url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://vpnbestuifgiot.netlify.app/benker86064duzi/windows-8-net-framework-download-malu.html
|
code
|
In Windows 7 SP1 and Windows Server 2008 R2 SP1, Update for Microsoft.NET Framework 4.8 (KB4503548) is displayed as an installed product under Programs and Features in Control Panel. In Windows Server 2012, Update for Microsoft Windows (KB4486081) is displayed under Installed Updates in Control Panel.
windows 8 net framework free download - Microsoft .NET Framework 4.8, Microsoft .NET Framework Redistributable Package, Microsoft .NET Framework 1.1 Service Pack 1, and many more programs The runtime includes everything you need to run existing apps/programs built with .NET Framework. Download .NET Framework 4.7.2 Runtime. Developer Pack. The developer pack is used by software developers to create applications that run on .NET Framework, typically using Visual Studio. Download .NET Framework 4.7.2 Developer Pack Jan 11, 2019 · Microsoft has released update 3005628 for the .NET Framework 3.5 on Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2. Individual, small-business, and organizational users should use the Windows automatic-updating feature to install the fixes from Microsoft Update. To do this, see Get security updates automatically. Downloads for building and running applications with .NET Framework 4.0 . Get web installer, offline installer, and language pack downloads for .NET Framework. .NET Framework 3.0 latest version download free offline installer setup exe file for all windows 32 and 64 bit. .NET Framework 3.0 is a software framework for Microsoft product developed by Microsoft Inc.
Jan 14, 2020 · For all Windows operating systems except Windows RT 8.1: Download the Microsoft .NET Framework 4.8 offline installer package now. For Windows RT 8.1: Download the Microsoft .NET Framework 4.8 package now. For information about how to download Microsoft support files, see How to obtain Microsoft support files from online services.
windows 8 framework free download - Microsoft .NET Framework 4.8, PDF Reader for Windows 8, Windows 8 Codecs Pack, and many more programs
The .NET Framework 4.8 is not supported on: Windows 10 1507; Windows 10 1511; If you're using Windows 10 1507 or 1511 and you want to install the .NET Framework 4.8, you first need to upgrade to a later Windows 10 version..NET Framework 4.6.2. The .NET Framework 4.6.2 is the latest supported .NET Framework version on Windows 10 1507 and 1511.
Jan 29, 2017 · Hi everyone, I have been trying to update the .NET Framework on my Windows 8.1 machine from 4.5.1 to 4.5.2 (I checked my .NET Framework version according to the instructions here: windows 8 framework free download - Microsoft .NET Framework 4.8, PDF Reader for Windows 8, Windows 8 Codecs Pack, and many more programs Apr 27, 2015 · Microsoft NET Framework Offline 18.104.22.168 is available to all software users as a free download for Windows 10 PCs but also without a hitch on Windows 7 and Windows 8. Compatibility with this net framework offline installer software may vary, but will generally run fine under Microsoft Windows 10, Windows 8, Windows 8.1, Windows 7, Windows Vista Download .NET Framework for Windows. Fast downloads of the latest free software! Click now Apr 27, 2015 · This net framework offline installer software download is currently available as version 22.214.171.124. Compatibility may vary, but generally runs on a Microsoft Windows 10, Windows 8 or Windows 7 desktop and laptop PC. Microsoft.NET Framework 3.5 Offline Installer has been tested for viruses, please refer to the tests on the "Virus Tests" page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00557.warc.gz
|
CC-MAIN-2023-23
| 3,530
| 6
|
https://issues.apache.org/jira/browse/CXF-1721
|
code
|
According to the Web Services Addressing 1.0 specification the format for an Action is (non-fault case):
[target namespace][delimiter][port type name][delimiter][input|output name]
The following definition of delimiter is supplied:
"is ":" when the [target namespace] is a URN, otherwise "/"."
I have a WSDL with the following relevant values:
target namespace - urn:xyz/BLAH
port type name - BlahServicePortType
input name - CountStuffRequest
I would expect CXF to generate the action:
However it appears to use a dot ('.') to delimit the fields:
I will dig around the cxf-rt-ws-addr module to see if I can narrow this down further...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990449.41/warc/CC-MAIN-20210514091252-20210514121252-00588.warc.gz
|
CC-MAIN-2021-21
| 635
| 11
|
https://fixhackedwebsite.com/dns-history-and-dns-queries/
|
code
|
Domain Name Systems:
Domain Name Systems (DNS) is called Internet phonebook. DNS helps to convert the numbers of IP addresses into human-readable domain names, allowing us to browse the internet or send emails without understanding what’s behind them. On any online service domain names can be easily used, and they work well with almost all kinds of web-based goods.
All Internet-connected devices contain a unique IP address that other machines use to locate the device. With DNS servers, IP addresses like 192.168.1.1 (in IPv4) or newer alphanumeric IP addresses like 2400: cb00:2048 need not be memorized.
Working of the DNS
If a DNS server receives a request for information about an address or name within the domain from outside the domain, it provides the authoritative response. When a server receives a request for information about an address or a name outside that domain from within its own domain, it then passes the request on to another server, which is mostly the one operated by its Internet service provider. Whether that server doesn’t know the answer or the authoritative source for the answer, the top-level domain will then go to the DNS servers. This is accompanied by forwarding the request on for the particular domain to the authoritative server. The response then flows along the same direction backwards.
Types of DNS Queries
In a typical DNS lookup three kinds of queries can occur:
The DNS client enables a DNS server to return the best possible answer. If the queried DNS server fails to match the query name, a request will then be returned to an authoritative DNS server for a lower domain namespace level. The DNS client then submits a question to the referral address. The process continues with additional DNS servers down the database chain until there is either a timeout or an error.
This happens when a DNS resolver client asks a DNS server for a record it has access to either because it is authoritative for the record, or the record is inside its cache. In general, a DNS server can cache DNS records to reduce additional bandwidth usage and upstream server load.
In this question, if the resolver is unable to locate the record, a DNS client would need a DNS server to address the client either with the resource information requested or with an error message.
Taking a look at DNS history
If you have a very long history of working with the same customers for several years, there is always the possibility that someone on a website may change a DNS record and then this person will want to change it back as well. Often people simply forget to log stuff, and you may be put in a position where you’re trying to figure out what IPs your custom name servers were set to, or what the old nameservers were.
DNS and domain names are used for legal activities, while there are also those who focus on the Internet’s dark side, creating DDOS botnets, setting up phishing domains, sending SPAM, spreading viruses and malware, or actually launching any other illicit digital services.
Security specialists from private and public entities work together to identify these dishonest individuals in order to evaluate different internet resources and gather information that could help track their actions. Here are some of the primary areas to be discussed when performing a domain name and DNS audit:
- Perform enumeration of documents
- Explore all associated subdomains
- Analyze DNS documents, such as MX, NS, A records, etc.
- Explore answer to PTR records
- Test the past of your DNS records
- Find related IP-neighbors domains
- Explore past and present Internet hosting companies
- Detecting current and past DNS servers
- Find matching domains behind an email address
How Does DNS Boost Site Performance?
Servers will store the answers they obtain over a limited time period to maximize performance. This helps them to respond quicker when a request for the same lookup comes in next time. For example, if someone in an organization tries to access the same training video on the same day on a specific website, the local DNS server will only have to fix the name once, and then it will be able to handle all the other requests out of its cache. The amount of time that the record is held is configurable; longer values lower the server load and shorter values ensure the most reliable responses.
Fixhackedwebsite is considered to be the only viable solution offering a full network security stack containing more than just a managed CDN and DNS. The following main Network security features are included in this web security tool:
Secure Content Delivery Network (CDN)
Fixhackedwebsite has a global distributed cloud network that aims to boost the efficiency of websites and web applications.
Web Application Firewall (WAF)
The Fixhackedwebsite WAF provides advanced security, filtering, and intrusion protection as a efficient, real time edge protection for websites and web applications.
Security Information and Event Management (SIEM)
The SIEM comes with improved intelligence capable of exploiting current events and data from 85M+ endpoints and 100M+ domains.
Such screening helps service providers and retailers to continue to comply with the Payment Card Data Security Standard for Industry (PCI DSS).
Malware Monitoring and Remediation
It function not only detects malware but also offers the methods and tools to delete it, and avoids potential malware attacks.
Cyber Security Operations Center (CSOC)
The CSOC consists of a team of always-on trained cybersecurity experts in charge of delivering round-the-clock monitoring and remediation services.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100555.27/warc/CC-MAIN-20231205172745-20231205202745-00206.warc.gz
|
CC-MAIN-2023-50
| 5,612
| 37
|
https://mathoverflow.net/questions/199849/brandts-definition-of-groupoids-1926
|
code
|
The definition of a category is usually attributed to Mac Lane and Eilenberg (1945). What seems to be less known is that the german mathematician Heinrich Brandt has developed the notion of a groupoid already in 1926 (motivated by questions on quadratic forms). The paper "Über eine Verallgemeinerung des Gruppenbegriffes" introduces, names and studies (connected) groupoids explicitly. The object-free definition is used, so that groupoids look very much like groups except that the product is only defined partially.
Well, first of all I have to say that it is quite amazing that the definition of a category is basically already there in Brandt's paper. Just erase the inverse elements from Axiom III. The paper doesn't really mention the arrow picture stressed by Mac Lane and Eilenberg, although the notions "einander rechts" (sharing the same codomain) and "einander links" (sharing the same domain) are introduced for groupoid elements aka morphisms.
See here for a list of further early publications on groupoids.
Nowadays, groupoids are usually seen as special categories. (Curiously, in homotopy type theory, categories are seen as special $\infty$-groupoids.) But the definition of a groupoid has appeared 20 years before the definition of a category. This leads to many (related) questions:
- Why did it take 20 years?
- Does the study of groupoids have influenced the development of the notion of a category?
- Did Mac Lane and Eilenberg know the work on groupoids?
- Is Brandt's work rather unknown? (Why?) Or have you heard of it before?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988774.18/warc/CC-MAIN-20210506235514-20210507025514-00239.warc.gz
|
CC-MAIN-2021-21
| 1,553
| 8
|
http://lists.relax-and-recover.org/pipermail/rear-devel/2018-October/001702.html
|
code
|
[rear-devel] [rear/rear] 4d4a00: Update default.conf
jsmeix at suse.com
Wed Oct 31 12:12:53 CET 2018
Author: Johannes Meixner <jsmeix at suse.com>
Date: 2018-10-31 (Wed, 31 Oct 2018)
Fixed typo 'Rela-and-Recover' => 'Relax-and-Recover'
**NOTE:** This service has been marked for deprecation: https://developer.github.com/changes/2018-04-25-github-services-deprecation/
Functionality will be removed from GitHub.com on January 31st, 2019.
More information about the rear-devel
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144165.4/warc/CC-MAIN-20200219153707-20200219183707-00304.warc.gz
|
CC-MAIN-2020-10
| 475
| 9
|
https://www.indymedia.org.au/keywords/internet.html
|
code
|
A homepage for activists and social revolutionaries with lots of features such as search tools, links and webtools to make your surfing easier.
A homepage for activists and social revolutionaries, its an anarchist homepage with lots of web tools, links and almost all search engines including torrent search.
It also features a small text forum for communication, information and sharing with other users, And Guerilla Radio and webchat.
Check it out, and ttry it out. http://www.startpage.a-revolt.org/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494852.95/warc/CC-MAIN-20230127001911-20230127031911-00393.warc.gz
|
CC-MAIN-2023-06
| 503
| 4
|
https://discuss.flarum.org/d/11714-fof-terms-ask-your-users-to-accept-tos-and-privacy-policy?page=3
|
code
|
clarkwinkelmann Yes I've thought of that but couldn't find any useful use case. If something is optional, it's usually connected to something else and would make more sense as a separate extension. For example a newsletter opt-in would be better handled by a separate extension adding its own checkbox and syncing the state accordingly.
Yes, it makes sense, thanks for the answer.
What would you like to use that feature for ?
I need to add up to 4 separate conditions for acceptance - 3 required, 1 not,
but for this one I will use the solution described in this thread.
Scratch that. I said it too early. The idea is that the user could, but he did not have to agree to something. For example, if you are asked to give marketing consent. According to the law, I can not demand it. In this situation, even if he does not check such options, he should still be able to register.
But I have a different suggestion now, the ability to change (or leave empty) the label of the "I agree" checkbox for each policy separately. In this way you will be able to use a different form, for example:
- I accept
- I agree (to the)
I have a similar solution, three check boxes and these are required, but I still need a fourth one, which can be but does not have to be ticked. I want users to agree to receive advertising materials electronically, but I can not demand that from them.
In this way, I will be able to create a database request for emails of people who have agreed to receive such materials and send them information from time to time, e.g. about promotions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949642.35/warc/CC-MAIN-20230331113819-20230331143819-00196.warc.gz
|
CC-MAIN-2023-14
| 1,558
| 11
|
https://frandroid.dreamwidth.org/2018/02/20/
|
code
|
zoefruitcake is doing a "365 questions" meme, which I can't be bothered to follow, but I just swiped the questions she's answering this week, because boredom.
- February 21 - if you could have the perfect meal, what would it be?
That's kind of difficult, but I'd be partial to a vegan Parsi wedding meal, including dhansak dal and dar ni poori. Maybe if Vij's in Vancouver knew how to make those recipes (they're Punjabi, not Parsi, but who cares?), that could be good.
- February 22 - if you had to permanently leave your home country, where would you go?
Right now, I would join the People's Defense Units of the Democratic Federation of Northern Syria, duh. I really wouldn't dislike living in Scotland, either.
- February 23 - What is your first political memory?
Rooting for Brian Mulroney in the 1994 federal election, because he was from Québec. (!!!)
- February 24 - When is the last time you were completely wrong about something?
Fuck me, I don't know when the last time was, I'm sure it was pretty recently. But the one that sticks in my craw is that I supported the U.S. efforts to depose Ghaddafi. Ohhh boy.
- February 25 - What do you prefer to be called? Who named you that and why? Where did it come from?
My first name is François, which was my maternal grandmother's name (Françoise). I _REALLY_ disliked being called Frank, because that's how some of my school bullies used to call me. There are a select few people who aren't subject to this objection, and they delight getting under my skin.
- February 27 - Five topics you’d like to download to your brain, and why?
- Das Kapital, because I'm a poorly read marxist.
- Ocalan's writings, because I'm just starting
- The Ancient Roman Greek and Roman canon, because that would be cool.
- I could let fate pick a language between Turkish, Kurmanji and Sorani
- February 28 - Best moment of the month
I don't have restrictions, constraints or features which work on a monthly cycle, so the question is kind of irrelevant to me...
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578583000.29/warc/CC-MAIN-20190422235159-20190423021027-00019.warc.gz
|
CC-MAIN-2019-18
| 2,002
| 18
|
http://www.phoronix.com/scan.php?page=article&item=amazon_rhel7_cloud&num=1
|
code
|
For those in need of a quick and easy place to experiment and trial Red Hat Enterprise Linux 7.0, which was released as stable earlier this month, it's easy to do so within Amazon's Elastic Compute Cloud. It's running well using a Xen HVM instance and so I have run some preliminary benchmarks against SUSE Enterprise and Ubuntu Linux.
While I ran some early tests of RHEL 7.0 -- including its release candidate -- I didn't have a chance to evaluate the release build up until trying the EC2 instance due to traveling and now in the process of setting up the new Phoronix office. In July I should have some proper benchmarks (hopefully with CentOS 7), but for some early benchmarks to toss out now of RHEL7 just for reference purposes, I have some basic numbers from Amazon's cloud.
This week I ran some clean, out-of-the-box tests on Red Hat Enterprise Linux 7.0, Ubuntu 14.04 LTS, and SUSE Enterprise Linux 11 SP3. The 64-bit builds were used for all three enterprise Linux distributions, using the Xen HVM versions of the AMIs, and using the other default values. The Amazon EC2 c3.xlarge instance type boasts four virtual CPUs, 7.5GB of system memory, and 2 x 40GB SSD storage. During the testing this week, the c3.xlarge instance types for these Xen HVM virtual machine instances were powered by Intel Xeon E5-2680 2.8GHz hardware.
Red Hat Enterprise Linux 7.0 uses the Linux 3.10 kernel, GCC 4.8.2 compiler, and XFS file-system by default. SUSE Linux Enterprise 11 SP3 meanwhile is with the EXT3 file-system, Linux 3.0 kernel, and GCC 4.3.4. Ubuntu 14.04 LTS has the Linux 3.13 kernel, GCC 4.8.2, and the EXT4 file-system.
All of these Linux cloud benchmarks were fully automated and standardized using the Phoronix Test Suite. Again, the benchmarks in this article should just be taken as some preview, reference figures. In July I should be back with some bare-metal numbers from my controlled environment across an array of hardware.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122174.32/warc/CC-MAIN-20170423031202-00541-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,942
| 5
|
http://wireless.sys-con.com/node/2442175
|
code
|
|By Marketwired .||
|November 13, 2012 03:00 AM EST||
MUNICH, GERMANY -- (Marketwire) -- 11/13/12 -- Electronica 2012 -- Vicor Corporation (NASDAQ: VICR) today announced the VI BRICK® AC Front End module for high, density, high efficiency AC to DC power conversion. This new module is a complete AC-DC converter which operates over the universal AC input range of 85-264V to deliver a fully isolated and PFC regulated 48V output. In a low profile package measuring 3.75 x1.91 inches (95.3mm x 48.6mm) and only 0.38 inches (9.55 mm) in height, the AC Front End module provides a power conversion density of 121 W/in3 (7.5W/cm3) or 54 W/in3 for a complete supply that includes all necessary components including hold-up capacitance.
Every electronic product or system that operates off of an AC utility line must incorporate an AC-DC front-end to convert the AC utility voltage into the smooth DC voltage required by electronic circuitry. As the "firewall" between the utility and the customer's electronics, a contemporary front-end must perform complex tasks -- such as power factor correction and noise reduction -- to meet the stringent requirements of international regulatory agencies. The Vicor AC Front End module, with its integrated rectification, filtering and transient protection, enables customers to configure a complete front end system that meets IEC 61000-3-2 harmonic noise and Class B EMI conducted emission limits supplying 330W to external output storage capacitance. Its comprehensive performance features give customers the ability to simplify their regulatory certification processes and streamline their power system designs.
With its proprietary Double-Clamp ZVS high switching frequency topology, the AC Front End module achieves consistently high efficiency -- up to 92% -- across its entire AC input voltage range, including operation down to 85VAC and cuts power losses by more than 50% compared to competing offerings. The AC Front End also simplifies the customers' cooling requirements, reducing both the size and cost of cooling components.
"From the wall plug to the point of load, Vicor provides low profile, high density, high efficiency power components that enable the most versatile and tightly-integrated power systems on the market today," said Rob Russell, Vice President, Brick product line, Vicor. "This AC Front End module based on performance-proven VI Chip technology now expands Vicor's brick product line into AC-DC applications."
The new VI BRICK® AC Front End module is compatible with a wide variety of downstream DC-DC power conversion components including Vicor's comprehensive portfolio of high-density, high efficiency, VI Chip and VI BRICK converters. When used with downstream DC-DC converters which support secondary-side energy storage and efficient power distribution, the AC Front End module provides superior power system performance and connectivity from the wall plug to the point of load and enables customers to design reliable and cost-effective power systems.
Electronica 2012 attendees can visit Vicor in Hall A6 at Stand 560.
Availability & Supporting Resources
Vicor's new VI BRICK AC Front End modules will be available to customers in consumer (-20 degrees C to 100 degrees C), telecom (-40 degrees C to 100 degrees C) and military (-55 degrees C to 100 degrees C) temperature grades. For preliminary datasheet and other technical documentation, visit Vicor. The product will be available through distribution at the end of the year. For pricing information and sample availability, email [email protected] or call 1-800-735-6200.
About Vicor Corporation
Headquartered in Andover, Massachusetts, Vicor Corporation designs, manufactures and markets innovative, high performance modular power components, from bricks to semiconductor-centric solutions, to enable customers to efficiently convert and manage power from the wall plug to the point-of-load. Complementing an extensive portfolio of patented innovations in power conversion and power distribution with significant application development expertise, Vicor offers comprehensive product lines addressing a broad range of power conversion and management requirements across all power distribution architectures, including CPA, DPA, IBA, FPA® and CBA. Vicor focuses on solutions for performance-critical applications in the following markets: enterprise and high performance computing, telecommunications and network infrastructure, industrial equipment and automation, vehicles and transportation and aerospace and defense electronics. www.vicorpower.com
Vicor, V.I Chip, VI BRICK, and FPA are trademarks of Vicor Corporation.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2150560
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
May. 6, 2016 02:00 AM EDT Reads: 1,397
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
May. 6, 2016 01:45 AM EDT Reads: 1,433
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
May. 6, 2016 01:00 AM EDT Reads: 1,254
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 6, 2016 12:00 AM EDT Reads: 1,481
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
May. 5, 2016 11:30 PM EDT Reads: 1,353
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
May. 5, 2016 07:45 PM EDT Reads: 1,505
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 5, 2016 06:00 PM EDT Reads: 1,052
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 5, 2016 04:00 PM EDT Reads: 790
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 5, 2016 03:45 PM EDT Reads: 761
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
May. 5, 2016 02:45 PM EDT Reads: 1,079
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
May. 5, 2016 02:30 PM EDT Reads: 1,494
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 5, 2016 01:45 PM EDT Reads: 778
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
May. 5, 2016 01:30 PM EDT Reads: 613
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 5, 2016 12:30 PM EDT Reads: 1,368
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 5, 2016 12:30 PM EDT Reads: 1,336
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
May. 5, 2016 10:15 AM EDT Reads: 1,581
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
May. 5, 2016 09:00 AM EDT Reads: 1,295
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
May. 5, 2016 08:45 AM EDT Reads: 1,409
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
May. 5, 2016 02:00 AM EDT Reads: 1,334
You deployed your app with the Bluemix PaaS and it's gaining some serious traction, so it's time to make some tweaks. Did you design your application in a way that it can scale in the cloud? Were you even thinking about the cloud when you built the app? If not, chances are your app is going to break. Check out this webcast to learn various techniques for designing applications that will scale successfully in Bluemix, for the confidence you need to take your apps to the next level and beyond.
May. 3, 2016 12:15 PM EDT Reads: 1,664
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861735203.5/warc/CC-MAIN-20160428164215-00027-ip-10-239-7-51.ec2.internal.warc.gz
|
CC-MAIN-2016-18
| 15,459
| 54
|
https://forums.flightsimulator.com/t/cessna-citation-longitude/154208/877
|
code
|
Are you referring to the “Official” Textron Longitude checklist that someone posted here a while back and then removed it? Someone went out and bought one and posted it here. Anyway, I grabbed it while it was still available and I have created my own MSFS-specific checklist using it as a reference. My checklist is still a work-in-progress, but I plan on putting vspeeds, etc on it, eventually.
This is a link to my checklist, if anyone is interested.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178351374.10/warc/CC-MAIN-20210225153633-20210225183633-00432.warc.gz
|
CC-MAIN-2021-10
| 456
| 2
|
https://www.longrangehunting.com/threads/which-height-of-harris.11083/
|
code
|
I need to buy another Harris bipod, but I'm a little torn as to what height I should get. The one I already have is the 12-25 Swivel. I like it, but it's too tall for comfortable prone shooting. So, what height do you guys find yourselves most often using for standard field work in the prone position? 6-9? or is that too low, so go with the 9-13?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820930.11/warc/CC-MAIN-20171017072323-20171017092323-00214.warc.gz
|
CC-MAIN-2017-43
| 348
| 1
|
https://blog.ipspace.net/2019/08/migrating-ipspacenet-infrastructure-to.html
|
code
|
I’m too stupid to unwind and relax over summer - there’s always some janitorial task to be done, and I simply cannot leave it alone. This summer, I decided to migrate our server infrastructure to AWS.
TL&DR: It went smoother than I expected, and figuring out how AWS virtual networks, public IP addresses, and security groups work while creating AWS Networking webinar definitely helped, but it also took way longer than I expected.
AWS has nice migration tools. In theory you could:
- Create your environment with AWS GUI;
- Migrate your VM image to AWS;
- Start your VM and go for a beer.
For whatever reason I decided to do “the right thing”, create AWS environment with a repeatable (or idempotent if you’re trying to win REST API bingo) script, and rebuild the server from scratch using Ansible playbooks.
It took me weeks to get the job done (in parallel with a gazillion other things I have to do), but it was worth it - now I have tested recipes I can use to recreate the whole infrastructure from scratch, and I already used the server provisioning playbooks to create a development copy of the server on my laptop.
Automation Win: the development server is created using the same playbooks as the production server and thus guaranteed to have the exact same software environment. Once I test the changes on development server it’s reasonably safe to deploy them in production.
Keep in mind: if you want to keep the two environments in sync, you should never ever install a package, or a Python/Perl/PHP/whatever module manually. The only way to get new third-party software into development environment (and later into production) is by modifying and executing Ansible playbooks.
Ansible is awfully slow when used against a remote server. I decided to deploy the server in US East region (pricing might have something to do with that), resulting in a bit over 100msec RTT… and doing the simplest tasks (like collecting server facts) with an Ansible playbook took forever. It would be better to copy the playbooks to the server as the first provisioning step and execute them locally.
AWS CLI is rudimentary at least when compared to Azure CLI (the one really good thing I like about Azure). As I explained in an infrastructure-as-code blog post REST API can quickly turn into a CRUD hell requiring an adaptation layer on top if you want to think in terms of desired end-state.
That adaptation layer is built into Azure CLI (more about that in an upcoming post), but totally missing in AWS CLI. I should have realized that and used a dedicated infrastructure-as-code tool like Terraform, but I was too lazy for that and managed to wing it with Bash scripts. Never again.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00019.warc.gz
|
CC-MAIN-2023-06
| 2,693
| 13
|
http://valueintegrity.blogspot.com/2018/04/physician-accused-of-scientific.html
|
code
|
- How would you feel if a colleague of yours said he was the author of your research?
- Should doctors be held to the same standard of academic integrity as college students? A higher standard? Why or why not?
- Should all books be checked for plagiarism before being published? Why or why not?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524568.14/warc/CC-MAIN-20190716135748-20190716161748-00020.warc.gz
|
CC-MAIN-2019-30
| 294
| 3
|
https://www.nyfirearms.com/threads/madison-county-where-to-find-pistol-training-and-safety-courses.40175/
|
code
|
I am definetly interested in this course. Please think of me when you set up the class!I am president of Canastota Conservation Club - Pistol | Rifle | Shotgun | Archery Shooting Range i am trying to put a class together but only have 3 people interested. This class is not the one held at gander mountain though. This is a NRA certified pistol class. includes range time as well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154310.16/warc/CC-MAIN-20210802075003-20210802105003-00278.warc.gz
|
CC-MAIN-2021-31
| 380
| 1
|
http://finance.yahoo.com/mbview/threadview/?bn=3090f54f-8d8e-3cd6-869c-3a9eb3ddb48a&tid=1363184264518-8650a767-bb55-4442-96f8-a13474efa4e5
|
code
|
This is supposed to go up not down!!!
This is completely ridiculous, looks like this going to be in red. How unfair
The scammers won't cover yet. More blood needed. They'll be very bloody when another shortsqueeze like last quarter kicks in.
This doesn't make any sense, how can they go against such outrageous earnings??
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298228.32/warc/CC-MAIN-20150323172138-00006-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 321
| 4
|
https://forum.unilang.org/viewtopic.php?f=56&t=48309
|
code
|
I guess it might depend on what you want to put the emphasis on.
I would say "tabak-poŝeto" or "tabak-saketo". This doesn't contain any of the idea of how the snus is used (i.e. placed on the gum). If you want to include everything, it becomes very clumsy but you could say "dentkarna tabak-poŝeto".
Or you could say "dentkarna tabako", which leaves out the form it could take (if, say you're old-school and use the loose snus).
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369512.68/warc/CC-MAIN-20210304174506-20210304204506-00324.warc.gz
|
CC-MAIN-2021-10
| 430
| 3
|
https://cirosantilli.com/dna
|
code
|
Since DNA is the centerpiece of life, Ciro Santilli is extremely excited about DNA-related technologies, see also: molecular biology technologies.
These are apparenty an important part of transcriptional regulation given the number of modifications they can undergo! Quite exciting.
DNA detection means determining if a specific DNA sequence is present in a sample.
This can be used to detect if a given species of microorganism is present in a sample, and is therefore a widely used diagnostics technique to see if someone is infected with a virus.
You could of course do full DNA Sequencing to see everything that is there, but since it is as a more generic procedure, sequencing is more expensive and slow.
The alternative is to use a DNA amplification technique.
DNA amplification is one of the key DNA technologies:
- it is one of the main ways in which DNA detection can be done.
- it is the first step of Illumina sequencing, since you need multiple copies of several parts of the genome for the method to work
This is an extremely widely used technique as of 2020 and much earlier.
If allows you to amplify "any" sequence of choice (TODO length limitations) between a start and end sequences of interest which you synthesize.
If the sequence of interest is present, it gets amplified exponentially, and you end up with a bunch of DNA at the end.
You can then measure the DNA concentration based on simple light refraction methods to see if there is a lot of DNA or not in the post-processed sample.
Even Ciro Santilli had some contact with it at: Section "How to use an Oxford Nanopore MinION to extract DNA from river water and determine which bacteria live in it", see: PCR!
One common problem that happens with PCR if you don't design your primers right is: en.wikipedia.org/wiki/Primer_dimer
Also known as: Quantitative PCR (qPCR).
Like PCR, but the amplification machine measures the concentration of DNA at each step.
This describes one possible concentration detection method with fluorescent molecules that only become fluorescent when the DNA is double stranded (SYBR Green)
This allows you to predict the exact initial concentration by extrapolating the exponential curve backwards.
TODO: vs non-real-time PCR. Why can't you just divide by 2 for every heating step to reach back the original concentration? Likely the reaction reach saturation at an unknown step.
TODO: vs non-real-time PCR in medical diagnostics: do you really need to know concentration for diagnostics? Isn't it enough to know if the virus is present or not?
Isothermal means "at fixed temperature".
This is to contrast with the more well established polymerase chain reaction, which requires heating and cooling the sample several times.
The obvious advantage of isothermal methods is that their machinery can be simpler and cheaper, and the process can happen faster, since you don't have to do through heating and cooling cycles.
Like PCR, but does not require thermal cycling. Thus the "isothermal" in the name: iso means same, so "same temperature".
Not needing the thermo cycling means that the equipment needed is much smaller and cheaper it seems.
Caused by slipped strand mispairing.
oriC = Origin of Chromosomal replication.
Most of these are going to be Whole-genome sequencing of some model organism:
en.wikipedia.org/wiki/Whole_genome_sequencing#History lists them all. Basically th big "firsts" all happened in the 1990s and early 2000s.
- 2003: Human Genome Project (3 Gbp)
Big excitement picture at: molecular biology technologies.
A concrete experiment has been done at Section 6. "Sequencing" on section sequencing.
Can be seen as a cheap form of DNA sequencing that only test for a few hits. Some major applications:
- gene expression profiling
- single-nucleotide polymorphism: specificity is high enough to detect snips
Experiments that involve sequencing bulk DNA found in a sample to determine what species are present, as opposed to sequencing just a single specific specimen. Examples of samples that are often used:
- river water to determine which bacteria are present, notably to determine if the water is free of dangerous bacteria. A concrete example is shown at: Section "How to use an Oxford Nanopore MinION to extract DNA from river water and determine which bacteria live in it".
- sea water biodiversity: ocean-microbiome.embl.de/companion.html
- food, including searching for desirable microorganisms such as in cheese or bread yeast
- poo, e.g. to study how the human microbiome influences health. There are companies actively working on this, e.g.: www.microbiotica.com/
One related application which most people would not consider metagenomics, is that of finding circulating tumor DNA in blood to detect tumors.
- techcrunch.com/2022/05/31/ultima-genomics-claims-100-full-genome-sequencing-after-stealth-600m-raise/ Ultima genomics TODO technology? Promises 100 USD genome, 600M funding out of stealth...
The by far dominating DNA sequencing company of the late 2000's and 2010's due to having the smallest cost per base pair.
To understand how Illumina's technology works basically, watch this video: Video 4. "Illumina Sequencing by Synthesis by Illumina (2016)".
The key innovation of this method is the Bridge amplification step, which produces a large amount of identical DNA strands.
This step is genius because sequencing is basically a signal-to-noise problem, as you are trying to observe individual tiny nucleotides mixed with billions of other tiny nucleotides.
With bridge amplification, we group some of the nucleotides together, and multiply the signal millions of times for that part of the DNA.
This is one of the prime examples of Europe's decline.
Instead of trying to dominate the sequencing market and gain trillions of dollars from it, they local British early stage investors were more than happy to get a 20x return on their small initial investments, and sold out to the Americans who will then make the real profit.
Here are some good articles about the company:
Cambridge visitors can still visit the Panton Arms pub, which was the location of the legendary "hey we should talk" founders meeting, chosen due to its proximity to the chemistry department of the University of Cambridge.
In 2021 the founders were awarded the Breakthrough Prize. The third person awarded was Pascal Mayer. He was apparently at Serono Pharmaceutical Research Institute at the time of development. They do have a wiki page unlike Solexa: en.wikipedia.org/wiki/Serono. They paid a 700 million fine in 2005 in the United States, and sold out in 2006 to Merck for 10 billion USD.
They put a lot of emphasis into base calling. E.g.:
- they have used FPGAs to accelerate it on certain models: twitter.com/nanopore/status/841671404588302338, sampe engineer: www.linkedin.com/in/balaji-renganathan-31b98415/
One of the sequencers made by Oxford Nanopore Technologies.
The device has had several updates since however, notably of the pore proteins which are present in the critical flow cell consumable.
Official documentation: nanoporetech.com/products/minion (archive)
The following images of the device and its peripherals were taken during the experiment: Section "How to use an Oxford Nanopore MinION to extract DNA from river water and determine which bacteria live in it".
As of 2018, Ciro Santilli believes that this could be the next big thing in biology technology.
"De novo" means "starting from scratch", that is: you type the desired sequence into a computer, and the synthesize it.
The "de novo" part is important, because it distinguishes this from the already well solved problem of duplicating DNA from an existing DNA template, which is what all our cells do daily, and which can already be done very efficiently in vitro with polymerase chain reaction.
Many startup companies are attempting to create more efficient de novo synthesis methods:
Notably, the dream of most of those companies is to have a machine that sits on a lab bench, which synthesises whatever you want.
TODO current de novo synthesis costs/time to delivery after ordering a custom sequence.
The initial main applications are likely going to be:
but the real pipe dream is building and bootstraping entire artificial chromosomes
- polymerase chain reaction primers (determine which region will be amplified
- creating a custom sequence to be inserted in a plasmid, i.e. artificial gene synthesis
- 2023-03 twitter.com/sethbannon/status/1633848116154880001
AnsaBio created the world's longest DNA oligo produced using de novo synthesis! 1,005 bases! 99.9% stepwise yield
- 2020-10-05 www.nature.com/articles/s41587-020-0695-9 "Enzymatic DNA synthesis enters new phase"
Using de novo DNA synthesis to synthesize a genes to later insert somewhere.
Note that this is a specific application of de novo DNA synthesis, e.g. polymerase chain reaction primers is another major application that does not imply creating genes.
Using de novo DNA synthesis to synthesize entire Chromosomes.
Synthesizing the DNA itself is not the only problem however.
You then have to get that DNA into a working living form state so that normal cell processes can continue:
- for viri see: synthetic virus
- for bacteria, you have to inject it into a cell
- for placental animals, you also have to somehow simulate a compatible placenta. It is likely easier for eggs.
Apparently achieved for the first time in 2021: www.jcvi.org/research/first-self-replicating-synthetic-bacterial-cell by the J. Craig Venter Institute.
Basically a synonym for doing a large chunk of de novo DNA synthesis.
TODO: if we had cheap de novo DNA synthesis, how hard would it be to bootstrap a virus culture from that? github.com/cirosantilli/cirosantilli.github.io/issues/60
Is it easy to transfect a cell with the synthesized DNA, and get it to generate full infectious viral particles?
If so, then de novo DNA synthesis would be very similar to 3D printed guns: en.wikipedia.org/wiki/3D_printed_firearms.
It might already be possible to order dissimulated sequences online:
The first found and most important known epigenetic marker.
Happens only on adenine and cytosine. Adenine methylation is much less common in mammal than cytosine methylation, when people say "methylation" they often mean just cytosine methylation.
It often happens on promoters, where it inhibits transcription.
Incredible that there hasn't been a Nobel Prize for it as of 2022, e.g. as mentioned at: theconversation.com/no-nobel-but-epigenetics-finally-gets-the-recognition-it-deserves-18970
Some old dudes getting another prize in 2016: www.cuimc.columbia.edu/news/pioneers-epigenetics-awarded-horwitz-prize
The main way to sequence DNA methylation. Converts methylated cytosine to uracil, and then we can sequence those.
They are actually inheritable! But alleles are rare: www.ncbi.nlm.nih.gov/pmc/articles/PMC5559844
Analogous problem to the secondary structure of proteins. Likely a bit simpler due to the strong tendency for complementary pairs to bind.
A DNA sequence that marks the start of a transcription area.
Used in Positive-strand RNA virus to replicate.
I don't think it's present outside viruses. Well regulated organisms just transcribe more DNA instead.
Sequence of genes under a single promoter. For an example, see E. Coli K-12 MG1655 operon thrLABC.
A single operon may produce multiple different transcription units depending on certain conditions, see: operon vs transcription unit.
A sequence of mRNA that can actually be transcribed.
For an example, see E. Coli K-12 MG1655 operon thrLABC.
Multiple different transcription units can be produced by a single operon, see: operon vs transcription unit.
Consider the E. Coli K-12 MG1655 operon thrLABC.
That single operon can produce two different mRNA transcription units:
- thrL only, the transcription unit is also called thrL: biocyc.org/ECOLI/NEW-IMAGE?object=TU0-42486
- thrL + thrA + thrB + thrC all together, the transcription unit is called thrLABC: biocyc.org/ECOLI/NEW-IMAGE?type=OPERON&object=TU00178
The reason for this appears to be that there is a rho-independent termination region after thrL. But then under certain conditions, that must get innactivated, and then the thrLABC is produced instead.
Multiple genes coding for multiple proteins in one transcription unit, e.g. e. Coli K-12 MG1655 gene thrL and e. Coli K-12 MG1655 gene thrA are both prat of the E. Coli K-12 MG1655 operon thrLABC.
- byjus.com/neet-questions/why-does-dna-contain-thymine-and-rna-uracil says Uracil cannot be repaired by DNA repair mechanisms. But it is also requires less energy to synthesize with.
There are six, three in each sense, depending on where you start modulo-3.
Area between a start codon and an stop codon.
This term is useful because:
- there are some crazy constructs, notably in viruses, in which there's more than one gene in a single orf
- post-transcriptional modifications can throw out parts of the sequence
NCBI online tool to find and view all open reading frames in a given FASTA: www.ncbi.nlm.nih.gov/orffinder/
High level DNA studies? :-)
TODO confirm, but looks like it, e.g. E. Coli starts DNA replication before the previous one finished.
Because DNA replication is a key limiting factor of bacterial replication time, such organisms are therefore strongly incentivized to have very minimal DNAs.
Power, Sex, Suicide by Nick Lane (2006) 7 "Why bacteria are simple" page 169 puts this nicely:
Bacteria replicate at colossal speed. [...] In two days, the mass of exponentially doubling E. coli would be 2664 times larger than the mass of the Earth.Luckily this does not happen, and the reason is that bacteria are normally half starved. They swiftly consume all available food, whereupon their growth is limited once again by the lack of nutrients. Most bacteria spend most of their lives in stasis, waiting for a meal. Nonetheless, the speed at which bacteria do mobilize themselves to replicate upon feeding illustrates the overwhelming strength of the selection pressures at work.
If you live in the relatively food abundant environment of another cell, then you don't have to be able to digest every single food source in existence, of defend against a wide range of predators.
So because DNA replication is a key limiting factor of bacterial replication time, you just reduce your genome to a minimum.
And likely you also want to be as small as possible to evade the host's immune system.
Power, Sex, Suicide by Nick Lane (2006) section "Gene loss as an evolutionary trajectory" puts it well:
One of the most extreme examples of gene loss is Rickettsia prowazekii, the cause of typhus. [...] Over evolutionary time Rickettsia has lost most of its genes, and now has a mere protein-coding genes left. [...] Rickettsia is a tiny bacterium, almost as small as a virus, which lives as a parasite inside other cells. It is so well adapted to this lifestyle that it can no longer survive outside its host cells. [...] It was able to lose most of its genes in this way simply because they were not needed: life inside other cells, if you can survive there at all, is a spoonfed existence.and also section "How to lose the cell wall without dying" page 184 has some related mentions:
While many types of bacteria do lose their cell wall during parts of their life cycle only two groups of prokaryotes have succeeded in losing their cell walls permanently, yet lived to tell the tale. It's interesting to consider the extenuating circumstances that permitted them to do so.[...]One group, the Mycoplasma, comprises mostly parasites, many of which live inside other cells. Mycoplasma cells are tiny, with very small genomes. M. genitalium, discovered in 1981, has the smallest known genome of any bacterial cell, encoding fewer than 500 genes. M. genitalium, discovered in 1981, has the smallest known genome of any bacterial cell, encoding fewer than 500 genes. [...] Like Rickettsia, Mycoplasma have lost virtually all the genes required for making nucleotides, amino acids, and so forth.
A gene that was inherited from the same ancestor in two different species, and which has maintained the same function in both species.
A gene that got duplicated withing the same species. The copies may diverge in function from the original.
Important example: hox genes.
The cause of variable number tandem repeat.
Ways in which it can happen:
Current Wikipedia seems to say that this refers specifically to cells taking up DNA from other dead cells as in the Avery-MacLeod-McCarty experiment, excluding other types of horizontal gene transfer like bacterial conjugation
The term is sometimes just used a synonym for horizontal gene transfer in general it seems however.
- 100 Greatest Discoveries by the Discovery Channel (2004-2005)
- Animation of molecular biology processes
- E. Coli Whole Cell Model by Covert Lab
- Mass fracion summary plot analysis
- Output overview
- Source code overview
- Human mitochondrion
- Molecular biology feels like systems programming
- Molecular biology technologies
- Overview of the experiment
- Physics and the illusion of life
- Protein tag
- Reverse transcriptase
- RNA-dependent RNA polymerase
- RNA polymerase
- Sequence alignment
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646076.50/warc/CC-MAIN-20230530163210-20230530193210-00450.warc.gz
|
CC-MAIN-2023-23
| 17,194
| 149
|
http://www.evanisgreat.com/2016/06/01/Meetup/
|
code
|
Yesterday I attended a meetup at the Microsoft New England Research and Development Center in Cambridge! Despite being in a different city, it was only a few short miles from my overpriced apartment in Boston.
This meetup was more organized than most, and included an actual schedule. The first order of business was eating pizza and networking with other developers. I chatted with a developer who works remotely for StackOverflow, and another dev who is currently looking for a C++ gig.
Being my first meetup in the area, I didn’t know anybody, so it was good to talk to a few people at least. During the networking portion I was mainly distracted/bemused by the sights of Shawn Wildermuth and Miguel de Icaza just…hanging out with everybody. It feels stupid to admit, but I guess I didn’t realize that developers who have attained a “rock star” type reputation are still only rock stars in the relatively small world of software development. They don’t have handlers. They don’t appear from backstage all of a sudden when the lights dim. They enjoy the free pizza just as much as you do.
The primary objective of this meetup was to record an episode of Shawn’s Hello World Podcast, which is currently on tour visiting a bunch of cities across America along with a handful of international stops. The podcast uses an interview format where Shawn talks with developers who speak about their roots and history in the development field. In this instance, the subject of the episode was Miguel de Icaza.
Miguel talked about his roots in open source, and how contributed as a hardcore OSS developer for a long time. He eventually moved into the world of closed source software, only to be bought out by Microsoft, who then proceeded to open source his product and give it away for free in an exercise of ridiculous irony.
An interesting tidbit from the podcast was that Miguel considers Gnumeric, a spreadsheet application, to be the most beautiful code he has ever written, and he’s not above admitting it. On programming forums, you’ll often see people asking for examples of beautiful code that they can learn from. Maybe this could be a good example.
The podcast was recorded live at the event, but based on the upload schedule, it should be available on Shawn’s site within the next few weeks. I highly recommend giving it a listen once it’s available.
After the podcast, Shawn did about an hour-long demo/introduction to ASP.NET Core. If you’ve seen any of his Pluralsight courses, you’ll know that he is somewhat of a subject matter expert when it comes to web development on the Microsoft stack, so I was very excited for this part.
With the standard ASP.NET MVC project template, you’re given a massive pile of included features that you don’t even know what they do, and virtually every resource for learning the framework kind of just rolls with it. It reminds me of people starting with Java as their first programming language, and being told to just ignore most of the language features you’re required to use just to get a simple “Hello, world!” printed to the console.
So Shawn started his demo from basically nothing. All he had was a console application which listened to web requests. During the talk, he slowly added and configured pieces of middleware from Nuget, demonstrating the flexibility of the new framework. Even fundamental things that you’d assume are included by default were actually added to the base web app:
- Application configuration
- Support for serving static files
- The .NET Framework itself
These were all included as Nuget packages and tied into the web application as middleware. It was a pretty compelling demo, and like the podcast, the code should be available in the coming weeks at Shawn’s github repo for the tour.
Overall, this was a fun and interesting event. I definitely hope to go to more like this in the Boston area. I met other local developers, I learned new things, and I even got some free pizza out of it. What more is there to ask for?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257197.14/warc/CC-MAIN-20190523083722-20190523105722-00251.warc.gz
|
CC-MAIN-2019-22
| 4,039
| 15
|
https://www.aimodels.fyi/models/replicate/0f88f0ca-25e7-4eff-ab3d-f553a2a20605
|
code
|
The CLIP Interrogator has several potential use cases for a technical audience. Firstly, it can be used to generate unique and creative artwork by combining text prompts with images. This tool allows artists and designers to experiment with different prompts and images, creating captivating visuals using text-to-image models like Stable Diffusion. Secondly, it can be employed in the field of content generation, such as generating captions or descriptions for images automatically. By optimizing text prompts to match given images, the CLIP Interrogator can assist in generating accurate and contextually relevant text content. Additionally, this tool can be applied in data analysis and research, enabling researchers to extract valuable information from visual datasets by transforming images into text representations, which can be further analyzed or used in machine learning models. With its ability to optimize text prompts for images, the CLIP Interrogator opens up a range of possibilities for creating innovative products and practical applications in various fields. For instance, it could be integrated into design software or content management systems to improve the user experience and automate certain tasks. Furthermore, it could be utilized in fields such as advertising, social media, or e-commerce to enhance image tagging and search functionalities. Overall, the CLIP Interrogator offers a versatile toolset for combining text and images, allowing for the exploration of new creative frontiers and facilitating efficient data analysis and content generation processes.
- Cost per run
- Avg run time
- Nvidia T4 GPU
|No other models by this creator|
You can use this area to play around with demo applications that incorporate the Clip Interrogator model. These demos are maintained and hosted externally by third-party creators. If you see an error, message me on Twitter.
Currently, there are no demos available for this model.
Summary of this model and related resources.
|Model Name||Clip Interrogator|
The CLIP Interrogator is a prompt engineering tool that combines OpenAI's C...Read more »
|Model Link||View on Replicate|
|API Spec||View on Replicate|
|Github Link||View on Github|
|Paper Link||No paper link provided|
How popular is this model, by number of runs? How popular is the creator, by the sum of all their runs?
How much does it cost to run this model? How long, on average, does it take to complete a run?
|Cost per Run||$0.02805|
|Prediction Hardware||Nvidia T4 GPU|
|Average Completion Time||51 seconds|
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00471.warc.gz
|
CC-MAIN-2023-50
| 2,547
| 19
|
https://linc.ucy.ac.cy/index.php?id=152
|
code
|
UNIVERSITYM.Sc., Computer Science, University of Cyprus, 2021
Joanna Georgiou is a Ph.D. student at the Computer Science Department, University of Cyprus. She holds a Master's degree in Computer Science (2021) and a Bachelor's degree (2019) in Computer Science from the University of Cyprus. From 2018, she had many opportunities to work as intern in various research labs, such as LInC , DMSL and CYENS. For the past few years she has been working as a researcher in many EU projects (ICARUS H2020, RAINBOW H2020).
Distributed Systems and Internet Computing with an emphasis on Edge Computing, Benchmarking and DevOps.
- Joanna Georgiou, Moysis Symeonides, Demetris Trihinas, George Pallis, Marios D. Dikaiakos. BenchPilot: Repeatable & Reproducible Benchmarking for Edge Micro-DCs, Proceedings of the 27th IEEE Symposium on Computers and Communications (ISCC '22), 2022
- Joanna Georgiou, Chrysovalantis Christodoulou, George Pallis, Marios Dikaiakos. The ICARUS Ontology: A General Aviation Ontology, ERCIM News (Special Theme: Brain-inspired Computing) , Volume 125, Pages: 45-47, 2021.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945287.43/warc/CC-MAIN-20230324144746-20230324174746-00587.warc.gz
|
CC-MAIN-2023-14
| 1,090
| 5
|
https://vzhilin.me/notes/curve-editor-01
|
code
|
I want to start series of posts about design and implementation curve editor, like this one from Gimp software:
With Typescript and React. Let's start!
At first, we need to decompose component into parts and name each part of it
I choose Bézier curves to make task more interesting. But I start from simple polyline.
Here is draft of React component:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00544.warc.gz
|
CC-MAIN-2023-50
| 351
| 5
|
https://serverfault.com/questions/556628/trying-to-setup-transparent-load-balancing-ssl-reverse-proxy-is-it-possible
|
code
|
I've done a few weeks worth of research on this topic for a project, and unfortunately I'm a simple code monkey, my knowledge of networking and SSL are limited. Pretty much every search I've done so far has brought me to serverfault, where I believe I've come to the conclusion that this might not be possible.
I basically need to develop a solution that will take incoming https and seamlessly pass it through to a cluster of cloned web servers. They are all serving the same exact content. The client SSL should not terminate at the load balancer. (https -> load balance -> cluster)
So technically my question is misleading, reverse proxy isn't really necessary but all my solutions so far have tended to be a proxy of some kind. I just basically need an transparent SSL load balancing solution.
Here is what I've tried so far.
Apache 2.4.x mod_proxy: Worked for https -> proxy -> http -> cluster. The full ssl solution failed.
Pound: Worked https -> proxy -> https very well, however the endpoint server receives the cert/info of the pound server. I need the clients cert, because the endpoint servers need to be able to do revocation. (Revocation cannot be handled by the proxy/MITM due to security concerns).
Other options I've research are: Squid, Charles, HAproxy, nginx, Charles, Pen and maybe some others I can't remember, my brain is basically mush at this point.
Pen might be the best solution as it's TCP traffic and shouldn't require decoding the ssl headers to handle the traffic, but I've had difficulty locating information on configuring it.
A hardware solution is not off the table. So I guess the questions are 1. Is this possible? 2. How would it be best done (cheap/open source preferable)? Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027312025.20/warc/CC-MAIN-20190817203056-20190817225056-00373.warc.gz
|
CC-MAIN-2019-35
| 1,719
| 9
|
https://www.crossingtheruby.com/2021/06/11/form-formation-hanami-validation-integration
|
code
|
‘Iacta alea est’
In yesterday’s post I showed how to define and run validations in Hanami. I later learned that Hanami’s approach of mixing in modules rather than using inheritance is a core tenet of the framework.
What I didn’t uncover was where in the greater whole validations are defined, and how the error messages are returned to the HTML form.
What is fascinating about Hanami validations is that they mirror the popular use of schemas and changesets in Phoenix at the web or controller layer. Although this is not the ‘blessed’ approach in the Phoenix framework, with schemas and validations being run far closer to the models and business logic, it has two notable proponents; Saša Jurić and Aaron Renner both consider casting, filtering and validation essential at the controller level, next to the form, and Hanami agrees.
Hanami controllers, or rather actions have a DSL to apply type casting, filtering and validation with a built-in DSL:
module Web::Controllers::Signup class Create include Web::Action params do required(:email).filled required(:password).filled required(:address).schema do required(:country).filled end end def call(params) … end end end
The params hash, which will contain the values submitted via a form can be validated in the controller.
If validation fails then the template is rendered again with the current params hash and validation error messages can be fetched on that object:
<% unless params.valid? %> <div class="errors"> <h3>There was a problem with your submission</h3> <ul> <% params.error_messages.each do |message| %> <li><%= message %></li> <% end %> </ul> </div> <% end %>
It should be possible to then extend this to an
error helper for any given attribute so that validation messages can be co-located with the form control.
Interesting to note that Hanami continues to keep the “form object” distinct from these concerns, choosing instead to handle everything on the
params hash. Or, looking from a different perspective, the params hash is the form object and this is decoupled from the model.
On a slightly unrelated note I quite like this division in the grander scheme of application architecture. It pushes validation concerns to the boundary of the application (receiving form data from the outside world at the controller layer) allowing the internal business logic to work with valid and type-cast data.
—Friday 11th June 2021.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510297.25/warc/CC-MAIN-20230927103312-20230927133312-00470.warc.gz
|
CC-MAIN-2023-40
| 2,417
| 15
|
http://www.blackfootstudios.com/forums/index.php?showtopic=6093
|
code
|
Posted 10 August 2012 - 01:00 PM
Yours truly, deeply and sincerely lol
Posted 10 August 2012 - 01:46 PM
Supporter GhostRecon.net | AGgReSsion
Any and all opinions that I post on this forum are mine and mine only and do not represent any promises or opinions from Blackfoot Studios.
Posted 10 August 2012 - 03:19 PM
So ill be going for one of those "ultra" notebooks, although I don't even know what the "ultra" means.(maybe you can elaborate on that)
I just know that they are more powerful then previous notebooks. And ill be glad to see groundbranch running on it.. ))
P.s. Thanks for the reply by the way.
Posted 10 August 2012 - 06:13 PM
Good stuff, Aldous. Thanks for the links.
Posted 11 August 2012 - 01:25 AM
It even sells here in Moscow. So now I have a 2nd option to what I will buy ))
Posted 11 August 2012 - 11:36 AM
> cpu over 2ghz
> w7 is today normally 64bit, so you need at least 6gb memory
> gpc with own memory
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170940.45/warc/CC-MAIN-20170219104610-00567-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,000
| 19
|
https://www.strmprivacy.io/tags/all/
|
code
|
Check our all posts
Scooterrific: IoT mobility data demo contract
This demo contract shows how to classify some. We link on producer ID (e.g. different brands of mobility scooters). The rider ID and GPS are classified as sensitive. We validate both the GPS (coordinates) and rider ID (UUID) with PCRE regexes.
Health data demo contract
This is a simplified health data contract that shows how privacy implications of sensitive health data can be captured in a STRM data contract. We consider a patient's medical practice and city sufficiently broad to be not sensitive. Direct PII (like names) requires the highest purpose for decryption. Indirect PII such as cohort identifiers like (combinations of) medications could easily lead to identification but are indirect. Heart rates and blood pressures can lead to K=1 identification (even without a patient id), but in this example we want to retain the integrity between data points to be useful.
STRM @ Data Council Austin: data streams for the privacy age
Consumers around the world ask for better data privacy. Your legal team needs you to fix data privacy yesterday. You just want to build better data products. But how do you make sure you can actually use your data among all those demands?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710890.97/warc/CC-MAIN-20221202014312-20221202044312-00100.warc.gz
|
CC-MAIN-2022-49
| 1,245
| 7
|
http://www.ccel.org/ccel/gibbon/decline/files/volume1/nt11/001.htm
|
code
|
Pons Aureoli, thirteen miles from Bergamo, and thirty-two from Milan. See Cluver. Italia Antiq. tom. i. p. 245. Near this place, in the year 1703, the obstinate battle of Cassano was fought between the French and Austrians. The excellent relation of the Chevalier de Folard, who was present, gives a very distinct idea of the ground. See Polybe de Folard, tom. iii. p. 223-248.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948617.86/warc/CC-MAIN-20180426222608-20180427002608-00180.warc.gz
|
CC-MAIN-2018-17
| 377
| 1
|
https://www.soultricks.com/en/best-telegram-bots-2022-list
|
code
|
Here you will find an updated collection with the best Telegram Bot list that, from within a conversation, will help you perform any operation both online and offline. In this article, we will also try to give you an answer about what Telegram Bots are, what they are for and where to find them.
For some time now, Telegram is becoming increasingly popular as an instant messaging application with innovative features, available not only for Android and iOS, but also on a PC.
With Telegram you can follow groups dealing with specific topics, exchange files of all kinds and make encrypted voices. The application today is a valid alternative to WhatsApp and, beyond that, for channels is distinguished by the use of bots.
In this regard, I suggest you read our guide on The best Telegram channels.
What are Telegram Bots?
Telegram bots are artificial users that allow you to interact in one-to-one chats with other users by performing a series of actions.
To discover the best Telegram Bots you must first recognize them, which is quite simple: if the name of a Telegram contact ends with"bot", then we are dealing with an artificial intelligence called a bot.
Now that you have an idea of what bots are, let's see how to use Telegram Bots in a conversation.
How to add or remove a Telegram bot
To add a Telegram bot you need to know what its username is and add it to the group chat. Below you will find the best Telegram bots that you can search for by typing during a conversation, whether in groups, chats or supergroups, the parameter @botname and then pressing Send.
Telegram will locate the bot that you then need to add to the group. To do this, press and hold the group name and then press Add member. Type the @ symbol to locate the bot.
Immediately afterwards, you can use a bot command within the conversation by pressing the button with the [/] symbol and get to know the list of commands of the bot you have just added. By typing the / command name you will be able to initiate an action of the bot itself. With the /help command in place, you can see all the information and commands of the bot.
With delete a Telegram bot you must open the bot's chat and click on the dots at the top left and then click on Stop and block bots, then click on delete chat.
This way, the bot will no longer be active on your profile and the bot chat will be deleted. In order to use the bot again, you will need to unblock it.
How to find new Telegram bots
Want to find Telegram Bot? You should know that bots can be added from mobile and Telegram Desktop as well, by clicking for the identified bot, on the corresponding magnifying glass button, followed by the Telegram airplane icon, on the official Bot website of the Telegram store.
The best Telegram bots
Below, you will find the best Telegram bots that can meet your needs. Note that the most popular bots such as funny Telegram bots, music bots, Amazon Telegram deals, hot Telegram girls, etc. have been collected.
Download 4K (deleted bot)
It is a Telegram bot for downloading music and videos from YouTube, Facebook and many others @FourkdownloadBot.
Amazon Search and Price
This is an Amazon bot to search for the price of an Amazon product in friend chats. It can be used in person or in a chat. @amazonglobalbot.
This is a useful bot if you want to converse in English to improve the language. This bot is useful for those who want to study English for educational purposes. @andyrobot.
This is to help you create and configure your own bots @botfather.
Calculate anyone's tax code with @Codice_fiscale_bot.
It's a bot. And it lets you ... Roll a die! Ideal for challenges, bets or decisions on who should take on the most boring task of the day, it's also available in group mode @dicebot.
This is a bot for medical and science enthusiasts. You can find quizzes, infographics and much more @dottor_bot.
This bot is really useful for those who travel frequently, as it allows you to see the exchange rates of 165 world currencies at any time. Exchange rates can be accessed through the username @exchangeratesbot.
If you are a lover of mystery and riddles, this bot will help you have fun both alone and with company @enigmibot.
Bot useful for searching images on Flickr based on a specific query from @flickr_bot.
Another bot to play in Telegram chat with @gamee's mini-games.
Another bot for playing @gamebot.
Hot or Bot
Belongs to the category of Telegram Bot girls and is used to meet new people. Like Tinder, it allows you to enter your personal information to see the contacts to chat with and who are considered by the bot compatible with you @hotorbot.
Used to control home automation through Telegram. @ifttt.
Search for images or GIFs on Bing. @imagebot.
A Telegram game bot that contains three games - "Hangman", Tic-tac-toe and "Guess the number" @KidBot.
Is a bitcoin Telegram bot whose purpose is to display the current value of BitCoin, acting as a currency converter @MoolahBot.
It is a very useful bot for groups because it lets you know the latest rates of mobile and virtual operators. @offertemobile_bot.
In the list of the best Telegram Bots, a Netflix Telegram bot could not be missing. Its purpose is to keep you updated on Netflix's catalog of movies and shows. @netflixnewsbot.
Random chat bot
It falls into the categories of Telegram ChatBot. Lets you start conversations with unknown contacts based on their personal preferences and showing age, gender, geographic distance, etc. @RandomChatBot.
A bot that allows you to generate secure and random passwords. @Safe_bot.
Falls into the category of Telegram bots for pranks or games. It offers several features that aim to have fun and joke with friends in chat. @spacobot.
It is a Spotify Telegram bot for Spotify lovers. It allows you to quickly share your favorite songs with all your @spotybot contacts.
Lets you create sticker collections in chats starting with personal images. @stickers.
Soccer goals bot
You can send a message to the bot requesting a list of goals scored in a given time period for the Bundesliga and Premier League leagues @soccergoalsbot.
It's a gaming bot and allows you to play Sudoku at three different difficulty levels @SudokuBot.
It's a bot that works like Shazam and will help you recognize the unknown song you're listening to @tadam_bot.
It is used to allow you to see a list of bots present on Telegram. @store_bot.
It is a Telegram mail bot that helps you get access to an email address to create a temporary 10-minute email. @temp_mail_bot.
It's a fun Telegram bot that offers videos, images and jokes. @gastabot.
The image bot.
It's a Telegram bot for Instagram that lets you share your Instagram images with Telegram contacts from ThePicturesBot.
It's a tracking bot to track your posts from different messengers directly from Telegram chat. @trackbot.
Extracts text from images and converts voice messages into text. @Transcriber_Bot.
This is Telegram's version of the iOS app inTranslation. Translate Bot is free and translates text written in a foreign language within the chat. @Translate_Bot.
A useful bot for those looking for animated GIFs or meme images based on mood. @umadbot.
It falls under the Telegram music bot category and is used to download music from a Russian service directly into the Telegram app. The Telegram bot for downloading music works by directly adding the username @vkmusic_bot on Android or @vkm_bot on iPhone.
A bot to get real-time weather forecasts for numerous cities @weatherbot.
Is a YouTube bot that allows you to search YouTube videos starting with a word or phrase. @ytbot.
Bot for Telegram Inline
In addition to the bots listed above, there are also bots that you can use in chats without having to start them because they are already present. Let's see what they are:
- @bing. Allows you to search in the Bing search engine.
- @bold. Allows you to type in bold.
- @gif. Allows you to search for and send gifs.
- @img. Search for images in Google Images.
- @music. Allows you to search for music and listen to it.
- @a. Allows you to search for videos on Youtube.
- @sticker. Allows you to search and share stickers.
- @Youtube. Allows you to start a search for videos on Youtube and log in with your account.
- @wiki. Provides Wikipedia search.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00383.warc.gz
|
CC-MAIN-2023-50
| 8,264
| 73
|
http://community.drprem.com/members/ConnorBlake
|
code
|
Welcome to Global Community of Social Leaders and Writers.
Current Designation or Work Profile
Current Organization or Status
Past or Other - Designation and Organization
Website OR LinkedIn Profile Page OR Blog Or Google Page OR Facebook Page
This is from department of pharmacy. if you are working as electronics engineer, software engineer , doctor or anything ,etc. but you didn't get a time to buy medicines and if you want proper medicine so you can buy from here : buy Valtrex online no prescription (http://www.modafinilshop.biz).
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105700.94/warc/CC-MAIN-20170819162833-20170819182833-00142.warc.gz
|
CC-MAIN-2017-34
| 538
| 6
|
https://serverfault.com/questions/485170/postfix-bounce-configuration
|
code
|
What I have is:
Windows server generating emails with own app and sending them to relay server (2) - this works fine
Relay server that sends emails received from (1) - CentOS - working fine
What I need is to additionally configure CentOS postfix to send bounce messages to Windows server (to work on them using own app on specified port). I tried to add in /etc/postfix/transport line:
but I have no idea what I should do more to make it work.
In maillog I have:
Mar 6 12:00:22 ubuntu postfix/qmgr: 9CBB260899: from=<root@ubuntu>, size=197, nrcpt=1 (queue active) Mar 6 12:00:22 ubuntu postfix/qmgr: warning: connect to transport private/bounced: No such file or directory Mar 6 12:00:22 ubuntu postfix/error: 9CBB260899: to=<email@example.com>, relay=none, delay=1890, delays=1890/0/0/0.01, dsn=4.3.0, status=deferred (mail transport unavailable)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487617599.15/warc/CC-MAIN-20210615053457-20210615083457-00016.warc.gz
|
CC-MAIN-2021-25
| 847
| 7
|
https://the-indexer.com/induction-cookware-sets
|
code
|
Last updated July 2020
Total 20,663 reviews scanned.
Tramontina Primaware 80117/585DS Stainless Steel Induction-Ready Tri-Ply Base 7-Piece Cookware Set
Cookware Set, Aicook 10-Piece Non Stick Induction Cookware, Copper Pots and Pans Set
T-fal C515SC Professional Total Nonstick Thermo-Spot Heat Indicator Induction Base Cookware Set, 12-Piece
Copper Pan 10-Piece Set Luxury Induction Cookware Set Non-stick
Kitchen Academy 10 Piece Nonstick Induction Cookware Set Includes Lids, Frying and Roasting
KUTIME 6pcs Cookware Set Non-stick Frying Pans Set Ceramic Coating Soup Pot, Milk
Circulon Genesis Stainless Steel Nonstick 10-Piece Cookware Set
Michelangelo 12 Piece Cookware Set with Non-Stick Ceramic Titanic Coating, Induction Pots
COOKSMARK 10 Piece Cookware Set with Nonstick Coating, Induction Pots and Pans set
When you are trying to find the right induction cookware sets, you definitely want to research:
Finding the answers of these questions is not simple as there are too many products and too many feedbacks to read. Our data analysis platform is useful to answer these questions.
We collect and analyze thousands of product reviews to generate usability score for each brand. This usability score is generated considering product benefits, price and customer feedbacks to provide you with a unbiased list of 10 best affordable induction cookware sets to buy.
You may find more about our algorithm and process at our about page. For any question or suggestion, do not hesitate to contact us.
Thank you for subscribing to our newsletter.
You have entered an invalid email address!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737206.16/warc/CC-MAIN-20200807172851-20200807202851-00220.warc.gz
|
CC-MAIN-2020-34
| 1,592
| 17
|
http://ubuntu-unleashed.blogspot.com/2008/05/get-kde-look-for-gnome-with-oxy-gnome.html
|
code
|
I just found a nice icon theme that others will probably like, its based off of the KDE Oxygen Theme ported over to gnome by Chris Smart
tar xvjf oxy-gnome-080504.tar.bz2
mv oxy-gnome ~/.icons
Alternatively you can install the icons globally by moving the icon folder:
sudo mv oxy-gnome /usr/share/icons/
Right Click Desktop->Change Backround->Theme->Customize->Icons->Select oxy-gnome->Close
Let me know what you think, also if you know of any other great icon packages let me know and I'll feature it here giving you credit!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118713.1/warc/CC-MAIN-20170423031158-00251-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 526
| 7
|
https://blog.gforgegroup.com/page/4/
|
code
|
GForgeNext is the newest incarnation of our long-lived project collaboration tool. It ties together all of the most important features that teams need to deliver big things – like task tracking, team chat and integrated source control. And in the next several months, we’ll add a lot more.
Next employs a Single Page Application (SPA) front end, and relies on our public REST API for all of its functionality. Everyone can now build great tools and integration points with GForge using the same REST API that we do.
On that topic, then, let’s explore the API and build an example or two.
There are plenty of good, detailed tutorials about REST. Here are the basics you need to get started with ours:
- REST deals in resources. In our case, things like users and projects.
- REST uses the HTTP verbs you already know to get things done. GET, POST, PUT and DELETE are the most common.
- REST also uses the same HTTP response codes that web pages use. 404? That record doesn’t exist. 400? You submitted something invalid. 500? You broke it.
- REST uses the normal query string and request body that HTML pages use.
- Data is typically exchanged (submitted and returned) in JSON format, which is easy to handle on most platforms.
- Our REST API also accepts regular FORM POST format, so it can be called even from static HTML pages or libcurl.
- All of the resources, methods and parameters for the API are documented in our API Docs.
GForge has very deep and flexible access controls, and the data you receive from the API will usually depend on the user requesting it. You can submit a separate user ID and password with each request, or get a session ID (from the /usersession endpoint).
curl -X POST https://USERNAME:PASSWORD@next.gforge.com/api/usersession
The POST verb is used to create data on the server – in this case, a new session ID is created if the user and password match up. You can then use the session ID in place of the password for further requests. In a browser, the session ID will also be set in a cookie just like visiting the login page on a web site.
To “log out” and remove this session:
curl -X DELETE https://USERNAME:SESSION@next.gforge.com/api/usersession/SESSION
Note that you have to include the session ID for both the authentication and to specify which session to delete.
Get Some Data
Now that we have an authenticated user, we can use it to get data from the API. How about the user profile for a friend?
Read the API docs, and see what you can get under the /api/user and /api/project endpoints. There are a whole bunch of sub-entities within each one. Then maybe move on to /api/tracker or even /api/trackeritem to see tasks.
For the especially brave, try /api/poll…
Got questions? Comments? Bugs? Leave a comment, or find me on Twitter @mtutty.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572934.73/warc/CC-MAIN-20190916200355-20190916222355-00418.warc.gz
|
CC-MAIN-2019-39
| 2,798
| 22
|
http://mobitel.lk.ipaddress.com/
|
code
|
Mobitel.lk is shown with a location in Sri Lanka.
When pulling the information for Mobitel.lk, we found that the organization tied to this IP is Mobitel. More details for Mobitel.lk are displayed if available at the date of your request, which is July 26, 2014.
A more detailed IP address report for Mobitel.lk is below. At the time you pulled this report, the IP of Mobitel.lk is 220.127.116.11.
The context of Mobitel.lk is "Mobitel" and could reflect the theme of the content available on the resource.
More IP details of Mobitel.lk are shown below along with a map location.
|Host of this IP:||mobitel.lk|
|3.||mobitel user password|
|4.||mobitel train booking|
|5.||mobitel mms settings|
|7.||mobitel sri lanka|
|10.||mobitel prepaid internet plans|
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997904391.23/warc/CC-MAIN-20140722025824-00065-ip-10-33-131-23.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 754
| 11
|
http://www.advogato.org/person/gicmo/diary/11.html
|
code
|
I am about to change my Major from Computer Sciens to Physics. CompSci tends to be very boring and I am totally sure I wanna study Physics. On the other hand I still wanna have some kind of degree in CompSci so at least I will switch form the german Diplom to Bachelor (the latter will take less time to finish). Well I am not so sure about the whole thing yet; time will tell.
I got some interesting Mail today. It's a probosal by Norbert about the integration of the kde and gnome file system layers. I think to have one file system layer for both desktops is a very good idea but I am not so sure if the current POSIX-like strucutre is a good thing. I learned that while writing the gnome vfs http backend
I would suggest to be more abstract here:
- Of course I would still have a common API and various diffrent backends.
- Have some very basic i/o operations like vfs_read_entire_file(), vfs_write_entire_file() and vfs_file_info() that every vfs backend must implement.
- Then provide a vfs_get_capabilities () functions or something like that. This function is then used to list all additional features a module provies e.g.: streaming files, acls, and all that stuff. The stream base interface could look like this: vfs_read_stream (offset start, offset end) and vfs_write_stream (offset start, offset end).
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164050279/warc/CC-MAIN-20131204133410-00043-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,315
| 6
|
https://rdrr.io/cran/PathSelectMP/man/MPlusBackwardSelect.html
|
code
|
performs backward selection for
MPlusBackwardSelect(FileName, Directry, PSig)
name of folder where .inp and .out files saved
the path where folder is located containing .inp and .out M Plus files
the significance level used for backward selection
the regular user should not use this function and is referred to instead use the wrapper function codeAllBackwardSelect which calls this function
does not return value but rather reads and writes .inp and .out files to specified folder and directory
1 2 3 4 5 6 7
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473347.0/warc/CC-MAIN-20240220211055-20240221001055-00385.warc.gz
|
CC-MAIN-2024-10
| 627
| 10
|
http://www.justanswer.com/computer/6weyi-samsung-smart-tv-recently-its-smart-hub.html
|
code
|
by clicking Control Panel > Appearance and Personalization > Folder Options. When a new window opens, click on the View tab and select Show hidden files and folders. Then confirm by pressing OK.
I now have my photo's and videos being displayed correctly, with the exception of any music files which still indicate the wrong format. It looks like I will have to except this situation.
Many thanks for your help
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986625.58/warc/CC-MAIN-20150728002306-00102-ip-10-236-191-2.ec2.internal.warc.gz
|
CC-MAIN-2015-32
| 409
| 3
|
https://forum.endeavouros.com/t/scroll-wheel-is-erratic/35207
|
code
|
I have a pretty cheap USB wireless mouse which looks a bit like an Apple Magic 2 but its a poor knockoff. The scroll wheel has always been jerky and erratic since new, so I left it alone and used the touchpad on the laptop. I tried the mouse on the iMac a while back and it does the same jerky up/down behaviour. Strangely though, it scrolls through workspaces on Gnome smoothly. Now I am moving to a desktop, the mouse becomes more important because the scroll bar is narrow and my eyesight ain’t what it used to be.
I followed the arch wiki and installed imwheel, but I need a little help on the parameters in the conf file.
Should I be looking for a different mouse that is known to scroll smoothly? If so, some models. Should I be looking for a trackpad? I never heard of a Linux trackpad, as they all seem to be for M$ Windows. Although the iMac has a Wacom tablet which I tried a while back and its plug’n’play on - Its a bit big for my crowded desk, and wife would never let me have the tablet since I gifted the iMac to her a while back. Still, a recommendation on a small trackpad would be useful for consideration.
Just to clarify. The supposedly problematic mouse works fine in Gnome, but not your current desktop environment? (Are you using Gnome?) Or is it that the scrolling is smooth only when scrolling through workspaces but not elsewhere?
You can do a lot of things with IMWheel; you can even define different mouse behavior for different applications with it (that’s how versatile it is).
You should probably be a bit more specific on what you are trying to accomplish with IMWheel?
Are you trying to solve the smooth scrolling issue with it? But you asked for a recommendation for a trackpad at the end?
It jumps around everywhere in Gnome and even as I recall in the dark days of KDE. I don’t remember this mouse ever scrolling properly on any build or DE.
Yes, I just want to solve the smooth scrolling since now I can’t workaround it with a trackpad as I have n the laptop.
Trackpad is only in case there is no solution. Also I hear some Logitech mouse models play well on Linux. I only want a stable scrolling experience. I find it very strange that the scrolling is fine on moving between workspaces vertically. That leads me to think there is nothing pyhysically damaged with the mouse, and that is why I am exploring imwheel in case it is a configuration/tweak.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500664.85/warc/CC-MAIN-20230207233330-20230208023330-00710.warc.gz
|
CC-MAIN-2023-06
| 2,400
| 10
|
https://djlab.com/2010/05/decrypting-a-ssl-server-key-for-importing-into-cpanel/
|
code
|
In case someone accidentally encrypts a server key (e.g. not following directions) then expects it to be accepted in to Cpanel, you’ll need to decrypt it first.
Most web hosting platforms (like Cpanel) need the server key to be in clear text. The private key can be decrypted with:
openssl rsa -in encrypted.pem -out plaintext.key
Make sure whomever encrypted the key provides you with the pass phrase.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473598.4/warc/CC-MAIN-20240221234056-20240222024056-00521.warc.gz
|
CC-MAIN-2024-10
| 404
| 4
|
http://puttingitontheline.com/archery/weighted-down-to-practice-3d/
|
code
|
Walking out to the 3D range this morning, Brenda was watching me go from our front porch. She said, “You are really weighted down.” As usual, she was right.
Going out to the range means carrying a lot of gear. Aside from the standard stuff – bow, arrows, binoculars, release, quiver – this time of year, living in a swampy area, there the need for a Thermacell and a pistol.
Sure, you may be an expert archer and consider any poisonous reptile a target, not me. In my experience when crossing paths with a water moccasin my quiver has been empty and my bow was not in hand.
There’s a more practical side, if a snake can kill me I want to be able to kill it first and a firearm, even a small 380, beats an arrow. Even so, I’m hiking around the 3D range with 17-inch snake boots.
Aside from the snakes and mosquitoes, for which precautions can be taken, the range is beautiful. Spending 2 to 6 hours a day there practicing is very relaxing. Granted, it is a lot of work to manage this range, but it is worth it.
I may have to gear up and load up to spend time in the woods but it’s a worthwhile effort and time enjoyed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585183.47/warc/CC-MAIN-20211017210244-20211018000244-00531.warc.gz
|
CC-MAIN-2021-43
| 1,131
| 6
|
https://community.asterisk.org/t/2-servers-via-wan-multiple-calls-looping-over-wan/29056
|
code
|
I have 4 offices each with a asterisk 1.4 server. Each office has a isdn30 line and offices are connected via a 2mbit wan.
Asterisk has a sip trunk set up to link both servers via the wan using g729 codec.
We use a mix of ip phones. Phones are only connected to the local asterisk box. This system allows us to dial any phone at any office via the trunk. Works great.
My problem is:
Calls can comes in office A via isdn30 and then get transfered via the sip trunk to a member of staff at office B. If then office B transfers it back to a member of staff at office A we have the call going twice over the wan.
Is there any way to improve on this and have the call only going once over the wan via some clever extension etc . We do find we can get reduced quality due to this.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400188049.8/warc/CC-MAIN-20200918155203-20200918185203-00573.warc.gz
|
CC-MAIN-2020-40
| 774
| 6
|
https://blog.regehr.org/archives/856
|
code
|
Random testing is a powerful way to find bugs in software systems. However, to actually find a bug it’s necessary to be able to automatically tell the difference between a correct and an incorrect execution of the system being tested. Sometimes this is easy: we’re just looking for crashes. On the other hand, there are lots of incorrect executions that don’t crash and we’d like to find those too. A test oracle is what we call a way to automatically find erroneous executions. This post is intended to be a public brainstorm: I’ll list all the kinds of oracles I’ve thought of and hopefully you readers will leave comments filling in the gaps.
Programming environment rule violations. Most programming environments have some amount of built-in checking for rule violations. For example, the Linux execution environment will crash a process that attempts to access an unmapped part of the address space. Java has lots of reasons to throw exceptions. In many cases, the execution environment can be asked or forced to act as a more effective oracle. For example, Perl code can be run under “use warnings” and the Linux environment can enforce a dramatically expanded set of rules by running a program under Valgrind. Some libraries that you use can be compiled with extra input validation turned on. Also, the code being tested has to cooperate by failing to hide rule violations. For example, if my Linux program masks all signals or my Java program catches and ignores all exceptions, these oracles are going to have a hard time revealing anything interesting.
Function/inverse pairs. If we can find a pair of operations that undo each other, we can generate a random test case, apply the function to it, apply the inverse function to the result, and compare the output with the original test case. I wrote about this earlier.
Nops. Many codes have semantic nops that can be exploited to find bugs (a function/inverse pair is a kind of nop but it seemed important enough to split out into its own category). For example, if we’re testing a transaction processing system we might begin a lot of transactions, force them all to abort, and then check that the data has not been changed. If we’re testing a JVM we can force the garbage collector to execute after every instruction and then check that the program’s output is not changed. At the hardware level, flushing the pipeline or caches should not affect the ongoing computation. Concurrent software (usually) should not change its result if we put random sleeps inside critical sections or force the thread scheduler to perform many more context switches than it usually would. A system that is designed to recover from transient faults, such as dropped or corrupted network messages, should not change its behavior when such a fault is artificially induced.
Nullspace transformations. If I’m testing a compiler, I might take some test case and replace every occurrence of x with (1+x-1) or (1.0 * x) or perhaps a call to a silly getter or setter function. The transformed program, when compiled, should behave the same as the original, as long as I’m super careful not to run afoul of overflows and such. If I’m testing a spellchecker, I might introduce whitespace changes or additional correctly-spelled words and make sure its behavior is not changed. The basic idea is that even if we can’t predict the behavior of a system, we can probably think of ways to change inputs to that system in such a way that the output of a correct system will not change. I’m grabbing the name of this kind of oracle from this paper.
Multiple versions. Occasionally we have multiple independent implementations of the same specification, such as a collection of Java compilers, and they can be tested against each other. Even when this is not the case, we can often test today’s version of our system against yesterday’s version or perhaps the previous release. Some kinds of program, such as optimizing compilers, effectively contain many versions in one: the -O0 version of GCC, the -O1 version, the -O2 version, etc.
Assertions. Internal consistency checks can be a very powerful kind of oracle. Here, we run our code on a random input and simply wait for the code to report an error.
Resource limits. Sometimes we can be pretty sure that our code should not, for example, use more than 1 GB of RAM or 1 minute of CPU time on simple random inputs. In that case, we can use a call such as ulimit to arrange for the OS to signal an error when the resource bound is exceeded. Finding good resource limits can be hard.
14 responses to “Oracles for Random Testing”
Busy with a paper submission, but off hand, metamorphic testing comes to mind — I know changing the input F(x) will cause F'(y) on the output. Generalization of nullspace, in a sense — predictable changes in output based on a class of input transformations.
A generalization of the function/inverse and nop ideas is fixed-point iteration: applying a function F to the program x and then to F(x), etc., should converge to some F(y) = y “quickly.” A classic example is that a parser and AST pretty-printer pair should converge within two cycles; another example is the multiple-stage trick of compilers (a compiler should be byte-for-byte equivalent with itself when compiled by itself and when compiled by a host compiler).
A generalization of my earlier comment on Function/inverse pairs: I’d suggest generalizing the term to “Identities with Fudge Factors.” The obvious one is the traditional sine squared plus cosine squared, though we didn’t get much mileage out of that. A slightly more complicated test did find a genuine bug in the PalmSource compiler’s hypotf.
Re inverse functions: we (Hex-Rays) started using Csmith to test our decompiler. We generate a “good” (non-erroring and non-crashing) program with Csmith, compile and run it, decompile the object code, compile the decompiled code and (if this step succeeded) check that the re-compiled program produces the same output. We are not using it extensively yet but we already found many subtle (and not so subtle) decompilation bugs. Many thanks for the great program!
Multiple Versions reminds me of a technique I learned from an Wise Old Programmer. Let’s say you need to re-implement an interface e.g. to make it faster/use less memory/etc. Keep the old interface available. When you are ready to validate the new interface, run your entire test suite–under the covers, use both the new and old implementation, and verify that the results are same. When you’re sure everything is working properly, cut away the old code. You can save your customers a lot of pain this way.
Generalizing assertions, of course, there is the huge area of checking properties of the logs. Temporal logic if you are a fancy model checking background person (maybe instrumentation for runtime verification), but regexps on logs for all kinds of people — I’ve used this on actual code, not just in papers.
LogScope was an attempt to make log properties fairly easy to write/check, that we used some (before the test team was disbanded during mission wait until later launch) on Curiosity software (http://www.cs.cmu.edu/~agroce/icse10.pdf),
“Nullspace transformations” and “nops” seem like the same principle to me. In both cases, you’re testing your implementation of F by finding some function g that preserves all the interesting properties of its argument (which is to say, g(x) ≡ x) and then verifying that F(g(x)) ≡ F(x).
“Multiple versions” testing (e.g. testing -O1 against -O2) is useful when you have implementations of F and F’ that are supposed to be equivalent; in that case you can verify that F(x) ≡ F'(x).
“Function-inverse pairs” are distinct from “nullspace transformations” (for the record I think those are both horrible obfuscatory names): in this case, you’re testing F by verifying that x ≡ h(F(x)) for some “inverse function” h.
In all the cases above, note that “x ≡ y” really means “f(x) = f(y) for some conveniently chosen hash function f”. Maybe that hash function is “run the code and take its output”, or maybe it’s “dump the contents of the text section through od”, or maybe it’s just “grep the output for a certain message”.
And by “verify …” I really mean “provide some concrete evidence in favor of the hypothesis that …”. 🙂
Compiling a compiler with itself is sort of a special case, I think. In that case your function F is supposed to have the special property that F(p) ≡ p for any program p. So you can do “multiple versions” testing with your original F and with an F’ := F(F); if the two versions ever differ in their behavior, then you’ve found a program p (namely F itself) for which F(p) is distinguishable from p.
Hi igorsk, great to hear! Please also consider using C-Reduce and also let us know if anything isn’t working.
Alex, log inspection is a great addition to the list, thanks.
Hi Arthur, please consider supplying some non-horrible, non-obfuscated names! Alex and I are going to be putting this material in a book at some point so now’s your chance to stop us from putting these into print.
By the time I wrote my third garbage collector, I knew that debugging it was going to suck so Before I wrote the collector, I wrote a pretty full set of invariant checking assertions for the heap and then ran the checks before and after every gc.
I used the same trick in the SoC-C runtime system (a load of coroutines, fifos, irq handlers, etc.) – very effective.
You had already mentioned assertions, but I think the special case of (quite expensive, recursive functions that check) invariants is worth particular attention.
Hi Alastair, I like to make a distinction between shallow assertions (only look at metadata, run in small constant time) and deep assertions (may look at all data in a data structure, may have runtime even worse than that, for example to verify a sort routine).
@John #10: I don’t have any shrinkwrapped suggestions, but I think good names would reflect the mathematical equivalences going on here. For example, I’d describe “nullspace transformations” by the phrase “Verifying that equivalent inputs produce equivalent outputs”. For “function-inverse pairs” the best I’ve got is “Verifying that a function of the output is equivalent to the input”. Then, for “multiple versions testing” (which I think is already a good name, btw), it would be “Verifying that the output is equivalent to a [known] function of the input.”
It *is* cool (now that I really notice it) that you’ve cleanly cleared “testing methodology” – black-box, white-box, fuzz, coverage, etc. – away from the much simpler question of “When we run any given test, how do we know if it passed or failed?”, to which there really *are* just a few possible answers. (It segfaults; it assert-fails; or it doesn’t match the expected output, for only a few possible definitions of “match”.)
Maybe there’s a useful parallel to the categorization of weaknesses in cryptography: a cipher might be attackable if C(g(k)) ≡ C(k), or if h(C(k)) ≡ k,… okay, so the parallels aren’t very exact, but still there might be some useful terminology you could steal from that field.
For parallel programs, what works great for us is schedulers randomizing execution order. That is, you run the same program many times and check that it produces the same outputs, but every time, you use a different random seed and the scheduler runs things in a different order.
I haven’t tried replacing a generic thread scheduler that way (a tool called Jinx does/did something like that I believe); I usually work against a higher-level task creation interface (not unlike OpenMP or TBB). Here’s an open source framework with a randomizing scheduler that I’m working on now (the code isn’t that great, nor is the entire repository… it’s a couple days old) – the scheduler is here (it’s really dumb – just run iterations in a parallel_for in random order, which is good enough to detect non-commutative side effects where there’s a race between the different iterations):
At work, we have something more elaborate dealing with arbitrary (but statically-known in our case) task graphs. With a task graph, it seems desirable to generate all schedules which could cause the order of independent tasks to flip (A before B in one order, B before A in another order; it’s equally desirable with iterations of parallel_for, it’s just so easy that it’s less worth mentioning). Here’s a write-up describing this:
A related oracle is access to data stored by another task/thread, however that’s defined in the parallelism framework – that is, the access itself regardless of how it affects the output. An easy way to track ownership (ID of the last storing task) is using something like Valgrind. Here’s a Valgrind tool which will flag access to data stored by someone else at runtime; it should be used together with a randomizing scheduler and then it will detect commutative side effects like accumulator updates or “almost commutative” side effects like allocation from thread-unsafe pools, which will otherwise go undetected (again the code is half-baked):
I think this works great with programs which are coded in a parallel fashion for performance reasons (to compute something faster). I’m not sure it extends that well to inherently concurrent programs (like banking or websites), because the success of these methods seems to me to depend, among other things, on being able to limit the interface to parallelism in ways that may be too inflexible for such applications; but I haven’t really thought it through (I work on computer vision, not banking or websites…)
(All of this is related to manipulating the scheduler as you mentioned, except it’s specifically directed at making the order of particular events different; which apparently has the downside of requiring more understanding of the app structure.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00221.warc.gz
|
CC-MAIN-2023-14
| 14,190
| 38
|
https://www.shapeways.com/forum/t/looking-for-modeler-to-build-small-custom-enclosures.8701/
|
code
|
am looking to make a miniature 3-d model in the design of a few old computers.... If this is something you are interested in, let me know and reply with more detail on potential price. The model should be ready for submission to shapeways for build. thank you I have already made about 4 different models, hoever, the current modelers has some time problems at the moment. thanks I will provide some more information upon reply.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607806.46/warc/CC-MAIN-20170524074252-20170524094252-00486.warc.gz
|
CC-MAIN-2017-22
| 428
| 1
|
https://buoygames.com/
|
code
|
Unity and UE4 Game Developer VR Game Developer
Hello! My name is Jacob Buoy and I am a game designer. I have created everything from board games to virtual reality games/experiences. If you would like to know more about me please visit the about section of the site. All the games featured on this site are available for play, download or purchase. Below is my current Demo Reel featuring my favorite work. Feel free to email me at: firstname.lastname@example.org if you have and questions, comments, or my personal favorite critiques! Thanks in advance for taking a interest in my work!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00592.warc.gz
|
CC-MAIN-2023-40
| 587
| 2
|
https://forum.openwrt.org/t/asu-server-locked-up/152266
|
code
|
Trying to do auc on an x86/64 box and get queue position 403, hangs for 10s of minutes. Killed it and tried again, same thing. Went to firmware selector and same thing happens, just hangs... https://firmware-selector.openwrt.org/
EDIT: Using SNAPSHOT, if that matters.
Probably should have pinged @aparcar initially...
Oh, and is this the right place to check this sort of thing?
You can try it in the dedicated thread probably - Online ImageBuilder and Upgrade Server - #571 by castillofrancodamian - already asked in the thread.
This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00755.warc.gz
|
CC-MAIN-2023-23
| 631
| 6
|
https://www.appthemes.com/blog/tag/1-5/
|
code
|
The latest version of JobRoller is now available. This release includes several bug fixes, new features, and an important Indeed integration change. Please read this entire post before performing the upgrade as not everyone may wish to do so.
The most notable changes in 1.5 have to do with the Indeed integration and a new resume (CV) subscription monetization feature. To see the full list of fixes and changes in this release, read the 1.5 release notes on our docs site.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515564.94/warc/CC-MAIN-20181023002817-20181023024317-00544.warc.gz
|
CC-MAIN-2018-43
| 474
| 2
|
https://aitopics.org/mlt?cdid=news%3AE35FBDB8&dimension=pagetext
|
code
|
Like many startups, the number of employees at Airbnb has grown significantly over the past several years. In parallel we have seen explosive growth in both the amount of data and the number of internal data resources: data tables, dashboards, reports, metrics definitions, etc. On one hand, the growth in data resources is healthy and reflects our heavy investment in data tooling to promote data-informed decision making. However it also creates a new challenge: effectively navigating a sea of data resources of varying quality, complexity, relevance, and trustworthiness. In this post we describe our observation of this problem and the Dataportal, a novel data resource search and discovery tool that addresses this issue.
A data catalog helps companies organize and find data that's stored in their many systems. It works a lot like a fashion catalog. But instead of detailing swimsuits or shoes, it has information about tables, files, and databases from a company's ERP, HR, Finance, and E-commerce systems (as well as social media feeds). The catalog also shows where all the data entities are located. A data catalog contains lots of critical information about each piece of data, such as the data's profile (statistics or informative summaries about the data), lineage (how the data is generated), and what others say about it.
Not only does this provide useful information to users in the moment, but it has also helped raise awareness and increase the adoption of Lexikon. Since launching the Lexikon Slack Bot, we've seen a sustained 25% increase in the number of Lexikon links shared on Slack per week. You just listened to a track by a new artist on your Discover Weekly and you're hooked. You want to hear more and learn about the artist. So, you go to the artist page on Spotify where you can check out the most popular tracks across different albums, read an artist bio, check out playlists where people tend to discover the artist, and explore similar artists.
Unstructured enterprise data such as reports, manuals and guidelines often contain tables. The traditional way of integrating data from these tables is through a two-step process of table detection/extraction and mapping the table layouts to an appropriate schema. This can be an expensive process. In this paper we show that by using semantic technologies (RD-F/SP ARQL and database dependencies) paired with a simple but powerful way to transform tables with non-relational layouts, it is possible to offer query answering services over these tables with minimal manual work or domain-specific mappings. Our method enables users to exploit data in tables embedded in documents with little effort, not only for simple retrieval queries, but also for structured queries that require joining multiple interrelated tables.
Tackling the information retrieval gap between non-technical database end-users and those with the knowledge of formal query languages has been an interesting area of data management and analytics research. The use of natural language interfaces to query information from databases offers the opportunity to bridge the communication challenges between end-users and systems that use formal query languages. Previous research efforts mainly focused on developing structured query interfaces to relational databases. However, the evolution of unstructured big data such as text, images, and video has exposed the limitations of traditional structured query interfaces. While the existing web search tools prove the popularity and usability of natural language query, they return complete documents and web pages instead of focused query responses and are not applicable to database systems. This paper reports our study on the design and development of a natural language query interface to a backend relational database. The novelty in the study lies in defining a graph database as a middle layer to store necessary metadata needed to transform a natural language query into structured query language that can be executed on backend databases. We implemented and evaluated our approach using a restaurant dataset. The translation results for some sample queries yielded a 90% accuracy rate.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064520.8/warc/CC-MAIN-20210411144457-20210411174457-00540.warc.gz
|
CC-MAIN-2021-17
| 4,192
| 5
|
https://igiltd.com/software/igi-software-user-guides/metis-discover-user-guide/deleting-data/
|
code
|
Data with geographic coordinates can be queried spatially.
Version: 1.21 (Dec 2019)
Usage: Data removal
Deleting samples via Discover from the Staging area is only possible if you’re a user of Metis Transform. Non-Transform users are unable to remove data from the Staging area and the following options are not visible to them at all.
After running a query of that returns up to 1,000 samples the red delete button becomes enabled. If more than 1000 samples are returned, then you will need to refine your criteria further in order to be able to delete any samples; 1000 samples is the maximum number it is currently possible to delete at a time.
Once the delete button is clicked then two options are presented: Delete or Export & Delete. Delete simply removes the data without making a copy first. Whereas “Export and Delete” will export the samples before deletion occurs. If you choose to delete all the samples in a well then that well will also be deleted along with it’s associated samples.
Once the deletion has completed Discover will refresh and display the new sample and well count in the data grid.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585178.60/warc/CC-MAIN-20211017144318-20211017174318-00661.warc.gz
|
CC-MAIN-2021-43
| 1,120
| 7
|
https://trinidadvintage.com/en/tienda/vintage-handbags/handbags/envelope-clutches/snakeskin-clutch-with-strap-fastening/
|
code
|
Strap fastening lined in leather.
Made in snakeskin with decorative stitching and craftsman-perfect finish. The skin’s natural patterns become the centre of attention given the bag’s minimalist design. The interior is lined in goatskin.
It has a single compartment with an open side pocket.
It is in very good condition.
This handbag can stand on its base.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735792.85/warc/CC-MAIN-20200803083123-20200803113123-00457.warc.gz
|
CC-MAIN-2020-34
| 360
| 5
|
https://forums.beamdog.com/discussion/comment/1121124
|
code
|
Dark Dreams of Furiae - a new module for NWN:EE! Buy now
Changing saved games directory
Hi. I've managed to mess up the OneDrive folder my saves are in (you really don't get a choice that files are backed up to OneDrive with Windows 10) such that the game will crash on attempting to show the Load Game menu. How can I therefore change the directory games are saved to so I can move them out of there and the game still be able to find them (and not crash)?
I won't go into why I'm having problems. I've wasted the best part of a day now attempting to fix the problem and I don't believe it even is fixable. Everything now seems as it was before the problem and yet I'm still getting crashes. I've read elsewhere that this is OneDrive problem and not due to the game. Sometimes I can load my last save but never the Load Game menu. The problem came about as a result of deleting some saves because with over 500 saves now, the Load Game menu took around 2 minutes to appear from the title screen. When you delete saves in Explorer (I am not clicking that delete button in game 500 times!) Steam will write them back in (assuming cloud saving is on) by extracting .CLOUD files (also saved to OneDrive) to the save directory thus causing the problem. This even seems to happen if cloud saving is turned off so I really don't care to understand what's going on any more. Every time I run the game, OneDrive is writing 3000+ files back as .CLOUD files and...
Look, there's more to this as I say, but I'm not going into any more detail now and I am not looking for advice regarding this. Just DO NOT DO WHAT I DID
tl;dr- If anyone does know how to change the settings somewhere I'd be very grateful for help because my quest is at a halt right now and that's no good!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988850.21/warc/CC-MAIN-20210508061546-20210508091546-00312.warc.gz
|
CC-MAIN-2021-21
| 1,762
| 6
|
http://sumrandomguy.com/faq/detail/how-can-i-pause-a-buddy-s-bot-remotely-so-i-can-defend-him
|
code
|
I've received questions about this enough times to write it up. Here's the instructions.
OK, sometimes it's necessary to pause someone's bot remotely so it doesn't kick you out while defending.
This HAS to be set up ahead of time; can't just have people pausing other people's bots, can we?
In the following scenario, we have the following actors:
SRG is the supporting defender; I'm always online.
GBA is the Guy Being Attacked; he's sleeping
SRG issues the following whisper:
GBA sees in his Commands window:
18:08:11 Receive from SRG: pause , hash = e2966f3e
GBA provides this hash to SRG. That's HIS specific key. No one else can use it. Now, when SRG sees GBA being attacked at some later time, he can do this:
/GBA //pause e2966f3e 2
The 2 on the end says to pause for 2 hours. If it went well, SRG will get a whisper back saying "Pausing for 2 hours."
- 1 hour is the minimum amount of time you can pause a remote bot.
- The rest that I had in here are irrelevant
The upsides are that a bot with a timing problem won't kick you out when you're trying to defend. People are MUCH better defenders than the bot any day. You also know that when you received the "pausing for 2 hours" message, it was a bot online and not a human.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806569.66/warc/CC-MAIN-20171122103526-20171122123526-00652.warc.gz
|
CC-MAIN-2017-47
| 1,232
| 15
|
http://www.michellegreene.org/scene-search/
|
code
|
Visual Search in Scenes
How do I find my lost keys? Visual search for real objects in real scenes does not always follow the same laws as visual search displays that are frequently used in experiments. In particular, the number of objects in a scene has very little influence over the difficulty of the search. In seeking to understand why this is the case, my colleagues and I have put forth a two pathway theory whereby a non-selective and global analysis of the scene can allow for activations of possible object locations while a selective process can evaluate each location in a serial manner (Wolfe et al, TiCS 2011).
What sort of information makes up the global image analysis? My global scene properties seemed like a good place to start. We examined visual search slopes for scenes with a particular global property, such as highly navigable scenes among non-navigable distractors. It does not appear that global properties are available without selective attention as search times increased substantially with increasing numbers of distractors (Greene & Wolfe, JoV 2011).
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256724.28/warc/CC-MAIN-20190522022933-20190522044933-00056.warc.gz
|
CC-MAIN-2019-22
| 1,081
| 3
|
https://community.brave.com/t/browser-slow-to-the-point-have-to-abandon-it/50027
|
code
|
I have exact the same problem here. Up to date version on mac OS 10.10.5 Problems started a few days ago. Before that no problems and I didn’t change anything. Especially Youtube is lagging to the point that it isn’t usable anymore.
If more people experience this please report so that a solution can be found.
Would either of you be willing to install the previous stable release (0.61.51), to confirm that it resolves the performance issues for you? You can find the appropriate files on GitHub. If you have any questions about which file is right for you, please do not hesitate to ask.
I can not check if it makes any difference as Brave 0.61.51 starts updating to 0.61.52 immediately after installation. I can not find where to switch off auto update. I wasn’t aware that it does so in the first place.
Are you still experiencing the slow performance issue? I see what you’re saying about auto-update, but I’m curious if a general un/reinstallation had any effect?
Additionally, for anyone experiencing this issue (@haiku@ee444), we’d like to get some additional information surrounding the issue so we can look for common threads among users and isolate the root problem. If you don’t mind, can you tell me:
3rd party/installed extensions you have enabled?
Which Brave features or built in extensions you have enabled (Brave Rewards, Brave Ads platform, webtorrent, hangouts, etc)?
Did you import browsing data from another browser at any point?
Additional solutions to try:
Disable Hardware acceleration and see if performance improves (Hardware acceleration sometimes has conflicts with streaming video content – may explain your YouTube issue @tatababa). To disable, open your the menu and navigate to: Settings --> Advanced --> System --> Hardware Acceleration
Create a new/fresh profile using the “People” menu on the top-right of the browser. Open the menu --> Manage People --> Add Person. The browser will relaunch with a clean profile and no enabled extensions. Take a few moments to browse using this new profile and note whether performance increases.
Try downloading theBetaorDeveloperversions of Brave. Both can be downloaded, installed and run without interfering with any other Brave version you have on your machine (so you don’t need to worry about your data being overwritten). Browse normally for a while and note whether or not performance improves.
If you have Brave Rewards enabled (as asked in first set of questions), can you try disabling it (temporarily)? Disable, relaunch, and see if the issue reproduces after browsing normally for a while.
Please let me know the results of any tests and/or additional details you can provide about this.
I imported data from Firefox when I first started using Brave. I had no issues with that. I have used Brave, nearly exclusively since. That’s been about 90 days with no issues at all.
When the browser slowed, I figured it was on my end - problems with my internet connection. I lived with it for several days, maybe five days. In that period of time, I would most likely have had the two extensions that I use intermittently, activated for some period of the time but I generally toggle them off after using them. I don’t think it’s connected.
I finally, reluctantly, opened firefox and was surprised when it zipped along, I made no changes top Brave, when it began working normally again.
I use the internet for work and have the sites I visit are static. This was akin to driving to work through a traffic jam, you can do nothing about. And now it’s cleared.
I did some testing with Version 0.61.51 Chromium: 73.0.3683.75 (Official Build) (64-bit). I installed it along the newer version by dragging it to the applications folder and renaming it to Brave Browser 2. By not relaunching it, it doesn’t complete the update proces and thus remains the old version. As far as I can tell the same problem persists. Mainly graphic anomalies when typing in search bars and flickering elements in a site. I’ve made a screen shot of what happens if I type in the main search bar. As far as I could tell your suggested solutions didn’t work unfortunately.
I have tried downloading 2 different versions of 0.61.51 for windows and neither one will download in under 5 hours!!! I am running Win 10 Home version 1903. My system has become SO slow since I downloaded Brave that I’m wondering if I really want to keep it.
I have the latest version of Brave and am unable to install the previous version due to time constraints. (I’m simply NOT going to wait 5 hours for Brave 0.61.51 to download)
I have installed no extensions since downloading Brave
I have turned off everything that you mentioned in re: Brave features etc.
I imported everything from chrome that was available because otherwise it simply refused to import anything!
I disabled Hardware Accel. But there was no “Manage People” in my menu!
There has been no improvement or change since doing all of the above! What do I do now?
I understand that this is about performance … doesn’t having nothing happening in the browser refer to performance??
Yes, I did say I tried downloading the earlier version of Brave and it kept increasing the time left to download … doesn’t that have something to do with performance since I was using Brave?
All of the other stuff was in reference to the suggestions you made.
I am having the very same problem as everyone else here … Brave barely works and since I downloaded it, everything has slowed down!
I am becoming very frustrated, Mattches! I am experiencing the exact same problem as everyone else … Ever since downloading Brave (on the Brave download page) EVERYTHING on my computer has slowed to a crawl, but, especially the Brave browser. I followed ALL of your suggestions for speeding up Brave and nothing worked.
I am QUITE aware that this thread is NOT about downloads and IS about Brave’s performance as I stated in my last message, and I AM most definitely referring to Brave’s performance. The information I gave about downloading was in response to YOUR suggestion that we go to github and download the previous version of Brave. I was simply informing you that I could not follow your suggestion since Brave would NOT download anything … Just as it doesn’t work to browse the web!
This message is NOT about downloading! It is about the fact that Brave is NOT working as a browser should. ie. it is slower than a snail!!
Please stop with the all caps – it doesn’t, nor has it ever, made anything better.
Additionally, I didn’t suggest that you download and install a previous version. I offered the standalone installer which contains the necessary files to install locally without having to fetch them from anywhere online – I made this suggestion because I thought you were referring to the actual download speed of the Brave installation files.
But your initial reply was,
This is why I told you about the standalone installer, which may not take 5 hours to download.
What I would suggest is confirming that Brave is the root cause of your system slowdown by uninstalling it and seeing if your system performance improves. If it does, we can work on getting Brave reinstalled and functioning properly.
@Mattches - I don’t know if this is of any use, but thought it was worth a mention:
Since updating to 0.61.52 (Windows 10), with Brave open I’ve been seeing a large volume of memory management popups and high memory utilization.
I’ve got the exact same session/tabs open as I had in .51 (they’re all work related and I’ve not had much opportunity to browse around elsewhere since!). With .51 I was not seeing any “Low on Memory” errors, but with .52 I’ve seen a good few, as already mentioned. Therefore, maybe it’s a question of memory usage?
Happy to provide any extra info that may be of use though, just wanted to offer up my two pennies
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578533774.1/warc/CC-MAIN-20190422015736-20190422041736-00187.warc.gz
|
CC-MAIN-2019-18
| 7,912
| 43
|
https://ulrik.blog.aau.dk/arinc-653/open653/
|
code
|
In the autumn of 2016 I supervised a student project on the topic of creating a ARINC 653 compliant operating system for the embedded platform Mini-M4 for STM32.
The project was inspired by the complete lack of open source solutions of ARINC 653 on which to perform experiments. The developed (but not completed) solution is available under the MIT license. If you use the software in teaching or experiments I would appreciate to hear from you (email@example.com).
Open653 (zip file including source-code)
Comments are closed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643784.62/warc/CC-MAIN-20230528114832-20230528144832-00644.warc.gz
|
CC-MAIN-2023-23
| 527
| 4
|
https://code.msdn.microsoft.com/Create-SQL-Agent-job-using-b95584e7
|
code
|
We’re sorry. The content you requested has been removed. You’ll be auto redirected in 1 second.
Create SQL Agent job using C# and SMO(SQL 2012)
Sample code to create SQL Agent job using SMO Visual Studio 2010 SP1 and SQL 2012 Management tools.
Sample C# application that creates a simple SQL Agent T-SQL job that runs on a one-time schedule
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119642.3/warc/CC-MAIN-20170423031159-00403-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 344
| 4
|
https://mlog.club/article/5588142
|
code
|
To hide the endpoint in the Django documentation just
@schema(None) has to be added for example to GenericAPIView, however I have a problem with these three urls:
url(r'^swagger/', schema_view), url(r'^rest-auth/', include('rest_auth.urls')), url(r'^rest-auth/registration/', include('rest_auth.registration.urls')),
I am not able to add
@schema(None) decorator because I do not have declared views for these urls. Any ideas how to work it around?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662512229.26/warc/CC-MAIN-20220516172745-20220516202745-00292.warc.gz
|
CC-MAIN-2022-21
| 447
| 5
|
https://community.filemaker.com/thread/97928
|
code
|
A script using the Install OnTimer Script script step will do what you want.
If this view can be displayed from with all the records in the table via a Show All Records, there isn't even a need for a script. The data will update automatically. Newly created records will automatically appear.
If you are displaying a subset of all the records in this table, then a timer controlled or looping script can periodically perform a find to refresh the records that should be part of this found set.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886133042.90/warc/CC-MAIN-20170824062820-20170824082820-00053.warc.gz
|
CC-MAIN-2017-34
| 493
| 3
|
http://www.crocodilesbag.com/crocodile-frame-tote/
|
code
|
Crocodile Frame Tote Bag Bottega Veneta
Taupe crocodile Bottega Veneta frame tote with silver-tone hardware, dual rolled leather top handles with Intrecciato accents, tonal smooth leather lining, single interior zip pocket and clasp closure at top. Includes accompanying compact mirror and dust bag. Shop Bottega Veneta handbags on sale.
- For Sale! Buy Now at: Therealreal
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141681209.60/warc/CC-MAIN-20201201170219-20201201200219-00347.warc.gz
|
CC-MAIN-2020-50
| 373
| 3
|
https://campusbuilding.com/j/software-development-engineer-aws-lambda-21714/
|
code
|
Software Development Engineer, AWS Lambda at Amazon
Software Development Engineer, AWS Lambda Details
April 16, 2019, 12:03 p.m.
Software Development Engineers
AWS Lambda team The Seattle-based AWS
AWS Lambda is changing the way that companies big and small think about computing in the cloud. Lambda functions offer customer a "serverless" way to create applications, an approach that lets customers turn business logic and application code into scalable, fault-tolerant production systems without requiring every developer to become an expert in distributed systems, deployment technologies, and infrastructure management. The Seattle-based AWS Lambda team is growing rapidly and is looking for talented software engineers who can help us create the massive scale and powerful new programming paradigms that our customers need to be successful. This position is to be part of the team building the fault-tolerant backend distributed data plane for Lambda. If you're excited by cloud computing, want to help lead from the innovative edge, and have a deep mastery of distributed system design, then join us in making Lambda the most successful computing platform on the planet! Job location is Seattle,
· Bachelors degree in Computer Science or a related field, 3+ years relevant work experience (or more for senior level developers) · Knowledge of C and at least one modern programming language, such as Java, Scala, C++, or C#· Computer Science fundamentals in data structures, algorithm design and problem solving · Demonstrated systems programming expertise · Experience in C/C++ or Java and exposure to interpreted languages such as Python · Excellent communication skills and the ability to work well in a team · Strong customer focus, ownership, urgency and drive · Experience building and operating
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501555.34/warc/CC-MAIN-20230209081052-20230209111052-00630.warc.gz
|
CC-MAIN-2023-06
| 1,814
| 7
|
http://www.drdobbs.com/windows/windows-phone-81-preview-for-developers/240167152
|
code
|
The developer preview for Windows Phone 8.1 is now available for developers to start building and testing applications alongside the tooling delivered in Visual Studio 2013 Update 2 RC.
The Windows Phone Preview for Developers program is working in line with the Windows Phone Store, which is now starting to accept app submissions and to enable app linking.
To update a device from Windows Phone 8 to 8.1 developers will need to download the developer preview app and opt into the program (the process is outlined on the Windows Phone Dev Center). If a phone is already opted in, then developers can simply check settings and check for an update.
"The Windows Phone Preview program, introduced last October, gives our developer community access to pre-release builds of Windows Phone updates before the operating system updates are made generally available to consumers. We make these updates available to you to enable on-device testing, and to enable you to build and test platform capabilities not present in the emulator," said Microsoft.
The firm says that it realizes how critical it is for programmers to see an app running on a physical phone prior to submitting to the store. Microsoft also notes that most emulator-based testing typically is focused on functional testing (does the code work as designed), while on-phone testing tells more about the app's real-world usability (e.g., touch target sizing, load times).
Going further than any kind of testing, there are a number of application usage scenarios that simply cannot be performed using the emulator alone, such as those involving device sensors like Bluetooth, NFC, and the camera.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525094.53/warc/CC-MAIN-20190717061451-20190717083451-00130.warc.gz
|
CC-MAIN-2019-30
| 1,652
| 6
|
http://programmers.stackexchange.com/questions/tagged/university+jobs
|
code
|
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Why should I not do a masters degree [closed]
I have left university on July 2010 where I studied web design (as we all know you learn more by your self but that’s not the issue at the moment). Since then I have not managed to find a job (apart ...
Mar 6 '11 at 7:47
newest university jobs questions feed
Announcing The Launch Of Meta Stack Exchange
Hot Network Questions
How can I deal with the challenges a player having Mind-Reading represents without negating their ability?
Is it possible that "A counter-example exists but it cannot be found"
Picasa without G +
Is it okay to report classmates cheating on exams?
Why doesn't Apple ship and support FOSS drivers for NTFS write capabilities?
Is there a single word for date of death?
How can I prove that I didn't plagiarize?
If an author declines authorship, may her co-authors publish without her?
Thoughts on Tattoos in the Workplace
Is there one word for both horizontal or vertical, but not diagonal, adjacency?
*Master in Java Programming* or *Master at Java Programming* - The Use of 'Master'
Draw a regular polygon
First night on a telescope questions
How to explain Heartbleed without technical terms?
How to get Ubuntu distribution's full code name?
Does `sl` ever show the current directory?
What needs to happen for email encryption to go mainstream?
Define and set length in one command
Nothing appears in simple plot
The antonym of political-savvy
What is Overmodulation?
What is a good topic for an essay on applications of Calculus 3?
Why does a nuclear explosion have directionality?
Why did early telephones use a rotary dial instead of 10 individual buttons?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537097.26/warc/CC-MAIN-20140416005217-00189-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 2,271
| 53
|
https://jsobject.info/2017/04/25/pydev-of-the-week-honza-kral/
|
code
|
This week we welcome Honza Král (@HonzaKral) as our PyDev of the Week! Honza is one of the core developers of the Django web framework. He is also the maintainer of the official Python client to Elasticsearch. You can see some of the projects he is interested in or working on over at Github. Let’s spend some time getting to know Honza better!
Can You Tell Us a Little About Yourself (Hobbies, Education, etc):
I grew up in the Old Town of Prague, Czech Republic where I also went to school, including University where I studied computer science (which I didn’t finish). During my studies, I discovered Python and immediately fell in love, first with the language and later, after going to my first Pycon in 2008, with the community.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583879117.74/warc/CC-MAIN-20190123003356-20190123025356-00437.warc.gz
|
CC-MAIN-2019-04
| 739
| 3
|
https://questions.x-plane.com/24258/x-plane-11-arduino-button-allocation
|
code
|
Good morning all,
Have been experimenting and flying X-Plane from the old no 6 version and still loving it. I have installed V 11 a few weeks ago and am now stuck in a corner.
I use a ELA gyroplane model which I downloaded. Comments on the forum indicates that it is working fine in X-Plane 11. I can fly it with conventional commercial control joystick.
I have an Arduino board with 4x axis (analogue inputs) and 7x digital (switch) inputs.
I use SimVim plugin to run Arduino.
I can use the custom controls through Arduino to control the Pitch, roll, rudder and throttle.
I can use 1x of the digital inputs (brakes On/Off) but the rest like Master on/off or Mags on/off or Pre-rotate does not work. I have configured them in the SimVim "configurator".
I looked at the ELA model in Plane maker under 2D panel. I can see 1 or 2 of the switches I want the Arduino to handle, but switches like Master and Mags does not show in 2D panel?
In the main X-Plane program there is no longer a screen where all the buttons appear (compared to X-Plane 10).
How can I get X-Plane 11 to read my custom buttons and switches from Arduino (through SimVim plugin)?
I imagine I need to figure out what the ELA model uses and then define them in SimVim, but how and where do I get that info?
Some help will be much appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532948.2/warc/CC-MAIN-20190421235818-20190422021818-00529.warc.gz
|
CC-MAIN-2019-18
| 1,307
| 12
|
https://paperplanetdesigns.com/six-with-ties-to-mit-honored-as-2022-acm-fellows-mit-news.html
|
code
|
On January 18, The Association for Computing Machinery (ACM) announced its 2022 Fellows “recognized for significant contributions in areas including cybersecurity, human-computer interaction, mobile computing, and recommendation systems in many other areas.” Among the new crop are six prominent scientists connected to MIT.
Armen Avanessians (1982) Professor Constantinos Daskalakis of the Department of Electrical Engineering and Computer Science (EECS) is honored for his “contributions to the fundamentals of algorithmic game theory, mechanism design, sublinear algorithms, and theoretical machine learning.” Daskalakis game theory; Economics probability theory; A theoretical computer scientist working at the interface of statistics and machine learning. His current work is multi-agent learning; learning from biased and dependent information; Focuses on causal inference and econometrics.
A native of Greece, Daskalakis joined the MIT faculty in 2009. He is a member of the Computer Science and Artificial Intelligence Laboratory (CSAIL) and is associated with the Operations Research Center for Information and Decision Systems (LIDS). He is also an investigator at the Foundations of Data Science Institute. He previously received the 2018 Nevlinna Prize from the International Mathematical Union; 2018 ACM Grace Murray Hopper Award; He has received honors such as the Kalai Game Theory and Computer Science Award from the Game Theory Society and the 2008 ACM Doctoral Dissertation Award.
Jerome B. Wiesner Professor of Media Arts and Sciences and Hiroshi Ishii, co-director of the MIT Media Lab, were honored for “contributions to tangible user interfaces and human-computer interaction.” Ishii joined the MIT Media Lab in 1995 and founded the Tangible Media Research Group with the goal of making digital tangible by giving digital information and computation a physical form. He is credited as the founder of “Tangible User Interfaces”.
Ishii and his research team presented at ACM SIGGRAPH; Ars Electronica, ICC Center Pompidou academic, including the Cooper Hewitt Design Museum and Milan; Visions of “Tangible Bits” and “Radical Atoms” have been presented in many areas of design and art. Design week. With Ishii’s motto, “Be Artistic and Analytic,” the exhibitions showcase the rigor of both scientific and artistic review and the design of engaging interactions. Be poetic and realistic.” Ishii was elected to the CHI Academy in 2006 and received the SIGCHI Lifetime Research Award in 2019 for his fundamental and influential research contributions to the field of human-computer interaction.
Kevin Fu 98, MEng ’99, PhD ’05, an alumnus of the MIT Department of Electrical Engineering and Computer Science and now a professor of electrical and computer engineering in the Khoury College of Computer Sciences at Northeastern University, was honored by MIT. Contributions to computer security and secure engineering of medical devices in particular.” Fu’s research interests include security related to emerging sensor technology in biomedical engineering and cyber-physical systems. His work includes medical devices; autonomous transportation; health care delivery; It has important implications for manufacturing and the Internet of Things.
Before joining Northeastern in January; Fu is an adjunct professor at the University of Michigan and an adjunct professor at the University of Massachusetts Amherst. In addition, Starting in 2021, he is the interim director for medical device cybersecurity within the US Food and Drug Administration Center for Devices and Radiological Health and the program director for cybersecurity at the FDA Digital Health Center of Excellence. His honors include Sloan Research Fellow; MIT Technology Review TR35 Innovator of the Year; Fellow of the IEEE Fed100 Award and National Science Foundation (NSF) Career Award. USENIX Security, Received Best Paper Awards from IEEE S&P and ACM SIGCOMM; He received an earlier Test of Time Award from IEEE Security and Privacy for work on pacemaker security.
Jimmy Lin ’00, MNG ’01, PhD ’04, an alumnus of the MIT Department of Electrical Engineering and Computer Science and now professor and David R. Cheriton Chair in the School of Computer Science at the University of Waterloo, has been honored. answering questions; Contributions to Information Retrieval and Natural Language Processing.”
Lin’s research centers on the challenge of connecting users to relevant information at scale. Over the years, Intelligence analysts from causality seekers on the web; medical doctors; He has worked on systems designed for a variety of users, from historians to data scientists. Before joining the University of Waterloo, Lin was at the University of Maryland. In addition, Twitter Cloudera, He spent time at Microsoft and the National Library of Medicine. He is currently the Chief Technology Officer of Primal, a Waterloo-based knowledge graph and deep learning company. Previously, He is the Chief Scientist of RSVP.ai based in Waterloo, Ontario.
Rafael Pass PhD ’06; An alumnus of the MIT Department of Electrical Engineering and Computer Science, now a professor of computer science at Tel-Aviv University. In addition to being the director of the Checkpoint Institute for Information Security, he is also a professor at Cornell Tech. / was honored by Cornell University. “Contributions to the foundations of cryptography.” Pass’s work covers cryptography and computational complexity and game theory, as well as the theoretical foundations of blockchains. Focuses on connections and connections between cryptography and Kolmogorov complexity.
His honors include: 9th NSA Best Scientific Cybersecurity Paper Competition; 2022, Best Paper Award at the 41st International Writing Conference 2021; Wallenberg Academy Fellow, awarded by the Royal Academy of Science in Sweden; Alfred P. Sloan Fellowship; AFOSR Young Investigator Award; Microsoft Research Institute Scholarship; and the NSF Career Award. Prior to earning his PhD from MIT, he earned a bachelor’s degree in engineering physics and a master’s degree in computer science from the Royal Institute of Technology (KTH) in Sweden.
Jaime Teevan SM ’01, PhD ’07, an alumnus of the MIT Department of Electrical Engineering and Computer Science who is now a Microsoft Technology Fellow, was honored. “human-computer interaction; information retrieval and support for productivity.” Teevan is responsible for driving research-backed innovation in Microsoft’s core products related to everything from AI to hybrid work. Previously, she served as a technical advisor to CEO Satya Nadella and led the Productivity team at Microsoft Research.
In addition to becoming an ACM Fellow this year, Teevan was inducted into the ACM SIGIR and CHI Academies. She is also an adjunct professor at the University of Washington. He earned a BS from Yale University before earning a master’s degree from MIT and a Ph.D.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00568.warc.gz
|
CC-MAIN-2023-14
| 7,015
| 13
|
https://www.addictivetips.com/windows-tips/launch-microsoft-edge-in-private-mode-windows-10/
|
code
|
Microsoft Edge has a private or incognito mode like all other browsers do. Like all other browsers, Microsoft Edge’s default launch state is the normal browsing mode. No browser by default opens in private mode. If you want your browser of choice to always open in private mode, you’re going to need a hack or trick to get it done. For example, to launch Chrome in incognito mode, you have to create a shortcut and add a switch to it. The same trick can work to launch Microsoft Edge in private mode.
Microsoft Edge In Private Mode
Right-click anywhere on your desktop an go to New>Shortcut.
In the location field, enter the following;
%windir%\System32\cmd.exe /c start shell:AppsFolder\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge -private
Name it something that makes it easy to identify what the shortcut is for e.g., Edge In Private, or something similar, and you’re all done. The shortcut will appear on your desktop and it will have the Command Prompt icon. This is going to be confusing so right-click the shortcut and select Properties.
In the Properties window, go to the Shortcut tab. If you want to use the exact same icon that Microsoft Edge has you can enter the following in the ‘Look for icons in this file’ field.
If you prefer to use a different icon so as not to mix up the Microsoft Edge in private shortcut with the normal one, you can download a different icon and select it by clicking the Browse button on this same tab.
What this shortcut essentially does is that it opens Microsoft Edge with the ‘-private’ switch. Some apps on Windows support switches. Chrome is one obvious example of this. The difference between Chrome and Microsoft Edge is that Chrome is a Win32 app while Edge is a stock UWP app which doesn’t let you add a switch to its shortcut. The field simply cannot be edited. That’s why the shortcut has to be created through the above method. With Chrome, you can use the Send To context menu item to create a shortcut and edit the Target field.
You can pin the shortcut to the Taskbar or to the Start Menu, whichever suits you, and use it to launch Microsoft Edge in private mode. To be clear, this is for when you want to launch Edge in private mode and don’t want to have to go through an ordinary Edge window or use the jumplist options that Edge has. If the jumplist option suits you, you can right-click the Edge icon and select the New InPrivate Window option.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588398.42/warc/CC-MAIN-20211028162638-20211028192638-00630.warc.gz
|
CC-MAIN-2021-43
| 2,434
| 10
|
https://www.twarak.com/ad/pune/jobs/engineering_jobs/653627/dwh-bi-test-engineer.html
|
code
|
Dwh Bi Test Engineer
« Prev Next »
Sorry!, the ad you are looking for is no longer available
Related Jobs Ads in Pune
Applicant should be DME/Any graduate. Should have 2/3 yrs of background. Should have good oral and written correspondence skill. , For more info: https://jobs-search.org/architecture-construction/sales-co-ordinator-wanted-in-pune-maharashtra_i107876167
May 3, 2020
Background- 1- two years Applicant must be Ability in Photoshop, Corel draw, Dreamweaver and Illustrator, with pixel perfect vision And the ability to work as part of a team and independently. Thorough knowledge of HTML, CSS3, HTML5, Flash, jquery, Java script, Bootstrap., For more information:...
May 20, 2020
Compute Samples Engineer
We are looking for a Systems Software Engineer to join NVIDIA’s CUDA Samples team. Our work has made major impact in various fields, and are used across leading academic institutions, start-ups, and industry; including the world’s largest Internet companies. We need passionate, hard-working, and...
Jul 1, 2020
Office admin executive
Office Admin Executive for it s own office premises in Wakad, Pune location. Tudip works only on development work across MEAN Stack, DotNet, Java, PHP, Ruby, Python, Android and iPhone/ iOS technologies. It has a large foot print in the web technologies and ever growing foot print in the device and...
Apr 16, 2020
Android Developer Min Background - one to 1.5yrs Eligibility - MCA/BE/BCS/MCS or equivalent Skill Set - Hands on Android SDK, NDK and UI Designing , For more info: https://jobs-search.org/android-developer/android-developer-wanted-in-pune-maharashtra_i107884905
May 3, 2020
Post a FREE Ad in Pune under Jobs » Engineering Jobs
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891640.22/warc/CC-MAIN-20200707013816-20200707043816-00511.warc.gz
|
CC-MAIN-2020-29
| 1,704
| 17
|
http://docs.keystone-enclave.org/en/v0.1-c2e5205/Contributing-to-Keystone/How-to-Contribute.html
|
code
|
1. How to Contribute¶
Keystone is, and will be, fully open source. We hope to see many projects both under the Keystone unbrella, and built on-top of it.
We welcome contributions at all levels, from platform specific bootloader modifications, to make compilers and toolchains for programming enclaves, to support for novel use-cases for end users.
1.1. Knwon Issues and Ongoing Projects¶
1.2. Platform Specific Builds/Changes¶
Many SoCs and boards will require some amount of custom support for Keystone to fully function. If you are interested in ensuring Keystone operates correctly on your target there are several requirements:
- RISC-V priv-1.10 ISA support (including PMP)
- Entropy sources
- 3 privilege level support (U/S/M)
Where possible, changes that allow Keystone to operate on another platform should be cross-platform themselves, to avoid fragmentation.
See also the list of known areas to work on, we need better platform specific builds!
1.3. General Contributions¶
keystone repo to your own account, mess around, and submit a pull request (PR) to the remote
A PR must be separated if it contains multiple patches for different parts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711368.1/warc/CC-MAIN-20221208215156-20221209005156-00672.warc.gz
|
CC-MAIN-2022-49
| 1,155
| 14
|
https://worldbdsm.net/drained-before-lock-up-bella-maree.html
|
code
|
I want to see how long you can go without an orgasm for me.. days? weeks? months?? I will be counting every second that I have your cock locked away in this tiny steel cage. I am going to let you drain yourself right before you are locked away so that I can account for every second your cock is chastised. Go ahead and jerk your cock… As soon as you spew that dirty man filth from your cock I am taking over control & chastising your cock.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154277.15/warc/CC-MAIN-20210801221329-20210802011329-00064.warc.gz
|
CC-MAIN-2021-31
| 442
| 1
|
https://fntirk.ru/casual/ac309n-driver.php
|
code
|
Category : Casual
To download AC309N DRIVER, click on the Download button
sports a clean layout with a whole gaggle of knobs, sliders, and buttons. This is ac309n driver because different video sites play better through some browsers as opposed to others. From Arun Mehta: Wave the phone around to make pleasant music with as many as 4 instruments. But you don't want to spend more money than you have to. After installing for Mac you'll need to turn on accessibility options so it can work ac309n driver.
don't have ac309n driver startup, the program
|Dream vacation solitaire torrent||Hp656c driver|
|BROTHER MFC-685CW SCANNER DRIVER||Bolji zivot torrent|
|GSKY USB WIFI ADAPTER 802.11 G DRIVER||344|
An introduction screen provides instructions for getting stated withand we found that we didn't need much beyond that; users who have additional questions can visit the ac309n driver support drover. Choose different units of measurement (milesh, ms, mph, knots, etc. Images can be imported from video files, ac309n driver cameras, and scanners.
Instead, it makes windows transparent when you drag them around the monitor. If ac309n driver choose an unavailable file type, the program will just ac309n driver it. Seeing nothing critical, we clicked Delete, and deleted 3,333 files in about a second, displaying a log on completion.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890514.66/warc/CC-MAIN-20180121100252-20180121120252-00619.warc.gz
|
CC-MAIN-2018-05
| 1,333
| 9
|
http://unifiedpeople.ru/exchhelp.en/html/87e4a7fc-5a8b-4bc7-9299-bf02cd656749.htm
|
code
|
Applies to: Exchange Server 2007 SP3, Exchange Server
2007 SP2, Exchange Server 2007 SP1, Exchange Server 2007
Topic Last Modified: 2007-08-24
Having familiarized yourself with the various disaster recovery concepts, it is important to select a disaster recovery strategy. The disaster recovery strategy you select also influences your backup strategy. If your Microsoft Exchange Server 2007 organization encounters a problem that requires the recovery of a server that is running Exchange 2007 (for example, if a fire destroys one of your servers), there are three recovery options from which you can select:
- Restore the server You can restore the
server from a full computer backup set, and then restore your
Exchange databases. A full backup set includes a backup of
System State data, the Exchange binary files, and most of the
data on your hard disks.
- Rebuild the server You can rebuild the
server completely. This option involves performing a new
installation of Windows Server running Exchange 2007
in Disaster Recovery mode, and then restoring your Exchange
databases. This option assumes that Active Directory directory
service is still available in Exchange 2007 in Disaster
- Use a standby server You can use a
standby recovery server as part of the rebuild the server
strategy. This option involves keeping recovery servers available
with the operating system and other software installed. Having
standby recovery servers available reduces the time it takes to
rebuild a damaged server.
In addition to choosing a server recovery strategy, to maximize your flexibility of recovery options when you must perform a full server recovery, consider the following issues:
- Priority of protecting Active Directory and
Exchange database data Take extra
precautions to make sure of the safety of your
Active Directory data and Exchange databases, which include
both Exchange database files and transaction log files. If you have
protected both of those sets of data, you will have additional
options for recovering your Exchange data. Focus your resources on
making sure that you protect those two items. Everything else is
- Preparedness for being able to re-create configuration data
manually if it becomes necessary Although
running Setup /mode:RecoverServer can help you bring up a
functional server, it may not preserve every custom setting or
leave connectors functional. Therefore, you should be prepared to
re-create any Exchange configuration settings in the event that you
cannot recover those settings stored in Active Directory. If
you can manually reconfigure the server, you have additional
recovery options if a disaster occurs. Reconfiguring the server
involves such tasks as reconfiguring your connectors, making
metabase modifications, and making registry modifications.
Note: A primary benefit to making Windows backup sets is that it lets you preserve the registry and other configuration settings on your servers. However, such a restore requires hardware that is similar to the system being restored.
In addition to the strategies discussed earlier, there are new features in Exchange 2007 that enable more recovery options and scenarios, including:
- Improved backup and restore When you
use local continuous replication (LCR) or cluster continuous
replication (CCR), Exchange 2007 enables you to offload
Exchange-aware Volume Shadow Copy Service (VSS) backups from the
active copy of a database to a passive copy of a database.
- Database portability Database
portability provide several features, including the ability to port
and recover a database on another server in the Exchange
organization. Database portability enables faster disaster recovery
strategies to be implemented for both site-level disasters and
hardware failures for Exchange 2007 servers.
- Dial tone portability When a database,
server, or datacenter is lost, you can use dial tone portability to
provide access to a new dial tone database on another server in the
For More Information
For more information about backup and restore options and strategies, see Database Backup and Restore.
For more information about database portability, see Database Portability.
For more information about dial tone portability, see Dial Tone Portability.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819668.74/warc/CC-MAIN-20240424143432-20240424173432-00756.warc.gz
|
CC-MAIN-2024-18
| 4,244
| 61
|
https://www.filesuffix.com/en/extension/mo
|
code
|
MO file - How do I open a .mo file?
The table below provides useful information about the .mo file extension. It answers questions such as:
- What is the .mo file?
- What program do I need to open a .mo file?
- How can the .mo file be opened, edited or printed?
- How can I convert .mo files to another format?
Table of Contents
We hope you find this page helpful and a valuable resource!
5 extension(s) and 0 alias(es) found in database
✅ GNU Gettext Machine Object File
The MO file is a GNU Gettext Machine Object File. GNU gettext is the GNU internationalization and localization (i18n) library. It is commonly used for writing multilingual programs. MO (Machine Object) files are compiled, machine-readable PO (Portable Object) files.
✅ Dymola Simulation Data
The MO file is a Dymola Simulation Data. Dymola (Dynamic Modeling Laboratory) is a complete tool for modeling and simulation of integrated and complex systems for use within automotive, aerospace, robotics, process and other applications.
✅ Modelica Model
The MO file is a Modelica Model. Modelica is an object-oriented, declarative, multi-domain modeling language for component-oriented modeling of complex systems.
✅ Transport Fever Game Text Data
The MO file is a Transport Fever Game Text Data. Transport Fever is a railroad-focused tycoon game for Microsoft Windows.
✅ Modula-3 Compiled Object
The MO file is a Modula-3 Compiled Object. Modula-3 is a modern programming language that supports interfaces, objects, generics, lightweight threads of control, the isolation of unsafe code, garbage collection, exceptions, and subtyping.
Other types of files may also use the .mo file extension.
🚫 The .mo file extension is often given incorrectly!
According to the searches on our site, these misspellings were the most common in the past year:
Is it possible that the filename extension is misspelled?
We found the following similar file extensions in our database:
🔴 Can't open a .mo file?
When you double-click a file to open it, Windows examines the filename extension. If Windows recognizes the filename extension, it opens the file in the program that is associated with that filename extension. When Windows does not recognize a filename extension, you receive the following message:
Windows cannot open this file:
To open this file, Windows needs to know what program you want to use to open it...
If you don't know how to set the .mo file association, check the FAQ.
🔴 Can I change the extension of files?
Changing the filename extension of a file is not a good idea. When you change a file's extension, you change the way programs on your computer read the file. The problem is, changing the file extension does not change the file format.
If you have helpful information about the .mo file extension, write to us!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00048.warc.gz
|
CC-MAIN-2023-23
| 2,808
| 32
|
http://www.aspmessageboard.com/showthread.php?18388-UNIX-Servers
|
code
|
I doubt it. There is a asp interpreter for unix/linux, the name I can't remember at the moment. I would doubt if your ISP is running it, but you could ask. Good luck. There are many unix/linux ISP that support Front Page Extensions though. So depending on what your trying to do.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719465.22/warc/CC-MAIN-20161020183839-00179-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 279
| 1
|
https://www.iaik.tugraz.at/person/felix-hoerandner/
|
code
|
Felix HörandnerDipl.-Ing. BSc
Secure Applications, PhD Candidate
My research focus lies in data sharing and identity management, where I aim to develop user-friendly and practical solutions that address various challenges. These challenges, for example, include improving the users’ privacy within semi-trusted cloud environments, as well as, designing user-friendly strategies for key management and recovery from device-loss.
I contributed to international research projects and activities, including:
- CREDENTIAL: an EU-funded H2020 project with the goal to develop a user-centric, cloudified, privacy-preserving platform for data sharing
- SEMPER: an EU Large Scale Pilot on Crossborder Semantic Interoperability of Powers and Mandates
- KRAKEN: an EU-funded H2020 project with the goal to integrate self-sovereign identities, privacy-preserving computation, and data marketplaces
I am contributing to the lecture Selected Topics IT Security 1 – E-Government in the area of identity management.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178349708.2/warc/CC-MAIN-20210224223004-20210225013004-00172.warc.gz
|
CC-MAIN-2021-10
| 1,004
| 8
|
https://codereview.meta.stackexchange.com/questions/1942/asking-for-comparison-of-design-of-two-code-snippets-giving-same-functionality
|
code
|
I had asked for the review of the part of a jQuery and as per the answer I made changes in the file. Now after making the changes (mainly moving from triggers to functions) I am not so sure whether I got enough benefit in the structure of the code. I think I can reason about the code better but I wanted some comments on the changes done.
Can I ask for a review of two code files (both written by me) in one question for comparison of the structure and design of the two? No change in the functionality is there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00524.warc.gz
|
CC-MAIN-2023-40
| 513
| 2
|
https://ctan.org/pkg/bibview
|
code
|
bibview – View BibTeX files
An interactive Perl script that allows the user to load a BibTeX database, to search for entries matching particular fields only, and to view entries thus found.
Maybe you are interested in the following packages as well.
- bible: A BibTeX library editor
- bibextract: Utilities to extract BibTeX data
- bibcard: An XView based interface for BibTeX databases
- bibtool: A tool for manipulating BibTeX files
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887054.15/warc/CC-MAIN-20180118012249-20180118032249-00722.warc.gz
|
CC-MAIN-2018-05
| 436
| 7
|
https://www.assemblyai.com/blog/our-30m-series-b/
|
code
|
Audio is Everywhere
Audio is becoming a core part of most products on the internet today.
Over the course of the pandemic, we’ve seen dating apps launch audio and video messaging features, and real estate apps begin to offer live video tours of properties. There’s been an explosion of audio/video-first collaboration tools for remote companies, such as Zoom and Loom. First-of-their kind audio-first social networks, like Twitter Spaces and Clubhouse, have started popping up everywhere. And even as the world opens back up post-pandemic, these features and tools are here to stay.
AI for ASR and NLP
At the same time, we’ve seen rapid developments in the AI that can make sense of all of this audio data. At AssemblyAI, we’re leveraging the same AI technology used to create popular AI models like DALL-E 2, GPT-3, and Google’s (supposedly sentient) LaMDA model, to create State-of-the-Art AI models for transcribing, understanding, and analyzing audio and video data – including Transformers, Large Language Models, massive GPU clusters, and large datasets.
Combined, this is why we’ve seen the number of developers building with our APIs grow 1,000%+ over the past 12 months. We’ve also seen our ARR more than double over the past 6 months alone, and we’re now processing millions of audio/video files with our APIs every single day for hundreds of paying customers – including startups like CallRail, Algolia, Veed, and Fathom, and enterprises like the WSJ, NBC Universal, and Spotify.
Our Series B
Four months ago, we announced our $28M Series A led by Accel, with participation from Y Combinator, the Stripe founders – John and Patrick Collison, Nat Friedman, and Daniel Gross.
Today, we’re excited to share that we’ve raised another $30M in our Series B round, led by global software investor Insight Partners. This brings our total funds raised to just over $65M.
The progress being made in the field of AI is incredibly exciting. Our goal is to expose this progress to every developer and product team on the internet – via a simple set of APIs. As we continue to research and train State-of-the-Art AI models for ASR and NLP tasks (like speech recognition, summarization, language identification, and many other tasks), we will continue to expose these AI models to developers and product teams via simple APIs – available for free.
We hope to be the place that developers and product teams come to for easy access to the advanced AI models they need in order to build exciting new products, services, and entire companies.
Over the past 6 months, we’ve launched ASR support for 15 new languages – including Spanish, German, French, Italian, Hindi, and Japanese, released major improvements to our Auto Chapters and Summarization models, Real-Time ASR models, Content Moderation models, and countless other product updates.
We’ve barely dipped into our Series A funds, but this new funding will give us the ability to aggressively scale up our efforts – without compromising on our runway.
With this new funding, we’ll be able to accelerate our product roadmap, build out better AI infrastructure to accelerate our AI research and inference engines, and grow our AI research team – which today include researchers from DeepMind, Google Brain, Meta AI, BMW, and Cisco.
So much of our growth has been product led, and a big focus for us is to launch new models/products at an even faster pace. Through our work, we also hope to be able to, more broadly, push forward the State-of-the-Art in AI – as well as expose AI to more and more developers through our Developer Education team, which have published great introductions to Diffusion Models, Differentiable Programming, and PyTorch.
In these market conditions, we’re very fortunate to be growing, and to have years of runway in the bank. If you’re interested in joining our team, we have over 30 open roles, and we’d love to talk! You can reach out to me personally at email@example.com, or check out our careers page for a list of open roles.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00331.warc.gz
|
CC-MAIN-2024-18
| 4,055
| 16
|
https://www.okf.fi/2019/03/28/okfi-is-looking-for-passionate-contributors-to-its-core-operations/
|
code
|
Hello OKFInauts! We at OKFI have been busy restructuring ourselves ever since the successful launch of MyData Global ry. We’ve specified some core roles that need passionate, competent people to help the cause of open knowledge in Finland. OKFI can offer a moderate compensation that scales with our operational volume.
UPDATE 2019-04-18: The applications have been reviewed and decisions have been made as follows: Arto Lampila for communications, Blina Meta for treasurer, John Sperryn for project support. Thank you to all applicants!
We have four roles:
- Sysadmin, already filled since 2018
- Communicator, to be filled now
- Project support, to be filled now
- Treasurer, to be filled now
All these roles will have autonomy to fulfill their purpose the best way they see fit. We don’t count working hours, just expect certain results in return for the monetary renumeration.
You can find the role domain descriptions in this Google Drive folder. There’s also a spreadsheet that estimates the monthly and yearly renumerations for the roles, based on currently active projects. Feel free to add comments if there is something you want to ask about or improve.
And of course, if you feel like you could chip in with your time and awesomeness, do let us know. Message the chair Tarmo Toikkanen on our slack, or send email to firstname.lastname@example.org. Please be prompt, these positions are filled as soon as we have suitable people to take them on.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473735.7/warc/CC-MAIN-20240222061937-20240222091937-00417.warc.gz
|
CC-MAIN-2024-10
| 1,461
| 10
|
https://www.digglicious.com/types-of-essays/can-you-use-z-scores-for-non-normal-data/
|
code
|
Can you use z-scores for non normal data?
Non-normal distributions can also be transformed into sets of Z-scores. In this case the standard normal table cannot be consulted, since the shape of the distribution of Z-scores is the same as that for the original non-normal distribution.
How is z-score calculated?
To calculate the Z-score, subtract the mean from each of the individual data points and divide the result by the standard deviation. Results of zero show the point and the mean equal.
How do you find the z-score of a sample set?
To find a z score, subtract the mean of a population from the particular value in question, then divide the result by the population’s standard deviation.
Can Z test be used for non-normal distribution?
Z-test and t-test can be used for data which is non-normally distributed as well if the sample size is greater than 20, however there are other preferable methods to use in such a situation.
What is an example of a non-normal distribution?
An extreme example: if you choose three random students and plot the results on a graph, you won’t get a normal distribution. You might get a uniform distribution (i.e. 62 62 63) or you might get a skewed distribution (80 92 99).
How do you solve z-score problems?
The z-score of a value is the count of the number of standard deviations between the value and the mean of the set. You can find it by subtracting the value from the mean, and dividing the result by the standard deviation.
Why do we calculate z-scores?
The standard score (more commonly referred to as a z-score) is a very useful statistic because it (a) allows us to calculate the probability of a score occurring within our normal distribution and (b) enables us to compare two scores that are from different normal distributions.
What is the z-score of 90 %?
Step #5: Find the Z value for the selected confidence interval.
How do you analyze non normally distributed data?
There are two ways to go about analyzing the non-normal data. Either use the non-parametric tests, which do not assume normality or transform the data using an appropriate function, forcing it to fit normal distribution. Several tests are robust to the assumption of normality such as t-test, ANOVA, Regression and DOE.
What is non normality?
Non-normality is a way of life, since no characteristic (height, weight, etc.) will have exactly a normal distribution. One strategy to make non-normal data resemble normal data is by using a transformation. There is no dearth of transformations in statistics; the issue is which one to select for the situation at hand.
What is the formula to calculate z score?
A = Working Capital/Total Assets
How do you calculate z score?
Step 1: find the mean.
How to calculate the z score calculator?
z-score is calculated by using the formula z = (x)/*, t score is, x is the raw score, is the population mean, and is the population standard deviation. formula shows, the z-score represents the raw scored minus the number of the factors within the population, divided by the difference within the population.
How do you find the probability of a z score?
– The scores can be positive or negative. – For data that is symmetric (i.e. bell-shaped) or nearly symmetric, a common application of Z-scores for identifying potential outliers is for any Z-scores that are beyond ± 3. – Maximum possible Z-score for a set of data is ( n − 1) n
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00390.warc.gz
|
CC-MAIN-2023-06
| 3,403
| 28
|
https://drupal.stackexchange.com/questions/91697/why-render-funcion-hide-img-tags/91714#91714
|
code
|
I have a simple text that contains tags but when I try to render the field, the img tags disappear!
<?php print render($content['field_with_img_tags']); ?>
Drupal Answers is a question and answer site for Drupal developers and administrators. It only takes a minute to sign up.Sign up to join this community
What type of field are you using ? If it is a
body_format using a format (i.e.: Filtered HTML, Full HTML) verify the filter settings. Probably
Limit allowed HTML tags is enabled and the tag is not part of the allowed tags.
To verify / change settings, it is under
admin/config/content/formats and click on
configure link of your used format.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00245.warc.gz
|
CC-MAIN-2022-40
| 649
| 9
|
https://becomingstronger.postach.io/page/contact
|
code
|
I don't know why you might want to contact me, but maybe you think I'm cool, and maybe I'll also think you're cool. We should hang out. If you're ever in the Kansas City area, let me show you my favorite coffee shops and abandoned buildings to explore.
Schedule a meeting/hangout:
Provide me anonymous feedback:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662619221.81/warc/CC-MAIN-20220526162749-20220526192749-00235.warc.gz
|
CC-MAIN-2022-21
| 311
| 3
|
https://luvemyw.joeshammas.com/write-a-rule-for-the-table-in-function-notation-313yh.html
|
code
|
Juxtaposition A special case of infix notation is juxtaposition or concatenation, which means writing nothing between two variables. The key here is to understand that we can partially apply a type just as we can partially apply a normal function.
For example, some require that a mapping be a continuous function. Any byte in a literal string not explicitly affected by the previous rules represents itself.
This names the function and simultaneously gives a formula for calculating its value. This behavior allows the finalizer to access properties associated with the object through weak tables.
Be clear that the geometric definition is just as good a definition as the formula is.
The following additional rules are defined for linear structures and for cyclic structures: This is why "return false;" is often included at the end of the code within an onclick handler. The liftM function is so useful that Control. As an experimental feature in Lua 5.
However, it says nothing about when the values a and b are evaluated: Being an instance of Monad gives us the necessary monadic triple of type constructor, injection function, and chaining function. Earlier in this chapter, we said that a monad has a type constructor with a single type variable, and yet here we have a type with two parameters.
Barred arrow notation may not be familiar to you, but it is becoming more common. The generic for loop has the following syntax: Applications The cotangent function is used throughout mathematics, the exact sciences, and engineering.
One way to work the problem would be to fully expand the 8!And this is how we write it: The Domain (all the values that can go into the function) is all Real Numbers up to and including 6, which we can write like this: Dom(f) = (-∞, 6] (using Interval Notation). You read the function like this: “f of x is equal to two times x squared minus 3.” The x is a variable — in this case, the input variable.
Whatever you put in the parentheses after the f replaces any x in the rule. The expression E(n) is read the function E of n.
This means that E(n) would give the amount of money Lakeshia earned for n hours. Rewrite your algebraic equation from question 13 using this notation. In the function that you wrote in question 14, E(7) means to replace n with 7 and find the value of the function.
What is the value of E(7)? Of E(11)? Functions and Function Notation Notes Page 7 of 22 9/10/ Let’s use the function rule expressed in function notation to find the value of the function when the input (x) is 3.
Big O notation is a mathematical notation that describes the limiting behavior of a function when the argument tends towards a particular value or infinity.
It is a member of a family of notations invented by Paul Bachmann, Edmund Landau, and others, collectively called Bachmann–Landau notation or asymptotic notation.
In computer science, big O notation is used to classify algorithms. Times New Roman Notebook Writing a Function Rule Slide 2 Slide 3 Slide 4 Function Notation An Example Another Example Using a Table of Values Another Way From a table Another Way From a table Tables of Values Try these.Download
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00544.warc.gz
|
CC-MAIN-2019-51
| 3,168
| 14
|
https://community.coda.io/t/1-way-editing-vs-2-way-editing-which-one-when-creating-relationships/47540
|
code
|
Hello! I was looking for best practices for determining if a linked table should be editable one way or editable from both tables.
For context, I have 4 tables:
- Users (i.e., Sam, John, Kristen),
- Groups (i.e., Sales Team, Administrators),
- Roles (Sale Rep, IT Manger), and
- Doc Pages as a Table (Dashboard Page, CRM page).
The objective is to assign access (based on Group?, Role?, User?) to each row of the the Doc Page Table.
There are different ways to link these tables and whether to turn on the 2-way edits or not. I’m curious to see what is typically done. I feel like there is a fundamental hierarchy that I’m missing here.
Hi Theresa, not sure whether there are hard and fast rules around this.
Personally I typically do not use the two way editing when both tables have a number of columns, because you in any case need to go to the other table and maintain the rest of the columns.
But if the one table is simply a lookup column, then I will use the two way editing.
Thanks for the feedback Piet. I was struggling to establish criteria that would help correctly and consistently link tables because even editing in a one way direction the question becomes which table is it?
So, I’ve done some searching with database designing and application. I focused on the normalization requirement particularly the 1st normal form (1NF), which states that at every row and column intersection in the table there, exists a single value, and never a list of values. Since each of my tables have a many-to-many relationship, I was not meeting this requirement.
The solution I came across was to create a junction table (i.e. User-Group, Group-Roles) which is simply matching info from different tables into a single row (See below).
However, I had the hardest time understanding how the junction tables get populated if there were no direct relationship columns between the 4 tables. After some more digging, I found that this is where the UI/UX comes into play. Set up a page with controls (text box, drop down menus, etc.), some pre-populated, that a user will fill out and when submitted the rows are then created in those junction tables as well as the original tables. (I found an example below)
For me this set up/framework make sense because creating a relationship column in a given table will pull in all the info from the second table. I imagine such a setup makes the doc size large, filtering more complex, and slowing down performance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00531.warc.gz
|
CC-MAIN-2024-18
| 2,457
| 16
|
http://westviewlearning.ca/programming-classes/
|
code
|
All ages can learn to code! Join a youth, parent, or family course at WestView Learning and discover how accessible the world of programming has become through block programming programs!
Family Learn to Code Classes – May – August, 2018
Small group workshops introduce a ‘pair’ of family members to coding. Whether it is parent/child or older and younger sibling, learning the basics of a coding language together provides opportunities to problem solve, be creative, and have a few laughs! These workshops are designed for 6-8 participants.
Learn to Code – Introduction to Scratch (ages 7+)
Scratch is a programming language and an online community where children can program and share interactive media such as stories, games, and animation with people from all over the world. As children create with Scratch, they learn to think creatively, work collaboratively, and reason systematically. Scratch is designed and maintained by the Lifelong Kindergarten group at the MIT Media Lab. Scratch Offline editor can be downloaded onto your computer as an alternative to working in the online format. Either format is free.
Learn to Code – Introduction to HTML5 (ages 10+)
HTML stands for Hypertext Markup Language and it has been the language of the web! HTML5 is the current version of the language. It is a text based rather than a block language which means students will be typing in text rather than dragging and tweaking ‘blocks’.
Participants in this class will learn to create a basic website with text, graphics and hyperlinks!
Learn to Code – Introduction to Python (ages 10+)
Python is often taught as a first programming language because it is a concise, easy to read, and versatile programming language. Python is used for a variety of purposes from web development to software development and scientific applications.
Participants in this class will learn about strings, variables, Input/Output, If/Else Statements, Print, List, and Integers through several mini-projects.
To register complete the contact form below or email Heather@westviewlearning.ca or call to register (250-701-3359)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867041.69/warc/CC-MAIN-20180525043910-20180525063910-00579.warc.gz
|
CC-MAIN-2018-22
| 2,118
| 12
|
https://figshare.com/articles/Annotation_for_Transparent_Inquiry_ATI_Transparency_for_Qualitative_Social_Science_Research/9989012
|
code
|
Annotation for Transparent Inquiry (ATI): Transparency for Qualitative Social Science Research
2019-10-16T12:36:18Z (GMT) by
Presentation for Force 2019 Conference
While templates for transparent research are well established for quantitative work, little work exists on the practicalities of transparent qualitative research. My presentation introduces Annotation for Transparent Inquiry (ATI), an approach developed by the Qualitative Data Repository in collaboration with the open source software non-profit Hypothesis (https://web.hypothes.is/) and Cambridge University Press. Using open web annotations, a W3C web standard, authors annotate key passages of their publications with additional analytical information, extended excerpts, and links to underlying sources - qualitative data - stored in a trusted digital repository. ATI demonstrates the possibilities for transparent research beyond quantitative work, as well as the promise of using open standards and open source tools for research transparency.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348513321.91/warc/CC-MAIN-20200606124655-20200606154655-00507.warc.gz
|
CC-MAIN-2020-24
| 1,014
| 4
|
https://www.piglets.org/blog/2008/06/19/debian-gnulinux-on-toshiba-portege-r500/
|
code
|
This week I got my hands on a Toshiba Portege R500 for work. It’s brilliant to have a laptop with a decent battery once again. Here are some thoughts on the hardware, and installing Linux.
The first thing I did was cut through the label on the box that makes it clear that no refund is possible for bundled software you don’t want, including the operating system. This beast came with Windows Vista Business edition, which I could happily live without. For now I didn’t perform a full exorcism, but only shrunk the Vista partition right back. I have some consultancy jobs which might make it handy to leave Vista there for now.
The hardware is brilliant, light (under 1 kg) while still packing quite a punch, dual core CPU, 2 Gig RAM and 160 Gig hard disk. I didn’t want the extra expenditure for a solid state disk, and I wanted the space too. Some reviews mentioned the heat and fan noise, but both are hugely reduced from my Sony Vaio so I’m more than happy.
I burnt a new Debian AMD64 net install disk with the current testing (Lenny) and the second beta version of the installer. I booted off the CD and began the install, having previously so configured the BIOS from within Windows, there was no obvious key to press to change the boot, although I think F12 will do it in retrospect. First thing to note, a really long delay after the kernel declares itself ready and the installer resumes made me think it had crashed. Be patient. The main Debian install went very well, smoothly and quickly. I used the partition editor to shrink the Vista partition to 40 Gig for now. One minor quibble, Debian offers a quick solution for an entire encrypted disk, but not such an option with the remaining space. I don’t yet understand that process well enough so I have left it unencrypted for now, and will do it manually later. Most of my working content is actually in SVN repositories so it’s easy to rebuild from scratch should I choose to.Out of the box, the X server is configured well, albeit with (to me) a disconcertingly small xorg.conf, much must now be done behind the scenes, I haven’t checked display on an external monitor, and I’ll need that for data projectors. The touchpad was not handled properly however, it has no side scroll behaviour and so on (this is a known bug with the installer). So I added some lines to the xorg.conf which fixed it. Just add this in addition to what is already there.
Wifi didn’t work straight away, unfortunately (but predictably) that required non-free firmware, so installing firmware-iwlwifi (Debian package) did the trick. The Bluetooth also does not work, there is a toshset executable installed to deal with this and other issues, but despite the fact the man page says is does not depend on a special kernel module, when you run it it complains about the absence of the special kernel module :-(. I started searching for a solution and found kernel patch written by Noodles, unfortunately this patch wasn’t accepted, but it does work. I downloaded the kernel tree, patched it, copied the config from the stock kernel and compiled and installed the new kernel. Now, as root
echo “enable” > /proc/acpi/toshiba/bluetooth
has the effect of switching bluetooth on and the icon appears on the desktop, echoing disable similarly turns it off. Both the wifi and bluetooth have a hardware switch that can be used to turn them off, which is handy for planes and of course, power consumption.
I filed a bug on the Debian package for toshset, but while trying to dig through the source code and looking for other tips I found (as described in the bug transcript) another patch for toshiba_acpi which allows the toshset program to work. This allows the bluetooth module to be manipulated, but also the transreflective display I’m using right now.
- Headphone socket doesn’t mute main speaker
The machine has a nifty hardware volume control on its left side, which works perfectly out of the box with Debian. The only issue is
that if you wanted to listen to something without disturbing those around you, you seem to be out of luck, there is still sound on the
- GRUB screen often doesn’t show
When you boot up, the Toshiba splashscreen stays present, while grub is plainly running behind the scenes. I put my patched kernel at the stop of /boot/grub/menu.lst to ensure it would boot when I was “blind”. I think now toshset is running I can play with some settings there. If you are really in need, allow the kernel to start booting after which ctrl-alt-del will take you to a grub you can see.
- Fingerprint reader stuff still in experimental in Debian
probably won’t start to play with it just yet, but it should all work in theory.
- SD card reader not working
well, it looks that way after a quick initial test, more to do here.
- Suspend to RAM fails
Hibernation works perfectly, but s2ram produces the (too familiar to me) symptoms of trying to suspend, only to immediately restart.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088471.40/warc/CC-MAIN-20210416012946-20210416042946-00449.warc.gz
|
CC-MAIN-2021-17
| 4,966
| 19
|
https://www.isca-speech.org/archive_open/sltech_2009/isl9_133.html
|
code
|
1st Joint SIG-IL/Microsoft Workshop on Speech and Language Technologies for Iberian Languages
Porto Salvo, Portugal
In the project HERON, we developed a framework for articulatory speech synthesis for European Portuguese. The system combines several modules, developed or adapted in the project. The Linguistic Processing model uses new syllabification and grapheme-to-phone modules developed in the project. The construction of the gestural scores is performed using an adapted version of TADA (TAsk Dynamic Application), made available for research by Haskins Laboratories. Other important result from HERON was the (first) comprehensive MRI database for European Portuguese and analyses conducted on this data. Two new Electromagnetic Midsagital (EMMA) corpora were also acquired, at GIPSA-Lab in Grenoble, one for EP nasals, and the other, of smaller dimension, relative to EP laterals.
Bibliographic reference. Teixeira, Antůnio / Oliveira, Catarina / Martins, Paula / Domingues, InÍs / Silva, Augusto (2009): "The project HERON", In SLTECH-2009, 133-134.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886095.7/warc/CC-MAIN-20200704073244-20200704103244-00281.warc.gz
|
CC-MAIN-2020-29
| 1,062
| 4
|
https://forums.macrumors.com/threads/help-sharpening-clarifying-text.677014/
|
code
|
I needed to photograph a page of an old broadsheet style journal because the people at the archive I went to did not have a scanner big enough. The image is not too bad, but I need to be able to shrink it and still be able to read the words. There are not a lot of words, by the way, it's not an article, its kind of like a board game. The problem is, of course, when I shrink it the words are difficult to read and I imagine will be even harder when I print out the page on an ordinary printer. Is there anything I can do to sharpen the text? I've tried using unsharp mask, but I'm not getting the results I want. What would work best, if possible, is tomake the print, which is the only black on the page, a little darker. Is there a way to do this? I'm not much of a photoshop buff! Thanks! p.s. tools at my disposal: photoshop and fireworks CS3, plus whatever Leopard has... edit 2: I hope this is the right forum! I figured this is where I would find people who use photoshop regularly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511063.10/warc/CC-MAIN-20181017065354-20181017090854-00227.warc.gz
|
CC-MAIN-2018-43
| 991
| 1
|
https://www.cryptopromastery.com/ethereum-classic.html
|
code
|
Augur is an open-source prediction & forecasting market platform that allows anyone to forecast events and get rewarded for predicting them correctly. Predictions on future real world events, like who will win the next US election, are carried out by trading virtual shares. If a person buys shares in a winning prediction, they receive monetary rewards.
The overwhelming majority of bitcoin transactions take place on a cryptocurrency exchange, rather than being used in transactions with merchants. Delays processing payments through the blockchain of about ten minutes make bitcoin use very difficult in a retail setting. Prices are not usually quoted in units of bitcoin and many trades involve one, or sometimes two, conversions into conventional currencies. Merchants that do accept bitcoin payments may use payment service providers to perform the conversions.
As the industry continues to investigate blockchain platforms, it’s apparent that Ethereum is becoming a de facto leader. For example, a few days ago JPMorgan publicly open-sourced its Quorum platform, architected and developed around the Go Ethereum client by Jeff Wilcke and his team. Several other major banks are using Ethereum, and Microsoft is anchoring its Bletchley platform on it as the foundational blockchain element. Industry, both publicly and confidentially, continues to contribute to Ethereum and work with us and others to help our promising, toddler-age codebase reach maturity. Stay tuned for news on this front.
There is ongoing research on how to use formal verification to express and prove non-trivial properties. A Microsoft Research report noted that writing solid smart contracts can be extremely difficult in practice, using The DAO hack to illustrate this problem. The report discussed tools that Microsoft had developed for verifying contracts, and noted that a large-scale analysis of published contracts is likely to uncover widespread vulnerabilities. The report also stated that it is possible to verify the equivalence of a Solidity program and the EVM code.
By comparison to government-backed global currencies, Bitcoin remains fairly complex for the typical user to acquire and use in regular transactions. Growing interest and significant global investments in Bitcoin wallet and Blockchain technology have nonetheless made buying and selling Bitcoin far more accessible to the average user. And indeed growing acceptance by government entities have ameliorated the ambiguity of legal and regulatory status for Bitcoin and Bitcoin exchanges.
“A DAO consists of one or more contracts and could be funded by a group of like-minded individuals. A DAO operates completely transparently and completely independently of any human intervention, including its original creators. A DAO will stay on the network as long as it covers its survival costs and provides a useful service to its customer base” Stephen Tual, Slock.it Founder, former CCO Ethereum.
Bitcoin has been criticized for the amount of electricity consumed by mining. As of 2015, The Economist estimated that even if all miners used modern facilities, the combined electricity consumption would be 166.7 megawatts (1.46 terawatt-hours per year). At the end of 2017, the global bitcoin mining activity was estimated to consume between one and four gigawatts of electricity. Politico noted that the even high-end estimates of bitcoin's total consumption levels amount to only about 6% of the total power consumed by the global banking sector, and even if bitcoin's consumption levels increased 100 fold from today's levels, bitcoin's consumption would still only amount to about 2% of global power consumption.
^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.
^ Mooney, Chris; Mufson, Steven (19 December 2017). "Why the bitcoin craze is using up so much energy". The Washington Post. Archived from the original on 9 January 2018. Retrieved 11 January 2018. several experts told The Washington Post that bitcoin probably uses as much as 1 to 4 gigawatts, or billion watts, of electricity, roughly the output of one to three nuclear reactors.
Smart contract is just a phrase used to describe a computer code that can facilitate the exchange of money, content, property, shares, or anything of value. When running on the blockchain a smart contract becomes like a self-operating computer program that automatically executes when specific conditions are met. Because smart contracts run on the blockchain, they run exactly as programmed without any possibility of censorship, downtime, fraud or third-party interference.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527204.71/warc/CC-MAIN-20190721205413-20190721231413-00291.warc.gz
|
CC-MAIN-2019-30
| 5,016
| 10
|
https://ndpsoftware.com/about.php
|
code
|
About the Site
This site was created by and is maintained by Andrew J. Peterson. Here are some highlights of its evolution:
- February 2014: I found some nice wood tiles, so added it to the header, just to freshen things up.
- February 2013: Experiment with establishing a vertical rhythm and minimal typography. I love the visual effect, but the support within CSS is not there-- but it is possible to make it work.
- 2012: Responsive Design applied.
- 2000 — 2010: I've played with the CSS extensively. Most of the layout is done with the CSS, and of course all of the styling is done that way. I've used this site to determine what works and what doesn't.
- 2007 — 2012: I've also tried adding a few AJAX-related technologies: dynamically created elements based on stylesheets (see "NEW" and "Updated" indicators); slide shows; rounded corners based solely on style-sheets and no images; and the "Books" page has a rather lame accordian effect. The sources of all this can be seen using "view source" in your browser. Note that lots of this doesn't work without Firefox 1.0, but it degrades by disappearing.
- Circa 2003: The colors now are based on a color scheme from kuler.adobe.com.
- 1999: The original color scheme was inspired by the HP 91 calculator. See some of these beasts at the HP Museum.
It was originally created on a G3 PowerBook using BBEdit Pro on MacOS X. Now it's a MacBook Air and I usually use RubyMine. We use locally-grown, hand-coded HTML and CSS. I created the few graphics with Adobe Photoshop LE, Elements 2.0 and Macromedia FireWorks. The photo comes from a scanned analog photograph.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00100.warc.gz
|
CC-MAIN-2023-50
| 1,620
| 10
|
http://dbaspot.com/db2-sybase-other-databases/435310-server-connection-broken.html
|
code
|
Hello. I am using a H2 database in Java (on windows) and have the below problem(s):
I have a server program that has:
Server server = Server.createTcpServer().start();
and 2 applications that have:
whenever they access the database.
Connection conn = DriverManager.getConnection("jdbc:h2:tcp://localhost/
~/test", "sa", "");
After a minute or so, both my programs breakdown and give the
the following warning
org.h2.jdbc.JdbcSQLException: Connection is broken: "session
Why could this be happening? Please help!
Thanks a lot!
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662882.88/warc/CC-MAIN-20160924173742-00275-ip-10-143-35-109.ec2.internal.warc.gz
|
CC-MAIN-2016-40
| 525
| 12
|
http://pkgsrc.org/pkgsrcCon/2019/index.html
|
code
|
pkgsrcCon is the annual technical conference for people working on pkgsrc,
a framework for building over 19,000 open source software packages.
pkgsrc is the native package manager on NetBSD, SmartOS and Minix, and is portable across many different operating systems including Linux and Mac OS X.
Developers, contributors and users are all welcome to attend.
The pkgsrcCon 2019 takes place on Saturday () and Sunday (). On Saturday we will start off with talks.
We will have lunchbreaks at a convenient time between talks.
On we will have a get-together with some drinks.
On after the conference we will have dinner together. (Partners may be in intersted in the Castle Hill open day happening near the conference venue.)
On we will have an ad hoc pub lunch together.
To plan accordingly please let the organizers know if you are going to attend the social event and dinner on Saturday!
|Social Event||Fri||18:00 - open end||The Castle Inn|
|Talks & Hacking||Sat||10:00 - 18:00||BP Institute|
|Post conf dinner||Sat||19:00 - late||Tandoori Palace|
|Hacking||Sun||11:00 - open end||Computer Museum|
pkgsrcCon will take place at the BP Institute for Multiphase Flow, in Cambridge.
On arrival day, Friday 12th, we will gather around a table at The Castle Inn.
The Castle Inn
38 Castle Street
The social dinner will take place on Saturday 13th at Tandoori Palace Indian restaurant.
68 Histon Road
The Centre for Computing History
Please let the organizers know if you have any particular requirements (diet, allergies...) and we will try our best to address them.
While the primary focus is on pkgsrc, the theme of the day is building and packaging open source software in general and the challenges we face.
Details for general attendees will be available soon but in the meantime, If you would like to present a talk on such a theme, please send the title, slot duration (minimum of 15 minutes) and a brief description (for the web site) to pkgsrcCon2019@NetBSD.org.
|10:00||Patrick Welche, Stephen Borrill||Meet & Greet|
|10:15||Nia Alarie||NetBSD audio - an application dev's perspective|
|11:00||Benny Siegert||A Tale of Two Spellcheckers|
|12:00||Alistair Crooks||Netflix and FreeBSD|
|13:50||Natasa Milic-Frayling||Software preservation and digital continuity|
|14:40||Sevan Janiyan||Something, something, Cambridge|
|15:10||Thomas Klausner||Introduction to the structure & interpretation of TNF|
|16:00||Amitai Schleier||The state of qmail in pkgsrc|
|16:30||Pierre Pronchery||Signing packages: a thing again?|
|16:50||Alistair Crooks||Large Scale Packaging|
The conference is free and there are no tickets.
To help with planning it would be greatly appreciated that you let the organizers know. Send an email to pkgsrcCon2019@NetBSD.org and include details like:
The U Bus line passes the train station, Churchill College (Storey's Way), and very close to the BP Institute (William Gates Building).
How to reach the correct end of Cambridge from further afield is well explained in Churchill College's directions.
The persons mainly responsible for organisation are Patrick Welche and Stephen Borrill. If you want to help with the event, or have questions, suggestions, criticism, remarks, enquiries, praise, queries, proposals, or anything else really, please e-mail pkgsrcCon2019@NetBSD.org.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107916776.80/warc/CC-MAIN-20201031062721-20201031092721-00075.warc.gz
|
CC-MAIN-2020-45
| 3,297
| 39
|
http://sourceforge.net/directory/developmentstatus%3Aplanning/language%3Ajavascript/language%3Ajava/?sort=rating
|
code
|
OSI-Approved Open Source (773)
- GNU General Public License version 2.0 (400)
- Apache License V2.0 (114)
- GNU Library or Lesser General Public License version 2.0 (98)
- BSD License (59)
- GNU General Public License version 3.0 (42)
- Academic Free License (37)
- Apache Software License (24)
- MIT License (20)
- GNU Library or Lesser General Public License version 3.0 (16)
- Common Public License 1.0 (15)
- Mozilla Public License 1.1 (12)
- Artistic License (11)
- Open Software License 3.0 (11)
- Eclipse Public License (10)
- Mozilla Public License 1.0 (10)
- Public Domain (29)
- Creative Commons Attribution License (22)
- Other License (19)
- Windows (810)
- Linux (795)
- Mac (682)
- Grouping and Descriptive Categories (539)
- Android (297)
- Modern (166)
- BSD (88)
- Embedded Operating Systems (37)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
OFBiz, recently changed to The Apache Open For Business Project (or Apache OFBiz), is now managed through the Apache Software Foundation. Apache OFBiz has a full-featured enterprise app framework plus an extensive set of best practices applications.3 weekly downloads
Middleware performance test solution1 weekly downloads
Ky eshte nje projekt i HAPUR/FALAS per publikun Shqip-foles i cili permban nje seri Video-Kursesh, Udhezime, dhe Shembuj Kodi per gjuhe (web) si: XHTML, CSS, JS, PHP, AS3 etj. si dhe per Desktop: C++, Java, Adobe Air etj. + programe/praktika te ndryshme.1 weekly downloads
A "Clientless" VNC solution implemented with Ajax technology. You can remote your PC anywhere without pre-installing any client. As it is purely HTTP, you can VNC even behind firewall or proxy. Java VNC server able to run on Windows/Mac/Linux.22 weekly downloads
A framework for creating service-oriented representations of common websites, using them to create composite services, and providing AJAX methods to "mash-up" these services.
TeamForge is an online real-time document collaboration service.2 weekly downloads
BuildsBoard is the consolidated dashboard of Jenkins jobs.2 weekly downloads
open source mobile development environment1 weekly downloads
This project targets on providing a UI for git from a centralized repository. It will include functionality of file based management with bug tracking. File changed history and other common functionality.
This Project moved to https://sourceforge.net/projects/synbiowave/ because the name GeneWave is a registered trademark... Please do not use this project anymore.
A Java web application that provides the features and behaviors offered by an Agile story wall. The application tracks the states of stories, tasks, and bugs from iteration to iteration.
The complete portal solution for college from both student and operational management perspective. portal should give custom user experience depending on role and context. If you are looking for similar work, Please let us know your views using forum.
This project is designed for the purpose of creating a Java Web-Based Platform for Medical Billing and transmittal of insurance claims. Still in planning stage, looking for volunteer developers.
GeoAssistant is a project denoted to spatial analysis & spatial informations. The goal is to provide usalbe & easy GIS functions. It is based on GeoTools.
Cyberaide is a project to develop a simple interface to advanced cyberinfrastructure for developers and users. For more information, please go to: * http://cyberaide.wiki.sourceforge.net/" or chose the "Web Site" menu item
A base framework to build e-commerce systems.
GLObal Robotic-telescopes Intelligent Array for e-Science1 weekly downloads
School Management Xp19 weekly downloads
Message Exchange via WebDAV
It is just a small OA system based on web. It's only for our college end term project.
An Enterprise Service Bus that is easy to use
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398458553.38/warc/CC-MAIN-20151124205418-00279-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 3,900
| 54
|
http://lists.openwrt.org/pipermail/openwrt-adm/2016-October/001056.html
|
code
|
jo at mein.io
Sat Oct 29 05:23:08 EDT 2016
> - Currently, nothing in the LEDE Project "goes wanting" because of
> lack of money. The cost of the current three build servers is being
> handled personally by members of the core team. These servers total
> ~150 Eur per month, plus a small annual domain registration fee.
> - Digital Ocean has graciously contributed the remaining
> infrastructure (Wiki, Forum, etc) as part of their open source
> support program.
Correct, the only restriction with DO is that we shall not run compute
tasks (buildbots, bitcoin miners ;) - stuff like that)
> - In the future (how soon - 2 months? six months?), we will likely
> need another two servers (additional ~100 Eur/month) to handle the
> full release. There may be team members who could step up to cover
> those new servers.
Yes, in the short term we can likely cover the cost personally, in the
long run some compensation would likely be appreciated.
> - If the current team is willing to continue to handle the existing
> expense, there is no immediate need to seek outside funding for the
> ~250 Eur/mo (3,000 Eur/year; $3,300/year) expense.
Right, there is no immediate, pressing need but eventually it would be
great to cover at least some of the running expenses from donations.
> - On the other hand, donations of $20 from each of 200 community
> members would be enough to compensate those team members for an
> entire year's operating expense, so it might be worth setting up the
> tracking/transparency mechanism to take outsider's money, either
> through direct contributions or some crowdfunding site.
> - I looked into one such site - gofundme.com. They take 5.3 % of the
> amount. I think (in the US) we might avoid a separate legal
> structure, since gofundme.com also says that most donations would be
> treated as personal gifts, and thus not taxable. I will ask my
> accountant, and report back.
That would be great if you could find some clarification on that -
personally I would have no issues with using something like gofundme.com
- any opinions from the others here?
> - Finally, I would like to put an excerpt of your note on the site. I
> think it's just as important for people to get credit for their
> financial contributions as their technical contributions. I won't
> mention names in the first draft, but I think it's important for the
> community to know about all the contributions that .
Feel free to quote me :)
More information about the openwrt-adm
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400283990.75/warc/CC-MAIN-20200927152349-20200927182349-00651.warc.gz
|
CC-MAIN-2020-40
| 2,477
| 42
|
https://help.webex.com/docs/DOC-9575
|
code
|
Verify Audio and Video Device Settings
|Step 1||Select The .General Preferences window opens.|
|Step 2||Select The .Audio/Video Preferences window opens.|
|Step 3||Verify the device settings.|
Check the Connection Status
If there is an issue with a feature, you can check your connection status. For example, if you cannot access your voice messages.
Report a Problem
If you encounter a problem with Cisco Jabber, you can create a problem report to assist your system administrator resolve your issue.
The Problem Reporting Assistant guides you through the reporting process. The problem report generated contains logs from your computer.
|Step 1||Select .|
|Step 2||Enter information on the issue and select Continue.|
|Step 3||Select Generate to create the problem report.|
|Step 4||Select Send Report to create an email that you can send to your system administrator.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084892059.90/warc/CC-MAIN-20180123171440-20180123191440-00177.warc.gz
|
CC-MAIN-2018-05
| 871
| 13
|
https://kloudless.com/2015/12/01/events-update/
|
code
|
Kloudless Enterprise Events Connect your Admin account and get access to organization-wide events. Enterprise Events can obtained through the normal events endpoint. The user responsible for the event is specified where applicable.
Events Endpoint PaginationThe Events endpoint now supports requests of a specific page size and also returns the number of remaining events. It also supports only the retrieval events created after the cloud account has been connected to the Kloudless application. Additionally, a more granular list of event types is also now available, instead of
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202299.16/warc/CC-MAIN-20190320044358-20190320070358-00249.warc.gz
|
CC-MAIN-2019-13
| 580
| 2
|
http://www.testfreaks.com/computer-cases/aopen-h800a/reviews/
|
code
|
Excerpt: What kind of hardware are we dealing with? Do we want to toss this in a rack or not? If so, shall we try to conserve rack space and go with something slim and trim like a 1U or 2U? Are we going to be packing this chassis with disk drives or using an external enclosure? How many PCI devices are we going to be dealing with here? (not so much of an issue unless we're talking 1U or 2U) I could go on and on (heh, you all know that), but I'll stop short.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246661095.66/warc/CC-MAIN-20150417045741-00116-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 461
| 1
|
https://ew.com/article/2006/02/27/apropos_of_noth_2/
|
code
|
Apropos of Nothing: Fun with beluga whales
Forgive me if I don’t post any more blog entries till after lunch. It’s just that I’ve been completely hypnotized by this BBC News segment about Aliya, an effervescent (and talented) beluga whale in Japan.
Curses Special thanks to Metafilter for the link.
Oooo, the bubble, it’s coming right at me! Again, again!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.66/warc/CC-MAIN-20230203091020-20230203121020-00491.warc.gz
|
CC-MAIN-2023-06
| 363
| 4
|
https://5help.squarespace.com/hc/en-us/articles/204964938
|
code
|
AddThis is a third-party service that lets you display different sharing tools on your Squarespace site:
- Share buttons allow users to share your content on social media. Use AddThis's Share buttons for social platforms that aren't included in our built-in social profiles.
- Follow buttons allow users to follow your social media profiles directly from your site. There is no built-in equivalent for Squarespace 5.
Step 1 - Register with AddThis
Go to the AddThis registration page and create a free account.
Step 2 - Activate and customize your tools
Click Tools to view your available tools.
In the Sharing Tools tab, toggle on the Sharing Buttons option.
Pick the size of your Share buttons and whether to show share counts.
Select Auto Personalization to automatically display the services that each visitor has previously used to share content. Alternatively, use the Select Your Own option to control which icons appear, as well as their order.
In the Follow Tools tab, toggle on the Horizontal Follow Buttons option.
Add your personal identifier into the field for any social media platforms you want to share. Hover over the question mark beside each option to see display specific instructions for retrieving your profile link for the service.
Use the Title field to modify the text that will display with the buttons on your site.
Step 4 - Get the code
Click Get The Code in the top bar. You'll need the AddThis code and the Activated Tools code to enable the buttons on your site.
Step 5 - Add the code to your site
First, open the Website Management bar and click Website Settings, then Code Injection. Add the AddThis code to Extra Header Code.
Next, add the button code anywhere on your site that accepts HTML. For example, you could add buttons:
- In your header or footer with Code Injection.
- In your sidebar with the Text/HTML widget.
- On a page in Content Mode.
Note: All third-party customizations fall outside of the scope of Squarespace support. For more information about AddThis and additional help resources, see their documentation.
Sharing on Squarespace 7
To try it out yourself, start a free trial site.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948541253.29/warc/CC-MAIN-20171214055056-20171214075056-00689.warc.gz
|
CC-MAIN-2017-51
| 2,136
| 24
|
https://www.socallinuxexpo.org/scale/20x/presentations/risky-business-bets-scale-mitigate-risk
|
code
|
Risky business - bets at scale to mitigate risk
How do you deal with an infinite number of risks in a finite amount of time?
This talk shares the methods and 4 big questions we ask at Shopify to mitigate risks at scale. We prepare our large, complex, globally distributed infrastructure systems for Black Friday Cyber Monday (BFCM). We ask key questions to understand what are our risks, what do we mitigate, who makes what decisions, and how do we communicate. Hear about real scenarios at Shopify where we proactively and reactively managed technical, operational, and financial risk.
We also learn from poker pros and engineers managing hurricane risk to take a probabilistic approach to risk mitigation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00894.warc.gz
|
CC-MAIN-2023-50
| 707
| 4
|
https://developer-support.majestic.com/security/
|
code
|
To ensure legacy compatibility and provide a wide range of options, the Majestic API supports several access methods. We advise developers to check the possible risks of each access method and determine the most appropriate method for their needs.
Majestic supports endpoints via both HTTP and HTTPS. The risks associated with sending requests without transport layer security are well documented. Many modern programming languages support both HTTP and HTTPS with very little overhead in terms of developer time. HTTP is supported for legacy reasons and should be considered deprecated.
Majestic supports both POST and GET request methods for API calls. HTTPS POST removes the need to pass parameters in the URL, reducing the opportunity for interception.
HTTPS GET should not be considered to offer the same level of security as HTTPS POST. Whilst many developers use GET requests when debugging or investigating aspects of web based APIs, it should be noted that some browser plugins have sent the URLs entered to third party servers, where such data may be made publically available via Web traffic reporting services.
As developer use of GET is considered a common use case, the Majestic API supports the passing of app_api_key as a cookie in order to avoid the need to pass this sensitive data where it may be intercepted. To limit potential for confusion, cookie based authentication is only supported for HTTP(S) GET, and only when the app_api_key is not passed as a URL parameter.
API keys are only as secure as the context in which they are used. Providing members of staff with access to API keys creates the possibility of malicious or accidental compromise, which needs to be considered as part of a wider security strategy. It is therefore important for API key users to monitor the usage of the API and to consider appropriate key management strategies.
The API Key Management page is the hub for Majestic API management. The Majestic API supports multiple keys, which may help support a key management process such as providing one key for development and another for a live environment, or potentially to re-issue keys when developers leave your organisation. It is possible to enable or disable access on individual keys simultaneously, facilitating higher availability during product release or upgrade.
The Majestic API supports the limiting of API access to a number or range of IP addresses on a per key basis. Whitelisted IPs may be expressed as individual IPv4 Addresses or listed together in CIDR notation (e.g 192.168.100.14/24). A white list policy may contain a combination of IP addresses and/or CIDR notation ranges. An absence of any whitelisted addresses will cause the API key to be open to access from all IP addresses.
The API command GetSubscriptionInfo and the My Subscriptions page provide headline resource usage statistics. In addition, the IP activity page in the API Management console provides a more detailed view of API usage on a key and IP address basis.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662510117.12/warc/CC-MAIN-20220516104933-20220516134933-00783.warc.gz
|
CC-MAIN-2022-21
| 3,001
| 9
|