url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://greengabbro.net/2002/12/12/dilemma-part-2/
code
rock out to the apparatus I am completely out of clean underwear. This leaves me with two choices: Going commando would be much more fun, I reckon. That’s where my vote goes, anyway. Posted 12 Dec 2002 at 9:37 pm ¶ you wear underwear? Posted 13 Dec 2002 at 12:07 am ¶ (three-word label of the moon) “vanilla, canela crescent.” Posted 13 Dec 2002 at 12:15 am ¶ is your real name then, Jaime or Sammi(y), or mammy (your parents were al jolsen fanatics) Mtv should have done a “fan” on Lawrence Welk before he up’d and died… sorry mutherfuker. why do people die? Posted 13 Dec 2002 at 12:19 am ¶ I say go commando. Besides, it’ll only make it that much more fun if airport security decides they need to do more extensive searches of your person. Posted 13 Dec 2002 at 12:22 am ¶ James Brown the Healer Posted 13 Dec 2002 at 12:25 am ¶ I said James Brown the HEALER! …James Brown the witchdoctor Posted 13 Dec 2002 at 12:26 am ¶ I love myself at five in the morning, in the library, listening to Qawwali whilst writing a critical essay on form and code-switching in Native American poetics I really love me! Posted 13 Dec 2002 at 12:28 am ¶ Well, that makes me feel a bit better about my early-morning Abba habit. Posted 13 Dec 2002 at 7:59 am ¶ right on! tiger Posted 13 Dec 2002 at 2:57 pm ¶ Right on…! Eh… I love you! Your blog, that is. Thanks for the giggle. Expect some more hits from lil’ ol’ me. Posted 13 Dec 2002 at 3:50 pm ¶ Oh, and Chris – guess again Posted 16 Dec 2002 at 7:08 pm ¶ Posted 17 Dec 2002 at 9:52 pm ¶ Not even close. Posted 17 Dec 2002 at 11:17 pm ¶ c’mon it must have some phonological connection to Yami Posted 18 Dec 2002 at 12:39 pm ¶ Nah, I was three years old when I spelled my name this way. Any phonological connection is tenuous at best, but there are three letters in common. Posted 18 Dec 2002 at 2:46 pm ¶ Your email is never published nor shared. Required fields are marked * Notify me of follow-up comments by email. Notify me of new posts by email.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125532.90/warc/CC-MAIN-20170423031205-00406-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,032
41
https://discourse.codecombat.com/t/how-to-regain-health/4236
code
what items are available to have the ability to regain health during game Well, there are health potions in Kithgard Brawl, and in The Trials, collecting a set of mushrooms fully heals you. Senick, any wizard, and a paladin can heal you. Senick and the paladin have Heal built in, and a wizard can use Regen the Book of Life and Drain Life from the Unholy Tome. Also, I believe there are some items coming along that allow you to regenerate health.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481122.31/warc/CC-MAIN-20190216210606-20190216232606-00109.warc.gz
CC-MAIN-2019-09
448
3
https://www.gnome-look.org/content/show.php/Ice-Orange?content=71554
code
Ice_orange are pixamps theme, and you need to install pixbuf engine in order to use this theme. Ice -orange sports grayblue and orange color, to give accent on active things, it is little bit strange combination,so please try theme before you vote. Comments,suggestions,ideas are welcome. 9 years ago Version 1.0 First release Changed Button in panel properties from pressed state to normal.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189884.21/warc/CC-MAIN-20170322212949-00657-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
391
6
http://freecode.com/tags/mime?page=1&sort=updated_at&with=&without=438
code
Counters.pl collects the CLI counters from network devices and produces custom reports. These counters can be reset independently of the SNMP counters, and when collected weekly, can highlight issues such as connection errors that you will not see looking at graphs produced from SNMP counters. They also contain information that is not available via SNMP. The reports can be viewed on a Web site and/or sent via email. There is a flexible configuration language in which reports can be specified. The format and style of the HTML reports are controlled by Template Toolkit templates and CSS. Currently only Cisco network equipment is supported. Trojita is a Qt IMAP email client. It is a pure Qt4 application with no additional dependencies. It has a robust IMAP core implemented using Qt's Model-View framework. Standards compliance is a design goal. It has support for bandwidth-saving mode aimed at mobile users with expensive connections. In addition to the usual SSL/TLS connections, the server can be accessed via SSH. It has on-demand body part loading, offline IMAP support, and safe dealing with HTML mail (actually more robust than Thunderbird's).
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538110.1/warc/CC-MAIN-20140416005218-00521-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,158
2
http://lanyrd.com/2013/pycon/scdzbh/
code
Sunday 17th March, 2013 1:10pm to 1:40pm Stenographic technology has been locked down to expensive, proprietary hardware and software for decades, depriving the world of the most efficient text entry system devised to date. Plover, a free, cross-platform steno engine that works with $45 hardware, offers hackers and hobbyists the ability to type at up to 240 WPM in applications ranging from wearable computing to captioning to coding. Certified CART Provider (realtime captioner for the Deaf and hard of hearing), ASL student, and novice Python programmer. bio from Twitter Sign in to add slides, notes or videos to this session
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514314.87/warc/CC-MAIN-20181021181851-20181021203351-00023.warc.gz
CC-MAIN-2018-43
630
5
http://forums.xbox-scene.com/index.php?/topic/427648-xbox-psu/
code
1 reply to this topic Posted 01 August 2005 - 05:48 AM Hey guys my friend needs a Version 1.2 PSU and i dont have one Looking for a money order! Posted 01 August 2005 - 07:39 AM i have one 1.2 to 1.5 psu . but i need a 1.0 to 1.1 psu , if you have one would you trade ? the psu i have is a delta . if so who makes the 1.0 to 1.1 psu 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718303.21/warc/CC-MAIN-20161020183838-00308-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
404
7
https://golangexample.com/jumbler-file-name-encrypter/
code
What is Jumbler? Jumbler can password encrypt and decrypt a large number of file names. Because it only encrypts the file names, not their content, it is really fast! When to use Jumbler? If you have files that you want to protect but data encryption is not an option (too slow, limited permission). If you have an encrypted disk and you want to have an additional security layer. Using Jumbler prevents any exposure of information through directory listing. - 32 bit encryption, password protected - quickly encrypt/decrypt a large number of file names Disclaimers and Limitations of Liability THE SOFTWARE IS PROVIDED ON AN “AS IS” BASIS, AND NO WARRANTY, EITHER EXPRESS OR IMPLIED, IS GIVEN. YOUR USE OF THE SOFTWARE IS AT YOUR SOLE RISK.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334596.27/warc/CC-MAIN-20220925193816-20220925223816-00410.warc.gz
CC-MAIN-2022-40
745
8
https://wordpress.org/support/topic/some-articles-dont-link-when-added/
code
This is a really weird one and we’re going nuts trying to determine what the cause is. We have a theme we built but we’re not even touching the logic for URL rewriting. That’s all handled by WordPress itself. We’ll add an article and check some categories to apply it to and it will add and link correctly from the homepage, yet we’ll do the same thing for another post but this time the link generates and shows data on the homepage, but we cannot click through to the article itself. It’s coming up as a broken page. Any advice is appreciated. Thanks guys.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189031.88/warc/CC-MAIN-20170322212949-00080-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
570
3
https://alfiebarker.com/pages/about
code
Alfie is a writer and director from Leeds, UK. His first tv mini-series titled "PRESENT TENSE" that he directed, produced & edited was broadcast on BBC FOUR. Alfie has recently been selected for the BFI Northern Exposures Script LAB and previously for Creative England’s ShortFLIX. His most recent fiction short, I WAS 3 starring Katie Jarvis (Fish Tank) premiered at Sundance London Film Festival and was then chosen as a finalist as part of their Ignite Competition. Alfie is an alumni of the BFI Film Academy graduating from the National Film and Television School (NFTS) Talent Campus. Contact / email@example.com
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151866.98/warc/CC-MAIN-20210725205752-20210725235752-00610.warc.gz
CC-MAIN-2021-31
619
5
http://programmers.stackexchange.com/questions/tagged/character-encoding+sql-server
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Why do we need to put N before strings in Microsoft SQL Server? I'm learning T-SQL. From the examples I've seen, to insert text in a varchar() cell, I can write just the string to insert, but for nvarchar() cells, every example prefix the strings with the letter ... Jul 6 '12 at 14:47 newest character-encoding sql-server questions feed Hot Network Questions Why would spacetime curvature cause gravity? Hess's Law/Enthalpy of Formation problems? Calculate a tip Can someone please explain buffers to me? What? No error? How to respond to "Why shouldn't we hire you?" Why do we burn chametz instead of other ways of destroying it? Are the orcs of the D&D core canon not above eating sentient humanoids? Where it says longsword +3 and short sword +2, what does the +3 and +2 mean? Unable to call trigger on formula field Are hard links equivalent to Windows shortcuts? Why do some websites enforce lack of SSL? CSS z-index paradox flower Odd proof method Effect of Maariv being originally optional Is it OK to use while ((line = r.readLine()) != null) construct? What artist drew this image, that was used on the Warriors of the Eternal Sun Genesis Game (not about the game) How to screenshot BSOD ( blue screen of death ) Nonpaid, volunteering position in a lab What's flawed about the "save-the-input" method of reversible computing? Are airlines legally obligated to feed passengers without charging? Custome Object is not visible in report making option Effects of war on everyday life and adventuring Why are commerical flights not equipped with parachutes? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Overflow Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678663724/warc/CC-MAIN-20140313024423-00048-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
2,200
52
https://collegecrisis.org/team/addie-mcdonough/
code
Addie is a Data Collector on the research team for the College Crisis Initiative at Davidson College. Originally from Takoma Park, Maryland, Addie is a sophomore at Davidson College where she is an intended Political Science major and Religious Studies minor. Additionally, she is extremely interested in international relations and world history. Addie is currently the Vice President for the Davidson College Democrats and is a Chidsey Leadership Fellow for the class of 2023. In addition to her research position, she is a Gig-Hub Consultant at The Hurt Hub @ Davidson. This summer, Addie is a finance intern for Cal Cunningham’s Campaign for U.S. Senate. When she is not campaigning, studying, or researching you can find Addie cooking or playing club Lacrosse. - Email: firstname.lastname@example.org
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703507045.10/warc/CC-MAIN-20210116195918-20210116225918-00526.warc.gz
CC-MAIN-2021-04
807
2
https://www.cybrary.it/video/enterprise-network-authentication-part-1-of-2/
code
all right. Enterprise Network authentication. The idea of enterprise network authentication is to have a uniform authentication system. Uniformed log on system works all the way across your environment. If you do that, then you've got consistent rules. If you got consistent rules, you've got consistent security, so there's a number of ways to do it. Never Communication path Password, authentication, protocol chap eep all this stuff for one of the oldest authentication message and the problem with path as it works. But it passes the passwords back and forth in the clear the user names and passwords. So a chap is an improvement on that one, and that one uses hashes instead. Eep extensible authentication protocol is a protocol allows you to write protocols. basically, it's a It's a vindication framework, and it says, I've got this plug in that says, if you can write an end system and you can write the end sister rules for the user database, plug it into my extensive authentication protocol. Then it can work all the way across your network kind, like writing printer drivers into Windows. Windows has this master printer driver is always you can write to that then it could talk to the printers. Eep is most can be used anywhere if is primarily used in ah Enterprise Wireless those air protocols that can be used again, anywhere primarily used in network management. NT Land manager in T l m Anybody know where that's from? as old Windows programming. And the funny thing is, the new systems all the way up to Windows 2012 still have the option of going being backward compatible within. Tell him and I will go to the curb. Rose. Anyone know a curb? Roses? That's why he had the three headed dog here. Three of the dog that guards the entrance to Haiti's So M. I. T. Developed in authentication system. They called her Burrows guarding the three of the dog guarding right, and in P k I public he infrastructure. So password authentication protocol. Everything's in the clear. That bad uses hashes that's better. Rainbow tables have made Chap somewhat dicey because rainbow tables allow you to reverse ah hash and figure out what the password waas or extensible authentication protocols. Most of them are certificate based and that's the most secure way to do it. Radius, remote, authentication, dialling user service. Anybody want to guess how old this protocol is? Yeah. Ever since dialling modems, right? It still gets used today. Doesn't have to be the island modem. We use it over network. Still Ah, window supports. Radius by default is actually a radius server built into windows. Most other systems support radius uh, you can think it with shared secret or or encrypted passwords, but most of it's just north. Indication, you can do authorization, but a lot of its authentication only attack axe attack acts, plus the difference in tak acts attack acts. Plus is he uses TCP instead of UDP. It can be encrypted. And if you're using to support network authentication gear and network here, one of the things is difficult to do with network equipment like routers and switches is to give people granular access. What about me? Like granular access, access control. What level of access for things like cannon, right. If you use tact X plus you can actually enlist the commands they're committed to use. And those are the only commands that work, so you can set up accounts with tak acts and give people either help that's mobile access or engineering level access or root access, depending on what command you allow them to run through tak acts. Tak acts wouldn't be as popular as it is if it weren't for that feature. But because of that feature, Tak Ax Plus gets used a lot to manage network devices. Now we'll people will d'oh it for radius and Tak acts is they'll have a radio server or attack act server. And rather than make accounts for everybody, you can actually take those servers and point them to another server like an L DAP server. Anybody know when l'd APP Server Windows Active directory, Right. So the concept is, if you want to use tak acts and give people just certain privileges or just certain commands, they can run. But you don't wanna have a tack ACS database and a separate user database. What you do instead is you create all the user accounts over here. Let the tack acts machine query, and then by group here, you group all the same people together with the same privileges and you only give them certain commands. They can run that way. They use their windows log on, They get filtered by tak acts who are commands, they can run, and you haven't enterprise white system that does it. New Technology and Land Man's used in Windows 90 95 98 T when those 2000 networks, The reason this week is because what it did was they took a password and broke it into seven character chunks. So you maxim password Link could be 14. But is it easy to break to seven character passwords or 1 14 character password to seven? Some lot fewer options, a lot fewer possibilities to run to seven character passwords? when I was in right, It's not anymore. But for years when I was in in the 19 nineties, up to around 4000 and something, the military required eight character passwords. I think about that for a second. If you broke the 1st 1 into seven and then you had the eighth character to the eighth character had any complexity to the password at all? No, because he ate character. One. Run through the hash and you're done right It's gotta be one of the 255 characters, UH, 127 character options. So eight character passwords were really silly for Intel M. Ah, and tell him the Navy wanted to be, too, and telling me to is the one still being used now infused backward compatibility And they were actually even up through Windows 2003. They were actually enabled by default and Windows 2008. They're not enabled by default but can be turned on in Windows 2012 not enabled by default but can be turned on, and people were turned them on because they were running older operating systems. They only supported the earlier versions of authentication. and even today, some systems were still running using very, very old operating systems X, p or even earlier. If you're running those systems, you're running X, p or even something earlier. If you have to run it, your best solutions to create two domains. One domain can run the really, really old system so you can turn on and tell em with an occasion for those 25 or 50 or 100 machines, whatever it is and then another domain to support everybody that you're forcing into the more secure stuff because it's crazy can lower the standards and security standards for an entire base for the entire Air Force. Just a sport, a handful of old systems doesn't mean that it works that way. It doesn't work that way because I'm not sure what post the Air Force has taken, but that's definitely an option. So anti LM user request a section with server step to the server issues a random string of bites called a challenge to the client. The client encrypts to challenge with hash of the passwords, send the encryption back of the response server, decrypt the response with the official, has word and seize every matches so long as they matched the user. The panic. So this is Intel and authentication and curb Roses indication in terms of how it passes things back and forth. One of the tricks on this one is it incorporates a number of elements into the password. One of the password elements is time. It's important in Windows devices to have everybody running on the same clock. Every domain. Every domain has a built in time server. It's part of building a domain to build the time server automatically. The reason it's important to have a time server is if you're more than five minutes off from the domain control you're trying to authenticate to your passwords Conf Ale.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703496947.2/warc/CC-MAIN-20210115194851-20210115224851-00396.warc.gz
CC-MAIN-2021-04
7,844
112
https://www.freelancer.com/projects/linux/improve-development-release-process/?ngsw-bypass=&w=f
code
Would like to automate the process of building virtual machines and docker images. Looking for experience in Ansible or Chef automation tools. 1 freelancer is bidding on average $5 for this job I have Hands On Experience in System Admin, Linux, Chef Configuration Management, DevOps, Ansible. I Have Very Much interested in this Project .Please Let us Discuss Project in detail.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583087.95/warc/CC-MAIN-20211015222918-20211016012918-00483.warc.gz
CC-MAIN-2021-43
378
3
https://www.bmwcca.org/forum/index.php?threads/replace-cd-changer-w-hard-drive-system.1472/
code
Does anyone know of a product that will do this? A company called "Phat Noise" used to have a "Phat Box" product to accomplish this, but it has been discontinued and I have been unable to find another comparable unit. I don't want to have to hook an Ipod or mp3 player to hear music and would prefer a Hard Drive option that I can sync to my PC and download all my music once and for all. By the way I have a e39 (1999 540i). Thanks for any help you guys can provide.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882934.6/warc/CC-MAIN-20200703184459-20200703214459-00175.warc.gz
CC-MAIN-2020-29
467
1
http://www.thecatsite.com/t/73000/baby-oil
code
Remember Cliffie on "Cheers?" The mailman who was always pontificating about arcane information like the length of a whale's intestines? Well, I'm painfully aware that I have some of Cliffie's compulsion to share bits of information I pick up along the way. I know it's annoying, but I can't seem to help it. So here's what I feel compelled to mention, just in case it might save somebody from a difficult situation someday: Baby oil should not be used in the, uh, manner to which Fran refers IF a latex condom is involved. The oil can break down the latex and cause a failure. Now, lest you think that I, at my advanced age, am having a lot more fun than I actually am, let me clarify that this is something I heard on Oprah -- NOT knowledge gained from direct experience... ~ sigh ~
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187144.60/warc/CC-MAIN-20170322212947-00227-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
784
5
https://old.strong-game.com/case-studies-project-kickoff/
code
Willow has two goals, the first is to create an environment where her team can get to know one another and get comfortable enough with each other that they can engage in meaningful, difficult conversations. Willow’s second goal is to generate awareness of why the project is so important, and what problems they need to focus on. He needs his team to pull together more. Willow creates ice breaker questions designed to have team members reflect and share stories regarding previous projects they worked together on. The reason behind choosing these questions is to bring out commonalities amongst her project’s stakeholders, creating bonds below the surface that will last at least for the term of the project. By using the ice-breaker and trivia questions, Willow created an environment where her team members could chat with one another about previous projects they worked on. They got to know one another and the project in far more detail. The survey questions were illuminating for Willow, as they provided her some insight on how members of her team felt about the project value, timelines, and overall direction. By gamifying the content Willow could see instant deeper connections in her team. People used to struggle remembering each other’s names but that was a thing of the past after using the Strong Game. By gamifying the content Willow could see instant deeper connections in her team. People used to struggle remembering each other’s names but that was a thing of the past after using the Strong Game.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817073.16/warc/CC-MAIN-20240416062523-20240416092523-00862.warc.gz
CC-MAIN-2024-18
1,526
6
http://www.manuals365.com/swf/fuji+xerox/860nsg.html?page=26
code
Phaser 860 Color Printer Changing the Printer’s Name (Optional) The name is displayed on the Startup Page and Configuration Page. The name also appears in the Chooser. The name can be up to 31 characters long. It may contain any printable characters; however, the characters @ : = * are deleted from the name used on AppleTalk. A change is persistent across printer power cycles. Using Apple Printer Utility Locate the Apple Printer Utility, included on your printer’s CD-ROM. Double-click the Apple Printer Utility icon to display the Printer Selector window. Select the zone (if applicable) and the printer. Click Open Printer. A dialog box is displayed containing Printer Information and Printer Preferences. Click the triangle to the left of Printer Preferences. Click the triangle to the left of Name; this displays a dialog box containing a field for the printer’s name. Type the new name in the field. Open the Chooser to reselect the printer with its new name. Using CentreWare IS Connect to the printer via CentreWare IS (see page 23). From the main CentreWare IS page, click Properties. In the Protocols group on the left side of the screen, click EtherTalk. In the Printer Name field, type the desired printer name. Click Save Changes at the bottom of the page. Notes Regarding Duplicate Printer Names on a Network If you have more than one printer in the same zone and you choose a name for one printer that is already assigned to another, the second printer registers itself on the network with the number 1 appended to the name. For example, if you attempt to assign a printer the name Xerox and another printer in the zone already has the same name, the printer you are naming appears on the network as Xerox-1. The added number is recalculated each time the printer is turned on. If you have more than one printer with the same name on the network, the printers’ names on the network depend on the order in which the printers are turned on. To avoid this confusion, it is recommended that you assign each printer on the network a unique The added number is displayed in the Chooser, on the printer’s front panel, and on the Startup Page. On the Configuration Page, the name, without the characters @ : = *, and with the added number, appears in the EtherTalk area. The Printer Name under General Information is the name as it was set, not as it is displayed in the Chooser.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886860.29/warc/CC-MAIN-20180117082758-20180117102758-00378.warc.gz
CC-MAIN-2018-05
2,399
36
https://forum.bugsounet.fr/topic/408/alarm-clock
code
Alarm Clock using Google Assistant. Module which will send any command to google assistant at specific time. Like your Welcome module but instead on start of mirror at specific time. Set up time by voice command “OK google set up alarm at 9 o’clock” and in config you can setup what should happen at that time. For example: “Play radio” using your radio recipes.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663016373.86/warc/CC-MAIN-20220528093113-20220528123113-00207.warc.gz
CC-MAIN-2022-21
372
1
https://docs.devstream.io/en/latest/development/dev/dev-env-setup/
code
Development Environment Setup¶ OK. So you want to get started with Golang/Kubernetes development. You've come to the right place. Read on. 1 Install Golang¶ Head to the official website and click the "Download" button: Make sure you select the correct package according to your operating system and processor: For Apple macOS users, click the apple logo in the menu bar, and choose "About This Mac" to check your chip: 2 Install Kubernetes¶ The easiest way to run a Kubernetes cluster locally is to run it in a Docker container. 2.1 Install Docker¶ Head to the official website and click the download button: Again, please pay attention to the operating system and processor options. For Apple M1 mac users, choose the "Apple Chip" option. To check what processor you have, see the previous section in "About This Mac". After installation, make sure Docker is up and running. 2.2 Install Minikube¶ Minikube is local Kubernetes, focusing on making it easy to learn and develop for Kubernetes. All you need is Docker (or similarly compatible) container or a Virtual Machine environment, and Kubernetes is a single command away. Note: there are other tools which can install a local K8s, such as kind, etc.; here we choose one of the most famous tools that is minikube as the demo. First, go to the official website of minikube, choose the right OS and architecture (again,) and download/install: Alternatively, if you are using Homebrew (if you don't know what it is, ignore this line,) you can simply run brew install minikube. Go to Kubernetes' official documentation website and follow the guide to install kubectl. Choose your operating system: Again, for macOS users, if you are using Homebrew package manager, you can install kubectl with Homebrew: 2.4 Start K8s¶ Note: if you would like to set Docker as the default driver for minikube, you can run: Then next time when you want to start minikube, you can simply run minikube startwithout the 2.5 Check K8s Status¶ minikube status, and you should get similar output: kubectl get node, and you should get similar output: OK, now you have Golang and Kubernetes ready locally. Start coding! 3 Contribute to DevStream¶ and start from there! For example, you can try a local build: Or, maybe you would like to have a go with it first? Check our quickstart guide. Happy hacking!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00155.warc.gz
CC-MAIN-2023-40
2,335
34
http://sourceforge.net/directory/graphics/graphics/3dmodeling/license%3Amit/?page=3
code
- License: MIT License × Showing page 3 of 3. VASE Plugin Interface Whiteboard. This plugin (.dll) renders a whiteboard in the VASE 3D environment. Avatars on a LAN can interact with the whiteboard.0 weekly downloads A structure from motion library. Suitable for reconstructing sparse (and someday dense) point clouds from images and video. Similar to Microsoft's Photosynth.0 weekly downloads Rendering of 2D and 3D Celtic Knots19 weekly downloads
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931010590.31/warc/CC-MAIN-20141125155650-00081-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
449
5
https://github.com/bibliographygenerator/chatgpt_plugin_bibliography_crossref
code
Ever wished your AI could talk science without making stuff up? Now it can! We're using the power of GPT-4 Plus and a tool called Crossref to make sure your AI speaks real science, not science fiction. With our tool, GPT-4 Plus doesn't just guess or make up scientific references - it pulls them from Crossref, a massive database of real scientific articles and papers. So, when you ask about a scientific topic, you get accurate, reliable information, complete with real DOI numbers. Plus, with Zotero, you can save and manage all the cool scientific discoveries you find. Ready to make your AI speak real science? Join us and turn your AI into your personal science expert! We're not just making research easier; we're democratizing knowledge. Join us in this revolution to make science accessible to all! - Access to the ChatGPT web interface where plugins can be added. Access the Plugin Management Section. Navigate to the section of the ChatGPT web interface where you can manage plugins. Add a New Plugin. Click on the 'Add Plugin' button. Enter the Plugin URL. In the field provided, enter the URL of the bibliography plugin: Confirm Addition of the Plugin. Click the 'Confirm' button to finalize the addition of the new plugin. Test the Plugin. Once the plugin is added, it should be available for use with ChatGPT. Test it by initiating a conversation related to bibliography or citation search. Now, you can ask ChatGPT to find publications for a topic, suggest DOIs or save publications to your Zotero project. You can try the Bibliography Generator Plugin API without access to ChatGPT here: The OpenAPI manifest YAML can be accessed here: For further information, contact firstname.lastname@example.org.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817073.16/warc/CC-MAIN-20240416062523-20240416092523-00023.warc.gz
CC-MAIN-2024-18
1,717
15
http://wkraju.xyz/archives/8336
code
Novel–Dragon King’s Son-In-Law–Dragon King’s Son-In-Law Dragon King’s Son-In-Law Chapter 736 flesh distance It turned out already large media if a few Nascent Heart and soul Kingdom cultivators designed the assortment development for Ethereal Summit . This time, it was actually Soul Formation World cultivators who are operating the collection development! It had been ingesting a lot of religious plants and elixir drugs everyday, the ones tools brought it loads of positive aspects . Though it was only a degree 5 snowfall lion, its figure was very much like those of a level 6 snow lion! When Hao Ren discovered just how the fantastic s.h.i.+eld dashed away out of the blue, he was actually a tad astonished . After some a lot more believed, he seen that he couldn’t command or safeguard the fantastic s.h.i.+eld together with his current toughness . Hao Ren put his fretting hand into his diamond necklace in order to discover one thing beneficial, but he pointed out that there wasn’t whatever that was former . For that reason, he pretended to keep relax and presented them two demonic cores . “Thank you so much, Become an expert in!” The two Soul Growth Kingdom cultivators who had been position in the front gotten to out for your demonic cores in thrills . Hao Ren experienced used six stage 10 demonic cores out of the Demon Water . He provided Minor White one and had now provided two on the Soul Creation World cultivators . There were about three eventually left, and this was adequate . The weather on the area was finding frosty as winter season approached, so Zhao Yanzi got already changed into her winter months uniform that has been more athletic in comparison to her outfit standard . On the other hand, the newest consistent failed to minimize how lively she checked . She was just like a violet flower that sprouted by way of rocks, exhibiting her younger years and energy . The skies darkened, but the five-coloured G.o.dly mild lighted it . It had been much like a vibrant pillar of light, piercing onto Sixth Paradise and Seventh Paradise . Under the power of the Spirit Formation Kingdom cultivators, the dark colored ashes experienced all melted in the ground, altering the ten amount 6 spiritual herbs about the Seven-Key Five-Colour Lotus Plant seeds into 100,000-year or so-old divine herbs! Hao Ren produced a part of sword energies on the entrance so that he could quietly cultivate as part of his cave . The gold s.h.i.+eld obtained spun returning to Hao Ren, and also it was now filled with nature fact . The skies was darkening, and Zhao Yanzi was famished given that she acquired developed for the majority of the time . She went interior her cave house to discover a little something to consume there was clearly nothing she could do today to help . Hao Ren couldn’t convey to whether she was holidaying or creating on 5th Heaven . Two demonic cores would for sure build huge surf on Seventh Paradise, and perhaps the energy structure on 7th Heaven would even adjust as a result! hocus pocus crocs The Lu sisters looked over each other, plus they appeared to experience a good deal on his or her heads . They organised hands and moved into their cave together below the brilliant actors inside the sky . The heavens was darkening, and Zhao Yanzi was ravenous considering that she got developed for many of the day . She happened to run on the inside her cave abode to discover a little something to have there had been almost nothing she could try to support . The five Spirit Creation Realm cultivators all nodded with honor and stepped on their own particular treasures, soaring clear of Ethereal Summit . Whoos.h.!.+ Zhao Yanzi flew out of her cave house while grasping a lot of treats . The weather conditions within the area was getting cold as winter time handled, so Zhao Yanzi experienced already switched into her winter season uniform which had been much more fitness when compared to her dress standard . Having said that, the revolutionary uniform did not minimize how lively she looked . She was for instance a blue colored floral that sprouted through stones, showing off her youngsters as well as . These cultivators have been the ideal cultivators on Seventh Paradise, and they also possessed not been collaborating together with other cultivators for several years . Even so, that they had to focus a bunch of their strength using a highly collaborative task this point . Just after getting to very best-tier Main Structure World, she could shoot out five stars from her Major Dipper Constellation Browse . Now, she got just two chapters still left to review well before she could use the previous two strategy, Kaiyang and Yaoguang . For a second, the character basis level all around Ethereal Summit got already surpa.s.sed that of Seventh Heaven! These five Heart and soul Growth Realm cultivators were actually sensation wronged given that they didn’t are aware that it may well consider a lot of their powers to arrange this selection development . The fantastic s.h.i.+eld obtained considered its vengeance on them by spitting out a number of black colored ashes of divine herbs which had been 100,000-calendar year-aged, additionally they was required to use a few a great deal of their cultivation sturdiness to melt the ashes . The Crimson Eco-friendly Jewel Sword underneath her toes just let out a brilliant blue lightweight, and she also searched even more energised than ahead of . Ultimately, the great s.h.i.+eld flew up in the heavens and allow out wonderful signals . All it ever wanted was to be with a formidable cultivator, but now it was actually ignored! Even Small White-colored despised it! Regardless of what realms these people were at, the cultivators on Fifth, Sixth, and 7th Paradise had the ability to start to see the gentle pillar . For just a moment, the character essence high intensity about Ethereal Summit experienced already surpa.s.sed those of 7th Paradise! “Best wishes to Modest Zhumu for successfully attaining a discovery!” Lu Linlin and Lu Lili walked up with a grin . Increase! Thrive! The G.o.dly signals in five colors rushed toward the skies . For just a moment, the nature basis intensity approximately Ethereal Summit had already surpa.s.sed those of 7th Heaven! The cultivators of the several sects near Ethereal Summit rushed to develop given that they didnt need to let go of this once-in-life-time chance! The 5 Spirit Formation Kingdom cultivators were surrounding the psychic discipline . They each waved and migrated both of your hands, and sweat began to show up on their foreheads . To take care of this nature basis focus collection growth, they will have to keep a fine equilibrium with the mother nature fact from the array development . Because each one of them provided all this they had simply because want to impress Hao Ren, they had to drive themselves extremely tough even though they ended up Heart and soul Formation Realm cultivator . These cultivators were actually the most effective cultivators on 7th Paradise, and in addition they possessed not been collaborating with other cultivators for quite some time . On the other hand, that they had to concentrate their very own energy at a highly collaborative process this time around . These strong vitality variation startled the Nascent Heart and soul World cultivators on Sixth Paradise . Even so, all those cultivators were all stunned and unsure of how to proceed when they realized that five Heart and soul Development Realm cultivators had been sustaining an collection structure in Ethereal Summit . It turned out already big information if a few Nascent Spirit Realm cultivators made the assortment development for Ethereal Summit . This time around, it was Heart and soul Structure Kingdom cultivators who were working the variety structure! Bam! Zhao Yanzi who had been in the light blue school standard flew out of her cave abode for the Crimson Natural Value Sword . She was in an important second and didnt determine she could crack by . Unexpectedly, she experienced the mother nature fact from the valley was growing dramatically, so she immediately targeted trickier on cultivation . Finally, she could arrive at very best-tier Key Structure World effectively! The Purple Natural Value Sword underneath her feet simply let out a bright blue lightweight, and she also appeared a lot more lively than ahead of . The weather in the city was having ice cold as winter season approached, so Zhao Yanzi possessed already changed into her winter season standard that has been even more fitness when compared with her apparel standard . Having said that, the revolutionary consistent failed to lessen how enthusiastic she searched . She was similar to a blue plant that sprouted by stones, exhibiting her younger years as well as . When she found the five cultivators from the valley, she became a little astonished . Great job to Compact Zhumu for effectively hitting a development! Lu Linlin and Lu Lili went on top of a grin . Yeah! I made a cutting-edge! Zhao Yanzi claimed happily . Immediately after reaching best-level Key Structure Kingdom, she surely could capture out five actors from her Huge Dipper Constellation Browse . Now, she got just two chapters left to examine ahead of she could use the final two procedure, Kaiyang and Yaoguang The atmosphere was darkening, and Zhao Yanzi was famished considering the fact that she had cultivated for many of the time . She went in her cave house to find a little something to enjoy there was clearly absolutely nothing she could because of guide . These five Heart and soul Development Realm cultivators ended up yelling in discomfort in . That they had believed that it may be simple to perform this selection creation . Not like what they predicted, this selection growth was one expected a long time and lots of effort, and so they couldnt prevent once it was subsequently begun . These were Spirit Formation Kingdom cultivators, so they could actually make use of the the outdoors substance about the crooks to experience the ideal benefits . Nevertheless, by using the aspect basis from the surroundings, they still needed to use their unique aspect fact . Though it required a cost on his or her physiques, their lifespans wouldnt reduce . Nonetheless, given that they were wanting their very best, people were working with many characteristics basis, and they also would still will need to go into seclusion farming for a long time if they returning . Whoos.h.!.+ Zhao Yanzi flew out from her cave abode while holding a number of snack food items . Sister Linlin, Sibling Lili, Sister Yujia, come around and follow a bit! Zhao Yanzi claimed as she place the foodstuff on the gra.s.s . When Xie Yujia read Zhao Yanzi phoning her by her identify, she smiled sweetly . Hao Ren noticed that they had settled their variations, so he smiled gladly . Granddad, you must appear around way too! When he listened to Zhao Yanzi calling him, Hao Rens grin froze . Tiny Bright was relaxing inside of a recognize more from their store, nonetheless it immediately went through . Its stomach area was harm through the Mystic Sound Factions Soul Creation Realm cultivators value, along with the fur on its abdomen was somewhat burned . Having said that, it was actually not necessarily wounded . It was having a number of divine plants and elixir products on a daily basis, as well as those assets brought it a great deal of benefits . Whilst it was just a point 5 snow lion, its figure was similar to that of a level 6 snowfall lion! Zhao Yanzi sat on the gra.s.s and pulled Hao Ren up to her part . She had stashed a great deal of meal during the cave . There were lots of different french fries, crackers, dried up fresh fruit, canned foods . Hao Ren couldnt explain to whether she was holidaying or developing on Fifth Paradise . The 5 Heart and soul Structure World cultivators observed them as they quite simply sat around the gra.s.s along with a picnic, and they also didnt feel that fantastic about this . Nevertheless, Hao Ren was someone of a higher reputation than them to allow them to couldnt utter anything of difficulty! Hello, Uncles and Aunt! Do you want to feed on along with us! Zhao Yanzi waved a handbag of french fries within the air and inquired the five Heart and soul Growth Realm cultivators . This almost created them spat out our blood . These people were like kings on Seventh Paradise but had been nothing at all here at Ethereal Summit on Fifth Paradise . The skies darkened, even so the five-pigmented G.o.dly lighting lighted it . It turned out like a decorative pillar of gentle, piercing onto 6th Paradise and Seventh Paradise . Regardless of what realms these people were at, the cultivators on Fifth, Sixth, and 7th Heaven had the ability to begin to see the mild pillar . Bam! The Heart and soul Formation Realm cultivators had ultimately dissolved the dark colored ashes on the psychic herbal remedies, and in addition they obtained finally ceased at the same time with perspire leaking down their foreheads . Soon after fifty percent daily of working hard, a couple of modest sprouts peaked through the black ground . Master… The 5 Spirit Growth Kingdom cultivators place their palms together and bowed they did that ahead of they even cleaned the perspire off their foreheads . Xie Yujia and Zhao Yanzi got returned to their own individual cave abodes to grow so that they could leverage the large character essence strength on Ethereal Summit . Hao Ren, however, was relaxing cross-legged with a rock and roll from the valley with Lu Linlin and Lu Lili by his facet . Hao Ren was possibly the only cultivators between 5th Paradise and 7th Heaven who can make Heart and soul Structure World cultivators operate so difficult Less than the power of the Soul Structure World cultivators, the black ashes experienced all dissolved into the garden soil, modifying the ten stage 6 psychic herbal plants round the Seven-Key Five-Color Lotus Plant seeds into 100,000-12 months-classic spiritual natural herbs! Since these religious plants went from 10,000-year-old for the same as 100,000-season-aged, the effects of the Seven-Central Five-Shade Lotus was increased by a lot of occasions . If this werent for your great s.h.i.+eld that spat out plenty of dark-colored ashes, this approach could be somewhat faster . According to the unique setting with the collection growth, it may well consider only four a long time for Nascent Soul Kingdom cultivators . Now finding these Spirit Formation Realm cultivators looking at him with antic.i.p.ation, Hao Ren didnt know what to do . He originally desired the five Heart and soul Development Realm cultivators to work for free simply because they infected him on 7th Heaven . Since he found these Spirit Structure Kingdom cultivators considering him like kids taking a look at grownups, he pointed out that he was only benefiting from his relatively elderly status, If he didnt let them have a single thing in return, it could search bad on him . These five Spirit Structure World cultivators were definitely feeling wronged since they didnt are aware that it would get a lot of their powers to put together this selection growth . The gold s.h.i.+eld possessed considered its vengeance about them by spitting out a handful of black colored ashes of religious herbal treatments which were 100,000-year-outdated, and they also was required to use a few several years of their cultivation power to burn the ashes . Consider those two level 10 demonic cores . Hao Ren get his fretting hand into his pendant in order to locate some thing valuable, but he seen that there wasnt something that was prior . As a result, he pretended to stay sooth and presented them two demonic cores . Anything they managed to divide the 2 main demonic cores amongst five cultivators was their trouble, not Hao Rens . Thanks, Excel at! Both the Soul Creation World cultivators who are standing upright in the front achieved out to the demonic cores in enthusiasm . He certainly is the sibling of Zhen Yuan Immortal . He wouldnt simply have one demonic center! He just casually presented us two point 10 demonic cores! they thinking . I dont want anyone to appear and hassle Ethereal Summit, Hao Ren said while displaying a solemn face . The 5 Soul Development Realm cultivators all nodded with consideration and stepped in their respective treasures, flying faraway from Ethereal Summit . Hao Ren obtained consumed six stage 10 demonic cores from your Demon Seas . He presented Minimal Bright one and had now given two into the Heart and soul Structure Realm cultivators . There had been about three remaining, and that was ample . As they do assist Hao Ren, Hao Ren paying back all of them with two demonic cores solved prospective issues . Hao Ren really didnt value the demonic cores, even so the demonic cores have been priceless to such Soul Growth Kingdom cultivators . Two demonic cores would definitely produce massive waves on Seventh Heaven, and maybe the strength structure on Seventh Heaven would even alter as a result! The fantastic s.h.i.+eld acquired spun straight back to Hao Ren, and yes it was now packed with character heart and soul . Since Spirit Formation Kingdom cultivators didnt get it, it may only be determined by Hao Ren . Go! Hao Ren photo out a sword strength which reach it on top and moved it back some yards . The glowing s.h.i.+eld flew in to the atmosphere . If it saw Small Bright white who has been with the snowfall lion cubs, it flew toward it . Even so, Very little Bright white dismissed it too . As soon as the wonderful s.h.i.+eld flew onto the leading of Minor White colored, Little Bright white would turn around in reaction . Ultimately, the golden s.h.i.+eld flew up into your heavens and just let out gold lighting fixtures . All it ever sought was to be with a robust cultivator, however it was subsequently ignored! Even Minimal Bright despised it! The fantastic s.h.i.+eld just let out glowing lamps and was organizing a tantrum inside the atmosphere . Its intelligence was the same as those of slightly youngster . Puff! The wonderful s.h.i.+eld all of a sudden spat out black color blood onto Small White colored . Small White was incapable of dodge, also it was dealt with in black blood flow . Whoos.h.!.+ The fantastic s.h.i.+eld was very irritated, so it charged from the variety structure of Ethereal Summit . When Hao Ren spotted the way the great s.h.i.+eld dashed away out of the blue, he had been a tad shocked . After a little much more believed, he discovered that he couldnt management or safeguard the wonderful s.h.i.+eld along with his up-to-date power . Little White-colored looked up in uncertainty as well it didnt anticipate the glowing s.h.i.+eld to leave . The assortment creation had kept in the character fact, as well as powers of the Spirit Formation Kingdom cultivators were still lingering all over . Hao Ren sighed a tad and grabbed Very little Bright white before soaring toward his cave . It had been already night time on 5th Paradise . They would firm up their realms now and get back on ground in the morning . The Lu sisters checked out the other, additionally they seemed to experience a whole lot with their heads . They retained hands and fingers and came into their cave together under the vibrant superstars in the sky . The Seven-Main Five-Color Lotus Seed was rising carefully . On the other hand, additional psychic natural herbs developed rapidly within the nutrition of your dark-colored ashes . Hao Ren published a level of sword energies in the entrance in order that he could quietly enhance in the cave . The night acquired pa.s.sed, along with the heavens was illuminated up via the Sunshine . Hao Ren exhaled deeply and searched down at Small Whitened that has been by his toes . Huh… d.a.m.n! Hao Ren instantly jumped up . Minor Whitened was not anymore curled up by his lower body it was a loli! Bam! The Spirit Formation Realm cultivators had eventually dissolved the dark colored ashes in the faith based herbal remedies, plus they acquired at last ended at the same time with perspiration dripping down their foreheads . Below the strength of the Heart and soul Creation World cultivators, the black color ashes got all melted into your soil, altering the ten amount 6 religious plants round the Seven-Main Five-Colour Lotus Plant seeds into 100,000-year or so-classic divine natural herbs! She had stashed quite a lot of food within the cave . There were clearly lots of different french fries, crackers, dried out fresh fruits, processed foodstuff . Xie Yujia and Zhao Yanzi experienced given back for their respective cave abodes to enhance to ensure that they could take advantage of the higher characteristics basis intensity on Ethereal Summit . Hao Ren, conversely, was sitting go across-legged on a rock inside the valley with Lu Linlin and Lu Lili by his side . Small Bright white was relaxing in the area even more from their website, nevertheless it immediately happened to run above . Novel–Dragon King’s Son-In-Law–Dragon King’s Son-In-Law
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710155.67/warc/CC-MAIN-20221127005113-20221127035113-00071.warc.gz
CC-MAIN-2022-49
21,192
39
https://www.weave.works/blog/gitops-pipeline
code
Build a seamless GitOps pipeline with Flux CD Get a good idea of what a GitOps pipeline looks like, how it differs from a CI/CD pipeline, and why Flux is central to a GitOps pipeline. GitOps is a set of principles for you to implement continuous deployment for cloud-native applications using Git as a single source of truth. With GitOps, you treat everything, including infrastructure, as source code and store it in Git. GitOps lets you automatically deploy code as soon as it is committed to a Git repository. Here are some of its benefits: - It offers a developer-centric approach - It promises high reliability with faster error recovery - It gives you complete visibility - It greatly increases your productivity When adopting GitOps in any organization, it takes setting up a GitOps pipeline that is different from a more traditional CI/CD pipeline. Modern cloud-native tools make up this new pipeline. In this post, we list the most vital tools that makeup a GitOps pipeline. We also discuss the practices that go along with these tools, which is sometimes more important than the tool itself. The list is not meant to be exhaustive but is a good indicator of the leading GitOps tools today. 1. Git Management Online Git hosting platforms are vital to GitOps as they enable you to not just store your code but also make it easy for teams to collaborate around these cloud-hosted repositories. They manage changes to repositories, store a version history, and are built to deal with complex branching of repositories. Here are the two most popular Git tools: GitHub needs no introduction as the leading Git tool in use today. Originally viewed as a place to store open source code, and external software components, GitHub has been making its way to internal software pipelines, and particularly in GitOps pipelines. It brings useful features like issue tracking, code review, and general code management. Git’s branching system revolutionized software development about a decade ago, and today that feature is still highly useful in structuring GitOps workflows. Other alternatives to GitHub include BitBucket, and GitLab. Some may believe that if they’re using a tool like GitHub, they’re automatically following GitOps practices. However, this is far from the truth as the rest of this list shows. It takes a lot more than a Git tool to practice GitOps. 2. Container Registry A container registry allows you to store all the information, files, and components of an application in the form of container images. Container images are used as templates to scale application development quickly. These container images must be stored in a secure and shareable registry. Docker Hub is a cloud-based registry service that is used to store, retrieve and share container images with your team. Upon integration, Flux can automatically scan and download container images from a registry, make changes to the image (eg. change version tags), and deploy the image to a production cluster. Other popular container registries include the ones from the cloud vendors like AWS Elastic Container Registry (ECR), or Google Cloud Container Registry or even DIY. 3. A GitOps Agent This is arguably the most important part of a GitOps pipeline. And the leading GitOps agent today is Flux CD. Once code is committed to Git, a GitOps agent like Flux CD takes over to run automated steps and move the code down the supply chain. Flux is an incubating project at the Cloud Native Computing Foundation that ensures the state of a cluster matches the configuration in Git. It forms a complete Continuous Delivery platform that enables application deployment. It works with all Git providers and various container registries and can be seamlessly integrated with other automation tools as well. 4. Kubernetes Configuration Automation One of the core principles of GitOps is the automated application of desired changes across the pipeline to match the single source of truth described in Git. To ensure effective automation Flux uses Kubernetes automation solutions. Helm helps you manage Kubernetes applications using a packaging format called charts. A chart comprises descriptive files of pre-configured Kubernetes resources. These charts are stored in Helm Repository, and from here you can share the resources details of the applications with your team. Helm is built with a pluggable architecture, allowing a declarative management tool like Flux to use its Helm Controller and take advantage of the Helm SDK. As a package management solution, Helm streamlines Kubernetes application deployment. Flux doesn’t stop with Helm, but also leverages Kustomize to further automate and customize configuration changes for Kubernetes. Kustomize can be defined in simple terms as a pipeline for infrastructure. Kustomize keeps a base layer of a resource like a Helm Chart, which remains unchanged, and then adds multiple patch layers that customize the base layer. The advantage of this is that when Kustomize needs to be updated, only the base layer is updated, and the customizations in the patch layers are not lost and need not be reconfigured. This is a way to manage Kubernetes configuration at scale. Kustomize leverages plain YAML files, which means it is very simple to learn and use. Flux includes a Kustomize controller to manage continuous delivery pipelines for Kubernetes. 5. Progressive delivery Progressive delivery uses a phased out deployment strategy to limit the impact of failures on end users. With GitOps, the leading progressive delivery tool is Flagger. It is easy to integrate Flagger with Flux and manage really complex deployments. Flagger enables you to automate canary deployments, measure performance metrics, and implement flexible traffic routing. It primarily ensures that any change made in Git is deployed selectively in a series of steps. Flagger integrates with service meshes like Linkerd, Istio, App Mesh, and Contour to manage traffic shifting during canary deployments, A/B testing and blue-green deployments. Importantly, Flagger also supports rollback of bad changes that can break a system. Sometimes this rollback happens so fast that Admins only find out after the rollback that there was a very brief failure. This is the kind of ideal scenario a well-setup GitOps pipeline can enable. 6. Monitoring tools Once a GitOps pipeline is set up, and deployments are happening, it is vital to monitor every step of the pipeline for bugs, errors, latency, and security risks. This requires robust monitoring tools. Prometheus & Grafana Prometheus is the leading time-series monitoring tool, and Grafana is the leading visualization tool in the cloud-native space today. Flux leverages these powerful solutions to enable state-of-the-art monitoring for GitOps. Prometheus is able to pull real-time performance metrics from all Flux controllers such as Helm Controller, and Kubernetes API. These metrics are queried by Grafana where they can be visualized in the form of dashboards. This dashboard, for example, shows the number of cluster reconcilers, failed reconcilers, Kubernetes manifest sources, and more. Grafana can also generate alerts if a reconciliation fails. These metrics are essential to assess the status of deployments, and make decisions in real-time. We hope this post gives you a good idea of what a GitOps pipeline looks like. As you probably noticed, a GitOps pipeline is quite different from a more traditional CI/CD pipeline. Both pipelines have the same goal of moving code from Dev to Production in the fastest way possible, but they take different approaches. A GitOps pipeline is very Kubernetes-centric, leveraging various open source tools like Helm, Kustomize, and Flagger. Another point to note is that Flux is the most important piece of a GitOps pipeline. It integrates with every other tool and pretty much brings together the entire GitOps pipeline. It automates various activities that are usually done manually, and delivers great control to tweak and customize to any extent. If you would like to learn more about Flux in a hands-on workshop, join the Weave Online User Group events. Finally, if you’re looking for a readymade GitOps pipeline that allows you to completely skip the integration and setup phase, look no further than Weave GitOps. It comes with all the tools mentioned in this post by default, or makes them available as plugins. There are two flavors - Weave GitOps Core (here is even a quick getting started guide), which is the open source option and an opinionated wrapper around Flux, and Weave GitOps Enterprise, which comes with all the bells and whistles such as team workspaces, RBAC, and more. If you’re looking to adopt GitOps, a GitOps pipeline is indispensable. Now you know which tools make up a GitOps pipeline, and how to get started the easy way.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100677.45/warc/CC-MAIN-20231207153748-20231207183748-00742.warc.gz
CC-MAIN-2023-50
8,846
41
https://www.youtube.com/user/orismology
code
For a (competitively) small patch surrounding part of the Eyre highway in southern Australia, time isn't quite as you would expect... During Summer time, CWST (or Eucla time) follows the pattern of WA and avoids daylight savings, making my actual time jump from SA 1 hour and 45 minutes - still better than 2:30! They did actually trial daylight saving time in WA around 2013, and Eucla time followed their example, but ultimately both timezones have ended up at their current UTC offset year-round. More like this hopefully coming soon! Subscribe or follow for updates.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827963.70/warc/CC-MAIN-20181216165437-20181216191437-00040.warc.gz
CC-MAIN-2018-51
570
3
https://www.danvy.tv/mixed-reality-artificial-intelligence-devoxx-2019/
code
Thank you for attending the Devoxx France conference. I hope you enjoyed the Mixed Reality & AI session. As promised, here is all the content used during the session and some pointer to start experimenting with Hololens and AI right now, even if you don’t own a device. Augmented Reality is a thing, Mixed Reality is another world. Add some Artificial Intelligence inside, you’ll get a futuristic solution right now. Just like what Robert Zemeckis and Bob Gale described in Back to the future. We’ll build an app for Hololens that leverage AI from the cloud to help the user to identify what’s around him. You’ll see what Hololens and AR can do, how to create a Mixed Reality app and how an app can quickly get some killer features using Azure Cognitive Services. Where & when ? During Devoxx 2019 at Palais des Congrès de la Porte Maillot à Paris, room “Paris 243” on Friday 19th April 2019 at 16:45. Hi there, I’m a cloud engineer & developer advocate at Microsoft R&D. I works with, help and teaches developers across the continent on cloud and open-source technologies. Before joining R&D, I helped large corporations and startups creating user-friendly apps & services and helping build teams behind these services. I used to be an engineering lead at Deezer, a WW music streaming service. Developer on the Windows platform including Windows Mixed Reality Holographic and Immersive. Working with Education partners and Software developers. Human|Robot? DaftPunk! I’m a French guy working @Microsoft #IoT addict, software lover, technology enthusiast #cloud #ai #ar & #food
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057371.69/warc/CC-MAIN-20210922163121-20210922193121-00044.warc.gz
CC-MAIN-2021-39
1,597
9
https://www.linuxquestions.org/questions/linux-software-2/mic-problems-with-ventrilo-wine-just-need-help-getting-the-mic-on-675912/
code
I am running Fedora 8 and utilized the link below to get it to work. I know others used it with diff distros to get it working also. Now if you have already done this, double check to see that you are using the right mic input (usually have 2 one on front header and another from output of card). Also check to see if Mic Boost is enabled and as you already mentioned capture enabled. while running Vent, the Vent window must be active/foreground in order to toggle the mic. It will not pick up the mic PTT key if in background. (if someone found a fix for that, please let me know)
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118552.28/warc/CC-MAIN-20170423031158-00268-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
582
3
https://brooklineprintcenter.com/word-press/wordpress-website-security-dealing-with-break-in-attempts/
code
WordPress websites have frequent break in attempts If your website is like this one, there are frequently attempts to break into the Admin Panel. Being systematic about passwords and monitoring will go a long way to being secure. It is important to have a strong password protocol. Also critical is some kind of monitor to keep you informed as attempted break ins happen. This post explains what I have done to provide a layman’s approach to security. It is strong and should be enough to stop your admin panel from being compromised. The approach is no or low cost. How to create a strong password system. I have a four step system to create strong passwords for everyday use. Use a password generator. Copy the strong password to the admin password entry on wordpress admin panel. Then copy it to a text file kept offline for backup. Finally use a password vault tool to login on a daily basis. Use a password generator. My hosting service, bluehost has a strong password generator on its Cpanel to create strong passwords. It is to allow users into the cpanel, and the website area. Using this tool, I created and copied a password which is difficult and incomprehensible. According to a password tester a standard computer running a password cracking software will take decades to break a password created this way. This strong password is my primary line of defense against break ins. Copy this password from the password generator to the WordPress admin area as the admin password. I also copy the password to a text file on a USB because I will never remember it and having an off line digital copy on a USB is a good practice. I use this method for all my other passwords. If I need to recover this password or any other password, I have a backup copy stored offline to recover my passwords. Finally I use a password vault tool like Keeper Password Manager & Digital Vault or anyone of the many available tools like it to use to login on a daily basis. Change the admin account name. Do not name the admin account username admin, Admin, or ADMIN. Use something else. Remember user names are case sensitive. These three account names are the three most common user names I am seeing being used to attempt a break-in to the admin area of this wordpress website. By not using these three names I will show you a strong way to block hacking attempts. Use a Monitoring and security tool. I use All In One WP Security & Firewall. It is lightweight. It monitors login attempts and informs you when someone attempts and fails to get into your site. It allows you to lockout IP addresses and usernames. Finally the basic version is no cost to use and robust in function. Lightweight. This means that the security tool does not heavily use processing resources. Your website host likely is a shared host and as such, your share of the processing resources is constrained by who else shares your server. This tool works mostly as a perimeter security tool preventing inappropriate people from gaining access to your admin area. It locks down many avenues of attack on word press sites. However it does not monitor the health of the site, nor use active processing to test or scan users, look for compromised code added to your site or back your site up. All these other steps are important parts of website host security and should be addressed too. The Monitoring and Security tool use: I have setup the login security as follows: If someone attempts to login and fails; after 3 attempts within 30 minutes my monitor locks out the IP address that attempted to login for 3 hours. Additionally if someone uses the user name, admin, Admin, or ADMIN to login they are immediately locked out. By black listing these three user names; the most common problem user names, I have created a strong way to block bad login attempts. Both of these fails generate a failed login attempt email report. I use these reports to create a black list of IP addresses and IP address ranges not allowed to login on my site. By always having very strong passwords, these lock out rules and a growing list of black listed IP addresses I make it very hard for someone to break into my website’s admin panel.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738380.22/warc/CC-MAIN-20200809013812-20200809043812-00526.warc.gz
CC-MAIN-2020-34
4,184
15
https://www.telerik.com/forums/react-scheduler-ellipsis-in-week-view-(see-month-view)
code
There is a feature in Month View where a day with many appointments will display an ellipsis ("...") at the bottom, indicating to the user that the day in question has more events scheduled than are listed on the screen. Does Week View have a feature similar to this? My users will sometimes display busy schedules with many appointments listed, and I would rather display "..." than the first character of each appointment as the component tries to mash all the appointments into the same box. This thread references the feature I'm referring to in Month View: As does this GitHub Issue:
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00016.warc.gz
CC-MAIN-2023-40
588
4
https://webogram.in/100-off-creating-a-chip-8-emulator-in-c/
code
In this fantastic course you will learn how to create your very own emulator for the Chip-8 in the C programming language. The Chip-8 is a virtual machine from the mid 1970s designed to make game development easier.Creating A Chip-8 Emulator This course is great for anyone who has programming experience and would love to create an emulator but just does not know where to start or has attempted to do it but ran into problems.Creating A Chip-8 Emulator You are taken through every step of emulator creation, throughout this course we start by setting up our project, then we start writing code to emulate the display and keyboard from the era. We soon move to simulating the entire Chip-8 instruction set.Creating A Chip-8 Emulator After you complete this course you will have a fully functioning Chip-8 emulator that can run space invaders, pong and many other classic games. I am a software engineer that has been programming for 13+ years. My experience is vast and covers web development all the way to compiler and interpreter development. I have also developed bootloaders in the past that can boot a kernel from the FAT(File Allocation Table) filesystem. I have developed two programming languages of my own one is called Craft language. The other is called Marble which is a web language like PHP. I also have programmed Linux kernel modules professionally - You must be confident in the C programming language - You must understand hexadecimal - You must understand bitwise operators and bit shifting This course includes - 5 hours on-demand video - Full lifetime access - Access on mobile and TV - Certificate of Completion Who this course is for: - People interested in how to create an emulator What you’ll learn - How to create an emulator for the Chip-8 machine - Knowledge of how instruction sets work - Understanding of how machines work
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107890028.58/warc/CC-MAIN-20201025212948-20201026002948-00634.warc.gz
CC-MAIN-2020-45
1,857
21
https://onlineradiobox.com/track/504461946458317398/
code
I wrote this love song because I started falling for a friend of mine and wasn't sure if it was a good time to bring it up. I showed her the song and yup, friend-zoned! I like the song that came out of that experience and happy to share it with you. On iTunes here - https://itunes.apple.com/us/album/im-falling-for-you-single/id602799106 Subscribe to this: https://www.youtube.com/user/chestersee And this too: https://www.youtube.com/user/ChesterDaily That Twitter Thing: https://twitter.com/chestersee That Facebook Thing: https://www.facebook.com/chesterseefanpage That Instagram Thing: http://instagram.com/chesterseesphotos That iTunes Thing: https://itunes.apple.com/us/artist/chester-see/id298899305 Merch is Here: http://chestersee.spreadshirt.com And totally cool with you sending me stuff: 16430 VENTURA BLVD., SUITE 306 ENCINO, CALIFORNIA 91436 Thanks again for the eyes and ears! Andy Lange produced the music. Subscribe to him! http://www.youtube.com/andylangemusic Scott Francisco did the strings. Check out his series Full on Drums! http://www.youtube.com/fullondrums Special thanks to Justin Safaei for helping me film this. If you're new to my channel, nice to meet you via the world wide web. Please be warned that I'm never sure what will end up getting posted. Original music, covers, comedic sketches, dramatic scenes, and occasionally I'll slip in a troll video. Thanks for watching though!
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743521.59/warc/CC-MAIN-20181117123417-20181117144650-00023.warc.gz
CC-MAIN-2018-47
1,413
11
https://learnopedia.co/how-to-join-a-list-into-a-string-python/
code
Python is a powerful programming language that many developers find appealing. It has a wide variety of applications and can be used to create functional and non-functional software. One of the cool things about Python is that it can easily be programmed to communicate with other systems. For example, you can use Python to interact with a web service and retrieve data. In this blog post, we will show you how to join a list into a string in Python. This is a useful skill if you want to build more complex programs or if you need to send data across systems. Intro to Listing When you want to join a list of data into a string, you use the join() function. The arguments are the list and the separator character used to join the elements of the list together. The following example joins two lists together and prints the result: list1 = [‘cat’, ‘dog’] list2 = [‘eagle’, ‘penguin’] How To Join A List Into A String Python? List-joining is a useful operation in Python that creates a new list from two or more lists. This tutorial will show you how to join a list into a string. The join() function takes two arguments: the first is the left list and the second is the right list. It will create a new list with the items from both lists combined. The result of joining two lists is always a list, even if one of the lists contains 0 items. Here’s an example using join(): list_1 = [ ‘a’ , ‘b’ , ‘c’ ] list_2 = [ ‘d’ , ‘e’ , ‘f’ ] list_3 = list_1 + list_2 print ( list_3 ) What You’ll Need? In order to join a list into a string, you will need the following items: - The list to be joined - A stringbuilder object - The join method of the stringbuilder object - The separator character to use between the elements of the list - The delimiter character to use between the elements of the string - The input file path or URL where the list is located How to Join a List? To join a list into a string, use the join() function. The join() function takes two arguments: the list to be joined and the string to be created. For example, if you wanted to create a string containing all of the items in a list, you could use the following code: list_items = [“cat”, “dog”, “pig”] string_with_items = “List of items: ” + list_items How to Display the List? How to Display the List? You can display a list of items in Python by using the len function. This function returns the length of a list, which is determined by counting the number of items in the list. The following code shows how to display a list of numbers: print(“The length of the list is ” + str(len(list)) + “\n”) What is List Python? List Python is a versatile library for working with lists in Python. It provides convenient wrappers around the native list library, as well as some additional functionality. To join a list into a string, you can use the join() function: list = [“a”, “b”, “c”] string = list.join(“=”) How to Install List Python? List python is a module which makes it easy to join lists of data into strings. To use list python, first import the module: from listpython import List Then, you can use the join() function to join two lists together: my_list = List([‘a’, ‘b’, ‘c’],’d’) my_string = my_list.join(‘e’) print(my_string) How To Use List Python? Joining a list into a string is easy with the list() function. To join two lists, use the list(…) function. The first argument is the first list, and the second argument is the second list. would return “a”,”b”,”c” as a string value. Some Examples of Using List Python List operations include finding the first element in a list, the last element in a list, and the middle element of a list. To join two lists into one string, use the join() function. The join() function takes two arguments: a list and a string. The first argument is the list to be joined, and the second argument is the string to be created from the lists. The join() function returns a string that contains all of the elements from both lists joined together. For example, let’s say we have two lists named “list1” and “list2” containing three elements each. We can join these lists together using the join() function to create a single string containing all six elements: list1 = [‘a’,’b’,’c’]; list2 = [‘d’,’e’,’f’] In this article, we will be discussing how to join a list into a string in Python. We will teach you how to use the str() function to create a new string that contains all of the elements in the list object. Finally, we will show you how to append the new string onto the end of the existing string. By following along with this tutorial, you will be able to join a list of strings together and create a single long string containing all of its contents.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00444.warc.gz
CC-MAIN-2023-23
4,826
51
https://techcommunity.microsoft.com/t5/excel/referencing-a-table-to-lookup-a-cell/td-p/3058743
code
Jan 12 2022 Basically I have a table with a list of clients where the column in their city they're from is filled in but the state isn't. I want to use a table as reference to autofill the gaps for the states. I've tried using vlookup and index/match but haven't been able to fix it. Here's an example of what I want to be able to do: This is the main table where I have my client information database: In this case, I want A4 (???) to be autofilled referencing a table. Thank you in advance and hope someone knows how this can be done!
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301488.71/warc/CC-MAIN-20220119185232-20220119215232-00685.warc.gz
CC-MAIN-2022-05
536
7
https://aggregate.digital/technology/development/agent-sdk.html
code
The Agent library is available on multiple platforms, including Java, .NET, C/C++, Android, and more. Similarly to drivers, agents are responsible for: |Communications with AggreGate servers, authentication and authorization||Implementing device operation execution logic| |Connection/disconnection handling logic||Asynchronous sending of value updates and events to the server| |Normalizing data available inside your device, i.e. connecting it to the unified model format||Optional buffering of updates and events internally if the server connection is unavailable| |Exposing available properties, operations, events, as well as their formats and groups||Implementing the event delivery confirmation logic| |Replying to property read/write requests and implementing their logic|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100632.0/warc/CC-MAIN-20231207022257-20231207052257-00064.warc.gz
CC-MAIN-2023-50
780
7
http://forums.steelersfever.com/showpost.php?p=1069901&postcount=110
code
Originally Posted by harrison'samonster What I remember reading or hearing was that Tomlin blew them away in the interviews. (And my assumption) Probably got a great recommendation from Tony Dungy, a pittsburgh guy who was getting a lot of credit for the Colts success at the time. Thank you. While I don't agree that a stellar interview and recommendation makes someone with no experience the ideal candidate, at least it's an explanation. I remember the interview being a determining factor too.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131295084.53/warc/CC-MAIN-20150323172135-00289-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
497
3
http://www.funfunfunfest.com/users/tetsujin28go/blogs/3005161/comments
code
On Tue, Jul 31, 2012 at 4:43 PM, It's almost like those winners on game shows. They win a new car in the showcase showdown but can't afford to pay the taxes, etc...I guess it's true: nothing in life is truly free! On Mon, Jul 30, 2012 at 9:16 PM, @Phillip: I know what you mean. After entering a contest on the Do512 website, I won a pair of tickets to see Willie Nelson at the Backyard. I couldn't go because I was broke, It was rough because i tried my best to scrounge up the money to go, but it just didn't happen. On Mon, Jul 30, 2012 at 5:23 PM, I keep wanting to enter these ACL contests but then realize that I can't afford to go, even with free tickets. Sad.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701943764/warc/CC-MAIN-20130516105903-00082-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
667
6
https://forum.popclip.app/t/searching-and-tab-groups/464
code
Wasn’t sure if this is a bug/known issue/specific to me so I thought I’d post it in general first. I’ve found that if I start a search in Safari (using DuckDuckGo in my case but I don’t think it matters) and the Safari window is part of a tab group then the search opens in a whole new window HOWEVER if I open a new Safari window that is not part of a tab group and do the same the search opens up in a new tab on that page. I don’t believe I have any other settings that might be causing this and it is 100% reproducible every single time. Anyone else? Apologies if this has already been brought up, I couldn’t find any references to it.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662510097.3/warc/CC-MAIN-20220516073101-20220516103101-00267.warc.gz
CC-MAIN-2022-21
651
4
https://gbatemp.net/search/2245720/
code
I recently backed up my save files from a memory card pak using my Everdrive 64 X7 because the pak's battery died now that I want the saves back on the pak I cant find out how to do so even googling it wont help me with my problem. Any help? When I got AC:NH last year I dumped the cart to my CFW thinking it wont be any problems but recently I found out I have been missing events including the Mario items so I tried following the github and in the end it wont work. I put a lot of work into my village and dont wanna have to restart in... I attempted to update my Atmosphere CFW using the Updater and when it finished downloading Atmos crashed and now I get this error when booting "A fatal error occurred when running Atmosphere. Program ID: 0100000000000008 Error Desc: std::abort() called (0xffe) Report saved to... Thanks for the reply! but sorry for sounding like a noob but how do I enable this? Because this is the first time reading about this since owning a Switch for 6 months now. Can I just go into my FTP program and edit the file or will I need to insert my micro-SD into my PC? So I got a DK Weird Fight pad from pdp and I noticed some weird issues like for one when using the analog stick some times when letting go the controller still acts like I'm holding the analog stick in that direction. Second I also noticed that when holding any button the game acts as if I'm...
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103943339.53/warc/CC-MAIN-20220701155803-20220701185803-00332.warc.gz
CC-MAIN-2022-27
1,391
10
https://www.mql5.com/en/market/product/4966
code
Integra Module is a semi-automatic trading system. - In the semi-automatic method, the trader places orders and the Expert Advisor manages them until closure. - It can be used as an assistant in other trading systems, or can help reduce the lot size of a series of orders in drawdown. - It can be used as a tool which can cut the lot of a series of orders in drawdown in a flat market and push it to a positive result. The system uses the following algorithms: Take Profit in deposit currency, virtually implemented as a graphical line. Trailing stop (profit trailing) is implemented virtually, but a physical one can also be used by shifting it from the virtual trailing stop by a preset value. Accumulative profit buffer: suppose there is a series of orders that are in loss and the market is flat; if this option is enabled then all returns of a trade, or of a hedging module, or of partial closure of orders is stored in a global variable. After the profit obtained by different methods exceeds the loss of the series in a drawdown by a value specified in DefaultProfit, all orders of the series are closed with a loss, thus we take only the profit from DefaultProfit, while the money earned are spent to close this series of orders. The last trail system actually means activation without loss of placed orders, the StartOrdLastTral parameter defines the order of the series, from which trailing without loss should be started. Partial closing of drawdown lots: in a drawdown series, the last order hits profit, according to the method chosen of three available - If 0 - partial closure of orders is disabled - If 1 - partial closure of the nearest order - If 2 - partial closure of the farthest order - If 3 - partial closure of the nearest and the farthest order The profit of the last order partially closes the lot in accordance with the selected method. Example: Method 1, the last 0.5 lot order hits profit and closes 0.1 losing lot of the previous 0.2 lot order, in the flat market, where the order is opened in the highest point, if profit is hit, closes part of losing lots of the series orders. The order covering system is similar to partial order closure. The difference is that in this system you set the number of the order, from which it's operation starts. When the the order reaches the profit enough to cover the loss of the farthest order of the series + the preset % of target profit of the covering order, the system closes the orders, where the last order covers the loss of the first one and gains a little additional profit. Covering can be two-level when the last order covers the loss of the farthest one, and the last order and the last but one order reach profit and cover the loss of the farthest one, profit is calculated by the percentage of the last but one order. The system of partial closure and cover does not trigger immediately when conditions are met, trailing of the systems is activated in the system, ans when price moves to the profit area, the trailing line follows it based on presets. reversal activates this or that block depending on the conditions. Visual indication shows information about the current market situation, lot of orders and their direction, their profit/loss, distances to breakeven and to loss of deposit, as well as a profit unit that displays the profit/loss in currency/points by days, weeks, months, year. Showing spread and the current price of the currency pair. Manual graphical trading panel, where you can place Buy and Sell orders, as well stop and limit orders. In the EA settings, the following data are set to be displayed in the panel: initial values of lot and distance for pending and limit orders followed by a list for selecting lot or distance. If a series of orders is closed by TP, the stop limit orders that have not triggered will be deleted. The simplest method to use the assistant: Suppose we have a series of 10 orders of different direction managed by an EA; some of them are at a loss. We understand that the algorithm of the EA cannot cope with the situation and the series of orders should be closed so that they do not reduce the deposit, but earn some money. Attach Integra Module to another symbol chart with the same orders Magiс. Before that, try to simulate the same situation in the strategy tester, choose the appropriate parameters, so that the EA would start partial closure of losing orders and cover them at the slightest market movement. As a result of the cooperation of our Expert Advisor and the module, and additional use of the manual panel to place orders, in most cases you can reduce the lot of the loosing series and close it by Take Profit within 2-3 days.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745015.71/warc/CC-MAIN-20181119023120-20181119045120-00378.warc.gz
CC-MAIN-2018-47
4,681
22
https://www.delucru.md/job/22460
code
Oportunitățile Stagierii in Slovacia Junior IT Developer / Junior Software Engineer / Junior Software Tester Ești student sau absolvent al unei universități din Republica Moldova și ești interesat să îți dezvolți abilitățile și experiența profesională în companii TIC de talie mondială? Ești pregătit să îți începi cariera în domeniul IT și să-ți dezvolți experiența în companii TIC, precum ESET, ORANGE, IBM, SOITRON sau One Simplicity? Acum ai șansa să câștigi o experiență de lucru de 3 luni în companii TIC de top din Slovacia, prin înregistrarea la programul Digi Talents, finanțat de UE. Cum arată candidatul ideal? Ce vei primi de la program? Fii primul care aplica nu ezita, doar fa clic pe link-ul: https://digitalents.md/apply-form/ și completeaza formularul. Dacă aveți întrebări, scrieți-ne pe e-mail ul: firstname.lastname@example.org About the Tekwill Project Tekwill has been designed as a national public private partnership between the Government of Moldova, USAID, Microsoft, and IBM to answer the needs of the ICT industry to close the gap of the human capital shortage, as well as support the development of the entrepreneurship ecosystem. The initial goal of the project was to contribute to the extension of the Tekwill project as a sustainable network and deploy its programs on regional/national level. The project aims at determining the operation model of the network, determining business plans for the relevant created centers or partners in the regions, deploy scalable activities to connect an estimated of 150,000 people to ICT (school and university students, community, etc.), deploy entrepreneurship programs aiming at both scaling up existing programs, as well as create inclusive innovation platforms for the regions, with their respective specifics and potential to absorb/apply ICT. We envision a minimum 10,000 beneficiaries/year for each direction (education and entrepreneurship) As a result of the project, 2 main outcomes of the project are expected: more and better qualified skills and workforce developed leading to a stronger ICT industry in Moldova, as well as creating the premises for a Startup Moldova program driving opportunities for companies seeking capitalization. The first phase of the project represented a USAID grant for Development matched by both cash and in-kind contributions provided by private and government partners that brought significant new resources, ideas, software, technologies and development activities, such as trainings, practical assignments, and mentorship. Private partners included multinational companies, IBM and Microsoft, but also members of the Information Technology and Communications Association (ATIC) comprised of local Information and Communications Technology (ICT) companies. Among government partners which have provided their support are the Ministry of Economy and Infrastructure, the Ministry of Education, Culture and Research, the e-Government Center and the Technical University (TUM). Hosting the first Center in its premises, the Technical University of Moldova has contributed with resources for initial investment and maintenance costs during the startup phase.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500017.27/warc/CC-MAIN-20230202101933-20230202131933-00765.warc.gz
CC-MAIN-2023-06
3,217
13
https://davehochendonerphotography.com/hello-world
code
Dave Hochendoner Photography Welcome to my website. Please come back in the next few days when the site is up and running. Hi, this is a comment. To get started with moderating, editing, and deleting comments, please visit the Comments screen in the dashboard. Commenter avatars come from Gravatar. Does this work. Your email address will not be published. Required fields are marked *
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00469.warc.gz
CC-MAIN-2024-18
385
7
https://java.net/jira/browse/HK2-102
code
As described here http://hk2.java.net/config/configuration.html#Changes_notification, listeners implementing @Contract ConfigListener must be added to injected config beans automatically, but it does not seem to work. It might be braking 'restart required' feature, when changing glassfish config sets the flag. See GLASSFISH-15987, scenario described there does not work. See also http://docs.oracle.com/cd/E19798-01/821-1751/ghciy/index.html for other examples of commands that require restart.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541783.81/warc/CC-MAIN-20161202170901-00323-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
496
3
https://www.cif-ifc.org/2019-student-quiz-bowl/
code
Make sure to register your team as soon as possible! - Registration for the Quiz Bowl is free! - The conference is not free. All team members and alternates must register for the conference; however some compensation may be available. Please see the CIF‐IFC website for more details regarding conference costs as updates become available - Each school can register up to 2 teams, with a maximum of 4 participants per team plus an alternate (If a school is unable to find enough students to form a full team, blended inter‐school teams may be permitted. Please contact Ayla Brombach for more details: firstname.lastname@example.org - This competition is for undergraduate students that are conference registrants only (Graduate students are not eligible to compete. Sorry!!) - Judges rulings are final - Games will be provided in both official Canadian languages as appropriate - Competition bracket structure will be determined based on the number of teams registered - Register early to secure your spot as space is limited!
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152144.92/warc/CC-MAIN-20210726183622-20210726213622-00199.warc.gz
CC-MAIN-2021-31
1,029
9
http://www.relationshipone.com/tag/events/
code
01 Nov 2012 31 Jan 2012 We decided one session just wasn’t enough to start the year off…so we had two users groups in January. Thanks to all that joined the discussion. If you are interested in joining our little get together, we hold the user group at our office the last Tuesday of every month starting at 3:30PM.
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768208.73/warc/CC-MAIN-20141217075248-00139-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
319
3
https://www.freelancer.cl/project-directory/C-4-104
code
Projects Directory : CAD/CAM Modelling for Injection moulded product - Cad2012. At startup, toolbars loaded very slowly due to recent attempt to customize the Tool Palettes. To repair the startup problem & to provide me a set of instruction to effectively customize the Tool Palettes. Projects starting with characters Total de trabajos publicados
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721392.72/warc/CC-MAIN-20161020183841-00040-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
347
3
http://www.crystalspace3d.org/docs/YoFrankieTutorials/crystal_space_development/weaver/shaderweaver.html
code
|Yo Frankie! | Crystal Space Tutorials| Crystal Space Shader Weaver The Crystal Space "shader weaver" generates Crystal Space shaders out of a graph. The weaver has some convenience functions and features, such as automatic conversion of coordinates and normals between spaces and efficient culling of vertex-to-fragment data which is not required, and has a very modular approach to describing shaders, simplifying the creation of complex shaders. It is recommended to read the "Introduction to Crystal Space Shaders": the weaver system is working atop the classic XML shader system; some elements are used verbatim (e.g. bindings), some concepts are used in a similar fashion (e.g. techniques). The initial motivation for creation of came from so-called Abstract Shade Trees wherein shaders are described by a tree structure. But unlike "classic" trees, where nodes where operations such as "dot product" or "read texture", the node operations are relatively high-level. There are only simple connections between individual nodes and the compiler figures out which inputs and outputs to match based on their types. The Crystal Space shader weaver provides the essential feature of Abstract Shader Trees, the input/output matching and type conversion. However, out of practical necessity, inputs and outputs can also be manually connected. Effectively this makes it possible to specify shaders both in a high- and low-level fashion, solely depending on whether more or less complex nodes are used in the graph. A "weaver shader" consists, like an XML shader, out of multiple techniques and passes. However, the format inside the passes is vastly different. The shader itself is described by a graph. The nodes are called snippets, links between snippet connections. A snippet can either be a compound snippet or an atom snippet. Compound snippets themselves can contain multiple techniques, each again containing a subgraph describing their behaviour. Atom snippets contain actual shader program code emitted in the actual shader. An atom snippet consists of multiple blocks: putting a meaningful statement into a shader usually requires changes at multiple places (e.g. for a constant, you need to declare a variable the constant is assigned to, bind a shader variable to the program variable, optionally provide a default value, and finally read out the program variable and put it into a place known to the generator). This fact is accomodated by these "block"s. Each block contains a fragment of shader markup or shader program code, inserted at a place specified in the block definition. Furthermore, atom snippets declare input and output values. Each can possess additional auxiliary information, called attributes. Inputs can optionally have default values. The shader weaver is, conceptually, not tied to an underlying technology for writing shaders. The job of combining the different fragments of a shader program to a whole is delegated to other plugins, named "combiner". Two combiners are available: a "default" combiner for elements of shaders independent from the shader program(s) (such as buffer and texture bindings) and a user-set combiner responsible for generating the actual shader program(s). In practice, the only user settable combiner available is one for Cg. Input to a weaver snippet is resolved as follows: first, the outputs of snippets immediately predecessing the current snippets are considered. An output is not considered twice for a node - ie when an output was already matched to another input of the current snippet it is not considered dor automatic matching again. When there is a direct match between the type of an input and an output, the matching output is used. Otherwise, a conversion from the type of the output and the input is attempted. If such a conversion exists, its "cost" is reported. When all outputs were checked, the one with the lowest cost is used. However, if no output can be converted, the search continues with all snippets predecessing the predecessor and so on. If no output is found in any of the checked snippets a user-specified default is used. If no default was given the input value is undefined. Any shader essentially needs to output two values: a coordinate in camera space, used by the hardware to determine the rasterization coordinates, and a color, used by the hardware to determine the color to raster. The weaver looks for outputs for a color value and a (camera) position value, starting at all snippets which are not serving as input to other snippets. It scans the tree upwards until the needed output values are found. They are then used to provide a camera coordinate and a raster color for the hardware. As "classic" Crystal Space shaders, weaver shaders are written in XML. The outermost element must be shader. A name attribute must be present as well. The compiler attribute must have the value "shaderweaver", identifying the shader as handled by the shaderweaver plugin. A weaver shader also consist of multiple techniques, each containing multiple passes. The skeleton for a weaver shader is: <shader compiler="shaderweaver" name="simpleweaver1"> <technique priority="100"> <pass> ... </pass> </technique> </shader> In a pass node, the combiner(s) to be used when generating the shader must be specified. In case an atom snippet uses multiple combiners this selects which of the blocks targetted at the different combiners are used. However, currently the only available combiner is the Cg one. The syntax for setting a combiner is: <combiner plugin="crystalspace.graphics3d.shader.combiner.glcg" /> As described in "Output" Snippets, we need to have at least a position output node and some color output node to get any result from the shader. Among the snippet shipping with Crystal Space are of course ones for these basic tasks. The position snippet transforms the vertex position to camera space; the surface-classic snippet reads a color from the "diffuse" texture. <snippet id="position" file="/shader/snippets/position.xml" /> <snippet id="surface" file="/shader/snippets/surface/surface-classic.xml" /> The file attribute identifies the snippet source file. The id attribute assigns each snippet a unique name: this is later needed for specifying connections between snippets. The shader as a whole looks like this (simpleweaver1.xml): <shader compiler="shaderweaver" name="simpleweaver1"> <technique priority="100"> <pass> <combiner plugin="crystalspace.graphics3d.shader.combiner.glcg" /> <snippet id="position" file="/shader/snippets/position.xml" /> <snippet id="surface" file="/shader/snippets/surface/surface-classic.xml" /> </pass> </technique> </shader> The stock snippets also contain snippets for lighting. These are split into two parts: first, a snippet for the lighting computation itself. These are realized in different techniques - presently, snippet for per-vertex and per-fragment lighting are available. The second part is the light application. This snippet basically takes various inputs - light diffuse color. surface diffuse color, light specular color, surface specular color, ambient color - and combines them into a single lit color value. To include the necessary lighting snippets: <snippet id="lighting" file="/shader/snippets/lighting/lighting-ppl.xml" /> <snippet id="apply_lighting" file="/shader/snippets/lighting/apply-lighting.xml" /> Notably the apply_lighting snippet has multiple inputs. To that end, connections between the snippets providing the data and apply_lighting snippet and the snippets providing the source data are needed. Currently, we have a diffuse surface color, provided by the surface snippet, and a light diffuse color, provided by the lighting snippet . Also, the apply_lighting snippet has multiple inputs of the same type - thus explicit connections are used to disambiguate. Inspect the contents of the snippet XML files to determine the available outputs and inputs. This leads to the following connections: <connection from="position" to="lighting" /> <connection from="surface" to="apply_lighting"> <explicit from="surfaceColor" to="surfaceDiffuse" /> </connection> <connection from="lighting" to="apply_lighting"> <explicit from="diffuseColor" to="lightDiffuse" /> </connection> Each connection is specified by a connection element. The from and to attributes contain the IDs of the snippets to connect; the output values of the "from" snippets are connected with the input values of the "to" snippet. The connection between "position" and "lighting" has no sub-elements - this means the automatic input/output matching is used. The connections to "apply_lighting", on the other hand, have explicit children - these explicitly map outputs to inputs, avoiding ambiguities and resolving mistaken input/output matches performed by the weaver. Finally, the "lighting" snippet needs the subset of lights to light as input. This is achieved with the following elements: <parameter id="lightOffset" type="int">0</parameter> <parameter id="maxLights" type="int">4</parameter> <connection from="lightOffset" to="apply_lighting" /> <connection from="maxLights" to="apply_lighting" /> parameter values are simple constants or values sourced from shader variables that can be connected to snippets to serve as inputs. Here, two constants for the first light to handle and the number of lights to handle are passed to the "apply_lighting" snippet. Set the lights attribute of the shader node to 4. The complete shader is in simpleweaver2.xml. The result is: The lighting snippet computes lighting per fragment , but it doesn't look like that. Using per-fragment normals would be nice. To that end, we merely need to add a snippet that provides normals from a normal map and connect that as input to the lighting snippet: The complete shader is in simpleweaver3.xml. The result is: In contrast, adding normal map support in a "classic" shader would have required manual bindings for normal, tangent and bitangent, normal map texture, and additional code to translate directions from or to tangent space and pushing some of that information from vertex to fragment program. To be honest, that is all still done - however, conveniently and reusably packaged into the normalmap.xml . One of the benefits of using a shader weaver is the ability to make creation of complex effects easier. Say, for example, you want to blend the surface to a reflection of the environment, based on the fresnel factor for a point. This can be done achieved with a couple more snippets and connections: <snippet id="reflection" file="/shader/snippets/reflect/reflect-env-world.xml" /> <snippet id="reflection_cubemap" file="/shader/snippets/surface/envmap-cube.xml" /> <snippet id="fresnel" file="/shader/snippets/reflect/fresnel.xml" /> <snippet id="lerp_reflect_surface" file="/shader/snippets/lerp.xml" /> <connection from="position" to="reflection" /> <connection from="position" to="fresnel" /> <connection from="normalmap" to="reflection" /> <connection from="normalmap" to="fresnel" /> <connection from="reflection" to="reflection_cubemap" /> <connection from="reflection_cubemap" to="lerp_reflect_surface"> <explicit from="envColor" to="b" /> </connection> <connection from="fresnel" to="lerp_reflect_surface" /> <connection from="apply_lighting" to="lerp_reflect_surface"> <explicit from="result" to="a" /> </connection> The complete shader is in simpleweaver4.xml. The result is:
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743714.57/warc/CC-MAIN-20181117144031-20181117170031-00329.warc.gz
CC-MAIN-2018-47
11,423
52
https://blog.linkedin.com/2014/03/10/getting-more-women-in-stem-our-partnership-with-mentornet
code
LinkedIn and MentorNet: A Partnership To Get More Women in STEM March 10, 2014 The technology industry is one of the primary growth engines of the economy, and with rapid growth comes demand for skilled workers to fill the increasing number of open positions at various companies within the sector. Despite a high demand for talent, there’s a widening gap within the tech industry in the number of science, technology, engineering, and math (STEM) roles held by women. For all its accomplishments and innovation, the technology industry is lagging when it comes to representing an equal balance in the workforce among women with technical backgrounds. We had LinkedIn researcher, Sohan Murthy, look into this imbalance and according to LinkedIn data: - Women represent just 30% of the entire workforce within the technology industry. - When looking at software engineering roles within the technology industry, only 15% are held by women. This raises an important topic for discussion: if technology will help to define how we work in the future, how can that future be meaningfully realized when women aren’t playing a more significant role in shaping it? We believe strongly that providing the right support in the form of role models could yield positive results in terms of getting more women in STEM positions, and it could also be an effective measure in balancing out the gender gap. And because we believe further steps need to be taken, today we’re pleased to announce our partnership with MentorNet, a national nonprofit that provides all STEM students with access to high-quality mentoring experiences by connecting them with professionals in their field. Using an online social networking platform, students (called protégés) can build relationships with mentors, connecting across generational, gender, racial, cultural, and socio-economic boundaries. Our partnership with MentorNet includes a grant to help update their technology platform, which will enable them to scale their impact. It will also allow MentorNet to leverage job postings in order to fill a critical need for great mentors, as the supply of protégés tends to heavily outweigh that of available mentors. Additionally, since the LinkedIn platform enables members to “signal” their interest in doing skill-based volunteering, it will provide MentorNet with the ability to leverage our growing network of 277 million professionals to identify members who might be interested in becoming a mentor and match their subject matter expertise with a willing protégé. To date, more than 600,000 LinkedIn members have indicated their interest in either serving on a board or doing skill-based volunteering. MentorNet’s CEO, Mary Fernandez, first became involved with the organization as a mentor herself. As a computer scientist, having her own mentor was invaluable in helping her navigate challenges and persist in a tech career. As LinkedIn data indicates, support for MentorNet’s mission couldn’t come at a more critical time, especially within the United States, as female representation among U.S. computer science and software engineering degree holders has declined over the past 30 years. In 1984, 23% of U.S. degree holders were women. As of last year, fewer than 15% were women. Unfortunately, this trend is fairly well documented. Compare this to India, where female representation has increased dramatically from 20% in 1999 to 31% in 2013. The increase of female computer science and software engineering degree holders in India is so dramatic, that prior to 1999, there weren’t enough members to include in our analysis to provide a robust result. In fact, the overall global trend of female representation is increasing - ever so slightly - due in part to India’s contribution. These are significant, fundamental challenges, and no single action by one company, entity or even group of companies and entities is going to address all of them. However, we’ve identified an area where we believe we can have significant impact, as it relates to one of our core areas of focus: the power of professional ties and the sharing of knowledge. Our vision as a company is to create economic opportunity for every member of the global workforce. The development of the Economic Graph and work of organizations like MentorNet will help make that vision a reality by providing real time insights and awareness into the shape and scale of problems like gender inequality in the technology sector. Methodological details: The results of this analysis represent the world as seen through the lens of LinkedIn data. As such, it is influenced by how members chose to use the site, which can vary based on professional, social, and regional culture, as well as overall site availability and accessibility. These variances were not accounted for in the analysis. Keen observers will note that there is no field for gender on the LinkedIn profile. We have inferred the gender of members included in this analysis by classifying first names. Members whose gender could not be inferred based on their first names weren’t included in the analysis. We analyzed information stored in the education field of the profile and focused on members who held bachelor’s degrees in fields related to computer science, software engineering, electrical engineering and computer science (EECS), computer application, and computer engineering. Members who did not provide a completion date for their degree weren’t included in the analysis.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645417.33/warc/CC-MAIN-20230530063958-20230530093958-00137.warc.gz
CC-MAIN-2023-23
5,522
16
https://docs.appdynamics.com/display/PRO44/Injection+Using+Apache
code
Download the Agent Open the browser application in which you are interested. From the left navigation menu, select Configuration. Place the file somewhere accessible to the Apache instance. The name of the saved file should be The basic set-up takes four steps: - Make Sure the Modules are Loaded - Create an Adrum Configuration File - Add the Location of the Adrum Configuration File to httpd.conf - Restart the Web Server Make Sure the Modules are Loaded Check your global Apache httpd.conf file and make sure that the following two LoadModule commands are in the file: Create an Adrum Configuration File Create a file named adrum.conf with contents similar to the example below, based on your Apache version. (See this Stack Overflow post for details.) In this case, the substitution rule covers the location of the entire site ( Location /) but you can also recursively select a specific directory and its subdirectories by using Sample adrum.conf Apache 2.2 Sample adrum.conf Apache 2.4 /adrum.js is the path to a copy of the adrum file that is accessible to the server. The flags after the i -matching is case-insensitive n -pattern is treated as a fixed string (removing the nmeans the pattern is treated as a regular expression) q -module does not flatten the buckets after each substitution - this can speed performance. For more information, see the Apache module docs here. <head> tag has an attribute like <head lang="en">, you can use a regex in the substitution string and omit the n flag. For example: Note the timer initialization: <script>window['adrum-start-time'] = new Date().getTime();</script>. Injecting these scripts as close as possible to the top of the document, preferably right after the <head> tag, ensures the best possible timings. If you use <meta> tags, you should place them right after your <meta> tag. This can avoid issues with some versions of IE.= (Optional) Adjust for gzipped resources If your page is compressed, the substitution won't work unless the content is INFLATEd, the substitution is made, and then the content is DEFLATEd. There are multiple ways to do this. For example, in the See this Stack Overflow post for more information. If you are using Apache as a proxy, you can also instruct it not to accept gzip-encoded content. Add the Location of the Adrum Configuration File to httpd.conf Add the following line to your global Apache Alternatively, you can add the directives to the httpd.conf file directly instead of creating a separate adrum file. Restart the Web Server To pick up the new configuration, restart: If you get a warning "Useless use of AllowOverride in line 2 of [absolutePathTo]/adrum.conf", it can be ignored. It simply means AllowOverride is redundant. You can remove it if you wish. If you are setting up your automatic injection using an Apache instance that is configured as a reverse proxy, you must use the Location directive based method described above, with the ProxyPassReverse directives also in the Location directive. If you are using an Apache instance that is your primary web container you have two additional options for describing the actual substitution step: Use the Directory Directive You can use the Directory directive instead of the Add lines similar to this to an .htaccess file in the base document directory for your site, replacing your filter name for <MyFilter>. If you don't have an .htaccess file, create one: /adrum.js is the path to a copy of the adrum file that is accessible to the server. Make sure .htaccess is world-readable.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585537.28/warc/CC-MAIN-20211023002852-20211023032852-00082.warc.gz
CC-MAIN-2021-43
3,539
55
http://wiki.gnashdev.org/Overview
code
From Gnash Project Wiki This is my meager attempt to explain what we are doing. We're basically aiming for total world domination by this project, which is to create a multimedia infrastructure for a networked world that supports free codecs. The client side runs in multiple environments, from small embedded devices like a Gameboy or cell phone, up to standalone or as a web browser plugin on the desktop. The server needs to support thousands of concurrent streams, plus be able to run on a small device that may have a camera, or something as large as a GNU/Linux cluster. Tying this all together is an ability to tag the creation of audio or video content in a way that if you choose to publish it on any of the popular web sites for this kind of thing, you can attach metadata to that content that others can view or add to. Initially there are two separate projects being combined here. One big part is Gnash, a Flash movie player and web browser plugin. The other part is what has been called MusicML. MusicML started life as a project to catalog our large collection of Grateful Dead bootlegs and other live music, and then grew to something archive.org could use. Currently Gnash already runs as a plugin for Firefox, Mozilla, Konqueror, Epiphany, Iceweasel and Opera, and is being used on more high-end embedded Linux platforms as the primary interface. MusicML is still more of a specification and design than a functioning system yet. What has brought these two projects together is the concept of an Open Rights Management (ORM) system. The concept is that as we enter a world where almost anyone can create digital media content, there needs to be a system in place to get metadata on that audio or video content. Rather than built a draconian system like most other Digital Rights Management system, this one is oriented to the rights of the creator of the content, and not the publishers. For instance, somebody might want to allow their video to be republished for free, but if a commercial company wants to reproduce it, they need permission, or to license it based on the terms dictated by the creator. The final piece is a new one, which is a server for streaming audio and video. This server will be Flash media server compatible, and in addition support the ORM system. A common thread is that the server will support free codecs like Ogg and Theora. Theora is based on the same codec used in the latest versions of Flash, although they are not the same. The server and client will have hooks in them to support the additional metadata of the media database. This will make it easy to create Flash based applications that can access a data rich environment, enhancing the end users enjoyment. One thought is a music player, written in Flash that also plays photos or videos while the music is playing, and allows you to identify other bands with similar music, search the lyrics, etc... An unrelated but important event was the FreeDB database decided to shut down. FreeDB is a database of metadata on commercially recorded CDs. This is the free version of GraceNote, whose data is only available to subscribers. Both of these support the CDDB protocol, which is used by most music players to get the track name and performers when playing a commercially recorded CD. The FreeDB data and domain has now been taken over by the MusicBrainz project, whose database is a superset of the FreeDB one. It's maintainers are also into a more accurate and data rich environment for music players, and have an much more active development community than FreeDB did, which is why FreeDB is shutting down. Initially we will be offering a free data feed of the MusicBrainz data to help with mirroring the data, and providing another source for people to get their metadata from when playing CDs. This doesn't solve the problem we are trying to work on though, but it'll let us start having more data as the MusicML system is developed, and will be our primary source of some metadata on commercially recorded CDs. Our goals are much more ambitious than cataloging commercial music. We want to be able to catalog non commercial music, most of it produced by people on their home PC, and offer a similar service as the CDDB lookup. Once there is a prototype MusicML database, we'll import the MusicBrainz data into our own format, while also offering a free CDDB lookup of that data. Then we'll extend the CDDB protocol to support additional metadata lookups for the additional metadata that our database will provide. (like lyrics, photos, etc...), as well as add a web based interface that allows much more complex data searches. Some of the data, like song lyrics and album cover art will probably need to be licensed to legally use them for a search. The main feature the ORM system will then have to provide is a way to birthmark the creation in a way that it will be possible to verify that birthmark if there is a copyright violation. Current Rights Management Systems provide a draconian way of enforcing perceived copyright violations, often by locking up machine playing the content. My working concept is that an ORM system should use existing copyright law for enforcement purposes, and not ever modify the base platform the software is running on. We all know that any digital file can be edited, and any birthmark data added can be removed, so this is the interesting part. How do we birthmark a file, and record that data in such a way that it can be verified to be that particular piece of content ? The other big goal is to enable people to use free codecs for streaming audio and video. It is actually not legal to produce an MP3 file unless your software is licensed to do so by Thomson Consumer Electronics. Although none of these projects has anything to do with the creation of digital content, its usage of them puts people potentially at risk. In order to enable people to start utilizing free codecs, the infrastructure must exist to stream the content, as well as to play it. While there are several other free video streaming servers like Icecast, or VLC, they don't have any support for Flash. A Flash server must also be able to send Flash streams, and to speak the RTMP protocol as used by Flash players. In addition to this, the server also needs to support streaming from an embedded device, for instance, a cell phone camera. The current video and audio support in Flash players is limited to poorly synchronized animations more suitable for small screens or web browsers. Gnash will have a better infrastructure for the playing of audio and video content. Not only will it support multiple codecs, but by doing so can support a higher quality experience. Since many music and video players these days are getting written in Flash, if a file is being played off a local disk, or over a broadband connection, it might as well be as high quality as possible. Gnash should be able to play video with the same quality as any of the other video players like XINE, Mplayer, or Totem. When using the Gnash streaming server Cygnal, in conjunction with the Gnash client, it will be possible to easily access the content metadata, as the ability to access the metadata will be built in. If any ORM data exists on that file, it can also be utilized. For instance if the content creator has requested that all reproduction be free, but wants to know how many time the file has been played, the player should know to ask the end user to agree to this condition. Automatically sending any information on the person playing the content should be forbidden, spyware is a bad idea no matter which system implements it.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440646242843.97/warc/CC-MAIN-20150827033042-00185-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
7,641
15
http://wordlog.com/archives/2004/08/27/
code
Seriocomic is one of the better designed WordPress weblogs in town. (No, you do _not_ click on the tab called “intercourse” on the horizontal menu. ) Friday, August 27, 2004 Spam Comments come in waves. Dougal helps you slow them down a bit, and then give them a piece of your mind. Spammer Tar Pit is a plugin that checks whether comments are from known spammer IPs in the list in your comment moderation keys, along with the spam words you have. If there is a match, the plugin waits for some time and then gives the spammer an “access denied” message. You can change the wait time, as well as the message. chocolate is to peanut butter like AdSense is to blogs Don’t worry if you can’t make too much sense of that. What matters is : …set up your own Bloggerized AdSense account so that you make the money. What’s the catch? We’re going to take some of the action. Based on what we have learned from AdSense so far, this will work out very nicely for both of us. Please note that this program is optional and that it is not required for you to have a Blogger powered blog—all bloggers are invited. So go ahead, read “There’s AdSense in My Blog!”, and start serving some ads, if you’d like to. My blog got accepted though it had been rejected earlier. BloGTK is a weblog client that allows you to post to your weblog from Linux without the need for a separate browser window. BloGTK allows you to connect with many weblog systems such as Blogger, Movable Type, pMachine, and more. BloGTK is written using Python and PyGTK , and is designed to be fast and simple to use. I was wondering if BloGTK works with WordPress, until I found the BloGTK Blog, which runs on WordPress. So WordPress is now the blog software of choice for a blogging tool. WordPress’ operamaniac, Sushubh, tells us there is a fix for the fieldset float fix bug Opera has when it deals with WordPress’ admin pages. Opera users, rejoice! Some readers may be interested in this RSS Aggregator Without Delusions Of Grandeur (RAWDOG). It’s not just the name that’s interesting. It is a way to create an html page with the entries from you favourite blogs. I found a rawdog in my referrers, and I went looking, which is how I found this tool. RAWDOG has been around for more than a year, in one way or the other.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118963.4/warc/CC-MAIN-20170423031158-00090-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,318
15
https://vox.veritas.com/t5/General-Veritas/InstallMaster-8-1-on-Windows-2008/m-p/687416/highlight/true
code
We are in a process to migrate builds from windows 2003 to windows 2008. One tool used is InstallMaster 8.1 Is InstallMaster 8.1 compatible with Windows 2008? I presume Windows 2008 does have a Windows 2003 Compatibility mode. What about the license? Can we reuse the license on Windows 2003 for new installation of the tool on various VMs running Windows 2008.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100047.66/warc/CC-MAIN-20231129010302-20231129040302-00044.warc.gz
CC-MAIN-2023-50
361
3
https://www.nen.nl/NEN-Shop/Norm/NENISOIEC-18000642012-en.htm
code
Over deze norm This part of ISO/IEC 18000 defines the air interface for radio frequency identification (RFID) devices operating in the 860 MHz to 960 MHz Industrial, Scientific, and Medical (ISM) band used in item management applications. It provides a common technical specification for RFID devices that can be used by ISO committees developing RFID application standards. This part of ISO/IEC 18000 is intended to allow for compatibility and to encourage inter-operability of products for the growing RFID market in the international marketplace. It defines the forward and return link parameters for technical attributes including, but not limited to, operating frequency, operating channel accuracy, occupied channel bandwidth, maximum effective isotropic radiated power (EIRP), spurious emissions, modulation, duty cycle, data coding, bit rate, bit rate accuracy, bit transmission order, and, where appropriate, operating channels, frequency hop rate, hop sequence, spreading sequence, and chip rate. It further defines the communications protocol used in the air interface. ||Information technology - Radio frequency identification for item management - Part 64: Parameters for air interface communications at 860 MHz to 960 MHz Type D
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827639.67/warc/CC-MAIN-20181216095437-20181216121437-00602.warc.gz
CC-MAIN-2018-51
1,242
3
http://www.trekbbs.com/showpost.php?p=8835097&postcount=5
code
GoRe Star wrote: But they're not omnipotent. Quinn said so. Which is why I don't believe they can do anything and that they're limited. I've always been of the opinion that perhaps they're not completely honest in what they can do. Maybe some of it is illusion or some 'trick'. They're definitely not unstoppable as we saw in the Voyager episode.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736677946.19/warc/CC-MAIN-20151001215757-00001-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
346
3
https://www.ocpsoft.org/tags/facelets/
code
September 14th, 2009 by Lincoln Baxter III So, a little while ago I was attempting to use JSF’s Facelets <ui:repeat> tag, as a replacement for <h:dataTable>, but difficulty came when I needed to process actions on individual records of each row. <ui:repeat> allows iteration over a List of Array of items, but it does not provide a method of discovering the “selected” or “actioned” row; there’s no way to discover the row the user is interacting with. Or is there?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00606.warc.gz
CC-MAIN-2023-14
477
4
http://docs.ceph.com/docs/jewel/glossary/
code
Ceph is growing rapidly. As firms deploy Ceph, the technical terms such as “RADOS”, “RBD,” “RGW” and so forth require corresponding marketing terms that explain what each component does. The terms in this glossary are intended to complement the existing technical terminology. Sometimes more than one term applies to a definition. Generally, the first term reflects a term consistent with Ceph’s marketing, and secondary terms reflect either technical terms or legacy ways of referring to Ceph systems. - Ceph Project - The aggregate term for the people, software, mission and infrastructure - The Ceph authentication protocol. Cephx operates like Kerberos, but it has no single point of failure. - All Ceph software, which includes any piece of code hosted at - Ceph System - A collection of two or more components of Ceph. - Ceph Node - Any single machine or server in a Ceph System. - Ceph Storage Cluster Ceph Object Store Reliable Autonomic Distributed Object Store - The core set of storage software which stores the user’s data (MON+OSD). - Ceph Cluster Map - The set of maps comprising the monitor map, OSD map, PG map, MDS map and CRUSH map. See Cluster Map for details. - Ceph Object Storage - The object storage “product”, service or capabilities, which consists essentially of a Ceph Storage Cluster and a Ceph Object Gateway. - Ceph Object Gateway - The S3/Swift gateway component of Ceph. - Ceph Block Device - The block storage component of Ceph. - Ceph Block Storage - The block storage “product,” service or capabilities when used in conjunction with librbd, a hypervisor such as QEMU or Xen, and a hypervisor abstraction layer such as libvirt. - Ceph Filesystem - The POSIX filesystem components of Ceph. - Cloud Platforms - Third party cloud provisioning platforms such as OpenStack, CloudStack, OpenNebula, ProxMox, etc. - Object Storage Device - A physical or logical storage unit (e.g., LUN). Sometimes, Ceph users use the term “OSD” to refer to Ceph OSD Daemon, though the proper term is “Ceph OSD”. - Ceph OSD Daemon - The Ceph OSD software, which interacts with a logical disk (OSD). Sometimes, Ceph users use the term “OSD” to refer to “Ceph OSD Daemon”, though the proper term is “Ceph OSD”. - Ceph Monitor - The Ceph monitor software. - Ceph Metadata Server - The Ceph metadata software. - Ceph Clients - The collection of Ceph components which can access a Ceph Storage Cluster. These include the Ceph Object Gateway, the Ceph Block Device, the Ceph Filesystem, and their corresponding libraries, kernel modules, - Ceph Kernel Modules - The collection of kernel modules which can be used to interact with the Ceph System (e.g,. ceph.ko, rbd.ko). - Ceph Client Libraries - The collection of libraries that can be used to interact with components of the Ceph System. - Ceph Release - Any distinct numbered version of Ceph. - Ceph Point Release - Any ad-hoc release that includes only bug or security fixes. - Ceph Interim Release - Versions of Ceph that have not yet been put through quality assurance testing, but may contain new features. - Ceph Release Candidate - A major version of Ceph that has undergone initial quality assurance testing and is ready for beta testers. - Ceph Stable Release - A major version of Ceph where all features from the preceding interim releases have been put through quality assurance testing successfully. - Ceph Test Framework - The collection of software that performs scripted tests on Ceph. - Controlled Replication Under Scalable Hashing. It is the algorithm Ceph uses to compute object storage locations. - A set of CRUSH data placement rules that applies to a particular pool(s). - Pools are logical partitions for storing objects.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186895.51/warc/CC-MAIN-20170322212946-00023-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
3,744
82
https://community.mcafee.com/t5/SecurityCenter/Avoid-Computer-at-risk-popup-when-firewall-is-disabled/td-p/244336
code
I keep getting this 'Your computer is at risk' popup (twice everytime I boot my machine).It reports my firewall is off. That is true for this particular machine, but my access point has a firewall installed, so I don't need a firewall on my PC. I have checked: General Settings and Alerts -> Protection Alerts -> Don't show an alert when Firewall if off Nevertheless, I keep getting the popup. 1. Does anyone have the same problem? 2. Does anyone know a solution (other than installing/enabling a firewall on my machine which I don't need)? If you have a default firewall enabled and if you wish McAfee firewall to be excluded, you can uninstall the suite completely opt for a custom reinstallation with firewall unchecked. Hope this helps. But , disabling/ removing firewall is nt a good option as most of the times your security programs firewall acts persistent to block any untrusted download in case your default firewall fails . McAfee Online Community Moderator Thanks for your reply. I had already installed without the firewall option, and I've disabled Windows default firewall. I trust the firewall in my broadband router enough. I am aware of the possible risks of not running a software firewall on my PC. Recently, I prolonged my license, which came with a new download. I deinstalled the software, and reinstalled using the download I was suggested during purchase. The software looked different, it's now McAfee SecurityCenter as it was before, while in between it used to be some other GUI when I had the problems. This GUI appeared after some update a couple of months ago. Anyway, problem solved, or rather, vanished.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645830.10/warc/CC-MAIN-20180318165408-20180318185408-00335.warc.gz
CC-MAIN-2018-13
1,636
10
http://www.linuxquestions.org/questions/linux-software-2/samba-access-denied-on-windows-367338/
code
Samba - access denied on windows I recently configured samba for my Fedora Core 4 fileserver. I have a share and when I try to write the share it says that access is denied. The server is running Fedora Core 4 and my PC is Windows XP Pro SP2. this is my smb.conf: #======================= Global Settings ===================================== workgroup = WORKGROUP server string = Samba Server log file = /var/log/samba/log.smbd max log size = 50 #============================ Share Definitions ============================== comment = Share path = /samba/shared read only = No writeable = Yes guest ok = Yes public = Yes browseable = Yes create mask = 0666 directory mask = 0777 Last edited by suco; 09-26-2005 at 09:02 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190236.99/warc/CC-MAIN-20170322212950-00312-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
724
20
http://custom-programs.blogspot.com/2011/05/cherish-paperie-survey-giveaway-winner.html
code
We want to thank all of those who took our survey and entered to win a $50 credit towards our products. Those who took the survey have helped us in knowing what you, the reader, want more of and now we can provide that! If you haven't yet took the survey but would like to, please feel free to go here and submit your answers. We appreciate any feedback on our website and our blog. So without further ado I am pleased to announce that the winner is: Congrats, Jessica! And thank you again for taking the time to complete the survey. We will be emailing you within 24 hours with information on how to collect your prize.
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607648.39/warc/CC-MAIN-20170523163634-20170523183634-00015.warc.gz
CC-MAIN-2017-22
620
3
https://www.gamedev.net/topic/642727-installing-debian-from-usb-disk/?forceDownload=1&_k=880ea6a14ea49e853634fbdc5015a024
code
Now this has me VERY confused. See, there was once upon a time where I could fire up unetbootin or yumi, install a debian iso to an usb drive and be done with it. Now it fails installation on both of them (with yumi, installer doesn't recognizes the simulated cd-rom drive, with unetbootin it recognises it but fails to read some files after a while). (Have In mind that I'm talking about a netbook here, so no real CD drive) Now if you search for "debian usb install" I get some links that either assume a lot of things, or I'm too stupid to understand what is really going on, or were written by authors who where living in another universe that isn't mine. Something about just plain copying the debian iso to the usb drive and automagically works! (it doesn't actually) or some other needed file (boot.img) that also needs to be copied for it to automagically work! (it doesn't either). So now I'm just out of ideas. I downloaded the xfce image from here: http://cdimage.debian.org/cdimage/weekly-builds/amd64/iso-cd/ Or that's what I think. There is a 10Mb difference between my iso and that iso, trying to download again, but that might be related with the fact that there is 800 branches in debian's directory tree so who knows if I ended up in the weekly builds or not...
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122167.63/warc/CC-MAIN-20170423031202-00091-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,279
5
https://softwareengineering.stackexchange.com/questions/398766/is-the-distinction-between-mocks-stubs-and-fakes-useful
code
Whether you are using mocks or stubs does not really make that big of a difference. But what does make a huge difference is using mocks or stubs on one hand, versus using fakes on the other hand. Mocks/stubs and Fakes (using Fowler's terminology) make different amounts of assumptions about the world, and subsequently the choice of whether to use mocks/stubs or fakes has a real impact on what kind of testing you are doing: - are you doing genuine, traditional, bona fide "unit testing", or - are you taking shortcuts and mixing your unit testing with integration testing? - are you testing against the interface? or - are you testing against the implementation? Mocks usually assume a lot: They assume that specific methods will be invoked, sometimes in a specific order, usually with very specific arguments, and they return very specific predetermined results in each call, which represent another whole new level of assumptions: they are the results that some programmer assumes that the real module would have returned for the given parameters and in its presumed state. Stubs make somewhat fewer assumptions about the ways in which they are invoked, but they still assume a lot, both in terms of how they will be invoked, and in terms of how the real module would have responded. That's because stubs, just like mocks, are only built to respond to the specific usage pattern that is expected from the unit-under-test, when exercised by the specific test. Essentially, the use of stubs is equivalent to the use of mocks, their only difference being that stubs are usually hand-crafted, so even if you wanted to code more assumptions it would be a lot of work to do so, while mocks are usually created using some mocking framework which makes it easy to specify assumptions, so you are likely to specify more of them. Fakes, on the other hand, tend to make as few assumptions as possible, and instead they try to offer a set of functionality that is as close as possible to the real thing. The ideal fake behaves in a way which is indistinguishable from the original, from the point of view of code which is exercising its public interface. (The differences are in their inner workings, and of course in what other subsystems they may or may not invoke in order to do their job.) As such, fakes usually do not depend on any particular usage pattern from any unit-under-test, exercised by any test. From the above it should be clear that when you are using mocks or stubs you are making excessive amounts of assumptions about the inner workings of the unit under test, while when you are using fakes you are making no such assumptions: you don't care exactly how your unit-under-test is invoking your fake object, all you want to see whether the end result of their interaction is correct. This in turn means that: When you are using mocks or stubs you are doing traditional unit testing "by the book", and you are totally disregarding the advice which says "test against the interface, not against the implementation". When you are using fakes you are not really doing unit testing "by the book", you are mixing it a bit with integration testing, (*) but you can in fact stick to testing against the interface instead of the implementation. These are the facts, and you can use them to make your own educated choices. If you want my opinion, fakes are a far superior choice to mocks and stubs, because testing against the implementation is not a wise thing to be doing, whereas doing something by the book when there is no objective merit in doing so is just cargo-cult programming. (*) I am saying "mixing it a bit with integration testing" in the sense that you are testing in integration with the fake, and you are deviating from the rule of unit testing which requires exercising your subsystem-under-test in complete isolation from its environment. With fakes, you do not anymore have complete control over every single detail of the interaction between your subsystem-under-test and its dependencies; you let the subsystem-under-test invoke whatever methods it needs on the fake, while the fake responds as faithfully to the original as possible. If the subsystem-under-test invokes a method on the fake that you did not expect to be invoked, or with parameter values that you did not expect, you will not necessarily know from this type of testing. This is exactly what happens in integration testing. And it is okay, because all you care about in integration testing is correctness of the end result of the interaction between your subsystem-under-test and its dependencies. In this case it just so happens that some or all of the dependencies are fakes.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657735.85/warc/CC-MAIN-20230610164417-20230610194417-00135.warc.gz
CC-MAIN-2023-23
4,668
15
https://www.superherodb.com/what-is-the-coolest-sounding-name-of-a-fictional-character-list-3/100-5644/
code
What is the coolest sounding name of a fictional character? (list 3) Created by dcm, 2 y 3 mo 3 d ago. Basically list the three fictional characters (in your opinion) who have the coolest sounding names. That isn't my list but you get the idea
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00633.warc.gz
CC-MAIN-2023-50
243
4
http://homelinkcs.com/testimonials/highly-recommend/
code
I can highly recommend Robert's services through Homelink Computer Services. I have had the pleasure of working with Robert to design my company website as well as two other business venture websites. Each time Robert has been extremely responsive to our company's goals for the website as well as offered strategic recommendations to improve upon our original intent. I can attest that Homelink is very efficient and delivers high value exceeding expectations. - Kevin Shaw
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815500.61/warc/CC-MAIN-20180224073111-20180224093111-00088.warc.gz
CC-MAIN-2018-09
474
2
http://irbg.org/2018/12/
code
- Are you an enthusiast of programming robots? - Do you like open-source projects? In collaboration with the Ideenlabor creativity company, the IRBG will develop a new robotic product shortly. This product will use our open-source robotic system Bot1 to implement its system functionality. Therefore, this is an opportunity to impulse and improve our robotic system. Have this project got your interest? In that case, you are welcomed if you know (or you want to learn) some of the following skills: - Sensor programming - Computer vision (Open CV) - Beagle Bone devices (Raspberry Pi enthusiasts are also welcomed) - ARM-Mx processors - Circuit design
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304570.90/warc/CC-MAIN-20220124124654-20220124154654-00446.warc.gz
CC-MAIN-2022-05
652
10
https://wiki.resolution.de/doc/user-deactivator/latest/all/administrator-guide/license-optimizer-admin-guide/ignore-endpoints
code
Since version 5.4.0 one can add paths to each License Optimizer application configuration that will be ignored when being processed. Some REST endpoints might not handle well additional delays introduced by the checks License Optimizer needs to perform. Examples are the REST endpoints from Jira Asset Management that start with /rest/insight If you don't encounter any performance degradation with Jira Assets there should be no need to use this option. For each application being optimized (1), just add paths relative to the base URL of your instance (2) without the application context at the end (some run Jira and Confluence on the same server/ base URL i.e. https://mycompany.com/jira and https://mycompany.com/confluence, only everything after counts as path for this option). You are not allowed to ignore all paths by referring to / only because you'd essentially disable License Optimizer. The path check is performed using startsWith and doesn't support regular expressions. Ignoring /rest/insight like in the picture below covers all known REST endpoints of the Asset management. Caveheats When Using With Jira Asset Management Users who have been inactive for the Inactivity Period defined in the top-left of the settings are getting removed from the group that provides the license. When they become active again this might only happen due to a REST call to one of the endpoints you are now ignoring. They'd then either get permission-related or 404 errors in the Asset section. Only a page refresh would solve that but this is of course not very user-friendly. We recommend increasing the Inactivity Period to a value of a few hours and a maximum of the duration of a regular working day. This will keep the users longer in the license group. The only downside is that licenses are not freed up again that quickly. Please keep that in mind if you start reaching the maximum of available licenses already. Please refer to this article on how to monitor license consumption at any time in your instance.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00141.warc.gz
CC-MAIN-2024-18
2,017
5
http://aboutbsd.net/?m=20151021
code
After recent discussions of revisiting W^X support in Mozilla Firefox, David Coppa (dcoppa@) has flipped the switch to enable it for OpenBSD users running -current. The 2015 Grace Hopper Conference was held in Houston, TX, October 14-16. The conference is for women in computing and most of the attendees were female computer science majors, female software developers, and college professors. A few men that attended as well, but of the 12,000 attendees, the majority were women. Arriving in Houston I think everyone attending the
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587623.1/warc/CC-MAIN-20211025030510-20211025060510-00470.warc.gz
CC-MAIN-2021-43
531
4
https://docs-previous.pega.com/data-management-and-integration/86/using-data-import-wizard
code
If your organization stores its data in spreadsheets, you can easily import that data into your Pega Platform application by using the Data Import wizard. You can import data from a variety of sources, even if they use different field names or types. During the import process, you configure how to process the data, and map the fields in the source .csv file or .xlsx file to the fields in your data object, without manually developing rules. With the Data Import wizard, you can efficiently migrate large data sets into your application, and use the data to build automated digital business processes. You can also add data import widgets to your dashboard to view the details of completed imports or imports that are currently in progress. Use the following topics to guide you through the process of importing your data.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00418.warc.gz
CC-MAIN-2023-50
824
3
http://www.photopost.com/forum/photopost-pro-installation-upgrades/112697-unsuccessful-upgrade-5-a-print.html
code
Unsuccessful upgrade to 5 2.5 hours has just been wasted trying to upgrade from pp 4.8c to pp 5.0.1. First off, clicking on 4.8.2 on upgrade.php returned a blank page so I clicked on 4.85 which displayed a page. I proceded with the 4.8.5 upgrade without a hitch until it started the process of moving files and creating directories. My server kept timing out after 10 minutes (57,000 images). Fortunately the PHP process still ranand completed (I verified that the files moved.). So I hacked my way to the next step my typing in the url for step 3 manually; which completed without a problem. I deleted the upgrade.php script and proceded to the index page of the gallery in my browser and was dissapointed to see a blank page. I am at a loss of what to do next. Should I revert to my backup? Is it possible to obtain the last version of PP 4.8.x? You can't skip an upgrade step. If the 4.82 upgrade isn't working, then we need to resolve that; but that step cannot be skipped. When I ran this, I get the screen that I am suppose to see. You should reupload the upgrade.php script and run it. I figured out the problem. There appears to be a depenancy on config-int.php (I dont use forum integration) in the upgrade to 4.8.5. As soon as I put the file in place the I was able to upgrade from 4.8 to 4.8.5 and then on to 5.0.1. Glad to hear. |All times are GMT -5. The time now is 10:26 PM.| Powered by vBulletin® Version 3.8.1 Copyright ©2000 - 2013, Jelsoft Enterprises Ltd. Search Engine Friendly URLs by vBSEO 3.2.0
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701233842/warc/CC-MAIN-20130516104713-00084-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,520
14
http://sfc.smackjeeves.com/comics/537759/sfc3-day-37-final-reward/
code
Fan Characters will be competing for $1,000,000. Baxter won the clue, but will it be enough to help him make the Final 3? Fliping hope not. Hope not. My vote is with either Violet or Monty. Can the public get a jury vote so that Montana can win? kthxbye I hope so Anything to get violet voted off. Sorry, No Public Jury vote Almost to the end...will they make it? I still think Montana wins the immunity. I don't care about the Final 3, I'm more concerned about winning. I'm thinking that Baxter wins immunity. Alex realizes that Violet is to big of a threat and votes with Montana to vote him off. 2 votes Violet 2 votes Montana. Montana wins tie-breaker somehow. I see Montana somehow winning immunity and violet's gone.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123097.48/warc/CC-MAIN-20170423031203-00166-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
722
13
https://simonwillison.net/2010/Oct/28/is-there-a-good/
code
Is there a good online calendar for upcoming technology conferences? My answer to Is there a good online calendar for upcoming technology conferences? on Quora We’re trying to build exactly this with http://lanyrd.com/—not just for technology conferences, but they are definitely our largest niche. We have over 3,000 conferences listed at the moment, and we categorise them in to topics, for example:http://lanyrd.com/topics/social-... You can also browse the site by place:http://lanyrd.com/places/boston/ And even by topic-in-a-place:http://lanyrd.com/topics/social-... Most importantly, if you sign in with Twitter we’ll pull the list of people you follow and show you conferences that they are tracking, attending or speaking at. All of the above pages have associated iCal feeds so you can subscribe to them directly from iCal, Outlook or Google Calendar. We’ve been live since the beginning of September but we’ve already got a pretty good community developing around the site. Finally, if you’re a conference speaker we encourage you to build up a profile of the talks you’ve given in the past—here’s mine:http://lanyrd.com/people/simonw/ Lanyrd is under very active development, so please tell us if there’s anything we could be doing to help make it easier for you to find the right events.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00593.warc.gz
CC-MAIN-2023-06
1,320
11
https://brill.com/abstract/journals/ab/58/4/article-p419_7.xml
code
The main objective of the Water Framework Directive (WFD) is to achieve good ecological status for surface waters in Europe by 2015. The ecological status has to be defined based on near-natural reference conditions. Benthic invertebrates and diatoms are among the key biological elements recommended by the Directive to assess ecological quality of water bodies. The purpose of this study is to identify species associations of these biological elements that are characteristic of the different stream types occurring in Luxembourg and that distinguish degraded from reference conditions. In general, the results reveal that diatoms and invertebrates can be considered as complementary indicators with more diatom species being characteristic of small size stream types and more benthic invertebrate species being associated with larger stream types. Among invertebrates, Trichoptera, Hydrachnidia, Ephemeroptera and Diptera show high affinities for most stream types. Plecoptera, Oligochaeta appear as useful indicators for some particular types. If only reference sites are selected (all river types considered), the number of indicator species drops from 55 to 24 for diatoms and from 81 to 48 for benthic invertebrates. Moreover, for the larger stream type, no reference site was found at all. This trend is likely to be a consequence of the multiple anthropogenic pressures that have affected large parts of European lowland rivers for decades. Our results suggest that Trichoptera, Hydrachnidia, Diptera, Ephemeroptera and Oligochaeta could be considered as best candidate groups for a tiered-taxonomic resolution approach where only taxa which have narrow and specific ecological requirements would be identified to finer levels. In Central Europe, however, since taxonomic soundness and easy recognition are required, only Trichoptera and Ephemeroptera are the groups to be recommended at the present time.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826686.8/warc/CC-MAIN-20181215014028-20181215040028-00054.warc.gz
CC-MAIN-2018-51
1,915
1
http://pulp-smash.readthedocs.io/en/latest/api/pulp_smash.tests.pulp2.puppet.cli.test_sync.html
code
Tests that sync Puppet repositories. Test whether Pulp can associate already-downloaded content with a repo. Consider the following scenario: - Create a repository with a feed and sync it. - Create a second repository with the same feed and sync it. When the second repository is synced, Pulp should recognize that the needed content units are already present, and it should associate them with the second repository. However, according to Pulp #1937, Pulp fails to do this, and the second repository will not be populated. Create two repositories with the same feed, and sync them serially. More specifically, this test creates two puppet repositories with identical feeds, syncs them serially, and verifies that both have equal non-zero content unit counts. Test whether one can sync modules from the Puppet Forge. According to Pulp #1846, Pulp sometimes fails to sync modules available on the Puppet forge. There is no consistency regarding which modules fail to sync: according to one comment, Pulp only detects 40 modules (of ~1,800), and according to another comment, Pulp syncs 4,089 of 4,128 modules. How do we test this? The ideal test case is to repeatedly sync the entire Puppet Forge and check for sync failures, until the probability of another random failure is low. This is problematic: we’re abusing the Puppet Forge and extending the test time. A more realistic test is to sync a small number of modules and ensure that no errors occur. This provides much less assurance, but it does at least show that a sync from the Puppet Forge can complete. pulp_smash.tests.pulp2.puppet.api_v2.test_sync_publishalready syncs from the Puppet Forge, but Pulp #1846 specifically uses the CLI. The end result is a test case that syncs an unknown number of Puppet modules and which provides only minimal assurance that syncs from the Puppet Forge work. Unfortunately, we cannot do better. Create a Puppet repository and trigger a sync. Tell how many puppet modules are in a repository. - cfg (pulp_smash.config.PulpSmashConfig) – Information about the Pulp server being targeted. - repo_id – A Puppet repository ID. The number of puppet modules in a repository, as an
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591718.31/warc/CC-MAIN-20180720154756-20180720174653-00002.warc.gz
CC-MAIN-2018-30
2,174
18
https://github.com/z0w0?tab=followers
code
Hide content and notifications from this user. Contact Support about this user's behavior. Trying to work hard every day and level up my skills. That's why I decided to code my favorite things after work on github. @pybenchmark @extended-debug @algo-holic Phoenix, Arizona, USA Js/Rust enthusiast | Crossbone Vanguard Elite Team Member. Student from Germany. University of Birmingham Birmingham, United Kingdom I'm an intern at Jump Trading. I study computer science at UIUC. I was formerly at CoreOS (YC S13), Sandia National Laboratories, and Rockwell Collins. Cedar Rapids, Iowa consultant, full-stack developer, ui/ux designer, musician & diy entusiast Póvoa de Varzim, Porto, Portugal Devsigner @algolia UX Search API [YC14] ~ own a clairvoyance PhD, eat scale for breakfast, fly Armattan quad FPV, attack ships on fire off the shoulder of Orion UX Devsigner @Algolia Paris – SF Ilya is a developer experience evangelist and engineer at Weaveworks, focused on making the adoption of microservices easier. New York City Leto Labs LLC Senior Developer @influxdata & co-Founder @slackpass Developer at large
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00454-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,112
21
http://silverlight.sys-con.com/node/2367187
code
|By Clint Edmonson|| |September 18, 2012 04:12 PM EDT|| Windows Azure Web Sites has added a new pricing tier that will solve the #1 blocker for the web development community. The shared tier now supports custom domain names mapped to shared-instance web sites. This post will outline the plan changes and elaborate on how the new pricing model makes Windows Azure Web Sites an even richer option for web development shops of all sizes. # of Sites $.02/hr per site, per instance $.08/hr per core Setting the Stage In June, we released the first public preview of Windows Azure Web Sites, which gave web developers a great platform on which to get web sites running using their web development framework of choice. PHP, Node.js, classic ASP, and ASP.NET developers can all utilize the Windows Azure platform to create and launch their web sites. Likewise, these developers have a series of data storage options using Windows Azure SQL Databases, MySQL, or Windows Azure Storage. The Windows Azure Web Sites free offer enabled startups to get their site up and running on Windows Azure with a minimal investment, and with multiple deployment and continuous integration features such as Git, Team Foundation Services, FTP, and Web Deploy. The response to the Windows Azure Web Sites offer has been overwhelmingly positive. Since the addition of the service on June 12th, tens of thousands of web sites have been deployed to Windows Azure and the volume of adoption is increasing every week. In spite of the growth and success of the product, the community has had questions about features lacking in the free preview offer. The main question web developers asked regarding Windows Azure Web Sites relates to the lack of the free offer’s support for domain name mapping. During the preview launch period, customer feedback made it obvious that the lack of domain name mapping support was an area of concern. We’re happy to announce that this #1 request has been delivered as a feature of the new shared plan. New Shared Tier Portal Features In the screen shot below, the “Scale” tab in the portal shows the new tiers – Free, Shared, and Reserved – and gives the user the ability to quickly move any of their free web sites into the shared tier. With a single mouse-click, the user can move their site into the shared tier. Once a site has been moved into the shared tier, a new Manage Domains button appears in the bottom action bar of the Windows Azure Portal giving site owners the ability to manage their domain names for a shared site. This button brings up the domain-management dialog, which can be used to enter in a specific domain name that will be mapped to the Windows Azure Web Site. Shared Tier Benefits Startups and large web agencies will both benefit from this plan change. Here are a few examples of scenarios which fit the new pricing model: - Startups no longer have to select the reserved plan to map domain names to their sites. Instead, they can use the free option to develop their sites and choose on a site-by-site basis which sites they elect to move into the shared plan, paying only for the sites that are finished and ready to be domain-mapped - Agencies who manage dozens of sites will realize a lower cost of ownership over the long term by moving their sites into reserved mode. Once multi-site companies reach a certain price point in the shared tier, it is much more cost-effective to move sites to a reserved tier. Long-term, it’s easy to see how the new Windows Azure Web Sites shared pricing tier makes Windows Azure Web Sites it a great choice for both startups and agency customers, as it enables rapid growth and upgrades while keeping the cost to a minimum. Large agencies will be able to have all of their sites in their own instances, and startups will have the capability to scale up to multiple-shared instances for minimal cost and eventually move to reserved instances without worrying about the need to incur continually additional costs. Customers can feel confident they have the power of the Microsoft Windows Azure brand and our world-class support, at prices competitive in the market. Plus, in addition to realizing the cost savings, they’ll have the whole family of Windows Azure features available. Continuous Deployment from GitHub and CodePlex Along with this new announcement are two other exciting new features. I’m proud to announce that web developers can now publish their web sites directly from CodePlex or GitHub.com repositories. Once connections are established between these services and your web sites, Windows Azure will automatically be notified every time a check-in occurs. This will then trigger Windows Azure to pull the source and compile/deploy the new version of your app to your web site automatically. Walk-through videos on how to perform these functions are below: These changes, as well as the enhancements to the reserved plan model, make Windows Azure Web Sites a truly competitive hosting option. It’s never been easier or cheaper for a web developer to get up and running. Check out the free Windows Azure web site offering and see for yourself. Stay tuned to my twitter feed for Windows Azure announcements, updates, and links: @clinted Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open. Jun. 24, 2016 04:15 PM EDT Reads: 1,049 Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp... Jun. 24, 2016 02:15 PM EDT Reads: 339 SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec... Jun. 24, 2016 01:00 PM EDT Reads: 1,290 Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat... Jun. 24, 2016 12:00 PM EDT Reads: 1,533 Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th... Jun. 24, 2016 12:00 PM EDT Reads: 709 The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh... Jun. 24, 2016 11:15 AM EDT Reads: 576 It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t... Jun. 24, 2016 11:00 AM EDT Reads: 947 In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett... Jun. 24, 2016 10:30 AM EDT Reads: 866 19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri... Jun. 24, 2016 09:45 AM EDT Reads: 1,152 SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes. Jun. 24, 2016 09:30 AM EDT Reads: 1,098 There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a... Jun. 24, 2016 09:30 AM EDT Reads: 574 Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp... Jun. 24, 2016 08:45 AM EDT Reads: 1,095 There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is... Jun. 24, 2016 08:45 AM EDT Reads: 1,199 A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh... Jun. 24, 2016 08:30 AM EDT Reads: 768 Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher.... Jun. 24, 2016 08:15 AM EDT Reads: 1,174 Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ... Jun. 24, 2016 08:15 AM EDT Reads: 1,403 In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly. Jun. 24, 2016 07:30 AM EDT Reads: 953 The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni... Jun. 24, 2016 07:15 AM EDT Reads: 1,148 industrial company for a multi-year contract initially valued at over $4.0 million. In addition to DataV software, Bsquare will also provide comprehensive systems integration, support and maintenance services. DataV leverages advanced data analytics, predictive reasoning, data-driven diagnostics, and automated orchestration of remediation actions in order to improve asset uptime while reducing service and warranty costs. Jun. 22, 2016 11:00 AM EDT Reads: 1,332 Vidyo, Inc., has joined the Alliance for Open Media. The Alliance for Open Media is a non-profit organization working to define and develop media technologies that address the need for an open standard for video compression and delivery over the web. As a member of the Alliance, Vidyo will collaborate with industry leaders in pursuit of an open and royalty-free AOMedia Video codec, AV1. Vidyo’s contributions to the organization will bring to bear its long history of expertise in codec technolo... Jun. 19, 2016 12:45 PM EDT Reads: 1,222
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00175-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
15,749
64
https://communary.net/2017/05/10/update-azurermtag/
code
I recently had a need of tagging a large number of resources in Azure, and found it difficult to do this easily. So naturally I ended up creating a helper function to do the job for me. The function takes an array of ResourceIds as input, as well as a hashtable of tags. It will tag all resources with the new tags, without removing any of the old tags. There are still some small work to be done on the function, such as adding help, confirm/whatif support and some more error handling, but I decided to release it as is for now. When I get the time to update it, I will update this post. The code is in a gist so it’s possible for anyone to fork and make changes to it. If you want to help contribute to the code, please feel free to fork it and help making it better.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739370.8/warc/CC-MAIN-20200814190500-20200814220500-00311.warc.gz
CC-MAIN-2020-34
772
4
https://learn.microsoft.com/es-ES/previous-versions/troubleshoot/dynamics/crm/unable-integrate-yammer
code
Unable to integrate Yammer with Microsoft Dynamics CRM 2011 Online This article helps you resolve the problem where you are unable to integrate Yammer with Microsoft Dynamics CRM 2011 Online. Applies to: Microsoft Dynamics CRM 2011 Original KB number: 2852087 During the integration setup, a user will go through the following steps: Click on Administration tab in CRM Online. Click on Yammer Configuration. Agree to the terms and conditions. Once the terms and conditions are accepted, the user will be asked to authorize his Yammer account. After clicking on Authorize Microsoft Dynamics CRM Online to connect to Yammer, the user will get the following error: An error has occurred. Try this action again. If the problem continues, check the Microsoft Dynamics CRM Community for solutions or contact your organization's Microsoft Dynamics CRM Administrator. Finally, you can contact Microsoft Support In the Yammer portal, Third Party Applications checkbox was unchecked under the Enabled Features area of the Admin tab. - Log into the Yammer portal as Yammer Network Administrator. - Click on the Admin tab. - Under Enabled Features, select Third Party Applications. - Check the Checkbox for Third Party Applications. - Save the settings. Even the System Administrator of CRM Online will get the same error message if this is unmarked.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00586.warc.gz
CC-MAIN-2023-50
1,338
18
https://help.intrexx.com/intrexx/steady/en-us/Content/OH/de.uplanet.lucy.client.odata.connector.integration.dsmanager.ConnectorAPIPanel.html
code
Connector for Connector API The Intrexx Connector API defines a Java API for implementing your own Intrexx connectors that provide external data in Intrexx via an external data group. In principle, the API specifies two Java interfaces that should be implemented by developers to create, read, update, and delete data records and files in the external system (known as CRUD operations). In addition, a metadata model is stored in the connector configuration file. This describes the structure of the data groups (fields, relationships, settings) provided by the connector implementation. At runtime, the Connector API provides preconfigured clients for HTTP and OData requests that automatically perform user authentication – if required by the service – via HTTP Basic Auth or OAuth2. Furthermore, any Java library (e.g. JDBC, REST APIs, etc.) can be used in your own code. Selecting "Connector API" menu / New data source will open a wizard where a new connection can be created. This option is available if the Connector for Connector API is selected under "Consume data" on the left-hand side. In all configuration dialogs, you can reach the corresponding Intrexx help by pressing F1 or clicking on the Help button. Every connection created by you is listed in the right-hand area. All of the functions available for editing a connection can be reached via "Connector API" menu, when an existing connection has been selected on the right. Displays the name of the connector. Displays the description of the connector.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00042.warc.gz
CC-MAIN-2023-23
1,525
5
https://pubmed.ncbi.nlm.nih.gov/24766811/?dopt=Abstract
code
During social interactions, an individual's behavior is largely governed by the subset of signals emitted by others. Discrimination of "self" from "other" regulates the territorial urine countermarking behavior of mice. To identify the cues for this social discrimination and understand how they are interpreted, we designed an olfactory-dependent countermarking assay. We find major urinary proteins (MUPs) sufficient to elicit countermarking, and unlike other vomeronasal ligands that are detected by specifically tuned sensory neurons, MUPs are detected by a combinatorial strategy. A chemosensory signature of "self" that modulates behavior is developed via experience through exposure to a repertoire of MUPs. In contrast, aggression can be elicited by MUPs in an experience-independent but context-dependent manner. These findings reveal that individually emitted chemical cues can be interpreted based on their combinatorial permutation and relative ratios, and they can transmit both fixed and learned information to promote multiple behaviors. Copyright © 2014 Elsevier Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818312.80/warc/CC-MAIN-20240422144517-20240422174517-00085.warc.gz
CC-MAIN-2024-18
1,105
2
https://sourceforge.net/p/panachart/news/
code
some bugs fixed X,Y axis titles line styles support The new PanaChart home page is available. You can create charts on the fly by using the Demo form, view documentation and coding examples or browse a list of different chart images created with PanaChart. Supports several plot types: bars, lines, dots, areas, step, impuls.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105341.69/warc/CC-MAIN-20170819105009-20170819125009-00148.warc.gz
CC-MAIN-2017-34
325
5
https://www.surfaceforums.net/threads/photo-album-of-your-surface-pro-3-desk-set-up.11303/page-7
code
Where'dja get the little stand to elevate your port replicator? It was actually sheer luck. I'd been looking for a shelf for a while so I'd have a place to store my keyboard while doing homework and non computer related stuff. After browsing Ikea with no luck, I found their AS-IS section and they had a bunch of drawer fronts for a few bucks. Found one that matched my desk (luckily) and then found some screws at Home Depot for the legs.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818105.48/warc/CC-MAIN-20240422082202-20240422112202-00819.warc.gz
CC-MAIN-2024-18
439
2
https://www.elance.com/s/kteam4/
code
With 1.7 million freelancers, we'll match you with the perfect talent. or, Register with Elance » I am an honest and hard worker. I get put in the required hours and then some. I will do the job and get it done in a timely manner. I work well with deadline constraints.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687906.71/warc/CC-MAIN-20170921205832-20170921225832-00616.warc.gz
CC-MAIN-2017-39
270
3
https://pakmediablog.net/malicious-nuget-packages-abuse-msbuild-to-install-malware-2293.html
code
A caller NuGet typosquatting run pushes malicious packages that maltreatment Visual Studio's MSBuild integration to execute codification and instal malware stealthily. NuGet is an open-source package head and package distribution system, enabling developers to download and see ready-to-run .NET libraries for their projects. Threat actors who target package distribution systems for illustration npm and PyPI person precocious shown liking successful NuGet, which predominantly targets Windows users and has go very celebrated among package developers. Hiding codification pinch MSBuild The latest NuGet run was spotted by ReversingLabs on October 15, 2023, utilizing different typosquatting packages to instal malware. Some of nan packages seen successful this run include: The caller constituent successful this run is that alternatively of utilizing nan modular attack of incorporating downloaders successful nan instal scripts, these packages leverage NuGet's MSBuild integration for codification execution. NuGet's MSBuild integrations is simply a characteristic introduced successful NuGet v2.5 pinch nan goals of supporting autochthonal projects, automating nan build and testing process, and giving developers nan expertise to specify civilization actions and resoluteness dependencies. When NuGet installs a package containing a '\build' folder, it automatically adds an MSBuild <Import> constituent to nan project, referencing nan .targets and .props files successful that folder. The build process uses these files to group configurations, properties, aliases civilization tasks. Although added to heighten nan build and packaging process for package projects, this caller NuGet integration has raised concerns about nan information implications it introduces, arsenic it adds a caller method to automatically tally scripts erstwhile a package is installed. In nan lawsuit spotted by ReversingLabs, nan malicious codification is hidden wrong nan <packageID>.targets record successful nan "build" directory arsenic a <Code> spot that implements nan functionality of PowerShell scripts utilized successful erstwhile versions of nan packages. Upon execution, nan codification fetches an executable from an outer reside and runs it successful a caller process. This method was first introduced by a security interrogator successful 2019 to exemplify really nan MSBuild process tin beryllium abused to tally codification erstwhile NuGet packages are installed. "First, nan drawstring artifact successful nan first statement of nan file, 'IAmRootDemo' led america to nan guidelines of this execution technique," explains ReversingLab's Karlo Zanki in a study shared pinch BleepingComputer. "Several years ago, successful 2019, the IAmRoot package was published by C. Augusto Proiete. The intent of nan package: 'To show that immoderate NuGet package tin tally arbitrary codification connected your machine.'" However, this is nan first documented lawsuit of threat actors leveraging this characteristic successful malicious NuGet packages. Evolution of existing campaigns ReversingLabs reports that nan NuGet packages they spotted, which person been removed, were portion of an ongoing run that started successful August 2023. However, it didn't maltreatment MSBuild integrations until mid-October. Earlier versions utilized PowerShell scripts ('init.ps1') to fetch nan malware payload from a GitHub repository. This indicates that nan attackers continually refine their techniques to make nan attacks stealthier. The analysts besides study watching beardown ties to a campaign reported by Phylum astatine nan commencement of nan month, wherever nan attackers utilized typosquatting to mimic crypto projects and present SeroXen RAT. ReversingLabs reports that nan threat actors instantly attempted to upload caller packages aft erstwhile ones were removed, showing intent to proceed nan campaign.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00678.warc.gz
CC-MAIN-2023-50
3,902
23
http://battlebrothersgame.com/forums/topic/poisoned-with-neer-a-blow-struck/
code
Hired a promising wildman with negative ranged defence. Gave him a kite shield to compensate. Ambushed by goblins. Before any blows were struck (the battle event scroll to the top-left of the screen, showing two sighted events, is fully opened), he had already been poisoned and lost some hit points and padding. He spent the rest of the battle edging towards where the closest goblins were, but never quite getting there before they were killed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00077.warc.gz
CC-MAIN-2023-14
446
1
https://deep-blue-water.net/hello-world.html
code
Well in a world where everyone has a blog/myspace/facebook/homepage I figured I should finally set up something. Its kind of ironic I guess me not having a webpage when there are literally thousands of websites out there using designs created by me. I found this old domain in my godaddy account , and figured it would perfect for a personal site on Key West, fishing, spearfishing etc, also a place to play around and show some of the photos my girlfriend and and I have taken underwater, although with the conditions recently it should be called shallow-green-water.com. The design is almost done I just have to mess around font colors and a couple more icons, then hit the wordpress plugin directory and see what toys I can add to the blog. Actually pretty fun way to spend a day designing for myself for once, and hopefully with a few tweaks and edits, I’ll use this design for some other projects.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100518.73/warc/CC-MAIN-20231203225036-20231204015036-00353.warc.gz
CC-MAIN-2023-50
904
2
http://www.ukweatherworld.co.uk/forum/index.php?/topic/75461-meteoinfo-software-free-meteorological-data-viewer/page__pid__846288__st__20
code
(Flatfile Data on Observating Stations XX Date Edition) MeteoInfo 1.0.3 was released with SYNOP data supported (http://www.meteothinker.com). Currently decoded parameters are visibility, cloud cover, wind direction, wind speed, temperature, dew point, pressure, precipitation and current weather. The functions were not tested with many data files due to my limit time, so please help me to do this job. I found another station list http://www.atmos.was...tationlist.html which including more stations than WMO station list. Any way, it's just beginning and it will be better in the future. "SYNOP Data" menu item is under "ASCII Data" menu item in "Meteo Data" dialog. Some figures from a synop data file are attached.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00015-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
719
2
https://www.equisys.com/Support/Technotes/info-whats-new-in-zetadocs-for-nav-v90
code
This Zetadocs technical note applies to: This technote summarises the changes in the latest version of Zetadocs for NAV. The following changes have been made to version 9.0 of Zetadocs for NAV. NAV 2017 Support Added support for NAV 2017 deployed on premise and multi-instance NAV deployments on Azure or privately hosted by partners. Drag & Drop on all NAV clients Version 9 introduces a single Zetadocs Documents FactBox to support all NAV clients. The same Zetadocs Documents FactBox is now available on the NAV Windows clients (32 and 64-bit) plus any of the HTML clients and the Dynamics NAV app (Universal app). There is no longer a requirement to install the Zetadocs Client on each PC to be able to drag and drop documents against any NAV record, removing the need for additional deployment steps on each client PC. NOTE: Drag & Drop emails from Outlook requires a 3rd party Outlook add-in - see technote ZTN4477 Save & Send from all NAV Clients On NAV 2015 and later, Zetadocs Express Save & Send now uses the Zetadocs NAV Server Delivery settings, so that Zetadocs Express customers can send and archive from all NAV clients, and simplifies the upgrade to Zetadocs Delivery Essentials. Zetadocs NAV Server Delivery uses built-in NAV Report Selections The Zetadocs Send button has been updated in this release to work with the standard NAV Report Selections, so that it’s simpler for customers to select the report Zetadocs sends without requiring C/AL code modification of the Send button. Added support for NAV “mini” Reports (13xx range) NAV 2017 also sets the “mini” NAV reports (13xx range) as default for most standard Sales and Purchase documents. The Zetadocs standard configuration import adds support for these mini reports, and the use of NAV Report selections gives customers a simple way to switch between the new or old report on preference. Simpler upgrades from Zetadocs Express Zetadocs for NAV now includes Zetadocs Express. This single code base makes it much simpler for partners to implement Zetadocs for NAV every time and just simply unlock the additional Zetadocs functionality required, by changing the Zetadocs license. This now removes the reimplementation task on previous versions. Combined tooling for Zetadocs Express and Zetadocs for NAV A single Zetadocs Page Modification tools is now provided to automate modifications to NAV pages so there is no need for reimplementation when upgrading from Zetadocs Express to Zetadocs Essentials. Retry failed delivery jobs and improved feedback Version 9 of Zetadocs for NAV adds a Retry button to the Zetadocs Outbox. This action button will allow you to retry previously enqueued jobs that might have failed to complete successfully during delivery or archiving. With this feature, there is no longer a need to access the NAV Job Queue entries page to restart a failed job, everything can be done through the same screen that you use to check the status of a current job. Additionally, status messages from the Zetadocs Delivery Outbox have been improved to give clearer information about the status of each job. Windows Server 2016 Support The Zetadocs Client and Zetadocs NAV Server components now support Windows Server 2016. General Improvements and enhancements: Additional filter field for NAV reports that require additional filters at runtime Special instructions are also provided in the installation guide to add support for the North American Customer Statement (10075). This report and others like it require an additional date filter applied. The Zetadocs Report Settings Table has been extended with an additional filter field to support 10075 and other NAV reports that require additional filters at runtime. FIX: Source file deleted when using %%[FileAttachment:] command FIX: Zetadocs Server does not Split Malformed PDF Documents FIX: Card page loses focus when creating a new record in NAV How to upgrade to the latest version of Zetadocs for NAV Last updated: 6th December 2016 (JC/GC)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00153.warc.gz
CC-MAIN-2023-50
3,999
30
https://telar.dev/docs/frontend/di/
code
#Telar Social frontend DI (Dependency Injection) In this article how DI (Dependency Injection) helped us to reduced module complexity and increasing system maintainability and reusability in a nutshell. - DI (Dependency Injection) - Telar Social frontend architecture #What is dependency injection in Telar Social frontend definition To make it simple I will explain the real usecase defenition in Telar Social frontend. Most of the times services are depend on other services (consuming from other service). To increase isolation for each service, we avoid consuming services directly. Instead we define interface for each service to access each other base on their interface. The implementation of each interface can be different base on requirements. #Using IOC Container in Telar Social frontend For example OpenFaaS Client implemented by Red Gold team. To use OpenFaaS Client we need to call useOpenFaaS() that bind classes to core service interfaces. We need to call the function in Social Engine file that execute function before rendering components. How can I implement services for Your server side is on PHP, Java,ASP.NET, Python, etc. Or you are using serverless solutions such as Google Cloud Function, AWS Lambda, Azure Functions, etc. You can connect Telar Social Frontend to any backend you build. You only need to implement the interfaces of core services like implementation of OpenFaaS Client. There is a summary steps of creating your own data client. Let's assume that we want to implement the services for PHP backend. You need to know about TypeScript and implementing interfaces. You can get help from other data clients implementation for your backend and also using core domain for the domain of backend could be helpful. - Create a folder in data layer name phpClient. - Create a folder in /phpClient folder name services then in services folder create some folders following core/services folder such as services/votes, services/posts and etc. - In each folder inside /phpClient/services/ folder you should implement following interfaces in core/services/ folder in file with appropriate name. For example we need to implement IPostService from core/services/posts/IPostService.ts in data/phpClient/services/posts/PostService.ts file. - After implementing interfaces for services layer. We should register the dependencies for our phpClient services. Create a file in phpClient folder name dependecyRegisterar.ts. - Following firestoreClient dependencies, add a function name usePhp() and bind dependencies in the the function. For example for PostService class add Here SocialProviderTypes has the identifier of each service. To learn more take a look at inversify docs. 6. Finally call registering dependencies function for in socialEngine file. Enjoy ;) It also would be great if you could contribute your clientData and backend with us to be part of this contribution 😍 . ⭐️ This page needs help. Please help with your contribution. To start click on edit button.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00213.warc.gz
CC-MAIN-2023-14
3,002
21
https://www.yegorsw.com/blog
code
I have started on getting a multiple importance sampling system going in my ray-tracer project for the light sampling. Rather than having a special "light" object type, I've decided to simply make all lights emissive meshes. There is a pre-processing step before BVH construction during which an internal "lightlist" is built - the renderer checks every triangle in the scene, and if any assigned material has the "emits light" flag enabled a pointer to the triangle is added to the lightlist. During shader evaluation, lights are looped through from the lightlist and sampled directly. I had 2 possible ways to implement this in an unbiased and energy conserving way: 1. Two separate loops - a "bxdf sample" loop and a "light sample" loop. During bxdf sampling all rays that strike the light will return black (the bxdf sampling loop only returns indirect light contribution). During light sampling all rays will be exclusively directed at the lights and only return a value if striking a light. The math works out to be incredibly simple - the light loop and bxdf loop can happen independently and each one can have an arbitrary amount of samples. It looks like this: Total_Bxdf_Irradiance += Bxdf_Irradiance / number_of_bxdf_samples for each light: Total_Light_Irradiance += (Light_Irradiance / distance_to_light_squared) / number_of_light_samples Total_Irradiance += Total_Bxdf_Irradiance + Total_Light_Irradiance 2. One loop which randomly chooses either a bxdf sample or a light sample, shoots that out, then downweighs it probabilistically based on the probability density function (pdf) of that sampling strategy. This is called multiple importance sampling and the math is more tricky than the previous method. Assuming "ratio" is a zero-to-one ratio value between how many bxdf samples vs light samples are sent out, it looks like this: if random_number(0..1) < ratio: Total_Irradiance += Bxdf_Irradiance / ( PDF_Bxdf * ratio + PDF_Light * (1 - ratio) ) Total_Irradiance += Light_Irradiance / ( PDF_Bxdf * ratio + PDF_Light * (1 - ratio) ) Total_Irradiance /= number_of_samples I have decided to try and implement the second method as it is more challenging, and avoids fireflies where light sources get near objects. For the moment I have a hacked solution and have not nailed the PDF calculation of the light sampling yet. I also wish to add a "probabilistic light selection" rather than always sampling every single light in the scene, and I am not sure how this will effect the PDF of the light sampling. Hopefully it is simple and the PDF remains unchanged, but I need to find and read more papers about this or flip through PBRT again and see if they cover this. Occasionally (very often), my raytracer project will have some bugs. As the code is all about outputting images, the bugs are often also graphical in nature. In this case the diffuse shader, rather than tracing outwards in a hemisphere oriented to the surface normal, was tracing in a flat 2d disk shape oriented with the world Y-axis. Sometimes bugs bring a cool surprise. Here is another one. I am not sure what caused this but it certainly looks broken. Somehow the wing of the angel has reflected at a much larger scale in the back.. I wanted to start a blog for a long time, a place for my to collect all of my random thoughts and projects, but I always found an excuse to put it off. Now I’ve finally committed to the idea! Diffuse = Spec? Something that has always been inconsistent between different lighting artists and TD’s that I’ve talked with is their explanations of “diffuse”. Every major renderer has a shader that follows this template: Diffuse and spec are modeling the same phenomenon, light reflecting off a surface, so diffuse is basically a more optimized/efficient shortcut for “very rough spec”. Sometimes people will take it a step further with the following conclusion: A single material cannot be smooth and rough at the same time; the surface can only have one shape. Therefore the “spec” in shaders must be another, separate material (gloss/clearcoat/moisture) with a smooth shape, layered on top of a material with a bumpy shape: Other people forego this conclusion but still insist on the first point: There is no difference between diffuse or spec in the real world; there is only reflection of light. The only thing that matters is the shape of the object’s surface. The reality of diffuse.. Take a piece of chocolate and roll it under the light. The chocolate does not have any moisture, there is no layer of oil covering the chocolate, and the chocolate has no clearcoat on it (I hope). Despite this, the chocolate reflects light in both a "rough" way (the matte brown) and a "smooth" way (the sharp white highlights). One way we can explain this is that the chocolate surface is covered in a mixture of smooth and rough areas, so microscopically small that to our eyes it evens out to both a "diffuse" and "specular" response in one place. But how does this explain the highlights being white, and the diffuse color being brown? Is it possible the chocolate is always, somehow, covered in a thin film of oil? As a thought experiment, imagine a cube made of solid red plastic. The plastic will, as we know, have a red diffuse and a "white" spec. Now, imagine a laser slicing this plastic cube down the middle, leaving a perfectly smooth surface exposed. How will this surface look? Since it is perfectly smooth, shouldn't it reflect all light back as "red spec"? In that case, it will be a red mirror, almost like a metallic Christmas ornament. This doesn't seem right for plastic, does it? Here is another example, a polished granite counter top with no clear-coat or varnish, simply a very polished stone. Again, we can see a brown diffuse color (with a visible texture this time), and a "white" specular reflection (the reflection is not tinted towards any color). Okay, one more example.. a piece of wood being lit by 3 dots. I like this one because if you look closely you can see the separate diffuse reflection, crawling vertically up the side of the wood, and specular reflection mirrored in it horizontally. Okay, so maybe you know that all surfaces exhibit some form of specular reflection, but how do we get a diffuse reflection from a very smooth surface? Is it possible that some mixture of rough areas and flat areas, on a microscopic scale, causes the illusion of separate diffuse/spec? If we had an ideal, perfectly smooth surface.. could we still get a diffuse reflection? Diffuse = SSS The answer is, yes! Actually, the “lambert” reflection model we all use is meant to be simulating diffuse reflection from a perfectly smooth surface! This is because diffuse “reflection” is actually the same phenomenon as subsurface scattering, albeit on a much smaller scale. Light penetrates the surface of the material, bounces around inside, and comes back out in a random direction. The only difference is the distance the light is scattered – in a material like wax or milk it is scattered far and exits the surface a good distance away from the entry point, while in a piece of wood or a rock it exits much closer to the entry point. Take a big enough candle, look at it from far enough away, and it will look just as “diffuse” as any rock or tree! This is the reason many shaders also have a “diffuse roughness” separate from the “spec roughness” - it slides between a smooth surface (which scatters diffuse light) and a rough surface (which also scatters diffuse light). In V-Ray, for example, the slider blends between a Lambert shader (diffuse scatter from a smooth surface) and an Oren-Nayar shader (diffuse scatter from a rough surface). Parts of the surface may self-shadow, cause diffuse inter-reflection between multiple microfacets, and catch more light at glancing angles due to small protrusions from the surface. Viewed from a macro scale, this rough surface flattens the overall lighting, and makes the edges of the object brighter. I always hear talk of "simplified" shaders that limit parameters to better mimic the real world.. having "specular intensity" actually modify the fresnel response, having the refraction IOR linked to the reflection IOR,, etc.. Well, going by this, if we really wanted to simplify our shader we could get rid of all "diffuse" and "SSS" parameters altogether and simply have one slider to rule them all (or rather, two): Scatter Color and Scatter Distance. This is not very practical or intuitive to use compared to a "diffuse color" slot, how it does drive home the point I am trying to make pretty clearly. Again, you don’t need to know any of this to create beautiful images.. however, this post is for those who share my interest in the nature of light and materials, and enjoy over-examining the tools that are provided to them. Thanks for reading!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00515.warc.gz
CC-MAIN-2023-50
8,867
45
http://mlug.ca/cms/en/blog/aakash-tablet
code
http://www.ubislate.com Aakash Android. I read this Tablet was made in Montreal & would like to write a review about it. I hope there will be Mlug 2012 meetings. As to house maintenance, does it involve problem solfing? If so, your hacker can safely be left to deall with the panning (for the musement value, if nothering ese). — Telsa Gwynne
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131238.51/warc/CC-MAIN-20140914011211-00068-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
344
8
https://www.mpgh.net/forum/352-call-duty-black-ops-discussions/228256-m00txtra-white-models.html
code
Been using external esp and my red / blue models were conflicting with the hack. For example i would be red team model wise so the enemy would be blue team. now that's fine untill the blue models have a red box and when there all bunched up on nuketown or something in a small area it gets confusing with all the red / blues mixed up so i decided to make a White model release to go with the external hack. its kind of like the thermal for mw2 if you'd like but obviously not as static. Ive not finished this yet but ill release this soon, if threes interest for it and people have the same problem i do with the colours conflicting. let me know your feed back
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822668.19/warc/CC-MAIN-20171018013719-20171018033719-00761.warc.gz
CC-MAIN-2017-43
660
4
https://www.digitalocean.com/community/users/willisjuanitabf
code
I followed all the steps, but when type “s-nail” show me this message s-nail: /home/myuser/Maildir: Is a directory If I type “sudo s-nail” this message s-nail: /var/mail/root: No such entry, file or directory This is normal and may only appear when sending this first message. You can check to make sure the directory was created by looking for your ~/Maildir directory: ls -R ~/Maildir If you do not see the cur, ...
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300934.87/warc/CC-MAIN-20220118152809-20220118182809-00234.warc.gz
CC-MAIN-2022-05
425
7
https://unix.stackexchange.com/questions/480482/why-does-pushd-always-output-the-stack-to-stdout
code
popd are primarily providing a convenient way to navigate directories interactively. In scripts, cd is more often used. As an interactive tool, pushd gives the user feedback about the current state of the directory stack whenever a new directory is successfully pushed onto it. The cd command is sometimes wrapped in a shell function (for interactive use only) that in the same way outputs the new directory whenever the current working directory is changed. The r alias in ksh shells, which repeats the most recently given command, also gives the user feedback in the form of echoing the actual command that is being executed. All these small pieces of feedback are there to help the user navigate and just to generally ensure that they are doing what they think they're doing when working at an interactive shell prompt.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528869.90/warc/CC-MAIN-20190723043719-20190723065719-00304.warc.gz
CC-MAIN-2019-30
822
8
https://nameberry.com/nametalk/threads/62058-Links-that-don-t-work
code
Results 1 to 2 of 2 Thread: Links that don't work October 17th, 2008 05:20 PM #1Moderator - Join Date - Oct 2008 Links that don't work On the media page I found some links that aren't working properly. When I click on the parenting.com links they all give me a message saying that the page cannot be found (except for the "What's In a Name?" link). I know that some of those pages are probably there, but you have the wrong link for them. For example, I recently found the "Baby Name Fortune Teller" page through a search. October 18th, 2008 07:59 AM #3 Re: Links that don't work Thanks for pointing this out! The links worked when we made the page last month, but Parenting has apparently taken those piece down except for the What's In A Name? piece.Pam Satran
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00307-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
762
11
https://www.howtoforge.com/community/threads/broking-ispconfig.85519/page-2
code
Discussion in 'Installation/Configuration' started by iniVan, Oct 31, 2020. Why not Contact ISPConfig Business Support, https://www.ispconfig.org/support/ ? Do you have a backup of your system? Have you checked the ISPConfig database? @iniVan How do you manged to get access back to the panel? Did you try a resync when you are logged in the panel? I have the same problem but I wasn't able to get the panel working again, after php -q update.php and the reconfiguring of the services i still get the problem that I can't login into the panel. I tried to make a manual symlink to ipsconfig.vhost and then I will be able to get access to the site without an SSL Error but I only get the apache root website and if try to open index.php manual i will get an error not found Is it possible to trigger the resync script from the commandline? i tried a re-sync but it said it found nothing Have you checked the ISPConfig database no some what a novice here ! if you're not completely sure what you're doing, best to do nothing. do you have a backup of the ispconfig database? if no, even more reason to do nothing. if you do something now that affects the dbispconfig database you wont get anything back. we can't see the exact state of your system, your safest option, as mentioned, is to contact business support and let them look at it lol i did so much but am awaiting a reply I don't believe so, as far as I know that is a function in the ui only. It sounds quite different? Does that mean you get to the login interface, but providing a valid username/pw doesn't work? You might clear your browser cache for that one. If you have other behavior/symptoms, you'll need to describe what's going on. ok guys used Bitvise ssh to have a look around the server /var/www still have its content an /var/vmail still in server yes, but i don't think ispconfig will delete any of those on a resync anyway, i believe it needs to be specifically told to delete a mailbox or website to actually delete the files. if the mailbox, site or database isn't visible in ispconfig and you run a resync, it should just ignore them as externally configured entities. with everything there, but ispconfig interface not showing any clients, sites etc, either you've lost/deleted/overwritten the original database, or it's looking at a new different ispconfig database. depending on what you've done, especially regarding updating ispconfig itself, and your answers to it's request to backup the system first, there may or may not be an up-to-date backup of the database that can be restored, and which, itself, may need the ispconfig update re-applied to it. this is why, at this point, you're much better off letting the official support take a look at your system. there are varying ways this can be resolved but it needs to be determined exactly how and where it's gone wrong to work out the best fix, and that appears to be best done directly now, rather than by questions and answers on here. I was unfortunately not precise. The Apache web server is not able to display the login page. During the update only the ispconfig.conf is written in sites-enabled and not the ispconfig.vhost. If I add the symlink manual I can call :8080 again but only the APACHE default page is displayed. Thanks for the help @jansurfingbad is it possible you installed ispconfig but chose not to install the interface? exactly where did you point the symlink to? what what is the contents of that target file? No I did an php -q update.php and said reconfigure services I ponited the symlink from /etc/apache2/sites-avaible to /etc/apache/sites-enabled/000-ispconfig.vhost The Target file was the old one from the existing working configuration which was online for over a year now ok, guess the starting point is to check the obvious. any apache errors when it's restarted? is there a symlink for 000-default-ssl.conf in there? is the target for that the page you're seeing instead of the ispconfig login? is https enabled for ispconfig itself? have you double checked the certificate is valid? when you browse to port 8080, is the certificate it uses the correct one for the ispconfig interface? does the symlink /var/www/ispconfig still exist? does it point to /usr/local/ispconfig/interface/web what os are you on? did you try to upgrade the os? did you change the default php version? what is the default php version? what version of ispconfig did you have before? and now? i'd guess changes to any of those are more likely to show lots of errors rather than the default apache page, but would still be helpful to know of any changes to those. No errors, no there was not an 000-default-ssl.conf present, I also removed all other symlinks just to be sure. https was enabled and the certificate was also used everything was fine exept that not the ISPconfig panel was show but the default apache site I upgraded from debian 9 to 10. I had a multiphp system before with 7.0, 7.2 and 7.3 after the upgrade i also got 7.4 but something went wrong with some package after i tried the perfect server tutorial for debian 10 therefore I needed to purge apache and php and then i reinstalled the apache and php7.3 and php7.4 after this i didn't got any errors. PHP 7.3 was also working as default version and i was also able to parse an info.php site inside of the default apache directory. Separate names with a comma.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363641.20/warc/CC-MAIN-20211209000407-20211209030407-00421.warc.gz
CC-MAIN-2021-49
5,373
41
https://premium.wpmudev.org/forums/topic/snapshot-from-only-a-subsite-on-a-wp-multisite-install
code
I enabled WPMUDEV Dashboard FYI too.... I am taking a snapshot of this subsite alone http://bit.ly/2mNOlYQ (but the zip does not seem to contain the active plugins on that subsite)? I need a complete snapshot so someone can have ALL content and database info specific to this subsite only so they can restore onto another host of their own. I am seeing this in the network area but I do not see options for plugin etc: https://www.screencast.com/t/1RsUtdldoj Please let me know.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527518.38/warc/CC-MAIN-20190419081303-20190419102248-00012.warc.gz
CC-MAIN-2019-18
478
4
http://www.virtualteen.org/forums/showpost.php?p=132883
code
Re: Yellowstone Eruption verneshot =/= volcano If the verneshot in russia goes off it will send a huge chunk of a tectonic plate into the stratosphere, and things that go up have a tendency of going back down. It would be the same as if a giant meteor hit the planet, dur. EDIT: I'll put it into terms easier for you to understand. Take a sharp knife, put the handle (that's the part that doesn't cut you when you grab it) and put in your mouth. Cock your head back so that the tip of the knife is sticking straight up in the air. Now spit out the knife as hard as you can, wait for results. That's pretty much what happens with a verneshot. Last edited by Lt.Col.Environment; February 13th, 2007 at 06:40 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541426.52/warc/CC-MAIN-20161202170901-00423-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
709
10
http://habadeer.com/?p=133
code
When Ubuntu made the decision to go off on their own and develop their own desktop environment it didn’t bother me too much. To be honest, once Windows 7 let you simply press the super key and start to type the name of the application you want to launch I pretty much stopped using the start menu all together. (I still thinks it’s funny watching people struggle to find the application they want to start by navigating the huge monstrosity that is the start menu.) I fell into using Unity and was very happy with the 14.04 and then the very usable and stable 16.04 LTS versions. I instantly fell in love with the HUD, since I can never remember where the page landscape menu option is in LibreDraw or the emboss transform in Gimp. To me, it was like the Unity developers had mind melded with my keyboard centric work flow. Well, now I have to begin switching to Gnome and so I spun up an 18.04 VM and began fiddling with it. I went into the settings dialogue and checked out the keyboard shortcuts. I tried simply changing the workspace navigation keyboard shortcut and the settings window locked up. I clicked on the close button for the window and it wouldn’t close. I waited several seconds for the window to popup allowing me to force quit the application, but it never appeared. Finally I decided to reboot and install the latest updates. After doing that I began again customizing some simple things. I decided to change my wallpaper. I opened the settings to change the wallpaper and saw a nice interface that even previewed the wallpaper and let me change the lock screen wallpaper as well. Then I discovered that it won’t let you pick a picture from any folder, you’ve got to put the picture into the Pictures folder. Fine, I tried to do this from files (Nautilus) and then once again, the files app locked up and nothing worked on the desktop. Just my mouse. This time I had to reboot the system to even get out of the locked desktop. Even though I have had the infrequent app fail in Ubuntu, it NEVER took out the whole system. I don’t know. I looked online to see if anyone else is having stability issues with the transition and everyone seems fine or comments on how much better Gnome is. I must be doing something wrong because this Gnome desktop does not seem as polished or stable as Unity was. Maybe I won’t move from 16.04 just yet. 🙁
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100308.37/warc/CC-MAIN-20231201215122-20231202005122-00610.warc.gz
CC-MAIN-2023-50
2,371
3
https://www.daniweb.com/programming/software-development/threads/361705/datagridview-to-crystal-report
code
I an working in C# windows application. I have a task to perform i.e. I have to print the crystal report from datagridview control. What ever data present in datagridview it shows in crystal report. When I click the print Button. Is it is possible. If yes please tell me the solution. I can't post a code because I really don't have any idea how to do this.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371805747.72/warc/CC-MAIN-20200407183818-20200407214318-00067.warc.gz
CC-MAIN-2020-16
357
2
http://glocktalk.com/forums/showpost.php?p=5743821&postcount=2
code
Re: New sub-forum in GT Originally posted by MarkP With all the other fluff forums on here , it's about time the services got their own place. Mark, are you active duty or former Army? Freedom has a taste to those who fight and almost die, that the protected will never know. If you don't watch the news you are uninformed, if you DO watch the news you are misinformed.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164029436/warc/CC-MAIN-20131204133349-00085-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
369
6
https://security.stackexchange.com/questions/118247/how-secure-is-aes-256-cbc-with-user-provided-password-and-initialization-vector
code
From my understanding the IV is used as a previous block for the first block only. But since each block is used by the following this adds significant security is a IV is provided and not based on the password. Thus I implemented a login system when the user provides both, distinct with a minimum of 8 characters using any characters they care as long they use at least 3 types (upper, lower, numeric, special, non ASCII). But now someone told me that by defining the IV I weaken the encryption as that would make the password sort-of useless. I did not exactly understand his explanation. My code looks like this: $hash = openssl_encrypt($username, 'aes-256-cbc', $password, false, md5($iv, true)); - Yes I am encrypting the username - Both the password and IV are user defined - Yes I am asking them for two passwords - I'm wrapping the IV in RAW md5 to ensure I get a standard 16 chr length Can someone clarify if the IV use in this manner is a good practice and is this idea is strong enough.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00075.warc.gz
CC-MAIN-2022-40
997
11
http://www.tigerdroppings.com/rant/o-t-lounge/would-you-rather-die-with-honor-or-live-with-shame/38786540/page-3/
code
You know, it is an interesting dilemma. Let's say you are the last surviving son of an important family, the heir to an empire. "common" men and women are dying all around you, so what's a few more potatoes in the stew? You would provide work and jobs and industry, and continue on a legacy. What do you do? I hope, what I believe is right, and save as many as I could with no thought to myself. Empires come and go and no one person is greater than any other, in regards to importance of life, imo. In the end, I'm sure there would be fear. Doing what is right and just in the face of fear, is what I hope I would have the courage to do. Having said that, every instance is different. If you had women and children vs say.. a murder convict, I'm sure my thought process and sacrifice would be different, although, it probably shouldn't be.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122167.63/warc/CC-MAIN-20170423031202-00136-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
840
4
https://www.digitalocean.com/community/tools/dyn-do
code
Write for DigitalOcean You get paid, we donate to tech non-profits. Find and meet other developers in your city. Contribute to Open Source This script will get your public IP address and then update an existing domain record to point to it via the Digital Ocean API
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573385.29/warc/CC-MAIN-20190918234431-20190919020431-00168.warc.gz
CC-MAIN-2019-39
265
5