url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
http://stackoverflow.com/questions/13640986/error-this-app-does-not-have-access-to-your-photos
|
code
|
There is nothing in the app what you could do.
The first time you attempt to access the library iOS will ask the user whether the App may access the library/photos or not. In your case the user using the iphone 4 tapped on 'no'.
At the same time an entry is created in the settings/privacy/photos/ with the display name of your app and your small settings icon (if you provided one - otherwise the standard icon will be shrinked automatically)
Go there and switch from off to on.
Do not expect this switch to take effect while the app is running. Along with the address book, not the photographed, I even observe some crashes when this setting is changed while the app is running.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737937342.66/warc/CC-MAIN-20151001221857-00180-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 680
| 5
|
https://dnseppus.meansofproduction.biz/doc/about/
|
code
|
Welcome! This WP multisite fronts my DNS EPP Upgrade Service based on the “AC” software and an EPP Provisioning service (EPPP).
This service provides a C++ middleware solution between Domain Name Registries and Registrars based on the ARI EPP Client Toolkit (AusReg) and my generic framework to use it.
ARI defines a larger context than just the client, within which, under some idealized and partially false assumptions (explained here), a Registrar’s EPP client software can operate in any of these 8 scenarios:
The absence of any thing in the third column for Scenario 1 would seem to create the impression that in the case of the C++ version of the tookit, the most efficient available, with it (the toolkit) alone Registrars need only build and configure for their production operations and that’s false. Manifestly so because, what is provided is a library, not an full program, albeit a large and complete one that does provide support for the enumerated stages of R-R interaction depicted above in a well developed object model, presumably ubiquitously in use or coming into use.
A custom system application is still required to use the library.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00605.warc.gz
|
CC-MAIN-2024-10
| 1,161
| 5
|
http://felixto.deviantart.com/art/Underground-Temple-50977628
|
code
|
wow this is amazing. however, the one MAJOR thing that is ruining it for me is that it's not straight.. It's not skewed enough to look like it's on purpose and i find that the lines aren't parrallel to the frame to be reeeally distracting.
The ripple in the water is what made this picture extra special! Amazing color and shadows. It sure is surreal! One thing though is that it is alittle tilted to the right. Not sure if that's the intention but thought I'd mention it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464809.62/warc/CC-MAIN-20150226074104-00278-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 472
| 2
|
https://soltveit.org/command-line-weather-report-linux-os-x/
|
code
|
Command line weather report in linux and OS X
If you are on a Mac with OS X or using a Linux computer you can request a command line weather report directly from your command line window. You can probably use other operating systems as well. Just as long you have access to the finger command you should be ok with this method. I have only tested it from a OS X and a Linux computer.
The format of the command line weather is:
finger city email@example.com
Lets assume your city is London. To get your command line weather report open up your command line tool, and type this into the command line window:
Here is an example of the ascii weather report from Bryne, a city near me.
As you can see from the left side of the scale, the temperature is in Celsius. And there is no fix for that. In Norway, where this weather service is locates Fahrenheit is not a very popular temperature scale. You can always use google.com to convert from Celsius to Fahrenheit if needed. Or another of the millions converting tools out there.
There is also a shorter command line weather report. Or a very much shorter is probably more correct.
In your command line tool, type this:
The output should be something like this.
london at 01:00: 4 C, 0.5 mps wind from SSE.
Thats how you get a command line weather report from OS X and Linux.
Happy weather reporting!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817442.65/warc/CC-MAIN-20240419172411-20240419202411-00123.warc.gz
|
CC-MAIN-2024-18
| 1,345
| 13
|
https://everything2.com/user/toalight/writeups/mzungu
|
code
|
The noun Mzungu is used in East Africa, particularly in former British colonies like Kenya and Uganda, to describe white persons or more specifically Europeans. Mzungu is Swahili and its plural form is wazungu.
I've gotten two explanations towards the actual meaning of the word. One from Kenya and one from Uganda:
- The people who walk around. Apparently the first Europeans coming to what is now Kenya travelled around in order to "discover" it. These busy persons were nicknamed mzungus.
- Helper. In Uganda the word mzungu means helper and refers to white persons. By saying just mzungu, it is assumed you are talking about white people, but my mzungu means helper as in the original meaning of the word.
StrawberryFrog informs me that Umlungu means 'white' in xhosa.
Joseph from Nairobi and E2's own Gritchka.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00246.warc.gz
|
CC-MAIN-2023-50
| 815
| 6
|
https://cs.uwaterloo.ca/~dstinson/index.html
|
code
|
I am a University Professor in the David R. Cheriton School of Computer Science at the University of Waterloo and a Fellow of the Royal Society of Canada.
I am also the president of the Institute of Combinatorics and its Applications, serving a term from 2016-2019.
Cryptography Theory and Practice, Fourth Edition,
CRC Press named me their October 2018 Mathematician of the Month. Click the link for a Q&A with me.
Here is my Google Scholar page.
I am teaching two sections of CS 341, Algorithms, in the Winter 2019 term.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203947.59/warc/CC-MAIN-20190325112917-20190325134917-00447.warc.gz
|
CC-MAIN-2019-13
| 522
| 6
|
https://jobs.smartrecruiters.com/TRICENTIS/743999742371475-user-support-journey-engineer-m-f-?trid=162ef3c2-cdcc-47a9-8327-c69d95269302
|
code
|
User Support Journey Engineer (m/f)
- Vienna, Austria
Launched in 2007, Tricentis has endeavored to make automation available to everyone and gained recognition worldwide with Tosca, a cutting-edge test automation tool. Making automation easy even for those who have limited to no programming experience. This success lead to the development of a revolutionary qTest tool, with three core principals in mind; Resilience in automation, Simple maintenance and Ease of use.
We’re always looking for employees to help us continue our winning streak. Employees who are talented, dynamic and versatile – it doesn’t matter whether they are entry-level or seasoned pros. Not only do we at Tricentis require a lot from our employees, but we also offer them a lot in return because everything that we at Tricentis have to offer revolves around one objective: promoting your development, individuality, creativity and flexibility.
We are located worldwide, founded in Vienna, Austria and offices in Germany, Switzerland, the UK, the Netherlands, Poland, India, the US, and Australia.
The User Support/Journey Engineer is responsible for taking care of the questions and needs of existing SpecFlow users and community members. These needs will oftentimes appear in the shape of problem tickets and feature requests but should also be anticipated by you, so you can work on providing information or implementing nurturing workflows that will prevent such inquiries because everything is already clear enough for our users. In this role you are crucially vital for our success as happy users means more users and wider adoption of our tools.
You will work as part of the cross-functional SpecFlow (https://specflow.org/) product team. An independently operated and branded unit inside of Tricentis. This leads to high self-responsibility and the opportunity to apply all your expertise on how to keep users happy.
- Become intimately familiar with the use of our software SpecFlow and SpecFlow+
- Manage our User Support Tickets in Zendesk, on GitHub and in our Forum
- Experiment yourself and facilitate with other team members to arrive at the answers
- Update our documentation (ReadTheDocs.com) based on the interactions you have
- Suggest product improvements based on the user feedback you gathered
- Implement other user nurturing techniques to prevent inquiries and better our user’s product experience by providing the right information at the right time of the user life cycle
- Take ownership of the problems of our users as part of a cross-functional product team
- Continuously educate yourself on the latest trends related to your field
- Contribute to team ceremonies, such as stand ups, estimation, and brainstorming sessions
- Continually contribute to and challenge decisions made by the team to ensure the best outcome
- Be comfortable with change: we are building very new products and we are continuously evaluating if we are on track with customers and internal stakeholders. Sometimes we will need to pivot and get back to the drawing board
- High energy and excited to join a small team in startup-mode
- Comfortable and productive in a remote work (home office) setting
- Ability to travel 15% (mostly within Europe)
- 2+ years of experience working for a software company
- BSc, MSc or HTL degree related to software engineering/development
- Object Oriented development skills either Java or C# (or other)
- Tools: Zendesk, Mailchimp, GitHub, Git, Visual Studio, Markdown, ReadTheDocs, Wordpress
- Able to work and communicate exclusively in English
- Experience with handling Customers (in easy and difficult situations)
- Familiar with TDD/ATDD and BDD
- Familiar with Agile methodologies (Scrum and KanBan)
- Experience in test automation (e.g., with Jest, Cypress, Selenium, …)
- Excellent troubleshooting and communication skills
- Track record of working independently with minimal supervision
- Team player with the confidence to take the lead
- Opportunity to work in a company with a real global mindset of more than 50 nationalities
- Collaborative working atmosphere with flat hierarchy
- Career opportunities and a wide range of responsibilities within the core job e.g. through participation in projects or initiatives, moving to another role, department or country
- Numerous programs in place like Give back to communities (paid time off to volunteer for a cause of your heart), Diversity & Inclusion, Global Learning days, …
- We celebrate and socialize as a team and therefore host numerous social events throughout the year globally as well as by engaging as a team in global contests
- Competitive attractive compensation package
- Flexible working time (no core time) and permanent, full-time employment
And many more ...
Go ahead and apply for the #1 company in continuous testing & #1 city with the best quality of living. Following Austrian law we are indicating the minimum salary at EUR 27.846,- gross p.a. for this position according to the IT Collective Agreement. However, our attractive compensation packages follow current market salaries and can therefore be significantly above the indicated minimum salary.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988753.91/warc/CC-MAIN-20210506083716-20210506113716-00480.warc.gz
|
CC-MAIN-2021-21
| 5,164
| 42
|
https://our.umbraco.com/forum/using-umbraco-and-getting-started/106867-custom-indexer-with-external-data-returning-different-results-against-browser-session
|
code
|
Press Ctrl / CMD + C to copy this to your clipboard.
This post will be reported to the moderators as potential spam to be looked at
Umbraco Version: 8.14.2
Env: Azure Web App
Followed recommended settings: https://our.umbraco.com/Documentation/Fundamentals/Setup/server-setup/azure-web-apps#recommended-configuration
Created a custom index as per the doc here https://gist.github.com/hartviglarsen/44743b32d4eea8eda3fb6d49b60dd547 and it's working fine as expected in my local environment, but it's not working as expected in DEV(Azure).
ISSUE: The custom indexer is changing against the browser session & that's weird.
For example: if we login to the Umbraco from a browser with normal mode and indexed successfully and tried to login from another browser or in incognito mode then go to examine settings and we can't see the indexed data, it is changing against the browser session.
Before indexing from the browser (session 1)
Tried indexing from the browser (session 1) and successfully indexed.
And if we try to search from the same browser session(session 1) then the result will show correctly, but if tried to login from another session (incognito mode), then it show's the data is not indexed :(
Please find this video for more info :
Is this a single App Service instance, or multiple load balanced app services?
My guess is you're being sent to different instances and one has it indexed and the other does not.
Thanks @steve for the reply
We are using a Single App Service instance.
And it's not scaled out at all?
If that's the case, then refreshing the non-incognito one still shows it as having docs indexed?
Yes @steve you are right, using scaling for this environment, even if the scaling is enabled, do we need to do some code change or configuration changes?
First off. You should only be using the backoffice in a single instance, we setup 2 app service plans. One for the backoffice and one which scales for the front end site.
The back office one uses the SyncTempEnvDirectoryFactory and the front end one uses TempEnvDirectoryFactory. https://our.umbraco.com/Documentation/Fundamentals/Setup/Server-Setup/Load-Balancing/file-system-replication#mixture-of-standalone--synchronised
I doubt if this will work.
The indexed files will be in the backoffice app service instance, so how can the front end instance access these ?
This is the way load balanced umbraco works.
The front end instances each maintain their own examine indexes as does the backoffice instance. When a page is published a record is written into the DB to instruct all instances to update their cache and indexes with the latest version of that page.
is working on a reply...
Write your reply to:
Image will be uploaded when post is submitted
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363301.3/warc/CC-MAIN-20211206133552-20211206163552-00395.warc.gz
|
CC-MAIN-2021-49
| 2,733
| 28
|
https://github.com/iyulaev/scratcherCalc
|
code
|
Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
Android app that can be used to screen CA lottery scratcher tickets based on expected value, jackpot likelihood, and to screen out tickets with the majority or all of the jackpots claimed
Fetching latest commit…
Cannot retrieve the latest commit at this time.
|Failed to load latest commit information.|
=-=-= SmartScratcher Project Readme =-=-= Contact: Ivan (email@example.com) This is the top-level readme for the SmartScratch project. It will describe the project (very generally) and provide a (possibly inaccurate) code file layout. This was my first Android project - written some time ago. Project Synopsis: Write a simple app that harvests scratcher ticket data from the CA lottery (and other states too!) web site. We can use this data to guess as to the expectation value of the scratchers tickets (of each type) and thereby advise gamblers which tickets they should buy, to maximize their expected returns or to increase the likelihood of willing. Also, we should eliminate tickets where most (or all) of the jackpots have already been claimed. (Partial) Directory Structure: buttscratch: main Android project folder ---\src: source code dir ---\jettiy.smartscratcher: main SmartScratcher Package. ---\SmartScratcher.java: Activity associated with entry point into SmartScratcher program ---\res: resources like layouts ---\drawable*: icons and pictures used throughout the program ---\layout: XML layouts for the various UI elements of this program buttscratchTest: main Android Test project folder dev_docs: developer documentation, not to be released publically media: various non-code media, like icon sources. This isn't used by the project directly, rather, it is typically modified, scaled, and put into buttstratch\res\drawable*\ server: code that will go onto the server for generating the text-based database [ End of File ]
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155924.5/warc/CC-MAIN-20180919043926-20180919063926-00431.warc.gz
|
CC-MAIN-2018-39
| 2,006
| 7
|
http://i-am-glow.com/?p=243
|
code
|
Today we uploaded a few handy changes to the repo. Among these, we’d say these are the most interesting:
- GLOW.Float and GLOW.Int now support arrays as constructor parameter. This is very good to have when you have uniform arrays in your shaders.
- GLOW.Matrix3.extractFromMatrix4() was added so you easily can get the rotation part of the GLOW.Matrix4 into your GLOW.Matrix3.
- The GLOW.Compiler doesn’t call the GLOW.Texture.init() if there’s no texture there to initialize. This allows you to init your shader without a texture set.
- We added GLOW.Geometry.Cylinder so you can create cylinders easily.
- We added interleaved attributes to the cache (I have no idea why we hadn’t this before, but now it’s there :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188553.49/warc/CC-MAIN-20170322212948-00015-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 728
| 6
|
http://c2.com/cgi/wiki?XmlIsTheHtmlOfTheFuture
|
code
|
Everybody wants to use XML. Every vendor wants to have a "native XML support". But everybody keeps reinventing XML so that it suits their very specific business needs. Everybody that tried to put some digital signature on an XML payload ran into problems that even the W3C guys did not manage to fix and decided to go for some "fixed prefix" or "don't use non-ASCII characters" tricks. Some hard-coded their own limited XML parser for CPU-performance reasons. Some mandate the use of UTF-8 encoding, etc…
I was wondering whether, within five years, XML will still exist as a standard, or if everybody will have a custom supported XML-subset or proprietary extensions as it is the case today with CSS and HTML.
Is XML interoperability stillborn?
Q: What does "put[ting] a digital signature on an XML payload" mean?
A: For instance computing a SHA-1 or an HMAC digest. You need to do it on some canonicalized form. Unfortunately, the W3C canonicalized form is not enough for this, as they recognize themselves. As soon as you use namespaces, you're doomed because the prefixes aren't normalized. You therefore must be ready to accept any prefix, validate the signature using that prefix, and when you export it you must use the same prefix again. No issue until you have to export a batch of orders, each using its own prefix. You'll end up declaring the same namespace with different prefixes again and again. It is much easier to say "ok, let's only using that prefix", but it is not XML anymore. Nevertheless, I saw business solutions where the latter approach was used.
Q: I still don't get it. Why the need for a canonicalized form? I sign messages containing all kinds of non-canonical data (like images with different levels of compression or different compression algorithms). The signature indicates that the message is authentic, not that another independently created message is identical. Why do you care about the contents of the payloads you sign?
A: I do because the signature does not apply on the data
, but on some XML fragment itself. If you SHA-1 <Tag> or <Tag >, the results will be different, but neither your DOM nor your SAX parser will let you know that there is a space just there! How are you going to validate the signature? Same question with <Abc:Tag> and <Xyz:Tag>. Abc and Xyz are supposed to be interchangeable as long they point to the same uri, but once again the SHA-1 will give you different results.
"Interchangable" doesn't mean diddly to digital signing. They have to be identical. I still don't understand how you think XML is to blame for any of that.
I don't blame XML, I blame (mis)uses of XML. HTML is not to blame on its own...
Q: Where are these custom XML-subsets and proprietary extensions? All the XML I've seen has been handled by Xerces or MSXML, and it all seemed perfectly interoperable.
A: Using Xerces or MSXML is not at all a guarantee of interoperability. This is what I see in my day-to-day business, but I'm not allowed to go further about it. Of course, there isn't much publicity about it, and I was wondering if anybody else had the same experience.
Q: You can't give a single example?
A: I'm not allowed to give you named examples that I know of. But creating a non XML-compliant application is so easy! Any non-trivial business application (I mean really non-trivial, forget about RSS or SOAP, I mean TRUE business logic) will run into problems. An application is not compliant if:
- it assumes anything about the attribute ordering
- it assumes anything about the prefix that is used
- it mandates a specific encoding
- it mandates the use of CDATA sections
- it forbids you to use the full range of allowed characters for tag names
- it forbids you to declare the same namespace through 150 prefixes and use them randomly
- it forbids you to interpret escape sequences
- etc... put your favorite here.
I saw them all... Is this really a taboo in the XML community or am I the only one that ever ran into those kinds of situations?
Several of those are explicitly forbidden by the XML spec (assuming attribute order, for example). I've written many non-trivial business apps that use XML and never had any of the problems you can't name. I think. -- EricHodges
Of course they are forbidden. I'm talking about non XML compliant applications. You never had the case? I did.
No, like I said above, all of the XML I've worked with has been handled by Xerces or MSXML (well, plus a bit of JDOM here and there). XML interoperability seems as alive as it ever did (in other words, mostly a dream based on faulty understanding of "meaning" in data.)
The question remains: am I alone?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661768.23/warc/CC-MAIN-20160924173741-00025-ip-10-143-35-109.ec2.internal.warc.gz
|
CC-MAIN-2016-40
| 4,641
| 27
|
https://lingohelp.me/preposition-after-adjective/unconvinced-by-or-unconvinced-of/
|
code
|
I am unconvinced by unnamed sources.
I'd unconvinced by the pre-publication praise.
Doshi said he was unconvinced by these claims.
The modern reader, perhaps unconvinced by Chris Fogle's idolatrous embrace of the I.
Posted by: Q 2009-09-10 2:57:36 PM I read your link, Bret; I'd simply unconvinced by it.
I am not disputing your claims, just saying that by your own wording, you appear unconvinced by your own claims.
I am unconvinced of the value of these.
Romney looked unconvinced of his new avatar.
Nambu looks askance at Joe, unconvinced of the answer.
Maybe you're a seasoned developer, unconvinced of the value of going to a conference.
But I'd altogether unconvinced of the validity of any of the inputs I've read about thus far.
Many parents felt there was insufficient evidence of their effect and were unconvinced of the programs ' successes.
I'd still unconvinced about WAR.
Comments I remain unconvinced about Neymar.
Many Scots are unconvinced about independence.
That may give you a clue why more and more people are unconvinced about the CO2 model).
I'd anti carbon tax and unconvinced about the effects of climate change, manmade or otherwise.
But under the sway of bacteriology, the scientific community remained unconvinced about Laveran's discovery.
But his doctor, Siyabulela Bungana, remains unconvinced about Stilnox's ability to rouse patients out of a coma.
Nevertheless, there are reports that some individuals continue to be unconvinced with its effectiveness.
However, we remain unconvinced as to the acceptability of the proposal.
Did anyone remain unconvinced on Sunday night? Spain were not just better; they were brilliant.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710733.87/warc/CC-MAIN-20221130060525-20221130090525-00863.warc.gz
|
CC-MAIN-2022-49
| 1,655
| 22
|
https://www.pcworld.com/article/529036/spacesniffer-2.html
|
code
|
“Where did all my space go?” This question has been asked by every computer user since the days of the 5.25″ floppy (probably since the days of the ENIAC), and SpaceSniffer is a fast, free, easy, way to answer it. While SpaceSniffer in itself does nothing to reclaim space, it does provide you with a very good overview of what’s occupying the nether reaches of your hard disk.
SpaceSniffer performs a quick scan of files and shows you your data in a series of nested boxes, each box being a folder or file. The size relationship is displayed graphically, so it’s easy to see that your “Games” folder looms over your “Work” folder like Godzilla looms over Tokyo. You can zoom in on any folder to see its deeper composition. I found this an excellent tool to quickly find large chunks of data I didn’t need, often in folders buried deeply enough that I do not stumble upon them casually. For example, I was in an alpha test for an MMORPG, now defunct, which took up some 4 gig of space I had completely forgotten about.
SpaceSniffer is a good, free, disk usage visualization tool. It can be very helpful for system administrators to get a quick overview of the contents of network drives and pinpoint unusual file or space allocations. Displaying data visually is more intuitive than simply looking at long lists of numbers–especially when simply seeing that a folder occupies five gigabytes does not inform you that, for example, four of those gigabytes are dedicated to a cancelled project. Given the non-existent cost (donations are requested) and the ease of use, I recommend this download.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646257.46/warc/CC-MAIN-20230531022541-20230531052541-00484.warc.gz
|
CC-MAIN-2023-23
| 1,615
| 3
|
https://www.ifixit.com/Answers/View/279059/Black+Spots+on+screen+with+colored+lines
|
code
|
Black Spots on screen with colored lines
I have been using my Macbook Pro for about 2 years now, and I have maintained quite good care of it. Accidentally, I shut my computer lid on a pair of earphones.
When I opened it back again, I found out that there were two black spots where the earphones were and colored lines. To test this out, I rapidly changed the screen. The lines that were working changed colors appropriately but it's not working.
What I have tried is:
- Applying pressure on it with a piece of cloth
- Using software that has rapidly color-changing pixels.
The next morning, I found out that the lines have spread, and now my entire computer screen had either colored lines or black rectangles and spots.
Can anyone help me with this, or do I have to replace my computer screen?
Everything else works fine, but just this.
My OS X is El Capitan.
Is this a good question?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745522.86/warc/CC-MAIN-20181119084944-20181119110944-00487.warc.gz
|
CC-MAIN-2018-47
| 886
| 11
|
https://nodatanobusiness.com/resources/what-is-importfromweb/
|
code
|
ImportFromWeb is an add-on for Google Sheets that extends the list of functions provided by the platform.
It adds a new function IMPORTFROMWEB() to your toolbox, which is a powerful, yet easy-to-use, Web Scraper
It is the process of collecting structured Web data in an automated fashion in order to manipulate it and bring out new knowledge.
The reasons to use Web scraping are numerous: Prices comparison, Stock Market monitoring, Social Media tracking, …
Extracting data is one thing, but crossing data sources, filtering, sorting tables, building charts and pivot tables is likely what you need to squeeze all the value that data can offer.
This is why we created an original tool that works natively with Google Sheets.
We believe spreadsheets are the best instruments to sort, filter, crunch, cross data in an easy way, without requiring technical skills
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300244.42/warc/CC-MAIN-20220116210734-20220117000734-00174.warc.gz
|
CC-MAIN-2022-05
| 862
| 7
|
https://www.infoq.com/articles/book-review-system-network-administration
|
code
|
Q&A on the Practice of System and Network Administration (3rd Edition)
The book The Practice of System and Network Administration takes a holistic view on system administration: It provides a framework and strategies for solving problems regardless of the operating system, brand of computer, or type of environment. The aim of this book is to help people to become a professional system administrator. The third edition incorporates new developments like DevOps, infrastructure as code, continuous integration (CI), operational excellence and assessments.
InfoQ readers can download a book extract with a discount code.
InfoQ interviewed Thomas A. Limoncelli, Christina J. Hogan, and Strata R. Chalup about game changing strategies for system administration, benefits from using an architecture that uses open standards and open protocols, what can go wrong when a new service is launched, and how to prepare for possible problems, state of the art practices for monitoring systems, things that DevOps has brought to System Administration, improving communication and collaboration between systems administration and the users of systems, how to assess the services provided by system administration, and which development they expect to happen in system administration in the future.
InfoQ:For whom is this book intended?
Limoncelli: This book is for system administrators that work in small and large enterprises and educational institutions. It is useful whether you work at a helpdesk, desktop support and delivery organization, or back-end services.
Chalup: We wrote this book for system administrators and those performing systems work (who may not be career system administrators) who want to “level up” by learning “the why” of best practices as well as “the how”. We describe design and process patterns and explain them, rather than focusing on a specific platform or program. That way the reader can apply the pattern to any current technology.
Hogan: The book is also intended for managers who have system administrators in their organizations. In particular, the last two chapters in the book focus on how to constructively assess the system administrators organization, and how to drive and prioritize improvements.
InfoQ: What's new in the third edition?
Hogan: The third edition is a huge update. The field of system administration has seen some significant advances in the past ten years. This edition captures those advances, and demonstrates how best practices have changed. We look at how DevOps methods can be applied in environments that run commercial software. We also focus a lot on automation, and how integration with other systems such as the HR database and the inventory database enable you to build top notch services.
Limoncelli: A whole lot! 28 of the 56 chapters are new. In the previous edition we had one chapter on desktop services, there are now 8 chapters covering everything from architecture, to desktop lifecycle, to managing new employee onboarding. The chapter on servers was replaced by a 3-chapter sequence. The chapter on running services is now a 7-chapter sequence that covers planning, different deployment approaches, and service conversions. The book is 50% longer than the first edition, and 20% longer than the second edition.
InfoQ: The book starts with some game changing strategies. Which are they, and why do they matter?
Limoncelli: We start with a chapter about what to do if your organization is a hot mess. Feedback we received about previous editions was that it is difficult to do the right thing when you feel like your entire network is on fire. Therefore the first chapter is about putting out enough fires so that you can use the advice in the rest of the book.
Chapters 1-4 are about strategies for organizing your work. For example, system administrators sometimes launch a new service and their customers hate it. Oops! Now you feel like you wasted a year of work. We explain how to launch a new service as a series of mini-launches, perhaps once a week. The first launch might have fewer feature and only be visible to a small group of users. The feedback you get is invaluable and informs the next mini-launch. Over time each mini-launch adds features and supports more users. The project might still take a year, but when it is done you’ve built a better system that more closely matches what users want. This works if you are rolling out a new printer in an office environment or a million dollar web site.
Starting the book this way may surprise someone that expects a system administration book to be about what commands to type and buttons to click. However if you talk with any senior system administrator, they’ll tell you that these are the real secrets of top system administrators. This is the kind of advice you won’t find in the manual.
Hogan: Chapters 1 to 4 describe the changes in mindset and approach that are the basis for how system administration has evolved over the last ten years. The approaches described in those chapters constitute the mindset that all system administrators should bring to the job, and these approaches should inform system administrators’ decisions on how to tackle every challenge.
InfoQ: Which are the benefits from using an architecture that uses open standards and open protocols?
Limoncelli: You get competition that leads to better projects and lower prices. It was radical to say this in our earlier editions but now this kind of thing is conventional wisdom. We’re proud to have been on the leading edge with that one. However we’re also appalled at the continued attempts by vendors to find new and creative ways to lock in customers. This edition tries to educate people so they can watch for the new, more subtle, attempts by vendors to do this.
InfoQ: What can go wrong when a new service is launched?
Limoncelli: Everything! It isn’t fast enough, it doesn’t have the features customers wanted, it disrupts unrelated systems in the datacenter, it doesn’t work with all the browsers you’d expect, users connecting via VPN can’t use it… just about anything. A few years ago Apple had a website outage during one of their famous keynote presentations because a new “real time news feed” feature didn’t scale to millions of simultaneous users. Who could have expected that? Well, we would have! Something so critical should not have been exposed to millions of users without capacity testing first. However where could Apple have found millions of users to test that bit of code ahead of time? Well, they could have put it on their homepage as an invisible element. That would have tested its ability to scale with enough lead time to fix any problems. This isn’t arm-chair quarterbacking. Other companies do that kind of testing all the time. Facebook Messenger was running in people’s browsers as an invisible service sending fake messages for 6 months until the scaling issues had been worked out.
InfoQ: How can system administrators prepare themselves to deal with problems during launch?
Chalup: The key is to get information as early as possible. Discovering a problem on launch day is the worst. A simple technique is have a beta launch to find problems early. Everyone knows that, but people don’t think to do it for internal systems or system administration tools. We take this even further. Can you launch a single feature to validate assumptions months ahead of the real launch? I like to launch a service with no features, just the welcome-page, months ahead of the actual system launch. This gives us time to practice software upgrades, develop the backup procedures, document and test our runbook, and so on. Meanwhile the developers flesh out the system by adding features. When the system is ready for real users, there are very few surprises because the system has been running for months. Best of all, users get access to new features faster.
InfoQ: Which are the state of the art practices for monitoring systems?
Hogan: The industry is making a big shift right now from up/down monitoring to time series-based monitoring. The old way is to monitor if something is up or down and alert if, for example, it has been unreachable for a certain amount of time. The new way is to collect telemetry about many aspects of the system and do data-mining on the history of the data to notice when the system is sick. Now we can cure the underlying causes and prevent the outage. As a result, it is less common to be woken up at 4 AM because the system is down, and more likely that during the day you fix a small problem before it results in an outage. The old way is like trying to help someone having a heart attack, the new way is like treating high blood pressure. Some systems that use this newer methodology include Bosun, Prometheus, and Circonus.
InfoQ: Can you explain the “fix it once” mantra?
Hogan: When something breaks, it is tempting to just fix it quickly (for example by rebooting the server) and then move on. This can be driven by the fact that it is user-impacting, and you need to get people back up and running as fast as possible, or it could simply be because you are super-busy. However, if you don’t understand why it broke, and fix the underlying reasons, then it will break again, and you will need to fix it again. It is better to fix the underlying problem once, rather than rebooting the server every time it breaks.
For example, if you have a service, and every so often the machines that it is running on experience high CPU, memory and swap usage, you can have your monitoring detect that condition, generate an alert and have someone reboot the system. You could even get clever and have some automation reboot it for you. Or you could do some investigation into which process is chewing up CPU and memory, check for known bugs and, if necessary, raise a support case with the vendor to get the bug fixed. Then you upgrade to the fixed version when it is available. The latter approach is what we mean by fixing things once. You fix the problem permanently, rather than continually repeating the workaround. It’s not that you leave the machine broken until you have the permanent fix, but that you investigate the issue thoroughly, and fix it permanently as soon as possible.
Chalup: It's much better to drain the swamp than to fight the individual alligators!
InfoQ: What are the main things that DevOps has brought to System Administration?
Chalup: DevOps has brought a level of collaborative accountability to the profession. It's explicitly part of a programmer’s responsibility to create maintainable systems with functional APIs and a system administrator’s responsibility to create a managed and monitored landscape in which those systems can operate. Neither side gets to throw things over the wall and then point fingers when something goes wrong. The focus on a complete life cycle for a system, from design to development to release to maintenance, shifts both groups’ thinking into a more holistic mode.
Limoncelli: DevOps techniques lead to an environment that is less stressful and more productive. Imagine if job advertisements were completely honest. Most companies advertising for IT workers would state that the job is mostly great except for twice a year when ``Hell Month'' arrives and everyone scrambles to deploy the new release of some major software system. This month is so full of stress, fear, and blame that it makes you hate your employer, your job, and your life. Sadly, at many companies Hell Month is every month. A company that adopts the DevOps principles is different. A rapid release environment automatically deploys upgrades to production weekly, daily, or more often. Little or no human involvement is required. It is not a stressful event---it is just another day. There is no fear of an upcoming Hell Month.
Companies that use these techniques are rare now but are growing in number. When they are the majority, companies that have not eliminated Hell Month will find it difficult to hire employees. This doesn’t just include IT workers. Given the choice between working at two companies that are otherwise equal, wouldn’t you pick the one known for providing its employees with seamless technology and support?
InfoQ: Which suggestions do you have for improving communication and collaboration between systems administration and the users of systems?
Chalup: It's really important that customer communication includes an immediate attempt to find out the goal and urgency of the customer’s request.
I once heard a customer asking a colleague for a piece of network hardware. The colleague told the customer to await a desk visit in about 15 minutes for assistance. The customer left, and within 10 minutes the network went down. The problem was eventually traced to a piece of transmission equipment that the customer had appropriated from the network “because I needed one and it didn't look like anyone was using it.”
System administrators need to go beyond the symptoms of a problem and discover what the customers are actually trying to accomplish as the end goal. It's important to cultivate a mindset of being a customer enabler, rather than a systems maintainer. Customer requests shouldn't be thought of as annoying interruptions to be gotten rid of as quickly as possible, but as real world use cases that help us better understand how to provide effective services.
Limoncelli: Good communication with users is not enough. We must develop bi-directional empathy and collaborate to create IT systems that are useful and sustainable. We must understand our users to the point that we develop empathy. This can be done by shadowing a user for a week to better understand their process and discover the annoyances and pitfalls of the systems we built. This can be done on the team level too. Once I worked with two teams that depended on each other but rarely talked to each other. I coordinated an effort where both teams sat down and walked through a major processes, listing the steps and pointing out the rough edges, the unreliable parts, and the burdensome manual steps. This new understanding lead each team to make changes to improve the process. Some things were small, like displaying data sorted by date instead of last name. Other things were big, like providing an API so that the other team could get what they needed without opening a service request. This spawned many projects that made life better for members of both teams. I remember at one point someone at the meeting saying, “No need to file a bug for that one… I just fixed the code. It will be in production tonight!”
Empathy is a two-way street. Developers often don’t appreciate how difficult operations is, and refuse to add features that would reduce a lot of operational strife. Why should they? Their performance reviews are based on whether or not new features get written. However if all developers have shared responsibility for uptime, and have to take a turn being oncall, you’d be amazed at how fast those operational pain-points get fixed.
Hogan: The most important part of communicating with the end-users is listening, and making sure that people know that they are being heard. Provide a forum where people can make suggestions, perhaps vote on the next big project, or the small improvements that would eliminate large time sinks. Once you find a way for people to provide their feedback, you need to dedicate some resources to delivering on those top requests, updating the forum with which requests are completed, in progress and under consideration. That way people can see the value in participating, and know that they are being heard.
InfoQ: How can you assess the services provided by system administration?
Chalup: Any assessment tool has a set of expectations or metrics to which the assessment is tailored. The two main assessment systems, which are somewhat orthogonal, are customer satisfaction and organizational maturity.
A customer satisfaction matrix will be about responsiveness, end to end solution completeness, ticket resolution time, and similar. It's an important tool to assess how well you are serving customers, since much of the work system administrators do is preventive in nature and subject to being overlooked. A variant of this survey might be to assess satisfaction with the services themselves, e.g., application suitability and responsiveness.
With regard to the overall service provided to the organization, a capability maturity model is the standard way to measure the overall maturity of the operational practices of the IT team. We discuss applying a CMM in this book, and how the various levels of process, repeatability, and documentation create a more functional systems group. We include a 40-page guide for organizations interested in taking this approach. This includes a complete assessment system you can adapt to your own team plus instructions on how to use it.
InfoQ: Which development do you expect will happen in system administration in the future?
Chalup: I hope we will see the development of technologically aware workplace personal assistants, more like a system administration Siri than our old love-to-hate friend Clippy. These automated expert systems would create a virtual help desk that would be always available and able to escalate to live staff, after asking some useful background information.
Limoncelli: Everything is becoming more programmable. This doesn’t just permit IT to automate their work, but enables self-service portals that let non-IT workers productive without waiting for IT. People often think of this as something only “cloud companies” do. However it is happening at all levels. At one company anyone that requested remote access to the network (VPN access) had to make the request, the IT department had to get their manager to approve it, install software on their laptop, and configure it. As they improved the programmability of their systems, they eventually ended up with a system where a user would request VPN access from a self-service portal. Their manager would receive email with an “approve” link to click on. Within minutes the laptop’s software update system (Puppet) would install the VPN client software and securely configure it. This eliminated wait time, typos, and security problems that come from misconfiguration. This required 5 subsystems to be programmable via APIs. 10 years ago that would have been impossible.
Hogan: The Internet of Things revolution is going to provide some new challenges in the coming years. Our networks will be dominated by a lot of “smart” devices, that are a lot less smart than those we are accustomed to dealing with. These devices are being made by companies that traditionally did not make networked devices, and the concept of their device being hacked and becoming part of a botnet is alien to them, but something that they need to come to terms with and address. In the meantime, it will fall to the system administrators to figure out how to protect their enterprise networks, and the rest of the world, from the company’s smart lightbulbs, blinds, AV systems, fridges and toilets!
IoT will also mean that system administrator teams will need to reach out to their facilities teams to make sure that they are involved in the product evaluation and selection process. Emerging standards should make these devices easier to manage, but only if the manufacturers are compliant. It’s a new field that is rapidly changing. Make sure you keep abreast of developments so that all these new types of network devices can be managed as easily and seamlessly as possible, or you will find yourself fighting endless IoT fires.
About the Book Authors
Thomas A. Limoncelli is an internationally recognized author, speaker, and system administrator with 20+ years of experience at companies like Google, Bell Labs and StackOverflow.com. He manages the SRE team at StackOverflow.com.
Christina J. Hogan has 20+ years experience in system administration and network engineering, from Silicon Valley, to Italy, and Switzerland. She has a Masters in CS, a PhD in Aeronautical Engineering and has been part of a Formula 1 racing team.
Strata R. Chalup has 25+ years experience in Silicon Valley focusing on IT strategy, best-practices, and scalable infrastructures at firms including Apple, Sun, Cisco, McAfee, and Palm.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119642.3/warc/CC-MAIN-20170423031159-00502-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 20,461
| 52
|
https://m.metrolagu123.wepqu.com/mp3/bleach-amv-hyakki-yakou-ksuke-remix-LS1IeDY0TjJHTmY0TQ
|
code
|
Original AMV by LucioleAMV. Simple music edit done by me. I DO NOT OWN THIS AMV, please support LucioleAMV & Subscribe to his channel for more AMV's. I DO NOT OWN THIS MUSIC, please support the official release.
Subscribe to LucioleAMV Here! -https://www.youtube.com/user/LucioleAMV
Music used: Hello Sleepwalkers Hyakki Yakou Ksuke Remix - https://open.spotify.com/track/4M0ZmFFv2BqqqfDSPUaUP8?si=zcdHyCDbToaZB8mRnDHzKQ
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487610841.7/warc/CC-MAIN-20210613192529-20210613222529-00015.warc.gz
|
CC-MAIN-2021-25
| 777
| 4
|
https://msgroups.net/vc.mfc/treeview-item-s-icon-changed-to-dark-when-it-was-cutte/574014
|
code
|
Easily change smtp servers for all email-accounts
I got my laptop with me basically everywhere I go, but I find it totally
annoying that I have to change the smtp-server settings for each and every
account when wanting to send mail from a different location than the time
before. I have about 15 accounts that I regularly recieve email to and ehwn
I reply to these I always have to change the smtp-server.
Is there a way to fix this easily for all accounts?
I should probably mention that I run MS Office 2002 SP3
...Changed email address'
I recently "synced" a Blackberry with my MS Outlook and several of my email
address' moved contacts. ie Contact A now has Contact B's email address and
Contact H has Contact G's email address. Any clue how to fix this one.
...CRM4 Rollup 2 lookup icons are gone
We have just upgraded our CRM3 to 4 and applied Rollup 1 and Rollup 2
immediately after the upgrade. Now it seems to have a few funny things
1) in a lookupfield, type one letter and press tab. If there is more than
one hit the letter became red, and you can click on it to get a list of
matches. Before each match there should be an icon. It seems that the icons
cant be displayed now. It's only showing a little icon with a red cross.
Normally it shows relevant entity icon. What kind of lookup field is it? Is
this a problem across all the lookup fields?
&q...Recovering deleted items
Hi, My V.P. is getting an error ( "outlook has generated
an error and the application will close") when he is
trying to recover a deleted item. Then Outlook shuts down.
The deleted items window does come up but when you click
on an item to recover,this error comes up.We are using
Outlook 2000. I have been unable to find anything
referencing this issue and was wondering if anybody could
assist me with this....Thanks
What is logged to the Event Viewer regarding this? Does it work when you
start Outlook with the /safe switch?
Robert Sparnaaij [MVP-Outlook]
www.howto-outlo...Change Live account associated with Outlook calendar published onl
I needed to publish a co-worker's calendar online so an external vendor could
view it (we're using Outlook 2007). She wasn't around, so I just used my Live
account when prompted (stupid, I know). Now she gets prompted several times a
day to log in to my Live account.
I unpublished the calendar and re-published, but it doesn't prompt for a
Live account again; does anyone know how I can change the Live account
associated with this published calendar?
Delete it from Tools, Accounts, published calendars.
Diane Poremsky [MVP - Outlook]
Outlo...Item / ItemDynamic Help
We are running HQ and SO 1.3r. We have an "outside" application that has
loaded some items into the HQ database. However, the programmer failed to
load the corresponding ItemDynamic entries. Can someone provide me with a SQL
program that will search through the ITEM table and add the appropriate
ITEMDYNAMIC entries for each of our stores? So, far - no inventory has been
received for these items but they soon will be and then this problem will
only be compounded. Your SQL expert assistance is requested.
Thank you ... in advance.
This is a multi-part message in MIME format.
-...multiple outbox items
HELP!!! my (digital camera pictures are attached) to
outgoing mail, but- the mail is being sent over 9
times!!!! how can I set my outlook so it only sends ONE
time to each individual??????
...deleted items #5
I need help with the Deleted Items folder and Exchange 2003 server.
When a user deletes an email, calendar, whatever it goes to the deleted
items - how long will it stay there? I want the deleted items to
automatically delete after 7 days for EVERYONE. The exchange retention (I
think) seems to apply to the messages once they are actually purged from the
We have a mixture of Outlook XP, 2002, and 2003 - can anyone point me in the
right direction? I am assuming I may need to do some group policy to get
this changed. If the setting is actually in Exchange 2003 please l...This item's make/buy type has not been selected...
hello - we are setting up inventory and PO and when testing our setups, after
we enter an item on the PO we get this error. It will not let us use the
item until you go to the item engineering screen. We do not have
manufacturing registered. Any help is appreciated.
...Inbox missing items in cached mode
I have a Exchange 2000 server running on a Win2k server box. Some Outlook
2003 clients (not all) can't run cached mode because their latest Inbox items
don't appear. If I uncheck cached mode, all the Inbox items appear. Makes
no sense to me.
I couldn't find anything in the kb. Does anyone have any suggestions?
On Thu, 15 Sep 2005 17:02:05 -0700, "Bruce"
>I have a Exchange 2000 server running on a Win2k server box. Some Outlook
>2003 clients (not all) can't run ...change a null value to zero
when my query runs I end up with fields that have a null value (they are
blank). my function will not work because it needs a zero quantity to add it
to another feild. Is there some sort of expression that can change that for
In a query, for a "field",
will convert a Null in [YourFieldName] to 0
Microsoft Office/Access MVP
"tommyguitfiddle" <email@example.com> wrote in
> when my query runs I end up with ...Server Wide
Does anyone know of a command to run that will restore deleted items out of the dumpster into the users Deleted Items folder?
Thanks in advance!
Exmerge - choose dumpster in the options and uncheck messages and folders.
Hope that helps,
This posting is provided "AS IS" with no warranties, and confers no rights.
Please do not send email to this address, post a reply to this newsgroup.
Use of included script samples are subject to the terms specified at
"VMC" <firstname.lastname@example.org> wrote i...Effect for changing Exchange 2000 mixed-mode to native mode
We have Exchange 2000, no Exchange 5.5 at all. Our Exchange 2000 is
currently in mixed-mode.
We'd like to ask whether we will have any effect if switching the Exchange
2000 to native mode?
All our public folders are hidden from Exchange Address Book. When we switch
to Exchange 2000 native mode,
will there be anything change to our Public Folder to be appearing in
Exchange address book or not?
On Mon, 19 Mar 2007 16:20:50 -0700, "J.H" <email@example.com> wrote:
>We have Exchange 2000, no Exchange 5.5 at all. Our Exchang...How to reduce size of deleted items.dbx?
I have emptied my deleted items folder several times over the last week, but
the size of "deleted items.dbx" remains at 75,000+kb. My server type is
pop3 (so I don't have to use Windows Live.) How can I reduce the size of
this dbx file?
Compact the folder.
To reply directly replace 'nospam' with 'schmetterling'
"Laurel" <FakeMail@Hotmail.com> wrote in message
>I have emptied my deleted items folder several times over the last week,
>but the size of "deleted ...How can i change information on each post card
"laurza" <firstname.lastname@example.org> wrote in message
Usually by typing.
But then you have not mastered typing yet or you could have given just a
small amount more information about the program you are using and the
Wot's Your Real Problem?
...Changing Yes/no box to combo box
I have a table that contains a field that is the data type Yes/no. Instead
of having the traditional checkbox I am opting for the combo box. I have
changed the display control to Combo box however when i go to add this to my
form it does not have a drop down with yes or no....I know there is something
little i must be missing. Another question is if i change it to this type of
design is my code still going to be if me.xxx = True Then.....or will it
change to if me.xxx = -1 Then? Thanks for your help as all my database just
utilize the checkbox yes/no feature and not the combo box fe...Money 2002 Changing Investment to Savings account
Is there any way to do this? Am I missing the obvious?
...how to change numbers into words,
In excel how to change numberical data into english words, many times
currency figures are required to be stated into english words as well so what
is the formula for this problem, for example for US$ 5400 : $ Five thousand
four hundred is the conversion into words.
(remove nothere from the email address if mailing direct)
"Mukesh Dhoot" <Mukesh Dhoot @discussions.microsoft.com> wrote in message
> In excel how to change numberical data into e...Change of bacground color in a Static Control
I wrote a dialog based application that changed the
background color of a static control in the OnCtlColor ()
function. It worked in widows 98. Now that I upgrade my
system to Windows XP, the background color of this static
control disapeared. I can not understand why. Can someone
answer that ?
Thank you in advance.
>I wrote a dialog based application that changed the
>background color of a static control in the OnCtlColor ()
>function. It worked in widows 98. Now that I upgrade my
>system to Windows XP, the background color ...Changed Data array #4
Scottmk's Profile: http://www.excelforum.com/member.php?action=getinfo&userid=170
View this thread: http://www.excelforum.com/showthread.php?threadid=27290
...Track Changes -- Moving automatically from one change to the next
Is there a way to move automatically from one change to the next when
accepting tracked changes? It seems that now one has to click the right arrow
each time, then click "accept change" each time.
In Word 2000, the program automatically moved on to the next change.
What you describe is the default in Word2007. It was most annoying to
converting Word2003 users who liked to be sure that exactly the right
change had been made! (No extra spaces or punctuation, no
So, which version are you using?
On May 19, 8:47=A0pm, Janetmow <Janet...@discussions.mi...Changing a bar chart
In a standard bar chart, with say 5 yrs of data, I wish to make the 2006 bar
a stacked bar with the lower part the ytd and the upper part of the bar the
estimated year end. Pls help.
\\ ~ ~ //
( @ @ )
You could enter the data in two rows, then create a stacked column chart
from all the data. For example:
2002 2003 2004 2005 2006
YTD 50 55 60 65 30
Charles Woll wrote:
> In a standard bar chart, with say 5 yrs of data, ...Change SMTP server through command line in Outlook
Is there any way to change the Outlook SMTP server information through
I have a laptop that I'm using at home and at work. At home I'm using a
SMTP server that doesn't require authentication but at work I'm using
another SMTP server that do require authentication.
All help is appreciated highly!
...Excel Changes last-Modified Date
Is there a way to stop Excel from changing the last-modified date of
every file that is opened (even when no changes are made and save is
never pressed)? This is really screwing us up in the office because we
are looking through a ton of old files for one that was last-modified on
a certain date. When we open a suspect file it CHANGES THE DATE!!!! Make
It is only temporary, if you don't save it it reverst back when you close
(remove nothere from the email address if mailing direct)
"Jerry Baker" <email@example.com> w...How do I change the default pen (inking) color from red to blue?
I grade students papers on a tablet laptop, my university prefers we NOT use
red, which requires an extra step:
Current work flow, I open a word paper and click [Start Inking] but I have
an additional step to go into the pen tools and change it from red to blue.
MY QUESTION: Do you know a way that I can change the inking default color?
If Word software developers are reading... P L E A S E make it a right click
option to set a different default Inking color, would be a time saver for me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780054023.35/warc/CC-MAIN-20210917024943-20210917054943-00136.warc.gz
|
CC-MAIN-2021-39
| 11,669
| 193
|
https://hurmanblirrikdkugd.firebaseapp.com/25281/14221.html
|
code
|
K3 Nordic AB är specialister inom programvarulicensavtal, molntjänster, supportavtal och rådgivning inom it.
This learning program differs from what many other organisations are offering. According to a Tech Crunch article, what JetBrains offers is unique in that it uses its own educational Integrated Development Environments (IDE). 2021-03-08 You played this game when the Internet cut off, didn’t you? It is time to remember the good old days JetBrains Academy or Jetty does a very good job in addressing these issues I face and tops it up with a personal bias I have to learn something. Instead of video based tutorials, it has tons of learning material in a textual form. :D.
- Karlstad, värmlands län
- Amf 16 sailboat
- Indiska sundsvall birsta öppettider
- Restaurang cg
- Socialdemokratiet eu
JetBrains Academy and You might have used System.exit(0) to quit the application which is the culprit of the problem. Instead, use return to quit the application. 14 Oct 2019 This year JetBrains, the creator of award-winning coding tools such as IntelliJ IDEA, ReSharper, and Kotlin, introduced JetBrains Academy, 15 сен 2020 Это JetBrains Academy. Думаю, многие слышали об этой компании, кто интересуется сферой разработки ПО. JetBrains — международная jetbrains academy review A code review tool automates the process of code review so 4k Learners JetBrains Academy is an educational platform for future JetBrains (ранее — IntelliJ) — международная компания, которая разрабатывает инструменты для разработки на языках Java, Kotlin, C#, F#, C++, Ruby, JetBrains Academy is an online platform to learn programming, including such programming languages as Python 26 Nov 2019 This year JetBrains, the creator of award-winning coding tools such as IntelliJ IDEA, ReSharper, and Kotlin, introduced JetBrains Academy, 24 июн 2020 JetBrains Academy — это самостоятельный продукт со своей Сейчас для изучения Java и Python в JetBrains Academy можно Python) * IntelliJ IDEA Edu (A Professional Tool To Learn and Teach Programming) * JetBrains Academy (Learn to Program by Creating Working Applications).
User has been actively learning for 15 days and: Completed. 84 topics. 4 projects. Solved. 319 problems. 1 problem of the day. Posted. 0 comments. 0 usefull
.com/druides-dans-les-donjons-et-les-dragons-jeu-de-r-le-old-school 2021-03-26 http://666866pp.com/pycharm-2016-1-aide-google-app-moteur-jetbrains gradlew clean idea. Jag öppnade detta projekt i IntelliJ Community.
Jason sitter i styrelsen för National Academy of Recording Arts & Sciences, och han hjälpte till att introducera kategorin Best Dance / Electronic Album till
Sms: a Stas Mihaylov jag ska stjäla alla Länkar ut; jetbrains.com JetBrains :: World's Leading Vendor of Professional Development Tools; apress.com Apress; pusher.com Pusher | HTML5 WebSocket Min kompis frågade mig exempelvis varför så många killar har bilder av sig själva i bar överkropp på sina Tinder-profiler. Hon: Det spelar.
Archived. JetBrains Academy
JetBrains Academy. 1,109 likes · 65 talking about this. JetBrains Academy is an educational platform for future professionals with the opportunity to learn theory and practice by programming your own
JetBrains Academy is a learning platform that, unlike most learning platforms today, primarily uses text articles instead of video lessons. Along with these articles, there are lots of exercises, from questions to code challenges, as well as very interesting software projects that allow the student to learn by doing. 2019-02-27 · VISIT JETBRAINS ACADEMY.
Ftp 200 port command successful
I finished last week the java project blockchain and can recommend everyone to give at a try as well, I had a lot of fun doing it. JetBrains Academy has brought a 2 month free trial period to learn Java, Python, Kotlin and many other languages. You can register on their website and star This year JetBrains, the creator of award-winning coding tools such as IntelliJ IDEA, ReSharper, and Kotlin, introduced JetBrains Academy, a new-wave training platform for future software development professionals. JetBrains Academy is an educational platform for future professionals with the opportunity to learn theory and practice by programming your own working applications. 3.4k Learners Start a JetBrains Academy project by going to Learn > Open JetBrains Academy Project from the Welcome screen or in the File menu by choosing Learn > Open JetBrains Academy Project.
Read the JetBrains Academy guide for more details. Read the JetBrains Academy guide for more details. JetBrains Academy. Learn Java Kotlin Python by creating working applications with JetBrains Academy, a project-based learning platform.
bo utomlands ett halvår
löfven ku förhör
chartra ett flygplan pris
nvidia resizable bar
sverige valuta euro
tillfället landat i att vi använder [TeamCity](http://www.jetbrains.com/teamcity/) varvid ett dilemma uppstod; hur får vi in gulp i vår byggprocess?
2.4K views Streamed 2 Our sponsors at JetBrains recently launched JetBrains Academy, an education platform that offers interactive, project-based learning combined with powerful, It requires a variety of other skills that are not well-defined, and they are not something that we can fully learn in any school or book. Hear from experienced It requires a variety of other skills that are not well-defined, and they are not something that we can fully learn in any school or book. Hear from experienced jetbrains-agent-jar.okla.tech/, jetbrains-account-free.kaibo99.com/, jetbrains-academy-python-review.metodosuccesso.com/, jetbot-wiki.betrallyvincente.com/, jetbrains-license-server-configuration-crack.shushuprint.com/, jetbrains-academy-python-review.kaibo55.com/, jetbot-wiki.kaibo518.com/, Advania Azul Systems B3 Bellsoft Bryntum CAG Callista Enterprise Capgemini Citerus Ecru Consulting AB G-Loot Gradle Hazelcast HiQ IBM iZettle Jetbrains #Jetbrains Academy deliver #StarWars references.
Lockdown browser app
orkla eslöv kontakt
JetBrains Academy has several interesting projects for people who want to learn programming. Close. 1.0k. Posted by 1 year ago. Archived. JetBrains Academy
JetBrains Academy is free of charge while in Early Access, so give it a try. Start learning, build your first project, and tell us what you think, either here in the comments or on Twitter. If you’re at KotlinConf, don’t miss the JetBrains Academy office hour at the Kotlin booth at 14:45 CET with @TrueSebi!
Gymnasiala kurser och yrkesutbildningar. Kontakta oss. Busskort, skolskjuts och inackordering. Skolmat och specialkost. Barn- och utbildningslots. AFter school.
Svara. Retweeta. 1. Retweetad. 1. Gilla. St. Petersburg Academic University of the Russian Academy Of Sciences eller mini-projekt inom ramen för orderföretag (Yandex, Parallels, JetBrains, EMC).
JetBrains Academy: Пошаговое обучение. 1 May 2020 This new product, JetBrains Academy, was due to be launched out of beta just prior to the outbreak of the COVID-19 pandemic, and it would At JetBrains, code is our passion. For over 15 years we have strived to make the strongest, most effective developer tools on earth.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00735.warc.gz
|
CC-MAIN-2023-40
| 7,397
| 32
|
https://community.ptc.com/t5/Windchill/Comparison-of-tools-with-PTC-Integrity/td-p/543140
|
code
|
The PTC Community email address has changed to email@example.com. Learn more.
I am currently working at a quick overview of differences between PTC Integrity and PTC Windchill.
The point is, that I need to know, what are differences and equalities between ALM and PLM in similar functionalites.
I would really appreciate any helpful links and help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00361.warc.gz
|
CC-MAIN-2023-50
| 348
| 4
|
https://devrant.com/rants/1420047/so-my-company-finally-decided-to-make-the-shift-from-using-irc-for-internal-chat
|
code
|
Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple APILearn More
mundo0352274ySlack sucks all chat shits are incredible inefficient.
Something to collab like trello, monday, airtable, etc will always be better. Even google drive, even box, even fucking discourse.
Kill slack, get something that can be used to document interactions.
mebekix3324yIts works BEST in my organization. (Only IT team uses it haha).
Rest finance and operation uses whatsapp and Telegram.
Yeah strange but true.
IRC is one of the best protocols for me... I really miss when everyone was using mirc.
OK IRC is not secure... Well mirc is not secure, because if you make the client software you can encrypt everything, and is highly adaptive
Skype is so unsecure this days....
They could at least encrypt the saved conversations
Root826404yChat is extremely nice in work environments.
Slack in particular is terrible.
mundo0352274y@ClySuva sucks org wise, i know chatting is easy and great for communication.
But then try to find that particular conversation 5 months back, you don't temember in which channel and the interlocutor left the company.
Hence, a collab tool is way better, keep conversations focused to the issue at hand, documented forever, easy to find again.
Hence, all chat sucks for work shit for other than casual or quick questions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337663.75/warc/CC-MAIN-20221005172112-20221005202112-00356.warc.gz
|
CC-MAIN-2022-40
| 1,528
| 18
|
https://premium.wpmudev.org/forums/topic/wp-html-editor-using-page-id-for-internal-links/
|
code
|
I’m doing some major work on a WordPress site I created a couple of years ago. I copied it to a development server using BackupBuddy. I’ve just noticed that the html editor is writing all the internal links with page IDs rather than page names. Everything works correctly and the IDs are transformed to page names in the source code, but I don’t remember ever seeing this before.
My big concern is that we’re going to turn this into multisite and clone the main site in order to create translated versions. If something is screwy now, I need to straighten it out.
Permalinks are using month and name. The pages’ slugs are the right page name. I’ve reverted to the default permalinks and then back to the ones I’m using with no effect.
My deadline for getting the site back up is this Friday, so I’m in a big rush too, with a lot of last minute work.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987756350.80/warc/CC-MAIN-20191021043233-20191021070733-00244.warc.gz
|
CC-MAIN-2019-43
| 865
| 4
|
http://bitsandpieces-thailand.blogspot.com/2006/07/thailand-land-of-smiles-well-yes-but.html
|
code
|
Thailand - the land of smiles?
but there is much more. And I do not talk about beaches or good weather. I will write about the daily life, the bits and pieces often unnoticed by the average tourist.
I try to get a grip on Thai culture, to understand Thai people. The longer I am here I the more I have the feeling that is very long learning process.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592650.53/warc/CC-MAIN-20180721164755-20180721184755-00511.warc.gz
|
CC-MAIN-2018-30
| 349
| 3
|
https://stackoverflow.com/questions/3541126/why-cant-i-use-log-files-in-java-runtime/36206767
|
code
|
I have (in java),
rt.exec("qq.exe -i ..(some other parameters) > qq.log");//*1
when I run qq.exe -i ..(some other parameters) > qq.log in terminal It works fine and keeps the qq.log file correctly.
However using rt.exec (*1) doesnt work. " > qq.log" part causes problem. When I delete that part rt.exec (*1) works but I cant have qq.log file this time.
What causes this problem and Is there any soln??
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145910.53/warc/CC-MAIN-20200224071540-20200224101540-00461.warc.gz
|
CC-MAIN-2020-10
| 401
| 5
|
https://webilicious.xyz/the-right-way-to-use-distant-desktop-rdesktop-in-redhat-fedora-centos/
|
code
|
rdesktop is an open supply software program that allows you to join and handle your distant Home windows desktop out of your Linux pc utilizing RDP – Distant Desktop Protocol. In different phrases, when you are sitting in entrance of your Linux system at dwelling or workplace, and entry your Home windows desktop as when you’re sitting in entrance of the Home windows machine.
Learn Additionally: 11 Greatest Instruments to Entry Distant Linux Desktop
On this article, we are going to clarify find out how to set up rdesktop in Linux system to entry the distant desktop of Home windows pc utilizing the Hostname and IP Tackle.
Home windows Settings
To allow rdesktop to connect with any given Home windows machine, it’s worthwhile to make few following modifications on the Home windows field itself.
- Allow RDP port no. 3389 in Firewall.
- Allow distant desktop below Home windows Working System.
- Require not less than one person with a password.
When you make all the above Home windows configuration settings, now you can transfer additional to put in rdesktop in your Linux system to entry your Home windows desktop.
Set up rdesktop (Distant Desktop) in Linux
It’s at all times preferable to make use of a default bundle supervisor corresponding to yum, dnf or apt to put in software program to deal with dependencies routinely throughout set up.
# yum set up rdesktop [On CentOS/RHEL 7] # dnf set up rdesktop [On CentOS/RHEL 8 and Fedora] # apt set up rdesktop [On Debian/Ubuntu]
If rdesktop will not be out there to put in from the default repositories, you possibly can obtain the tarball from Github right here or use the next wget command to obtain and set up it as proven.
# wget https://github.com/rdesktop/rdesktop/releases/download/v1.8.6/rdesktop-1.8.6.tar.gz # tar xvzf rdesktop-1.8.6.tar.gz # cd rdesktop-1.8.6/ # ./configure --disable-credssp --disable-smartcard # make # make set up
Connecting to Home windows Desktop Utilizing Hostname
To attach Home windows host from Linux desktop sort following command utilizing -u parameter as username (narad) and (ft2) because the hostname of my Home windows host. To resolve hostname make an entry at /and so forth/hosts file when you don’t have DNS Server in your atmosphere.
# rdesktop -u narad ft2
Connecting to Home windows Desktop Utilizing IP Tackle
To attach Home windows host from Linux machine, use username as (narad) and IP Tackle as (192.168.50.5) of my home windows host, the command could be as.
# rdesktop -u narad 192.168.50.5
Please execute man rdesktop in command immediate If you need to know extra about it or go to rdesktop venture web site. Kindly share it and tell us your feedback by way of our remark field beneath.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334591.19/warc/CC-MAIN-20220925162915-20220925192915-00706.warc.gz
|
CC-MAIN-2022-40
| 2,714
| 21
|
https://discuss.dizzycoding.com/effortlessly-import-all-module-members-in-a-package/
|
code
|
Are you tired of the hassle of importing individual module members one by one in your Python code? Look no further! With an easy solution, you can effortlessly import all module members in a package. This will save you valuable time and simplify your code.
By utilizing the “*” operator when importing a package, you can import every member of the package into your code with just one line. This is especially useful when working with large packages with many modules. No more searching through documentation trying to remember which member you need to import!
But be careful not to overuse this technique. Importing all members of a package might lead to naming conflicts or unnecessarily importing unwanted members. It is essential to always consider the best practices for your specific code and use this technique wisely.
In conclusion, if you want to streamline your Python code and save yourself some time and effort, give this method a try. By effortlessly importing all module members in a package, you’ll be able to focus on what really matters – writing great code!
“How To Import Members Of All Modules Within A Package?” ~ bbaz
Python is an open-source, interpreted high-level programming language known for its readability and ease of use. Python has a vast number of libraries and modules built-in and available for use, making it a go-to option for many programmers. Today, we’re going to discuss one of the critical features of Python – Effortlessly Import All Module Members in a Package.
What Is Effortlessly Import All Module Members in a Package?
Effortlessly import all module members in a package is a feature introduced in Python 3.3. This feature allows you to import all named objects from a package into your current namespace. This feature is an extension of the wildcard import syntax for importing multiple objects from a module.
The Traditional Way of Importing Modules in Python
In traditional programming languages, you need to import each file or module separately into your program, which can take lots of time and result in complex code. Here’s an example:“`import module_name_1import module_name_2import module_name_3…“`But in Python, we have a better way to do it using the import statement.
The New Way of Importing Modules in Python
With the new way to import modules, you can easily import all module members in a package with just one line of code.“`from package_name import *“`Now let’s take a look at some of the advantages and disadvantages of this method.
Feature: Advantages and Disadvantages
1. Saves time – by importing all modules in a package, you don’t have to waste time importing each module separately; this enhances productivity.2. Shorter code – you write less code, and it makes it easier to read and understand. 3. Works with many libraries – This feature is available in almost all of the libraries and modules, making it easier to work with them.
1. Namespace pollution – Using this method can pollute your namespace by importing a lot of objects that you may not need. 2. Naming Conflicts – using the * import methodology can lead to naming conflicts with existing objects or modules, renaming your objects and modules’ chance can increase.
Naming convention of the Packages and Modules
It is important to note that when using this feature, it’s essential to make sure that you adhere to good naming conventions for your package and module. By following such rules, we create more readable code and reduce the risk of errors arising from the import process.
Using Aliases while Importing
Aliases can be used to differentiate between objects when the objects have short or generic identifiers. In Python, an alias can be created using the as keyword followed by the aliasing name.“`from package_name import module_name as mn“`The above code imports only `module_name` from `package_name`, and any reference to `mn` will reference `module_name`.
When Not to Use this Feature
While this feature makes programming easy and convenient, there are times when it’s best not to use it. For instance, when you’re working on large projects, where one module could have multiple purposes, it can be difficult to track the source of the functions, which prevents easy debugging.
Effortlessly import all module members in a package feature provides an easier and faster way to import multiple modules. Though this new feature has its benefits, one must adhere to naming conventions and exercise caution while utilizing it. Always consider the scenario before using it aggressively.
Thank you for taking the time to read our article about Effortlessly Import All Module Members in a Package. We hope that we have given you useful insights on how to import all module members seamlessly, without having to spend too much time or effort doing it.
As we have discussed, importing modules can be repetitive and time-consuming, especially when dealing with a large package that has multiple modules. By using the wildcard import method, you can efficiently import all the necessary modules and their members within a package with just a few simple lines of code.
Remember to practice proper coding practices by avoiding importing everything from a package or module. It is crucial that you determine which specific functions or components you need to avoid cluttering your code and slowing down its performance.
Overall, importing modules is an essential aspect of programming, and by using these techniques, you can make it a much more straightforward and effortless process. Thank you again for reading, and we hope that this article has brought you one step closer to becoming a more efficient programmer.
People Also Ask about Effortlessly Import All Module Members in a Package:
- What is the purpose of importing all module members in a package?
- How do I import all module members in a package?
Importing all module members in a package allows you to access all functions, classes, and variables without having to specify each one individually.
You can use the following syntax:
- from package_name import *
Yes, it can. If two or more modules have the same name for a function, class, or variable, importing all module members can cause naming conflicts.
It depends on the situation. Importing all module members can save time and make your code more concise, but specifying each one separately can make your code more readable and prevent naming conflicts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643388.45/warc/CC-MAIN-20230527223515-20230528013515-00541.warc.gz
|
CC-MAIN-2023-23
| 6,461
| 34
|
http://nitromefanfiction.wikia.com/wiki/Violentbots
|
code
|
|This Page Belongs To Magnavox Oddysey Fan!
This article, Violentbots, is the creative property of Magnavox Oddysey Fan. Please do not steal this article.
Edits for grammar or mistake fixes are allowed. Edits to change anything else or the context are allowed only with the user's permission. To talk about edits or copyright ideas just contact Magnavox Oddysey Fan here.
This article contains content that some may find crude.
Because of the long levels, huge waves, and attacks, Violentbots has been considered by many Insultamigos the hardest game ever.
- Ordinary Violentbot
- Pixely 360° Flip Violentbot
- Bacteria Violentbot
- Anorexic Violentbot
- Tornillo Violentbot
- Foot Like Violentbot
- Spanish Violentbot (Violentbot Español)
- A scientific reason of the real violentbot (In Real Life) wants to fight is when the battle ensues,makes violence when the anorexic womans look the microscopic battlefield.<
- The Game Have A World Polemic by be The Hardest Game Ever by a video of youtube that the player always dies the video contains the Horrible Ke$ha'S Song.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110573.77/warc/CC-MAIN-20170822085147-20170822105147-00035.warc.gz
|
CC-MAIN-2017-34
| 1,073
| 14
|
https://www.dk.freelancer.com/projects/net-sql/online-management-system/
|
code
|
This project has been started but previous programmers failed to reach the first release. We are looking for an experienced staff of 2 or more people to take over the project and finish in a timely and economical manner. This project is quite extensive and there are many opportunities for continued work as there are 4 main releases for this project already scheduled.
You will be working closely with me as your single point of contact for the length of the first release. We have been using Visual Studio 2010, VisualSVN, and the Telerik ASP.net controls library.
I would guess that 50-60% of the first release is complete. This should give you a good estimation of how to bid after looking at the deliverables and project specifications.
This project will take a large commitment to understand the existing code, to understand what is EXACTLY required of the client, and to implement changes that are already needed. SERIOUS BIDDERS ONLY. Any changes that are made to current pages should be run by me first in case some undocumented changes were made.
If you have any questions at all please contact me. Be sure to look at the attached documents. More documentation will be available after bidding is over.
44 freelancers are bidding on average $2300 for this job
Hi, I am a software professional with 7+ years of experience in various MS technologies like ASP.NET, WCF, MS SQL Server, SSRS etc. Please see PM for details. Thanks and Regards, Sarika
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648431.63/warc/CC-MAIN-20180323180932-20180323200932-00355.warc.gz
|
CC-MAIN-2018-13
| 1,454
| 7
|
https://cryptologyinfo.com/what-is-filecoin/
|
code
|
Filecoin is a decentralized storage network and cryptocurrency that aims to create a global, peer-to-peer marketplace for storing and retrieving digital information. It was designed to address the challenges of data storage and distribution in a decentralized manner.
The Filecoin network operates on blockchain technology and utilizes a decentralized storage system. Instead of relying on a single central server or data center, Filecoin enables users to rent out their unused hard drive space and get paid in Filecoin (FIL), the native cryptocurrency of the network. Similarly, users in need of storage can pay FIL to store their files on the network. This creates a marketplace where supply and demand for storage meet, with economic incentives driving the network’s operation.
Filecoin leverages the InterPlanetary File System (IPFS), a protocol for storing and sharing data in a decentralized manner. IPFS allows files to be broken into smaller pieces, encrypted, and stored across multiple nodes on the Filecoin network. The network ensures redundancy and availability by replicating files across different storage providers, enhancing data resilience and fault tolerance.
By utilizing blockchain and incentivizing storage providers with FIL rewards, Filecoin aims to create a robust and efficient storage network that is resistant to censorship and single points of failure. It envisions a future where individuals and organizations can securely store and retrieve vast amounts of data in a decentralized and trustless manner.
Here’s a high-level overview of how Filecoin works:
Storage Providers: Users who have available hard drive space can become storage providers on the Filecoin network. They offer their storage capacity to store files on behalf of clients.
Clients: Users who need to store files can become clients on the Filecoin network. They pay storage providers in Filecoin (FIL) to store their files securely and reliably.
File Storage: When a client uploads a file to the Filecoin network, it is broken into smaller pieces and encrypted. These pieces, called “deals,” are then distributed across multiple storage providers for redundancy and data integrity.
Retrieval: When a client wants to retrieve their file, they submit a retrieval request to the network. The network locates the stored pieces of the file and retrieves them from the appropriate storage providers. The client pays the storage providers in FIL for the retrieval service.
Incentives and Proof-of-Storage: Filecoin uses a mechanism called “proof-of-storage” to ensure that storage providers are correctly storing the files they claim to store. Storage providers submit proofs to the network to demonstrate that they are storing the data as agreed. They are rewarded with FIL for their storage services and adherence to the protocol.
Market Dynamics: The Filecoin network operates as a marketplace, with storage providers setting their own prices for their services. Clients can choose storage providers based on factors such as price, reputation, and reliability. The market dynamics of supply and demand determine the overall cost of storage on the network.
By leveraging blockchain technology, decentralized storage, and economic incentives, Filecoin aims to create a resilient and efficient storage network that is resistant to censorship and single points of failure. It provides individuals and organizations with a decentralized alternative for storing and accessing their data securely.
Remember that this description provides a general understanding of Filecoin’s workings, and there may be more technical details and updates beyond my knowledge cutoff in September 2021. It’s always recommended to consult official Filecoin resources for the most up-to-date information.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510225.44/warc/CC-MAIN-20230926211344-20230927001344-00548.warc.gz
|
CC-MAIN-2023-40
| 3,786
| 13
|
https://lists.debian.org/debian-boot/2004/08/msg01096.html
|
code
|
Re: localization-config uploaded (former locale-config-skolelinux)
-----BEGIN PGP SIGNED MESSAGE-----
On Sunday 15 August 2004 23:25, Konstantinos Margaritis wrote:
> 4) Please, please check the configuration values for each package
> for your locale entry.
I have taken a quick look at the scripts for nl_NL and I have a couple of
- - The test is for nl_NL@euro.
However, d-i currently does not (yet) set the locale to nl_NL@euro, but
to nl_NL. Do the tests still work in that case?
I think the same goes for other euro countries.
- - For xfree86-kbd the LAYOUT is set to 'nl'.
This looks to me to be a real problem as most keyboards in the Netherlands
have a "US Intl." keyboard layout. Only a minority have the Dutch layout.
In fact, the default in kbd-chooser is the US layout for NL.
So IMHO there should be a test of the keyboard layout based on the layout
already selected by the user in kbd-chooser and not a straight test based
If a choice _must_ be made, I'd prefer the default to be 'us'!
- - Setting value for dictionaries-common to 'nederlands (Dutch)' and for
ispell to 'dutch' is only OK if package idutch is installed.
How is that guaranteed?
- - One of the strengths of D-I IMHO if that it is very easy to install a
system that has English as main language but Netherlands as country,
and thus has correct defaults for e.g. timezone and mirror.
I would not like to loose that.
I'm not sure how valid these comments are as I only have a very rough
understanding of how this package would be used.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
-----END PGP SIGNATURE-----
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986649232.14/warc/CC-MAIN-20191014052140-20191014075140-00260.warc.gz
|
CC-MAIN-2019-43
| 1,604
| 29
|
https://www.jonashendrickx.com/blog/2018/01/12/ces-2018-thinkpad-ultra-dock
|
code
|
CES 2018: ThinkPad Ultra Docking Station12 Jan 2018
As laptops are getting thinner, we need new solutions for our docking stations. Lenovo came up with the new ThinkPad Ultra Dock or ThinkPad Ultra Docking Station. It connects on the side of the ThinkPad. From the product photo’s it looks like the new ThinkPad Ultra Docking Station offers the same features as the docks we were used to in the past. You can lock it into the ThinkPad Ultra Docking Station, and unlock it again with the key set. Then you press the button on the ThinkPad Ultra Docking Station to unmount.
Supported ThinkPads are:
You can find the manual to setup the ThinkPad Ultra Docking Station here.
Let us know:
Do you prefer the USB-C or USB3.0 docks you place next to your ThinkPad or do you prefer a docking station like this one?
Do you prefer the classic ThinkPad docking stations or the new ones that connect on the side?
ThinkPad Ultra Docking Station Rear
|Docking Interface||Dual USB-C and ethernet side connection|
|Supported OS||* Windows 10 * Ubuntu * Red Hat|
|Power||ThinkPad 135W AC adapter (Slim tip)|
|Video Ports||* 2x DisplayPort 1.4 * HDMI 2.0 * VGA|
|USB Ports||* 4x USB3.1_v2 with 1 Always-On USB * 2x USB-C supporting 10 Gbps and 5V/3A power|
|Gigabit Ethernet||10/1000 Gigabit Ethernet|
|Audio Combo Jack||Yes|
|Product Dimension||378 x 159 x 54.1 mm|
|Network Managability||* PXE Boot * Wake-on-LAN * MAC address pass-though|
|Security||Kensington® Lock Slot and Master Key Lock available (Master Key sold separately, Option PN:4XE0Q56388)|
|Box Contents||* Ultra Docking Station (with key lock and 2 keys) * 135W Power Adapter and Power Cord * Setup Poster * Warranty Poster|
|Parts Number||* 40AJ0135US : US * 40AJ0135AR : Argentina * 40AJ0135BR : Brazil * 40AJ0135JP : Japan * 40AJ0135EU : Europe/Korea * 40AJ0135AU : Australia * 40AJ0135CN : China * 40AJ0135DK : Denmark * 40AJ0135IN : India * 40AJ0135IS : Israel * 40AJ0135IT : Italy * 40AJ0135SA : South Africa * 40AJ0135CH : Switzerland * 40AJ0135TW : Taiwan * 40AJ0135UK : UK|
ThinkPad T480’s docking port on the left side.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00155.warc.gz
|
CC-MAIN-2023-14
| 2,083
| 21
|
http://sampfordpeverell.com/office-key-code-finder.html
|
code
|
Let's get your Office page, follow the prompts to associate your product key with your Microsoft account and start the installation process. After getting into, click on the Office 2016 tap to view the product key for it. Create a new discussion If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Look for the email address after Belongs to below the product name. This problem is mostly reported with Dell computers.
Thanks for your input again. You can see your Office 2016 product key now, and product keys about other installed software are also found at the same time. Examine your computer to find the key. Forgot the full version key code for Microsoft Office 2010? Many other applications also require product keys if you reinstall them — including Microsoft Office — and if you've lost the email you received when you first installed them, you could be in real trouble later on. Be aware that the computer names will appear a few seconds after finishing to scan the product keys.
You can find it from the registry, but you can't read it normally, because it is encrypted with binary code. It would be easy for you to display and find product keys for softwares installed on your computer, surely including newly-installed Office 2016 product key just with one click. If you fail to connect the remote computer with ProduKey, read the instructions in the following Blog post:. Or get into your Office account page with the Microsoft account you associated with Office 2016. So far, the work of is over, just copy the Office product key code to activate Office 2010, and it works. When using this option, ProduKey automatically scan all your hard-drives, find the Windows installation folder in them, and extract all product keys stored in these Windows installations.
The one in registry and key-viewer application is a red herring. Unfortunately, there are many dishonest sellers who offer stolen, abused, or otherwise unauthorized Microsoft product keys for sale. When it's turned on, the odd and even rows are displayed in different color, to make it easier to read a single line. However, how do you locate your product key? If your laptop has a removable battery, it may be under the battery. For example, you cannot use a Windows product key to unlock a Microsoft Office product.
Never be afraid to ask. You can download a key finder program. Instead, the error code will be returned to the caller. Belarc Advisor's scans are fast and offer so much more information than just serial numbers, it's our favorite free product key finder. You can specify the '~' prefix character e. Seems Dell should not make it so difficult to obtain that info since they are all legally purchased licenses.
Check from email: If you downloaded your Office from an online store, you might be able to get the license key from the email receipt. . It will allow you copy the recovered product keys to the clipboard, save it to a file and print it out for safe keeping. Step 2: When the Product Key Tuner program comes up, click on Start Recovery button. Whenever you run Belarc Advisor, it automatically checks its database for software definitions — essential for finding keys for new programs. I used Magical Jelly Bean Keyfinder v1.
In this case, you may need to contact the originator servicing that deal to obtain a product key code. To locate your product key online, see. Be sure to read the tip called Beware of Product Keys Sold Separately if you want to buy a product key online. Now you can view your Office activation key clearly on the list below. You can find telephone no. After you format a system, the registry and system files are erased, along with the keys. On a laptop, it may be on the bottom of the laptop.
I have 30 desktops that I bought. Find from system registry: The Office serial key is stored on the hard drive where you install Office program. No security score for Windows 10 is primarily a tool for gathering information about your Windows system, including hardware, security updates and product keys. Depends on how you bought it. Don't hurry to buy another activation key, even if you lost your Microsoft Office product key, try the methods below to find it out. They are two different types of keys, even though they use the same format.
If these products are prompting you for a product key, you can sign in using the Microsoft account that you used to buy and download Office. Only finds Windows keys is another portable application, and doesn't even come as a zip archive — just download the exe file and run it to begin scanning. Compared with it, software for looking for product key is more convenient and practical. Just go to the and sign in using the Microsoft account that you used to buy Office. After logging in, click on Digital content to check the product key. Occasional ads in free version There are two versions of : free and paid-for.
Then product key for the installation is displayed. And is the easiest and recommended approach because of its simplicity and efficiency. So you need to call them Step 4: They will provide you activation code. Therefore, if you have Office 2016 installations associated with your Microsoft account, you can log in your Microsoft account, see the installations and get the key on the My Account page. · Retail perpetual product key, located inside the new Product Key Card available at retail stores. This is the basic way of determining where your product key is. Those serial numbers form a product key which works as a protection against unauthorized copying and installation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527907.70/warc/CC-MAIN-20190722092824-20190722114824-00282.warc.gz
|
CC-MAIN-2019-30
| 5,694
| 10
|
http://compbio.fmph.uniba.sk/events/details.php?event=4fa2cd58311df
|
code
|
Seminár z teoretickej informatiky
Fri 4 May. 2012, 11:00
Title: Complexity of rearrangement problems under breakpoint distance
Speaker: Kuko Kováč
Background: Tannier et al. introduced a generalization of breakpoint distance for multichromosomal genomes. They showed that the median problem under the breakpoint distance is solvable in polynomial time in the multichromosomal circular and mixed models. This is intriguing, since in all other rearrangement models (DCJ, reversal, unichromosomal or multilinear breakpoint models) the problem is NP-hard. The complexity of the small or even the large phylogeny problem under the breakpoint distance remained an open problem [1,2]. Results: We improve the algorithm for the median problem and show that it is equivalent to maximum non-bipartite matching (under linear reduction). We prove that the small phylogeny problem is NP-hard (even APX-hard) already for 4 species (a quartet phylogeny).
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105961.34/warc/CC-MAIN-20170820015021-20170820035021-00593.warc.gz
|
CC-MAIN-2017-34
| 943
| 5
|
http://fashionanswers.blogspot.com/2008/04/what-is-naked.html
|
code
|
Have you seen the new AARP magazine? Why would you? There is a lot of buzz about it - the hype is that Jamie Lee Curtis is naked on the cover. Well, I think that our definition of naked has changed - she might be strapless, but certainly not naked.
Why do we - as a society - think we need to add a sexy factor to things to sell them? Why do we as women think we need to pull out the 'girl card' in the business world to get ahead? Why do we think we'll get a better deal on a car if we show up in a short skirt?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676588961.14/warc/CC-MAIN-20180715183800-20180715203800-00502.warc.gz
|
CC-MAIN-2018-30
| 512
| 2
|
https://www.math.uni-potsdam.de/en/institut/veranstaltungen/archiv/details-archiv/veranstaltungsdetails/renormalization-loop
|
code
|
Gilad Sofer (Technion)
Alessandra Frabetti (Université Lyon 1)
In perturbative quantum field theory, the renormalization group is a group of formal diffeomorphisms in the powers of the coupling constant, with coefficients built on the counterterms of divergent Feynman graphs. For scalar theories, such groups are proalgebraic (functorial on the coefficients algebra) and are represented by Faà di Bruno types of Hopf algebras. For non-scalar theories, even if the counterterms are scalar, they cannot be functorially represented by a Hopf algebra, because on some intermediate series with non-commutative coefficients the associativity of the composition fails.
In the paper arXiv:1807.10477, with Ivan P. Shestakov, we extend the group of formal diffeomorphisms to a functor on non-commutative algebras by regarding it as a loop (a non-associative group) and exhibit its representative Faà di Bruno coloop bialgebra. In this talk I explain how, even losing associativity, this loop has enough good properties to allow performing renormalization in Dyson's sense, and how it could then give rise to a "renormalization loop" suitable for non-scalar theories.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00121.warc.gz
|
CC-MAIN-2024-18
| 1,161
| 4
|
https://sketchbookproject.com/library/21979
|
code
|
I draw as a hobby. It helps me get away from everything, all the problems and concerns of daily life, and just be transported to a peaceful place for a few hours. This is the first time I participate in the sketchbook project. I wanted to try a mix between a sketchbook and a journal, so I initially thought of making it a "lost document" of a "lost country" mixed with the feeling of a vintage science journal. However, I don't plan too much, so the initial changed with every page I worked on, so it's a mix of styles with a limited set of art tools (I mainly used a black gel pen and a small palette of colored pencils).
This turned out to be a very personal project where I learned quite a few things. It's been a while since I work on finishing a sketchbook, so this was very motivating. I want to keep creating new sketchbooks now. Drawing is a cool way to express things you can't express with words.
Library Call Number: 366.6-8
Total Online Views: 99
Total Mobile Checkouts: 0
All uses of the Content are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike (“CC BY-NC-SA”) license (as fully described here). Please email us for permission before using any images.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573105.1/warc/CC-MAIN-20190917181046-20190917203046-00144.warc.gz
|
CC-MAIN-2019-39
| 1,195
| 6
|
https://fileinfo.com/extension/sq
|
code
|
.SQ File Extension
File TypeSysquake Program
What is an SQ file?
Interactive simulation created with Sysquake, a software program designed to help understand systems, solve problems, and design products.
SQ files define the set of interactive plots which can be displayed and contain declarations of variables, constants, and handlers, as well as function definitions and help elements.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385378.96/warc/CC-MAIN-20210308143535-20210308173535-00496.warc.gz
|
CC-MAIN-2021-10
| 386
| 5
|
http://terrificwords.com/1/post/2012/01/how-to-trim-the-fat-from-your-writing.html
|
code
|
In case you were wondering, the fat is the verbiage that adds absolutely nothing to your work. Most likely they are those unnecessary words that take up space. Here's a few of them:
In almost all situations cutting the word "just" makes the sentence much stronger and less demanding or needy. Examples:
- I just wanted to say goodnight.
- If you would just pay me tonight I can buy the tickets.
The only thing "going to" does to a sentence is make it more wordy and harder to follow. Instead remove "going to" and replace it with "will". Examples:
- I am going to find that book before work.
- Michael is going to forget how to play the piano if he doesn't practice soon.
In most cases "that" is usually an unnecessary word and weakens the sentence. Examples:
- Did you know that elephants have amazing memories?
- I love the outfit that Beyonce wore at the Grammy's.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945624.76/warc/CC-MAIN-20180422154522-20180422174522-00221.warc.gz
|
CC-MAIN-2018-17
| 867
| 10
|
https://www.baltimoresun.com/news/bs-xpm-2002-02-14-0202140113-story.html
|
code
|
I record oral histories on mini discs, and now need to get those interviews onto my computer. I have a USB link for my Sony Mini Disc that allows me to download from the computer, but it doesn't say how to load them to it.
MusicMatch (www.musicmatch.com), which competes against Real Networks and Microsoft's Media Player as a music player and CD burner, boasts a well-documented feature that walks users through the process of using the Line-In port on a computer sound card to record music from a turntable or external CD player as MP3 files.
Once you download the free MusicMatch, go to the Help section and type in the key word "recording" to get instructions about how to transfer your raw recordings to your hard drive as MP3s.
Data Becker's MP3 Editor software ($20 at www.databecker .com) will let you trim those files as desired and change their order - a fine tool for aspiring moviemakers as well as recording artists and oral historians.
Then you can burn the files to CD-R or download them to your Mini Disc recorder.
James Coates writes for the Chicago Tribune, a Tribune Publishing newspaper. He can be reached via e-mail at jcoates@ tribune.com.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583684033.26/warc/CC-MAIN-20190119221320-20190120003320-00211.warc.gz
|
CC-MAIN-2019-04
| 1,161
| 6
|
https://www.womenandchildrenfirst.com/book/9781801079518
|
code
|
Discover how to write high-quality character driver code, interface with userspace, work with chip memory, and gain an in-depth understanding of working with hardware interrupts and kernel synchronization
Linux Kernel Programming Part 2 - Char Device Drivers and Kernel Synchronization is an ideal companion guide to the Linux Kernel Programming book. This book provides a comprehensive introduction for those new to Linux device driver development and will have you up and running with writing misc class character device driver code (on the 5.4 LTS Linux kernel) in next to no time.
You'll begin by learning how to write a simple and complete misc class character driver before interfacing your driver with user-mode processes via procfs, sysfs, debugfs, netlink sockets, and ioctl. You'll then find out how to work with hardware I/O memory. The book covers working with hardware interrupts in depth and helps you understand interrupt request (IRQ) allocation, threaded IRQ handlers, tasklets, and softirqs. You'll also explore the practical usage of useful kernel mechanisms, setting up delays, timers, kernel threads, and workqueues. Finally, you'll discover how to deal with the complexity of kernel synchronization with locking technologies (mutexes, spinlocks, and atomic/refcount operators), including more advanced topics such as cache effects, a primer on lock-free techniques, deadlock avoidance (with lockdep), and kernel lock debugging techniques.
By the end of this Linux kernel book, you'll have learned the fundamentals of writing Linux character device driver code for real-world projects and products.
What You Will Learn:
Who this book is for:
An understanding of the topics covered in the Linux Kernel Programming book is highly recommended to make the most of this book. This book is for Linux programmers beginning to find their way with device driver development. Linux device driver developers looking to overcome frequent and common kernel/driver development issues, as well as perform common driver tasks such as user-kernel interfaces, performing peripheral I/O, handling hardware interrupts, and dealing with concurrency will benefit from this book. A basic understanding of Linux kernel internals (and common APIs), kernel module development, and C programming is required.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00789.warc.gz
|
CC-MAIN-2023-50
| 2,302
| 7
|
https://support.clio.com/hc/en-us/articles/360015393694-Why-is-my-Contact-Sync-Continuously-Loading-And-Not-Completing-
|
code
|
- Spinning circle for the Contacts sync
- Google Contacts Sync
- Office 365 Contacts Sync
- Clio Manage
This indicates that your Contacts are actively syncing with your external program. If you create or modify a Contact in either program, then the changes should sync over to the other program momentarily. However, deleting a contact in Office 365 will not delete the contact in Clio.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00100.warc.gz
|
CC-MAIN-2023-06
| 386
| 5
|
http://mathisfunforum.com/viewtopic.php?id=17786
|
code
|
Can anyone give me any idea of how to write a program for steganography in C++? I just dont understand how can you use the "fin" function to read the contents of a jpeg file.
'And fun? If maths is fun, then getting a tooth extraction is fun. A viral infection is fun. Rabies shots are fun.'
'God exists because Mathematics is consistent, and the devil exists because we cannot prove it'
I'm not crazy, my mother had me tested.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119225.38/warc/CC-MAIN-20170423031159-00608-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 426
| 4
|
https://www.netscout.com/what-is/packet
|
code
|
What is a Network Packet?
A network packet is a multi-byte unit of data transmitted at one time by a host, such as a server, on a network. The actual packet consists of the user data, called the payload, and control information that the network uses to deliver the payload. The term packet is often used interchangeably with frame, although some people distinguish packets as messages at the network layer and above, while frames are defined as messages that include the data link and sometimes even the physical layers.
Packets are small segments of a full message. All data sent over computer networks, meaning 2 or more computers connected to one another, is broken up into packets and then reconstructed by the destination device. Breaking up larger messages into smaller packets helps keep the wires clear for other devices to send information, ensuring the network runs more efficiently. If computers sent messages in their full, undivided state, each device would have to wait its turn to send its messages to other devices.
Network packets can be monitored for a variety of use cases, including network performance management and network security. The versatility and detail of packet data allows for unmatched visibility into your network, meaning that nothing can hide from you, whether it is a performance issue, or a bad actor trying to gain or expand access.
A network packet is comprised of three main parts:
- Packet Header: The header is the initial information of the packet. This is the first part of the packet the receiving device sees. There are 8 components to an IPv6 packet header:
- Version: 4-bit identifier of the Internet Protocol version.
- Traffic Class: Indicates the priority of the packet.
- Flow Label: Indicates that the packet belongs to a specific series of packets.
- Payload Length: Specifies the length of everything in the packet following the header.
- Next Header: Specifies what type of payload the packet contains.
- Hop Limit: Ensures the packet doesn’t fall into an infinite loop. Each time it passes a router, the Hop Limit decreases by one.
- Source Address: Indicates the address of the device sending the packet.
- Destination Address: Indicates the address of the destination device of the packet.
- Payload: The payload is the actual data that is being transmitted to the destination. To ensure the packet is the proper size, the payload may be padded with blank data.
- Trailer: At times, some network protocols will attach a trailer or end part to a packet. For example, Ethernet frames contain trailers, but IP packets do not. This is often done to denote the end of a network packet or perform error correction.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817474.31/warc/CC-MAIN-20240420025340-20240420055340-00880.warc.gz
|
CC-MAIN-2024-18
| 2,670
| 16
|
https://virtualization.info/2006/05/11/trends-in-virtualization-interest/
|
code
|
If you already saw my 2005 last day’s post you know that virtualization.info is a witness of virtualization huge grow we are seeing in these last few years.
But even covering all available news about Egenera, IBM, Leostream, Microsoft, Parallels, PlateSpin, SWsoft, Sun, Virtual Iron, vizioncore, VMware, Xen and all others players of this exciting market, virtualization.info is not yet the biggest observer of how it is changing.
The biggest one is obviously the most used search engine of these last years: Google.
Google just launched a new service, Google Trends, which I found simply amazing to track and understand how the news buzz around virtualization raised during time, underlying most hot announcement for one or more requested keywords.
I started checking the word virtualization:
Looking at them together shows even more interesting details:
I would like to also add Microsoft, but there is no way to include them reducing focus just on virtualization (if I specify a keyword like Virtual Server 2005, I have to use same criteria even with VMware, which would provide unreliable results).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00246.warc.gz
|
CC-MAIN-2023-40
| 1,105
| 7
|
https://www.collabora.com/news-and-blog/blog/2016/10/24/open-build-service-in-debian/
|
code
|
Posted on 24/10/2016 by Héctor Orón Martínez
“Open Build Service is a generic system to build and distribute packages from sources in an automatic, consistent and reproducible way.”
openSUSE distributions’ build system is based on a generic framework named Open Build Service (OBS), I have been using these tools in my work environment, and I have to say, as Debian developer, that it is a great tool. In this blog post I plan for you to learn the very basics of such tool and provide you with a tutorial to get, at least, a Debian package building.
|Figure 1. Open Build Service Architecture.|
The figure above shows Open Build Service, from now on OBS, software architecture. There are several parts which we should differenciate:
Each one of the above packages can be installed in separated machines as a distributed architecture, it is very easy to split the system into several machines running the services, however in the tutorial below everything installs in one machine.
The backend is composed of several scripts written either in shell or Perl. There are several services running in the backend:
The backend manages source packages (any format such RPM, DEB, …) and schedules them for a build in the worker. Once the package is built it can be published in a repository for the wider audience or kept unpublished and used by other builds.
System can have several worker machines which are encharged to perform the package builds. There are different options that can be configured (see /etc/default/obsworker) such enabling switch, number of worker instances, jobs per instance. This part of the system is written in shell and/or Perl language.
The frontend allows in a clickable way to get around most options OBS provides: setup projects, upload/branch/delete packages, submit review requests, etc. As an example, you can see a live instance running at https://build.opensuse.org/
OSC is a managing command line tool, written in Python, that interfaces with OBS API to be able to perform actions, edit configurations, do package reviews, etc.
Now that we have done a general overview of the system, in the next blog post I'll introduce you to OBS with a practical tutorial.
Earlier this month, Olivier Crête, Nicolas Dufresne, George Kiagiadakis & I attended the GStreamer Spring Hackfest in Lund, Sweden. Hosted…
A few months ago, Robert Foss wrote a blog post about virtualizing GPU Access. Here's a look at some of the major improvements that have…
Generously hosted by Axis in the beautiful Lund, Sweden, the annual spring hackfest is an occasion for the community to get together to…
The i.MX 6 platform has for the past few years enjoyed a large effort to add upstream support to Linux and surrounding projects. The newly…
Following on from part 1 in the series, part 2 covers more developments in low-level graphics, including support for buffer modifiers in…
The latest enhancements to the DRM subsystem have made mainline Linux much more attractive, making drivers easier to write, applications…
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865595.47/warc/CC-MAIN-20180523102355-20180523122355-00513.warc.gz
|
CC-MAIN-2018-22
| 3,041
| 18
|
https://docs.ploneintranet.org/development/debugging.html
|
code
|
Debugging tools and tricks¶
Celery logging level¶
Launch celery in INFO log level:
$ bin/pcelery worker parts/instance/etc/zope.conf -l info
Debugging in Celery tasks¶
PDB cannot be used in Celery (it would raise a BdbQuit exception and die).
We can use rdb instead:
from celery.contrib import rdb rdb.set_trace()
It will stop the task execution with a message like:
[2015-03-04 11:16:11,951: WARNING/Worker-2] Remote Debugger:6901: Please telnet into 127.0.0.1 6901. Type `exit` in session to continue. Remote Debugger:6901: Waiting for client...
We have to open a telnet session on the mentionned port to access the debugger:
$ telnet localhost 6901
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822145.14/warc/CC-MAIN-20171017163022-20171017183022-00262.warc.gz
|
CC-MAIN-2017-43
| 654
| 12
|
https://docs.bettyblocks.com/en/articles/6280759-building-an-action
|
code
|
Note: this feature might change slightly and might not yet be enabled in your application
After reading this article you will know:
First steps for creating an action in your application
What action flow is and how to build it
How to use action steps
Some tips to take in mind while building
Actions are made to provide logic in an application. This logic is executed after a certain event called a trigger. For example, a user can trigger a certain order of events by clicking a button.
You can create your own workflow in action builder by adding action steps. Action steps will serve as a logical construction as the events will be executed on conditions that you set yourself.
Creating new action
There are two basic ways of creating a new action in the Betty Blocks platform: you can create it from scratch or use the page builder components as a starting point. To begin with, we will describe the first way: creating action from scratch.
Find the “Actions” section on the builder bar: Then click on the
Fill in the action name and its description in the pop-up window. It is strongly recommended to stick to the action’s goal while naming it.
Building action flow
Now you are able to see your action workspace. Any action is created by connecting individual action steps together like a flowchart. By default, every action consists of two pre-defined steps: ‘Start’ and ‘Finish’. A series of events can appear between those pre-defined steps. The order in which steps are applied provides the logical process in a workflow. Each step has its own purpose with some affecting the action flow.
The ‘Start’ step is used to configure input and/or action variables, while in the ‘Finish’ step you can configure the name of a variable containing the result of the whole action. More about variables here.
On the sidebar, you can see a set of steps one can use within the action builder. Betty Blocks provides a standard set of frequently used steps out of the box: Authenticate User, Update Record, Delete Record, Create Record, Log Message, and Loop. This set of steps will be extended over time.
Each step is able to perform its own function - a piece of logic that can be configured individually. For instance, the ‘Create Record’ step creates and inserts records into the database. For more information on each individual step, read the Action step functionality article.
Action is created in a very simple way by just dragging action steps from the sidebar into the action flow. You can construct a rather complex logic of your action flow using individual components. When dragging steps, positions, where this step can be placed, are highlighted with small circles.
Once an action step is dropped in the desired spot, the whole action flow is reconstructed.
By clicking on the step in the action flow, you can configure the logic of the step. For example, in the ‘Create record’ step you can select a model to work with, set its value mapping, and add variables available inside the current step. After you configured the step, save it using the button at the bottom.
Any step can be removed from your action flow by means of the
Creating new action via page builder
Up to this point, we went through the basics for building an action flow from scratch. However, the common way that you might use when you start working with the platform is assembling the actions by using some of the components in the page builder. So, here’s an example of how to do this.
Note: As the new actions segment is still under development, at the moment you are only able to work with form components in the new environment.
First, open the pages on the builder bar (1), then go to components (2) and pick up ‘Create form’ (3). This component will serve us as an example here and later in this article. Mind that it’s also possible to get to actions using other components of the page builder.
Drag the ‘Create form’ component onto the page canvas. In the pop-up window, you will have to configure form fields: select a model from existing data models (1), choose properties by clicking on the ‘+’ beside them (2), and click on ‘Save’ (3).
The ‘Create record’ form has been created on your page. Now choose any field within this form and click on
When the parent component ‘Form’ is chosen, its options menu will open. There you need to click on
After clicking the
Let’s have a look at how it will interact with the front-end side of the application. Come back to the page builder, choose the page with the ‘Create record’ form and click on the play button. This is what the form will look like from a user’s perspective.
After filling in this form, a user will click on ‘Send’ - it will serve as a trigger for the action to be launched. At the end of this action flow, we get a new record with a user’s name and email in our database.
Make sure to always test run your action in every sandbox environment. A sandbox might have different configurations and data and might cause a different end result than anticipated.
Action duration has a maximum of 1 minute, if your action takes more than a minutes we recommend splitting the action into batches or using less data.
The default maximum amount of records for an action collection is 200, we recommend to split your action collection into batches when you work with more than 100 records at a time
➝ Next article: Action step functionality
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510179.22/warc/CC-MAIN-20230926075508-20230926105508-00290.warc.gz
|
CC-MAIN-2023-40
| 5,451
| 35
|
https://www.monetdb.org/bugzilla/show_bug.cgi?format=multiple&id=6753
|
code
|
|Summary:||SQL COPY INTO FROM compressed (bz2,xz,gz) file fails|
|Product:||SQL||Reporter:||Stefan Manegold <Stefan.Manegold>|
|Component:||all||Assignee:||SQL devs <bugs-sql>|
Description Stefan Manegold 2019-08-20 13:56:17 CEST
trying to bulk-load from a compressed (bz2,xz,gz) CSV file using COPY OFFSET 3 INTO "data" FROM '$PWD/data.csv.bz2' DELIMITERS ',','\r\n','' NULL AS ''; fails with "Failed to import table 'data', incomplete record at end of file" The problem occurs with Apr2019_release (Apr2019_3), Apr2019_SP1_release (APR2019_7) and the latest head of the Apr2019 branch (changeset ad472c9f29d3).
Comment 1 Stefan Manegold 2019-08-20 14:03:03 CEST
Please find a test at http://homepages.cwi.nl/~manegold/Bug-6753.tar
Comment 2 Sjoerd Mullender 2019-08-20 14:15:33 CEST
Try delimiter '\n' instead of '\r\n'.
Comment 3 Stefan Manegold 2019-08-20 16:13:51 CEST
Thanks! Indeed, all MonetDB decompression code seems to silently replace '\r\n' (CRLF) by '\n' (LF) during decompression (at least on non-Windows systems, i.e., on systems where '\n' (LF) is the standard end-of-line marker, rather than '\r\n' (CRLF)). The plain (non-compressed) CSV reader, however, seems to not do such replacement. Consequently, when loading from CSV files that do contain '\r\n' (CRLF) line-endings, MonetDB's copy into need to specify delimiter '\r\n' when loading from a plain (uncompressed) CSV file, and delimiter '\n' when loading from a compressed CSV file. Otherwise, when using '\r\n' with compressed files, the error reported here occurs, and when using '\n' on plain (uncompressed) CSV files, '\r' occurs in the loaded data (provided the last column is a clob/string/varchar/char(-like; i.e., non-numerical) column). Please take this as an implicit documentation of this current "inconsistency" in the MonetDB code base.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141181482.18/warc/CC-MAIN-20201125071137-20201125101137-00613.warc.gz
|
CC-MAIN-2020-50
| 1,824
| 11
|
https://www.gettysburg.edu/academic-programs/biochemistry-molecular-biology/diversity-statement
|
code
|
The Gettysburg College Biochemistry and Molecular Biology program recognizes and appreciates that diversity strengthens our community and field.
We are committed to creating and sustaining an inclusive environment that welcomes, supports, and respects all of its members, from all backgrounds and experiences. Each and every member is critical to developing a community that values the diversity of experiences including but not limited to race, religion, ethnicity, gender identity, sexual orientation, socioeconomic status, disability, and place of origin. Our members work to connect with and support each member of our community and expect all others to do the same in developing and sustaining an environment that is free from harassment, exploitation, intimidation, and discrimination.
As biochemists and molecular biologists, we have a unique responsibility to use our knowledge, perspectives, and power to build a more equitable, inclusive, and just society. We recognize the ways in which biochemistry and molecular biology as a field has been used to shape and perpetuate biases and practices that are harmful and problematic, and that we must be active in rectifying these issues. We commit to working to ensure an anti-racist future for the program and community. We will work to dismantle the racist, sexist, and otherwise unjust systems within the field in order to develop inclusive, equitable practices. As we do this, we commit to doing so uniformly, transparently, and with the needs of all our members at the forefront. Each member of our community is expected to uphold these values and work towards creating a more inclusive and equitable environment for all our members in the future.
Modified from the Gettysburg College Biology and Chemistry Departments.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00417.warc.gz
|
CC-MAIN-2024-10
| 1,778
| 4
|
http://imgur.com/r/halo/
|
code
|
Bad picture, but I just got a sweet MCC case poster! (The "poster" is made from multiple cases put together)
Comparison of Prophet Mercy In halo 2 (Original in-game vs Blur Pre-rendered CGI)
These seven things are gonna be the reason I don't sleep tonight after watching the Halo 2 Anniversary Trailer (I know that only half of this post belongs on this subreddit btw)
First person to guess the number of fingers on my left hand get this Halo Reach Anniversary Pack DLC Code.
I made a Master Chief tattoo design based off of the ODST tattoo from Forward Unto Dawn.
I guess they pulled the old Post Game Carnage Reports sometime after the bungie/microsoft contract ended. Back in 2010, i screenshot one that was special to me. Glad i did.
I took the Half life 2 elite skull patch and i edited it to look like a 105th ODST style emblem
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268660.14/warc/CC-MAIN-20140728011748-00071-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 833
| 7
|
https://ug.edu.ge/en/announcement/cyber-hackathon
|
code
|
From 20 through 21st of December the University of Georgia with Data Exchange Agency and OWASP will host a Cyber Hackathon.
Within the framework of the event participants will make web-application and cybersecurity programs.
Everyone who’s willing to produce program about Cybersecurity issues can attend the event. They must form a team with 3 active members and present the project on 21th of October.
Different companies will be presented at the event:
At the end of the hackathon, a competent jury of experts from both the public, private and educational sectors will name the winner team.
For additional Information please visit the Link
Registration is available untill 19th of December.
Attendance is free.
Time: 10 AM
Place: The University of Georgia, IV Building, Conference Hall #519
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400241093.64/warc/CC-MAIN-20200926102645-20200926132645-00176.warc.gz
|
CC-MAIN-2020-40
| 795
| 10
|
http://www.bostongis.org/?content_name=srid
|
code
|
SRID stands for Spatial Reference Identifier and SRS ID stands for Spatial Reference System Identifier. A spatial reference system defines a projection, coordinate system, datums and ellipsoids. Morten Nielsen gives and excellent definition of What is a spatial reference system?.
The term SRID is usually used in common GIS database lingo as an integer in an OGC compliant database which is the primary key in a lookup table called spatial_ref_sys (or similarly named table or view). It is used to lookup the spatial reference details of a spatial reference system and most OGC SFQL functions simply use this SRID key defined in the table when doing projection based functions.
In other GIS usage the spatial reference identifier is usually called SRS ID (Spatial Reference System Identifier) and it is usually composed of Author Name and the unique Integer ID defined by that authority of that spatial reference system. For example the common WGS 84 long lat has an identifier EPSG:4326. Massachusetts State Plane NAD 83 meters would be referred to as EPSG:26986. In general the same integer ID part is rarely used by two different authorities so then simply saying 4326 people know what that means and a lot of database systems simply use the Authority's Integer ID for their SRID. Also in general most commonly used SRIDs have author European Petroleum Survey Goup (EPSG) so its safe to leave out the author. So in short the terms SRS ID and SRID are often used interchangeably although they have slightly different meaning.
One thing that is particular confusing is that since the database use of the term SRID is simply a pseudo-dummy id in a lookup table and even you can define your own if you are not satisfied with any of the common ones, you can conceivably have two different SRIDs that define equivalent spatial reference systems or map to the same SRS ID. The database will commonly treat them as different since they have different SRIDs and its less taxing to assume they are different. There isn't even an official rule that states your database SRIDs have to match up with official SRS IDs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818293.64/warc/CC-MAIN-20240422113340-20240422143340-00084.warc.gz
|
CC-MAIN-2024-18
| 2,108
| 4
|
http://www.edugeek.net/forums/windows/print-37053-ethernet-drivers-hp-dc5100-tower-im-stuck.html
|
code
|
I've had to re-install XP Pro SP2 on an HP DC5100 and did this from the supplied recovery disks.
All is fine BUT it hasn't installed the ethernet drivers :(
I got as far as this webpage: HP Compaq dc5100 Microtower PC- Download drivers and software - HP Business Support Center
But how do I know which to use and what do I do with it please?
Sorry I'm having a seriously bad time at the moment and the brain has gone into meltdown.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443869.1/warc/CC-MAIN-20141017005723-00126-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 431
| 5
|
https://discussions.unity.com/t/programming-skills-with-unity/86824
|
code
|
Im new with unity and I want to know one thing :
Do you need any programming skills (in C or C++) with unity?
Thanks you for your help,
Have a great day!
Script Reference: Unity - Scripting API:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00585.warc.gz
|
CC-MAIN-2023-50
| 194
| 5
|
http://sql.server.error.5113.winwizards.org/
|
code
|
The only sql server error 5113
With a black and other with the default editor. I get messed this laptop. I can snap shoot. Thank you are errors mean, I was Update Files that will see:fsutil - Ran the network again. Locked Data Name"StandbySuspendTotalChange"0Data Data Name"StandbyDevicesCount"146Data Ultimate boot cd i/o error Name"StandbyResumeS3BiosInitTime"758Data Data Name"BootPNPInitDuration"411Data Data Name"StandbySuspendLockPageableSectionsChange"0Data Data 9E175B6D-F52A-11D8-B9A5-505054503030.
:Description : hal!HalBugCheckSystem0x1e3 fffff80003c06ae0 fffff8000282e700 : memory_corruption Followup: MachineOwner - WinDbg analyze the ipconfigall and not see the command and deleted). Again, short - a Windows 7 OS to have to do anything, that I added the information or so please help after I noticed a message that I'm in the new W7 (professional) PC is in the Linksys router - according to ask what I don't know where one 'country' gave me from DLL-files.
com. Sql server error 5113 Files E:WinSystemWindowsInstaller and move over the instructions below to work fine. My Help would like pre installed all of I do not find anything.
All sql server error 5113 being turned off my horror stories re installed fresh install the PDF viewer. Someone suggested I need for. I think), I should have been thrown by chance to figure it snaps and do it persists.
I was running the tool. I could be able to work. I have a situation is very much more info and they they should), but they were to 500Mbs. The 2 minutes to Administrative Tools. Then RUN it.
The system files, disable offline sfc scannow reports files of System. Deployment. Application. ShellExposure. ParseAppShortcut(String shortcutFile, DefinitionIdentity subId, Uri providerUri)at System. Click image to the top to format on the 22 1620x1050 - Windows 7 built a prog like when I didn't manage to use the installed but there any kind of 0x0000020 (0x014e6330 0x00000000) The first question may be doing anything.
Veeeeery frustrated on behalf as a alienware motherboard loading a folder in Installed Physical Memory 4. 6 - http:go. microsoft. comen-uswindows7Start-your-computer-in-safe-mode Restart your computer and waited about people have been having this isn't listed twice. 1st time after I have found four Seagate 1TB hitachi HDD and reinstalled.
exe avast_internet_security_setup. exe loads, it did a file Code: 0x8004FE21 HrOnline: NA BIOS valid for your installation disk image NO, but nothing has these 3 weeks it cool in Ext. HDD. But I'm fine until tomorrow ( nt. ::NNGAKEGL::string'0x29ce6 fffff880047faa60 fffff80002cd6853 : 15 minutes remaining steps in Latency Sql server error 5113 (everything else works for help would matter on safe mode and I posted on the mouse or without any that I would try to show all the server first uninstall Avast.
is not I got this for ages to this. Hello,I installed a 32 however it will still clickable. It would appreciate any other things. Would I don't have had very limited copypast operations by "Brink" which drive you have had partitioned. I change times. 0x0000009f with different mose same method in use. If anyone offer you transferring large consumers without UAC and i enter new power button "Donate with horizontal stripes only. I h 1bf3856ad364e35_6. 7601. 17514 Nombre: Windows(R) 7, in disk which has been previously connected via WMP11 and the data will handle internet access to the NumObjectTypes variable 'WixBundleLog' to have authenticated on GTA 5.
Get the BSOD when powered it but i think you're safe for some files. In control panel. Process ID 1003 Task bar, put everything possible method. The WindowsSystem32 which I accidently deleted the motherboard, I just recently, usually happens: I couldn't help would post - Graphics 5600 Monitors 1x; Generic PnP adapter.
that the option instead. You can I get beyond the following "Important" - 750 Ti Phantom CPU: Intel series and it also noticed today It sounds nice. The phenomenology of error williams summary got a first the rest of my laptop without access is enough for incoming mail for restoring little control panelsystem are all my Computer Name resolution time I wanted to this, I find archived directly to constantly at once, its port Now here's why this happened while browsing the case of win updates set my CPU on my wifi network connection is the partition XP back in a specific SUB directories.
Actually earlier versions of booting up saying Windows 7 Pro x64 installer tries to be able to a day, now the abilities they always. Device Driver Sweeper, check the tutorials to run two firewalls (Win, ZA, Modem) are not sure. Sql server 2008 r2 windows installer error attached along with my new one. Display. Can someone please help in advance for any pin down.
Most Recent shortcuts do anything I restarted, the cause. Logs that point; you can perfectly fine - is randomly popped up space so i try using OpenDNS when playing session table Windows Update starts loading temporary account and power the folder icon is a notification area instead of these have found this window for it dose not going to connect the Extended PID: 00426-00178-926-600010-02-1033-7601.
0000-0882016 Installation ID: 55c92734-d682-4d71-983e-d6ec3f16059f Extended PID: 00359-00178-926-800010-02-1033-7600. 0000-3642009 Installation ID: 0x0 LegitcheckControl ActiveX: Registered, Version: NA, hr 0x80070002 OGA Notifications Data- Cached Result: If in what appears and RegionChange the computer specsASUS P9X79 Intel 7 ?Dell tried it says access and half years old.
I've had stored on the advice about sample rate issue as it shouldn't be 6 Brown RXBX 5 people suggest that is supposed to go back ups you have to make my documents list at all. The program has been infected PC). It sounds stupid, im open these reboots without cleanly reinstall MS OFFICE installation or my computer.
I get that this tutorial somewhere that I have a Google Chrome was just using DM Logs and try to set it gets to GPU,AFTER ROOTING AROUND what happens. The right now. However, these at least medium settings.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608642.30/warc/CC-MAIN-20170526051657-20170526071657-00125.warc.gz
|
CC-MAIN-2017-22
| 6,073
| 17
|
https://github.com/dpmforensics/
|
code
|
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 28 million developers.
Automatically identify potentially suspicious emails.
Box Edit Log Parser
A simple script to process VMware GuestAppsCache Folder
Google Activity Log Capture Script
in the last year
February - August 2018
dpmforensics has no activity yet for this period.
Press h to open a hovercard with more details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212040.27/warc/CC-MAIN-20180817104238-20180817124238-00479.warc.gz
|
CC-MAIN-2018-34
| 470
| 10
|
http://smarterhunt.com/a/detail.do/id-ab52edec-3a87-4492-946c-e1a614463b7b
|
code
|
NET Developer with prior financial experience for a local client located in Dallas.The systems are technically complex with extensive interdependencies and stable technology is critical to success of the business.
Candidates should be comfortable working in mission-critical technically heterogeneous environments. Responsibilities include: New project developmentMaintenance of deployed projects/applications/reportsReport generationTechnical break/fixResponsible for balancing tasking from multiple sources and prioritizing work in concert with management and other team membersMinimum of 4 years development experience in .
NET developmentExtensive experience in rapid development methodologiesPrior experience dealing with both managerial and customer related issuesExperience with Relational DatabasesPrior experience with Microsoft SQL Management StudioBasic networking knowledgeExperience with HTML server based technology - C#, .NET 2.
0, JSP, ASP, PHPExtensive experience with C# with .NET 2.
0, 3.5, 4.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383259/warc/CC-MAIN-20130516092623-00048-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,012
| 5
|
https://www.moddb.com/groups/edm/news/artist-project-46
|
code
|
Now, I had been planning on doing this for quite a while, but a preview release of an upcoming song by Project 46, prompted me to begin writing this. In fact, I'm listening to it right now.
I first heard Project 46 on a YouTube channel I've consistently shared on my profile, Monstercat Media. Not only did I start salivating and going into conniptions once I heard the song, but I did my utmost to find out what other songs they had produced. At that point, they had only released the one I heard. However, they have since released many songs, all of which seem to hit HypeMachines top 10 every single time (with several hitting number 1 and staying there). Probably my favorite of their's before the latest preview was this one:
Now sure, there are many great artists out there and many stay in touch with their fans, but Project 46 has taken it to the next level. In addition to the hits that they've released, they continually produce free mashups almost every Friday (the day they call "Pancake Friday"). The songs they release for free are just as good (and some times better) than those they release on Monstercat Media or Beatport.
I certainly think Project 46 has made it big and will continue to do so. If you don't believe me, listen to this preview and let me know what you think!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583884996.76/warc/CC-MAIN-20190123023710-20190123045710-00185.warc.gz
|
CC-MAIN-2019-04
| 1,292
| 4
|
http://www.trekbbs.com/showpost.php?p=8139010&postcount=30
|
code
|
Lee Enfield wrote:
Haha, I get it. You mock the movie.
Well, then I mocked the movie.
P.S. On a more rational thought: I like your contemplations. But Abrams doesn't care shit for our beloved Reasoning-Game. So in the end, it won't make much sense.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274987.43/warc/CC-MAIN-20140728011754-00416-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 248
| 4
|
https://inprogrammer.com/data-science-ebooks-free-online/
|
code
|
Initially what I thought is that the best way to learn data science is through videos. But referring to these books along with videos is super beneficial. So let’s have a look at our amazing and comprehensive ebooks for learning Data Science.
Python Data Science Handbook:
So to begin with the first ebook of Data Science ebooks list that I like to mention is from O’Reilly. The book’s name is Python data science handbook. I’ll tell you what all things this wonderfully written book includes.
So first of all this is a very very good comprehensive guide for Python for data science. If you are very much interested in Python and aspire to become an expert in Python with respect to a fight then you want to implement some data science projects. So I think this book is absolutely perfect.
Secondly, you know it has wonderful quotes which were very very beneficial to me. This book covers all the important libraries as non Python does. The best part is the exploratory data analysis. It becomes more wonderful because the flow that continues after the exploratory data analysis to the machine learning algorithms actually includes a whole lot of things. Which encapsulates a whole idea.
Thirdly when I talk about machine learning it covers both the practical implementation of the libraries and how do they work. Moreover, you will see the advanced concepts like Python graphics libraries, some of the maps which include Seaborn, etc. So definitely I suggest this ebook as a great option for learning Data Science. It is available completely for free and online.
Download Free Ebook :
Think Stats 2e:
The second among the Data Science ebooks that I would like to say is about Think Stats 2e. This Thing stats 2e by Alan B Downing is also an O’Reilly Edition. That means the publisher is O’Reilly.
The best part is that it discovers the practical overview of statistics for Data Science. What I have observed from this particular book is that it uses Data Set from the National Institute of Health. National Institute of Health with respect to various research that they have done they’ve collected those data set. You can use that data set to do a whole lot of things like expert data analysis.
When I specifically say with respect to statistics I think you should prefer this particular book. As it has done a lot of things. If I just see go and see the content the limits of PMF (probability mass function), Percentile, CDFs, representing CDFs, Percentile based Statistics, Random numbers, Modeling distribution, Exponential distribution, Normal distribution, Lognormal distribution, Pareto distribution, like everything is here. All the important scenes that are required actually to cover most of the things in feature engineering have been covered over here.
I suggest that if you have been looking for where should you learn statistics and how should you cover these topics. This book will suffice that. It properly covers each and every concept in statistics. Moreover, it has a lot of examples like Correlation, Covariance, Pearson Correlation, Nonlinear relationships, Spearman’s rank correlation, Coefficient & Causation.
It also covered a separate chapter called hypothesis testing. That is in chapter 9. Along with simple explanations, they have given a lot of examples. That will definitely make it easy for you to learn these things.
R For Data Science:
Now many people are also interested in learning the R programming language for Data Science. So this is the book that I have for them. Again this is from O’Reilly and the author if you see is Hadley Wickham and Garrett Grolemund.
If I just say about this particular book this is the go-to book for learning R programming Language. Above that, it’s available for free in the form of a PDF. It’s a comprehensive guide to do Data Science with R. It covers everything from Data Visualization, Data Manipulation, Data Modeling, Data Transformation, Exploratory Data Analysis, and so on. Additionally, projects are also available here. So you can actually go through this particular book. It will direct you even if you don’t have any amount of expertise in the R programming language.
Rules For Machine Learning:
My next ebook for you is Rules of Machine Learning: Best Practices for ML Engineering written by Martin Zinkevich.
This is also a wonderful document altogether. Primarily this document is intended to help those with a basic knowledge of machine learning. Especially to get the benefits of best practices and machine learning from around Google. This ebook presents a style for machine learning similar to the Google C++ style guide and very same function over here.
You can go and try to click each and every link given into that ebook and try to read. This book is just somewhere around 24 pages and it is a great resource. It covers very good practices that I have learned and has always been beneficial for me.
Now our last Data Science eBook is Deep Learning. It is from an MIT press book co-written by Ian Goodfellow and Yoshua Benglo and Aaron Courville.
Inside this, you’ll be able to see the particular content of Deep Learning. You should also try to read research papers with respect to deep learning then only you’d be getting a whole lot of ideas. I have referred to many research papers so because of that I’m good at deep learning with respect to theoretical concepts and practical implementations. So definitely you should read this ebook.
So these were our 5 Data Science eBooks, and trust me if you start with the Python Data Science Handbook you will already get a whole lot of knowledge about it.
Note: The free pdf provided here should not be used for any unfair means except learning. In case of any copyright violation by us kindly contact us at email@example.com.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.42/warc/CC-MAIN-20231203161435-20231203191435-00328.warc.gz
|
CC-MAIN-2023-50
| 5,793
| 24
|
https://codecamp.ro/masterclasses/data-context-and-interaction-dci/
|
code
|
End users typically approach a computer with a model of an algorithm whereby a network of objects work together to achieve some goal, and object-oriented programming strives to match those mental models.
Its benefits include providing a good match between software solutions and business needs, and ease of programming that is structured around business understanding. Much of what programmers call object-oriented today in fact is altogether something else: Abstract Data Types, each of which should be separately considered as an encapsulated grouping of data and low-level operations.
This mismatch harms software useability and has dramatic software engineering drawbacks. The Data, Context and Interaction (DCI) restores object-oriented thinking to the design and programming world. This tutorial will help you deeply understand object-oriented thinking and learn what it takes to implement it in a modern architecture.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00322.warc.gz
|
CC-MAIN-2024-10
| 924
| 3
|
https://www.ssl.co.rs/en/
|
code
|
Anyone who needs to securely transmit information over the internet.
Use SSL for securing:
- Online credit card transactions, web forms and customer logins.
- Email and webmail applications (Microsoft Outlook Web Access, Exchange & Office Communications Server).
- Corporate communications on intranets, extranets, internal networks, file sharing and Microsoft SharePoint
- Communications on cloud based platforms and virtualized applications
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00029.warc.gz
|
CC-MAIN-2023-50
| 442
| 6
|
https://www.blockchainalmanac.com/real-estate/propy/
|
code
|
Propy hopes to create a smart contract enabled marketplace for real estate, with lower transaction fees and more transparency for title registration.
- Founded 2015
- Palo Alto, California
- Decentralized Real Estate Marketplace
Propy is developing a blockchain-based marketplace for real estate transactions. Their platform will be powered by an Ethereum token called PRO, and will enable users to list properties and execute real estate related transactions at lower costs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473524.88/warc/CC-MAIN-20240221170215-20240221200215-00875.warc.gz
|
CC-MAIN-2024-10
| 475
| 5
|
https://www.hedgehogcentral.com/threads/stackable-tote-housing.3663/
|
code
|
I don't remember seeing this... I personally use one stack of three tubs with hardware cloth for ventilation for mice, but not for hedgies... I would think that'd be a pain unstacking everything when you need to get to each cage every day.
we are just trying to figure out a way to minimize space. as of now we have a room dedicated to our little critters and we are planning on moving so we may not have a whole spare room for them. SOOO we are looking for ways to save space if need be any other space saving ideas for me?
The first two pics shown are of that tub size, and the basic setups. If you scroll down a bit, there's a picture of what Deneen's barn looked like previously. The black and grey shelving fits three tubs. The only problem is heating, if you use that you'd need to use a space heater to heat the whole room.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989914.60/warc/CC-MAIN-20210516201947-20210516231947-00503.warc.gz
|
CC-MAIN-2021-21
| 830
| 3
|
https://ryanparag.com/notes/building-a-community-website
|
code
|
Building a Community Website
A few weeks back (~ late June 2020), I was having trouble tracking down where I could join a few of the local design Slack communities in the Tampa Bay area. There wasn't a central location for me to see which communities were in the area and what events they had coming up.
So, I set out to quickly build a website that would aggregate that data in a central location and help those in the area that were just starting out in design (or are not currently part of any of the communities) to join in on their discussions.
I've been playing with Next.js and Styled Components lately and thought it would be a fun way to experiment with a few modern web tools. In this post, I'll quickly go over how I built it. We needed a few basic functions on the website:
- Show local design communities hosting events
- Post links to join the various local Slack communities
- Allow new, or not listed design communities, to submit their org to be listed
- Allow communities to submit events
Styled Components, and Google Forms, I quickly spun up a small site that lists the major communities designers can join:
Users can fill out the Google Form using the link to notify me about their organization to be listed,
With my limited knowledge as a non-dev, I also needed a way for communities to submit events to a database, but not list them until I can verify them. Some orgs are using Meetup, some using Eventbrite, and some using another event hosting site du jour.
I decided I would just grab all of the currently upcoming events and throw them in an Airtable doc:
By using Airtable, I could grab all upcoming events for all the communities in a single API call. After an event's date had passed, it would no longer be listed. I also included a column called Verified to mark an event as verified and listed in the event list on the website.
If an event was unverified, I would receive a notification and a message on the website, letting me know to verify the event in Airtable, either on Airtable's website or mobile app - case closed 👏.
Hopefully that was helpful in case you want to do the same for your community, or even if you want to help contribute on this website. I'll keep updating this site with more features that could be helpful to other designers in the area, but if you have an idea, ping me using the form below - I'd love to hear about your ideas.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00025.warc.gz
|
CC-MAIN-2023-14
| 2,388
| 15
|
http://stackoverflow.com/questions/2496538/making-vim-git-aware?answertab=oldest
|
code
|
- I use Vim & Git together.
- I tend to merge/switch Git branches alot.
I tend to have lots of vim buffers open.
Is there a way to tell vim: when I execute this git command (which switches branches), reload all buffers? Since I have hooks into all my vim-git interaction, letting vim know when to do the reload is not a problem. The question is: how to force vim to reload all buffers?
You can try setting the
From the vim help:
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701161775.86/warc/CC-MAIN-20160205193921-00022-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 428
| 6
|
http://www.linuxquestions.org/questions/syndicated-linux-news-67/lxer-sa-s-mysql-guru-on-databases-and-the-web-570796/
|
code
|
Published at LXer:
Capetonian Ian Gilfillan is the author of Mastering MySQL 4 and an authority on database management. But, as Vincent Maher found out, he also has a philosophical side that helps rather than hinders him. Vincent first met Ian at the Digital Citizens Indaba last year where they co-presented a panel with Mike Stopforth. Last week he interviewed him for Tectonic.co.za.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119361.6/warc/CC-MAIN-20170423031159-00592-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 386
| 2
|
http://fitness.stackexchange.com/questions/tagged/creatine+hypertrophy
|
code
|
Physical Fitness Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Conceptually, why does creatine increase muscle size?
Muscle contractions are powered by ATP losing a phosphate and becoming ADP. Creatine can give away one phosphate to convert ADP back to ATP. With more ATP, muscles are more powerful. How is any of ...
Nov 6 '11 at 7:13
newest creatine hypertrophy questions feed
Hot Network Questions
How big was the Order of the Phoenix during each of the two Wizarding Wars?
Is it reasonable to use Nagios to check that a service is NOT available?
Choosing between .bashrc, .profile, .bash_profile, etc
Does clicking lead to DoS attack?
How do I get filled black < and \leq?
What is the name of the piano piece Seven of Nine plays?
Is it possible to ping a LAN card through its MAC address?
String method startsWith(String) is case-sensitive or not?
How many required fields are too many?
Foreach loop between two lists
How to react to a reviewer’s comment when he is completely right, but you do not like the consequences?
Can I ask for authorship/acknowledgement for writing small data analysis program for a large study?
How is the data access cursor performance so enhanced compared to previous versions?
Examples of "Non-Logical Theorems" Proven by Logic
Last names that are English words with an extra 'e'
Known characters in passwords?
Figuring out how many megabytes go into gigabytes?
If clones contain all the same genetics: Is there any difference in abilities of clone commanders compared to clone troopers?
Does spyware exist for ubuntu?
Change the inner color of markers
Running sum of the last n integers in an array
Is this kids experiment a legitimate way to show that air has mass?
Holomorphic functions on a complex compact manifold are only constants
What is the opposite of an Epiphany?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268363.15/warc/CC-MAIN-20140728011748-00325-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,408
| 53
|
https://www.developgoodhabits.xyz/whats-data-science-a-beginners-information-to-knowledge-science.html
|
code
|
Needless to say, Machine Learning types the heart of Data Science and requires you to be good at it. Also, you need to have a strong understanding of the domain you are working in to understand the enterprise issues clearly. You should be capable of implementing numerous algorithms which require good coding skills.
Finally, once you have made certain key choices, it is necessary so that you can deliver them to the stakeholders. So, good communication will certainly add brownie points to your skills.
In the ultimate Capstone Project, you’ll apply the talents realized by building a knowledge product utilizing real-world knowledge. At completion, students may have a portfolio demonstrating their mastery of the material. Whether you’re brand new to machine learning or have tried to get models working in Python, Weka could be the perfect starting point for you. Every firm will say they’re doing a type of knowledge science, but what exactly does that imply?
The easiest definition of information science is the extraction of actionable insights from raw knowledge. Our guide will walk you thru the ins-and-outs of the ever-expanding area, together with how it works and examples of how it’s being used right now. In the gaming world, the usage of Machine studying algorithms is growing day by day. EA Sports, Sony, Nintendo, are widely utilizing knowledge science for enhancing consumer experience. As you’ll be able to see in the above picture, you need to purchase various hard expertise and delicate expertise. You must be good at statistics and arithmetic to research and visualize knowledge.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521152.22/warc/CC-MAIN-20220518052503-20220518082503-00065.warc.gz
|
CC-MAIN-2022-21
| 1,614
| 4
|
https://rails.devcamp.com/trails/ruby-programming/campsites/working-with-the-file-system-in-ruby
|
code
|
In this lesson, we are going to learn how to work with files in Ruby, including how to create, edit and append. This information can be particularly helpful when you want to store content on a text file, so that you don't have to rely on a database connection every time. It's good to have some practical knowledge on this.
Ruby does some cool things when it comes to reading from a file, and we are going to see it in this lesson.
devCamp does not support ancient browsers.
Install a modern version for best experience.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710933.89/warc/CC-MAIN-20221203143925-20221203173925-00460.warc.gz
|
CC-MAIN-2022-49
| 520
| 4
|
https://community.retool.com/t/retool-mobile-with-onpremise/21644
|
code
|
I’m evaluating enterprise on premise on docker. Retool is running fine and I’ve added Azure AD SSO and our own wildcard SSL certificate. Retool is running within our own network. Now I want to test Retool Mobile, but I can’t connect to the server. In the Mobile app I’ve selected the on premise option and entered the url to the webapp.
The app then shows an error that it can’t connect to the server.
The device is within the same network and no firewall in between. Dns has been setup and is working fine from any computer.
Do I need to enter a different url? Or port?
And how do I get to sign in using SSO? The app is (now) only showing the username and password field.
Can you visit your Retool instance from your phone using Safari?
Yes, I can acces retool at https://retool-test.domain.com using Safari and am able to login.
When I use the same host in Mobile it shows the error : Something wnet wrong contacting the host at https://retool-test.domain.com
Retool hasn't bee exposed to public internet, only internal. Might that be the issue?
Hi @mbruijnpff, is the mobile device also on VPN? The app can only reach the server if its on public internet by default. Also, it may be worth checking the SSL configuration of the server. For example, if you are using a self signed certificate, that may fail the requests on mobile device.
Another thing you can try is to access retool on mobile safari and see if that works. Usually, the network problems like these are reproducible in the mobile browser too.
There is no VPN involved. Both the retool server and mobile device are in the same network/subnet. Everything behind the same firewall. The retool server currently can't be accessed from outside.
Server -> Switch -> AP -> Mobile
I'm using CA signed certificates.
Do I need to expose the server to internet to connect?
The solution was to allow the server to be accessible from the internet. It's working fine now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00871.warc.gz
|
CC-MAIN-2023-40
| 1,934
| 16
|
https://the.fmsoup.org/t/filemaker-user-group-game-show-meetings-whats-next/2198
|
code
|
There were 2 recent FileMaker user group "game show" meetings that went very well. (links below)
Different people would take sides and duel over a particular FileMaker topic.
The audience would join the debate and everyone would then vote.
With the disclaimer that, in most cases the correct answer is “it depends”, the game show format led to lot of interesting and fun discussions.
Here are outlines of the meetings...
May 2021 Meetup: FileMaker Feature Duel Pt. 1
- Button Bar v. Button
- $$global_variable vs. Global Field
- Perform Find vs Go to Related Record
- Plug-Ins vs. Native?
- Perform Find vs ExecuteSQL
- Get ( UUID ) vs Get ( UUIDNumber )
- Built-in Theme vs Custom Theme
- Transactions vs. "The Easy Way"
DIGFM: FileMaker Feature Fight, Dual Duel Deux (5/13/2021)
- See the clickable "timestamp links" on the Youtube page
Thanks for the shows!
Below are some (unsorted) ideas for more A vs B discussions/duels. These could make up entire meetings or could individually be a portion of a user group meeting.
- Set Variable Script step vs. Let $var for instantiating vars
- Custom Function" vs "Script Function”
- Single vs Multi-File
- SVG Glyphs vs ICONs in container fields
- Tooltips vs Popovers
- Zebra Stripes vs NO Zebra Stripes
- Show Status bar vs Hide Status Bar
- Refactoring Grouped Objects vs leaving them be
- Go to Field vs Go to Object
- Table views vs List views
- Serial Primary Keys vs UUIDs
- Tab Controls vs. Slider+Button Bar
Additional Ideas (more below)
- Unstored Calc field vs Auto-Enter
- Native Accounts vs External Authentication
- color vs colour (sp?)
- "__ID" for primary key vs never using "_" as a prefix
- "¶" vs ¶
- $the_file_paths vs $theFilePaths
- Built-in "Modification fields" vs. Custom Modification fields that can be toggled off and/or ignore some fields.
- Popovers vs. Card Windows
- PSoS vs Script Schedules
- Custom Dialogs vs Layout Dialogs vs. Popovers vs CardWindow (4 teams?)
Sorted relationship vs one line sorted portal vs LastRelatedField_uCT to show most recent record data
What other FileMaker A vs B topics do you thing would be interesting to discussion/duel over?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585522.78/warc/CC-MAIN-20211022212051-20211023002051-00094.warc.gz
|
CC-MAIN-2021-43
| 2,149
| 43
|
https://avidhafoundation.com/2023/09/latest-kannada-songs-2023-complete-list-of-kannada-songs-releases-rocking-star-yash-status-%F0%9F%98%88-shorts-youtubeshorts-kgf-rockingstaryash-hombalefilms-download.html
|
code
|
Latest Kannada Songs 2023 | Complete List of Kannada Songs Releases
Rocking Star Yash Status 😈 | #shorts | #youtubeshorts | #kgf | #rockingstaryash | #hombalefilms | #choixdevie | GPS Editing
Editing Software :-
KGF Chapter 1 : EDITED SHORT
SONG : CHOIX DE VIE
:- Strictly meant for Promotional Purpose.We Do not Wish to make any Commercial Use of this & Intended to Showcase the Creativity Of the Artist Involved.*
⚠️*The original Copyright(s) is (are) Solely owned by the Companies/Original-Artist(s)/Record-label(s).All the contents are intended to showcase the creativity of the Artist.
• I have no rights on the background music
• All of the music and video clips are under the use of fair use
My Copyright Disclaimer:
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. No copyright infringement intended.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100534.18/warc/CC-MAIN-20231204182901-20231204212901-00443.warc.gz
|
CC-MAIN-2023-50
| 1,131
| 11
|
https://docs.microsoft.com/en-us/archive/blogs/rudi_larno/win-a-smartphone
|
code
|
Win a Smartphone
Looking to build applications for mobile devices like the Windows Powered Smartphone or the Pocket PC but don't know where to begin?
Learn247 are please to announce the free "Building Mobile Applications with Visual Studio.NET" online training series presented by the Mobile Devices Division at Microsoft. This is a 3 part hands on training course which has been designed to teach all you need to know to begin building powerful mobile applications using Visual Studio.NET.
Session 1 - Introduction to Windows Mobile Development
Date: - 16th November 10:00 GMT - 11:30 GMT
If you are new to Microsoft's Mobile platform and development tools then why not start with the basics: What is Windows Mobile? What's Microsoft's strategy and view of Mobile platforms? What types of application can I build for Windows Mobile? How can I build them? Deploy them? Where is Microsoft going with the platform?
All these questions and more will be answered in this session. During this session we will build a simple .NET based application using C# or VB.NET to experience the development tools, emulators and debug environment first hand.
Session 2 - Developing Smartphone Applications in Managed Code
Date: - 30th November 10:00 GMT - 11:30 GMT
With the advent of .NET Compact Framework and Windows Mobile 2003, Smartphone application development could not be simpler. In this session we will explore the features of Compact Framework specific for Smartphone development. Most of this session will be dedicated to hands-on work, building your very own snake game.
To take part in any of the series you can sign up by clicking here . Taking part in the training is *free* and *easy* so sign up today!
You need to signup before you can participate and once signed up, we'll contact you nearer the time on how to download the code.
Just for taking part in the training we have a number of prizes to give away to say thank you for attending - including an Orange SPV E200 mobile phone (with Windows smartphone software) for each webcast. One attendee from each session will be chosen at random to win this fantastic prize.
By registering for the training you will receive the training labs in C# and VB.NET before the training takes place.
If you wish to take part in the training and follow along on your own PC you will need to have the relevant software installed. This will include Visual Studio.NET and related SDKs. Full details will of the installation will be sent shortly.
Of course you are welcome attend just to watch if you prefer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401582033.88/warc/CC-MAIN-20200927215009-20200928005009-00129.warc.gz
|
CC-MAIN-2020-40
| 2,543
| 16
|
https://www.lynxpro.com/contractors/virtual%20Reality-developer/london/
|
code
|
Hire Virtual Reality Developers & Contractors in London | LynxPro
Find Virtual Reality Developers in London
We use a highly curated database to find the candidate with the skills most suited to your business’s needs. Browse the talent below, find the perfect fit and our qualified customer service agents will take care of the rest.
Mobile developer with over 8 years of experience developing for Android, iOS and Windows/Windows Phone using the Microsoft stack: C#, .NET, Xamarin, ASP .NET and Azure. Deep knowledge in cross-platform development, diagnosing and fixing application performance issues, and 2D/3D computer graphics. Interested in Augmented Reality and Virtual Reality.
I'm currently working as a Director/ Game Developer of this indie game development company. This company aims to development good iOS, Android arcade games, the game for kids, Augmented Reality apps, and Virtual Reality apps. The main tools we used for development is Unity3d. Have experience with 2d games design and development, develop VR games use google Cardboard SDK, and Oculus SDK. Also, we have experience with developing Augmented Reality apps with Vuforia SDK.
Currently a freelance WordPress and front-end web developer, with a good knowledge of PHP as well. I have a professional attitude and work hard to provide what the client wants, in time and on budget.
I am currently 17 years old ( 01.05.2001 ) and I have variety of skills in the IT and Creative sector.
I have 6 years of experience in working with Photoshop. I also have some experience in the back end of IT, but I prefer working as a Designer in Front End Projects such as logos, posters, flyers and etc. I can also draw really good digitally and on paper.
I am currently studying ICT Level 3 Extended Diploma in the College of North West London and I am trying to find my self a part-time job in the IT sector.
Focused, very strong work ethic, persistence, determination, work well in any capacity in a team, good judge of character, good sense of humour, committed to a continual process of upskilling. Very strong identification with, and understanding of real business world and its requirements. I prefer to remain hands on.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259327.59/warc/CC-MAIN-20190526165427-20190526191427-00351.warc.gz
|
CC-MAIN-2019-22
| 2,190
| 10
|
https://www.freelancer.gr/job-search/scraping-data-html-table-aspnet/
|
code
|
Εφαρμογή jquery-ui plugin (jquery-ui autocomplete / [κάνε είσοδο για να δεις το URL] )σε html φόρμα για καλύτερο user experience. Το p...
...(delay – 15 λεπτά καθυστέρηση) σε διεύθυνση RSS Feed – XML για να χρησιμοποιηθούν σε πινακίδα Led Ticke...
...και στην υποστήριξη αυτού. • Δηλαδή κατασκευή sites ή/και κατασκευή σελίδων μέσα σ&...
...covering throughout this class, from manipulating tidy data to designing and storing data in a relational database to working with hierarchical data to the underpinnings of Client-Server computing and working with Web APIs by providers. It is also intended to be self-defined. Do some exploration and find data from a provider that you are interested in investigating
...whenever a user clicks a specific HTML button. I need you to do the following things: 1. Figure out a way to pass user data to the server side scrip on the HTML button click 2. Write a script that runs on the backend and is triggered on the HTML button click 3. On click Script asks for the API response by sending user data. 4. Once it receives an answer
Project discussed scraping json based IP from site within heroku to write out to new tables Postgresql DB.
I need someone to create/update my Webtemplate, and help with angular routing and running the template on localhost.
...registration check, if there was no registration from same 255.255.255./24 network during the last 3 days. - store new users to DB (MySQL), save username, password, email, IP. Create table structure on the first registration request. You can use any MVC framework. However, you must create a processing module (username validation, request to DB) and template that
I will send you db table sql file ----------------------------------------------------------------------------------------- THE JOB 1- create controller file 2 - create route 3 - create view 4 - on page load detect users location and update map with listings 5 - top search -> searches title -> plots on map 6 - top search drop down (radius) (50
Need a web page in ASP.Net Core MVC that connects to SQL Server database and shows info from one table (15 fields aprox.) in an html table or grid, that allows editing of only 4 fields directly in the grid (through dropdown list), and also allows saving only selected items (through checkboxes).
I am freelancer Web Developer,
Urgently my client need Best Supported, Data Scraping Tool(web crawling Tool ajax)
1).Chrome: Web-tool Scraping data as like [κάνε είσοδο για να δεις το URL]
2). Data Store in phpMyAdmin
3). Fetch Data in
Hello We need to make a html version of simple email in very short time. Has to be prepared for mailchimp > must be as responsive as possible and all possible texts to be textes (not just cutting a few images :) ) Urgent request, simple job, first good (and unrestood) answer will be taken. Thanks
* add 15 DAYS and 30 DAYS * add text box to input text [device_mac_address} and automatically send it to Whatsapp [κάνε είσοδο για να δεις το URL][device_mac_address] *...sellers to see vouchers list on the left pane * delete SellerHVS Banner * change dashboard name to WIFINET * so...
Need to write a python3 program that creates a graph using a textarea. The code will print out the graph in multiple ways and to be able to open up in the webpage when the .py extension is uploaded onto the server. I have a good chunk of the code done. I just need help finishing it.
Need to add 2 new theme page(HTML/CSS) to be merged with an existing website. Need to slice the header and footer of the new theme and use the header and footer of the existing website. Please read the requirement before coming. As the existing website is in HTML and CSS but PHP syntax is used so to include Header and Footer files.
Need an iFrame HTML designed. Will be pulling from 3 different areas. See attached wireframe of desired layout. This will all need to fit on 1200-1400px by 800-1000px screen size. Left Side will feature radar from (see wireframe for desired look) [κάνε είσοδο για να δεις το ...
As per the title, I'm looking for someone that has very good experience with PSD to HTML. My current developers are overbooked and I have constant work for PSD to HTML. Please don't apply if you're a beginner or intermediate. The projects that I'll send your way are quite complex and if you don't provide good work we are both wasting time. Good english
...demand user can send his schematic and receive a quote with price and lead time for its prototype. Very Simple Android Project. - Offer user can choose from a simple table the number of machines he wants to make available and its shift availabilty - For highlight its presence, the offer user must be able to send periodically information to the
I need a PHP system that connect with MYSQL database with 3 tables. One table will save the person information that visit a company and path of 2 photos that use a JS library to take it. The second table will save information about date and gate. The system need a menu to link to the forms. The page will use a CSS very nice that you can create o can
...services to the Nigerian populace (which includes businesses and individuals alike. As part of my marketing drive, I wish to employ the services of an expert web scraper and data miner to assist in organically mining the information detailed below, for 100,000 records (comprising of individuals and businesses) in Nigeria. The information sort after
...term in need of some extra help with our email program! We are looking for an email coder who would be willing to code for 5-10 hours/week for us (from PSD files to responsive HTML). We are looking for someone who won't just cut up the file into images, but can code the text so that it can be edited, etc. We are also looking for someone who can communicate
- Candidate should have strong knowledge in PHP and HTML willing to take responsibilities of customer call handling and should give on time solution based on high priority - Server side Programming - Core PHP (Must) - Object oriented programming using PHP (Preferred if they have). - Experience into CodeIgniter would be an added advantage
Hi..Error with Social media login. when i am going to login or create a new aacount with Facebook and google showing Error in some devices, otherwise it is working well in many mobile phone. it is working well in Desktop and Iphone also
I need a solid works model done of a spanner with a design table of 10mm 11mm 12mm 13mm and 14mm.
I want to build a single page application using latest web technologies. The application will be almost similar to an existing application. Good base code is already built. One need to extend the existing code. Willing to pay extra if I am impressed with quality of work and also will to give more work to him/her.
...economics and managerial reports, at an Hight Academic Level (Master, PhD). ⁃ Should be able to find data and to work properly with them in order to reach conclusions and make comparisons: e.g. between companies. ⁃ Should be able to create graphs, table, diagrams at a digital level and to add them into reports. - Should be willing to sign a not-negotiable
...them to specific whatsapp tel no. 5. Each spin will have a unique serial number that stored in a database. 6. The database will also store mobile no. date and time. (sortable table) PS: I'll start this project within ASAP. I need your full attention, expecting to complete within 3 days. Show me your best UI/UX Mobile finish product. I'll build layout
...analyze and visualise data In some cases we would like to embed data not in Tableau but using Angular We would like to query data from a tableau extract and use Angular to present it, we don't want to present a tableau sheet within an angular page. Data is kept in Tableau extract, it is required to apply filters and select specific data from facts tables
Looking to build an email list of small local businesses in the uk such as restaurants, hairdressers etc, i need someone to extract email addresses from google, yell or bing for a cold email campaign.
Hi..error with Social media login. when i am going to login or create a new aacount with Facebook and google showing Error in some devices, otherwise it is working well in many mobile phone. it is working well in Desktop and Iphone also
I need you to design website's screens and provide high resolution graphic design as well as HTML. we will integrate it with our back end. just need images and HTML for it. Budget is fixed. Deadline is 28th April
Need a freelancer to work on an existing website that is static with two different Bootstrap versions are used due to sperate themes of the pages. In website, PHP syntax is used so same Header and Footer so to include on every different theme page used in the website. Task needs to be done (New fixes) 1.) Need to add new theme Pages that will be provided by me and slice header and Footer so to I...
Gray marble tile Gray marble countrtops Gray marble table Gray marble slab [κάνε είσοδο για να δεις το URL] keywords need to appear 3-5 times evenly [κάνε είσοδο για να δει&sig...
...Parameters can be changed (max distance, to get a different schedule with the students selected. Requirements for the findschedule3 function a)The issue is once the time table is created in thefindschedule3 function it creates a schedule based on distance and availability. We need the time also added so the order of students appears from earliest
Hello, we need an expert team to develop a custom HTML prototype of 4 pages: - Home Page - Feature Page - Leadership Page - Article Page This project is already discussed to be awarded. Thank you.
we need to build a admin system, we have axture prototype file about 50pages, but no sketh, no PSD, we need you design as admin lte 2.0 style. You need have s...50pages, but no sketh, no PSD, we need you design as admin lte 2.0 style. You need have some design experience, you need provide me a perfect design and code, and could fetchin data from ajax.
I have a bunch of HTML pages, the structure is already there, I just need minor changes in css to match the layout I have. I need the mobile version too. I'm using bootstrap 4. Please, send the price per page.
...specific requirements. The app will have 3 main menu items: BUY - SELL - NOTIFICATIONS 1. SELL a. Offline: the cars that are created but not yet on auction. Shows a table with the data: item nr., make, model, age, mileage, date creation carfile, name seller, link to add pictures, link to add 4 criteria. Seller clicks links to add pictures. The camera
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578582584.59/warc/CC-MAIN-20190422195208-20190422221208-00317.warc.gz
|
CC-MAIN-2019-18
| 10,839
| 42
|
http://stackoverflow.com/questions/103844/how-do-i-merge-a-2d-array-in-python-into-one-string-with-list-comprehension
|
code
|
For the second one, there is a built-in string method to do that :
>>> print ','.join(str(x) for x in li2)
For the first one, you can use join within a comprehension list :
>>> print ",".join([",".join(str(x) for x in li])
But it's easier to use itertools.flatten :
>>> import itertools
>>> print itertools.flatten(li)
>>> print ",".join(str(x) for x in itertools.flatten(li))
N.B : itertools is a module that help you to deal with common tasks with iterators such as list, tuples or string... It's handy because it does not store a copy of the structure you're working on but process the items one by one.
EDIT : funny, I am learning plenty of way to do it. Who said that there was only one good way to do it ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678677656/warc/CC-MAIN-20140313024437-00008-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 711
| 10
|
https://cocoontech.com/threads/download-philips-hue.29311/
|
code
|
File Submitter: etc6849
File Submitted: 13 May 2016
File Category: Premise
Contact: post question in respecitve download thread
Control Philips Hue with Premise!
Works with Premise's native lighting class, so you can also change brightness and turn your Hue lights on/off. No extended GUI has been made yet to change lighting color from Premise's web interface, so hopefully if someone uses this, they'll do that.
Automatically imports lights and groups from your Philips Hue Bridge (zigbee based RF bridge that connects to your home network).
For my install, I use scripts that initiate color changes. This module lets you change color of your lights based on events via OnChange scripts you write under respective Home objects. For example, when your phone rings your lights could turn red, when a movie is playing your lights could turn green, etc...
Click here to download this file
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335254.72/warc/CC-MAIN-20220928113848-20220928143848-00117.warc.gz
|
CC-MAIN-2022-40
| 886
| 9
|
http://chzn.fr/blog.html
|
code
|
A hopefully growing repertoire of articles.
- - - - - General - - - - -
Tooling For Community Data Analytics
24 January 2020
- - - - - French - - - - -
Outils: Analyse de données communautaires
07 January 2020
I have yet to find a witty quote about software engineering so I'll put this here, and you'll pretend to laugh, and no one will know. Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370503664.38/warc/CC-MAIN-20200331181930-20200331211930-00040.warc.gz
|
CC-MAIN-2020-16
| 352
| 8
|
https://forum.thegradcafe.com/topic/50272-older-applicant-to-european-phd-programs/
|
code
|
Johndg2 Posted January 31, 2014 Share Posted January 31, 2014 Hello all, I'm just seeing if anyone has experience with applying to PhD programs in Europe. I applied to 10 programs for Fall 2014 in the USA but I really don't think I'm going to get in anywhere given my C/V so I'm looking at options in Europe. From what I've seen so for via websites, you do not take coursework and a lot of times can be directly admitted to a particular lab. This would benefit me as I have a Master's and my research interests are more specific. I have only contacted 2 professors so far, at the University of Dundee in Scotland, and I'm wondering if it would be a good strategy to contact professors before I formally apply to the announcement (usually they have announcements advertising open positions in labs). I am very eager to begin PhD studies, and would prefer to do one in the USA, but I have an unusual background that I feel makes me poised to start doctorate studies, but doesn't look so "good" on paper. I have 11 years of research experience spanning 4 labs. I have 2 publications and one pending in decent journals. My GRE is V(510) Q(700) W (4). My master's g.p.a is 3.2. My undergraduate g.p.a is low, like a 2.4, and I have explained this in an informal letter I wrote that most programs I applied to this cycle has allowed me to give them. Basically, I said that I was not motivated until I finished my undergrad and started doing research. However, the biggest reason I think I don't have a shot this time around is that I was actually in a doctorate program for 2 years but had to quit because my advisor ran out of money and the department couldn't offer me a TA. I had no other choice. My research was going well. What was I to do? Get a fulltime job AND be a student, that would have been insane. My former doctorate advisor and master's advisor are supporting my application and I have strong letters from them. Also not so good, I took four classes as a doc student and made 3 A's and 1 measly C. I have also explained that C in the letter I wrote. My SOP from programs was probably strong too. I dunno, I'm sure that most applicants are actually qualified to do the programs, but it seems so competitive, that I think I'll be passed up for a younger applicant with less research experience with a better academic record (I'm 39). I can see why an addcom would not accept me and this makes me depressed, especially knowing that I'm well capable. So you do you think? Do I have a better shot at getting into a lab in Europe by doing some networking? Thanks for your advice! Link to comment Share on other sites More sharing options...
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!Register a new account
Already have an account? Sign in here.Sign In Now
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00311.warc.gz
|
CC-MAIN-2023-14
| 2,881
| 6
|
http://forums.theregister.co.uk/user/48104/
|
code
|
2 posts • joined 20 Jan 2011
Have you used it yet?
The form factor is the same as other phones, afterall, its a phone. From your post it doesn't sound like you have actually used one yet. Its a different experience than other smart phone vendors. Information from various sources is collected and linked seamlessly, the product is worth a look.
Azure is not strictly a .NET platform. You can write Java as well. PHP, Ruby -- its all supported. When you deploy an app to Azure you are effectively deploying it to a Windows Server virtual machine. That VM doesn't care if its running .NET or Java.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538787.31/warc/CC-MAIN-20140416005218-00566-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 597
| 4
|
https://intl.cloud.tencent.com/document/product/215/31795
|
code
|
Last updated: 2020-04-02 16:15:34PDF
Before using Tencent Cloud VPC, you need to plan the quantity and IP range of your VPC instances based on your business to prevent problems resulting from temporary scale-out or similar.
During planning, pay attention to the belonging region, VPC instances, number of subnets, IP ranges, and route tables.
Each VPC belongs to a specific region (for example, Guangzhou), and each region contains one or more availability zones (such as Guangzhou Zone 1 and Guangzhou Zone 2). You can choose an appropriate region to create VPC instances and subnets.
Note that even if two VPC instances are present in the same region and isolated from each other by default within the private network, private network communication is enabled only in the same VPC by default. To enable private network communication between different VPC instances, establish a peering connection or use CCN.
Planning VPC Instances
Planning a VPC
If your business volume is relatively small and the business is deployed in the same region without the demand for network isolation, we recommend that you plan one VPC.
You can create multiple subnets and route tables in a single VPC to achieve refined traffic management.
Planning multiple VPC instances
In the following scenarios, we recommend that you plan multiple VPC instances:
- Your business is deployed in multiple regions
As VPC instances are region-specific, they cannot be deployed across different regions. When your business is deployed in multiple regions, you must plan multiple VPC instances.
VPC instances in different regions can implement private network communication through peering connection or CCN.
- Multiple businesses need to be isolated from each other
As private network communication is enabled within the same VPC by default, if you have different businesses in the same region need to be isolated from each other, you must plan multiple VPC instances.
Each Tencent Cloud VPC supports creating a maximum of 10 subnets, which are IP address blocks within VPC instances. The IP range of subnets must fall within or be identical to the VPC’s IP range. One VPC can simultaneously contain multiple subnets, and different subnets in the same VPC intercommunicate with each other through the private network by default.
Consider the following when planning subnets:
- Subnet size and number of IP addresses
When creating subnets, ensure that the number of IP addresses in the subnet IP range meets your requirements. However, the size of the subnets should not be too big in case you may need to create new subnets when expanding business in the future.
- Subnet IP range
If the VPC in which subnets are located needs to communicate with other VPC instances or IDCs, ensure that the subnet IP range does not overlap with the IP range of the peer end. Otherwise, private network communication fails.
- Business requirements
A single VPC can be divided into multiple subnets based on business modules, such as deploying the web layer, logic layer, and data layer in different subnets. Access to subnets can be controlled by using Network ACLs.
Planning IP Ranges
Tencent Cloud VPC CIDR supports using any of the following private IP ranges:
- 10.0.0.0 - 10.255.255.255 (The mask must range from 16 to 28.)
- 172.16.0.0 - 172.31.255.255 (The mask must range from 16 to 28.)
- 192.168.0.0 - 192.168.255.255 (The mask must range from 16 to 28.)
IP range explanation
- To create multiple VPC instances that need to communicate with each other or with IDCs, ensure that the IP ranges of VPC instances do not overlap with each other. Otherwise, peering connections and CCN do not work.
- If your VPC needs to communicate with the basic network, create a VPC with the IP range falling within
10.[0-47].0.0/16or its subsets. Classiclink cannot be created for VPC instances in other IP ranges.
- If subnet IP ranges overlap, you can change subnets of instance and then use CCN. Alternatively, you can re-create a VPC or purchase a CVM.
Planning Route Tables
A route table is used to control the traffic route within a subnet. Each subnet can be bound to one route table. Tencent Cloud VPC instances support the default route table and custom route tables.
Planning a route table
If the traffic route requirements of different subnets in your VPC are the same or similar, we recommend that you plan one route table. You can create different routing policies to control different traffic routes.
Planning multiple route tables
If the traffic route requirements of different subnets in your VPC are different, we recommend that you plan multiple route tables. To do this, bind subnets with corresponding route tables based on different requirements, and control specific traffic routes by defining routing policies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396495.25/warc/CC-MAIN-20200528030851-20200528060851-00545.warc.gz
|
CC-MAIN-2020-24
| 4,778
| 40
|
http://louantonelli.blogspot.com/2009/03/dance-with-me-henry-now-available-by.html
|
code
|
I had a thought. While POD printing is convenient, it isn't cheaper than mass producing books. The Lulu version of "Dance" is over $20, so I have gone back and modified the account so it's available via pdf download.
Stumbled across this video on YouTube recently. It's an abbreviated version of the song, but hey, dig those crazy go-go dancers.
Of course, whenever I hear this song I think of "The Witch of Waxahachie".
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948537139.36/warc/CC-MAIN-20171214020144-20171214040144-00211.warc.gz
|
CC-MAIN-2017-51
| 420
| 3
|
https://www.sawdustandrustmusic.com/when-could-you-first-short-bitcoin-on-bitmex
|
code
|
BitMEX Review What You Should be aware of
Before you can begin trading with BitMEX it is possible that you would like to know a bit more about the site and how it works. Learn more about KYC and other crucial topics. We’ll also cover the various kinds of fees and deposits, as well as liquidation and contract provisions. We’ll also discuss ways to find help if you have questions.
What exactly is Bitmex?
BitMEX is an online exchange that allows users to trade Bitcoins in a secure manner. It is simple to sign up and only takes a couple of minutes. To begin, you must enter your email address and country of residence. Once you’ve completed these, you can begin trading immediately. It is also possible to contact customer support by email, and you can find information on the Knowledge Base.
BitMEX has faced some issues with regulators in the past. In the past the company was under investigation by the US Commodity Futures Trading Commission (CFTC). It is believed that the CFTC believes that BitMEX might have violated the law. The company’s founders were charged with allegations of violating laws such as the US Bank Secrecy Act. They were released after they paid the bond of $5 million. However, their non complying with the law hurt their reputation and hurt traders.
How does it work
BitMEX is a platform that allows professional investors the opportunity to buy Bitcoin. It lets them make deposits in Bitcoin and also to purchase and sell futures and options. All margin deposits and profits are in Bitcoin. The company’s services are accessible via the desktop web, application and various other platforms.
The most well-known features in BitMEX is the capability to use leverage. Certain crypto currencies are traded using up to 1:20 leverage. Many other coins trade using leverage of up to 1:100. For traders who are new to trading, however, this level of leverage is not recommended. The traders can choose the leverage level they wish to utilize under the box for orders.
Limit orders and market orders are two kinds of orders that are available on BitMEX. Market orders and limit orders are two types of order that can be made on BitMEX platform. These orders depend on certain price, and will be filled when the price is at that level. They generally cost less than market orders, and are a good option if you want to leave the market in a short time. Market orders however will be filled instantly however they will be charged more charges as compared to limit order.
Is it Legit?
BitMEX, or “Bitmex,” is a cryptocurrency exchange operating within the Seychelles. It offers trading services to all users, although the company does not allow US customers to use its services. BitMEX has strict rules that prohibit customers from trading with cryptocurrency in the US. It suggests that US traders look for an alternative exchange that will accept users from US.
While the BitMEX exchange isn’t regulated however, it has taken a number of measures to guarantee its users’ security. For instance the exchange has implemented the multi-signature method to ensure that transactions are secure and safe. Additionally, all transactions through the platform are kept in a secure, offline location. No information of the user has ever been lost or stolen due to hacking or other security breaches. In the end, it has established itself as an extremely reliable platform for crypto traders.
An Bitmex KYC review should show how the KYC procedure works to verify the identity of an account owner. As of this writing the exchange hasn’t been the target of an attack that has been successful. Furthermore, BitMEX uses PGP-based communication daily audits, as well as other tools that are secure in the top financial institutions. However the exchange has experienced many legal issues. A recent example is an incident where the exchange mistakenly disclosed the names and addresses of the registered users to anyone with access to a computer and internet connection. This caused a great deal of confusion and an intense debate about security issues in the crypto world.
In order to trade with BitMEX, you must complete a KYC verification procedure. The procedure requires you to present a picture of an authentic ID document as well as a document proving your address. Some exchanges may even require an image to prevent fake IDs from getting through. You will also be inquired about your trading experience and the origin of any money you deposit. If you are not able to successfully complete the KYC process on a site like BitMEX then it is impossible to withdraw your money out of your bank account.
The BitMEX platform has a wide range of options to meet your requirements. You can select between futures, perpetual contracts, and a rate for funding which changes every eight hours. Similar to any cryptocurrency exchange, it is important to understand the distinction between each type of product prior to making a decision on a trade.
The fees that BitMEX is charged are very minimal compared with other exchanges. The fees are only a small percent of the value you trade, not a high percentage like other platforms. In contrast to other exchanges, the fees don’t depend on quantity or leverage. You’ll even be able to test margin trading without paying any commissions.
BitMEX charges no fees when you buy or sell Bitcoin and Tether. However, you’ll need to pay fees to withdraw funds. If you have any questions regarding charges, you can reach BitMEX’s customer service team by clicking on the Contact Us link on the website. Be sure to provide your contact information, the topic of your query, as well as a brief description of the issue in the email body.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00181.warc.gz
|
CC-MAIN-2023-23
| 5,702
| 17
|
http://downloads.nbastuffer.com/download-nba-box-score-stats-in-excel/
|
code
|
Data sets of the previous 6 seasons and current season are available. In case you need to get updated downloads throughout the season as more games are played, subscribe to the weekly data set delivery service and have the downloads in your email on every Sunday morning.
FEATURES OF DATA SETS
A season file includes teams’ game-by-game box score data for all games played in regular season and playoffs.
Data set is presented in tabular form and each row has following fields:
- Scores: Quarter-by-quarter and final game scores.
- Basic stats: Team totals for field goal attempts, total assists, total rebounds, etc.
- Advanced stats: Game-by-game possession, pace, offensive,defensive efficiency.
- NBA odds: Opening point spreads and points total (O/U lines) for each game.
- Rest days: Team’s own and opponent’s days of rest.
- Starting lineups: Position-by-position player matchups included.
- Box score links: Link to the official box score page at NBA.com for each game.
Note that data sets of the game-by-game player stats are offered separately!
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381630/warc/CC-MAIN-20130516092621-00024-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,060
| 12
|
http://sourceforge.net/p/gcaldaemon/discussion/643348/thread/dfe98fca
|
code
|
I just installed GCAL Daemon on an OpenSuse installation running Kontact calendar. Everything seemed to go OK and I was able to verify my Gmail account settings once set up in Config Editor. However, when I run Standalone-Start.sh, I keep getting an error as follows (some characters have been changed to protect account security):
FATAL | Fatal service error!
java.io.FileNotFoundException: https:/www.google.com/calendar/ical/davesones%40gmail.com/private-e79a9c511910c689b451b534a7ab5ad3d5/basic.ics (No such file or directory)
The ical address was copied directly from my Google Calendar account, so I can't figure out why it's being rejected.
Can anyone suggest a solution please?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132495.49/warc/CC-MAIN-20140914011212-00276-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 685
| 5
|
http://tech.ericschuetz.com/2012/02/what-desktop-oss-could-learn-from.html
|
code
|
So, you have that fancy Android, iPhone, Blackberry, or some other smartphone or tablet. You have your favorite apps installed. You immediately notice updates every few days (if there is active development). You install them happily knowing that the developers are putting out the latest edition of the app for you. You also feel comforted knowing you never have to worry about if the software you have installed is outdated, putting you at risk, or not having all of the latest features. Mobile apps, in my opinion, are revolutionary in the sense that the user never has to worry about having to open a variety of websites, or the app just to check for those updates. However, as long as desktop OS’s have been around, you still have to do the leg work to just see if there are updates, even if you don’t intend to use that particular app at that time. Why is that?
After nearly maybe 30+ years of Desktop OS’s running the lead, why haven’t they implemented something like a “market” as seen on mobile OS’s? Yes, there are millions of apps out in the wild for practically ever facet of our computing lives, but there never has really been anything solid to mimic this on your Windows or Mac computers. Ubuntu seems to be the ONLY desktop OS that actually appears to do anything remotely like this. A few other Linux distro’s seem to do this, as well.
There are a LOT of aspects of mobile OS’s that are catching on very quickly that users take advantage of, and enjoy. Particular for me is the auto-update that I am talking about. I do not enjoy having to go back every so often on my computer and check updates for software. I also do not like opening an application I intend to use just to get a pop up telling me about an update I have not been aware of that has put my currently outdated version MONTHS behind.
Admittedly, updating software on a desktop computer is tedious and time consuming. Not only do you have to install the software, but you may have to reboot the computer after the updates. On your smartphone or tablet, you don’t have to go through that rigor. You simply update and go. Now, come on Windows, Mac, and even Linux. Get with the game!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211126.22/warc/CC-MAIN-20180816152341-20180816172341-00379.warc.gz
|
CC-MAIN-2018-34
| 2,181
| 4
|
https://www.bluematador.com/landing/watchdog/prometheus-monitoring-alternative/
|
code
|
Replace Your Slow Prometheus Configuration With Watchdog’s Zero-Config, Automatic Alerts
–Dr. Frederick Ryckbosch, Department of Applied Mathematics, Computer Science and Statistics, University of Ghent, Belgium
Watchdog includes Essential Alerts™ out of the box and takes less than a minute to install, while Prometheus can’t even offer anomaly detection. See how Watchdog stacks up.
System admins don’t have time to investigate every little problem. But they need to be aware of issues that lead to downtime. Why spend precious time on something as common as server monitoring?
Let Watchdog guard your hardware — automatically — by installing our Smart Agent and get proactive alerts on:
VM steal time
–Andrew Hurd, Sr. Software Engineer, ZipBooks
Small and lightweight, Watchdog can be set up on all your servers in minutes thanks to its 23-second install
As a startup, you know you need to monitor your servers and apps, but you are also trying to bootstrap and trim costs where possible. Watchdog installs on all your systems for free, giving you zero-config Essential Alerts™ (CPU, memory, swap space, etc.) and Custom Alerts in minutes.
When your business is scaling to meet the demands of your customers, you need to ensure high uptime and availability for retention and loyalty. Watchdog takes only 23 seconds to install, and Custom Alerts are easy to configure on the fly.
Setting up Watchdog on existing large installations is easy because there is no config required to get Essential Alerts on even hundreds of servers.
Part 1: Installing Prometheus Daemons
STEP 1: Download the source archive
Go to the Prometheus download page and download the source archive. Once downloaded, extract the sources, by running:
$ tar -zxvf Prometheus-3.4.0.tar.gz
Enter the correct Prometheus version in the command. It must match the name of the downloaded archive.
STEP 2: Create user account
For all of the Prometheus daemon processes, an unprivileged user is required. If a Prometheus daemon is started from an unprivileged user account, it will run as that user.
However, if a daemon is started from a 'root' account, it will switch to a 'Prometheus' user account, which must be present. To create such a user account (in its own group, “Prometheus”) on Linux systems, run:
useradd -g Prometheus Prometheus
Running Prometheus as root, bin, or any other account with special rights is a security risk.
STEP 3: Create Prometheus database
For Prometheus server and proxy daemons, as well as Prometheus frontend, a database is required. It is not needed to run Prometheus agent.
SQL scripts are provided for creating database schema and inserting the dataset. Prometheus proxy database needs only the schema while Prometheus server database requires also the dataset on top of the schema.
Having created a Prometheus database, proceed to the following steps of compiling Prometheus.
STEP 4: Configure the Sources
When configuring the sources for a Prometheus server or proxy, you must specify the database type to be used. Only one database type can be compiled with a server or proxy process at a time.
To see all of the supported configuration options, inside the extracted Prometheus source directory run:
To configure the sources for a Prometheus server and agent, you may run something like:
./configure --enable-server --enable-agent --with-mysql --enable-ipv6 --with-net-snmp --with-libcurl --with-libxml2
--with-libcurl configuration option with cURL 7.20.0 or higher is required for SMTP authentication, supported since Prometheus 3.0.0.
--with-libcurl and --with-libxml2 configuration options are required for virtual machine monitoring, supported since Prometheus 2.2.0.
To configure the sources for a Prometheus server (with PostgreSQL etc.), you may run:
./configure --enable-server --with-postgresql --with-net-snmp
To configure the sources for a Prometheus proxy (with SQLite etc.), you may run:
./configure --prefix=/usr --enable-proxy --with-net-snmp --with-sqlite3 --with-ssh2
To configure the sources for a Prometheus agent, you may run:
You may use the --enable-static flag to statically link libraries. If you plan to distribute compiled binaries among different servers, you must use this flag to make these binaries work without required libraries. Note that --enable-static does not work under Solaris.
Using --enable-static option is not recommended when building server.
In order to build the server statically you must have a static version of every external library needed. There is no strict check for that in configure script.
Command-line utilities Prometheus_get and Prometheus_sender are compiled if --enable-agent option is used.
Add optional path to the MySQL configuration file --with-mysql=/<path_to_the_file>/mysql_config to select the desired MySQL client library when there is a need to use one that is not located in the default location.
It is useful when there are several versions of MySQL installed or MariaDB installed alongside MySQL on the same system.
Use --with-ibm-db2 flag to specify location of the CLI API.
Use --with-oracle flag to specify location of the OCI API.
STEP 5: Make and install everything
If installing from SVN, it is required to run first:
$ make dbschema
$ make install
This step should be run as a user with sufficient permissions (commonly 'root', or by using sudo).
Running make install will by default install the daemon binaries (Prometheus_server, Prometheus_agentd, Prometheus_proxy) in /usr/local/sbin and the client binaries (Prometheus_get, Prometheus_sender) in /usr/local/bin.
To specify a different location than /usr/local, use a --prefix key in the previous step of configuring sources, for example --prefix=/home/Prometheus. In this case daemon binaries will be installed under <prefix>/sbin, while utilities under <prefix>/bin. Man pages will be installed under <prefix>/share.
STEP 6: Review and edit configuration files
You need to configure this file for every host with Prometheus_agentd installed.
You must specify the Prometheus server IP address in the file. Connections from other hosts will be denied.
You must specify the database name, user and password (if using any).
The rest of the parameters will suit you with their defaults if you have a small installation (up to ten monitored hosts). You should change the default parameters if you want to maximize the performance of Prometheus server (or proxy) though. See the performance tuning section for more details.
You must specify the server IP address and proxy hostname (must be known to the server), as well as the database name, user and password (if using any).
With SQLite the full path to database file must be specified; DB user and password are not required.
STEP 7: Start up the daemons
Run Prometheus_server on the server side.
Make sure that your system allows allocation of 36MB (or a bit more) of shared memory, otherwise the server may not start and you will see “Cannot allocate shared memory for
See the "See also" section at the bottom of this page to find out how to configure shared memory.
Run Prometheus_agentd on all the monitored machines.
Make sure that your system allows allocation of 2MB of shared memory, otherwise the agent may not start and you will see “Cannot allocate shared memory for collector.” in the agent log file. This may happen on Solaris 8.
If you have installed Prometheus proxy, run Prometheus_proxy.
PART 2: Installing Prometheus web interface
Copying PHP files (4 commands)
Prometheus frontend is written in PHP, so to run it a PHP supported webserver is needed. Installation is done by simply copying the PHP files from frontends/php to the webserver HTML documents directory.
Common locations of HTML documents directories for Apache web servers include:
It is suggested to use a subdirectory instead of the HTML root. To create a subdirectory and copy Prometheus frontend files into it, execute the following commands, replacing the actual directory:
cp -a . <htdocs>/Prometheus
If installing from SVN and planning to use any other language than English, you must generate translation files. To do so, run:
msgfmt utility from gettext package is required.
Additionally, to use any other language than English, its locale should be installed on the web server. See the "See also" section in the “User profile” page to find out how to install it if required.
Installing the Frontend
In your browser, open Prometheus URL: http://<server_ip_or_name>/Prometheus
You should see the first screen of the frontend installation wizard.
Make sure that all software prerequisites are met.
Enter details for connecting to the database. Prometheus database must already be created.
Enter Prometheus server details.
Review a summary of settings.
Download the configuration file and place it under conf/ in the webserver HTML documents subdirectory where you copied Prometheus PHP files to.
Providing the webserver user has write access to conf/ directory the configuration file would be saved automatically and it would be possible to proceed to the next step right away.
Finish the installation.
The Prometheus frontend is finally ready after all of these steps. The default username is Admin, password Prometheus.
As open source software, Prometheus is offered for free once you make it through the installation. Hosted Prometheus is a third-party option. You can skip the painful installation process detailed above, but then you have to budget for your needs
Add on inevitable support contracts, a developer salary to maintain your configuration, and paid courses to learn it, and you can see why Prometheus isn’t really free.
Create a free Blue Matador account
You can get started by creating your account here
Install the Blue Matador Smart Agent, which is automatically configured with Watchdog alerts.
On Linux, just enter:
curl -L -s "https://app.bluematador.com/install?os=linux" | sudo ACCOUNT="a67acd6e68f872b807a1c9afe3a2453564e67877" API_KEY="f80d0ca101e967b50b730ddf8e8aca0de85e8df6" AGENT_TAGS="env:prod" bash
Receive Essential Alerts™ on your servers without any config on your part. Set up Custom Alerts for any arbitrary alert you need for your setup.
$0 - Free Forever
We aren’t kidding when we say it’s free.
We get the frustration of fighting fires all the time, always balancing the need to fix production, add more monitoring, and do more of the real DevOps work you were hired to do.
Watchdog is free forever because we want to help system admins get ahead of the firefighting curve. Our founders spent years doing on-call DevOps monitoring, day and night.
–Aaron Mefford, VP of Technology & Development, DMG
You can download and install Watchdog on your own just by creating a Blue Matador account instantly. There’s no waiting around for permission or approval.
Watchdog really is free. Not convinced? Use our pricing calculator below to doublecheck.
Watchdog is fully featured for as many servers as you want. There are no user limitations, feature paywalls, data restrictions, update restraints, or alert throttling.
Your monthly bill would be
Did you think we were kidding?
Watchdog really is free forever.GET FREE SERVER MONITORING
Watchdog runs entirely on your server. In fact, after installing the Blue Matador Smart Agent, your server detects hardware anomalies and generates the report metrics itself. And it does this with the amazingly low overhead that our Smart Agent provides (<2% CPU overhead, <2% memory usage, and 90% gzip compression).
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187827853.86/warc/CC-MAIN-20171024014937-20171024034937-00283.warc.gz
|
CC-MAIN-2017-43
| 11,508
| 106
|
http://photoshopcafe.com/cafe/archive/index.php/t-649.html
|
code
|
11-29-2002, 12:17 AM
I was wondering if someone could tell me where I could find out how to make icons... I'd really appreciate this
11-29-2002, 06:49 AM
I couldn't say for Windows, but if you're on a Mac it's simple. Take any small bit-map graphic in Photoshop (or similar app), select a rectangle of approx. icon size (in PS use the rectangular Marquee tool), and copy to the clipboard (Command C).
In the Finder (Mac's desktop), select a file you want this icon added to, and hit Command I (or File Menu > Get Info > General Information).
In the box that pops up, click on the current icon at the top left, and Paste: Command V. Presto!
To get fancier: First copy the present icon from the target file's Get Info box, and paste it into a PS doc, so you'll have a sort of template -- or at least a reference to show you the correct size.
Now with the Pencil tool, construct an original icon. Zoom right in so you can see what you're doing (Com. - a few times) , and make the Pencil just 1 or 2 pixels in size( press [ a bunch of times).
Then select and Copy as describe above, and Paste back into the file's Get Info icon thumbnail.
It can't be too different on Windows, but regretfully I'm PC ignorant.
Powered by vBulletin® Version 4.2.0 Copyright © 2013 vBulletin Solutions, Inc. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698222543/warc/CC-MAIN-20130516095702-00001-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,307
| 11
|
http://www.contrib.andrew.cmu.edu/~nsharifr/
|
code
|
Office: 6607 Gates Hillman Center, Carnegie Mellon University.
Hi, and welcome to my webpage. I’m a first year PhD student in Language Technologies Institute, and I’m working with my advisor, Prof. Christopher James Langmead, on Graphical Models applied to protein structure modeling. We’re currently working on Estimation and Inference for continuous multivariate models of backbone torsion angles, including multivariate Gaussian model and von-Mises model.
Prior to my PhD, I was a Master student here in LTI, working on Statistical Machine Translation with Stephan Vogel.
Graphical Models, Parameter Estimation and Inference on Continuous Multivariate Models, Regularization, Protein/Protein Interaction, Drug Design, Protein Structure Prediction, Structural Biology, Computational Biology.
15-879 Algorithms for Computational Structural Biology
10-810 Computational Genomics
11-762 Languages and Statistics II
Publication and Technical Reports
Narges Sharif Razavian, Selen Uguroglu, and Andreas Zollmann.
“Species Selection for Phylogeny-Based Motif Detection”, Computational Genomics
project report, 2009.(link)
Narges Sharif-Razavian and Andreas Zollmann. “An Overview of
Nonparametric Bayesian Models and Applications to Natural Language Processing”,
Languages and Statistics II project report, January 2009.(link)
Narges Sharif Razavian, Stephan Vogel, “Fixed Length Word Suffix as New Factors in
Factored Statistical Machine Translation”, Language Technologies Institute, Student
Research Symposium, September 2009.(link)
Narges Sharif Razavian, Stephan Vogel, “The Web as a Platform to Build Machine
Translation Resources”, International Workshop on Intercultural
Collaboration(IWIC2008), Stanford, USA February 2009.(link)
M. Keikha, Narges Sharif-Razavian, Farhad Oroumchian, Hassan Seyedrazi,
“Document Representation and Quality of Text: An Analysis”, Survey of Text Mining:
Clustering, Classification, and Retrieval, Second Edition, Chapter 12, pp219-232,
Springer London, ISBN 978-1-84800-046-9, July 2007.(link)
Narges Sharif-razavian, Fattaneh Taghiyareh, “Embedding Corporate Blogging System
in CRM Solutions” Information Technology: New Generations, 2008. ITNG, Las Vegas,
USA, April 2007.(link)
See my Facebook account. :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00084-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 2,274
| 28
|
https://forum.xda-developers.com/showthread.php?t=977674&page=2566
|
code
|
Originally Posted by RaiZProduction
Should I make a thread in this section where people share the cringi-est anecdotes they have ?
Guilty as charged! Have at it!
Why is it that the video quality of a good Blu-ray disc which is only 1080p, still surpasses that of 4K streaming sites such as Netflix?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259452.84/warc/CC-MAIN-20190526185417-20190526211417-00174.warc.gz
|
CC-MAIN-2019-22
| 298
| 4
|
https://dawn.googlesource.com/dawn/+/refs/heads/chromium/4749
|
code
|
|author||fujunwei <email@example.com>||Sun Dec 05 05:29:44 2021 +0000|
|committer||Dawn LUCI CQ <firstname.lastname@example.org>||Sun Dec 05 05:29:44 2021 +0000|
Make the prefix of proc table configurable in api.json Add a metadata to configure the prefix of proc table and Make proc table flexiable with the prefix and declared functions. BUG=dawn:1201 Change-Id: Id28e5521506fa5dc8efca90a7883fbd3dd548e8d Reviewed-on: https://dawn-review.googlesource.com/c/dawn/+/71526 Commit-Queue: Junwei Fu <email@example.com> Reviewed-by: Austin Eng <firstname.lastname@example.org>
Dawn is an open-source and cross-platform implementation of the work-in-progress WebGPU standard. More precisely it implements
webgpu.h that is a one-to-one mapping with the WebGPU IDL. Dawn is meant to be integrated as part of a larger system and is the underlying implementation of WebGPU in Chromium.
Dawn provides several WebGPU building blocks:
webgpu.hversion that Dawn implements.
User documentation: (TODO, figure out what overlaps with the webgpu.h docs)
Apache 2.0 Public License, please see LICENSE.
This is not an officially supported Google product.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710685.0/warc/CC-MAIN-20221129031912-20221129061912-00711.warc.gz
|
CC-MAIN-2022-49
| 1,135
| 10
|
https://logiclounge.com/how-to-install-windows-8-consumer-preview-on-a-flash-drive/
|
code
|
Update: Though this works on Windows 8 previews, this will not work on the final release of Windows 8. Please consider purchasing Windows 8 Enterprise or higher to achieve this feature.
As hinted and said from Microsoft, Windows 8 will include a feature called Windows To Go, a feature that will allow to run Windows 8 off an external drive. While that is not going to be ready till the retail release of Windows 8, there is a way of having Windows 8 Developer Preview and Windows 8 Consumer Preview. To create a Windows 8 Consumer Preview To Go flash drive, you will need…
- A 32GB (or larger) bootable Flash Drive (I have tried using a 16GB flash drive with success though it is not recommended. Also, a fast flash drive is highly recommended as a lot of files will be written and read)
- A Windows 8 Developer Preview/Consumer Preview iso
- The Windows Automated Installation Kit (AIK) for Windows 7
- Some type of compression software that can extract files from an iso and cab file (7Zip and WinRAR are just to name a few)
- A DVD writable disc (depending on how you are installing it)
…and depending on the way you want to install it (as we will discuss later)
- We need to get the imagex file from The Windows Automated Installation Kit (AIK) for Windows 7. We can do this by using the file compression software to extract the Neutral.cab file and using the same compression software, extract the F1_imagex file and rename it to imagex.exe.
- Extract all of Windows 8 iso contents in a folder
- Insert the imagex.exe file in the \sources\ folder you extracted
- Depending on how you want to install it….
With installing Windows 8 on a hard drive or a virtual drive in a virtual machine
- Install Windows 8 Consumer Preview on the hard drive or a virtual drive
- Have the extracted Windows 8 files in the drive
- Go to Command Prompt and Run as Administrator
Without Installing Windows 8 on a hard drive or a virtual drive in a virtual machine
- Re-iso up the folder with the imagex file inside the folder and set it to be bootable
- Burn the iso to a DVD writable disc
- Have another flash drive (4GB or larger) on hand to move the files to
- Burn the regular Windows 8 iso you downloaded from Microsoft
Now we are going to boot the computer and run command prompt without installing Windows 8 Consumer Preview
- Boot the computer/virtual machine and set it to boot the disc
- Select the language, time, and keyboard type, and click next
- Click on Repair Your Computer when it ask you if you want to install Windows 8
- When you are in the Repair Your Computer Option, select Troubleshoot
- When you are in the repair windows option, select the more Advanced options
- When you are in the advanced options, elect Command Prompt
From this point on, the instructions should be close to the same for all three options. We will first format the USB drive to be an active NTFS drive
- Plug (and mount if you are using a virtual machine) in the USB you want to have Windows 8 Consumer Preview on
- When you are in command prompt type the command into Command Prompt
- We will need to list all of the disks available, so we will need to list all of the disks with
- We will need to select disk we want to use, so we will list the disk with
select disk #
Note: Replace # with the USB drive number containing the disk you want to use to have Windows 8 Consumer Preview
- We will need to clean the current partition of the drive (Warning: Like formatting, you will lose all of the file you have on that drive. Make sure you want to wipe the selected drive and make sure it is the right drive you are selecting [it should be about 32GB if you are using a 32GB USB flash drive]) by typing
- We will need to create a new primary partition on the drive by typing
create partition primary
- We will need to format the partition to NTFS by typing.
format fs=ntfs quick
- We will also need to set it as active by typing
- We are now done with formatting the drive so we can exit diskpart by typing
We are now going to install Windows 8 Consumer Preview onto the flash drive
- Locate where you have the Windows 8 Consumer Preview Installation files that also have the imagex.exe file we have inserted.
- Go into the sources folder.
- Install the files into the flash drive by using the command (Note: This will take 1 to 3 hours to do, so you should do something else while it is installing).
imagex.exe /apply install.wim 1 <the drive letter of the drive you want to have Windows 8 Consumer Preview on>:\
- We will need to set the Master Boot Record (MBR) of the flash drive to go to Windows 8 files we have by using the command.
bcdboot.exe <the drive letter of the drive you want to have Windows 8 Consumer Preview on>:\windows /s <the drive letter of the drive you want to have Windows 8 Consumer Preview on>: /f ALL
- Exit command prompt.
- Reboot the computer and tell it to boot of the flash drive.
- Follow the onscreen guide.
- Note: It will ask you for the key. Windows has provided a key for Windows 8 Consumer preview when you have downloaded the Windows 8 Consumer Preview iso so you can test out Windows 8.
In our test, we can use the flash drive on multiple machine. In the first initial boot when using the drive on another computer, it will take some time installing all of the drivers it needs to operate; though after the initial bootup on another machine, it will boot quicker than the initial boot. The only machines that we are unable to boot are the Intel Pentium 4 line computers. As there is a lot of files being written and read at the same time, it is highly recommended to have a fast flash drive. Even though you may have a flash drive, it is somewhat a little sluggish. I would recommend you remove any necessary things you do not need and set the desktop theme to Basic mode.
As a note: LogicLounge is not responsible if your computer, operating system, or files is destroyed from this instructions. You are reformatting a drive, and mistakenly setting the wrong drive can destroy your primary drive.You are at your own risk of doing this.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817239.30/warc/CC-MAIN-20240418191007-20240418221007-00282.warc.gz
|
CC-MAIN-2024-18
| 6,066
| 55
|
https://www.delawareonline.com/story/opinion/2017/01/24/if-fake-news-fools-you-can-fool-robots-too/96997590/
|
code
|
If fake news fools you, it can fool robots, too
Uninformative as fake news may be, it's shedding light on an important limitation of the algorithms that have helped make the likes of Facebook and Google into multi-billion-dollar companies: They're no better than people at recognizing what is true or right.
Remember Tay, the Microsoft bot that was supposed to converse breezily with regular folks on Twitter? People on Twitter are nuts, so within 16 hours it was spewing racist and anti-semitic obscenities and had to be yanked. More recently, Microsoft released an updated version called Zo, explicitly designed to avoid certain topics, on the smaller social network Kik. Zo's problem is that she doesn’t make much sense.
The lesson from these experiments: Algorithms, machine learning, artificial intelligence or whatever else you’d like to call such things are not good at general knowledge and understanding. They can avoid a blacklist of topics, or respond in some special way to a whitelist, but that’s about it. They have no underlying model of the world that allows them to make nuanced distinctions between truth and falsehoods. Instead, they rely on pattern matching from a large corpus of consistently true information.
That’s not to say they can't infer information, or that they are logically flawed. They excel in tiny, toy universes where the rules of the game are precisely understood and consistent -- games such as chess or go, for example. They can even handle trivia, as the success of IBM's Watson in playing Jeopardy has demonstrated.
Watson's ability to study and recall data involves a lot of sophisticated machine learning and graph theory. But those data -- the “ground truth” for Watson, consisting of articles, research reports, blogs and tweets found on the internet -- must be reliable. If the internet were half wrong, or 99 percent wrong, Watson would be terrible at Jeopardy.
Our society is embroiled in a debate about what is true, what is opinion and what is propaganda, and it leaves most of us confused. Why should artificial intelligence be any different?
It would be great if an algorithmic gatekeeper could help us out. Google, for one, has done a pretty good job of algorithmically vetting websites for quality. Even here, though, groups devoted to propaganda around Jews, women, Hitler and Muslims have managed to game autocomplete and search algorithms, leading users to bogus websites. Google has cleaned up the more embarrassing examples, but by employing a sophisticated version of blacklisting rather than any deep change in its algorithmic methodology.
If we must rely on lists, can we at least crowdsource them? Facebook apparently hopes to do so by getting its users to flag fake news and using outside fact-checking resources. This sounds like a pretty good idea until you consider the success that fake news creators have already enjoyed -- including in getting real people to repost their disinformation. If they can game Google, they will likely game the “flag the fake” system, too, if only by flagging everything and overwhelming the fact-checkers.
Algorithms have worked really well for the past few decades, mainly because people tended to post mostly trustworthy or useful information. Companies such as Google and Facebook, which have a lot of money riding on the algorithms, will naturally try to make the case that the public should keep trusting them. But in an environment of intentionally false information, users will need to move past the algorithms and decide which individuals -- and which news sources -- to rely on for vetted information.
Cathy O'Neil is a mathematician who has worked as a professor, hedge-fund analyst and data scientist.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711013.11/warc/CC-MAIN-20221205064509-20221205094509-00076.warc.gz
|
CC-MAIN-2022-49
| 3,728
| 11
|
https://www.scottishjobsonthe.net/bluehost-performance-cloud-hosing/
|
code
|
Bluehost Performance Cloud Hosing
Finding a high-grade cheap web hosting company isn’t easy. Every site will have different requirements from a host. And also, you have to contrast all the features of an organizing company, all while seeking the best bargain possible.
This can be a great deal to kind with, specifically if this is your very first time purchasing hosting, or developing a website.
Many hosts will certainly use extremely affordable initial prices, just to raise those rates 2 or 3 times higher once your initial get in touch with is up. Some hosts will provide free bonuses when you register, such as a free domain name, or a cost-free SSL certificate.
While some hosts will have the ability to offer much better performance as well as high degrees of safety and security. Bluehost Performance Cloud Hosing
Listed below we dive deep right into the best economical host plan there. You’ll discover what core organizing attributes are essential in a host and also how to analyze your own organizing needs to ensure that you can choose from among the best affordable hosting service providers below.
Disclosure: When you acquire a web hosting package via web links on this web page, we make some compensation. This helps us to maintain this site running. There are no additional costs to you whatsoever by utilizing our links. The listed here is of the best economical webhosting plans that I’ve directly utilized and checked.
What We Take into consideration To Be Affordable Webhosting When we describe a host package as being “Inexpensive” or “Spending plan” what we indicate is hosting that comes under the price bracket between $0.80 to $4 monthly. Whilst researching low-cost hosting providers for this guide, we looked at over 100 various hosts that fell into that rate array. We after that assessed the top quality of their most affordable organizing bundle, worth for money as well as customer support.
In this write-up, I’ll be looking at this first-rate site holding firm and stick in as much appropriate details as possible.
I’ll go over the attributes, the pricing options, and also anything else I can think about that I assume might be of benefit, if you’re determining to sign up to Bluhost as well as get your websites up and running.
So without additional trouble, allow’s check it out.
Bluehost is one of the greatest host business worldwide, getting both huge marketing support from the business itself and also affiliate online marketers that promote it.
It actually is a huge firm, that has been around for a long time, has a large reputation, and also is most definitely among the top selections when it concerns web hosting (absolutely within the leading 3, at least in my publication).
Yet what is it specifically, as well as should you obtain its solutions?
Today, I will address all there is you require to recognize, provided that you are a blogger or a business owner who is seeking a web host, and doesn’t understand where to start, given that it’s a terrific solution for that target market in general.
Let’s picture, you wish to host your sites and make them noticeable. Okay?
You already have your domain (which is your site destination or LINK) but now you wish to “transform the lights on”. Bluehost Performance Cloud Hosing
You require some holding…
To achieve every one of this, and also to make your internet site visible, you require what is called a “web server”. A server is a black box, or tool, that saves all your internet site data (files such as photos, texts, videos, web links, plugins, as well as various other info).
Currently, this server, has to get on constantly and also it needs to be connected to the net 100% of the time (I’ll be stating something called “downtime” later).
On top of that, it additionally requires (without getting also fancy and also into information) a file transfer protocol generally called FTP, so it can show internet browsers your site in its designated type.
All these things are either pricey, or call for a high degree of technological skill (or both), to create as well as keep. As well as you can completely head out there and learn these things on your own and set them up … but what regarding instead of you purchasing and keeping one … why not simply “renting out hosting” instead?
“This is where Bluehost can be found in. You lease their servers (called Shared Hosting) and also you introduce a site using those servers.”
Given that Bluehost keeps all your documents, the company additionally permits you to set up your material administration systems (CMS, for short) such as WordPress for you. WordPress is an incredibly popular CMS … so it just makes good sense to have that alternative readily available (virtually every holding company now has this option too).
In short, you no more need to set-up a server and after that integrate a software application where you can construct your web content, independently. It is already rolled into one bundle.
Well … picture if your server remains in your house. If anything were to occur to it in all, all your documents are gone. If something fails with its interior processes, you need a technician to repair it. If something overheats, or breaks down or gets damaged … that’s no good!
Bluehost takes all these inconveniences away, and looks after whatever technical: Pay your web server “rent”, and they will certainly look after everything. And as soon as you get the service, you can then begin concentrating on including content to your internet site, or you can place your effort into your advertising and marketing projects.
What Solutions Do You Obtain From Bluehost?
Bluehost offers a myriad of various services, yet the main one is hosting of course.
The organizing itself, is of different types incidentally. You can lease a common web server, have a dedicated web server, or additionally a virtual exclusive web server.
For the purpose of this Bluehost evaluation, we will focus on hosting solutions and various other services, that a blog writer or an on the internet business owner would certainly need, instead of go too deep into the rabbit opening and also discuss the other services, that are targeted at more seasoned folks.
- WordPress, WordPress PRO, as well as e-Commerce— these organizing solutions are the packages that allow you to organize a website making use of WordPress and also WooCommerce (the latter of which enables you to do ecommerce). After acquiring any of these plans, you can start constructing your internet site with WordPress as your CMS.
- Domain name Market— you can additionally get your domain from Bluehost instead of other domain name registrars. Doing so will certainly make it easier to direct your domain name to your host’s name servers, because you’re utilizing the very same industry.
- Email— once you have actually acquired your domain name, it makes good sense to additionally obtain an email address connected to it. As a blog writer or on-line entrepreneur, you need to practically never use a complimentary e-mail service, like Yahoo! or Gmail. An email similar to this makes you look unprofessional. The good news is, Bluehost provides you one totally free with your domain name.
Bluehost likewise uses committed servers.
As well as you may be asking …” What is a specialized web server anyway?”.
Well, the thing is, the fundamental webhosting packages of Bluehost can just so much web traffic for your internet site, after which you’ll need to update your hosting. The factor being is that the common servers, are shared.
What this implies is that a person server can be servicing 2 or more web sites, at the same time, among which can be yours.
What Does That Mean For Yourself?
It indicates that the solitary web server’s resources are shared, and also it is doing multiple jobs at any type of offered time. When your internet site begins to hit 100,000 site sees each month, you are mosting likely to require a devoted web server which you can additionally obtain from Bluehost for a minimum of $79.99 each month.
This is not something yous should bother with when you’re starting out but you should keep it in mind for certain.
Bluehost Rates: How Much Does It Cost?
In this Bluehost review, I’ll be focusing my attention generally on the Bluehost WordPress Hosting bundles, because it’s one of the most preferred one, and also highly likely the one that you’re searching for and that will certainly suit you the very best (unless you’re a significant brand, firm or website).
The three offered plans, are as follows:
- Fundamental Strategy– $2.95 per month/ $7.99 normal rate
- Plus Strategy– $5.45 each month/ $10.99 normal rate
- Choice Plus Strategy– $5.45 per month/ $14.99 routine cost
The very first cost you see is the price you pay upon join, and the second price is what the price is, after the very first year of being with the firm.
So primarily, Bluehost is going to charge you on a yearly basis. As well as you can likewise select the quantity of years you intend to organize your site on them with. Bluehost Performance Cloud Hosing
If you choose the Fundamental plan, you will certainly pay $2.95 x 12 = $35.40 starting today and by the time you enter your 13th month, you will now pay $7.99 each month, which is additionally billed per year. If that makes any type of feeling.
If you are serious about your web site, you should 100% obtain the three-year choice. This implies that for the basic strategy, you will certainly pay $2.95 x 36 months = $106.2.
By the time you strike your fourth year, that is the only time you will pay $7.99 per month. If you think about it, this approach will certainly save you $120 during three years. It’s not much, yet it’s still something.
If you intend to get more than one internet site (which I very suggest, and if you’re significant, you’ll probably be getting even more at some time in time) you’ll wish to utilize the selection plus strategy. It’ll permit you to host endless websites.
What Does Each Plan Offer?
So, when it comes to WordPress holding strategies (which resemble the common hosting strategies, but are extra tailored towards WordPress, which is what we’ll be focusing on) the attributes are as follows:
For the Fundamental strategy, you get:
- One site only
- Safe internet site via SSL certificate
- Optimum of 50GB of storage space
- Cost-free domain for a year
- $ 200 advertising credit history
Remember that the domain names are bought separately from the hosting. You can obtain a cost-free domain name with Bluehost below.
For both the Bluehost Plus hosting and Choice Plus, you get the following:
- Limitless number of internet sites
- Free SSL Certification. Bluehost Performance Cloud Hosing
- No storage or data transfer restriction
- Complimentary domain for one year
- $ 200 marketing credit score
- 1 Workplace 365 Mail box that is cost-free for thirty day
The Choice Plus strategy has an included benefit of Code Guard Basic Alternative, a back-up system where your data is conserved and also replicated. If any type of collision occurs and your web site data vanishes, you can restore it to its initial kind with this function.
Notice that even though both strategies set you back the same, the Choice Strategy then defaults to $14.99 per month, normal rate, after the collection quantity of years you’ve picked.
What Are The Benefits Of Using Bluehost
So, why pick Bluehost over other host solutions? There are hundreds of webhosting, a lot of which are resellers, but Bluehost is one choose few that have actually stood the test of time, and also it’s probably one of the most well known around (and also forever factors).
Right here are the 3 major benefits of picking Bluehost as your host service provider:
- Web server uptime— your website will not be visible if your host is down; Bluehost has greater than 99% uptime. This is very vital when it comes to Google SEO as well as positions. The higher the much better.
- Bluehost rate— exactly how your server feedback establishes how quick your internet site reveals on an internet browser; Bluehost is lighting quick, which indicates you will lower your bounce price. Albeit not the most effective when it concerns loading speed it’s still widely crucial to have a fast speed, to make user experience far better and much better your position.
- Unrestricted storage— if you get the Plus strategy, you need not bother with how many documents you keep such as videos– your storage ability is unrestricted. This is really important, since you’ll most likely encounter some storage problems in the future down the tracks, as well as you don’t desire this to be a trouble … ever.
Last but not least, client assistance is 24/7, which indicates regardless of where you remain in the globe, you can speak to the support team to fix your website issues. Pretty common nowadays, yet we’re taking this for provided … it’s also very crucial. Bluehost Performance Cloud Hosing
Additionally, if you’ve gotten a cost-free domain with them, after that there will be a $15.99 fee that will be subtracted from the quantity you originally acquired (I picture this is because it kind of takes the “domain name out of the market”, not exactly sure about this, however there probably is a hard-cost for registering it).
Finally, any kind of requests after 1 month for a reimbursement … are void (although in all sincerity … they need to possibly be stringent right here).
So as you see, this isn’t necessarily a “no questions asked” plan, like with several of the other organizing choices around, so make sure you’re all right with the policies prior to proceeding with the organizing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711121.31/warc/CC-MAIN-20221206225143-20221207015143-00323.warc.gz
|
CC-MAIN-2022-49
| 13,791
| 81
|
https://chemistry.stackexchange.com/questions/131571/why-are-polynuclear-carbonyl-complexes-coloured
|
code
|
We know that polynuclear carbonyls are colored and their intensity increases with increase in metal ions. But why does the color arise?
I am aware that this is due to some transition between electronic energy levels; but, what sort of transition takes place? Is it due to transition between orbitals that are largely localized on the ligands i.e. CO, or is due to transition between orbitals localized on metal frame work?
I have tried gathering some information about the same and I have found something called metal to ligand charge transfer (MLCT) that is responsible for colors in complexes, but I am not sure whether this is applicable in this case or not.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154500.32/warc/CC-MAIN-20210804013942-20210804043942-00004.warc.gz
|
CC-MAIN-2021-31
| 661
| 3
|
https://github.com/jlfwong/speedscope/wiki/Importing-from-Firefox
|
code
|
Join GitHub today
Importing from Firefox
To record a performance profile in Firefox, open the developer tools and switch to the performance tab.
Click the "Start Recording Performance" button.
When you're done recording, click the "Stop Recording Performance" button.
When it's finished processing, click on "save".
This should save with a filename like
You should be able to open that file in https://www.speedscope.app/.
To view it offline, you'll need to install speedscope via
npm install -g speedscope
Then you should be able to open it like so:
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158205.30/warc/CC-MAIN-20180922064457-20180922084857-00262.warc.gz
|
CC-MAIN-2018-39
| 550
| 11
|
https://bollymovies.ucoz.com/index/how_to_find_serial_numbers_on_google/0-69
|
code
|
How To Find Serial Numbers On Google
ok, this is a little trick that i usually use to find cd keys with google.
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.
1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for.
2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
Step 1:- If your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up.
this works great in google.
I hope this trick help you finding your ccd keys easily
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257605.76/warc/CC-MAIN-20190524104501-20190524130501-00100.warc.gz
|
CC-MAIN-2019-22
| 824
| 9
|
https://www.frenchsole.com/store/ballet-flats/pointed-toe/penelope-stone-grey-leather-snake-en216/
|
code
|
Penelope Stone Grey Leather Snake (EN216)
These brand new Penelope comes in a uniquely rich, deep stone grey snakeskin print leather with black trim. Made with care in our European factory, they are fully leather lined with a comfortable rubber sole and small heel for added support. These shoes are perfect for adding a sophisticated yet fun touch to your wardrobe.
We recommend that you take one size larger than usual. For example, if you are usually a size 6 UK, we recommend you to take a size 7 UK.
Our size guide is a generic reference for all our customers, and it is based on our customers’ experiences. However, because it is generic, there might be some individuals for which it is not representative.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474641.34/warc/CC-MAIN-20240225171204-20240225201204-00390.warc.gz
|
CC-MAIN-2024-10
| 714
| 4
|
https://github.com/pavpanchekha/dropbox.el
|
code
|
dropbox.el, A Dropbox Client for Emacs
dropbox.el provides lets your read and write Dropbox files from
dropbox.el, you'll need to authorize it to connect
to your Dropbox. Run
customize-group, with group
should see a field for your Dropbox "access token".
To create this token, navigate to the Dropbox developers console and click through the questions to create a new Dropbox app. (Choose the "Dropbox API" option and give it access to the full Dropbox.)
Click "Create App", and you'll be taken to the new app's details page. Find the text "Generate Access Token" and click the "Generate" button below it. Copy and paste the long random string you get in response into the "access token" field in Emacs. Save the buffer, and you're ready to use Dropbox.
Once you have saved your access token, you can use
simply attempting to open a file in any folder beginning with
For example, if you open the path
/db:, you'll get a Dired window in
the root of your Dropbox folder. You can use many of the usual Dired
commands from here; you can also open files to edit them.
dropbox.elseems to be incompatible with Helm.
dropbox.el supports much of the functionality you'd expect from an
Emacs Dropbox client. A few otherwise-reasonable features aren't yet
- Some file operations are still in progress (like file and directory copy and rename)
- None of the
process-filevariants are supported.
- Not all optional arguments are implemented for many functions.
- Symbolic and hard links aren't handled, though Dropbox must somehow handle them internally.
- Race conditions abound. Don't use
dropbox.elsimultaneously on multiple machines.
- The setup for this package is incredibly confusing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824675.15/warc/CC-MAIN-20181213101934-20181213123434-00163.warc.gz
|
CC-MAIN-2018-51
| 1,677
| 25
|