url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.cellula.com/upcoming-events/2018/10/31/creating-a-thriving-underwater-ros-community
|
code
|
Robot Operating System or ROS is rapidly becoming the de-facto standard in robotics middleware in academic circles. However, ROS is only now making significant in-roads into the Unmanned Underwater Vehicle (UUV) world among the less research oriented and more operational groups. There appears to be a rapidly growing critical mass that could allow for the formation of an underwater ROS community. This workshop will explore ways in which that community may be formed and nurtured.
Cellula software engineer, Mike Borghardt, will be attending the event. If you would like to schedule a meeting, please arrange a time with us.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986717235.56/warc/CC-MAIN-20191020160500-20191020184000-00165.warc.gz
|
CC-MAIN-2019-43
| 626
| 2
|
https://init.solutions/blog/2018/11/29/debug-ionic-apps-installed-on-device-using-google-chrome/
|
code
|
Run following command on terminal –
ionic cordova run --device --debug
Next it will ask platform, example android
Then Open chrome and Web Inspector in chrome, and follow below menu path.
From right side menu “Customize and contorl DevTools” -> More tools -> Remote Devices
It will show list of devices, click on your device, it shows apps you can debug, click on your app.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710813.48/warc/CC-MAIN-20221201121601-20221201151601-00035.warc.gz
|
CC-MAIN-2022-49
| 379
| 6
|
http://www.carolinahuddle.com/boards/topic/83745-who-is-more-importantluke-or-cam/
|
code
|
Who is more important...Luke or Cam?
Posted 04 February 2013 - 12:01 AM
Posted 04 February 2013 - 12:03 AM
Posted 04 February 2013 - 12:12 AM
Posted 04 February 2013 - 12:13 AM
Posted 04 February 2013 - 12:21 AM
To me, that's like asking what's more important between offense and defense.
You have to have both.
When I saw the thread title, I wanted to come in here and ask how anyone could.even ask that question.
Thank God Scot was here to speak the truth so quickly.
Posted 04 February 2013 - 12:25 AM
My team building philosophy has always been that the lines should be addressed first, so I'll differ some.
Posted 04 February 2013 - 12:31 AM
You can find good NFL lbs working in your local walgreens.
This is a stupid question.
Having an elite NFL QB is your ticket to a yearly shot at the super bowl. Having an elite NFL LB puts you in a hotly contested debate with fans of all the other 20 teams who didn't make the post season every January about whose LB is best rather than watching the teams with elite QBs battle it out for the big game
It's like asking if you'd rather have a tree that makes gold or a 5 dollar bill. Dumbest question I've seen on here in some time.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936468536.58/warc/CC-MAIN-20150226074108-00133-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 1,250
| 19
|
https://codingprolab.com/product/eece5644-homework-2/
|
code
|
Question 1 (30%)
Problem 2.13 from the textbook (included in the next page).
Question 2 (35%)
Write a function that generates a specified number of independent and identically distributed
samples paired with the class labels that generated these samples. Specifically, the data distribution
is a mixture of Gaussians with specified prior probabilities for each Gaussian class conditional pdf,
as well as respective mean vectors and covariance matrices. Generate and visualize data in the form
of scatter plots, with a color/marker based identification of the class label for each sample for each
of the following cases (using Matlab syntax for 2×2 matrices):
1. Number of samples = 400; class means [0,0]
; class covariance matrices both set
to I; equal class priors.
2. All parameters same as (1), but both covariance matrices changed to [3,1; 1,0.8].
3. Number of samples = 400; class means[0,0]
; class covariance matrices[2,0.5; 0.5,1]
and [2,−1.9;−1.9,5]; equal class priors.
4. Same (1), but prior for class priors are 0.05 and 0.95.
5. Same (2), but prior for class priors are 0.05 and 0.95.
6. Same (3), but prior for class priors are 0.05 and 0.95.
Make sure your plots include axis labels, titles, and data legends. Describe how your sampling
procedure works, using zero-mean identity-covariance Gaussian sample generators.
Additionally, for each of these datasets, use the maximum-a-priori (MAP) classification rule
(using full knowledge of the respective data pdfs) and produce inferred class labels for each data
samples. In accompanying visualizations, demonstrate scatter plots of the data for each case along
with their inferred (decision) labels. For each case, count the number of errors and estimate the
probability of error based on these counts.
Question 3 (35%)
For the datasets you generated in Question 2, implement and apply the Fisher Linear Discriminant Analysis classifier with the decision threshold for the linear discriminant score set to minimize
the smallest probability error you can achieve on the specific data sets generated for each case. Visualize the one-dimensional Fisher LDA discriminant scores and decision labels for each sample
in separate plots for each case. Note: We will soon discuss the principle of cross-validation that
dictates parameter selection and performance assessment must use independent datasets.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00646.warc.gz
|
CC-MAIN-2023-40
| 2,364
| 31
|
https://www.syncfusion.com/forums/181743/datasource-based-diagram-not-updated-if-data-changes
|
code
|
BoldDeskWe are launching BoldDesk on Product Hunt soon.
Learn more & follow us.
my diagram uses DataSource which is defined in DataSourceSettings.
The DataSource property refers to ObservableCollection.
My expectation was that if I change the ObservableCollection at runtime the digram updates accordingly.
However this is not the case.
Also I tried to call the method RefreshDataSource(), but this did not have any effect either.
Kindly let me know how I can dynamically update the diagram if using an ObservableCollection as its datasource.
We have created and attached a sample for your requirement to change the ObservableCollection at runtime, and the diagram updates accordingly. Please find the sample in the following link.https://github.com/SyncfusionExamples/Blazor-Diagram-Examples/tree/master/Samples/CollectionChangeInDataSource/CollectionChangeInDataSource
I hope this sample will satisfy your requirements. If you still have problems achieving your requirements, kindly explain them in more detail; this will help us provide a solution.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00864.warc.gz
|
CC-MAIN-2023-50
| 1,051
| 10
|
http://www.eecs.berkeley.edu/Research/Projects/2010/106866.html
|
code
|
CMOS Circuits for MEMS Aluminum Nitride Inertial Sensors (MINT)
Bernhard Boser, Richard Przybyla, Igor Izyumin and Mitchell Kline
Defense Advanced Research Projects Agency
Aluminum Nitride (AlN) is a piezoelectric material that has gained widespread use in filters for mobile phones. However, AlN is also a promising material for use in MEMS sensors because of its mechanical properties and low temperature, CMOS-compatible deposition. In this project, we are working with multi-disciplinary team to develop AlN micromachined ultrasound transducers, AlN accelerometers, and AlN gyroscopes. The piezoelectric properties of the material yield performance benefits over the standard, electrostatic MEMS because they do not require bulky comb drives and do not suffer the same non-linearities. In the last year, we have demonstrated an AlN accelerometer and a velocity sensor with sub-mm/sec resolution based on an AlN ultrasound transducer.
Figure 1: Scanning Laser Doppler Vibrometer showing the out of plane motion of a z-axis Aluminum Nitride accelerometer.
Figure 2: Optical photograph of array of Aluminum Nitride piezoelectric micromachined ultrasonic sensors.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00039-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 1,163
| 6
|
https://community.zapier.com/troubleshooting-99/how-do-i-setup-a-zap-to-automatically-send-a-gmail-once-per-week-to-a-specific-person-with-google-sheet-as-an-attachment-19082
|
code
|
I am new to Zapier & need some epert help!!
I have a zap for exporting leads from my facebook ads to a google sheet.
Now I want to setup a Zap for to automatically send a gmail once per week to a specific person with that google sheet as an attachment.
Can anyone help me out!!
Thanks a mil
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00263.warc.gz
|
CC-MAIN-2023-50
| 290
| 5
|
https://lists.macports.org/pipermail/macports-dev/2017-January/035260.html
|
code
|
question for the "base gurus"
René J.V. Bertin
rjvbertin at gmail.com
Wed Jan 25 09:10:08 UTC 2017
On Tuesday January 24 2017 19:14:28 Brandon Allbery wrote:
>On Tue, Jan 24, 2017 at 6:53 PM, René J.V. Bertin <rjvbertin at gmail.com>
>> 0775 (00000001:11111101) turning into 0255 (0000000:10101101), there's no
>> logical explanation (involving umask()) for that, is there?
>That is what you'd get if the *umask* were 0255.
Why yes indeed, but then the question becomes why the umask would sometimes get set to 0255. Does that sound like a value that base might use in certain conditions? I never use umask myself, one of those things I shoot myself in the foot with too easily.
The setmode() manpage warns about transient changes to umask (on Linux and OS X) but the only evidence I find for that (in v. 0.8.3) is this:
* Get a copy of the mask for the permissions that are mask relative.
* Flip the bits, we want what's not set. Since it's possible that
* the caller is opening files inside a signal handler, protect them
* as best we can.
(void)sigprocmask(SIG_BLOCK, &signset, &sigoset);
(void)umask(mask = umask(0));
mask = ~mask;
(void)sigprocmask(SIG_SETMASK, &sigoset, NULL);
I don't know what the umask() function does internally but I'd hope that would be one of the more exhaustively tested (and no-longer-evolving) system functions. Maybe the old-style obfuscated-C like umask() statement can confuse modern-day optimisers in such a way that the operation has side-effects under stress? Sounds unlikely, no?
Am I missing a reason why the umask() function would interact with the filesystem?
More information about the macports-dev
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178364008.55/warc/CC-MAIN-20210302125936-20210302155936-00052.warc.gz
|
CC-MAIN-2021-10
| 1,644
| 22
|
http://www.typologycentral.com/forums/general-psychology/69781-morals-sense-justice-2.html
|
code
|
So in this case, if it seems so you may end up to that suspect record under the label "possible organized crime member". Also in my country there should be arrangement to treatment for these people, but i know that this happens rarely.
So in the criminal record you may get accurate info of what you did. But in the other records there can be anything.
All this is wrong in my opinion, but ordinary citizen cannot access to the other records and see what has been written from him/her.
And i still hope those who answer the poll "something else?" would explain what that would be.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00453-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 580
| 4
|
https://www.saashub.com/git-webui-new-alternatives
|
code
|
A simple Gitweb replacement built with Django.
A fast and light git client for Mac with Finder integration
GitBucket is the easily installable open-source GitHub clone written with Scala.
Modern Publishing, Simply taking your books from ideas to finished, polished books.
Pure Java Git solution for managing, viewing, and serving Git repositories
Set up your own self hosted git server on IIS for Windows.
An extension to ActivityPub for web-based Git services federation.
Create, review and deploy code together with GitLab open source git repo management software | GitLab
A painless self-hosted Git service
SourceForge is a web-based source code repository.
EasyMercurial is a simple user interface for the Mercurial distributed version control system.
Fast and Friendly Git Client for Mac
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371637684.76/warc/CC-MAIN-20200406133533-20200406164033-00305.warc.gz
|
CC-MAIN-2020-16
| 792
| 12
|
https://imaginelayout.com/keynote_diagrams-template-5083/
|
code
|
Disintegration Arrows Keynote diagram templates for use in the presentation. This template allows you to quickly use it as intended. The main goal - analysis of any business activity, market.
A Disintegration Arrows diagram is a quality management tool based on identifying logical relationships between different data. This Keynote presentation tool is used to define and demonstrate goals:
The Disintegration Arrows Keynote diagram provides a structured approach to analyzing complex interactions, which is its strength. Decorated with diagrams for a presentation of an overview of the rice, or letting the mother know about the area in which she won't get stuck.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00733.warc.gz
|
CC-MAIN-2023-50
| 665
| 3
|
https://www.freelancer.com/projects/Software-Testing-Website-Testing/software-repost/
|
code
|
2) the plece where people look for a job and where the information is keep
that included the personal information of every personan and the reports of testers
3) one space for articles
4) salary studies
it create many profiles of vacancies of many diferentes companies
and the system must calculate the value of every salary
the administrator create the system value, the system just have
to compare in some tabs and take the value and make a graph.
the web site must be make in PHP and you have to take care about security ways to keep the information.
I will provide in JPG, one prototype of the principal screens but maybe you must to proposal some one.
it has a store on line.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805114.42/warc/CC-MAIN-20171118225302-20171119005302-00487.warc.gz
|
CC-MAIN-2017-47
| 680
| 11
|
https://androidforums.com/threads/lg-motion-camera-issue.671030/
|
code
|
After I quit laughing and tried to figure out if our interpretation is what the OP was attempting to articulate, I realized what he meant. I'd like to know the answer to this too, but more specifically. When I take a picture horizontally, or vertically and then upload it, it doesn't always come out orientated the way I took it. It's as if the accelerometer isn't doing it's job in the end. I then have to rotate the picture to fix it's orientation. How is this fixed?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647459.8/warc/CC-MAIN-20230531214247-20230601004247-00043.warc.gz
|
CC-MAIN-2023-23
| 469
| 1
|
http://www.hotukdeals.com/vouchers/30-discount-at-gap-1-week-only-26-november-11056
|
code
|
Instructions:Download the following voucher image and print out:
There was a similar voucher a couple of months back which worked for me. That one appeared to be employer related and on one of the 2 ocassions I was asked by the store who I worked for. The answer was Barclays. Be prepared in case it is the same. This voucher reached me by e-mail but it's original source is unknown to me. Perhaps someone else can enlighten us.
Update: I have been able to confirm that this voucher is intended for employees of large corporations and was e-mailed out to them.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425737.60/warc/CC-MAIN-20170726002333-20170726022333-00352.warc.gz
|
CC-MAIN-2017-30
| 560
| 3
|
https://ask.csdn.net/questions/849145
|
code
|
href in your CSS is a relative link. So for www.example.com/user the browser will request the css file at www.example.com/webpage.css, but for www.example.com/user/contact it will request www.example.com/user/webpage.css
That may cause part of your problem and can be fixed by preceding your hrefs with a /, so
href="/webpage.css". The / will cause the browser to always request from the root of your domain so it will always request www.example.com/webpage.css regardless of the page you're on. If your css is inside some folder within your DocumentRoot (I assume you're using Apache here), you should be providing the full path to the file from the start of the doc root so possibly something like
In the comments, Michael is also correct that you may have a rewrite rule error so please add that information to your question.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064520.8/warc/CC-MAIN-20210411144457-20210411174457-00568.warc.gz
|
CC-MAIN-2021-17
| 828
| 4
|
https://developer.mozilla.org/en-US/docs/web/api/iirfilternode
|
code
|
IIRFilterNode interface of the Web Audio API is a
AudioNode processor which implements a general infinite impulse response (IIR) filter; this type of filter can be used to implement tone control devices and graphic equalizers as well. It lets the parameters of the filter response be specified, so that it can be tuned as needed.
|Number of inputs
|Number of outputs
|Channel count mode
|Same as on the input
Typically, it's best to use the
BiquadFilterNode interface to implement higher-order filters. There are several reasons why:
- Biquad filters are typically less sensitive to numeric quirks.
- The filter parameters of biquad filters can be automated.
- All even-ordered IIR filters can be created using
However, if you need to create an odd-ordered IIR filter, you'll need to use
IIRFilterNode. You may also find this interface useful if you don't need automation, or for other reasons.
Note: Once the node has been created, you can't change its coefficients.
IIRFilterNodes have a tail-time reference; they continue to output non-silent audio with zero input. As an IIR filter, the non-zero input continues forever, but this can be limited after some finite time in practice, when the output has approached zero closely enough. The actual time that takes depends on the filter coefficients provided.
Creates a new instance of an IIRFilterNode object.
This interface has no properties of its own; however, it inherits properties from its parent,
You can find a simple IIR filter demo live on Codepen. Also see the source code on GitHub. It includes some different coefficient values for different lowpass frequencies — you can change the value of the
filterNumber constant to a value between 0 and 3 to check out the different available effects.
Also see our Using IIR filters guide for a full explanation.
|Web Audio API
BCD tables only load in the browser
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816586.79/warc/CC-MAIN-20240413051941-20240413081941-00878.warc.gz
|
CC-MAIN-2024-18
| 1,867
| 22
|
http://www.fmod.org/questions/question/forum-1505/
|
code
|
To detect a hard end shouldn’t be to hard, and could be modified to find a fade out as well.
Use a callback to analyze the buffer, you’ll be looking for the “graph” of how the ending 3 to 5 seconds is. If the graph drops fast, then its a hard end, if its a gradual drop then its a fade.
I hope I’m correct on this, but silence would return zero’s for the buffer, so you’ll be looking at how fast (the step say of) the samples.
Doah! You can use the VU to get the volume (Geez I feel stupid) and just analyze how fast it goes to silence!
Now if you want to know this before the song gets to the end, then you need to use a buffer and analyze the information as I said before. Remember, the buffer returns floating point values from -32647 to +32648.
- NiteBeast answered 17 years ago
- You must login to post comments
Please login first to submit.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742117.38/warc/CC-MAIN-20181114150002-20181114172002-00360.warc.gz
|
CC-MAIN-2018-47
| 860
| 8
|
http://stackoverflow.com/questions/1313360/writing-a-text-file-from-vb-net-encoding-problem
|
code
|
I am writing an application that must generate a plain Text file with fixed sized columns.
my current code is:
Dim MyFilePath As String = Path & FILE_PREFIX & FileNr & ".TXT" IO.File.Delete(MyFilePath) Dim FileStr As New IO.StreamWriter(MyFilePath, False, <ENCODER HERE>) Do While r.Read FileStr.WriteLine(r("TXTLine")) Loop FileStr.Close() r.Close()
My problem is that i have some special characters like: "ñ", "à", etc, and i can't find the right encoding.
- If i use default, then it replaces "ñ" with 2 characters.
- If i use ASCII then all special Characters end up as: "?"
- If i use UTF-8 then all text is ok, but it add a "ÿ" in the first byte of the file.
I need the special characters to be writed in the textfile just as they came in the datareader. And i can't have extra characters added becouse columns are of fixed lenght..
What could i do?
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299236.74/warc/CC-MAIN-20150323172139-00284-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 878
| 10
|
https://web.stagram.com/tag/woshe
|
code
|
I began that sketch in november 2016. Just did the S and the H. Few days ago, I got back to it and it was sooo hard to find the same flow again. The W and the O were first too steady, with no movement at all. Then, they were too close from each other, compared to their sisters. Finally, I found this formula... But I guess colours help a lot to hyde problems.
#woshe #blackbook #alphabeatz #lettering #lettersfirst #nevergiveup
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948542031.37/warc/CC-MAIN-20171214074533-20171214094533-00468.warc.gz
|
CC-MAIN-2017-51
| 428
| 2
|
http://www.societyofrobots.com/robotforum/index.php?topic=8257.0
|
code
|
I have an 6 DOF hobby arm robot (wrist=3DOF). I want to program it with quaternions.
Because this has more advantages.
Can anyone tell me where good info is on the forward and inverse transformation ?
Or is there a way to work with quaternions and translations combined to do the kinematics ?
I have previously programmed the forward- and inverse kinematics of an 4 DOF arm
robot with matrices. See: http://www.lynxmotion.net/viewtopic.php?t=4452
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00128-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 446
| 6
|
http://sofla-live.livejournal.com/11019.html
|
code
|
PALM BEACH COUNTY MUSICIANS
i'm trying to start a band. for right now one guitarist, or one bassist, or anything at all would be good. i'm really serious about this. get at me, please. any music you like, i don't mind.
email: email@example.com or firstname.lastname@example.org
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00153-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 277
| 3
|
http://www.linuxforums.org/forum/applications/185399-my-photos-have-been-hijacked-shotwell.html
|
code
|
Results 1 to 3 of 3
Enjoy an ad free experience by logging in. Not a member yet? Register.
My photos have been hijacked by shotwell
Registered Linux user #526930
- Join Date
- Nov 2011
- New Zealand
If you don't like Shotwell then you could remove it, from a terminal window, via
sudo apt-get remove shotwell
Otherwise you could keep Shotwell and right-click on an image file, choose "open with" from menu, then select the gnome image viewer as the app to open your image with and also select it as the default app for those types of files. You may have to repeat this for each different image file format though.
I had tried the properties, open with, but it kept resetting itself to shotwell. Guess I will try and remove shotwell. Thanks.
update: Removing shotwell worked, now my photos open as I want them. Shotwell was part of an update I guess, not my choosing.
Last edited by MASONTX; 12-20-2011 at 11:33 AM. Reason: updateRegistered Linux user #526930
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122739.53/warc/CC-MAIN-20170423031202-00441-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 958
| 13
|
https://preview.npmjs.com/package/machinepack-ioredis
|
code
|
Wait! You might not want to use machinepack-ioredis in your app! This package contains relatively low-level functionality, and it is designed to provide building blocks for packages that expose higher-level abstractions. To use Redis for implementing caching in your Sails app, please use sails-ioredis2 instead of this package.
If you have questions or are having trouble, click here.
To report a bug, click here.
The tests can run using a one off docker container (@see
.test-env.dockerfile for such a test container)
Please observe the guidelines and conventions laid out in the Sails project contribution guide when opening issues or submitting pull requests.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400187354.1/warc/CC-MAIN-20200918061627-20200918091627-00553.warc.gz
|
CC-MAIN-2020-40
| 663
| 6
|
http://stackoverflow.com/questions/18661409/where-when-can-i-add-something-to-the-uiwindow-in-my-uiviewcontroller
|
code
|
I am trying to add a view to my
UIWindow so that it stays up there even if my
UIViewController goes away. I right now I am adding a
UIView in my init method and I also tried my
viewDidLoad method, but in both of them my
self.view.window is nil.
If I use my same code in a tap method, the
UIWindow is inited and the
UIView gets added.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064538.31/warc/CC-MAIN-20150827025424-00149-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 333
| 9
|
https://www.wareable.com/wearable-tech/microsoft-smart-ring-patent-6612
|
code
|
A patent has been uncovered which suggests Microsoft is exploring the possibility of a smart ring, complete with fitness tracking and gesture control.
The filing concerns a ring working in a similar manner to a basic wearable on the wrist, giving the user the ability to pay through NFC, receive notifications from their connected smartphone and even track activity and heart rate.
Read this: How the Microsoft Band may live on
Unlike many patents we come across, the reference to the device isn't made in passing, with detailed descriptions of the smart ring. Within the listing, Microsoft notes how the 'finger band' (its wording, not ours) would be configured to accommodate a user's finger. That means that pressure sensors would recognise the finger and configure itself to sense changes in the tendons of the finger, and thus be able to recognise different gestures.
As the image in the filing suggests, the Microsoft ring's gestures would be used to control external smart devices, such as phones, digital displays, smartwatches and even smartglasses. Battery life is also hinted at in the description of the smart ring, with the company suggesting that, in one case, "using a 10 mAh battery powered by energy harvested from an NFC-enabled smart phone, the ring could support more than 10 hours of active user interactions."
Now, of course, it's important to keep in mind some of the context here. Firstly, this is only a patent, which means the contents are fairly unlikely to ever see the light of a production line. And secondly, this is Microsoft we're talking about.
While the company has been quite involved in exploring alternate realities through the Windows Mixed Reality series and its own Microsoft HoloLens headset, it's been tapped out of traditional wearables since discontinuing the Microsoft Band back in 2016.
If it was to re-enter the scene, a smart ring would be quite a left-field way of doing so. However, what this does tell us is that it's at least a consideration over at Microsoft HQ, and only time will tell if it chooses to make this one a reality.
Source: Windows Latest
How we test
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00651.warc.gz
|
CC-MAIN-2023-50
| 2,117
| 10
|
https://www.translegal.com/dictionary/en/collateral/noun
|
code
|
Definitions of collateral
assets (=something valuable) that you promise to give someone if you cannot pay back money that you owe them
We used our house as collateral for the loan.
This is a limited preview — please sign in or subscribe to learn everything we know about the term “collateral”.
Phrase Bank for collateral
Additional Notes for collateral
A video describing the term “collateral”.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347435987.85/warc/CC-MAIN-20200603175139-20200603205139-00337.warc.gz
|
CC-MAIN-2020-24
| 404
| 7
|
http://www.swedishvallhund.com/how-do-i-remove-win32-virus/
|
code
|
How do i remove win32 virusRaven 11/06/2016 14:30:56
Simply follow these steps to remove backdoor. Blnk virus removal. Tweaking. System mechanic professional 7.5. Hello, 2016 how to your windows malware. More information about the seventh edition of worrying about win32/phorpiex. Remove the trojan: software do not use below tool and worm is hmm i remove sobig. Simply follow these steps stay safe and redirects browser hijacker. , 2016 how do not use below tool and we show you slashdot: win32/polyglot. Sep 30, 2016 you don t want to use below tool designed to do that shows troublesome advertisements and it on our rds farm. Win32/Fakesysdef manifests as normal and other malware or a! More time enjoying your computer. Pc: pup from the threat autorun.
Is a missing files back without pay for serfe be cleaned once before posting. A laptop to access virustotal. To save editor v1 test release. .. A virus win32: this is hmm i had a virus: 1 system mechanic professional 7.5. , 2016 the second infected with other malware? Latest; win32. 3 a virus locked laptop to keep data protected from microsoft genuine pc.
Trojan-Ransom. Blnk virus name and free rootkit virus? Microsoft toolkit same for technology related news from startup programs. Hiren's bootcd 15.2 http://themorecard.hk/ duration: common se. Hpcmpmgr. .. Portable tool designed to the developer faq, 2016 we show you have a alert virus. Reset a heavy slant towards linux mint is a tool and how to get rid of malware infection that matters. Do lots of an adware from spywares menu skip to remove tee support forum category. Ac or win32. Remove rootkit virus. F worm; hacker group; only; posted by this virus needs to google chrome.
How do i remove the fbi virus from my laptop
My computer. Com -. Microsoft toolkit same for technology related to remove an adware program can remove malware from startup programs. After windows 10 upgrade. Read 25552 times c: news with windows. Has anybody else also, 2016 they requires to save your pc. So i wake up and. Nicely's research code 9uwxx400d; technical information; spyware; only god knows how do is win32.
Downloads 190unlocker. Also have some additional directories, see the week in one tips updating your devices instead of the trojan: win32/vundo. Exe and extension presented by step 1:. Where to get into the virus, covers general topics about win32/phorpiex. Reset a lots of distributed computing experiment virus win32. Clicksor. Adware issue and free trojan: win32/polyglot. Program can be the pc: tool and cpus: common appdata serfe be alert level: xda xda-developers. Rebooting the nginx virus removal tool designed to hamper.
Wininfos virus removal guides. Net is a virus; spyware and how do now; kovter. The subreddit. Clicksor. System mechanic professional 7.5. More time enjoying your web browsers deluging with a discussion on your virus? Steps should i remove trojan virus removal guide for x86 processors. Trojan: win32/xadupi quickly to be able of an adware: win32/skeeyah. Dll error when i remove it would recommend to remove one bootable cd which can t want to remove startup programs. Virus infection that shows troublesome advertisements and protected yahoo mail? Downloader. Oct 03, 2016 how to remove sobig. Com - here are the eset program files to specify this was looking at some additional directories, cleanup. Top five most common se.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027323246.35/warc/CC-MAIN-20190825084751-20190825110751-00431.warc.gz
|
CC-MAIN-2019-35
| 3,374
| 8
|
https://www.monsterindia.com/search/python-development-jobs-in-delhi-ncr
|
code
|
We are looking for a curious and collaborative individual to join our fast-growing augmented reality team. In your role as an Unity Developer, you will be able to work on exciting projects for game development, advertising, sports and film. Y
We are looking for an individual with an appetite for emerging and enabling technologies, such as Game development, AR, and advanced computer vision.You will be working with the most advanced computer ios computer vision and machine learning .
Honeywell is charging into the Industrial IoT revolution with the establishment of Honeywell Connected Enterprise (HCE), building on our heritage of invention and deep, on-the-ground industry expertise.
Support and maintain remote end-users’ requests for hardware and software issues and apply the IT policies and procedures to ensure a smoothly running environment. Able to program using standard python frameworks based on based on the requirement.
Promote and sell company's products, that's medical equipment. Customers can include doctors, nurses and pharmacists. They will increase product awareness, answer queries, provide advice and introduce new products.
This role will focus on creating sales opportunities in the SAARC region. This role will be focused on the researching client business referrals, network, and web leads; provide prospective customers/clients.
Python Developer responsibilities include writing and testing code, debugging programs and integrating applications with third-party web services. To be successful in this role, you should have experience using server-side logic and work well.
Responsible for adapting a brand strategy for a company's target market, Maintain brand integrity across all company marketing initiatives & communications & manage a portfolio of products. New Product Development includes R&D, Packaging Development
Business development executive is a person who is responsible for the growth of the business. The main job of the Business development executive is to find new targets and leads to promote the sales and services of the company or organization.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038492417.61/warc/CC-MAIN-20210418133614-20210418163614-00119.warc.gz
|
CC-MAIN-2021-17
| 2,101
| 9
|
https://simpleinjector.org/ReferenceLibrary/html/T_SimpleInjector_SimpleInjectorMvcExtensions.htm
|
code
|
Extension methods for integrating Simple Injector with ASP.NET MVC applications.
Assembly: SimpleInjector.Integration.Web.Mvc (in SimpleInjector.Integration.Web.Mvc.dll) Version: 4.10.2
public static class SimpleInjectorMvcExtensions
<ExtensionAttribute> Public NotInheritable Class SimpleInjectorMvcExtensions
Thetype exposes the following members.
Returns all public, non abstract, non generic types that implement IController and which name end with "Controller" that are located in the supplied assemblies.
Registers the MVC IController instances (which name end with 'Controller') that are declared as public non-abstract in the supplied set of assemblies.
Registers a IFilterProvider that allows filter attributes to go through the Simple Injector pipeline (https://simpleinjector.org/pipel). This allows any registered property to be injected if a custom IPropertySelectionBehavior in configured in the container, and allows anyinitializers to be called on those attributes. Please note that attributes are cached by MVC, so only dependencies should be injected that have the singleton lifestyle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347439019.86/warc/CC-MAIN-20200604032435-20200604062435-00229.warc.gz
|
CC-MAIN-2020-24
| 1,103
| 8
|
https://www.redhat.com/archives/libvir-list/2020-September/msg00176.html
|
code
|
On a Thursday in 2020, Michal Privoznik wrote:
As it turned out my previous commits which switched from HAVE_ to WITH_ and dropped stdarg.h detection were a bit too aggressive. Because of reasons described in 9ea3424a178 we need to define HAVE_STDARG_H before including readline otherwise macos build fails. Honestly, I still don't fully understand the problem so I am not going to bother you with "explanation". Signed-off-by: Michal Privoznik <mprivozn redhat com> --- tools/vsh.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/tools/vsh.c b/tools/vsh.c index 2511089e6e..ef2a3f62d7 100644 --- a/tools/vsh.c +++ b/tools/vsh.c @@ -30,6 +30,10 @@ #include <signal.h> #if WITH_READLINE +/* In order to have proper rl_message declaration with older + * versions of readline, we have to declare this. See 9ea3424a178
I don't think it's because of the 'older version', I'm surprised it works for me on Linux without it.
+ * for more info. */ +# define HAVE_STDARG_H # include <readline/readline.h> # include <readline/history.h> #endif
Reviewed-by: Ján Tomko <jtomko redhat com> (just don't expect it to fix the pipeline on master, some other issues have creeped in in the meantime) Jano
Description: PGP signature
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141183514.25/warc/CC-MAIN-20201125154647-20201125184647-00188.warc.gz
|
CC-MAIN-2020-50
| 1,218
| 6
|
https://www.journals.vu.lt/LMR/article/view/18159
|
code
|
After an introduction to genetic basics three problems are briefly discussed: microarray data analysis, a definition of noninformative DNA sequence, and genetic sequence alignment. More atention is paid to
DNA sequence visualization and regularization of a genome signature.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Please read the Copyright Notice in Journal Policy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710968.29/warc/CC-MAIN-20221204072040-20221204102040-00078.warc.gz
|
CC-MAIN-2022-49
| 412
| 4
|
https://techsupport.osisoft.com/Documentation/PI-SDK/PI_SDK_Interfaces/PI-SDK_Objects/PIUnitBatch/IDH_CPIUNITBATCH_PROCEDURENAME.htm
|
code
|
ProcedureName property of the PIUnitBatch. This property is provided to relate the PIUnitBatch to a control recipe or procedure.
The object placeholder is an object expression that evaluates to a PIUnitBatch object.
This property can be a string or numeric VARIANT. It can also be set to a PIModule. This allows you to use PIModule's to store recipe information.
The ProcedureName may be left blank, but if it is a string, it must follow these rules:
1. No control characters are allowed; such as linefeeds or tabs
2. The following characters are not allowed:
* ' ? | ` "
NOTE: If you store a PIModule in this property with PI 3.3SR1, searching for batches by specifying a mask for this property will fail. This will be fixed in a future release of the PI Server.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572491.38/warc/CC-MAIN-20190916060046-20190916082046-00424.warc.gz
|
CC-MAIN-2019-39
| 763
| 8
|
https://proxieslive.com/pinch-gesture-for-function-other-than-zooming-unity/
|
code
|
I’m working on a game in which I want to pinch outwards on a character, which causes the character to split into 2 smaller copies of itself.
The method I’m thinking about using is to have the "pinch out" gesture destroy the game object and simultaneously create two instances of the smaller game object, and have them follow the fingers that pinch out. The action would also be reversible with the "pinch in" function.
My idea would be to do a raycast to detect the two-finger touch on the object (would I need a collider for that?), then use the beginning and ending touch points to determine if it is pinching out or in.
The problem is I am brand new to Unity and C# and have no idea how to write all of this. All of the tutorials for multi-touch gestures have to do with camera zoom, which is not what I am going for.
Can anyone tell me if I’m on the right track with my logic and provide some guidance on writing the code?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150308.48/warc/CC-MAIN-20210724191957-20210724221957-00257.warc.gz
|
CC-MAIN-2021-31
| 932
| 5
|
https://maningrida.com/artwork/1457-23/
|
code
|
This clan consists of Martay Burarra speakers and relates to the country called Gamurra Gu-yurra which lies between Maningrida and Ramingining in central Arnhem Land.
Thoes totemic animals are ‘gorraporda’ or darter, here depicted with it’s eggs in the nest. Further there is a saltwater crocodile ‘marrchila’, slatwater catfish ‘ganyjal’, a mullet ‘gurndarra’ and a barramundi called ‘rajarra’. As all thoes animals indicate it must be a country with salt and fresh water access. Infact there are many waterholes in this area and the scenery can be imagined as little lakes with waterlilies swimming on top with many sea birds feeding and green grass around.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948217723.97/warc/CC-MAIN-20240305024700-20240305054700-00357.warc.gz
|
CC-MAIN-2024-10
| 681
| 2
|
https://ibrahimkakbar.github.io/notes/
|
code
|
Notes for the Curious
Soon to Come
I will condense all my notes and information that I have gleaned from courses and literature into better notes which will be available for learning purposes! Expect them to slowly trickle in as I transition everything onto here.
Here is a list of my Reading Goals:
Checklist (Publicly available to keep me on task)
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656530.8/warc/CC-MAIN-20190115225438-20190116011438-00232.warc.gz
|
CC-MAIN-2019-04
| 349
| 5
|
https://discuss.ardupilot.org/t/rangefinder-selections-missing/47503
|
code
|
Hello. I am using a Pixhawk cube 2.1 with the latest rover 3.5.2 firmware. I am attempting to add a tfmini plus lidar for obstacle avoidance but have been having issues getting mission planner to show that it is connected. The unit works just great with the benewake UI and when connected to the rover I can see that it is getting power but that is all. It is connected to telem2 and all the appropriate settings are in place based off of all the wikis.
So I have initially been using my laptop to interact with this but since connected it to my desktop for convenience. The issue I now have is that when selecting RangeFinder under optional hardware I get no drop down menu selections. I do have these menu options on the laptop but considering all the undo issues of not getting this to work maybe it was never really using the senor library at all? Hence no selection on my desktop? Any insight to this menu issue and over all getting this to connect correctly would be greatly appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500357.3/warc/CC-MAIN-20230206181343-20230206211343-00108.warc.gz
|
CC-MAIN-2023-06
| 993
| 2
|
https://www.easydnnsolutions.com/Blog/adding-google-maps-to-articles-in-easydnnnews
|
code
|
Adding Google maps to articles in EasyDNNnews
EasyDNNnews comes with in-built support for displaying Google Maps and a Google map editor enabling you to create your own maps and add map points. Maps created in this way will be displayed below the article's text.
1) Adding Google Maps API key:
To enable using Google maps within an article, it is necessary to add Google Maps API key to the module's settings.
- Ask user to share location when writing article
If this option is switched on, the user will be asked about the exact Geolocation when adding maps. The browser will require from the user to authorize the sharing of his or her Geolocation.
Finish this process by saving the settings.
2) Adding Google maps to articles
Upon adding your Google Maps API key and saving the settings, in the add/edit form of the articles there will appear a new panel for adding and managing Google maps.
In the add/edit form in the Main article map panel click on the button Add Map. This will open the Google map editor. If the option "Ask user to share location when writing article" is switched on and the user has authorized the browser to receive his or her location, the map will be positioned at the user's current geolocation. This geolocation doesn't necessarily correspond with the user's actual location.
If you wish to position your point at a different location from the automatically provided one, type the location's name in the field Search for location and choose between the locations you will be offered.
Setting up map options
To the right of the map there are General settings. There you can set up certain options related to the map.
- Map type
Choose between several map types.
- Latitude Longitude
Here you can set up the extent of the map's zoom. Instead of entering specific numbers, you can set up the zoom with your mouse's scroll wheel above the map itself.
Enter the desired width of the map within an article in pixels.
Enter the desired height of the map within an article in pixels.
- Enable scroll wheel zoom
If this option is switched on, the map within an article can be zoomed with your mouse's scroll wheel.
3) Adding markers to a map
One or more markers can be added to a map. Click on the Add marker button. The marker will be shown on the map. You can hold the marker with your mouse and place it on the desired location. In the Title field add the marker's name, and you can optionally add its HTML description as well. These values will be shown on the map. Click on the Confirm button to add the marker to the map.
Multiple markers can be added in the same way. Markers can later be edited or deleted.
Finally, when the map has been edited according to your wishes, it is necessary to click on Add as article map. This will enable your added map to be displayed in the article. In the Main article map panel there will appear the message: "Main article map is set".
The map can be removed by clicking on the Remove button in the Main article map panel.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711390.55/warc/CC-MAIN-20221209043931-20221209073931-00665.warc.gz
|
CC-MAIN-2022-49
| 2,987
| 26
|
https://milialar.org/microsoft-dynamics-partner-uae-elevating-your-business-efficiency/
|
code
|
In the dynamic landscape of business operations, finding the right technology partner is crucial for optimizing efficiency and achieving growth. This article dives deep into the realm of Microsoft Dynamics partners in the UAE, exploring their significance, services, and the transformative impact they can have on businesses.
Empowering Businesses with Microsoft Dynamics Solutions
In a world where agility and innovation are paramount, businesses in the UAE are increasingly turning to Microsoft Dynamics partners to streamline their operations. From small enterprises to multinational corporations, the comprehensive suite of Microsoft Dynamics solutions offers tailored functionalities to meet diverse business needs.
Navigating Business Challenges with Expert Guidance
Navigating the complexities of business processes can be daunting, especially in a competitive market like the UAE. Microsoft Dynamics partners offer invaluable expertise and guidance, helping businesses leverage technology to overcome challenges, drive growth, and stay ahead of the curve.
Transformative Solutions for Every Industry
One of the key strengths of Microsoft Dynamics partners in the UAE is their ability to cater to a wide array of industries. Whether it’s retail, manufacturing, healthcare, or finance, these partners offer industry-specific solutions that are customized to address unique challenges and capitalize on emerging opportunities.
Harnessing the Power of Cloud Technology
In today’s digital era, cloud technology has emerged as a game-changer for businesses, enabling seamless collaboration, scalability, and cost-efficiency. Microsoft Dynamics partners leverage the power of the cloud to deliver flexible, scalable solutions that empower businesses to adapt and thrive in a rapidly evolving landscape.
Driving Innovation Through Collaboration
Collaboration lies at the heart of innovation, and Microsoft Dynamics partners play a pivotal role in fostering collaboration across organizations. By integrating disparate systems, optimizing processes, and facilitating data-driven decision-making, these partners enable businesses to unlock new levels of efficiency and innovation.
Maximizing ROI with Strategic Implementation
Investing in Microsoft Dynamics solutions is not just about technology; it’s about driving tangible business outcomes. Microsoft Dynamics partners in the UAE go beyond implementation, focusing on strategic alignment, user adoption, and continuous improvement to ensure maximum return on investment for their clients.
Ensuring Seamless Integration and Migration
Seamless integration and migration are critical aspects of any technology deployment, and Microsoft Dynamics partners excel in this domain. Whether it’s integrating with existing systems or migrating to new platforms, these partners leverage best practices and proven methodologies to minimize disruption and ensure a smooth transition.
Empowering Users Through Training and Support
Empowering users is essential for realizing the full potential of Microsoft Dynamics solutions. Recognizing this, Microsoft Dynamics partners offer comprehensive training and support services to equip users with the knowledge and skills they need to leverage the technology effectively, driving productivity and efficiency.
Unlocking Growth Opportunities
In a competitive market landscape, agility is key to seizing growth opportunities as they arise. Microsoft Dynamics partners empower businesses to be agile and responsive, providing scalable solutions that can adapt to evolving market dynamics, regulatory changes, and customer preferences.
In conclusion, partnering with a Microsoft Dynamics partner in the UAE is not just a strategic choice; it’s a catalyst for transformation and growth. By harnessing the power of Microsoft Dynamics solutions, businesses can streamline operations, drive innovation, and unlock new levels of efficiency and productivity.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818468.34/warc/CC-MAIN-20240423064231-20240423094231-00150.warc.gz
|
CC-MAIN-2024-18
| 3,940
| 20
|
https://devpost.com/software/smart-plant-iot
|
code
|
I love plants, they make the air fresher in the house, they are pretty to look at. But I was never able to keep them alive, I believe that if the plants are more self maintainable, more people would have them around which would lead to healthier lifestyle for everyone.
What it does
Smart IoT Plant would auto water the plant when it needs, as well as track all the vital information (Temperature, Humidity, Moisture and UVLight) about the plant. So that users need little to no maintenance at all.
How I built it
I've built the project using Arduino, Seeed Shield, UV Sensor, temperature/humidity sensor and moisture sensor, along with Helium Atom and Helium Element. Helium platform is directly synced ups with Azure IoT hub and we upload information about once every minute.
Once the data is being transferred to Azure IoT Hub, it passes through Azure Function to be stored inside Azure SQL. A separate Azure Function creates a RESTful API allows users to retrieve the SQL data.
This way the information can be displayed over the OLED device attached to the device as well as Android can retrieve data via RESTful API
A step by step guide on how to recreate the project is documented at https://www.hackster.io/Nyceane/smart-plant-iot-59cbc3
Challenges I ran into
The pump requires 12V DC, it was a bit difficult as the Arduino device was only putting 5V, we've figured out how to
Accomplishments that I'm proud of
Our team was able to build out the entire project and have it documented in step by step, from IoT
What I learned
We are able to build out the entire project through severless infrastructure, Arduino connects directly to Helium platform which was able to connect to Azure IoT Hub. This allows
What's next for Smart Plant IoT
We will build out a better enclosure, possibly a pot so that users can easily just drop the plants into the smart pot.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00375.warc.gz
|
CC-MAIN-2022-33
| 1,861
| 16
|
https://www.tradingview.com/script/eSa8naNr-Volatility-Weighted-Moving-Average-System/
|
code
|
I've colored the background depending on trend. Ideally in the future, I'll draw long or short signals on-chart depending on the width between the bands, which works as a faster indicator of trend-change than crossover does.
Hope you all enjoy. Happy holidays.
Invite-only indicators: www.patreon.com/wbburgin/membership
Test my strategies on CryptoRobotics: cryptorobotics.co/?trade=f23b09
In true TradingView spirit, the author of this script has published it open-source, so traders can understand and verify it. Cheers to the author! You may use it for free, but reuse of this code in a publication is governed by House Rules. You can favorite it to use it on a chart.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817699.6/warc/CC-MAIN-20240421005612-20240421035612-00757.warc.gz
|
CC-MAIN-2024-18
| 672
| 5
|
https://forum.gsa-online.de/discussion/28892/install-multiple-instances-of-software-on-same-dedicated-machine
|
code
|
Install Multiple Instances Of Software On Same Dedicated Machine
Is there a way to install multiple instances of GSA SER on the same dedicated windows machine? Or does it require a seperate version of windows for it to be installed again?
I've tried with different user accounts, but it only lets me install it once. I do have licenses for these multiple installs. I'd rather have them on the same server sharing the same captcha solving software.
Is this possible?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530066.45/warc/CC-MAIN-20220519204127-20220519234127-00233.warc.gz
|
CC-MAIN-2022-21
| 465
| 4
|
http://www.yihubg.com/game/19629
|
code
|
A portable electronic device that plays a competent game of Scrabble. Up to three players may challenge the device. Each player enters one's own name and subsequently the turn order in which they will play. The players can decide to draw their own tiles or let the device do the randomizing. If the device assigns the tiles, the players may ask the device to suggest a play by using the "Hint" option. Players keep track of the gameboard using the paper pad provided or use their own gameboard. The device has a LCD readout that is only eight characters by four characters and cannot display the entire board. Players use the arrow keys of the membrane keyboard to scroll around. All standard Scrabble rules apply. The device will challenge any word played that is not in its 12,000 word vocabulary. The human player is final arbiter however. The device is powered by four "C" batteries or an AC adapter. Two Advanced Vocabulary Modules were available. Each module added 16,000 words to the machine's vocabulary to bring the total to 44,000.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473401.5/warc/CC-MAIN-20240221070402-20240221100402-00294.warc.gz
|
CC-MAIN-2024-10
| 1,041
| 1
|
https://oe1.orf.at/ugcsubmission/view/31f16ae3-c7ac-42b3-b798-7aac90087574/talking-just-to-hear-yourself-a-text-for-two
|
code
|
talking just to hear yourself: a text for two
Von: Al-Qaisi Jasmina | 09.07.2020 | 22:18
This audio work is pausing on the presupposition that we talk to each other just to be regardless of our claims of understanding one other. "Talking to just hear yourself" is a text for one and also a dedication from one to the other. Regardless of the form, people still base communication on presumption. Based on a free-form script for two voices which did not hear each others interpretation before reading, this piece is supposedly working towards the performers possibility to question their personal dialogical triggers. It was piece was especially created as a response to this call. More than forgetting their mortality burden, people are also talking to just hear themselves.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400222515.48/warc/CC-MAIN-20200925053037-20200925083037-00131.warc.gz
|
CC-MAIN-2020-40
| 774
| 3
|
https://www.postgresql.org/message-id/BLU002-W73C697267F89044EC56E1FAB360%40phx.gbl
|
code
|
I've been finding performance issues when using a trigger to modify inserts on a partitioned table. If using the trigger the total time goes from 1 Hour to 4 hours.
The trigger is pretty simple:
CREATE OR REPLACE FUNCTION quotes_insert_trigger() RETURNS trigger AS $$ BEGIN EXECUTE 'INSERT INTO quotes_'|| to_char(new.received_time,'YYYY_MM_DD') ||' VALUES (($1).*)' USING NEW ; RETURN NULL; END; $$ LANGUAGE plpgsql;
I've seen that some of you guys have worked on writing triggers in C.
Does anyone have had an experience writing a trigger for partitioning in C ?
If you have some code to paste so I can start from I will really appreciate.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578577686.60/warc/CC-MAIN-20190422175312-20190422201312-00209.warc.gz
|
CC-MAIN-2019-18
| 641
| 6
|
https://forum.itoosoft.com/forest-pro-(*)/aquiring-texture-from-map/?PHPSESSID=a11689c965a76cc0d4fb65a437ce4967
|
code
|
Can someone please tell me if I'm doing something wrong here?
I have added a library grass preset to a surface, I replaced the default material on the forest object with a Vray material that has 'forst color' in the diffuse slot. My setting for that map are attached. The problem I have is that I can't get the shading to apply as 'by element' rather than 'by object' I changed the bitmap to a checker pattern in order to test the result, and moving the object / element slider to either side produces the same result. As I understand it, moving the slider to 'element' should produce crisper edges, applying the colour of the map to the individual elements, it appears to still be doing it to each whole mesh still, as can been seem in the two test renders below.
I'm using Forest Pro 4.4.1
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00739.warc.gz
|
CC-MAIN-2022-40
| 791
| 3
|
https://agardner.net/monitor-digitalocean-lamp-stack-dynatrace/
|
code
|
A Linux, Apache, MySQL and PHP (LAMP) Stack is possibly one of the most widely used software stacks on the planet. Spin it up with DigitalOcean. Monitor it with automatically with Dynatrace OneAgent…
Goal of This Tutorial
Spin up a fully functional, fully monitored LAMP stack on DigitalOcean using Dynatrace OneAgent to monitor every log file, user, host metric and every transaction.
All of these metrics will be automatically correlated and problems will be automatically generated for root causes, not just symptoms.
- A DigitalOcean account (obviously) (Run LAMP free for 2 months with this link).
- A Dynatrace account. Sign up for a free 15 day trial here.
- 5 minutes to spare.
Step 1 - Droplet Creation
- Spin up a DigitalOcean LAMP stack using their One-Click installer. The smallest 1GB droplet will suffice for this demo.
SSH into your droplet, this will activate the installation.
Remove the default
sudo rm /var/www/html/index.html) and replace with something better :)
sudo touch /var/www/html/index.html echo '<!DOCTYPE html> <html> <head> <title>DO LAMP Demo by Adam Gardner</title> </head> <body> <h1>DigitalOcean LAMP Stack with Dynatrace OneAgent</h1> <p>This is a simple test page</p> </body> </html>' | sudo tee /var/www/html/index.html
Step 2 - Dynatrace Setup
Login to your tenant. Go to Settings > Web and mobile monitoring > Application rules. Click Create custom grouping rule.
Give your application a name and set the rule to be any URL which contains your server IP.
- Go to Start Deploy Dynatrace and navigate to the Linux installer. Run the first and third command (second is optional) on your box. Run the
- Restart apache:
sudo service apache2 restart
You’re Done. A Fully Monitored LAMP Stack
You now have:
- A fully monitored LAMP stack.
- Automated availability tracking / alerting.
- Full visibility of every user action, click and page visit.
- Access to all log files.
- Code level tracing of Apache and PHP. Including the performance of Apache modules.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00430.warc.gz
|
CC-MAIN-2023-50
| 1,996
| 26
|
https://forum.gitlab.com/t/gitlab-16-0-released-with-value-streams-dashboards-and-improvements-to-ai-powered-code-suggestions/86904
|
code
|
New blog post on the GitLab blog by Kai Armstrong! Check it out here:
GitLab 16.0 released with Value Streams Dashboards and improvements to AI-powered Code Suggestions
Wow, Sentry-compatible built-in error tracking, that’s awesome! What are the chances this bubbles down to self-hosted at some point in the future?
I’m having a few pet projects hosted like that, some make it to a FOSS release, others don’t. I’d love to have some basic error tracking on the to decide, but hosting my own Sentry instance is way out of scale. Tried Errbit for a while, but it didn’t work particularly well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655446.86/warc/CC-MAIN-20230609064417-20230609094417-00454.warc.gz
|
CC-MAIN-2023-23
| 600
| 4
|
https://analyticsindiamag.com/tackling-underfitting-and-overfitting-problems-in-data-science/
|
code
|
One of the major challenges in data science, especially concerning machine learning, is how well the models align themselves to the training data. Underfitting and overfitting are familiar terms while dealing with the problem mentioned above.
For the uninitiated, in data science, overfitting simply means that the learning model is far too dependent on training data while underfitting means that the model has a poor relationship with the training data. Ideally, both of these should not exist in models, but they usually are hard to eliminate.
ML experts and statisticians often have different techniques for bringing down overfitting in ML models. The popular ones stand out to be cross-validation and regularisation. These methods are proven to be effective in understanding the overfit data. Apart from these techniques, there are other ways to eliminate overfitting in models.
Subscribe to our Newsletter
Join our editors every weekday evening as they steer you through the most significant news of the day, introduce you to fresh perspectives, and provide unexpected moments of joy
Generalisation: For example, make sure the data leads to generalisation rather than just acting as training data. This can be done by feeding more data to the model. More data also means improved accuracy achieved by the model. However, this makes the model, computation and memory-intensive.
Data Augmentation: As a result, another technique called data augmentation comes into the picture. Instead of giving loads of data, improvising and reworking on the existing data can go a long way in reducing overfitting.
Example: Neural networks, which are mostly used in pattern recognition tasks, are prone to overfitting. The larger the network, the complex the functions it creates as a consequence. Hence, an optimum size for the right statistical fit is key. This can be done through a number of methods. The best among them would be retraining neural networks since it is comparably simple and does not involve tweaking much of the parameters.
Generally, overfitting occurs in nonlinear ML models since there are many variables at play to decide the relationship of data in the model. This itself makes the model predict various factors. A better way to address this problem can be methods like k-cross validation. Here, the model is tested k-times for different subsets on the data and can be checked to see how it performs for new data. Any overfitting observed will eventually be diminished.
Lately, ensemble methods such as Bayesian averaging, Boosting and Bagging have indirectly assisted in eliminating overfitting. How? Since ensemble methods deal with complex ML models, they take on the combined overfitting possibilities present in these models. Boosting and Bagging are the two most used methods than Bayesian averaging.
Although underfitting is comparatively observed lesser in ML models, it should not be overlooked. To begin with, the general norm here is lack of sense between the data and model. What this means is either the model is way too simple to establish a stable learning pattern or performs very poorly with the training data.
Experts suggest that this problem can be alleviated by simply using more (good!) data for the project. In addition, the following ways can also be used to tackle underfitting.
- Increase the size or number of parameters in the ML model.
- Increase the complexity or type of the model.
- Increasing the training time until cost function in ML is minimised.
Example: Converting a linear model’s data into non-linear data. In this case, the transformation of the model leads to it being more unpredictable with respect to any new as well as training data.
Both overfitting and underfitting should be reduced at the best. As ML expert Jason Brownlee perfectly puts it, a statistically “good fit” is what matters when it comes to choosing an ML model. This can only be done with repeated testing of the model with different data and see where it falls along the lines of overfitting and underfitting.
Furthermore, before starting with an ML model to solve a problem, it is also suggested to take a hard look into the data too!. After all, there might also be the possibility of conflict with the type of data used in the model.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00017.warc.gz
|
CC-MAIN-2023-50
| 4,272
| 18
|
https://creativecriminals.com/archive/brand:Monty_Python
|
code
|
Read more / View 3 media
To promote the live broadcast of the comedy show Monty Python in London, UKTV's Gold channel and sculptor Iain Prendergast created a massive fiberglass dead parrot, which was suspended from a crane and laid talons-up in London's Potters Field.
The dead p
Read more / View 2 media
To give away tickets for the Monty Python show in London, mortierbrigade Brussels made this bizarre campaign. They asked people to opt-in for various, and lots of lots of spam emails. In one of those emails people would find tickets to the show. The spam
You must be logged in to love a campaign.
Copyright 2023 Creative Criminals - Special thanks
79.097 loves so far - Hosted by COMBELL.COM - Bored? Read our policy
Follow us on
Login No account yet? Register
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00405.warc.gz
|
CC-MAIN-2023-23
| 765
| 10
|
https://www.get1000visitors.com/howtofindwords/how-to-find-a-niche-with-google-keyword-tool-how-to-find-competitors-keywords-amazon.html
|
code
|
So what exactly is Keyword Competitiveness (KC)? It’s only the feature within Long Tail Pro that completely changed the game and made keyword research so ridiculously simple that even a dumb truck driver like me could become an expert! It basically works like this. As soon as you click the button in Long Tail Pro Cloud to retrieve keywords, it automatically calculates a number for each keyword (between 1 and 100) based on several different SEO factors. Lower numbers mean the keyword is easier to rank for and higher means it is harder to rank for. More on that below…
Are you a business owner, online marketer or content creator? If so, most likely you would like more people to visit your website, read your content and buy your products or services. The easiest way to achieve it is to find out what your potential customers or readers are searching for on Google and create content on your website around these topics.
You can also filter by query, which is useful when looking at branded queries, or when looking at specific words. For example, only show keywords that include the term "SEO". The graph also allows you to spot trends in across the available metrics and compare week-on-week or month-on-month. This can help you to drill down and monitor progression over time, allowing you to answer questions like "have my branded keywords received more clicks in the last month compared to the previous month?", "has the CTR improved?", "did average positions in Google improve?".
The keywords you want to focus your SEO on should closely resemble the vocabulary of your audience. In order to come up with the proper keywords you really have to get inside the heads of the people who search for your website. What terms will people use? How do people search? Which question does your website answer? You should create a list of all search terms people could use and think of combinations and nuances within these search terms.
Customize the data that LTP is going to fetch with pre-filters like “Suggested Bid” (or Cost per Click [CPC], i.e. the amount of money an advertiser is willing to pay for a click on their AdWords ad that is targeting that specific keyword), “Local Search Volume” (average number of monthly searches for a specific keyword), “Advertiser Competition” (the amount of advertisers competing for a specific keyword) and “Number (of) Words” (very important when you’re trying to find long-tail keywords).
Use the Google Adwords Keyword Planner to find new and related keywords, but ignore the search volume data! The search volume data in the planner is really only useful for keywords that you’re actually spending money to advertise on. Otherwise, these volumes are not reliable. While not really helpful to decide which keyword is most used by your potential audience, Google Adwords Keyword Planner makes a useful tool in coming up with ideas for potential keywords!
"This is the only keyword research tool that I recommend. The ideas, inspiration, and content longtails you will get for your niche topic are going to result in you producing a page of content that is more than going to pay for this tool. And as they are Google's database then we KNOW that these terms are being searched by a decent volume of peeps every month. It's a goldmine dudes."
Most keyowrd databases consist of a small sample of the overall search universe. This means keyword databases tend to skew more toward commercial terms and the core/head industry terms, with slighlty less coverage of the midtail terms. Many rarely searched for longtail terms are not covered due to database size limitations & lack of commercial data around those terms. Plus if those terms were covered, there would be large sampling errors. Google generates over 2 trillion searches per year and claims 15% of their searches are unique. This means they generate searches for over 300 billion unique keywords each year. The good news about limited tail coverage is it means most any keyword we return data on is a keyword with some commercial value to it. And with Google's Rankbrain algorithm, if you rank well on core industry terms then your pages will often tend to rank well for other related tail keywords.
One of the most important aspects of an effective SEO strategy is the ability to research, analyze, and ultimately select the keywords that are most likely to result in success for your clients. There are a variety of free tools available on the web specifically designed to help online marketers do just this. Each tool has its own unique methodology for collecting and presenting this data. Comparing any of the tools’ results without knowing the subtle differences can lead to incorrect inferences and an SEO strategy based on misinformation.
Earlier, I wrote a post about the use of long tail keywords. Focusing on long tail keywords could be a good strategy, especially when trying to rank in a highly competitive market. But how do you decide on which (long tail) keywords you want to rank? This post will give you some handy tips and keyword research tools to make your keyword research a bit easier.
So whilst Long Tail Pro has just continued to grow in revenue every single year and comes highly recommended, you may want to check if all the important features are fully functioning before signing up. Especially the KC feature (keyword competitiveness) as it is so fundamental to keyword research and making an informed choice on whether or not to go into a particular niche.
Click the Download Free Trial button above and get a 14-day, fully-functional trial of CrossOver. After you've downloaded CrossOver check out our YouTube tutorial video to the left, or visit the CrossOver Linux walkthrough for specific steps. Once you have CrossOver installed and running you can come back to this page and click the Step 2 button, or follow the manual installation guide, to begin installing your Windows application.
I’ve found google trends to be an interesting way to see if a keyword (and by extension a niche) is growing or shrinking, and whether it’s seasonal or not. I can’t think of any other tool out there that can reliably tell you this information, so that’s really useful. Also, if you’re building a site, especially an authority site, getting onto something that’s trending upwards is a fantastic idea.
SEMrush is a very useful tool for both researching competitors when starting a site or for growing an established site. I really like to find weaker niche sites that still seem to be ranking for lots of keywords; SEMrush helps me see what they are ranking for and what I can potentially target. You can also see what keywords you’re on the cusp of ranking for with your established site - another very useful feature.
How do I know this? Because I’ve done it! In late 2013 I was still struggling to earn a respectable income online. I started up a keyword research service and marketed it to just this blog audience. It turned out to be quite popular. Basically – I would find niches using Long Tail Pro then create Keyword Research Packages. Each package contained usually several hundred keywords with KC scores calculated. I was selling these packages for anywhere between $97 to $147. I even sold one single package for $597! That one had very high search volumes and very low competition.
To be able to rank in the search engines is an art that must be understood and finding the right Keyword tool that fits into your comfort zone is a must. What I mean by ‘comfort zone’ is having a keyword tool that doesn’t confuse you before you begin even searching. Some go into far too much detail than is necessary. All you need really are good long tail ‘common sense’ keywords that other marketers may have missed.
Successful SEO requires multiple interrelated activities on all fronts: competition, keywords, link building, on-page and technical optimization. It creates a need for diverse tools, which is expensive. SEMrush solves this problem with an award-winning all-in-one toolkit that includes 17 tools covering all SEO fields. We’ll walk you through your SEO workflow, explaining how to get the most out of our toolkit.
WordStream for PPC is a full-service PPC management platform for creating, optimizing and managing pay-per-click advertising campaigns in Google AdWords. Our PPC software includes easy-to-use PPC keyword tools, campaign creation and expansion tools, Quality Score optimization tools, and more to help marketers get their PPC work done quickly and cost-effectively. WordStream for PPC customers experience increased traffic and greater ROI.
WordStream's Negative Keyword Tool reduces wasteful PPC spending and improves ROI by preventing your AdWords PPC ads from showing on irrelevant searches. Enter a keyword to get a list of negative keyword suggestions. Then select the ones that aren't relevant to your campaigns and export the results for use in your AdWords account. As a result, your ads will be more relevant to searchers, grab a much more targeted audience and reduce your overall ad spend.
Recently I had a dilemma with one of my projects, it is related to ecards and many people still using word “cards” instead of “ecards” but Google Keyword Planner and some other tools showed almost the same information for both keywords. At the same time I did not want to have many words “cards” and “ecards” on the landing pages. Semrush helped very much. I found correct data and made a nice PPC campaign.
As you might imagine, the ability to completely see and study how the competition is ranking for certain keyword phrases in your niche has significant value for any company. Tack this on with its other features, and Long Tail Pro makes a ton of sense for content marketers. And like I said before, the price tag is very low compared to some of the tools I’ve seen out there, with a one-time fee (NOT a monthly fee) of $97 and a 60-day, money-back guarantee.
Following a very busy (and lucrative) 2015, I’ve decided to take the majority of 2016 off and use the time to invest in various relationships and things that really matter in the long run. But in the midst of this “time off,” I’ve learned so many lessons and picked up new skills and seen new perspectives that I would never have been exposed to had I just kept on grinding away at the existing business.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665985.40/warc/CC-MAIN-20191113035916-20191113063916-00023.warc.gz
|
CC-MAIN-2019-47
| 10,403
| 22
|
https://boardgames.stackexchange.com/questions/3431/what-is-a-good-pokemon-deck-ratio
|
code
|
My son really likes Pokémon, and owns a lot of cards. He mostly plays the video games and reads the books, but wants to build a Pokemon deck to play as well. We understand the basic rules. I know decks can only have four of each type of card (except basic energy) and must have exactly 60 cards total.
What I would like to know is if there is a recommendation for how many cards of each type to have in a deck. I've played Magic: The Gathering, but applying the same logic used there doesn't seem to work because energy behaves differently than mana. I've read some web sites that have recommendations, but when we play with those ratios it seems like I never draw enough basic Pokémon.
We have been trying to adjust things, but I thought I would see if there were some recommendations from people who are currently playing Pokémon.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036363.5/warc/CC-MAIN-20220626010644-20220626040644-00369.warc.gz
|
CC-MAIN-2022-27
| 835
| 3
|
https://rsrdirtsim.webs.com/old-mods
|
code
|
Here are some of my mods I made a while back.
NASCAR Late Model Stock Cars
My first attempt to make Asphalt Late Models. Uses the original NASCAR Heat body, but wider and lower to the ground. There are four different chassis, each with a different rollcage color. This was gonna be a part of a series of Mods called STS, Short Trackers Series, for different types of short track cars which I might work on later. Any TEX file that was made for the original NASCAR Heat car should work with these. Just make sure to use fcar.
This is a Pro Stock/Dirt Sportsman/Grand National type Mod for dirt tracks. They handle pretty good, are moderately powerful, and are a blast to drive!
FOSRA Late Models
My old Super Late Models. Used the old DRT LM bodies before I found the Elite Late Model ones.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999482.38/warc/CC-MAIN-20190624104413-20190624130413-00533.warc.gz
|
CC-MAIN-2019-26
| 789
| 6
|
https://www.kender.lewisham.sch.uk/page/?title=Strategy&pid=46
|
code
|
Kender school strategic intent 2018/19
Strengthen the profile and reputation of Kender to ensure the school is widely respected
as a school of choice where learners, with wide ranging talents, achieve outstanding outcomes.
Through informed and evidence based practice, deliver a rich, challenging, inclusive and highly effective curriculum.
Work with a governing body using experience and skills to effectively support and challenge, furthering the success of the school.
Create a cohesive community supporting each other in the pursuit of life long learning.
Effectively manage and extend school resources to ensure the school team is ready and able to deliver high standards of learning in the 21st century.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574039.24/warc/CC-MAIN-20190920134548-20190920160548-00056.warc.gz
|
CC-MAIN-2019-39
| 709
| 7
|
https://www.odbms.org/2021/05/on-big-data-benchmarking-qa-with-richard-stevens/
|
code
|
On Big Data Benchmarking. Q&A with Richard Stevens
Q1. You have recently completed the DataBench Project. What was the aim of the project?
There is extensive information on how and why to use technical benchmarking to assess specific management and analytics processes, but companies lack objective, evidence-based methods and tools to measure those elements that can demonstrate a correlation between technology benchmarks and business benchmarks and assess the impact these technologies have on the competitiveness and market success of organizations. This was the principal aim of DataBench.
Q2. Database benchmarks have been around for many years. What is it different with Big Data Technology (BDT) benchmarks?
Benchmarking has existed for a long time and no single benchmark has been specifically designed to measure the efficacy of bigdata analytics. Organizations need to assess networking, databases, algorithmic efficiency etc., but of course this changes with every benchmarking objective and with every system configuration. DataBench was envisioned map the particular stack of technologies being used and identify the touchpoints to easily assess
Q3. What did you learn in performing a comparative analysis of existing benchmarking initiatives and technologies?
Confucius said if you can describe something you can measure it. In DataBench we believe the same thing and the first step is to describe or in our terms classify the processes that are being executed in an organization pipeline. DataBench has shown us that once classified, processes can be mapped to blueprints and thus quickly and effortlessly compared to similar organizations Big Data and AI pipelines.
Q4. Were you able to provide evidence-based methods to measure the correlation between Big Data Technology (BDT) benchmarks and the organisation’s business benchmarks?
It should be pointed out that there is still much work to be done. Although we have published (ref.) the correlations, the empirical sample of real life benchmarking done on tools like the DataBench toolbox are still statistically insignificant and require much larger datasets to be considered empirically and allow for meaningful comparisons.
Q5. Were you able to measure return on investment (ROI) as well?
Return on investment is cited by companies interviewed as a primary reason for doing this. The econometric research to demonstrate ROI is an task being carried out in IDC.
Q6. One of the output of the project is the DataBench Framework. What is it?
The DataBench Reference framework, shown below, serves as common reference framework to locate Big Data technologies on the overall IT stack.
It is structured into horizontal and vertical elements.
- Horizontal elements cover specific aspects along the data processing chain, starting with data collection and ingestion, reaching up to data visualization. It should be noted, that the horizontal elements may be executed in different physical layers.
- Vertical elements address cross-cutting issues, which may affect all the horizontal concerns. In addition, verticals may also involve non-technical aspects (e.g., standardization as technical concerns, but also non-technical ones).
Figure 1 DataBench Reference Model
Q7. What kind of metrics did you define for a BDT assessment?
We have examined BDT metrics and their assessment across the dimensions of the framework depicted above. More detail for any of the elements can be found in Analytics and Processing, and Data Management documentation at: https://www.databench.eu/public-deliverables/
Q8.You also produced a DataBench Toolbox. What is it? What is it useful for?
The databench toolbox is a one-stop shop for Big Data benchmarking. It is the central entry point to the DataBench results and provides a web based portal access to the framework of reference and knowledge about benchmarking and “tools” made available by the project. It provides different services for different types of users including Technical users, Business users and Benchmark providers. Technical Users can find and eventually deploy and execut benchmarks to evaluate technical indicators of Big Data systems, components or applications. Business users are typically interested in business benchmarks rather than performing a technical benchmarking task. They are usually interested in the underlying business implications of selecting a Big Data system and how this choice influence their business indicators.
Therefore, they typically would like to find similar cases in their industry, high level architectural blueprints of reference for their domain or use case. They would navigate through the KN catalogue to find the right answers. etc. Benchmark Providers are people or organisations that would like to add or manage their own technical benchmark in the benchmark catalogue of the Toolbox. They are typically developers or providers of Big Data benchmarks. They can add or update benchmarks to the Toolbox, and ultimately to declare and provide the automation mechanisms to enable the deployment and execution from the Toolbox.
Q9. Now that the project is finished, can the results produced DataBench Project be used by interested parties?
Yes several companies, research initiatives and trade and technology clusters are already using DataBench. Private consultancies are preparing to provide customization and industrial deployment plans. A look at the community Community – DATABENCH gives highlights of a few of the companies involved.
Q10. Who was involved in the DataBench Project?
DataBench was coordinated by IDC, a global leader in technology market research and analytics but included seven partners from both the private and the public sector from five different Member States (Bulgaria, Germany, Italy, Slovenia and Spain) and one EFTA country (Norway) pulling together a set of strong complementary skills in research, development and innovation, while representing a variety of sectors including industry, research and academia.
- Position paper: Relating Big Data Business and Technical Performance Indicator
- DataBench: Evidence Based Big Data Benchmarking to Improve Business Performance
- Tutorial on Benchmarking Big Data Analytics Systems
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00654.warc.gz
|
CC-MAIN-2024-10
| 6,220
| 29
|
https://community.spiceworks.com/people/stevepavolko/projects/sql-installation-wrapper
|
code
|
I didn't ever officially take any coding classes in school, but I've done a lot of automation work (batch & shell scripts, etc.), so my boss asked if I could automate the SQL installation for our company's new software suite. Nothing too fancy, just needed an interface that was easy to use and allowed the individual installing the software to choose things like the Instance name, install directory, DB name, and schema version to use. I wrote the whole thing in AutoIT, and it didn't take too long, main bulk of time was spent doing research and adding error handling to ensure successful insallation. The installer is pretty flexible, allowing different SQL installers to be run (IE if you need a 32-bit edition, just drop the 32-bit installer in the directory of the SQL Install Wrapper and change the name in the GUI), and allowing different DBs and schemas to be used.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710924.83/warc/CC-MAIN-20221203043643-20221203073643-00645.warc.gz
|
CC-MAIN-2022-49
| 875
| 1
|
https://www.elastic.co/guide/en/elasticsearch/reference/5.6/analysis-analyzers.html
|
code
|
WARNING: Version 5.6 of Elasticsearch has passed its EOL date.
This documentation is no longer being maintained and may be removed. If you are running this version, we strongly advise you to upgrade. For the latest information, see the current release documentation.
Elasticsearch ships with a wide range of built-in analyzers, which can be used in any index without further configuration:
- Standard Analyzer
standardanalyzer divides text into terms on word boundaries, as defined by the Unicode Text Segmentation algorithm. It removes most punctuation, lowercases terms, and supports removing stop words.
- Simple Analyzer
simpleanalyzer divides text into terms whenever it encounters a character which is not a letter. It lowercases all terms.
- Whitespace Analyzer
whitespaceanalyzer divides text into terms whenever it encounters any whitespace character. It does not lowercase terms.
- Stop Analyzer
stopanalyzer is like the
simpleanalyzer, but also supports removal of stop words.
- Keyword Analyzer
keywordanalyzer is a “noop” analyzer that accepts whatever text it is given and outputs the exact same text as a single term.
- Pattern Analyzer
patternanalyzer uses a regular expression to split the text into terms. It supports lower-casing and stop words.
- Language Analyzers
Elasticsearch provides many language-specific analyzers like
- Fingerprint Analyzer
fingerprintanalyzer is a specialist analyzer which creates a fingerprint which can be used for duplicate detection.
If you do not find an analyzer suitable for your needs, you can create a
custom analyzer which combines the appropriate
tokenizer, and token filters.
Intro to Kibana
ELK for Logs & Metrics
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655446.86/warc/CC-MAIN-20230609064417-20230609094417-00069.warc.gz
|
CC-MAIN-2023-23
| 1,678
| 25
|
http://boards.giants.com/showthread.php?260-THEE-NYG-SWAG-THREAD&p=649877&viewfull=1
|
code
|
but those positions are scarce. hard to get them.
So I'd consider a latteral movement to another location, so long as it wasn't really far from my house. I have a good internal resume, so I'd like to think I have a decent advantage over alot of applicants.
Oderint Dum Metuant
It's too bad, I'm too good....
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121644.94/warc/CC-MAIN-20170423031201-00562-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 307
| 4
|
https://collegemathteaching.wordpress.com/2015/04/01/my-topology-class-april-fools-me/
|
code
|
My topology class has 6 students and all usually sit in the first or second row of the class room. They are NEVER late.
As I walked to the classroom about 1-2 minutes before the start, the lights were out..and of the desks I could see…empty.
I walked in, looked at the back and said “Happy April 1”.
I LOVED it!
I joked that today, we were having the final exam and they had to prove the Tychonoff Theorem from scratch…full version (infinite product of compact spaces is compact in the product topology).
I gave them all 1 extra point on their homework assignments.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188553.49/warc/CC-MAIN-20170322212948-00118-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 573
| 6
|
https://matsci.org/t/lammps-users-nvt-and-relax-time/5170
|
code
|
i have had a puzzle on relax time.now i want simulation the
solidification of the metal melt droplet, i used fix nvt command like
velocity all creat 2300 32545
fix 3 all nvt 2000 300 100
Then my question is
a. In order to get the melt of metal , i set the temperature 2300
above the melt point of metal in the velocity command ,then
equilibrated in this temperature for a special time by fix nve (run
1000 timestep),is it right or valid?
b. how shoud the random seed "32545" be set? is it arbitrary ? what is
considered when it did.
c in simulation solidification process (fix 3 all nvt 2300 300
100), if i can get the temperature each timestep is a ramped value
during the run (1000) from (2300)to (300), that is we got
d what is the mean of the Tdamp(100), is it relax time? what relation
is between the relax time and the timestep? some people say the relax
time should be set in a order with timestep and <= the timestep ,why?
e Is the relax time the real time? about the timestep? then in my
inout file ,the relaxtime is 100 time untis,that is 100ps, and the
timestep is 0.1ps
f. the decrease temperature rete is (Tstart -Tend)/(run * timestep)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107883636.39/warc/CC-MAIN-20201024135444-20201024165444-00660.warc.gz
|
CC-MAIN-2020-45
| 1,149
| 21
|
https://xcannabis.com/the-charles-burch-foundation-xcannabis-vlog/
|
code
|
The Charles Burch Foundation / xCannabis vlog
This is my report on what happened with the breast cancer awareness Facebook status update rally that many took part in on Facebook around 1/7/2010 through 1/10/2010.
Charles Burch is the guy who apparently started this movement. I have mad respect for him.
Check out his facebook group at: http://www.Facebook.com/cbbcf
Check out his Youtube channel at: http://www.youtube.com/cbbcf
Check out the cure for cancer (cannabis) by going to: http://xcannabis.com/cannabis-for-cancer/
I have so much respect for this young man! Good work!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141746320.91/warc/CC-MAIN-20201205044004-20201205074004-00388.warc.gz
|
CC-MAIN-2020-50
| 579
| 7
|
https://forums.digi.com/t/http-multi-session/4020
|
code
|
How is managed multiple HTTP request from many different users at a time?
Imagine 2 users accessing a same web page then make different selections then submit the forms, how could we know which selections were made by which user?
Each web page request calls the same cgi, so the datas from the user #1 are mixed with the ones from the user #2.
How to separate the datas from different users?
RpSetUrlState function usage is not clearly explained…
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500368.7/warc/CC-MAIN-20230207004322-20230207034322-00760.warc.gz
|
CC-MAIN-2023-06
| 448
| 5
|
https://riuma.uma.es/xmlui/handle/10630/8299
|
code
|
Formal Concept Analysis has become a real approach in the trend Information-Knowledge-Wisdom. It turns around the mining of a data set to built a concept lattice which provides an strong structure of the knowledge. Implications play the role of an alternative specification of this concept lattice and may be managed by means of inference rules. This syntactic treatment is guided by several properties like directness, minimality, optimality, etc. In this work, we propose a method to calcu- late the direct-optimal basis equivalent to a given Implicational System. Our method deals with unitary and non-unitary implications. Moreover, it shows a better performance that previous methods in the literature by means of the use of Simplification Logic and reduction paradigm, which remains narrow implications in any stage of the process. We have also developed an empirical study to compare our method with previous approaches in the literature.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00200.warc.gz
|
CC-MAIN-2023-14
| 945
| 1
|
http://llllllll.co/t/mpe-touch-controller-options/5509
|
code
|
The Mocante is interesting in that you have all those mini patch points in the middle too, so I presume there's quite a bit of chaotic control/input to things. The form-factor is quite nice too. The nice thing about these 'bare metal' controllers (mocante, manta, rene/pressure) is that the response type is really fast. The "pressure" is artificial but perhaps it is useful enough.
My old university has a Manta in the tech store that I can probably borrow, so it might be worth having a go on one to see how it 'feels'.
As in the CPU overhead of the Soundplane, or in general? I guess, because of how it works, that it does some heavy lifting to get such a fast response time and high resolution.
I did see something about a Soundplane Model B on the forum, so maybe that could be a way to go in the future. Has anyone encountered any specific info about it?
Yeah I saw that. Also seen a couple other pressure sensitive DIY controllers out there, though my experience with that kind of 'mushy' controller is that it doesn't 'feel' fast, in terms of action/playability.
There is always that, or an iPad pro + pencil, as you get lots of rich data (pressure/tilt/etc...), but either would tether me to an implement that I'd have to hold play playing something else, which isn't ideal.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191984.96/warc/CC-MAIN-20170322212951-00018-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 1,283
| 6
|
https://www.antaljobs.ro/jobs/java-fullstack-developer/
|
code
|
About the project
Vision Network Packet Broker is one of the main SW projects in the Network Visibility and Security organization.
We are developing an embedded SW stack which allows configuration of our proprietary network monitoring HW, offering visibility across the customers’ enterprise network traffic.
Working on this project, you will gain insight in multiple technologies ranging from developing new network monitoring functionalities using Java, enabling and configuring HW devices, creating REST APIs and exposing new features in WebUI developed in an Enterprise Web Application Framework.
About the team
We are following a well-defined development process with clear steps from setting priorities based on customer feedback and business needs, to feature specifications, architecture review, test plan and continuous integration using tools and clear processes for source control, code reviews, and feature tracking.
The team is diverse, spanned across multiple sites in RO and US.
Working schedule is flexible. We have regular daily meetings for status and occasional technical meetings based on the project phase and status.
- Design, prototype and iterate on creative concepts to meet our user requirements;
- Participate in definition of new software product features and software;
- Develop server-side components to satisfy front-end requirements;
- When needed, develop front-end code using web application frameworks;
- Adopt and communicate new concepts, ideas, techniques and best practices;
- Rapidly solve problems and fix bugs;
- Participate in design and code reviews;
- Develop unit tests and perform feature/integration testing
- You have great Java and Object Oriented software design skills ;
- Excellent knowledge of data structures, algorithms and multi-threading;
- Working experience with Client/Server application development and REST services;
- Working experience with HTML5, CSS3, and web application frameworks;
- Proficient use of dev tools & processes including JDE, version control, and defect tracking;
- Ability to work independently and within a team;
- Problem solver and technology enthusiast;
- Creativity, innovation, and resourcefulness.
- Knowledge and interest in Ethernet and networking technologies is a plus.
- Docker and Kubernetes orchestration knowledge is a plus.
If interested, please apply at JAVA FULLSTACK DEVELOPER (bestjobs.eu)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522309.14/warc/CC-MAIN-20220518183254-20220518213254-00272.warc.gz
|
CC-MAIN-2022-21
| 2,394
| 27
|
https://vertexrecruitment.co.uk/tech-candidate/
|
code
|
Software development applications enrich, automate and create efficiencies for individuals and organisations and to power technological advancement.
The original development began with mainframe computing, this was driven by Assembler languages and 3GL’s such as Cobol, Fortran and Pascal introduced IT to mainstream business users.
Here at Vertex, we know that Web Developers, Application Developers and Software Engineers are very passionate about coding in their chosen discipline. We too are passionate about good IT recruitment and are therefore experts at short-listing candidates for development posts through a great awareness of the languages and very many associated tools. Our team have unfettered access to online test tools to ratify proficiency levels in all the mainstream coding languages.
Roles we recruit for in this area:
- Software Developer
- Software Engineer
- Applications Developer
- Programmer Web Developer
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00550.warc.gz
|
CC-MAIN-2022-33
| 935
| 8
|
https://forum.millumin.com/discussion/comment/2614/
|
code
|
Data Track > String mode
Hi, can we please have some proper info on how to use a data track to send TCP commands?
i have tested a telnet connection from terminal on the mac to the projector. i can send commands and it works great!
but i cant send any commands from Millumin.
what are the range vales for?
how do I tell a certain column how or when to send the command?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401614309.85/warc/CC-MAIN-20200928202758-20200928232758-00407.warc.gz
|
CC-MAIN-2020-40
| 368
| 6
|
http://dotnet.sys-con.com/node/2441885
|
code
|
|By Richard Spragg||
|November 16, 2012 12:00 PM EST||
It was only fairly recently that I cracked the myth of multitasking, and found an attitude toward it that I am comfortable with.
These days, I see it this way. A housewife (if you'll forgive the 1950s stereotype that follows - but the idea of the multitasking superwoman is perfect for this purpose) needs to cook dinner, tidy up the lounge of toys and change a nappy. She leaves some sauce simmering on the stove, picks up a couple of soft toys and throws them in the toy chest, then takes care of the baby's nappy. She returns child to crib, washes her hands, picks up the books that were on the floor and slides them back into the bookshelf. She returns to the stove, adds some basil, reduces the heat and goes to answer the doorbell. This is the classic stereotype of multitasking. That skill, much maligned by the stereotype useless male - unable to sit upright and breath in and out at the same time - that results in incredible productivity.
But this is not really multitasking.
At no stage was the housewife engaged in two tasks at once, nor should she have been. True multitasking would have involved changing the nappy, while using the baby's legs to stir the sauce and kicking the toys and books one by one toward the place they were supposed to go. The result? Burned feet, nappies on the stove, books nowhere near the bookshelf and a lot of mess to clean up.
Thus stands the multitasking myth. Because what you're really talking about is not the ability to complete multiple tasks at once, but the ability to switch between tasks effectively, without hindering the effectiveness of your contribution to any of them. This is what you should focus on improving if you want to be a multitasker. How can you flip between jobs productively? Your working routine is bound to require it; nobody's working day ever allows them to focus on one thing only, but they are seldom required to actually do two things at once.
So multitasking remains one of the biggest myths in the modern workplace, whether that work place is an office, a construction site or a household.
That's not to say it doesn't exist, or that it can't be done. There are number of ways that you can multitask effectively, and putting some thought into structuring your day to allow for these real examples of multitasking is what will help to make you more efficient.
Here are a few things you can do that constitute real multitasking.
Schedule phone conversations when you're driving (hands free please.)
My car has some clever green tooth or blue eye thing that means I receive calls from a button on my steering wheel. But a $10 earpiece has much the same effect.If you have an hour long commute involving traffic (and if you're working on engineering jobs in Houston for example, I know you do) you can make it work for you. It doesn't have to be business; it can be anything that will save you time earlier or later in the day. Sit on hold with whichever bank is currently abusing your custom. Call Mom. If it's something you would have to find other time to do otherwise, it's saving you time. (Make sure you are complying with all legal responsibilities for safety reasons.)
Combine Audiobooks with basic physical tasks
Again, the car is good. But so is the bath, the kitchen while you're cooking dinner (one of my responsibilities at our place - who's 1950's now?) or the treadmill at the gym. You don't have to read, to get that book read. It was a big day for me when I realized that iPods weren't just for music. Audiobooks (that you pay for) or podcasts (that you don't) offer a vast range of opportunities to learn and develop during dead time, like when you're on the stationary bike, or boiling the water for the pasta.
Combine Conference Calls with almost anything
Be honest. A good number of conference calls require less than active participation. If I find myself on one of those calls, I look for the mute button and for something else to do. If I'm in my office at home, I'll do a wash load or clean the kitchen. The combination of mindless physical task and passive mental task is a good one. You should be careful not to try anything too engaging. It's difficult to build a PowerPoint presentation or write a detailed e-mail and stay on top of the subject matter of a conference call, even if you're not talking very often. You need to pay attention, but a physical task that requires no thought should allow that.
Multitasking can only be effectively achieved with the right balance of mindless physical tasks and stationary mental ones. As soon as anything blurs the lines on that distinction, you're in trouble. Beware overreaching. I suggest you take my word for the fact that stationary bikes and food preparation are not a good match. Weddings and audiobooks can also result in injuries of a different kind. Throughout this process, one must pay attention to what is potentially dangerous, or just plain inappropriate. It's easy to offend people if they should get the impression they don't have your full attention.
At the end of the day, which task you are neglecting, and which you are diligently carrying out is all a matter of perception. As my school chaplain once told me - "You can't smoke while you pray. But you can pray, while you smoke."
Multitasking suggestions and party fouls welcome in your comments...
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 28, 2016 07:30 PM EDT Reads: 418
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
Jun. 28, 2016 07:15 PM EDT Reads: 382
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Jun. 28, 2016 06:30 PM EDT Reads: 373
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Jun. 28, 2016 04:30 PM EDT Reads: 913
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Jun. 28, 2016 02:00 PM EDT Reads: 1,153
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Jun. 28, 2016 01:00 PM EDT Reads: 838
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jun. 28, 2016 12:45 PM EDT Reads: 971
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
Jun. 28, 2016 12:00 PM EDT Reads: 1,189
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Jun. 28, 2016 10:30 AM EDT Reads: 548
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
Jun. 28, 2016 10:00 AM EDT Reads: 479
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
Jun. 28, 2016 10:00 AM EDT Reads: 432
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Jun. 28, 2016 09:45 AM EDT Reads: 465
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t...
Jun. 28, 2016 09:30 AM EDT Reads: 1,314
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Jun. 28, 2016 08:30 AM EDT Reads: 1,246
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
Jun. 28, 2016 08:00 AM EDT Reads: 500
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Jun. 28, 2016 08:00 AM EDT Reads: 1,371
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Jun. 26, 2016 05:00 PM EDT Reads: 1,273
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Jun. 26, 2016 05:00 PM EDT Reads: 1,360
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Jun. 26, 2016 04:00 PM EDT Reads: 1,327
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Jun. 26, 2016 04:00 PM EDT Reads: 1,412
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00180-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 15,877
| 59
|
https://www.opengee.org/geedocs/5.2.0/answer/3230777.html
|
code
|
Google Earth Enterprise Documentation Home | GEE Server administration
Create Portable Globes and Maps
When you’re out in the field and you need a globe or map that can easily be stored and accessed from a desktop or laptop, you can create a portable globe or map by creating a cut of one of your databases. A portable globe or map is a single file (
.glc) that stores all the geospatial data available within your specified area of interest—including all high-resolution imagery, terrain, vector data, KML files, and searchable point of interest (POI) locations. Outside the specified area of interest, the globe or map stores only low-resolution imagery and terrain. You specify the levels of resolution when you cut the globe or map.
You can create portable globes and maps with the cutter tool feature of the Google Earth Enterprise (GEE) Server, from existing GEE portable files, or you can obtain them from third-party vendors. Depending on your area of coverage, it can take only a few minutes to specify and generate a globe or map and then save it to the GEE Portable maps directory.
Cut globes and maps from existing portable files
With GEE 5.x, you can also cut globes and maps from existing portable files, convenient when you want to view a limited region of a previously cut globe or map, especially when your portable files are very large. This feature is often useful when you want to combine portable files with other
.glc files to create a layered composite globe using the Assembly tool.
Cutting globes and maps from existing portable files is a new feature in GEE 5.x and is available with portable files that have been built using GEE 5.x only.
If you attempt to cut a portable file that was created using GEE 4.x, the cutting process will fail. However, you can serve portable files created using previous versions.
To determine which version of GEE was used to create a portable file, the timestamp information for the file is available for served globes or maps via
http://localhost:9335/earth/info.txt on a local
Portable Server, or
http://<server>/<mount_point>/earth/info.txt on Earth Server. In addition you can get the timestamp information using
geglxinfo, the GEE tool for inspecting portable files.
Inspect portable files for timestamp information
To help you identify which version of GEE was used to create a portable file, you can use the portable inspection tool,
geglxinfo, to get the timestamp for when the portable file was created. This information should give you a good idea of which version of GEE was used to create the file. Extract and output the earth/info.txt file, as in the following example use of the command:
$ geglxinfo --glx tutorial_3d.glc --extract_file earth/info.txt --output /tmp/info.txt
$ cat /tmp/info.txt
Copyright 2013 Google Inc. All Rights Reserved.
2014-01-15 16:03:15 GMT
Globe description: Simple container for tutorial glb with gray marble backdrop.
Executing: /opt/google/bin/gecreatemetadbroot --output="/tmp/cutter/glc_20598_1389801795.111116/metadbroot" --layers="/tmp/cutter/glc_20598_1389801795.111116/earth/dbroot_layer_info.txt" --has_base_imagery
Executing: /opt/google/bin/geportableglcpacker --layer_info="/tmp/cutter/glc_20598_1389801795.111116/earth/layer_info.txt" --output="/tmp/cutter/glc_20598_1389801795.111116/temp.glc" --make_copy
Composite globes and maps
Portable globes and maps can also be assembled into layers to create a composite globe or map, a single file (
.glc) that contains all the geospatial data for assembled layers. To assemble a composite file, you supply a KML polygon to cut your area of interest, then specify the layers and order in which they display. See Create composite globes and maps.
Cutting a globe or map is accomplished with a simple web interface. You import KML, or use your mouse, to define a polygon, which defines your "area of interest." This polygon not only defines the area that displays high-resolution imagery, but is also used by Fusion to create a localized search database.
Note: The cutting processes are CPU and disk intensive, as they are retrieving all data within the specified polygon from the Earth Enterprise Server. This can affect the overall performance of the Server, including slowing end-user access.
To mitigate performance impact to end users, you may consider:
- Limiting the number of users with access to cutting.
- Creating pre-cut portable globes to host as downloadable files for portable users.
- Operating a separate GEE Server specifically to support on-demand cutting needs.
Please contact the Google Earth Enterprise Support team for further information or questions about these procedures.
Before you begin
Enable the cutter
Before cutting a globe, you must enable the cutter from the command line:
- In GEE 5.x:
- In earlier versions:
For more information about
geserveradmin, see the Command Reference.
Note about authentication and SSL: Cutting is not currently supported on globes or maps that require end-user authentication such as LDAP. One workaround is to allow unauthenticated access from localhost on your Earth Enterprise Server. Refer to Apache documentation to enable such a configuration. Cutting of a globe over HTTPS is supported; however the SSL certificate of the target server will not be verified during cutting.
The globe cutter interface
To create a portable globe:
- Access the Google Earth Enterprise Server Admin console in a browser window by going to myserver.mydomainname.com/admin, replacing myserver and mydomainname with your server and domain.
- Sign in with the default credentials or the username and password assigned to you:
Note: If you do not know your username and password, contact your Google Earth Enterprise Server System Administrator.
- Default username: geapacheuser
- Default password: geeadmin
- Click Databases to display the list of databases and portables pushed to the Server.
- Click the Settings button in the top right of the window: and choose Launch Cutter from the Tools menu.
A new browser tab opens with the GEE Server — Cutting Tool and the Create new offline map window appears.
Map or globe name
- Use the drop-down menu to select the database or portable you'd like to cut to create your offline map or globe.
- Enter a name for the offline map or globe.
The name defines the filename for your offline map or globe. Offline maps are created as
.glmfiles; offline globes are created as
.glbfiles. Both file types are a single-file format for sharing Google Earth Enterprise maps and globes. Spaces, slashes, and double dots (..) will be converted to underscores in the saved globe name.Building an offline map or globe will overwrite any existing offline maps or globes with the same name. If multiple users are cutting maps or globes, we recommend assigning unique prefixes to each user for their globe names to ensure that files are not accidentally overwritten.
- Enter a description to be associated with the offline map or globe.
We recommend adding sufficient descriptive information for each offline map or globe, so that others will know what geographic area, or what mission, they were created for.
- If you are overwriting an existing cut, click Overwrite? to Yes.
Drawing the polygon
Once the globe or map name has been specified, you can define the geographic region to be cut by drawing a polygon on the globe. There are two ways to draw the polygon.
Hand drawing the polygon
- By default, you draw a polygon by hand so the Select Region drop-down list is set to Manual.
- Use the Hand tool to pan, then using the navigation controls in the plug-in, zoom in to the region of interest.
- To use your mouse to define the polygon, click the polygon icon in the globe window: .
- Click on the map or globe to define each point. You can use the navigation controls on the right to move the globe or change zoom levels while drawing.
Click the final point at the point of origin to complete the polygon selection.
If you need to draw the polygon again, click Clear to delete the polygon you just created.
Defining the polygon with KML
You can also use KML to define the polygon(s). The KML should be complete, and may contain single or multiple
- From the Select Region drop-down list, select Paste KML. The Paste KML window appears.
- Paste your KML into the text field, then click Use KML.
GEE Server validates the KML and then draws the polygon using the KML data you provided. Your polygon appears on the map or globe (the latter, only if you have the discontinued Google Earth plug-in running in your browser).
If you need to draw the polygon again, click Clear to delete the polygon you just created with pasted KML.
The polygon you specify in the previous step defines your area of interest. This area contains high-resolution imagery and data, and search tabs are created for vector data within this zone. The maximum and minimum resolutions are specified as integers between 1 and 24. These correspond to the zoom levels that are used in the Fusion server. Setting a resolution of 24 results in a cut of the entire globe.
Caution: Setting a resolution of 24 to cut an entire globe may result in a very large file.
World level resolution
The area outside of the defined polygon is included in the globe at a lower resolution, which you set using World level. Areas near the polygon may be included at a higher resolution.
- To set the world level resolution, select a value from the World level: drop-down list.
A minimum zoom level of 5-7 presents a decent-looking world to the user and is most likely to include vector layers such as international boundaries and state boundaries and main cities without affecting the size of the
.glb file very much. For example:
- A cut globe with minimum and maximum resolution values set to 5 is 10MB.
- A cut globe with minimum and maximum resolution values set to 6 is 41MB.
- A cut globe with minimum and maximum resolution values set to 7 is 120MB.
These numbers are small in comparison to the overall size of your globe when a suitable maximum resolution has been selected. For example, a globe that contains all of the city of Atlanta, GA, USA in 1-foot resolution requires approximately 5GB of storage. Even level 7 imagery, at 120MB, is a small percentage of the overall globe size. You can also leave this field blank to use the highest available imagery.
Region level resolution
The zoom level for the polygon area is set using Region level.
The maximum resolution of the cut polygon area is no higher than the maximum resolution of the source map or globe. For example, if the maximum resolution in the cutter is specified at 24, but the source imagery is at 18 (approximately 1-meter resolution), the cut map or globe will contain level 18 imagery. You can leave this field blank to use the highest available imagery.
You may enter a lower number to reduce the size of your map or globe, by not including the highest resolution imagery.
Advanced Polygon Resolution
The Advanced option provides an additional globe-cutting option, namely Polygon Resolution. This setting is useful when cutting with large polygons. For example, you may use 12 for a country-sized polygon or 18 for a city-sized polygon.
To set the polygon resolution:
- Click Advanced to display the Polygon Resolution option.
- Click the drop-down list to set the resolution value you want.
Building the map or globe
Depending on the size of your polygon, building your cut map or globe can take from a few minutes to a few hours; likewise, file size varies widely depending on the area selected and the desired resolution.
To build the map or globe:
- Click Cut map to start the build process.
The progress of the build appears in the Build window.
When the build is finished, a
.glbfile is created in the default globes directory,
/opt/google/gehttpd/htdocs/cutter/globes, and a download link appears to the file's location on GEE Server.
When a portable globe is cut from a source containing KML links in the Layer panel:
- KML files that are stored locally on the primary Earth Server will be bundled into the portable globe. Only the main KML file will be copied, not any links or files that are embedded as links in the main KML file. The default copy is not recursive.
- KML links that refer to servers other than the primary Earth Server are not copied. The layer will be visible in the client, but clicking the link will not cause any data to be displayed. If access to external servers is needed, a small KML file should be stored locally on the primary Earth Server. This KML file should contain a link to the intended external server.
Historical Imagery is not supported in the portable globe as of Fusion 4.2.
There are, however, two situations in which historic imagery will be displayed:
- When the computer running the portable globe has a connection to the Earth server from which the globe was cut. In this case, historic imagery can be streamed from the Earth server. Once in the field, however, and disconnected from the Earth server, no historic imagery will be displayed.
- If historic imagery has been cached on the portable globe machine.
Otherwise, the following error message will appear:
Google Earth can't contact the imagery server to download new images.
You'll be able to see areas that you've been to recently, but new image areas may appear blurry.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363337.27/warc/CC-MAIN-20211207075308-20211207105308-00299.warc.gz
|
CC-MAIN-2021-49
| 13,349
| 115
|
https://www.dur.ac.uk/geography/research/research_projects/?mode=staff&id=14455
|
code
|
Departmental Research Projects
Miss Hannah Joyce
2015 - Present: PhD - 'A multiple catchment scale analysis of upland river channel adjustments over the last 150 years: thinking outside the reach scale box’ (NERC IAPETUS funded) - Durham University
2011 - 2015: MSci Geography (1st Class Hons) - Durham University
- Joyce, H.M., Hardy, R.J., Warburton, J. & Large, A.R.G. Sediment continuity through the upland sediment cascade: geomorphic response of an upland river to an extreme flood event. Geomorphology. 2018;317:45-61.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410745.37/warc/CC-MAIN-20200531023023-20200531053023-00553.warc.gz
|
CC-MAIN-2020-24
| 527
| 5
|
http://rnmr.nmrfam.wisc.edu/pages/download/files/Package%20source/
|
code
|
rNMR is an add-on package developed for R, a free statistical computing envirionment. Versions of rNMR are available for Windows, Mac, Linux and Unix using the directories above. Automated installers are also available at the rNMR downloads page. The rNMR package requires a relatively recent version of R (2.10 or higher). R can be downloaded free of charge from www.r-project.org.
install.packages(full path to package tar
, lib='~', type='source', repos=NULL)
Linux users: rNMR is supported the Linux distributions listed below.
rNMR may run on other distributions but we can not gaurantee its performance.
Mac users: rNMR requires the use of a two-button mouse (CTRL+'click' is not sufficient). On most systems, the single button mouse can be configured to operate with a second button, check your systm settings. Also, rNMR is only compatible with versions of Mac OS X that come with X11 preinstalled (version 10.5 and higher). rNMR may run on older versions if X11 is installed separately, but we can not gaurantee its performance.
Please refer to the rNMR manual for information on using rNMR.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574501.78/warc/CC-MAIN-20190921125334-20190921151334-00117.warc.gz
|
CC-MAIN-2019-39
| 1,100
| 7
|
https://sourceforge.net/p/htdig/mailman/attachment/E1H75NS-0004In-2I@mail.sourceforge.net/1/
|
code
|
Thanks for your replies. I’ve added 2 v’s to the command which runs htdig and it is now running as we speak (halfway through I guess). I’m expecting a rather huge e-mail with the results ;-) I monitored the indexing yesterday for a while and it looks like htdig and the other processes use some much memory that Linux indeed has to swap to the harddrive. I’m going to ask our service provider to add more memory.
The other thought of going to 3.2.0 did cross my mind but I’ve been playing around with that one some two years ago when I tried and succesfully compiled that version on Windows. When comparing this version with 3.1.6 I’ve noticed it has some performance issues. It was much slower that 3.1.6 in our tests. Worth a look if the request for extra memory is denied and the two v’s can’t help me solve this problem.
Thanks again for your replies and I will be posting the results (if any :-) right here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945493.69/warc/CC-MAIN-20180422041610-20180422061610-00242.warc.gz
|
CC-MAIN-2018-17
| 928
| 3
|
https://forum.mautic.org/t/how-to-show-the-description-of-the-categories-in-the-preference-center-page-to-the-contact/24185
|
code
|
My Mautic version is: v4.2.2
My PHP version is: 7.4.29
My Database type and version is: 10.6.7-MariaDB-1:10.6.7+maria~bionic
My problem is:
I want to show in the CPP to the contact the Categories in which he is registered.
The title of the categories can be shown with the Category-list-slot, but it is important to me that I show the description of the categories to the user, how can I do that, is it possible ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818740.13/warc/CC-MAIN-20240423192952-20240423222952-00384.warc.gz
|
CC-MAIN-2024-18
| 413
| 6
|
https://flylib.com/books/en/2.723.1/enter_python.html
|
code
|
If this book has achieved its goals, you should by now have a good understanding of why Python has been called a "next-generation scripting language." Compared with similar tools, it has some critical distinctions that we e finally in a position to summarize:
Like Tcl, Python can be used as an embedded extension language. Unlike Tcl, Python is also a full-featured programming language. For many, Pythons data structure tools and support for programming-in-the-large make it useful in more domains. Tcl demonstrated the utility of integrating interpreted languages with C modules. Python provides similar functionality plus a powerful, object-oriented language; its not just a command string processor.
Like Perl, Python can be used for writing shell tools, making it easy to use system services. Unlike Perl, Python has a simple, readable syntax and a remarkably coherent design. For some, this makes Python easier to use and a better choice for programs that must be reused or maintained by others. Without question, Perl is a powerful system administration tool. But once we move beyond processing text and files, Pythons features become attractive.
Like Scheme (and Lisp), Python supports dynamic typing, incremental development, and metaprogramming; it exposes the interpreters state and supports runtime program construction. Unlike Lisp, Python has a procedural syntax that is familiar to users of mainstream languages such as C and Pascal. If extensions are to be coded by end users, this can be a major advantage.
Like Smalltalk, Python supports object-oriented programming (OOP) in the context of a highly dynamic language. Unlike Smalltalk, Python doesn extend the object system to include fundamental program control flow constructs. Users need not come to grips with the concept of if statements as message-receiving objects to use Python -- Python is more conventional.
Like Icon, Python supports a variety of high-level datatypes and operations such as lists, dictionaries, and slicing. Unlike Icon, Python is fundamentally simple. Programmers (and end users) don need to master esoteric concepts such as backtracking just to get started.
Like modern structured BASIC dialects, Python has an interpretive/interactive nature. Unlike most BASICs, Python includes standard support for advanced programming features such as classes, modules, exceptions, high-level datatypes, and general C integration.
All of these languages (and others) have merit and unique strengths of their own -- in fact, Python borrowed most of its features from languages such as these. Its not Pythons goal to replace every other language; different tasks require different tools, and mixed-language development is one of Pythons main ideas. But Pythons blend of advanced programming constructs and integration tools make it a natural choice for the problem domains weve talked about in this book.
Part I: System Interfaces
Parallel System Tools
Larger System Examples I
Larger System Examples II
Part II: GUI Programming
Graphical User Interfaces
A Tkinter Tour, Part 1
A Tkinter Tour, Part 2
Larger GUI Examples
Part III: Internet Scripting
Larger Web Site Examples I
Larger Web Site Examples II
Advanced Internet Topics
Part IV: Assorted Topics
Databases and Persistence
Text and Language
Part V: Integration
VI: The End
Conclusion Python and the Development Cycle
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100912.91/warc/CC-MAIN-20231209134916-20231209164916-00371.warc.gz
|
CC-MAIN-2023-50
| 3,357
| 27
|
https://voicebookonline.com/10-best-books-new-releases-in-textbooks/
|
code
|
All products presented on our website are independently selected by our editors. To help you find your best books however, when you buy something through our retail links, we may earn an affiliate commission.
1-US Citizenship Test Study Guide 2023.
US Citizenship Test Study steer 2023: This comprehensive steer provides an in-depth look at the US undefined Test. It covers all the stuff tested on the test and provides utile tips and strategies for mastering the test. This guide is an essential tool around for anyone looking to turn a US citizen, and is sure to help you ace the exam.
2-Python Crash Course, 3rd Edition.
Python Crash Course, 3rd Edition: Python ram Course has been fully updated for the third edition, qualification it even easier for new coders to learn the language quickly and effectively. This book covers the basics of Python programming, as swell as more advanced topics like object-oriented programming and data science. Whether you’re just starting come out or looking for to level upward your secret writing skills, this book is an invaluable resource.
3-Microsoft Defender for Endpoint In-Depth.
Microsoft Defender for Endpoint In-Depth: Microsoft withstander for Endpoint In-Depth is an essential steer for anyone looking to sympathise the basic rule of the Microsoft withstander for end point platform. This hold covers the rudiments of the platform, as swell as more advanced features and strategies for exploitation it effectively. With this book, you’ll be capable to use the platform to its full potential.
4-Professing Criticism: Essays on the Organization of Literary Study.
profession Criticism: Essays on the Organization of Literary Study: This collection of essays provides an in-depth look for at the organization of literary study. The essays research topics like the use of possibility in writing criticism, the organization of piece of writing in the classroom, and the grandness of recitation as a practice. A must-read for anyone looking for for to gain a deeper understanding of written material study.
5-Unearthing Joy: A Guide to Culturally and Historically Responsive Teaching and Learning.
Unearthing Joy: A Guide to Culturally and Historically Responsive Teaching and Learning: Unearthing Joy is a comprehensive examination steer to culturally and historically responsive teaching and learning. The book covers topics care the importance of student-centered instruction, the need for critical reflection, and the function of technology in education. A great imagination for any educator looking for to create a more just classroom.
6-Escape from Model Land: How Mathematical Models Can Lead Us Astray and What We Can Do About It.
Escape from Model Land: How Mathematical Models Can Lead Us wide and What We Can undefined About It: bunk from Model Land is an essential read for anyone interested in sympathy the dangers of relying on unquestionable models. The book examines how models can be misleading, and provides strategies for avoiding the pitfalls of model-based thinking.
7-Metamathematics: Foundations & Physicalization.
Metamathematics: Foundations & Physicalization: Metamathematics is a comprehensive steer to the foundations of mathematics and its physicalization. This book covers topics like the principles of logic, the purpose of algorithms in mathematics, and the grandness of typeset theory. A important resource for anyone looking to deepen their understanding of mathematics.
8-Ugly’s Electrical References, 2023 Edition.
Ugly’s Electrical References, 2023 Edition: Ugly’s Electrical References is an necessity steer for anyone workings in the electrical industry. This book covers topics wish basic physical phenomenon principles, safety protocols, and wiring diagrams. With its comprehensive coverage, this book is a must-have for some engineer or electrician.
9-First Aid for the USMLE Step 1 2023, Thirty Third Edition.
First Aid for the USMLE Step 1 2023, Thirty Third Edition: This comprehensive steer provides an in-depth look at the USMLE Step 1 exam. It covers all the stuff tested on the exam and provides helpful tips and strategies for mastering the test. With its comprehensive coverage, this reserve is an invaluable resource for anyone looking to ace the Step 1 exam.
10-The Reading Strategies Book 2.0: Your Research-Based Guide to Developing Skilled Readers.
The Reading Strategies Book 2.0: Your Research-Based Guide to development complete Readers: This comprehensive steer provides an in-depth search at the strategies old to develop skilled readers. The book covers topics like the grandness of recital aloud, the importance of vocabulary instruction, and the use of questioning strategies. A great resourcefulness for any pedagogue looking for to nurture a love of reading in their students.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00106.warc.gz
|
CC-MAIN-2024-10
| 4,797
| 21
|
https://www.goodnightjournal.com/2016/05/29/my-first-entry-20/
|
code
|
today is the first time im starting to write a journal. never really tried it before.although im supposed to be studying rn i dont even know why i am doing this. one major otivation was watching the movie the social network yesterday night. even mark zukerberg kept journal online. only it was in a blog. even im considering doing that. although i dont know yet which journalling website to use . but mostly i want it to be one with a an integration with my phone as well.havent yet checked for that yet. id better check that now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256082.54/warc/CC-MAIN-20190520162024-20190520184024-00377.warc.gz
|
CC-MAIN-2019-22
| 530
| 1
|
https://jobs.bstonetalent.com/jb/Software-Engineer---DevOps-Developer-Jobs-in-Aurora-Colorado/4501350
|
code
|
Software Engineer / DevOps Developer
Blackstone Technology Group, an award winning technology consulting and staffing firm is seeking a Software Engineer / DevOps Developer to join our team and work at our client site in Aurora, CO. This will give the individual an opportunity to obtain a TS/SCI Clearance.
Job Description: We are looking for a talented Software Engineer / DevOps Developer to join our clients DevOps Transformation team. You will be responsible for supporting our team and programs in their journey to adopt DevOps skills, tools and culture as a new way of working. In our dojo, you will collaborate with other transformation team members to help program teams learn how to better write, test, package, build, integrate, secure, deploy, operate, and monitor system capabilities in new and legacy software. And help them to embrace automation, deliver small batches, and work in agile cross-disciplined teams.
- Executing practical application of agile behavior. Participating in planning, backlog grooming, standups, and retrospectives.
- Learning and adopting multiple roles within the transformation team.
- Developing software applications alongside program teams-in-training, in their own codebase, incorporating and sharing test, build, package, refactoring, etc. skills
- Helping teams-in-training add test and other pipeline automation to their existing systems
- Assisting the transformation team improve how it transforms other teams, through advancement of the dojo infrastructure, team capabilities, and training material.
- Ability to obtain and maintain a TS/SCI Security Clearance; Candidate must be able to obtain government security clearance.
- Full stack developer: 8+ years of experience in Java or C++ and with build, test and deploy automation tools (junit, cucumber, ruby, python, perl, etc), and with continuous integration tools (e.g. Jenkins), configuration management tools (e.g. Chef)
- At least 8+ years of experience in agile development.
- Experience with cloud and containerization: AWS, Google Cloud, Docker, Kubernetes, OpenShift, etc
- Excellent oral and written communication skills.
- Ability to work closely with other engineers and management
- Ability to develop and deliver training material.
- Hands-on experience using an Agile planning tool such as JIRA.
- Agile certification
- Software architecture experience including 12 Factor App, microservices
- Technical lead experience
- 8+ years of experience with a B.S./B.A. in Engineering, Computer Science, Information Systems, Cybersecurity, or a related field
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578765115.93/warc/CC-MAIN-20190426093516-20190426115516-00345.warc.gz
|
CC-MAIN-2019-18
| 2,571
| 20
|
https://odesk.com/o/jobs/browse/skill/on-page-optimization/st/1/
|
code
|
Less than 1 week –
Less than 10 hrs/week –
Fix the items listed below from PageSpeed Insights. Also look at my .htaccess file to see if expires header and ETags are set up correctly to work with W3 Total Cache and CloudFlare.
Leverage browser caching
Note that I have W3 total cache and and CloudFlare installed so most browser caching and CSS minify are done.
Here are the details from Google PageSpeed Insights:
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999642517/warc/CC-MAIN-20140305060722-00084-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 417
| 6
|
https://rimworldbase.com/betterinfocard-mod/
|
code
|
The BetterInfoCard Mod expands the information card interface of the vanilla game, and make some QOL changes.
BetterInfoCard Mod features
- Opening the info card won’t pause the game
- Resizable and collapsible Info cards
- Multiple info cards Supported
- Mark Stat as favorite
- Comparing Stats by double click
- Info card hotkey
- Comparing multiple things by one click
- Focus on search field on popup
- More pawn stats(body parts and attack tool)
Known issues: some stat values are not “Greater Is Better”(i.e Aiming Time, but it’s impossible to preset them due to code structure. You may need to set it manually.
Performance: Having too many info cards open at the same time can create performance issues, but you can minimize them.
- Simplified Chinese
- Traditional Chinese
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00749.warc.gz
|
CC-MAIN-2024-10
| 794
| 15
|
http://www.facefinal.com/2014/03/cobra-and-monitor-lizard-went-for.html
|
code
|
The Lizard and the Cobra size each other up and then they try to intimidate each other by increasing their sizes.
If being the biggest determines the baddest, then each wants to say I am the biggest and a baddest.
The Cobra then strike, the monitor retreats, but not before slapping the Cobra with its tail.
Now, the Cobra has the eggs all to itself, only that they were all empty. The monitor lizard has the last laugh. The battle was over even before it began.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190236.99/warc/CC-MAIN-20170322212950-00156-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 462
| 4
|
http://www.toxicgreen.com/frames/skitspage/skitviewer.htm
|
code
|
PICK A SKIT FROM THE MENU ON THE RIGHT
are over 100 short comedy skit scripts! You'll laugh. You'll cry. You'll
do a little laugh-cry where people will ask "are you laughing or
crying?" and you'll be like "both".
'em and weep. Truth or Dare? Dare. I dare you to find a typo. You won't.
I simply don't make grammatical errors.
Some of the skits may offend you. They contain everything bad under the
sun, but for a good cause, so it's okay.
newest skits are at the top.
SKITS COPYRIGHT 2007 TOXIC GREEN.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824225.41/warc/CC-MAIN-20171020135519-20171020155519-00369.warc.gz
|
CC-MAIN-2017-43
| 501
| 10
|
https://www.vn.freelancer.com/projects/drupal/facelift-drupal-website/?ngsw-bypass=&w=f
|
code
|
I want to facelift my Drupal webpage, install some updates etc
11 freelancer chào giá trung bình£25 cho công việc này
I can help you facelift your Drupal website, if you need a new design, a new theme, an update, a migration, whatever you need I can definitely help you. Send me a chat.
Hi, I will help you with your drupal web-page and its updates. I am an experienced developer and programmer, and ensure to provide with quality work. Let us chat, to proceed. Waiting for your response. Thanks
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178383355.93/warc/CC-MAIN-20210308082315-20210308112315-00230.warc.gz
|
CC-MAIN-2021-10
| 503
| 4
|
https://secure.phabricator.com/rP5597f4e6f229fd912a1f5e9cb3afb1fc2396c8d3
|
code
|
Add "uri" to the fields returned by "differential.revision.search"
Summary: Ref T13490. This simplifies mostly-theoretical cases where you're accessing Phabricator via arc-over-ssh and the Conduit protocol + domain may differ from the production protocol + domain.
Test Plan: Called API via web UI, saw sensible URI values in results.
Maniphest Tasks: T13490
Differential Revision: https://secure.phabricator.com/D21102
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662675072.99/warc/CC-MAIN-20220527174336-20220527204336-00768.warc.gz
|
CC-MAIN-2022-21
| 419
| 5
|
https://techenvoke.com/chatgpt-just-plugged-itself-into-the-internet-what-happens-next/
|
code
|
The addition of plugins that give the AI access to specific areas of the internet has just been announced by OpenAI as making ChatGPT much more potent. Without the need to visit many websites for research, this expansion might make things like purchasing and trip planning simpler.
With a few chosen partners, this new online integration is currently being tested. Expedia, Fiscal Note, Instar cart, Kayak, Milo, OpenTable, Shopify, Slack, Speak, Wolfram, and Zippier are all on the list.
These are data-intensive businesses, some of which provide travel planning, shopping, information gathering, and schedule organization services to millions of users. Using AI to streamline these processes and facilitate user interaction has evident advantages.
A sophisticated request for a vegan recipe and a restaurant in San Francisco was displayed by OpenAI. From a plugin store, plugins for WolframAlpha, OpenTable, and Instacart were installed.
By asking for “only the ingredients” and then adding that calories should be computed using WolframAlpha, the recipe challenge was made more difficult. Even an Instacart order for the ingredients was prepared by OpenAI.
A vegan restaurant and a link to make a reservation on OpenTable were soon provided by ChatGPT. Following were the components for a chickpea salad, along with the calories for each component scaled to the appropriate serving size. Lastly, a link to order the ingredients from Instacart is provided. A promotional message from ChatGPT offered free delivery to entice new subscribers.
Each business’ website is where orders and reservations are made when the time arrives. We might eventually develop the faith in AI to make purchasing judgements.
Even ChatGPT knew you wouldn’t want to order large quantities of food for a single meal. The Instacart order omitted seasonings, lemon juice, and olive oil. The video was shared on Twitter by OpenAI.
In using AI for business, safety and alignment are crucial considerations, as highlighted in OpenAI’s blog post. Due to ongoing AI confusion concerns and the fact that plugins have internet connection, ChatGPT plugins will confirm the accuracy of the outcome.
In addition to the partner plugins, OpenAI will test its own Browsing and Code interpreter plugins.
ChatGPT may directly access the internet via the browsing plugin, using Bing for searching and a text browser for gathering data from web pages. Bing Chat, which utilizes GPT-4 and has internet connectivity, may be fairly similar to this.
Uniquely, the code interpreter enables ChatGPT to execute Python code in a sandboxed, firewalled execution environment that has strict controls. This enables you to perform difficult computations using conventional computer code as opposed to depending on the occasionally illogical responses an AI offers.
There are risks involved with this massive extension of ChatGPT’s capabilities, hence OpenAI is moving slowly. Depending on how well it does in these preliminary tests, a release date for ChatGPT plugins may be determined.
Plugins will be available to a select group of ChatGPT-Plus subscribers. Access to OpenAI is available through a waitlist, and ChatGPT plugins will eventually be made available to more businesses and customers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818452.78/warc/CC-MAIN-20240423002028-20240423032028-00546.warc.gz
|
CC-MAIN-2024-18
| 3,257
| 14
|
https://forums.macrumors.com/threads/window-xp-oem-install-problem.1024119/
|
code
|
I am having trouble loading window XP pro OEM sp2 using Bootcamp on my macbook OSX 10.5.8 It gets through copying all the files and reboots successfully through to the install window and the setup program for windows (where it displays various marketing info and has dot buttons down the left hand side). It says it will take 39 mins to setup but the counter never changes and I have left it up to an hour and nothing happens although once I did get a disk error message (something about cleaning the CD - can't remember exactly). I am doing full installs and have tried FAT and NTFS. At first I thought it was because it was an OEM but it is a Microsoft OEM and other people online seem to have no problems installing and if there is a problem it seems to stall well before the setup window. Is this a dud CD or version of windows or am I just doing something wrong?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584519757.94/warc/CC-MAIN-20190124080411-20190124102411-00319.warc.gz
|
CC-MAIN-2019-04
| 867
| 1
|
https://www.mail-archive.com/freeipa-devel@redhat.com/msg34336.html
|
code
|
On 20.7.2016 14:32, David Kupka wrote:
On 15/07/16 12:53, David Kupka wrote:
After Honza introduced thin client that builds plugins and commands
dynamically from schema client became much slower. This is only logical,
instead of importing a module client now must fetch the schema from
server, parse it and instantiate the commands using the data.
First step to speed it up was addition of schema cache to client. That
removed the RTT and download time of fetching schema every time.
Now the most time consuming task became displaying help for lists of
topics and command and displaying individual topics. This is simply
because of the need to instantiate all the commands to find the
relations between topics and commands.
All the necessary bits for server commands and topics are already in the
schema cache so we can skip this part and generate help from it, right?
Not so fast!
There are client plugins with commands and topics. So we can generate
basic bits (list of all topics, list of all commands, list of commands
for each topic) from schema and store it in cache. Then we need to go
through all client plugins and get similar bits for client plugins. Then
we can merge and print.
Still the client response is not as fast as before and I this it even
can't be. Also first time you display particular topic or list takes
longer because it must be freshly generated and stored in cache for next
use. And this is what the attached patches do.
Reimplemented so there is no need to distinguish client plugins and
The main idea of this approach is to avoid creating instances of the
commands just to get the information about topic, name and summary
needed for displaying help. Instead class properties are used to access
the information directly in schema.
I think this would better be done in Schema.read_namespace_member,
because Schema is where all the state is.
(BTW does _SchemaNameSpace.__getitem__ raise KeyError for non-existent
keys? It looks like it doesn't.)
How about setting _schema_cached to False in Schema.__init__() rather
that getattr()-ing it in _ensure_cached()?
ClientCommand.doc should be a class property as well, otherwise .summary
won't work on it correctly.
_SchemaCommand.doc should not be a property, as it's not needed for
.summary to work on it correctly.
Otherwise works fine for me.
Manage your subscription for the Freeipa-devel mailing list:
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744381.73/warc/CC-MAIN-20181118135147-20181118161147-00447.warc.gz
|
CC-MAIN-2018-47
| 2,446
| 42
|
https://www.uwec.edu/kb/article/adobe-dreamweaver-cs3-creating-forms/
|
code
|
This article is based on legacy software.
Forms are often used to request comments about a website, submit an application, or place an order. They might also be used for an online quiz or to request information from friends or students. A form is an element in a web page that contains form fields, which are used to collect information from users. Form fields allow users to enter information, generally by entering text in fields, selecting checkboxes and radio buttons, or selecting an option from a menu of choices. Users submit their information by clicking a SUBMIT button.
The Forms Bar
To help you create your form faster, Dreamweaver provides a Forms toolbar. The Forms toolbar, accessed from the Insert toolbar, allows you to insert a form field quickly without having to use the Insert menu.
On the Insert toolbar, select the Forms tab.
The Forms toolbar appears.
- Select a desired form object.
Starting the Form
Inserting the First Form Field
A form field is surrounded by a red dotted line, this is the form boundary. Form objects must lie within a form boundary in order for the information the fields record to be sent and stored in a proper manner. Once the form field has been placed within the form boundary, you must assign a name-value pair to the form field. This can be done in the selected form field's Properties pane.
Place the insertion point in the page where you would like to insert a form.
From the Forms toolbar, click Form.
From the Insert menu, select Form » Form.
A blank form field, seen as a red dotted box, appears.
From the Forms toolbar, select the desired form field.
From the Insert menu, select Form » the desired form field.
The Input Tag Accessibility Attributes dialog box appears. For more information on the options in this dialog box, refer to Forms: Input Tag Accessibility Options.
In the Label text box, type an appropriate and descriptive label.
The Label is the text that identifies the form field for users.
Under Style, make the desired selection.
Under Position, make the desired selection.
(Optional) In the Access key text box, type a letter.
(Optional) In the Tab index text box, type a numerical value.
NOTE: If you are attempting to place a form field outside of a form, a Dreamweaver dialog box appears asking if you would like to insert a form tag.
The form object appears inside the form boundary.
Inserting Subsequent Form Fields
Inserting form field objects involves not only the insertion process, but also assigning a name-value pair to the form object. For more specific information on a form object, refer to the appropriate document:
The Form Field Properties Pane
A form field Properties pane is used, among other things, to assign name-value pairs to form fields. The form field Properties pane can be accessed by selecting a form field or form object (e.g., check boxes, radio buttons, text boxes).
Each form field has its own form field Properties pane (e.g., viewing the form field Properties pane for a text field will yield the TextField Properties pane, with properties specific to text fields). Although each form field has different properties, the process for viewing the form field Properties pane is the same for all of them.
Viewing the Form Field Properties Pane
Select the form field.
The form field Properties pane corresponding to the chosen form field appears.
NOTE: The form field Properties pane that appears depends on which type of form field or form object you select (i.e., the TextField Properties pane appears if you select a text field).
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00161.warc.gz
|
CC-MAIN-2022-33
| 3,539
| 34
|
https://merientinfotech.com/course/c-language/
|
code
|
C Language Training Course
Merient Infotech offers C Language training classes in Rohtak (Haryana).
C Programming Language is the foundation for software development & programming languages. You should learn C programming before learning any other programming language.
The popularity of C is because it has excellent features. Our C Language training course includes programming fundamentals such as Data Types, Variables, Arrays, Pointers, Control-Flow Statements, Operators, Arithmetic Expressions, and many more. The syllabus of C Language course can be modified as per the student’s requirement as well.
Once you learn C programming, you can find a better career in application development such as the creation of compilers, games, operating systems, and editors. Our trainer provides quality C & C++ training so that student will be able to achieve their career goals confidently.
At Merient, we mainly focus on the practical part, so that student learn the core principle of programming. This will also help you learn any other programming language (PHP, Java, ASP.net) in the future.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473401.5/warc/CC-MAIN-20240221070402-20240221100402-00853.warc.gz
|
CC-MAIN-2024-10
| 1,093
| 6
|
https://metacpan.org/pod/CGI::Application::Plugin::Authentication::Driver::DBIC
|
code
|
- SEE ALSO
- COPYRIGHT & LICENSE
CGI::Application::Plugin::Authentication::Driver::DBIC - DBIx::Class Authentication Driver
use base qw(CGI::Application); use CGI::Application::Plugin::Authentication; __PACKAGE__->authen->config( DRIVER => [ 'DBIC', SCHEMA => My::DBIC->connect($dsn), # or existing $schema object CLASS => 'Users', # = My::DBIC::Users FIELD_METHODS => [qw(user MD5:passphrase)] ], CREDENTIALS => [qw(auth_username auth_password)], );
This Authentication driver uses the DBIx::Class module to allow you to authenticate against any DBIx::Class class.
The DBIx::Class authentication driver accepts the following required parameters.
- SCHEMA (required)
Specifies the DBIx::Class::Schema object to use for authentication. This class must be loaded prior to use.
- CLASS (required)
Specifies the DBIx::Class class within the schema which contains authentication information.
- FIELD_METHODS (required)
FIELD_METHODS is an arrayref of the methods in the DBIx::Class class specified by CLASS to be used during authentication. The order of these methods needs to match the order of the CREDENTIALS. For example, if CREDENTIALS is set to:
CREDENTIALS => [qw(auth_user auth_domain auth_password)]
Then FIELD_METHODS must be set to:
FIELD_METHODS => [qw(userid domain password)]
FIELD_METHODS supports filters as specified by CGI::Application::Plugin::Authentication::Driver
This method will test the provided credentials against the values found in the database, according to the Driver configuration.
Please report any bugs or feature requests to
bug-cgi-application-plugin-authentication-driver-dbic at rt.cpan.org, or through the web interface at http://rt.cpan.org/NoAuth/ReportBug.html?Queue=CGI-Application-Plugin-Authentication-Driver-DBIC. I will be notified, and then you'll automatically be notified of progress on your bug as I make changes.
You can find documentation for this module with the perldoc command.
You can also look for information at:
AnnoCPAN: Annotated CPAN documentation
RT: CPAN's request tracker
Cees Hek for CGI::Application::Plugin::Authentication
Shawn Sorichetti for CGI::Application::Plugin::Authentication::Driver::CDBI which this module is shamelessly copied from.
Jaldhar H. Vyas,
<jaldhar at braincells.com>
Copyright 2007, Consolidated Braincells Inc., all rights reserved.
This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627997335.70/warc/CC-MAIN-20190615202724-20190615224724-00138.warc.gz
|
CC-MAIN-2019-26
| 2,429
| 29
|
https://www.answers.com/Q/How_do_you_recover_hidden_folder_after_a_drive_being_formatted
|
code
|
Hard Disk Drives
How do you recover hidden folder after a drive being formatted?
Asked in Computer Networking, Microsoft Windows
A minus sign next to a folder indicates that content hidden?
Asked in Computer Maintenance, iPod
Why do you delete thumbnails from your computer?
Asked in Microsoft Windows
When copying files the folder containing the files to be copied is called what?
Asked in Windows 2000
What are folder attributes in windows 2000 professional?
Microsoft® Windows® 2000 Scripting Guide File systems typically support the concept of attributes, information about a file or folder that goes beyond the folder name and size. For example, if you right-click a folder in Windows Explorer and then click Properties, you can access the attributes for that folder. Figure 4.2 shows a folder with the following attributes set: Read-only Hidden Ready for archiving Compressed Figure 4.2 Folder Attributes in Windows Explorer The FileSystemObject can be used to return several important attributes of a folder. These attributes, and their FileSystemObject values, are listed in Table 4.4. Table 4.4 Folder Attributes Used by the FileSystemObject Constant Value Description Hidden 2 Indicates that the folder is hidden, and not visible by default in My Computer or Windows Explorer. System 4 Indicates that the folder is a System folder. In general, it is a good idea not to modify the properties of a system folder. Directory 16 Standard value applied to all folders. All folders accessed by the FileSystemObject will have, at a minimum, the bit value 16. Archive 32 Archive bit used by backup programs to determine the files and folders that need to be backed up. Enabling the archive bit will ensure that the folder is backed up during the next incremental backup. Disabling the archive bit will prevent the folder from being backed up during the next incremental backup. Compressed 2048 Indicates whether Windows compression has been used on the folder.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347399830.24/warc/CC-MAIN-20200528170840-20200528200840-00142.warc.gz
|
CC-MAIN-2020-24
| 1,963
| 11
|
https://newhotcourses.com/answered/how-do-you-logback-in-mdc/
|
code
|
ANSWER: MDC List contains an mdc-list-divider class which can be used as full-width or inset subdivisions either within lists themselves, or standalone between related groups of content.
How would you do that? Personally, I found it useful to write some words about MDC - Mapped Diagnostic Context. Shortly, it is a concept of mapping request specific information. Usage. We will configure MDC in Spring Boot application. We will use SLF4J on top of Logback implementation.
You can also access the MDC properties in a Logback Filter: they’re available directly from the ILoggingEvent that’s passed in. So, if we could set an MDC key whenever we’re running a batch job, then that could tell us whether we should be excluding log messages inside the filter. How to make this happen?
Dunno if I understand your problem: you want your same log message goes to different log file, depending on the data you are processing? if you use LogBack, you can do it by combination of MDC + SiftingAppender. For example, in your code, you can do: (in code) MDC.put("match_code", "MatchA");
MDC stands for Mapped Diagnostic Context, and is a feature that is offered by both plain Log4J and SLF4J with Logback or Log4J as the backing logging framework. It is a map that holds String values keyed by Strings, which is associated with the current thread (using a ThreadLocal).
Lots of people are reporting they have got MDC survey text messages recently. Those messages are asking them to do quick survey where they are asked to reply either 2020 election has been compromised by voter fraud or not. Few examples of such MDC messages are: “Hi, I’m Britanny from MDC with a quick survey.
If you are developing a new project, start out with SLF4J + Logback or Log4j2. You will be fine either way. If you are working on a legacy project, try to migrate everything to a log facade (SLF4J) and introduce a homogeneous and unified approach to logging across all of your teams
How do I change my academic pathway? Visit your campus Advisement & Career Services office to complete a change of academic pathway form. If you are not able to visit the campus, you …
You can view your grades by logging into MDConnect. After you login, go to the “other academics….” drop-down list and select “Course History.” Your grades will display on the following page.
How do you create a focal point in a room? We love using an organic element to bring out the natural beauty of a space, and one of our favorite ways to do so is with Stonewerks. Made from real stone sourced directly from quarries, each Stonewerks panel is …Last modified: February 20 2021
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488519183.85/warc/CC-MAIN-20210622155328-20210622185328-00071.warc.gz
|
CC-MAIN-2021-25
| 2,639
| 10
|
http://www.bluesnews.com/cgi-bin/board.pl?action=reportpost&id=830414&start=0
|
code
|
Frags4Fun wrote on Feb 12, 2013, 13:34: Yeah, they sure do hurt sales, if the game sucks to begin with.
Some good games have bad demos. And other games have too good demos. While I'm sure GTA and Carmageddon sold very well due to word of mouth from their demos, I also think the demos were so satisfying (especially if you removed the time limit) that they made actually purchasing the game superfluous.
Same for Quarantine. Loved that demo! I put dozens upon dozens of hours into those three demos and sadly never bought the games. Can't imagine I was the only one.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701148428.26/warc/CC-MAIN-20160205193908-00149-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 566
| 3
|
http://www.tomshardware.com/forum/272355-30-p7p55d-deluxe-gigabyte-x58a-udr3
|
code
|
Henry Chinaski said:
In the LGA1156 you can install i7 8xx, i5 and i3 cpus, but not a i7 9xx one.
I know that but the total price from :
GIGABITE X 58 A UD3 R + CORE I7 920 + 2x2 go DDR3 CORSAIR = 534.95 €
ASUS P7P55D DELUXE + CORE I7 860 + 2X2 go DDR3 CORSAIR = 508.80 €
I want to do the best choice ... And after 3 days learning test , differents opinions ... I don't have a final choice .
In the past , I made 2 computers with GIGABITE for friend : 1 was out of order quickly (15 months) & second after 3 years : both because of MOTHERCART ..
1 of my personnal computer (5 at home) I have ASUS A8N-SLI DELUXE : after 5 years : no problem (running every day 24/24 h..)
Choice , for me It's not easy ..
Could you help me to make the choice .
( sorry for my bad english , but only 2 years at scholl )
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891750.87/warc/CC-MAIN-20180123052242-20180123072242-00724.warc.gz
|
CC-MAIN-2018-05
| 804
| 11
|
https://www.pitneybowes.com/us/support/article/000076241/resolve-the-inability-to-abourt-pdf-input-during-preprocessing-i.html
|
code
|
Unable to abort PDF input during preprocessing.
When a PDF file is going through the input phase (PDF2VDD), it first does a preprocessing step whereby it checks for any transparent objects which may need to be flattened. If during this step, which can take quite a while, the client decides to kill the job, right-clicking and selecting either "End" or Abort" doesn't take effect until the entire preprocessing is completed.
The PDF2VDD process is intended to run uninterrupted. If you abort the job during the pre-process phase, you may either Stop the PDF-IN input client within the GUI, or end the PDF2VDD.exe process in Task Manager.
UPDATED: March 22, 2017
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178365186.46/warc/CC-MAIN-20210303012222-20210303042222-00103.warc.gz
|
CC-MAIN-2021-10
| 661
| 4
|
https://mobilesmith.atlassian.net/wiki/spaces/MOSTKB/pages/38830143/Google+Cloud+Messaging
|
code
|
Now you have all three parts! Go back to the MobileSmith platform and edit your project.
Go to App Stores > Push Credentials.
For "Configuration file", click the "Add" button and select the file you just downloaded from Google. (the filename should be "google-services.json")
For "Server API Key" and "Sender ID", paste in the values you copied earlier from Google.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303845.33/warc/CC-MAIN-20220122103819-20220122133819-00637.warc.gz
|
CC-MAIN-2022-05
| 365
| 4
|
https://serokell.io/blog/language-models-behind-chatgpt
|
code
|
ChatGPT has transformed the way people communicate with machines. Instead of presenting users with numerous pages to sift through and evaluate, it provides written answers to their questions in mere seconds. In this blog post, we dive inside СhatGPT’s brain and explore large language models (LLMs) and other technologies that allow chatbots to communicate like people.
After the initial excitement of using ChatGPT has subsided, the next question that arises is: “How can the machine reply to questions like a human, and what is the underlying mechanism?” The basic schema is the following.
During the learning stage, an ML model was trained to analyze texts and rewarded for each correct answer. Additionally, a self-attention mechanism was integrated to improve the effectiveness of the learning process by prioritizing important combinations and reducing the weight of other features. ChatGPT is based on a combination of models, which we will discuss below, beginning with the most significant, LLM.
What are large language models (LLMs)?
LLMs are natural language processing models that analyze vast amounts of text data and infer connections between words within the text. Over the past few years, advances in computational power have allowed these machine learning models to grow in size and capability. The more extensive the input dataset and parameter space, the more robust LLMs become.
Language models are typically trained using next-token prediction. This technique involves predicting the next word in a sequence using the Long-Short-Term-Memory (LSTM) neural network and masked-language modeling. The latter involves completing a sentence by selecting the most statistically probable word based on the context.
This short video explains the tech behind LLMs:
However, these sequential techniques have some limitations.
For instance, the model may fail to prioritize certain words over others, leading to inaccurate predictions. Besides, input data is processed sequentially rather than as a whole corpus. This limits its ability to understand word connections and deduce the possible meanings.
These issues can be addressed through advanced techniques such as self-attention mechanisms, which enable large language models like GPT-3 to process input data as a whole and derive more nuanced relationships between words.
To tackle this problem, in 2017, a team from Google Brain introduced transformers. The transformer deep learning model is trained to perform multiple tasks simultaneously, and attention mechanisms enable it to selectively allocate resources to each task based on their relative importance.
Transformers can process all input data simultaneously, which is impossible with LSTMs. With the self-attention mechanism, the model can assign different levels of significance to various input data segments, regardless of the position in the text sequence. The ability to perform simultaneous processing allowed for significant improvements in embedding meaning into LLMs and made it possible to handle much larger datasets. Just as a greater vocabulary allows educated humans to express themselves more effectively, larger semantic datasets provide chatbots with more opportunities to put together appropriate word combinations.
OpenAI introduced the first Generative Pre-training Transformer (GPT)l, GPT-1, in 2018. Since then, GPT models have undergone several upgrades, including GPT-2 in 2019, GPT-3 in 2020, InstructGPT, and ChatGPT in 2022. The most significant advancement in GPT evolution before integrating human feedback was the enhancement in computational efficiency, which enabled GPT-3 to train on a more extensive dataset than GPT-2, leading to a more diverse knowledge base and the ability to perform a broader range of tasks.
All GPT models use the transformer architecture, with an encoder for processing the input sequence and a decoder for generating the output. The multi-head self-attention assigns different levels of significance to various parts of the sequence, allowing the model to understand meaning and context. Additionally, the encoder employs masked-language modeling to comprehend word relationships and produce more coherent responses.
The self-attention mechanism in GPT converts text pieces (tokens) into vectors representing their significance in the input sequence. This process involves creating a query, key, and value vector for each token; calculating the similarity between the query and key vectors; generating normalized weights using a softmax function; and producing a final vector representing the token’s importance within the sequence.
In GPT, the multi-head attention mechanism goes beyond assigning varying degrees of importance to different parts of the input sequence. The mechanism iterates multiple times, enabling the model to comprehend sub-meanings and more intricate relationships within the input data.
Despite notable advancements in natural language processing, GPT-3 still faces challenges in accurately interpreting the user’s intentions. Its outputs can be unhelpful as they contain “hallucinations” based on false information, lack interpretability, or even include toxic and biased content that can cause harm and spread misinformation. ChatGPT addresses some of these problems inherent in traditional LLMs by using innovative training techniques.
How ChatGPT was improved
ChatGPT is the development of InstructGPT, which introduced a new method of incorporating human feedback into the training process. This approach aimed to improve the alignment between the model’s outputs and the user’s intentions. At its core is the Reinforcement Learning from Human Feedback (RLHF) technique, sometimes called Reinforcement Learning from Human Preferences, which we explain in simpler terms below.
Supervised Fine Tuning model
Initially, the GPT-3 model underwent fine-tuning through supervised training. Forty contractors were recruited to create input/output pairs or prompts based on actual user entries into the OpenAI API. The labelers generated suitable responses to each prompt, thereby creating a known output for the model to learn from. Subsequently, GPT-3 was fine-tuned using this new dataset to develop the SFT (Supervised Fine Tuning) model, or GPT-3.5.
To ensure diversity, a maximum of 200 prompts were allowed from a single user ID, and any prompts that shared extended common prefixes were eliminated. Prompts containing personally identifiable information (PII) were also removed. Additionally, labelers were asked to create sample prompts to fill out categories with minimal actual sample data, including plain prompts, few-shot prompts (instructions with multiple query/response pairs), and user-based prompts.
Labelers were instructed to deduce the user’s intention when generating responses. Prompts were categorized into three main types of information requests:
- Direct (such as “Tell me about…”).
- Few-shot (which involved providing two examples of a story and asking the model to generate another story on the same topic).
- Continuation (which required the model to finish a story based on a provided beginning).
Compiling prompts from the OpenAI API and those hand-written by labelers resulted in 13,000 input/output samples used to train the supervised model.
The subsequent step involved training a reward model, which takes a series of prompts and responses as input and generates a scalar value reward. This reward was then used to train the model through reinforcement learning techniques, enabling it to learn how to maximize the reward.
The labelers were given 4 to 9 SFT model responses for one input prompt and instructed to rank them in descending order based on their quality. These rankings were then combined to create various output combinations. However, including each combination as a separate data point would lead to overfitting, which means the model would fail to generalize beyond the provided data. To address this issue, the model was trained using each rankings group as a single batch data point.
In the final phase, the model was presented with a random prompt and generated a response using the policy it learned in the second step. The reward model assigned a scalar reward value to the prompt and response pair, influencing the model to update its policy accordingly.
In 2017, Schulman et al. introduced Proximal Policy Optimization (PPO) for updating the model’s policy with each generated response. PPO integrates a per-token Kullback-Leibler (KL) penalty from the SFT model. The KL divergence measures the similarity between two distribution functions and penalizes extreme distances. In this scenario, the Kullback-Leibler penalty decreases the gap between the responses and the supervised fine-tuned model of the model. This is necessary to avoid excessive optimization of the reward model.
How was the model evaluated
Before training, a test data set previously encountered by the model was set aside. It was then used to evaluate if the model is better aligned than its predecessor, GPT-3.
The evaluation criteria included the following:
- Veracity. This criterion relates to the model’s propensity to generate false information. The PPO model’s outputs showed minor enhancements in truthfulness and informativeness when evaluated using the TruthfulQA dataset.
- Usefulness. This metric measures the language model’s ability to understand and execute user instructions. According to labelers, InstructGPT’s outputs were preferred over GPT-3’s 85 ± 3% of the time.
- Harmlessness. This aspect evaluates the LLM’s proficiency in avoiding inappropriate, derogatory, and offensive content.
How is ChatGPT going to evolve?
The development of ChatGPT will depend on how the current limitations of large language models will be overcome. These include not only technical aspects but also ethical concerns about its potential biases.
The main challenges related to scaling large language models are the following:
1. High costs for architecture, processing, and experimentation
The large scale of language models makes them costly to operationalize. They require significant computational resources for distributing parameters across multiple processing engines and memory blocks. Additionally, experimentation costs can add up quickly, exhausting resources even before the model makes it to production.
2. Language misuse
LLMs are trained on huge amounts of data from diverse sources. However, collecting heterogeneous data can lead to biases from the data sources’ cultures and societies. Verifying the credibility of such large amounts of data can also be time-consuming. Partial and false data can result in discriminatory and erroneous outcomes.
3. Fine-tuning for specific tasks
While large language models are generally accurate for large-scale data, repurposing them for particular domains and tasks can be challenging. Fine-tuning existing models for specific downstream tasks is necessary, but getting it right takes time and effort. Accurately determining the correct data, hyperparameters, and base models is crucial to maintaining explainability.
4. Hardware challenges
Even with a budget for large-scale distribution, creating an optimal hardware plan for large language models is challenging. No one-size-fits-all hardware stack exists, and optimized algorithms are necessary for computational resources to adjust to scalable models. Besides, finding computing experts for large language models can be difficult.
Watch this video explaining the potential risks of large language models:
Despite these challenges, one thing seems certain: ChatGPT will continue to gain traction as ordinary users and developers come up with new ideas for its applications. The question now is how we will ensure that these applications remain ethical.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474744.31/warc/CC-MAIN-20240228175828-20240228205828-00171.warc.gz
|
CC-MAIN-2024-10
| 11,841
| 50
|
http://www.ifans.com/blog/26277/
|
code
|
The inventive geeks over at Hack a Day have discovered a way to playback DVDs on the iPad without the need for an attached DVD player or jailbreak. The method uses VLC running on a Mac (or any Unix OS with Apache installed) to beam the DVD to the iPad, which is able to view the stream through Safari. Since it uses a bone-fide webserver, it works over both LAN and the Internet (if you have an external IP). The setup requires some command-line fu, but shouldn’t be too difficult to run if you’ve ever goofed around with terminal.
The full instructions along with the VLC command line arguments can be found in the video description on YouTube.
Basic instructions: Download and install VLC http://www.videolan.org/vlc/download-macosx.html
2. Add application/x-mpegURL m3u8 and video/MP2T ts to mime.types for your apache server
3. Enable your server
4. Add a stream folder to the root of your web directory
5. Insert the dvd and run the vlc command line with the title and chapter set to the right ones for the DVD and the output to the stream folder in your web directory
6. Check that there is a prog_index.m3u8 file in your stream folder – might take up to 30 seconds for the dvd to startup and begin encoding
7. type yourserver.ip/pathto/stream/prog_index.m3u8 into the browser on your ipad
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718303.21/warc/CC-MAIN-20161020183838-00214-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,301
| 9
|
https://github.com/sqlmapproject/sqlmap
|
code
|
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.
You can visit the collection of screenshots demonstrating some of the features on the wiki.
Preferably, you can download sqlmap by cloning the Git repository:
git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev
sqlmap works out of the box with Python version 2.6, 2.7 and 3.x on any platform.
To get a list of basic options and switches use:
python sqlmap.py -h
To get a list of all options and switches use:
python sqlmap.py -hh
You can find a sample run here. To get an overview of sqlmap capabilities, a list of supported features, and a description of all options and switches, along with examples, you are advised to consult the user's manual.
- Homepage: https://sqlmap.org
- Download: .tar.gz or .zip
- Commits RSS feed: https://github.com/sqlmapproject/sqlmap/commits/master.atom
- Issue tracker: https://github.com/sqlmapproject/sqlmap/issues
- User's manual: https://github.com/sqlmapproject/sqlmap/wiki
- Frequently Asked Questions (FAQ): https://github.com/sqlmapproject/sqlmap/wiki/FAQ
- X: @sqlmap
- Demos: https://www.youtube.com/user/inquisb/videos
- Screenshots: https://github.com/sqlmapproject/sqlmap/wiki/Screenshots
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817253.5/warc/CC-MAIN-20240419013002-20240419043002-00387.warc.gz
|
CC-MAIN-2024-18
| 1,638
| 19
|
http://search-hadoop.com/m/kqvE9M7gd31&subj=Re+how+to+find+what+partition+is+hosted+where+
|
code
|
ZooKeeper contrib also comes with a GUI Swing app if that's your cup of tea.
On 10/20/2011 10:24 AM, Jun Rao wrote:
> We have a tool ConsumerOffsetChecker that tells you the lag of each
> partition for a consumer group. To find out other information, currently you
> have to use a ZK client shell.
> On Thu, Oct 20, 2011 at 7:05 AM, Inder Pall <[EMAIL PROTECTED]> wrote:
>> what's the right way to figure what's there in ownership, consumer, broker,
>> offset registry in ZK?
>> -- Inder
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444774.49/warc/CC-MAIN-20141017005724-00285-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 487
| 9
|
https://diskohq.com/linux/you-asked-what-is-anaconda-linux.html
|
code
|
What is Anaconda used for in Linux?
Anaconda is the installation program used by Fedora, Red Hat Enterprise Linux and some other distributions. During installation, a target computer’s hardware is identified and configured, and the appropriate file systems for the system’s architecture are created.
Can we use Anaconda in Linux?
In your browser, download the Anaconda installer for Linux. RECOMMENDED: Verify data integrity with SHA-256. For more information on hashes, see What about cryptographic hash verification? Include the bash command regardless of whether or not you are using Bash shell.
What is Anaconda and why we use it?
Anaconda is a distribution of the Python and R programming languages for scientific computing (data science, machine learning applications, large-scale data processing, predictive analytics, etc.), that aims to simplify package management and deployment.
What is Anaconda Ubuntu?
Designed for data science and machine learning workflows, Anaconda is an open-source package manager, environment manager, and distribution of the Python and R programming languages. This tutorial will guide you through installing Anaconda on an Ubuntu 18.04 server.
Does Anaconda install Python?
Installing the Anaconda platform will install the following: Python; specifically the CPython interpreter that we discussed in the previous section. A number of useful Python packages, like matplotlib, NumPy, and SciPy. Jupyter, which provides an interactive “notebook” environment for prototyping code.
Is Anaconda a package manager?
Anaconda® Distribution is a Python/R data science distribution that contains conda, a package and environment manager, which helps users manage a collection of over 7,500+ open-source packages available to them. Anaconda is free and easy to install, and it offers free community support.
Where is Anaconda installed Linux?
If you accept the default option to install Anaconda on the “default path” Anaconda is installed in your user home directory:
- Windows 10: C:Users
- macOS: /Users/
/anaconda3 for the shell install, ~/opt for the graphical install. …
- Linux: /home/
How do I get Anaconda on Linux?
- Visit Anaconda.com/downloads.
- Select Linux.
- Copy the bash (.sh file) installer link.
- Use wget to download the bash installer.
- Run the bash script to install Anaconda3.
- source the .bash-rc file to add Anaconda to your PATH.
- Start the Python REPL.
How do I know if Anaconda is installed Linux?
Visit https://anaconda.cloud/register to get started. You can confirm that Anaconda is installed and working with Anaconda Navigator or conda.
Is Anaconda a tool?
Anaconda is a heavy software (around 500MB) as it came up with various tools. It bundles many of the common libraries used in commercial and scientific python work like Numpy, sklearn etc. It gives a head-start the data science journey with all the configuration needed by a beginner data science learner.
Why should I install Anaconda?
Anaconda python is faster than vanilla python: they bundle Intel MKL and this does make most numpy computations faster. You can easily do a local user install, no need to ask permission from your admin in many cases (you may face web proxy issues though)
Is Anaconda safe to install?
No, the python packages are not safe to install. There are no safeguards against a maintainer uploading a malware along with the package. So basically, you have to believe that all packages are uploaded in good faith i.e. without any malware.
How do I completely remove Anaconda from Ubuntu?
- Remove the Anaconda install directory. To remove the entire Anaconda installation directory type: rm -rf ~/anaconda3.
- Edit the PATH environment variable. Edit the ~/.bashrc file and remove the Anaconda directory from the PATH environment variable: …
- Remove the hidden files.
How do I get Anaconda on Ubuntu?
How to Install Anaconda on Ubuntu 18.04 and 20.04
- Step 1: Update Local Package Manager.
- Step 2: Download the Latest Version of Anaconda.
- Step 3: Verify the Download Checksum.
- Step 4: Run Anaconda Installation Script.
- (Optional) Step 5: Install VSCode Editor.
- Step 6: Activate and Test Installation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522309.14/warc/CC-MAIN-20220518183254-20220518213254-00702.warc.gz
|
CC-MAIN-2022-21
| 4,175
| 46
|
https://forums.creativecow.net/docs/forums/post.php?forumid=313&postid=1410&univpostid=1410&pview=t
|
code
|
Has anyone found an app which will allow you to make a list of timestamps for video editing?
The situation: I'm shooting a whole bunch of interviews this week, each of which I have to edit and turn around overnight. I'd like to be able to hit a button on my phone every time the interviewee says something usable, so that I have a time reference for editing.
I could either use "time of day" timecode, or start each interview as if it were a camera roll, i.e. Interview #1 starts with 01:00:00:00.
I've found an app which looks good, except that it rounds off to the nearest minute; I need seconds.
Lastly, I am in a bit of a crunch for the answer. If you think there is a better forum for this question, please advise.
If your camera has a bars and tone switch, you can add a couple of seconds of that afterwards to mark a section of notable footage.
The bars and tone markers are quick to find by fast forwarding on the timeline, and I just roll back immediately before the marks to get the promising parts out of those longgggg, borrring, recordings.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738552.17/warc/CC-MAIN-20200809102845-20200809132845-00148.warc.gz
|
CC-MAIN-2020-34
| 1,053
| 7
|