url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.silverstripe.org/community/forums/customising-the-cms/show/44161
code
My website is currently running SilverStripe 3.1 on PHP 5.3.27. My web host recently migrated my site to a new server and since then, I have observed the following problem when attempting to insert images into pages. Code that should look like this: <img class="leftAlone" title="Cineraria" src="assets/Uploads/cineraria-senecio-cruentus.jpg" alt="cineraria"> Comes out looking like this: <img class="\"leftAlone\"" title="\"Cineraria\"" src="\"assets/Uploads/cineraria-senecio-cruentus.jpg\"" alt="\"cineraria\""> On the page, rather than an image I see the following text (using the above example): I cannot use the TinyMCE HTML editor to correct the tags. Pressing "Publish" will result in the above error in the pages. I only installed SilverStripe last month as per this. At the time, my .htaccess contained this line: <IfModule mod_php5.c> php_value memory_limit 128M </IfModule> SetEnv PHPRC "/home/mysite/public_html/silverstripe/" I have since had to remove this to prevent an Error 500: SetEnv PHPRC "/home/mysite/public_html/silverstripe/" My phpinfo() file shows that magic quotes are off but I wonder if this is related. Can anyone help? Pages created before the upgrade are still fine.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689897.78/warc/CC-MAIN-20170924062956-20170924082956-00065.warc.gz
CC-MAIN-2017-39
1,199
13
http://carlosbercero.com/post/?post=%5BSolved%5D_Unable_to_remove_directory_app.publish
code
Sometimes what you would think should work flawless, it turns out it doesn’t. You are compiling in visual studio and you get this error: Unable to remove directory "bin\Release\app.publish\" Unable to remove directory "bin\Debug\app.publish\" It doesn’t matter the project type; WPF, Winforms, ASP.NET, MVC, etc. You probably have your solution files in a OneDrive folder with OneDrive client on. It seems like OneDrive locks files for syncing or messes up with the files timestamps or attributes. Therefore Visual Studio is unable to remove the folder or files. Just unload your OneDrive client, and wait a couple of seconds. Your solution should now recompile again without problems. You can turn OneDrive back on when you finish and let it resync. Alternatively, you can go to OneDrive SettingsAccount/Choose folders, navigate to your project folder and unmark the “bin” folder. Also, you can just move your solution out of OneDrive.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585246.50/warc/CC-MAIN-20211019074128-20211019104128-00573.warc.gz
CC-MAIN-2021-43
944
11
http://teampyro.blogspot.com/2006/01/brief-parable.html
code
To which the organ-grinder replies, "He's a monkey; you think I baptized him or something?" And you are somehow appalled that an organ-grinder is using a monkey. They are all organ-grinders. They are all using monkeys. To get mad at this last one and boycott him when you have boycotted none of the rest for using monkeys is, in fact, arbitrary. It's an organ-grinder problem, not a monkey problem.
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607802.75/warc/CC-MAIN-20170524055048-20170524075048-00082.warc.gz
CC-MAIN-2017-22
398
2
https://www.freevbcode.com/ShowCode.asp?ID=2315
code
Populate a FlexGrid or Sheridan DataGrid with Data from an ADO Recordset Version Compatibility: Visual Basic 6, Visual Basic 5 This is one of two functions on the site that loads dtaa from an ADO recordset into an MSFlexGrid, the other is at http://www.freevbcode.com/ShowCode.Asp?ID=1728. There are a number of differences between the two; unlike the other function, this one works with a Sheridan DataGrid as well, requires VB6, uses ADO's GetString method to speed things up, and takes care of clearing the grid. However, the other function adds field names as well as values whereas this one does not. Instructions: Copy the declarations and code below and paste directly into your VB project.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053493.41/warc/CC-MAIN-20210916094919-20210916124919-00594.warc.gz
CC-MAIN-2021-39
697
4
https://www.vmware.com/education-services/certification/sdwanf-2019-skills.html
code
VMware SD-WAN Foundations proves that an individual has a fundamental understanding of SD-WAN technology. The VMware SD-WAN Foundation badge holder can, present the SD-WAN solution, present the architecture and features, connect customer needs/use cases to product capabilities across different market verticals, and provide a high-level demonstration of the VeloCloud Orchestrator 2. Pass the VMware SDWAN Foundations Skills exam (5V0-35.19): When you’ve earned a VMware badge, you will receive an email notification alerting you to claim your badge. When you accept your badge, you’ll be brought immediately into a sharing workflow that allows you to share to Facebook, Twitter, and LinkedIn, embed in a personal website, or share over email.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573124.40/warc/CC-MAIN-20190917223332-20190918005332-00026.warc.gz
CC-MAIN-2019-39
748
3
https://forum.manjaro.org/t/droidcam-v4l2loopback-device-not-found/83377/2
code
Hello everybody, newbie to Linux, literally 3 days starting using it so maybe this problem is easy to solve but i don’t know how. Well, my problem is that when I open Droidcam (which was installed from the Add/remove software from Manjaro) it gives me this error message: I investigate a little and found out that I have to install the matching headers for the kernels, but I tried with the commands I found and it didn’t work. Here’s the one i used for example: $ sudo pacman -Syu linux-latest-headers linux-lts-headers And when i put this command in the terminal it gives me this error message: warning: failed to retrieve some files error: failed to commit transaction (failed to retrieve some files) Errors occurred, no packages were upgraded. By the way, the kernels i have installed is the version Linux 5.13.13 (linux513) and Linux 5.14.0 (linux514) which is the last version i have available. Thanks for reading and hopefully responding, see ya!!
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500719.31/warc/CC-MAIN-20230208060523-20230208090523-00388.warc.gz
CC-MAIN-2023-06
960
8
https://startupxplore.com/en/startups/shopery
code
It is a platform based on cloud technology (SaaS) that allows an end user to create and manage one or multiple online stores simply, quickly and intuitively. Satisfies customer requirements without additional developments, updates or specific programming codes. Image Gallery Shopery 0 Shopery doesn't have any images in his gallery. Acceleradoras Shopery 0 Shopery no ha pasado por aceleradoras
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00418.warc.gz
CC-MAIN-2023-50
395
5
https://machsomwatch.org/en/node/7864
code
Abu Dis, Container (Wadi Nar), Ras Abu Sbitan (Olive Terminal), Sheikh Saed, Wed 29.10.08, Morning A group of c. 15 men were waiting. School-children passed freely. Only one turnstile was operating for both exits and entrances, because the magnometer at the seond turnstile had broken down. (Someone came to fix it a couple of days ago but to no avail.) Even though there was a sense of relaxation about the inspection of documents and the passage of neighbourhood residents, the attitude of the soldiers vis-a-vis the population was not particularly relaxed. 07:50 Zeitim Crossing 09:30 Wadi Nar Lively traffic flowing freely, without incidental detentions. Now and then the soldiers stop one of the vehicles to inspect documents, and immediately gesture to drive on.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738723.55/warc/CC-MAIN-20200810235513-20200811025513-00232.warc.gz
CC-MAIN-2020-34
768
5
http://portal7.info/guides/uml-2-certification-guide-fundamental-intermediate-exams-pdf-5941.php
code
UML 2 Certification Guide: Fundamental and Intermediate Exams (The MK/OMG eBook: Tim Weilkiens, Bernd Oestereich: portal7.info: Kindle Store UML 2. Request PDF on ResearchGate | On Jan 1, , Tim Weilkiens and others UML 2 certificiation guide - fundamental and intermediate exams. . a guide book for a UML 2 certification, referred to as OMG Certified UML Professional ( OCUP). free download uml 2 certification guide fundamental intermediate exams exams the mk omg press book pdf keywords free downloaduml 2 certification. |Language:||English, Spanish, French| |ePub File Size:||29.66 MB| |PDF File Size:||18.71 MB| |Distribution:||Free* [*Sign up for free]| UML 2 Certification Guide - 1st Edition - ISBN: , Fundamental and Intermediate Exams eBook ISBN: [PDF] UML 2 Certification Guide: Fundamental & Intermediate Exams (The MK OMG Press) by Tim. Weilkiens. Book file PDF easily for everyone and every. if searching for a book uml 2 certification guide: fundamental and intermediate exams (the mk/omg press) by bernd oestereich, tim weilkiens in pdf format. OR Python notes by durgasoft pdf 1. Objects have types. Don't show me this again. It is resided at Hyderabad, India. It also describes some of the optional components that are commonly included in Python distributions. It was designed and written by a man named Dennis Ritchie. Class diagrams can also be used to show implementation classes, which are the things that programmers typically deal with. Preparing to Write: To write a good summary it is important to thoroughly understand the material you are working with. Since the sequence diagram layout works better in the landscape setting, we need to change the page setup for this diagram. However, as your system scales and grows, it becomes increasingly difficult to keep track of all these relationships. Here's a theoretical example: And Data Flow Diagrams are …? A state is a constraint or a situation in the life cycle of an object, in which a constraint Entity class entity set is a structural description of things that share common attributes Entity instance is the occurrence of a particular entity Attribute Describes an entity class All entity instances of a given entity class have the same attributes, but vary in the values of those attributes Identifier Identifies an entity instance diagrams. Procedure: Using the attached diagram, ask for a student volunteer from the class to assist in this demonstration about communication. Example: The following table gives the frequency distribution of the number. For example, in Figure 1—3B1, the control wiring from the start-stop pushbutton station runs to the actual connection points 1, 2, and 3. A customer can download an item, using a smart card issued by the vending machine company to pay for it. The state of an activity relates to the performance of each workflow step. Changes to the sequence diagram's notation set in UML 2 have made vast improvements in modeling logic in sequences. The OMG specification states: "The Unified Modeling Language UML is a graphical language for visualizing, specifying, constructing, and documenting the artifacts of a software-intensive system. Have a glimpse into the web's leading online psychometric preparation institute. The greatest common place value of the data is used to form the stem. Classes are arranged in hierarchies sharing common structure and behavior and are associated with other classes Class diagram is a static diagram. Class diagrams describe three different perspectives when designing a system, conceptual, specification, and 5. William L. Within the philosophy of science there have been competing ideas about what an explanation is. The class diagram is one of the most commonly used diagrams in UML, as explained in depth in our guide on class diagrams. The Analysis Class Diagram captures the basic class structure implied by the use case flows of events. Dear Sir, I would like to put this letter as explanation to your kind notice that presently I am dealing with huge financial crisis as I have lost my last job due to some specific reason. This model allows you to graphically represent symbol diagrams containing classes. This is an example of a class diagram, using the Publication class as the parent. In a Builder Design Pattern implementation the construction of a complex object is separated from its representation. Figure 1. Requirements Diagram. The purpose of this module is to introduce language for talking about sets, and some. The way to measure complexity is to determine how many classes can be affected by changing a particular class. Here is sample code for a possible implementation of a Bicycle class, to give you an overview of a class declaration. Compare this diagram to Figure , the Check Out Asset collaboration diagram. Stumpf, Lavette C. A class diagram is a graphic view of the static structural model. Sequence diagrams contain the same information as Collaboration diagrams, but emphasize the sequence of the messages instead of the relationships between the objects. Example: Online Shopping In order to develop our sequence diagram we will need the use case text and the specification class diagram: Use Case Text: download a Product Online 1. The implementation class diagram won't be drawn with the same attributes, however, because it will I am having a hard time understanding these when it comes to designing a class diagram, from what I know composition is a "has-a" relationship but Aggregation?? I have no idea what is it. Projectable of simple class diagram showing pets and masters 4. The example above shows a basic class diagram. Paragraph Structure: Putting the P. Explain to the other students that the volunteer is going to describe something to them and their task is to simply follow instructions in Introduction to Tape Diagrams Page 1 of 5 There are 36 children in the class. It represents the static view of an application. Object Diagrams, sometimes referred to as Instance diagrams are very similar to class diagrams. It describes the structure of a system by showing the general issues,classes of a system, attributes, operations, interfaces, inheritance, and the relationships between them. Class A is passed an instance of Class B in it's constructor and saves it as a class member. Handout of class diagram for ATM Example 2. A class represents a relevant concept from the domain, a set of persons, objects, or ideas that are depicted in the IT system: Examples of classes are passengers, planes, or tickets. Software engineers and business professionals often choose class diagrams to map the structure of particular systems because they clearly display the various classes, attributes, operations, and Visit the post for more. The Pourbaix diagram is a projection of the equilibrium potential surface in a many dimensional parameter space onto the subspace of pH. The example on the right shows a conceptual view of Human society. A class diagram describes the types of objects in the system and the different types of relationships that exist among them. The examples are in sequence: each next example improves the previous one. If we look into class diagram, object diagram, collaboration diagram, interaction diagrams all would basically be designed based on the objects. JMU Computer Science Course Information Typically, people can elaborate use case scenarios with a sequence diagram: Sequence Diagram models the collaboration of objects based on a time sequence. Customer goes to checkout. Classes are arranged in hierarchies sharing common structure and behavior and are associated with other classes Examples of UML diagrams - website, ATM, online shopping, library management, single sign-on SSO for Google Apps, etc. Specifically, we define the interchange syntax with a MOF-based metamodel and the graphical syntax with a QVT mapping to a graphics metamodel. We then run an experiment where we interchange and render an example diagram. A free-body diagram is a special example of the vector diagrams that This definition explains what a use case diagram is and how it's used and also provides a graphic example and links to more information. Ann Arbor: U Michigan P, Activity usually interacts with user, and the Activity class takes care Diagram. Solution: X is the midpoint of the class. Figure 4. Class diagram is not only used for visualizing, describing, and documenting different aspects of a system but also for constructing executable code of the software application. For example, in the dice game, an inspection of the sequence diagram leads to the partial design class diagram shown in Figure 1. Entity class entity set is a structural description of things that share common attributes Entity instance is the occurrence of a particular entity Attribute Describes an entity class All entity instances of a given entity class have the same attributes, but vary in the values of those attributes Identifier Identifies an entity instance State Diagrams 3. Then it is time to study the flows of events in detail. All structured data from the file and property namespaces is available under the Creative Commons CC0 License; all unstructured text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. Figure 3. These definitions and uses will be introduced specifically in the following. We address this problem from two perspectives and construct the class diagram in two work steps. The Critical Path Method or Critical Path Analysis, is a mathematically based algorithm for scheduling a set of project activities It is an important tool for effective project management Commonly used with all forms of projects, including construction, software development, research projects, product Every Java developer knows that bytecode will be executed by JRE Java Runtime Environment. Plot Diagram Template. System complexity can be measured simply by looking at a UML class diagram and evaluating the association, aggregation, and composition relationship lines. A class is a blueprint, or prototype which defines and describes the member attributes and member functions. You will not be able to take the Exam if you do not agree to these requirements. Yes, you may mark certain question that you feel are difficult and review them at the end of the Exam. After you clicked the submit button, the tool will tell you that you have marked questions and allow you to jump to them. Both marked and unmarked questions will be scored when finally submitting the Exam. Unanswered questions will be marked as incorrect answers. Is it OK to guess answers or are these tests marked negatively? The Exams are not scored negatively. This means that you can safely guess answers, as no points will be deducted for incorrect answers. It is best to check if you have actually answered ALL questions before completing the Exam. If you are running short on time, just click any answer and move on. This way, you will at least have a chance to get some of them right. Do the Pearson VUE test centers provide special testing accommodations? Candidates with documented visual, physical, hearing, or learning disabilities, which would prevent them from taking an examination under standard conditions, may request special testing accommodations and arrangements. Please contact Pearson VUE directly. Published Date: Page Count: View all volumes in this series: Sorry, this product is currently out of stock. Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle. When you read an eBook on VitalSource Bookshelf, enjoy such features as: Access online or offline, on mobile or desktop devices Bookmarks, highlights and notes sync across all your devices Smart study tools such as note sharing and subscription, review mode, and Microsoft OneNote integration Search and navigate content across your entire Bookshelf library Interactive notebook and read-aloud functionality Look up additional information online by highlighting a word or phrase. Institutional Subscription. Instructor Ancillary Support Materials. Free Shipping Free global shipping No minimum order. Introduction 1. OCUP fundamental 2. OCUP intermediate 3. The official certification resource Assumes a basic knowledge of UML so that you can focus immediately on the exams Written by two authors known for their skill as trainers, consultants, and developers Developed systematically to enable you to master all exam topics—without exception Covers the use of UML for applications, as required by the exams, both inside and outside of the realm of software development Includes a practice exam, glossary, list of books, and website information.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371803248.90/warc/CC-MAIN-20200407152449-20200407182949-00056.warc.gz
CC-MAIN-2020-16
12,759
39
http://www.march-hare.com/library/html/convert.htm
code
After considering using Uniface to do a direct copy, they selected the March Hare UD8/CSV driver because: It would be considerably faster to load using SQL*Loader SQL*Loader provides more functionality for 'massaging' the data on the way through. CSV files were more readily understood by the development team than TRX files. Once installed on their NCR 3000 series server running System V UNIX, it made short work of the 500,000 records. The assignment file setting was, e.g.: USYS$UD8_PARAMS=alert, separator \xb6 This combination used a separator that was unlikely to appear in the data, and an alert message to warn if the separator HAD been found in the data. An example SQL*Loader control file INTO TABLE TMP_MASTER FIELDS TERMINATED BY "¶" MS_ITERATION CONSTANT 0, MS_CONVERSION_STATUS CONSTANT " ", MS_RADDR3 "TO_DATE(:MS_RADDR3,'YYYYMMDD')" , MS_RDATE "TO_DATE(:MS_RDATE,'YYYYMMDD')" , MS_DELCLOSE "TO_DATE(:MS_DELCLOSE,'YYYYMMDD')" , - UD8/CSV driver is available for all Uniface supported platforms |$Revision: 1.7 $ $Date: 2011/02/28 02:56:32 $||[go to top]|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711114.3/warc/CC-MAIN-20221206192947-20221206222947-00356.warc.gz
CC-MAIN-2022-49
1,071
18
https://discuss.elastic.co/t/do-we-require-licence-to-enable-xpack-security-feature/287427
code
I just wanted to know, If I wanted to use the alerting, monitoring and user administration RBAC feature in ELK stack. Do I require a license for the same? I also wanted to know, if I would like to do integration of a tool with ELK stack in that case also do we require a license? As today I tried to enable the xpack.security.enable=true in docker-compose of ELK i am getting error message "License is required" Please do let me know on this.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358208.31/warc/CC-MAIN-20211127163427-20211127193427-00018.warc.gz
CC-MAIN-2021-49
442
4
https://dribbble.com/benmacgowan/tags/alegreya
code
Personal website - v3 - header (revised) Revisiting the header to my personal website to add a bit more pop. Personal website - v3 - secondary posts Have decided to move secondary posts e.g. Instagram photos, favourited tweets and Delicious bookmarks to a separate timeline. Personal website - v3 - header Been inspired to re-brand. Going for a much cleaner and content focused look. Setting myself the challenge of a quick turn around.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190234.0/warc/CC-MAIN-20170322212950-00498-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
436
3
https://community.spotify.com/t5/Your-Library/View-all-Songs-a-Playlist-ever-had/td-p/4920278
code
Scroll all the way to the bottom and click on Let’s go As a heads-up, it's good to know that the higher the number of votes an Idea gets, the more likely it is for the Idea to be implemented. If you wish to learn more about how your feedback will reach Spotify, feel free to take a look at this article. Hope you'll find this info useful. Have a nice (and a safe) day! Help others find this answer and click "Accept as Solution". If you appreciate an answer, maybe give it a Like.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00164.warc.gz
CC-MAIN-2022-33
482
5
http://www.pearltrees.com/u/360922-ggobi-visualization-system
code
Case study: A brief review of online visualisation tools that can help There is a growing range of online tools to help users their data. This brief review highlights four online visualisation tools that can help. The links page also links to lots more useful resources. Online tools that can help visualise data (these tools are free to use, but any data uploaded is typically then available on the system for other users) highlighted below include: On the resources and links page, we also link to free software applications and libraries for visualising data, and development languages for more sophisticated data visualisation. Mondrian (software) Mondrian is a general-purpose statistical data-visualization system. It features outstanding visualization techniques for data of almost any kind, and has its particular strength compared to other tools when working with Categorical Data, Geographical Data and LARGE Data. All plots in Mondrian are fully linked, and offer various interactions and queries. Any case selected in a plot in Mondrian is highlighted in all other plots. Currently implemented plots comprise Mosaic Plot, Scatterplots and SPLOM, Maps, Barcharts, Histograms, Missing Value Plot, Parallel Coordinates/Boxplots and Boxplots y by x. Mondrian works with data in standard tab-delimited or comma-separated ASCII files and can load data from R workspaces. 5 of the Best Free and Open Source Data Mining Software The process of extracting patterns from data is called data mining. It is recognized as an essential tool by modern business since it is able to convert data into business intelligence thus giving an informational edge. At present, it is widely used in profiling practices, like surveillance, marketing, scientific discovery, and fraud detection. There are four kinds of tasks that are normally involve in Data mining: * Classification - the task of generalizing familiar structure to employ to new data* Clustering - the task of finding groups and structures in the data that are in some way or another the same, without using noted structures in the data.* Association rule learning - Looks for relationships between variables.* Regression - Aims to find a function that models the data with the slightest error. Pavel Risenberg Nooblast Project inspired by the old days Noösphere concept. Visualization picks the real-time data from public APIs and calculates overall strength of signal (recent network buzz) for two given keywords. Some picked events have geolocation information, so they mapped on the globe in the exact points. The overall strength visualized around the globe as “noo”-cloud, the size of which reflects event streams and shaped by geotagged data, building light abstract visual structures-snapshots in space for each term. It explores abstract visual component of generated crowd sourced info streams as the visual connection attaching you to the pulse of planet. gource visualisation tool Gource is a software version control visualization tool. See more of Gource in action on the Videos page. Introduction Software projects are displayed by Gource as an animated tree with the root directory of the project at its centre. Directories appear as branches with files as leaves. Developers can be seen working on the tree at the times they contributed to the project. Gallery "Spike" map Interactive United States population density map. Average rating: 7.5 (23 votes) 2D histogram An extension of the concept of histogram to display the colour image content. Average rating: 4.8 (5 votes) claudio martella In the past, I’ve written about Google Pregel. At the time, as it was quite obvious, there was no implementation of anything like Pregel out there of any kind, not to mention Open Source. Now things have changed, so I’d like to give a quick list of the projects out there that might help you getting started with this technology, as I see that very often people ask what the difference is between all of them. I have direct experience only with the Java implementations, so I can talk about them a bit more extensively. As you remember from my last post, Pregel is a framework for large-scale graph processing that builds on top of the BSP computational model. It allows the developer to write a vertex-centric algorithm for graph processing (meaning you write a function that receives messages from vertices and sends messages to other vertices) and forget about things as distribution and fault-tolerance. Data Mining Image: Detail of sliced visualization of thirty video samples of Downfall remixes. See actual visualization below. As part of my post doctoral research for The Department of Information Science and Media Studies at the University of Bergen, Norway, I am using cultural analytics techniques to analyze YouTube video remixes. How to become a data visualization ninja with 3 free tools for non-programmers We noticed many times between the lines of this blog how data visualization is in the hype and how this trend is growing and growing. That’s good news guys! It’s fun and it’s … success! But as more and more people join this wild bunch we have to take care of those who are not as skilled as we are yet. There are many people out there who love data visualization but they think they are out of this business because they are not able to code. 75+ Tools for Visualizing your Data, CSS, Flash, jQuery, PHP Most people would agree that the old adage “A picture is worth a thousand words” is also true for web based solutions. There should be no discussion – Charts and Graphs are ideal to visualize data in order to quickly deliver an overview and communicate key messages. Whatever type of data presentation you prefer or suits you data (pie charts, bubble charts, bar graphs, network diagrams etc.), there are many different options but how do you get started and what is technologically possible? In this article tripwire magazine present more than 75 Tools for Visualizing your data on a website and most of the options available will be covered. Open Source Text Analytics by Seth Grimes Open source is a great choice for many text analytics users, especially folks who have programming skills, who need custom capabilities or who are trying to get a feel for possibilities before committing themselves. Excellent options are available for all these users. Tools such as Gate, NLTK, R and RapidMiner share the low cost, power, flexibility and community that have driven adoptionof open-source software by individual users and enterprises alike. RapidMiner even combines text processing with business intelligence (BI) and visualization functions. This article will look at open source text analytics, focusing on those four tools.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987798619.84/warc/CC-MAIN-20191022030805-20191022054305-00321.warc.gz
CC-MAIN-2019-43
6,740
10
https://edworkingpapers.com/topics/inequality?page=5
code
Search for EdWorkingPapers here by author, title, or keywords. We estimate the longer-run effects of attending an effective high school (one that improves a combination of test scores, survey measures of socio-emotional development, and behaviours in 9th grade) for students who are more versus less educationally advantaged (i.e., likely to attain more years of education based on 8th-grade characteristics). All students benefit from attending effective schools. However, the least advantaged students experience the largest improvements in high-school graduation, college-going, and school-based arrests. These patterns are driven by the least advantaged students benefiting the most from school impacts on the non-test-score dimensions of school quality. However, while there is considerable overlap in the effectiveness of schools attended by more and less advantaged students, it is the most advantaged students that are most likely to attend highly effective schools. These patterns underscore the importance of quality schools, and the non-test score components of quality schools, for improving the longer-run outcomes for less advantaged students. Homelessness is rising among public school students in large cities across the US. Using nine years of student-level administrative data, we examine how homelessness affects students’ mathematics and attendance outcomes within the Los Angeles Unified School District, including the differential effects of homelessness based on duration and timing of their homeless experiences. Results using inverse probability of treatment weighting find that homeless students score 0.13 SD lower on math assessments and miss 5.8 additional days of school than students who never experience homeless. Results suggest that current homelessness has larger negative impacts on math achievement and attendance than former homelessness, and that transitory homelessness has larger negative impacts than persistent homelessness on the same outcomes. Despite the significant influence that peer motivation is likely to have on educational investments during high school, it is difficult to test empirically since exogenous changes in peer motivation are rarely observed. In this paper, I focus on the 2012 introduction of Deferred Action for Childhood Arrivals (DACA) to study a setting in which peer motivation changed sharply for a subset of high school students. DACA significantly increased the returns to schooling for undocumented youth, while leaving the returns for their peers unchanged. I find that DACA induced undocumented youth to invest more in their education, which also had positive spillover effects on ineligible students (those born in the US) who attended high school with high concentrations of DACA-eligible youth. JEL Codes: I26, H52, J15 One of the controversies surrounding charter schools is whether these schools may either “cream skim” high-performing students from traditional public schools or “pushout” low-achieving students or students with discipline histories, leaving traditional public schools to educate the most challenging students. We use these terms strictly for brevity and acknowledge that many of the reasons that students are labeled high- or low-performing academically or behaviorally are beyond the control of the student. In this study, we use longitudinal statewide data from Tennessee and North Carolina and linear probability models to examine whether there is evidence consistent with these selective enrollment practices. Because school choice programs managed by districts (magnet and open enrollment programs) have a similar ability to cream skim and pushout students, we also examine these outcomes for these programs. Across the various school choice programs, magnet schools have the most evidence of cream skimming, but this might be expected as they often have selective admissions. For charter schools, we do not find patterns in the data consistent with cream skimming, but we do find evidence consistent with pushout behaviors based on discipline records. Finally, some have raised concerns that students may be pushed out near accountability test dates, but our results suggest no evidence consistent with this claim. We examine U.S. children whose parents won the lottery to trace out the effect of financial resources on college attendance. The analysis leverages federal tax and financial aid records and substantial variation in win size and timing. While per-dollar effects are modest, the relationship is weakly concave, with a high upper bound for amounts greatly exceeding college costs. Effects are smaller among low-SES households, not sensitive to how early in adolescence the shock occurs, and not moderated by financial aid crowd-out. The results imply that households derive consumption value from college and household financial constraints alone do not inhibit attendance. Growing experimental evidence demonstrates that low-touch informational, nudge, and virtual advising interventions are ineffective at improving postsecondary educational outcomes for economically-disadvantaged students at scale. Intensive in-person college advising programs are a considerably higher-touch and more resource intensive strategy; some programs provide students with dozen of hours of individualized assistance starting in high school and continuing through college, and can cost thousands of dollars per student served. Despite the magnitude of this investment, causal evidence on these programs' impact is quite limited, particularly for programs that serve Hispanic students, the fastest growing segment of U.S. college enrollees. We contribute new evidence on the impact of intensive college advising programs through a multi-cohort RCT of College Forward, which provides individualized advising from junior year of high school through college for a majority Hispanic student population in Texas. College Forward leads to a 7.5 percentage point increase in enrollment in college, driven entirely by increased enrollment at four-year universities. Students who receive College Forward advising are nearly 12 percentage points more likely to persist to their third year of college. While more costly and harder to scale than low-touch interventions, back of the envelope calculations suggest that the benefit from increased college graduation likely induced by the program outweighs operating costs in less than two years following college completion. This article asks whether small changes to community college courses and programs can help improve student outcomes. We use administrative data from the California Community College system, including millions of student records and detailed course-level information for most career-technical education programs in the state. We construct a summary measure of each program’s flexibility, incorporating many components of the availability and scheduling of its courses. We show considerable variation in this flexibility measure across programs and over time. An increase in a program’s flexibility is associated with increases in enrollment and completions, but not with changes in its completion rate. The estimation of test score “gaps” and gap trends plays an important role in monitoring educational inequality. Researchers decompose gaps and gap changes into within- and between-school portions to generate evidence on the role schools play in shaping these inequalities. However, existing decomposition methods assume an equal-interval test scale and are a poor fit to coarsened data such as proficiency categories. This leaves many potential data sources ill-suited for decomposition applications. We develop two decomposition approaches that overcome these limitations: an extension of V, an ordinal gap statistic, and an extension of ordered probit models. Simulations show V decompositions have negligible bias with small within-school samples. Ordered probit decompositions have negligible bias with large within-school samples but more serious bias with small within-school samples. More broadly, our methods enable analysts to (1) decompose the difference between two groups on any ordinal outcome into portions within- and between some third categorical variable, and (2) estimate scale-invariant between-group differences that adjust for a categorical covariate. In this paper I study the impact of court-mandated school desegregation, which began in the late 1950s, on White individuals’ racial attitudes and politics in adulthood. Using geocoded nationwide data from the General Social Survey, I compare outcomes between respondents living in the same county who were differentially exposed to desegregated schools, based on respondent age and the year of court-mandated integration. With this differences-in-differences approach, I find that exposure to desegregated schools increased White individuals’ conservatism and negatively impacted their racial attitudes and support for policies promoting racial equity, such as affirmative action. Heterogeneity analyses indicate that effects are particularly pronounced in counties where opposition to integration was strongest: Southern counties desegregating after the passage of the Civil Rights Act of 1964 and counties where support for the Democratic presidential candidate between the 1960 and 1968 elections substantially decreased. My study provides causal evidence for key tenets of the contact hypothesis, which theorizes that Black-White contact in integrated schools can improve outgroup racial attitudes only under certain conditions, including when this intergroup contact has institutional support. One frequently cited yet understudied channel through which money matters for college students is course availability- colleges may respond to budgetary pressure by reducing course offerings. Open admissions policies, binding class size constraints, and heavy reliance on state funding may make this channel especially salient at community colleges, which enroll 47% of U.S. undergraduates in public colleges and 55% of underrepresented minority students. We use administrative course registration data from a large community college in California to test this mechanism. By exploiting discontinuities in course admissions created by waitlists, we find that students stuck on a waitlist and shut out of a course section were 25% more likely to take zero courses that term relative to a baseline of 10%. Shutouts also increased transfer rates to nearby, but potentially lower quality, two-year colleges. These results document that course availability- even through a relatively small friction- can interrupt and distort community college students’ educational trajectories.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057973.90/warc/CC-MAIN-20210926205414-20210926235414-00063.warc.gz
CC-MAIN-2021-39
10,736
11
https://www.millioncenters.com/tutor-details/Dance,Music,Martial-Arts-tutor-in-Delhi/Sandeep-shrivastav:4135
code
I am student of science. Teaching Type - Home Tutor Only. ID verified : Adharcard (ID Proof) Tutor's verified Documents : No review ! Get ₹100 OFF on Home Decor Products on myntra.com only for new users, and use same number for registration to get the offer. Photography is the art of telling storie ...read more What’s common between having a hob ...read more What were you doing when you were six... ...read more 'There's no better school than c ...read more Forget song and dance, did you know that ...read more
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347439019.86/warc/CC-MAIN-20200604032435-20200604062435-00174.warc.gz
CC-MAIN-2020-24
518
14
https://www.ahbmusic.com/copy-of-beatstems
code
Text Me Directly. 24/7 A guide to Better Quality. 1. Close all programs and applications that don't need to be open to record We need to keep in mind that while we do have an interface handling the heavy lifting, recording is still a heavy process on your computer. Make sure to close all unnecessary software, applications and plugins before beginning. If you hear pops and clicks, it’s often a result of lack of processing power. If we only have the necessities for recording open and we still get clicks and pops we can adjust the buffer size. 2. Play with Buffer size At it’s VERY basic you need to know this… If the buffer size is too big, you will experience a delay between the recording and how quickly it returns to your headphones. If the buffer size is too small, it may cause unwanted pops and clicks that aren’t always fixable. The goal is to find a happy place that doesn’t bother you and causes no clicks. SOME artists don’t like to monitor/listen to their voice while they record. If this is you, a larger buffer size might work better for you. If you want to understand more about Buffering check out the link below that covers it much more in depth.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818999.68/warc/CC-MAIN-20240424014618-20240424044618-00319.warc.gz
CC-MAIN-2024-18
1,179
9
http://www.mellanox.com/blog/2017/12/going-distance-mellanox-hackathon-spurs-innovation-code-rules-day/
code
Mellanox recently held its 11th Software Hackathon in Mellanox Israel offices. As most know, Hackathons are essentially software writing contests. Creative engineers spend 48 hours, working around the clock, “hacking” (writing software) in a marathon fashion. Hackathons have become part of the Mellanox culture by enabling employees to innovate and drive their ideas from vision into reality. In Hackathons we have a saying: Code Wins. Code wins every argument and Code demonstrates feasibility and value of the invention. Over the past four years, engineers have had amazing opportunities to bring their ideas to life in Mellanox hackathons. As a result, we have enriched our product portfolio, improved our infrastructure, developed new inventions and established collaboration with partners on new innovative directions. In this latest hackathon, Mellanox hosted 18 participating teams, which made it the largest hackathon record. We received amazing ideas; from containerized switch applications, improving resiliency and performance, simulators and prototyping, artificial intelligence, manageability and debug-ability, online training and so much more. Our MLNX-OS switch platform support for containerized applications facilitated multiple projects enabling value add applications to run inside the switch. Such applications can include manageability, protocols enhancements, telemetry, resiliency, debuggability, testability, tuning and more. We are also seeing trends of innovation around machine learning algorithms to boost our products and core infrastructure. The winner was coding for a switch container application that boosts storage resiliency. In second place, was code for containerized MLNX-OS -. In third place, was an automatic storage management infrastructure and dynamic performance tuning. As hackathons are integral to Mellanox’s continual quest for innovation, we are already looking forward for the next successful hackathon!
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864790.28/warc/CC-MAIN-20180522131652-20180522151652-00595.warc.gz
CC-MAIN-2018-22
1,961
3
http://www.tdaxp.com/archive/2005/08/08
code
“It’s your stock of entangled particles,” by iabervon, Slashdot, 8 August 2005, http://science.slashdot.org/comments.pl?sid=158439&cid=13274823. In most situations we have prior information. For example, if Alice wants to tell Bob her phone number (which is ten digits long), and Bob knows three of the numbers in her phone number (he might sometimes know the area code if he knows where she lives), then Alice only has to send Bob seven of the numbers. So we can divide the information Total information: 10 numbers Prior information: 3 numbers Partial information: 7 numbers Notice that the total information is equal to the prior information plus the partial information. Another way of understanding negative information, is that in quantum mechanics, you can know too much. Remember the telephone number example? Well, in that case, the total information (the phone number), was ten letters and Bob’s prior information was three letters. Alice needed to send him seven letters for him to get the total information. It turns out that in quantum mechanics, Bob could know more than the total amount of information. So he might know fifteen letters of information even though the total amount of information is only ten. So Alice can tell him the quantum phone number by sending him negative five quantum letters of information, which basically means that Alice and Bob can perform some tricks on their quantum letters so that Bob will learn the quantum phone number, and also, Alice will be able to send him more quantum letters in the future. Essentially, they will be able to convert part of their quantum letters into a resource which can be used to teleport quantum information between them. A commentator on Slashdot expounds The trick is that you can use quantum entanglement to have excess unspecified knowledge, which can be converted into specific knowledge. It’s like being on a quiz show where you are given a certain number of times you can look up an answer. These bonuses have to count in your total knowledge (I know 100 facts, plus I can look up things twice). If someone tells you something, you get positive information. If you look something up, you get zero information (you trade a bonus lookup for a fact). If you look something up, and you already knew the answer, you get negative information. Now think about it as if someone else controlled the book. They can tell you things over the phone, and they can cause answers to pop out of the book. If they waste the book on something you actually already knew, your total information goes down, so the information in the transaction is negative.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655900614.47/warc/CC-MAIN-20200709162634-20200709192634-00579.warc.gz
CC-MAIN-2020-29
2,629
10
http://begintocodewithpython.com/tools.html
code
Welcome to the Begin to code with Python tools page. You can find the official Microsoft Press Store page for this book here You can find the Python tools at Python download site. Remember to download version 3.6 as this is the version of Python that I use for alll the examples. Talking of examples, you can find them here. You can find the Visual Studio Code editor at Visual Studio Code download site. You can find a set of notes that will help you use this book to revise for the Microsoft Certified Professional Exam 98-381, 'Introduction to Programming Using Python' here. You can buy the book here. You can find my blog at www.robmiles.com. If you have any questions about the links, the sample programs, or the book, you can get in touch with me via email on questions at begintocodewithpython.com. You can also tweet any questions to @begintocode or @robmiles
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510412.43/warc/CC-MAIN-20230928130936-20230928160936-00384.warc.gz
CC-MAIN-2023-40
868
10
https://www.mattbacak.com/mattbacakoffers/jam-your-pockets-full-of-cash/
code
But now… a single renegade is willing to break his “vow of silence” and reveal the secrets used by these select few to rake in as much as $20,000,000 a year! (As reported in Business 2.0 magazine) Throw away your preconceived notions because you’ve never seen anything like And if you don’t check this out right now, you’ll be kicking yourself later when you find out you’ve missed a small window of extraordinary opportunity. Take 5 minutes to visit this site right now: P.S. Don’t just sit on your butt and watch other people go out and start raking in the big bucks with this system – check it out yourself!
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359073.63/warc/CC-MAIN-20211130201935-20211130231935-00568.warc.gz
CC-MAIN-2021-49
628
15
https://web.stagram.com/tag/visitbihar
code
The best means of transport in a hilly area ..and that too like #rajgir (Bihar,India)..is to travel by a #tanga (A carvan/cart generally carried by A horse or bull🐾) according to me,If you want an bizzare experience of your travel.! ▪You will have more time to notice and learn things,provided it moves slowly than a vehicle.! ▪If you are an Indian or NRI,and understand the basic hindi,You won't need a guide throughout your journey,the rider itself is a guide.😃 Even if you,don't understand the language properly or are from some other country..no worry.! They will make you understand through signs and some english words.! And,afterall you are paying for just ride.! So it's a profit.! ▪ Third,there are less means of transport which runs in/on the hills and which runs will eat up your pocket totally..if you are travelling on your pocket-moneys or self earnings. Anyway,money matters. ▪4th,You will feel the breeze on the tanga,which is not possible by a van.! And,who wants an synthetic air (AC) when he/she have entered in a totally isolated natural place. (Yes,it is.!) ▪ And last but not the least,if you book the tanga- you'll have to spend hardly 400 rs. If you didn't bargain,and if you did.. (like me) the amount may decrease to 250 rs. That's not much expensive for a 3-4 hour ride,his waits,and in which the return ride is included.!😆 Therefore,if you are reading this..and plan to come ever here.!Whenever you come,at least for once..Try A tanga ride,and i promise you won't blame me later.! Also,if you are about to plan to come here,I would advise you to visit here in the month of 'January-March' or "August-Dec",in which first season would be more proper..because you'll have to carry more clothes if you come around December.😉😀 (TRAVEL BLOG WROTTEN BY ME,TELL ME HOW'S IT ?) #travelblog #travel #blog #blogger #bloggers #bloggerstyle #bloggerlife #globetrotter #explorer #explore #explorebihar #patna #heypatna #patnabeats #india #cuture #bihar #buddhism #buddha #history #historical #historicalplace #museum #magadh #king #samrat #visitindia #visitbihar
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944677.39/warc/CC-MAIN-20180420174802-20180420194802-00619.warc.gz
CC-MAIN-2018-17
2,101
4
https://wagnersantos.com/
code
Doctorate, Master's, and Bachelor's Degree in Computer Science I am a Specialist in compliance with GDPR and LGPD. Automated privacy tools in software engineering. IT Consultant with 25+ years of experience, in support and requirements in information security and computer networks NIST Cybersecurity Framework, PCI-DSS, Windows Server, Active Directory, Firewall, Backup, CCNA Cisco and IT Manager. I am capable of constant and responsible learning, I am also proactive with the ability to adapt to changes, I always seek to obtain the best possible result for my team. Always predisposed to resolve conflicts, contributing with new ideas and new solutions, I have the passion of an adventurer and want to discover new places, I can capture new and different processes quickly. I have my academic knowledge combined with the same area of professional knowledge and also always looking to add more knowledge with my current Ph.D. course in Computer Science.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00482.warc.gz
CC-MAIN-2023-40
957
16
https://www.mobileread.com/forums/showpost.php?p=306920&postcount=1
code
I am having troubles getting Mobipocket files working on my iPhone 3G (FW v.2.2). The eBooks I used for testing are all DRM free Demo files in Mobipocket Format (*.prc), e.g.: HEROLD - INNERE MEDIZIN (2009) , ARZNEIMITTEL E-POCKET PLUS 2007 or REPETITORIUM AN─STHESIOLOGIE As eReading Software on the iPhone I have tested Stanza, eReader, BookshelfLT and textReader. The first two one won't display any of the above files. TextReader only displays "REPETITORIUM AN─STHESIOLOGIE" but none of the other files. Also the formating seems to be corrupt and none of the special characters (e.g. ─, ÷, ▀) is displayed. The other files can't be handles be textReader, giving me the popup that those files aren't supported. The only reader that seems to be able to handle all of these files is BookshelfLT. Sadly the text links aren't working and Bookshelf doesn't have a search function - so the usability of these ebooks is almost nill. I also tried a DRM protected Mobipocket file i regularly purchased. I found a bunch of pythons scripts aswell as a bundle of them compiled to EXE files. For those who still need to get those, demonoid and btjinkie might provide help to find Mobipocket Conversion programs + DRM Removal. But after removing the DRM I am getting the same results as with the above above free demo files... So, what alternatives do I have left? Converting the files to HTML? I have tried so with mobi2html. I can get all of the included GIF and other files extracted but the output HTML file seems to be empty (with 1kB file size only). If anyone knows how to get these (or other) Mobipocket files running with full functionality on the iPhone, please share your wisdom with the rest of the world. Thanks a lot
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00568-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,728
13
http://forums.zimbra.com/caldav-carddav-isync/34390-isync-addressbook-problems.html?mode=hybrid
code
I'm trying to get the sync with addressbook to work. I have approx 10k contacts in various groups. I realised pretty quickly that syncing them all (not all are related to my current job) is not useful and downright unhandleable in the webclient (cannot mass select etc). So instead I'm trying to set up a partial sync. Selected only a shared folder with colleagues where we will build up a new contacts database that I would like to have a 2-way sync with. However try as I might (even after a clean reinstall of isync) the tool attempts to sync all 10k contacts to my personal contacts folder; and hogs all the cpu/lots of memory. And then I have not even addressed the problem of addressbook groups which the initial full sync just turned into distribution lists in the zumbra contacts (unusable again)... Does anybody face the same issues or have any tips for a workaround? We're using 5.0.19 and os x 10.5.5.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275328.63/warc/CC-MAIN-20160524002115-00202-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
912
4
https://docs.netapp.com/us-en/ontap/cloud/volume-management-concept.html
code
Flexible and efficient volume management is the heart of the ONTAP cloud solution. ONTAP FlexVol volumes offer the same data fabric benefits, with the same data management processes, regardless of whether they are configured on-prem in the cloud. You can also take advantage of cloud capabilities to rapidly scale workloads, increasing or decreasing capacity as needed. Cloud volumes provide the same storage efficiencies as on-prem volumes: deduplication, compression, compaction, thin provisioning, and data tiering. In a cloud environment, this means that you pay less for underlying cloud disk usage. There are two ways to provision volumes in the cloud: Create new cloud volumes. Replicate existing on-prem volumes to new cloud volume destination using SnapMirror technology or the Cloud Sync service.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358233.7/warc/CC-MAIN-20211127193525-20211127223525-00473.warc.gz
CC-MAIN-2021-49
806
5
http://blogs.adobe.com/formbuilder/2006/08/tracking_mouse_clicks.html
code
I just recently received another “comment from Zack”:http://blogs.adobe.com/formbuilder/2006/08/autolocalizing_your_forms.html#comment-18302. This time, he was wondering about how one would go about tracking mouse clicks on an image field. I had never attempted to do that so I took it on as a challenge and thought I would share the results in this post. I knew from the start that XFA alone wasn’t going to be able to handle this simply because (to my knowledge) it doesn’t provide any information as to the position of the mouse pointer when an event occurs. The most logical place I thought would’ve provided the information — the _Event Pseudo Model_ (the xfa.event object available in all XFA events) — didn’t live up to my expectations. Thankfully, XFA at least provides a Click event so that I could know when the image got clicked. The next logical place to look was in Acrobat’s Scripting Object Model (in the “AcroForm Objects”:http://blogs.adobe.com/formbuilder/2006/06/acroform_objects.html). In the Acrobat Document object, I found what I was looking for: the _mouseX_ and _mouseY_ properties which provided the location of the mouse with respect to the document window. The last thing I needed was information about the dimensions and location (within the Acrobat Document Object’s coordinate space) of the image field and the Acrobat Field object’s _rect_ property would give me just that. The combination of the XFA Click event, the Acrobat Document object’s mouseX and mouseY properties and the Field object’s rect property was just what I needed to get this to work. Of course, I soon discovered that I had another problem to figure-out: The behaviour of an image field in a PDF form running in Acrobat is that when clicked, it opens a browse dialog that lets you pick the content for the field. Unfortunately, there isn’t any way to suppress that dialog other than making the image field read-only or by using a static image object but then both alternatives prevent the Click event from firing. So I needed some clever way to capture a mouse click over an image (whether it was a field or a static object) and I decided to use a button with a transparent fill and no border (so it was essentially transparent). Since buttons are fields just like image fields, the mouseX, mouseY and rect properties would still be available for the button and if I sized the button to fit the image and placed it over-top, I would essentially end-up with an HTML <map>. “Download Sample [pdf]”:http://blogs.adobe.com/formbuilder/samples/AcroFormObjects/TrackingMouseClicks.pdf *Minimum Requirements:* Designer 7.1, Acrobat 7.0.5. The first challenge was getting an instance of the Acrobat Field object which represents the button using thebc. event.target.getFieldmethod. That was easily accomplished by using the script I provided on my “AcroForm Field Name Generator”:http://blogs.adobe.com/formbuilder/2006/06/acroform_field_name_generator.html article.The next problem to be solved was the fact that the default behaviour, in Acrobat, for a button when it’s clicked is to invert its content area. Since I was trying to hide the button, I needed a way to suppress the inversion so that clicking on the button would give no visual feedback to the user. That way, it would give the impression that the user was actually clicking on some sort of hyperlink on the image itself. That was easily solved by using the _highlight_ property of the Acrobat Field object representing the XFA button in its Enter event (had to be Enter and not Initialize because Initialize is too early in the form’s initialization process for the association between the XFA button and it’s Acrobat Field counterpart to be established):bc. event.target.getField(ScriptObject.GetFQSOMExp(this)).highlight =highlight.n;The last problem was with respect to calculating the coordinates of the hot spots on the button that would trigger a reaction (in this sample, I was just going to set the value of a text field somewhere else on the form to reflect the area that was clicked). The problem there was that while I had the mouse location and the button’s dimensions all in the same coordinate space (Acrobat Document), the coordinates were specified with (0,0) set to the document’s *lower* left corner.While this may not seem like a big deal to some of you, it really messes me up when (0,0) isn’t at the *top* left corner (with the maximum (x,y) set to the bottom right corner). I guess that’s a result of years of writing code for Windows where an MFC CWnd’s coordinate space places (0,0) at the top left corner. Anyway, after lots of hair pulling, I finally figured-out how to properly calculate the hot spots in this strange — no, alien — coordinate system.Zack, if you have any other questions, please post a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102967.65/warc/CC-MAIN-20170817053725-20170817073725-00315.warc.gz
CC-MAIN-2017-34
4,858
10
https://www.experts-exchange.com/questions/23156760/Image-navegation-mini-window.html
code
Im trying to make an application in Delphi 7 that can display large images on screen. I want to know how to use a mini window to navigate across the large image. Something like the minimap in games like StarCraft where the huge map is on the main screen (can't see it all), but in the right corner is a mini stretched version of the huge image, and over this a selection tool (a rectangle), then when you move this rectangle over the mini image, the main screen go to this image portion on the huge image at the backgroud. Sorry for my poor english skills. Thanks a lot.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583884996.76/warc/CC-MAIN-20190123023710-20190123045710-00159.warc.gz
CC-MAIN-2019-04
570
6
http://www.ibm.com/developerworks/websphere/zones/portal/security/
code
To accommodate a wide variety of security requirements, WebSphere Portal integrates with other security infrastructure components to provide authentication, authorization, and single sign-on (SSO) capabilities. This page provides resources for portlet developers, portal administrators, IT Security professionals, and portal developers who need to configure, administer, or use WebSphere Portal security features. Learn about WebSphere Portal security capabilities New security APIs in WebSphere Portal: Learn about three new security APIs: the portlet login service, the remember me cookie portlet service, and the authentication filter model. WebSphere Portal v6.0 Security Overview: Portal security architects describe the WebSphere Portal architecture and use deployment scenarios to illustrate the flexibility and breadth of options you can use to implement your own portal security infrastructure. (Also see: V5.1 security overview.) Performance tuning of Portal Access Control: Get essential performance background information so you can improve your portal's performance, including login, read-only operation, and administration performance. Learn how to prevent future portal access control performance issues by making the best use of PAC. Configuring single sign-on using Tivoli Access Manager and WebSphere Portal: Provides detailed steps for configuring a Trust Association Interceptor (TAI) with a trusted user and other possible SSO configurations. Securing sensitive data using SSL in Websphere Portal: Portal administrators and developers learn an approach for securing personal information on selected portal pages. Meet the experts: Keys Botzum on WebSphere security: WebSphere consultant and security expert Keys Botzum provides insight to WebSphere Application Server and WebSphere Portal security. Develop and Deploy a Secure Portal Solution, Using WebSphere Portal V5.0.2 and Tivoli Access Manager V5.1: This IBM Redbook discusses portal security architecture, topology selection, design, and integration considerations, and provides and describes a complete working example. Exploiting the WebSphere Portal V126.96.36.199 programming model, Part 3: Integrating WebSphere Portal into your security environment: Shows how to use programming interfaces to implement SSO, customize portal login behavior, and access user profile systems. Get quick access to recent security bulletins with required updates - Fix Available: Security vulnerability in WebSphere Application Server might affect Portal, WCM or Quickr customers - 6.0.1, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 6.1: Access problems with BasicAuthTAI in WebSphere Portal - 126.96.36.199: Addnode.log file contains sensitive information in plain text - IBM WebSphere Application Server JSP exposure - WebSphere Portal WSRP producer exposure - Security updates for WebSphere Portal component XMLAccess included in PK13338 - Security update for Exchange portlets included in PK12518 - Potential security vulnerability in IBM Directory Server See WebSphere Portal security usage examples Implement an on demand security scanning application using Websphere Portal: This article demonstrates how to integrate a scanning tool—the Nessus vulnerability scanner, in this case—with your portal so that your users can scan their own computers, on demand. Accessing secure remote Web applications using a portlet service: This article explains how to use a portlet service to encapsulate the interaction between portlets and a remote Web application—for example, a WebSphere Application Server application that uses an LDAP directory and LTPA for security. Sample code and configuration examples are included to demonstrate connecting to either a session EJB or to a servlet. More articles on security: Browse our collection of technical articles, tutorials, and books on WebSphere Portal security topics.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00405-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
3,916
23
http://www.tuxarena.com/2011/11/taking-screenshots-with-shutter-in-ubuntu/
code
Shutter 0.88 has recently been released with several new features, looking even better than before. For those of you who didn’t hear about it before, it’s probably time you have a look at it. Shutter is probably the most powerful screenshot-taking application available for GNOME, including countless features and several useful tools to take screenshots and manipulate them in any way possible. The latest release brings several new features, including: - improved uploading by adding a bunch of new image hosting services - improved CLI interface Other changes include rewritten code and fixed bugs. To install the latest Shutter release in Ubuntu, open a terminal and type in the following two lines: sudo add-apt-repository ppa:shutter/ppa sudo apt-get update && sudo apt-get install shutter The first command will add the Shutter repository to your sources list and the second will fetch and install the latest version. Shutter supports sessions, exporting to various Internet services, it can save in various image formats, including PNG or JPG, it supports plugins and comes bundled with a lot of them. In addition, Shutter is also highly configurable via the Edit->Preferences menu entry. It allows you to take screenshots of the whole desktop, a window, a section of desktop, a child window, a single menu or cascading menus, only a tooltip, and it provides a timer too. For quick editing, Shutter comes with the Shutter Drawing Tool, an application which can be launched from the menu or from the toolbar, and which includes basic painting tools like straight lines or rectangles, but also text or the pixelize effect. However the current version seems to have a bug when trying to save the image, the window closing unexpectedly. Still, exporting to a huge number of image formats works, as well as PDF or SVG. The configuration window allows to change the default image format for saving screenshots (PNG, JPEG or BMP), automatically save file, change the default file name (including the numbering style), include or exclude the cursor, include or exclude window decorations, automatically resize window, generate thumbnail, border, reduce colors, enable/disable popups, change the default keybinding in GNOME, upload images to various services. You can start Shutter at login, hide the window on first launch and also hide the notification icon. Tray icon integration is also provided. Shutter also comes with several plugins, mostly for applying image effects. In addition to these, Shutter also includes several nice command-line switches which provide the possibility to take screenshots directly from the terminal (for example shutter -w will take the screenshot of a window while shutter -f will capture the fullscreen).
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814002.69/warc/CC-MAIN-20180222041853-20180222061853-00192.warc.gz
CC-MAIN-2018-09
2,743
17
https://gitlab.freedesktop.org/pipewire/pipewire/-/issues/886
code
Unable to launch ecasound when pw-jack is used I am trying to play with ecasound on pipewire/pw-jack and running it like this: pw-jack ecasound -i jack -o jack What I get is: (audioio_jack_manager) Unable to adapt to the new buffersize received from ... JACK, shutting down. It seems to run, but doesn't really work, trying to relaunch engine results in a segmentation fault. Here is a full output of ecasound ran like above, where I run it then press ctrl+c after few seconds: ecasoundlog I am using pipewire version 0.3.23.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611641.26/warc/CC-MAIN-20210614074543-20210614104543-00015.warc.gz
CC-MAIN-2021-25
525
6
https://forum.duolingo.com/comment/10351469/Jeg-er-sulten-allerede
code
ja føler det hele tiden om natten.. Can I say "Jeg er allerede sulten" ? When talking about time, the adverbs usually comes at the end I'm thinking if Norwegian is a copy of English or English is a copy of Norwegian :/ this much similarities r impossible. They both have the same roots(germanic?), just like german. Of course there will be many similarities, but the languages cannot be named 'copies' in my opinion. All of them have their own story and their own influences.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738562.5/warc/CC-MAIN-20200809162458-20200809192458-00263.warc.gz
CC-MAIN-2020-34
476
5
https://mirajobs.com/p/operations-specialist-ready-to-apply-swissarmy-knife-skills-1d59aa5d
code
Operations specialist ready to apply Swiss-Army knife skills Founded a business in Germany right out of high school, moved across the world to obtain a bachelors degree, and demonstrated attention to detail in supporting C-level executives as well as strengths in prioritizing tasks when leading legal matters. I am looking for a challenge and am eager to go above and beyond. Ideally, a role as an Executive Assistant, Administrative Assistant, or in Operations would be best suited, but I am open to other opportunities as well. Expected Base Salary **,000 USD / year Total Professional Experience Send a connection request to the candidate to get their contact details.Contact Candidate
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711712.26/warc/CC-MAIN-20221210042021-20221210072021-00748.warc.gz
CC-MAIN-2022-49
689
7
https://www.donationcoder.com/forum/index.php?action=profile;area=showposts;u=338758
code
Hey, how old is Watson? Is this legal?-Renegade (June 28, 2011, 06:41 AM) This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to. Cool stuff, i didn't realize how easy it was to interface code to skype.. makes one think of other program ideas..-mouser (March 06, 2011, 10:34 AM) Yes, I tend to agree, but finding API details when you don't have a MSDN subscription can be a b****. The one thing I like about Java over EVERY other language I have tried to work with is the self-describing documentation that can be viewed with any HTML browser. Moreover, it is instantly available online or off (because it just reads the details from the jar file as part of your SDK). It's format is also VERY easy to understand. If Microsoft's API documentation was that easy to access and understand, I probably never would have started with Java. Since it isn't....-steeladept (June 26, 2011, 12:44 PM) I'm not sure I follow you there. You can get all the documentation from the MS site. You don't need an MSDN subscription. I actually have found the MSDN documentation to be much better and easier than other languages/SDKs/APIs. Want a nightmare? Go try something with the Facebook API. Good f**king luck. In addition to being total s**t documentation, the API is broken. So, you are fumbling around in the dark, and running into land mines. I'm not sure what problems you've been trying to solve. Most often I can solve problems by searching and finding community articles. Community is really important, and that's a strength in .NET. You don't get that with some things. But for docs, MS is damn good. And one of the reasons I tend to side with MS technologies. I just don't like farting around with zero docs. I have better things to do, like solve my own problems.-Renegade (June 26, 2011, 01:03 PM) this tool claims to "extract files from any type of archive, whether it's a simple zip file, an installation program, or even a Windows Installer (.msi) package." i think, it will come in handy if anyone wants to just extract files from the installers btw, happens to be written in AutoIt and acts a front-end for a lot of other cmd-line programs. more info at the website and its forum: Main Window (see attachment in previous post) Universal Extractor context menu (see attachment in previous post)-lanux128 (November 22, 2006, 08:36 PM) I saw this on a Wikipedia page, but haven't seen it since: (see attachment in previous post) Has anyone seen that? I think it's a fantastic addition as I've seen some Wikipedia articles that have been flat out dominated by massively slanted views.-Renegade (June 19, 2011, 11:52 AM)
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703521139.30/warc/CC-MAIN-20210120151257-20210120181257-00135.warc.gz
CC-MAIN-2021-04
2,700
19
https://wordpress.org/plugins/noindex-total/changelog/
code
All releases, prior latest stable, are deprecated, and no longer supported on this project: is very suggested upgrade to the latest build, always! Developmental Code in Becoming! - Inremental Update [STABLE] Instruct Search Engines to Total no Indexing WordPress - Please update as soon as possible! - NEW Prioritization of Plugin Loading (with db table index) - NEW Add Preemptive KeyTag Plugin Authenticity Support - NEW Add Header and Footer Log - UPDATED Security Rules - BUMP Version 2014 Build 0418 Revision 1438
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064503.53/warc/CC-MAIN-20150827025424-00120-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
518
11
http://xdoclet.sourceforge.net/xdoclet/merge.html
code
A merge point is an "entry point" to XDoclet generated files. The developer can add custom data easily. There are two different ways to use merge points. Having to hard code deployment descriptor specifics (ejb-jar.xml and vendor specific ones) in a source file simplifies the deployment work but has the limitation that the programmer must also take the deployer role. Let's examine an example. You have, in your ejb-jar.xml, an env-entry element to a JDBC URL that you use inside a session bean ( test.ejb.SessionBean) to access a database. You have included a @ejb.env-entry name="jdbcUrl" type="String" value="jdbc:hsqldb:hsql://thishost:1476" and use the value returned by a JNDI lookup to get the SQL connection. The problem is that you will need to change your code when the url changes. Several merge points exist in ejb-body.xdt. This file is the template for ejb-jar.xml, you can see the merge point we need: Every line between this tag and its closing tag will be replaced in the generated ejb-jar.xml file by the content of ejb-env-entries-SessionBean.xml, found under the directory given by the mergeDir attribute you specify for the task or the subtask and a directory structure given by the package of the class. For example c:\mergedir\test\ejb\. Here is the content: <env-entry> <env-entry-name>jdbcUrl</env-entry-name> <env-entry-type>java.lang.String</env-entry-type> <env-entry-value>jdbc:hsqldb:hsql://thishost:1476</env-entry-value> </env-entry> You can now change this file independently of the source file. Look into the .xdt files directly to find all defined merge points. Entry points exist in template files used to generate the classes. For example in entitycmp.xdt (template for Entity Bean classes) you have <XDtMerge:merge file="entitycmp-custom.xdt"></XDtMerge:merge>. If you program something in this file (that will be searched for in the mergeDir of the task or subtask) the generated content will be included in the generated file. Examine the existing .xdt files to learn the template language.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887746.35/warc/CC-MAIN-20180119045937-20180119065937-00717.warc.gz
CC-MAIN-2018-05
2,032
22
https://www.getcrux.ai/
code
Backed by the best Building a production-grade AI Copilot takes months Balancing accuracy, latency, and costs is a nightmare and you are racing against time for the launch Build, Customize and Deploy your Copilot seamlessly SaaS teams use pre-configured agents or add custom rulebooks to create state-of-the-art Copilots and deploy securely Take your customers from Intent to Action in Seconds Delight your customers with the ability to ask questions about their data, or get proactive insights and execute actions on any platform User asks a question to our agents in simple english and gets output in smart insights and visualisation formats. Our advanced LLMs automatically detects & generates all your proactive insights. Our advanced LLMs automatically detects & priortize & executes action for you. Why build from scratch when you have Crux? Building a Copilot that can make decisions is a specialized job. Crux does all the heavy-lifting so that you can focus on growing your business and product. Our task-specific agents perform like a deterministic model To help you fully control your customer's experience Bring your business logic, internal lingo, or querying rulebook No matter how unsemantic or complex your database is Designed to help you make decisions, not just generate SQL queries Creates Semantic Layer over large & complex databases
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00822.warc.gz
CC-MAIN-2024-18
1,355
19
https://www.aramis.admin.ch/Texte/?ProjectID=35244
code
The overall objective of this project is to use Bayesian approaches (Bayesian Networks and Naïve Bayes Classifiers) to develop tools for combining and interpreting the results of many SyS event detection algorithms from many diverse data. The goals of the project will be to develop and evaluate methods for: · Estimating the likelihoods that specific diseases could be causing an epidemic in a population and ranking them according to the likelihood. Note: in this project the target population that we will be working with is the Swiss cattle population. · Estimating the probability that an epidemic is ongoing within the livestock population under surveillance · Estimating whether there may be an emerging (previously unknown) pathogen causing the epidemic and also providing some information about the characteristics of the unknown pathogen. The methods that will be developed are planned to augment the information that is generated by a SyS system and to fit within the architecture of a livestock SyS system. Figure 1 is a schematic showing where the tools proposed for this project will fit within a generalized SyS architecture. Data from several databases (DB) are transported electronically to a preprocessing application that subdivides and formats the data into time series. The times series are then analyzed with event detection algorithms that evaluate whether there is a greater than expected number of cases (red dot = signal when greater than expected number of cases is detected) or not, in the most recent data. The results from all of the algorithms will be then analyzed by the tools developed by this project to produce a ranking of the most likely diseases that could be causing an epidemic, if an epidemic were occurring within the population. The methods developed will incorporate expert knowledge and knowledge from the literature about the diseases under surveillance. Knowledge will be incorporated using scenario tree models (Martin, Cameron, & Greiner, 2007), expert opinion, prevalence estimates for endemic diseases, and combinations of these. Methods will be developed using a small number of cattle diseases as examples and a small number of time series covering the Swiss cattle population. Diseases proposed at this time include: Schmallenberg virus, Infectious Bovine Rhinotracheitis, Bovine Virus Diarrhea and Bovine Tuberculosis. It is expected that at the time the project starts there will be two databases available for the project, the ALIS and the TDV databases. Time series from the TDV database are currently being evaluated for cattle SyS under a current VPHI project (1.12.12) and time series form the ALIS database will be evaluated as they become available. It is the goal of the project to develop tools that will be scalable and will be able to handle large numbers of diseases and time series as needs change and new time series become available. The methods will be developed in R(R Core Team, 2014). The R code and accompanying documentation will be transferred to the early detection group of the BLV for implementation. Training materials will be developed and BLV surveillance practitioners will be trained in the methods.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00618.warc.gz
CC-MAIN-2023-23
3,190
7
https://turtlespet.com/what-to-do-with-a-dead-turtle/
code
Finding a dead turtle can be a sad and unexpected event, especially if it is a wild turtle. Additionally, dead turtles can potentially carry diseases that can be harmful to other animals and humans, so it is important to handle a dead turtle with care and follow appropriate protocols to prevent the spread of disease. The purpose of this blog post is to provide guidance on what to do if you find a dead turtle, including how to safely handle and dispose of the animal in order to protect wildlife and the environment. What To Do With A Dead Turtle? Turtles are facing many threats, including habitat destruction, pollution, and human interference. If you come across a dead turtle, it is essential to handle and dispose of it properly. Identify the turtle, use gloves and handle with care, report it, dispose of the turtle properly and prevent future turtle deaths. Remember that turtles are an important part of the ecosystem and it is our responsibility to protect them. Identifying a Dead Turtle The first step in dealing with a dead turtle is to make sure it is actually dead and not just injured or in shock. Look for signs such as a lack of movement, no response to touch, and cloudy eyes. If you are unsure, it is best to err on the side of caution and assume the turtle is dead. Handling a Dead Turtle Dead animals can carry diseases, so it is important to use gloves and handle the turtle with care to avoid contamination. Pick up the turtle gently with both hands, supporting its body, and avoid touching its head or tail. Reporting a Dead Turtle If the turtle is a protected species, contact the local wildlife agency or conservation organization to report the death. They may need to investigate the cause of death or take the turtle for examination. It is also important to report a dead turtle to help researchers understand the populations and mortality rates of different turtle species. Disposing of a Dead Turtle Dead turtles should be disposed of in accordance with local regulations. Contact your local authorities, or the wildlife agency to find out the proper disposal method in your area. Some areas may have specific guidelines for disposing of dead animals, while others may require a permit. Preventing Turtle Mortality While it is important to know what to do with a dead turtle, it is even more crucial to take steps to prevent turtle mortality in the first place. Consider ways you can help prevent turtle deaths, such as reducing pollution, preserving turtle habitats, and driving slower near bodies of water. What Should I Do If My Turtle Dies? If your turtle has passed away, the first thing you should do is remove the turtle from its enclosure. If the turtle was diseased or died from an unknown cause, it is important to properly clean and disinfect the enclosure to prevent the spread of any potential illness to other pets or humans. If you are unsure how to do this, it is best to contact a veterinarian or a local animal control agency for guidance. If the turtle was a beloved pet, you may also want to consider properly burying the turtle or cremating its remains. It is important to handle a deceased turtle with care and respect, just as you would with any other pet. Finding a dead turtle can be a distressing experience, but it is important to remember that proper handling and disposal of the animal can play a role in protecting wild turtle populations and their habitats. By following the guidelines outlined in this blog post, including wearing gloves and using a shovel to safely handle the turtle, reporting the turtle to the appropriate authorities, and disposing of the turtle in a way that does not harm other wildlife or the environment, we can help protect the health and well-being of turtle populations and the ecosystems they inhabit. If you find a dead turtle, handle it with care by wearing gloves, report it to the appropriate authorities, and properly dispose of it by following guidelines from the local wildlife department to prevent the spread of disease and protect other wildlife. Finding a dead turtle could indicate a potential problem with the turtle’s habitat or population, or the turtle may have died from natural causes or disease. Report the turtle to authorities for further investigation and proper disposal to help protect other wildlife. If a turtle dies at home, it should be disposed of properly to avoid attracting pests or spreading disease. Consult a veterinarian for advice on disposal. There is no scientific evidence to suggest that a turtle dying in your home brings bad luck. However, some cultures may have different beliefs or superstitions about turtle death.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296815919.75/warc/CC-MAIN-20240412101354-20240412131354-00272.warc.gz
CC-MAIN-2024-18
4,656
23
https://gunroom.tv/2021/12/24/the-christmas-shoot/
code
Merry Christmas everybody – we went to a Christmas shoot and shot our little hearts out! To Become a Channel Member and give us your support: To support our channel by getting TGS Merch please go to: To get your very own custom-fit guards head over to: https://customfitguards.com/?ref=1fLDgyuo2f6K6 For 10% off your order use code- TGS10 Subscribe & hit the alarm bell for plenty more where this came from! Find Jonny on Instagram – https://www.instagram.com/jonny.carter.shooting/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00186.warc.gz
CC-MAIN-2023-50
486
7
http://www.badscientist.net/
code
Could you tell which is the most random distribution of dots between the two below? |Which is random? (click to enlarge)| The most common answer would be the one on the right, which is wrong. In fact, the pattern on the right is generated by applying a small wobble (or uncertainty) on an uniform distribution. The pattern on the left, instead, has been generated using a pseudorandom number generator in BASH (details in this blog post). Randomness allows for "clumps" to form and it's because of those clumps that the unpredictable behaviour of randomness comes from (unless, of course, you know the "shape" of the random distribution a priori). This appears more clearly whenever we look at the distributions shown above in 1D rather than 2D: |A random and an uniform distribution (click to enlarge)| It is clear that in the case of a uniform distribution, we have a greater level of predictability. Imagine you have a series of events which follows the uniform distribution. You are filling the histograms with events one by one by reaching 5000 events which recreate the distribution above. Whenever you approach higher numbers of events filled if there is a lack of events in one region of the histogram, there will be a higher chance for the next even to fall in that region. You can picture in practice a 2D uniform distribution by imagining pouring a layer of marbles in a box, one by one. At the beginning their position will look random, because they can move around and take any possible position, but the fuller it gets the less available spaces there are and soon it will be easy to predict which are the only available spots for the next marble to go in. The key thing is that whenever a position is occupied, it cannot be occupied again. This allows for a level of predictability, and this is not true of random distributions. Randomness is not predictable, its profile is unknown by definition, and it allows for the same position to be occupied again. This caused by the assumption that each random event is independent from the previous (Poisson process). Maybe this is also the reason why we believe uniform distributions to be "random". We are more familiar with those in practice and random events are either mostly abstract or harder to visualize. This explains tendency of people to estimate randomness wrongly. This happens every time during lotteries. If a number has not come up for a long time, we feel that it is due soon. This is because we imagine random events as uniform. In fact, the probability of picking any number in a lottery is the same for every extraction, making all number equally probable to be picked, and not anyone more probable, because every extraction is independent from the previous. An equivalent example is found in coin flipping. We feel that repeated head or tail events in a sequence of coin flips is a rare event. In fact, the chance of obtaining heads or tails is still 50% even after any number of heads have come up already. For example, events of the kind: THHTHTTHTTH and TTTTTHHHHH are equally as likely. I created a computer-generated set of tosses to work out the frequencies of occurrences of repeated heads or tails (details on how this is done are in here). These are the results for 100000 occurrences of 15 tosses each: 3 repetitions: 93894/100000 4 repetitions: 64634/100000 5 repetitions: 34667/100000 6 repetitions: 16723/100000 7 repetitions: 7789/100000 8 repetitions: 3487/100000 9 repetitions: 1584/100000 10 repetitions: 719/100000 11 repetitions: 332/100000 12 repetitions: 125/100000 13 repetitions: 53/100000 14 repetitions: 18/100000 15 repetitions: 7/100000 15 repetitions would mean having a full set of heads or tails, which seems impossible, but it happens 0.006% of the times. In fact, over 100000 occurrences, it happened 7 times. Close enough. The data shows that three repetitions is an event which happens almost all the times, with four repetitions more than half of the times. Up to 6 repetitions, in fact, is not that much of an uncommon event. Almost half of the sequence! I am sure it would be hard to define "random" - in the common sense - anything which has more than 4 repetitions, although this simple test shows that it's almost the norm. Another great example of how bad we are at understanding randomness is given by this small application at Nick Berry's DataGenetics. It will distinguish a randomly generated sequences of tosses (from a real coin) from the ones you made up yourself. It is not infallible, as it is based on the Pearson Chi-squared test (so it cannot always predict which is which) and after some trials it is easy to trick it to make it believe your sequence is random. Yet, I am sure it will give you a better understanding of randomness! I have used the word pseudorandom because every computer-generated programs simulates randomness. True randomness can only be found in some not completely understood natural phenomena. Being a simulation, there are different "qualities" of generated random numbers. I am not sure about the one used in BASH, but it is usually good to stick with a higher quality random number generator for more serious business (e.g. GSL)
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860123023.37/warc/CC-MAIN-20160428161523-00169-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
5,189
27
https://www.ellagracehelton.com/store/p18/%22Fish%22_9x13_giclee_print%2C_limited_edition_of_250.html
code
"Fish" 9x13 giclee print, limited edition of 250 Ella Grace Helton drew this fish with pastel on newsprint. She said it makes her think of Bubbles, her first pet, a goldfish. Prints come with a signed certificate of authenticity. Printer: Epson Surecolor P7000 Paper: Epson Enhanced Matte Ink: Epson UltraChrome HDX Archival Ink Prints will be generated up to a maximum of 250.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511361.38/warc/CC-MAIN-20231004052258-20231004082258-00476.warc.gz
CC-MAIN-2023-40
377
7
https://premium.wpmudev.org/forums/topic/workflow-management-system-plugin
code
It will be good if there is a plugin which can route the form/request application for approval in various stages, eg. Leave Application. It should be able to auto-route to designate personnel for approval and status of the application be updated as well. Allow file attachment will be good. Auto notification to various parties to take action and notify requested when completed.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746110.52/warc/CC-MAIN-20181119192035-20181119214035-00356.warc.gz
CC-MAIN-2018-47
379
1
https://community.fortinet.com/t5/Fortinet-Forum/30-seconds-of-packet-loss-when-switch-is-re-connected/m-p/214445
code
30 seconds of packet loss when switch is re-connected I have a large network which is described in the image below. The image is simplified. In my real network there are about 40 switches like "Switch C" -- switches that are connected to both "Switch A" and "Switch B". Also I have a Fortigate HA pair (Active/Passive) connected to "Switch A" and "Switch B". Running firmware 6.2.2 In my network, I can ping from "Host 1" to "Host 2". If I pull the power from "Switch D", my ping from "Host 1" to "Host 2" continues to work. This is expected. However, when I re-apply the power to "Switch D", and after "Switch D" boots, pings from "Host 1" to "Host 2" become sporadic. This "packet loss" lasts for about 30 seconds. Then the pings return to normal. Can anyone tell me (or guess) what the problem is or how I could go about debugging? I duplicated the network with a spare pair of Fortigates and 448/224 switches and I was unable to reproduce. With 40+ switches I am pretty sure you have a central log storage for all of them, I'd check what log level is needed to catch STP port/VLAN state changes (Forwarding/Blocking) and look for them in the logs. Problem that occurs every 30 seconds each time seems more like a timers issue, especially with Spanning Tree Convergence times. Thank you all for your replies. A couple of comments which I should have included in my original post: The dropped traffic between "Host 1" and "Host 2" is on the same VLAN. No routing. The fortigate does not see the traffic (in the logs), which is what I would expect. So I doubt the firewalls are playing any direct role in the problem @vponmuniraj what do you mean by "route changes"? Are you talking about Layer 3? Regardless, how do I monitor "route changes" on the switches or firewalls? @Toshi_Esumi I have two Fortigates (running 6.2.2) in HA Active-Passive. Each fortigate is connected to both "Switch A" and "Switch B". Similar to how the hosts are connected to these switches. @Yurisk I suspect STP or some fortinet ISL equivalent also. Particularly in light of item 5 below. However, the problem does not happen regularly at 30 second intervals. When "Switch D" is connected to "Switch C", the traffic between "Host 1" and "Host 2" becomes "spotty"... and this misbehavior lasts for only about 30-45 seconds. After this time, the traffic returns to normal and there is no more trouble. The switch logs show nothing interesting. They do show STP messages when individual ports come up and down. The problem appears in an additional way also. Please see the imaged I pasted below. If I leave all switches connected and powered up... but disconnect and reconnect each of the ISLs listed below, 1-4 (waiting one minute between each disconnect or connection), the problem (packet loss between "Host 1" and "Host 2") will also happen temporarily. My sales engineer suggested that a "loop" is forming between switches C and D, which doesn't make sense to me. Complicating this: I'm working in an air gapped environment so getting support is difficult. I tried to replicate with spare fortigates and switches, but so far I'm unsuccessful. Does anyone know how I can diagnose/trace the "logic" that the switches go through when "Switch D" joins the topology or when ISL connections come up and down?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103205617.12/warc/CC-MAIN-20220626101442-20220626131442-00117.warc.gz
CC-MAIN-2022-27
3,282
14
http://home.uchicago.edu/~mcmahanh/
code
I'm a seventh year PhD candidate at the University of Chicago Department of Linguistics. My research focuses on spatial language and deixis in Kalaallisut, a Yupik-Inuit language spoken in Greenland. I am currently working on my dissertation, which investigates ongoing change in Kalaallisut's complex and typologically unusual demonstrative system. Broadly, my interests include language variation and change, anthropological linguistics, and the interaction between language structure, culture, and environment. My particular focus is on the indigenous languages of the Arctic and North America.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999210.22/warc/CC-MAIN-20190620105329-20190620131329-00440.warc.gz
CC-MAIN-2019-26
597
3
https://events.techsoup.org/events/details/techsoup-techsoup-connect-southern-africa-presents-important-microsoft-programme-offerings-your-questions-answered/
code
Important changes to the Microsoft Donation Programme have recently been announced. About this event Join this virtual session to learn about the current Microsoft products, solutions, and services available to nonprofits in Southern Africa. Arnold and Samantha will go over details of various product options, services and courses to help you get the most out of your Microsoft solutions. Finally, we will also review the recent Microsoft programme changes and answer questions you may have about the planned changes taking effect in April 2022. Kindly note that this session will not be recorded however an email summary of the event will be sent out to all email subscribers.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474670.19/warc/CC-MAIN-20240227021813-20240227051813-00535.warc.gz
CC-MAIN-2024-10
678
4
https://documentation.solarwinds.com/en/success_center/vman/content/vman-recommendations-configure-settings.htm
code
Configure Recommendations settings in VMAN After you start monitoring and polling your environment, VMAN begins collecting and sending data to trigger recommendations for active and potential issues. Recommendations settings are enabled out-of-the-box and include a set of strategies defining the VM components to trigger recommendations. You can configure the recommendation settings to ensure VMAN reports on alerts and predictive actions based on your monitoring needs. If you want to disable recommendations for a specific system or restrict available actions in your virtual environment, you can create recommendation policies and constraints. After configuring, consider reviewing global and virtual threshold settings. Recommendations and alerts use thresholds to trigger actions and notify you of active and potential issues affecting your environment. - Configure the recommendations settings from the Getting Started resource on the Virtualization Summary page in the SolarWinds Platform Web Console. Click Manage Strategies. You can also access the Recommendations page anytime through the menu. Click My Dashboards > Virtualization > Recommendations. To configure the strategies, click Recommendation Settings. The Recommendation Settings page displays with enable and disable options for all strategies. When enabled, each strategy directs the Recommendation Engine to gather and review monitored VM data to provide active and predictive recommendations. - You can enable or disable each of the strategies: - VM right sizing optimizations - These strategies locate VMs with under and over allocated VM resources. Overallocated VMs have too many resources compared to usage and needs, best utilized by underallocated VMs. Underallocated VMs do not have enough resources allocated to them to support processes, potentially causing alerts. You can expand Advanced Options for Overallocations and Underallocations. - Host Performance and Capacity Assurance - These strategies locate hosts that will run out of CPU or memory resources within a defined time period, and hosts with CPU or memory usage currently over a critical threshold. You can expand Advanced Options for Active Recommendations and Predictive Recommendations. For predictive recommendations, you can modify the virtualization thresholds to affect the trigger condition thresholds. For additional information on these thresholds, see this information. - Storage Capacity Assurance - This strategy identifies datastores that may reach a storage space or other limit within a defined time period. - Balancing VMs on hosts - This strategy identifies VMs that may need to be distributed to new hosts to achieve balanced usage and utilization. Migrating VMs is only possible between hosts that are in the same cluster and have shared storage. - VM right sizing optimizations - These strategies locate VMs with under and over allocated VM resources. Overallocated VMs have too many resources compared to usage and needs, best utilized by underallocated VMs. Underallocated VMs do not have enough resources allocated to them to support processes, potentially causing alerts. You can expand Advanced Options for Overallocations and Underallocations. - When complete, click Recalculate Now. The Recommendations Engine provides different levels of detail and precision based on how long it has been collecting data: - 1 hour: The minimum amount of data required to generate recommendations for immediate, real-time issues. - 1 week: The amount of data required to generate predictive recommendations about future issues. - 4 weeks: The amount of data required to generate optimal and more precise predictive recommendations.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00174.warc.gz
CC-MAIN-2023-50
3,689
22
https://www.gnu.org/software/emacs/manual/html_node/eintr/Prepare-the-data.html
code
recursive-lengths-list-many-files function returns a list of numbers. Each number records the length of a function definition. What we need to do now is transform this data into a list of numbers suitable for generating a graph. The new list will tell how many functions definitions contain less than 10 words and symbols, how many contain between 10 and 19 words and symbols, how many contain between 20 and 29 words and symbols, and so on. In brief, we need to go through the lengths’ list produced by the recursive-lengths-list-many-files function and count the number of defuns within each range of lengths, and produce a list of those
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00364.warc.gz
CC-MAIN-2024-18
641
10
https://defencehub.live/threads/turkish-economy-updates.112/page-98
code
Erdogan should really let the economy be controlled by those who know what tf they are doing I mean just why, just WHY!! Thx to this, the lira posted significant losses today <blockquote class="twitter-tweet"><p lang="en" dir="ltr">Erdogan sacks three people from the Central Bank’s monetary policy committee, including Semih Tumen who was rumoured for the governorship</p>— Ragıp Soylu (@ragipsoylu) <a href=" https://platform.twitter.com/widgets.js" charset="utf-8"></script> Why does your copy paste from twitter always have all this other code around it each time lol. I have noticed it only happens with your posts.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362930.53/warc/CC-MAIN-20211204033320-20211204063320-00436.warc.gz
CC-MAIN-2021-49
625
5
http://heloise.ish-lyon.cnrs.fr/meetings
code
3rd Data for History meeting, Leipzig, 4-5 April 2019. Informal mini meeting at EADH2018, Galway, 9 December 2018. 2nd Data for History meeting, Lyon, 24-25 May 2018 Workshop on the creation of an international Data for History consortium, Lyon, 23-24 November 2017 Collective actors list Abstract objects list Named places list Social characteristics list Copyright © 2019, back up ↑
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583684033.26/warc/CC-MAIN-20190119221320-20190120003320-00296.warc.gz
CC-MAIN-2019-04
387
10
https://dba.stackexchange.com/questions/187126/optimization-profile-and-explain-mode/187226
code
The other day I noticed something strange that perhaps someone have an explanation for. The problem I was facing was a query that due to a skewed distribution of data generated a poor plan when a parameter marker was used. The execution time was prox 10 times higher compared to a hardcoded value concatenated into the query. I have never tried optimization profiles before, so I thought it would give it a shot. I installed a profile like: <?xml version="1.0" encoding="UTF-8"?> <OPTPROFILE VERSION="10.5.8.0"> <STMTPROFILE ID="Guideline for update of process_state_id"> <STMTKEY> <![CDATA[UPDATE NYA.PICKED_COURSE_OFFERING PCO SET PCO.PROCESS_STATE_ID = 90 WHERE EXISTS ( SELECT 1 FROM NYA.PERSON P WHERE P.PERSON_ID = PCO.PERSON_ID AND SUBSTR(P.PNR, 9, 1) <> 'F' ) AND NOT EXISTS ( SELECT 1 FROM NYA.COURSE_OFFERING_PREVENT_LADOK_PUBLICATION CPL WHERE CPL.EDUCATIONORG_ID = PCO.EDUCATIONORG_ID AND CPL.ADMISSIONROUND_ID = PCO.ADMISSIONROUND_ID AND CPL.COURSEOFFERING_ID = PCO.COURSEOFFERING_ID ) AND PCO.ADMISSIONROUND_ID = ? AND PCO.RESULT = 20]]> </STMTKEY> <OPTGUIDELINES> <REOPT VALUE='ALWAYS'/> </OPTGUIDELINES> </STMTPROFILE> This gave me what I wished for, i.e. the query where recompiled every time it got a new parameter and benefitted from distribution statistics. So far so good. I wanted to take a closer look at how the plan changed due to the optimization profile, so I turned on explain mode and fired of the query: ]$ db2 set current explain mode explain DB20000I The SQL command completed successfully. ]$ db2 -tf update_orig.sql SQL0217W The statement was not executed as only Explain information requests are being processed. SQLSTATE=01604 ]$ db2exfmt -d ... Much to my surprise, I get an error doing the same thing with the optimization profile enabled: ]$ db2 "set current optimization profile test.optprof" DB20000I The SQL command completed successfully. ]$ db2 set current explain mode explain DB20000I The SQL command completed successfully. ]$ db2 -tf update_orig.sql DB21034E The command was processed as an SQL statement because it was not a valid Command Line Processor command. During SQL processing it returned: SQL0313N The number of variables in the EXECUTE statement, the number of variables in the OPEN statement, or the number of arguments in an OPEN statement for a parameterized cursor is not equal to the number of values required. SQLSTATE=07004 If I run the query from python or java everything works well, so it is more a question of the convenience to be able to explain statements from command line. In addition, it also works to explain the plan like: ]$ db2 "explain plan for UPDATE NYA.PICKED_COURSE_OFFERING PCO SET PCO.PROCESS_STATE_ID = 90 > WHERE EXISTS ( > SELECT 1 > FROM NYA.PERSON P WHERE P.PERSON_ID = PCO.PERSON_ID > AND SUBSTR(P.PNR, 9, 1) <> 'F' > ) AND NOT EXISTS ( > SELECT 1 > FROM NYA.COURSE_OFFERING_PREVENT_LADOK_PUBLICATION CPL > WHERE CPL.EDUCATIONORG_ID = PCO.EDUCATIONORG_ID > AND CPL.ADMISSIONROUND_ID = PCO.ADMISSIONROUND_ID > AND CPL.COURSEOFFERING_ID = PCO.COURSEOFFERING_ID > ) AND PCO.ADMISSIONROUND_ID = ? > AND PCO.RESULT = 20" DB20000I The SQL command completed successfully. This, however, becomes a bit unpractical for large queries since it requires either to change the query in the file, keep two files, one for explain and one without, or as above executing the query directly. Does the optimization profile somehow invalidate the explain mode? It does not matter in what order I set explain mode and optimization profile, I cannot execute a query with a parameter marker either way. Any thoughts anyone?
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594603.8/warc/CC-MAIN-20200119122744-20200119150744-00334.warc.gz
CC-MAIN-2020-05
3,592
13
https://groups.google.com/g/ldc-dev/c/qx9tH0_bi1M
code
Nov 3, 2012, 9:06:55 PM11/3/12 the recent »Build Failed« messages from Travis have been caused by bug in its notification system, the build failures really only affect pull requests (which I submitted for the precise purpose of having them tested on LLVM 3.0 before pushing them to the official repository). Sorry for the clutter this caused in your inboxes, the Travis team is investigating the issue. Again, sorry for the noise,
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711114.3/warc/CC-MAIN-20221206192947-20221206222947-00047.warc.gz
CC-MAIN-2022-49
432
8
https://forum.renoise.com/t/pie-and-noexecstack-for-linux-builds/45694
code
Hi, long time Renoise fan and recent customer (felt I had to give something back after using the demo for so many years) here, with a couple of technical queries about the Linux builds. $ pspax -p $(pgrep renoise) USER PID PAX MAPS ETYPE NAME CAPS ATTR root 4277 PemRs w|x ET_EXEC renoise = cap_ipc_lock,cap_sys_nice+ep staff_u:staff_r:renoise_t:s0 (no I’m not running Renoise as root! that’s just pspax being buggy) Note the ET_EXEC – it really ought to be ET_DYN (i.e. built with fPIE) instead. Is there any reason why the 64-bit builds aren’t PIE? I can understand why 32-bit builds wouldn’t be, but the performance hit is so tiny on 64-bit that there’s no reason not to do it. Secondly, is there a reason why Renoise needs W|X (i.e. allowing execmem in SELinux) since 3.0? Did you switch from Lua to Luajit? If not, what’s the cause? Lots of programs these days use these kinds of permissions for absolutely no benefit (e.g. JITs that are spun up even when though they’re not going to be used, hacky optimizations, badly written bindings for dynamic languages), and whenever I find something that needs them, I always wonder whether it’s actually necessary (the Python ctypes module is a famous one – it uses execmem every time you import it for some bug workaround, but the bug in question doesn’t even affect Linux, so distros have to patch those lines out in order to get it to play nicely with SELinux). I guess most audio people would avoid SELinux anyway for performance reasons, but for anyone that does use Renoise with SELinux, the only options are to allow execmem globally (very very bad), use PaX to enforce it instead (good, but means using a non-vanilla kernel and it’s only user-friendly if you use Gentoo or Arch), or write a policy to allow it just for Renoise (which is what I do, but most people wouldn’t bother). It would be a good idea to mention the requirement in the documentation at least, so that people aren’t tempted to just disable SELinux or allow execmem everywhere without understanding the consequences first.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00014.warc.gz
CC-MAIN-2023-06
2,074
7
https://forum.beagleboard.org/t/loading-out-onto-pru/26098
code
I’m looking for the most up-to-date instructions on updating the device tree, and loading a .out file onto the BBB’s PRU(s). There’s a ton of information on the web, but so much is obsolete, or as in the case of TI’s super-helpful hands-on-labs (http://processors.wiki.ti.com/index.php/PRU_Training:_Hands-on_Labs#LAB_4:_Introduction_to_Linux_driver) not targeted at the stock eMMC Debian distro. I’m hoping someone super-familiar with developing on the PRUs can link me to a resource that is the most modern approach to loading a compiled .out file (from CCS, if it matters) onto the PRUs first, then get it to load at boot every boot. Thank you in advance (also, sorry if this is a double post, I believe I posted earlier, but didn’t see it pop up on the list) There are of course many ways to work with the PRU, but if you want “latest and greatest” that would be via RemoteProc framework. And if you are working with the TI labs, you have already been exposed to it. I don’t work with CCS (might in the future as I saw recently there is no longer a license fee), but instead I did everything at the command line via SSH. And I used the Beaglebone Green with Debian based IOT image (TI kernel). If you look at this project, there is a link to a github repository which has a PDF file in the doc folder. There are a couple of sections in the PDF which show how to configure it all on the BBG Debian IOT: RemoteProc framework does the work of loading the PRU firmwares into the PRUs and starting the processors. It’s just an example, have a look and it might give you an idea where to go next.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00345.warc.gz
CC-MAIN-2022-40
1,614
11
https://www.pitr.uk/hp-transformative-cloud-platform/
code
New printing innovations HP Workpath and HP Command Center allow HP partners and customers to create, manage and deploy applications that make arduous business processes – like submitting expense reports or digitally archiving records -easier and faster. HP Workpath is a new cloud platform and developer ecosystem that enables print resellers, developers and customers to create applications that make business processes easier. Much like smartphones, HP partners can easily create new applications or access existing apps and install them directly onto the MFP. HP Command Center is a cloud based platform that allows service providers to manage MFPs and deploy HP Workpath applications remotely. It also gives partners the ability to diversify their offerings by finding, accessing, recommending, and subscribing to HP Workpath applications, thus delivering higher value solutions to their customers.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00620.warc.gz
CC-MAIN-2022-33
905
3
http://www.imgins.org/tags/trance
code
#7. @ltn_louis_tan - Wind And Cloud [Suanda Progressive / @suandamusic] Ok, let me be - as always - honest. For me, Louis Tanuatmadja - known as LTN (Indonesia) - has something what I like to call a "Paul Oakenfold's syndrome": he can creating wonderful compositions as well as a total garbage (in my opinion) ;) Anyway, "Wind And Cloud" definitely belongs to this first group! Roman Messer's label signed a perfect track for the fans of beautiful progressive melodies with energetic but still mild and delicate atmosphere :) Flows so good! :) Listen: https://www.youtube.com/watch?v=hJsvasUICqw Expect the unexpected!
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948595342.71/warc/CC-MAIN-20171217093816-20171217115816-00765.warc.gz
CC-MAIN-2017-51
618
3
https://www.rdocumentation.org/packages/lattice/versions/0.20-45/topics/C_01_trellis.device
code
Initialization of a display device with appropriate graphical parameters. trellis.device(device = getOption("device"), color = !(dev.name == "postscript"), theme = lattice.getOption("default.theme"), new = TRUE, retain = FALSE, …) standard.theme(name, color) canonical.theme(name, color) col.whitebg() function (or the name of one as a character string) that starts a device. Admissible values depend on the platform and how R was compiled (see Devices), but usually at least one of will be available. logical, whether the initial settings should be color or black and white. Defaults to FALSE for postscript devices, TRUE otherwise. Note that this only applies to the initial choice of colors, which can be overridden using subsequent calls to trellis.par.set (and by arguments supplied directly in high level calls for some settings). list of components that changes the settings of the device opened, or, a function that when called produces such a list. The function name can be supplied as a quoted string. These settings are only used to modify the default settings (determined by other arguments), and need not contain all possible parameters. A possible use of this argument is to change the default settings by lattice.options(default.theme = "col.whitebg"). For back-compatibility, this is initially (when lattice is loaded) theme is a function, it will not be supplied any arguments, however, it is guaranteed that a device will already be open when it is called, so one may use .Device inside the function to ascertain what device has been opened. logical flag indicating whether a new device should be FALSE, the options for the current device are changed to the defaults determined by the other arguments. TRUE and a setting for this device already exists, then that is used instead of the defaults for this device. By default, pre-existing settings are overwritten (and name of the device for which the setting is required, as additional parameters to be passed to the function, most commonly file for non-screen devices, as well width, etc. See the help file for individual devices for admissible arguments. standard.theme returns a list of components defining graphical parameter settings for Lattice displays. It is used internally in trellis.device, and can also be used as the trellis.par.set, or even as trellis.device to use the defaults for another device. canonical.theme is an alias for col.whitebg returns a similar (but smaller) list that is suitable as the theme argument to trellis.par.set. It contains settings values which provide colors suitable for plotting on a white background. Note that col.whitebg is somewhat of a misnomer, since it actually sets the background to transparent rather than white. Trellis Graphics functions obtain the default values of various graphical parameters (colors, line types, fonts, etc.) from a customizable “settings” list. This functionality is analogous par for standard R graphics and, together with lattice.options, mostly supplants it ( settings are mostly ignored by Lattice). Unlike Trellis settings can be controlled separately for each different device type (but not concurrently for different instances of the same predefined settings (a.k.a. themes), while provides a high level interface to control which “theme” will be in effect when a new device is opened. called automatically when a "trellis" object is plotted, and the defaults can be used to provide sufficient control, so in a properly configured system it is rarely necessary for the user to call standard.theme function is intended to provide device specific settings (e.g. light colors on a grey background for screen devices, dark colors or black and white for print devices) which were used as defaults prior to R 2.3.0. However, these defaults are not always appropriate, due to the variety of platforms and hardware settings on which R is used, as well as the fact that a plot created on a particular device may be subsequently used in many different ways. For this reason, a “safe” default is used for all devices from R 2.3.0 onwards. The old behaviour can be reinstated by standard.theme as the default e.g. by putting "standard.theme") in a startup script (see the entry for above for details). Sarkar, Deepayan (2008) Lattice: Multivariate Data Visualization with R, Springer. http://lmdvr.r-forge.r-project.org/ Lattice for an overview of the Devices for valid choices of device on your trellis.par.set can be used to query and modify the settings after a device has been par.settings argument to high level functions, described in xyplot, can be used to attach transient settings to a
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103640328.37/warc/CC-MAIN-20220629150145-20220629180145-00714.warc.gz
CC-MAIN-2022-27
4,649
89
https://docs.allium.so/historical-data/supported-blockchains/evm/scroll/assets/token-transfers/erc1155-transfers
code
The ERC1155 Token Transfers table records all transactions made with tokens that adhere to the ERC1155 standard. Type of transfer event for ERC1155 tokens. This can either be a single or batch transfer. Address of the ERC1155 operator. Address where the token is being transferred from. Address where the token is being transferred to. Token address of the asset transferred. Unique ID of the ERC token. Amount of token moved, unnormalized, in string (to retain precision). Amount of tokens moved, unnormalized. Amount of token moved, normalized, in string (to retain precision). Amount of token moved, normalized. The address of the sending party of this transaction. The address of the receiving party of this transaction (could be a contract address). Transaction hash that this transfer belongs to. The log index that corresponds to this transfer. The time when the block that contains this transaction was included on the blockchain. The block number that the corresponding transaction of this transfer belongs to. The block hash that the corresponding transaction of this transfer belongs to. Unique id generated to each transfer.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818312.80/warc/CC-MAIN-20240422144517-20240422174517-00100.warc.gz
CC-MAIN-2024-18
1,136
19
http://webapps.stackexchange.com/questions/tagged/hacking?sort=faq
code
Web Applications Meta to customize your list. more stack exchange communities Reputation and Badges Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Learn more about Stack Overflow the company Learn more about hiring developers or posting ads with us tag has no usage guidance. My Gmail password has been changed by someone Yesterday when I tried to access my Gmail account. I was not able to access it. It was showing me that password is wrong even though I haven't changed the password. (Later on I recovered password ... Dec 1 '10 at 9:49 recently active hacking questions feed frequent question tagged Hot Network Questions I almost searched my password, but didn't press enter. Because of autocomplete, is my password at risk? Why would an alien race have developed space travel and yet not have other technology? Why is it considered safe to install something as a non-root user in Linux environments? Does a receptacle have to supply the max current that it is rated for? If clinching is technically illegal, why does it almost always go unpunished? My friend and his six roomies Gender neutral version of housewife Why was the image of Supreme Leader Snoke not "scaled to fit our primitive screens"? Does Forced Movement, As In Thunderwave, Necessarily Break A Grapple? Bond gain is greater than remaining coupon payments. Time to sell? What's the smallest change to physics required to allow magic? To style Sound object Are black Americans responsible for more than 50% homicides? Why is there so much fear surrounding LiPo batteries? What's the next symbol in this sequence How would I know if I were a 1 mm tall robot? Why is text justified in newspapers, but not on the web? Potatoes were alive and sprouted on Mars: How were they preserved on the journey there? How do I encourage users to supply information that might not be available, if it is available? Will transforming Thing in the Ice with a token-summoning spell bounce my tokens? How to prevent drafting? Uses of small sized 1/2" drive sockets Does anyone know why my car has burnt through all the oil? I broke an appliance at a company-supplied house -- should I turn myself in? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Movies & TV Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2016 Stack Exchange Inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111374.13/warc/CC-MAIN-20160428161511-00036-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
2,698
59
http://stackoverflow.com/questions/9654087/how-to-find-a-rare-bug
code
My application contains a bug, which makes script run infinitelly long. When I force script to stop, all jQuery UI elements don't answer to my actions, nor application answers to keypresses. If I choose to open Firebug, it requires reloading page and all current application state is lost. The thing is I can't reproduce this bug and it's kinda driving me crazy. How to find and fix such slick bug? UPDATE. Thanks all of you for the advice. But the problem is that I can't figure out when bug happens and, hence, can't reproduce it. That's why standard procedures won't work in my case. I have examined every while loop and recursive function calls, but haven't figured out the problem yet. Publishing the code isn't a good idea — code listing is huge and rather complicated (a game). POSSIBLE SOLUTION. I'll follow one of the published hints and will try to consolelog all functions that might be causing the problem. Hope it helps.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00083-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
935
7
https://hoegl.com/at-en/python-0-104413.html
code
Calfskin ankle boots with platform sole Black Chelsea boots are an exciting variation on the classic black ankle boots. They’ll be perfect for any grey autumn day when they look as cool as this PYTHON style. The chunky platform sole and the clean-cut shape with its typical stretch fabric inserts characterise this sporty design. They are made of soft calfskin, which comes from certified leather suppliers. The production is environmentally friendly and ensures the lowest possible water and energy consumption. |Boot Height (cm) |Heel height (mm) ||Carbon Pro (Spray), as alternative Special Wax (Spray) ||Organic Bamboo Lotion
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066981.0/warc/CC-MAIN-20210416130611-20210416160611-00575.warc.gz
CC-MAIN-2021-17
631
6
https://lists.freedesktop.org/archives/mesa-dev/2013-March/035722.html
code
[Mesa-dev] [RFC] GLX_MESA_query_renderer hverbeet at gmail.com Tue Mar 5 06:58:01 PST 2013 On 2 March 2013 00:14, Ian Romanick <idr at freedesktop.org> wrote: I added some comments, but I think the extension is pretty much fine for at least Wine's purposes. > GLX_ARB_create_context and GLX_ARB_create_context_profile are required. It's probably not a big deal since just about everyone implements these, but I think most of the extension could be implemented without > There are also cases where more than one renderer may be available per > display. For example, there is typically a hardware implementation and > a software based implementation. There are cases where an application > may want to pick one over the other. One such situation is when the > software implementation supports more features than the hardware I think that makes sense in some cases (although the more common case may turn out to be setups like PRIME where you actually have two different hardware renderers and want to switch between them), but wouldn't you also want to look at the (GL) extension string before creating a context in such a case? I realize issue 9 resolves this as basically "not worth the effort", but doesn't that then contradict the text above? (For Wine creating the GLX context is no big deal at this point since we already have that code anyway, but it seems like useful information for (new) applications that want to avoid that.) > Additions to the OpenGL / WGL Specifications > None. This specification is written for GLX. I think we'd like a WGL spec for wined3d, since it's written on top of Wine's WGL implementation instead of directly on top of GLX. If needed we could also solve that with a Wine internal extension, but we'd like to avoid those where possible. > To obtain information about the available renderers for a particular > display and screen, > void glXQueryRendererIntegerMESA(Display *dpy, int screen, int > int attribute, unsigned int This returned a Bool above. I don't see the glXQueryCurrent*() functions specified at all, but I assume that will be added before the final version of the spec. > GLX_RENDERER_VERSION_MESA 3 Major, minor, and patch level > the renderer implementation I guess the trade-of here is that it avoids having to parse version strings in the application, but on the other hand it leaves no room for things like the git sha1 or e.g. "beta" or "rc" that you sometimes see in version strings. That probably isn't a big deal for applications themselves, but it may be relevant when a version string is included in a bug report. > The string returned for GLX_RENDERER_VENDOR_ID_MESA will have the same > format as the string that would be returned by glGetString of GL_VENDOR. > It may, however, have a different value. > The string returned for GLX_RENDERER_DEVICE_ID_MESA will have the same > format as the string that would be returned by glGetString of > It may, however, have a different value. But the GL_VENDOR and GL_RENDERER "formats" are implementation defined, so I'm not sure that wording it like this really adds much over just saying the format for these are implementation defined. > 1) How should the difference between on-card and GART memory be exposed? Somewhat related, dxgi / d3d10 distinguishes between "DedicatedVideoMemory" and "SharedSystemMemory" (and "DedicatedSystemMemory"). I'm not sure how much we really care, but I figured I'd at least mention it. > 5) How can applications tell the difference between different hardware > renderers for the same device? For example, whether the renderer is the > open-source driver or the closed-source driver. > RESOLVED. Assuming this extension is ever implemented outside Mesa, > applications can query GLX_RENDERER_VENDOR_ID_MESA from > glXQueryRendererStringMESA. This will almost certainly return > different strings for open-source and closed-source drivers. For what it's worth, internally in wined3d we distinguish between the GL vendor and the hardware vendor. So you can have e.g. Mesa / AMD, fglrx / AMD or Apple / AMD for the same hardware. That's all derived from the VENDOR and RENDERER strings, so that approach is certainly possible, but on the other hand perhaps it also makes sense to explicitly make that distinction in the API itself. > 6) What is the value of GLX_RENDERER_UNIFIED_MEMORY_ARCHITECTURE_MESA > software renderers? > UNRESOLVED. Video (display) memory and texture memory is not > for software implementations, so it seems reasonable for this to be Related to that, are e.g. GLX_RENDERER_VENDOR_ID_MESA, GLX_RENDERER_DEVICE_ID_MESA (integer versions for both) or GLX_RENDERER_VIDEO_MEMORY_MESA really meaningful for software More information about the mesa-dev
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446708010.98/warc/CC-MAIN-20221126144448-20221126174448-00496.warc.gz
CC-MAIN-2022-49
4,709
79
https://svn.haxx.se/users/archive-2007-09/0864.shtml
code
RE: Hook scripts -- Regarding From: nikhil gupta <ng_g20_at_hotmail.com> Date: 2007-09-27 14:34:19 CEST You need not use the perl script, if you are not well versed with that. You can write a script in any of the scripting language you are comfortable with. you need to use svnlook.exe (comes with svn itself) to extract the information & then handle the same to send the mail using any scripting language (VBScript for an instance). Once the script is ready. Call this script from a "post-commit.bat" and place both your script as well as the post-commit.bat under the hooks directory in the repository that you have. if everything goes fine, it will work perfectly. Date: Thu, 27 Sep 2007 13:21:57 +0530 I tried with Svn:Notify but getting some error in Net:Smtp auth installation. So I tried with hook scripts... If some one have already configured Please send me the hook script u used for commit. Provide me with some solution if u can.... This is an archived mail posted to the Subversion Users mailing list.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474948.91/warc/CC-MAIN-20240301030138-20240301060138-00285.warc.gz
CC-MAIN-2024-10
1,014
12
https://community.home-assistant.io/t/added-xiaomi-mijia-gw-via-homekit-controller-but-buttons-are-not-entities/210670
code
I’ve added the GW without any problems ( I have the Mio controller v3 ), and it’s seeing 5 devices and 8 entities. I have two wireless buttons, connected to the GW without issues and they work. However, in the Entities section I only see sensor.stateless_programmable_switch_battery but not the actual switch. The actual switch is under devices. However each device only the entity about the battery. I want to be able to use the switch as a normal (stateless ) switch to toggle different automations. I tried everything I could think of, but wasn’t able to make it work at all. I’m open to any ideas. That’s not the way it works. If you want a switch to toggle an automation just create an input boolean and use it for that. Since they’re stateless, they don’t have entities. They trigger an event instead. Check in the Developer Tools - Events tab, you should see a HomeKit event listed there. Subscribe to it and see what comes through when you press the button. I tried everything, but there’s no Homekit event coming (nothing at all). In the Mi Home (android app) the button fires the event, but not in Home assistant. Everything else on the Homekit Controller works as expected … This is a known problem. At the moment, the Homekit component in Home Assistant does not support stateless switches. Until the feature is added, there is nothing we can do unfortunately. We can push for this feature to be added as soon as possible!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00357.warc.gz
CC-MAIN-2024-10
1,452
11
https://community.amethyst.rs/t/statistics-amethyst-network/240
code
Amethyst network doesn’t currently have any statistics. Now we want to gather some statistics which could be generated to a report or be turned into a graph. So if anyone ideas about certain statistics for amethyst network please let me know. I’ll be updating a list here and see which ones are valuable. - Throughput P/S - Packets received - Packets Sent - Connected Client Count
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259177.93/warc/CC-MAIN-20190526125236-20190526151236-00154.warc.gz
CC-MAIN-2019-22
384
7
https://stratics.com/threads/question-about-vet-rewards.100194/
code
Seeing all the lovely new things they've added brought this up - in about a month my acount will be 2 years old. When it switches over, do I just get 1 vet reward pick? Or 4? I read the UO.com page, and understood it to mean I would just get 1, but then I see people talking about using "one of their picks" so though maybe each year you get the previous years amount +1? (so for me would be 4?) Thinking on it, it made sense that I would get the previous years amount +1 - cos just a single pick for an entire year's subscription seems a bit "cheap", if you're going to give people 3 picks for just the first year =) If it's just 1 I'm going to be bummed, cos I've got my hopes up now that it's 4 Thanks in advance for any help!
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106984.52/warc/CC-MAIN-20170820185216-20170820205216-00088.warc.gz
CC-MAIN-2017-34
729
1
http://eximas.net/services.htm
code
Services and Training Eximas in depth knowledge of Microsoft Dynamics NAV has been used for a wide variety of projects ranging from web sites and customer portals to Electronic Document Interchange (E.D.I.). Our analyst team has worked on many process re-engineering projects. Eximas has the experience to help with any NAV related project. Successful implementations are the cornerstone of our customer service experience. Our team works closely with key users to define and document your requirements. In turn this allows us to develop a detailed project plan that includes both technical requirements and key success factors (e.g. communication plan, risk and risk mitigation techniques, project team roles…). This clear understanding of your exact needs allows us to implement your Microsoft Dynamics NAV solution on time and on budget. Eximas has Microsoft Certified Trainers available that can run training sessions on all modules of NAV including Manufacturing. Each trainer combines their practical and NAV experiences to deliver highly effective training. We have experience working with implementations that are highly complex and at risk of failure. We have worked with our partners and customers to ensure that NAV installations are functional and practical for end users. This has involved performance tuning, workflow automation, base NAV code modifications and comprehensive quality management. Other product or company names are the registered trademarks or trademarks of their respective owners.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987779528.82/warc/CC-MAIN-20191021143945-20191021171445-00135.warc.gz
CC-MAIN-2019-43
1,514
6
https://bugzilla.redhat.com/show_bug.cgi?id=1154730
code
If the installation takes more than one hour or if the servers have been registered but not deployed for more than an hour the token expires and the host won't be built. The result is the hosts rebooting all the time into installation as the pxelinux.cfg/mac_address_of_the_node is not updated to boot from the local disk. We tried doing this from the foreman console: # foreman-rake console => #<Token id: 158, value: "31255447-68d4-4467-a722-861cb65bf832", expires: "2014-10-20 18:17:05", host_id: 87> The token expire time is changed but the host still ends up in the building loop. Closing list of bugs for RHEL OSP Installer since its support cycle has already ended . If there is some bug closed by mistake, feel free to re-open. For new deployments, please, use RHOSP director (starting with version 7). -- Jaromir Coufal -- Sr. Product Manager -- Red Hat OpenStack Platform
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318894.83/warc/CC-MAIN-20190823150804-20190823172804-00359.warc.gz
CC-MAIN-2019-35
881
10
https://www.cakecentral.com/forum/t/716570/gun-cake
code
I have an order for a gun cake this weekend and I have no clue as to how I have to make it..any tips will be greatly appreciated! We have several guns. So my first thought would be a Glock. A very basic design. Maybe do a double 1/4 sheet and carve it lying down. I guess it would depend on who it is for as well. Wouldn't want to do that for someone interested in cowboy action shooting. Good luck! thanks for responding kristen81...a 1/4 sheet should be a perfect size. does anyone have any templates tutorials?
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689192.26/warc/CC-MAIN-20170922202048-20170922222048-00627.warc.gz
CC-MAIN-2017-39
513
4
https://support.shaw.ca/t5/internet-discussions/accessing/td-p/539
code
This problem typically takes about 1-2 minutes to fix, once you know how to do it. What we want to do is to delete the minimum amount of data necessary from your Firefox required to fix this, without losing your potentially useful browsing history and other website preferences. 1) Open Firefox, then press Control + Shift + Delete to bring up Firefox's "Clear All History" window. Select only the following settings. After you select "Clear Now", wait at least 10 seconds for your cache (saved temporary files) to be deleted by Firefox. The more of these files there are, the longer this will take. Generally 10-20 seconds should be plenty of time. Next, close Firefox and wait another 10 seconds (it can take a while for Firefox to finish closing in the background once you close it, so you generally want to wait a moment before opening it again). Try to use Shaw Webmail again. If the problem persists: 2) Follow these steps to delete all of your Shaw Webmail cookies in Firefox, leaving your other cookies untouched: Let us know how it goes! Tried both options but no dice! Interestingly on my second device (Laptop) with FF the web-mail Sign-in works, however the 3rd party extensions disabling one by one on the problematic one still to be tried. PS: the 3rd party suggestion was made by Shaw-tony, not myself. Give "Private Browsing" mode a try! It's great for quickly narrowing down problems like this in Firefox, before you make any changes. See if you have the same problem there. Control + Shift + P What plugins do you have? Can you show us a screenshot? You can jump straight to Firefox's extensions screen with Control + Shift + A The offending extension was Privacy Badger. One more thing that PREVENTING of Replying of posted questions/replies strangely McAfee Webadvisor! I forgot about safe-search plugins. I haven't gone near one for a long time... and now you see why! Even back when I still used antivirus software (nearly 10 years now), I would always opt out of all the browser plugins they tried to install.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574159.19/warc/CC-MAIN-20190921001810-20190921023810-00207.warc.gz
CC-MAIN-2019-39
2,032
19
https://archive.sap.com/discussions/thread/1513739
code
Error while Importing SQL Table's Metadata I am creating an External defination of category "dbtab". when i try to import the table in 3rd step i get this error. "Error occurred while attempting to connect to database". I checked the JDBC channel, in the channel getting this error "Error processing request in sax parser: Error when executing statement for table/stored proc. 'metadataRequest' (structure 'statement'): java.sql.SQLException: [Microsoft][SQLServer 2000 Driver for JDBC]Can't start a cloned connection while in manual transaction mode."
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201672.12/warc/CC-MAIN-20190318191656-20190318213656-00124.warc.gz
CC-MAIN-2019-13
552
4
http://www.ifans.com/forums/threads/im-so-lost.4463/
code
My ipod touch is jailbreaked, i have a bunch of apps installed. That was easy. What I want to know is 1) how to install iphone apps (maps, weather, etc.) on my ipod. I have copies of them downloaded on to my computer but how do i get them on? ssh? 2) what the heck is ssh? how do i use it, what does it do etc? 3) how do i put roms on my ipod for the nes emulator? (ssh?) i have them on my computer, like the iphone programs. I'm a total noob. Obviously.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541886.85/warc/CC-MAIN-20161202170901-00216-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
454
1
https://intellij-support.jetbrains.com/hc/en-us/community/posts/206994265-libraries
code
1. the longish optimization of jars in classpath gets on my nerves, I often have to switch a big jar (12MB) to another version -> have to wait > 1 minute. Is it possible to defer optimization until the time when it is needed? or do it in background? currently IDEA 3.x is more convenient to me in that respect, because there I can easily put large jars in and out of classpath without having to wait 2. ability to "comment out" a library / classes entry to be able to temporarily remove classpath entries and easy possible to bring them back again 3. it is difficult to find usages in libraries of e.g. some method from a class that was decompiled - because then the decompiled source is within project path and IDEA does not let me "search in libraries"
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348511950.89/warc/CC-MAIN-20200606062649-20200606092649-00385.warc.gz
CC-MAIN-2020-24
754
12
https://www.usingenglish.com/forum/threads/158038-Student-of-Life
code
Is it proper to begin a business letter with the pronoun "I"? In the way back when, as I was learning grammar and punctuation I was taught that it was a "no-no" to begin a letter with the pronoun "I". Just trying to confirm what I think I recall as a 'rule'. There's nothing wrong with it at all. (As your thread is about Beginning a letter with 'I', that would have been a great title.)
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121644.94/warc/CC-MAIN-20170423031201-00481-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
387
4
https://forum.smallgiantgames.com/t/show-s2-map-quest-progress-in-terms-of-location/183106
code
In the player profile screen, progress on the map is shown by area, except for Season 2 which is shown by # of Atlantis tokens. That doesn’t help me, and doesn’t make sense. Please correct that inconsistency. Unlike S3 in S2 you can do any stage in hard mode what was completed in normal mode. So you do not need to follow the order. So it is the only way it can be shown on the profile window.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107905965.68/warc/CC-MAIN-20201029214439-20201030004439-00536.warc.gz
CC-MAIN-2020-45
398
4
https://ubuntuforums.org/archive/index.php/t-1653759.html?s=f43ce4f3321b53d530351bd776265cb6
code
View Full Version : [ubuntu] micro instance AMI below 10GB December 27th, 2010, 05:07 PM I checked the Ubuntu AMIs at http://uec-images.ubuntu.com/releases/10.04/release/, but all of them occupies 15GB of space. Are there any official Ubuntu AMI, which is suitable for the Free Tier (up to 10GB)? Or are there any nearly-officials that are reliable? Or is there a way to create one? December 27th, 2010, 06:29 PM Any of the daily images 20101106 or later at http://uec-images.ubuntu.com/server/maverick/ will have 8G root FS January 4th, 2011, 10:21 PM January 5th, 2011, 09:22 AM Hi Ray, why do you think this message is spam ?! It's not :) January 5th, 2011, 10:32 AM Yesterday, there was big Russian-spam-posts in many (the same text) Threads. With Pictures of some faction Flags. The forum team deleted those Post, that is why my post is now after yours. Sorry :lolflag: January 6th, 2011, 10:45 AM hehe I see, no problemo :) Powered by vBulletin® Version 4.2.2 Copyright © 2017 vBulletin Solutions, Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170286.6/warc/CC-MAIN-20170219104610-00080-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,031
16
http://www.scienceforseo.com/tutorials/make-a-web-spider/
code
I’m often asked how to make a spider to crawl the web, or a specific site, a directory, look for hubs, and so on. They’re not hard to make and there are a ton load of them out there. There is really no need to reinvent the wheel and write a load of other ones that are all the same. It’s bad engineering, always reuse code. The following presentation is one I use a lot, and it will give you a lot of places to get code, tutorials, information and so on. I also dish out some basic advice. I hope it’s useful, lots of love, cj
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164005827/warc/CC-MAIN-20131204133325-00048-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
534
2
https://forums.fast.ai/t/lesson-8-official-topic/70494/260
code
Any solution for this issue? Hi Megan! Would love to join! Will there be a meet today or tomorrow? Sounds good, Dan. I’m taking this week off course review to work on a covid hackathon. Meetings start next week. Can it be @harish3110 that in this example you mentioned your data had only 3 columns: text, sentiment and is_valid? It seems to me know this could be the key but I am not entirely sure. sentencepiece throws an error (see below) when I run notebook 10_nlp.ipynb in Google Colab. Has anyone managed to successfully deal with this issue? In Chapter 12 we create an LSTMCell from scratch as such: class LSTMCell(Module): def __init__(self, ni, nh): self.ih = nn.Linear(ni,4*nh) self.hh = nn.Linear(nh,4*nh) def forward(self, input, state): h,c = state #One big multiplication for all the gates is better than 4 smaller ones gates = (self.ih(input) + self.hh(h)).chunk(4, 1) ingate,forgetgate,outgate = map(torch.sigmoid, gates[:3]) cellgate = gates.tanh() c = (forgetgate*c) + (ingate*cellgate) h = outgate * c.tanh() return h, (h,c) How do I create a single layer LSTM model to use this cell? This isn’t implemented in the notebook. I have tried it on my own but I’m getting an error RuntimeError: size mismatch, m1: [1024 x 64], m2: [2 x 256] at /pytorch/aten/src/TH/generic/THTensorMath.cpp:41 and I’m not sure what the mistake is. Here’s the code for the model and training: class LMModel6(Module): def __init__(self, vocab_sz, n_hidden, n_layers): self.i_h = nn.Embedding(vocab_sz, n_hidden) self.lstm = LSTMCell(n_layers, n_hidden) self.h_o = nn.Linear(n_hidden, vocab_sz) self.h = torch.zeros(n_layers, bs, n_hidden) def forward(self, x): h, res = self.lstm(self.i_h(x), self.h) self.h = h.detach() return self.h_o(res) def reset(self): for h in self.h: h.zero_() learn = Learner(dls, LMModel6(len(vocab), 64, 2), loss_func=CrossEntropyLossFlat(), metrics=accuracy, cbs=ModelReseter) learn.fit_one_cycle(15, 1e-2) Any idea how to fix this? Can you share output of learn.summary? Learn.summary won’t work since there is a runtime error. But you should be able to see the inputs and outputs and then dwelve into the code to check. This is just a suggestion. Good morning catanza hope you are having a wonderful day. I am receiving the exact error! I use the following to repositories at the start of my notebook as this is what, has worked for me. from colab_utils import setup_fastai_colab setup_fastai_colab() I had to install !pip install sentencepiece this morning and have had the error since then, it is my first attempt at NLP so am a little stuck . Have you managed to find a resolution for this error? Kind regards mrfabulous1 HI jcatanza hope your having a Fun day! I was trying to resolve this problem on another thread! The above solution worked for me if you still have the issue! Thanks @mrfabulous1 I installed an earlier version of sentencepiece % pip install sentencepiece==0.1.86, and now there is no problem. @Salazar we’ll start next week May 26th Tuesday, 6-9pm PST. We will silently work on notebooks, then discuss as a group. You don’t have to complete anything in advance. URL to join next week’s meeting: https://meet.google.com/hgw-itjd-hep. Hope to see some of you there! I am using paper space and I get the following error when running this line of code in notebook 10. I am not sure why it is looking for a pkl file. dls_lm = DataBlock( blocks=TextBlock.from_folder(path, is_lm=True), get_items=get_imdb, splitter=RandomSplitter(0.1) ).dataloaders(path, path=path, bs=128, seq_len=80) It’s due to the tokenized text information being saved away. This may be a similar issue to what has been going on with the old course and paperspace, where the system path would give issues. A better place for this may be on the paperspace platform discussion? (Where I know mods from paperspace are on often): Thanks. I will post there. Is this working for you? I haven’t been able to get it to work in How are you passing it in? On Learner or on your call to fit? Does Fastai2 support multi-gpu training?
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00415.warc.gz
CC-MAIN-2022-40
4,058
39
http://www.howtoforge.com/forums/printthread.php?t=56661
code
need some help with apf-firewall logs I have got a couple of logs I can't "read" - can someone explain what the different fields mean? i.e. I figured out some of them, i.e. DPT=destination port target, STP=source target port Besides, why would my server connect to that remote IP? I can post a summary of my apf config if its needed to answer this question. P.S. I have not set up filtering of outgoing connections in apf so the above log lines must not be based upon the static fitlering but some reactive mechanism of apf. |All times are GMT +2. The time now is 21:32.| Powered by vBulletin® Version 3.8.7 Copyright ©2000 - 2014, vBulletin Solutions, Inc.
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802776528.19/warc/CC-MAIN-20141217075256-00004-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
659
9
https://www.ifs.tuwien.ac.at/infrastructures/ossdip/
code
OSSDIP: Open Source Secure Data Infrastructure and Processes Platform that Supports Data Visiting¶ Meeting the conflicting goals of protecting and maintaining control over sensitive data while also allowing access by third parties constitutes a significant challenge. Secure data infrastructures support data visiting in a highly controlled and monitored environment which, if properly set-up and operated, provide high security guarantees through a combination of technical, legal and procedural mechanisms. To ease the process of deploying such a secure data infrastructure, we present a detailed documentation of the architecture and processes of such an infrastructure and provide a pre-configured reference implementation based entirely on open source software that can be flexibly configured to meet differing security requirements and deployment scenarios. We combine mechanisms for data visiting on secured infrastructure components with optional components of data anonymization and fingerprinting, covered by extensive logging and monitoring functions and embedded in defined processes and contractual frameworks. The set-up is based upon the experience of operating such a secure infrastructure in the medical domain for almost ten years, addressing the emerging need to make such a solution available to a larger set of stakeholders. We show that our system significantly enhances data visiting, offers a higher level of data isolation and present our open source reference implementation thereof. This project is supported by EOSC Secretariat in cooperation with COVID-19 Future Operations and EOSC-Life. We thank Martin Weise for the automatization of the project which greatly improves the flexibility, overall infrastructure testing, set-up of the repository and documentation of the project. Special thanks goes to: - The team of the Coordination and Communications team (ZKK) at the Faculty of Informatics of TU Wien, - The team operating the DEXHELPP infrastructure, as well as - Numerous experts contributing to the discussion and design of this infrastructure, at TU Wien, SBA-Research and several other institutions, as well as - The EOSC-Secretariat project for its support under the Co-Creation programme (call H2020-INFRAEOSC-05-2018-2019, grant agreement number 831644), as well as - The EOSC-Life project for its supported under the Digital Life Sciences Open Call (call EH2020-INFRAEOSC-05-2018-201, grant agreement number 824087), and - The Austrian COVID19 Future Operations board
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00665.warc.gz
CC-MAIN-2023-50
2,511
13
https://math.stackexchange.com/questions/3091837/prove-that-if-p-is-prime-and-apbp-cp-then-ab-c-0-mod-p
code
I'm working on the following Fermat little theorem exercise: Prove that if $p$ is prime and $a^p+b^p = c^p$ then $a+b-c = 0 \mod p$ Also I find a relation with Fermat last theorem which says that no three positive integers $a, b$, and $c$ satisfy the equation $a^n$ + $b^n$ $=$ $c^n$ for any integer value of $n$ greater than $2$. So is there a solution or a way to solve the problem based on the last theorem? How should I go ahead on this exercise? Any hint or help will be really appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576965.71/warc/CC-MAIN-20190923125729-20190923151729-00420.warc.gz
CC-MAIN-2019-39
495
4
https://impulsefitness.website/produit/hourglass-curves-define-training-diet-pack/?lang=en
code
Hourglass Curves Define (free eBook) Program description: Many of you have asked what my workouts are, how often I train and hat some good options are. This is your chance to workout just like I do! This program is an intense 6 week workout plan with the goal to get leaner without loosing your curves. The exercises are suitable for every one in every gym. This free eBook contains the first day of the program (pdf).
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746465.88/warc/CC-MAIN-20181120150950-20181120172950-00086.warc.gz
CC-MAIN-2018-47
418
2
https://www.aerocontact.com/videos/84485-em-sheldon-inside-100m-royal-jet-boeing-bbj-designed-by-edese-doret
code
In Em's VLOG she shows you a rare glimpse at how Billionaires, Head's of State and Royalty travel. She was extremely lucky to be able to fly to Abu Dhabi with her brother on the world's most luxurious Royal Jet Boeing Business Jet (B737) designed by Edése Doret. They were filming for a documentary and managed to VLOG some of it for you guys! FYI no one sponsored this video or paid Em Sheldon, she chose to make a video whilst filming a separate documentary. I N S T A G R A M: http://www.instagram.com/emshelx My Brother's Insta: http://www.instagram.com/adsheldon T W I T T E R http://www.twitter.com/emshelx MY INSTAGRAM FILTERS: http://www.emspresets.com . . . Instagram: https://www.instagram.com/edese_doret/ | @edese_doret Twitter: https://twitter.com/EdeseDoret | @EdeseDoret
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213454.52/warc/CC-MAIN-20200924034208-20200924064208-00047.warc.gz
CC-MAIN-2020-40
786
9
https://www.oreilly.com/library/view/learning-mcollective/9781491945681/apa.html
code
Appendix A. Appendix Using r10k to install Puppet Modules r10k provides a general purpose toolset for deploying Puppet environments and modules. It implements the Puppetfile format and provides a native implementation of Puppet dynamic environments. To translate that into English, r10k takes all the work out of managing a collection of puppet modules and their dependencies on GitHub. If you’d like to deploy the Learning MCollective test environment (exactly as I used it when writing this book) in a fresh new environment, this is the fastest way to do it. If you don’t have r10k installed yet, let’s do this first. Install it directly from the gem: sudo gem install r10kSuccessfully installed colored-1.2 Successfully installed cri-2.5.0 Successfully installed systemu-2.5.2 Successfully installed log4r-1.1.10 Successfully installed multi_json-1.8.4 Successfully installed json_pure-1.8.1 Successfully installed multipart-post-1.2.0 Successfully installed faraday-0.8.9 Successfully installed faraday_middleware-0.9.1 Successfully installed faraday_middleware-multi_json-0.0.5 Successfully installed r10k-1.2.1 11 gems installed If you are using Ruby 1.8 then you may see errors like this when you run Faraday: you may want to install system_timer for reliable timeouts If so, install the gem specified. sudo gem install system_timerBuilding native extensions. This could take a while... Successfully installed system_timer-1.2.4 1 gem installed Now that ...
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739370.8/warc/CC-MAIN-20200814190500-20200814220500-00138.warc.gz
CC-MAIN-2020-34
1,470
13
https://viscircle.de/how-to-use-ai-to-speed-up-graphics-workloads-during-raytracing/?lang=en
code
How Iray Interactive Denoinsing works. Existing algorithms for high-quality denoinsing take seconds to minutes per frame, making them impractical for interactive applications. By predicting final images from only partially completed results, Iray generates artificial intelligence (AI) and thus accurate, photorealistic models without waiting for the final image. Designers can iterate and finish final images 4x faster to get a much faster understanding of a final scene or model. The cumulative time savings can significantly accelerate a company`s time to market. To achieve this, Nvidia researchers and engineers turned to a class of neutral networks, the auto encoder. Auto encoders are used to increase image resolution, compress video and many other image processing algorithms.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00891.warc.gz
CC-MAIN-2023-50
785
5
http://www.photopost.com/forum/1227811-post3.html
code
The paths are the same, the images are in there too. Please check Main Index - Pakistani Pictures Half of the albums are fine, the other half are not at bottom, the stats show 0, but the paths are still the same for them and all the pictures are in those folders. So in this case what should I do? I am willing to pay you 50US if you can have a look at my settings and try to find a fix for it. Please let me know if I should PM you.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711240143/warc/CC-MAIN-20130516133400-00033-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
433
4
https://www.pasadenacarecruiter.com/it-software-systems-jobs/2447982429/sr-backend-java-developer
code
Sr Backend Java Developer Company: Agm Tech Solutions - A Wbenc And Mbe Certified Com Posted on: January 16, 2022 Our Direct Client is looking for a Senior Backend Developer, an innovative thinker with a 'can-do ' attitude. You will work with teams across the company to leverage technologies that support our integration applications. Hands on expertise in Java, Python, NoSQL, Cloud (Server less/AWS Exposure). Requires programming skills, involved in the development of software applications. Knowledge of programming languages to develop necessary specifications for the software by following the technical designs. In specific cases, knowledgeable on Agile/iterative development methodologies will be required (and Senior level knowledge in the following:1. Java, Microservices and REST API development2. Python and Conda Linux and Tomcat3. Hands on experience with coding highly scalable and available systems.4. Full software life cycle (SDLC) -- develop/test/build/deploy/etc.5. Unit testing, System testing, and integration testing6. Understanding of Java architecture.7. Object-oriented programming and applying design patterns and practices8. Analyzing log files, researching errors, managing security, configuring database connections, etc.9. SQL and NoSQL Databases such as Oracle, PostgreSQL, MongoDB, or similar Intermediate knowledge of the following:o CI/CD pipelines (AWS preferred)o Test-Driven Developmento Domain-Driven Design conceptso Testing automation frameworks such as Selenium, Katalon, and Cucumbero Agile development with Scrum Practices, usage of tools like JIRA, Confluenceo AWS services like API Gateway, Lambda, SQS, S3, Kafka, Elastic Search, Kinesis, Splunk THIS IS A CONTRACT TO HIRE ROLE, REMOTE FOR 6 MONTH BUT YOU MUST BE COMFORTABLE MOVING TO PASADENA CA AFTER 6 MONTHSby Jobble Keywords: Agm Tech Solutions - A Wbenc And Mbe Certified Com, Pasadena , Sr Backend Java Developer, IT / Software / Systems , Pasadena, California Didn't find what you're looking for? Search again!
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306301.52/warc/CC-MAIN-20220128152530-20220128182530-00391.warc.gz
CC-MAIN-2022-05
2,017
33
https://islam.meta.stackexchange.com/questions/441/duplicates-to-unsatisfactory-answers
code
I've noticed that there are a few questions that are basically asking the same thing, but those questions are not satisfactorily answered. For example, I've seen at least two questions on whether a person in debt needs to pay Zakat, but neither have accepted answers. For example: In many cases, they are going to choose/upvote an answer they want to believe, rather than the right answer, so people are (rightfully) going to doubt the 'concluded' answer of similar questions and ask the same question again. I'm also afraid that some people would be using the site as a way to win arguments, and keep on giving loaded questions until they get a verbose answer that tells them what they want to hear. So, how do we deal with these kinds of duplicates? How would you 'bump' a topic that does not have a satisfactory answer? If duplicate questions are allowed, would it also be fine to copy and paste the same answer?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104141372.60/warc/CC-MAIN-20220702131941-20220702161941-00434.warc.gz
CC-MAIN-2022-27
915
5
https://www.heinfo.slc.co.uk/resources/guidance/student-information-service-user-guide/change-of-circumstances/coc-worklist/coc-worklist-student-search/
code
Version 0.1 - Last Updated: 05 May 2021 CoC worklist - Student Search The following options are available on the Student Search tab. This defaults to the current academic year and is the only mandatory field you need to run a search. Mode of Study The dropdown options are Full Time or Part Time. Customer Reference Number / SSN These are unique student identifiers. Date of Birth You can use a wildcard search for these fields. For this, you must enter at least 3 characters along with the wildcard symbol (%). If you use one of these fields, you must also use the other. CoC Created Between This can be used if you are looking for a specific date window for CoCs created (dd/mm/yyyy) and (dd/mm/yyyy). Current Year Start Date From/To This field lets you filter on the current year start date of part-time students. You cannot use it if you set the Mode of Study field to Full Time. Number of Records to Display The number of search results per page. By default, this is 25, but you can change it to 50, 100 or 200 Print this section
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00239.warc.gz
CC-MAIN-2022-33
1,034
17
http://careers.balderton.com/jobdetail.php?jobid=1230180
code
At carwow, we’re aiming to create the best car-buying experience in the world. Buying a car is normally the 2nd biggest financial decision people face (after buying a house), and it’s a complex one. There are many issues people face throughout the process, and we aim to fix them. We’re a driven, energetic startup with a team of 200+ based in London, Munich and Madrid. We are backed by some of Europe’s leading VCs and have raised over £48m in funding since we launched, so we’re growing fast. We’re constantly asking ourselves how we can make carwow better, so if you’re curious, motivated, and want to help us change the future of car buying, get in touch. It’s the chance to be at the start of something huge. We’re looking for a great Data Scientist to join our central data team. We work across functions (Product, Marketing, Supply & BI) on impactful projects, such as Marketing incrementality, TV measurement, PPC bidding, user conversion, propensity modelling, product experimentation, supply acquisition and network health scoring, sales forecasting and churn prediction, NLP and offer algorithm tuning. We strive to find the best balance between technical skills and commercial nous to create significant value to carwow. You will work within a team of 10 Data Scientists & Analysts with an initial focus on Business Intelligence. This means you will develop an unhealthy obsession with our user & dealer cohorts, help us forecast our sales lag & compression, engineer data sources & create top-notch visualisation, promote data self-service across functions at carwow, deep dive into commercial performance to understand drivers of conversion and improve our in-house Data Science apps (e.g. PPC bidding algorithm, A/B testing app, user flow app etc.). Data Scientists in our team will also be able to work on a variety of projects and across disciplines. We work with well-maintained data, use great technology (our stack is documented here) and have one of the richest data sources in automotive. The right candidate is self-driven, has a passion for data and above all is excited about putting Data Science at the heart of carwow. - A competitive salary and equity in the company - 25 days holiday, plus bank holidays on top - A generous annual training budget for you to spend on your personal development - Free access to Sanctus mental-health coaching sessions - Regular lunch & learn sessions with a wide range of external, inspiring speakers - Monthly company-wide socials, Friday drinks, and whole company, international events (we’ve been skiing to Austria and France and hosted our very own carwow Olympics) - carwow fitness and well-being groups open to everyone in the office. These include activities such as yoga lessons, squash, football, and tennis - A dog-friendly office in Victoria, with free refreshments and a variety of breakout spaces - let Mat Watson take you for a spin around our office here At carwow, we believe diversity of experience (whether that be personal or professional), contributes to a broader perspective and will lead to a more innovative company. We’re working hard to increase the diversity of our team and be more inclusive, so if you’re not sure you fit all of the requirements, why not get in touch? Above all, we’re looking for people with drive who share our company values (you can view them here).
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330907.46/warc/CC-MAIN-20190825215958-20190826001958-00456.warc.gz
CC-MAIN-2019-35
3,388
14
https://www.r-bloggers.com/2014/04/regular-expressions-in-r-vs-rstudio/
code
The 'regex' family of languages and commands is used for manipulating text strings. More specifically, regular expressions are typically used for finding specific patterns of characters and replacing them with others. These technique have a range of applications and R's base installation has powerful regex tools (not to mention add-on packages for string manipulation such as stringr). Yet regex in R is cause of much confusion, as indicated by the multitude of stackoverflow questions on the subject and the documentation is difficult for novices to the world of regex. In this post we are going to see a few reproducible examples of R's implementation of regular expressions and how it can make your life easier. There is already much useful information on the topic such as a simple how-to on using regex to load files with specific names, an excellent introduction from Regular-Expressions.info and R's terse documentation on the matter triggered with In an attempt to adhere to the DRY principle, this article will focus on just three topics: R's basic regex commands, search and replace in R and R Studio's implementation of regex. The final topic has rarely been discussed yet understanding the differences between regex in R Studio's search panel and in standard R can save much time. R Studio's implementation of regex is confusingly different from R's default regex behavior. R's basic regex commands Let us start with an example: illegal column names that describe age categories, attributes and which we want to eventually prefix with 'm'. Here are the original column names imported from Excel: x <- c("16_24cat", "25_34cat", "35_44catch", "45_54Cat", "55_104fat") Imagine we first want to select all items in this string containing 'cat'. The basic regex command in R is grep, which simply returns the index of the matching elements: grep(pattern = "cat", x = x) ## 1 2 3 Note that 'catch' was included whereas 'Cat' was not: the matching pattern can appear anywhere in the text string but is case specific. To make the search ignore cases, simply add the ignore.case = T argument. To exclude 'catch', the dollar sign can be used. These arguments can be used to extract the names we are really interested in: grep("cat$", x, ignore.case = T) ## 1 2 4 grepl is the same as grep, only it outputs a yes/now output for each element: grepl("cat$", x, ignore.case = T) ## TRUE TRUE FALSE TRUE FALSE The final regex-related command worth knowing we want all characters on the right-hand side of the underscore. strsplit(x, split = "_") ## [] ## "16" "24cat" ## ## [] ## "25" "34cat" ## ## [] ## "35" "44catch" ## ## [] ## "45" "54Cat" ## ## [] ## "55" "104fat" Strangely, the hardest part of the is to re-combine the list output into a useful form. For this, in base R, we need the power of sapply(strsplit(x, split = "_"), "[", 2) ## "24cat" "34cat" "44catch" "54Cat" "104fat" A simpler way to achieve this same result would be to use the str_split_fixed function of the library(stringr) str_split_fixed(x, "_", 2)[, 2] ## "24cat" "34cat" "44catch" "54Cat" "104fat" Finding and replacing in R To search and replace the first instance of a pattern, use Much more useful is gsub, which replaces all instances. To replace all instances of 'cat' with 'fat', use the following: gsub(pattern = "cat$", replacement = "fat", x = x, ignore.case = T) ## "16_24fat" "25_34fat" "35_44catch" "45_54fat" "55_104fat" Let's try something more complicated. We want all instances of two numbers followed by an alphabet letter to have an additional character inserted, but only if the first of those numbers is 3 or less: gsub("([1-3][1-9][a-z])", "m\\1", x, perl = T, ) ## "16_m24cat" "25_m34cat" "35_44catch" "45_54Cat" "55_104fat" The above syntax is bizarre, so let's run - We have specified that we want Perl-esque regex, allowing us to store groups for later referral. - The curved brackets have no impact on the search result, but are used by Perl to store the contents of the group. - The square brackets refer to any character matching the range of values indicated. \\1 symbol means "replace this with the value captured in group 1", meaning that the same numbers are retained, even though the numbers were used in the match. Regular expressions in RStudio The above bullet points may seem like a daunting amount of explanation for only one line of code, and the regex is still relatively simple! More complex commands can be done, especially when perl = T argument is enabled or using the more coherent package. However, one of the main uses that R users may have for regular expressions is not their data per se - R is most useful for quantitative not character information after all. Regular expressions can be hugely useful for editing long R scripts to do different jobs. R Studio's search and replace functionality is well known but the little "Regex" tick mark is less so. Hitting that tick mark brings the whole power of Perl regex to bear on your code editing: time spent learning the functionality of regular expressions can pay dividends in fast code modification and automation of repetitive tasks. In fact, the example used throughout this article was originally implemented in RStudio to change the name of text strings so they would be valid column names. The text in the previous image means, in English, "search for any instance of " followed by a number and then insert the letter directly after the quote mark and the number". This altered all the column names in an instant. Unfortunately, R Studio's website has little in the way of documentation for this little feature (hint hint to any on the RStudio team reading this), other than a thread about how it differs from R's implementation, as covered in this article. Clearly, there is large potential for confusion in R's implementation of regular expressions. To pick one example, the group $1 in RStudio and pure Perl is different from the \\1 register used in R. Yet it is well worth the effort of learning regex in R, as it opens up huge possibility for the manipulation and analysis of text data as well as automation of your own code re-writing. This article and the reproducible examples should be of use to others. Understanding regular expressions in R and RStudio can make the R programming process more powerful, less prone to human error and faster. It is hoped that this will allow R users more time away from their computers, to enjoy nature and hopefully to return to their computers with a refreshed desire to learn and use their specialist skills for the greater good.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00137.warc.gz
CC-MAIN-2023-40
6,570
87
http://www.php-forum.com/phpforum/viewtopic.php?p=1512
code
something is wrong with you're query. either the table "UserMaster" (case sensitive) doesn't exist. or the table hase more or less than 2 colums. or $LName and/or $LPASS has got one or more ' in it's string. In that case use addslashes to escape those.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645378542.93/warc/CC-MAIN-20150827031618-00280-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
252
5
http://urjc.impok.com/home/NuevoUsuario.aspx
code
La gestión inteligente de tus inversiones Join Universidad Rey Juan Carlos today Must have a length of between 5 and 15 characters. Can not contain spaces. Your electronic mail. Must have a length of 5 characters or more Your public URL I have read and accept of use of the portal I don't want to receive comercial communication from thirds.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721142.99/warc/CC-MAIN-20161020183841-00179-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
342
9
https://itendencia.online/2023/05/05/buy-the-best-3d-printer-files-online-3/
code
This went into the first available place on the disk, which just happened to be the header of the lost MP3 file. BPNF, BHLF, and B10F were early binary formats, but they are neither compact nor flexible. Hexadecimal formats are more compact because they represent 4 bits rather than 1 bit per character. Many, such as S-record, are more flexible because they include address information so they can specify just a portion of a PROM. TekHex is another hex format that can include a symbol table for debugging. The S-record format was created in the mid-1970s for the Motorola 6800 processor. Just like the examples above, you can list several parameters to plot separated by comma in the square brackets. In general, you can plot any variable that you are able to read like normal in odrivetool. Some people have had issues using the python dfu tool, so below is a guide on how to manually use different tools. Try running sudo odrivetool dfu instead of odrivetool dfu. This command will connect to GitHub servers to retrieve the latest firmware. By default, odrivetool will connect to any ODrive it finds. If you are certain that you will never want to load betaflight on the board then you can install the ArduPilot bootloader. The STM32CubeProgrammer will install the required DFU (direct firmware upload) drivers and can be used to flash the firmware to autopilots in DFU mode. This is available for Windows, Linux, and MacOS systems. - A computer has to follow all instructions for the software to function. - His variety of experiences speak to his ability to handle small business needs at all stages of business growth and development. - Software is any program or group of programs run by a computer. - If any of the settings are removed or renamed, you will get warning messages. You may, on the other hand, get some kind of notice from other devices. You can get in terms of an email from your product manufacturer, pop up with message in your web browser window, light may come on. Also, you can check the manual when you are not aware of your product if an update is available for your device. For example, printers with updated firmware experience increased print resolution, faster execution times, and boot times. Televisions with updated firmware experience better resolution and fewer glitches. - The following steps are going to explain how you can upgrade the firmware on your 3D printer, so be sure to follow each of them carefully. - They both cover the topic of software that’s embedded into a specific piece of hardware. - The chip has a built-in RF subsystem, intended no doubt to enable wireless sensor designs. - Most flashing and upgrading tutorials mention a bootloader, but not all 3D printers are equipped with a bootloader. - Any changes you make here will persist for future prints as well. In order to not wait for the extruder to reach a normal temperature, you can remove the filament and set the initial temperature to a very low value. This will allow your printer to start moving right away. When a new print starts, you may notice that it does a routine in which it goes to its home position before initiating the entire job. After the said routine, the printer only follows the instructions given by the G-Code and actually does not remember any previous notion of the initial position. It just assumes that it correctly homed and that all the following movements were correctly executed. Before getting started, stock firmware ROM make sure you have Arduino IDE installed on your computer since it will be required in order to compile the firmware.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00139.warc.gz
CC-MAIN-2023-50
3,591
14
https://www.programmableweb.com/library/pebble-node.js-library-pebble
code
Developing on wearable platforms is new and challenging. App developers are asked to create dynamic user experiences on small screens comparable to what customers see on their mobile phones and web pages. Connect IQ offers a platform for developers to create wearable apps across all Garmin devices. When creating an IoT prototype, an easy way to start is to pick a computing module that serves as your prototype core. This article explains why the Intel Edison IoT devkit is a good choice for developing IoT prototypes and will also suggest some best practices to follow when developing for it.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348517506.81/warc/CC-MAIN-20200606155701-20200606185701-00265.warc.gz
CC-MAIN-2020-24
595
2
https://sourceforge.net/p/magicor/news/?source=navbar
code
This project is now stale, development (if any) will be made on http://gitorious.org/magicor First stable release. Minor bugfixes. Now with Windows support and some bug fixes. Files available for download. Getting ready for 1.0 release! Sign up for the SourceForge newsletter: You seem to have CSS turned off. Please don't fill out this field.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549429417.40/warc/CC-MAIN-20170727182552-20170727202552-00589.warc.gz
CC-MAIN-2017-30
343
7
https://www.programmableweb.com/api/imwallet-recharge?qt-top_most_menu_other_directories=3
code
Sorry, no developers found for this API. Sorry, no mashups for this API. Telstra Connected Things ||With the Telstra Connected Things API, developers can query details and network information for your Telstra IoT SIM connected to Telstra's CAT-M1 network (Australia's largest LPWAN network). This...||Mobile||04.15.2019| ||The Mutual-Fund API offers financial information associated with mutual funds. The API provides the latest Net Asset Values (NAVs) for a mutual fund or multiple mutual funds, and historical NAV...||Financial||04.14.2019| ETNA OMS WebSockets ||The ETNA WebSockets API allows developers low latency access to streaming data. Implementing the streaming client provides pushed messages for indicating quotes, orders, positions and other events...||Platform-as-a-Service||04.04.2019| ||This is an Order and Execution Management System API that reduces the complexity associated with online stock trading for robo-advisors and FinTech startups. ETNA API simplifies trade management...||Financial||04.04.2019| ||This is API access to the Nedbank developer portal to utilize Nedbank's payment functionalities to move funds, send money and receive money. All Nedbank developer APIs use OAuth 2.0 for...||Banking||03.29.2019|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526807.5/warc/CC-MAIN-20190418201429-20190418223429-00265.warc.gz
CC-MAIN-2019-18
1,238
9
https://teamtreehouse.com/library/creating-user-sessions-in-rails
code
Bummer! This is just a preview. You need to be signed in with a Pro account to view the entire video. Creating User Sessions in Rails14:51 with Jim Hoskins [Master Class] [Designer and Developer Workflow] [Creating the User Session] 0:00 So now, we've updated our form view where we can have our password 0:05 and password confirmation and our properly crypted password 0:09 will be stored in the database. 0:12 So, we can pretty much register and edit all the users. 0:14 So, the next step is to actually log in. 0:18 In order to log in, we'll be using a session, and a session is 0:21 a model that sort of handles a particular session. 0:25 So, when we log in, we'll be creating a new session for a user, 0:28 and when we log out, we'll be deleting a session. 0:32 So, it works just like our other models where we'll be creating and deleting things. 0:34 So, let's go ahead and generate our session. 0:39 So, we saw before that there is a generator that's installed with authlogic 0:42 called "authlogic session," and basically, we can use this to generate our user session 0:47 which is a session that authenticates a user. 0:53 So, we'll do "rails generate authlogic:session" 0:57 and we'll call this a "UserSession." 1:07 So, now it's gone ahead and created a file called "app/models/user_session.rb," 1:13 so let's go check that out, and here we are in app/models/user_session.rb. 1:18 Now, you'll notice this is a little bit different than our typical model. 1:25 It doesn't inherit from ActiveRecord base. 1:28 In fact, there is no database table for the user session. 1:32 The model itself is represented in the database, 1:35 so it can abstract away the actual logging in and logging out. 1:38 So instead, it inherits from Authlogic Session Base, 1:42 and that class provides us with a lot of functionality, 1:47 which will ultimately allow us to log in. 1:50 Now, since it's called a user session, it's assuming that 1:53 what it's going to be authenticating against is a user class, 1:56 which will act as authentic, which we've already gone ahead and set up. 2:00 So, those assumptions should be true. 2:05 So now, the steps are we're going to create a new controller for handling our authentication, 2:08 or handling our actual user sessions, and when we want to log in 2:13 we'll call the create method, and we'll generate a new user session 2:18 based on the authentication credentials that have been passed. 2:22 And if that's successful, then we'll have a new session where somebody is logged in, 2:26 and if it's not successful, it will redirect them back to the new user session screen 2:31 or the log in screen. 2:35 So, let's go ahead and generate a new controller for our user sessions. 2:37 So, we'll do "rails generate controller" and we'll call this "UserSessions," 2:41 and what I'm going to do is define a method called "new" which will be our log in, 2:52 and this will just generate a view for the new field, which is really the only 2:58 user visible action that the user sessions will implement. 3:02 So, if we run that, it's created a new controller called "user sessions controller," 3:06 and it's created a new view file under views/user_sessions/new.html.haml, 3:10 and that new .html file will be our log in page. 3:17 We'll go ahead and adjust our routes later so the route will look like /login. 3:21 So, let's go to our new user sessions controller because 3:27 it's just generated an empty controller. 3:30 What we have to do is now add the logic that we want to add to it. 3:32 So, let's go ahead, open up controllers, user session controller. 3:37 So, here it's generated a new method stub, and this is what's going to be called 3:42 when we go to usersessions/new, and what we need to do is 3:47 instantiate a new user session, and this will be useful because in our form 3:52 our user session instance is actually what we're going to be basing our form off of. 3:58 So, since we have a real object of the user session, 4:03 it allows us to treat it just like any other model in our application. 4:06 So, we'll just go ahead and say "@user_session = UserSession.new." 4:10 Then our new .html view will render and display an empty form for user session. 4:20 So, when that form submits or they hit log in and it submits, 4:28 that's going to go to create. 4:32 And this is the method where we're actually going to do our authentication. 4:35 So, in this create method is actually where we're going to do our authentication. 4:39 So, the first step is to get a user session instance. 4:43 This will be a lot like our new method. 4:46 We'll do "UserSession.new." 4:48 However, this time we've been passed in parameters, so we want to instantiate 4:52 our user session with the, let's say, email and password that were submitted. 4:56 So, to do that we'll just pass in (params[user_session]). 5:01 Now, this just looks like any other create method where we instantiate a new object 5:09 based on the parameters, and that's what's really great about authlogic 5:13 is it really has the same sort of pattern as any other model. 5:16 So, the next step is where the real magic happens. 5:21 We're going to try to save this user session. 5:24 So, we'll say "if @user_session.save," 5:26 and then there's going to be an else and end here. 5:33 So, when we try to save a user session, what authlogic does is it takes the information 5:37 that it was passed, basically our email and password, and it tried to find a user 5:42 who matches those credentials. 5:47 If it finds one and we save it, it will go ahead and say that we are authenticated 5:50 and return true, and it will set the cookie saying this person is logged in 5:55 so we can handle our true session here, so at this point they are logged in. 6:00 So, why don't we go ahead and just leave a flash here, 6:05 and this is just a notice at the top of the page, 6:09 so we'll say "flash(notice) = "Welcome to EasyJobs" 6:11 or something along those lines. 6:19 We can go ahead and change this easily later. 6:21 So, if we're logged in, we want to go ahead and redirect them somewhere. 6:23 So, we'll just say "redirect_to jobs_url." 6:25 Now, in this else clause here, we were not able to save our user session, 6:33 which means that based on the information that was passed in via params, 6:36 which I just realized I misspelled. 6:41 It is not "parms." 6:43 There we go. 6:45 Based on that information, we are not able to log in, so what we want to do is actually 6:47 go ahead and just render our new form again. 6:51 So, we'll say "render action of new" and what this does is 6:54 since we have our @user_session set with the information that was submitted 7:01 when we render this new action here, it will actually prepopulate the email field 7:06 with what they pass through. 7:12 The actual password field should be blank because we don't want to pass 7:14 the password back to them, but it's a nice little tip that we will be able to give 7:17 to the user that you don't have to enter your email again, or you can review it. 7:21 So, this handles our logging in. 7:25 Basically, with the user session we just pass it some information like email and password. 7:27 If it saves, they're logged in. 7:31 If not, they need to try again, and destroying is pretty much the same thing. 7:34 When we log out, we want to go ahead and destroy this user session. 7:40 So, we'll define destroy. 7:47 So, how do we find our current user session? 7:50 Well, this is code that we're going to need throughout the entire application. 7:54 We're going to need to be able to search for the current user session 7:57 and the current user in order to, for instance, display who's logged in, 8:00 to perform authorization checks to see if they're allowed to perform certain actions. 8:06 So, what we're going to do is write different methods, and we'll save them 8:10 in our application controller so they're available to us at any place in our application. 8:13 So, we're going to take a break from writing our user sessions controller 8:17 to go to our application controller, and our application controller 8:21 is in app, controllers, application controller. 8:25 So here, we're going to define two private methods. 8:30 So, we'll define private and down here is where we'll define our method. 8:33 The first method we want to do is current user session, "current_user_session." 8:38 And we'll define another method which will be current user, 8:46 and where current session will actually retrieve the current user session 8:52 more often we actually want the user that's associated with the session, 8:56 so this convenience method "current_user" will provide that. 9:00 Now, the way we can get the current user session is by using the user session 9:04 class method called "find," and authlogic will use its ways to find out 9:08 if there is a current user session and return that instance to you if it exists, otherwise no. 9:13 Now, while this will technically work, we may be calling current user session 9:18 multiple times in our request. 9:23 So, what we want to do is make sure we're not calling user.find all the time. 9:26 Instead, we want to cache or memoize the result into an instance variable 9:29 so we're not calling user.find over and over again. 9:34 So, the first thing we'll do is we'll say "@current_user_session = UserSession.find." 9:37 So, after the first time we've called it, @current_user_session is defined. 9:47 So, if we call it a second time, what we want to do is check if @current_user_session 9:51 has been defined and if so, we want to return that since we already did the find call on it. 9:55 We can just return the cached result, otherwise we'll actually want to do 10:01 the User.Session find here. 10:06 So, what we'll do is we'll say "return @current_user_session" 10:09 if we have current user session defined, so we'll do "defined?(@current_user_session). 10:16 Another reason we can't just say "return @current_user_session 10:26 if @current_user_session" is because if they are logged out, 10:29 current_user_session will be nil and it will try to reevaluate User.Session.find every time 10:33 if somebody's logged out. 10:40 So, this is just a way of us caching so don't have to call User.Session.find 10:42 over and over again if we call current user session over and over again. 10:45 Now, let's say we want to get the current user. 10:49 Well, to do that we will need to get the current user session, 10:51 so we can just type in "current_user_session" and call that method, 10:54 and we can call ".user" on it. 10:59 Now remember, if somebody's logged out, current user session will be null 11:02 and if we try to call user on that, well, we're going to get an error. 11:05 So, what we need to do is check if current user session is true 11:09 or a truthy value or just not nil. 11:14 So, by using this here, we'll say "current_user_session," make sure it's true. 11:17 If it is, then we'll call "current_user_session.user." 11:21 Now, if current user session is false or they're logged out, 11:24 when this evaluates to nil, or false rather, it will not evaluate this side 11:27 so we won't get an error. 11:32 Now you can see that we've called current user session twice in quick succession, 11:35 which is why this caching is important. 11:38 Again, we don't want to continue doing this over and over again, 11:41 so let's implement the same sort of caching, so let's implement 11:43 the same sort of value caching here that we did here. 11:46 So, instead of just returning, we'll return it while setting it to current user, 11:49 and then before we try to do that, we'll say 11:57 "return @current_user if defined?(@current_user)." 11:59 So now, from anywhere in our controller we could type in "current user," 12:08 and if somebody's logged in, we'll get a user instance of the person who's logged in, 12:11 and if they're not logged in, then we'll get nil. 12:15 We could do the same thing for current user session if we actually wanted 12:18 to get the session which we actually do in our log out method. 12:21 Now, before I switch away from this, there is one last thing I want to do. 12:25 So, we'll call helper method and pass it the symbol "current_user_session" 12:33 and "current_user." 12:39 What this does is it makes the methods current user session and current user 12:43 available in our views as helper methods because quite often in our views 12:46 we're going to want to access current user. 12:51 So now, we can go ahead and save that out. 12:53 So, let's just hop back to our user sessions controller 12:56 to see if we can't implement destroy now. 12:59 Well, now, this is as simple as doing "current_user_session.destroy." 13:01 Now, you'll realize that if somebody's logged out already then current user session 13:11 will return null and trying to call destroy on it will cause an error. 13:15 Now, there's a couple of different ways we could solve this. 13:20 The most correct, in my opinion, way to do this would be to restrict the destroy method 13:22 so it's only visible to people who are logged in, and that will happen 13:28 when we start doing our authorization. 13:32 Right now what I want to do is just to make sure we don't get this error, 13:35 I'm going to call "current_user_session && current_user_session.destroy." 13:38 That way, if there is no current user session, the destroy method will not be called. 13:46 No harm, no foul. 13:51 It will be a little bit weird to log out while you're logged out, but right now it avoids the error. 13:53 So, then I'm just going to go ahead and just type in "flash[:notice]" 13:59 and just say "You are now logged out." 14:04 And let's go ahead and just redirect to the jobs url again, the home page. 14:11 So, now we've got the controllers and models for our session set up. 14:18 We have a user session which handles all of the logic of logging in 14:21 and authenticating the user. 14:25 We have the user sessions controller which will ultimately 14:27 be our log in and log out controller. 14:30 We still need to create the views for it, and in our application controller 14:32 we've created a couple of methods that will allow us to get the current session 14:36 and the current user. 14:39 So, up next we're going to go ahead and jump towards the front end 14:41 and create our log in form and some information that will be displayed 14:44 when you're logged in or when you're logged out. 14:48 You need to sign up for Treehouse in order to download course files.Sign up
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657151761.87/warc/CC-MAIN-20200714212401-20200715002401-00368.warc.gz
CC-MAIN-2020-29
14,492
4
https://www.techrepublic.com/forums/discussions/access-to-folders-via-groups-in-ad/
code
Access to folders via groups in ADLocked I have created a global group in AD, lets call it MemberGroupFolder. And I have created a Domain Local Group, FolderAccessGroup in AD. The MemberGroupFolder is a member of the FolderAccessGroup I have given full access rights to the Folder to FolderAccessGroup, and if I check the “Effective Permissions” in the Advanced section of the Security tab, I can see that my user has all the rights necessary to create folder, files and modify all the content of the given folder. But when I try to create a folder, I get an error messages that states “Cannot create “FolderName”. No Access” The domain runs in windows 2000 native mode, but I thought it was suppose to handle nested groups. What am I forgetting? If i put the members directly in the FolderAccessGroup, they do get access, but not if they are in the MemberGroupFolder. Any good suggestions?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662604495.84/warc/CC-MAIN-20220526065603-20220526095603-00655.warc.gz
CC-MAIN-2022-21
902
9
https://benjamin.smedbergs.us/blog/2008-06-24/mozilla-build-tricks-viewing-preprocessed-source/
code
More in the occasional series of tricks you can do with the Mozilla build system. Making Preprocessed Sources If you have a compile error and you can’t figure out what macros are being expanded, you can make a preprocessed version of any C/C++ file: $ cd $OBJDIR/some/directory $ make nsMyFilename.i Using Doxygen to Generate Documentation You can use the documentation-generation tool Doxygen to automatically generate interface/class/method documentation from the Mozilla sources. $ cd $OBJDIR $ make documentation Warning: doxygen isn’t especially precise. Your mileage may vary. Displaying a Build Variable Sometimes when hacking a Makefile it may not be obvious what the final value of a variable is. You can check this by using the echo-variable-% rule: $ cd $OBJDIR/some/directory $ make echo-variable-EXTRA_DSO_LDOPTS
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00060.warc.gz
CC-MAIN-2022-33
829
11