and other recovery features in Windows Vista are affected when you dual-boot with Windows XP". RELATED ARTICLEWhat’s the Best Antivirus for Windows 10? (Is Windows Defender Good Enough?) System Restore is not a good solution for removing viruses or other malware. this contact form Click the System Restore tab. To make sure System Restore is turned on-and to enable it for specific drives-hit Start, type "restore," and then click "Create a restore point." Don't worry. Restore Windows 7 To Factory Settings Support (3.8 ed.). The one you need is most likely already selected. I can create manual restore point a number of time (giving them a distinct name),the points are created correctly and are available if I ask to restore during the same session, Saved my butt countless times. There is one caveat however - When run in safe mode, system restore does not create an "undo" point prior to running the operation - however that's never been a problem System Restore Windows 7 Not Working Add My Comment Register Login Forgot your password? Forgot your password? Automation ... When you restore your PC to an earlier restore point, any apps you installed after that point will get uninstalled. navigate here When you run the System Restore utility, it displays a calendar that lists the restore points created (every day that your computer is used will have at least one restore point If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948029.93/warc/CC-MAIN-20180425232612-20180426012612-00611.warc.gz
CC-MAIN-2018-17
5,527
13
https://www.reddit.com/r/DnD/comments/18dvsr/where_are_all_the_dwarf_women/
code
My girlfriend decided to start playing, and she's in the process of building a dwarf warlord (at least that's what she's making now, but the class might change). Anyway I've been searching for a minifigure she could use, and the more I look, the more I realize that there aren't any minis of dwarf women! Pretty much every other player race has at least one female mini... why didn't WoTC make any female dwarves? Anyway, if anybody on here knows where I can get a female dwarf mini (preferably one that I don't have to paint), please let me know. EDIT: I ended up finding some dwarf women figures, and they're in the mail. Thanks for your help!
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117874.26/warc/CC-MAIN-20170823055231-20170823075231-00306.warc.gz
CC-MAIN-2017-34
645
3
https://docs.microsoft.com/en-us/previous-versions/visualstudio/design-tools/expression-studio-2/cc294517(v=expression.10)?redirectedfrom=MSDN
code
Convert bitmapped images to paths Microsoft Expression Design has a built-in auto trace feature to convert bitmapped images into vector paths. Converting an image to paths To convert a bitmapped image to paths Select an image object on your page. On the Object menu, point to Image, and then click Auto Trace Image. In the Auto Trace Image dialog box, set the auto trace parameters. These include the following: Number of Colors Type or select a value from the list for the number of colors that Expression Design should use in the final vector artwork. Pre-filtering Select a value from the Pre-filtering drop-down list for the amount of smoothing (or blurring) that should be applied to the image before it is converted to vector paths. The higher the value, the more the bitmapped image will be smoothed. If you select None, the image will not be blurred at all, and the result will often contain sharper edges. Tightness of fit Select how tightly you want the vector objects to fit to the original bitmapped image (from Very loose to Verytight). If the fit is set to be looser, the resulting paths will have fewer nodes, and fewer details will be retained from the bitmapped image. To convert the image, click OK. The result is a group of vector objects positioned on top of the original bitmapped image. If you have to work with individual objects in the group, use the Group Select tool or, on the Arrange menu, click Ungroup. The original image (left) and the auto traced image (right). Several of the vector shapes in the auto traced version have been selected.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540491491.18/warc/CC-MAIN-20191206222837-20191207010837-00329.warc.gz
CC-MAIN-2019-51
1,569
13
https://castbox.fm/episode/Ep.-006%3A-Jason-Kirton---Building-Uber-for-Delivering-Packages-at-Dispatch-id2733668-id276729275?country=us
code
Ep. 006: Jason Kirton - Building Uber for Delivering Packages at Dispatch In today's episode, Jan interviews Jason Kirton who's the Director of Engineering at Dispatch, which is a scale-up that enables businesses to order a courier directly from the driver. We're going to discuss why Jason joined Dispatch, how he thinks about outsourcing software development and organizing his teams in a scale-up mode, and how did COVID-19 impact their industry. Visit www.cleevio.com if you're interested to build a digital product.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039490226.78/warc/CC-MAIN-20210420183658-20210420213658-00216.warc.gz
CC-MAIN-2021-17
520
4
http://frapbot.kohze.com
code
A new open source FRAP application. Frapbot has all features found in common FRAP software and more - online and all at the same place. We make sure that every version is stored to reproduce your old results at any time. At the same time, we can apply changes and bug fixes within minutes for everyone without downloading new software or dependencies. The source code is written in R and can easily be modified for your experimental needs.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00875.warc.gz
CC-MAIN-2024-18
439
5
http://jenson.in/dicts_mal.php?word=terrible&submit=1
code
Adapted or likely to excite terror, awe, or dread; dreadful; formidable. - Causing great fear or alarm; dreadful: a terrible bolt of lightning; a terrible curse. - Extremely formidable: terrible responsibilities. - Extreme in extent or degree; intense: "the life for which he had paid so terrible a price” ( Leslie Fiedler). - Unpleasant; disagreeable: had a terrible time at the party; terrible food. - Very bad: a terrible actor. Malayalam MeaningTransliteration ON/OFF | Not Correct/Proper? ഭയങ്കരമായ - Bhayankaramaaya | Bhayankaramaya ;ഭീകര - Bheekara ;ഭീഷണ - Bheeshana ;ഉക്ഷാല - Ukshaala | Ukshala ;ഭീകരം - Bheekaram ;ഘോരമായ - Ghoramaaya | Ghoramaya ;
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718284.75/warc/CC-MAIN-20161020183838-00362-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
726
8
https://devforum.roblox.com/t/looking-for-some-ideas-and-suggustions-on-what-i-should-script/1913031
code
You can write your topic however you want, but you need to answer these questions: What do you want to achieve? Keep it simple and clear! I would like some suggustions on what to script as i can’t think of any What is the issue? Include screenshots / videos if possible! I can’t think of anything to script at the momment and would like the community to give me some suggustions on what i should script What solutions have you tried so far? Did you look for solutions on the Developer Hub? Yes and i have found no topics about this Please do not ask people to write entire scripts or design entire systems for you. If you can’t answer the three questions above, you should probably pick a different category. Hello, i’m writing this topic today because i’m lost and can’t think of anything to script i’m just asking for suggustions and ideas what i should script to get me started thank you for your Ideas and Suggustions
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511023.76/warc/CC-MAIN-20231002232712-20231003022712-00112.warc.gz
CC-MAIN-2023-40
935
6
http://andresmgrcq.total-blog.com/the-best-side-of-pay-me-to-do-your-homework-12446597
code
The best Side of pay me to do your homework Of course we would like to advise you, to acquire your visa up-to-date continually! Even when you always Do not get any difficulty, there is always a slight likelihood an individual will Test your passport. While in the worst scenario state of affairs this may well cause your arrest and deportation to your dwelling place. My daughter has just placed on volunteer at a certain orphange in Peru for three months. She does have a valid Canadian passport and has long been recommended she would require a visa To accomplish this. Peru doesn’t demand a visa for tourism uses for US citizens. With a valid US passport entry really should be easy and no distinctive than as in the event you experienced no criminal report. But in 2013 the Peruvian Prime Minister declared that there are programs (!) on the way in which allowing for immigration officers to deny entry to foreigners using a criminal file (Primarily with drug relevant convictions). I don’t know if these plans are by now executed or is often recognized in any way. as the answer to your concern exceeds the House We have now in this article for replies, I permitted myself to maneuver your comment to our Discussion Board below "Volunteering in Peru to get a Year ("")" and answered it there. The Peruvian regulation involves that foreign website visitors need a return or onward passage out from the state if they aren't residents. I'm honored to make an application for the Master of Library Science program with the University of Okoboji for the reason that providing I can don't forget I've had a really like affair with books. A versed listing of providers. If another person steals a CD containing a Model of a GPL-coated method, does the GPL give him the proper to redistribute that Variation? Students or interns need to enter Peru with a tourist visa and after that alter their immigration position at Peru's immigration office Migraciones. I'm inquiring this problem Considering that the Paraguay consulate these days advised me that visa commences through the working day of problem where scenario I have a difficulty with Peru. Hope you can remedy this. On or next to the stamp the immigration officer writes a range indicating the days she's allowed to stay in the nation. Your daughter really should make sure that she will get The three months she needs, due to the fact the moment in Peru the visa cannot be prolonged. the necessities can be found on the web site from the Peruvian Immigration Office DIGEMIN (""). Just one choice is getting a occupation and employer supporting you which has a operate visa. I wrote on our discussion board ("") a bit concerning the complications. Other choices: if you need to study a College student Visa, if you are a retiree that has a pension of US$ 1000 a Rentista Visa, in case you open up a business (expenditure of US$ 30000 + proper business enterprise approach) an Trader Visa. For marrying in Peru you should carry a duplicate of your primary start certificate along with a certification of no impediment (a certification that you'll be solitary), each not older than 6 months and legalized because of the Peruvian consulate in your dwelling investigate this site country along with you. In relation to determining whether or not two pieces of program sort only one operate, does The point that the code is in a number of containers have any outcome? Sure I may help. But as The solution to your thoughts exceeds the Area We've here, I moved your comment to our Dialogue Board underneath "Dwelling legally in Peru" ("") and answered it there.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657510.42/warc/CC-MAIN-20190116134421-20190116160421-00387.warc.gz
CC-MAIN-2019-04
3,613
15
https://www.hitachivantara.com/en-hk/insights/faq/what-is-container-orchestration.html
code
Container orchestration is the practice and process of organizing containers and allocating resources to them at scale. This differs from containerization software, such as Docker, which creates and acts as a container’s runtime. Container orchestration software typically coordinates several virtual and physical machines each with its own containerization software installed. Docker can run containerized applications by creating a virtualized container, deployed inside with an application and its required libraries, and with its own allocation of resources available on the machine where the container is running. This container believes it exists as a fully functioning machine, running a single app when it is a container among many other containers running microservices on a single hardware system within even further groupings of hardware. Container orchestration steps in to manage several of these container deployments, with the aim of scaling across multiple servers. While there are several orchestration technologies—even Docker has theirs called Docker Swarm—Kubernetes is the most popular container orchestrator and works exceptionally well with Docker as its container creator. Kubernetes, when deployed, creates a cluster (in Docker, the “swarm” is the similar cluster feature) which will have inside it several worker machines called nodes each running containerized applications. A node can be a VM or a physical machine. A cluster will also have a control plane that runs on its own node, though not necessarily, and provides decision-making capabilities for the entire cluster. Nodes are made up of several components: - A kublet agent that runs the node and ensures its containers are in a pod, and that they start and stop as expected. - A kube-proxy allows and maintains communication to the pods inside and outside the cluster. - A container runtime that runs the containers (Docker). A pod is a grouping of running containers within the cluster. Because of virtualization, a pod is assigned an IP address, usually encompassing closely associated containers that are located on the same host/node for efficient resource sharing. This grouping allows the orchestrator to easily schedule, and use ports without conflicts. Depending on the use case, clusters can be quite full. Kubernetes states that their clusters can hold up to 5000 nodes. Though in practice, this is not normal. In short, the container orchestrator is the piece of software that manages all of these components, virtual and physical, to ensure that resources are used and shared effectively and efficiently within a container architecture.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506028.36/warc/CC-MAIN-20230921141907-20230921171907-00687.warc.gz
CC-MAIN-2023-40
2,645
10
https://learnstartup.net/p/SkCfL7xbe?utm_source=1
code
**Student Reviews for Learn Python Software Development For Beginners! “It was a pretty difficult choice for me which Python course to choose here on Udemy. I went ahead and gave this one a try and boy was that a good decision. Both Tim and J-P are always prompt in answering your question. This course is so vast and more and more topics getting added I’d say go ahead and give this a try and you will not regret. I’d rather say it’s worth every small penny that you spend” -** Anirban Mukherjee **“Usually I don’t like to review courses. This course is by far the most organized and professionally recorded/filmed class I have taken on uDemy. The teacher teaches at a fast enough pace where he isn’t repeating useless information and if he ever does go a bit fast for me I can always pause the video. The teacher is very engaging and kind of feels like a mentor walking you through what you need to know in order to be successful. He keeps adding content to his courses and is available for questions. I’m very impressed and happy that I bought this course. I tried to take another Python course and it was like pulling teeth (not to be mean but the teacher was not organized or prepared and very monotone). I’m excited to move through the rest of the course. Yay!” - **Ariel Dana Ron So you have decided to learn Python, but are struggling to figure out which course to take. Choosing the right course that will help you become a Python programmer in the shortest amount of time, but teaching you correct programming principles can be hard to find. Another thing is ensuring that the instructors with real world commercial programming experience is vital. This is one of those professions when being a teacher only is not enough. You need that real world programming experience. The instructors in this course, Tim and Jean-Paul have a collective sixty years of commercial software development experience, meaning you are learning the right way to program to maximize your future development potential. So yes, you have found the best Python course on Udemy (in our opinion, and also the opinion of many of our students). You will learn how to develop programs in the Python programming language. This gives you more opportunities for jobs and career advancement because Python is one of the most requested skills in 2016! This course assumes no previous programming or Python experience. If you’ve never programmed a computer before, or if you know another programming language and want to learn Python, this course will teach you how. The course is continually updated and enhanced, and fully supports Python 3. This guarantees what you are learning is relevant for you today and is not obsolete. One of the course instructors got voted into the best instructor list of 2015 (as voted by students and Udemy staff). So you can be sure that the training is world class and literally the best content you will find and will help you become an experience Python developer faster, and more efficiently than other courses. Eduard, a student has this to say about our course “I cannot stress this enough, this is, by far, the best Python course you will find online. The information presented by the tutors is excellent and well presented. You also get great support from the tutors on practically any questions related to the course. Highly recommend to anyone who wants to learn or re-visit Python programming language.” And Shesh said this about the course “The treatment of the subject is fantastic as compared to any 101 course on Python on Udemy or elsewhere (in my personal experience of course). Look no where else, if you wanna dive in fast and dive in deep at beginners level this course is perfect … In any programming language your 101 course sets up you tone, your perspective on how you will approach the language … this does it perfectly.” Our courses have a history of teaching students the real-life skills they need to get jobs or further their programming skills. Take this course in confidence today knowing you have just found the best Python course on Udemy! Don’t delay. Every minute you are not learning Python is another potential opportunity wasted. Click the Take this course button now and start learning now.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077336.28/warc/CC-MAIN-20210414064832-20210414094832-00352.warc.gz
CC-MAIN-2021-17
4,273
20
http://www.coderanch.com/t/513525/EJB-JEE/java/directory-structure
code
This week's book giveaway is in the We're giving away four copies of and have Sam Newman on-line! A friendly place for programming greenhorns! Big Moose Saloon Register / Login Win a copy of this week in the EJB and other Java EE Technologies Regarding directory structure santhosh kumar vk Joined: Aug 25, 2009 Oct 12, 2010 06:13:05 This is santhosh i need Directory structure for integerate we are using 4.1 please help me. I’ve looked at a lot of different solutions, and in my humble opinion Aspose is the way to go. Here’s the link: subject: Regarding directory structure In struts I am getting an error App doesn't work How can I get my HelloWorld Servlet to Run? Test class cannot find other class All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter | Powered by Copyright © 1998-2015
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990603.54/warc/CC-MAIN-20150728002310-00248-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
810
25
https://www.dk.freelancer.com/projects/data-entry/data-entry-from-home-canadian-20794921/
code
Job ikke fundet Beklager, vi kunne ikke finde jobbet du ledte efter. Find de seneste jobs her: actually the project is about the E-commerce for every business connection in one roof. i am facing some issues when setting web view -android Please provide artwork in pdf , jpg & vector files Please note College of Nursing & Health Sciences is required in blue like logo not black print Dimensions : 114 mm x 64mm I am looking for Bot Developer who is good at Blockchain. WIll discuss more details over chat Thanks Hi Looking for a quick developer to complete the installation and troubleshoot WPML. Please provide your previous Wp websites what you worked with WPML and describe briefly. Thanks I am looking for silent installer script which will install software on just one click. If you can provide solution you are welcome. Script can be java script , python, or any other open source solution. We have lots of typing materials. You should know Microsoft Office Word. 1st video: 2 jpgs with spin transition, loop video (5 second each jpg) 2nd video: 3jpgs with spin transtion, loop vidoe (5 second each jpg) 2rd video: 3jpgs with spin transition, loop video (5 second each jpg) This are for TV screen menu in restaurant. This transition: [log ind for at se URL] We want a beautiful and colorful website that would enhance the company's corporate profile. Showing activities and important information about the company, and pictures of company's activities and other important information looking for a part-time Bookkeeper/ Data Entry Clerk who is Proficient in MS Office, particularly Excel, Hands-on experience with spreadsheets and financial reports Knowledge of databases and accounting software is nice to have but not required Ability to perform filing and record keeping tasks Accuracy and attention to detail Aptitude for numbers Data entry and word processing skills Highly organ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316718.64/warc/CC-MAIN-20190822022401-20190822044401-00006.warc.gz
CC-MAIN-2019-35
1,893
13
https://communities.bentley.com/products/microstation/w/microstation__wiki/14305/need-to-control-levels-for-plotting-user-wants-to-turn-off-certain-levels-on-the-plot-and-also-control-the-display-of-these-levels-in-the-design-file
code
Need to control levels for plotting. User wants to turn off certain levels on the plot and also control the display of these levels in the design file. Recommend you use Level Manager for turning off the levels on the plot (Plot option under Properties). This will leave the levels on in the design file. Key-ins can be used to set Levels Plot Off/On level set plot OFF "Level 36" "Level 5" "Level 24" level set plot ON "Level 36" "Level 5" "Level 24"
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100518.73/warc/CC-MAIN-20231203225036-20231204015036-00327.warc.gz
CC-MAIN-2023-50
451
4
https://www.energy-measures.com/finest-27-and-24-computer-gaming-displays-2017.html
code
Computer gaming design faculties have a curriculum that helps students prepare for a challenging profession within the game industry. In contrast to other GTA-inspired games though the main target is readily available-to-hand fight and depends on a canopy system when the participant chooses to make use of a weapon (although I discovered it extra satisfying to at all times go for hand-to-hand because the management scheme really shines when you use it). Additionally, Intel is not favored by most avid gamers since you pay extra to get a technology called hyper-threading which is not used in PC video games. In addition they provided the know-how wanted for avid gamers to create their own games with FUNDAMENTAL code. WDC 2TB SATA3 64MB – Green Power – WD20EZRX, 2 Tb size yang lumayan dan memang sudah mencukupi untuk menyimpan game, dan dokumen lainnya. Whereas console video games will likely be mailed to you in conventional Netflix type gamers can hire digital PC games. A reading textual content from the Pattern UK website will stretch higher level college students and can be used as a foundation for discussion on the possible risks of enjoying violent video games. Such built-in graphics playing cards are good however not adequate for playing the newest 3D video games. Pada tahun 1976, Fairchild mencoba menghidupkan kembali dunia video game dengan menciptakan VES (Video Leisure System). Beberapa saat yang lalu, saya sempat kesengsem untuk membeli satu gaming mouse. Use review websites akin to Tom’s Hardware to compare performance between video cards.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100518.73/warc/CC-MAIN-20231203225036-20231204015036-00107.warc.gz
CC-MAIN-2023-50
1,578
5
https://jalict.com/game-jam/2015/04/05/cutato-3d.html
code
Is a spiritual successor to my first Ludum Dare game, Cutato. The game revolves around peeling potatoes in a rather chaotic setting. Made for Game Jam 2 by AAU Game Lab - Theme: Fix Your Old Project Game won the first price The game was made together with Alex Rymark Vorm,
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247496080.57/warc/CC-MAIN-20190220190527-20190220212527-00532.warc.gz
CC-MAIN-2019-09
273
4
https://serc.carleton.edu/eet/shrinking_forests/index.html
code
Shrinking Forest - Growing Problem In this chapter, you will learn to measure land use change over time. Download and compare Synthetic Aperture Radar (SAR) satellite images of the Amazon rainforest in Brazil for 1994, 1995, and 1996. Then use ImageJ, a public domain image analysis program, to identify forested and deforested land. Next, you will measure and compare the amounts of each. As a final product, you will create and interpret a color-coded image showing the oldest to most recently deforested areas for the three-year period. This chapter is part of the Earth Exploration Toolbook. Each chapter provides teachers and/or students with direct practice for using scientific tools to analyze Earth science data. Students should begin on the Case Study page. The EET web site collects no personally identifying information and so is compliant with the Children's Online Privacy Protection Act. The site is constructed with tools that attempt to ensure the broadest possible accessibility in line with section 508 and w3c guidelines.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00883.warc.gz
CC-MAIN-2023-50
1,041
5
https://gentoobrowse.randomdan.homeip.net/news/2019-07-18-syncthing-update-incompatibility
code
Syncthing 1.2.0 and newer do not interoperate with 0.14.45 and older Starting with version 1.2.0, Syncthing always uses large, variable-sized, blocks to index and transfer files larger than 256 MiB . Syncthing version 0.14.45 and older will initially appear to accept files scanned with large blocks, but will later panic and shut down during some internal file operations. Do NOT install those versions, or enable large blocks in older versions, in clusters with devices still on v0.14.45 or older, e.g. Debian Stretch servers using distribution-provided packages.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145818.81/warc/CC-MAIN-20200223154628-20200223184628-00454.warc.gz
CC-MAIN-2020-10
565
2
https://www.turbosquid.com/ja/3d-models/max-nivea-soft/663490
code
Nivea Soft (Moisturizing Cream) ======================== Originally modeled in Maya. Clean topology and totally polygon geometry (mostly Quad and a few Triangular surfaces). You have to increase subdivision level if you need. Objects have Unwrapped UVs and Automatic UVs. Model files don't include any lighting and rendering setup. =Maya Files= Maya 2011 .ma (ascii) and .mb (binary) files are included in the rar file. =Obj and Fbx Files= These files are exported from Maya 2011. =Texture= NiveaSoft_Color (1400 x 1400 - JPG, Tiff)
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572980.56/warc/CC-MAIN-20190917000820-20190917022820-00510.warc.gz
CC-MAIN-2019-39
532
4
https://sfpc.io/people/zach-lieberman/
code
Zach is an artist with a simple goal: he wants you surprised. His work uses technology in a playful way to break down the fragile boundary between the visible and the invisible. He has held residencies at Ars Electronica Futurelab, Eyebeam, Dance Theater Workshop, and the Hangar Center for the Arts in Barcelona, and his work has been exhibited around the world. Zach is one of the co-founders of openFrameworks, a C++ library for creative coding. He’s currently working on the EyeWriter project, a low-cost, open source hardware and software toolkit that helps people draw with their eyes. The project has won the Design of the Year from the London Design Museum, FutureEverything prize and the Golden Nica in Interactive Art at Ars Electronica. It was also listed by Time Magazine as one the 50 best inventions in 2010. Zach is one of the recipients of the AOL 25 for 25 grant, and was listed in Fast Company Magazine’s 100 Creative people in business. He taught at Parsons School of Design for over 10 years before helping start SFPC. |Machine Learning Literacy||Organizer|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104692018.96/warc/CC-MAIN-20220707124050-20220707154050-00462.warc.gz
CC-MAIN-2022-27
1,081
3
https://www.developer.ebay.com/api-docs/static/gs_developers-technical-support.html
code
Formal eBay support comes from the Developer Technical Support team. You must be a registered eBay developer with active support to interact with Developer Technical Support. If you exhaust your ability to debug your application, or if you think you have encountered a bug in an eBay interface, you can contact Developer Technical Support for help. Enable premium support Before you can request Premium Support: You must have either already purchased Developer Technical Support support hours, or You need to purchase them via the Purchase Hours tab on the Premium Support site. If you do not have any hours available, select Purchase Hours and specify the number of hours you want (either a 4-hour package for $250 or individual hours at $75 each), and pay using PayPal. Once you have purchased support hours, go to the Request Support tab to file a ticket. Create a support request To create a support request, go to the Request Support tab of the Premium Support page and complete a ticket. Additional Help Resources In addition to the resources that directly support your eBay application development, the following resources provide details on the rich eBay feature set: eBay Buying Customer Service Help pages—Business support page that provides information on buying, such as how bidding works, payments, shipping and tracking items, managing purchases, and working with sellers. eBay Seller Center—Business support page that provides sellers with information on listing and marketing, running a store, shipping, and service and payments. eBay Customer Service Help—eBay’s primary customer support page. eBay Policy Index—Index page of eBay’s buying and selling policies. eBay Motors Support—Business support page for eBay Motors.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00259.warc.gz
CC-MAIN-2023-50
1,751
15
http://www.colorado.edu/oit/tutorial/exchange-open-resource-calendar-outlook-2011
code
You can open a resource's calendar and view when it is scheduled and for what. First, they must share the calendar with you through Exchange. The shared calendar will appear on the right side of your screen. You can click the name of the calendar, and view its content. TIP: The name of the shared calendar will also appear on the left-hand side of the screen with a checkbox beside it. Uncheck this box to close the shared calendar. You can recheck this box later to view the shared calendar again. You can also check multiple calendars to view them all at the same time (Ex. You want to view a day in your calendar, the resource calendar, and other exchange users).
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738009849.87/warc/CC-MAIN-20151001222009-00141-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
667
3