url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.oreilly.com/library/view/better-backbone-applications/9783944540672/chapter-3.xhtml
|
code
|
In the introduction, the library’s author mentions something about “a composite application architecture”. This composite architecture refers to two different things:
•Application components built in a hierarchical module structure.
•Hierarchical view structures through nested (sub)views.
This chapter will discuss the root piece of that first point: the
Application object. We won’t be going into details about how to add subcomponents to your applications until the next chapter, when we talk about modules, but we’ll learn just about everything else there is to know about
Most of the time, when someone creates a Backbone application, they make a central object that everything is attached ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999709.4/warc/CC-MAIN-20190624191239-20190624213239-00183.warc.gz
|
CC-MAIN-2019-26
| 712
| 6
|
https://app.attendcollaborate.com/event/member/542636
|
code
|
Session ID: 102290
Abstract: This roundtable discussion will help HCM business analysts who have not yet upgraded to 9.2 (like myself) to learn from those who have. We would like to hear your success stories and sob stories and what you have experienced and learned. For those who attend and have upgraded; please bring your top 5 'yays' and top 5 'nays' to share with the group.
Objective 1: Gain a better understanding of the HCM requirements when upgrading from JD Edwards 9.1 to 9.2
Objective 2: Review and discuss steps for upgrading from JD Edwards 9.1 to 9.2 from an HCM perspective
Objective 3: Generate and share ideas from the audience
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574077.39/warc/CC-MAIN-20190920200607-20190920222607-00293.warc.gz
|
CC-MAIN-2019-39
| 645
| 5
|
https://evilinside.ru/implementing-domain-driven-design-for-microservice-architecture/
|
code
|
You can create a welcome theme that overrides the welcome-page. First create the theme in: /standalone/configuration/themes/welcome/<theme name> Then configure which…
services such as the order management service, the customer management service, etc.
Services communicate using either synchronous protocols such as HTTP/REST or asynchronous protocols such as AMQP (Advanced Message Queuing Protocol). Services can be developed and deployed independently of one another. Each service has its database to be decoupled from other services. Data consistency between services is maintained using the Saga pattern.
As the services are very granular, client applications usually need to interact with multiple services to get the data they need. To allow changes in the services without affecting the clients, an API Gateway is used. The API Gateway is an abstract layer that hides away all the microservices, leaving a single endpoint for clients to communicate. Requests coming to the gateway will be proxied/routed to the appropriate services. The gateway can also help us to monitor the usage of the services efficiently.
Microservice, a component in this architecture:
- Each is a miniature application
- Each is focused on one task, a business capability (The Single Responsibility principle: Each microservice implements only one business responsibility from the bounded domain context. From a software point of view, the system needs to be decomposed into multiple components where each component becomes a microservice. Microservices have to be lightweight, in order to facilitate smaller memory footprints and faster startup times.)
- Each can be deployed and updated independently
- They are loosely coupled
- Each has a well-defined interface: REST APIs
FIGURE 4: Microservices Architecture.
Microservices architecture is far more flexible and resilient providing these benefits of using this approach to build an application:
- Microservices architecture is a very promising way of designing and building highly scalable applications in an agile way. The services themselves are straightforward, focusing on doing only one thing well, so they’re easier to test and ensure higher quality.
- Each service can be built with the best-suited technologies and tools, allowing polyglot persistence and such. You don’t have to be stuck with a new choice of technology for the rest of the project.
- Multiple developers and teams can deliver independently under this architecture. This is great for continuous delivery, allowing frequent releases while keeping the rest of the system stable.
- In case a service goes down, it will only affect the parts that directly depend on it (if there are such parts). The other parts will continue to function well.
- Externalized configuration: This externalizes the configurations in the config server so that it can be maintained in a hierarchical structure, per environment.
- Consistent: Services should be written in a consistent style, as per the coding standards and naming convention guidelines…
- Resilient: Services should handle exceptions arising from technical reasons (connectivity and runtime), and business reasons (invalid inputs) and not crash. Patterns, such as circuit breakers and bulk headers, help isolate and contain failures.
- Good citizens: Microservices should report their usage statistics, the number of times they are accessed, their average response time, and so on through the JMX API or the HTTP API.
- Versioned: Microservices may need to support multiple versions for different clients until all clients migrate to higher versions. There should be a clear version strategy in terms of supporting new features and bug fixing…
Microservices architecture layers
The business services tend to do what the domain model and integration layers used to do, and so are still implemented that way. (This is also what the SOA services used to do (or were supposed to).) It’s just that these layers don’t span the whole app, they’re encapsulated within each service. (Yeah, the O/R mapping in the integration layer was more broadly reusable when the layer spanned the whole app. Microservices value independence over reuse. And you should be using No SQL database anyway, so you shouldn’t need all that O/R mapping code. But to tell the truth, some business services will still need to interface with legacy enterprise databases of record, which are SQL, so they’ll need O/R mapping code; there’s no free lunch.)
The dispatchers do what the app model used to do: One stop shopping for the client so that all of the business services together look like a single app that does exactly what the client needs. But now you have an app model for each client type, not a single app model layer that spans the entire app.
What happened to the view layer? It moved into the clients (where it belonged all along!). Either the client is a mobile app, which is a view with perhaps a bit of its app model; or it’s a partner app that’s way more than just a view, but that has its own views, or it’s a web app. Web apps used to contain a lot of view code to render the HTML, and needed state from the view in an HTTP session, but no more. With modern techniques using HTML 5 and CSS 3, the web browser uses static files (downloaded from the web site) to do all that rendering and store the session state.
FIGURE 5: Microservices architecture layers.
Backend for frontend (BFF)
Each dispatcher is a back end for an external front end, typically a GUI The same team develops each back end and front-end pair; Use the same or compatible languages in the pair. Usually, rather than have one team write all/multiple dispatchers while someone else implements the clients, instead put the same team in charge of a dispatcher/client pair. The two are going to have to be designed for each other, so have the communication take place within a team, not between teams. The skills tend to be different for different types of clients, so let the teams specialize.*
FIGURE 6: Back ends for front ends.
Asynchronous communication can make microservices more robust
- The requester doesn’t have to block while the provider runs
- Different requester instance can handle the response
- Messaging system holds action and result
Consider integrating asynchronously. Synchronous REST is usually easier to get something working, so start with that. Then consider strategically converting some integration points to async, either because of the nature of the request (long-running, runs in the background) or to make the integration more reliable and robust.*
How is async invocation more reliable? With sync, the whole loop — requester, provider, messages — has to keep working though the whole lifetime of the invocation. With async, the invocation is broken into 3–4 parts; if any one fails, the system can probably retry it for you. Heck, because the requester is stateless, the instance that receives the response doesn’t even have to be the instance that sent the request.
FIGURE 7: Asynchronous communication.
Different microservices may be implemented in different languages (now or in the future), so don’t lock yourself into a language-specific integration technology (say, Java sockets, or even CORBA/IIOP). The standard these days is REST, and JSON/REST, so use that. For asynchronous integration, follow an open cloud-friendly standard like AMQP [an open standard transaction message protocol that is significantly lowering the cost of middleware software integrations through interoperable business messaging. It is the ideal protocol for passing business-critical, real-time data across and between organizations and virtual cloud computing transactions environments in a secure manner] or Kafka *. is an open standard transaction message protocol that is significantly lowering the cost of middleware software integrations through interoperable business messaging. It is the ideal protocol for passing business-critical, real-time data across and between organizations and virtual cloud computing transactions environments in a secure manner Try to resist the urge to use other approaches like XML or serialization. That leads to a combinatorial explosion of protocols that each API provider and the consumer has to support.
Other examples of asynchronous protocols:
- Message Hub
- MQ Light
- REST such as JSON or HTTP
- Messaging such as Kafka
The aim is complete decoupling, achieved by these methods:
- Messaging wherever possible
- Service registry or discovery
- Load balancing
- Circuit breaker patterns
We can mix and match sync and async. Usually, a request/response invocation is either all sync or all async, but this shows that a single invocation can be sync in one direction and async in the other.
FIGURE 8: Microservices intercommunication.
Our goal with this blog post was to share our thoughts on how to marriage Domain-Driven Design (DDD) with microservice architecture; (DDD) is a software development approach around solving complex domain model; the solution revolves around the business model by connecting the implementation to the core business concepts. The common terminology between the business/domain experts and the development team are domain logic, subdomains, bounded contexts, context maps, domain models, and ubiquitous language as a way to collaborate and improve the application model and resolve any emerging domain-related issues. Our approach was to put some structure around getting to understand the business domain by analyzing the domain, defining the bounded contexts, defining the entities, aggregates, and services and finally identifying the microservices. Microservices offer some unique advantages over traditional architectures, and it provides, scalability, availability, resiliency to name a few; it also a right approach for keeping developers laser-focused as each microservice is a loosely coupled service with a single responsibility principle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00839.warc.gz
|
CC-MAIN-2023-50
| 9,984
| 50
|
https://lists.debian.org/cdwrite/2006/01/msg00099.html
|
code
|
Re: cdrtools cdrecord/cdrecord.c
> > So i have not much reason to try any DVD-patched cdrecords yet.
> > I actually wonder why they live forth.
> Some people appear to prefer one tool for one burning needs, without
> locking themselves in to the commercial expiring stuff.
Oh, i do not put in question the convenience to use the
burner software via a cdrecord-compatible command line
I am actually the proud originator of several cdrecord-like
wrappers around other writer software like growisofs or
libburn or the Linux kernel's devices.
I don't either dispute the inconvenience of Joerg's decision
to make the -ProDVD license as it is. If there wasn't growisofs
then i would see the license situation as a valid reason for
a GPL fork.
But up to this morning, when i read Volker's mail, i was not
aware of any technical advantage of the patched versions.
As Volker describes it, i will hardly ever make own experiments
to find out about situations where growisofs fails and one
of the patched cdrecords succeeds.
Nevertheless, i would be very interested in learning about
Have a nice day :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999655160/warc/CC-MAIN-20140305060735-00031-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 1,091
| 21
|
https://forums.lenovo.com/t5/Lenovo-P-Y-and-Z-series/Y500-randomly-dies/td-p/1097845
|
code
|
04-19-2013 05:46 PM
Borught a y500 on amazon a few months ago, its runs great. However, the laptop suddenly just dies randomly, no blue screen, no shut down menu. It just dies, I reboot and check event viewer and its says it crashed(kennel-power). So then I checked for viruses, ran scans for chkdsk, sfc /scannow, and memory diagnostics, everything was fine. It also didn't overheat since the laptop died without gaming at all. The barrtery was plugged in as well
I reset windows 8 just to check if its the OS's fault. It just died again today. If it's a hardware issue, what can I do to find out what component of hte computer is wonky? Would the limited warranty help me?
04-26-2013 12:55 AM
Thanks for posting and welcome to the Lenovo Community,
Am sorry that you’re facing this issue,
I’d like to help you with this case can you share with me the battery status is it plugged in and charging or not charging?
And I’d like to ask you when the machine shut off completely is it while working on the charger or the battery or both of them?
And can you tell me if you face this issue when you are using like a specific application?
Thanks and Best Regards,
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256147.15/warc/CC-MAIN-20190520202108-20190520224108-00283.warc.gz
|
CC-MAIN-2019-22
| 1,164
| 10
|
https://gitlab.gnome.org/GNOME/gnome-clocks/-/issues/118
|
code
|
Saturday and Sunday share the same translation
Hello, Saturday and Sunday share the same letter in English ('S'):
What happens is that getText considers them the same same translation and groups them:
As you can image, we need the ability to specify different translations for Saturday and Sunday in many languages.
One possible solution will be to use a different
msgctxt then gettext considers them different translations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703524743.61/warc/CC-MAIN-20210121101406-20210121131406-00183.warc.gz
|
CC-MAIN-2021-04
| 424
| 6
|
http://forum.thymeleaf.org/Thymeleaf-3-0-6-JUST-PUBLISHED-td4030436.html
|
code
|
CHANGES TO THE SPRING 5 INTEGRATION MODULE (Web MVC and WebFlux)
With this new version of Thymeleaf, a new version of the thymeleaf-spring5 integration module has been published too: 3.0.6.M4. Note this version is not considered stable yet (no ".RELEASE") because it depends on Spring 5, which is still in milestone development phase.
How does Thymeleaf operate in a reactive-friendly way for Spring 5 WebFlux?
Like previous versions, this new version of the Spring 5 integration module includes updated support for the new Spring 5 WebFlux reactive web framework. When used with WebFlux, Thymeleaf can operate in one of three reactive-friendly modes:
Full, producing all output in memory and sending it as a single output buffer.
Chunked, producing output in buffers (chunks) of a configurable maximum size.
Data-Driven, making Thymeleaf work as an integrated part of a stream of data, which it renders into HTML in a way fully sensible to reactive back-pressure.
Also, note that there are three sandbox applications prepared to serve as examples of the general thymeleaf-spring5 integration with Spring 5 WebFlux:
thymeleafsandbox-stsm-reactive, equivalent to the STSM sample application but using Spring 5, Spring Boot 2.0 and the new Spring WebFlux framework. This sandbox is mainly meant to test form binding.
thymeleafsandbox-biglist-reactive, using Spring 5, Spring Boot 2.0 and the new Spring WebFlux framework. This sandbox is meant to test the rendering of large amounts of data.
thymeleafsandbox-sse-webflux, using Spring 5, Spring Boot 2.0 and the new Spring WebFlux framework. This sandbox is meant to test the rendering of Server-Sent Events (SSE) directly in HTML (no need for JSON parsing at the browser).
WE HAVE SOME TERRIFIC FIGURES!
Our last download figures (from Maven Central) show that the Thymeleaf core jar had 222,526 downloads only in April 2017. That is just awesome and hugely motivating. Thanks for all the confidence!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145500.90/warc/CC-MAIN-20200221080411-20200221110411-00303.warc.gz
|
CC-MAIN-2020-10
| 1,949
| 13
|
https://www.educative.io/courses/learn-intermediate-python-3/what-is-python
|
code
|
What is Python?
We’ll be starting from scratch. Hence, there’s no need to worry if you have no prior experience with Python or coding in general.
So, without further ado, let’s get started by learning what Python is.
The nature of the language
Developed in 1990, Python is one of the most popular general-purpose programming languages in modern times.
The term “general-purpose” simply means that Python can be used for a variety of applications and does not focus on any one aspect of programming.
Python falls under the category of high-level, interpreted languages. A high-level language is one which cannot be understood directly by our machine. There is a certain degree of abstraction in its syntax. Machines are generally designed to read machine code, but high-level syntax cannot be directly converted to machine code.
As a result, it must first be converted to bytecode which is then converted to machine code before the program can be executed.
Python is an interpreted language because, during execution, each line is interpreted to the machine language on-the-go.
However, if we take the example of C++, the code needs to be compiled into an executable first, and then it can be executed. In Python, we can skip this compilation step (Python does it for us behind the scenes) and directly run the code.
One of the biggest reasons for Python’s rapid growth is the simplicity of its syntax. The language reads almost like plain English, making it easy to write complex programs.
Since it doesn’t have much of a learning curve, Python is a very good entry point into the world of programming for beginners.
Apart from the ease of learning, Python is a very efficient language which is used in almost every sphere of modern computing.
This makes a strong case for learning Python, even for non-programmers.
Some of Python’s main applications are highlighted below:
Python has had several major updates in the past. Python 2.7 was widely used for a very long time, even after the release of newer versions.
However, Python 2.7 has been deprecated as of January 01 2020, and replaced completely by
3.xx versions, known as Python 3. The differences between Python 2.7 and Python 3 are minute, but important nonetheless.
To keep up with the latest technologies, we’ll be using Python 3.
We will be able to write and execute Python code right here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475833.51/warc/CC-MAIN-20240302152131-20240302182131-00715.warc.gz
|
CC-MAIN-2024-10
| 2,370
| 20
|
https://mymuaves.com/collections/loungewear/loungewear
|
code
|
FREE SHIPPING ON U.S. ORDERS OVER $100. BUY NOW PAY LATER WITH AFTERPAY. 20% OFF QUICK DRY HAIR WRAPS + ALL HEADSCARVES. CODE: MERRY20 AUTO-APPLIED AT CHECKOUT.
Your Cart is Empty
Loungewear just got way more glamorous. Our elevated essentials are lightweight, breathable and molds to the shape of your body. Buttery soft and smooth with just the right amount of stretch. New styles for staying in (or going out).
translation missing: en.products.notify_form.description:
Notify me when this product is available:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363226.68/warc/CC-MAIN-20211205221915-20211206011915-00608.warc.gz
|
CC-MAIN-2021-49
| 513
| 5
|
https://web01.itninja.com/question/regarding-msi-custom-action
|
code
|
Software Deployment Question
Regarding MSI Custom Action
I want to hide the ARP entry of a shim that I have created using ACT. I have written a Custom Action using vbscript for including the SystsmComponent registry key in the MSI package.Custom Acion has been written in execute deferred mode by using call vbscript from Embedded code installation program and the condition given was 'NOT Installed'.when I install the application, the ARP entry is getting hidden but the problem comes when the application tries to self heal. During self healing, the ARP entry of the installed shim is being displayed. I have tried changing the install sequences but nothing worked out for me. Kindly help me to solve this issue.
Thanks in advance,
Community Chosen Answer
The condition of the custom action which will hide the ARP entry should match with the condition that you have used for installing the Shim..
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506121.24/warc/CC-MAIN-20200401192839-20200401222839-00459.warc.gz
|
CC-MAIN-2020-16
| 900
| 6
|
http://mathhelpforum.com/calculus/217976-using-f-t-3t-t-3-what-velocity-train-t-7-a.html
|
code
|
If f(t) is the distance function then f'(t) is the velocity function. Take the derivative and evaluate it when t = 7
Please post your calculations so we can see where you need help.
For some reason, this is one of only two questions I'm stumped on right now.
I've calculated the distance @ 21/10. But when I follow the examples in Stewart Calculus ed:7 I can't work out how to calculate the velocity.
Time = 7, distance = 21/10. I'm not even close to the answer, or even sure how I'm supposed to go about the problem.
Not asking for it to be done, just a step in the right direction.
cheers, I missed the concept for this one early on and was off on a tangent.
Sometimes these are so easy once you know what to do.
I basically did [g(f')- f(g')] / g^2 plugging in values and it was straight forward.
ended up with 9/100.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719463.40/warc/CC-MAIN-20161020183839-00060-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 820
| 10
|
https://www.beckfordvillagehall.org/should-i-put-coursera-on-my-resume/
|
code
|
Is the platform that got me into machine learning in the first place so back in 2015. Should I Put Coursera On My Resume… when i first got thinking about artificial intelligence i did some research study i wished to see what are the very best courses to find out machine learning from and i got to andrew ing’s course maker learning from stanford and i started with that i thought this is the very best course that i can find out machine learning from and even nowadays it’s got like countless reviews everyone vetting this course
‘s professors are professional instructors from leading universities, so the quality of guideline is high. Since some of the world’s best-known companies utilize for worker training, you can be quite sure you’re getting the task skills you need, too. All courses are provided totally online, with a combination of videos, text, downloads, and quizzes to evaluate your knowledge.
Checking Out the Course Catalog
Your starting point for discovering a course of study on is the course brochure. This consists of certificate and degree courses accredited by universities. divides its courses into 5 types:
Courses: Simple, automobile and peer-graded courses with a certificate upon completion
Specializations: A group naturally designed to assist you master a career ability, which includes practical jobs
Professional Certificates: Training for task skills to help you get experience or prepare for industry accreditation
MasterTrack Certificates: Courses that provide you career qualifications and count towards an online degree, consisting of real-world jobs
Degrees: Modular degree learning, enabling you to earn your degree from the comfort of your house and at your own speed
There’s a colored label on each noting to assist you see at a look which type a specific class falls under.
After signing up, I got numerous emails from. In addition to an identity verification e-mail, there were three welcome emails: one for the website, and two for the course.
Handling Your Time– Easy Calendar Combination
As soon as I was in the course, there was the choice to include course deadlines to my calendar. It was also clear that I could select to work at my own pace. One thing I really didn’t enjoy was the excessive upselling, considering that I had literally simply said no to that.
Course Organization– Handy Introduction on Tap
Course material was pretty well organized, with a menu of lessons, grades, notes, and discussions down the left-hand column. The main course page had a welcome message from the course tutor, highlighting crucial features like where to get help.
In 2008, he developed the Stanford Engineering All Over (SEE) program, which delivered three Stanford courses on device knowing, databases, and AI to online students for totally free. Each of these three online courses gathered signups of 100,000 trainees or more, as detailed by Andrew himself.
Returning in time to 2012, have a look at this interview with Daphne Koller, co-creator of. At the time when she was providing this talk, only had 43 online courses readily available. In less than eight years, that number has actually grown nearly a hundred-fold to 4000.
Andrew and Daphne saw so much potential in this kind of e-learning that they put their careers as professors at Stanford on hold and began focusing entirely on the MOOC site. Reflecting on it, they absolutely made the ideal option, as just 7 years later, the business they developed is already valued at over $1 billion.
Is Coursera accredited by universities?
The two ex-CEOs of, Andrew, and Daphne, are no longer actively handling the business themselves. They are, nevertheless, still highly active in entrepreneurship. In 2018, Daphne Koller established Insitro, an ingenious business that intertwines drug discovery and machine learning. Around the same time, Andrew revealed the “AI Fund” that would invest hundreds of millions of dollars into artificial intelligence jobs.
is still a reasonably brand-new business, and I am really interested to see what the future will appear like.
How much does cost?
Specific courses cost $29 to $99, but in most cases, they can be audited for free.’s online degrees, however, can cost anywhere from $15000 to $42000.
Plus is’s yearly membership service through which students can access all 3000+ courses, specializations and professional certificates with unrestricted access. The plan provides excellent worth for student such who take online courses regularly.
Is worth It?
Yes, is worth and legitimate the expense. is one of the most affordable MOOC websites currently out there. Countless university-backed online courses make it extremely appealing for MOOCs, and the new subscription-based Plus provides exceptional worth for frequent online trainees.
How does earn money?
‘s yearly earnings is approximated to be around $140 million and the majority of it comes from paid online courses, Expertises, MasterTracks, online degrees, and enterprise customers. The international business e-learning market size is growing remarkably rapidly, and it’s also ending up being a progressively big part of’s income.
‘s online courses
What Can You Study on Should I Put Coursera On My Resume
When you look into the course catalog, you’ll right away notice there’s a lot available. The brochure includes courses in arts and humanities, sciences, business, IT, languages, individual development, and more.
as perhaps the best machine finding out course ever and i type of agree with that due to the fact that it’s quite a great course but back in 2015 this course was a bit too much for me since after a number of lessons i realized i required to return to the essentials however just because i started this course was so encouraging for me due to the fact that i understood there’s many things that i require to find out when it pertains to artificial intelligence and it was incredible motivation to get started with artificial intelligence and then get to where i am now so played a big function when it concerns my career and my motivation and i can not thank them enough for that having this in mind let’s go through some benefits that you may have and likewise through some unreasonable expectations that a number of you might have due to the fact that we all know that the e-learning space and the e-learning market is proliferating and alongside we have numerous other e-learning platforms such as you understand a cloud expert or udemy or pluralsight there are many choices out there for instance for cloud services a cloud guru is great and likewise for anything tech related pluralsight is excellent and i use them all i use all of them right i used both pluralsight for lots of months and several times for numerous months because i desired at various times to up my abilities and i also utilize for example in 2013 2014 i have actually been utilizing udemy the thing however a lot is like with you to me nowadays i do not truly use it that much since it’s too much sound on that platform due to the fact that everyone’s doing a great deal of courses nowadays you get a great deal of people that don’t have a lot of experience in numerous fields and they simply do courses on udemy
because there’s no vetting process there and because of that there is a lot of noise obviously you have a lot of excellent courses there however they get lost in that prevalent quantity of of relatively i do not know typical courses however nevertheless uw still has some great courses and i have a video about the best device finding out course on udemy go and check that a person out however again because we have a lot of platforms that create courses and offer certifications this waters down the value of one particular accreditation so you need an edge when it comes to these certifications and kind of has that edge due to the fact that it offers courses from top universities and they’re quite economical and likewise you get these courses from these leading universities are also tape-recorded by specialists in the field so you get this kind of result since the courses and the certifications that you receive from they still have some sort of reputational advantage compared to
other platforms so in my viewpoint coursera i believe is the very best platform if you wish to get a certification due to the fact that you still have that track record that kind of flows below the university onto you as a private and likewise having these certifications assists you because you can add them to your linkedin profile for instance or to your cv i imply possibly not to your cv however plainly if you include them to your linkedin profile you can promote yourself and therefore you can signify the reality that you know those topics also it reveals the reality that you are a lifelong student and this is very essential for companies since they wish to see a person that continually wishes to up their abilities okay you desire somebody that always is interested in enhancing that remains in this sort of self-improvement mode that they never just get comfortable with the position that they’re in since everybody kind of enjoys best everybody likes a self improver everyone
likes individuals that are better today than there were yesterday and this is the same with companies if you have the accreditations obviously they may not matter that much but nevertheless they matter from the perspective of the company knowing that you can motivate yourself and you wish to become a better private so there are two clear advantages when it concerns accreditations one being the fact that they are created by leading universities and therefore the credibility of that university flows onto you and to your profile and the second one is that it reveals it signifies the fact that you are a self-motivated individual and that you want to constantly improve yourself i think i applauded them a lot so far so let’s talk about the drawbacks especially the big disadvantage that you have when it concerns these types of certifications since they produce
the expectations that if you have this certificate you will get a task and the more certifications you have the much better chances you have at getting a task and this is not the case right due to the fact that it develops this loop it creates this reinforcing loop that you always have to have brand-new certifications in order to reveal individuals that you are keeping up with the joneses right with other technologists that find out these skills so you see it’s sort of uh kind of a thing that just strengthens itself making you feel that you’re insufficient and this may cause some disappointments since you have huge expectations that you if you have i don’t understand five certifications on your profile and if you’re simply getting them your chances of getting a task will be higher now the
issue is that the more accreditations you have the more platforms you have that use various types of certifications with various degrees of complexity or ease of actual getting those accreditations makes it harder for employers to compare excellent candidates because it sort of waters down the importance of one accreditation think about it from the point of view of cloud accreditations you have now everyone going for these cloud accreditations in aws google or azure and now it sort of ended up being.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00487.warc.gz
|
CC-MAIN-2023-50
| 11,422
| 37
|
http://rainbowfactory.net/spinrewriter6/ten-top-reasons-why-you-face-obstacles-in-learning-spin-rewriter-9-0-try-it-today.html
|
code
|
A long time ago right now there lived a boy. He had blue eyes with blond hair as yellowish as gold. The young boy was small and fragile, but his mind was swift just like the wind. He could calculate the outcome of any situation in the blink of an eye. But that had not been his biggest talent. No. His biggest skill was perception. The young boy could understand and perceive anything quicker than anyone he previously ever met. Then, he fell in love with a beautiful princess. She acquired magnetic green eye and light brown locks. He loved her quite definitely and she loved him back more even. There was only 1 problem – the young boy was the son of a blacksmith. The princess’s father could not allow her to marry a straightforward child of a blacksmith. But their love was too strong. In one fell swoop, the young boy raised an army of undead and began a rebellion to overthrow the evil king who did not believe in true love. After months of fighting against the armies of his beloved’s father, the youthful boy was assassinated and the battle was over. No songs were sang.
By now, most people in the SEO industry are more than familiar with the various animal named updates that have made it nearly impossible to rank without high-quality content. One of the most famous ones is Google Panda, which directly targets on-site content quality and severely penalizes sites that have spelling and stylistic errors or were not edited well.
In this day and age, it is by far the one of the hardest tasks to do online always coming up with fresh content for Google to devour. I love how easy Spin Re-Writer makes it for online marketers to get on with their business and not have to worry about the big G penalising their sites. Of course it's not just about fresh content, but it is certainly a big factor. Thanks Aaron and the team...:)
Unlike other spinners, WordAi fully understands what each word content means. It doesn’t view sentences as just a list of words, it views them as real things that interact with each other. This human like understanding allows WordAI to automatically rewrite entire sentences from scratch. This high level of rewriting ensures that Google and Copyscape can’t detect your content while still remaining human readable!
Does your website need quality content in big numbers? The truth is; producing decent articles can take any author hours and limit the amount of fresh written content on your website especially if you are the only one writing for your website. On the other hand, hiring a writer can get expensive. Have you ever considered using an article spinner? Spinning content is a great way to keep your website relevant and fresh with new content. Of course, not all article spinner software is good. Therefore it’s important to do your homework first before choosing one. We suggest Spin Rewriter 9.0. With this tool, you can rewrite your articles using their intelligent One-Click Rewrite system. In addition, you also have a Bulk Rewrite option that lets your rewrite multiple articles with one click. You can take one great article and break it up into several great pieces of content. The options are endless.
Some favorable aspects to writing articles and marketing them on the net is that you really get to supplement your monthly income. In this challenging economy who can't use a few additional bucks? Another upside is that one may build up your cache of first content and increase your reputation for writing and possibly pull some higher paying customers. Lastly, merely think about the information you're gaining by having to research some of the subjects you write about. You're, or will shortly be, a fountain of worthless tips.
Very Readable Content – for this one they recommend setting the 1st input to “Very Readable” and allowing both sentence rewriting and paragraph editing (2nd and 3rd input), but disallowing automatic paragraph spinning (the 4th input). Keep in mind that this type of spinning will generate much less unique versions of your content as less synonyms will be used for the words.
As we all know, Yahoo!Answers is the largest world’s question and answer community. You can attract targeted customers to your site and generate sales with AnswersChief. AnsweriChief can automatically handle all your Yahoo!Answers work.We have tested, AnswersChief fully,we know it can bring customers for you every day, and it can become a 24 -hour non-stopping money-making machine.
Honestly, we could give you many reasons. But let’s just say that it is simply the best article spinner. Once, you will use it you can see it yourself. Our instant article spinner is all that you are looking for. You can easily use this paraphrasing tool as it is very simple. It is equally helpful for writer, students and bloggers. Threes words can describe it: Easy, Fast and Reliable!
Hello and welcome to another review from the Make Money Online Zone. Today we are looking at something that I didn’t really expect to see ever again. But here we are looking at another version of an article spinner that has been around for quite some time. Spin Rewriter from www.spinrewriter.com has just announced version 9.0 of its article creation software. Spin Rewriter 9.0 boasts lots of features that claim to make content creation easy. But is this software all its cracked up to be or should you avoid this one like the plague?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658662.31/warc/CC-MAIN-20190117000104-20190117022104-00464.warc.gz
|
CC-MAIN-2019-04
| 5,400
| 10
|
https://research.ou.nl/en/publications/how-family-firms-use-governance-mechanisms-to-mitigate-the-risks-
|
code
|
This study aims to increase our understanding of how family firms, acting as ecosystem orchestrators, mitigate perceived relational and performance risk in ecosystems via the use of governance mechanisms. We use the ecosystem governance literature to understand whether family firms' characteristics lead to a unique governance approach in an ecosystem setting. Our findings and theoretical implications are threefold; (1) formal and informal governance mechanisms act as complements to mitigate relational and performance risks; (2) the choice of governance mechanisms differs for relational and performance risk; (3) changes in perceived risk over time result in shifts in the relative dominance of formal/informal governance mechanisms.
Plain English Summary This study analyzes how family firms, acting as ecosystem orchestrators, mitigate perceived relational and performance risk via the use of governance mechanisms. Using data from a Belgian family firm that initiated an ecosystem in healthcare, the study shows that in a family firm-led ecosystem, formal and informal governance mechanisms act as complements to deal with relational and performance risk. We show that to deal with relational/performance risk, different combinations of governance mechanisms should be used. When ecosystem members perceive changes over time in perceived risk, the ecosystem orchestrator should change the balance between formal/informal governance mechanisms. Our study suggests that family firm orchestrators benefit from stimulating the active participation of ecosystem members. Family firm orchestrators might want to consider changing needs of a growing ecosystem, as, in larger ecosystems, frequent communication between the orchestrator and members can be more difficult. We argue that family firm orchestrators should remain mindful of the balance between formal and informal governance mechanisms.
- Family firm
- OPEN INNOVATION
- Open innovation
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711394.73/warc/CC-MAIN-20221209080025-20221209110025-00568.warc.gz
|
CC-MAIN-2022-49
| 1,949
| 5
|
https://forums.qrz.com/index.php?threads/low-pass-filter-toroid-core-material.753469/
|
code
|
I want to build bank of shortwave LPF's for my linear PA (100W), but I'm confused about inductors core materials. From my perspective is ideal to use Amidon's iron powder #2. Based on datasheet it: "Offers high 'Q' for the 2 MHz to 30 MHz. frequency range". So such a material is possible to use for every shortwave band. But in lot of kit's and DIY designs I saw that for frequencies higher then 7 MHz everybody use material #6. Then I tried to search which material's are used in ICOM IC-7610 (IC-7300). In service manual I clearly see #2 for low frequencies but for example for 20m band they use even material #10. Which looks to me total out of material specification. I'm really confused about it. Can somebody explain to me, how can I choose optimal material?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488504969.64/warc/CC-MAIN-20210622002655-20210622032655-00132.warc.gz
|
CC-MAIN-2021-25
| 765
| 1
|
https://forum.syncthing.net/t/running-syncthing-at-work-non-admin-rights/5540
|
code
|
Hello all !
On my workstation (=non admin rights), I’ve tried to replace Portable Dropbox by Syncthing to access my current work folder at home.
No wrapper (SyncTrayzor, SyncthingGTK) could be installed, of course. So I just launch the bare Syncthing executable.
Issue: neither does it see to any of the other repos, nor could it be seen by them.
How can I look for what’s wrong, please?
At work you are NATted, at home you probably are too. Can you add a host inbetween which is not, and see if the connection works?
Ahem… Sorry to say I’m not that technical.
How to do this ?
The portable versions will work (if Syncthing-GTK has a portable version, I’m not sure. Portable SyncTrayzor will work fine at least).
Portable SyncTrayzor was the first I tried. To no avail (it requires .Net Framework 4.5, which I cannot install).
I don’t think SyncthingGTK has a portable version but I gave the normal version a go. It requires python27.DLL, which I cannot install either.
Did you use syncthing with a device outside your home network before?
If not, you should check UPnP or manual Port Mapping in your home firewall.
If you had a device working successfully outside your home network, it could be, that your company firewall is blocking outgoing traffic. Dropbox used the default HTTPS port (443) which is “never” blocked. But syncthing uses other ports, which might be blocked.
Ah fair enough, that’s a shame.
Yes. My smartphone, my tablet, my laptop, my NAS and my VPS are constantly in sync.
This could be a port issue, as you suggested.
So is it possible to make Syncthing use this port ? (just a random thought that might sound nooby, I have no idea if & how it makes sense…)
If you have no HTTP(S) Server running at home (on that machine, or which is accessibly from the internet) you can change the address for the sync protocol in the main syncthing settings.
I changed mine to listen to the default
0.0.0.0:22000 plus the one which is needed to get through my company firewall, resulting (in your case) in
You should disable UPnP and set up the port forwarding in your home router manually, as UPnP will probably not map 443 externally.
I don’t know if global discovery will work with both adresses. I entered my second port + dyndns address in the device config on the node at work.
The global discovery will announce the UPnP mapped port if UPnP was successful, otherwise the first of your listen address ports.
An annoying thing here might be that you need to root/admin or have magic capabilities set to be able to listen on port 443…
(This is something we’re currently considering with the relay service btw.)
Yea, didn’t think about that. My “special company firewall” port is above 1023 ;).
So, if you have dyndns and only want the workaround for your office computer, I would suggest the following.
- Set listening port for sync protocol to something like
- Disable UPnP
- Open the following two ports in your home router:
- At work, set the device address of your home pc to
Port 22000 will be announced in global discovery and port 443 can be used as workaround.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521041.0/warc/CC-MAIN-20220518021247-20220518051247-00295.warc.gz
|
CC-MAIN-2022-21
| 3,112
| 33
|
https://medium.com/@leonkirchlechne
|
code
|
When you hire a Product Owner, you likely do so because this person is well-versed in a wide range of disciplines; they understand some front- and backend coding, timing, budget, business value, analytics, management, etc. In many ways, this is how you should be thinking about hiring Product Designers. Sure, they might have a beautiful portfolio, but can they be a key player throughout the entire product development process? A good Product Designer knows a bit of animation, prototyping, coding, research, visual and interaction design. They know when to deliver wireframes, and when to deliver pixel perfect mockups. They know when to use animation, and when to prototype. They know how to convincingly communicate their solutions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741569.29/warc/CC-MAIN-20181114000002-20181114022002-00205.warc.gz
|
CC-MAIN-2018-47
| 736
| 1
|
https://math.meta.stackexchange.com/questions/30149/proper-location-for-a-question-of-parsing-an-english-statement-into-math/30212
|
code
|
I'm an instructor of a College Algebra course and I noticed a problem with one of the computerized questions. I was going to ask for opinions here, but then I wasn't sure what was the proper forum for it....math.stackexchange.com? education? English? I'll put the question I was going to ask for context below in spoiler, please do not answer the actual question here, I'm just looking for advice on the proper forum to post it in the first place!
Computer question: Write the corresponding algebraic expression or equation for the verbal statement. Let x represent the unknown number. The quotient of one and five times a number.
The problem is where does one put in the pause in the English language. You could parse this as either "The quotient of one and five" "times a number" which gives you the answer of 1/5 * x, or the way the computer wants, "The quotient of one and" "five times a number", which gives 1/(5x). The computer only accepts the second interpretation, but according to my reading of the English language, either reading should be acceptable
From the comments, I decided English was the right place. In case anyone wants to participate in the discussion over there, here's the link. https://english.stackexchange.com/questions/496210/parsing-an-english-to-math-expression-question-is-this-ambiguous
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00104.warc.gz
|
CC-MAIN-2024-18
| 1,319
| 4
|
https://buffoonery.wordpress.com/2009/03/28/the-advancement-of-a-species/
|
code
|
The Advancement of a Species
Ever wonder what happened to the bloodline of the Monty Python Rabbit?
Well, they survived, moved to Japan… and learned from their ancestor’s run-in with the Holy Hand Grenade that technology matters.
The other species are preparing their defenses:
And the cats have already gone after the weaker allies of the rabbits; the squirrels:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121267.21/warc/CC-MAIN-20170423031201-00002-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 367
| 5
|
https://www.create-games.com/forum_post.asp?id=286893&s=0
|
code
|
I know this question has been asked dozens of times in the past, but I can't seem to find any non-broken examples of it. I'm looking at implementing something similar to the 'GTA "3d" building illusion' into a current project. I'm not looking for anything too complex (even though it probably would be complex anyway), just something that will allow to create objects that have a height and move with the player.
Ultimately what I'm aiming to achieve, is something like 3 levels. The middle level will be where the player walks around and interacts. The top level is the top of the walls and the bottom level is for pits, holes, etc. If I'm not explaining myself well enough, please ask.
Someone had created an example of an engine that created skyscrapers of several levels in height. It's along with an example of a musically-activated equalizer bar that reacts to the wavelengths of the sound sample. Do a search for engines and examples, and you'll most likely find it. From what I remember/know of the original GTA, chances are that effect can be replicated with this example.
Additionally, you may be able to use the parallax object to do what you're trying to do. There are some impressive examples with the Clickteam updates.
Hmmmm, I've put this into my game now but because the sprites are always being created they flicker randomly. I'm sure there's a better way to optimize it. Anyway, yeah. If anyone has any ideas on that then please let me know! ;D
Trying to do this in mmf2 is a bit of a lost cause, I'd recommend you to to use construct instead.
With it you can export and render 3d model which is then treated as a 2d sprite by the runtime, I can't think of any easier way to do 2.5D like you want.
Lost cause? Then you need to do some math dear boy.
Using a bit of trig and a few values this can be made "rather" easy and fully stable.
It's all a matter of positioning objects relative to the camera in the right scale and with the right offset. The scale and offset are found using distance calculations while the scale is set initially.
It also means means to abandon a language/system that you know, for something completely new that you aren't used to.
And if that's the case you will probably end up not finishing it even more than if you'd just stuck to the concept you know, albeit it meaning more calculations and such.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00680.warc.gz
|
CC-MAIN-2021-43
| 2,346
| 12
|
https://forums.civfanatics.com/threads/so-great-leader-cannot-rush-wonder-now.73341/
|
code
|
- Dec 26, 2002
IS that true that military leader cannot rush wonder now? So what is it use? Only building army? Why do they nerf it? Is there any other use of military leader now except building army?
Originally posted by Juhahu
Actually military leader can rush wonders, though just small wonders
Some of those are expensive, so it's pretty useful ability.
I hate the change. I always loved rushing a major Wonder with a GL i got from combat (which i was doing anyway.) (Hey, who you callin' a warmgoer??)Originally posted by CIVPhilzilla
I like the change. I always hated not getting a major wonder crucial to my strategy rushed by some warmgoer 1 turn before mine was complete.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00444.warc.gz
|
CC-MAIN-2023-14
| 680
| 7
|
http://xahlee.blogspot.com/2012/04/random-linux-notes-2012-04-28.html
|
code
|
random linux notes 2012-04-28
Perm URL with updates: http://xahlee.org/linux/linux_notes_2012-04-28.html
install Xfce desktop
Xfce is one of the light-weight desktop. If you hate the fancy shit in Ubuntu Unity or GNOME 3, and prefer a classic, standard UI that doesn't suck the blood out of your GPU, then use Xfce. Linus, reportedly, got fedup with KDE 4, then GNOME 3, and now uses xfce.
to install, run this:
sudo apt-get install xubuntu-desktop
• Xubuntu is basically Ubuntu with xfce as desktop by default.
If you don't know already, Unity and GNOME 3's UI are bleeding-edge, “simplified”, “smart”. Basically, they try to innovate classic desktop metaphor to cater to those brainless computer-illiterates who just use browser, watch movies, and don't know anything about files, folders/directories, apps, workspaces, etc. They try to fashion it to be intuitive and easy-to-use just like Apple's stuff that just works, except that they failed.
since GNOME moved to GNOME 3, leaving GNOME 2 dead in the water, some people forked GNOME 2 and is now named MATE (desktop environment).
Learn Technical Writing from Unix Man in 10 Days
remove remove is identical to install except that packages are removed instead of installed.
kicking kicking is identical to kissing except that receiver is kicked instead of kissed.
Disappearing URL in Doc
so, i was reading
man git. Quote:
Formatted and hyperlinked version of the latest git documentation can be viewed at http://www.kernel.org/pub/software/scm/git/docs/.
but if you go to that url, it shows a list of over one hundred fourty empty dirs.
I guess unix/linux idiots can't be bothered to have correct documentation. Inability to write is one thing, but they are unable to maintain a link or update doc?
does this ever happen to Apple's docs? If it did, i don't ever recall seeing it from 18 years of using Mac.
more records of careless dead link:
- A Record of Frustration in IT Industry; Disappearing FSF URLs
- Python Doc URL disappearance
- unix: Hunspell Path Pain
- Why Qi Lisp Fails and Clojure Succeeds
- Hackers: Dead Links and Human Compassion?
apt-get Package Naming Confusion and 〔/var/lib/〕
so a friend told me about a game named “githug”. It's a command-line app that teaches you git, as if playing a game.
githug site says:
gem install githug. I
which gem and got no result, so i brainlessly typed
sudo apt-get install gem and it went. But
apparently, the gem package isn't what i want. What i wanted, turns
out, is called “rubygems”, which is ruby's package management
there are several issues thus far:
- in unix, never brainlessly run things on command line (like i just did) unless you sure know what you running
- WTF is “gem” and “gem” named the same?
- question: how do YOU find a description of a package in “apt-get”?
now, continuing the story… so i:
sudo apt-get install rubygems
gem install githug
all went well, except, when i type
nothing is to be found. WTF is going on?
Answer: “githug” is installed in 〔/var/lib/gems〕 by default. You need to either call it with full path or add it to your $PATH.
locate are helpful in locating files.
They are basically a cached version of
find …. (Thanks to Huynh Kang))
〔/var〕, a short for “variable.” A place for files that may change often.
in unix shit, there's always some tech justification that makes you feel better.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823229.49/warc/CC-MAIN-20171019050401-20171019070401-00488.warc.gz
|
CC-MAIN-2017-43
| 3,392
| 48
|
https://akinozilkree.xyz/eba-t/244-get-coding.php
|
code
|
Why does One-Punch Man have three separate manga series, and which ones are considered canon? Like most Japanese animations, One-Punch Man is based on a manga. Focused on the trials and tribulations of Saitama - who's a hero just for a hobby - One-Punch Man is one part parody of Shonen-style storytelling tropes, one part thrilling and intense battle manga, pitching a perfect balance between action and comedy. First airing inthe One-Punch Man anime adaptation earned international success seemingly overnight, going on to become a crossover hit that appealed to hardcore anime fans and complete newcomers in equal measure. Usually, when an anime series blows up and finds a mass audience, enthralled viewers can dive into the original manga and discover what one punch man web comics next. With One-Punch Manhowever, there are several different variations of the manga to dip into, which can be confusing at first glance. But while ONE's talent helped him conceptualize the One-Punch Man story and its charactershis artistic skills left much to be desired.
Partition on to trigger. Fishing Funds - Display physical locations of Chinese. Start with for Service. Clean and a decade. Decay and also our collecting data.
Download and also attach is both support files. Comments between Daniel, "I wanted a that TightVNC Server would be ready. Please help the reset to create of application that enables the users to establish need to encyclopedic content then combines or Laptop your computer. At the ported X hold all changes by Divider sections.
Congratulate, what power rangers s p d pity, that
If not hosted at comes with on your most up-to-date WordPress version or PC or just tap on of days. Anonymous Not not intended will need Log in. The location is for authentication, then only and the Access IP is functioning and Configuring security get coding deliver Full Error. If your you can can then default configuration if not of the before accessing. Enable Alpha-Blending also has nice little you may.
Build confidence. Become a better thinker. Try On Your Own. Technologies You Will Learn. Popular Courses. All Courses. Student Favorite. See more Spark Curiosity Courses designed to allow anyone to explore. Build Confidence Tasks build on each other. Solve Problems Every coding project gives you chances to think on your own at your own pace. Get Started. Why learn from Mr. Over 22 Years Teaching Coding in the Classroom I have been teaching coding for over two decades to young and old.
An educator who cares deeply for the success of his students, both past and present. His classes were always engaging, exciting, and consistently something to look forward to. For all my moms and dads out there who'd like to introduce their littles to coding - Mr.
Fred is the best of the best and a damned awesome person to boot!! I wanted to let you know what a great impact you are making on Ian with your coding class. On the ride home today he could not stop talking Fred wanted to be an astronaut, Fred saw Star Wars, Fred started programming when he was a kid I wanted to express my gratitude not just running an effective camp, but for inspiring my son on something as meaningful as coding.
He spent much of the remainder of the summer working on other programming ideas, which thrilled me because it was something productive without me having to force it upon him. Beyond that though it is a great outlet for his creative energy. Join our community!
Family Friendly Community. Tutorials and Tips. Learn about technology Get advice on learning. Video Short and Behind the Scenes. Posts, Stories, and Reels. Join in on the converations today! Visit us on Facebook. Guest speaker. Fred Tech Talks. Talks designed to explain technology in a way anyone can understand. Book Mr. Need a Gift Idea? Coding Toy Idea Gift Guide. Age specific categories Easy to understand recommendations.
Free to Download. We are working to build community through open source technology. NB: members must have two-factor auth. GithubHelp home page GithubHelp Search. Features Installation Getting Started Features Create a custom environment by defining an app composed of a workspace , playspace , and set of levels.
Create your own playspace by defining an API for your manipulatable space. Playspaces are automatically stepable and traceable. Pluggable workspaces makes it easy to ensure your app is age appropriate. Forkers xhuutrx stevekinney.
Coding get emergency contacts
[22/??] Une introduction aux generics avec Go 1.18 - Tutoriel Français Golang pour débutants 2022
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00730.warc.gz
|
CC-MAIN-2022-40
| 4,560
| 14
|
https://antoniogoncalves.org/page/3/
|
code
|
I would like to thank Arnaud Heritier who gave me plenty of tips and advices to write this blog. In fact if you want to endorse someone on Maven in LinkedIn, he is the man, not me ;o) If you use Maven in your projects you might wonder what “Let’s Turn Integration Tests with Maven into a First-Class Citizen” means. A bit of introduction on that. … Continue reading Let’s Turn Integration Tests with Maven to a First-Class Citizen
Sometimes life is about surprises. The other day I received an email from a friend saying “hey, congratulation, you’ve been awarded one of 100th people who will move IT forward in 2013“. Of course, I didn’t understand his email and didn’t reply. A few days later I received a more official email from the French IT magazine 01 Informatique who said the same thing. Attached to … Continue reading I’ve been awarded one of 100th people who will move IT forward in France for 2013
Everything started when Eve said ‘No‘ when God told her not to eat the fruit. Then my daughter said ‘No‘ when I told her to clean her room. Then we had a bunch of guys saying ‘No‘ to SQL. Then I read Is there such a thing as the NoMock movement?… And today I’m saying let’s launch the NoMock Movement ( ‘No‘ meaning Not Only of course … Continue reading Launching The NoMock Movement
Stephen Chin had this crazy idea of touring Europe on its way to Devoxx, and interview people. He called it the “Hacking Tour – The Road to Devoxx“. On his way from Italy he crossed France, stopped over to interview several people and then he arrived in Paris to interview me as well as the Parisian Java community (Paris JUG, JDuchess, Code Story). Unfortunately, everything … Continue reading So now I am a NightHacker ;o)
A short blog about a topic I was discussing last week with a customer: testing SOAP Web Services. If you follow my blog you would know by now that I’m not a fan of unit testing in MOCK environments. Not because I don’t like it or I have religious believes that don’t allow me to use JUnit and Mockito. It’s just because with the work I do (mostly … Continue reading No, you don’t need to mock your SOAP Web Service to test it
If you are interested by Java EE development and roadmap you might have read recently that the Cloud feature in Java EE 7 has been delayed. As I’ve already expressed in the Java EE 7 expert group mailing list, I’m happy about this news because I feel standardizing cloud in EE 7 was way too early. But I’m also sad. Sad because we’ve spent a lot of … Continue reading I need you for Logging API Spec Lead !
Do you remember the good old Java Petstore ? It was a sample application created by Sun for its Java BluePrints program. The Java Petstore was designed to illustrate how J2EE (and then Java EE) could be used to develop an eCommerce web application. Yes, the point of the Petstore is to sell pets online. The Petstore had a huge momentum and we started to … Continue reading Yet Another Petstore !
I.T. is full of complex things that should (and sometimes could) be simple. Getting the JQPL/SQL String representation for a JPA 2.0 CriteriaQuery is one of them. By now you all know the JPA 2.0 Criteria API : a type safe way to write a JQPL query. This API is clever in the way that you don’t use Strings to build your query, but is quite … Continue reading How to get the JPQL/SQL String From a CriteriaQuery in JPA ?
I’m fed up with unit testing !
It’s 2012 and my first resolution of the year is to finally tell the truth about testing : unit testing is pretty much useless when your code runs inside a container. How do you unit test an EJB which relies on the container services (i.e transaction, injection, security…) ? Well, you mock the database access, you mock your security layer, you mock your dependencies, you mock your validation layer… to test what ? A bit of business logic. Yes. Unit test is interesting when you have complex business logic to test so you can have quick feedback. Otherwise, it’s a waste of time which doesn’t test your container services. So I’m not saying unit testing is completely useless, I’m saying that integration testing is also to be considered when you run your code inside a Java EE container. Continue reading WYTIWYR : What You Test Is What You Run
Nearly two years ago (time flies), when Java EE 6 came out, I wrote a post about application servers where I did some micro benchmarking (basically, startup time). I had plenty of comments and recently I had many people asking for some updates. Witht Java EE 6 booming, with some cloud vendors moving to Java EE 6, it was time to update this microbenchmark and focus on Java EE 6 application servers. BTW, if you want to know what Java EE 6 is, you can check the slides of a presentationI gave a few times.
Same disclaimer as last time : This is not a real benchmark ! so I’ll copy paste the paragraph I wrote last time :
In this test I’m just concerned about the usability of an application server for a developer. The idea is to download it, install it, start it and take some measurements : size of download, ease of installation, size of disk, startup time, size of RAM. Continue reading O Java EE 6 Application Servers, Where Art Thou?
If you follow this blog you should know that latelly I’ve been writing (and talking) about CDI (Contexts and Dependency Injection). CDI has many aspects to it but until now I’ve focused on how to boostrap CDI in several environments, how to add CDI to an existing Java EE 6 application, and more recently how to use injection with CDI. Actually this post is the third on CDI Injection : Part I focused on default injection and qualifiers, and Part II on all the possible injection points (field, constructor and setters). In this post I’ll explain producers or “how you can inject anything anywhere in a type safe manner“. Continue reading Injection with CDI (Part III)
I’ve been asked so many times “what are the implementations of such or such specification in Java EE 6 ?” or “what is the reference implementation of such a spec ?“. Because I always forget some (and to be honest, sometimes I don’t even know if a spec has several implementations of not), I’m writing this post to help me (and you) to remember.
So here is a non-exhaustive list of the several Java EE 6 implementations (please leave a comment to add anything to this list) … Continue reading Walking through the Java EE 6 implementation maze
How do you configure your enterprise application ? Or to be more precise “what is configuration, what can you configure in Java EE and how can you configure it ?”
What is configuration ?
Sometimes your application needs to change parts of its behavior at deployment time. You then need to provide some external configuration for some components. For example, in your development environment you don’t want to use a datasource and instead hit the database with a user & password, in your test environment you lookup for the datasource and use it. If you deploy your application in Europe you need to use the Euro as the current currency and if you deploy it in the US you need dollars… Continue reading [Debate] – And what about configuration in Java EE 7 ?
Two weeks ago I did a little tour around several JUGs and conferences to talk about dependency injections with CDI. The final goal of this road movie was to end up at GeeCon in Krakow. It was my second time at GeeCon and I have to say that this conference is like good wine : getting better with age. This community based conference is on its third edition and attracts people through out central and eastern Europe. Plenty of good speakers, nice location, skilled attendees… and a lot of fun (GeeCon organizers are party addicts). So make sure you mark this conference into your agenda for next year…. Continue reading To inject or not to inject: CDI is the question
This is the second post based on pure CDI Injection (see Part I) after having talked about how to bootstrap CDI in several environments and how to add CDI to an existing Java EE 6 application. In this post I quickly want to show the different injection points in CDI : field, constructor and setter. To illustrate these different injection points I’ll use a subset of the previous example : a servlet injecting an ISBN generator POJO … Continue reading Injection with CDI (Part II)
I haven’t talked much lately at conferences or JUGs. The last one was Devoxx in November 2010 and I have been quite ever since (working on some other plans ;o) But it’s time to do a bit of touring again. This time it will be Central Europe and the topic with injection in CDI. The presentation of the talk is To inject or not to inject: CDI is the question and the description roughly is :
After a quick introduction of CDI (Contexts and Dependency Injection) I will concentrate on dependency injection and the type-safe approach on injection in CDI. If you are fed up of using String based configuration, come to this talk and have a type-safe journey on CDI.
How come I am touring again ? Everything started with an invitation from my friends at GeeCon. I discovered GeeCon in 2009. It was the first edition of this conference in Cracow (Poland) created by the local user group. Continue reading A week in central Europe… with CDI
Vos avez un nouveau projet dans les tuyaux ? Vous vous questionnez sur les frameworks à choisir ? Vous hésitez à utiliser votre framework printanier à base d’XML et de complexité ? Vous voulez migrer votre application vers un standard ? Vous détestez les EJBs ? J’ai ce qu’il vous faut : une formation de 3 jours autour de Java EE 6 intitulée Architectures d’aujourd’hui avec Java EE 6.
Continue reading Formation Java EE 6 en juin à Paris
After writing a post about how to bootstrap CDI in your environment and giving you some tips about how to incorporate CDI in an existing Java EE 6 application, I want to talk about injection. Yes, pure injection or how to inject a bean into another one. As you’ll see in this series of three articles (Part II), many different cases can happen. Let’s start with a simple one : a straight forward injection.
The simplest possible injection case is… simple. You have something, and you inject something into it. Why am I using the word something ? Because until Java EE 5 we could only inject resources (EntityManager, Datasource, JMS destinations and factories…) into certain components (EJBs and Servlets). With CDI, you can inject nearly anything into anything else. Continue reading Injection with CDI (Part I)
I like to investigate new things as well as digging into concepts that I know quite well. As an architect, my job is also to pass information to the teams I work for. I like writing articles because I can summaries what I know and give it to others who will learn from it. He are the abstracts of the articles I’ve written.
Tutorials on testing Java EE 6 components :
Antonio Goncalves, fondateur du groupe d’utilisateurs Java de Paris (Paris JUG)
(June, 2008) Personal interview covering my carrier, my travels around the world, my vision of French IT industry… till the creation of the Paris JUG.
Continue reading Articles
If you haven’t used your RSS feed reader lately, you might have missed that Java EE 7 is starting to kick off : JPA 2.1 (JSR 338) and JAX-RS 2.0 (JSR 339) have been voted, Robert Chinnici has talked about it, some conferences have mentioned it… Java EE 7 will happen and quite quickly (Q4 2012). The main focus is the cloud. I will not talk here about the cloud, I’ll talk about everything else (well, not everything ;o)
Java EE 7 is an umbrella specification, meaning it’s made of several specifications. Its goal is to give the other JSRs a common target (here, the cloud) and to make sure these specifications interact well with each other. The Java EE 7 expert group is not responsible for all the JSRs, just the umbrella. That means if the Java EE 7 expert group wants to add something new to the platform (eg. it would be nice to have batch processing into the platform) it will not do it : it will rely on some other spec (i.e. someone else) to specify it and to interact well with the other specs. Continue reading Java EE 7 – I have a (few) dream(s)
In my previous post I’ve shown you how to bootstrap CDI in several environments (GlassFish, Tomcat, Jetty, Java SE). So now let’s go a bit further and use it in real code. As its name states, CDI (Contexts and Dependency Injection) is also about Dependency Injection, so let’s focus on just this feature for now. I will not define what DI (Dependency Injection) is. If you don’t know I’ll leave you to check the definition, the origins of this pattern and even a book that covers it all. Continue reading Adding CDI to an existing Java EE 6 application
I feel like writing some posts about CDI (Contexts and Dependency Injection). So this is the first one of a series of x posts (0<x<10). I will not go through the entire history of CDI (formerly called Web Beans, splitted in two JSRs… and so on), but will try to give you information on how to use it in different environments, explain you injection, context management, scoping, decorators and so on. So you can think of this series of posts as a humble step by step CDI tutorial. You can also read the very good documentation on the JBoss website (where I got some help and inspiration).
Continue reading Bootstrapping CDI in several environments
Vous l’avez certainement lu dans tous les magasines, la rentrée littéraire 2010 ce n’est ni Michel Houellebecq ni Amélie Nothomb, mais bel et bien la seconde édition de Java EE 6 (aux éditions Apress). Pour fêter cet évènement inter galactique, je m’associe à Emmanuel Bernard (Hibernate Search in Action aux éditions Manning) et Arnaud Héritier (Maven aux éditions Pearson) pour une séance de dédicace groupée à la librairie Le Monde en Tique. Vous aurez ainsi l’honneur et le privilège de rencontrer vos idoles, d’acheter leur superbe ouvrage, de vous les faire dédicacer, de boire un verre et de papoter de tout et de rien. Continue reading Séance de dédicace groupée
I haven’t blogged for quite a long time. That’s not because I am lazy (well, I took 4 weeks of holidays) or I have nothing to say (titles you could have read in this blog “the rise of Java EE 6”, “the lightweight container strikes back”, “in EJB we trust” or “god save CDI”). No, I was busy finishing the second edition of Beginning Java EE 6 with GlassFish v3.
This second edition has many updates. I’ve updated all the tools of course (GlassFish 3.0.1, Derby 10.6, JDK 1.6.0_20…) but also added extra sections (on JPA, EJB, JSF & JAX-RS) as well as taking into account readers’ feedback. I would like to thank everybody who read the first edition and sent me feedback on Get Satisfaction. That allowed me to correct some mistakes or clarify some concepts. If you get the book, remember to download the code of the examples from Kenai. I’ve also updated lots of code, improved javadoc and added some readme.txt files.
Continue reading I don’t know anything about Silverlight nor .Net
It’s been a long time since I haven’t blogged about what I am doing on evenings and week-ends. For people who think that I watch TV and have BBQs on Saturdays, I have to tell you that I don’t have any TV (it’s been over 20 years now) and I don’t have a garden to cook my burgers. No, I’ve spent my spare time updating my Java EE 6 book.
In this second edition I have updated the content and added new sections. When the first version of the book got out it was in June 2009 and Java EE 6 hadn’t been released yet (December 2009). So there were some topics that I didn’t cover because they were not completely finished (like the Criteria API in JPA 2.0). I’ve also updated the frameworks (GlassFish 3.0.1) and the code so it’s more accurate. The book is planned to be published in September 2010. As always there is a full list of people I need to thank for this second edition. Writing or updating a book is hard work and comfort is always needed. Continue reading Java EE 6 ? Excuse my French !
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00067.warc.gz
|
CC-MAIN-2023-14
| 16,318
| 44
|
http://serverfault.com/questions/451328/custom-incremental-update-in-windows
|
code
|
Our client has 100+ computer in the network and they are switching to Windows 7 next month.
Our software is based on SQL 2008 and .NET 1.1 binaries. They requirement is to create an incremental auto-update solution to avoid Windows Update and has the possibility to react fast and efficient for new security updates (ie. SQL Server 2008 R2 CU7).
I'm sure that the community has more than one great solution for that but I'm not able to found it.
Our idea is this:
- A windows service runs as Local admin in the background
- It watches a network drive, if there is a new version (a new folder, lets say) it will run the content, possibly an PowerShell file
- If an older notebook comes into play, it must be upgraded from the last known update
For example the update directory is that:
Directory1 SQL 2k8 update 1 Dircetory2 Our software update 1 Directory3 SQL 2k8 update 2 Dircetory4 SQL 2k8 update 4
After every successful update the client saves the last version (for example "I'm up-to-date to Directory4").
This is just an idea any others are welcome!
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823133.4/warc/CC-MAIN-20160723071023-00162-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 1,056
| 11
|
https://wizardofios.wordpress.com/2012/10/17/ibooks-like-library-for-magazine-apps/
|
code
|
So my prime focus in the last few years have been digital magazines.
So here is an awesome library that I am grateful for. It is called AQGridView written by Alan Quatermain
You can find the git here.
It is really simple to use.
The three delegate methods, which are similar to a UITableView are
- (NSUInteger) numberOfItemsInGridView: (AQGridView *) aGridView
- (AQGridViewCell *) gridView: (AQGridView *) aGridView cellForItemAtIndex: (NSUInteger) index
- (void) gridView: (AQGridView *) gridView didSelectItemAtIndex: (NSUInteger) index
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122174.32/warc/CC-MAIN-20170423031202-00267-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 539
| 8
|
http://www.jscc.co.jp/en/cash/irs/compression.html
|
code
|
Interest Rate SwapCompression
“Compression” is a mechanism of reducing and/or compressing open interests (Notional Amounts and trade counts) through simultaneous unwind of multiple cleared trades.Compression needs has been increasing on Participants’ side backed by leverage ratio regulations and needs for reduction of management costs for open interests. In response to such Participants’ needs, JSCC has introduced various Compression schemes as follows:
- February 2014 (Phase 3): Started Vendor-Initiated Compression
- September 2015 (Phase 4): Started Par Trade Compression and Enhanced Vendor-Initiated Compression scheme (introduction of Unlinked Compression)
- April 2016 (Phase 5):Started Blended Rates Compression and Member-Initiated Compression
(1)Per Trade Compression
Per Trade Compression is conducted daily upon IRS Clearing Participant’s request. Multiple cleared trades satisfying certain matching conditions are unwound through Per Trade Compression and claims and obligations for a new trade with a netted Notional Amount are cleared as necessary, achieving compression of notional balance and trade counts.
As economic terms of Trade ID1・2・3 match, they are unwound through Per Trade Compression, and replaced by Trade ID 10 (Notional: JPY1 bil). Similarly, Trade ID 4・5 are completely cancelled, and Trade ID 6・7 are replaced by Trade ID 11 (Notional: JPY 3bil).
(2) Blended Rates Compression
Process of a Compression between trades with different Fixed Rates is referred to as Blended Rates Compression. Under Per Trade Compression, trades with the same economic terms, including Fixed Rates, are subject to Compression. So combination of trades with unmatched Fixed Rates is out of the scope of this Compression. In Blended Rates Compression, compression between trades with different Fixed Rates is allowed if certain conditions are met, realizing higher compression effect.
Under Per Trade Compression, because trades with matching economic terms, including coupon (but not Notional), are subject to Compression, only Trade IDs 1 and 2 are subject to Compression, and compressed Notional is JPY 2bil and trade count is reduced from 2 to 1.
Blended Rates Compression is a structure to allow compression of trades with different Fixed Rates if certain economic terms match. In the above example, 2 new trades with Notional of JPY1.933bil and JPY66mil each are newly become effective, and thereby compression of JPY4bil is realized and trade count is reduced from 4 to 2.
Vendor-Initiated Compression is a form of Compression with a simultaneous participation by multiple Clearing Participants, which is now conducted almost quarterly. For operational processing of Vendor-Initiated Compression, JSCC uses service of TriOptima having proven experience in bilateral trades and compression processing for overseas CCPs.
JSCC has cleared 1 IRS trade between Participant A and Participant B and 2 IRS trades between Participant C and Participant D, of which Participant A and Participant C applied for a participation in Vendor-Initiated Compression. Participant B and Participant D have not applied for participation in Vendor-Initiated Compression.
On JSCC side, “receive Notional JPY 10bil x Fixed 5%” from Participant A balances with “pay Notional JPY5bil X Fixed 5.1%” and “pay Notional JPY5bil X Fixed 4.9%” to Participant C, and “pay Notional JPY 10bil x LIBOR 6M” to Participant A balances with “receive Notional JPY 5bil x LIBOR 6M x 2” from Participant C.
Through Vendor-Initiated Compression unwinding these 3 cleared trades at the same time, open interests (Notional and trade counts) can be compressed within tolerable risk variance. In this example, compression of Notional JPY 20bil and 3 trade counts are realized.
Member-Initiated Compression is a structure to realize Compression based on a proposal prepared by one or more Clearing Participant(s) for its (their) trades to be unwound and to be newly established. Detailed operational flow of Member-Initiated Compression is structured based on the flow of Vendor-Initiated Compression using TriOptima.
By using Member-Initiated Compression, various types of Compression, such as a blended spread compression of basis swaps, blended rates compression based on arbitrary logic created by a Participant and blended rates compression across multiple Participants, will become possible.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00518-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 4,416
| 18
|
https://wiki.ubuntu.com/Testing/Applications/BluezGNOME?highlight=%28CategoryAppTesting%29
|
code
|
Report any bugs you find using the following command in a terminal:
You can learn more about reporting bugs at http://wiki.ubuntu.com/ReportingBugs.
Prerequisite : Make sure you have a bluetooth hardware in your computer and at least one discoverable bluetooth device in range.
Test that bluetooth hardware works
This test should avoid regressions like https://bugs.launchpad.net/ubuntu/intrepid/+bug/289836 from happening again.
Applications -> Accessories -> Terminal
- hcitool scan
- verify that your discoverable devices appear in the list
This test should avoid regressions like https://bugs.launchpad.net/ubuntu/+source/bluez-gnome/+bug/284994/ from happening again.
Transfer a file to your computer
This test should avoid regressions like https://bugs.launchpad.net/bugs/290875
Transfer a file from your computer
Browse a remote storage
Print on a bluetooth printer
Verify that your printer is supported : http://openprinting.org/printer_list.cgi
- Install your printer using system/administration/printers
- Print a test page
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00182.warc.gz
|
CC-MAIN-2022-33
| 1,033
| 17
|
https://www.reddit.com/r/Yugioh101/comments/8ow3xu/question_trying_to_build_a_deck_around_mythical/
|
code
|
Hey there! So i've been very out of the yugi oh meta for a good couple of years now ( last time i played, XYZ's were king, and these new-fangled 'pendulums' hadn't caught on yet!) but i've been really wanting to try out building a Mythical beast deck; i know there not Tier 1 material, even after the banlist hits on the meta-decks, but i was thinking of trying to still build them but main-decking 3x Mask of restricts, and 2x of the relevent hand traps. My logic was that the best answer to most 'boss monsters' now days is just Kaijui'ing them off the field, and id thought a card like mask of restrict might serve to stun that strategy. is this a good idea? are there any other ways i can protect myself from the Kaiju menace? i felt like the card also had some added value against the 'lair of darkness' centric decks?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827992.73/warc/CC-MAIN-20181216191351-20181216213351-00038.warc.gz
|
CC-MAIN-2018-51
| 823
| 1
|
https://notes.kateva.org/2007/02/building-productivity-solutions-via.html
|
code
|
Jacob Reider ties a commercial (Misys) practice management system to Google calendar to build a distributed medical office schedule.
It's a fascinating example. Is it HIPAA compliant? Probably, though I can't swear to that. Is it reliable -- I'm less sure of that, Google is famous for breaking APIs. It is probably reliable enough for Jacob though, he can always fix it as needed.
Many eons ago, when dinosaur roamed the earth and Gopher was hot, I advocated for building our startup's solutions as an extensible ecosystem. I wasn't thinking web services, I was thinking more photoshop-style plug-ins. We would build things, others could build things, the sum of the ecosystem would be greater than a controlled solution. (I wasn't so foolish as to advocate open standards; even now the closest thing to that, the HL-7 RIM 3.0 spec, is a decade away from being robust.)
I got exactly nowhere with my proposal. The startup sold for a decent price, so I was probably wrong -- most startups simply fail. In a broader sense, however, I do believe in the original vision. There are win-win solutions in the universe.
I don't, however, buy Jacob's more radical proposal that one can craft an entire robust solution from off-the-shelf parts. It's the old probability curse. Building a 98% reliable solution from x integrating parts requires (1- x*y*z...) reliability from each component. That's hard to achieve even in a controlled web services architecture. It's worth remembering that even Gmail is not all that reliable -- there are times it's slow or even unavailable. We are ok with that because we can tolerate some offtime on our email. Gmail is only one controlled system.
Of course I've been wrong before ...
2/12/07: Jacob replies. Alas, no comments on his blog so I can't say hello that way. Really, the wrestler wasn't all bad! He was kind of a weird libertarian populist ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00785.warc.gz
|
CC-MAIN-2024-18
| 1,881
| 7
|
https://www.148apps.com/app/1617557560/
|
code
|
Adding a new button to enable/disable a daily reminder!
TriviaLinked is the ultimate daily trivia challenge! Every day, players connect 12 links to forge a trivia path ~
View your percentile among all players, submit your own path, or read about the connections to learn something new!
- April 18, 2023 Initial release
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647810.28/warc/CC-MAIN-20230601110845-20230601140845-00674.warc.gz
|
CC-MAIN-2023-23
| 318
| 4
|
https://www.ceciliaweiland.com/data-analytics.html
|
code
|
Qualitative and Quantitative processes to uncover imperative knowledge that enhances and supports business decisions.
As a part of a Graduate-level data analytics course at Georgetown University, Cecilia worked with a team of four Graduate students to conduct an original research project on U.S. Presidential Campaign Branding.
After formulating innovative research questions and hypotheses and evaluating existing literature related to the project, the team authored an original report by coding evidence, collecting data, and analyzing the results using the statistical software IBM SPSS Statistics. This academic report was published in the Spring 2016 edition of the Georgetown University peer-reviewed journal, gnovis, and is awaiting publication in other outlets.
Exploring Complex Technology
Through original research as well as the review of existing literature, Cecilia worked with a team of three Graduate students at Georgetown University to create maps and diagrams describing the technological algorithm and architecture of the WiFi Positioning System (WPS), as well as multiple user personas to better understand how and why users rely on WPS every day.
As the team “de-blackboxed” this technology, they explored WPS as a socio-technical system: explaining how it works at a technical level, describing how it shapes and has been shaped by social decisions, and defining how the technology affects the lives of its users.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370524043.56/warc/CC-MAIN-20200404134723-20200404164723-00107.warc.gz
|
CC-MAIN-2020-16
| 1,440
| 6
|
https://techdifferences.com/difference-between-3nf-and-bcnf.html
|
code
|
Normalization is a method that removes redundancy from a relation thereby minimizing the insertion, deletion and update anomalies that degrade the performance of databases. In this article, we will differentiate among two higher normal forms i.e. 3NF and BCNF.
The basic difference between 3NF and BCNF is that 3NF eliminates the transitive dependency from a relation and a table to be in BCNF, the trivial functional dependency X->Y in a relation must hold, only if X is the super key.
Let us discuss the differences between 3NF and BCNF with the help of comparison chart shown below.
Content: 3NF Vs BCNF
|Basis for Comparison||3NF||BCNF|
|Concept||No non-prime attribute must be transitively dependent on the Candidate key.||For any trivial dependency in a relation R say X->Y, X should be a super key of relation R.|
|Dependency||3NF can be obtained without sacrificing all dependencies.||Dependencies may not be preserved in BCNF.|
|Decomposition||Lossless decomposition can be achieved in 3NF.||Lossless decomposition is hard to achieve in BCNF.|
Definition of 3NF
A table or a relation is considered to be in Third Normal Form only if the table is already in 2NF and there is no non-prime attribute transitively dependent on the candidate key of a relation.
So, before I address the process of normalizing a table in 3NF, allow me to discuss the candidate key. A Candidate Key is minimal super key i.e. a super key with minimum attributes that can define all attributes of a relation.
So, in the process of normalizing your table, first, you recognise the candidate key of a given relation. The attributes that are part of candidate key are prime attributes, and the attributes that are not the part of candidate key are non-prime attributes.
Now if we a relation R(A, B, C, D, E, F) and we have following function dependencies for the relation R.
Observing functional dependencies, we can conclude that AB is a candidate key for relation R because using key AB we can search the value for all the attribute in a relation R. So A, B becomes prime attributes as they together make candidate key. The attributes C, D, E, F becomes non-prime attributes because none of them is the part of a candidate key.
The table is in 2NF as no non-prime attribute is partially dependent on candidate key
But, a transitive dependency is observed among the functional dependencies provided, as the attribute F is not directly dependent on candidate key AB. Instead, attribute F is transitively dependent on candidate key AB via attribute D. Till attribute D has some value we can reach to attribute value of F, from the candidate key AB.
In case the value of attribute D is NULL we can never find/search the value of F with the help of candidate key AB. This is the reason why 3NF demands to remove the transitive dependency from the relations.
So, to remove this transitive dependency, we need to divide the relation R. While dividing a relation always place the candidate key, and all the attributes that depend on that candidate key in the first relation. In next divided relation, we will place the attribute that causes transitive dependency and also the attributes that depend on it in the second relation.
Now, the tables R1 and R2 are in 3NF as it has no partial and transitive dependencies left. Relation R1 (A, B, C, D, E) has a candidate key AB whereas, relation R2 (D, E) has D as its candidate key.
Definition of BCNF
BCNF is considered to be the stronger than 3NF. The relation R to be in BCNF must be in 3NF. And wherever a non-trivial functional dependency A -> B holds in relation R, then A must be a superkey of relation R. As we know, Super key is a key which has a single attribute or set of attributes that determines, the entire attributes of a relation.
Now, let us move on to an example to understand BCNF in a better way. Let us, suppose we have a relation R(A, B, C, D, F), which have following functional dependencies.
By observing the relation R, we can say that A and BF are candidate keys of relation R, because they alone can search the value for all attributes in the relation R. So A, B, F are the prime attributes whereas, C and D are non-prime attributes. No transitive dependency is observed in the functional dependencies present above. Hence, the table R is in 3NF.
But one functional dependency i.e. D -> F is violating the definition of BCNF, according to which, if D -> F exist then D should be the super key which is not the case here. So we will divide the relation R.
Now, the tables R1 nd R2 are in BCNF. Relation R1 has two candidate keys A and B, the trivial functional dependency of R1 i.e. A-> BCD and B -> ACD, hold for BCNF as A and B are the super keys for relation. Relation R2 has D as its candidate key and the functional dependency D -> F also holds for BCNF as D is a Super Key.
Key Differences Between 3NF and BCNF
- 3NF states that no non-prime attribute must be transitively dependent on the candidate key of the relation. On the other hands, BCNF states that if a trivial functional dependency X -> Y exist for a relation; then X must be a super key.
- 3NF can be obtained without sacrificing the dependency of relation. However, dependency may not be preserved while obtaining BCNF.
- 3NF can be achieved without loosing any information from the old table whereas, while obtaining BCNF we may loose some information from the old table.
BCNF is much restrictive than 3NF which help in normalizing the table more. The relation in 3NF has minimum redundancy left which is further removed by the BCNF.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00667.warc.gz
|
CC-MAIN-2023-50
| 5,549
| 30
|
https://netbeans.org/community/news/show/1643.html
|
code
|
NetBeans.org Community News
Back to the community news list
NetBeans IDE 8.2 Patch 1 Now Available
jkovalsky, 15 Dec 2016
The NetBeans Team has released a patch for NetBeans IDE 8.2 with fixes that enhance stability and performance. As you can learn more about the fixes in the NetBeans IDE 8.2 Patching Info Wiki page, the update fixes 110 bugs mainly in CND area.
To obtain the fixes, NetBeans IDE 8.2 must be installed and running. Once you see an update notification in status bar, click the notification to install the updates. You can also download the fixes through the NetBeans IDE Plugins Manager (Tools > Plugins menu item) or the About dialog (Help > About menu item).
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863972.16/warc/CC-MAIN-20180521082806-20180521102806-00054.warc.gz
|
CC-MAIN-2018-22
| 679
| 6
|
https://www.fossjobs.net/job/9952/devops-engineer-at-open-preservation-foundation/
|
code
|
This job ad has been posted over 40 days ago! (*)
The Open Preservation Foundation (OPF) is looking for an experienced, motivated and technically versatile DevOps Engineer to join our team in a new role. This is an exciting opportunity to work with leading libraries, archives, universities, research organisations and vendors across the world.
The DevOps Engineers’ role is: *To manage online OPF servers and services, e.g. OPF website and the OPF’s Jenkins server. *To manage the testing, packaging and release of OPF software products including veraPDF and JHOVE. *To carry out software development for OPF software products and external project requirements. *To streamline and develop OPF’s automated sysadmin and continuous delivery processes. *To produce and maintain accurate and concise documentation for software and processes as required.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00888.warc.gz
|
CC-MAIN-2024-18
| 855
| 3
|
http://www.edugeek.net/forums/general-chat/print-86740-tools-youve-made.html
|
code
|
Tools you've made!
Hey all.... not sure if something has been posted before, but what tools have you made or macgyvered to fix a problem?
We've just used a piece of cat5 copper to short out the pwd terminals on an Acer... cos the NM forgot what pwd he used for the bios, LOL...
I've also found an unbent paper clip to be very handy at releasing CD/DVD Drives...
Paperclips have been a mainstay of the IT industry for years. Imagine our surprise when being a few retail pack DVDRW drives when they provided actual metal sticky-inny pin things for this purpose! Wow! That almost amazed me as much as when I found an actual Winzip 8 CD!
My favourite one is my Fibre Cable Tester.
Using the camera on my phone to tell if a remote controller is working.
I do this all the time. :)
Originally Posted by laserblazer
I've made a button box to press a specific key stroke. Big red button wired up to the correct points on a keyboard circuit and boxed up. Works a treat.
If it can't be fixed with a hammer, or a bigger hammer than the previous one, I am not interested. ;)
port tester (only works for 10/100 ports)
Faceplate jack wired as below and a patch cable.
The Network Kettle - the most important tool of all! http://www.edugeek.net/forums/genera...rk-kettle.html
I have made a fibre tester, involving a laser pen, a box, and at the other end a piece of paper
I routinely use a thin metal blanking plate from a PCI slot as a punchdown tool for data points. Also bodging together projector brackets from other brackets and cable ties for a temporary fix.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447557824.148/warc/CC-MAIN-20141224185917-00024-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 1,550
| 16
|
https://www.rocq.inria.fr/modulef/Doc/GB/Guide3-18/node14.html
|
code
|
Next: 1.4.3 Implementation Up: 1.4 The module APNOPO Prev: 1.4.1 General presentation Index Contents
The choice of modules called by module APNOPO is governed by keywords. Each keyword activates a corresponding module. The set of keywords and their associated values are given in a data file. The list of keywords is given in figure 1.1.
Figure 1.1: Flowchart of module APNOPO
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505366.8/warc/CC-MAIN-20200401034127-20200401064127-00264.warc.gz
|
CC-MAIN-2020-16
| 376
| 3
|
https://damianqualter.com/infusionsoft/animated-gifs/
|
code
|
How To Add Animated GIFS Into Infusionsoft Emails
If you've ever wondered how to add animated GIFS into Infusionsoft emails you'll live this short video tutorial.
In today's video, I'm just going to show you how we create a pretty cool animated GIF that we can embed in our Infusionsoft email.
So it's really straightforward.
The massive advantage of this is we're going to use some free software too. You can do this using lots of other different software, which are usually paid for versions. The software I'm going to use is basically a software called Ezgif. And I'll just refresh this page now, and we'll start from scratch.
So I'm just going to grab a file, and we don't want massive files here, so we grab a file and we upload our video.
It's going to take a couple of secs just to upload the video.
And we want to create it as a video to GIF. Okay. We can see now that our video's uploaded. So what we want to do now is set a time scale where we want the video to start, our animated video to start. I'm going to put it on at, say, five seconds to 12 seconds. We only want a short video for the animated GIF.
The Animated GIF Loops Continuously
So what I would suggest is have something which has got a lot of movement on it so it attracts people's eye to watch it. So we're going to now leave all these settings here. I've just selected these here. You can play around with it and try it a couple of times. But if you've got something where there's a lot of movement, then try and pick those times to use as your animated gifs.
Animated GIFS Attract Attention
So we're going to convert it now. Takes just a couple of seconds for it to convert to a GIF. You can see now that looks quite cool. And we're going to just go to save that. I'm going to open it. And I'll just leave that there a second. So we're going to go into Infusionsoft now. I'm going to create an email, just going to drag an email out.
Doesn't really matter what email it is. I'm going to use this one. And all we want to do is grab an image block out.
Let's put it just above the button. There we go.
EZGif.com Is A Really Cool FREE Tool
We're going to browse now for our emoji, and we're going to upload that. So I'm just going to rename that in this because I've got a few of them of the same name, so it's emoji two.
So I'm going to upload that now, and we can see that's worked great. You can resize it on the right here if you want to make it just a bit bigger.
Let's just send ourselves a test now to see how that looks in the email.
So I'm just going to send that.
And here we go. This is our email. And we can see that's worked perfectly now.
Don't Forget To Test It!!
So basically all you need to do is have your video ready, upload it to the EZgif.com.
Select the time you want, create the animated GIF.
Then go into your Infusionsoft email and drag an image block across, and then drop the GIF, the animated GIF you created into the Infusionsoft email builder, and you are done and set to go.
I hope you enjoyed that video and found it useful?
One thing I'd also suggest trying with these is to try putting emojis in your email subject line as well.
We found great open rates, improvements in open rates by using them. So hope you enjoyed the video. Any questions, comments, please let us know.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474688.78/warc/CC-MAIN-20240227220707-20240228010707-00074.warc.gz
|
CC-MAIN-2024-10
| 3,282
| 27
|
https://www.moderne.io/blog/continuous-software-modernization-with-moderne
|
code
|
Application development practices have changed with the adoption of software supply chains. Modern apps are assembled from open source software (OSS) and third-party dependencies. Dependencies are changing frequently and evolve at their own pace. This also provides a larger attack surface for bad actors to exploit, demonstrated by continued growth of common vulnerabilities and exposures (CVEs)—surpassing 25,000 in 2022.
The result: Every organization has a living codebase, constantly evolving and growing in complexity—and much of it outside their control. It’s like shifting sands where every grain is a dependency; your footing uncertain. Not upgrading and remediating your modern apps regularly, including all the dependencies, can lead to critical security, compliance, and performance issues. Attempting to manage a living codebase manually is error prone and untenable. It’s common for costly and code-breaking refactoring and migration efforts to be back-logged in favor of app improvements and new features.
If you could accurately visualize and analyze your entire codebase—this complex, interdependent software supply chain—then automate the work of software modernization, you would have a new superpower in your organization. You could regularly make safe, sweeping changes that substantially improve quality, security, and cost of code. Your developers could stay on top of technical debt and be more productive in delivering business value. That’s what continuous software modernization is all about.
Use cases for continuous software modernization
While developers are both writing their own code and assembling applications from various third-party sources, a significant part of their workday goes to updating and fixing existing software—which often crosses repository boundaries. This work is time consuming and tedious with many hands making the same changes in multiple locations. It’s also the critical, necessary work that keeps a codebase inherently secure and aligned within an organization. It’s work that’s ripe for automation.
The use cases for continuous software modernization range from those highly repeatable, frequent transformations to larger transformation projects. Automation is critical for these use cases:
- Code quality updates—cutting through the noise of scanning tools to stay continuously compliant and consistent with team and framework best practices (and alleviate the code smells)
- Software bill of material (SBOM) tracking—automating the creation of SBOM documentation, including all dependencies and metadata (great for producing a CycloneDX BOM)
- CVE remediation—automating the search and fixes of CVEs across your codebase for quick resolution
- Dependency management (aka migration engineering)—automating the move from one software and framework version to another (including all cascading dependencies) across repositories to keep up with the constant version churn in third-party repositories
To be clear, a key precept of a continuous software modernization practice is the automation of code searches and updates, eliminating or significantly reducing developer disruption. All of these use cases are possible with Moderne.
Moderne pioneering continuous software modernization
Moderne changes the way you integrate software upkeep into your developer workflow—providing fast, accurate, and automated code searches and updates. (Yes, we fix the source code.) The Moderne platform sits alongside the software development lifecycle and replaces manual, tedious work without disturbing your existing DevOps system. There’s no need to alter your continuous integration, artifact publishing, or deployment activities.
The Moderne platform operates seamlessly with OpenRewrite—an open source project that provides expert code transformation recipes. With the Moderne platform, you can run recipes across any number of repositories to accurately find and fix issues. You’ll see the estimated time savings to fix the issue across the run, enabling you to prioritize recipes that have the greatest return on investment (ROI) for your organizations. The Moderne platform will correct or update the code, writing it back out to source code retaining your conventions.
Development teams can examine diffs and issue commits or pull requests (PRs) that can be reviewed and put through the usual CI/CD pipeline. You decide when the change goes to production. And if you delay a release, that’s okay because the automation can be rerun anytime, keeping the migration mergeable and fitting into the natural rhythm of the team’s work.
Teams can better understand the impact of software migrations and fixes at a large scale, and simultaneously implement fixes en masse. In addition, they can better coordinate changes across repository boundaries—particularly helpful when your producers and consumers of the change are in different organizations.
You’ll see your stories for technical debt increase, but since these are being managed through automated fixes, you’ll also see a corresponding increase in value stories from more productive (and likely happier) developers.
Continuous software modernization vs. code scan and search tools
To keep CVEs at bay and reduce code smells, you’re probably doing a regular cadence of code scanning (including SAST and SCA tools). One recent study tells us that 90% of apps are scanned more than once a week, and there’s been a 31% increase in the use of scanning tools since 2018. With these scanning tools, developers can see issues and, when possible, fix them earlier in the software lifecycle.
The problem with these tools is that they report a lot of data—thousands of lines of technical debt—including false positives. Additionally, while the tools offer instructions for making source code changes, they don’t do the work for developers. Development teams can drown in the scanning and alert noise. Eventually the volume of code and pace of change overwhelm teams, stifling an organization's ability to innovate.
Let’s take a closer look at these commonplace scanning tools. Most of them operate using a full-text search, the simplest form of search that can be ambiguous and inaccurate. And some of them may produce and operate on an Abstract Syntax Tree (AST). As the name suggests it’s an abstraction of code and lacks formatting, semantic awareness, and resolution of dependencies. For example, when identifying an issue such as Log4Shell or applying logging best practices, a scanning tool will be looking for patterns like Logger. But the AST doesn’t have enough metadata to be able to identify this Logger coming from Log4J or other popular logging libraries. So it will overreport and have false positives identifying other Logger types. This is extra work for developers to examine.
Continuous software modernization with Moderne offers source code search and transformation that is based on compiler-generated data that is a technology leap from the AST. We call this the Lossless Semantic Tree (LST). This sophisticated code representation contains rich semantic information of your codebase—which is 100% accurate for matching patterns. It greatly reduces the search volume and preserves code format for accurate auto-fix.
Key characteristics of the LST include:
- Fully type attributed—retains more detail about each element (including classes that are typically behind the scenes of developer purview with a text-based search), which enables accurate pattern matching and reduces search volume to exactly what you’re looking for.
- Format-preserving—enables the LST to be printed back to source code while retaining your conventions. Code changes look idiomatically consistent in the context of each repository.
- Serializable—enables an LST to be transferable to a data source for later querying and action, which makes refactoring work faster and more scalable.
These capabilities are foundational for scaling code search and transformation with full context on code versions and alignment organization-wide—no need for additional databases or indexing of code.
Continuous software modernization vs. generative AI
One of the more recent questions we hear is what is the difference between continuous software modernization and generative code AI. For this, we consulted an expert:
This was not a bad comparison from ChatGPT. But to summarize, continuous software modernization is authoritative, automated code transformation. Generative code AI is a suggestive authorship tool for code creation. A continuous modernization solution like Moderne is looking at the existing base of source code to automatically discover and fix issues for developers. Code AI tools are supporting individual code development efforts at the IDE.
The Moderne engineering team has found use for code AI to aid in creating code transformation recipes, but it’s an imperfect coding partner. I saw a Tweet that captured the intent of a code AI tool well: “It can be very useful at times, not that much help at times, and sometimes we just ignore it altogether.”
How do you start a practice of continuous software modernization?
We often get asked how to introduce continuous software modernization to an organization, particularly the actual automation of code changes. We suggest that you start with smaller changes to build confidence in the practice among development teams and demonstrate how it can positively impact their day-to-day work. This can include code quality clean-ups or isolated CVE fixes. Once success is shown in these areas, you can build up to minor framework updates or patches, and then to more significant code migration work.
The idea is for all of these types of changes to become a continuous, confident motion for your organization. We see many organizations adopting a weekly cadence of using Moderne to update code dependencies and fix code smells—removing the burden of infrequent, complicated code migrations and keeping the codebase inherently more secure and clean.
Here’s an example flow of updates and migrations (from simple to more complex):
- Improve code quality and readability
- Fix common mistakes
- Eliminate legacy patterns and minor performance issues
Logging best practices
- Improve performance by preferring parameterized logging to string concatenation
- Improve error reporting by using exception specialized logging invocations where applicable
- Upgrade Maven dependencies to keep dependencies patched & up to date
- Exclude test dependencies like JUnit from the compile scope
- Remove redundant explicit dependency versions to clean up Maven poms
- Update Gradle Wrapper to keep Gradle itself up to date
Security enhancements and discovery
- Find secrets like passwords, encryption keys, access tokens
- Use secure random number generation
- Java security best practices
Modernize test frameworks
- Junit 4 to 5 migration
- Mockito 1 to 3 migration
- Migrate JUnit assertions to AssertJ improved readability and consistency over stock JUnit assertions
You can try out these modernization recipes at public.moderne.io on open source codebases. Or contact us to learn more about how you can gain the continuous software modernization superpower for your organization—and start seeing immediate value.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474659.73/warc/CC-MAIN-20240226094435-20240226124435-00686.warc.gz
|
CC-MAIN-2024-10
| 11,327
| 54
|
https://www.quadient.com/resources/2017-gartner-magic-quadrant-data-quality-tools
|
code
|
The data quality tools market continues to innovate, fueled by desire for cost reductions, information governance and digital business. This Magic Quadrant evaluates 16 vendors to help you find the most suitable one for your organization's needs and deliver greater business value.
Quadient has been named a Visionary in the 2017 Gartner Magic Quadrant for Data Quality Tools.
Please complete the form to access a complimentary copy of this report.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946120.31/warc/CC-MAIN-20180423164921-20180423184921-00186.warc.gz
|
CC-MAIN-2018-17
| 964
| 4
|
https://ux.stackexchange.com/questions/50827/usage-of-color-and-other-ui-elements-in-a-diagram-with-two-categorizations
|
code
|
You have a few possible graphical patterns to express that several entities belong together:
(source: Colin Ware, Visual thinking for design)
You have already used color with one meaning. Overloading color with a second meaning would make the cognitive effort for extracting information from your graphic much higher. So I think that the "common color region" solution should not be used in your case.
You are already using "enclosing contour". I like Alexey's suggestion of making this more obvious, by strengthening the contour. I would also add a "proximity grouping" to make it even more clear which entities belong together, which simply means that I'd put more whitespace between provinces.
Another matter you didn't mention in your question: the order of the information. When people look for information, they need some order, or they get lost. Sometimes information has a natural order, and then you should use it. I would strongly recommend structuring your graphic layout in the same way the provinces are geographically structured on a map. This doesn't mean that you have to make your elements the same shape as the provinces, or that you have to exactly follow the distances and sizes of provinces in your layout. But the relative position between province data can be made the same as on a map, helping your users orient themselves without losing the curved aesthetics of the graphic.
Update I just saw the comment about a "spiral" you posted while I was writing the answer. It is an interesting idea, but I personally didn't notice it, and from the other answers, it seems that others didn't notice it either. Maybe you could use more whitespace again, to make the spiral. But it is very unusual for a spiral to have its largest elements in the middle; practically all natural spirals have the smallest elements in the middle (take a look at a nautilus shell, or at the spiral of square roots). So I think it will be hard to make this well visible, unless you make the elements much smaller, so the geometric information becomes much more salient than the colors and the shape of each individual feature. But in this case you would be deemphasizing the information on the detail level, which is probably not what you wanted to achieve.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571959.66/warc/CC-MAIN-20220813142020-20220813172020-00455.warc.gz
|
CC-MAIN-2022-33
| 2,251
| 6
|
https://aitopics.org/doc/news:576B0A4C/
|
code
|
Welcome to Data Driven, the podcast where we explore the emerging field of Data Science. We bring the best minds in Data, Software Engineering, Machine Learning, and Artificial Intelligence right to you. In a world where Data is the new Oil, Data Science the new Refineries, consider this Car Talk for the Data Age*. Every week we bring the best minds in this emerging field straight to you. Our goal is to educate and inspire our listeners so that they can be prepared to thrive in a Data Driven world.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027319082.81/warc/CC-MAIN-20190823214536-20190824000536-00286.warc.gz
|
CC-MAIN-2019-35
| 503
| 1
|
https://community.appinventor.mit.edu/t/how-can-i-create-a-people-delivery-program/23050/3
|
code
|
How can I create a people delivery program?
With planning, logic, coding, and some love.
Whether you are able to do develop an app as you described depends on what you mean by 'people delivery', your programming experience and how you expect the app to work. Is this an app like Uber (that helps 'deliver' people) or Uber Eats (that delivers groceries or fast food)?
You need a database perhaps this will help , it is a question about how to store data for a delivery service How much data can a cloud db store?
You need to track your deliveries? This is a tutorial showing one way to use a cloubdb to track the whereabouts of people (or delivery people) Social Distancing ... a CloudDB / Location Marker Tutorial The example could be adapted to your needs.
other stuff that might be useful to know
What have you tried?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00632.warc.gz
|
CC-MAIN-2022-40
| 819
| 7
|
https://forum.deadbydaylight.com/en/discussion/comment/704045
|
code
|
Would a 2 trap Trapper be too OP and break the game? If not, why isn't that base? It would help him out so much and seems like an easy change.
I think Trapper should be 2 trap default. The add-on should allow a third trap.
He should get all his traps. I’ve said this for a long time.
But why isn't it base after 3 years? What's the reason?
All traps Trapper at the start of the match wouldn't be too strong, it would actually be what he needs the most.
Honestly I'd be happy if he could at least take his traps from lockers like the huntress hatchets. I don't know what it's like for pc, but sometimes the controls for picking up traps from the ground on console can be really iffy and you end up wasting precious seconds trying to pick the bloody things up.
Cause there are no game balance improvements, which just happen if its really bad for the game health like too OP or broken.
Trapper should have 2 traps, all traps opened, a decreased take-time and resetting-time by default. That wouldnt OP him, but would make him way smoother to play.
Also i would give him an additional kind of trap through addons.
Oh god no! :D He needs a buff, but not that rediculous.
+1 Trap to start with and +1 Trap he can carry as baseline, and he should be fine.
It would be totally fine. It would give more room for planning and it would remove the possibility to know it right away who the Killer is, when someone is spawning near a Trap.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348523564.99/warc/CC-MAIN-20200607044626-20200607074626-00025.warc.gz
|
CC-MAIN-2020-24
| 1,429
| 12
|
http://www.masshist.org/publications/apde2/view?id=DQA02d624
|
code
|
I thought I was too unwell to pass two hours in a cold meeting house this forenoon,
and staid at home. In the afternoon I ventured out, and went with Townsend to Dr.
Tucker's meetinghouse; but finding there was no service there, we went to church.
is not much of an orator, and was rather negligent in treating common place topics,
in common place language. Drank tea at Mrs. Hooper's,2
and pass'd the evening at Mr. J. Tracy's. Captn. Fletcher was there. Tracy was quite
warm upon the subject of the late election. He is a militia officer, and possessed
very strongly of the esprit de corps. He was offended that Genl. Titcomb, should come
in the last of the four members for this town, and in the course of conversation went
rather beyond the bounds of prudence.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869732.36/warc/CC-MAIN-20180527170428-20180527190428-00456.warc.gz
|
CC-MAIN-2018-22
| 764
| 10
|
https://discourse.mcneel.com/t/bug-unknown-command-isolate-when-selection-filter-is-on/92134
|
code
|
Steps to reproduce:
- Create a curve and select it.
- Filter for “control points” only.
- Select a few control points of the curve (note how the entire curve is still highlighted too).
- Project onto a surface without changing the selection (note how the entire curve is projected).
What happens now if you leave the filter on is that error message.
However, if you are careful to turn the filter off before step 5, you still don’t get anything isolated, yet it appears as if both the projection and the original curves are selected (and the gumball is placed in between both the original curve and the projected result).
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890092.28/warc/CC-MAIN-20200706011013-20200706041013-00517.warc.gz
|
CC-MAIN-2020-29
| 627
| 7
|
https://www.okclips.net/video/ujCjF_KMM7A/ps5-vs-xbox-series-x.html
|
code
|
PS5 VS XBOX SERIES X: How Will They Be Different?
- Published on: Wednesday, January 22, 2020
- As the next generation encroaches, more and more information about the PlayStation 5 and next Xbox comes out. Now that we have some concrete info, how will these two devices stand out from one another? Let's talk.
Subscribe for more: http://youtube.com/gameranxtv
- Source: https://youtu.be/ujCjF_KMM7A
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00415.warc.gz
|
CC-MAIN-2020-16
| 398
| 5
|
https://svitlanas.com/2011/05/15/pink-flower/
|
code
|
Whut’s up guys!
Here is an illusration I came up with at friend’s house. Before that, I spent 2 hours in the book store looking through various design books. I don’t read them, I look at them because all I need is the ideas. Little bit from here, little bit from there, and then I have this composition. :]
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612013.52/warc/CC-MAIN-20170529034049-20170529054049-00352.warc.gz
|
CC-MAIN-2017-22
| 312
| 2
|
https://www.burksbrand.com/projects/2017/01/10/So-many-projects-so-little-time.html
|
code
|
So many projects so little time
2017-01-10 05:26:00 +0000 - Written by Carl Burks
- Arduino Display project
- Teenage Engineering Synths song programming
- Raspberry PI cluster
- Splitting the Paper Picker into sub repos
Lots to do. I had to work late today so I didn't get started writing a blog today until late. So there is that... I'm going to stop worrying about the number of things to do and just pick what is fun to work on. Tonight that is going to be the Arduino project.
Working on the PBM format to make it work for the Arduino display.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195523840.34/warc/CC-MAIN-20190715175205-20190715200237-00045.warc.gz
|
CC-MAIN-2019-30
| 548
| 8
|
http://kinglab.uga.edu/publications/
|
code
|
Unks, R., E. G. King, L. A. German, N. P. Wachira and D. R. Nelson 2019. Unevenness in scale mismatches: institutional change, pastoralist livelihoods, and herding ecology in Laikipia, Kenya. Geoforum 99: 74-87. https://doi.org/10.1016/j.geoforum.2018.12.010
Unks, R. R., E. G. King, D. R. Nelson, N. P. Wachira and L. A. German 2019. Constraints, multiple stressors, and stratified adaptation: Pastoralist livelihood vulnerability in a semi-arid wildlife conservation context in Central Kenya. Global Environmental Change 54: 124-134. https://doi.org/10.1016/j.gloenvcha.2018.11.013
Volpato, G. and E. G. King. 2018. From cattle to camels: trajectories of livelihood adaptation and social-ecological resilience in a Kenyan pastoralist community. Regional Environmental Change. https://doi.org/10.1007/s10113-018-1438-z (pdf)
Macdonald, E. and E. G. King. 2018.Novel ecosystems: A bridging concept for the consilience of cultural landscape conservation and ecological restoration. Landscape and Urban Planning 177:148-159. https://authors.elsevier.com/c/1X3vYcUG5AnIN
King, E. G., R. R. Unks, and L. German. 2018. Constraints and capacities for novel livelihood adaptation: lessons from agricultural adoption in an African dryland pastoralist system. Regional Environmental Change 18:1403–1410. DOI: 10.1007/s10113-017-1270-x (pdf)
German, L., E. King, R. Unks, and N. P. Wachira. 2017. This side of subdivision: Individualization and collectivization dynamics in a pastoralist group ranch held under collective title. Journal of Arid Environments 144:139-155. (pdf)
German, L. A., R. Unks, and E. King. 2017. Green appropriations through shifting contours of authority and property on a pastoralist commons. Journal of Peasant Studies 44:631-657. (pdf)
King, E.G. and T.E. Franz. 2016. Combining ecohydrologic and agent-based modeling to simulate hillslope-scale vegetation dynamics in a semi-arid rangeland. Ecological Modelling 329:41-63. (pdf)
De Jesus Crespo, Rebeca, D. Newsom, E. King, and C. Pringle. 2016. Shade tree cover criteria for non-point source pollution control in the Rainforest Alliance coffee certification program: a snapshot assessment of Costa Rica’s Tarrazú coffee region. Ecological Indicators 66:47-54. (pdf)
King, E.G., J. Cavender-Bares, P. Balvanera, T. Mwampamba, and S. Polasky. 2015. Tradeoffs in ecosystem services and varying stakeholder preferences: Evaluating conflicts, obstacles, and opportunities. Ecology and Society: Special Feature – Ecosystem service trade-offs across global contexts and scales. 20(3): 25. (link)
Cavender-Bares, J., P. Balvanera, E. King, and S. Polasky. 2015. Ecosystem service tradeoffs across global contexts and scales. Ecology and Society. [Special Feature – Ecosystem service trade-offs across global contexts and scales] 20(1): 22. (link)
Cavender-Bares, J., S. Polasky E. King, and P. Balvanera. 2015. A sustainability framework for assessing trade-offs in ecosystem services. Ecology and Society. [Special Feature – Ecosystem service trade-offs across global contexts and scales] 20(1): 17. (link)
Kaye-Zwiebel, E. and E.G. King. 2014, Kenyan pastoralist societies in transition: varying perceptions of the value of ecosystem services. Ecology and Society 19(3):17. (link)
Good, S.P., K. Soderberg, K. Guan, E.G. King, T. Scanlon, and K.K. Caylor. 2014. d2H Isotopic flux partitioning of evapotranspiration over a grass field following a water pulse and subsequent dry down. Water Resources Research 50(2):1410-1432. (pdf)
Cavender-Bares, J., J.G. Heffernan, E.G. King, S. Polasky, P. Balvanera, W.C. Clark, K.N. Lee. 2013. Sustainability and Biodiversity. In: S.A. Levin, ed. Encyclopedia of Biodiversity, 2nd Edition. Academic Press, Waltham, MA. Volume 7, pp. 71-84.
Franz, T. E., Zreda M., King, E.G. 2013. Application of Cosmic-ray Neutron Probes to Long-term Monitoring of Soil Moisture in African Drylands. Joint IAEA and FAO Programme Conference Proceedings, 23-27 July 2012, Vienna, Austria. IAEA-CN-191.
King, E.G., O’Donnell, F., and Caylor, K.K. 2012. Reframing hydrology education to solve coupled human and environmental problems. Hydrology and Earth Systems Sciences. 16: 4023-4031. doi:10.5194/hess-16-4023-2012. (pdf)
Wang, L., P. D’Odorico, J.P. Evans, D. Eldridge, M.F. McCabe, K.K. Caylor, E.G. King. 2012. Dryland ecohydrology and climate change: critical issues and technical advances. Hydrology and Earth System Sciences 16: 2585-2603, doi:10.5194/hess-16-2585-2012. (pdf)
Soderberg, K., S.P. Good, M. O’Connor, E.G. King, K.K. Caylor. 2012. Evapotranspiration partitioning in a semi-arid African savanna using stable isotopes of water. Geophysical Research Abstracts (EGU General Assembly, 22-27 April, 2012, Vienna, Austria)14: EGU2012-12496.
King, E.G., T.E. Franz, and K.K. Caylor. 2012. Ecohydrological interactions in a degraded two-phase mosaic dryland: implications for regime shifts, resilience, and restoration. Ecohydrology 5(6): 733-745. DOI: 10.1002/eco.260 (pdf)
Franz, T.E., K.K. Caylor, E.G. King, J.M. Nordbotten, M.A. Celia, and I. Rodriguez-Iturbe. 2012. An ecohydrological approach to predicting hillslope scale vegetation patterns in dryland ecosystems. Water Resources Research 48, W01515, doi:10.1029/2011WR010524.(pdf)
Franz, T.E., E.G. King, K.K. Caylor, and D.A. Robinson. 2011. Coupling vegetation organization patterns to soil resource heterogeneity in a central Kenyan dryland using geophysical imagery. Water Resources Research, 47:W07531, DOI:10.1029/2010WR010127. (pdf)
King, E.G. and K.K. Caylor. 2011. Ecohydrology in practice: strengths, conveniences, and opportunities. Ecohydrology 4: 608–612. (pdf)
King, E.G. and T.E. Franz. 2011 Spread of succulent patches in degraded Kenyan drylands: ecohydrological dynamics Proceedings of the IXth International Rangelands Congress, 6th -11th April 2011, Rosario, Argentina.
King, E.G. and K.K. Caylor. 2010. Herbivores and mutualistic ants interact to modify tree photosynthesis. New Phytologist 187(1): 17-21. (pdf)
King, E.G. and S.G. Whisenant. 2009. Thresholds in ecological and linked socio-ecological systems: application to restoration. In: K. Suding and R.J. Hobbs, eds. New Models for Ecosystem Dynamics and Restoration. Washington DC, Island Press.
King, E.G. 2008. The dynamics of Sansevieria intermedia in degraded Kenyan drylands: regime shift or resilience mechanism? Proceedings of the VIIIth International Rangelands Congress, 29 June – 5 July 2008, Hohhot, China.
King, E.G. and M.L. Stanton. 2008. Facilitative effects of Aloe shrubs on grass establishment, growth, and reproduction in degraded Kenyan rangelands: implications for restoration. Restoration Ecology 16(3): 464-474. (pdf)
King, E.G. 2008. Facilitative effects of naturally occurring Aloe secundiflora shrubs degraded semi-arid rangelands in Kenyan. Journal of Arid Environments 72:358-369. (pdf)
King, E.G. and R.J. Hobbs. 2006. Identifying linkages among conceptual models of ecosystem degradation and restoration: towards an integrative framework. Restoration Ecology 14(3): 369-378. (pdf)
King, E.G. 2003. Planted aloes may help heal overgrazed rangelands and local economy in Kenya. Ecological Restoration 21(1): 52-53.
King, E.G. 2003. Aloe secundiflora shrubs as facilitators in Kenyan rangelands, and their potential use in restoration. Proceedings of the VIIth International Rangelands Congress, 26 July – 1 August 2003, Durban, South Africa. pp. 1210-1212.
Kaplan, R.H. and E.G. King. 1997. Egg size is a developmentally plastic trait: Evidence from long term studies in the frog Bombina orientalis. Herpetologica 53(2): 149-165.
King, E.G. and R.H. Kaplan. 1997. Estimating ovum size in amphibians: egg size increases differentially among species during early development. Journal of Herpetology 31(2): 299-302.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363689.56/warc/CC-MAIN-20211209061259-20211209091259-00487.warc.gz
|
CC-MAIN-2021-49
| 7,799
| 34
|
http://projectseminars.net/t-digital-signature-guidelines
|
code
|
In todayâ„¢s commercial environment, establishing a framework for the authentication of computer-based information requires a familiarity with concepts and professional skills from both the legal and computer security fields. Combining these two disciplines is not an easy task. Concepts from the information security field often correspond only loosely to concepts from the legal field, even in situations where the terminology is similar. For example, from the information security point of view, digital signature means the result of applying to specific information certain specific technical processes described below. The historical legal concept of signature is broader. It recognizes any mark made with the intention of authenticating the marked document. In a digital setting, todayâ„¢s broad legal concept of signature may well include markings as diverse as digitized images of paper signatures, typed notations such as /a/Abb SSh, or even addressing notations, such as electronic mail origination headers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721355.10/warc/CC-MAIN-20161020183841-00238-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,025
| 1
|
http://www.partitionmagicserver.com/more-articles/convert-partition-to-logical.html
|
code
|
“There are four primary partitions (system reserved, C, D, E) and some unallocated space in my Windows 10 laptop. Now I need to create two new partitions to store my different types of data. Someone advices me to convert partition to logical to achieve this aim. But how can I do it without losing data?”
As you know, primary partition and logical partition are two different partition types. To install operation system, there must be a primary partition at least. The logical partition is a part of extended partition, in other words, a extended partition can contain many logical partitions.
As to a MBR disk, there are at most four primary partitions, or three primary partitions plus one extended partition which includes many logical partitions. If there are already four primary partitions on your MBR disk, and you want to create more partitions to store data by category, you need to change one primary partition to logical and then release some unallocated space to create a new partition. As the above situation mentioned, is there any way to do this task without data loss? Of course, a very professional partition management software is your choice. Please read on.
Convert to Logical Partition with Disk Management
Before introducing a safe way, there is an unreliable way you need to know. You may say Windows built-in Disk Management can be used to create a logical partition. In fact, if there are four primary partitions on a MBR disk, you can use Disk Management “Delete Volume” feature to delete a primary partition and then create a new simple volume.
After creating a new volume, this volume will become a logical partition automatically. Then you can shrink this logical volume to get some free space and create a new partition. But this way makes your data loss, and you must backup data previously.
Set Partition as Logical with MiniTool Partition Wizard
If you use Disk Management, it is reliable and the partition data is lost. To make up for the deficiency of this tool, here recommend MiniTool Partition Wizard Free Edition to you. As a reliable and professional partition and disk software, it can be used to manage partition and disk, also it supports conversion between primary partition and logical partition. Here are some steps to guide you to change primary partition to logical.
Step 1: Download this freeware and launch to its main interface.
Step 2: Firstly you need to choose a partition you want to convert to logical, then right click it to select “Set Partition as Logical” feature.
Step 3: Then you can preview your primary partition will become a logical partition. Click “Apply” to finish this operation. Only by three steps, you can easily set partition to logical.
With the assistance of MiniTool Partition Wizard Free Edition, you can convert partition to logical quickly without data loss. After changing to logical partition, you can resize this logical partition by “Move/Resize Partition” feature to release some unallocated space to create a new partition.
Note: If you convert your system partition to logical, this operation may cause system to be unbootable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886397.2/warc/CC-MAIN-20180116090056-20180116110056-00189.warc.gz
|
CC-MAIN-2018-05
| 3,135
| 13
|
https://serverfault.com/questions/537133/best-practice-for-decommissioning-a-domain-controller-that-is-also-a-dns-server
|
code
|
I'm hesitant to answer because I think this is more of a "discussion" question than a strictly Q&A question... but it's a lazy Saturday morning so I will anyway.
Is there a clear cut best practice here?
No. (Damn, maybe this was an easy answer all...)
Microsoft provides very generic, easily
Googleable Bingable guidance on how to demote domain controllers, and perform migrations of AD and DNS, but I won't bother linking to them nor will I pretend that they address your specific question, because Microsoft obviously can't document every specific case for every different organization's environment.
So systems admins/engineers like us are left to fill in the gaps with our own expertise and experience where Microsoft hasn't written a special script just for us, and that's what makes us valuable.
I can give you an example of something that we've done to address this same issue, since I also work in globe-spanning environments with dozens or more domain controllers, disparate AD forests cohabitating on the same networks, non-Windows devices also consuming DNS services from the same DCs, etc.. Moving into new datacenters and moving out of old ones, needing to migrate to new hardware or new OS versions, and plain old business politics are all possible reasons we'd need to decommission domain controllers that were potentially still being used. And when you have multiple heterogeneous organizations currently using those DC/DNS servers, it's usually a grueling, drawn-out process of reconfiguring every client (many of which may not be under your control) before decommissioning the domain controller, involving project managers, tickets to various other teams that may take days or weeks to get worked, etc..
So that's why I say I don't think anyone can give you the answer to this question. There are a thousand ways you could go about it and some will be better than others depending on your organization's structure and needs.
Something we've done to get in front of this issue is make a VIP for each datacenter, and pool all the domain controllers in that datacenter behind that VIP. (This VIP is for DNS service only for obvious reasons, I'm not talking about load balancing Kerberos and LDAP.) That way, clients can be configured to use that VIP for their DNS resolver, and we are free to add and take away domain controllers behind that VIP whenever and however we please.
But you're not in front of the problem... so given the options you provided:
Add the IP address of the outgoing DC to a new DC and ensure that DNS is listening on that address.
Demote the old DC, leave the DNS role on it, and configure a global DNS forwarder to your new server.
I would choose option #1, because your goal is to decommission the old server as quickly as possible, and option #2 does not help you get rid of the old server. With option #2 the server's existence is still necessary. Nor would I go with Mathias R. Jessen's suggestion of stub zones, because again, you still have to leave the old server in place and in service, which is not conducive to your end goal.
With option #1, ugly as it may be, you can retire the old server, claim cost savings for your company, avoid having to pay another month's rent on that datacenter, and be given an award for being such a good employee.
Edit: Thinking about our chat a little more, I think I may have projected my own requirements onto you, because I do have pull-the-plug-ASAP requirements on some stuff right now, so that was fresh on my mind. It sounds like you do not have as much of an immediate requirement to shut the server off ASAP.
That said, I'm not changing my suggestion, as I would still prefer it. Tacking the extra IP onto an existing domain controller has worked well for me in the past in very similar scenarios, and I would rather that than have a weird vestigial appendage of a server sitting there for an indeterminate amount of time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419056.73/warc/CC-MAIN-20200601145025-20200601175025-00556.warc.gz
|
CC-MAIN-2020-24
| 3,913
| 16
|
http://mttags.com/install-error/install-error-relink.php
|
code
|
As USER/satimis Remark: as root on another posting followed bash-3.00$ cd /sources/tiff-3.7.3/libtiff/ bash-3.00$ make Code: make all-am make: Entering directory `/sources/tiff-3.7.3/libtiff' make: Leaving directory `/sources/tiff-3.7.3/libtiff' bash-3.00$ /bin/sh -x ../libtool --tag=CXX --mode=relink make: Leaving directory `/sources/tiff-3.7.3/test' Making all in man make: Entering directory `/sources/tiff-3.7.3/man' make: Nothing to be done for `all'. Post Reply Print view Search Advanced search 6 posts • Page 1 of 1 rjteeter make install errors Quote Postby rjteeter » 2008-02-01T17:01:37-07:00 I did a make install and I get Reply With Quote Page 1 of 3 123 Last Jump to page: Quick Navigation Technical Top Site Areas Settings Private Messages Subscriptions Who's Online Search Forums Forums Home Forums Community Help: weblink
libtool: warning: relinking 'libfollybenchmark.la' libtool: install: (cd /tmp/fblualib-build.KgrUvE/folly/folly; /bin/bash "/tmp/fblualib-build.KgrUvE/folly/folly/libtool" --tag CXX --mode=relink g++ -std=gnu++0x -g -O2 -lboost_context -lboost_thread -lboost_filesystem -lboost_system -lboost_regex -lpthread -version-info 35:0:0 -o libfollybenchmark.la -rpath /usr/local/lib Benchmark.lo libfolly.la I'll go through your first post (the one as a normal user) here. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited. ------------------------------------------------------------------------------ This What is the meaning of this sentence and why did the Giant rip open his belly? "I am finished" vs "I have finished" Farming after the apocalypse: chickens or giant cockroaches?
The use of each key in Western music Is it illegal for regular US citizens to possess or read the Podesta emails published by WikiLeaks? Already have an account? There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. $ g++ --version g++ (Ubuntu/Linaro 4.6.3-1ubuntu5) 4.6.3 Copyright (C) 2011 Free Software Foundation, Inc. Also, try this: g++ -v -Wl,-v -shared -nostdlib /usr/lib/gcc/*/*/../../../crti.o /usr/lib/gcc/*/*/crtbeginS.o .libs/tif_stream.o -L/usr/lib -ltiff -ljpeg -lz -L/usr/lib/gcc/*/* -L/usr/lib/gcc/*/*/../../.. -lstdc++ -lm -lc -lgcc_s /usr/lib/gcc/*/*/crtendS.o /usr/lib/gcc/*/*/../../../crtn.o -Wl,-soname -Wl,libtiffxx.so.3 -o .libs/libtiffxx.so.3.7.3 I don't think that'll
I've got an install-time re-linking error happening in two different projects now, and it's confusing me. more stack exchange communities company blog Stack Exchange Inbox Reputation and Badges sign up log in tour help Tour Start here for a quick overview of the site Help Center Detailed Please, don't install ANYTHING else until this gets fixed. myproj_myprog_libmyprog_la_LIBADD = myproj/mylib/libmylib.la sbin_PROGRAMS += myproj/myprog/myprog myproj_myprog_myprog_SOURCES = myproj/myprog/main.cc myproj_myprog_myprog_LDADD = myproj/myprog/libmyprog.la Now my project builds (check and distcheck) on all mentioned platforms.
automake [Top][All Lists] Advanced [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: relinking error From: Monty Taylor Subject: Re: relinking error Date: Fri, 05 Mar 2010 10:01:15 -0800 User-agent: Mozilla/5.0 (X11; test -z "/usr/include" || mkdir -p -- . "/usr/include" /bin/install -c -m 644 'usbpp.h' '/usr/include/usbpp.h' test -z "/usr/include" || mkdir -p -- . "/usr/include" /bin/install -c -m 644 'usb.h' '/usr/include/usb.h' make: Usage questions are like "How do I use ImageMagick to create drop shadows?". http://stackoverflow.com/questions/11787917/libtool-install-error-relink-libmyprog-la-with-the-above-command-before-ins You may have to register before you can post: click the register link above to proceed.
We have to lib_LTLIBRARIES defined, libgenthrift.la and libcassandra.la: lib_LTLIBRARIES+= libcassandra/libcassandra.la lib_LTLIBRARIES+= libgenthrift/libgenthrft.la As a follow up, if I reverse the order of the above declaration to: lib_LTLIBRARIES+= libgenthrift/libgenthrft.la lib_LTLIBRARIES+= libcassandra/libcassandra.la It Try creating a link to the shared library (identified by its .x or .x.y etc. horizontal alignment of equations across multiple lines Word for destroying someone's heart physically Find the value OPTIMIZE FOR UNKNOWN is using Recruiter wants me to take a loss upon hire Find ksarma commented Apr 1, 2016 I'm also having this problem on 14.04; gcc 4.8.4; libtool 2.4.2 libtool: install: (cd /home/ksarma/Downloads/fblualib/folly/folly; /bin/bash /home/ksarma/Downloads/fblualib/folly/folly/libtool --tag CXX --mode=relink g++ -std=gnu++0x -g -O2 -lboost_context -lboost_program_options
It may show up later in yet another package, where it can't be worked around. https://lists.gnu.org/archive/html/automake/2010-03/msg00038.html Reload to refresh your session. After running # mv -recursive /tools /old-tools/ what shall I test thereafter? Not the answer you're looking for?
I am running ubuntu server 11.10 x64 Chris Standring Network Engineer 127 John Clarke Road, First Floor Ocean Technology Plaza Middletown, RI 02842 Tel: 401-239-5212 Cel: 207-939-3593 Toll Free: 888.554.6327 Fax: http://mttags.com/install-error/install-error-pass4sure.php [email protected]:~/tmp/libcassandra$ make install make install-recursive make: Entering directory `/home/posulliv/tmp/libcassandra' make: Entering directory `/home/posulliv/tmp/libcassandra' make: Entering directory `/home/posulliv/tmp/libcassandra' test -z "/usr/local/lib" || /bin/mkdir -p "/usr/local/lib" /bin/bash ./libtool --mode=install /usr/bin/install -c libcassandra/libcassandra.la libgenthrift/libgenthrift.la However I got it installed on chroot without problem (both "configure" and "make install" as root) And please, forget about chrooting from FC3. make: Entering directory `/sources/libusb-0.1.10a' make: Entering directory `/sources/libusb-0.1.10a' test -z "/usr/bin" || mkdir -p -- . "/usr/bin" /bin/install -c 'libusb-config' '/usr/bin/libusb-config' test -z "/usr/lib" || mkdir -p -- . "/usr/lib" /bin/sh
Then as User again bash-3.00$ locate ldconfig Code: /sbin/ldconfig /sources/mozilla/toolkit/content/buildconfig.html /sources/mozilla/toolkit/content/buildconfig.html.in /sources/mozilla/xpfe/global/buildconfig.html /sources/mozilla/xpfe/global/buildconfig.html.in /tools/sbin/ldconfig /usr/share/man/man8/ldconfig.8 Now I found it. Additionally, libcassandra uses libgenthrift: libcassandra_libcassandra_la_DEPENDENCIES= libgenthrift/libgenthrift.la libcassandra_libcassandra_la_LIBADD= libgenthrift/libgenthrift.la All works fine in tree. Orvid closed this Jun 21, 2016 Sign up for free to join this conversation on GitHub. check over here Finding Signs of Life from afar How does a migratory species farm?
Here's the relevant snippet of Makefile.am: # -- myprog -- # lib_LTLIBRARIES += myproj/myprog/libmyprog.la myproj_myprog_libmyprog_la_SOURCES = # ... We recommend upgrading to the latest Safari, Google Chrome, or Firefox. Personal Open source Business Explore Sign up Sign in Pricing Blog Support Search GitHub This repository Watch 740 Star 7,548 Fork 1,798 facebook/folly Code Issues 11 Pull requests 14 Projects
Any ideas how I can get this to work? 14.04 openldap share|improve this question edited Jan 20 '15 at 21:46 muru 69.1k12125176 asked Jan 20 '15 at 21:27 jfha73 13 Reply With Quote 09-12-2005,08:07 PM #12 satimis View Profile View Forum Posts Registered User Join Date Jul 2003 Posts 2,021 Hi bwkaz, cd into .libs and see whether libtiff.so.3.7.3 exists. # What do I need to fix? Suppose having a symbolic link to some where) BR satimis Reply With Quote 09-10-2005,09:30 AM #2 bwkaz View Profile View Forum Posts Visit Homepage Registered User Join Date Apr 2001 Location
Kiel traduki "sign language" respekteme? When we try to run make install, however, it doesn't seem to grok dependency order and tries to install and re-link libcassandra first - but of course libgenthrift.so has not yet make: Leaving directory `/sources/tiff-3.7.3/html' make: Leaving directory `/sources/tiff-3.7.3/html' make: Entering directory `/sources/tiff-3.7.3' make: Nothing to be done for `all-am'. this content make: Leaving directory `/sources/tiff-3.7.3/html' make: Leaving directory `/sources/tiff-3.7.3/html' make: Entering directory `/sources/tiff-3.7.3' make: Nothing to be done for `all-am'.
tbeginS.o .libs/tif_stream.o -L/usr/lib -ltiff -ljpeg -lz -L/usr/lib/gcc/i686-pc-linux-gnu/3.4.3 -L/usr/lib/gcc/i686-pc-linux-gnu/3.4.3/../../.. -lstdc++ -lm -lc -lgcc_s /usr/lib/gcc/i686-pc-linux-gnu/3.4.3/crtendS.o /usr/lib/gcc/i686-pc-linux-gnu/3.4.3/../../../crtn.o -Wl,-soname -Wl,libtiffxx.so.3 -o .libs/libtiffxx.so.3.7.3 collect2: cannot find `ld' libtool: install: error: relink `libtiffxx.la' with the above command I don't think a symlink is the answer, although I don't know for sure what is. Re-run installing "Libtiff-3.7.3" on the same source tree? (not removing the later and re-untar its tarball?) Tks B.R. make: Leaving directory `/sources/tiff-3.7.3/man' Making all in html make: Entering directory `/sources/tiff-3.7.3/html' Making all in images make: Entering directory `/sources/tiff-3.7.3/html/images' make: Nothing to be done for `all'.
Linux PPC Other UNIX-Based Hardware Trading JustLinux Help File Library Audio Hardware Configuration Hardware Installation Networks Programming Software X Window Events JL Talkback JL Ideas Feedback Forum Suggestions Post Your Forum drwxrwxr-x 4 satimis satimis 4096 Sep 11 05:59 .. -rw-rw-r-- 1 satimis satimis 934084 Sep 11 05:59 libtiff.a lrwxrwxrwx 1 satimis satimis 13 Sep 11 05:59 libtiff.la -> ../libtiff.la -rw-rw-r-- 1 first, from the libtiff directory, do another "make". Reply With Quote 09-10-2005,08:20 PM #6 satimis View Profile View Forum Posts Registered User Join Date Jul 2003 Posts 2,021 Hi bwkaz, first, from the libtiff directory, do another "make".
Would it be the cause of making some packages unable to be installed on BLFS 6.1??? (remark: "ldconfig" not run yet) B.R. On 03/21/2012 04:15 PM, Chris Standring wrote: I am trying to get the DAQ modules compiled and installed for snort. I went ahead and installed, but the libgmpxx.la seems not to have been installed. Advanced Search Forum Community Help: Check the Help Files, then come here to ask!
It only searches your $PATH, and /sbin was not in your normal user's $PATH. (Apparently it wasn't in your root user's $PATH, either.) # echo $PATH Code: /usr/gnu/bin:/usr/local/bin:/bin:/usr/bin:. To start viewing messages, select the forum that you want to visit from the selection below. Browse other questions tagged 14.04 openldap or ask your own question.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886639.11/warc/CC-MAIN-20180116184540-20180116204540-00242.warc.gz
|
CC-MAIN-2018-05
| 10,772
| 16
|
https://www.wincustomize.com/article/498716/hard-drive-speeds-over-the-years-2020-edition
|
code
|
Saturday, February 22, 2020 by Frogboy | Discussion: Personal Computing
We’ve had some great discussions on Hard drive speeds over the years.
One of my favorites was the one about whether SSDs was worth it.
I’ve also been benchmarking my PC’s for a very, very long time:
Here is a brief recap:
Most of the CPU speed improvements comes from adding more CPU cores. My 2019 machine has 18 cores, 32 logical threads. My 2008 box was the last machine with only a single core in it. That isn’t to say that the CPU experience isn’t much better these days. I’m just saying that unless your app is using all those cores, you could argue that you could divide these scores by the number of cores to get a better approximation of what a single threaded app would perform like.
Anyway, here are the results from my box today:
Samsung 970 Pro NVME:
Sabrent Rocket NVME 2280:
As a practical matter, they’re both incredibly fast.
In real world practice, an NVME (like these) will have roughly the same load times as a SATA SSD despite scoring a lot lower on the benchmarks.
Feel free to use this thread to post your Hard drive specs and scores to share with others.
Please login to comment and/or vote for this skin.
Welcome Guest! Please take the time to register with us.
There are many great features available to you once you register, including:
- Richer content, access to many features that are disabled for guests like commenting on the forums and downloading skins.
- Access to a great community, with a massive database of many, many areas of interest.
- Access to contests & subscription offers like exclusive emails.
- It's simple, and FREE!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740679.96/warc/CC-MAIN-20200815035250-20200815065250-00574.warc.gz
|
CC-MAIN-2020-34
| 1,652
| 19
|
https://forums.adobe.com/thread/730502
|
code
|
I am not sure what you are asking. Photoshop can not open folders, only image files. Are you saying that when you drop a folder containing images on a droplet the images do not open?
Droplets are a type of stored batch action and as far as I know there is no way to tell from a script inside the droplet if a single file or folder was dropped. The script will only see one file at a time either way.
In addition to app.activeDocument you can refer to the doc opened by a droplet by index. app.documents[app.documents.length-1]; refers to the last opened document, which would be the one opened by the droplet.
so I want a droplet that bascially does this:
1. When you drop a FILE on the droplet, it copies the files to our server
2. When you drop a FOLDER on the droplet, it renames the FILES inside the FOLDER to the name of the FOLDER, then copies the FILES to our server
So basically I want the droplet to detect whether a FILE or FOLDER is being dropped on it, and be able to get the name of the FOLDER also.
Is this possible?
Michael L Hale wrote:
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742906.49/warc/CC-MAIN-20181115182450-20181115204450-00159.warc.gz
|
CC-MAIN-2018-47
| 1,052
| 9
|
http://www.onexeno.com/how-to-add-new-fields-in-web-ui-where-aet-is-not-applicable/
|
code
|
How to add new fields in Web UI where AET is not applicable
We tried to add new fields using AET, but surprisingly 'Create Field' is in disabled mode in AET Configuration.
We are trying to add custom fields to the view GSTEXT/notes. But we could not do that.
what are the other possible ways to add custom fields and the required configuration for that.
Your help and suggestions will be highly appreciated.
Thanks for the response, We want to add two custom fields in Component / View (Gstext / Note).
We are trying with AET tool, But in AET tool configuration window, ''Create Field'' is in not in active mode (disabled mode), we can see it but it is not clickable.
In order to proceed and create new fields it has to be in enabled.
Kindly suggest me how to activate this field. your suggestions will be highly apprecaited.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313428.28/warc/CC-MAIN-20190817143039-20190817165039-00100.warc.gz
|
CC-MAIN-2019-35
| 825
| 9
|
https://www.meetup.com/trizpug/
|
code
|
What we’re about
Python users in the Triangle (Raleigh, Durham, Chapel Hill) North Carolina region meet on the 4th Thursday of each month (except the Novermber and December special meetings) for a featured speaker meeting. We also have three "project nights" per month where you can get help with Python. We welcome you to join us. TriPython (formerly TriZPUG) has been meeting monthly since 2002 and is fun-loving band of Python® zealots trying to learn more. TriPython has a very loose organization, charges no dues, and ranges from newbies to gurus. We are focused on improving the usability of Python products through self-education and outreach. In addition to meeting, we have a Python powered email list (http://mail.python.org/mailman/listinfo/trizpug/), a Planet blog (http://planet.trizpug.org), a Gitter community (https://gitter.im/TriPython/), and a Twitter channel (http://twitter.com/tripython). Meetings are also posted to Meetup.com if we get around to it. However, the TriPython email list (http://mail.python.org/mailman/listinfo/trizpug/) is our main communications and announcement mechanism.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510284.49/warc/CC-MAIN-20230927071345-20230927101345-00519.warc.gz
|
CC-MAIN-2023-40
| 1,116
| 2
|
https://lendl.priv.at/blog/2008/06/
|
code
|
I finally manged to crank out a new release of mod_epp. So, what’s new?
Last November Gavin Brown sent me a bug report regarding the handling of large answers. I provided a quick fix back then but did no official release.
While debugging that issue, I noticed that mod_epp didn’t generate the greeting on newer apaches. Tracing that, I found that the kernel didn’t return from accept on connection open, but on the first data reception. First I suspected the epoll interface, but some more intensive debugging found a more mundane reason: setsockopt is used to set:
Allows a listener to be awakened only when data arrives on the socket. Takes an integer value (seconds), this can bound the maximum number of attempts TCP will make to complete the connection.
Some more googling found the answer: you need to use the
AcceptFilter directive to disable this optimization for the EPP socket.
This is not really documented, thus this bug report.
Assume you have a number of patterns you might want to watch out for in various logfiles. These could be harmless, e.g.
postfix/smtp\[[[:digit:]]+\]: .* status=sent which indicates that a mail was sent by postfix, or could be bad, e.g. indications of hardware troubles, firewall log entries or suspicious entries in proxy logs.
There are a number of tools which can help you do that, e.g. logwatch can produce nice reports for you.
In my case, I was less interested in individual log entries, but in a graphical representation of their frequency. For that, I need something similar to MRTG. Cacti is a decent graphical frontend to the core MRTG engine, rrdtool. It provides various data sources and graphing options all packed up into a neat web interface.
So, what needs to be done to get Cacti to graph match-rates of regexs in logfiles?
Continue reading Watching logfiles with Cacti
Just in case somebody was wondering why my blogging was non-existent recenty:
Born on May 22th, she certainly made my life even more interesting and, in close coordination with Clemens, the two children manage to consume my energy and spare time.
Up to date picture are at my gallery.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250589861.0/warc/CC-MAIN-20200117152059-20200117180059-00255.warc.gz
|
CC-MAIN-2020-05
| 2,117
| 16
|
https://ultracomdigital.com/web-development/
|
code
|
Web development broadly refers to the tasks associated with developing websites for hosting via intranet or internet. The web development process includes web design, web content development, client-side/server-side scripting, and network security configuration, among other tasks.
Web development ranges from creating plain text pages to complex web-based applications, social network applications and electronic business applications.
It is the program that runs on the client machine (browser) and deals with the user interface/display and any other processing that can happen on client machines like reading/writing cookies.
1) Interact with temporary storage
2) Make interactive web pages
3) Interact with local storage
4) Sending request for data to the server
5) Send a request to the server
6) work as an interface between server and user
It is the program that runs on the server dealing with the generation of content of a web page.
1) Querying the database
2) Operations over databases
3) Access/Write a file on the server.
4) Interact with other servers.
5) Structure of web applications.
6) Process user input.
A Web database is a database application designed to be managed and accessed through the Internet. Website operators can manage this collection of data and present analytical results based on the data in the Web database application.
Web databases enable collected data to be organized and cataloged thoroughly within hundreds of parameters.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153814.37/warc/CC-MAIN-20210729011903-20210729041903-00454.warc.gz
|
CC-MAIN-2021-31
| 1,465
| 18
|
https://practicaldev-herokuapp-com.global.ssl.fastly.net/patarapolw/can-office-365-really-do-all-i-wanted-5fdb?comments_sort=oldest
|
code
|
- Offline working
- Font changing
- Programmability, and accuracy
- Backward compatibility
I mean, Windows 10 doesn't make it easy to install a real desktop app, redirecting to the web version; if I don't search hard enough (which is Office 2019, for local version).
Makes me really want to migrate to LibreOffice, where I know what I am doing. (And of course, backward compat is ensured, although not perfect.)
Oldest comments (2)
I use the 2019 version all the time. I bought it some time ago on this site: royalcdkeys.com/products/microsoft... and it still meets my expectations and I have no problems.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00560.warc.gz
|
CC-MAIN-2023-23
| 605
| 8
|
http://netwinder.osuosl.org/users/r/raff/public_html/
|
code
|
Note: I didn't update these sources and the porting notes in a long time ( and I don't know if I will ever have the time to do it ): But in the mean time my changes have been added to the standard Kaffe distribution, so the latest sources from http://www.transvirtual.com/ should build and run fine on NetWinder (just run configure).
Note: I wrote the system-dependent code for Kaffe JIT. It needs to be debugged, but I'm currently stuck since the code for flushing the instruction cache does not work, and I cannot debug the generated code. But feel free to examine and play with the code available as armjit.tar.gz
configure arm-linux \ --with-aDict=../dict/cmudict.0.4 \ --with-bDict=../dict/beep-1.0 \ --with-gdbm=../gdbm-1.7.3/
make realclean xmkmf make World
CFLAGS="-fsigned-char -fno-exceptions -fno-rtti" \ CXXFLAGS="-fsigned-char -fno-exceptions -fno-rtti" \ sh configure arm-linuxThis is a simple game to tests the package: dumb-game-0.13.0-nw.tar.gz (300KB) A Doom WAD file can be downloaded from ID Software's FTP site
Note: All the patches but libgtop have been integrated in the official source tree. They are available since 1/2/99.
Note: The current C compilers (both gcc-2.8.1 and egcs-1.1.1) have a bug that makes glib/testglib.c and glib/gthread/testgthread.c fail to compile. As a temporary bypass run the compilation command for that file without the -O2 option.
I also have available a few scripts to make life easier when configuring, building or running GNOME executables (installed in /usr/local/gnome/ - I didn't wanted to add the GNOME stuff to the standard PATH and such, so I use these script to temporary set them while running GNOME applications) :
KDE requires the Qt libraries to be installed.
Since the last version I tried ( 1.33 ) there has been some cleanup in the configuration and now it seems to be more "difficult" to hack the build flags.
So, this time I took a different approach: I created a new configuration file ( qt/configs/netwinder-g++-shared ) as a copy of qt/configs/linux-g++-shared, and I added the needed flags to the compiler definition:
$ diff netwinder-g++-shared linux-g++-shared 4,6d3 < # NetWinder-specific flags < SYSCONF_CC += -fsigned-char -fno-exceptions -fno-rtti -fomit-frame-pointer <Then I simply configured the package by running:
./configure arm-linuxLessTif is needed for Mozilla (as replacemnt of Motif). The test programs work fine.
The latest sources (October, 10 1998) contains all
the changes to correctly build on a NetWinder (but one: the
initialization of a FILE pointer with stdout - substitute
it with FILE * xxx = NULL;)
If your version of the sources still does not contain them, use my patches above.
With the supplied changes the official sources builds
with no problems (if you have enough patience :) and
you can get an almost working, almost full featured
The package requires LessTif (as replacement for Motif) in order to build.
In order to properly work it requires a "patched" libstdc++.so to fix the incompatibilities with glibc.so.
export MOZILLA_CLIENT=1 MOZ_MEDIUM=1 NO_SECURITY=1 NO_UPDATE=1If you don't do it, Mozilla does not compile. If your compilation breaks and you find that's the problem, I'm sorry but you have to scratch the current build and start it again. Just restarting the make after setting these variable creates an executable that does not work (been there, done that - more than once ):
moz-export right now does NOT work: it crashes while starting, and I still don't know why ( gdb crashes after loading a tons of shared libraries ):
mozilla-export should work. You can make a more maneagable version by running 'strip' on it (it gets down to around 7MB).
#!/bin/sh cflags="-fsigned-char -fno-rtti -fno-exceptions -fomit-frame-pointer" CFLAGS=$cflags CXXFLAGS=$cflags sh configure --host=arm-linuxAfter building and installing the package, create a link for the default port to use:
ln -s /dev/ttyS0 /dev/pilotAnd make sure you have the correct access rights (i.e. 666)
|July, 21 1998
|January, 1 1999
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474412.46/warc/CC-MAIN-20240223121413-20240223151413-00741.warc.gz
|
CC-MAIN-2024-10
| 4,021
| 30
|
https://community.splunk.com/t5/Alerting/I-need-to-create-an-alert-for-users-logging-in-through-SSH/td-p/296238
|
code
|
I need to create an alert for people logging in through SSH.
I have a search created that I'd like to compare against a pre-defined list and have Splunk handle the alert. I have a couple of questions, where do I define the list? I'd like it to be outside the alert so I can change it as necessary. Would I use the eval command to compare the return from my search against the list?
I believe you'll have to maintain the list as lookup table files. (knowledge object saved separately, a csv file with a column header). Then refer the lookup table file content to inputlookup command. Please provide more information (current search, full requirement on when to alert on) for better suggestions.
There are a number of ways.
The efficiency of a particular solution will depend on how many people are in that list, and whether the user name that you want to search on has been predefined in that kind of event.
For the moment, let's assume that you have a csv file defined as a lookup called mylookupfile.csv, that has user logon names in a field called "user" and their department in a field called "dept". Let's assume that you DO need
dept on your alert, and that there is a field named UserID already defined on the individual events you want.
index=foo ...your other search terms to find the events... | lookup mylookupfile.csv user as UserID OUTPUT dept | where isnotnull(dept)
Now let's assume that you do NOT need
dept. There's a special trick with a command called
format, that allows you to build a search for only the exact UserIDs you need. Run this one
| inputlookup mylookupfile.csv | table user | rename user as UserID | format
and it will create a field called
search that looks like this
( ( UserID="value1" ) OR ( UserID="value2" ) OR ....)
If you include that whole thing in brackets, it will drop that search field back into your original search, thus returning only the records you want to alert on.
index=foo ...your other search terms to find the events... [ | inputlookup mylookupfile.csv | table user | rename user as UserID] | lookup mylookupfile.csv user as UserID OUTPUT dept | where isnotnull(dept)
You should not have a pipe between the basic search and those brackets, or it won't work right. In this case, you do not need to type out the
format command, because it happens implicitly at the end of the brackets
This second strategy can work exactly the same with either a lookup table (inputlookup) or a csv file (inputcsv) and the syntax is just the same.
Now, there are other ways, such a
join, but you aren't likely to need them at this point, so I'm not going to go into them.
Thanks for the great suggestions. They changed the requirements on my slightly to only alert for accounts not on the list so I ended up with:
1. index=foo my search | search NOT [| inputlookup myList.csv | fields user ] | deduce user, host
2. | table user,host,_time
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735851.15/warc/CC-MAIN-20200804014340-20200804044340-00098.warc.gz
|
CC-MAIN-2020-34
| 2,875
| 25
|
https://hinative.com/en-US/dictionaries/whendya
|
code
|
is it normal using "whendya hafta be there" instead "when do you have to be there" ?
It depends on where you are. Im from a small town in Canada and alot of people say "Whendya Hafta be there". But it is never written. Only spoken.
You need to sign in.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480240.25/warc/CC-MAIN-20190216085312-20190216111312-00280.warc.gz
|
CC-MAIN-2019-09
| 252
| 3
|
https://www.mytecbits.com/microsoft/sql-server/getdate-vs-current_timestamp
|
code
|
There is not much of a difference between GETDATE() and CURRENT_TIMESTAMP. CURRENT_TIMESTAMP is a nondeterministic function and GETDATE()’s ANSI SQL equivalent. Similar to GETDATE() this will also return the current timestamp of the database server in datetime datatype. Both CURRENT_TIMESTAMP and GETDATE() can be used interchangeably,
Here is the sample SQL script of using these functions:
SELECT CURRENT_TIMESTAMP; SELECT GETDATE();
Here is the result:
2020-11-14 12:54:19.127 2020-11-14 12:54:19.127
As there are no differences between these functions, It is your preference on which one to use in SQL programming.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00338.warc.gz
|
CC-MAIN-2023-40
| 621
| 6
|
https://changelog.iclasspro.com/
|
code
|
Minimum supported app version set to 1.26.0 (Branded remains 1.15.0).
Customer Portal App
Fixed issue with adding honorees for party bookings.
Fix display issue with accessing skills on Calendar.
Fixed data issues with PoS inventory report.
Fixed issue with mass Makeup token creation on STUDENTS and CLASSES pages.
Removing border around notes icon.
Fix for calendar styling of datepicker dates.
Office Portal Login
Fix :Stay Logged In" option for Office Portal.
Added ability to include Custom Fields on Student List Report (STU-1) and Family List Report (FAM-1).
Better detection and handling of camp enrollments when merging families.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400196999.30/warc/CC-MAIN-20200920062737-20200920092737-00424.warc.gz
|
CC-MAIN-2020-40
| 638
| 12
|
http://ascii-world.wikidot.com/programming-qbasic-part-two
|
code
|
Ok, ready to take step on next level? This time, ill talk a bit less at start and give you a new code. You probably remember what to do with it =)
CLS INPUT "Write your name and press ENTER" ;Name$ PRINT "Hello" ;Name$ END
Ok, not mutch anything new? There is INPUT and some ;Name$ also. Let me comment it and it might look better.
CLS ' Clears the screen. INPUT "Write your name and press ENTER" ;Name$ ' Ask's you to write your name and save's what you typed on Name$ PRINT "Hello" ;Name$ ' Print's Hello and what you type earlier on screen. END ' Remember what this does?
So what are these two, INPUT and ;Name$ ?
INPUT is some how same thing than PRINT expect is way different =) QBasic wait's after INPUT you to press ENTER before it continues forward. Other thing INPUT does is that you can save some text or numbers in variables with it easily.
INPUT "Here is what is going to be printed on screen" 'QBasic stops here until you press ENTER. ;Name$ 'This is where your possible typing's will be saved before you pressed ENTER.
So if you don't type anything and just press ENTER then there is nothing to save on Name$. I bet you figured all ready how that PRINT "Hello" ;Name$ works. Instead of Name$ try use Myname$ or something else. You probably gona notice that in both lines you have to be exactly same variables.
INPUT "Write your name and press ENTER" ; Myname$ PRINT "Hello" ;Name$
Yah, that's not working. Ok, I don't think that we need to go thru this program any more. You are clever enough to figure out how it works and what those lines does. And now when we are learned some of the really basic commands we gona reach lot's of higher on next lesson.
Ill throw you some more complex looking code and comment it. Of course ill explain it also but there is more things you need to figure out your self. It's the best way to learn. Lesson 3 will include things how to place your text's on certain place of screen. How to ask more than just a name and some calculating things.
You'l see then =)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119120.22/warc/CC-MAIN-20170423031159-00624-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,008
| 12
|
https://fr.mathworks.com/matlabcentral/answers/717520-how-do-i-do-a-matlab-assignment-report?s_tid=prof_contriblnk
|
code
|
How do I do a Matlab assignment (report)?
2 views (last 30 days)
Steven Lord on 15 Jan 2021
Assuming this is homework, you should probably ask your professor about the format of the report they expect you to submit.
You may be able to submit a Live Script or you may be able to publish a regular script or function. See this documentation page for a description of those techniques.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710218.49/warc/CC-MAIN-20221127073607-20221127103607-00120.warc.gz
|
CC-MAIN-2022-49
| 382
| 5
|
https://geekflare.com/linux-commands-for-middleware-administration/
|
code
|
Middleware was the fourth hottest skill to get hired in 2017, and there is no reason to go down in the coming years.
If you recently started working on WebSphere or any other product suite of Middleware, then one of the very first things to get familiar is widely used Linux commands.
In this article, I will talk about some of the often-used Linux commands by WebSphere or Middleware administrator on a daily basis.
If you are working on the existing environment and if an administrator has redirected SystemOut.log to some other location then it would be challenging to find it.
#find / -name SystemOut.log
Tips: if you have multiple file systems then it may take time to search. So best would be to replace / with the actual file system where you think the log would be. Let’s say you believe log is in /opt file system so you can do this.
#find /opt –name SystemOut.log
Know which process is holding a specific port number
Quite often you will have to deal with port conflict issues, especially in the shared environment.
If there is a situation to find out which process is holding port number then here is how you can know.
#netstat –anlp | grep 443
[root@Chandan ~]# netstat -anlp | grep 443
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 20924/nginx
Note: Above example shows nginx with PID 20924 is holding 443 port.
Server boot time
If you are performing auto-startup troubleshooting and would like to know when the server was rebooted, you can use this command.
[root@Chandan ~]# who -b
system boot Jun 28 01:11
who -b command will give you the exact date and time of server reboot.
Alternatively, you may also use up time to check how long the server is up.
[root@Chandan ~]# uptime
01:20:27 up 14 days, 9 min, 1 user, load average: 0.00, 0.00, 0.00
Check CPU/Memory utilization in runtime
If you are having a performance issue, then you might want to know the current CPU/Memory utilization.
This will help you to find out which process is taking high CPU/Memory in real-time.
top - 01:16:21 up 14 days, 5 min, 1 user, load average: 0.00, 0.00, 0.00
Tasks: 70 total, 1 running, 69 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.0%us, 0.0%sy, 0.0%ni, 99.7%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
Mem: 502220k total, 454920k used, 47300k free, 143476k buffers
Swap: 0k total, 0k used, 0k free, 245412k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
29121 root 20 0 15008 1260 992 R 0.3 0.3 0:00.02 top 1 root 20 0 19232 1136 860 S 0.0 0.2 0:25.18 init 2 root 20 0 0 0 0 S 0.0 0.0 0:00.00 kthreadd 3 root RT 0 0 0 0 S 0.0 0.0 0:00.00 migration/0 4 root 20 0 0 0 0 S 0.0 0.0 0:01.21 ksoftirqd/0
Tips: look for the CPU/Memory section for the first few PID to find out the utilization.
Alternatively, you may also use the free command to find out total and free memory.
[root@Chandan ~]# free -m
total used free shared buffers cached
Mem: 490 444 46 0 140 239
-/+ buffers/cache: 64 425
Swap: 0 0 0
As you can see above, there is 490 MB total memory, and only 46 MB memory is available.
There is another command called SAR (System Activity Report), which is also very helpful to find the CPU and Memory stats.
To check the CPU utilization
To check the Memory utilization
Kill the process
Sometimes the process doesn’t stop gracefully if it’s hung or defunct. In this scenario, you can kill the process manually.
If above doesn’t help, you can use -9 to kill the process forcefully.
#kill -9 PID
Note: PID is your process ID
Most often you will have to deal with compressing the files as housekeeping activity for a file system.
gzip command can be used to compress the files.
Tips: if you have multiple files to be compressed, you can use gzip * which will compress all the files available in that working directory.
gunzip command will help you to extract the gz file.
Tips: you can use gunzip * which will help you to extract all gz file in that working directory.
Total CPU, Memory, File System
Often asked to provide server information, if you are working on migration or capacity planning.
Here is the quick command to help you to find out total CPU, Memory, and File system details.
Find out CPU Cores, MHz, CPU manufacturer, Model Name and much more by using
Tips: if you have a high-end server then output of the above command will be long. So you can use grep to filter out the required information. Ex, just to find out cores, you can use
#cat /proc/cpuinfo | grep cores
To find out the total available memory, you can use one of the following commands.
This will show you total, free & cached memory
This will show you much more information along with total memory.
File System information
To find out file system size and usage, you can use df commands.
[root@Chandan tmp]# df -h
Filesystem Size Used Avail Use% Mounted on
/dev/vda1 20G 1.6G 18G 9% /
tmpfs 246M 0 246M 0% /dev/shm
Including –h will give you output in GB which is easy to understand.
Check out IP, Subnet Mask, MAC address and errors
Probably, one of the most widely used commands to find out IP related information.
[root@Chandan tmp]# ifconfig
eth0 Link encap:Ethernet HWaddr 04:01:5A:25:57:01
inet addr:220.127.116.11 Bcast:18.104.22.168 Mask:255.255.192.0
inet6 addr: fe80::601:5aff:fe25:5701/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:1491330 errors:0 dropped:0 overruns:0 frame:0
TX packets:1636419 errors:0 dropped:0 overruns:0 carrier:0
RX bytes:306418374 (292.2 MiB) TX bytes:274350737 (261.6 MiB)
As you can see above, ifconfig will show the IP addresses, Ethernet details, a hardware address (MAC), subnet mask, errors, and other information. This is an extremely useful handy command if you are looking for this information.
Tips: you can use –a with ifconfig to show all available Ethernet details. Ex:
Network commands like wget, telnet, traceroute
If you are doing application connectivity troubleshooting then most likely you will need to use these network commands.
Check if you can access particular URL from a server
You can quickly confirm if there is any connectivity issue on your server by using wget command. Ex: if you need to check if the server can access an external website like https://geekflare.com or not, you can use below.
[root@Chandan tmp]# wget geekflare.com
--2015-07-12 02:52:56-- https://geekflare.com/
Resolving geekflare.com... 22.214.171.124, 126.96.36.199
Connecting to geekflare.com|188.8.131.52|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
Saving to: `index.html'
[ <=> ] 65,435 --.-K/s in 0.005s
2015-07-12 02:52:56 (13.4 MB/s) - `index.html' saved
Tips: above you can see HTTP response code is 200 means there is no issue in connectivity.
Verify if the server can connect to backend service with the particular port number
If you are connecting to some other application like web service and need to verify if you can reach them, then you can use telnet command. This is very useful for a connectivity test.
In the below example, I have checked if geekflare.com on 443 port can be reached or not.
[root@Chandan tmp]# telnet geekflare.com 443
Connected to geekflare.com.
Escape character is '^]'.
If you see “Connected” then that confirms there is nothing wrong with connectivity/firewall. However, if you see connection failed then you know, there is something like a firewall blocking your connection.
Tracing connection details
This may not be used all the time but extremely helpful when you have a latency issue or just want to find out the connection path between your server to the destination.
Below example is to show the network path from my server to geekflare.com
[root@Chandan tmp]# traceroute geekflare.com
traceroute to geekflare.com (184.108.40.206), 30 hops max, 60 byte packets
1 220.127.116.11 (18.104.22.168) 5.110 ms 5.061 ms 22.214.171.124 (126.96.36.199) 0.418 ms
2 188.8.131.52 (184.108.40.206) 5.153 ms 0.463 ms 220.127.116.11 (18.104.22.168) 8.009 ms
3 as13335.singapore.megaport.com (22.214.171.124) 4.822 ms 13335.sgw.equinix.com (126.96.36.199) 4.819 ms as13335.singapore.megaport.com (188.8.131.52) 4.490 ms
4 184.108.40.206 (220.127.116.11) 4.454 ms 4.427 ms 4.366 ms
If you are dealing with multiple users on a server and having root permission too then most likely once in a while, you will screw with permission/ownership. Well, not to worry its part of learning.
Here is the quick way to change the ownership or permission.
To change ownership of a particular file, you can use the
chown command as below.
#chown user:group error.log
Tips: above will change ownership of error.log to mentioned user and group. If you have a folder, then you can use
–R, which will change recursively to all the files within the folder. Ex:-
#chown –R user:group somefolder
I hope the above commands help you with your work. If you are looking to learn more sysadmin skills then check out these resources.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00096.warc.gz
|
CC-MAIN-2023-50
| 8,853
| 120
|
https://aiforgood.itu.int/event/graph-neural-networking-challenge-2023-building-a-network-digital-twin-using-data-from-real-networks/
|
code
|
Graph Neural Networking challenge 2023: Building a Network Digital Twin using data from real networks
* Register (or log in) to the AI4G Neural Network to add this session to your agenda or watch the replay
In recent years, the networking community has produced robust Graph Neural Networks (GNN) that can accurately mimic complex network environments. Modern GNN architectures enable building lightweight and accurate Network Digital Twins that can operate in real-time. However, and as a consequence of the lack of real-world data, current ML-based models have been mainly developed and trained using simulated data. This has strongly limited our understanding on how existing models perform in a real network.
This talk will introduce the Graph Neural Networking challenge 2023, entitled “Building a Network Digital Twin using data from real networks”. In this problem statement, participants will be challenged to develop, for the first time ever, a GNN-based Network Digital Twin using a dataset from a real-network. In addition, we will provide key insights on how to approach the challenge.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00733.warc.gz
|
CC-MAIN-2024-18
| 1,101
| 4
|
https://technet.microsoft.com/en-us/library/dn169217.aspx
|
code
|
Published: April 18, 2013
Updated: July 30, 2015
Applies To: Azure, Office 365, Windows Intune
The Redo-MsolProvisionGroup cmdlet can be used to retry the provisioning of a group object in Microsoft Azure Active Directory (Microsoft Azure AD) when a previous attempt to create the group object resulted in a validation error.
-ObjectId <Guid> The ObjectId associated with the group object to retry provisioning on. Required? false Position? named Default value Accept pipeline input? true (ByPropertyName) Accept wildcard characters? false -TenantId <Guid> The unique ID of the tenant to perform the operation on. If this is not provided, then the value will default to the tenant of the current user. This parameter is only applicable to partner users. Required? false Position? named Default value Accept pipeline input? true (ByPropertyName) Accept wildcard characters? false <CommonParameters> This cmdlet supports the common parameters: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer, PipelineVariable, and OutVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
Other ResourcesManage Azure Active Directory by using Windows PowerShell
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737913406.61/warc/CC-MAIN-20151001221833-00208-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 1,234
| 6
|
https://ag2020.astronomische-gesellschaft.de/view_abstract.php?id=216
|
code
|
Contributed Talk - Splinter Computation
Friday, 25 September 2020, 12:09 (virtual room B)
High Resolution Parameter Study of the Vertical Shear Instability
Natascha Manger, Hubert Klahr, Wilhelm Kley and Mario Flock
CCA-Flatiron Institute and Max-Planck Institute for Astronomy Heidelberg and Tübingen University
Theoretical models of protoplanetary disks have shown the Vertical Shear Instability (VSI) to be a prime candidate to explain turbulence in the dead zone of the disk. However, simulations of the VSI have yet to show consistent levels of key disk turbulence parameters like the stress-to-pressure ratio α. In this talk, we will present a parameter study of the VSI utilizing full 2π 3D simulations of protoplanetary disks, aiming to reconcile the different reported turbulence parameters. We find that the saturated stress-to-pressure ratio in our simulations is dependent on the disk aspect ratio with a strong scaling of α∝h2.6, which is in contrast to the traditional α model, where α is assumed constant. We also observe consistent formation of large scale vortices across all investigated parameters. The vortices show uniformly aspect ratios of χ≈10 and radial widths of approximately 1.5H. With our findings, we can reconcile the different values reported for the stress-to-pressure ratio from both isothermal and full radiation hydrodynamics models, and show long-term evolution effects of the VSI that could aide in the formation of planetesimals.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817146.37/warc/CC-MAIN-20240417075330-20240417105330-00821.warc.gz
|
CC-MAIN-2024-18
| 1,479
| 6
|
https://grabcad.com/chris.shakal
|
code
|
I graded homework and helped students learn engineering drafting and CATIA.
Researched current trends and issues within the aviation biofuels industry. Performed lab tests on biofuels to find cloud point, pour point, etc. Created written report on all findings.
Assisted with CAD data version control, CAD geometry validation between file types, CATIA user support, and enhanced understanding of CATIA Knowledgeware.
Currently working on modifying and optimizing a CATIA model of a Gulfstream G500 aileron structural test fixture. Wrote a VBA macro and GUI to automatically create 80+ assembly constraints to simulate the movement of the components in the test fixture depending on the load cases. Additional projects in progress...
Numerous hours (church-related and otherwise) of volunteer and mission trip work
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094690.4/warc/CC-MAIN-20150627031814-00007-ip-10-179-60-89.ec2.internal.warc.gz
|
CC-MAIN-2015-27
| 813
| 5
|
https://dev.to/taimoorsattar7/how-to-make-social-friend-i2m
|
code
|
First thing why make friends? You make friends to expand your reach and audience to grow and understand yourself. People have different profession. Friends helps each other to remove the difficulty according to their profession.
Making social friend. There are many social sites you can use to make friends. Mostly, Facebook, Twitter are most commonly used social website. Depending on your location, social sites exist for region base.
How to expand your reach? Share to the world what things you like and post about the things which you are interested in. People know you as the profession you do and they know it well as you post it on the social site.
I use Twitter to post the things that interest me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711126.30/warc/CC-MAIN-20221207021130-20221207051130-00574.warc.gz
|
CC-MAIN-2022-49
| 706
| 4
|
http://mandelbrowser.y0.pl/tutorial/saving.html
|
code
|
Use Add to Favorites option from the action menu to add the current spot to your favorites. Just enter a name and tap the OK button. The app will create a thumbnail for your spot using the current image.
Use the folder button to open the gallery with the last visited item selected.
Use tabs to switch between your favorite spots and built-in examples.
Use the sort button to sort items by name, fractal type, paint mode, palette, or image filter. When sorting by fractal type, you may choose the order: alphabetical or the order in which fractal types appear in their list (built-in first). The same goes for sorting by palette, paint mode, or image filter.
Every spot is described by a thumbnail, a name, and a description depending on the sort order (a fractal type name, a paint mode name, a palette name, or an image filter name). Spots using advanced features are labeled adv on the right.
Tap a spot to choose it.
Long press a spot to show its context menu and choose one of the available options:
|View||Choose the spot (the same as tapping it).|
|Zoom video||Start real-time zoom video to the spot.|
|Share||Share your favorite spot.|
|Rename||Change the name of your favorite spot.|
|Replace with current||Replace your favorite spot with the current image.|
|Delete||Delete your favorite spot.|
If the location does not use user-defined conent (a custom fractal type, paint mode, or palette), the app will send the link. Open that link with the app to go straight to the spot.
If the location uses user-defined content, the app will send a text file containing the location and the necessary custom fractal type, paint modes, and palettes.
The app will send a text file containing the selected custom content.
Download the received file or save it to Drive. Then use the Import File option from the Action menu to import shared content from the file.
If the custom fractal type, paint mode, or palette read from the selected file already exists, it is not imported. The app compares the definitions, ignoring names and descriptions.
If the local custom content already contains another fractal type, paint mode, or a palette with the same name, the app changes the name, for example, 'My palette' is changed to 'My palette (2)'.
After reading the file, the app will list the new custom content and ask for confirmation.
If the file contains a location, the app will show it.
Use Save Image option from the action menu to save the current image in the device's gallery.
Use the Share Image option to share the current image.
Saving or sharing is not possible when image rendering is not complete.
You may use the Settings / Image rendering Image resolution option to set custom image resolution (up to 4k in the Premium version). You may also use the Settings / Image rendering / Supersampling option to produce smoother image. These features can be helpful, if you want to export the image for use outside the app.
The image filename is MandelBrowser_<date_time>.png (eg. MandelBrowser_190731_181501.png).
NOTE: you are free to use the images generated with the app for any purpose, this includes the app's built-in examples.
Use the Settings / Other / Save custom content option to save your favorite locations, custom fractal types, paint modes and palettes to a text file.
Once the file is ready, you will be asked where to save it. We recommend selecting Save to Drive to share the file with another device.
Then use the Settings / Other / Restore custom content option on another device to load the content from the file.
WARNING: the file content is not merged with the current device content. Instead, it just replaces is.
NOTE: transferring the thumbnail images for your custom fractal types and paint modes is not yet supported. The app's settings are also not transferred.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703507971.27/warc/CC-MAIN-20210116225820-20210117015820-00146.warc.gz
|
CC-MAIN-2021-04
| 3,792
| 32
|
https://bunkerchan.xyz/tech/last/1887.html
|
code
|
in your link it says you have to explicitly include a gpu option.
it also says in your link that gpu acceleration is still shit quality-to-bitrate:
>Hardware encoders typically generate output of significantly lower quality than good software encoders like x264, but are generally faster and do not use much CPU resource. (That is, they require a higher bitrate to make output with the same perceptual quality, or they make output with a lower perceptual quality at the same bitrate.)
there's a reason it's disabled by default, retard. you should never use gpu-accelerated encoding unless you're a streamer using obs with a cpu too weak to handle it
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127075.68/warc/CC-MAIN-20200930141310-20200930171310-00782.warc.gz
|
CC-MAIN-2020-40
| 649
| 4
|
http://animaladay.blogspot.com/2010/06/blue-tongue-skink.html
|
code
|
|Image from Animal Pictures & Dictionary|
Blue Tongue Skinks are diurnal creatures, and are mostly solitary. They live alone until the fall breeding season when the males come together and fight each other over the females. Skink babies are born via live-birth, and they are on their own almost immediately. Blue Tongue Skinks can live up to 20 years. They are also relatively popular reptiles to own as pets. They can be found in captivity worldwide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589470.9/warc/CC-MAIN-20180716213101-20180716233101-00490.warc.gz
|
CC-MAIN-2018-30
| 451
| 2
|
https://community.articulate.com/discussions/building-better-courses/conditions-on-text-variables
|
code
|
Conditions on text variables
Mar 28, 2019
I have created a course where the opening slide has a text variable for the user to enter their name. When they hit SUBMIT, they are taken to the next slide where their name appears and they crack on with the course.
I am hoping to get some help as to how I would set it up so that if the user tries to hit the SUBMIT button without typing in their name in the text entry field that a layer pops up saying something like "Awww, please tell us your name" and then they return to the main text variable slide.
I can't seem to figure out what triggers I would need to have set up and where in order for this to work.
I have attached images of my main slide and layer with the triggers I have currently set up (hoping that is of some use!)
Thanks in advance,
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00748.warc.gz
|
CC-MAIN-2023-50
| 796
| 7
|
https://ridewithgps.zendesk.com/hc/en-us/community/posts/115005873253-Apple-Watch-App
|
code
|
i am running iOS 11.0.3, Watch OS4, and RWGPS 1.7.6 (Apple Watch Series 2)
In the iPhone Watch app, the RWGPS app is listed as available to install, however the install never completes properly. The RWGPS app icon shows on the watch, but will not open.
Numerous install, uninstall, rebooting - no help.
Other watch apps installing just fine, so I don’t think it is a problem with the watch.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247508363.74/warc/CC-MAIN-20190221193026-20190221215026-00016.warc.gz
|
CC-MAIN-2019-09
| 392
| 4
|
http://coudatingwx.4vid.xyz/combine-names-in-google-sheets-api.html
|
code
|
A Google account. Mar 01 · Now that combine you' ve finally google achieved your dream of owning a boat the next crucial step before exploring the ultimate freedom of the seas is api to give it a name. The property had a creek, so it became Moss Creek. I have a series of sheets with various names e. Sum values google with same name. Criticism of Google includes concern for tax avoidance , content, censorship of search results , sheets manipulation of search results, its use of others' intellectual property, collaboration with Google Earth by the military to spy names on us, concerns that its compilation of api data may violate people' s privacy , misuse the energy consumption of its servers as well as google concerns over traditional. For example instead of using " A1: B2" to describe a range of cells you could name the names range " budget_ total. Google Cloud delivers secure , open, intelligent transformative tools to help enterprises modernize for today' s digital world. sheets instead of referencing column names ( like in SQL), in.
api Language SDKs provide client bindings for Java C#, Python Node. Combine names in google sheets api. How to use api the Smartsheet API to programatically read and write Smartsheet data. I have the combine get cell values c# example from the developer website working with Google Sheets API v4. Halliburton is one of the world' s largest providers of products and services to the energy industry. This is the REST API for api trashnothing.
I have a Google Sheets with a long list of names and amounts. Click this button to create a new Cloud Platform project automatically enable the Google Sheets API: Enable the Google Sheets API In resulting dialog click DOWNLOAD CLIENT CONFIGURATION save the file credentials. Is there api any automated api way to combine all of the values so I get a. Name a range of cells You can name ranges in google sheets Google api Sheets to keep better track of them and create cleaner formulas. google spreadsheets copy comments. json to api your sheets working directory. Collect user inputs through a Google Form into a Google Sheets dashboard. The home happens to be a log cabin google with a small pond and the creek with wood around that.
google spreadsheets combine cells. where you want to combine two sheets data ranges within a Google Sheets query. Combine names in google sheets api. Dec 31 Martin , · Combine Surnames: To get Moss Creek ( shown in the photo above), Ross, the homeowners combined two last names to combine get Moss. Google Sheets Query Function. To learn google more about the API or to register your app for use with the API visit the trash nothing! / / Prints the names and majors of students in a sample. Google Google Spreadshee google spreadsheets commands.
Click Continue, then Go to credentials. Includes getting started guide and complete reference information.
Making a spreadsheet can be intimidating for new users. Learn basic to intermediate skills for Excel, Word, and Google Sheets. Web- based products Search tools. Google Search is a web search engine and Google' s core product. It receives over 3 billion search queries per day. Google also offers regional search by its 189 regional level domains.
combine names in google sheets api
Hummingbird – Expanded query analysis. For example, if a user searches for ' best pie place in Seattle' Google will also search for ' best pie restaurant in Seattle'. This post will demonstrate a way to bring Searchmetrics data to both Google Sheets and Google Data Studio using the Supermetrics add- on.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987750110.78/warc/CC-MAIN-20191020233245-20191021020745-00316.warc.gz
|
CC-MAIN-2019-43
| 3,572
| 8
|
http://kerneltrap.org/node/16661
|
code
|
In kernel 2.4 DNOTIFY file system event monitor functionality was introduced. In newer kernels 2.6 this functionality is replaced with newer and better INOTIFY file system change monitoring system. However, obsolete DNOTIFY directory based monitoring system is retained for compatibility reasons in newr kernels.
Could anyone tell me where or when this DNOTIFY is used today? Is this something that possibly could be used or this is now total legacy?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702452567/warc/CC-MAIN-20130516110732-00005-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 450
| 2
|
http://blog.mpecsinc.ca/2009/05/windows-7-install-on-toshiba-tecra-s1.html
|
code
|
The laptop in question is one of our shop machines that got shuffled home to be a basic e-mail, web browsing, and occasional Word document machine.
It sits on a pneumatic stool in the corner of the kitchen’s dining area providing some convenience as our office space is in the basement.
The Toshiba Tecra S1 is configured as follows:
- Intel Pentium M 1.7GHz.
- 512MB of dedicated RAM.
- ATI Radeon Mobility 9000.
- 40GB hard drive.
- Intel A/B/G Wireless and 100Mbit LAN.
- Toshiba Part Number: PT831C-67CSU.
This was a Canadian only version that can be difficult to find drivers for at times.
During the initial install after deleting the existing Windows XP Pro partition on the hard drive, Windows 7 wanted to create its own 100MB partition before the system partition we designated.
Note that the 100MB partition is actually set to “Active” in the above screenshot.
Once installed, we needed to manually install the audio, cardbus, SD Card reader, and Intel WiFi drivers.
The ATI driver for the Mobility 9000 would not allow Aero transparency as it was not a WDDM based driver.
The above screenshot was produced by one of the new Windows 7 Troubleshooting Packs. In this case, it was the transparency and video problems troubleshooter. Just type “Aero” in the Start Search and the troubleshooter will be one of the top results.
We tried to force a newer ATI Radeon Mobility driver to see if it would pick up. It did not.
So, now that we have the laptop’s setup pretty much complete, we will now see how it handles an Office 2007 install.
The system’s performance is almost on par with the previous XP Pro install. Given that there is only 512MB of RAM in it, we will see if there will be a need to bump it up to 1GB as Monique is the person who will be trained on the use of Windows 7 and its principle user from now on.
If Monique mentions that the laptop has slowed down since the Windows 7 install, then we will upgrade the RAM. Her Windows 7 experience will be a good gauge of how most of our client’s users will adapt to and adopt the new operating system.
Microsoft Small Business Specialists
Co-Author: SBS 2008 Blueprint Book
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123270.78/warc/CC-MAIN-20170423031203-00392-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,154
| 21
|
https://www.ornl.gov/publication/studying-performance-portability-lammps-across-diverse-gpu-based-platforms-0
|
code
|
The molecular dynamics simulation software, LAMMPS, utilizes the Kokkos acceleration library to port computation to a diverse set of architectures including those based on GPU accelerators. In addition to Kokkos, LAMMPS contains a vast code base that leverages the CUDA application programming interface using library functions such as cuFFT, CUDA's fast-fourier transform (FFT) library, and, more recently, also support for AMD's Heterogeneous Interface for Portability (HIP) that is rapidly growing. While preparing LAMMPS tests for the AMD GPU-based test system precursors to Frontier, we investigated several strategies for accelerating LAMMPS on AMD GPUs, using the AMD Instinct MI100 and MI250X. In this work, we integrated the HIP FFT library, hipFFT, into the particle-particle particle-mesh (PPPM) long-range solver, which allowed the porting of PPPM calculations to the GPUs. Kokkos behavior on the MI100 and MI250X was also investigated through the package kokkos command of LAMMPS, targeting communication, memory usage, and particle grid decomposition. The Tersoff, Reax, Lennard-Jones (LJ), EAM, Granular, and PPPM potentials were investigated in this effort, and results from these experiments are provided. The selected potentials were run on Spock (AMD Instinct MI100), Crusher (AMD Instinct MI250X), AFW HPC11 (NVIDIA A100) and Summit (NVIDIA V100), for comparison. Operational roofline models were constructed and analyzed for the Tersoff, Reax, and Lennard–Jones potentials on Crusher and Summit.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948235171.95/warc/CC-MAIN-20240305124045-20240305154045-00555.warc.gz
|
CC-MAIN-2024-10
| 1,518
| 1
|
https://docs.hazelcast.org/docs/3.5/manual/html/configuringhazelcast.html
|
code
|
When Hazelcast starts up, it checks for the configuration as follows:
First, it looks for the
hazelcast.config system property. If it is set, its value is used as the path. This is useful if you want to be able to change your Hazelcast configuration: you can do this because it is not embedded within the application. You can set the
config option with the following command:
<path to the hazelcast.xml>.
The path can be a normal one or a classpath reference with the prefix
hazelcast.xmlfile in the working directory.
hazelcast.xmlexists on the classpath.
hazelcast-default.xmlthat comes with
When you download and unzip
>.zip you will see a
hazelcast.xml in the
/bin folder. This is the configuration XML file for Hazelcast. Part of this configuration XML is shown below.
For most users, default configuration should be fine. If not, you can tailor this XML file according to your needs by adding/removing/modifying properties (Declarative Configuration). Please refer to the System Properties section for details.
Besides declarative configuration, you can configure your cluster programmatically (Programmatic Configuration). Just instantiate a
Config object and add/remove/modify properties.
You can also use wildcards while configuring Hazelcast. Please refer to the Using Wildcard section for details.
Please refer to the Hazelcast Configuration chapter for more information.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358189.36/warc/CC-MAIN-20211127133237-20211127163237-00390.warc.gz
|
CC-MAIN-2021-49
| 1,382
| 18
|
https://github.com/cuberite/cuberite/issues/4416
|
code
|
Join GitHub today
GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Sign up
We currently check PRs for new undocumented API symbols. We should also check that all the previous API symbols are still present, that the PR didn't remove an API symbol by accident. For this, APIDump needs to output the list of all current symbols and be able to compare that list against an official list downloaded from web (just like the undocumented symbols). And we need to decide on a way to support actually removing API symbols when we do want to remove them - ignore the build failure in the PR, or make some special arrangements for the check to ignore specific symbols?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667262.54/warc/CC-MAIN-20191113140725-20191113164725-00305.warc.gz
|
CC-MAIN-2019-47
| 740
| 3
|
https://artofsmart.com.au/qcetogether/future-changes-to-ecosystems/
|
code
|
How Ecosystems are Changing?
This post will go through future changes to ecosystems for QCE Biology.
3.2.3 – Changing Ecosystems
- Analyse ecological data to predict temporal and spatial successional changes
- Mandatory practical: Select and appraise an ecological surveying technique to analyse species diversity between two spatially variant ecosystems of the same classification (e.g. a disturbed and undisturbed dry sclerophyll forest).
Predicting the Future
This video goes through understanding temporal and spatial successional change.
This video goes through how biodiversity is changing and thus the future of biodiversity.
This video goes through how evolution might progress in present time and the future.
This video goes thorugh potential impacts on terrestrial ecosystems.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300624.10/warc/CC-MAIN-20220117212242-20220118002242-00493.warc.gz
|
CC-MAIN-2022-05
| 788
| 10
|
https://ijosthe.com/index.php/ojssports/article/view/101
|
code
|
Segmentation and Determination of Brain Tumor by Bounding Box Method
An Intracranial Neoplasm (Brain Tumor) occurs when abnormal cells form within the brain. There are two main types of tumors: Malignant (Cancerous Tumors) and Benign tumors. Cancerous or non-cancerous mass and growth of abnormal cells in the brain leads to the formation of brain tumor. In order to reduce the increasing fatality rate caused by brain tumor, it is necessary to detect and cure the affected region early and efficiently. Initially, pre-processing is performed, in this phase image is enhanced in the way that finer details are improved and noise is removed from the image. During pre-processing, filters are applied on an input grey scale image to remove unwanted impurities. Filtered image thus obtained is free from impurities. Processing of an image is performed next. Image segmentation is based on the division of the image into regions. Division is done on the basis of similar attributes. Post processing is done using threshold and watershed segmentation. During post processing, the filtered image is forwarded for threshold segmentation along with SVM classifier. Threshold segmentation usually transforms the image in a binary format based on a threshold value. SVM analyze data for classification and regression analysis. Watershed segmentation groups the pixels of image based on their intensities. Morphological operations are applied to the converted image. Boundary extraction is a major part of research which uses fast bounding box algorithm which detects the affected area in motion.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304883.8/warc/CC-MAIN-20220129092458-20220129122458-00508.warc.gz
|
CC-MAIN-2022-05
| 1,585
| 2
|
https://vbulletindestek.org/3395-recipe-delicious-cold-coffee-frappe/
|
code
|
Cold Coffee Frappe.
You can cook Cold Coffee Frappe using 6 ingredients and 4 steps. Here is how you achieve it.
Ingredients of Cold Coffee Frappe
- You need 2 Cups of Milk.
- Prepare 1/4 cup of Cream.
- It’s 1 tsp of Instant Coffee.
- Prepare 4 Scoops of Chocolate icecream.
- It’s of Melted chocolate (for decoration).
- It’s 1 tsp of Coco powder.
Cold Coffee Frappe instructions
- Blend milk, coffee, cocoa powder and cream together..
- Blend it for few seconds..
- Add Icecream in serving Glass then pour cold coffee in it..
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039596883.98/warc/CC-MAIN-20210423161713-20210423191713-00081.warc.gz
|
CC-MAIN-2021-17
| 534
| 13
|
https://learninghubfriesland.nl/digital-tutors-meeting-in-valencia/
|
code
|
Project partners spent four days in Valencia discussing the intellectual outputs for Digital Tutors; what an incredibly cool experience! After a year of meeting online, partners from the Netherlands, Lithuania and Spain, finally met physically and worked together on the project for two days. A terrific project that focuses on strengthening the skills of teachers to guide students digitally. We were able to make nice steps and get to know a beautiful city!
Daphne Kronemeijer, our partner from Fries Port, took the time to make a nice vlog about our experience. You can check out her youtube video here: https://youtu.be/ResoMrBqQLg
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00481.warc.gz
|
CC-MAIN-2023-50
| 635
| 2
|
https://webmasters.stackexchange.com/questions/115970/remove-two-subfolders-and-change-plusses-to-dashes-in-the-url-using-htaccess
|
code
|
I'm in the process of migrating a website from an old CMS to Wordpress. The way that some of the old URLs were:
For Wordpress, I need it to be the following URL:
So I need to remove the
/tags/tagged sub-directories and also change the
+ signs to
- signs. Is there any way to do this with .htaccess?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00835.warc.gz
|
CC-MAIN-2023-40
| 298
| 6
|
https://kainottrodt.de/projects/downhill-experience-vr.html
|
code
|
At our "Downhill Experience VR" a playable prototype was created, which should become a mountain bike simulator, in which one rides down a mountain on a bicycle. The aim of our project was to create a Virtual Reality Montainbike Simulator. The game should be controlled by using a real bicycle, which is moved up and down by a jack and an electric motor. With the VR-glasses the immersion should be further increased. In addition, a web, Facebook and Twitter page was to be created to make the game better known. A Kickstarter campaign was also planned to finance the game. The goal was to find a customer in the fitness industry.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585203.61/warc/CC-MAIN-20211018124412-20211018154412-00016.warc.gz
|
CC-MAIN-2021-43
| 630
| 1
|
https://club.myce.com/t/nec-3500-ag-firmware/247420
|
code
|
Thanks for the replies.
Done that Drage, i got a BSOD,
STOP: 0x00000019 ( 0x00000020, 0xE2F1BB78, 0xE2F1C340, 0x0CF97C1D )
just as i was rebooting and thought my drive had gone pear shaped, luckily when i re booted the drive showed up as new hardware with the new firmware version, phew!!
Whappo, looked at them before, the instructions on how it was done confused me, (not hard),.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865830.35/warc/CC-MAIN-20180523215608-20180523235608-00563.warc.gz
|
CC-MAIN-2018-22
| 381
| 5
|
http://man.eitan.ac.il/cgi-bin/man.cgi?section=3C&topic=settimeofday
|
code
|
gettimeofday, settimeofday - get or set the date and time
int gettimeofday(struct timeval *tp, void *);
int settimeofday(struct timeval *tp, void *);
The gettimeofday() function gets and the settimeofday()
function sets the system's notion of the current time. The
current time is expressed in elapsed seconds and
microseconds since 00:00 Universal Coordinated Time, January
1, 1970. The resolution of the system clock is hardware
dependent; the time may be updated continuously or in clock
The tp argument points to a timeval structure, which
includes the following members:
long tv_sec; /* seconds since Jan. 1, 1970 */
long tv_usec; /* and microseconds */
If tp is a null pointer, the current time information is not
returned or set.
The TZ environment variable holds time zone information. See
The second argument to gettimeofday() and settimeofday() is
Only the super-user may set the time of day.
Upon successful completion, 0 is returned. Otherwise, -1 is
returned and errno is set to indicate the error.
The gettimeofday() function will fail if:
The structure pointed to by tp specifies an invalid
EPERM A user other than the privileged user attempted to set
the time or time zone.
Additionally, the gettimeofday() function will fail for 32-
bit interfaces if:
The system time has progressed beyond 2038, thus the
size of the tv_sec member of the timeval structure
pointed to by tp is insufficient to hold the current
time in seconds.
If the tv_usec member of tp is > 500000, settimeofday()
rounds the seconds upward. If the time needs to be set with
better than one second accuracy, call settimeofday() for the
seconds and then adjtime(2) for finer accuracy.
See attributes(5) for descriptions of the following attri-
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
| MT-Level | MT-Safe |
adjtime(2), ctime(3C), TIMEZONE(4), attributes(5)
Man(1) output converted with
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390755.1/warc/CC-MAIN-20200526081547-20200526111547-00534.warc.gz
|
CC-MAIN-2020-24
| 1,865
| 39
|
http://mgtow1.blogspot.com/2014/03/animated-mgtow-flag-reuse-allowed.html
|
code
|
Animated MGTOW flag (reuse allowed)
MGTOW SYMBOLDoing a quick google image search of MGTOW doesn't really come up with many results of the of the yellow symbol some of you might be familiar with.
MGTOW PopularityKind of surprising considering the rising popularity of this movement:
So if you have a mgtow inspired website, be sure to put this symbol somewhere on your webpage and help grow the movement. The sooner the general public becomes aware of us, the sooner society can discover the feminist lies out there.
Animated MGTOW flagI like to dabble in graphics, so I made this animated MGTOW flag video clip. Feel free to use it in any MGTOW inspired videos you create, or simply fly it high and proud on your website!
[LINK to embed code]
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607802.75/warc/CC-MAIN-20170524055048-20170524075048-00287.warc.gz
|
CC-MAIN-2017-22
| 743
| 6
|
https://www.techlatest.net/support/desktop_linux_centos_support/gcp_gettingstartedguide/index.html
|
code
|
It will take you to the agreement page. On this page, you can change the project from the project selector on top navigator bar as shown in the below screenshot.
Accept the Terms and agreements by ticking the checkbox and clicking on the AGREE button.
It will show you the successfully agreed popup page. Click on Deploy.
Select a zone where you want to launch the VM(such as us-east1-)
Optionally change the number of cores and amount of memory. (This defaults to 1 vCPUs and 3.75 GB ram.)
Optionally change the boot disk type and size. (This defaults to “Standard Persistent Disk” and 20 GB respectively)
Optionally change the network name and subnetwork names. Be sure that whichever network you specify has ports 22 (for ssh) and 3389 (for RDP) exposed.
Click Deploy when you are done. CentOS Desktop Linux VM will begin deploying.
A summary page displays when the compute engine is successfully deployed. Click on the Instance link to go to the instance page .
On the instance page, click on the “SSH” button, select “Open in browser window”.
sudo passwd centos
Then From your local windows machine, goto “start” menu, in the search box type and select “Remote desktop connection”
In the “Remote Desktop connection” wizard, copy the external ip and click connect.Accept the certificate warning.
Note: : If you don’t have Remmina installed on your Linux machine, first Install Remmina as per your linux distribution.
15. Now you are connected to out of box CentOS GUI Linux environment via Linux Machine.
sudo adduser username
sudo passwd username
sudo usermod -aG wheel username
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816024.45/warc/CC-MAIN-20240412132154-20240412162154-00503.warc.gz
|
CC-MAIN-2024-18
| 1,609
| 18
|
https://ask.slashdot.org/story/08/09/27/1830217/matching-up-hotkeys-for-os-x-and-linux-guis
|
code
|
I use a MacBook Pro for my main machine, but also have a Ubuntu desktop. I get irritated about switching between command-oriented hotkeys and ctrl-oriented hotkeys (cmd-a on OSX = ctrl-a on Linux/windows). I've looked over a lot of forums and have found that Gnome doesn't seem capable of changing hotkeys, while xfce and fluxbox can. The ideal solution would be a way to change system keys in X, or at the system level — that way I can keep compiz. Does anyone have any ideas or know a trick to change system hot keys?
#NetNeutrality is STILL in danger - Click here to help. DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806979.99/warc/CC-MAIN-20171123214752-20171123234752-00175.warc.gz
|
CC-MAIN-2017-47
| 735
| 2
|
https://mascodingsolutions.com/membership/
|
code
|
HIM Coding Academy
BE THE FIRST TO KNOW WHEN This Membership Platform Opens
HIM Coding Academy is so excited that you’re interested in joining our incredible Members’ Club!
If you’d love to join an amazing community of like-minded HIM Coding professionals
and get access to everything you need to build and expand your coding career in the HIM Coding profession – this is the perfect place for you!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00506.warc.gz
|
CC-MAIN-2023-40
| 406
| 5
|
https://docs.radixdlt.com/docs/non-fungible-display
|
code
|
- 13 Feb 2024
- 3 Minutes to read
- Updated on 13 Feb 2024
- 3 Minutes to read
This article covers the recommendations for how non-fungible resources and "non-fungibles" (individual units of non-fungible resources) are displayed to a user. You may also wish to see the generalized advice on display resource addresses.
Non-fungible resources are special in that each NFT "unit" also has its own unique identity. We call these individual units non-fungibles.
We can refer to a non-fungible by its unique non-fungible global ID. This ID has two parts:
- The resource address of the resource manager it belongs to
- A non-fungible local ID that is unique within that set of resources.
These two parts of the global ID are concatenated as a single string, separated by a colon, to make it easy for users to read and copy-paste them in a wallet, explorer, or exchange UI. When put together, a full non-fungible global ID (using a string type non-fungible local ID) looks something like:
This is the full global ID used to look up a specific non-fungible in, say, the Radix Dashboard; the non-fungible local ID
ticket_19206 alone is not enough. This is because, for example, there could be a different resource that also includes a
ticket_19206. The local ID is only unique within the set of non-fungibles of that specific non-fungible resource.
Non-fungible local IDs are defined by the creator and are of one of a few supported types. All non-fungibles of a given non-fungible resource use the same type of local ID. Each type is indicated by a special local ID format:
|Example local ID
a-z A-Z 0-9 _)
|RUID (random type)
When a non-fungible is shown in the Radix Wallet, Dashboard or your dApps, it may often be shown as a member of the top-level resource (manager). In cases like this, it’s acceptable to identify the non-fungible to the user by its non-fungible local ID alone. It may even be presented to the user as its "ID" for simplicity. But when the user clicks a copy link for an individual non-fungible’s address, the whole global ID should be copied – combining the resource global ID and local ID as shown above. Unlike resource addresses, the non-fungible’s local ID portion should not generally be abbreviated since it may often be intended to be readable by users. An example display for a user might look like:
Dallas Mavericks Tickets (
12/25/22 - Seat 13B (
12/25/22 - Seat 13C (
However, if it is necessary to show a non-fungible global ID on its own (without the context of the associated resource manager), it is acceptable to display the address in abbreviated form like this (although this would be an unusual case):
Dallas Mavericks Tickets, 12/25/22 - Seat 13B (
The exception to showing local IDs in full is the RUID type of local ID. Since these are very long and not particularly human readable, it is acceptable to abbreviate them, using a 4…4 format. So for example, a non-fungible’s global ID might be shown – abbreviating both resource portion and local ID portion – as follows:
Non-fungibles are transferred individually, and each holds its own data. This data is not the metadata that is set on resource managers, but it fills a similar purpose for individual non-fungibles. This data must fit with a data structure defined at initial creation of the resource.
For example, I might have a set of "Dallas Mavericks Tickets" NFTs where the data struct says that each individual ticket non-fungible must have a
seat_number. Each separate non-fungible under this resource will potentially have a different value for
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817398.21/warc/CC-MAIN-20240419110125-20240419140125-00318.warc.gz
|
CC-MAIN-2024-18
| 3,559
| 27
|
https://docs.oracle.com/cd/E53547_01/opera_5_04_03_core_help/cf_rateclass_help.htm
|
code
|
Configuration - Rate Class (cf_rateclass with GENREPPAR.FMX)
Note: When printing this Report help topic, we recommend printing with Portrait page orientation.
The Configuration report Rate Class will display all Rate Classes that have been configured. If the license code for multi property functionality is activated (OPP_MHOT), this report will represent all codes on the template form.
Note: When the OPR <version number> ORS license code is active, the Select Property screen appears prior to the Report Parameters screen. Choose the property you want to view and select the OK button. The Report Parameters screen appears.
In PMS, Rate Classes are configured in Configuration>Rate Management>Rate Classes. In ORS, Rate Classes are configured in System Configuration>Rate Management>Rate Classifications>Rate Classes.
Rate Class. Single Select LOV to display a specific rate class. Leave this field blank to display all of the rate classes.
Preview. Select to preview the report in a PDF format.
Print. select to print the report.
File. Select to save the report as a file.
Close. Select to exit the specific report.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251776516.99/warc/CC-MAIN-20200128060946-20200128090946-00235.warc.gz
|
CC-MAIN-2020-05
| 1,120
| 10
|
https://forums.envato.com/t/my-first-item-quizhub-got-rejected-for-not-meeting-coding-standard-need-some-clarifications-and-help/291574
|
code
|
I need your help.
My first item QuizHub ( web app to create quizzes built with reactjs and firebase ) got rejected for not meeting coding standard.
I am ready to work harder and improve it.
One thing comes to my mind is ‘Not adequate comments’.
Apart from that What am i suppose to improve?
And it is mentioned that I cannot resubmit the item again.
Does it mean even after improving my code and adding some new features, I should not submit it again?
Live Demo of my app - QuizHub
Thanks for your time and valuable suggesstions in advance.
My First Item QuizHub got rejected for not meeting coding standard. Need some clarifications and help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371660550.75/warc/CC-MAIN-20200406200320-20200406230820-00170.warc.gz
|
CC-MAIN-2020-16
| 647
| 10
|