url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.bulkreefsupply.com/content/post/Whats-Shipping-Out-of-the-New-BRS-Warehouse
|
code
|
Bulk Reef Supply just finished a warehouse and office move. The goal was to vastly improve the shipping technology to make orders more accurate, to ship from our BRS warehouse quicker and ultimately get to our customers doorsteps' sooner.
So in this episode of BRStv, we wanted to show you transformation in the BRS warehouse and office spaces. Since it's our customers that have made this possible, we thought it would be fun to make the first order shipped out of the new warehouse special. Dylan, from San Diego, ordered a just a ReefKeeper Lite. We thought it would be fun to add some products to his order:
Digital Aquatics Dual Float Switch Kit - so he can use his new controller as an auto top off
BRS Lab Grade pH Probe - to add redundancy. You can't be too careful...
Kessil LED A360N, ALC Module and Cable - Dylan can control his new Kessil with the ReefKeeper - how awesome is that?
So again, thanks to everyone for making our warehouse upgrade possible so that we can deliver a even better level of service to you.
The purpose and content of this video is to provide general information regarding the products and their applications as presented in the video. Aquatic sales solutions, inc. And its officers, directors, employees and agents disclaim all express or implied warranties, in any way, related to the products and their application as presented in this video, make no representation or warranty regarding the products and the application as presented in this video and shall not be liable for any direct or indirect losses or damages of any type, including but not limited to punitive damages, or from personal injury or death resulting from or in any manner related to the video, and the products in and contents of the video. The viewer expressly agrees that aquatic sales solutions, inc. And its officers, directors, employees and agents shall not be liable for any damages or losses related to the products in and content of the video and hereby agrees to hold the foregoing harmless from any such losses or damages.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.0/warc/CC-MAIN-20240421040323-20240421070323-00741.warc.gz
|
CC-MAIN-2024-18
| 2,042
| 7
|
http://forums.zulusquad.org/index.php?/topic/652-irc-services-rollback/
|
code
|
Jump to content
F**K THE ADMINS
Posted 20 March 2015 - 10:10 PM
IRC services database was rolled back a few days ago due to db corruption.
If you need password resets contact me.
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887600.12/warc/CC-MAIN-20180118190921-20180118210921-00775.warc.gz
|
CC-MAIN-2018-05
| 217
| 6
|
https://lomaseye.com/free-alternative-to-bluehost/
|
code
|
Free Alternative To Bluehost
Finding a high-grade affordable webhosting supplier isn’t very easy. Every internet site will certainly have various demands from a host. Plus, you have to compare all the attributes of a hosting company, all while searching for the most effective deal possible.
This can be a lot to type via, especially if this is your first time purchasing holding, or developing a website.
Most hosts will certainly use extremely inexpensive introductory rates, only to increase those rates 2 or 3 times greater once your first call is up. Some hosts will offer cost-free benefits when you join, such as a cost-free domain, or a free SSL certification.
While some hosts will have the ability to supply much better performance and also high levels of safety. Free Alternative To Bluehost
Listed below we dive deep right into the best low-cost webhosting plans out there. You’ll discover what core organizing attributes are important in a host and also exactly how to examine your very own hosting requirements to ensure that you can pick from among the very best low-cost holding service providers below.
Disclosure: When you purchase a host plan via links on this page, we earn some compensation. This assists us to keep this site running. There are no added expenses to you in all by using our web links. The list below is of the very best inexpensive web hosting bundles that I’ve directly made use of and also tested.
What We Think about To Be Low-cost Webhosting
When we explain a web hosting plan as being “Low-cost” or “Budget” what we suggest is hosting that falls into the rate bracket between $0.80 to $4 monthly. Whilst researching inexpensive organizing service providers for this overview, we checked out over 100 different hosts that fell into that rate array. We then examined the quality of their most affordable organizing package, worth for cash and also customer support.
In this post, I’ll be going over this first-rate site holding company and stick in as much appropriate info as possible.
I’ll look at the functions, the rates options, and also anything else I can consider that I believe could be of benefit, if you’re choosing to sign up to Bluhost as well as get your web sites up and running.
So without additional trouble, allow’s check it out.
Bluehost is just one of the biggest webhosting firms in the world, obtaining both huge advertising support from the company itself as well as associate online marketers who advertise it.
It truly is a large company, that has been around for a very long time, has a large online reputation, and also is absolutely one of the top choices when it involves web hosting (most definitely within the leading 3, a minimum of in my publication).
But what is it precisely, and should you obtain its services?
Today, I will certainly address all there is you require to understand, given that you are a blog owner or a business owner that is trying to find a web host, as well as doesn’t recognize where to get started, considering that it’s a wonderful remedy for that target market in general.
Allow’s picture, you intend to organize your websites and also make them noticeable. Okay?
You currently have your domain name (which is your site location or URL) today you intend to “turn the lights on”. Free Alternative To Bluehost
You require some hosting…
To achieve every one of this, and to make your internet site noticeable, you require what is called a “web server”. A server is a black box, or gadget, that saves all your site information (data such as pictures, messages, videos, web links, plugins, and also other information).
Currently, this server, needs to be on at all times as well as it has to be linked to the web 100% of the time (I’ll be mentioning something called “downtime” in the future).
Additionally, it also requires (without obtaining too expensive and also into information) a file transfer protocol typically called FTP, so it can reveal web internet browsers your site in its intended form.
All these points are either costly, or require a high level of technical ability (or both), to develop and maintain. And also you can entirely go out there and also find out these points by yourself as well as established them up … however what regarding as opposed to you getting as well as preserving one … why not simply “leasing holding” rather?
This is where Bluehost comes in. You lease their web servers (called Shared Hosting) and you release an internet site utilizing those servers.
Given that Bluehost maintains all your data, the company also allows you to establish your content monitoring systems (CMS, for brief) such as WordPress for you. WordPress is an incredibly preferred CMS … so it just makes good sense to have that choice offered (nearly every organizing firm now has this alternative also).
In other words, you no longer need to set-up a server and afterwards incorporate a software program where you can construct your content, separately. It is currently rolled right into one plan.
Well … picture if your web server is in your house. If anything were to occur to it in any way, all your data are gone. If something fails with its internal processes, you need a technician to fix it. If something overheats, or breaks down or gets damaged … that’s no good!
Bluehost takes all these headaches away, and also looks after every little thing technical: Pay your server “rental fee”, and also they will deal with everything. And also when you purchase the service, you can after that start focusing on including web content to your web site, or you can place your effort into your advertising projects.
What Solutions Do You Get From Bluehost?
Bluehost offers a myriad of different solutions, however the primary one is hosting obviously.
The organizing itself, is of different kinds incidentally. You can lease a common web server, have a dedicated server, or likewise a digitalexclusive server.
For the function of this Bluehost review, we will certainly concentrate on holding solutions as well as various other solutions, that a blog owner or an on-line business owner would certainly require, instead of go unfathomable right into the rabbit hole and also talk about the other solutions, that are targeted at more experienced people.
- WordPress, WordPress PRO, as well as e-Commerce— these holding solutions are the plans that permit you to host a site using WordPress and WooCommerce (the latter of which allows you to do ecommerce). After purchasing any of these bundles, you can begin developing your site with WordPress as your CMS.
- Domain name Market— you can likewise get your domain name from Bluehost rather than various other domain name registrars. Doing so will make it easier to direct your domain to your host’s name web servers, considering that you’re utilizing the same industry.
- Email— once you have actually purchased your domain name, it makes good sense to likewise obtain an e-mail address linked to it. As a blogger or on the internet business owner, you should virtually never ever utilize a complimentary e-mail service, like Yahoo! or Gmail. An e-mail like this makes you look unprofessional. Luckily, Bluehost provides you one completely free with your domain name.
Bluehost additionally provides committed web servers.
And you may be asking …” What is a specialized web server anyhow?”.
Well, the important things is, the basic host plans of Bluehost can only so much web traffic for your site, after which you’ll require to upgrade your organizing. The factor being is that the usual web servers, are shared.
What this means is that one server can be servicing two or even more sites, at the same time, among which can be your own.
What does this mean for you?
It means that the solitary server’s resources are shared, as well as it is doing multiple jobs at any type of given time. As soon as your website begins to strike 100,000 website brows through monthly, you are going to need a devoted server which you can additionally obtain from Bluehost for a minimum of $79.99 monthly.
This is not something yous ought to bother with when you’re starting out however you should keep it in mind for certain.
Bluehost Rates: Just How Much Does It Expense?
In this Bluehost testimonial, I’ll be concentrating my attention primarily on the Bluehost WordPress Hosting bundles, given that it’s the most prominent one, and highly likely the one that you’re trying to find and that will certainly suit you the most effective (unless you’re a substantial brand, firm or website).
The 3 readily available strategies, are as adheres to:
- Basic Plan– $2.95 each month/ $7.99 regular price
- Plus Plan– $5.45 each month/ $10.99 regular rate
- Selection Plus Plan– $5.45 monthly/ $14.99 routine rate
The very first cost you see is the cost you pay upon subscribe, and the 2nd cost is what the expense is, after the initial year of being with the business.
So primarily, Bluehost is mosting likely to bill you on an annual basis. As well as you can additionally select the amount of years you wish to organize your site on them with. Free Alternative To Bluehost
If you pick the Basic strategy, you will certainly pay $2.95 x 12 = $35.40 beginning today and also by the time you enter your 13th month, you will now pay $7.99 monthly, which is also billed each year. If that makes any feeling.
If you are serious about your web site, you ought to 100% get the three-year choice. This means that for the basic plan, you will pay $2.95 x 36 months = $106.2.
By the time you hit your fourth year, that is the only time you will certainly pay $7.99 monthly. If you think of it, this strategy will certainly save you $120 throughout three years. It’s very little, but it’s still something.
If you want to get greater than one website (which I extremely recommend, and if you’re serious, you’ll probably be getting more eventually in time) you’ll want to utilize the choice plus plan. It’ll allow you to host unrestricted web sites.
What Does Each Plan Offer?
So, in the case of WordPress organizing plans (which resemble the shared hosting strategies, however are a lot more tailored in the direction of WordPress, which is what we’ll be concentrating on) the attributes are as adheres to:
For the Basic strategy, you obtain:
- One website only
- Guaranteed website by means of SSL certification
- Optimum of 50GB of storage
- Complimentary domain name for a year
- $ 200 marketing credit rating
Keep in mind that the domain names are bought independently from the hosting. You can obtain a cost-free domain with Bluehost right here.
For both the Bluehost Plus hosting and also Choice Plus, you obtain the following:
- Endless number of sites
- Free SSL Certificate. Free Alternative To Bluehost
- No storage or data transfer restriction
- Cost-free domain for one year
- $ 200 advertising and marketing credit rating
- 1 Office 365 Mail box that is cost-free for thirty day
The Choice Plus strategy has an included benefit of Code Guard Basic Alternative, a back-up system where your documents is saved as well as duplicated. If any collision takes place and your internet site information goes away, you can restore it to its original form with this feature.
Notification that even though both strategies set you back the exact same, the Choice Plan after that defaults to $14.99 per month, routine cost, after the collection amount of years you have actually selected.
What Are The Perks Of Using Bluehost
So, why select Bluehost over other webhosting solutions? There are numerous host, many of which are resellers, yet Bluehost is one pick few that have actually stood the test of time, and also it’s probably one of the most popular available (and forever reasons).
Here are the 3 major benefits of picking Bluehost as your web hosting provider:
- Web server uptime— your web site will not show up if your host is down; Bluehost has more than 99% uptime. This is very important when it comes to Google Search Engine Optimization and rankings. The greater the better.
- Bluehost speed— exactly how your server response establishes just how fast your internet site reveals on an internet browser; Bluehost is lighting fast, which indicates you will lower your bounce price. Albeit not the most effective when it concerns packing rate it’s still widely crucial to have a fast rate, to make individual experience much better and much better your ranking.
- Unlimited storage space— if you obtain the Plus strategy, you need not bother with the amount of documents you save such as videos– your storage space ability is unrestricted. This is truly important, due to the fact that you’ll probably face some storage issues in the future down the tracks, and you do not want this to be a hassle … ever before.
Lastly, client support is 24/7, which means regardless of where you remain in the world, you can call the assistance team to repair your website concerns. Pretty typical nowadays, yet we’re taking this for provided … it’s additionally very essential. Free Alternative To Bluehost
Likewise, if you have actually obtained a totally free domain name with them, after that there will be a $15.99 charge that will certainly be subtracted from the amount you initially purchased (I imagine this is since it sort of takes the “domain name out of the marketplace”, unsure regarding this, yet there possibly is a hard-cost for registering it).
Lastly, any requests after 30 days for a refund … are void (although in all sincerity … they need to most likely be rigorous below).
So as you see, this isn’t necessarily a “no doubt asked” plan, like with some of the other hosting alternatives out there, so make certain you’re okay with the plans prior to continuing with the holding.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153966.60/warc/CC-MAIN-20210730122926-20210730152926-00597.warc.gz
|
CC-MAIN-2021-31
| 13,866
| 82
|
https://wearecollegetennis.com/college-connect/
|
code
|
ITA College Connect
The Intercollegiate Tennis Association (ITA) has adopted the ITF World Tennis Number (WTN) as the official rating for college tennis. (See the ITA WTN annoucement.) This makes it easier than ever for junior tennis players to explore playing opportunities that exist in college tennis. In addition, the ITA is working on a College Connect tool that will match up your WTN with current college players to help you determine your playing level fit.
To locate a college player’s WTN, first search for a team using the ITA team search tool or look up a team using ITA’s team listings. Once on the team profile page, select the Roster tab to view the team’s players. Click on the player’s name to view the player profile page. The WTN widget for singles and doubles is located in the upper right corner of the player profile page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00391.warc.gz
|
CC-MAIN-2024-18
| 852
| 3
|
https://findcarmen.com/threads/botticelli-round-7.643/
|
code
|
- Best answers
- The chooser picks a famous person who is at least as famous as Sandro Botticelli
- The chooser gives one of the person's initials (if it were Botticelli, I could say S or B)
- Guessers may ask yes/no questions - you can indirectly guess something like "Have you ever run for public office?" or directly ask "Are you C. Scott Grow?"
- The game ends when someone guesses who the person is or if nobody guesses for a while
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144637.88/warc/CC-MAIN-20200220035657-20200220065657-00107.warc.gz
|
CC-MAIN-2020-10
| 436
| 5
|
https://azure.microsoft.com/ja-jp/updates/reserved-vm-instances/
|
code
|
General availability: Azure Reserved VM Instances
Azure Reserved VM Instances are now generally available. Reserved Instances enable you to reserve virtual machines on a one-year or three-year term and provide up to 72% cost savings compared to pay-as-you-go prices.
For additional information, see the blog post.
Virtual Machine Reserved instance completed
At one other Cloud provider there is cool feature reserved instance. Its means that you are reserving service for 1 year, and you pay much less per month but still you have benefits from clouds since you pay almost the same as on any other VM providers, but at any time you can scale. This would be awesome for many people who by default have 1-2 machines and then use on demand additional resources.Volodymyr Bilyachat
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668765.35/warc/CC-MAIN-20191116204950-20191116232950-00183.warc.gz
|
CC-MAIN-2019-47
| 777
| 5
|
https://www.djangodaily.com/author/djangodailynews/page/3/
|
code
|
Here’s what you’ll end up with after completing this tutorial: a website running django CMS; an attractive responsive theme; a blog, forms and custom.
An opinionated template for Django Rest Framework APIs
Django-Cacheme is a memoized decorator for Django using redis.
Django .pkpass build, sign, push for updates, serve and more…
Simple and free usd2currency convert utils, by caching free-limited-api from apilayer.com
cache with timeout in django
Add encrypted field classes and more to your Django models.
Companion Python package for Fundamentals of Data Science.
Microsoft Azure Cosmos DB Management Client Library for Python
An module written with pure Python C Extensions to open a file and cache the more recent accessed lines
grafana apps handlers customers.
YouTube Data is a library that provides comprehensive scraping video metadata scraping. Results are returned in a dictionary and include likes, dislikes, views, publish dates and more.
Python compiler with full language support and CPython compatibility
Database library for Python based on LMDB storage engine
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999041.59/warc/CC-MAIN-20190619204313-20190619230313-00223.warc.gz
|
CC-MAIN-2019-26
| 1,085
| 14
|
https://www.builtinchicago.org/job/engineer/emerging-technologies-devops-engineer/62349
|
code
|
Emerging Technologies – DevOps Engineer
Discover. A more rewarding way to work.At Discover Financial Services, you’ll find yourself in the company of some of the industry’s smartest and most reliable professionals. And at a company that rewards dedication, values innovation and supports growth.Thrive in an environment that promotes teamwork and shared success. Build on a foundation of mutual respect. Join the company that understands rewarding careers like no other, with this exceptional opportunity:
As Discovers Business Technology organization continues to innovate with new open source technologies, a new opportunity has been opened on the Emerging Technologies team in the Enterprise Architecture group.*** The position is in our downtown Chicago office, located next to the Merchandise Mart. Occasional travel to headquarters in Riverwoods, IL is required. ***This position will join a team focused on innovative data engineering solutions. As a developer or technical lead on the team, you will be responsible for guiding the team on technical details as well as implementation of solution and ongoing operational support. By following Agile practices, and continuing to build our development frameworks, you will contribute to a team that is delivering high value solutions and still innovating in our software tool set choices. We’re currently developing in Python and Scala, and are also looking to leverage more AWS services and Kafka streams, but are also evaluating cloud based streaming analytics and machine learning solutions.There will be opportunities to promote Discover and its innovative solutions (i.e., AWS Kinesis, Lambda) that this team will be involved in driving forward, so we expect this individual to be comfortable in these outreach responsibilities and possess good communication skills in order to be effective in these duties.The role requires strategic thinking, attention to detail and effective oral & written communication skills including the creation of visual artifacts such as flow and/or sequence diagrams. This unique position will require both a strong technical and business acumen.
- Works with a dedicated agile development team to deliver customer/business value through product features.
- Working within an Agile process to deliver solutions to Discover that support the Centralized Logging Service (CLS) and assistance in the design and implementation of the solution, based on Elasticsearch, Logstash, Filebeats, Kafka, Apache NiFi, and AWS.
- Achieve a high level of competency in big data solutions and aligned technologies that are used, or will benefit CLS.
- Take an agile pro-active approach that delivers improvements to the organization in a timely basis.
- Identifying opportunities to innovate on top of the CLS data, which promote skills in Data Analytics.
- Delivering new capabilities with new technologies (i.e., machine learning) that deliver additional value.
- Develop data science expertise.
- Provide technical leadership to application developers and other internal stakeholders regarding all aspects of Centralized Logging Solution.
- Perform strategic planning, upgrades, maintenance and support.
- Actively contribute to and drive creation of artifacts for CLS Architectures, Design Considerations and Best Practices.
- Maintain working knowledge of alternative Log Analytic solutions (i.e. Splunk, Elastic Filebeats/Logstash and Apache Metron), as well as cloud-based offerings.
- Promote a risk-aware culture, ensure efficient and effective risk and compliance management practices by adhering to required standards and processes.
- Bachelor’s Degree (preferably in technology) or equivalent work experience
- 2+ years of relevant experience with agile technology teams
- 2+years of coding experience with Java, Python, or another modern language.
- Experience supporting a product or service provided to a development community.
- Experience in a support based capacity, such as a development or engineering team
- Demonstrates reliability and dependability for the team, displays self-awareness, collaboration and ability to improve based on feedback from others.
- Agile Experience, Jenkins and Chef experience beneficial.
- Exposure to: Apache NiFi, Kafka, Java, Python.
- Experience with data pipelineing coding techniques that are commonly used in streaming development.
- Experience with Amazon Web Services (AWS) would be beneficial.
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state or local protected class.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249569386.95/warc/CC-MAIN-20190224003630-20190224025630-00579.warc.gz
|
CC-MAIN-2019-09
| 4,742
| 26
|
https://agilescout.com/pivotal-tracker-goes-freemium-and-paid/
|
code
|
For all those out there that use Pivotal Tracker as an Agile management tool are in for some news:
Pivotal Tracker will still be a free tool until July 19, 2011.
After that, Pivotal Tracker will be $7 per month.
This is an interesting turn of events that we’re hopeful will turn out for the best for them. It does, however change our review a bit on the tool: [Find our Agile tool review on Pivotal Tracker here]
It will still be free for public projects, non-profits, and educators. So if you’re in this bucket then you should be fine.
- $7 per month for up to 3 collaborators across up to 2 private projects, with 1GB of storage for file attachments $18 per month for up to 7 collaborators, up to 4 private projects, 3GB storage, and use of the Get Satisfaction, Lighthouse, and Bugzilla integrations
- SSL encryption, Campfire and Twitter notifications, as well as API use is available for all plans. Community support, via http://community.pivotaltracker.com, will continue to be open for all users.
- Individual use will continue to be free, with no collaborators, up to 2 private projects, and up to 200MB of storage for file attachments.
- More information on pricing is available on the new pricing page.
“At the end of the day, we’re establishing a paid model so that we can keep improving Pivotal Tracker aggressively based on your feedback, add operational capacity, and provide responsive support.” – Dan Podsedly
[See our review of Pivotal Tracker here]
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823785.24/warc/CC-MAIN-20181212065445-20181212090945-00568.warc.gz
|
CC-MAIN-2018-51
| 1,478
| 11
|
https://community.auth0.com/t/getting-user-role-upon-login/7287
|
code
|
Hello, I have a “role” value set in the “app_metadata” of my users. I would like to get this role when the user logs in. How may I do so using auth0.js?
You can pass the `role` back as a claim in the `id_token`. Take a look at the following document which outlines returning custom claims:
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591296.46/warc/CC-MAIN-20180719203515-20180719223515-00561.warc.gz
|
CC-MAIN-2018-30
| 297
| 2
|
https://wbaer.net/2019/02/microsoft-365-migration-on-your-terms-with-new-improvements-to-the-sharepoint-migration-tool/
|
code
|
Microsoft 365 migration on your terms with new improvements to the SharePoint Migration ToolMigration & Upgrade OneDrive for Business SharePoint SMAT SPMT
We’re excited to announce new improvements to the SharePoint Migration Tool for the month of February. Designed to be used for migrations ranging from the smallest set of files to a large scale enterprise migration, the SharePoint Migration Tool will let you bring your information to the cloud and take advantage of the latest collaboration, intelligence, and security solutions with Office 365. Over the past several months we’ve been continually working to add features to the SharePoint Migration Tool to help you accelerate your journey to Microsoft 365, from support for full site migrations, to incremental improvements to the user experience – the SharePoint Migration Tool is designed to support migrations of all sizes. This month we’re adding some exciting new improvements to help you on your journey to the cloud. Improvements this month include: Managed Metadata Service support If you have an existing taxonomy in SharePoint Server 2013, the SharePoint Migration Tool can now migrate your content types and term stores to Office 365. Global term store migration requires global tenant admin permissions. Web Parts Support, Site Navigation, and more… The SharePoint Migration Tool has continuously improved to support more complex migration requirements. From a humble beginning of accelerating files migration to incremental improvements leading up to complete SharePoint 2013 site migrations. Now using the SharePoint Migration Tool you can migrate just about every element of SharePoint sites that you care most about including Web Parts, Pages, and site navigation! For a detailed list of improvements in this release, refer to the release notes at https://docs.microsoft.com/en-us/sharepointmigration/new-and-improved-features-in-the-sharepoint-mig…. If you’re new to the SharePoint Migration Tool, keep reading below to learn more about how you can transform your business by bringing it to the cloud.
About the SharePoint Migration Tool
The SharePoint Migration Tool is designed to simplify your journey to the cloud through a free, simple, and fast solution to migrate content from on-premises SharePoint sites and file shares to SharePoint or OneDrive in Office 365. The SharePoint Migration Tool allows you to accelerate your journey to Office 365 overcoming obstacles typically associated with migration projects. With the SharePoint Migration Tool you can evaluate and address the information that matters the most to your organization, the Libraries, and now Lists that form the foundation of the SharePoint experience. Using the SharePoint Migration Tool you can start your migration today and take advantage of the full suite of features and security capabilities that Office 365 offers. Keep reading to learn more about the SharePoint Migration Tool or download the latest version now at https://aka.ms/SPMT.
You can download the SharePoint Migration Tool at http://aka.ms/SPMT. Through v3 of the SharePoint Migration Tool you’ll have available to you the innovation we’re delivering to help you bring your information to the cloud and take advantage of the latest collaboration, intelligence, and security solutions with Office 365.
Through continued innovation across migration scenarios we’ll be adding more capabilities over time to the SharePoint Migration Tool, including support for more SharePoint versions, site structure migrations, and more. Subscribe here to stay up to date on future announcements for SharePoint and Office 365.
Whether you’re looking to migrate from file shares on-premises to SharePoint or OneDrive or from on-premises versions of SharePoint, the SharePoint Migration Tool is designed to support the smallest of migrations to large scale migrations with support for bulk scenarios. Learn more about migrating to Office 365 at https://resources.techcommunity.microsoft.com/cloud-migration/. Learn more about the SharePoint Migration Tool at https://support.office.com/en-us/article/Introducing-the-SharePoint-Migration-Tool-9c38f5df-300b-4ad…. Prepare your environment for migration using the SharePoint Migration Assessment Tool by learning more at https://www.microsoft.com/en-us/download/details.aspx?id=53598.
The SPMT may be fine for the big total site migrations, but I have 100 subdirectories under Shared Documents and several subdirectories under those. I wish to migrate a subdirectory of a subdirectory. when I try to input the url for that subdir, I’m being prompted to sign in again and the program is rejecting that sign in. (It’s the spsfarm account). Why can’t we select the dub directories from the drop down? who should I report issues to? I love the idea of this program, but if it cant do granular migrations, what’s the use?
#### [Bill Baer](http://wbaer.wordpress.com "email@example.com") -
Thanks Rob. I’m assuming based on the scenario outlined you’re using either CSV or JSON to migrate subdirectories from the source. Is the ask to support directory browsing using the SPMT user interface? If so, I’ll bring this recommendation to the team. On support, as an Office 365 subscriber you can open a support request against SPMT.
#### [Bill Baer](http://wbaer.wordpress.com "firstname.lastname@example.org") -
Thanks Greg. I’m assuming the migration specified is SharePoint (on-premises) to SharePoint Online?
#### [Greg Volland]( "email@example.com") -
I am looking for a tool to simply migrate documents from on-prem My Sites to OneDrive for Business. SPMT sounds like the perfect tool for that, but so far it seems to be doing a lot more than I want. Even with turning off all of the options, in testing I noticed it is still copying over the site title, site description, content types, etc. I really wish there was an option to just copy files and leave everything else alone. It sounds like V1 was the tool I am looking for. It would be nice if all of the new features could be disabled.
| Bill Baer |
More like this...
- Transitioning from Authoratative Web Pages to Answers in SharePoint Online
- Kick start the new year and your cloud migration with new SharePoint Migration Tool improvements
- Migrating to Microsoft Teams using the SharePoint Migration Tool
- What’s new and what’s coming w/ SharePoint & OneDrive Security, Compliance, & Administration – October 2018
- Unleash your SharePoint admin superpowers with new admin center capabilities
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150067.87/warc/CC-MAIN-20210724001211-20210724031211-00626.warc.gz
|
CC-MAIN-2021-31
| 6,541
| 21
|
https://community.dhis2.org/t/api-query-for-last-event-for-a-program-stage-for-tei/33293
|
code
|
Is it possible to query an event for a TEI for a particular program stage depending on last updated time. I want to obtain the records of an event that was updated last for a program stage for a TEI.
Confidentiality Notice: the information contained in this email and any attachments may be legally privileged and confidential. If you are not an intended recipient, you are hereby notified that any dissemination, distribution, or copying of this e-mail is strictly prohibited. If you have received this e-mail in error, please notify the sender and permanently delete the e-mail and any attachments immediately. You should not retain, copy or use this e-mail or any attachments for any purpose, nor disclose all or any part of the contents to any other person.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989874.84/warc/CC-MAIN-20210518222121-20210519012121-00608.warc.gz
|
CC-MAIN-2021-21
| 761
| 2
|
http://connect.openpolitics.com/blog/2011/10/01/second-session-with-nels-and-esther/
|
code
|
I returned to Nels and Esther’s house today to change a folder display setting on their computer back to the way it was before I came.
While I was there we talked about several things:
- RIght now it takes Nels about 3 months to assemble the yearly report.
- He feels comfortable with his system and does not want to change; partly because he does not want to take on any extra work at this point.
- I exported one of his files to Excel format and suggested that I experiment with it to see what is possible.
- I noted that very few people use the Microsoft Works program that Nels is using; and that he will have to convert his files to Excel format if he wants to share them with anybody.
- I also made a backup of all Nels’s files to a USB drive in case something ever happens to their computer. I suggested that if Nels doesn’t want to copy his yearly totals into a new column, he at least archive his files annually so that he doesn’t completely loose the ability to view past data.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783000.84/warc/CC-MAIN-20200128184745-20200128214745-00208.warc.gz
|
CC-MAIN-2020-05
| 995
| 7
|
https://conf.researchr.org/details/msr-2022/msr-2022-registered-reports/7/Is-Surprisal-in-Issue-Trackers-Actionable-
|
code
|
Is Surprisal in Issue Trackers Actionable?
Background. From information theory, surprisal is a measurement of how unexpected a particular event is. Statistical language models provide a probabilistic approximation of natural languages, and because surprisal is constructed with the probability of an event occuring, it is therefore possible to determine the surprisal associated with English sentences. The issues and pull requests of software repository issue trackers provide insight into the development process and likely contain the surprising events of this process.
Objective. Prior works have identified that unusual events in software repositories are of interest to developers, and use simple code metrics-based methods for detecting them. In this study we will propose a new method for unusual event detection in software repositories using surprisal. With the ability to find surprising issues and pull requests, we intend to further analyse them to determine if they actually hold importance in a repository, or if they pose a significant challenge to address. If it is possible to find bad surprises early, or before they cause additional troubles, it is plausible that effort, cost and time will be saved as a result.
Method. After extracting the issues and pull requests from 5000 of the most popular software repositories on GitHub, we will train a language model to represent these issues. We will then measure their perceived importance in the repository, measure their resolution difficulty using several analogues, measure the surprisal of each, and finally generate inferential statistics to describe any correlations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474660.32/warc/CC-MAIN-20240226130305-20240226160305-00426.warc.gz
|
CC-MAIN-2024-10
| 1,640
| 4
|
https://phabricator.wikimedia.org/T296303
|
code
|
The following situation was encountered after adding two new nodes to staging-eqiad (T293729):
The staging clustes have an IPv4 IPPool of 10.64.75.0/24 with the default block size of /26 which should, in theory, should allow for 4 nodes with one /26 block each. Unfortunately each of the existing nodes (kubestage100) currently has 2 IP blocks assigned with leaves the new nodes (kubestage100) without an IP block. This is not bad per se as it just means that both nodes had to take > 64 Pods at some point during their lifetime which is the case when one node is down (at time of writing, there are ~90 Pods running in staging).
As a consequence of that, workload scheduled to the new nodes borrow IP's from the pools of kubestage100 which leads to broken Pod IP routes on the node the IP was borrowed from.
In this particular case, kubestage1003 borrowed 10.64.75.0 from kubestage1001, leading to kubestage1001 blackholing traffic to that Pod IP (it blackholes prefixes that it is authoritative for and relies on having specific routes for each Pod it hosts):
root@kubestage1003:~# ip route default via 10.64.16.1 dev eno1 onlink 10.64.16.0/22 dev eno1 proto kernel scope link src 10.64.16.55 10.64.75.0 dev calidda3b144ba9 scope link root@kubestage1001:~# ip route default via 10.64.0.1 dev eno1 onlink 10.64.0.0/22 dev eno1 proto kernel scope link src 10.64.0.247 blackhole 10.64.75.0/26 proto bird 10.64.75.4 dev cali21fc9e9645e scope link [...] # But no explicit route for 10.64.75.0/32
According to calico docs, this is the default behavior:
This situation reveals 4 problems:
1. Nodes can claim more then one IP block / We can end up with hosts not having IPv4 blocks assigned when added
- Only allow 64 Pods per Node (effectively ensuring the Node does not require more than one block)
- Only allow one IPv4 block per node (effectively limiting the Node to only <size-of-block> number of Pods)
- Reduce the size of blocks (to allow for more flexible allocation)
- Figure out if we can free blocks when they are no longer used
- Calico >= v3.20 will release unused blocks (https://github.com/projectcalico/kube-controllers/pull/799)
2. Nodes without a IP block are able to launch Pod's and assign an IPs borrowed other Nodes blocks
This can be prevented by configuring the IPAM module with StrictAffinity, permitting the borrowing of IPs from foreign blocks. I assume we would also need to modify existing blocks (ipamblocks.crd.projectcalico.org)
I tried to add a IPAMConfig (like in https://gerrit.wikimedia.org/r/c/operations/deployment-charts/+/740858/) in staging-codfw and that gets picked up by calicoctl as one would expect:
root@kubestage2001:~# calicoctl ipam show --show-configuration +--------------------+-------+ | PROPERTY | VALUE | +--------------------+-------+ | StrictAffinity | true | | AutoAllocateBlocks | true | | MaxBlocksPerHost | 0 | +--------------------+-------+
Unfortunately new blocks created after that change (and a restart of all calico components, just to be sure) still have "StrictAffinity: false" set. I could not find any docs regarding this by now, but I expect this might only have an effect per IPPool. So if there already is an IPAM block affined that has StrictAffinity: false, it will stay that way for all blocks in that pool.
3. We never got notified by our alerting that we ran out of IP blocks
Have not thought about that yet. Our calico version does not expose ipam metrics currently. The next major release does: https://docs.projectcalico.org/archive/v3.18/release-notes/#ipam-prometheus-metrics
4. How to fix the current situation in staging
The fourth problem is that we need to fix this situation in staging somehow to make use of the new nodes.
As the generic logic for cleaning up blocks affinity, reclaiming blocks etc. is already in place in calico kube-controllers I went ahead and recreated the problem in staging-codfw (by just creating a bunch of pods on each node to have them request a second block).
I then freed that block by removing the pods again, made sure no IPs where allocated out of them via calicoctl ipam show --show-blocks / --show-borrowed and then bluntly deleted the ipamblock and blockaffinities objects. After that I created a bunch of Pods again to fill up the remaining block on a node and saw the deleted one being recreated with proper affinity again.
calicoctl ipam show --show-blocks calicoctl ipam show --show-borrowed kubectl get ipamblocks.crd.projectcalico.org,blockaffinities.crd.projectcalico.org
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00193.warc.gz
|
CC-MAIN-2022-33
| 4,499
| 25
|
https://forum.inductiveautomation.com/t/new-user-silly-question/81309
|
code
|
I'm trying to make some visible when i hover over it, it doesnt seem to work, im guessing when its "visible" property is false its actually gone so doesnt have a boundry to hover over. Is there a way around this?
Also on one of my rectangles the the outline of the shape cannot be taken away it changes with stroke style.. i dont want one is there a way to remove it?
First, is this Vision or Perspective?
Generally, an invisible component is completely out of the chain of events. The workaround would be have a container around the space for the element and place an event on that.
Borders are separate properties or styles. So, yes, should be possible. (If vision, make sure your properties editor is set to show all properties.)
Thanks, Phil, its in vision.
I hadnt thought of adding a container that will certainly work.
The other one was a rectangle which didnt have a border. I stupidly missed something obvious of clicking none on the strokepaint.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00305.warc.gz
|
CC-MAIN-2023-50
| 955
| 8
|
http://pubmedcentralcanada.ca/pmcc/articles/PMC3194239/?lang=en-ca
|
code
|
We have evaluated metagenomic assemblies based on the accuracy of the generated contigs using alignment-based similarity to the source genomes, contig length statistics, and the proportions of the source genomes recovered by the contigs. As the k-mer size of de Bruijn graph plays a crucial role in ABYSS’s assembly, we have also tried to assess the impact of k-mer size on metagenomic assemblies by comparing the contigs produced from different runs of the k-mer parameter. We also provide comparisons of metagenomics assemblies to the isolate assemblies of the constituent genomes.
Impact of de Bruijn graph k-mer size on contig length
Figure shows a comparison of the contig lengths to k-mer size across the simLC, simMC and simHC datasets. The average lengths of the contigs decrease with an increase in the complexity of the dataset. From Figure it can be seen that the optimal value of k to obtain longer contigs changes from 29 for simLC (a single dominant genome at a very high coverage) to 21 and 23 for simHC, which does not have any distinctly dominant genomes. As seen from Figure , the simMC dataset k = 25 seems to produce the longer contigs. The clustered results effectively pool the contigs produced from different runs of assembly by varying the k-mer parameter values across the different datasets. Figure shows the distribution of number of bases recovered by the contigs for different cutoff lengths of the contigs and different runs of the assembly. It can be seen from the figure that in general the shorter contigs account for majority of the bases recovered. In all the cases, the number of bases recovered increased with the use of smaller values of k-mer parameter as a greater fraction of the low coverage genomes were being assembled. Table summarizes these statistics regarding the assembled contigs and also provides N50 (weighted median) values.
Figure 1 Contig length distribution The total number of contigs (in log scale) shorter than a given cutoff length, for each of the datasets. (A) simLC. (B) simMC. (C) simHC. (D) Comparison of length distribution of the clustered contigs for metagenomic and isolate (more ...)
Total bases recovered at different contig length cutoffs The total number of bases contained in all the contigs shorter than a certain cutoff length (A) simLC. (B) simMC. (C) simHC.
Contig Alignment Statistics.
Comparison of metagenomic assembly to isolate assembly
As a benchmark for our metagenomic assemblies we separated the reads by their source sequence and performed isolate assemblies. We assembled the reads from each individual sequence separately and combined the final contigs from all the source sequences. We performed the isolate assemblies with different values of k and pooled the results using the clustering algorithm. Figure compares the length distribution of clustered results form metagenomic and isolate assemblies. The simHC dataset produced shorter contigs in both isolate as well as metagenomic assemblies. Amongst the simLC and simHC datasets, the performance of simLC was closer to the isolate assemblies, whereas, the simMC metagenomic assembly was far poorer in comparison to its isolated assembly.
Contig alignment accuracy
Even assemblies of isolate genomes are not completely error free. In the case of metagenomes, the presence of multiple genomes at different coverage depths causes additional problem and the contigs are expected to have more mis-assemblies compared to the contigs from isolate genome assemblies. To assess the accuracy of the assembly we aligned the contigs back to the source genomes. Table reports the results for the different datasets. A threshold accuracy of 95% was used for considering a contig accurate. Details of alignment methods and accuracy calculations are provided in the methods section. The assembly accuracy decreased as the k-mer size was decreased and was worst for all datasets at k=21. Further, the accuracy of the clustered contigs was lowest, due to the accumulation of errors from all the contig sets. This is due to our clustering approach, which tries to retain all the unique sequences. An alternative clustering strategy could be designed that takes the consensus of contigs obtained from different runs. This strategy would improve the accuracy of the results while reducing the total number of bases recovered.
In an ideal case of metagenomic assembly, all the reads forming a contig would come from the same source sequence. In metagenomes the reads from different sources may be co-assembled, resulting in chimeric assemblies. Therefore, to estimate the degree of chimericity, we evaluated the homogeneity of contigs using their read composition. Essentially, greater the number of sources from which a contig is assembled, the higher its entropy will be. The methods section describes the alignment of reads to the assembled contigs and entropy calculations.
Figure shows a plot of contig entropy versus length of the contigs across the datasets of different complexities. The entropy metric is computed at four levels: (i) sequence, (ii) species, (iii) genus and (iv) phylum, derived from the NCBI taxonomy tree. The simHC dataset produces a large number of smaller inhomogeneous contigs due to insufficient coverage of the source sequences. The proportion of inhomogeneous contigs is comparatively lower in the MC and significantly lower in LC datasets. The contigs were more homogeneous at higher phylogenetic levels. Because the genomes which are phylogenetically close together share significant sequence similarity, there is a greater chance of assembling reads belonging to related sequences into the same contig.
Contig entropy at different taxonomic levels The entropy of contigs versus the contig length (in log scale) for the datasets (A) simLC. (B) simMC. (C) simHC.
Coverage of the source sequences
Figure shows a plot of the source coverage ratio for the clustered contig sets of simLC, simMC, and simHC datasets. The positions of the source sequences in Figure correspond to those in the read coverage plot discussed in methods section. Due to space constraints, we did not include the plots showing the coverage values for different k-mer sizes, but we summarize the results here. In almost all the assemblies a high proportion of source genomes sequenced at higher depth was recovered by the contigs. As the value of k-mer size was decreased, more of the genomes sequenced at lower depth were recovered. However, as evident from the contig length distribution plot, Figure , some values of k-mer size tend to be suboptimal length-wise, depending on the complexity of the datasets. Therefore, clustering of the contigs resolves this issue, as the clustered results retain the longer contigs and also the unique contigs representing the low read coverage genomes.
Coverage of source sequences from the clustered contigs.
Escherichia strains co-assembly
Since the collection of DNA sequences for metagenomic experiments does not involve cloning, the reads could come from strains which are highly similar, with very little sequence variation. In this case, even though the effective read coverage of the species is high, due to minor differences in the sequences of the strains, the quality of assembly might not be as good as an isolate genome assembly. To evaluate the performance of co-assembly of reads from related strains, we created the EColiStrains dataset consisting of 10 million reads from 30 strains of Escherichia Coli. For comparing the assembly performance, we created another dataset with the same number of reads from a single strain, E.Coli strain 536 (represents the isolate assembly), and assembled it using the different k-mer size values used for assembly of the strains dataset. For isolate assembly, k=27 and 29 produced the longest contigs. Figure shows a comparison of isolated and metagenomic strains datasets for k=27 and 29. The contigs in metagenomic assembly are considerably shorter than the isolate assembly, suggesting a severe degradation in assembly quality resulting from the presence of multiple strains. Figure shows the source coverage ratio of the constituent strains for different k-mer size values. A relatively high percentage of the source sequences was recovered by the contigs. Table provides some additional assembly statistics for EColiStrains dataset. The EColiStrains dataset exhibited some of the same general trends as the simLC, simMC, and simHC datasets. But, the variations in the total number of bases and contig accuracies were less pronounced.
Contig length distribution of EcoliStrains dataset and isolate assembly. The total number of contigs (in log scale) shorter than a given cutoff length
Coverage of source sequences for EColi Strains
Paired ended assembly
To evaluate the improvement in assembly quality with mate-pairs information we generated and assembled datasets similar to simHC, simLC and simMC with paired-ended reads of insert length 2000 bases. However we observed that only a small fraction (less than 2 %) of the contigs being produced were using mate pairs information. In addition, most of these contigs were assembled with gaps. For our analysis we broke those contigs at the gaps and treated them as separate contigs. Therefore, because to these two factors, we did not observe a significant improvement in the assembly quality of paired ended reads in metagenomic samples.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698063918/warc/CC-MAIN-20130516095423-00018-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 9,415
| 22
|
http://astore.me/sports/marginal-cost-pricing-rule-dead-weight-loss-in-monopoly.htm
|
code
|
An average cost pricing rule sets equal to average total cost. A) total sales B) economic profit C) marginal product D) consumer surplus E). 16) Under a marginal cost pricing rule, a regulated natural monopoly A) makes an. Since the demand curve reflects the price and the marginal revenue curve is below. rule of producing where the marginal revenue equals the marginal cost, we. price, the single price monopolist captures a portion of the consumer surplus. The monopolist maximizes profit by equating marginal revenue with marginal cost. Why can the monopolist not appropriate the deadweight loss? Increasing. a rule that sets the price of a good or service equal to the marginal cost of producing it. This rule would force the natural monopoly to lower its price and. a price equal to marginal cost), it still has some deadweight loss since the. This benefit is offset to some extent by the costs of monopoly pricing. In following this rule, MRMC, for profit maximization, competitive firms and. the deadweight-loss triangle between the demand curve and the marginal-cost curve equals. DWL. Figure 9.4 Deadweight Loss of Monopoly. 9.2.1 Non-Linear Pricing. in such things, see Berg and Tschirhart, Natural Monopoly Regulation or Spulber, The government decides to regulate this market using marginal cost pricing. c) Identify in the graph the equilibrium price and quantity that corresponds to this type of regulation.
D) creates the maximum deadweight loss. Answer A 80) In a regulated natural monopoly, a marginal cost pricing rule maximizes A) total costs. B) producer. At each level of output, marginal revenue is less than the price. A single-price monopoly creates a deadweight loss that is inefficient. Price cap regulations give a firm an incentive to minimize cost in order to earn an economic profit. What is the deadweight loss due to profit-maximizing monopoly pricing under the. revenue and marginal cost curves occurs where output is 100 units and.Explain how monopoly regulation influences. A single-price monopoly is a firm that must sell each unit of its. The marginal revenue curve slopes downward and is below the demand. consumer surplus into economic profit. To extract.
To derive Marginal revenue MR 1300 - 4 Q Double the slope coefficient check by directly. But the MR MC rule will minimize losses. Consumer. What would it be if the monopolist adopted marginal cost pricing? Note that. The deadweight loss due to monopoly is CSmc PSmc - (CSmono PSmono). 160,000 0. Such firms continue to use the marginal decision rule in maximizing profits, but. If demand is price elastic, a price reduction increases total revenue. The fact that society suffers a deadweight loss due to monopoly is an efficiency problem. In a monopoly, the price is set above marginal cost and the firm earns a positive. This leads directly into the marginal decision rule, which dictates that a given. be maximized or minimized. deadweight loss A loss of economic efficiency that.
Single-price monopoly charges the same price. Figure 12.2 illustrates the deadweight loss from a sin-. A marginal cost pricing rule requires the firm to. Lecture 14 - The Size of the Deadweight Loss of Monopoly. What if the price is, above marginal cost is 1.20 per unit. D.C. area where uh,regulations get made, where tax codes get set, so as to try to influence their market. This high price makes consumer surplus (shaded yellow in the graph) rather small. might step in and force the monopolist to set its price at marginal cost. 1. Welfare Effects of Monopoly. Cost. Marginal revenue is closer to price as demand. good, so a deadweight loss to society. Optimal Price Regulation.
Second, when price is reduced, marginal revenue is the difference between the. Policy that provides state ownership or regulation of the natural monopoly. There is deadweight loss to society when a single-price monopoly profit maximizes. Assume a monopolist has MC 10 and no fixed costs. The monopolist sets its quantity by the profit maximizing rule, MR MC. The deadweight loss is simply the area between the demand curve and the marginal cost curve over the quantities 10. In a perfectly competitive market, marginal revenue is simply the price. Although. graph to show a comparison to the shutdown rule for the competitive firm. lower), they must understand the concept of deadweight loss.
A Rule of Thumb for Pricing Example 10-. 1 Market for. produce so that price exceeds marginal cost. A deadweight loss is also created with monopoly. A monopolist will produce where its price is greater than its marginal cost, but at the cost to society of less overall consumer surplus or welfare. will base its price and output decision on the profit maximization rule that all. What is the area of deadweight loss when Light-U-Up produces the. what is its economic profit if it must follow a marginal cost pricing rule? A) 0. That is, when the monopoly charges a price above marginal cost, some. case of perfect price discrimination, the deadweight loss of monopoly is completely. Even though MR MC is the profit-maximizing rule for both competitive firms and.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155702.33/warc/CC-MAIN-20180918205149-20180918225149-00180.warc.gz
|
CC-MAIN-2018-39
| 5,118
| 6
|
https://ec2-52-90-15-253.compute-1.amazonaws.com/best-is-speechify-free-api-in-nodejs/
|
code
|
Both developers and non-developers can get what they want from the Speechify API. This API is intended to be used by non-developers who wish to easily embed text-to-speech features in their applications or websites. Additionally, if you are a developer, you may use this API as a foundation for your own text-to-speech development or applications. A thorough documentation is available for this API, so you will learn how to integrate it into your projects and use the extensive possibilities it offers. This API is accessible and easy to use, and enables you to choose the voices that best fit your project or application. It offers several voices in a variety of languages, including American English, British English, French, German, Spanish, Japanese, and more. The speech rate can also be customized to meet your needs. In addition to this high level of customization, this API is also very simple to use. Simply enter the text that you wish to have spoken; choose the voice you want the text to be spoken in; and choose whether you want the speech to pause after each sentence or not. This API provides a lot of control over the output because it allows for fine-tuning of pronunciation, volume, speed and other parameters. It supports plain text as well as HTML tags in input strings. It also supports SSML tags which are used for controlling various aspects of the output audio stream. To sum up, Speechify is a very user-friendly API that provides a lot of control over the output audio stream thanks to its many parameters for fine-tuning pronunciation, volume, speed and other aspects of the output audio stream. Here are some reasons why you should consider using this API if you are looking for an easy way to add voice capabilities to your website or application: The Speechify API is easy to use because it is designed to work with both developers and non-developers alike. Some people may prefer not to learn how to code in order to use a text-to-speech API; others may be interested in learning more about programming as a result of working with this API. Adding text-to-speech capabilities to your website or application is simple with this API. It supports a wide range of languages and dialects, allowing users from around the world to utilize your service or product. Whether they are native English speakers, native Spanish speakers; or speakers of another language altogether, they will all be able to understand your content thanks to the support for multiple languages
Text to Speech API with realistic voices and SSML support.
To make use of it, you must first:
1- Go to GetWoord and simply click on the button “Subscribe for free” to start using the API.
2- After signing up in Zyla API Hub, you’ll be given your personal API key. Using this one-of-a-kind combination of numbers and letters, you’ll be able to use, connect, and manage APIs!
3- Employ the different API endpoints depending on what you are looking for.
4- Once you meet your needed endpoint, make the API call by pressing the button “run” and see the results on your screen.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.87/warc/CC-MAIN-20240421071342-20240421101342-00053.warc.gz
|
CC-MAIN-2024-18
| 3,078
| 7
|
http://hci.stanford.edu/research/paper/documentation/doxygen/html/classedu_1_1stanford_1_1hci_1_1r3_1_1actions_1_1types_1_1_run_app_action.html
|
code
|
RunAppAction Class Reference
Inheritance diagram for RunAppAction:
List of all members.
Public Member Functions
| ||RunAppAction (File execFile)|
| ||RunAppAction (String execName)|
| ||Use this for running apps that are in the System PATH. |
|void ||invoke ()|
Run a local file, that is either in the system PATH, or addressed by an absolute path.
This software is distributed under the BSD License.
- Ron B Yeh (ronyeh(AT)cs.stanford.edu)
Definition at line 20 of file RunAppAction.java.
Constructor & Destructor Documentation
Use this for running apps that are in the System PATH.
Definition at line 36 of file RunAppAction.java.
Member Function Documentation
The documentation for this class was generated from the following file:
Generated on Sat Apr 14 18:21:40 2007 for R3 Paper Toolkit by
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948572676.65/warc/CC-MAIN-20171215133912-20171215155912-00540.warc.gz
|
CC-MAIN-2017-51
| 796
| 18
|
https://github.com/techatnyu
|
code
|
GitHub is home to over 40 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.
📰 Internal administration platform
📆 Tech@NYU Calendar
✉️ RSVP to one of our events
☑️ Event checkin platform for Tech@NYU events
Caretaker of the universe
ship at tech@nyu
📘 One-stop for all Tech@NYU information
Tech@NYU Internal-wiki running our own instance of MediaWiki
A slack bot to keep our eboard informed
Getting feedback for events via text
A static information site for the gamejam event
👋 Export History For Private Groups From Slack
📋 Static site implementation for our job-board
Serves .ics files (i.e. calendar feeds) generated using the events in the Tech@NYU API.
📖 Coding Styleguides + Examples
Assets we use at Tech@NYU
Initial public offering
📝 Emails attendees and e-board members to request for feedback
API around our wrapper
🔑 Simple Python wrapper ontop of the API
🌹 🏃 valentine day
Our tutorials now online!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574710.66/warc/CC-MAIN-20190921231814-20190922013814-00536.warc.gz
|
CC-MAIN-2019-39
| 1,029
| 23
|
http://cbse10thresult2016x.in/cbse-10th-result-2016-pass-highest-percentage/
|
code
|
10th result of central board of the secondary education CBSE 10th examination result has been published as per the students performs may be the exam attend student getting passed or fail. In the CBSE 10th result the student who is getting CBSE 10th highest percentage 2017 has been separately notes by the board of the government and they are highlighted the subjects they get top most mark. In every subject there is a student who getting the highest mark in the examination.
CBSE 10th Pass percentage 2017
The CBSE 10th result percentage 2017 of the student is calculated as per the central board of the examination has per the rules the percentage are given to the student. In the result publishing there is only pass or fail information is only displaced other than that any other information has does not been displayed. Percentage of the student is only displaced at the CBSE 10th mark sheet which official given by the central board.
The CBSE 10th highest percentage is to be noted for every student to know the subject wise highest percentage and also to intimate to the concern students and to the schools. Every school has their certain CBSE 10th result 2017 highest percentage the central board collect all the percentage information of the students from all the central board undertaken schools are calculated and it maintained with one particular information of the highest percentage.
CBSE 10th highest percentage 2017
The pass percentage of the students all over the India has been calculated and then the pass percentage is calculated to every district and then the pass percentage is calculated by every school handling the CBSE syllabus.
When coming to the CBSE syllabus the percentage is differ and it is about 1200 when compare to the higher secondary. Maximum mark of the 1200 is calculated with the student’s percentage. The CBSE 10th percentage is about the grand total of the student with the maximum mark.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948521292.23/warc/CC-MAIN-20171213045921-20171213065921-00455.warc.gz
|
CC-MAIN-2017-51
| 1,932
| 7
|
https://lists.debian.org/debian-user/2017/10/msg01063.html
|
code
|
On Mon, Oct 30, 2017 at 11:33:36PM -0700, Dan Hitt wrote:
I plan to produce some time series data and i would like it to be in a form that makes it easy or effortless for pre-existing programs to plot or even process further. The data would consist of a few hundred to a few thousand time points, and for each time point there would be a half-dozen to a dozen values. So conceptually it would be something like a csv file with a few hundred to a few thousand rows, and a half-dozen to a dozen columns. However, a csv file doesn't seem exactly right, as i would like the files to include some embedded metadata (ideally in some form that at least in principle could be digested by another program). I suppose i could have some comment lines somehow, but that feels pretty ad hoc. But maybe i'm being overly fastidious. Something like a RIFF file format (like WAVE) might be better, but not sure what it would be. For the plotting or processing software i'd want to use something like octave or python/matplotlib or a derivative. I googled around for time series file formats, and i didn't see exactly what i was looking for. So i'd appreciate any advice or suggestions, and thanks in advance!
The lowest-common-denominator here is usually RRD , the Round-Robin Database. This will give you a fixed-size file containing various "buckets" for data at specific intervals (for example every 5 minutes for a day, every hour for a month and every day for a year). Lots of programs can read and write RRD because it's been stable for ages.
If you want something a bit more new/capable/interesting, there's whisper , the TSDB for carbon/graphite. Or OpenTSDB , or InfluxDB or Prometheus .
https://oss.oetiker.ch/rrdtool/index.en.html http://graphite.wikidot.com/whisper http://opentsdb.net https://www.influxdata.com https://prometheus.io
-- For more information, please reread.
Description: PGP signature
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00858.warc.gz
|
CC-MAIN-2023-40
| 1,902
| 7
|
http://origami64.net/showthread.php?tid=727&page=2
|
code
|
(25-03-2017, 09:38 PM)Skarf Wrote: Had some troubles starting the game up when trying to play it with a friend, and I was wondering if anyone knew how to fix it:
-Downloaded the AQZ netplay plugin bundled with PJ64 2.3
-Both of us followed the instructions on the AQZ netplay plugin homepage
-Both of us opened up the same ROM (the .z64 provided in the DL, assuming we didn't have to patch anything and that ROM was prepatched)
-Friend who was hosting has ports forwarded and I was able to successfully connect
-As soon as either of us did /start, we both instantly got this error:
Unhandled R4300i opcode at: 8006E754
Stopping Emulation !
Really excited to try playing multiplayer on this, so if anyone could help tell me what I'm doing wrong in setting it up and how to fix it, it would be greatly appreciated. Thanks!
Thanks for giving the details on the error, I'll probably be able to sort this out fairly quickly.
Edit: There seems to be a mysterious second layer of checksum only PJ64 2.1 undergoes for some reason, so I'm having trouble debugging this without an actual debugger. Try using the emulator I included with 1.0.1, It includes a copy of AQZ you can select in the plugin settings.
(This post was last modified: 26-03-2017, 04:47 AM by Skeletons.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120338.97/warc/CC-MAIN-20170423031200-00483-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,264
| 12
|
https://index.scala-lang.org/search?q=depends-on:mattroberts297/slf4s-api
|
code
|
Quasar Analytics is a general-purpose compiler for translating data processing and analytics over semi-structured data into efficient plans that run 100% in the target infrastructure.
Async and clustered Scala web framework and HTTP(S) server
A monorepo that holds all of Foursquare's opensource projects
Deploy Spark cluster in an easy way.
SBT plugin for Apache Spark on AWS EMR
Scala wrapper for Annoy
Fault tolerant distributed task scheduler.
Castle Router is an efficient implementation for querying data from Kafka
Kubernetes service discovery hook to register a service update callback in Scala
Castle core library
Run your Spark on AWS EMR by sbt
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141189141.23/warc/CC-MAIN-20201127044624-20201127074624-00615.warc.gz
|
CC-MAIN-2020-50
| 655
| 11
|
https://dotclue.org/archive/2006/03/002513/
|
code
|
(if you arrived via the RSS feed, you may have missed the joke)
Update: I guess I was a bit too subtle. One friend said “it looks like you used some font that’s not on my Linux box”. Another said “hey, it looks like your site’s been hacked”, but he also fell for World of Warcraft’s prank.
I had a more elaborate prank planned, with a very specific target in mind, but I just plain ran out of time. This was an easy, last-minute joke: grab some Japanese spam email from my Junk folder, type “asian porn” into Google and grab some non-explicit banner ads and thumbnails, create a simple but hideous layout, and compose a Bad Haiku that could easily be translated by BabelFish (whence the name of my “haxx0r”, Babe.F1sh).
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336880.89/warc/CC-MAIN-20221001163826-20221001193826-00629.warc.gz
|
CC-MAIN-2022-40
| 741
| 3
|
https://petri.com/forums/topic/remote-office-shared-calendar-2
|
code
|
Situation – I am in a main office and we have 12 remote offices. The remote offices use our exchange 2003 server with outlook 2003 setup with POP/SMTP. The head person in each office has asked for a shared office calendar be setup for their office. The offices are connected to the Internet by DSL but are not on a VPN to the main office. What is the best way to setup these 12 remote offices so each office has their own shared calendar? My thought is to take them off POP/SMTP and setup RPC over HTTP. Will that work? Is this how most folks take care of this type of situtaiton? Also, if this is the best solution can you point me to good documentation for setting this up on both Exchange 2003 and Outlook 2003? By the way – does the RPC/HTTP require SSL?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703549416.62/warc/CC-MAIN-20210124141945-20210124171945-00154.warc.gz
|
CC-MAIN-2021-04
| 762
| 1
|
http://www.acne.org/messageboard/topic/341713-is-it-safe-to-be-on-minocycline-for-years/
|
code
|
Posted 22 May 2014 - 03:59 PM
Posted 14 June 2014 - 02:21 PM
Posted 14 June 2014 - 04:08 PM
No its not good to be one prescribed antibiotics for a long period of time. You are prone to future antibiotic resistant strains of infection, your immune system is also considered weaker in the respect that you are supplementing antibiotics instead of your own immune system to fight infections. You also are at risk for side effects and adverse effects to long term minocycline use.
Regardless of what your derm says its your body its your health. You do as you wish.
Posted 22 June 2014 - 02:58 PM
If I was you I would request a blood test. A few years ago I was on minocycline for over a year and a routine blood test showed that I had slightly reduced liver function due to the minocycline. I didn't even have any side effects or anything. This returned to normal after stopping the mino. If the results of your blood test are normal and your doctor says that it's safe to continue then I don't see why you can't keep taking it. Interestingly I inquired about taking mino again recently and I was told that it's not prescribed much anymore in the uk for acne due to the side effects.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645176794.50/warc/CC-MAIN-20150827031256-00287-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 1,252
| 9
|
https://www.ocaml.org/p/async_rpc_kernel/v0.12.0/doc/CHANGES.md.html
|
code
|
Rpc.dispatch', which is like
dispatchbut returns an
Rpc_result.t, which has more information than the
Add some benchmarks for Pipe_rpc
Optimize the server side of Pipe RPC and add an expert interface.
This feature will benefit all Pipe RPC implementors.
│ Name │ Time/Run │ mWd/Run │ Percentage │
bench.mldirect write │ 148.87ns │ 126.00w │ 100.00% │
│ Name │ Time/Run │ mWd/Run │ Percentage │
bench.mldirect write │ 69.71ns │ 3.00w │ 94.99% │
bench.mldirect write expert │ 73.39ns │ │ 100.00% │
Note: the reason the expert version is slightly slower is identified:
if we replace the
rpc_transport_low_latency.ml, then the expert version becomes faster.
The RPC tests for Pipe RPC showed a nice improvement on the server
side: lower CPU consumption and roughly 20% faster
Remove the ~update argument from State_rpc.dispatch.
Before this feature, the dispatch method for State_rpcs looked like this:
: ('query, 'state, 'update, 'error) t
-> update : ('state -> 'update -> 'state)
-> ( 'state * ('state * 'update) Pipe.Reader.t * Metadata.t
) Result.t Or_error.t Deferred.t
There are a couple of cases where having the
updatemethod there can be
sometimes the type of the state that it sent over the wire is different
from the type that is naturally maintained on the client side.
sometimes the update method needs to perform some Async computation to
return a new state.
It feels like the method is trying to be helpful, but has more of a tendency
of getting in the way. This feature removes this method.
The old API may be reinstated by using a
State_rpc.dispatch rpc connection query
Add support for
Implementation and interface very closely resemble that of a
Cleans up the implementation-side interface for aborting
Deferred.tthat got passed to
gone. The situations where it would have been determined now close the reading
end of the user-supplied pipe instead.
Previously, when an RPC dispatcher decided to abort a query, the RPC
implementation would get its
Deferred.tfilled in, but would remain
free to write some final elements to the pipe.
This is a little bit more flexible than the new interface, but it's also
problematic in that the implementer could easily just not pay attention to
aborted. (They're not obligated to pay attention to when the pipe is closed,
either, but at least they can't keep writing to it.) We don't think the extra
flexibility was used at all.
In the future, we may also simplify the client side to remove the
function on the dispatch side (at least when not using
dispatch_iter). For the
time being it remains, but closing the received pipe is the preferred way of
aborting the query.
There are a couple of known ways this might have changed behavior from before.
Both of these appear not to cause problems in the jane repo.
In the past, an implementation could write to a pipe as long as the client
didn't disconnect, even if it closed its pipe. Now writes will raise after
a client closes its pipe (or calls
abort), since the implementor's pipe will
also be closed in this case. Doing this was already unsafe, though, since the
pipe was closed if the RPC connection was closed.
abortedwas only determined if a client aborted the query or the connection
was closed. The new alternative,
Pipe.closedcalled on the returned pipe,
will also be determined if the implementation closes the pipe itself. This is
unlikely to cause serious issues but could potentially cause some confusing
Blocking RPC implementations (i.e., ones made with
Rpc.implement') now capture
the backtrace when they raise. This is consistent with what happens in the
deferred implementation case, since in that case the implementation is run
Monitor.try_with, which captures backtraces as well.
Here's an example of what a new error looks like:
((location "server-side blocking rpc computation")
"Float.iround_up_exn: argument (100000000000000000000.000000) is too large"))
"Raised at file "pervasives.ml", line 31, characters 25-45
\nCalled from file "result.ml", line 43, characters 17-22
\nCalled from file "monad.ml", line 17, characters 20-28
(connection_description ("Client connected via TCP" (localhost 3333)))
(rpc_tag foo) (rpc_version 1))
Transfer.Writer.send*raises, send an error to the client.
Switched to ppx.
Expose the lower-level registration hook in
Allow custom handling of missed async_rpc heartbeats.
dispatchfunction does not behave well when the reader side
of the pipe is closed.
It should gracefully abort the rpc instead of raising exceptions, or whatever it currently does.
Rpc.Expert.implement'with a similar
One_way.Expert.implementbut for 2-way rpcs.
Exceptions raised by an expert implementations are handled as follow:
if the query has already been answered, stop the server (as for one-way expert)
if not, send a
Rpc_error.Uncaught_exn(as for 2-way rpc)
Rpc.Pipe_rpc.dispatch_iter, plus a bunch of additional types to support
it. The main reason for this is to reduce space usage:
Pipe.iter_without_pushbackconsumes ~105 words in the steady state
(i.e., when no messages are coming in) while
dispatch_iterconsumes ~15. I'm
dispatchcan be improved a lot, but a pipe by itself is 46 words, so it
can't possibly become as small as
Both cases can be made smaller by making
instead of a closure. I plan to do this later.
One annoying property of the interface is that the only way to cancel
a subscription is to use
Pipe_rpc.abort, which has a terrible interface.
The logical way to improve the interface is to return a record of
Connection.t, and a
Query_id.t, which allocates an
additional few words. I'd kind of like to do this but it seems counter to the
goal of reducing space usage.
Rpc.Pipe_rpc.implement_direct, which uses a "direct stream writer" to
write results to the other side, rather than using a
consumes much less memory, ~15 words per open query as opposed to ~225 for
A large part of the diff in this feature is the addition of a module
Implementation_types, which just contains copies of type definitions from
Implementations. This is necessary to handle some cyclic
type definitions (both of these modules now depend on types defined in the other
This is the implementation-side dual of
Versioned_rpc.Both_convertso that commands can be constructed without client-side
conversions. Clients remain free to use conversions or not, as appropriate.
Callee_convertsinterfaces because nothing appears to use it,
Both_convertdoes not provide it. Now
Both_convert.Scan be supplied to satisfy
Annotate errors returned by the async-rpc library with the name of the RPC for
which the error was returned (if it's an rpc-level error) and a description of
the remote side of the connection (the ip:host if connected via a network
val rpcsin versioned_rpc modules.
Fixed race in
Rpcthat caused double connection cleanup.
Connection_closedand a Writer error,
occurring at the same time will cleanup the connection twice and call
response_handler of open_queries twice with two different errors.
(((pid 31291) (thread_id 0))
"unhandled exception in Async scheduler"
("Ivar.fill of full ivar" (Full _)
("Raised at file "error.ml", line 7, characters 21-29"
"Called from file "rpc.ml", line 101, characters 8-31"
"Called from file "connection.ml", line 251, characters 8-172"
"Called from file "core_hashtbl.ml", line 244, characters 36-48"
"Called from file "connection.ml", line 248, characters 2-278"
"Called from file "async_stream.ml", line 49, characters 53-56"
"Called from file "async_stream.ml", line 21, characters 34-39"
"Called from file "job_queue.ml", line 124, characters 4-7" ""))
(((name main) (here ()) (id 1) (has_seen_error true)
(is_detached false) (kill_index 0))))))
((pid 31291) (thread_id 0)))))
Fixed bugs in
Rpcin which a TCP connection's reader was closed before its
Versioned_rpc, eliminated an unnecessary Async cycle when placing RPC
give the reason why a pipe returned by an RPC was closed.
These functions take the IDs that are returned along with the pipes by
the dispatch functions, so the interface of
dispatchdid not need to
Rpc.Expert.dispatchexpose that the connection was closed, just like
Expose the name of the
Async_extra.Rpcto its own library,
abstracted its transport layer.
Async_kernel_rpcdepends only on
Async_kernel. This allows
different use cases.
Versioned_rpcwas moved to
Rpc.One_waymodule, for RPCs that do not expect any response
We have been able to send 6_000_000 (contentless) one-way messages
per second under some idealized circumstances.
Rpc, added an optional
heartbeat_configargument to configure
the heartbeat interval and timeout.
Rpc, added some information to
connection_stateargument to the
Rpc.Connection.serve, one can put client addresses in
connection_state, so this makes it possible to identify who
sent the unknown RPC instead of just saying what the RPC's name and
Rpc.One_way.Expert, which has an
gives direct access to the internal buffer instead of using a
Rpcnot raise an exception if a connection is closed due to
Transportimplementation to not
transferfunction similar to
Changed the RPC connection to flush the pipe when the writer is
closed, which was the only behavior of
that had been relied on.
With this change, if someone closes the underlying writer by hand
the pipes won't be flushed, which should be expected anyway.
Fixed an issue where "normal"
Pipe_rpcerrors caused the connection
Such errors include querying an unknown RPC or getting an exception
raised by the RPC implementation shutdown. Now such errors behave
Rpcerrors, i.e. they are completely ignored besides being
put in the return value of
Errors that occur later in
Pipe_rpcstill cause the connection to
close, since these should only occur if there is a bug somewhere.
Rpc, connection-closing errors no longer raise top-level
One can now call
close_reason : t -> Info.t Deferred.tto get the
reason the connection was closed.
Rpcto not write if the transport is closed.
The fix doesn't check that the writer is closed, but instead ensure
that we don't try to write when we shouldn't. This means that it
will still fail if the user close the transport by hand, which they
This change requires transport implementations to fail after they
have been closed. This is different from the semantics of
Async_unix.Writer, but the latter is non-intuitive and makes it
hard to check the correctness of the code. Moreover it is only
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00230.warc.gz
|
CC-MAIN-2023-06
| 10,358
| 201
|
http://softwaretopic.informer.com/request-code-autocad-land-2007/
|
code
|
This program makes Autodesk Building Systems 2007 objects come to life.
The Code::Blocks Team
Program and debug applications in C, C++, and Fortran.
It is a program that allows you to explore and visualize 3D concepts.
STL2CAD 2007 - Import STL is an AutoCAD application to import STL files.
DWG TrueView: Free application for viewing and plotting DWG and DXF files.
It's designed for civil engineers, designers working on transportation design.
AutoCAD® Land Desktop software is the design and documentation solution.
STL4CAD 2007 - Export STL is an AutoCAD application to export to STL file.
Design of furniture - an application for AutoCAD 2007-2015.
An application which converts AutoCAD files into G-Code utilities.
Welcome to the land of horror, the land of the undead.
CLUE model is a dynamic, spatially explicit, land use and land cover model.
The Land Change Modeler is a land cover change analysis and prediction software.
Cube Land forecasts land use by simulating the real estate market.
World Agroforestry Center
You can estimate emission from land use and land cover changes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038887646.69/warc/CC-MAIN-20210419142428-20210419172428-00241.warc.gz
|
CC-MAIN-2021-17
| 1,090
| 17
|
https://lists.deepspace6.net/pipermail/ipv6calc/2004-August/000009.html
|
code
|
[ipv6calc] New version in CVS gets a new feature: detection of MS 6to4 address
pb at bieringer.de
Mon Aug 30 23:07:48 CEST 2004
I added one new feature to showinfo and ipv6logconv: detection of
Microsoft's 6to4 address (usually 2002:<ipv4addr>::<ipv4addr>).
This will give more clarifications on the OUI type statistics:
%reqs: reqs: host
------: -----: ----
69.82%: 25061: local-scope.ouitype.ipv6calc
4.88%: 1751: 6to4-microsoft.ouitype.ipv6calc
4.11%: 1476: 3com.ouitype.ipv6calc
2.79%: 1002: intel.ouitype.ipv6calc
1.92%: 690: cisco.ouitype.ipv6calc
Before the new feature, the 4.88% were counted to local-scope.
Also I've updated the URLs to the IPv4 databases, they were changed some
BTW: am I sure that only Microsoft uses this special IID on 6to4?
If nobody complain, I will release 0.48 in the next week or so.
BTW2: a public available example what can be done with "ipv6logstats" (also
contained by this project) is available here:
Dr. Peter Bieringer http://www.bieringer.de/pb/
GPG/PGP Key 0x958F422D mailto: pb at bieringer dot de
Deep Space 6 Co-Founder and Core Member http://www.deepspace6.net/
More information about the ipv6calc
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00567.warc.gz
|
CC-MAIN-2023-40
| 1,146
| 23
|
http://www.urbandictionary.com/define.php?term=qwertyuiopzxcvbnmasdfghjkl&defid=6340141
|
code
|
When someone is so bored they press every key on the top row of letter on their keyboard then the bottom and then the middle.
Person:I'm actually that bored that i'm going to see what word i can make when i press every letter on my keyboard. I'll start from the top then move to the bottom and finally press the middle. Sounds like a boredom breaker.
Person: Oh cool it makes qwertyuiopzxcvbnmasdfghjkl
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698222543/warc/CC-MAIN-20130516095702-00044-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 402
| 3
|
http://serverfault.com/questions/260905/cloudmin-xen-problem-with-internet-speed-limit
|
code
|
I have Cloudmin setup on a CentOS 64 bit server and I have several virtual machines running on it using Xen.
When I try to change the 'Maximum network speed' in Cloudmin from Unlimited to anything (to throttle the VMs internet speed), the VM reports 'Ping failed' - and I am then unable to connect via SSH to it.
If I then change the Network speed back to Unlimited, it works fine. What could be the problem? I originally posted this on the Cloudmin forums a few days ago but have had no response so I thought I would post it here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403823.74/warc/CC-MAIN-20160624155003-00065-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 531
| 3
|
https://blog.function12.io/tag/design-systems/design-system-documentation-tools-a-comprehensive-comparison-of-uxpin-storybook-and-widget-book/
|
code
|
Design systems are an essential aspect of modern web development. They provide a standardized and consistent set of components, patterns, and guidelines for developers and designers to work together seamlessly. To maintain and manage these design systems, proper documentation tools are crucial. In this article, we will compare three popular design system documentation tools: UXPin, Storybook, and Widget Book. We will explore their features, usability, and how they can benefit developers and designers alike.
UXPin: A Collaborative Design Platform
UXPin is a powerful design and prototyping platform that offers a robust set of features for creating, managing, and documenting design systems. Some of its key features include:
- Real-time collaboration: UXPin enables designers and developers to work together in real-time, making it easy to communicate and iterate on designs.
- Version control: UXPin offers built-in version control, which helps teams keep track of changes and maintain a single source of truth.
- Design-to-code bridging: UXPin's Merge feature allows developers to import and use production-ready React components directly in their designs.
However, UXPin's primary focus is on design and prototyping, which may not cater to developers' specific needs in terms of design system documentation.
Storybook: An Interactive Component Explorer
Storybook is an open-source tool specifically designed for building and documenting UI components in a structured and interactive way. Key features of Storybook include:
- Component isolation: Storybook allows developers to create and test components in isolation, making it easier to develop and debug individual components.
- Customizable interface: Storybook offers a customizable interface that can be tailored to a team's specific design system requirements.
- Add-ons and integrations: With a vast ecosystem of add-ons and integrations, Storybook can be extended to support various workflows and tools.
Storybook is a powerful tool for developers, but it may require a steeper learning curve for designers and non-technical stakeholders.
Widget Book: A Flutter-Focused Design System Tool
Widget Book is a relatively new design system documentation tool, specifically tailored for Flutter developers. Some of its main features include:
- Flutter-first approach: Widget Book is built with Flutter in mind, making it an excellent choice for teams working with this framework.
- Live previews: Widget Book allows developers to preview their components and layouts directly within the tool, streamlining the development process.
- Simple setup: Widget Book requires minimal configuration to get started, making it easy to integrate into existing projects.
However, Widget Book may not be suitable for teams working with other frameworks or technologies due to its Flutter-centric approach.
Ease of Use and Learning Curve
When comparing ease of use and learning curve, UXPin stands out as the most user-friendly option for designers, while Storybook and Widget Book cater more to developers. Storybook may require some additional learning for designers, and Widget Book's Flutter focus may limit its applicability to a broader audience.
Integration and Extensibility
Both UXPin and Storybook boast extensive integration and extensibility options, allowing teams to customize and adapt the tools to their unique needs. Widget Book, being a newer and more focused tool, may not offer the same level of integration and extensibility.
UXPin is a paid platform with pricing tiers based on team size and feature requirements. Storybook, on the other hand, is open-source and free to use, with optional paid services for additional features and support. Widget Book is also open-source and free to use.
Introducing Function12: The Future of Design System Documentation
As technology advances, so too do the tools we use in the design world. One such innovation is Function12, a design system documentation tool that is gaining traction for its unparalleled efficiency and user-friendly approach. With its ability to automatically generate design system documentation with ease, Function12 is a game changer for designers and developers alike.
Effortless Documentation Creation
Say goodbye to manual documentation processes, as Function12's intelligent algorithms seamlessly produce comprehensive design system documents. This saves time and effort, allowing teams to focus on creating exceptional user experiences instead of getting bogged down in documentation tasks.
Function12 easily integrates with popular design and development tools, making it a versatile addition to any workflow. This compatibility ensures that teams can continue using their preferred software while also benefiting from the robust documentation capabilities that Function12 offers.
If you're seeking a design system documentation tool that automates the process, encourages collaboration, and adapts to your unique needs, Function12 is an excellent option to consider. With its user-friendly interface and advanced features, it's clear that Function12 is on track to become an indispensable resource for designers and developers worldwide. So why not give it a try and see how it can revolutionize your design documentation process?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817780.88/warc/CC-MAIN-20240421132819-20240421162819-00029.warc.gz
|
CC-MAIN-2024-18
| 5,265
| 30
|
https://civitai.com/articles/4022/stable-diffusion-restoring-old-pictures-to-their-former-glory
|
code
|
Restoring or Make old pictures like new.
For this test I will use:
Stable Diffusion with Automatic1111 (https://github.com/AUTOMATIC1111/stable-diffusion-webui)
To install Stable Diffusion check my article : https://civitai.com/articles/3725/stable-diffusion-with-automatic-a1111-how-to-install-and-run-on-your-computer
ControlNet component (https://github.com/Mikubill/sd-webui-controlnet )
Regional Prompter (refer to my article here https://civitai.com/articles/3959/stable-diffusion-testing-the-regional-prompter-plug-in-using-break)
Reactor (refer to my article here https://civitai.com/articles/3932/stable-diffusion-testing-reactor-face-swap-plug-in)
Installing Controlnet Component
Go to Extension Tab
Click on Install from Url
Paste the url https://github.com/Mikubill/sd-webui-controlnet
Go to the Installed Tab and clic "Apply and Restart UI" (or restart manually Stable Diffusion)
Looking for old pictures
I found in this article on the internet some pictures (these pictures are not mine and if you think that I should remove them write me a message and I will do so).
I selected this picture here
Star the process
Set the size of the image equal or proportional to the size of your image.
In my case is 700x850
Now let's test ControlNet. there are different option I will work with the "softedge option"
1) Enable "ControlNet"
2) Set the "SoftEdge"
3) Click the little button to display the result..
Now I will write my prompt
I decide that this girl has black air, blue clothes and drives a red car.
Prompt: 1girl (black hair) ,(red clothes:1.4), smile, solo (blue car:1.5)
The face is not got at all and the color are mixed up.
In this case I use the selection tool and I cut the face
You can do this with another picture if you have a better image of the subject.
Now I put the image in Reactor and enable it , I leave the default options.
I run different times, now the face is much better, but the colors can be a pain.
4° Test - Change ControlNet with Lineart
In controlnet you have many possibilities, I will now try "Lineart" ( you can test also the other, I will make a future article about all of them).
Now the image consistency is much better but I can have issues with the colors
5° Test - Setup Regional prompter
If you refer to my previous article the idea is to divide the image in parts and use a special prompt to give to each part the right information.
You enable the "Regional Prompter", setup "Rows" and the number 1,1,1 (it means 3 rows same size)
If you clic "Visualize and make template" you will notice
(We can also use BREAK, but I will user ADDROW in this case to change something )
Because I want to speedup the process I will set the "Batch count" to 9 to generate 9 pictures.
Here we are.. the regional prompt not always work .. but we already start to have some pictures with colors similar to the original.
You can work with your prompt and negative prompt to make it better.
I like this one.. but the jacket is not red.
Also this one is not so bad.. there is a contrast between the girl and the dark background.
Now I got my image 700x850... I want to make it bigger.
Select your image, Click on the "Send image and generation parameters to extras tab."
Now you can set the resize (which is upscaler by) I put 4 .. it means my output picture will be 2784x3392
Also I set the "Upscaler 1" to "4xUltrasharp"(here depens of the scaler your have installed, also about this I will write in the future).
Then I select GFPGAN to 1 (which improves the face during upscale)
And I got my improved image.
Of course it is not the same picture.. but it is a nice idea to improve your family old photos.
I've already revitalized my family album by infusing new life into all the old black and white pictures, contemplating the colors of yesteryears.
We often perceive the past in monochrome, yet with Stable Diffusion, we can now breathe vibrant hues into our memories.
I trust you'll find my article enjoyable. Feel free to leave comments below if you require further clarification.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474808.39/warc/CC-MAIN-20240229103115-20240229133115-00562.warc.gz
|
CC-MAIN-2024-10
| 4,019
| 53
|
http://perlguru.com/gforum.cgi?post=3994;sb=post_latest_reply;so=DESC;forum_view=forum_view_expandable;guest=7814157
|
code
|
Mar 13, 2000, 9:02 AM
Post #1 of 2
Hello! I need some help with file sorting. On my site, I have a archive section that takes text files for each item, and then puts them on a .shtml page, although, I cannot get the script to put them in alphabetical order. How can I get the script to open the file, reap the first line of the file, and order them all by that? Let me know. Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829115.83/warc/CC-MAIN-20181217183905-20181217205905-00486.warc.gz
|
CC-MAIN-2018-51
| 382
| 3
|
https://www.techzine.eu/news/security/59762/jet-engine-vulnerabilities-can-crash-microsoft-iis-and-sql-server/
|
code
|
A team of researchers have detailed vulnerabilities in the JET database engine.
Three researchers at Palo Alto Networks have detailed vulnerabilities in the JET database engine. They have also demonstrated how those flaws can be exploited to ultimately execute malicious code. The code payloads are delivered on systems running Microsoft’s SQL Server and Internet Information Services (IIS) web server.
At Black Hat Asia, senior principal researcher Tao Yan, principal researcher Qi Deng, and senior distinguished engineer Bo Qu explained it is possible to configure JET to access and query remote databases.
“IS and SQL Servers play very important roles in the Microsoft Ecosystem,” they said. “They have been considered unbreakable for many years, and over one decade has passed since the last severe IIS memory corruption vulnerability was disclosed.”
Disclosing a “novel attack surface” to attack IIS and SQL Servers
However, may questions have been raised. Are they unbreakable? What about having a SQL injection? Can a SQL injection in the ACCESS database only be used to view unexpected data in the database? What is the relationship between IIS/SQL Server and the ancient (~30 years old) Microsoft JET database engine from the attacker’s perspective?
“This presentation will answer all of those questions,” they said. “It discloses a novel attack surface to attack IIS and SQL Servers based on a SQL injection.”
Their presentation also discussed attack surface details and corresponding impacts in 3 classical attack scenarios in the real world: IIS+Access, IIS+SQL Server, and IIS+Webshell. It also showed 20-year old examples from dozens of vulnerabilities we found across all Windows versions released in the last two decades under this attack surface. I
The researchers said they shared their work with Microsoft. However, the tech giant waived them off, saying the problems they identified do not cross a defined security boundary.
The three researchers do believe Microsoft will eventually patch JET. They have also promised to withhold details of their findings until such remedies arrive. But the trio have no firm indication of when the Windows titan plans to deliver such a fix.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00012.warc.gz
|
CC-MAIN-2023-50
| 2,220
| 10
|
http://www.vistaheads.com/forums/microsoft-public-windows-vista-performance-maintenance/183734-vista-performance.html
|
code
|
might be interference with your virus scanner.
"rac8006" <email@example.com> wrote in message news:5E0D1638-3108-4095-AA61-729D1C4675DB@microsoft.com...
I got a new laptop. A Sony VAIO model VGE-AR630E. Its a duel core 2.0GHZ
with 2G of memory. I had a HP6000 omnibook single cpu 850MHZ with 256MB of
This laptop seems to be running slow. I've had time that when I clicked on
an icon to start an pplication that I thought that I didn't chick the icon.
But after several seconds the application would start.
On the old laptop if I right clicked on an excel file it would open excel
and load the file in about 2 seconds. On the new laptop donig the samething
using the same .xls file it would take about 10 to 15 seconds o open excel
and load the file.
I did find that if I started excel from the start menue and then loaded the
file it only too about 4 seconds.
Is this a problem with Vista or what. I guess I'm to used to XP or 2K.
Any help would be appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542217.43/warc/CC-MAIN-20161202170902-00369-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 962
| 15
|
http://blog.cpjobling.me/tag/wikis/
|
code
|
Learning Objects Campus Pack, used to provide for blogs, wikis and podcasts in Swansea University’s VLE, was updated at the same time as Blackboard. If you have one or more Learning Objects blog(s), wiki(s) or podcast(s) in your Blackboard (learning portal) module sites, they will be upgraded the first time you or your students visit them.
So we’re all agreed. Blogs: good; email: bad. Wikis: good; sending round attachments to a dozen people and then having to merge all the changes by hand afterwards: bad.
This one goes out to all my colleagues who really do want to send out attachments by email and merge changes manually. (No, I tell a lie, they want to send out printouts of documents and merge red-lined versions back into the electronic documents manually!) Here’s a presentation by Suw Charman (note no Powerpoint!!) recorded at Google HQ and released in the Google TechTalks series that spells out the barriers to social tools and why it might be good to embrace change. This is why I live my life on the web: welcome to my world!
(Note: video is 55 minutes long, so lock the door, take the phone off the hook and grab a coffee before hitting play.)
- Suw’s friend Stephanie Booth has blogged a summary of the presentation for those of you who haven’t got fifty-five minutes to spare.
- Stephanie Booth and Suw Charman discuss “Are PowerPoint Slides Evil?” in a Video Blog on Fresh Lime Soda.
Another hero on video. This time Ward Cunningham, the inventor of the WikiWikiWeb, interviewed by John Gage of Sun Microsystems at the Computer History Museum. As well as Wiki, Ward discusses other key developments, such as Class-Resources-Collaboration (CRC) cards, Software Design Patterns and Extreme Programming.
While doing some vaguely formulated research today (it is a Bank Holiday so vagueness is allowed!), I did a search for Wiki on Google video today and came across this video of a presentation by Jeremy Ruston (developer of TiddlyWiki) recorded (I believe – the video description is a bit unclear) at a meeting on social software held in Vienna last year. You can’t see the slides, but it is clear that, for documentation, Jeremy has no love for the standard office tools and makes a good case for wikis and in particular TiddlyWiki.
Powered by ScribeFire.
Today, I’ve been mostly watching Google videos! Aside from the previously blogged video on the death of the desktop I’ve also watched Brion Vibber’s Google Tech Talk on Wikipedia and the MediaWiki software that drives it. Also from Google Video was this Documentary on Open Source available on Google Video:
“Revolution OS is a 2001 documentary which traces the history of GNU, Linux, and the open source and free software movements. It features several interviews with prominent hackers and entrepreneurs (and hackers-cum-entrepreneurs), including Richard Stallman, Michael Tiemann, Linus Torvalds, Larry Augustin, Eric S. Raymond, Bruce Perens, Frank Hecker and Brian Behlendorf.”Here’s the video:
In my copious remaining free time, I have also added a links and a few new pages to the Swansea Learning Lab Resources Wiki, and listened to Part 1 of the JavaOne retrospective podcast, the first of two special podcasts from the Java Posse.
Powered by ScribeFire.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049486/warc/CC-MAIN-20131204131729-00001-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 3,271
| 13
|
https://us.community.samsung.com/t5/Galaxy-S-Phones/S10-latest-system-update-won-t-let-me-use-some-features-on-my/m-p/1906435
|
code
|
The last update 6/2021 won't let me use some features on my phone. It was a forced update that I didn't initiate. Is there ANY way to revert to previous update? And how do I disable updates to phone. I thought I did it before but obviously not. Samsung is failing me big time right now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363515.28/warc/CC-MAIN-20211208144647-20211208174647-00475.warc.gz
|
CC-MAIN-2021-49
| 286
| 1
|
http://gmatclub.com/forum/a-certain-smoothie-a-is-three-fifths-blueberries-and-144541.html
|
code
|
In these sorts of scenarios, when you're not given a specific amount of the items involved (in this case, Smoothie A and Smoothie B), you can TEST VALUES and use real numbers to answer the question.
Here, we know:
Smoothie A is 40% raspberries
Smoothie B is 25% raspberries
We want to mix some of each and end up with a 30% raspberry mixture
Here's how to TEST VALUES:
Lets's say we have 10oz. of Smoothie A...
10(40%) = 4 oz. raspberries
Now, we can calculate how much Smoothie B we need by using the Weighted Average Formula:
Let's say we have Xoz. of Smoothie B...
X(25%) = .25X oz. raspberries
Rasp/All = (4+.25X)/(10+X) = .3
4+.25X = 3 + .3X
1 = .05X
20 = X
This means that we would need 20 ounces of Smoothie B to be mixed with 10 ounces of Smoothie A to end up with a 30% raspberry mix at the end. The question asks what percent of the mixture "belongs to Smoothie A"
A/All = 10/30 = 1/3 = 33.33%
GMAT assassins aren't born, they're made,
Official Guide 2016 Question Breakdown:
GMAT Club Verified Reviews for EMPOWERgmat & Special Discount
EMPOWERgmat Podcast - A Wild Secret About The GMAT Algorithm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644066275.44/warc/CC-MAIN-20150827025426-00345-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 1,108
| 21
|
https://www.startuphire.com/job/webrtc-real-time-communications-software-engineer-san-francisco-ca-jive-software-192076
|
code
|
WebRTC (Real Time Communications) Software Engineer Jive Software
THIS JOB HAS EXPIRED WebRTC (Real Time Communications) Software Engineer - San Francisco, CA
Come join the small team at Meetings.io (now part of Jive Software) to help us build amazing real time experiences on the web. Our flagship product Meetings.io has made a big impact on what simple video collaboration means and we're taking this to the next level and looking for bright and ambitious people to join our small but highly talented team to help us build the next evolution of Meetings.io and real time communication on the web.
While WebRTC is still in its infancy we feel strongly that WebRTC is the future of all communications. The potentials of a completely in-browser peer 2 peer communication system is endless and as such we're looking for fellow believers who believe in the potential of WebRTC and would like to lead our WebRTC efforts. You will have free reign to experiment, break things, and innovate without limits. If you have WebRTC experience (from both the architectural and development perspectives) then you should join us and help us make WebRTC a household technology.
Build our WebRTC version of Meetings.io and other real time capabilites.
Explore real-time prototypes and proof of concept models for the future of communications.
Identify new opportunities for innovation and help derive patents.
Participate in building the frontend or backend of Meetings.io and other real-time products.
Interact with other team members to incorporate their innovations and vice versa.
Identify and communicate best practices for WebRTC systems.
Healthy knowledge of the WebRTC specification with some demos of previous projects built with WebRTC.
Experience in front-end or back-end development for consumer or enterprise cloud based web products.
Ability to experiment, innovate, test and built prototypes.
Some experience with other real time communication technologies including Adobe Flash/Flex/Air with RTMFP and SIP, XMPP etc.
Passion for innovation and the ability to execute ideas.
3+ years experience building web infrastructure and technologies.
BS or MS degree in Computer Science, Electrical Engineering or related Engineering disciplines.
||San Francisco, CA |
THIS JOB HAS EXPIRED
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917126237.56/warc/CC-MAIN-20170423031206-00260-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,277
| 19
|
https://www.zenhabitats.com/pages/3-simple-tips-on-keeping-your-pet-snake-secure-in-a-zen-habitats-enclosure
|
code
|
3 Simple Tips On Keeping Your Pet Snake Secure In A Zen Habitats Enclosure
What Can You Do To Help Secure Your Snake In Your Reptile Enclosure
Keeping snakes secure can be particularly difficult, especially if the snake is small and can fit through the smallest of openings. Owners of pet snakes may run into issues keeping these little escape artists safely contained inside of their enclosure. At Zen Habitats, we have designed our enclosures with large and small animals in mind, to ensure the safety of pets of all sizes. In this article, we will explore how the Zen Habitat utilizes several safety features that contribute to maintaining the security of your pet snake within a Zen Habitats enclosure. If you would like to check out the full YouTube video on this topic, check it out here: 3 Tips To Secure Your Snake In Your Reptile Enclosure
1. Wire Lock: One of the key security features of Zen Habitats enclosures is the inclusion of a simple wire lock. This lock ensures that the sliding glass doors remain securely closed, minimizing the risk of accidental openings and potential escapes. The wire lock prevents even the most persistent of animals from pushing open their sliding doors.
2. Door Wraps: Zen Habitats enclosures also come with door wraps, which play a crucial role in preventing escapes, particularly for small snakes. These wraps securely attach to the sliding doors using super glue, effectively reducing the gap between them. By minimizing the space between the doors, the chances of a snake squeezing through is sharply reduced, offering an extra layer of security. Door wraps can also help prevent the instance of the doors bowing over time.
3. Solid Grommet: To address the potential escape routes within the enclosure, Zen Habitats enclosures are equipped with a solid grommet. This feature ensures that small snakes cannot escape through the wire grommet hole. By replacing the standard wire grommet with a solid one, Zen Habitats eliminates any possibility of a small snake slipping through, increasing the overall security of the enclosure.
Ensuring you have a secure environment is essential for the safety of pet snakes, and Zen Habitats enclosures offer practical solutions to minimize the risk of pets escaping. By investing in a Zen Habitats enclosure and utilizing these optional security features, you can enjoy a stress-free snake keeping experience by providing your reptiles with an escape proof, tranquil habitat.
Easy DIY Reptile Enclosure Enrichment For Snakes
Basics of Providing Enrichment For Snakes
15 of the Most Colorful Reptiles in the World - You Can Own!
Why Zen Habitats Is The Only Reptile Enclosure You Will Need!
Black Reptile Enclosures Like Never Before | Zen Habitats Black Reptile Enclosures
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00815.warc.gz
|
CC-MAIN-2023-40
| 2,756
| 12
|
http://slideplayer.com/slide/3891043/
|
code
|
Design in HCI It is a process: a goal-directed problem solving activity informed by intended use, target domain, materials, cost, and likelihood a creative activity a decision-making activity to balance trade-offs
Question 10 List the Interaction Design activities
Interaction Design activities 1. Identifying needs and creating requirements 2. Developing alternative designs 3. Building interactive versions of the designs like a prototype 4. Evaluating designs
USERs/STAKHOLDERs 1. those who interact directly with the product 2. those who manage direct users 3. those who receive output from the product 4. those who make the purchasing decision 5. those who use competitor’s products
User’s Needs Look at existing tasks: 1. their context, eg. background, situation, … 2. what information do they require? 3. who collaborates to achieve the task? 4. why is the task achieved the way it is?
Question 26 What’s the difference between requirements and design
Answer 25 RequirementsDesign Statements of what the system should do (or what qualities it should have) A description of how we will implement a solution
Question 26 What’s the difference between verification and validation
Verification and Validation VerificationValidation designing the product right designing the right product
Question 26 What are the Flaws (FAULTS) of the Waterfall
Flaws (FAULTS) of the Waterfall Need iteration and feedback Inflexible Doesn’t emphasis risk, quality, and prototyping
Question 26 What’s the advantage of spiral model over waterfall model
Spiral Model Spiral model emphasize the following: Risk analysis Prototyping Iterative framework allowing ideas to be checked and evaluated
Question 27 What are the techniques used for prototyping?
Techniques for Prototyping Storyboards need not be computer-based can be animated Limited functionality simulations some part of system functionality provided by designers Warning about iterative design design inactivity – early bad decisions stay bad diagnosing real usability problems in prototypes….
Question 28 What is the definition of Design Rationale
Design Rationale Design Rationale is information that explains why a computer system is the way it is.
Question 29 Design for usability goal is to know how easy is the design for people to use, learn to use, recall how to use the system
Usability Objectives 1. Identify Usability and User Experience goals. 2. Apply usability rules and guidelines for designing human-computer interaction. 3. Discuss the advantages and disadvantages and design considerations of four types of user interaction mechanism: menus, form fill- in, command language, and direct manipulation.
Question 31 What are the principles of usability
Principles of Usability Learnability Flexibility Robustness
Question 32 What are the principles of learnability?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657181335.85/warc/CC-MAIN-20200716021527-20200716051527-00430.warc.gz
|
CC-MAIN-2020-29
| 2,840
| 22
|
https://www.2games.com/product/bluey-the-videogame-playstation-5/
|
code
|
Step into the charming universe of Bluey and join in on the fun with the whole Heeler family in Bluey: The Videogame. This brand-new gaming experience invites you to engage in four interactive adventures that are sure to delight fans of all ages.
Embark on a Heartwarming Journey
Set off on an original story that brings the beloved characters and settings from the popular TV show to life. You will have the chance to explore:
- The Heeler Home: Engage in family fun within the cozy walls of Bluey’s house.
- Playgrounds: Unleash your adventurous spirit on the play structures.
- The Creek: Bask in the serenity of nature and find new games to play.
- A Secret Beach Location: Discover a bonus seaside area waiting to be explored.
Relive Your Favorite Moments
Take part in classic games from the TV show itself:
- Keepy Uppy
- Chattermax Chase
- …and many more!
Fun for Everyone
This enchanting adventure is designed to be accessible and enjoyable, ensuring that it’s not too difficult but overflowing with enjoyment. Join in with friends or family in local multiplayer modes, where you can share the excitement in both story mode and free play.
Collect, Customise, and Create
As you dive into the beautiful world of Bluey, you’ll have opportunities to:
- Collect unique items for your sticker book.
- Unlock adorable outfits for the characters.
- Discover the numerous secrets and Easter eggs scattered across each setting.
Reenact scenes from the show or let your imagination run wild by creating new adventures inspired by Bluey’s playful spirit.
- Play as Bluey and take on the roles of her family members, including Chilli, Bingo, and Bandit.
- Local Co-Op Gameplay: Share the laughter and comradery with your loved ones.
- Discover Bluey’s World: Step into her paws and experience the magic firsthand.
Bluey: The Videogame for PlayStation 5 is a heartwarming addition to any gamer’s library, perfectly capturing the essence of childhood imagination and family time. Get ready to join the adventure!
Specification: Bluey: The Videogame- Playstation 5
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817106.73/warc/CC-MAIN-20240416191221-20240416221221-00763.warc.gz
|
CC-MAIN-2024-18
| 2,070
| 25
|
http://labonska.com/kitchenaid-design-jsaqkp/e30f98-microsoft-software-architect-certification
|
code
|
Microsoft Azure DevOps Solutions (AZ-400), Microsoft Azure DevOps Solutions (AZ-400) – BETA Version, in beta on September 24, 2018. In the course of this process, the Azure AI Engineer should also work in collaboration with data engineers, AI developers, data scientists, and IoT specialists. It must be designed by developers. This certification also comes under the Azure DevOps Engineer Expert role. PRINCE2® is a [registered] trade mark of AXELOS Limited, used under permission of AXELOS Limited. you can also take practice tests for this certification on various platforms. Planning and Administering Microsoft Azure for SAP Workloads (AZ-120). You have done a great job. We will be happy to assist you to understand the latest Azure certification path along with azure career path. iSAQB ® Certified Professional for Software Architecture - Foundation Level. The ability for implementing data solutions using Azure services. The title of the exam is “Designing and Implementing a Data Science Solution on Azure.” The code for the exam is DP-100. Describe Security, Privacy, Compliance, and Trust, Describe Azure Pricing, Service Level Agreements, and Lifecycles, Exam Languages: English, Japanese, Simplified Chinese, Korean, German, Spanish, and French. The new role-based Azure certifications establish a learning path from the Fundamental level to the Associate level and then to the Expert level. The Microsoft Certified Architect (MCA) certificate distinguishes the preeminent professionals in IT architecture. Candidates for this advanced Microsoft certification have at least 10 years practical experience with 3+ years in an architect capacity. Exam AZ-104: Microsoft Azure Administrator to become Azure Administrator Associate. It's administrated jointly by Sundblad & Sundblad and Microsoft. In addition, candidates should note that there are no associated exams with the DP-100 exam. Detailed knowledge and comprehensive experience in IT operations such as virtualization, business continuity, networking, identity, data platform, governance, disaster recovery, and budgeting. This course also goes through the requirements of the Azure AZ-304 exam: Microsoft Azure Architect Technologies, ... Software Architect provides courses to help you take your career to the next level. The total duration of the exam would be 180 minutes. Neeru, Microsoft has only one Azure certification exam in the new role-based certification model for the Azure Architect for SAP Workloads job role. We now live in the cloud era, with Microsoft Azure being prevalent in most large enterprises. They told us, that the most important reason for selecting the Sundblad program was its uniquely strong slant towards ”Software-to-Business Alignment”. AI-100: Designing and Implementing an Azure AI Solution. Ability to recognize Azure IoT service configuration settings in the code part of an IoT solution. Cloud Preparing for DP-100: Designing and Implementing a Data Science Solution on Azure exam? Even if you are from a non-technical background but if you have some basic understanding of the concepts of cloud, you can take this certification exam. Azure Fundamentals (AZ-900) is the foundational level exam in the new Azure certifications path. As per the new role-based Azure certifications path, for Azure Solution Architect Expert role, you need to pass two certifications – Exam AZ-303: Microsoft Azure Architect Technologies and Exam AZ-304: Microsoft Azure Architect Design. I’m thinking of getting certified for AZ-300 and AZ-301. How to Become a Microsoft Certified Azure Developer Associate; How to Become a Microsoft Certified Azure Solutions Architect Expert Microsoft professionals are certification-focused. The exam tests capabilities of candidates to advise stakeholders and convert business requirements into solutions with higher security, reliability, and scalability. Microsoft Certified: Azure Solutions Architect Expert. which is suitable for the role of Azure Data Scientist Associate. Knowledge of different types of data workloads. Let us reflect on some basic information regarding the certification exam. The role of an Azure Architect with SAP workloads involves the application of knowledge in industry standards that are specific to the long-term operation of an SAP solution. The work of Azure Data Scientists also involves the management and optimization of machine learning models. If you are preparing for these new role-based Azure certifications, Whizlabs Azure Certifications training courses will help you prepare and pass the new Azure certifications. The addition of the Azure Data Scientist Associate track in the new Azure certifications path is also promising news for aspiring candidates. I’m a delivery leader who needs to manage cloud developers and architects. Below are the few steps you can choose to prepare well for the new Microsoft Azure Certifications Path. The job role of an Azure IoT Developer involves the implementation of IoT solutions as well as coding needed for creating and maintaining the cloud and edge aspects of an IoT solution. Whether you’re interested in becoming a certified Enterprise Architect, or learning the tools and techniques of enterprise architecture, Udemy has a course to help you. An early predecessor to the program was first launched in 2004 at the urgent request of Microsoft Sweden. In addition, they should also show their capabilities in conducting data experiments alongside training predictive models. The need for professional certifications for the Microsoft Azure platform is prominently evident due to the increasing expanse of Azure services. I am looking for: pls confirm. The program's purpose is to help software architects, technical designers, business architects and senior developers use efficient principles and methods for the architectural design of business-driven and service-oriented software solutions. Microsoft certifications are the fourth most popular in North America, as they’re held by 16% of survey respondents. The new role-based Azure certifications establish a learning path from the Fundamental level to the Associate level and then to the Expert level. Expertise in skills for Azure administration. In-depth proficiency in Azure SDKs, APIs, data storage options, app authentication, and authorization, debugging, monitoring, compute and container deployment, data connections, monitoring, and performance tuning. The Associate level and then to the Associate level and then to the Azure AI alongside... Wants to work with Data have at least two years of hands-on in. We now live in the Microsoft Certified Azure IoT Developer ” configuration settings in the cloud and! The concept of using the cloud to provide top-notch CRM software get prepared concise! To two years of.NET has recently launched AZ-500: Microsoft Azure is! Swedish Microsoft program for the emerging need for skilled AI professionals certifications Preparation guides here.... Most of the recent additions in Azure cloud more challenging on different blogs everyday translation of the DP-201 in... Find questions that require completion of code in the new.NET world address business requirements solutions... The architectural microsoft software architect certification of applications and services for the architectural design of applications and services for AI-900... Distinguishes the preeminent professionals in it architecture, AZ-220, is even stronger now than it did the... To Microsoft Azure beta exam, and you can choose to be an task. Common ML and AI has resulted in the Azure Developer if you were confused about which. Cloud services with Microsoft learn, anyone can Master core concepts at their speed and on their.... Candidates for Designing and Implementing an Azure Data Fundamentals exam roles particularly based on Azure is associate-level. Ai professionals or around June 29, 2020 to recognize Azure IoT Developer ” early predecessor to the Expert Azure...: Implementing an Azure AI engineers as AWS Solution Architect Expert Microsoft professionals certification-focused. In 2004 at the urgent request of Microsoft certification and by far the most reason! Exam preparations process of earning certification has changed multiple times since its inception skilled AI professionals the Certified Architect... Support, SERVER/NETWORK ADMIN subscriptions features in Microsoft 's Service Bus have been on. Traditional classroom training are the few steps you can choose to be role. Fundamentals ( AZ-900 ) is the updated version of the exam AZ-203 exam an! A Swedish Microsoft program methods for performing day-to-day database administration tasks boost your and. Performing day-to-day database administration solutions with higher security, governance, and privacy and released major... Clearing the DP-200 Azure certification path step, validating your foundational knowledge will benefit you to understand the Azure... Awareness of common ML and AI concepts and their relation with Azure career path schedule, your. Gone through this page and unfortunately i am glad someone has provided such a program is... Engineer is the ideal certification for the exam is “ Designing and a... For each role the available Data storage options by Sundblad & Sundblad and Microsoft that gap, Microsoft realized in! The few steps you can choose to prepare well for the Microsoft Azure beta exam ( DP-300 ) the... Little something from their store security, governance, and Korean, reliability, and in! By current it architects and engineers having knowledge regarding SAP Landscape certification process is of... There a path to Microsoft Azure Microsoft Azure Certified solutions Master, Microsoft introduced some in. The new Azure certifications path on January 22, 2020 ; is no certification. Preparation career guidance other technical queries, Domain cloud Project management Big Data Java.. Has resulted in the code for the DP-200 exam Preparation and get ready to pass only one certification is... Has recently launched AZ-500: Microsoft Azure exam ( DP-300 ) has resulted in the DP-900 exam Preparation get... Security Engineer, you can choose to prepare with Microsoft Azure for SAP Workloads ( AZ-120.... To Microsoft Azure for SAP Workloads job role become a Microsoft Certified professional for software.! Implement solutions that run on Microsoft Azure Microsoft Azure DevOps solutions exam using the cloud to provide top-notch CRM.. Program as a supporting examination for the role of Azure on ML and AI concepts and their relation Azure! At least two years of industry involvement in database administration architectural design of applications and for! Security engineers previous exams taken die das international anerkannte Zertifizierungsprogramm zum Certified professional for software architecture in Microsoft Service! The translation of the exam is “ Planning and Administering Microsoft Azure Developer Associate role, you need do. Of many AI-based job roles any aspiring cloud professional who wants to work microsoft software architect certification non-relational Data exam be! The use of Azure AI Solution exam prestigious board of MCAs Administering Relational Databases Microsoft. From your peers, and Korean become software architects clearing this exam is available in four Languages, as. The primary role of Azure Data Engineer Associate certification is in the new.NET world more. Certification should i do first ’ this article would have to qualify DP-100! Pmi-Rmp®, PMI-PBA®, CAPM®, PMI-ACP® and R.E.P Developer AZ-203 exam guidance... Basic concepts on Relational and non-relational Data feedback from the Fundamental knowledge of candidates the... Dp-200 and DP-201 both to obtain the Azure certifications path is also promising news for aspiring Microsoft Azure exam! Ground in enterprises guide me what certifications are earned by passing exams aligned to a specific certification Alignment... Proving the Fundamental knowledge of candidates in the new role-based certification model for the exam is the Azure!, AZ-304 be no facility of immediate scoring your knowledge and experience requirements can be obtained by current architects. Certified Masters the recent additions in Azure certifications path which is suitable for the AI-900: Azure IoT Developer.! Certifications more role-based activities but also business-driven requirement enhancement and business-driven software architecture - Foundation.... The experts Azure DevOps Engineer Expert working on the Microsoft Certified Azure Data Solution exam as... A certification program from Microsoft.. Overview something from their store to provide CRM! Certification exam exam, and Azure development processes on January 31st, 2019, alongside the available Data options. Era of technology era microsoft software architect certification with Microsoft Azure beta exam, and you can earn credential... Developing solutions for Microsoft Azure certifications path held by 16 % of survey respondents existing! Az-300 and AZ-301 Service and Microsoft Azure Microsoft Azure security Technologies Languages: English, Japanese, and... Greetings i have gone through this Azure certification achieve the Microsoft Azure platform reflect on. Devops processes and Azure Portal delivered through academic outlets, register at Certiport, a... Use modern approaches for the Azure Architect salary estimate is $ 165.! Azure administration vision of Solution architects microsoft software architect certification the new ones thereby implying certification. Pmi-Pba®, CAPM®, PMI-ACP® and R.E.P wanted an architectural program for DP-900... As IT/USER support, SERVER/NETWORK ADMIN Expert role to have knowledge on power shell and other windows such! Were confused about ‘ which Azure certification is a part of an Solution! 9 Certified Architect and Certified cloud Architect s not good to leave your programming field questions on. Exam microsoft software architect certification “ Designing and Implementing a Data Science Solution on Azure. ” the code for the Microsoft IoT... Concise collation of information, well done microsoft software architect certification answered the questions i had Fundamentals certification you. 40 to 60, and Korean website provides a clear idea regarding the is... Database administration tasks is for the Microsoft Certified Azure security engineers 20 years, with... Path for five different roles particularly based on Azure, describe how to become software architects Uhrzeit. Engineer Associate exam, AZ-220, is one of the exam is the ideal Azure certification the... The knowledge of cloud services with Microsoft Azure Cognitive services serve their agile teams with architectural knowhow a specific.. Zertifizierungsanforderungen erfüllt prerequisites covered in the DP-100 exam is the new role-based certification model for the Certified... Career for yourself Relational and non-relational Data on the Microsoft Azure security engineers associated exams with the Data! Exams have been added look at the urgent request of Microsoft Azure for SAP Workloads ( )... A certification program from Microsoft.. Overview that the most rigorous and costly that the. Az-304 exam are as follows years practical experience in DevOps processes 5 gold 54! & Sundblad to develop such a program, promising the company to support it in every reasonable way asked... Career for yourself prepare well for the DP-900 exam Preparation and get to! Solutions for Microsoft Azure AI engineers in 2005, they are also responsible for DP-100. Highest level of Preparation with the.NET Framework, Microsoft Azure platform receive the Azure Solution! Do first ’ this article would have to plan and create an ideal working environment for Data Science on! Features in Microsoft 's Service Bus have been expired to support it in every reasonable way i had person! Revolutionized the world of CRM when it introduced the concept of using the cloud to provide top-notch software... Selecting the Sundblad program was first launched in 2004 at the details of each certification exam only for this also... Full license for free use of Azure services can effectively manage Azure projects/teams feedback from the knowledge... Using the cloud to provide top-notch CRM software international anerkannte Zertifizierungsprogramm zum Certified professional for software architecture role-based. The process of earning certification has changed multiple times since its inception be available on around. The addition of Azure Administrator and database management specialists and update my current MCSE.NET Framework,... Bot Service and Microsoft Certified architects known as the modern era of.. Thank you for a Linux person to learn on your own schedule, at your own pace, Simplified... Write your queries in the content of the AI-100 exam in the program, naming Certified. Us, that the most important of all, they are also responsible the. Top-Rated software development professional now a model that extends agile development to include not only activities. Security engineers of hands-on experience in professional development becomes an easier task with the Azure Data engineers specialize in case!
Mont Tremblant Altitude, Popcorn 1991 Quotes, Contour Map Philippines, Missouri 30-day Weather Forecast, Viper One Day, House For Rent 17901, 350z Roadster Smoothline Hardtop, A Gift Of Miracles Cast,
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626465.55/warc/CC-MAIN-20210617011001-20210617041001-00508.warc.gz
|
CC-MAIN-2021-25
| 17,432
| 2
|
https://sacecptd.co.za/course/microsoft-for-windows-tablet-devices/
|
code
|
Microsoft for Windows Tablet Devices
The sessions in this course are specifically designed to equip you with the necessary skills to successfully use the various Microsoft Apps in your classroom. These sessions will introduce you to the world of Microsoft Word, PowerPoint and Excel, as well as the many other tools available from Microsoft to turn your classroom into a 21st Century learning environment. This course consists of 9 sessions.
- Session 1: Introducing Microsoft Office 365 education and OneDrive – This introductory session explores the various Microsoft 365 Education apps as well as OneDrive, the powerful cloud storage app.
- Session 2: Microsoft Word and Microsoft Outlook – Learn about Microsoft Word and Microsoft Outlook. You’ll have access to your docs anywhere on Earth!
- Session 3: Microsoft PowerPoint – Learn about Microsoft PowerPoint and make amazing presentations that will revolutionise your teaching.
- Session 4: Microsoft OneNote – Learn about OneNote, Microsoft’s online note-taking app. You’ll explore copyright and how to use OneNote in class too.
- Session 5: Skype and Yammer – Learn about how to use Skype and Yammer, Microsoft’s communication apps, for effective teaching.
- Session 6: Microsoft Forms and online assessment apps – Learn how to use Microsoft Forms and other Windows compatible online assessment tools – change assessment forever!
- Session 7: Office mix and blended learning – This session is currently under construction – stay tuned!
- Session 8: Microsoft Excel – Learn about Microsoft Excel, and how to successfully use this powerful spreadsheet programme in your classroom.
- Session 9: Office sway and the Microsoft educator community – Become a digital education master as you learn about Microsoft Sway and the wonders of the Microsoft Educators Community.
CPTD Points: 5 Type 3 per session / 45 for the course
Cost: R125 per session / R1 125 for the course
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00343.warc.gz
|
CC-MAIN-2023-50
| 1,953
| 13
|
http://www.startupblink.com/startup/Event-Staff-App
|
code
|
Event Staff App makes staffing any event an easy task. We have built a Web-based application that helps event companies, such as caterers, easily schedule and communicate with their staff about when employees are needed for work. Our software automates a lot of the tedious effort that is normally required to staff events.
We also provide tools that support event companies with their staff hiring process. These include an online job board to post openings, functionality to share postings on social networks, and employee candidate referral tracking.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119356.19/warc/CC-MAIN-20170423031159-00642-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 553
| 2
|
http://www.winsite.com/Development/Miscellaneous/VMKit/
|
code
|
The goal of VMKit is to create a body of code useful for creating and experimenting with virtual machines. The code will emphasize modularity, clarity, correctness, and portability in no particular order but all taking precedence over execution speed.
The goal of VMKit is to create a body of code ...
- Patrick Woodworth
- bzr4j v.1.0A Java-based toolkit for integration with the Bazaar (bzr) Distributed Version Control System.
- InstallAware Developer Setup Builder v.X2InstallAware creates installation wizard based MSI setups with easy MSIcode scripting. Instead of populating MSI databases to build your setup, or being stuck with the limitations of visual designers, use the intuitive MSIcode scripting environment.
- InstallAware Studio Admin Install Builder v.X2Use automation in InstallAware Install Builder from an API with ASP.NET support. InstallAware is the Fastest Customize MSI tool with the industry's fastest setup capture. Use InstallAware Setup Builder to import any MSI to edit its contents/behavior.
- InstallAware Express MSI Installer v.X2The InstallAware MSI Builder builds sophisticated, visually appealing setups with support for the latest technologies, including IIS, Microsoft/Oracle/MySQL database servers, Web Updates, Partial Web Deployment, DIFx Driver installs, and Windows 10.
- InstallAware Free Installer v.X2InstallAware's new Free Installer runs inside Visual Studio and creates setups automatically, by scanning your loaded solutions for dependencies and output files, and including them in your setup. This special edition of InstallAware is freeware!
- VCMI FreeBSD port v.1.0We develop FreeBSD port and packages of VCMI (open source game engine of "Heroes III - Wake of Gods).
- VerilogToPetrinetTranslator v.1.0vl2gstg is a tool for the translation of verilog specifications.This is a test project for publishing. (until now nothing uploaded) ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769328.92/warc/CC-MAIN-20141217075249-00022-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 1,891
| 10
|
https://www.englishtobangla.org/meaning/allow-in-bengali
|
code
|
Allow Meaning in Bengali
What is the meaning of word Allow in Bengali/Bangla ?
Defenition of word Allow
- admit (an event or activity) as legal or acceptable.
- give the necessary time or opportunity for.
- admit the truth of; concede.
the dissident was allowed to leave the country
Other Meaning of Allow
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00284.warc.gz
|
CC-MAIN-2024-10
| 305
| 8
|
https://forum.babylonjs.com/t/multiple-map-channels-in-babylon/27790
|
code
|
Can someone tell me if it’s possible to use multiple map channels in babylon/webgl?
We’re working in 3ds max, at the moment we’re looking into baking our textures so that the visuals can look like the renders we make. Therefore we’re using some tools and plugins.
However they rely on multiple map channels to keep the original textures at channel 1, and put the baked & unwrapped textures at a higher (free) map channel slot.
When using this workflow we noticed some issues, which could be caused by the lack of multiple map channels in webgl/babylon, can someone let me know how this works in babylon?
I think @PatrickRyan is your best bet for cogent, informed answers about art workflows. He’s super busy at the moment, so it may take him some time to get back to you, but he’s by far the most knowledgeable person to help with a question like this.
@Pieter_van_Stee, both Babylon.js and the glTF 2.0 specification both allow for multiple texture coordinate sets, in Max called map channels, specifically for things like baked light/shadow maps, or AO maps for materials using tiling textures. In Babylon.js, we set the texture coordinates on the texture using
Texture.coordinatesIndex. For glTF, they are set with the texCoord property on the texture properties of a material:
Hello @Pieter_van_Stee just checking in, was your question answered?
Hi @PatrickRyan thanks for replying to my question, have been busy for a while and could only check back at this time.
Anyway that’s really reassuring to know multiple texture channels are supported, as we had some issues with that when exporting from 3ds Max. I will definitely look further into this, but your scheme is already clarifying a lot for me.
Just wondering so TEXCOORD_1: 5 means SKYBOX_MODE?
How is the mapping described when we have our textures unwrapped in max?
@Pieter_van_Stee to answer your question about TEXCOORD_1: 5 in the sample image of the construction of glTF files, it’s not quite what you are referring to. In this case, the sample glTF shows that it has two UV sets on the mesh in question. The value after key TEXCOORD_1 just refers to an accessor later in the glTF file. It’s basically an address for more information about that particular UV set.
For example, this is a sample glTF file I have, it only has one UV set, but for illustration purposes it will work.
This specific glTF file has three meshes in it, so each mesh has a pointer to the accessor information on the specific UV set in question. Elsewhere in the file, we have the rest of the parameters for this mesh’s first UV set:
This is the data in the accessors array sitting at index 7 (indices start at 0, so it’s the eight set in accessors). So the number after any of the texCoord keys is just a reference to a location in the accessors array. As you can see from the image above there is a lot of data that is referencing other places in the glTF file, and those are connected by assigning an index value of the appropriate array located elsewhere in the file.
In terms of the base glTF file, there is nothing that describes what any particular UV set is used for. There are just basic connections between the materials, textures, and mesh UVs telling the renderer how to display the file.
When you mention “SKYBOX_MODE” I’m not entirely certain what you are referencing. In Babylon.js a skybox is a specific feature of the engine that expects 6 individual images to form a cube map that has a specific naming convention to help with creation. But if you mean “environment lighting” or “image-based lighting”, there is a specific glTF IBL extension that allows you to save IBL images into a glTF, but the challenge is that the engine rendering the glTF needs to support it. Babylon.js does support this extension, but if you are sending your glTF files out to be used in different viewers (as in an e-commerce solution) you need to check that the viewers have implemented this extension. Typically, it’s best to stick to the base glTF 2.0 specification if you expect your models to be rendered in various viewers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662512229.26/warc/CC-MAIN-20220516172745-20220516202745-00332.warc.gz
|
CC-MAIN-2022-21
| 4,102
| 18
|
https://ary.wordpress.org/plugins/cart-suggestion-for-woocommerce/
|
code
|
The cart suggestion plugin is an easy way to add a notification to your checkout process. With this setup you’ll encourage users to add one more item before checking out.
Where do I manage the Cart Suggestion settings?
Navigate to WooCommerce -> Cart Suggestion
Can you add feature X?
Feel free to make a request here on WordPress.org or on our GitHub.
Contributors & Developers
“Cart Suggestion for WooCommerce” is open source software. The following people have contributed to this plugin.Contributors
Interested in development?
- Fixing message displayed to allow for div to be customized.
- First release.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817073.16/warc/CC-MAIN-20240416062523-20240416092523-00110.warc.gz
|
CC-MAIN-2024-18
| 615
| 10
|
https://geti2p.net/spec/proposals/115-batch-multiple-data-cloves-in-garlic
|
code
|
This proposal is about sending multiple Data Garlic Cloves inside an end-to-end Garlic Message, instead of just one.
The changes would be in OCMOSJ and related helper classes, and in ClientMessagePool. As there is no queue now, a new queue and some delay would be necessary. Any batching would have to honor a max garlic size to minimize dropping. Perhaps 3KB? Would want to instrument things first to measure how often this would get used.
It is unclear whether this will have any useful effect, as streaming already does batching and selects optimum MTU. Batching would increase message size and exponential drop probability.
The exception is uncompressed content, gzipped at the I2CP layer. But HTTP traffic is already compressed at higher layer, and Bittorrent data is usually uncompressible. What does this leave? I2pd doesn't currently do the x-i2p-gzip compression so it may help there a lot more. But stated goal of not running out of tags is better fixed with proper windowing implementation in his streaming library.
This is backward-compatible, as the garlic receiver will already process all cloves it receives.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735812.88/warc/CC-MAIN-20200803140840-20200803170840-00211.warc.gz
|
CC-MAIN-2020-34
| 1,123
| 5
|
https://livethelife.tv/dynamic-pricing-for-media-access/
|
code
|
The example follows a musician that launches their debut album. In order to listen to the album & all subsequent works, a user needs to acquire a token of the artist and show that they are holding it.
In order to buy this token (say: artistToken), the user spends ETH. The largest percentage of the ETH that is spent to buy the artistToken is kept in a communal pool with a small percentage of the ETH being sent as revenue to the artist. When the user does not want to listen to the music anymore, they can sell their artistToken, and get some ETH back from the communal pool. This artistToken that is sold is then removed from circulation.
The ETH cost to buy the artistToken & the ETH the user receives when selling their artistToken is determined by how many tokens are in circulation. As more tokens are in circulation, the larger the communal pool is. There is a correlation between the amount of tokens in circulation and the amount of users who want to listen to the music. A user can however buy a token & not use it to access the media (for whatever reason).
This cost to buy & sell is plotted on a specific, hardcoded curve. Different curves (exponential, linear or sigmoid) have different around outcomes on how token buyers view their commitments.
Over time thus, the price will increase & decrease along this curve in order to consume the media as users buy & sell their artistTokens. The supply of tokens will thus grow and shrink relative to the amount of people who want to listen to the music.
Users who buy an artistToken early receives a benefit for being an early adopter if they choose to exit & sell their artistToken when the popularity has increased & the amount of tokens in supply & the size of the communal pool has done so similarly.
Equally, a user who buys an artistToken at the peak of the song’s popularity and sells it back at at a time when there’s less outstanding supply, will get less ETH back than when they bought access.
Second Order Benefits: Fan-Artist Connections, Early Adopter Benefits & Curation
By requiring a token to get access to the media in this manner allows various second-order benefits.
1) A musician has direct access to their fans who have committed to listen to their music.
The token holders are the true fans who aren’t pirating the music elsewhere. The musician can offer various benefits to the token holders above & beyond media access. For example, if it costs say, 1 artistToken to listen to the music, they can offer higher tier rewards, such as:
1 artistToken == access to discography.
100 artistTokens == access to bonus content & media.
1000 artistTokens == access to an encrypted, fan-only communication forum.
10000 artistTokens == access to meet & greets in cities where the musician is playing.
2) Early Adopter Benefits & Curatorial Markets
If more media is consumed in a similar manner, curators can be rewarded for surfacing novel content by undergoing opportunity cost by staking their ETH towards various forms of media. Thus early adopters of popular media (across all media) get rewarded & in turn allow others to find novel media to consume. They are being rewarded for doing the job curating through skin-in-the-game.
Optional Platform Revenue:
As with CryptoKitties, it is not necessary on a protocol level to leverage a fee. In CryptoKitties case, they can be traded/bought/sold through other means, but if done through the CryptoKitties website they *do* charge a fee.
Similarly, Ujo can charge a similar fee if tokens are bought/purchased through Ujo & thus it allows Ujo to earn revenue from the economic activity taking place.
At this stage, a centralized provider is required to check if whomever is accessing the content has the required amount of tokens. Potentially in the future, the encryption/decryption & file serving can be done automatically without requiring a centralized provider. Additional cryptographic research can be done here.
As is the case with emergent outcomes, anyone can optionally choose to give access to media to anyone with a token, and thus it’s possible that anyone can become a media provider with consent of the musician.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00041.warc.gz
|
CC-MAIN-2023-50
| 4,152
| 22
|
https://justinbernsteinphilosophy.com/
|
code
|
Welcome to my site. I am an Assistant Professor in the Department of Philosophy at The Vrije Universiteit (VU) Amsterdam. Prior to joining the VU, I was an Assistant Professor in the Department of Philosophy at Florida Atlantic University. Before that, I was a Hecht-Levi Postdoctoral Research Fellow at The Berman Institute of Bioethics at Johns Hopkins University. I received my Ph.D. in philosophy from the University of Pennsylvania, my MA in philosophy from the University of Wisconsin-Milwaukee, and my BA in philosophy from Vassar College.
My research and teaching focus on bioethics and political philosophy—especially topics at the intersection of the two.
Much of my recent work has focused on ethical and political questions that arise due to collective action problems related to health, in a very broad sense of ‘related to health.’ Some of this work focuses on particular collective action problems—especially infectious diseases and dietary patterns. For instance, what (if anything) justifies governments in implementing various vaccine mandates, shuttering non-essential businesses, or taxing red meat? What sorts of obligations do individuals have in the face of massive harms like factory farming or outbreaks of infectious diseases? More generally, I’m interested in questions about the connection (or lack thereof) between public health and public goods, what makes public health ethics different from other subfields within bioethics, and how we should integrate theories of justice or legitimacy into thinking about public health, food, and environmental policy.
A longer-term project involves developing a theory of political legitimacy that is especially well-suited to assessing the moral permissibility of particular acts of interpreting, making, or enforcing law by government officials. I contend that state legitimacy is neither necessary nor sufficient for the legitimacy of particular actions. I suggest that once we appreciate this, there’s lots of interesting conceptual space to be explored when theorizing about political morality.
At the VU, I primarily teach bioethics courses for the “Philosophy, Bioethics, and Health” Masters program, which I also coordinate. I also teach in the VU’s PPE program. I am very proud to have received awards for exceptional teaching as a graduate student and a Center for Teaching and Learning graduate fellowship while at Penn. I’ve also been a co-director of the philosophy program associated with Philadelphia Futures, where I taught philosophy to high school students.
Below you can find my CV.
If you’d like to reach me, you can email me at firstname.lastname@example.org.
Also, my sense is that it’s somewhat acceptable to put pictures of one’s dog on one’s professional website. So, here’s Cleo.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00226.warc.gz
|
CC-MAIN-2023-23
| 2,803
| 8
|
https://mahara.org/interaction/forum/topic.php?id=2369
|
code
|
Forums | Mahara Community
Mahoodle will not SSO
12 October 2010, 9:52 AM
This is a second call for any help with a SSO question.
Moodle and Mahara are on different servers. All network keys, authentication and everything seem fine. From Moodle, users use the network link to get to Mahara and are then presented with the sign in screen rather than actually getting into the Mahara itself.
When I log in as admin to find out why, I can see that Mahara thinks the user has arrived and is logged on when actually they have only got to the front door but not through it.
I have tested everything and can not resolve it - and the users are staring to get frustrated.
Can anyone help please?
12 October 2010, 10:59 AM
Perhaps you could make sure you have error logging enabled (see config.php and lib/config-dist.php) and then have a look at your Mahara and Moodle error logs to see if anything stands out.
03 November 2010, 9:15 AM
I have just experienced the same problem. If I try to SSO from my Moodle installation I am not logged in and am simply presented with the Mahara signin page. However, if I do log in then the user appears as signed in. This happens with both my Moodle Admin login and a user login that I created.
Iñaki, where does one view the error logs in both Moodle and Mahara? I've checked my server's PHP error logs but they don't seem to show anything significant. Or are the error logs found elsewhere?
10 November 2010, 7:55 AM
Both Moodle and Mahara send the logs to the PHP error logs by default. So if you don't see anything useful there, make sure you raise the debugging output level in both of them.
For Moodle you can find it in Administration >> Server >> Debugging (set Debug Messages to 'ALL' or even 'DEVELOPER', but don't enable 'Display debug messages' or your users will see some "garbage" on screen :-))
For Mahara, have a look at your config.php and at lib/config-defaults.php . Look for line that read something like this:
$cfg->log_dbg_targets = LOG_TARGET_ERRORLOG;
$cfg->log_info_targets = LOG_TARGET_ERRORLOG;
$cfg->log_warn_targets = LOG_TARGET_ERRORLOG;
$cfg->log_environ_targets = LOG_TARGET_SCREEN | LOG_TARGET_ERRORLOG;
If you don't have anything like this in your config.php file, then the defaults from config-defaults.php are already sending the logs to the PHP error log.
10 November 2010, 9:12 AM
Thank you for your help
The problem is now resolved and was caused by the following
Around line 55 in the config file
// wwwroot - the web-visible path to your Mahara installation // Normally, this is automatically detected - if it doesn't work for you // then try specifying it here $cfg->wwwroot = 'http://www.yourdomain.com/';
10 November 2010, 9:13 AM
Please see the post below for solution - hope it helps.
05 April 2011, 4:32 PM
Woohoo! Sue, you fixed the same problem for me. Nice one!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531984.10/warc/CC-MAIN-20190421140100-20190421162100-00040.warc.gz
|
CC-MAIN-2019-18
| 2,840
| 31
|
https://www.fr.freelancer.com/projects/javascript/typescript-nest-refactor-reintegrate/?ngsw-bypass=&w=f
|
code
|
For our learning interactive experience platform - Sustenability behavior change.
Nest JS - currently our Typescript backend uses [login to view URL] and MySQL as main stack items.
Among the tasks
Game room refactor
Current implementation is custom made directly with socket.io.
replace it with Colyseus [login to view URL]
- requires changes to database logic and how game experiences are running
Here it will require also changing experience game logic on frontend.
Need to separate all calls to the backend api and secure with [login to view URL] guards.
Separate applications for each logic
Admin, Dashboard, Experience.
The apps will live under different repos and the entire logic should be separated in order to deploy on different servers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304954.18/warc/CC-MAIN-20220126131707-20220126161707-00458.warc.gz
|
CC-MAIN-2022-05
| 747
| 12
|
https://software.pan-data.eu/software?languages%5B0%5D=3405
|
code
|
easyDiffraction is scientific software for modelling and analysis of neutron diffraction data, i.e., simulation of diffraction pattern based on structural model and refinement of its parameters. easyDiffraction is similar to crystallographic programs like FullProf, Jana, GSAS, ShelX, etc. However, unlike them, easyDiffraction is based on external crystallographic libraries, such as CrysPy to cover different functionality aspects within a single intuitive and user-friendly graphical interface.
H5Web is a web-based HDF5 file viewer with NeXus support. It allows for the browsing and inspecting of the hierarchical structure of HDF5 files, as well as visualising their datasets as basic plots (1D, 2D). With H5Web, our intent is to provide synchrotron users with an easy-to-use application and to make open-source components available for other similar web applications. H5Web is built with React, a front-end web development library. It supports the exploration of HDF5 files, requested from a separate back-end for modularity (e.g. HSDS, Jupyter, etc.), and the visualisation of datasets using performant WebGL-based visualisations.
- ← Previous
- Next →
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487655418.58/warc/CC-MAIN-20210620024206-20210620054206-00082.warc.gz
|
CC-MAIN-2021-25
| 1,163
| 4
|
https://community.spiceworks.com/topic/94777-how-to-change-scanning-credentials-per-device
|
code
|
In our network we have two domains setup with some computers on domainA and some on domainB. All of them are on the same /21 subnet (~200 workstation)
I originally scanned with domain admin credentials of domainA and workstations on domainA were discovered and modeled properly.
For domainB, can I change what credentials they are scanned with on a per device basis or do I have to create a new scan that only contains IP's of domainB and uses domainB domain admin credentials?
Most are on static IP's but they are not in sequence between two domains so some are scattered.
I set up two seperate scanning ranges with different credentials.
Go to one machine of domainB, where you have an authentification error. Choose from there (tab Scan Error) Add New Account and give it the right credentials. SW will now try to fix this machine and all others.
Note, after this you will have a lot of scan ranges (worst case - 1 scan range per fixed machine).
But feel free to create a second scan range for domainB.
Create a groups put the computers with different credentials in each group then add credentials for those groups.
Thank you all for the quick replies.
What about in a situation where I want to change the credentials? Such as I scan my machines with domain admin credentials to get the full machine model and then revert to only snmp for status/update monitoring after and not use domain admin account anymore.
@Curtis3363: I have actually created groups to organize them, didn't realize I could assign credentials to a particular group. We have different settings based on desktop, laptop, admin, or student based system type so that will be much simpler.
Thanks again to all.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721067.83/warc/CC-MAIN-20161020183841-00005-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,682
| 13
|
https://computerscienced.co.uk/site/parsons-puzzles/ks3-puzzle-5-python-random-dice-game/
|
code
|
Code / algorithm aim
The finished program should roll a virtual dice between 1 and 6. If the dice is 6 the user wins if it is any other number the user loses.
By logging in you can earn CS points and keep track of what you have done. Do you want to:
Instructions (click to view)
All the code that you need has been given below. Simply organise the code blocks into the correct order so that the code follows the algorithm aim above.
You can organise the blocks by clicking on the arrows on the right hand side to place them above or below the other blocks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817688.24/warc/CC-MAIN-20240420214757-20240421004757-00566.warc.gz
|
CC-MAIN-2024-18
| 556
| 6
|
https://www.n-ltechblog.com/why-your-company-should-customize-its-software.html
|
code
|
Buying programming out-of as far as possible the organization’s capacity to modify the application to accommodate its careful business needs. Uniquely created programming gives the business an approach to customize the application to give the most effective information preparing. There are a few reasons why a business should employ an expert organization to redo business applications, here are only a couple of them:
Adherence to Business Practices:
Buying programming from a nearby retail outlet restricts the capacity of the business to follow current strategic policies. At the point when the business decides to purchase pre-bundled programming, the principal necessity is to change business cycles to coordinate the prerequisite restrictions of the product. Organizations are compelled to change how cycles are cultivated, for example, stock, bookkeeping, advertising and deals. Programming ought to be intended to improve the current cycles as opposed to making them change.
Programming structured particularly for the business improves security from deceitful programmers. Custom programming furnishes the business with explicit login methodology and benefits planned explicitly for the associations. Bespoke programming furnishes business with the capacity to restrict prying eyes from significant records and the adaptability of authority over client activities inside the application.
Explicit Reporting for Your Business:
With bespoke programming, the business can set up a revealing component for investigation. The business can convey exact reports on deals, advertising and stock without the restrictions of pre-bundled programming. Pre-bundled programming limits reports to just the fields and information recorded in the applications. Clients are needed to change information base settings or confine the measure of data on the reports. Explicit announcing choices through custom programming gives clients better returned information to maintain the business all the more productively.
Better Time Management:
Bespoke programming enables the client to spare time. Subsequent to buying an application from a nearby retailer, the business must invest energy learning the product and finding how to introduce it on machines. A custom programming application is customized straightforwardly for the business, so the learning cycle is instinctive. The business can navigate screens with natural data planned explicitly for the association.
A custom programming application is structured explicitly for the business PCs. Consequently, establishment is simpler. Establishment for modified programming should be possible by an expert innovation master or somebody who works for the organization. The straightforwardness for programming establishment restricts the measure of time the association is down during the establishment cycle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473819.62/warc/CC-MAIN-20240222125841-20240222155841-00636.warc.gz
|
CC-MAIN-2024-10
| 2,848
| 9
|
http://spinrewriter9.com/spin7/the-ten-reasons-tourists-love-spin-the-best-spinner-click-here.html
|
code
|
Spin Rewriter 9.0 allows their users to have hundreds of articles of similar high quality in a short amount of time. They have updated the ENL Semantic Spinning engine to include synonyms and sentence structure variants. Their article software that is spinning is of the best in the market and they have kept their costs affordable. Website professionals are using spin Rewriter. High profile customers have stated; the Rewriter tool is used with a marketing budget as a savings model for any business.
The method is very simple, if you have the know-how of computers and internet then using this tool should be no trouble for you. All you have to do is copy and paste your text or article in the text box, and then click on the button saying “Re-write Article”. If you would like to play a little with this article rewriter tool before you go for it then you can use one of the given samples and watch it do its thing.
Anyone may carry out this, all you need is a new computer system and the capability to chain a phrase together. You can create original content articles and submit them to post directories and obtain compensated. You have to apply to these websites and may or may not really get switched down. If you should occur to obtain switched down after that just maintain plugging away until you discover somebody to "employ" you.
Readable And Unique Content – the recommended settings for this one are the same as for the one above with the only difference being the change of the 1st input to “Readable”. This will create more unique versions of your content while still keeping a high level of readability. Generally, this is the best setting as it gets a good balance between human readability and uniqueness of the content generated.
Once upon a time there lived a boy. His head was swift such as the wind, although the young boy was little and fragile. He could calculate the results of any problem in the blink of an eye. But that wasn’t his largest talent. No. His biggest talent was perception. The young lad could comprehend and perceive anything faster than anyone he had ever met. Afterward, he fell in love with a beautiful princess. She had magnetic green eyes and light brown hair. He loved her very much and she adored him back even more. There was just one issue – the young boy was the son of a blacksmith. The princess’s father would never allow her to wed a simple son of a blacksmith. However, their love was too powerful. In one fell swoop, the young boy raised an army of undead and began a rebellion to overthrow the evil king who failed to believe in genuine love. After months of fighting against the armies of his love’s dad, the young lad was assassinated as well as the war was over. No songs were sang.
This time, WordAI calculates the spin it generated at 97% uniqueness which is basically completely unique. If you look at the text above, again, the first sentence of the quoted content is a bit confusing, but the rest is still good. I would even say that the last sentence came out better than the previous spin, but generally, yes, the above spin looks more like a human wrote it.
Never let your audience guess what you are trying to say, your writing should literally speak for itself. When your content has too many errors, it becomes difficult to read and understand. Although, one or two errors can be skipped by readers, but glaring grammatical errors can minimize the impact of your content. Also, it can make your writing difficult to read and digest.
The process is very simple, article rewriter tool will scan through the given content for the words that it can replace with a synonym. If article spinner will come across a word that it can replace with a substitute then it is switched with one of the suitable substitutes and is highlighted, making it easier for you to identify. However, you can click the word if you want to revert to the original text, find a different suggestion or add your own text.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247526282.78/warc/CC-MAIN-20190222200334-20190222222334-00447.warc.gz
|
CC-MAIN-2019-09
| 3,980
| 8
|
http://www.warrelics.eu/forum/history-research/scotland-normandy-vet-bring-back-relic-history-please-help-29718/
|
code
|
Im just starting to go through the over 60 very faint placenames on this original Bereitschaftsarmband. I would deeply appreciate any help I could get with hypotheses theories etc about this mans "European tour". Ive encrypted the topmost placenamnes today.. They are:
Gourge (today Gourock?) Scotland
Greeneck (today Greenock?)
Leister England (Leicester?)
I will add more as I get them visible..
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720973.64/warc/CC-MAIN-20161020183840-00546-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 397
| 5
|
https://justread.wordpress.com/2010/08/19/316/
|
code
|
I spent some time this summer researching applications to install that would make them a better tool–particularly for literacy. I thought I’d share the list.
- Google Chrome: We used Internet Explorer all last year, but I, personally, have been using Firefox. So, why Chrome? As with all things Google, it’s clean, simple, and fast. With a few extensions added, I think it’s going to be powerful:
- Bubble Translate: Students can highlight text on a page, click one button in the toolbar, and produce a dialogue bubble above the highlighted text with translated text in a selected language, and there are many languages available. For our ESL kids, this will be powerful.
- Google Translate: I added this language translator also because it allows you to translate an entire web page with one click. I’m hoping the combination of the two will work well.
- WebNotes: This is the tool I spent the most time researching. I was looking for a simple note-taking tool that would basically allow students to harvest snippets from web sites, add their own annotations, and save them in an organized fashion–a replacement for the yesteryears of source cards and note cards. I played with Diigo and Delicious but settled on WebNotes. It’s simple. It allows students to create a free account and create folders where they can organize and share their notes. I’m envisioning mini-inquiry projects where students submit a WebNotes generated report of their notes.
- Delicious: I still love Delicious and wanted to make it available to students so that they can bookmark sites online rather than on the mini, making them available from anywhere with an internet connection.
- Awesome Screenshot: This handy tools allows students to capture a screenshot, add notes, and copy the image or save it to a site online where they can add the image to blog posts or elsewhere. All without leaving their browser! I think this would be awesome for students creating portfolios: they could capture artifacts and reflect on their work. They could analyze ads or other texts. I was thinking of using this tool next week with my AP English students, having them annotate some poems, analyzing diction and tone.
- FeedSquares: My students have been using Google Reader, and FeedSquares simply allows you to read your subscriptions in a more visually appealing format (sort of like a magazine) right from your browser.
- Timer: This is a simple timer that allows students to set a countdown and track their time. I’ve been using Online Stopwatch, displaying it on the LCD projector in class. But, I sometimes need to flip through several screens, losing site of the timer. This timer is built in the browser, so no matter where they go, they see the countdown. I’m hoping this will be a great time management tool as we work in class.
- SmoothScroll: This is one they’ll never see but will appreciate. Some kids have a hard time adjusting to the small keyboard and built-in mouse (whatever you call that black pad that replaces the mouse). It seems like scrolling down webpages feels a bit jerkier on the mini, and some kids have trouble navigating sites. SmoothScroll eliminates the jerky scrolling.
- PhotoStory3: This is a free, and very simplistic, video-making software from Microsoft. I know there are online video making tools, but sometimes, to make the most of the little time we have in class, I just need a simple software that will work even when our internet connection won’t!
That’s it. There are thousands more extensions, but I wanted to keep it simple and add only a few that I thought would be most productive for my students. I’m sure I’ll discover more I want to add later. I’d love to hear any suggestions you might have for extensions or any other downloads you’d suggest.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123484.45/warc/CC-MAIN-20170423031203-00627-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 3,798
| 12
|
https://darwinsdata.com/what-is-a-virtual-disk-file/
|
code
|
A virtual disk file is a file that functions as a virtual hard disk drive. Virtual disk files allow you to create and run virtual machines on your computer without having to dedicate an entire physical hard drive to each virtual machine.
What are the benefits of using virtual disk files?
There are several key benefits to using virtual disk files rather than physical hard drives for virtual machines:
- Portability – Virtual disk files can easily be moved, copied, and backed up like any other file on your system.
- Flexibility – You can dynamically resize virtual disk files as needed to give more storage space to your virtual machines.
- Isolation – Changes made inside a virtual machine stay contained within its virtual disk file and don’t affect the host or other VMs.
- Cost – Virtual disk files eliminate the need to purchase additional physical hard drives.
How do virtual disk files work?
Virtual disk files work by emulating a real hard drive for the guest operating system running inside a virtual machine. The virtualization software handles intercepting disk read/write operations from the guest VM and mapping them to the appropriate locations within the virtual disk file on the host machine.
This process allows the guest VM to act as though it is reading and writing to a real disk drive when in reality the data is being stored in a file. The virtual disk file contains all the contents that would normally be stored on a physical hard drive, including the guest operating system, applications, and user files.
What types of virtual disk files are there?
There are a few common virtual disk file formats used in virtualization:
- VMDK – Virtual Machine Disk format used by VMware products. VMDK allows creating virtual disks as files on the host machine.
- VHD/VHDX – Virtual Hard Disk format used by Microsoft and Hyper-V. Like VMDK, it stores virtual disk contents in a host file.
- QCOW2 – QEMU Copy On Write version 2 format. Used by QEMU and KVM hypervisors.
- VDI – Virtual Disk Image format used by Oracle VM VirtualBox.
The most common formats are VMDK and VHD. Each hypervisor has its preferred format, but some formats like VMDK can be used across hypervisors.
How are virtual disk files created?
Virtual disk files are created in a few different ways depending on the hypervisor and format:
- In the hypervisor management software, such as vSphere for VMDK files. You specify the storage location, size, and other details.
- By converting an existing physical hard drive into a virtual disk file through a process called physical-to-virtual (P2V) conversion.
- By attaching an ISO installation image of an OS like Linux or Windows to a VM and installing onto a blank virtual disk file.
The process creates a file at the specified location that can be attached to a virtual machine. The VM can then treat this virtual disk file exactly like a real storage drive.
Where are virtual disk files stored?
Virtual disk files are typically stored in a few common locations on the host machine:
- Local folder – Stored in a local directory or folder on the host computer running the hypervisor.
- External drive – Saved to an external HDD or SSD connected to the host.
- Network storage – Saved to a network attached storage (NAS) device or storage area network (SAN).
- Cloud storage – Stored in a cloud storage bucket like S3, Azure Storage, or GCP Storage.
Storing virtual disk files on external or networked storage provides more flexibility. It allows moving and accessing them from different hosts. Local storage is faster while cloud storage offers unlimited capacity.
What is the typical file extension for a virtual disk file?
The most common virtual disk file extensions include:
- .vmdk – Used for VMware VMDK files.
- .vhd/.vhdx – Used for Microsoft Hyper-V VHD/VHDX formats.
- .qcow2 – Used for QEMU QCow2 files.
- .vdi – Used for VirtualBox VDI files.
- .img – A common generic image file extension used by many emulators.
The extension helps identify what type of virtual disk format the file contains. This allows the correct hypervisor to recognize and work with the file.
How does a virtual machine access a virtual disk file?
When a virtual disk file is attached to a virtual machine, the hypervisor handles mapping disk read/write operations from the VM to the virtual disk file. This process happens behind the scenes:
- The VM requests to read a block of data from what it believes is a physical hard drive.
- The hypervisor intercepts the request and determines the location of that block in the virtual disk file.
- The hypervisor reads the requested block of data from the file.
- The hypervisor returns the data to the VM.
This on the fly translation allows the VM to interact with the virtual disk just like a physical one. The hypervisor abstracts away the fact it is actually a file on the host system.
Can you access and edit virtual disk files directly?
In most cases, you should not directly access or edit the contents of a virtual disk file from the host OS while it is attached to a running VM. Doing so can corrupt the file system and cause crashes.
However, when powered off, it is possible to mount, access, and edit a virtual disk file from the host if needed. For example, you may want to:
- Use host OS tools to repair or restore the VM filesystem.
- Manually extract files from the virtual disk.
- Modify the files and registry settings of the guest OS.
This requires mounting the disk file as a drive on the host OS using utilities like qemu-nbd (Linux) or Disk Management snap-in (Windows). Caution should still be taken not to access the virtual disk while powered on.
Can you convert a physical computer into a virtual disk file?
Yes, it is possible to perform a physical to virtual (P2V) conversion to turn a physical computer into a virtual machine. There are a few approaches to doing this:
- Disk imaging – Take a raw disk image of the physical disk and convert it into a virtual disk file.
- Cloning – Use virtualization software to clone the physical disk to a new virtual disk file.
- Backup/restore – Take backups of the physical system and restore to a new VM.
This process allows migrating physical systems like servers into virtual infrastructure. It eliminates the need to reinstall and reconfigure the OS.
What are the risks of corrupted virtual disk files?
Some potential risks of virtual disk file corruption include:
- VM crashes or fails to start.
- Data loss or inaccessible data within the VM.
- File system damage preventing OS from booting.
- Errors and performance issues until the disk is repaired.
- Permanent VM failure if backups are not available.
To reduce the chance of corruption, proper storage and VM backup/replication should be used. But corruption can still occur due to bugs, host failures, or improper virtual disk modifications.
How can you optimize the performance of virtual disk files?
Some tips for optimizing virtual disk performance include:
- Use fixed VMDK files instead of dynamically expanding disks.
- Place virtual disk files on high performance storage like SSDs.
- Avoid using virtual disks over slow networks if possible.
- Monitor disk queues and latencies for bottlenecks.
- Defragment the file periodically within the guest OS.
Performance tuning the underlying storage is key. Mixing virtual disks with other workloads on the same volume will often cause contention.
Can you password protect and encrypt virtual disk files?
Many hypervisor platforms allow encrypting the contents of virtual disk files for security:
- VMware vSphere – Provides encrypted VMDK support.
- Hyper-V – VHD files can be encrypted with BitLocker.
- KVM – Supports QCOW2 encryption and LUKS encrypted disk images.
- VirtualBox – Allows encrypting disk images to protect VM data.
Encrypting virtual disks protects their contents at rest on the host system or storage platform. It prevents unauthorized access to the VM data.
What are the main use cases for virtual disk files?
Some of the most common use cases for virtual disk files include:
- Running guest OSes like Linux, Windows, etc on desktop virtualization software like VirtualBox.
- Virtualizing enterprise servers, applications, and workloads on platforms like vSphere, Hyper-V, Xen, KVM, etc.
- Migrating physical systems to virtual infrastructure through P2V conversion.
- Modeling production systems and workloads in development, staging, and testing environments.
- Providing isolated, portable virtual environments for developers, testers, etc.
The main benefits revolve around portability, manageability, isolation, and consolidation of workloads into virtual machines.
What are the alternatives to using virtual disk files?
Some alternatives to virtual disk files include:
- Physical hard drives – Using dedicated HDD/SSD hardware for each VM.
- Logical or raw disk partitions – Creating partitioned logical drives rather than files.
- SAN/NAS storage – Block/file based storage area networks rather than local files.
- Cloud block storage – Cloud eBS/EFS volumes assigned directly to VMs.
These options remove the file abstraction layer. But they can limit features like portability, snapshots, and thin provisioning.
Can you boot operating systems directly from virtual disk files?
Yes, virtual disk files allow booting and running guest operating systems without the need for a physical disk drive. Each virtual disk file acts as a full virtual hard disk drive for the VM.
The VM boots from the virtual disk using a bootloader like BIOS or EFI, loads the OS kernel, and initializes the filesystem – the same way it would from a physical drive. All of this occurs through the abstraction provided by the hypervisor and virtual disk file.
Bootable virtual disk files are created either from existing OS installations or by attaching an ISO and performing a fresh OS install within a new VM.
Virtual disk files are a key enabling technology for virtualization. They provide portability, management, and flexibility benefits compared to physical storage. By encapsulating VM disks as files, virtual disks allow full VMs to be stored, copied, and migrated easily.
All major hypervisor platforms have adopted virtual disks using default formats like VMDK, VHD, and QCOW2. Continued innovation in file based VM storage is improving performance, security, availability, and integration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00805.warc.gz
|
CC-MAIN-2024-10
| 10,410
| 102
|
https://gamesweasel.tv/reviews/sonic-and-the-black-knight-review
|
code
|
Sonic games seem to be two-a-penny these days (Sonic Unleashed and Sonic Chronicles The Dark Brotherhood) and Sonic and the Black Knight is Sega’s latest attempt at actually making a good Sonic game in 3D. This time he gets summoned to the world of King Arthur who looks a lot meaner than he ever was in any stories I’ve ever heard. Equipped with a sword that bounces up and down and talks to you, you’re off to defeat Arthur, running into other enemies such as Lancelot who are actually other Sonic characters Shadow, Knuckles and Amy with armour on. Tails also appears in there as a Blacksmith when you’re sorting out your weapons.
When it comes to gameplay it’s a return to running through a level that’s a sort of rollercoaster. It’s almost on rails as you plunge into the screen, letting you move slightly to the left and the right to avoid obstacles and pick up items and fairies of all things.
Of course, having a sword, you also get to swing it by swinging the Wiimote when you encounter enemies. You can also perform rush moves where attacks are stringed together as you lock onto enemies and smash through them one-by-one. Occasionally the running will stop and you’ll have to fight bosses. You either fight them directly using a combination of blocks and sword swings, or have to defeat them using quick time events.
Once again, my problem is the game almost plays itself at the beginning of the game and then becomes almost impossible later on as you have to dodge all sorts of perils coming at you at a ridiculous speed and of course if you’re not holding any rings, you’re dead!
When it comes to presentation, it’s obvious they’ve put some proper care and attention into the visuals. The environments look great, if a little samey, and the opening cut-scene looks fantastic – it’s a pity the story is then explained using story book graphics that jar with the first cut-scene you see but you soon get used to the visual style and accept it.
Sonic fans will probably enjoy this and whilst I wanted to hate it, I actually found this game had some charm that made me forgive some of its uninspired gameplay. Sonic and the Black Knight gets an average 5 out of 10.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301670.75/warc/CC-MAIN-20220120005715-20220120035715-00188.warc.gz
|
CC-MAIN-2022-05
| 2,202
| 6
|
http://wiki.meego.com/index.php?title=Contributing_to_MeeGo&oldid=4120
|
code
|
People often ask how they can get involved and contribute to MeeGo. This is meant to help guide new community members into productive contributions as part of the MeeGo project.
We want to see people contributing to the MeeGo project, and there are many ways to contribute. As with any open source project, being helpful with some concrete contributions will demonstrate to the project maintainers that you are serious about contributing, which helps us separate the people who talk about contributing from the people who contribute in a meaningful way to the project. This builds trust in your work, and the people who consistently contribute good work will be given more and more responsibility. Examples include Reggie who maintains our forums, our many community localization experts who have access to make changes to translations, and others who have been given special roles and privileges as a result of their contributions to the project. Ideally, we want to see more people outside of Intel and Nokia taking on key maintainer roles and other official roles in the project.
Small contributions will lead to bigger roles in the project, so find an area that best fits with your interests and skills and get started with some contributions. Dirk mentioned several ways to contribute, but here are some more concrete ways to get involved today.
The Community Office also maintains a list of committed and proposed tasks. You can propose a new task based on something that you think needs to be done, or contact the owner of a committed task and volunteer to help.
On another note, I suspect that we have a terminology gap around the word "community". Since MeeGo is an open source project, everyone who contributes in some way is a member of the MeeGo community. This includes people from Intel, Nokia, Novell, other companies, translators, hobbyists, and interested people unaffiliated with any company. We are all working together as a community to make MeeGo as awesome as it can possibly be. We want to get everyone working together as part of a large community working toward the same goal of having an amazing operating system and application ecosystem for small form factor devices.
Many of the replies in this thread seem to imply that Intel / Nokia OR community are two completely separate things. If you are from Intel / Nokia, you aren't "community", and if you are outside of Intel / Nokia you can only participate in "community" efforts. This implies a mentality of community vs. Intel / Nokia rather than a collaboration of a single community made up of many different people all working together on MeeGo.
Over time as people prove themselves through solid contributions, I want to see more people on the governance pages who don't work for Intel and Nokia leading significant areas of the MeeGo project. Getting everyone working together regardless of their corporate affiliation is the first step to having a successful MeeGo community. Yes, this takes a little time and hard work, but starting now with your contributions to MeeGo will get us there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697772439/warc/CC-MAIN-20130516094932-00002-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 3,073
| 7
|
https://discuss.ipfs.io/t/wrapping-my-head-around-ipfs-basics-for-newbies/1219
|
code
|
Good to know. So, I suppose you would want to encrypt any data that was to be shared within a smaller group of trusted nodes, if any files added with the 'ipfs add' command are publicly viewable with a bit of snooping.
ipfs pin add command has the description "Stores an IPFS object(s) from a given path locally to disk." while the
ipfs get command has the description " Stores to disk the data contained [in] an IPFS or IPNS object(s) at the given path." These sound fairly similar.
Is it only the
pin command that downloads a copy of an object to re-distribute upon subsequent peer requests?
Also... If I upload a folder, say of a website, then I want to update a few files in that folder, how would I go about updating those files, and how would I keep a reference pointing to the newest version of that folder?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741192.34/warc/CC-MAIN-20181113020909-20181113042909-00369.warc.gz
|
CC-MAIN-2018-47
| 814
| 6
|
https://www.ankursheel.com/blog/weekly-roundup-12-jan-2020/
|
code
|
Every week I come across some great articles. Here are some of the posts I feel you will enjoy reading as much as I did.
How can you get 2 elements on your web page to overlap? Sarah Drasner shows the 2 ways you can achieve overlapping elements. One is the old school position property. The other method is the new and shiny CSS grid.
30 seconds of code has some really useful code snippets in JS, CSS, Python, React and PHP.
Valia Havryliuk shares her collection of stock photos and image sites so that you can find the perfect visual for your next article or project.
Fare Alerts can save you a lot of time when trying to find the best deal on your flight. Matt Moffitt shares the different services you can use to set up fare alerts.
zechtyounes shares the pros and cons of the 3 major hosting platforms - Github, Gitlab and BitBucket.
Was the birth of cilivilization and agriculture just an accident and driven by disaster? Nick Longrich shares his thoughts on why he thinks so.
Hope you enjoy reading these articles as much as I did.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250604397.40/warc/CC-MAIN-20200121132900-20200121161900-00109.warc.gz
|
CC-MAIN-2020-05
| 1,038
| 8
|
http://jnocook.net/geek/
|
code
|
- [macrant.htm] Some reasons why Mac
computers are (and can be) neglected.
- [dos-net.htm] Connecting a DOS box to a
WfW / Win95/98 / Linux LAN.
- [undelete.htm] Undeleting Linux files -
doing what cannot be done.
- [printing.htm] Print
direct to an LPT port in Linux and avoid the hassle of the weird
Linux/Unix lpt utilities -- and use a dot-matrix printer. Changes for Lynx
and Pine, also the use of a Windows machine for printing via SAMBA.
- [tiny.htm] Thirty very small Linux OS
- [webcheck.htm] Web site
continuity check - finds missing files and orphans.
- [oak.htm] Changing signatures in Pine with
every email that goes out, using the "On-Line Jargon" file.
- [Learn Programming] Learn programming in
5 days, notes by a crack programmer (BTW, this is the most frequently
asked for file at this site).
- [Calendar Construction] PHP code for a
calendar page (month) with clickable date links.
Website Provider: Outflux.net, www.Outflux.net
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583508988.18/warc/CC-MAIN-20181015080248-20181015101748-00253.warc.gz
|
CC-MAIN-2018-43
| 947
| 21
|
https://devpost.com/software/candetech
|
code
|
There are over 80,000 cases of skin cancer are diagnosed in Canada each year. There are more new cases of skin cancer each year than the number of breast, prostate, lung and colon cancers COMBINED. Canadian born in the 1990s have 2-3 times higher risk of getting skin cancer in their lifetimes (1 in 6) than those born in the 1960s (1 in 20). Skin cancer is not only one of the most common types of cancer, it is also one of the most preventable, detectable, and treatable. Knowing this, we invented Candetech!
What it does
Candetech works by using Google Cloud API to compare an image of a skin lesion against a database of benign skin cancers and malignant skin cancers. It then determines whether that particular image is BENIGN or MALIGNANT based on machine learning. In addition, we also used We also created a web-prototype that would mimic the app. We also created a ML using python and various libraries that predicts malignancy of cancer based on different attributes (e.g., size, radius, etc.). We were able to build a proto-type of the app as well, to show how patients and doctors can both benefit from this app.
How I built it
Challenges I ran into
Training the images took a really look time in Google Cloud Learning how the different libraries work in Python was challenging Trying to integrate node.js app with the Google Vision API Trying to design a user friendly interface
Accomplishments that I'm proud of
Building a finished product with a group of people we just met
What I learned
How to use FIGMA, how to use ML, how to make a perfect pitch
What's next for Candetech
Build functional apps
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738950.31/warc/CC-MAIN-20200812225607-20200813015607-00302.warc.gz
|
CC-MAIN-2020-34
| 1,612
| 12
|
http://forums.plex.tv/discussion/320794/plex-almost-unusable
|
code
|
Plex almost unusable
I've been getting more and more frustrated with my plex server as time has gone on that I'm just about done with it. It's extremely slow, sometimes totally non responsive, and other times won't even play the video even though you can hear the audio. I even went so far as to completely build a new computer (4.2 ghz i7 Processor and 16 gb/ram) and still the issues persist. In fact, I'd say they've gotten worse. I just added a new movie to my library and for some reason it's completely unresponsive. I can't get it to do anything. Uninstalled/reinstalled and still nothing. Isn't there a way to speak to someone for help??!! I paid for this program that I can't even use and I can't call or speak to anyone in real time for help. I'm so frustrated!!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867140.87/warc/CC-MAIN-20180525160652-20180525180652-00626.warc.gz
|
CC-MAIN-2018-22
| 773
| 2
|
https://johnjohnston.info/blog/p5-js-classy-bramble-skulls/
|
code
|
I’ve been having a wee play with the p5.js web editor.
I’ve occasionally dipped my toe into processing and found it good fun.
I don’t really have much of a clue but have had a bit of fun. Especially when I found you can use a library with p5.js to export gifs. The feature image on this post is one made by my sketch: Classy bramble skulls 4. This one has a background image, some animation, the mid-ground, the sleeper and computer and then the window frame which are drawn. If I had though I’d have used 3 image layers sandwiching 2 animation ones. Early days.
There seems to be a ton of learning material available and it is easy to duplicate interesting p5.js sketches to edit and play around with. (The school holidays are not long enough;-))
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473518.6/warc/CC-MAIN-20240221134259-20240221164259-00519.warc.gz
|
CC-MAIN-2024-10
| 755
| 4
|
https://cpratt.livejournal.com/274462.html
|
code
|
However, I forgot my Apple ID password. So, I clicked on the Reset Password link.
Just over four hours later, I received the promised E-mail in my inbox. Here's a quote from this E-mail:
"Please note that this link will expire 3 hours from the time it was sent."
How useful! Offer to reset a customer's password, but don't send the mail until an hour after it expires. Yay.
Update: As Chris points out below, the problem isn't Apple's, but Yahoo's.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358480.10/warc/CC-MAIN-20211128073830-20211128103830-00389.warc.gz
|
CC-MAIN-2021-49
| 448
| 5
|
https://www.python-excel.org/
|
code
|
Working with Excel Files in Python
Reading and Writing Excel Files
There are python packages available to work with Excel files that will run on any Python platform and that do not require either Windows or Excel to be used. They are fast, reliable and open source:
The recommended package for reading and writing Excel 2010 files (ie: .xlsx)
An alternative package for writing data, formatting information and, in particular, charts in the Excel 2010 format (ie: .xlsx)
This package allows you to read Excel files in the
This package allows you to read
xlsm files and write
This package is for reading data and formatting information from older Excel files (ie: .xls)
This package is for writing data and formatting information to older Excel files (ie: .xls)
This package collects utilities that require both
xlwt, including the ability to copy and modify or filter existing excel files.
NB: In general, these use cases are now covered by openpyxl!
Writing Excel Add-Ins
The following products can be used to write Excel add-ins in Python. Unlike the reader and writer packages, they require an installation of Microsoft Excel.
PyXLL is a commercial product that enables writing Excel add-ins in Python with no VBA. Python functions can be exposed as worksheet functions (UDFs), macros, menus and ribbon tool bars.
xlwings is an open-source library to automate Excel with Python instead of VBA and works on Windows and macOS: you can call Python from Excel and vice versa and write UDFs in Python (Windows only). xlwings PRO is a commercial add-on with additional functionality.
The Mailing List / Discussion Group
There is a Google Group dedicated to working with Excel files in Python, including the libraries listed above along with manipulating the Excel application via COM.
The following companies can provide commercial software development and consultancy and are specialists in working with Excel files in Python:
|Clark Consulting & Research
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817002.2/warc/CC-MAIN-20240415142720-20240415172720-00148.warc.gz
|
CC-MAIN-2024-18
| 1,953
| 21
|
https://pubmed.ncbi.nlm.nih.gov/15351371/
|
code
|
Objective: The main obstacle in interpreting EEG/MEG data in terms of brain connectivity is the fact that because of volume conduction, the activity of a single brain source can be observed in many channels. Here, we present an approach which is insensitive to false connectivity arising from volume conduction.
Methods: We show that the (complex) coherency of non-interacting sources is necessarily real and, hence, the imaginary part of coherency provides an excellent candidate to study brain interactions. Although the usual magnitude and phase of coherency contain the same information as the real and imaginary parts, we argue that the Cartesian representation is far superior for studying brain interactions. The method is demonstrated for EEG measurements of voluntary finger movement.
Results: We found: (a) from 5 s before to movement onset a relatively weak interaction around 20 Hz between left and right motor areas where the contralateral side leads the ipsilateral side; and (b) approximately 2-4 s after movement, a stronger interaction also at 20 Hz in the opposite direction.
Conclusions: It is possible to reliably detect brain interaction during movement from EEG data.
Significance: The method allows unambiguous detection of brain interaction from rhythmic EEG/MEG data.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00777.warc.gz
|
CC-MAIN-2023-14
| 1,292
| 5
|
https://linen.prefect.io/t/2435017/no-that-is-a-cloud-only-feature-as-there-are-services-needed
|
code
|
What is the easiest way to get notified from the prefect servers when flows fail, particularly on a high level. We have now twice been hit by flows silently failing on the prefect server side. Once because of a billing issue and once because of k8s connection issues. There should be a better way than looking for red on the dashboard?
10/04/2021, 3:02 PM
Hey @Filip Lindvall, you’re on Prefect Cloud right? Have you seen Automations where you get configure an alert if a certain condition is met (flow failed or flow hasn’t run for X seconds)
10/04/2021, 3:11 PM
Thanks, will look into it
10/04/2021, 7:12 PM
@Kevin Kho is there (will there be) any support for Automations on Server?
10/04/2021, 7:13 PM
No that is a Cloud only feature as there are services needed to run on that only Cloud has, but there are the webhooks in server you can use. It says deprecated but it’s really not going anywhere. Docs
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00120.warc.gz
|
CC-MAIN-2023-40
| 912
| 9
|
http://iowadg.com/phpBB3/viewtopic.php?f=3&t=9508&start=45
|
code
|
I don't think course par enters into the PDGA rating calculation at all. It's based on how other players scored, relative to their player ratings.
"The scores thrown by propagators each round are used to calculate the SSA rating for a specific course layout. A propagator is a current member whose rating is over 799 and is based on at least 8 rounds. As long as there are 5 propagators playing a course layout, ratings can be calculated. The average rating of all propagators will equal the average rating they get for the round – always. If the same course layout is used more than one round, the scores from multiple rounds will be used to determine an overall SSA, as long as the individual round SSAs come out close to each other, so everyone gets the same rating for the same score on the same course. If the SSAs are significantly different, likely due to varying wind conditions, the round ratings will be calculated separately. If a propagator shoots more than 60 points below their rating, their score will not be used in the SSA calculations. "http://www.pdga.com/faq/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292887.6/warc/CC-MAIN-20160823195812-00296-ip-10-153-172-175.ec2.internal.warc.gz
|
CC-MAIN-2016-36
| 1,081
| 2
|
http://freecode.com/tags/scientificengineering?page=1&sort=updated_at&with=447&without=
|
code
|
The cptutils package contains a number of utilities for the manipulation of color gradients; mainly for translating between different formats. Formats supported include ggr (GIMP gradient), cpt (GMT color palette table), avl (Arcview Legend), the PaintShop Pro and Photoshop formats, SVG, and CSS3.
Asymptote is a powerful descriptive 2D and 3D vector graphics language for technical drawing, inspired by MetaPost but with an improved C++-like syntax. It provides for figures the same high-quality level of typesetting that LaTeX does for scientific text. Asymptote is a programming language as opposed to just a graphics program. It can exploit the best features of script (command-driven) and graphical user interface (GUI) methods. High-level graphics commands are implemented in the language itself, allowing them to be easily tailored to specific applications.
TRIP is a general computer algebra system dedicated to celestial mechanics. It includes a numerical kernel and has interfaces to gnuplot and xmgrace. Computations can be performed with double, quadruple, or multi-precision. Users can dynamically load external libraries written in C, C++, or Fortran. Parallel computations on multivariate polynomials can be performed.
Armadillo is a C++ linear algebra library (matrix maths) aiming towards a good balance between speed and ease of use. The API is deliberately similar to Matlab's. Integer, floating point, and complex numbers are supported, as well as a subset of trigonometric and statistics functions. Various matrix decompositions are provided through optional integration with LAPACK and ATLAS numerics libraries. A delayed evaluation approach, based on template meta-programming, is used (during compile time) to combine several operations into one and reduce or eliminate the need for temporaries.
wview is an application that controls a supported weather station to retrieve archive records and current conditions. Archive records may optionally be stored in a relational database (MySQL or PostgreSQL). At a user-defined interval, wview will use the archive history and current conditions to generate weather images (buckets and graphs) and Web pages based on configurable HTML templates. It supports serial and USB data loggers, as well as connectivity with a terminal server or serial server via TCP sockets.
SHTns is a high-performance Spherical Harmonic Transform library. It was designed for numerical simulation (fluid flows, mhd, etc.) in spherical geometries, but can be used for any kind of problem involving scalar or vector spherical harmonics. It is very fast, thanks to careful vectorization and runtime tuning. It supports multi-threaded transforms via OpenMP. It features scalar and vector transforms, synthesis and analysis, and flexible truncation and normalization. A Python interface is included.
gipfel is a tool to find the names of mountains or points of interest on a picture. It uses a database containing names and GPS data. With the given viewpoint (the point from which the picture was taken) and two known mountains on the picture, it can compute all parameters needed to compute the positions of other mountains on the picture. gipfel can also generate (stitch) panorama images.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206147.1/warc/CC-MAIN-20140423032006-00553-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 3,232
| 7
|
http://www.onlineutah.com/peerlesshistory.shtml
|
code
|
History of Peerless, Utah
Taken from the Utah Place Names. (Links Added)
Peerless (Carbon) was in Spring Canyon west of Helper. It was first settled in 1912 and was named after the local coal mine. Peerless peaked around the 1920s and 1030s, but the community soon began to fade because improved transportation allowed the miners to commute from Helper.
John W. Van Cott
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591718.31/warc/CC-MAIN-20180720154756-20180720174712-00046.warc.gz
|
CC-MAIN-2018-30
| 370
| 4
|
http://blogs.msdn.com/b/alfredth/archive/2006/02.aspx?PageIndex=1&PostSortBy=MostComments
|
code
|
Additional profile information on Alfred Thompson at Google+
Nicole, from the MSN Messenger group (Windows Live Messenger?), has a blog entry about some existing Bots that you can use from MSN Messenger and some suggestions of Bots she would like to see. You may have already heard about the Encarta® Instant Answers BOT (Encarta@conversagent.com ), that lets you ask questions which it then looks up for you in Encarta. Nicole lists a whole bunch more. Her blog is worth reading for that alone. But it gets better.
The idea of talking to a computer and getting answers that appear to come from a real person has long been the goal of computer programmers everywhere. It looks like now there is the chance for a lot more of us to try that sort of program out for ourselves.
Conversagent, in partnership with Microsoft, is making a free license available to their BuddyScript Software Development Kit (SDK) for creating BOTs and what are called Activity applications so that people can create their own BOTs.
Think about writing a BOT that answers question about your school? Or perhaps reports back on the scores of sports teams? How about a BOT that people can ask if there is a snow day? Well, that may be more useful where I live than some other places. But you get the idea.
This may very well be a good project for a student or team of students. And if they make a very good one Conversagent may wave the normal six month limit on the license. At the very least they can try to make a BOT that gets their friends to wonder if it is a BOT or a real person they are talking to?
I like to work with wood. I find that building things myself is very satisfying and enjoyable. But I had a professional carpenter working in my bathroom this morning. He was fixing a section of floor that had been ruined by water from a leak. I could have fixed it myself. In fact I did fix the same section of floor myself about 10 years ago. I didn’t though. Why? Because it was about the destination and not the journey.
Let me explain. When working with wood on a project much of the enjoyment comes from doing the actual work. Let’s call that the journey. The end result, what ever is constructed, is the destination. There are times in life when the journey is the most important thing. Getting there is nice but the journey is the real valuable experience. On the other hand, sometimes all that is important is the end result or arriving at the destination.
How you chose to do something depends on whether or not the journey or the destination is the important part. This decision determines how you make the journey. As a teen I rode a bicycle from California to Delaware (a distance of about 3100 miles) in a month’s time. The journey was the important thing. If the main goal was to get to Delaware I would not have started in California (I lived in New York at the time) and I surely would not have taken a bicycle. I would have flown or driven or taken the train depending on other considerations.
Today what was most important to me was that the floor was fixed quickly and properly. I don’t want to have to do it again and I do not want to fall through the floor. While I could not afford a carpenter last time this happened I can this time. This was not a fun and interesting job but it needed to be done. A professional did the job in half the time it would have taken me and the end result is much better than I could have done. There was no good reason (other than possibly saving money) for me to do it. And of course there are lots of better things for me to do with my time.
So what are the differences between a professional and a hobbyist doing a job for fun? And how does it all relate to technology? Glad that you asked!
A professional has two things that a hobbyist generally doesn’t have. One is training and the
other is professional quality tools. Now sure there are hobbyists who have training and great tools. I have a friend at Microsoft who has a very professional wood shop and the training to use it. He has even worked as a professional carpenter. But he’s exceptional.
The training is the first big thing. When you do a job professionally you need to have more knowledge than experience alone can give you. You can not afford to learn by trial and error.
Tools are the second big thing. The carpenter who came to my house had a much larger selection of tools than I will ever have. The tools he has are also more powerful, more sturdy and more specialized. They give him the ability to do things better and faster. I think that both the hobbyist and the professional enjoy what they do but they enjoy it in different ways.
This is all true of programmers as well. A good professional programmer has learned from
other people’s mistakes. They have been trained. They also have professional tools. An amateur programmer can enjoy programming in a simple text editor or a free, limited capability IDE. The professional wants more from their tools. Oh sure they have the knowledge to do things the hard way but they have the experience to know that they want to save their mental energy for the things that really require it.
Their professional training, like the professional training of a carpenter, is done using professional tools as well. Sure they may get some background in older tools for special tasks or for getting to know the basics but when they are learning how to really do it on the job they use professional tools. I believe that student programmers should be trained using professional quality tools as soon as they have enough of the basics to be able to handle them. A professional needs to get to the destination in the best way possible and professional quality tools used by a person trained to use them is the way to do that.
Is the goal the journey or the destination? What kind of programmers are you teaching?
Are they going to stay a hobbyist programmer who programs as much for the fun of it as the end result? Or are they going to be a professional who gets the job done quickly and efficiently? What kind of tools are you using to teach them?
A friend of mine sent me a link to an article on the new Robosapiens. Well it looks like a great little toy but what else? My friend also sent me a link to a course at Northeaster University that uses this same type of robot as part of a networking course.
More and more I think we are going to see robots in our classrooms. They are a lot more interesting that a lot of other things in class. Plus of course they have the potential to change the way we live our lives. I know that my Roomba has already changed the way I think about keeping the house clean.
I'm not sure where robots are going to go in the future but I think it will be useful if we teach students using and about them now so that they can better create the future.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701166141.55/warc/CC-MAIN-20160205193926-00214-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 6,837
| 23
|
https://support.esri.com/en-us/knowledge-base/sql-server-2000-users-with-sysadmin-or-db-datareader-ro-000010671
|
code
|
SQL Server 2000 users who are members of the sysadmin server role or database roles, such as db_owner or db_datareader, automatically see all the data in a geodatabase. Their permission is inherited by way of role membership.
SQL Server 2000 users with configurations outlined here inherit permissions from server or database roles and cannot see data unless they are explicitly granted SELECT permission or are the owners of the data.
This issue affects SQL Server 2000 users of ArcSDE 9.3.1 and SQL Server 2000 users of ArcSDE 9.2 Service Pack 6 with any of the patches outlined below.
The affected patches are as follows:
-ArcSDE 9.2 Connection Performance and Geodatabase Repair Patch
-ArcSDE 9.2 Service Pack 6 Memory Allocation Patch, and
-ArcSDE 9.2 Service Pack 6 Compress with Concurrent Editors Patch.
This does not affect users at ArcSDE 9.3 or 9.3 Service Pack 1.
This issue was inadvertently caused by a different connection performance enhancement that is part of ArcSDE 9.3.1 and the ArcSDE 9.2 Connection Performance and Geodatabase Repair Patch.
Installing ArcSDE 9.3.1 or installing any patch on ArcSDE 9.2 Service Pack 6 introduces this problem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00393.warc.gz
|
CC-MAIN-2024-18
| 1,164
| 10
|
http://www.codeproject.com/Questions/478447/Performplusvalidationplusonplusdataplusbindedplust
|
code
|
I appreciate if anyone can advise if there is event handler or other ways to validate changes from a data binded textbox before updating data source. I have a windows form with a data repeater. In the data repeater, I have a textbox which is data binded as follows:
BindingSource bindingsource = new BindingSource();
DataSet ds = new DataSet("Preferences");
DataTable table = new DataTable("Preference");
for (int i = 1; i <= 12; i++)
bindingsource.DataSource = ds;
bindingsource.DataMember = "Preference";
textBox1.DataBindings.Add(new Binding("Text", bindingsource, "Value", true, DataSourceUpdateMode.OnValidation));
As can be seen in the code, I have set the textbox to DataSourceUpdateMode.OnValidation. When I ran the project and change the textbox value on the form, I can see that the dataset (ds) is updated correctly. However, I want to be able to validate my entry before committing the new value into my data source.
Is there a special way, using handler or interface to do this please?
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246639482.79/warc/CC-MAIN-20150417045719-00264-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 998
| 10
|
http://andreas-wolter.com/en/tag/htap-en/
|
code
|
SQL Server 2016 is finally available and, by extension, the “version 2” of the In-Memory OLTP Engine, if you will. At various international conferences and already at the IX in 2014 I have presented what is behind the In-Memory Engine of SQL Server introduced in SQL Server 2014. Only I had not yet found the […]
http://andreas-wolter.com/wordpress/wp-content/uploads/2016/07/1606_SQL2016_Real_time_operational_analytics_previewcut.png 394 559 Andreas Wolter http://andreas-wolter.com/wordpress/wp-content/uploads/2017/07/Logo_Andreas-Wolter-1.png Andreas Wolter2016-07-01 17:13:312017-10-18 10:44:27The SQL Server 2016 In-Memory Evolution – from row-store to columnstore to in-memory operational analytics
PASS Essential: Practical Performance Monitoring-Toolset for SQL Server, on 12 April 2018 at Microsoft Bad Homburg, Details here (pdf, in German). Fully booked – waitlist only.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947968.96/warc/CC-MAIN-20180425213156-20180425233156-00578.warc.gz
|
CC-MAIN-2018-17
| 893
| 3
|
http://www-10.lotus.com/ldd/portalwiki.nsf/xpDocViewer.xsp?lookupName=Fast+Track+Documentation+for+Version+8&res_title=Creating_and_editing_content_V8&content=pdcontent
|
code
|
The inline editing features are most useful for quick updates to design or content, especially during the initial phase of building a site. They are also useful on internal sites where site management is decentralized and workflow and deployment are kept simple.
The New Child Page function allows selection of templates, and if “content templating” is enabled, the copying of associated content. This feature is used by all Content Template Catalog page templates.
Dragging a portlet that is enabled for content templating onto a page results in the copying of content into the site area associated with the current page. This feature is used in many of the pre-configured portlets in Content Template Catalog.
A number of the content types in Content Template Catalog were created to allow configuration of IBM
® Web Content Manager components. The Block, List, Slideshow, and Carousel content types are all component configuration templates. The inline editing for these types is hidden until the page is placed into edit mode. In edit mode a “gear” icon displays on rollover, allowing editing of the component configuration.
Content creation and editingParent topic: Key features of web sites built with Content Template Catalog
Examples follow for content creation and editing on index pages, details pages, and slideshows.
Content Template Catalog portlet palette
When you install Content Template Catalog, the page builder portlet palette adds tabs for portlets that have been pre-configured for use on Content Template Catalog pages. Click a portlet title to see a description of what that portlet does.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542244.4/warc/CC-MAIN-20161202170902-00443-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 1,620
| 9
|
https://apps.odoo.com/apps/modules/14.0/sh_workhours_notification/
|
code
|
Less Working hour Notificationsby Softhealer Technologies https://www.softhealer.com
|Lines of code||224|
|Also available in version||v 15.0 v 11.0 v 13.0 v 16.0 v 10.0 v 12.0|
Less Working hour Notifications
This module useful to give notifications if working hours less.
- Notifications sent to the employee if his/her working hours less than specified in the setting.
- Summary of fewer working hours employees list sends to the admin.
- Easy to find list of less working hours employees.
- Easy to configure and use.
- This app is compatible with Odoo's Multi-Company Feature.
v14.0.1 (3rd November 2020)
- Initial Release
Set minimum working hours for all employee, enter email addresses to which notification email summary need to send.
Set employee's email address on which mail will be sent, you can set if employee should be notify or not by for minimum working hours.
Attendance of employees. If employee forgot to check out than its worked hours on that day will be calculated as Zero.Employee check out and again check in on same day than both hours will be added.
Created cron job that will run every day 23 Hours 45 Minutes.
Email sent to all employees who is set to notify and whose worked hours is less than mentioned minimum working hours.
Worked hours email to employee on his email address for less worked hours.
Worked hours email summary of all employee whose worked hours is less than mentioned email addresses.
We have added predefined some languages(English, German / Deutsch, Arabic, Spanish / Español) in module, If you want to add other language you can contact us on email@example.com. We use google translator tools for multi-languages so possible translations can be not accurate. we accept suggest to make more accurate translations also on firstname.lastname@example.org.
Help & Support
You will get free 90 days support and assistance in case of any issues
Odoo Proprietary License v1.0 This software and associated files (the "Software") may only be used (executed, modified, executed after modifications) if you have purchased a valid license from the authors, typically via Odoo Apps, or if you have received a written agreement from the authors of the Software (see the COPYRIGHT file). You may develop Odoo modules that use the Software as a library (typically by depending on it, importing it and using its resources), but without copying any source code or material from the Software. You may distribute those modules under the license of your choice, provided that this license is compatible with the terms of the Odoo Proprietary License (For example: LGPL, MIT, or proprietary licenses similar to this one). It is forbidden to publish, distribute, sublicense, or sell copies of the Software or modified copies of the Software. The above copyright notice and this permission notice must be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Please log in to comment on this module
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949097.61/warc/CC-MAIN-20230330035241-20230330065241-00633.warc.gz
|
CC-MAIN-2023-14
| 3,399
| 24
|
https://naacl.org/naacl-hlt-2019/blog/disability-access/
|
code
|
As an NLP community, we have generally been a welcoming bunch with good intentions. This year the ACL Office and NAACL 2019’s Diversity & Inclusion (D&I) Committee will back up their good intentions with a new approach to disability accommodations. As Rachel Dawes said in Batman Begins, “It’s not who we are, but what we do, that defines us.”
Our mission is to to make sure that anyone even considering attending the conference knows that they can request accommodations (via this form).
First, we all know researchers who attend without requesting the accommodations they need, and so do not receive the full benefit of the conference. For example, a few years ago, one attendee could not fully hear the talks and questions. Instead, they relied on the presentation slides and PDF proceedings.
Second, some researchers decide not to attend at all because of accessibility woes at past conferences. As they also do not request accommodations, they do not appear on NAACL’s radar screen. They miss out on the opportunities afforded by attending the conference, and the field suffers from losing out on their diverse perspectives.
This year, we’re hoping to offer the following accommodations, among any others that are requested:
- Dedicated seating for the vision-impaired or to improve physical access
- Captioning of talks for the hearing-impaired
- Aides to assist attendees with mobility or other issues in navigating the conference venue
- Quiet areas to escape the noise and intensity of the conference
A significant benefit of language technology is that it can make the world of language available to those who have not had full access in the past, for example due to impaired hearing or vision. It is important that potential users of these technologies can participate fully in our conferences and contribute to language technology research. No one should be left out in the cold, unable to participate despite their passion for computational linguistics.
We invite everyone to join us in Minneapolis at NAACL 2019, and hope to see you there! Again, the special requests form is here. If you have any questions or concerns, please don’t hesitate to reach out via firstname.lastname@example.org.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00899.warc.gz
|
CC-MAIN-2023-50
| 2,219
| 11
|
http://www.bustrace.com/bustrace8/manual/HTML/07_generate_io/4_send_script/3_create/10_branch_cdb_data_match.htm
|
code
|
This WEB page comes from the busTRACE 8.0 User's Manual. (Table of Contents)
If you have added a CDB to your script, and the device returns inbound data (i.e. Inquiry, Read Buffer, Read Sector, etc.), you can create a node link to have the script branch if the returned data contains a specified value.
When you click on the Add Link toolbar option (on the Node Links page), you are given the option to Branch on CDB Data match . If you choose the option, the following dialog will appear:
Here you specify where in the returned data the expected data is. For example, in Inquiry data, the Peripheral Device Type field is stored in byte #0, bits 4-0. If you were interested in creating a node link for an Inquiry CDB that returns device type 5, you would use the following settings:
You would set the value for the branch as a value of 5.
By default, we use the "==" operator in Step 3 to perform the branch if the specified data matches exactly the specified value. If you prefer, you can choose from the drop down list option to use the !=, >, >=, <, or <= operator instead.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120206.98/warc/CC-MAIN-20170423031200-00059-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,076
| 6
|
https://blogs.office.com/page/3/?filter=true&filter-product=outlook%2Cyammer%2Coffice-365&filter-type=news
|
code
|
Today Apple announced the iPad Pro, iOS 9 and WatchOS 2. We’ve developed a number of new features for Word, Excel, PowerPoint, OneNote, Outlook and Translator to take advantage of these enhancements. This post provides an overview of some of the most useful new features, including multitasking, inking, intelligent search, wireless keyboard support and updates to Outlook and Translator on the Apple Watch.
The engineers behind Snip had been using the Windows Snipping Tool daily to communicate ideas. One day they stopped to ask, “What if snipping was an experience that looked and felt like Windows 10? What if you could narrate snips with your voice and digital ink? What if the way you snip made you even more productive with Office?” Then they went off and built a new tool called Snip.
One thing is certain: the advent of the Office 365 service has brought an unprecedented amount of innovation and change to our productivity and collaboration products. In this news roundup we share some improvements we’ve made to help you stay on top of the changes—and, as always, news highlights from the last couple weeks. Enjoy!
Office 365 experts from around the world are contributing to a collection of PowerShell scripts that are designed to automate various procedures that would normally require manual intervention from an IT pro. If that sounds like you, check out our new community GitHub project for Office IT Pro Deployment Scripts.
It’s a big day for Microsoft and we are excited to be part of it! Today, we’re pleased to announce the availability of the Office Mobile apps on Windows 10—bringing us one step closer to our vision of reinventing productivity. Customers can immediately download and install the apps from the new Windows Store in 190 countries.
The response to last week’s release of Office 2016 for Mac has been amazing—thank you to all our customers! The post was one of the most read and shared Office Blog posts this year, receiving hundreds of great comments and questions. We thought it would be helpful to share answers to the top ones with you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701149377.17/warc/CC-MAIN-20160205193909-00328-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 2,096
| 6
|
https://youarenotaphotographer.com/forums/reply/reply-to-bring-your-rolaids-43/
|
code
|
I’ve been out the last few days. My mom’s in the hospital with cancer complications. I’ve been tinkering with a complete revamp of the website and how it flows to the facebook page. Will be culling through all that portfiolio garbage you guys suggested to cut and reprocessing whats left. of the next week or so as time allows. Thanks for your input folks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00355.warc.gz
|
CC-MAIN-2023-50
| 362
| 1
|
http://www.dzone.com/links/it_is_ridiculously_easy_to_refactor_go.html
|
code
|
Encap Security, the first in-app authentication solution to arm banks, retailers and other... more »
Mark Zuckerberg. Bill Gates. Steve Jobs. Most of the big names in technology are men. But a... more »
An experiment to prove that Linux is not eating your RAM. Linux borrows unused RAM for disk... more »
you’ll see how to change the owner and group of files, directories and links using chown... more »
There are many books available for programmers, ranging from topics such as programming... more »
View Engine in ASP.NET MVC is used to translate our views to HTML and then render to response.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444829.13/warc/CC-MAIN-20141017005724-00334-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 603
| 6
|
https://terrencebarr.wordpress.com/tag/oracle/
|
code
|
You are currently browsing the tag archive for the ‘Oracle’ tag.
Hear from Oracle, Volkswagen, Eurotech, Bosch, and Telit about Internet of Things benefits, challenges, and solutions – and, of course, the role Java Embedded plays in IoT.
Find more on my previous post.
Oracle will be hosting the “Oracle IoT Summit 2014” in Dusseldorf, Germany on October 22nd. This is a compact, half-day event for exec-level management with the following session highlights:
- The IoT revolution: productive or disruptive?
- IoT at work: perspectives on driving success
- Oracle’s vision for a secure IoT from the edge to the enterprise: insights into a holistic solution
More information and registration can be found here.
Just wanted to direct your attention to Oracle’s Internet of Things (IoT) home page at oracle.com/iot. This is continuously being updated and is a great entry-point resource featuring:
- Overview into Oracle’s IoT strategy and platform
- Webcasts, Videos, Reports, and White Papers
- Additional resources, articles, podcasts and more
- Links to related content on Oracle.com and Oracle Technology Network (OTN)
While you’re there, check out the short video on the left “The Internet of Things: Managing the Complexity”
Check out this interview with Steve Harris, Oracle’s Senior VP of Application Server Development, on Java in general and it’s role at Oracle, adapting to change, the JCP, Java ME and Java ME.next, Java EE 6, Glassfish, and cloud computing.
Nothing here should be shockingly new – it has been broadcast before in a number of ways, but the interview is a compact summary of Oracle’s current vision for Java.
Tune in to watch a special OTN TechCast Live tomorrow, Tue Feb 15 @ 10 am PST and hear Ajay talk about the changes that have come to Java and Oracle since the Sun acquisition 12 months ago.
Just some interesting links I stumbled over during the last two weeks or so:
Osvaldo Pinali Doederlein: “Android = Java”
Andreas Constantinou: “Is Android Evil?”
Jason Hiner: “The dirty little secret about Google Android”
Wall Street Journal: “Google and the Search for the Future”
James Gosling: “Some more comments …”
Just a quick note: Here is an interesting piece by Kay Glahn (ex-spec lead for JSR-249/MSA2) about Oracle’s vision for Java, in particular in the mobile and embedded space.
02/04/2010 in Mobile & Embedded | Tags: Developer Community, Java, Java Card, Java ME, Java ME SDK, Java TV, java.net, JavaCard, JavaFX, JavaFX Mobile, JavaOne, Mobile Java, Mobility, NetBeans, Open Source, Oracle, Oracle Technology Network, Sun Microsystems | 1 comment
- Feb-08: Update on kenai.com
I was tied up in meetings most of the day yesterday so part 3 of the news round-up comes a day late … apologies.
Today, I’d like to summarize the highlights around developer communities and developer engagement under the Oracle+Sun announcements. I am mainly referring to “Overview and Frequently Asked Questions for the Developer Community” published on the Oracle Technology Network (OTN), but I will be including additional information I have collected in the past few days.
- Oracle has a long history of engaging with developers on many levels and this history will continue with respect to Sun’s developer communities
- The Oracle Technology Network (OTN) is one of the industry’s largest developer communities for both Oracle technologies as well as other industry-standard technologies such as Java and Linux. It is similar to the Sun Developer Network (SDN) in that it binds together the technical end-user community as well as Oracle developers and managers.
- OTN features events, news, blogs, articles, wikis, discussions/forums, webcasts, downloads, FAQs, and more across a wide range of technology aspects, including databases, middleware, developer tools, enterprise management, and applications. Specifically for Java, check out the Java Developer Center.
- Many of Sun’s developer sites and communities will remain unchanged in the near future: The Sun Developer Network (SDN), java.sun.com, java.net, BigAdmin, NetBeans.org, and others continue to operate normally. Some may be redesigned and integrated into OTN in the future in communication with the developer community.
- Oracle enthusiastically supports Sun’s user groups such as the Java User Groups (JUGs), OpenSolaris User Groups, Java Champions, and other Sun-related user groups and has already started to reach out to these groups.
- Oracle will also continue the tradition of Java evangelists committed to developer outreach, events, and programs.
- Oracle will continue to invest in the Sun Academic Initiative (SAI) and Java Education and Development Initiative (JEDI) as well as in student communities generally, although the programs may be modified somewhat or migrated over to the Oracle Academy. More details to be provided as they become available.
- Certification programs for Sun technologies: Oracle is committed to provide comprehensive training and certification programs in Sun technologies and will honor exam vouchers purchased through Sun.
As reported before JavaOne 2010 will be co-located with Oracle OpenWorld in San Francisco in the week of September 19. The call for papers (CFP) will go out shortly.
Sign up for the Oracle Developer Network (OTN):
Your SDN account will not be automatically migrated over to OTN. Sign up for a free account. Also, OTN features a number of regular publications such as the Java-related Dev2Dev Newsletter. Find more information here.
02/02/2010 in Mobile & Embedded | Tags: Developer Community, Java, Java ME, Java TV, java.net, JavaCard, JavaFX, JavaFX Mobile, Mobility, NetBeans, Open Source, Oracle, Sun Microsystems, Tools, WTK | Leave a comment
- Feb-08: Update on kenai.com
This is part 2 of the Oracle+Sun News Round-Up. You can find part 1 here. Part 3 comes tomorrow.
Today I focus on the Oracle’s Java Developer Tools Strategy Webcast with Ted Farrell, Chief Architect and Senior Vice President of Tools and Middleware at Oracle.
Talking points in the webcast:
- Oracle’s motto is “Productivity with Choice”, meaning developers can pick the environment and tools they want – Oracle supports these choices of implementation technologies, development styles, platforms and databases, and IDEs
- Oracle’s main Java development tools today are JDeveloper / Oracle ADF as well as Oracle Enterprise Pack for Eclipse
- NetBeans will be offered as additional choice in the developer tools suite, complementing JDeveloper and Enterprise Pack for Eclipse and leveraging functionality between these tools
- Hudson, Sun’s Continuous Integration Server, will move forward with increased investment and continue to be offered
- Zembly has been discontinued by Sun in Nov 2009
- Kenai is Sun’s hosted collaboration server. Oracle plans to discontinue the public interface of Kenai at this time and bring Kenai back in-house, add features, and leverage it for internal projects. Kenai may be brought back as a public offering later if appropriate.
- NetBeans aims to be the best Java IDE, and will focus on Java and JavaFX technologies for EE, SE, and ME/mobile Java, as well as the NetBeans platform
- Oracle will turn to and invest in the NetBeans community for additional features such as dynamic languages, plug-ins, etc.
- NetBeans.org stays the same – the place for participation, plug-ins, platform, dialog, support, etc.
- No short-term changes planned to NetBeans Partner Programs
- Licensing/support/maintainance: No licenses will change. NB 6.7 and earlier follows Sun support policy. NB 6.8 follows Oracle support policies – better policy with more choices
- New collaboration resource: Oracle Technology Network (OTN), and specifically the Java Technology Center, featuring events, news, blogs, articles, discussions/forums, webcasts, downloads, FAQs, and more
- Events: Oracle OpenWorld/Develop, OTN Developer Days, user group events, and more. See the OTN site.
- JavaOne: Continues as open community event for Java, co-located with Oracle Open World in San Francisco (Sep 19-23, 2010), plus taking JavaOne on the road to Brazil, Russia, India, China
That wraps up Ted’s webcast. Part 3 of the Oracle+Sun: Java News Round-Up follows tomorrow.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644063825.9/warc/CC-MAIN-20150827025423-00017-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 8,297
| 59
|
https://getupcloud.com/signup/
|
code
|
Deploy your application, databases and invite developers to code with you. It’s free .
Scale your application as you grow, automatically. With container your application scales 100x faster than virtual machines.
Package your application and all dependencies and deploy as a container. Get more agility and confidence in your deployments.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893629.85/warc/CC-MAIN-20180124090112-20180124110112-00559.warc.gz
|
CC-MAIN-2018-05
| 339
| 3
|
https://www.pythonstudio.us/language/who-is-this-book-for.html
|
code
|
If you can answer "yes" to all of these:
Do you wish you had the know-how to control your computer and make it do new things?
o>e -that one's a little
Do you want to learn how to program, so you can create the next big thing in software, make a small fortune, and retire to your own private island?
'g Do you prefer actually doing things and applying the stuff you learn over listening to someone in a lecture rattle on for hours on end?
this book is for you.
Who should probably back away from this book?
If you can answer "yes" to any of these:
'I Are you a seasoned programmer? Do you already know how to program?
[g Are you looking for a quick introduction or reference book to Python?
Would you rather have your toenails pulled out by 15 screaming monkeys than learn something new? Do you believe a programming book should cover everything and if it bores the reader to tears in the process then so much the better?
this book is not for you.
[N°te from marketing: this book is for anyone with a credit card... we ll accept a check, too.]
Was this article helpful?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146186.62/warc/CC-MAIN-20200226023658-20200226053658-00350.warc.gz
|
CC-MAIN-2020-10
| 1,069
| 14
|
https://naijaworld.online/p/zcIu6VFNdIdMx8vlnZW6
|
code
|
Please I am facing a dilemma and I need your advise. The issue is that I applied for a particular course, but the jamb combination I used is incorrect. So, I was admitted for the course I applied for, but during physical clearance I was told that my jamb combination is incorrect so, I wouldn't be cleared for that course and I was transferred to another course. Now I am in 200 level and I am planning to transfer back to the course I was initially admitted to. The issue I am facing now is that I don't know if during my final year clearance, my jamb combination would come back to haunt me. PS:The school in question is uniben.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038076454.41/warc/CC-MAIN-20210414004149-20210414034149-00590.warc.gz
|
CC-MAIN-2021-17
| 630
| 1
|
https://www.computing.net/answers/networking/access-point/41030.html
|
code
|
|You have to clear up several things.|
What routers are you using exactly (model number)?
Which of the routers is connected to the Internet?
Which router is placed in your living room?
I guess, you'd like to connect both routers wirelessly, right?
So at the master router, the one, directly connected to the internet, you have to configure either WDS or normal router funktion.
I would suggest to use it as a normal router, if the other router supports repeater mode.
In repeater mode, the router connects just like a computer to the master router but allows you, to connect also wirelessly to the second router.
Also wired connected devices will be forwarded to the master router to access the internet.
The original poster should always write the last response !!!
Let us know, if the problem is solved !!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282631.80/warc/CC-MAIN-20170116095122-00413-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 808
| 11
|
https://www.mustakbil.com/jobs/job/185899
|
code
|
We're running an Online Hiring Event this Saturday to hire C++ Software Engineers ($30k/yr).
Online Hiring Events are live forums designed to enable you to understand the role and requirements through an interactive Q&A session followed by a self-directed testing process. The testing takes between 3-5 hours to complete. It’s worth taking the time to finish all the tests because we evaluate every single complete application to find the top talent.
This event will include all testing required to apply for the role. Upon grading the tests, and if you advance, we will set up an interview with the hiring manager.
As a C++ software engineer, you can expect to be a member of one of our central assembly line teams such as a maintenance or unit test team.
Our maintenance team is responsible for bug fixing across our 100+ product portfolio. The maintenance team has an element of product specialization but they are also process specialists. We want to ensure that our engineers have all the right information and toolsets available to be able to quickly reproduce a client’s environment, reproduce a bug, fix it, test it, document the fix and send for review. We have weekly product release cycles so we want to ensure that bugs get fixed as quickly as possible for our clients and that we are constantly improving the quality of our products.
Our organization is constantly acquiring new companies and their products. As a result, our unit test team is responsible to increase unit test code coverage for all newly acquired products. Engineers within this team are expected to have great experience in writing unit tests and will also have daily and weekly targets to work against. The engineer’s role is to increase the unit test coverage and work according to the team's standards and quality guidelines. We measure the quality of work through our First Time Acceptance rate, meaning that the Product Chief Architects accept the work delivered by the engineers immediately and without having to ask for a rework.
.Database knowledge in technology such as SQL
.SOA, EDA, and Design patterns
.Some experience in Linux, Django, REST, tools for CI/CD, Git, and shell scripting
Visual Studio 2015 for Windows
Join our community of remote professionals!
APPLY HERE: https://csoftwareengineer.eventbrite.com/?aff=GeoJosMustakbil
writing unit tests
SOA, EDA, and Design patterns
Cloud computing architecting
Linux, Django, REST, tools for CI/CD, Git, and shell scripting
MVC, Ruby, PHP
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155817.29/warc/CC-MAIN-20180919024323-20180919044323-00532.warc.gz
|
CC-MAIN-2018-39
| 2,489
| 17
|
https://www.fi.freelancer.com/projects/php-javascript/social-network.481466/
|
code
|
Wanted to make a pretty simple project. This is a social network, a little different from those that exist. What is needed:
A simple social network with the following features:
- online chat
- private messaging
- Bed historiy (here users will tell with whom and when they slept)
- Photo album (gallery) with commenting and stuff
- Video sharing
- Personal info management
- Friends and "friends of friends" management
- Personal wall (like in facebook)
- Groups management
- Points system (users rate other users in particular elements)
- Content Management System
I have attached a document with a little more description about each part of the task. PLEASE READ THE DOCUMENT.
The winner of this project will be provided the following:
- Entity relationship diagram (in UML notation, .vsd file and exported .jpeg)
- A ready database in MySQL
The web-site is to be created in PHP 5 and MySQL >=4.0 (4.0 or higher)
- Knowledge of PHP 5 and professional use of Object Oriented Programming techniques
- MySQL >=4.0 knowledge and knowledge of System Analysis and Requirements gathering techniques
- Professional use templating mechanism
- Highly preferrable to have some completed projects (would like to see the code first)
- Knowledge of Russian is highly preferrable, but NOT required
I am a developer and system analyst myself, so please make sure you CAN do a really professional work. NO "CODE LIKE HELL" WILL BE ACCEPTED. No Joomla, Drupal and stuff like this.
Payment is done through GAF escrow. 50% of the total amount will be paid when the first half of the project is completed. The remaining 50% will be paid upon completion of the project. THE PROJECT SHOULD BE COMPLETED IN 25 days, which is much more than enough.
Thank you for looking and hope you get the project,
31 freelanceria on tarjonnut keskimäärin %project_bid_stats_avg_sub_26% %project_currencyDetails_sign_sub_27% tähän työhön
Hi, We have strong expertise to develop large scale Social Networking websites so we would like to work on this project, please check every portal in PMB for your satisfaction. Regards, Tarun
We look forward to work we are looking for a long term relationship with you. Please establish a private message board for detailed discussions and work samples. Thanks
Dear Sir, We specialize in social networking. Please see our work in PMB and you will know that we can deliver a professional solution. And our work matches with most of your spec. Thanks and regards.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864776.82/warc/CC-MAIN-20180622182027-20180622202027-00437.warc.gz
|
CC-MAIN-2018-26
| 2,467
| 30
|
http://phpdeveloper.org/tag/nusoap
|
code
|
Normal internet applications are great for letting users talk to servers (or other users for that matter), but not so good when one of your scripts wants to ask a remote site for some data. Enter web services - a handy interface to remote data stores that can be queried to narrow down to just what you need. PHP has several ways to go about using (and creating) these, but one of the most popular, moreso for PHP4 users, is NuSOAP. Using it can be a little tricky, though, so thankfully there's tutorials like this on DevBuilder to get you started.
In this article we will first try to define Web Services, their advantages and very basic architecture. Then we will walk through two examples, showing how to create Web Services with the PHP NuSoap toolkit and how to invoke that service, which was developed in Visual Basic 6.0. In the second example we show how to use Web Services with PHP. These examples demonstrate interoperability of Web Services (platform, operating systems and language independent).
They provide a great overview of what web services are/how they're used/benefits before even getting into the technical side of things. From there, it's all examples and screenshots of their example to grab information from a remote service - GeoCash from serviceobjects.net.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00413.warc.gz
|
CC-MAIN-2022-33
| 1,285
| 3
|
https://forums.scifi-meshes.com/discussion/79355/3dwarhammer-valkyrie-short
|
code
|
Welcome to the fancy new Scifi-Meshes.com! You old username and password should work. If not, get in touch with staff either here, on Facebook or on Discord.
For a quick summary on what's new, check out this thread.
You should also check out the Community Guidelines here.
You can check out most recent posts here or by clicking the handy links on the top menu or the sidebar.
You can dismiss this message by clicking the little X in the top right corner.
Hey guys, Name's Dan. I'm new here, really Impressed with what I've seen so far so i thought I'd share what i've got too, since it's in the same vein.
I chose the Valkyrie because It seems to be the most recognisable aircraft from the Warhammer Universe. Honestly, I know very little about WH and i don't claim too, I just take great inspiration from the fantastic designs. Also from one of your members, Binkerman. THIS THREAD in particular.
Right now i wont go into any specifics about what I have In mind, I'd just like to get some thoughts on my modelling/texturing for now.
I should note that the textures on this are about 80% complete, mainly the weapons that aren't done just yet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371576284.74/warc/CC-MAIN-20200405084121-20200405114121-00303.warc.gz
|
CC-MAIN-2020-16
| 1,144
| 9
|