url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://discourse.vvvv.org/t/fieldtrip-kinect-demo/16739
|
code
|
I got a request to share my patches for Fieldtrip vector lines with Kinect depth input so here they are, enjoy!
Made in 50_beta36_x64
And you will need
-Kinect2 SDK drivers
Start the ‘_Echoes3 VectorMod’ patch
If you don’t have a Kinect2 it will still work although you’ll only be able to use the noise function.
Uses my own EchoTrails textureFX
Echoes3Mod.zip (26.8 KB)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00210.warc.gz
|
CC-MAIN-2023-40
| 378
| 8
|
https://blog.smartlydressedgames.com/unturned-ii-devlog-022/
|
code
|
Unturned II Devlog #022
May 31st 2019 by SDGNelson
Blast from the past: Eaglefire
The Eaglefire, along with several related items like 5.56 ammo, boxes, one type of canted mount, etc have now been remodeled and added to the firing range. Now that everything's finally starting to come together I don't think they'll need to be recreated again. 🙂
Currently the scope attaching to the canted mount is questionable, but in the future each rail will have a number of notches and the attachments will consume the number of notches they require.
Holographic projection calculations have been improved, and one quality of life change especially compared to 3 is that there is a subtle shadow to make it easier to aim against bright backdrops. You can even see the hologram if you position the camera properly in 3rd-person or the item inspector.
If there's enough time next week I'll update the reticule + color randomization to the now-not-as-new inventory revamp.
Radial menus are now updated to the lower-level UMG-Slate split I was working on, so the radial layout is a slate panel but the visual is handled by a UMaterial. Interactors can use the radial menu by holding interact, and multiple optics can be selected using the radial menu of a weapon. This also involved fixing an engine issue so that toggle-attach works properly as well. (Gamepads can easily use radial menu.)
Seating & Weapon Cleaning
Before working further on the Eaglefire I decided to revise the weapon code and seating code a bit, because I know that in the future the seating code will need to be able to interact with mounted turrets and vehicle turrets. Seat definitions were reworked into seat "instances" similar to the item revamp, and the idea for turrets will be that seat instances can have Turret asset user data associated with them.
Item Ownership Responsibilities
In order to make ammo containers more useful I worked on allowing storage owners to override stack size limits. Individual stacks of bullets in the inventory take up 1x1, but a container is much more space efficient.
As part of this my mindset on client<->server item commands has changed. Previously the server tried to be smart about auto-exchanging items, auto-equipping, etc, but I think that for the most flexibility it makes more sense to make the server dumb and instead allow the client to issue series of more complex commands in response to drag/drops. This will be on the of to-dos for the next update.
Steam Deploy Tool
I can't believe that in now almost five years of updating Unturned on Steam I hadn't built a tool for this yet. Usually releasing an update involves logging into the Steam backend and marking the build live, but now it's simply a matter of quickly opening the new tool, selecting a branch, and clicking Deploy.
Earlier last week the Unturned II expanded access Steam package got approved, so my next goal in regards to that is finishing the remaining items in the "Active Development" roadmap list, adding a small interior combat test map, and then activating wave #1 of this package. I'd guess this will be around Devlog #023 or #024, and I really I hope to stick to that goal.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00433.warc.gz
|
CC-MAIN-2023-23
| 3,161
| 16
|
https://community.bosch-sensortec.com/t5/MEMS-sensors-forum/BHI260AB-Game-Rotation-Vector-drift-over-time/m-p/52354
|
code
|
I'm using the BHI260AB hosted by an STM32.
In my application, I use the Game Rotation Vector for getting the current orientation of the device. But I noted that if I apply a constant vibration (3Hz) on the device, the Game Rotation Vector quaternion got from the chip starts shifting over time. The vibration applied is really slow and has low amplitude, it's just a subtle shaking of the device.
At the beginning of the test the resulting quaternion of the Game Rotation Vector was:
After 1 minute of shaking the device, the resulting quaternion on the same position was:
Solved! Go to Solution.
It's the static calibration method. The calibration method is like:
After a good six-sided calibration described above, the accuracy of the virtual sensor, Accelerometer Calibrated would becomes 3. Otherwise, you have to do the six-sided calibration again, because, maybe you did not put the device on a flat place or the calibration time for each side is too short.
I'm still trying to read out the calibration state from the BHI chip. See the "BHI260 - Calibration State - BSX Algorithm Parameters" thread (https://community.bosch-sensortec.com/t5/MEMS-sensors-forum/BHI260-Calibration-State-BSX-Algorithm-P....
Once I get that working I'll be able to validate the drifting issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00376.warc.gz
|
CC-MAIN-2023-50
| 1,279
| 9
|
https://connect.unity.com/p/vr-x-wing-racer-3d
|
code
|
I really need to work on my titles.
Simple VR spaceship game with obstacles to sort out. Speed increases and platforms move from bottom to top. You can't leave that tunnel (there is a trigger zone where the meteorites are, don't go higher) Dont crush, pick flying coins in your way to the end of the race. Check behind you for the awesome planet that looks like a testicle (is not... i think... it's a free skybox asset from assetstore)
If you are a designer and you are looking forward to get in touch with a programmer to team up. hit me up!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141515751.74/warc/CC-MAIN-20201130222609-20201201012609-00083.warc.gz
|
CC-MAIN-2020-50
| 543
| 3
|
https://microfables.blogspot.com/2022/02/the-dung-thief.html
|
code
|
The animals lived in their kraal, keeping warm in the dung.
At night, though, a thief was eating the dung.
Monkey stood guard, but the thief shot Monkey and escaped in the dark.
Hyena stood guard, but the thief shot him too.
Elephant stood guard. The thief didn't come, and Elephant fell asleep. When Elephant awoke, the thief had come and gone. In the distance, Elephant saw someone escaping; he didn't know Tortoise was the thief.
Tortoise hid in a hole, driving Rabbit out.
Elephant chased Rabbit and caught him. "I'm innocent!" shouted Rabbit. "It was Tortoise."
So Tortoise escaped.
Inspired by: "Sankhambi and the Elephant" in The Bavenda by Hugh Arthur Stayt, 1931.
Notes: You can read the original story online. Sankhambi the trickster is most likely a tortoise (that's the possible Stayt endorses), so I have used the name Tortoise in the Sankhambi stories. Elephant doesn't give up; here's what happens next: The Elephant Chases the Tortoise.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00517.warc.gz
|
CC-MAIN-2023-40
| 952
| 10
|
https://superuser.com/questions/962244/cannot-format-or-remove-extra-partitions-on-hdd
|
code
|
C: is the boot partition
After Windows 10 upgrade there were eight partitions. Booted into a Live USB Linux and run
gparted, then simply deleted all partitions except the required EFI partition and C: partition, and even shrunk the C: partition to make room for a dual boot later. (Note: did not move the C: partition, just shrunk it.)
At reboot, Windows 10 started just fine with just the two partitions. I even forgot and did a hybrid Windows shutdown before all this (where it saves state to speed next startup) so it started fine but showed all those old partitions for a while, crashed on disk management rescan, but next full start it was okay from then on, after making me do a diskcheck. Feels quite stable to delete all but EFI and C: when your C: is your boot partition.
Reference reserved partition being deletable, and efi partition being required.
C: is NOT the boot partition
I repeated the above on a different system where the vendor (Acer) booted from a special partition first, which wasn't my EFI or C: partitions, and Windows wouldn't start any longer, because I deleted the special vendor boot partition. Note, it did boot Windows (EFI partition worked) but couldn't find C: and had a Windows 10 version of a blue screen which is lighter blue and some sort of error about no boot partition found.
Ordinarily to fix this boot your Windows 10 recovery USB stick then pick: language
advanced options |
startup repair |
Windows 10. Except this wouldn't help because the vendor tweaked the EFI and C: partitions to not be fixable.
My fix was to boot Windows 10 recovery USB, take the options that lead you to a command prompt. There, you can try with the usual
bootsect /nt60 C: and look for Windows installations
bootrec /scanos and mine found none. Then ran
diskpart, did the usual
list volumes mine happened to be 2,
select volume 3,
remove letter C,
select volume 2,
assign letter C, to make C: where Windows is installed (it's temporary).
It showed as hidden, so to unhide it couldn't simply use
attribute volume, got a not found, ended up having to
set id=ebd0a0a2-...etc to make it a normal Data partition, then changed the attribute to not hidden. Running
attribute volume should show "no" on all four lines. At that point, C: is not hidden. Had to
attribute volume clear nodefaultdriveletter so on boot it would assign C: normally. Just for grins, changed the EFI partition to be an EFI partition (happened to be 1) with
select volume 1 and
set id=c12a7328...etc. Still shows hidden but that's okay, EFI is normally hidden.
So my partitions are not longer messed up, removed all the weirdness the vendor did to them. But still not finished, had to setup C: to boot correctly. Tried
bcdedit /enum and saw some odd boot settings in my C:, so to undo that
bcdboot C:\Windows /v. The last thing is the secret sauce.
At this point
bcdedit /enum showed more normal looking things and it booted properly.
Above, that first 301MB unallocated was the original boot partition I deleted.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598217.23/warc/CC-MAIN-20200120081337-20200120105337-00300.warc.gz
|
CC-MAIN-2020-05
| 3,001
| 33
|
http://www.autonomous-driving-ux.org/about/
|
code
|
This website was set up by a team of researchers from across the globe who have an interest in exploring the user experience issues relating to autonomous and semi-autonomous vehicles. The website is a result of a number of publication and workshop collaborations between the team members and the intention of the site is to act as a hub for all those interested in this emerging topic area.
- Sven Krome (RMIT, Germany and Australia)
- Rod McCall (University of Luxembourg) (publications, profile, blog)
- Alexander Meschtscherjakov (University of Salzburg, Austria)
- Dali Szostak (Google, USA)
- Rabindra Ratan (Michigan State University, USA)
- Ioannis Poltis (University of Glasgow, UK)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738523.63/warc/CC-MAIN-20200809073133-20200809103133-00453.warc.gz
|
CC-MAIN-2020-34
| 691
| 7
|
http://travel.stackexchange.com/questions/tagged/greenland+extreme-tourism
|
code
|
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Can you actually do a road-trip in Greenland?
There is of course the epic Top Gear episode where they went for the North Pole. I came across this short youtube film on some driving the only "freeway" in Greenland. It seems you can drive on ...
Jun 12 '12 at 15:04
newest greenland extreme-tourism questions feed
Hot Network Questions
Word for obscuring bad or immoral acts with grammar
Show that inequality holds
Can somebody please explain the concept of "non-superimposable mirror image" in chirality (chemistry)?
Cola Machine #1
Is there anything preventing the NSA from becoming a root CA?
Complexity lower bound of finding the factorial of a number
Is it valid for a hostname to start with a digit?
Troubles between "Subset" and "["
Why didn't Walter White consume his own product?
The case of the imaginary VASI
Proving a set is compact - Homework
Why is TLS_FALLBACK_SCSV secure against a MITM attack?
Is it possible, without knowing Python, to animate between orthographic and perspective camera view?
PA System: What type of speaker for that "punchy" bass?
Why are fleets so diversified?
How can one derive Schrödinger equation?
Do they use semidefinite programming in industry?
Why doesn't this pattern work?
Alexander and the burning forest
Can a Ranger learn spells outside the Ranger spell list?
Contacted by a Company's Client to do a project - should I inform my company?
How do tachyons violate causality?
Can a 7 days full 100% CPU load "burn-in" / "stess test" damage a modern notebook?
How to get OUTPUT $action, Inserted.*,Deleted.* records in In SSIS
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443869.1/warc/CC-MAIN-20141017005723-00093-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 2,210
| 52
|
https://lists.debian.org/debian-devel/2003/01/msg00484.html
|
code
|
Re: pbuilder-uml working (Re: Another pbuilder run finished)
On Wed, Jan 08, 2003 at 10:08:46AM -0500, Matt Zimmerman wrote:
> > Please check that your LOGNAME is set.
> > pbuilder-user-mode-linux tries to use LOGNAME value from
> > outside of UML, and it does not fail on my system.
> It is set; dpkg-source definitely works for me outside of pbuilder. :-)
> Of course, it is set to 'mdz', and that user does not exist inside of UML
> unless pbuilder is adding it to the passwd file (I did not check).
I have the same problem in pbuilder chroots. In the chroot, the user
aaronl does not exist. I have to unset LOGNAME.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317113.27/warc/CC-MAIN-20190822110215-20190822132215-00474.warc.gz
|
CC-MAIN-2019-35
| 619
| 10
|
https://keskescreativewriting.wordpress.com/2016/11/10/nanowrimo-day-10/
|
code
|
Time to review our class word counts and award some more winners for the first challenge: reaching 25% and the second challenge: reaching 50%!
Today’s focus is on dialogue.
Take a look at pages 38-41 in your workbooks. It explains three things dialogue should do:
- reveal characters’ relationships to one another
- move the story forward
- increase the tension
On page 41, pick one of the six scenarios listed and write it in your workbook. You can later transfer it into your novel. I have a supplemental handout for you as well to ensure you format your dialogue correctly.
Here’s a refresher on what you should complete for points:
- Conflict Handout (pgs. 16-18)
- Plot Description (pg. 26)
- Plot Rollercoaster (pg. 28)
- Four ways to begin your novel (pgs. 50-52)
- Setting that enhances a character (pgs. 31-33)
- Setting that enhances mood in a particular scene (pgs. 36-37)
- Dialogue (pg. 41)
You have the hour to keep working on these activities. The last ten minutes, you’ll continue writing your novel to add to your growing word count.
DP #33: Write your novel
Write non-stop until the end of class: anything and everything to do with your novel. Feel free to bring your own technology if you want to type instead of hand write.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945668.34/warc/CC-MAIN-20180422232447-20180423012447-00213.warc.gz
|
CC-MAIN-2018-17
| 1,251
| 18
|
https://cofounderslab.com/profile/myles-lane
|
code
|
I'm interested in meeting people who are passionate about redesigning health care or energy systems.
I have been involved with several early stage ventures (tech and non tech), and am currently working with a startup to address and solve the Canadian identity crisis.
Prior to this, I worked as a management consultant and worked in a B2B and B2C context in the following sectors:
- Health Care
- Utilities (Generation, Transmission, and Distribution)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390442.29/warc/CC-MAIN-20200526015239-20200526045239-00008.warc.gz
|
CC-MAIN-2020-24
| 451
| 5
|
https://stackoverflow.com/questions/61396989/what-is-the-docker-desktop-data-distro-used-for-when-running-docker-desktop-with
|
code
|
When running docker desktop on Windows with Hyper-V I have a single VM called DockerDesktopVM where my Linux VM is running with it's containers inside.
However when I run docker desktop with the WSL engine I see that it creates 2 WSL distros.
I can shell into the docker-desktop distro like I would any other distro.
But trying to do the same to docker-desktop-data just bounces me out.
So my question is what is the docker-desktop-data distro for and why does it exist separately from the docker-desktop distro? Clearly the name implies data but what specific data and why can't I jump into the distro as I would any other?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585441.99/warc/CC-MAIN-20211021195527-20211021225527-00414.warc.gz
|
CC-MAIN-2021-43
| 624
| 5
|
https://www.sky-flow.net/docs/en/sky-ap-go/funkcionalnosti-obrade-ulaznih-racuna/stornirani/kartica-aktivnost
|
code
|
The 'Activity' tab is used to display activity data. The form for entering data on the selected activity is opened by clicking on the 'Activity' tab within the interface for canceled accounts.
The activity data entry form contains the following fields:
Under 'Account approval' there are fields with basic account data: 'Company' - company name, 'Number' - account number, 'Int. number ',' Amount ',' Currency ',' Month. cost ',' Dat. account ',' Dat. making ',' Dat. payments', 'Partner', 'OIB', 'Status' and' Partner ID '.
Under 'Other data' there is data by fields, and they are opened by pressing the arrow located in the code. The fields that are displayed are: 'Header', 'Basic date ',' terms of payment ',' Ref. ',' FI number 'and' MM number '.
Under 'Activity data' there are fields 'Created' - account creation date and 'Priority', which can be low, medium or high.
Under 'My task' there is a field 'Comment'.
All fields of this card are used to display data, are filled in automatically and cannot be changed. Only within the 'Comment' field can we enter a comment about the activity.
The toolbar when entering activity data consists of three buttons: 'Save changes', 'Confirm cancellation' and 'Undo cancel'. Clicking the 'Save Changes' button saves the changes entered in the activity data entry form. Pressing the 'Confirm cancellation' button confirms that the incoming invoice has been canceled and it is saved in the archive. By clicking on the 'Cancel cancellation' button, the account is returned to the accounts for approval.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00026.warc.gz
|
CC-MAIN-2023-40
| 1,544
| 8
|
https://sharepoint.stackexchange.com/questions/251271/caml-query-where-clause-not-working-with-view-tag-rowlimit
|
code
|
I've reached the maximum view threshold limit on a SharePoint List, with a little more than 5000 item in it.
When I raise the limit in the webapp's settings, everything is working fine, but I would like to avoid doing that, as it will ultimately affect performance.
In order to do that, I tried to set a RowLimit value (of 100 items) to my CAML Query. This limit is working, but the where clause of my query is being ignored, thus returning me the first 100 items of the list.
If I add an OrderBy clause, it gets ignored aswell.
Here is my code :
SPList list = web.Lists[new Guid("xxxx")]; SPQuery query = new SPQuery(); query.RowLimit = 100; // My previous query, which is ignoring the RowLimit statement and is triggering the limit threshold error. // query.Query = "<Where><Eq><FieldRef Name=\"Author\" /><Value Type=\"Integer\"><UserID /></Value></Eq></Where>"; // The current query, working with rowlimit, ignoring everything inside the view tag query.Query = "<View Scope='RecursiveAll'><Where><Eq><FieldRef Name=\"Author\" /><Value Type=\"Integer\"><UserID /></Value></Eq></Where></View>"; SPListItemCollection listItemsCollection = list.GetItems(query);
I've tried a lot of things, for example putting the rowlimit statement as a tag inside the query, or adding a query tag inside the view tag, but nothing seems to work.
How am I supposed to use a RowLimit and a Where clause at the same time ? If that's not possible, what's the best approach with my threshold limit issue ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100518.73/warc/CC-MAIN-20231203225036-20231204015036-00243.warc.gz
|
CC-MAIN-2023-50
| 1,484
| 8
|
https://www.ossamakhalaf.com/about
|
code
|
A science pilgrim with an enriching journey. An apothecary turned neuroscientist, embarked on a global expedition to study the brain, conducting research on four continents! As a passionate educator, I inspire students to be curious about the world around them, cultivate critical thinking, and nurture a lifelong love for learning. Alongside my scientific pursuits, I've evolved into an internationally-acclaimed public speaker and an award-winning science communicator, harnessing the power of storytelling to captivate diverse audiences with the marvels of science. In all my endeavors, my unwavering mission is to bridge the gap between science and society.
Ecole Polytechnique Fédérale de Lausanne (EPFL) - The Swiss Federal Institute of Technology in Lausanne
American University in Cairo (AUC)
Cairo - Egypt
Ph.D. in Neuroscience.
Thesis project carried out in the lab of Neuroepigenetics at EPFL. In my PhD, I have managed to shed the light on how our brains process traumatic memories, and where they are stored in the brain, and how would it be possible to overcome such traumata.
M.Sc. in Biotechnology.
Thesis project in the lab of Neurogenetics at
UT Southwestern Medical Centre - Dallas, Texas
(July 2011 till October 2012).
B.Sc. of Pharmacy.
Worked as a community pharmacist for 2 years, and did research at the Pharmaceutical Industries division at the biggest research centre in Egypt, the National Research Centre (NRC).
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.54/warc/CC-MAIN-20240418124808-20240418154808-00631.warc.gz
|
CC-MAIN-2024-18
| 1,441
| 12
|
https://pressbooks.library.torontomu.ca/iwacc/chapter/introduction-to-understandable/
|
code
|
The Principle Explained
If you have ever poked around an attractive-looking website written in a language you do not recognize, you know that it is possible to explore a site without understanding a single word.
Principle 3 builds on the principles that come before it. Conforming to Principle 1 ensures that users can perceive a site. Conforming to Principle 2 ensures that users can act upon a site. But, even if visitors can see and interact with content, a site is not fully accessible if users cannot make sense of it. Principle 3 is about increasing the odds that visitors actually understand the content.
Even if content is written in your own language, it does not make the content understandable. For example, a page may contain:
- Unfamiliar words or abbreviations
- Overly complex instructions
- Messages that tell you that you made a mistake, but fail to explain how to fix it
- Interactive components that look familiar but behave in unpredictable ways
Barriers to understanding content are felt acutely by users with disabilities. Take, for example, the following scenarios:
- A student with low-vision uses magnification software. She needs to enlarge text so much that only a few words fit on the screen at one time. The lack of context makes it harder for her to understand abbreviations. Does “PC” mean personal computer, police constable, politically correct, or privy council?
- A professor with a learning disability is an expert in his field. He is very familiar with the jargon of the field, but he has trouble making sense of long and — from his perspective — unnecessarily complex sentences.
- An online job-application form indicates required fields in colour. Because screen readers only read text, an applicant who is blind is not able to determine which fields are required and which are optional.
By following Principle 3 guidelines, visitors will be better able to understand the content. Principle 3 is organized around three ideas. For web content to be understandable, these three items must be followed:
- People must be able to read it: The content is readable.
- The site must behave in ways that people can predict: The content is predictable.
- The site must be designed to help people avoid mistakes. When they do make mistakes, it should be forgiving of errors. In the language of WCAG 2.1, the site provides input assistance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00824.warc.gz
|
CC-MAIN-2023-50
| 2,375
| 16
|
https://kodlogs.com/35492/on-linux-where-are-the-commands-required-for-system-administration-stored
|
code
|
Can anyone give the right solution?
On Linux, where are the commands required for system administration stored?A) /binB) /usrC) /optD) /sbin
It's very simple as answer is :
Explanation: System administration and other root-only commands are stored in /sbin, /usr/sbin, and /usr/local/sbin. /sbin
Hope you got the right solution
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107892710.59/warc/CC-MAIN-20201026234045-20201027024045-00290.warc.gz
|
CC-MAIN-2020-45
| 327
| 5
|
http://sourceforge.net/p/npp-plugins/feature-requests/36/
|
code
|
While the new console I/O buffering scheme for NppExec is much faster, it has a shortcoming when dealing with small status updates of I/O before completion of the launched external program.
I have a utility that takes about a minute to execute, and outputs short lines of progress text along the way. I think it is because the buffer size limit is not reached that the progress text does not appear until the external application terminates. It would be good to have a periodic timer that will flush the I/O buffer every 500ms or so in order to handle situations like this.
BTW, thanks DV for a great plugin!
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645338295.91/warc/CC-MAIN-20150827031538-00250-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 608
| 3
|
https://azure.microsoft.com/zh-cn/search/documentation/13/?q=2002%E5%B9%B4%E8%BA%AB%E4%BB%BD%E8%AF%81%E5%9B%BE%E7%89%87%E3%80%90%E5%8A%9E%E8%AF%81%E5%88%BB%E7%AB%A0V%E4%BF%A1hao123bbs%E3%80%91
|
code
|
Returns the value from the right map (possibly null).
A multimap which forwards all its method calls to another multimap. Subclasses should override one or more methods to modify the behavior of the backing multimap as desired per the decorator pattern. default method warning: This class does not forward calls to default methods. Instead, it inherits their default implementations. When those implementations invoke methods, they invoke methods on the ForwardingMultimap.
A builder for creating immutable bimap instances, especially public static final bimaps ("constant bimaps"). Example: static final ImmutableBiMap WORD_TO_INT = new ImmutableBiMap.Builder() .put("one", 1) .put("two", 2) .put("three", 3) .build(); For small immutable bimaps, the ImmutableBiMap.of() methods are even more convenient. By default, a Builder will generate bimaps that iterate over entries in the order they were inserted into the builder. For example, in the above example, WORD_TO_INT.entrySet() is guaranteed to iterate over the entries in the order "one"=1, "two"=2, "three"=3, and keySet() and values() respect the same order. If you want a different order, consider using orderEntriesByValue(Comparator<? super V> valueComparator), which changes this builder to sort entries by value. Builder instances can be reused - it is safe to call #build multiple times to build multiple bimaps in series. Each bimap is a superset of the bimaps created before it.
A SetMultimap<K,V> whose contents will never change, with many other important properties detailed at ImmutableCollection<E>. See the Guava User Guide article on immutable collections.
A builder for creating immutable sorted map instances, especially public static final maps ("constant maps"). Example: static final ImmutableSortedMap INT_TO_WORD = new ImmutableSortedMap.Builder(Ordering.natural()) .put(1, "one") .put(2, "two") .put(3, "three") .build(); For small immutable sorted maps, the ImmutableSortedMap.of() methods are even more convenient. Builder instances can be reused - it is safe to call #build multiple times to build multiple maps in series. Each map is a superset of the maps created before it.
An object representing the differences between two sorted maps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00286.warc.gz
|
CC-MAIN-2022-33
| 2,224
| 6
|
http://freecode.com/tags/windows?page=1&with=2833&without=2754
|
code
|
GraphicsMagick is a robust collection of tools and libraries which support reading, writing, and manipulating an image in over 90 major formats including popular formats like DPX, DICOM, BMP, GIF, JPEG, JPEG-2000, PDF, PNG, PNM, SVG, and TIFF. A high-quality 2D renderer is included, which provides a subset of SVG capabilities. C, C++, Perl, Tcl, and Ruby are supported. Originally based on ImageMagick, GraphicsMagick focuses on performance, minimizing bugs, and providing stable APIs and ABIs. It runs on all modern variants of Unix, Windows, and Mac OS X.
TacitPixel (formerly libTAP ) is a prototyping system for virtual reality and augmented reality applications. It runs on a variety of platforms. RAP (rapid application prototyping) is done through the Lua interface, which mirrors the C++ namespace as closely as possible. libTAP has a small but distinctive feature set, focused on prototyping of realtime 3D simulations.
C/Invoke is a library which can call C functions at runtime with no prior knowledge of the function prototypes. This capability is used to allow any language to call native libraries without writing a separate module in C, similar to the P/Invoke functionality of the .NET framework.
Renoise is a sophisticated music sequencer and audio processing application. It's an all-in-one music production environment for your personal computer. Based on MOD tracker software, its primary use is the composition of music using samples, (in WAV, AIFF, FLAC, Ogg, and MP3 format), plug-ins, and MIDI/OSC sequencing of VSTi/AudioUnits soft synths.
Liquid PCB is a computer aided design application for designing printed circuit boards. Unlike other PCB CAD applications, you are not restricted to straight tracks and 45º angles. Instead, you can freely draw tracks any way you like, and the tracks themselves will move and bend as required to maintain your design rules. Vias and components are also free to move and rotate. The user interface exposes all functions through the multi-directional expanding mouse menu and the keyboard instead of through icons and menus.
LuaRocks is a deployment and management system for modules in the Lua programming language. It aims to provide facilities for Lua such as those from module systems of other scripting languages, such as Ruby's RubyGems or Perl's CPAN. LuaRocks allows Lua modules to be installed as self-contained packages called "rocks", which also contain version and dependency information.
crtmpserver it is a high performance streaming server able to stream (live or recorded) in the following technologies: to and from Flash (RTMP, RTMPE, RTMPS, RTMPT, RTMPTE), to and from embedded devices (such as iPhone and Android), from surveillance cameras, and with IP-TV using MPEG-TS and RTSP/RTCP/RTP protocols. Also, crtmpserver can be used as a high performance rendesvous server. For example, it enables you to do audio/video conferencing, online gaming, online collaboration, and simple or complex chat applications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533957.14/warc/CC-MAIN-20140416005213-00077-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 2,992
| 7
|
http://www.myoverview.net/2011/12/thankful.html
|
code
|
Glad to be home and feeling better. Bored lying down so I opened my computer. I was lucky to get opportunities. Gee, I wonder why I am not getting the opportunities with a higher payouts even if I qualify in terms of page rank. Anyway, even if I don't get the high pay outs I just get contented to working on the lower payouts. It is good than nothing at all. I am glad that my page rank is still relatively high.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578747424.89/warc/CC-MAIN-20190426013652-20190426035652-00502.warc.gz
|
CC-MAIN-2019-18
| 413
| 1
|
https://govyhigyzumo.michaelferrisjr.com/write-allocate-example-29151jx.html
|
code
|
Sometimes, the size of array you declared may be insufficient.
It does not mean allocating separate time for it and executing the same as a ritual. All instruction accesses are reads, and most instructions do not write to memory. In addition, the AllocatePrefetchInstr flag allows you to change the instruction to which this prefetch is done: Motivation[ edit ] There is an inherent trade-off between size and speed given that a larger resource implies greater physical distances but also a tradeoff between expensive, premium technologies such as SRAM vs cheaper, easily mass-produced commodities such as DRAM or hard disks.
If a multiprocessor system contains N nodes, the nodes are numbered from 0 to N This write allocate example bit should be set only if the caller requires the ability to write allocate example instructions in the allocated memory. In addition, the caller can set one but not both of the following optional flag bits in the Protect parameter.
For example, a web browser program might check its local cache on disk to see if it has a local copy of the contents of a web page at a particular URL. In particular, Stepanov was requested to make the library containers independent of the underlying memory model which led to the creation of allocators.
A driver that must use contiguous memory should allocate this memory during driver initialization because physical memory is likely to become fragmented over time as the operating system allocates and frees memory.
An allocator for objects of type T can be constructed from an allocator for objects of type U. In case of failure, garbage collection is invoked.
In contrast, reads can access more bytes than necessary without a problem. There is also somewhere involved in the error GC overhead limit exceeded, all kinds of notifications about GC, logs and other checks not related to allocation. More efficient caching algorithms compute the use-hit frequency against the size of the stored contents, as well as the latencies and throughputs for both the cache and the backing store.
This solves the problem of uneven allocation between threads and, on average, allallocates quickly, and they waste little memory. We check whether half of the eden was used to avoid the effect of full GC or pathological cases for example, an explicit call to System.
In contrast, reads can access more bytes than necessary without a problem. If the application has threads, 3 of which serve user requests, 2 are doing some auxiliary activity on the timer, and all others are idle, then the first group of threads will receive large TLABs, the second is quite small, and all the others are default values.
If garbage collection does not help, then an attempt is made to allocate directly to the Old Generation where the behavior depends on the selected GC algorithmand in case of failure, another assembly and attempt to create the object occurs, and if it does not work, then finally throws OutOfMemoryError.
She saw the list that had been prepared allocating tasks to the four teams. The custom allocator will serve individual allocation requests by simply write allocate example a pointer to memory from the pool.
Riddle - where are the abstract classes?. Purchase Price Allocation Example – Advanced Tutorial. In this lesson, you’ll learn how to properly “divide up” and allocate the purchase price in a merger model, how to calculate new goodwill created, how to adjust for intangible and tangible asset write-ups, and how to create and write-up / write-down deferred tax assets and deferred tax liabilities, as well.
For example, if the address space is cache-able with write back and write no allocate attribute, when write to this space happen and it is not cache hint yet, on CM4, does cache line allocate happen? or just push data to physical device? Type an ALLOCATE command at the READY prompt to define the attributes of the new data set.
You can use the ALLOCATE command to create a PDS instead of using ISPF/PDF panels. If you noted attributes in the Preliminary Checklist # 5, substitute the attributes from the appropriate system file in the following example. For example, given an allocator type IntAllocator for objects of type int, The default allocator uses operator new to allocate memory.
This is often implemented as a thin layer around the C heap allocation functions, which are usually optimized for infrequent allocation of large memory blocks. A cache with a write-through policy (and write-allocate) reads an entire block (cacheline) from memory on a cache miss and writes only the updated item to memory for a store.
Write Allocate - the block is loaded on a write miss, followed by the write-hit action. No Write Allocate - the block is modified in the main memory and not loaded into the cache.
Although either write-miss policy could be used with write through or write back, write-back caches generally use write allocate (hoping that subsequent writes to.Write allocate example
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534669.47/warc/CC-MAIN-20220520191810-20220520221810-00451.warc.gz
|
CC-MAIN-2022-21
| 4,976
| 17
|
https://www.width.ai/post/upc-code-matching
|
code
|
Matching product data based on UPC code is a use case that allows companies such as retailers, warehouses, and ecommerce companies to automate the process of comparing two different data entries for similarity. This software system allows you to automate the processing of product orders, vendor agreements, barcode scanning, and inventory management with very little input data.
Product UPC codes come in a number of different formats based on industry, country, and source which makes it difficult to build data matching products that can cover all the use cases with high accuracy. On top of that, many of these UPC codes come from sources such as web scraping or OCR which can cause a high level of noise or loss of data.
Being able to compare UPC codes between products across sources is a huge advantage that gives a new angle to product matching. Oftentimes product matching requires a number of different data points to line up as well as relatively low noise from each of the sources. In situations where we have to use OCR or other similar methods the percentage of data that is lost during text extraction is high enough to affect most text matching tools. These other data matching tools require constant updates and revisions to account for new noise and variations from sources.
Width.ai built an NLP based solution that learns the deep relationship between different formats of UPC codes with varying levels of noise. The architecture supports both exact and partial UPC codes and allows for matching between the two. Poorly or incorrectly formatted UPC codes are a go as well and are still highly accurate. UPC codes from multiple industries and sources were used during training to allow for a huge boost in the resiliency of the accuracy long term.
Not only does the model tell you if two UPC codes are a match, it will tell you why or why not they are a match. The model generates it’s reasoning for what criteria led to the decision. While the model does explain itself fairly well, there are instances where the model gives us some reasoning that does not match the use case or explains the wrong type of match. We consider this an added benefit that is not related to our confidence metrics, although it has shown to give nearly an 8% boost in accuracy.
The model understands what information is different between the two UPC codes and if removing it leads to the same UPC code. The ability to reason is shown in full effect below where the relationship between partial and full UPC codes is understood.
It goes without saying but UPC codes that are different come back as a no match, and the model adds reasoning that makes sense.
The model is pre-trained already on a number of different use cases which means there is very little fine-tuning required as new users onboard and start using the NLP architecture in production. Even with multiple large language models being used the runtime per comparison on a single instance is less than
As mentioned before common methods of extracting UPC codes such as OCR and web scraping commonly lead to fields running into each other or line differences on a product label being skipped. This can lead to an insane amount of noise that fuzzy matchers cannot overcome. This is by far the most valuable part of our deep learning based solution. Here’s an example where the product title field was accidentally added to the UPC field because of an OCR error. This would be a nightmare for other data matching solutions.
No issue for our NLP architecture. The learned relationship between UPC codes is too strong.
Want to learn more about product matching or other data matching use cases? We’ve built a number of product matching solutions and offer all levels of customization to fit your use case. Take a look at these solutions:
Interested in seeing how GPT-3 and other NLP tools can be used in your industry? Let’s talk - Contact Us
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00449.warc.gz
|
CC-MAIN-2023-14
| 3,905
| 12
|
http://community.fantasyflightgames.com/index.php?/topic/110098-mixed-cards/
|
code
|
Hey there! well I recently bought the game and after I opened the little bags with the cards -stupidly- I didn't think about saving them with something to keep them in the same order as they came so now I have all my cards mixed and I have no idea of how to order the plot cards and many others . Can any of you help me by telling me the correct order by house? I just want to play and that has been imposible withouth having the order of the cards right.
Posted 04 July 2014 - 02:11 PM
You need not keep the cards in any order...it's all about how you play them. You keep all of your cards in your hand and play them, as necessary, against your foes. Each one has an ability beyond the numerical value. Good luck with AGoT!
Posted 04 July 2014 - 02:38 PM
Plot Cards are used in the Living Card Game, not the Board Game - are you sure you have the right forum?
If you are talking about the LCG, each card has a number and letter on the right side center. Just sort all the cards by letter (L - Lannister, B - Baratheon, S - Stark, T-Targaryen).
Edited by kauai1964, 04 July 2014 - 02:41 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115861872.41/warc/CC-MAIN-20150124161101-00011-ip-10-180-212-252.ec2.internal.warc.gz
|
CC-MAIN-2015-06
| 1,090
| 7
|
http://www.iphonegamecreator.com/faq/
|
code
|
Why You Choose Iphone Game Creator?
iPhone Game Creator was founded by a need. Our founder Sami wanted a way to build his own games for the AppStore, but didn’t know how to code, make graphics, or create sounds. After a year of hunting, he was able to put a team together. That same rock-star team is available for anyone. We remove the pain of finding a good team and let you focus on making your idea materialize.
How Much Does a Game Cost?
Well, that is up to the Game. There are four major factors to a game: Graphics, Sounds, Game Complexity and Server Complexity. If your game is a simple game, such as a “Bejeweled”, it could cost as little as $7,000 USD for everything included. For games that save player progress, time locking, and complex instant apps purchases, the cost varies.
How long does it take to make a Game?
Again, depends on the complexity of the game. Most graphics and sounds take two weeks to complete. Coding on simple games may take another two weeks. At a minimum, a project will take a month, start to finish.
What is the IGC Process?
First, we’ll discuss your idea. Next, we’ll build out the graphics, and send them to you for your approval. We’ll then create sounds to match the “look” of the game. Before coding, we will create a short 10-20 second animation of your main game mechanics to approve. Our Engineers will then make it all come to life!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424148.78/warc/CC-MAIN-20170722202635-20170722222635-00200.warc.gz
|
CC-MAIN-2017-30
| 1,396
| 8
|
https://supportforums.cisco.com/t5/network-management/brand-new-cisco-1721-and-sdm-cd/td-p/686544
|
code
|
how do i setup SDM on a new 1721 correctly? i tftp'd the 4 SDM files to flash, enabled http server and setup a usr/pwd with priv 15. i get the login prompt in IE error 401 unauthorised. dunno what is messed up? i really need help here someone please reply soon.
i sort of getting there now guys. ios was fine. i added the following lines
: http authentication local
: line vty 0 4
: privilege level 15
: login local ; remove login & password lines
:transport input telnet
: transport input telnet ssh
:logging buffered 51200 warning
authentication worked and this window was ok'd to close, now second window says "SDM express for 10.10.10.1 will open in another window. do not close this window until you exit SDM express" but the second window hasnt launched after 5mins... probably the SDM ver is old, i have v2.1.1 from the cd.
ok, i opened up java manager and i got this error hostname router and url 10.10.10.1 don't match. i clicked continue anyway and now the fatal error has occured :
ES Startup Error
Application ES has not been granted with the necessary privileges in order to startup successfully, or another unknown error occurred during startup. Please close all involved browser windows and try again by granting all requested privileges.
ok guys, i have lift off now with URL https://10.10.10.1 and thanks to another post title 1811 & SDM i.e go to IE options/advanced.. place tick beside "allow active content to run in files in My Computer". to get to the final working SDM express screen however i encounter two popup prompt screens:
HTTPS - warning ( th
The hostname in the server security certificate does not match the name of the server.
hostname of the url : 10.10.10.1
hostname from the certificate : router.
do you want to proceed... yes
then second popup
Warning - Security
Do you want to accept the certificate from web site "router". for the purpose of exchanging encrypted information?
publisher authenticity verified by "unknow issuer"
! the security certificate was issued by a company that is not trusted
i the security certificate has not expired and is still valid
Caution : router asserts that this content is safe. you should always accept this content if you trust "router" to make that assertion....click on always and voila, i finally get the SDM express screen with all the workings, to prove it works i set the router clock to sync with my PCtime and it worked indeed.
i think the second prompt screen is normal but the first screen prompt can be tidied up so that it doesn't popup everytime.
can someone agree this is fixable or is this just normal prompts in the way SDM express is accessed via IE?
do i need to change the hostname of the router or adjust the router config ?
ok guys, when i use http://10.10.10.1, i dont get the two popup prompts mentioned in the last thread and secondly when i use https://10.10.10.1 , these two popup prompts are i suspect just normal IE security and certificate prompts. so, now I think i have SDM fully operational with either http or https. thanks for tuning in and hope this helps someone else in the future. now i am off to secure my 1721 with SDM express. after securing my 1721 router with SDM express, i will post further updates if http or https access falls over again via IE.
We are pleased to announce availability of Beta software for 16.6.3. 16.6.3 will be the second rebuild on the 16.6 release train targeted towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are looking for early feedback from custome...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084892059.90/warc/CC-MAIN-20180123171440-20180123191440-00248.warc.gz
|
CC-MAIN-2018-05
| 3,518
| 31
|
https://www.brainasoft.com/firecmd/faqs.html
|
code
|
*) What is FireCMD?
-> FireCMD is a software package containing a set of tools such as FireCMD command shell, console emulator, FireTXT text editor and various other bundled programs.
*) Who are FireCMD's users?
-> Our primarily users are Developers, System Administrators, Programmers, Technical Support, Computer Science Students and corporate IT departments. Though FireCMD can also be used by normal computer users for powerful interaction with their computer. It is so intuitive and user friendly that even a novice user who is scared of command line will start loving it.
*) Why should I use FireCMD shell?
-> FireCMD command shell has features like recursive aliases, command substitution using files, HTML and CSS support, file and directory path auto-completion etc. which makes it a next generation command shell. It also remembers command history and last working directory for next session. It has an user-friendly interface unlike the traditional console based command interpreters. FireCMD can be really helpful for developers and system administrators and it can increase your productivity.
*) Is FireCMD a freeware?
-> No, FireCMD is not a freeware. Though trial copy allows users to try the software for free for a limited number of launches. Trial copy has no restrictions implied on the features.
*) Is there a 64-bit version of FireCMD?
-> There is a 64-bit friendly version of FireCMD which can be downloaded from the Downloads Page. Note that it is not a complete 64 bit version. The main core is 32 bit with only some components being 64 bit.
*) What is UWIN?
-> Uwin is a Unix to Windows Integration Toolkit that gives you all the features of a traditional UNIX operating system on a Windows OS. It provides a virtual UNIX environment on Windows. Most of the utilities were developed by AT&T.
*) What is GCLI?
-> Graphical Command Line Interface (GCLI) is a new human-computer interface conceived and developed by Akash Shastri. It merges the power of CLI (Command Line Interface) and user friendliness of GUI (Graphical User Interface). For more information check this link: GCLI meaning and advantages.
*) Is it called GCLI because user types command in a window instead of a console?
-> No, FireCMD is not a GCLI merely because the user types commands in a GUI window, but it is more a GCLI because it provides a set of features and programs which enables users to interact using a mouse with GUI components such as dialog boxes to get the output once they have pressed the return key after typing the command.
*) Where can I find the user manual?
-> Documentation can be accessed from the Help menu -> Help Contents of the application window. Online documentaion can be found here: FireCMD Documentation
*) Where can I get support?
-> You can ask us any queries by sending us email at email@example.com. Also check our Support Page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823260.52/warc/CC-MAIN-20171019084246-20171019104246-00361.warc.gz
|
CC-MAIN-2017-43
| 2,860
| 20
|
http://stackoverflow.com/questions/tagged/incompatibility+osx
|
code
|
I'm trying to compile a pre-existing c++ package on my mac osx leopard machine, and get the following error: error: no matching function for call to 'getline(char**, size_t*, FILE*&)' This is ...
I know there is no official SDK for Windows, which is very annoying. Is there any way to develop applications on a Windows computer, other than somehow running a Mac OS in VMware? I know you can do it ...
I've written a Java applet. A user reports that he tried to run it in Firefox 3.0.3 on OS X 10.5.5 but no go. It wants him to download a plug-in, but when he tells it to install missing plug-ins it ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826025.8/warc/CC-MAIN-20140820021346-00164-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 602
| 3
|
https://apxitex.com/courses/full-stack-web-development/
|
code
|
Full Stack Web Development
This course is designed to give you a vivid understanding about creating applications using PHP and MySQL. In this course not only you will learn about PHP, but creating database, interacting with the database using PHP and creating and designing a Content Management System (CMS) like WordPress.
But we won’t stop there. We will look in to security and working with APIs for smoother functions. The course is divided in to multiple units and has quizzes and projects to make sure you have a strong understanding regarding the PHP, MySQL, JSON, and other methods we will use throughout the course to build and run our application.
What Will I Learn?
- You will learn to create a (CMS) Content Management System like WordPress
- You will learn MySQL
- How to use forms to submit data to databases
- You will learn about PHP security
- You will learn about sessions
- Password hashing
- You will learn to debug your code
- You will learn to use an API to bring data from a database to a graphical interface
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107900860.51/warc/CC-MAIN-20201028191655-20201028221655-00484.warc.gz
|
CC-MAIN-2020-45
| 1,033
| 12
|
https://www.freertos.org/FreeRTOS_Support_Forum_Archive/March_2009/freertos_SAM-ICE_AT91SAM7X-EK_FreeRTOS_Debug_problem_3087771.html
|
code
|
Hello @ all, I tried to debug the newest version of FreeRTOS with the GNU Compiler Toolchain. The Toolchain is configured as described in James P. Lynchs "Using Open Source Tools for AT91SAM7S Cross Development" Revision C. Changes are made to the GDB commands, since the tutorial is for the SAM7S, like described on the yargato homepage. The problem is, that eclipse isn’t possible to start the debugsession. It hangs at about 27%. I also changed the CFFLAG to – O0 to disable optimisation. The rest of the toolchain works fine, compilation is ok and loading the program into flash via SAM-BA also works fine and the FreeRTOS port seems to work well. Has anyone the correct settings for debug via SAM-ICE with eclipse? Thanks a lot! Tobias
Can SAM-ICE be used with this setup as is? I think you can buy some GDB interfaces from Segger. Regards.
Hi I testet again a little with this debug commands and the debug starts but doesn’t stop at main and normal debug operations are not possible. # Listening for commands on this PC’s tcp port 2331 target remote localhost:2331 # Set gdb server to little endian monitor endian little # Set JTAG speed to 30 kHz monitor speed 30 # Reset the chip to get to a known state. monitor reset 8 monitor sleep 10 # # Disable the watchdog and setup the PLL # # WDT_MR, disable watchdog monitor writeu32 0xFFFFFD44 = 0x00008000 # CKGR_MOR monitor writeu32 0xFFFFFC20 = 0x00000601 monitor sleep 10 # CKGR_PLLR monitor writeu32 0xFFFFFC2C = 0x00480a0e monitor sleep 10 # PMC_MCKR monitor writeu32 0xFFFFFC30 = 0x00000007 monitor sleep 10 # PMC_IER monitor writeu32 0xFFFFFF60 = 0x00480100 monitor sleep 100 # Set JTAG speed in khz monitor speed 12000 load break main continue Sometimes the connection closes down when i pause the debugging and sometimes it hangs and the step commands are not possible. I used the same configuration with the test project from yargato and all worked fine. Is there a problem in debuging FreeRTOS in RAM, because flash debugging seems not to work with SAM-ICE, together with eclipse, without an extra licence. Best Regards! Tobias
Copyright (C) Amazon Web Services, Inc. or its affiliates. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100540.62/warc/CC-MAIN-20231205010358-20231205040358-00195.warc.gz
|
CC-MAIN-2023-50
| 2,179
| 4
|
https://github.com/fsprojects/Paket/issues/1589
|
code
|
Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
Paket could not restore http dependencies to the same directory #1589
Paket could not restore http dependencies to the same directory
Correct files restore
added a commit
Apr 10, 2016
I think I've seen similar issues (sometimes) when downloading multiple files via file dependencies from the same location.
It smells like some concurrency issue, but I never quite looked into the details.
EDIT But I don't see how this could be happening - the grouping of downloads by target folder should avoid any concurrency issues around the version file and I really don't see anything else that can go wrong there...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211000.35/warc/CC-MAIN-20180816132758-20180816152758-00309.warc.gz
|
CC-MAIN-2018-34
| 764
| 10
|
https://calendar.dallasmakerspace.org/events/view/15861
|
code
|
Cancellations for this event must be made before August 1, 2020 — 12:00pm.
Registration for the event is closed.
About this Event
Standard monthly meeting with cleanup, and discussion.
On todo list:
- determine what's required to hang the new air filter (and let's bring it in during cleanup to at least help during that)
- check our consumables storage
- looking for volunteers to recalibrate the thermocouple limiter on the large oven (arduino using the ADC with a K type probe I think)
PIN: 179 873 734#
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738674.42/warc/CC-MAIN-20200810102345-20200810132345-00523.warc.gz
|
CC-MAIN-2020-34
| 508
| 9
|
https://bentoml.com/blog/why-do-people-say-its-so-hard-to-deploy-a-ml-model-to-production
|
code
|
Jul 8, 2022 • Written By Tim Liu
You’ve heard it said, you’ve heard it written and you’ve heard it sung from the rooftops by analysts and vendors alike: 87% of data science projects never make it into production.
Why is that?
Well, of course, it always depends, but the slightly more precise answer is that building ML services is more complex than other types of software. Different technologies, lack of best practices, and the cross-functional nature all contribute to the challenges of deploying ML models.
In this article, I dig into some of the most common challenges that ML teams are faced with while shipping a trained model as a production-level prediction service, and offer some tips and recommendations. But first, it’s important to distinguish how ML projects differ from traditional software engineering and even data engineering projects.
I’ve spent a lot of my career building data applications, and I’ve found that they share many of the same complexities as ML. However, with ML, you have one additional artifact adding another shifting dimension: the model itself.
Here’s how I’ve started think of it:
In traditional software engineering, your main concern is the code.
In data engineering, your main concerns are the code + the data.
In ML engineering, your main concerns are the code + the data + the model.
It’s not just me, either. Software thought leader, Martin Fowler, shares in a recent article why ML services are so complex. Hint: it’s because of the shifting nature of these three components.
Let’s dig in.
The code, for the most part, is a fairly known quantity and has a deterministic quality about it. In other words, given the same input, it will produce the same output. Even if your code is stateful (not recommended), I’d argue that the “state” is part of the input.
The data is deterministic in a way, but having spent years in data, it’s difficult to know what types of data and at what volumes you will receive it. You will always be surprised. For this reason, I would say the data is the most variable piece of the puzzle.
I think of the model as a deterministic function, albeit the most blackbox of the three. Imagine the worst coder in the world writing spaghetti code that even the most experienced coder couldn’t figure out. A trained model is analogous to this code in that it is composed of complex vectors which by themself are very difficult to understand, but given a particular input, the output should always be the same for a given version of a model.
After a model has been trained, the next step is moving it to a centralized location where it can be used to build or update a prediction service. Models are trained in a variety of environments, from Jupyter notebooks to distributed experiment systems, and the methods for saving them can vary depending on the library that you’re using.
ML frameworks have different methods of saving a model to ensure the reproducibility of the prediction. Depending on how you save the model, it could be serializing the Python class or just saving the weights of the model. Both methods could fail to reproduce the model depending on the context of the training environment. If the model is not saved correctly, then it could produce erratic predictions in production.
Once the model has been saved, you’ll want to move it, along with its associated files. When saving a model, multiple files may be generated as associated metadata -- a requirement for loading the model again.
A centralized location for model storage is not only required so that a developer can create the prediction service, it is also required to have an efficient CI/CD process so that when the service is being deployed to production, the model can be downloaded by the deployment pipeline and packaged into the production deployment.
Persisting various versions of the model is extremely important in order to rollback bad updates or debug working models. You may even want to run multiple model versions in production (known as A/B testing) in order to gauge which model runs the best. More sophisticated deployments can run model version experiments like “multi-arm bandit” that can score the models in real time and direct more traffic to the best model.
• Do your research when saving your model and make sure it’s the recommended way of saving. For example, Pytorch has documentation that explains the various methods used to save the model depending on your context.
• Tools like S3 or Google Cloud Storage can be an elegant solution as a shared model repository that Data Scientists and developers can use to share models.
• Try to find a standard which you can use to coordinate the model training with the model service. Tools like MLFlow, BentoML, TFServing and Cortex help to coordinate the model into a model registry and ultimately to a deployed destination. For example, use MLFlow to manage your experimentation and training and BentoML for model serving and deployment.
The prediction service is used as the glue to expose an API, transform the data to extract appropriate features, use the model for inference, and incorporate business logic. The code for the service is usually written by a trained software developer, but on smaller teams, the Data Scientist may have the responsibility of creating the service.
The feature extraction code is commonly written by the Data Scientist, so developers will need to migrate the code from the training environment to the prediction service. Additionally, they may have to translate the input to the service (perhaps a REST request) into usable data. Finally, they’ll have to write the code that takes the output of the inference and translates it into something that the calling service can understand.
Dependencies in a prediction service are very important because if they are not precisely configured, not only could the code behave differently than expected, the model itself could make different predictions than in the training environment. The right versions of the ML library, the runtime, and the dependencies should all be used in order for the service to run correctly.
A scalable prediction service needs the proper environment in order to run well. For example, particular ML libraries can only run on particular OS distributions. Docker is the standard for configuring a reproducible environment, but configuring Docker for an ML use case can be extremely challenging. If configured correctly, it will give you a clean artifact from which you can deploy to a number of different services, as well as provide the ability to run the service locally so that you can debug it if there is an issue.
• Unless you absolutely need it, create the model serving service in Python. Most Data Scientists use Python. It makes the deployment process way more streamlined. In my experience, users go from “weeks/months” to days when redeploying a new model. Some teams need ridiculously high performance and prefer to convert all the code into Rust/Go. Most do not. By the way, AWS Sagemaker is written in Python.
• Make sure you use the same version of Python and the ML library that you used to train the model. You can use “pip freeze” to determine which versions you’re using.
• For GPU support, use Nvidia’s docker image, it provides a good base out of the box to GPU workloads. Believe me, you do not want to end up in “cuda hell”
• Make sure the Docker image (or associated runtime) exposes health, documentation and monitoring endpoints for your service.
• Select the deployment environment that makes the most sense for your team. Choose something you’re already familiar with that you’re deploying other applications into already. This reduces the learning curve for maintaining this new pipeline
Finally, once your service is in production, there is no telling how the data will change over time — whether that means all of a sudden receiving bad data or simply changing data as users change their behavior. Change in the data is something that I’ve never been able to predict in my years building data applications. When the data changes unexpectedly, you can still manage it with the strategies below.
Changes in the data over time can result in a variety of issues from the model not making as effective predictions to the model not working at all. Data drift, or variations in production input data, can happen as time passes or seasons change. It’s important to know if it’s happening so that you can retrain your model if necessary.
Model performance can also change as time passes, but can be much more difficult to monitor because it requires you to join predictions with downstream outcomes. For example, connecting the dots between a product recommendation and the potential sale of the product.
Retraining a model is often the solution to both data drift and performance issues. Retraining not only involves making sure you have fresh data but also that your system is agile enough to ship the new model in an efficient and automated manner. Just in traditional software deployments, the CI/CD pipeline needs to be integrated with your model repository so that it can ship new models quickly when you have trained a new one.
As data changes in production, you may not necessarily want to risk deploying a new model. For this reason, it can be helpful to have ways to test production data with models that you’re still validating. Especially in cases where performance is suffering, you want to make sure that a newly-trained model will actually help performance rather than make things worse.
• Deploying often and at speed will give you more confidence in your pipeline. Not only that, it has added benefits like data drift not being as problematic
• Monitoring performance often includes joining with downstream metrics. Make sure you’re sending your inference results to the same place (likely a data warehouse) as the metrics you want to join with.
• Using a service mesh like Istio or AWS App Mesh can help fan out production traffic and help validate new models using shadow pipelines
The complexity introduced by having 3 different shifting dimensions is not trivial especially given that the development process often involves multiple stakeholders. Best practices are still in their early days because operationalizing ML projects is such a new field. With more and more tools and practitioners entering this market I feel confident that best practices will emerge just like the did in traditional software, devops and even data engineering.
As Andrew Ng puts it, the point of these MLOps tools and processes is to make “AI an efficient and systematic process.” The more we can streamline these processes the better companies can begin to benefit from ML.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473370.18/warc/CC-MAIN-20240221034447-20240221064447-00780.warc.gz
|
CC-MAIN-2024-10
| 10,822
| 42
|
https://www.instructables.com/community/Is-there-a-benchmark-file-in-povray-35-and-if-so/
|
code
|
Is there a benchmark file in povray 3.5? and if so, How do you use it? Answered
I have been searching for a way to benchmark my openmosix cluster and i came across povray and povmosix. povmosix is a program that splits a scene into parts to be processed and rendered by separate computers. Unfortunately it only supports 3.5. i know how to use the benchmark in 3.6 but not 3.5. any help would be apreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038056869.3/warc/CC-MAIN-20210410105831-20210410135831-00223.warc.gz
|
CC-MAIN-2021-17
| 407
| 2
|
http://www.zelenyprachy.cz/case/74e377841c305424.html
|
code
|
Jul 10,2020·Label Smoothing.Label Smoothing is one of the popular regularisation techniques for classification models.This technique helps by preventing the model from predicting the labels during training.Label smoothing has been used successfully to improve the accuracy of deep learning models across a range of tasks,including image classification results for this questionHow is a CNN used in image classification?How is a CNN used in image classification?Instead of preprocessing the data to derive features like textures and shapes,a CNN takes the images raw pixel data as input and learns how to extract these features,and ultimately infer what object they constitute.In this article,we will learn the basic concepts of CNN and then implementing them on a multiclass image classification problem.Understanding the basics of CNN with image classification.by Sneha results for this questionHow to reshape data for a classification model?How to reshape data for a classification model?Reshape your data either using X.reshape (-1,1) if your data has a single feature or X.reshape (1,-1) if it contains a single sample.DeprecationWarning)Evaluating a Classification Model Machine Learning,Deep Learning
Oct 15,2020·Data Science Hackathon Tip #8 Trust Local Validation.Do not jump into building models by dumping data into the algorithms.While it is useful to get a sense of basic benchmarks,you need to take a step back and build a robust validation framework.Without validation,you are just shooting inAndrew-NG-Notes/andrewng-p-4-convolutional-neuralFoundations of CNNsDeep Convolutional Models Case StudiesObject DetectionExtrasComputer vision1.Computer vision is one of the applications that are rapidly active thanks to deep learning.2.Some of the applications of computer vision that are using deep learning includes 2.1.Self driving cars.2.2.Face recognition.3.Deep learning is also enabling new types of art to be created.4.Rapid changes to compEdge detection example1.The convolution operation is one of the fundamentals blocks of a CNN.One of the examples about convolution is the image edge detection operation.2.Early layers of CNN might detect edges then the middle layers will detect parts of objects and the later layers will put the these parts together to producPadding1.In order to to use deep neural networks we really need to use paddings.2.In the last section we saw that a 6x6 matrix convolved with 3x3 filter/kernel gives us a 4x4matrix.3.To give it a general rule,if a matrix nxn is convolved with fxf filter/kernel give us n-f+1,n-f+1matrix.4.The convolution operation shriSee more on githubPreprocessing in Data Science (Part 1) - DataCampApr 26,2016·Preprocessing in Data Science (Part 1) Centering,Scaling,and KNN.This article will explain the importance of preprocessing in the machine learning pipeline by examining how centering and scaling can improve model performance.Data preprocessing is an umbrella term that covers an array of operations data scientists will use to get their data Author Sneha BhattEstimated Reading Time 8 minsThe 4 Convolutional Neural Network Models That Can Oct 07,2018·For all the models (except for the pre-trained one),here is my approach Split the original training data (60,000 images) into 80% training (48,000 images) and 20% validation (12000 images) optimize the classifier,while keeping the test data (10,000 images) to finally evaluate the accuracy of the model on the data it has never seen.This
PrecisionRecallPrecision and Recall A Tug of WarPrecisionattempts to answer the following question Precision is defined as follows Let's calculate precision for our ML model from the previous sectionthat analyzes tumors Our model has a precision of 0.5in other words,when itpredicts a tumor is malignant,it is correct 50% of the time.See more on developers.googleKNN Classification using Scikit-learn - DataCampAug 02,2018·Learn K-Nearest Neighbor (KNN) Classification and build KNN classifier using Python Scikit-learn package.K Nearest Neighbor (KNN) is a very simple,easy to understand,versatile and one of the topmost machine learning algorithms.KNN used in the variety of applications such as finance,healthcare,political science,handwriting detection Comparing different supervised machine learning algorithms Dec 21,2019·Supervised machine learning algorithms have been a dominant method in the data mining field.Disease prediction using health data has recently shown a potential application area for these methods.This study aims to identify the key trends among different types of supervised machine learning algorithms,and their performance and usage for disease risk prediction.Cosine Learning Rate Decay.The Cosine Learning Rate Decay involves reductions and restarts of learning rates over the course of training.Knowledge Distillation.Knowledge Distillation follows a teacher-student relationship method.Linear Scaling Learning Rate.Learning Rate Warmup.Label Smoothing.Mixed Precision Training.Model Tweaks.No Bias Decay.8 Important Hacks for Image Classification Models One MustWas this helpful?People also askWhich is the best pre trained model for image classification?Which is the best pre trained model for image classification?Top 4 Pre-Trained Models for Image Classification with Python Code.1 1.Very Deep Convolutional Networks for Large-Scale Image Recognition (VGG-16) The VGG-16 is one of the most popular pre-trained models for image 2 2.Inception.3 3.ResNet50.4 4.EfficientNet.Top 4 Pre-Trained Models for Image Classification With
DatasetData Cleansing and Data PreprocessingEdaNeural NetworkConclusionThe data is from Kaggle and it contains metadata,train folder and test folder which contain chest x-ray images.There are two main problems of this dataset.First,there is no any Covid-19 images in test folder.The second problem is some names of images which are in train folder are not in X_ray_image_name in metadata.csv,so we need to remove those images whose names are not in metadata.csv.See more on melaniesoek0120.mediumA survey on Image Data Augmentation for Deep Learning Jul 06,2019·In this study,the performance of the baseline model decreases from 74.61 to 66.87% when evaluated on augmented test images.Some classification models lie on the fence in terms of their necessity for speed.This suggests promise in developing methods that incrementally upgrade the confidence of prediction.Estimated Reading Time 5 minsTop 4 Pre-Trained Models for Image Classification With IntroductionTable of Contents-Setting Up The SystemPreparing The DatasetEnd NotesThe human brain can easily recognize and distinguish the objects in an image.For instance,given the image of a cat and dog,within nanoseconds,we distinguish the two and our brain perceives this difference.In case a machine mimics this behavior,it is as close to Artificial Intelligence we can get.Subsequently,the field of Computer Vision aims to mimic the human vision system and there have been numerous milestones that haSee more on analyticsvidhyaEstimated Reading Time 8 minsPublished Aug 17,2020Machine Learning Classification - 8 Algorithms for Data Oct 04,2019·Classification is one of the most important aspects of supervised learning.In this article,we will discuss the various classification algorithms like logistic regression,naive bayes,decision trees,random forests and many more.We will go through each of the algorithms classification properties and how they work.1.Estimated Reading Time 9 minsImage classification TensorFlow CoreJun 17,2021·normalized_ds = train_ds.map(lambda x,y (normalization_layer(x),y)) image_batch,labels_batch = next(iter(normalized_ds)) first_image = image_batch # Notice the pixels values are now in `[0,1]`.print(np.min(first_image),np.max(first_image))
2.Model evaluation procedures ¶.Training and testing on the same data.Rewards overly complex models that overfit the training data and won't necessarily generalize.Train/test split.Split the dataset into two pieces,so that the model can be trained and tested on different data.Better estimate of out-of-sample performance,but still a GitHub - kunalj101/Data-Science-Hacks Data Science Hacks Jul 11,2020·Data Science Hacks,Tips and Tricks Data Science Hack #1 - Resource Downloader Data Science Hack #2 Pandas Apply Data Science Hack #3 Pandas Boolean Indexing Data Science Hack #4 Pandas Pivot Table Data Science Hack #5 Pandas crosstab Data Science Hack #6 Pandas str.split Data Science Hack #7 Extract E-mails from text Data Science Hack #8 Normal Distribution Data Science Hack #9 Remove Emojis from text Data Science Hack #10 Elbow method for classifier Data Science HackGoogle Earth Engine Supervised Classification of Creating An Roi from CoordinatesLoading An ImageCollection and Filtering to A Single ImageCollect Training DataSample Imagery at Training Points to Create Training DatasetsTrain The ClassifierClassify The Image Display The ResultsAssess The AccuracyFirst we need to define a region of interest (ROI).Instead of using an imported asset,we will use a single coordinate that we will manually define.I am interested in doing a classification around Houston,so I will use the city center as my lat/long.See more on geohackweek.github.ioImage Classifier using CNN - GeeksforGeeksAug 09,2019·Image Classifier using CNN.The article is about creating an Image classifier for identifying cat-vs-dogs using TFLearn in Python.The problem is here hosted on kaggle.Machine Learning is now one of the most hot topics around the world.Well,it can even be said as the new electricity in todays world.
Jul 12,2019·The key to GANs is the adversarial training of both models.It does not work when you train one model in isolation,e.g.just the generator or just the discriminator.If you want to train a single model,you can train a classification model directly.And you should as a point of comparison and only use a GAN if it can perform better.Image Classification - an overview ScienceDirect TopicsImage classification is the primary domain,in which deep neural networks play the most important role of medical image analysis.The image classification accepts the given input images and produces output classification for identifying whether the disease is present or not.E.Kim et al. proposed a CNN method which outperforms perfect Image Classification in QGIS - Supervised and Unsupervised Image Classification in QGIS Image classification is one of the most important tasks in image processing and analysis.It is used to analyze land use and land cover classes.With the help of remote sensing we get satellite images such as landsat satellite images.But these images are not enough to analyze,we need to do Continue reading Image Classification in QGIS Supervised and
May 20,2021·1a.Logistic regression ¶.In # import the class from sklearn.linear_model import LogisticRegression # instantiate the model (using the default parameters) logreg = LogisticRegression() # fit the model with data logreg.fit(X,y) # predict the response values for the observations in X logreg.predict(X) Out :Machine learning Evaluation metrics ML Cheat SheetFeb 03,2020·Evaluation metrics help to evaluate the performance of the machine learning model.They are an important step in the training pipeline to validate a model.Before getting deeper into definitions Multiple Feature Learning for Hyperspectral Image Aug 28,2014·Hyperspectral image classification has been an active topic of research in recent years.In the past,many different types of features have been extracted (using both linear and nonlinear strategies) for classification problems.On the one hand,some approaches have exploited the original spectral information or other features linearly derived from such information in order to have classes
Apr 11,2019·Some proven data augmentation methods include Random geometry transformation for random cropping (with constraints),random expansion,random horizontal flip and random resize (with random interpolation).Random color jittering for brightness,hue,saturation,and contrast.Object detection and image classification with Google May 13,2019·Image classification with the Coral USB Accelerator Figure 1 Image classification using Python with the Google Coral TPU USB Accelerator and the Raspberry Pi.Lets get started with image classification on the Google Coral! Open up the classify_imageResNet,AlexNet,VGGNet,Inception Understanding various Aug 03,2018·Image classification is the task of classifying a given image into one of the pre-defined categories.Traditional pipeline for image classification involves two modules viz.feature extraction and classification.Feature extraction involves extracting a higher level of information from raw pixel values that can capture the distinction among the categories involved.
·Maybe the model takes input data from the image as *any function it can. That is why it is important to train the model with a large number of images. One of the models to reduce Tutorial Image Classification - MicroImagesImage Classification The input color image covers about 320 acres of farmland in eastern Nebraska.It was acquired during the summer growing season,and includes fields of corn,wheat,and soybeans.Our main purpose in classifying the image is to map the distribution of theUnderstanding the basics of CNN with image classification Oct 07,2019·We will also discuss in detail- how the accuracy and performance of a model can be further improved.Trending AI Articles 1.Neural networks for solving differential equations.2.Turn your Raspberry Pi into homemade Google Home.3.Keras Cheat Sheet Neural Networks in Python.4.Making a Simple Neural Network
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304876.16/warc/CC-MAIN-20220125220353-20220126010353-00313.warc.gz
|
CC-MAIN-2022-05
| 13,677
| 9
|
http://www.head-fi.org/t/534479/mad-lust-envys-headphone-gaming-guide-3-18-2016-mrspeakers-ether-c-1-1-added/8085
|
code
|
Considering how popular the Mixamp is I can't believe they would stop production of the current model months before the release of their new model. Being that the sound card is the least expensive part of this set up I suppose I can get the Recon3D and be on the lookout for the Mixamp 3 or restocking of the current model. I just don't want to wait until 2013 to get all of this. If it does come back in stock on October 20th like Mjonir says than I should still be in the window to return the Recon3D.
Well, since they are already selling the Mixamp 2013 version with their headsets, I'd assume it won't be long until they restock them as stand-alone.
Look no further than just above your first post for a theoretical but official explanation from Beyer on this. On the practical side, you'll have to rely on reviews though.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218193716.70/warc/CC-MAIN-20170322212953-00156-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 826
| 3
|
https://kotadamansaraforest.org/a-c-nielsen-malaysia-global-impact-day-18-june-2019/
|
code
|
A C Nielsen returned again this year for their community outreach day. The main objective of this is to get its employees out of the office for a day to contribute to the community/environment to make an impact. This was in conjunction with #NLSNEarthweek
This year the group consisted of 50 participants who were split up into 3 groups targeting the Sahabat, Serenity and Temuan trails. A vibrant group of enthusiastic individuals from around the world helped upkeep these KDCF trails.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475422.71/warc/CC-MAIN-20240301161412-20240301191412-00340.warc.gz
|
CC-MAIN-2024-10
| 486
| 2
|
https://wordpress.stackexchange.com/questions/358040/completly-disable-and-remove-thumbnails
|
code
|
This is my first question, so forgive me if it's not perfect 😅
I am asking, if there is a way, to completely disable and remove the thumbnail functionality from WordPress. (I am using an image CDN plugin, which is taking care of resizing, optimizing, etc. So, no need for the extra size and file count consumption by thumbnails)
I already know how to prevent WordPress from generating thumbnails, good so far. I also know how to delete all thumbnails (from the filesystem). But doing this on my staging environment brought up 2 obvious issues I forgot about.
To prevent the issues, I would need functions, that:
Removes all thumbnail information from the WordPress database (i guess postmeta?)
"Replaces" the image size Settings, of all images used in Blog-posts or Pages, by "Full Size"
"Replaces" the thumbnails, used by the media library, with the full-sized image (since I want to delete all thumbnails)
Thanks in advance
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474715.58/warc/CC-MAIN-20240228112121-20240228142121-00024.warc.gz
|
CC-MAIN-2024-10
| 928
| 8
|
http://vrworlds.blogspot.com/2012/02/my-friend-told-me-about-this-deodorant.html
|
code
|
My friend told me about this deodorant commercial which I thought I should share with the class.
I think this is a great example on how to mix 3D with both reality and advertisement. Although the graphics might not seem that complex, they work with the concept of the story. The main reason I wanted to post this add was because that were in charge of this campaign took these concept of angels falling to a whole new level. They live animated a big add in London.
This technique is called augmented reality. I though it was pretty cool and innovative. It made me think that 3D and animation actually expand to all sort of platforms.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948544124.40/warc/CC-MAIN-20171214124830-20171214144830-00796.warc.gz
|
CC-MAIN-2017-51
| 633
| 3
|
https://education-research.org/room-divider-ashley-furniture/divider-furniture-images-room-shelves-ashley-shopee/
|
code
|
The size The period of the hanging panel room divider is dependent upon the height of the ceiling, whereas the perfect width is dependent on multiple things. The height is the other thing you wish to consider. Translucent glass frames and curtains offer a lot more cost-effective solutions that are simple to incorporate. Bigger hinges ought to be used so the metallic plate is practically as wide as the edge of the door.
Wall dividers can be put almost anywhere and are created of various materials. Wood dividers were hard to discover. One of the most frequent dividers utilised in homes is an easy wall divider. You can create a Multi-Use Divider. If you select a rice paper room divider, this choice is ideal for allowing light to pass through. It is possible to also utilize room dividers as a manner of hiding workspaces. You may even make an offbeat room divider with the usage of some crates!
Setup is fast and simple, giving a no-tools approach to designing and re-arranging a dynamic location. Discover all the ways that you can create an exceptional office setup with a broad range of panel and cubicle systems designed for your requirements. When you’ve seen all of your alternatives, you’ll appreciate the benefits of using elegant, functional glass walls for office space divisions. Using portable room dividers that serve another function like displaying photographs are increasingly gaining popularity over the previous years because of the additional functionality it supplies. The goal of a cookie is to tell the Web server you have returned to a particular page. There are quite a lot of tips that you can use as a way to divide up space between children that are sharing the exact same room or who use exactly the same play space. Another great point about office dividers is they’re portable.
If you are in possession of a massive area you want to divide or you’re trying to find a more bespoke solution, then we can offer expert advice on which product could possibly be proper for you. Based on the size of your instruction space, you might need to carve this up into smaller areas and give individual teams a little privacy to focus. For your living space, you can produce more private spaces that will act as your reading area, TV room, or play area for your children.
If you set the room partition appropriately and study the way that it ought to be placed, it’s undoubtedly a plus component for your area and can transform a very simple space into a bedazzling focus. Finding a room partition does not merely mean just getting any design. You’ve mirrored room partition very similar to create portable is not unusual to something more.
Any content, trademark/s, or other material that might be found on this site that is not this site property remains the copyright of its respective owner/s. In no way does LocalHost claim ownership or responsibility for such items and you should seek legal consent for any use of such materials from its owner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594341.91/warc/CC-MAIN-20210422160833-20210422190833-00554.warc.gz
|
CC-MAIN-2021-17
| 2,986
| 6
|
https://www.oreilly.com/library/view/pro-drupal-7/9781430228387/ch01.html
|
code
|
Chapter 1. How Drupal Works
In this chapter, I'll give you an overview of Drupal. Details on how each part of the system works will be provided in later chapters. Here, we'll cover the technology stack on which Drupal runs, the layout of the files that make up Drupal, and the various conceptual terms that Drupal uses, such as nodes, hooks, blocks, and themes.
What Is Drupal?
Drupal is used to build web sites. It's a highly modular, open source web content management framework with an emphasis on collaboration. It is extensible, standards-compliant, and strives for clean code and a small footprint. Drupal ships with basic core functionality, and additional functionality is gained by enabling built-in or third-party modules. Drupal is designed to ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038082988.39/warc/CC-MAIN-20210415005811-20210415035811-00588.warc.gz
|
CC-MAIN-2021-17
| 758
| 4
|
https://forum.arduino.cc/t/recommendations-for-wireless-alarm-sensors/98459
|
code
|
I'm building an Arduino alarm system. I want to add some wireless sensors, both motion and alarm contact (door) sensors. There are lots of alarm hardware options, does anyone have any recommendations for a place to start? Does anyone have any suggestions for a wireless system that's easy to integrate with an Arduino?
I was really hoping to get wireless sensors for $10 or $15, and just have those transmit to some wireless receiver that can feed my Arduino. I was thinking something like this: http://www.smarthome.com/7311D/Skylink-WD-318-Household-Alert-Door-Window-Alert-System/p.aspx
Other than cost, any reason you couldn't RYO (roll-your-own)?
For the comms part, you could use a single RF serial transceiver, and each sensor could have a seperate RF serial transceiver. You could poll each to send back a status (when checking for a status), otherwise, don't poll, and instead wait for a pin-change interrupt from the base transceiver. The sensors would only send when they detect a pin-change interrupt. Each would have an "Arduino" (best would be an ATTiny), with a pin connected to the sensing device (IR, magnet switch, etc); they would need to be coded in such a manner as to be in "sleep" mode and wake-up on the pin change interrupt (either from polling, or sensor status). Each would need its own "address", etc. This will likely cost a bit more than $10-15 dollars each (plus time and effort to build), though.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00502.warc.gz
|
CC-MAIN-2022-40
| 1,428
| 4
|
http://www.devslife.com/finding-and-promoting-abstractions-in-your-code/
|
code
|
Throughout my posts and in many many other articles, books, booklets and almost all (good) IT materials, you keep hearing the same over and over again, repeated almost like a mantra – “Find the abstraction and use it” – it’s good and all, but how you should go about it is almost always lacking in the explanations.
Now don’t take this as if I’m trying to dis my fellow authors – I most certainly am not – it’s just that – from my own personal experience from when I was a fledgling programmer tackling the great sea of code- people have a very hard time wrapping their heads around something so “abstract” as abstractions. I know I know, I used the adjective to describe the noun, something akin to recursion but not quite. Just leave it at that.
So what are abstractions?
Def: “abstraction is a technique for arranging complexity of computer systems. It works by establishing a level of complexity on which a person interacts with the system, suppressing the more complex details below the current level. The programmer works with an idealized interface (usually well defined) and can add additional levels of functionality that would otherwise be too complex to handle.” – wikipedia
In layman terms, an abstraction – in computer programming sense – represents the essence of the object, or more simply put: “That which it cannot do without”. It it the core of the functionality, or even more simply put: “it is that which defines the system with the least words possible”.
If you are a first time reader, then you may not be accustomed to my enforced practice of stating that programming is the craft of modeling real world events and interactions and as such, most of the principles and ideas that govern programming are based on real world paradigms, principles and examples that were taken and reapplied in code.
That being said. What are abstractions?
To better help you understand I will illustrate to you the greatest abstraction I know off, and for that we shall make a small exercise in writing.
Class Humanity Def human_being person end def person unless assign_male assign_female end private def assign_male #... end def assign_female #... end end
Now the code I have wrote is childish, but the point it’s leading to is not. So from the example I have given, you could extract the fact that the human_being is the abstraction (since it was conveniently placed in the top level and public interface) and the assign_male and assign_female methods are the complexities of the code that are built up on the abstraction.
But if you stop, just for a short moment, and think about it, really take a second and chew down, to the bone, there is an even higher level abstraction.
And if you can understand that high level abstraction, then you can really begin to contour the logic behind any and all abstractions and how they exist in the first place. If I’m still sounding mysterious then think of this.
To exist, what does a human being need in the first place? How did the human_being come to be instantiated?
“Third Planet from the sun”. It’s planet Earth.
You see, Mother Earth, in all it’s bountiful generosity and love, manages all dependencies. In it’s absence there could be no humanity. You see, Earth, as the abstraction, defines all rules, laws and objects upon which we as human beings depend upon. Small, but very important things such as air and oxygen, water and fire, plants and inanimate objects. It is the sole high level abstraction and we are the complexities built upon it. We convey specificity and application to a very vast and base set of rules.
If I lost you just now – and you might be justified in thinking that “hey, this is not coding” – you’d be right. But I am not explaining a coding concept. I am conveying to you an idea. I want you to understand the base idea upon which the “abstraction in programming” is based. If I can succeed in teaching you how to visualize the concept of abstraction, then you will never ever be bogged down navigating through your – or anyone else’s – code.
In ruby, the highest (or more commonly put “top level abstraction”) is BasicObject. You can think of it as Mother Earth. Every other object – whether predefined or defined by you – inherits from this top level abstraction.
You can think of it (and of all abstractions in general) as the environment. The one place in which all other object live in.
So the next time you are defining a class, think onto yourself. What is it that this class cannot do without, what does it all boil down to, and doing so you’ll have won half the battle in extracting abstraction. The other half is all about setting up your code on the right kind of abstractions. But more about that in another post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816070.70/warc/CC-MAIN-20240412194614-20240412224614-00256.warc.gz
|
CC-MAIN-2024-18
| 4,794
| 19
|
https://geckoforums.net/search/147694/
|
code
|
Ok thanks. I got the gecko and it’s albino so it has a hard time seeing with the light on Bc that’s an albino thing (according to the women who sold it to me). She said because it’s small feed 10 small crickets a day and he seems to eat them all up by morning. But thanks for the advice!
So I am getting a Leopard Gecko and it’s a juvenile and was wondering how often and how much should I feed in each feeding and should I use small or large crickets? (If you have to feed more than once a day then please say how much in each one of those feedings)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894759.37/warc/CC-MAIN-20201027195832-20201027225832-00480.warc.gz
|
CC-MAIN-2020-45
| 558
| 2
|
https://bj.xhd.cn/ielts/ysxz/776437.html
|
code
|
摘要: New technologies have changed the way children spend their free time. Do you think the advantages outweigh the disadvantages?
New technologies have changed the way children spend their free time. Do you think the advantages outweigh the disadvantages?
What is worse is that it is huge unlikely that the children have abundant time and energy on communicating with other people. They will become isolated from not only their parents, but also their pupils.
※ 句型上建议将what is worse断开,充当衔接而非主语从句;
※ 我们一般会使用如下搭配:have time for something或have time to do something,而非have time on doing something;be highly unlikely,而非be huge unlikely;
※ 形近词也要区分:peer VS. pupil,the pupils of somebody/a school指某人的弟子/学校的学生
What is worse, spending too much time in the virtual world, children are less likely to communicate face to face with parents or peers, and the lack of non-virtual experiences is often the root of their isolation.
※ 独立的衔接what is worse,与上文形成递进;
※ 现在分词短语spending too much … 是为了点一下题new technology以及their free time,注意短语前置的时候,逻辑主语与主干主语(children)保持一致;
※ 后一个分句中使用了两个抽象名词:non-virtual experiences以及isolation,用法不同。non-virtual experiences概述前文children communicate face to face with parents or peers,起到承接作用;isolation浓缩了原文they will become isolated from somebody,使句子呈现更简洁;
※ root refers to the cause of a problem or of an unpleasant situation
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988927.95/warc/CC-MAIN-20210508211857-20210509001857-00568.warc.gz
|
CC-MAIN-2021-21
| 1,666
| 11
|
https://www.fsf.org/blogs/licensing/fsd-meeting-recap-2023-07-28
|
code
|
FSD meeting recap 2023-07-28
Every week, free software activists from around the world come together in #fsf on Libera.Chat to help improve the FSD, which is a catalog of useful free software that runs under free GNU-like systems (not limited to the GNU operating system and its GNU/Linux variants) and a project of the Free Software Foundation (FSF). This recaps the work we accomplished at the Friday, July 28, 2023 meeting, where we saw a several new programs added and couple entries updated.
New programs approved with licensing check:
- Ninja-build is a small build system with a focus on speed.
- Libsurvive is a lighthouse tracking system without SteamVR.
- Azimuth is a top-down shooter adventure game where you play as a ship.
- Meson is a free software build system.
- GSConnect is a complete implementation of KDE Connect.
Programs with version bumps or minor edits:
Join us each week to help improve the FSD every Friday in #fsf on Libera.Chat from 12:00 to 15:00 EDT (16:00 to 19:00 UTC). Find out more about upcoming FSD IRC Meetings by subscribing to our events RSS feed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508959.20/warc/CC-MAIN-20230925083430-20230925113430-00546.warc.gz
|
CC-MAIN-2023-40
| 1,087
| 10
|
https://social.technet.microsoft.com/Forums/windows/en-US/4ca7afd3-aee0-4dc2-a3ea-c54569bc6136/disabling-uac-and-desktop-foldersfiles-missing?forum=w7itprosecurity
|
code
|
Had the weirdest thing happen today and just wondered if anyone has had the same experience, I had to disable UAC on one of our users laptops because of some issues with updating some software he has, I disabled UAC like I have done a hundred times before
and after a reboot the user logged in to find ALL their desktop folders/files vanished, they had completely vanished, they were not even in the Recycle Bin. I cannot possibly see how disabling UAC could cause this to happen in anyway. The laptop is on
our domain, has Windows 7 32-bit Pro installed and user has power-user access. My initial thoughts were that a new profile was created for him or he had been assigned a temporary one but this wasent the case.
I managed to recover the folders/files but I'm determined to get to the bottom of why it would even do this. Anyone had something similar happen? I cannot see a connection between me disabling UAC and this happening.
Edited byrdovey1981Monday, February 18, 2013 4:49 PM
Microsoft is conducting an online survey to understand your opinion of the Technet Web site. If you choose to participate, the online survey will be presented to you when you leave the Technet Web site.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174124.9/warc/CC-MAIN-20170219104614-00086-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,189
| 6
|
https://docs.microsoft.com/en-US/dotnet/api/microsoft.office.interop.excel.legendentries?view=excel-pia
|
code
|
A collection of all the LegendEntry objects in the specified chart legend.
public interface class LegendEntries : System::Collections::IEnumerable
[System.Runtime.InteropServices.Guid("000208BB-0000-0000-C000-000000000046")] [System.Runtime.InteropServices.InterfaceType(2)] public interface LegendEntries : System.Collections.IEnumerable
Public Interface LegendEntries Implements IEnumerable
Each legend entry has two parts: the text of the entry, which is the name of the series or trendline associated with the legend entry; and the entry marker, which visually links the legend entry with its associated series or trendline in the chart. The formatting properties for the entry marker and its associated series or trendline are contained in the LegendKey object.
Use the LegendEntries(Object) method to return the LegendEntries collection.
index is the legend entry index number, to return a single LegendEntry object. You cannot return legend entries by name.
The index number represents the position of the legend entry in the legend. LegendEntries(1) is at the top of the legend; LegendEntries(LegendEntries.Count) is at the bottom.
|Application Application Application||
Returns an Application object that represents the Microsoft Excel application.
|Count Count Count||
Returns the number of objects in the collection.
|Creator Creator Creator||
Returns a 32-bit integer that indicates the application in which this object was created.
|Parent Parent Parent||
Returns the parent object for the specified object.
|_Default(Object) _Default(Object) _Default(Object)||
Reserved for internal use.
|GetEnumerator() GetEnumerator() GetEnumerator()|
|Item(Object) Item(Object) Item(Object)||
Returns a single object from a collection.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628001138.93/warc/CC-MAIN-20190627115818-20190627141818-00414.warc.gz
|
CC-MAIN-2019-26
| 1,736
| 21
|
https://gardeningliving.com/index.php/2021/04/01/top-10-cool-garden-gadgets-on-amazon/
|
code
|
Please check below links for more information. There will be many more exciting new inventions so stay tuned to this Channel!
Share This Video: https://youtu.be/Tvh6ogXvEtw
0:07 Eve Aqua Smart Water Controller https://amzn.to/2D7AlA2
1:00 Gardena Robotic Lawnmowerhttps://amzn.to/2Ip7vhJ
1:59 Fire Sense Hotspot Square Fire Pit https://amzn.to/2KpwtAn
2:48 WORX WG430 13 Amp Foldable Bladeless Electric Leaf Mulcher https://amzn.to/2YZ0ZEx
5:11 WORX WG629 Cordless Hydroshot https://amzn.to/2Z1p1OW
5:41 Worx WG320 JawSaw https://amzn.to/2U8BhcT
7:29 Logosol Smart Log Splitter https://amzn.to/2Io9CCx
9:45 Aquor House Hydrant V2 Outdoor Faucet System https://amzn.to/2IuZjMS
10:51 Edyn Wi-Fi Garden Sensor https://amzn.to/2U5XQiw
13:28 AeroGarden Harvest 360 https://amzn.to/2WZOOoU
13:59 AeroGarden Bounty Elite WI-FI https://amzn.to/2KqTItS
15:32 AeroGarden Harvest Wi-Fi https://amzn.to/2YZ2YbX
17:04 Philips Hue Outdoor Smart Lights https://amzn.to/2X1YDTw
Thank You For Supporting This Channel.
If You Would Like Your Product Featured On My Channel – Please Email: email@example.com
This video is created to showcase products, for educational/informational purposes and qualifies as Fair Use. NO COPYRIGHT INFRINGEMENT INTENDED. This CHANNEL CLAIMS NO RIGHTS OR OWNERSHIP over the contents posted.
If you are the rightful owner of the footage featured in this video and have concerns on the way it is portraited, please notify us via YouTube comments or email and we will remove it from our feed immediately.
The intention behind this channel is to showcase innovative products from owner’s sites in high quality videos. Thanks to all my subscribers and viewers for watching and thanks to YouTube for making it possible.
This video description may contain affiliate links. If you click on one of the product links, we receive a small commission. This help supports our channel and enables us to continue to making videos for you to watch. Thank you for the support! Note: Prices may change after video published date.
garden gadget,vegetable garden,garden planning,organic garden,life hacks,diy projects,useful things,diy activities,simple life hacks,diy life hacks,best garden tools,garden technology gadgets,5-minute crafts,amazon garden gadgets,top 10 gardening gadgets,garden gadgets 2019,new garden gadgets,smart garden gadgets,garden tools and equipment,garden tools and their uses,garden tools storage ideas,garden tools organizer,garden tools for weeding,garden tools for beginners,smart garden review,smart garden click and grow,best garden gadgets 2019,gardening tools and equipment,gardening tools 2019,gardening tools and their uses,garden irrigation system installation,cool gadgets on amazon,smart home gadgets,smart home ideas,smart home devices,smart home 2019,smart home tech,indoor gardening for beginners,indoor gardening ideas,indoor gardening vegetables,indoor gardening hacks,indoor gardening lighting,indoor gardening during winter,indoor gardening tips,indoor gardening herbs,home gardening life hacks,garden life hacks you should know,kitchen garden life hacks,garden decor life hacks,life hacks for home garden,life hacks for your garden,garden tips for beginners,garden tips and hacks,garden tips channel,useful things to buy on amazon,simple life hacks that will change your life
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151760.94/warc/CC-MAIN-20210725174608-20210725204608-00145.warc.gz
|
CC-MAIN-2021-31
| 3,317
| 22
|
https://chicagodivebar.com/travel/chicago-travel-vlog-a-day-in-logan-square-chicago-travel-guide/
|
code
|
In today’s Chicago travel vlog, we are exploring the Logan Square neighborhood. I am a Chicago local who loves exploring different neighborhoods in the city, creating travel guides, and supporting our local small businesses. 🙂 I hope you enjoy this video and please comment below if you have any recommendations for me, be it in Chicago or your neck of the woods!
When watching my (or anyones!) videos, double check the Quality settings to make sure you’re viewing in 1080p or higher for the best viewing experience! 🙂
PLACES FEATURED IN THIS VIDEO:
Sip of Hope
Robin Williams Mural
‘Greetings from Chicago’ Mural
Wolfbait & B-Girls
Lost Girls Vintage
Katherine Anne Confectionary
Thank you for watching. If you’d like to see more of my videos, don’t forget to subscribe!
To see more of the places mentioned in this video, follow me on Instagram: @christieinthecity. I share tags for each place on my stories and in my highlights!
Music- June Gloom by Prima
Music- Brunch by Lukrembo
Music by Clueless Kit – live now – https://thmatc.co/?l=8FAD4AAF
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499790.41/warc/CC-MAIN-20230130003215-20230130033215-00349.warc.gz
|
CC-MAIN-2023-06
| 1,070
| 14
|
https://flylib.com/books/en/3.44.1.23/1/
|
code
|
|‚ < ‚ Day Day Up ‚ > ‚|
2.6 SpamAssassin and the End User
The discussion so far in this chapter has focused on getting SpamAssassin to analyze incoming mail and mark spam by modifying the message before delivery. For end users who read their email on the server or download it with a POP or IMAP client, the final step is to take action on messages. Messages processed through SpamAssassin fall into one of the categories described in the next four sections.
2.6.1 True Negatives (ham)
True negatives are messages that both you and SpamAssassin agree are non-spam, or ham , messages. SpamAssassin does not modify these messages much. It adds an X-Spam-Status header beginning with the word "No," and an X-Spam-Checker-Version header giving the version of SpamAssassin in use. These messages look just as they should to a user's mail reader.
2.6.2 True Positives (spam)
True positives are messages that both you and SpamAssassin agree are spam. These messages are tagged by SpamAssassin. At minimum, SpamAssassin adds X-Spam-Leve l, X-Spam-Status , and X-Spam-Flag headers. If rewrite_subject is on, SpamAssassin also changes the subject of the message to begin with *****SPAM*****. Example 2-10 shows these headers.
Example 2-10. Headers added to spam by SpamAssassin
Subject: *****SPAM***** Live your dream life!! MPNWSTU X-Spam-Status: Yes, hits=12.9 required=5.0 tests=CLICK_BELOW, FORGED_MUA_EUDORA,FROM_ENDS_IN_NUMS,MISSING_OUTLOOK_NAME, MSGID_OUTLOOK_INVALID,MSGID_SPAM_ZEROES,NORMAL_HTTP_TO_IP, SUBJ_HAS_SPACES,SUBJ_HAS_UNIQ_ID autolearn=no version=2.60 X-Spam-Flag: YES X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) X-Spam-Level: ************
Most people will want either to complain about spam to the spammer's ISP or to discard it. In the former case, simply being able to quickly identify spam messages on sight is usually sufficient, and the modified Subject header makes that simple. If the user is reading his mail on a system with the spamassassin script and applications for distributed spam clearinghouses, he can pipe the message to spamassassin --report to report the message to the clearinghouses.
In the latter case, that of wanting to discard spam, users can set up their personal mail filters to delete spam or save it to a "spam" mailbox that they can check now and then. Users on shell accounts with procmail might use the following recipes in their ~/.procmailrc file:
:0 * ^X-Spam-Level: \*\*\*\*\*\*\*\*\*\*\*\*\*\*\* /dev/null :0 * ^X-Spam-Flag: YES spambox
The first recipe checks to see if the message has at least 15 asterisks in the X-Spam-Level header. These messages are very likely to be true positives and are discarded by delivering them to /dev/null . The second recipe catches all other messages that SpamAssassin considers spam (e.g., with scores between 5.0 and 14.99) and saves them to a separate mailbox file called spambox .
Users of POP mail clients can use their client's filtering capabilities. Nearly all modern POP mail clients provide the ability to filter messages based on strings contained in the Subject header, so spam can be redirected by checking the Subject for *****SPAM*****. Some POP clients provide greater control over filtering and allow checking arbitrary headers; these clients can do the equivalent of the preceding procmail recipes.
2.6.3 False Positives
False positives are the bane of all spam-checkers. A false positive occurs when SpamAssassin incorrectly marks a message as spam that you actually wanted to receive. Because of the potential for false positives, it's a good idea to encourage users to think of SpamAssassin's tags as advisory and to avoid discarding messages unseen on the basis of a spam classification by SpamAssassin. Instead, as illustrated in the earlier section on true positives, spam can be filtered to a special spam mailbox that the user can check periodically to ensure that it does not contain any false positives.
If you're reading email on a system that has the spamassassin script and you find a false positive, you can pipe the message through spamassassin --remove-markup to remove the SpamAssassin report and restore the message to its untagged state.
Identifying false positives and reporting them to SpamAssassin is key to improving SpamAssassin's Bayesian classifier. The Bayesian classifier is discussed in detail in Chapter 4.
2.6.4 False Negatives
A false negative is a missed spam. It occurs when SpamAssassin fails to tag a message as spam that you actually consider spam. The more false negatives you get, the less effective the spam-checking is in saving you time. You can reduce false negatives by lowering SpamAssassin's threshold score, but you will increase false positives at the same time. Keeping track of false negatives can help you find patterns that may let you tweak SpamAssassin's rules to match your environment more closely.
As with true positives, if the user is reading her mail on a system with the spamassassin script and applications for distributed spam clearinghouses, she can pipe the message to spamassassin --report to report the message to the clearinghouses."
Identifying false negatives and reporting them to SpamAssassin is key to improving SpamAssassin's Bayesian classifier. The Bayesian classifier is discussed in detail in Chapter 4.
|‚ < ‚ Day Day Up ‚ > ‚|
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526337.45/warc/CC-MAIN-20190719182214-20190719204214-00467.warc.gz
|
CC-MAIN-2019-30
| 5,345
| 23
|
https://miroconsulting.com/blog/quick-byte-oracle-licensing-tip-3/
|
code
|
Though Named User Oracle licensing isn’t available to new contracts anymore, companies still maintain and renew their Named User Oracle license agreements.
Named User Plus Licensing….means you pay per named user, NOT concurrent user. Named User licensing limited the number of authorized Oracle individuals on a specified computer.
Oracle licensing models for Named User Plus require you to adhere to the following Oracle user minimums:
· All other Oracle Application Server products: 10 Named User Plus licenses per CPU
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00195.warc.gz
|
CC-MAIN-2024-10
| 525
| 4
|
https://independentjobs.independent.co.uk/job/30447275/devops-technical-architect-hybrid-working-inside-ir35/
|
code
|
DevOps Technical Architect - HYBRID WORKING - INSIDE IR35
One of our biggest customers is looking an experienced DevOps Technical Architect
to join them immediately on an initial 6 month basis.
Our client wants to establish and roll out a common DevOps tool kit and requires a Technical Architect
to become part of the project team and guide them to a successful delivery.
Skills and experience you need:
- Previous experience of implementing (or extensive use of) DevOps tooling and methodology within a large Financial company
- Clear understanding of how to roll out a CI/CD pipeline that would service several Development teams working on different languages and platforms.
- Working experience and a clear understanding of the various DevOps tools on the market, such as GitHub, Docker, Kubernetes, Jenkins, Bamboo, Octopus, Puppet, etc vs Azure DevOps to help decide on the toolkit to be deployed, the roll out strategy, and then deliver it!
- Understanding of the job roles required in a DevOps environment
- Demonstrable experience of the security aspects required across such systems
- Be able to work and bond with a project team and show proactivity; helping to drive the project forward and keep it on track considering the ambitious timeline
Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted.
Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation
We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website http://proactive.it/privacy-notice/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663006341.98/warc/CC-MAIN-20220527205437-20220527235437-00246.warc.gz
|
CC-MAIN-2022-21
| 1,813
| 15
|
http://edaproject.space/Works/Sonnets%20Work.html
|
code
|
Shakespeare's Quantum Sonnets
Shakespeare's Quantum Sonnets is somewhat different. The lines of Shakespeare's sonnets have been used to build new versions of the sonnets. All of the sonnets have been broken down by line number. The lines of various sonnets are randomly re-ordered on the fly. The sonnet is constructed by taking a line one from a random sonnet followed by a line two from a different sonnet followed by a line three from a third sonnet etc., until the 14 lines are complete. Clicking the "Rewrite" box gives a new sonnet by this process.
Less is enough.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540496492.8/warc/CC-MAIN-20191207055244-20191207083244-00497.warc.gz
|
CC-MAIN-2019-51
| 570
| 3
|
https://www.instructables.com/community/?search=sites
|
code
|
So maybe I've got the right spot for this comment this time (Thanks, Kiteman, for the wake up), but here goes..the last time the site had an update wasn't too bad. Things were relatively easy to see and find, and the previous style had been a little cumbersome--now it's a big mishmash and confusing as hell. What is it with geeks who can't leave what works well enough alone, but have to try and fix it? (I'm looking at you here, too, Firefox.) Pay attention here folks! The project of the day humongous header at the top of the page--it's frickin' annoying!! It was good to be able to see all the projects in a row, very neat and organized, and then go to the one I'm interested in. Surely I'm not the only one? I can't get here everyday and now the different projects are extremely hard to catch up on. I'm not trying to be mean, nor am I against constructive change or fixing problems, but changing something just to be different doesn't always work. People come here to see the projects, etc., To connect on ways to do things or build things, not to see a website where someone wants to show off their building skills. Please take a poll of your readers or something and see what everyone else thinks. If I'm a minority opinion I'll just learn to lump it, but I still won't have to like it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357935.29/warc/CC-MAIN-20210226175238-20210226205238-00300.warc.gz
|
CC-MAIN-2021-10
| 1,295
| 1
|
https://list.orgmode.org/22E47E07-CA61-4BA9-8992-3339A9084A37@gmail.com/
|
code
|
From: Carsten Dominik <firstname.lastname@example.org>
To: Samuel Wales <email@example.com>
Subject: Re: pop-up-windows
Date: Wed, 6 May 2009 14:14:49 +0200 [thread overview]
Message-ID: <firstname.lastname@example.org> (raw)
On Apr 25, 2009, at 5:44 AM, Samuel Wales wrote:
> When I click on a link, org-open-at-point splits the window.
> What I would like is for it to open the link in the current
> window. The same occurs with org-remember; it splits the
> window, but I would like to have the whole window.
> Both Emacs and Xemacs have a standard variable,
> pop-up-windows, that allows the user to control this
> behavior. Users who set it to nil can expect all but the
> most unusual buffers to open in the current window. Most
> parts of emacs respect it.
I do not use display-buffer in Org, because the results are
so unpredictable for different users precisely because there
is a plethora of options and hooks that do modify the behavior.
This makes it difficult to create a consistent interface, at
least in my opinion.
As mentioned in this thread, use org-link-frame-setup to
customize this for links.
For remember you can use
(add-hook 'remember-mode-hook 'delete-other-windows)
> IMO it would be useful for org to do the same. It is easy to do,
> because you can call pop-to-buffer instead of
> Try these:
> (let ((pop-up-windows t)) (pop-to-buffer (get-buffer "*Messages*")))
> (let ((pop-up-windows)) (pop-to-buffer (get-buffer "*Messages*")))
> People who use small screens and people who use large fonts
> use nil because splitting the window makes small windows.
> In org, todo state selection and tag selection should
> probably ignore the variable, provided that the window
> height contains the buffer. The context is useful, so it's
> OK to split the window.
Exactly, this is what drove me crazy and toward
abandoning pop-to-buffer and display-buffer entirely.
> Export dispatch and agenda dispatch should probably respect
> the variable because context usually does not add to the
> decision being made (among other reasons). They do not
> currently respect it.
I don't think this is an issue. These commands make the
buffer as large as needed to display their entire content.
If necessary they will remove the other window. So with a
large font, they can use the whole frame.
In general, I do like the other window to remain visible
if enough space is there, to remind the user of the calling
> org-complete is currently problematic because it
> inadvertently respects the variable. It changes to the
> completions buffer, and then the completion keys do not
I don't understand. What is the problem?
> This should probably either ignore the variable or accept the
> completion keys. However, I do not use it, so I have not
> tried it much.
next prev parent reply other threads:[~2009-05-06 12:15 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-04-25 3:44 pop-up-windows Samuel Wales
2009-05-06 12:14 ` Carsten Dominik [this message]
2009-05-28 22:49 ` pop-up-windows Samuel Wales
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
List information: https://www.orgmode.org/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710980.82/warc/CC-MAIN-20221204204504-20221204234504-00622.warc.gz
|
CC-MAIN-2022-49
| 3,882
| 76
|
https://mail.coreboot.org/hyperkitty/list/coreboot@coreboot.org/message/QYVZ37NQ76APXDK2R2MXPC7UCBZTNHUZ/attachment/2/attachment.htm
|
code
|
I have here some dummy questions (forgive me for my ignorance), but I need to ask them just for the sake of curiosity (maybe, after all, we can get somewhere if I articulate questions in the right direction/right format for this problem):
> If I put a proprietary AMI BIOS, GRUB2 works without issue in gfxterm mode and boots Linux without issue.
What Linux architecture are you using (32 or 64)?
Which Linux distro?
Which kernel version?
If you put AMI BIOS, the following questions I would like to know:
Are you using 32 or 64 BIOS?
Which mode are you using for booting (legacy/CSM ON or UEFI/CSM OFF)?
In the accordance with , what video component you have set with CMOS: vBIOS or GOP driver?
Not sure, but it seems to me that you are using too old/outdated GRUB2 version (or maybe I am also mistaken)?
Could you tell us, which GRUB2 version you are using?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652959.43/warc/CC-MAIN-20230606150510-20230606180510-00075.warc.gz
|
CC-MAIN-2023-23
| 866
| 11
|
http://cloudbacon.com/
|
code
|
26 Aug 2015
Slack and bots go together like peanut butter and chinese food.
They are quite, literally over running the joint.
So with an already loud and notification filled app like Slack,
what’s one more? Hubot is a somewhat older,
coffee script powered happiness engine from the folks at GitHub.
Getting one of these guys up and running isn’t really the topic here but,
this guide is super easy to follow.
Now that there is a bot up and running,
we can’t just check out of the server and have it continue to run.
That’s where Monit comes in.
Monit is a dead-simple, text based uptime monitoring system.
It can search out, at an interval and
make sure a specific program is still running.
If the PID, or whatever is missing,
Monit will use the designated start process to start things back up.
Ok, so how can we stitch Monit and Hubot together?
Matt Garrison, a couple years ago put together a gist for just this occasion.
A couple of things to make this thing work:
- Make sure on the restart and start services to use a user and group that is available to your server.
- Name the bot properly
- Make sure to use the correct path to the bot
- And finally/lastly, call the hubot bin from node_modules, it’s cleaner.
Happy annoying your fellow Slack mates with kittens and Archer quotes. Also, if for some reason Matt removes the above link, here is my forked gist
03 May 2015
Webpack seems to be getting plenty of lip service these days.
Doubly so in the React community which means most of Facebook.
Since Rails leans so heavily on the asset pipeline,
how can we merge ES6, modules, and other bits of Webpack greatness
with the age old,
do one thing well: Sprockets
The following two scripts (one used for Development, the other Production),
show that Webpack can easily integrate with Rail’s existing asset pipeline.
While giving way to utilizing many of the best features hidden in Webpack.
A few caveats about running these scripts:
- The directory structure assumes a
top level in your Rails app.
- The common/development script assumes that assets will be served from a server.
This means you will need a few
- The two urls for this server are: http://localhost:8080/webpack-dev-server.js
- To run the Dev script:
$(npm bin)/webpack-dev-server --config webpack.config.js --hot --progress --inline --display-chunks
- And the Prod script:
$(npm bin)/webpack --config webpack.production.js
- Currently there is only one ‘entry point’ defined as ‘app’.
This will need to be modified depending on the entry point or bootstrap script.
05 Apr 2015
As an avid keyboardist, keyboarder… whatever. I jumped on the very first Inifinity Keyboard offered by Massdrop back in November of 2014. Having built it, played with it and attempted to program it with a missing web interface; there is definitely more than a few words on my mind. However, this post is more of an introduction to the knowledge gained throughout my time with it, instead of a true review/product breakdown. GitHub houses a random collection of markdown files. One specifically highlights ways to build/config/customize the Infinity’s layouts.
Hopefully this helps folks out who are struggling with the seeming lack of information surrounding this obscure but, somewhat interesting way to define keyboard layouts. If for any reason you happen to want to add or correct anything, feel free to open a GitHub issue.
One last thing: There seems to be a lot of talk surrounding the bounce/debounce rate of these boards. Some of them seem to exibit double key presses from one single keypress. While this is a configurable option in the KLL files, it should not be a need if the board was properly soldered. A very easy fix is to flux/solder the connections up with quality 60/40 rosin core solder.
I have finally compiled all of the build scripts into one KLL based directory that could be wrapped in Git. The Git repo is, as always on GitHub and everyone should fork it if they are looking for a quick way to bootstrap their Infinity based Keyboard.
In other news, the awesome folks at Massdrop have released an ErgoDox keyboard variant that will be powered by the same configurator/keyboard mapping language. The great thing about these keyboards using the same controller is only needing to have one workman-p mapping that can be flashed to different keyboards. Which means, although I own and adore my now gen1 ErgoDox, I will definetly be picking up the new version. Likely with stiffer, Cherry MX Tactile Greys.
20 Mar 2015
Nope, not actually problem solving because that is in fact boring, something that no one is really interested in and somewhat of a non starter. Doubley so when things haven’t been updated much around here. Go or GoLang is a fantastic language at hunting down problems, or what some would call “debugging”. I would call it debugging as well however, I am sure there are a myriad of words that all mean the same thing.
Whenever a Go program comes under the green light, the developer uses the handy
run command. This kicks off the compile step inheret in Go programming; and, since this is in fact programming, there will be errors. These errors are accompanied by a somewhat small stacktrace (thank you Rob) along with the line number where the offense is occurring. The greatest thing is that these exceptions are small, readable (by humans) and consise. A programmer with little information on the language mechanics can read: “no method x exists for x” and realize they likely lower cased the first character of the method’s name. Or perhaps they should just look back through through the documentation one more time to see where they took the incorrect turn.
ALSO! Captial methods… Good one.
Overall, a Luddite as myself can figure out what is going on in a language that I am actively learning and feel satisfied. No stacktraces where you have to increase the lines recorded in Tmux. Just a few lines… For humans.
24 Jan 2015
JS For A Week
For the better part of 5 years I have been writing,
hacking and generally focused on the Ruby programming language.
This hasn’t stopped me from exploring other languages; however,
besides a small and rather painful stint writing PHP (again),
many days were spent crafting Ruby code.
In addition to this,
the last 2 years has been spent ping-ponging between different code bases.
Not so much over the course of the past week.
and all for a single product.
What was learned
The best thing to do after a dicotomy of a situation like this
is to perform a bit of introspection
Why it was hard
## Why it differs so greatly from Ruby
## What was the takeway
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736679281.15/warc/CC-MAIN-20151001215759-00143-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 6,626
| 75
|
http://sar-roo.ru/updating-database-from-datagrid-1963.html
|
code
|
Ottawa sex webcam - Updating database from datagrid
NET (Data Tables, Data Sets, Data Grids, Data Adapters, Data Binding, ...
Introduction A Data Grid View control can be used to display data from a database.
A table can be displayed from a database in a Data Grid View, using the Data Adapter class and data logic.
Fill(table); Binding Source b Source = new Binding Source(); b Source. They have to do with redrawing the control which is why new rows don't appear.
Select Command = new My Sql Command(sql Select All, con); Data Table table = new Data Table(); My DA. Close(); are methods that are inherited from Control.
How do I add,edit,delete update my database in datagridview using codes?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347401004.26/warc/CC-MAIN-20200528232803-20200529022803-00105.warc.gz
|
CC-MAIN-2020-24
| 694
| 7
|
https://www.workbridgeassociates.com/jobs/232457
|
code
|
Software Quality Assurance Engineer
Founded in 2001 in the wake of the September 11th tragedies to provide multifaceted crisis-communications solutions. The firm has since developed innovative, web-based and mobile technology that has transformed how businesses, government agencies, non-profits and universities communicate in both emergency and non-emergency situations.
They are now looking for a Software Engineer in Test (SDET) who will be responsible for developing and executing comprehensive suites of automation test plans and test cases, maintaining and adding to existing automation framework, continued evaluation of test cases for inclusion in regression, automation for newly integrated features, and development of toolsets to augment QA and Development testing. The SDET will also work closely with Software Developers and other QA engineers in small scrum teams to deliver the highest quality products in a timely and cost-effective manner.
Specific duties and responsibilities include creating, maintaining and executing test plans and test cases against our hardware and software platforms, estimating test efforts, analyzing and communicating test results, defect tracking and participating in day to day QA Activities.
- Create, maintain, and execute test plans and test cases against our hardware and software platforms
- Strong Understanding of Automation frameworks and experience working in a Microsoft Stack
- Knowledge of Ranorex
- Enhance and extend the automation library and framework
This a great place to work for someone who wants professional growth. The environment is fast paced and has a startup feel without the startup risk, they are backed by the corporate stability of one of the world’s largest e-commerce websites. They provide stock options, 401k, health and other benefit plans as well as onsite parking.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945855.61/warc/CC-MAIN-20180423070455-20180423090455-00440.warc.gz
|
CC-MAIN-2018-17
| 1,851
| 9
|
https://dzone.com/articles/so-youre-saying-we-shouldnt-learn-to-code
|
code
|
So Are You Saying We SHOULDN'T Learn to Code???
Is learning to code the new literacy, or overrated? Dave Fecak explores the true value of coding ability.
Join the DZone community and get the full member experience.Join For Free
I've been noticing a trend of articles that (upon first glance) seem to be discouraging the general public from learning to code. A recent piece "Please Don't Learn to Code Please Don't Learn to Code Unless...Unless..." posted on Simple Programmer is only one of many. Once you get past the title, the article makes some points I agree with and others that should be addressed.
The article starts with the acknowledgment of the "Learn To Code" movement that often uses celebrities and politicians to encourage the public. The author then states that "coding is not the new literacy." Why not, exactly? We now live in a world where code exists everywhere, even though it's invisible to most. Coding ability isn't wholly necessary to communicate, but if we try to look forward and envision the world in a few years, it's not hard to imagine students in developed countries using code to solve problems on a regular basis.
Over the past twenty or so years, the ability to use a computer has in essence become the new literacy. Those without basic computing knowledge today (like the illiterate) are largely unemployable in many industries, but that clearly wasn't the case in the 1980s. In 1991 I had multiple weeks to complete a project for a university science class to send a single email to my professor. Things change. What was considered a challenge years ago is now a necessary skill for employment, and looking ahead some basic ability to code might fall into that category.
Why is it such a stretch to imagine that in the 2020s or 2030s our employers in many industries will expect new hires to read and write at least some basic code?
"Selling coding as a ticket to economic salvation for the masses is simply dishonest."
Is that really what is happening here? Do those "Learn To Code" commercials show men and women coders on gold-plated Macbooks aboard luxury yachts, lying atop piles of cash and surrounded by models while having champagne poured down their throats? Tech is hardly the only industry glamorized by the entertainment industry, but let's not conflate Hollywood portrayals and the "Learn To Code" movement when it comes to "selling coding." If we're genuinely worried about the public's fascination with Elon Musk and Mark Zuckerberg, let's get data on the number of high schoolers who can pick Elon out of a lineup in comparison with those who can name more than one Kardashian.
I'm not sure what the author had in mind regarding "the masses," but it's naive to think that every human being that has the ability to code is a coder. And that's how these articles (and sometimes more importantly, their titles) may be interpreted. Coding is soooo hard, and if you had the required talent to code you'd already be doing it. Is that a message we want to send, even unintentionally?
Back to the article...
The author mentions bootcamps and that "everyone wants to own a startup and/or become an engineer." Good, because many people think we need more engineers. Or perhaps more accurately, we need better engineers.
Those who go negative on the "Learn To Code" movement seem concerned about attracting the "wrong" people, or those who may not have the tools to be successful. Can we accept that the "Learn To Code" movement is primarily trying to recruit those among the brightest of their generation who perhaps never considered a career in coding and were instead looking at things like medicine, chemistry, or other non-CS engineering disciplines?
Compared to those other fields, software is relatively new. We need a "Learn To Code" campaign because kids aren't as likely to hear that message from their grandparents or even their parents. "Be a doctor" and "Go to law school" may eventually give way to "Be a software engineer," but we're not there yet.
Next, he mentions bootcamps. Anyone that has been in the industry for 20 years may remember the number of computer training programs that arose in the late 90s where Cobol or some Microsoft networking certification were your ticket to financial freedom. There were good and bad schools then, just as there are good and bad bootcamps. We will always have opportunists in education when we have supply and demand labor inefficiencies, and as the cost of traditional education rises this isn't likely to change.
As for what is required to learn coding at a high level, the author writes:
Don’t get me wrong; I do believe that engineering and programming are important skills. But only in the right context, and only for the type of person willing to put in the necessary blood, sweat, and tears to succeed.
All this blood, sweat, and tears is probably because people start learning how to code much later in life. I learned to type at 18, where students today are using keyboards at a much younger age. What if kids also learned some coding basics earlier on?
If your first exposure to programming concepts comes in a coding bootcamp after spending four years and 100K for a degree in economics, there will be some blood and sweat (but mostly tears). Students who had some computer science classes in high school and college aren't likely to face the same challenges.
Then perhaps the most troubling statement, for me anyway...
I would no more urge everyone to learn programming than I would urge everyone to learn plumbing.
I think this is where the author truly misses the mark. We can learn some basic plumbing because knowing how to fix a leaky pipe or unclog a toilet will save you some money and a headache some day. Likewise, we can learn some basic coding because writing a script to automate a task at our job might also come in handy. Everyone who learns to fix a pipe doesn't need to be a plumber, just like everyone who learns some coding doesn't need to be Mark Zuckerberg.
The article takes a bit of a tangent and then addresses the line between learning to code and getting being paid to program. He reveals he is self-taught and doesn't have a CS degree, but his persistence allowed him to make it in the industry.
Being self-taught and having no CS degree is probably the most difficult path to success in the industry, and the fact that the author succeeded in the industry is a testament to hard work. Imagine if we taught him some coding at a younger age?
But if you want to talk about how difficult it is to land gainful employment in an industry, is software really the best example? Even during a down economy, employment levels in the tech sector are well above other industries. Recruiters fall over themselves to talk to programmers, and it's not uncommon for even junior level talent to get 10-20 "offers" of new employment in a week.
Complaints about finding work in the software industry fall on deaf ears when your audience consists of people who aren't so inundated with offers of work that they find the need to put "Please don't contact me about jobs" on their LinkedIn profiles.
If we're going to discourage our youth from pursuing a career in programming because it's hard to get a paying job, let's start the conversation by telling them how much more difficult it will be to find a job in the dozens of other fields where unemployment is much higher. Although the manner in which programmers are evaluated for employment certainly needs to be revisited, let's not kid ourselves about the reality - if you are looking for a job, being an unemployed programmer is preferable to being an unemployed [almost anything else].
Let's change the message (or at least the branding of the message) from "Please Don't Learn to Code Unless..." to "Like countless other professions coding can be a lucrative career, but it can be difficult for some to enter and be successful. Even if you aren't seriously considering a career in technology, learning some basic coding might be a valuable investment of your time." Engineering isn't the only hard thing, and we should stop talking as if it were.
Opinions expressed by DZone contributors are their own.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662560022.71/warc/CC-MAIN-20220523163515-20220523193515-00001.warc.gz
|
CC-MAIN-2022-21
| 8,179
| 29
|
https://wiki.subscribe-hr.com.au/index.php?title=Subscribe-HR_Wiki_Help:General_disclaimer&oldid=7485
|
code
|
Subscribe-HR Wiki Help:General disclaimer
Subscribe-HR takes no responsibility for the accuracy of the information on the Subscribe-HR Wiki. The Wiki is meant to provide training information to Subscribe-HR customers, based on how to use the Subscribe-HR Solutions. Some information in this Wiki may be out of date. Some of the information may be released in advance of the actual product being put into Production.
ABN: 86 132 590 277 E: email@example.com . Please use e-mail subject heading - Subscribe-HR: Wiki Question .
Information in this Wiki is protected by Copyright. Any attempt to reverse engineer of copy Subscribe-HR Functionality will be managed appropriately. Legal action and injunctive relief made be sought.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817688.24/warc/CC-MAIN-20240420214757-20240421004757-00436.warc.gz
|
CC-MAIN-2024-18
| 725
| 4
|
https://www.jotform.com/answers/1105843-How-to-make-form-lightbox-to-be-responsive-avoid-lightbox-scrollbars-
|
code
|
- sto_metallikAsked on March 29, 2017 at 03:02 PM
I set width and height of the lightbox precisely to my form dimensions. When I try to fill all the fields and miss required field, the error message appears. But the lightbox gets a vertical scrollbar (( How to make lightbox to be responsive without scrollbars even considering error check out?
And one more thing. I've noticed that usage of your lightbox prevents working of other scripts at my page ((
- JotForm SupportKevin_GAnswered on March 29, 2017 at 05:28 PM
I would suggest you to inject the following CSS code to make the scrollbar disappear:
This guide will help you doing so: How-to-Inject-Custom-CSS-Codes
To avoid the conflict with the scripts you could add the noConflict function, here you will find more details about it: http://learn.jquery.com/using-jquery-core/avoid-conflicts-other-libraries/
Hope this helps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647519.62/warc/CC-MAIN-20180320170119-20180320190119-00675.warc.gz
|
CC-MAIN-2018-13
| 880
| 8
|
https://researchoutcomes.wordpress.com/2010/03/08/opportunity-for-our-traditional-repository/
|
code
|
Today I’ve spent some time in the library with colleagues from Faculties and the library getting an update on development of the University of Glasgow repository.
We recently made our link to awards live to allow staff to add one or many awards to the publications they are depositing.
This helps us with Open Access Compliance, preparing for outcome reporting (whatever shape that takes in future for RCUK , REF and others), and of course publicity.
There are some publications already in the repository with award information but these need tidied so we will tie them to the formal award record soon.
Someone asked about non-refereed papers and they would be able to be added under the RCUK schema.
I’ve drafted the the plan and hope to send it to the Programme Manager tomorrow and get it on our website asap thereafter.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647556.43/warc/CC-MAIN-20180321004405-20180321024405-00280.warc.gz
|
CC-MAIN-2018-13
| 827
| 6
|
https://cse.umn.edu/cs/news/cspotlight-machine-learning-and-neuroscience
|
code
|
CSpotlight: Machine Learning and Neuroscience
Why did you choose to pursue a degree in computer science specifically at the University of Minnesota?
The University of Minnesota has a very competitive computer science program and it's reasonably affordable and only a half hour from my hometown. It was a natural choice to pursue my career goals and further my education at the University of Minnesota. I really love the community here on campus. I think it really offers a welcoming and diverse presence.
How did you become interested in computer science? What are your specific interests within the field?
I've been interested in computers and technology since I was very young. I was begging my dad to let me install video games on his computer when I was 11. I built my own computer at 14. I took my first computer science course at 15 and I quickly left high school early through the Post Secondary Enrollment Options (PSEO) program to start my degree here when I was 16. Machine learning in particular has become a strong passion of mine and as I continue to expand my horizons. I never fail to find different innovations and projects that really capture my attention and get me excited to work on my own projects. Recently, I've gotten into computational neuroscience in my research lab. I'm fascinated by studying the mind and exploring its effects in psychology and perception.”
Tell us more about your internship experiences.
This past summer I had the pleasure of interning at Tableau in Seattle, a division of Salesforce with an office right on Lake Union in Fremont. I learned a tremendous amount working there. I got to contribute to some very cool projects. Mainly, I contributed to building spatial parameter modules on the maps team, which encapsulate geospatial information within the Tableau Maps environment. I absolutely loved it there. I felt like I fit right in. I also loved working in Seattle. It’s one of the most culturally vibrant and technologically advanced cities in the entire world. Living there is a pleasure and it sort of feels like my home away from home. I plan to move there eventually after completing my studies here.
Are you involved in any student groups? What inspired you to get involved?
I'm a member of the varsity CS:GO Team at the Esports Club. I'm also an active member of the Psychedelic Education Club here on campus. I'm fascinated with the study of the mind and especially how psychedelics can alter and enhance its function. I hope to be able to eventually contribute to research in this space so I can continue to help educate and inform my community on psychedelics. I've read a lot of the psychedelic research that has come from professors here, at the University of Minnesota, as well as in the public literature. I think there's a lot of potential for clinical applications as well as public applications just to be able to personally develop your identity and yourself. Psychedelics are something we have stigmatized as a community, and I think that's a shame. I think that education is the cure for that so that's why I've gotten involved.
What do you hope to contribute to the computer science community at the University?
The main thing that I can contribute to the computer science community is to broaden its horizons. I think that there exists a computer science bubble inside of both the University of Minnesota community, but also inside of technological circles in general. It's very easy to get trapped in this bubble. Computer scientists often only work on computational problems, and stay within tech as a field. But we ignore the fact that most, if not a vast majority, of the applications for this technology exist outside of that bubble. That's something that I didn't realize until I was a master’s student branching out into a graduate minor. The best advice I can give for people in the computer science program and in general is to branch out a little bit. Try and find projects that are interesting to you that have a broader impact and that have a different application than just writing code for apps.
What advice do you have for incoming computer science students?
I've had a wonderful time talking to professors outside of class environments. These are people who have spent most of their lives dutifully studying a topic or field. So just offering to buy your professor a coffee and soak in some of their knowledge, has led to some of my more interesting conversations. I've especially had great talks with Paul Schrater, who is my graduate faculty advisor. I think I'm going to continue doing this, and I would encourage other students to reach out to your professors more and try and soak in some of that great knowledge that they can't always communicate in class.
What are your plans after graduation?
I have a job lined up as a computer vision scientist here in Minnesota at a research lab called BBN Technologies. I'll be building computer vision tools for them that are used to enhance current technologies and research. One of the projects they're working on right now is building augmented reality first aid glasses to aid soldiers in performing first aid. It will guide you through first aid practice as you're applying a tourniquet or other medicinal techniques. I also have a pending application to the Ph.D. program here at the University of Minnesota, which I plan to do part time alongside my job in the industry for the next couple of years.
Are there any additional experiences you did that you would like to highlight in the article?
I’m currently working in Thomas Naselaris’ lab. It's a computational neuroscience lab. I'm working on a project called “Second Sight”, where we are decoding and reconstructing visual imagery from fMRI brain activity. I've absolutely loved working on this. It combines my interest in neuroscience with my focus on machine learning. As we apply and leverage a lot of these new technologies, like stable diffusion and a lot of other machine learning models, to get a better idea of what's going on inside the visual cortex as your mind is processing its retinal information. We have lots of promising preliminary results so far, and we hope to publish them at a major conference in the next couple of months.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00195.warc.gz
|
CC-MAIN-2023-50
| 6,256
| 17
|
https://gr.pinterest.com/desireeburns0104/revolution-eyeshadow/
|
code
|
Stop Pouring Leftover Pickle Juice Down The Drain. Here Are 15 Unexpected Uses For It At Home
#food #hacks #pickle #juice Where do you usually put your pickle juice? Do you also pour it down the drain? Most of us (including me) are guilty of this, we look at pickle juice as a useless liquid once the pickles dipped onto it are already gone.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363420.81/warc/CC-MAIN-20211207232140-20211208022140-00374.warc.gz
|
CC-MAIN-2021-49
| 341
| 2
|
https://www.epicheroes.com/2020/08/10/the-future-of-farming/
|
code
|
Technology is revolutionizing farming. That’s great news—by the year 2050 Earth’s population will be 10 billion, so we need to almost double the amount of food we now produce.
Subscribe to TDC: https://www.youtube.com/TheDailyConversation/
Main information sources:
Video by Bryce Plank and Robin West
Co-written by Kiriana Cowansage
“Abstract Electronic [TDC Remix]” via Motion Array
“Timelapse” via Motion Array
“Night Music” by Kevin MacLeod
“Technology Explainer” via Motion Array
“Truth Revealing” via Motion Array
china farming simulator cnn canada
This video was first published onSource link . We are just re-posting and re-sharing from their RSS feed.
Top Tech Stories
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945248.28/warc/CC-MAIN-20230324051147-20230324081147-00095.warc.gz
|
CC-MAIN-2023-14
| 703
| 13
|
https://www.experts-exchange.com/questions/28580699/Small-Business-Backup-Solutions.html
|
code
|
We currently use USB and NAS drives for backup for small businesses. Sometimes when clients switch USB backup drives over, the drive letter changes. Also, for NAS drives, backups are too slow across gigabit connections. We are typically backing up VHDs and VHDx - so quite large files. What other media solutions are out there that people are using that are fast and reliable?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991982.8/warc/CC-MAIN-20210511092245-20210511122245-00211.warc.gz
|
CC-MAIN-2021-21
| 376
| 1
|
https://www.adalta-recruitment.co.uk/job/devops-engineer-1/
|
code
|
DevOps Automation Engineer
DevOps, Automation, Sys Admin, Open Source, Automation, Scripting, Python, Bash, Ansible, Kubernetes, Containerization, Jenkins, Docker, Open Shift, Open Stack
Competitive Salary + Benefits
My client is a leading provider of online digital ecommerce and entertainment on a global scale. Their infrastructure environment is enterprise scale with close to 20,000 servers and a Petabyte of storage, supporting high-availability systems, 1 million concurrent connections at any one point across multiple global locations.
Overview We are looking to build and scale an Automation capability within both our DevOps and Platform Delivery functions. Automation Engineers will collaborate closely with colleagues in Software Release, SRE, Platform Delivery (Networks, Database and Systems) and IT Services to increase levels of Automation and Tooling with a particular focus on cross-team processes and services to help drive forward our vision for a modern, flexible set of platforms We hire people with a broad set of technical skills who are ready to tackle some of technology’s greatest challenges and continue to break new ground in software innovation.
Your main responsibilities will be:
- Working with automation and orchestration platforms (e.g. Ansible, Jenkins), to automate manual activity and processes.
- Working with varied teams to consume and/or build APIs for their services in end-to-end department wide processes.
- Collaborating with colleagues across Infrastructure to determine requirements and solutions, to solve problems and progress work.
- Must have experience working in either an Infrastructure team (Network, Server) or a Software Development team.
- Strong working knowledge of automation tooling and best practice.
- Experience with Automation and Orchestration platforms (e.g. Ansible, Jenkins).
- Experience and knowledge of Windows and Linux operating system stacks.
- Solid understanding of automation principles and tools such as Git, Jira, Docker, Ansible, Artifactory, AWX, Jenkins, Chef, CI/CD.
- Experience in collecting and visualising metric and log data using tools such as Splunk and Elastic.
- Experience building and consuming APIs.
- Excellent issue investigation and diagnosis abilities.
- 5 weeks per annum plus public holidays
- Private pension contribution
- Bonus Scheme
- Gym membership
- Life Assurance Scheme
Sys Admin, Open Source, Automation, Scripting, Python, Bash, Ansible, Kubernetes, Containerization, Jenkins, Docker, Open Shift, Open Stack
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703509973.34/warc/CC-MAIN-20210117051021-20210117081021-00050.warc.gz
|
CC-MAIN-2021-04
| 2,525
| 23
|
https://www.sdu.dk/da/forskning/centreforenergyinformatics/publications
|
code
|
Indsendte og godkendte videnskabelige publikationer, som endnu ikke er publiceret:
- T. Lei, K. Engelbrecht, K.K. Nielsen and C.T. Veje, “Study of Geometries of Active Magnetic Regenerators for Room Temperature Magnetocaloric Refrigeration”. Accepted, Applied Thermal Engineering, 2015.
- M. Kuhrmann and D. Méndez Fernández, “On the Use of Variability Operations in Software Process Lines”, (in press) Journal of Software: Evolution and Process (Special Issue of ICSSP 2014, invited article), Wiley, 2014.
- M. Kuhrmann and D. Méndez Fernández, “From Pragmatic to Systematic Software Process Improvement: An Evaluated Approach”, (in press, available online, issue assignment pending) IET Software, IET, 2015.
- G. Theocharis, M. Kuhrmann, J. Münch and P. Diebold, “Is Water-Scrum-Fall Reality? On the Use of Agile and Traditional Development Practices”, (accepted for publication) in International Conference on Product Focused Software Development and Process Improvement (PROFES), Springer, 2015.
- H. R. Shaker, "Fault recoverability analysis via cross-gramian" in 2nd International Conference on Mechatronics and Robotics Engineering, 2016.
- M. G. Wollsen and B. N. Jørgensen, “Artificial Neural Network Combined With Automatic Feature Selection for Local Temperature Forecasting”, in Neurocomputing Special Issue, 2015. (In review).
- A.K. Singh and C.T. Veje, “System Development for Storing Heat Energy in Sand”, in 9th International Conference on Multiphase Flow (ICMF 2016), May 22 to 27, 2016 in Firenze, Italy, 2016.
- A.F. Haubjerg, C.T. Veje, B. Simonsen and B.N. Jørgensen, “Deep Bed Drying of Extruded Fish Feed: Development of a Mathematical Model” in Drying Technology (submitted November 2015). (In review).
- A.K. Singh and C.T. Veje, “Finite Element Implementation for Phase-Change Phenomena Operating the Volume Translated Peng-Robinson Equation of State”, in Journal of Computational Physics, (Submitted on October 2015).
- A.K. Singh, S.F. Svane, K.T. Kristensen, C.T. Veje and C.S. Jensen, “Two phase model for capillary water flow in root screening facility: Model development and validation”, in Journal of Hydrology, (Submitted on September 2015).
- M. Jradi and S. Riffat, “Testing and Performance Analysis of a Hollow Fibre-Based Core for Evaporative Cooling and Liquid Desiccant Dehumidification”, Accepted for publication in the International Journal of Green Energy.
- Ma Z., B. N. Jørgensen, and Z. Prljaca (forthcoming), Global Smart Grid Transferability: Insights from Europe, the U.S., and China, in Journal of Energy and Power Engineering, 2016.
Se centrets øvrige videnskabelige publikationer for henholdsvis 2013-2015:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00058.warc.gz
|
CC-MAIN-2023-50
| 2,708
| 14
|
http://www.okcupid.com/profile/troldrik
|
code
|
Um.. I guess I would describe myself as intelligent, introverted,
sensitive, inquisitive into stuff I find interesting, and shy until
I learn to know people.
I spend a lot of time reading about stuff to understand the world
better, be it history, politics, science or plain old fiction with
a message. Also enjoy good story telling which ever medium it's
I have dabbled a bit with game development, but do not work in the
game industry. I just do plain old software development.
What I’m doing with my life
Often asked myself that question. :p Right now I'm on a
self-improvement spree, exercising (jogging, hitting the gym) to
shed some kilograms, trying to live more healthily, and not letting
anxiety run my life.
I’m really good at
Absorbing useless trivia by osmosis. You don't want to challenge me
in a trivia game ;), Baking, Coding, Giving bear hugs.
The first things people usually notice about me
My height, I guess?
Favorite books, movies, shows, music, and food
Books: Mostly Sci-Fi/Fantasy stuff, Discworld, Dresden Files, A
Deepness in the Sky, Kingkiller Chronicles, 1984 which sadly seems
to have been taken as a instruction manual these days, rather than
Shows: QI, Sherlock, Babylon 5, West Wing (Until Aaron Sorkin got
canned), Game of Thrones, The Wire, Psych, Breaking Bad, South
Park, Mythbusters, Futurama, Monty Python's Flying Circus, That
Mitchell and Webb Look, Coupling
Films: Dr. Strangelove, Monty Python and the Holy Grail, Star Wars
IV-VI (THERE ARE NO PREQUELS).
Music: Muse, Nightwish, Epica
Food: My homemade authenticish Neapolitan Pizza.
The six things I could never do without
My Ipad full of ebooks.
A comfy bed to sleep in.
I spend a lot of time thinking about
Daydreaming about how much better the world would be, if I were the
supreme overlord of Earth. Philosophising about the meaning of
life, the universe and everything. What I should have said 5
On a typical Friday night I am
At home, surfing the net, chatting, reading a book, gaming or
watching an excellent series.
The most private thing I’m willing to admit
I watch way too many lolcats and Youtube cat videos.
You should message me if
You can quote Monty Python, like intelligent discussions, or if you
just like nerdy guys in general.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701148475.34/warc/CC-MAIN-20160205193908-00187-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 2,244
| 45
|
http://allaboutwindowsphone.com/flow/item/21730_its_Doom_On_your_phone.php
|
code
|
It's true that there have always been ways to get the original texture-mapped 3D FPS Doom on your phone - but they usually required some messing about, if not hacking. Happily, thanks to developers SeNSSoft, Doom, or at least 'D00M'(!) is only one tap away, since this is a normal Store install with nothing fancy needed. OK, if you want to go beyond the level packs here and into the official original Doom 'wads' then some file hunting and copying will be needed. But if you're anything like as bad as me at FPS, the free levels and difficulties will be all you'll need....
Say "Hello" to the Windows Phone port of the legendary first person shooter by the Id Software called "Doom"! This "reincarnation" of the classic PC game is based on the open source implementation called PrBoom but have some unique features.
Trial version has just one limitation - you can play a "FreeDoom" mod only (freeware wad file created by enthusiasts); to play original "Doom" or "Doom 2" wads (or any other PrBoom-compatible mods) you need to purchase a full version of game.
You'll know the game, hopefully, at least if you're over about 35, Doom rewrite the rules of how immersive computer games could be. Here's D00M in action on a Lumia 950:
The traditional five difficulty levels of Doom - you'll want to start off gently while you get the feel of the touch controls....
Happily you can adjust the touch control sensitivity, in case you find yourself lurching around uncontrollably. Or maybe that's just me!
D00M in action. Die, die, die!
There's a map that you can pop up and zoom in on - unfortunately this doesn't help with the puzzles (doors, panels, and so on) - for those you'll need online help.
I wonder what's on the other side of the door?
You can grab D00M here in the Store as a free trial (referring to all the free levels). I'd welcome data points as to how far you get - I must be completely useless as I couldn't even open the very first internal door. Or is this a bug?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00614.warc.gz
|
CC-MAIN-2023-23
| 1,976
| 10
|
http://rabuck.blogspot.com/2014/11/the-28mm-classroom-part-ii.html
|
code
|
The battle continues. Note that my daughter has chosen to deploy not just the TARSDIS, but 28mm Cybermen, Daleks,a nd Weeping Angels I got for my birthday. Zack couldn't make this session, SO Carter was left playing the French by himself.
|The results of the charge. The reserve dragoons ignored the square of British light infantry. They're about to discover what an enfilade is.|
|Emily has successfully engaged the French Chasseurs a cheval, and now she contemplates that, with the forces being roughly equal, the survival of the British flank rests on a 50-50 chance.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484020.33/warc/CC-MAIN-20190218013525-20190218035525-00478.warc.gz
|
CC-MAIN-2019-09
| 572
| 3
|
http://thumbsup2life.blogspot.com/2011/02/dynamic-and-relocatable-dynamic.html
|
code
|
The following jobs are loaded into memory using dynamic partition and relocatable dynamic partition. Its memory size is 220k with allocated OS for 15k. These are the following list of jobs with their specific size and turnaround.
Job 1 100k 3
Job 2 10k 1
Job 3 35k 2
Job 4 15k 1
Job 5 23k 2
Job 6 6k 1
Job 7 25k 1
Job 8 55k 2
Job 9 88k 3Job 10 100k 3
D Y N A M I C P A R T I T I O N
The main memory is partitioned. Jobs given memory requested when loaded and one contiguous partition per job. It uses "First Come, First Serve" allocation method in allocating job and its memory waste is comparatively small.
R E L O C A T A B L E D Y N A M I C P A R T I T I O N
The memory manager relocates programs of which it gathers together all empty blocks. Compact the empty blocks and make one block of memory large enough to accommodate some or all of the jobs waiting to get in.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125654.80/warc/CC-MAIN-20170423031205-00206-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 871
| 14
|
https://developer.jboss.org/en/tools/blog/2013/6
|
code
|
What is this all about?
At JBoss Tools we use git when it comes to source control and have all our components hosted on Github. Eclipse offers very capable and handy git tooling with EGit. Nevertheless most of us still use the command line even though we do and use Eclipse on a daily base. The main reasons are manifold. EGit was for a long time still on the maturing curve and was not on par with the command line. Migrating users did not feel safe either since EGit was not operated in the way it used to be with CVS, SVN etc. Furthermore many UIs in EGit dont try to accomodate the newbie user but offer all the nots and bolts instead.
I'm using the EGit/JGit API (not the UI) in our OpenShift tooling. EGit/JGit is thus thus vital for my product. I therefore started to eat my own dogfood and forced myself to use EGit where I had the reflex to switch to the command line before. I found a pretty mature and very capable EGit. It is IMHO even more handy than the command line in certain usecases. I'll therefore try to improve EGit and convert most of us to us to use what was an unloved child before. I am very convinced that a little effort here and there will tranform EGit into first class and most excellent tooling that noone wants to miss.
A tale of branches and main repos.
As I already mentioned, all JBoss Tools components are available from Github. All developes within JBoss Tools have their very own fork of those master repos and also have them on Github. When it comes to issue tracking, we use Jira. Whenever we tackle an issue we branch from master and commit our work to this topic branch. Since git is decentralized, one would have a local clone of its Github fork, commit the changes to it and push it back to Github. A pull request then notifies the maintainer of the master repo to review the suggested changes and merge them into the master branch in the master repo.
Clone your Fork
Everything starts by having a personal fork on github. Once this is done one clones this repository to the local machine by issuing (I'm cloning my fork of the openshift-java-client here):
git clone git://github.com/adietish/openshift-java-client.git
In EGit things are as easy as on the command line. You make sure that you have the Git URI in your clipboard and switch to the Git Repository Exploring perspective...
You pick the Clone a Git Repository action from the toolbar in the Git Repositories view...
... and EGit will use the Git URI in your clipboard to prefill the upcoming cloning settings:
In an additional step you tell EGit where to clone to and once you're done the new repository will show up in your Git Repositories view:
A last step involves importing the Eclipse project to your workspace. You pick Import Projects... from the context menu of your repository and you're all done:
Create your topic branch
Every issue is tackled in a separate topics branch. That allows us to separate the concerns when coding. It also allows us to switch among different task if priorities shift. We simply switch topic branch and focus on the current task.
To create a new topic branch based on the current master branch one does:
git checkout -b my-topic master
Using EGit you wont have any more steps involved, it is as easy as it is with the command line. In the Git Repository Exploring perspective you unfold the branches of your local git repo, select the branch you want your topic branch to be based on (which usually is master) and pick Create Branch... in the context menu.
In the upcoming dialog you choose the name of your new branch and hit Finish. EGit will by default switch your code to the new branch (see Checkout new branch checkbox).
Do your work
Now that you have a branch for your task you're ready to do your changes. Get to the Java or JEE perspective and make sure you have the Git Staging view opened. It will track the files you change and make them show up in the Unstaged Changes. If I change the README.md in my project and save it will instantly get listed in the Unstaged Changes:
Commit and Push
As soon as we're done with all our coding we're ready to commit and push. When we started we cloned our Github fork to the local machine. Our local repository is thus originating from the Github fork, it's Origin is pointing to this Github repository. Committing and pushing our changes to this fork is done in 2 steps when using the git command line:
git commit -a -m "[JIRA-XXXX] corrected readme"
git push origin my-topic-branch
In EGit things are even more handy. it's mostly a single click experience:
PIck the unstaged files that you want to commit and drag and drop them to the Staged Changes. Then provide some commit message and you're ready to go:
Hit Commit and Push:
EGit will commit your changes to your topic branch and push it to its origin, the fork on Github. The topic branch only exists on the local machine, pushing it to Github will thus create a new branch in this remote repository. EGit will show you that in the upcoming dialog:
Oh, my change was incomplete
If I now discover that I forgot to do some modifications I could easily add another commit and push it as I just did before. The commit history would then show 2 distinct commits that tackle the very same topic though. I personally prefer to ammend in these cases. I could alternatively merge these 2 commits into a single one (by rebasing). I personally prefer to amend since this keeps me focused, I wont have to rebase once I'm ready to merge.
Let us do the change we had forgotten and amend it. On the command line this would look like this:
git commit -a --amend
In Eclipse I'll proceed as shown before. I change my files, drag them from unstaged to staged and tell EGit to amend by htting Amend Previous Commit:
When hitting Amend Previous Commit the previous commit message shows up in the message area.
Also Notice the warning that the Git Staging view is issuing. It tells you that your current commit was already pushed to a remote branch. It tells you that pushing will most likely fail if done to the very same remote:
Doors shut, push rejected?
If I now hit Commit and Push committing will succeed but pushing wont. It'll tell me that it is rejected, that it is non-fast-forward:
Amending modifies an existing commit. I had pushed this commit to my fork already. The new push sends a modifed version of the very same commit. The remote therefore rejects it and tells me that I pushed a conflicting change, a change that is non-fast-forward.
Use the force, Luke!
To solve this conflict I'll use the force. I changed my commit on purpose, I wanted to add some missing pieces. I therefore insist on pushing my change and tell git to force my push. Using the command line one does:
git push -f origin my-topic-branch
The Git Staging view unfortunately doesn't offer this option yet. We should consider ways of pushing force in the staging view in order to keep the workflow smooth.
To currently push force in EGit you have to get to the full fledged push action that is accessible in the project explorer: Team -> Remote -> Push...
In the upcoming wizard you can then choose the remote repository you want to push to. I therefore pick origin, which points to Github fork:
On the next wizard page I then pick the branch I want to push:
EGit will then pick the existing (remote) topic branch as destination:
I can then add this source-destination pair to the refspecs that EGit will push:
EGit then lists it in the push specifications and allows me to further further fine-tune it:
I can then tell it push force in the Force Update column:
Once I executed all these steps I'm ready to go and can hit Finish, telling EGit to push force my local topic branch.
In my opinion the wizard we just used - especially the 2nd page where you build a push-force refspec is far too complicated. It's not inutitive enough, especially for newbie users. The git command line is so much simpler. We should seriously think about providing a simpler version which fits the vast majority of the usecases. A very simple first improvement is to have the current branch preselected (in Source ref).
Let there be merge
Now that we pushed our topic branch to Github we're ready to file a pull request and let the review happen. Github contributed Mylin connectors for EGit/Github. I honestly didn't find out how to file pull-requests though. Looking into their code this must be possible, the functionality is there, but I didnt get how to use the UI to file those. That's another area where I'd love to enhance. IMHO it should be possible to file pull requests right from Eclipse. I'm not even sure if we really should require Mylyn. Mylyn is very nice, no doubt about But at times you just want to create the PR and dont want to edit it. Having it prefilled with the commit-message is fairly sufficient.
For the sake of breveity I wont get into details how one would file a pull request on github, I'll just assume we filed it on github.
I then get back to the Git Repository Exploring perspective and merge master with my topics branch. I double click my master branch and make sure it's checked out. I then pick Merge... from its context menu:
...and tell the wizard to merge my master with my topic branch.
Once the merge is done I can push it to master by using the push outlined above. This time I'll just push to the master repo, too and publish my code the official repo. My task is finished, I merged my topics branch (my work) into master and made it official JBoss Tools code. I can now kill my topics local and remote branches.
Egit, what about new clothes?
In the above I spotted several steps that could get enhanced to get your EGit journey perfect. EGit has all you need, it's became pretty stable and mature over the years. I'd love to gather those ideas and wishes and get your feedback!
A first shortcoming I spotted is that you cannot push force from git staging view. Maybe that's a good practice since push force should stay the exception, it should not become the general rule. It should not be too easy since there's too much you can do wrong and loose all your work.Nevertheless I'd love to allow this common practice when correcting pull-request (in github or EGit gerrit) in the Git Staging view.
- What about displaying a force update checkbox when the already pushed warning is displayed?
- Alternatively we could ask the user if he wants to push force in something similar to this:
IMHO the dialog that pops up when you want to push to some remote could get quite some love.
- First of all it pops up with no default being filled out. Having the current branch selected as source and the corresponding remote on origin (that gets selected as soon as you choose your source) would spare you 1 first unneeded click:
- Secondly the dialog is far too complex and not intuitive enough for the newbie user. There are far too many nots and bolts for the default usecase. We could offer the simple 1:1 push with a force option in a single line and hide the advanced option behind an Advanced >> button:
I might be wrong but it looks very much as if there was no way to create a Github pull request within Eclipse. One has to use hub or get to the website. I'd love to have this in Eclipse so that there's no need to switch app. IMHO we should offer this with or without Mylyn. Maybe we should offer an action in the context menu that opens the Mylyn pull-request editor prefilled with all the relevant informations that I can then just confirm.
I'd love to get your feedback, get to know what you guys think. Please shout at me, confirm me or comment with your very own ideas. Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00356.warc.gz
|
CC-MAIN-2023-50
| 11,620
| 68
|
https://www.mhonarc.org/archive/html/ietf-smtp/2007-04/msg00195.html
|
code
|
Peter J. Holzer wrote:
The bug is IMHO that it isn't completely clear whether all codes in a
multiline reply must be the same. Hector interpretes the current text to
mean that they can be different, while several other (including me)
interprete it to mean that they must be the same.
No Peter. I could easily be among the same group to have a view that
suggest that it is "common sense" to presume it is all the same.
However, in the name of looking for a solution, and there is no
normative text that indicates it MUST be the same, but instead has a 25
year old suggestive text, a MAY concept, which implies only the last one
reply code is necessary and a 25 years wide practice to back it up, I
was proposing that we use this unique opportunity to embrace it for
There is no doubt, if it wasn't a concept that I could not envision as a
real possibility and useful for developers now and down the road, I
could easily see myself voting for a LOCK DOWN.
I am not proposing anything else but a "150-" as a PRELIMINARY reply
code for this purpose. No mixing of two or more different 2xx, 3xx, 4xx,
5xx lines. If the server finds itself where it needs to "keep the
channel" alive, or show it is still "working" it could issue the
PRELIMINARY code 150- before any other COMPLETION code is finally
determined and issued.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103337962.22/warc/CC-MAIN-20220627164834-20220627194834-00481.warc.gz
|
CC-MAIN-2022-27
| 1,315
| 21
|
https://www.businessmanagementdaily.com/41495/end-inertia-and-get-them-on-board
|
code
|
When your people say, “We can’t change that,” what they mean is that it’s hard. Changing one thing would mean having to change something else. It might even lead to unintended consequences and a cascade of unanticipated problems.
Some ways to get off dead center:
• Identify power brokers. Which people have unique abilities to get things done? Talk with them before moving ahead.
• Create allies. Discover what individuals care about and get them to trade favors so they can move their agendas forward.
• Separate ideas from champions. If a good idea comes from someone who is disliked, no one will listen. But if the idea is recorded and circulated with other ideas, it may fly.
• Ask for help. Request volunteers for various assignments. Assign the rest.
— Adapted from Leading Innovation, Jeff DeGraff and Shawn E. Quinn, McGraw-Hill.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887065.16/warc/CC-MAIN-20180118032119-20180118052119-00366.warc.gz
|
CC-MAIN-2018-05
| 856
| 7
|
https://www.cellinisignature.com/product/shoes-ginger-3555-blue/
|
code
|
No products in the cart.
RUNIC CLASSIC SHOES CALF LEATHER (BLACK)
RUNIC CLASSIC SHOES DEER SKIN (BROWN)
ALFREDO BERETTA LOW-TOP SNEAKERS SHOES SUEDE CROCO LEATHER (BROWN)
ARTIOLI SHOES CALF LEATHER (BLACK)
SHOE-ALLIGATOR S0101 (BLUE)
CELLINI SNEAKERS SHOES SUEDE (BLUE-BEIGE)
ARTIOLI LOAFER SHOES CALF LEATHER (BLUE)
MOCCASIN SHOES GENUINE ALLIGATOR LEATHER (BROWN)
SHOES SK01 SUEDE NAVY BLUE
ARTIOLI CASUAL SHOES DEER-CROCO LEATHER (BLACK)
Username or email address *
Lost your password?
Email address *
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527458.86/warc/CC-MAIN-20190722010436-20190722032436-00475.warc.gz
|
CC-MAIN-2019-30
| 504
| 14
|
https://blog.madhucharan.com/series/elementsofml?guid=none&deviceId=25445ecc-e0c7-400c-a3e6-2f5e3bc49c3d
|
code
|
This series consists of all mathematical prerequisites required for Machine Learning.
Articles in this series
How to get into the AI field?
How can I learn Machine Learning?
What is the best resource for Machine Learning or Deep Learning?
How can one stay up to date with AI?
Is this the best resource to learn Machine Learning?
Best possible way to learn AI?...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046156141.29/warc/CC-MAIN-20210805161906-20210805191906-00127.warc.gz
|
CC-MAIN-2021-31
| 362
| 8
|
https://answers.uillinois.edu/page.php?id=83586
|
code
|
ATLAS FormBuilder - Introduction to Phases
This tutorial briefly explains phases and walks the user through the process of adding a new phase to a form.
In order to build a form, you must use phases to differentiate between the parts of the form and to establish exactly how the form will function.
There are three types of phases in FormBuilder:
- Data Collection: This phase is the one that your form responder sees directly. The questions listed on your form will be located in this phase.
- Review Approval: This is the back-end of the form that typically only the form administrators need access to. For example, if the form is an order form, the administrator can approve the order placed by the form responder in the review approval phase.
- Archive: The archive is where all form responses are stored, including all interactions this form response encounters throughout the period.
Each type of phase has permissions that need to be set to ensure the phase works properly. These permissions allow you to customize who has access to specific parts of the form which is helpful when creating a special form. For a tutorial on how to set up phase permissions, check out ATLAS FormBuilder - How to Create a Phase Permission.
Aside from permissions, phases also need to be assigned routing triggers, which effectually link your form together into a chain. This chain represents the entire set of actions that occur, starting from when a form responder begins to fill out a form and ending when that form response is archived in your database. For more information on routing triggers and how to set them up, check out ATLAS FormBuilder - Lifecycle - How to Build a Routing Trigger.
1.) Select "Phases" under the Data Collection and Form Lifecycle tab on the form dashboard.
2.) Select "+ Add Phase" in the Phases tab. If you are creating the first phase of your form, the list beneath the tab will be blank. If you are creating an additional phase, a list of existing phases will be displayed below, as shown here. You can edit these by clicking the gear icon next to the phase.
3.) A new box will pop up on the right-hand side of the screen, like the one shown below. If creating a new phase, give it a name and classification in the fields listed. To assign the phase permissions, navigate to the Permissions tab.
4.) To add a phase permission, select "+ Add Permission".
5.) For more specific instructions on how to set up phase permissions, check out ATLAS FormBuilder - How to Create a Phase Permission.
6.) Remember to save your new phase by selecting the blue "Save" button at the bottom of the box. To delete a phase permission, select the red trash icon on the right. To edit a phase permission, select the "Edit" button on the permission you wish to edit.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473401.5/warc/CC-MAIN-20240221070402-20240221100402-00572.warc.gz
|
CC-MAIN-2024-10
| 2,768
| 15
|
https://www.al-feqh.com/en/kafirs-working-and-cooking-in-restaurants
|
code
|
Q: Some people who own restaurants in
are asking about employing some Kafir (non-Muslim) workers in the kitchens, since we cannot be safe from their betrayal.
Eating the food made by Kafir workers that do not contain anything Haram (prohibited) is permissible. The Prophet (peace be upon him) ate food that was prepared by Jews. As for those who are not of (Part No. 22; Page No. 347) the People of the Book, they should not slaughter animals by themselves. It is not permissible to bring Kafir workers to Muslim lands, particularly to
the Arabian Peninsula, since the Prophet (peace be upon him) ordered to drive them out of it. Moreover, there are enough Muslim workers in Muslim countries.May Allah grant us success. May peace and blessings be upon our Prophet Muhammad, his family, and Companions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00235.warc.gz
|
CC-MAIN-2022-40
| 801
| 4
|
https://knowledge.campaigner.com/article/28-smart-email-builder-overview
|
code
|
Smart Email Builder Overview
The Smart Email Builder helps you quickly create a newsletter email with minimal options. You simply choose a predefined smart template for your email design and add the text and images that convey your message. The editor creates emails in both the HTML and plain text email formats.
Note: Other editors are available. Ensure that you're using the editor most appropriate for the email you want to create.
The Smart Email Builder has three steps:
- Choose a smart template for your email design.A smart template is comprised of a predefined layout and theme. A layout organizes the newsletter, such as the number of columns and the placement of the header and footer. A theme determines the appearance of the newsletter, such as its graphic elements and colors.At this stage you can choose whether or not to create a plain text version of your email.
- Add the content that conveys your message. The template includes content blocks for adding your text and images. As you work, you can change the smart template if you find that another layout or theme is more suitable for your content. The Smart Email Builder displays a preview of the email design on the same page where you define content, and displays changes immediately in this preview. Plain text email design takes place after you complete your template content.
- Provide email details (such as your email address and the subject line).
Although you don't need to do any advance preparation before using the Smart Email Builder, doing so may help you work more efficiently. For information, see Prepare to Get Started.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00335.warc.gz
|
CC-MAIN-2023-14
| 1,609
| 8
|
https://www.jesociety.org/category/visual-edwards-library/
|
code
|
Video and Interactive Visualization
Extracting topics from Edwards’s sermon . . . Scroll down for the clickable page references which link to The Works of Jonathan Edwards Online
“Miscellanies,” no. 5. HEAVEN. There is no more reason why it should be a damp to the happiness of some in heaven that others are happier, than that their happiness should be damped by barely a possibility of greater happiness, supposing them to be all equal…
Video Introduction, Part 2: A 12 minute video which introduces the software and demonstrates the process of building a visualization from an Edwards phrase.
I am happy to announce that the Visual Edwards Library has now grown to over 450 visualizations. The base set of 456 visualizations parallels Edwards’ Table to the “Miscellanies.” Key terms from each table entry were used to create visualizations spanning all 26 volumes of the Yale letterpress edition of The Works of Jonathan Edwards.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506481.17/warc/CC-MAIN-20230923130827-20230923160827-00124.warc.gz
|
CC-MAIN-2023-40
| 946
| 5
|
https://hnhiring.com/locations/salt-lake-city
|
code
|
Recursion Pharmaceuticals | Salt Lake City, Utah | Full-Time | www.recursionpharma.com/careers
We have raised over $200M to apply machine learning to one of the most unique datasets in existence - over 12 billion images of cells under a huge number of biological and chemical perturbations, generated in our own labs - in order to find treatments for hundreds of diseases. Our long term mission is to decode biology to radically improve lives - we want to understand biology so well that we can fix most things that go wrong in our bodies. Among other awesome folks, Yoshua Bengio is one of our advisors, and helps our ML team come up with novel ways of tackling these problems.
We’re looking for:
* Software Engineering Manager (SLC, UT): Looking for an experienced Software Engineering Manager to join our team. You’ll lead and guide two of the most important aspects of our organization - our people and the definition/execution of our technical strategy.
* Machine Learning Scientist (Anywhere): Looking for a highly experienced senior/principal-level Machine Learning Scientist who wants a challenging problem, lots of rich data, and knowledge that their breakthroughs will seriously help people. No bio background needed.
* Sr. DevOps Engineer (SLC,UT): As a DevOps professional your contributions will benefit Biologists, Automation Scientists, and Data Scientists by building the infrastructure needed to decode human biology and reinvent drug discovery.
* CyberSecurity Threat Analyst (SLC,UT): As you work closely with IT, engineering, and data science teams, you will help promote best practices and help guide us to workflows that are more secure.
* Director of Data Science (SLC,UT): As a Director in data science, you'll work with, mentor, and develop our data scientists to grow and accomplish their missions to identify and answer questions and build systems to propel Recursion’s drug discovery engine forward.
Additional roles we are hiring for:
* Sr. Data Engineer, Sr. Full Stack Software Developer, Data Science Intern, Software Engineering Intern, Biologist, Computational Chemists, Automation Engineer, and Drug Discovery experts.
http://www.recursionpharma.com/careers for more details and to apply.
Logistics: Salt Lake City, Utah. Hiking/running/biking is literally out our back door, and it's half an hour to 6 ski resorts. Great competitive pay, health insurance, 401k, relocation assistance, equity, fully-paid gym membership, complementary chef-prepared meals everyday, two one-week paid company closures in addition to flexible, generous vacation, 70ft onsite rock climbing wall, commuter benefits, a top-caliber team, and help make a massively positive human impact. Happy to sponsor/extend visas.
Data Science: pydata stack (pandas, numpy, scikit-learn, matplotlib, bokeh, tensorflow w/keras, etc), a cluster of GPUs for all your research ideas
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670643.58/warc/CC-MAIN-20191121000300-20191121024300-00088.warc.gz
|
CC-MAIN-2019-47
| 2,883
| 13
|
https://medium.com/@dalaidunc/fs-readfile-vs-streams-to-read-text-files-in-node-js-5dd0710c80ea
|
code
|
fs.readFile vs streams to read text files in node.js
The de facto standard of reading text files in node.js is to use
For quick prototypes, or if we’re just dealing with small text files, this approach is completely fine. However, if there is a chance that other people might use our code, or that it may at some point be run on text files of varying sizes, we may as well optimize our code and consider using streams instead.
Streams allow us to keep data held in memory to a minimum, thus making reading a file that much quicker. They also allow us to pick and choose which parts of the file we want to process and leave the rest of the data unopened.
I was interested in the trade off between the ease-of-use of fs.readFile and the faster run-time of streams. At what file size does it make sense to refactor use of readFile and instead use streams?
I devised a simple test: create dummy data CSVs of various sizes and compare the time taken to extract the headers of these CSVs by 2 methods, one fs.readFile and one stream-based.
The first step is to use node.js to create some CSVs of various lengths:
node makedata.js will create 4 files with varying numbers of rows.
The next step is to run our 2 methods to read the headers of the CSV files:
read1 uses fs.readFile and to read in the entire contents of each CSV and then return the first line (the header). The next method
read2 uses streams to read in data from the CSV file and then returns the header.
The default setting in node.js for createReadStream is to read the file in 16KB chunks at a time. As soon as we have read the first chunk, we get the header of that string and then immediately destroy the stream so that it does not read any more chunks. This allows us to have fast performance no matter how big the file size is.
And here is the comparison for reading in CSVs of various sizes, ranging from 164KB to 160MB in size (x-axis is lines of CSV/file size, y-axis is the time taken for the relevant function of read.js to read the header):
As you can see, the stream method remains largely flat and fast, whereas the readFile method starts to increase noticeably as we approach ~16MB in file size.
TLDR: my suggestion is once you are planning on dealing with text files of greater size than around 10MB, it’s best to ditch readFile and start using streams instead.
There is one other thing to mention that the astute observer may have noticed: using a stream seems to be slightly faster when dealing with the 100000 lines file when compared to the smaller file sizes. I ran the code multiple times and still got the same result. Why is this? My guess is that it has something to do with the way the createReadStream splits the file into chunks. If anyone has a better idea, then let me know!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528481.47/warc/CC-MAIN-20190420020937-20190420042013-00048.warc.gz
|
CC-MAIN-2019-18
| 2,767
| 16
|
http://www.sklogwiki.org/SklogWiki/index.php/Potts_model
|
code
|
The Potts model, proposed by Renfrey B. Potts in 1952 , is a generalisation of the Ising model to more than two components. For a general discussion on Potts models see Refs . In practice one has a lattice system. The sites of the lattice can be occupied by particles of different species, .
The energy of the system, , is defined as:
where is the coupling constant, indicates that the sum is performed exclusively over pairs of nearest neighbour sites, and is the Kronecker delta. Note that the particular case is equivalent to the Ising model.
Considering a symmetric situation (i.e. equal chemical potential for all the species):
the Potts model exhibits order-disorder phase transitions. For space dimensionality , and low values of the transitions are continuous ( is a continuous function), but the heat capacity, , diverges at the transition temperature. The critical behaviour of different values of belong to (or define) different universality classes of criticality For space dimensionality , the transitions for are first order ( shows a discontinuity at the transition temperature).
- Renfrey B. Potts "Some generalized order-disorder transformations", Proceedings of the Cambridge Philosophical Society 48 pp. 106-109 (1952)
- Rodney J. Baxter "Exactly Solved Models in Statistical Mechanics", Academic Press (1982) ISBN 0120831821 Chapter 12 (freely available pdf)
- F. Y. Wu "The Potts model", Reviews of Modern Physics 54 pp. 235-268 (1982)
- F. Y. Wu "Erratum: The Potts model", Reviews of Modern Physics 55 p. 315 (1983)
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986684425.36/warc/CC-MAIN-20191018181458-20191018204958-00067.warc.gz
|
CC-MAIN-2019-43
| 1,538
| 9
|
https://drupal.stackexchange.com/questions/20593/using-revision-with-views
|
code
|
I'm creating a page to list any content that needs moderation, which in my case includes new content and pending revisions.
I have the pending revisions down, by setting
- Content: Nid
- Content revision: Title (Title)
- Content revision: Updated date (Last Revised)
- Content revision: Vid
- Filter Criteria
- Content revision: State (= Pending)
- Content: Revision moderation (=Moderated)
- Content: Published (YES)
Now how do I add in content that hasn't been published that requires moderation, BUT don't pull prior content that has been set to unpublished?
I've tried opening up the filter for Content:published and selecting the ANY option and excluding it from display. However, When you unpublish content, the revision for it asks for moderator attention as if it was a new revision waiting to be published. So it grabs ALL unpublished content as opposed to only the new content waiting to be published.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510967.73/warc/CC-MAIN-20231002033129-20231002063129-00569.warc.gz
|
CC-MAIN-2023-40
| 911
| 12
|
https://gallery.photobrunobernard.com/all-pics/20-kraken-vs-godzilla-size-comparison-images/
|
code
|
23+ Kraken Vs Godzilla Size Comparison Pics. (kraken is bigger than 138 square feet (i'm comparing with argos the city in the movie) godzilla had trouble. Godzilla vs evolution of kraken scene giant:
#thebuzzthe legendary titans in monsterverse have been introduced in godzilla: Who are the titans in godzilla vs kong? But, as far as we know, kraken is a bit taller.
Most of them were not from the toho franchise.
Well, this fight is just an entertainment.godzilla and kraken are not real, so this fight would never happend. The kraken is said to be as big as the greek titans. Have you ever wondered how big your favorite monsters are ?, because in this video i show you in perspective, from the smallest to the largest. Most of them were not from the toho franchise.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817158.8/warc/CC-MAIN-20240417142102-20240417172102-00106.warc.gz
|
CC-MAIN-2024-18
| 768
| 4
|
http://www.house4hack.co.za/category/competitions
|
code
|
This was amazing – despite it being freezing in the venue (Jacques even went home to get a small heater!), everyone stayed right to the end! During the day the teams worked amazingly well together – no prima donnas, egos etc. just good hacking 🙂
The venue was a stand in the exhibition hall of the African Utility Week (so very visible) and we had lots of people walking by asking what are we doing and why. I think some of them will never get it, but we made some good friends who will hopefully join us next year.
MTN sponsored a Galaxy Note for the event and House4Hack pitched in with some gift vouchers for the winning team. We only approached Yusuf last week about this and he immediately said yes and then personally brought it to the event after only receiving it on the morning of the event.
There were three teams, one for each challenge (see at the bottom of the post for the problem description). The challenge owner was on site to provide further details and guide the teams to a solution.
Map the poison – (https://github.com/house4hack/map-da-poizon) The solution was a combination of Open Data Kit (ODK) and Google Fusion tables. Field workers can capture data using Open Data Kit and visualize it in Google Fusion tables. These are extremely powerful tools and a great framework for future projects. The team consisted of Gerard, Jacques, Richard, Sean and Toby.
H2O Detective (winner) – (https://github.com/house4hack/h2o-detective) the solution used e-breadboard (http://sourceforge.net/projects/ebreadboard/) a framework developed by Enerweb DI and released as open source. Additionally, an Android app was developed for use by fieldworkers to identify and manage consumers with very water consumption using the geo-position of the field worker and historical water consumption patterns. The team was Marius Kruger, Lawrence Matjeni and Nathi Tshabalala.
Open Pump Monitor – (https://github.com/house4hack/opm) the solution consisted of an open hardware (Arduino) monitor, connected to an inexpensive Android phone (Vodafone 858). The phone acts as data logger and sends the measured power quality to a server written in Clojure. From there SMS’s is sent via a commercial gateway and a series of reports can be drawn. The team was Mikkel, Tom, Jabu, Tobie and Schalk
The combined team from Sowertech and Enerweb with H2O detective won the hackathon! Nathi Tshabalala from Sowertech was picked as the winner of the Samsung Galaxy Note sponsored by MTN.
The hackathon personality prize sponsored by The Body Shop went to Toby Kurien:
Random Hacks of Kindness
Work will continue on these projects at the RHoK global event to be held 2-3 June at UNISA –http://www.rhok.org/event/pretoria-south-africa-0
Water Hackathon Invite
Lack of safe water and adequate sanitation is the world’s single largest cause of illness, responsible for two million deaths a year. That’s four people every minute – most of them children.
House4Hack is helping Africa Utility Week (http://www.african-utility-week.com/water-expo/) to organize a 1 day water hackathon on Monday 21 May 2012.
Why you should attend
You are a social entrepreneur, innovator, open source developer, data scientist, designer (graphical, gui, industrial etc), open hardware enthusiast, project manager or all of the above.
You would like to make a difference.
You want to meet like-minded people and have fun.
There are some really high impact challenges and here is a taste
Map the poison – This should be a web based application that will be used to map spots along a wetland system where poorly treated and potentially poisonous effluent is being discharged into the system.The program should be able to specify which kind of components of the toxic effluent are being discharged where. The problem is that in Africa, Leather tanning and other industries are still thriving while releasing poorly treated effluent directly into our wetland systems. The reason they go undetected is lacking a GPS system that will track these activities so that the culprits are apprehended and corrected. This would go far in solving this issue.
Power surge prompt – A system that alerts plant operator on duty through their mobile phone whenever there is low, high or fluctuating voltage that could cause damage to pumps, motors etc in the plant. Report to technical manager or supervisor daily indicating time, nature of occurence and action taken as well time of normalisation of system.
Water usage map – In order to help managers understand water use patterns and how they vary geographically, a mapping application (e.g. Google Earth app) could link water meter data with meter GPS co-ordinates. Such maps could inform decisions around planning and investment for areas with low consumption or connection density (often poorer neighbourhoods and marginalised communities). The ability to include additional demographic data would allow for richer analysis (http://www.sanmap.org/) for a taste of this type of visualisation. Overall, the ability to visualise this data on an interactive map would assist managers in their decision-making around demand management and distribution losses. They could even single out households with suspiciously high or low water usage (helping to fight leakage and corruption).
Expo Center in Johannesburg (http://www.african-utility-week.com/about-the-venue/venue-directions/)
08h00 Registration and breakfast 09h30 Schedule and logistics announcements 10h00 Subject matter expert briefing 10h30 Begin coding 13h00 Lunch 13h30 Coding continued 14h30 Optional progress briefing, coding continued 18h00 Coding ends / Presenting solutions 19h00 Dinner / Judging / Prize giving 20h00 End (to be continued at RHoK on 2 – 3 June 2012)
Registration now open http://waterhackathon.eventbrite.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122739.53/warc/CC-MAIN-20170423031202-00099-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 5,814
| 25
|
http://hackaday.com/tag/3d-printer/
|
code
|
We’re far beyond the heyday of the RepRap project, and the Hackaday tip line isn’t seeing multiple Kickstarters for 3D printers every week. In a way, this is a bit of a loss. The rapid evolution of the low-cost 3D printer seen in the first half of this decade will never be matched, and from now on we’ll only see incremental improvements instead of the revolutionary steps taken by the first Prusa, the first Printrbot, and even the Makerbot Replicator.
This doesn’t mean everything is standardized. There’s still enough room for arguing over deltas versus Cartesians, beds moving on the Y axis versus moving along the Z, and a host of other details that make the current crop of printers so diverse. One of these small arguments is especially interesting: the diameter of the filament. Today, you can get any type of plastic you want, in any color, in two sizes: 1.75 and 3mm. If you think about it, it’s bizarre. Why on Earth would filament manufacturers, hot end fabricators, and even printer manufacturers decide to support two different varieties of the same consumable? The answer is a mix of a historical choice, engineering tradeoffs, and an absolutely arbitrary consequence of what 3D printers actually do.
Continue reading “3D Printing Has Evolved Two Filament Standards”
[Massimo Moretti] has a big idea – to build housing on the cheap from locally sourced materials for a burgeoning world population. He also has a background in 3D printing, and he’s brought the two concepts together by building a 12 meter tall delta-bot that can print a house from clay.
The printer, dubbed Big Delta for obvious reasons, was unveiled in a sort of Burning Man festival last weekend in Massa Lombarda, Italy, near the headquarters of [Moretti]’s WASProject. From the Italian-language video after the break, we can see that Big Delta moves an extruder for locally sourced clay over a print area of about 20 square meters. A video that was previously posted on WASProject’s web site showed the printer in action with clay during the festival, but it appears to have been taken down by the copyright holder. Still, another video of a smaller version of Big Delta shows that clay can be extruded into durable structures, so scaling up to full-sized dwellings should be feasible with the 4 meter delta’s big brother.
Clay extrusion is not the only medium for 3D printed houses, so we’ll reserve judgment on Big Delta until we’ve seen it print a livable structure. If it does, the possibilities are endless – imagine adding another axis to the Big Delta by having it wheel itself around a site to print an entire village.
Continue reading “Enormous Delta-bot 3D Designed to Print an Entire House”
Few hackers have trouble understanding basic electric motors. We’ve all taken apart something that has a permanent magnet DC motor in it and hooked up its two leads to a battery to make it spin. Reverse the polarity, reverse the spin; remove the power, stop the spin. Stepper motors (and their close cousins, brushless DC motors) are a little tougher to grok, though, especially for the beginner. But with a giant 3D printed stepper motor, [Proto G] has made getting your head around electronically commutated motors a little easier.
While we’ve seen 3D printed stepper motors before, the size and simple layout of this one really lends to understanding the theory. With a 3D-printed frame, coils wound on nails, and rare-earth magnets glued to a rotor, this is an approachable build that lays the internals of a stepper motor out for all to see and understand. You can easily watch how the rotor lines up as the various coils are energized in a circular pattern, although it might be more revealing to include bi-color LEDs to indicate which coils are energized and what the polarity is. Those would be especially helpful demonstrating the concept of half-stepping. We’d also like to see more detail on the controller electronics, although admittedly all the video-worthy action is in the motor itself.
Continue reading “Giant Stepper Motor Gets You Up to Speed on Theory”
Manufacturers of 3D printers have a lot to do before they catch up with makers of the cheapest 2D, paper-based printers. If you’ve ever taken an inkjet apart, you’ll most likely find some sort of closed-loop control on at least one of the axes. The 2D printer will tell you when you’re out of ink, when a 3D printer will go merrily along, printing in air without filament. File formats? Everything is Gcode on a 3D printer, and there are dozens, if not hundreds of page description languages for 2D printers.
The solution to some of these problems are drivers – software for a 3D printer that slowly consumes the slicing of an object, printer settings, and placing an object on the bed. It’s coming, and the people who are responsible for making your 2D printer work with your computer are busy at work messing up the toolchain for your 3D printer.
The latest version of CUPS (C Unix Printing System) adds support for 3D printers. This addition is based on meetings, white papers, and discussions in the Printer Working Group (PWG). There has already been a lot of talk about what is wrong with the current state of 3D printer toolchains, what can be improved, and what should be completely ignored. Let’s take a look at what all of this has accomplished.
Continue reading “Drivers for 3D Printers and Why We Need Them”
Back in the 1990’s moving files via a floppy disk was known as “sneaker net.” While floppies are a thing of the past, SD Cards are the modern equivalent and they still lend themselves to sneaker net operations.
But why? WiFi is everywhere now. Wouldn’t it be great if you could hack those devices with SD slots to use WiFi? Apparently 3D printer [extrud3d] thought the same thing and found a way to reconfigure a Toshiba FlashAir card to put his 3D printer on the network.
The card is aimed at consumers, so by default it creates a hotspot and waits for a connection, a rudimentary web app allows you to move files back and forth over the network to the SD card which is then read by the host device. However, [extrud3d] shows how to modify a file on the SD card’s file system to allow the device to hook up to an existing wireless network and also provides a Python script to make the file transfer easier.
Although this hack is for a 3D printer, it ought to work with most devices that have a full sized SD slot (or can be adapted to take a full sized card). Since the hack is nothing more than changing a text file, it is a lot easier than some other SD hacks we’ve covered. Over on hackaday.io, [Chris Jones] has recently done some hacking on the FlashAir and has a list of its shell commands if you want to go beyond the text file hacks.
Continue reading “Hacking an SD Slot for WiFi”
No one wants to design consumer electronics that last longer than a few years. This trend is an ecological disaster, with millions of tons of computers, printers, fax machines and cell phones ending up in landfills. In these landfills, all the lead and chemicals used to extract minuscule amounts of gold plating leech into the environment. Turning it all around is monumental, but reusing some of this waste can help make a difference.
[Masterperson] and [Maaphoo] have been working on a way to turn those tons of e-waste into something useful. They’ve come up with a framework for turning e-waste into 3D printers. With a clever application of Python and FreeCAD Macros, this project can generate a model of a 3D printer using motors, shafts, and bearings taken from discarded 2D printers.
Right now a printer can be configured by adding the parts you have on hand to a configuration file, running a Python macro in FreeCAD, and waiting until the macro generates the parts to build a cartesian bot. This macro also spits out the files for the parts that need to be printed, and can interface with Plater to optimize the placement of these printed parts on an existing printer.
It’s a very cool project, but it’s not done yet: the team is looking for help to refine the printer designs and possibly growing more designs than a simple cartesian bot. Anything that is explicitly designed to pick the meat off of 2D printers is a great idea, and turning those into real 3D printers is the cherry on top.
Even with the cost of 3D Printers continually falling, entering the hobby still requires a significant investment. [Skeat] had some typical 3D Printer components available but didn’t have access to a printer for making the ever-so-common frame parts of typical RepRap designs.
[Skeat’s] plan was to cobble together a printer just good enough to print out parts for another, more robust one. The frame is made from wood, a very inexpensive and available material. The frame is not screwed together and doesn’t have any alignment tabs, it’s just hand cut pieces glued together. Each portion of the frame is laid out, aligned with a carpenter’s square and then glued together. This design and assembly method was intentional as [Skeat] didn’t have access to any precision tools. He stated that the only parts of the frame that had to be somewhat precise were the motor mount holes. The assembly process is well documented to aid anyone else looking to make something similar.
In addition to the wooden frame, all of the components are glued in place. That includes the bearings, rods, limit switches and even the Z axis motor! After seeing the photos of this printer, it would be easy to dismiss it as a poor performer. The below video shows that this printer’s print quality can keep up with any hobby level machine available. We wonder if [Skeat] is rethinking making another since this one works so well.
Continue reading “Wood & Glue RepStrap Works Surprisingly Well”
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737952309.80/warc/CC-MAIN-20151001221912-00141-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 9,845
| 27
|
http://sequence.complete.org/node/160
|
code
|
News about Haskell
Skip to content
Request new password
Thiago Negri: Personal website
Yesod Web Framework: Use Stackage for docs
Lennart Augustsson: A commentary on 24 days of GHC extensions, part 3
articles/fbut.md at master · quchen/articles
Ken T Takusagawa: [ojorjgmk] 1D Lego fractal
Lennart Augustsson: A commentary on 24 days of GHC extensions, part 2
Things that amuse me: A commentary on 24 days of GHC extensions
Software Simply: LTMT Part 3: The Monad Cookbook
Introduction to Haskell - Lecture 11
Episode 2 - Snap - School of Haskell | FP Complete
The Web Problem, and solving it in Haskell
mightybyte: LTMT Part 3: The Monad Cookbook
Danny Gratzer: Treating Programs like Vending Machines
Haskellの機械学習ライブラリHLearn - Qiita
John C Reynolds Doctoral Dissertation Award nominations for 2014
Zélus : A Synchronous Language with ODEs
Why the presence/absence of the HsColour binary forces to recompile the QuickCheck library?
The next 7000... abstractions to learn!
Static indices for speedy array-based algorithms
Getting Parse Error...
Treating Programs like Vending Machines - Notes on Coinduction
Informal Poll of Under-Documented Haskell Topics
http-client-streams: io-streams for http-client, w/ openssl
Implementing Language Engine - Paraphrases and Lexical Decomposition
Gave my talk on an introduction functional programming with Haskell
Use Stackage for docs
24 Days of GHC Extensions: Scoped Type Variables (guest post by Tim Docker)
Newbie questions on Applicatives, Types and Typeclasses
We believe that adoption of functional programming will drive wider adoption of lightweight formal methods such as VDM. In return, formal methods could serve as the design method and language for functional programming. Would you agree and/or comment?
A commentary on 24 days of GHC extensions, part 3
Pathfinding benchmark of ARM for several compilers, including GHC
24 Days of GHC Extensions: Existential Quantification (guest post by Roman Cheplyaka)
You are here:
» Novice Questions
Submitted by metaperl on Wed, 04/05/2006 - 4:19pm.
For a function
fn (x:xs) ...
what happens if it is called like this
A convenient way to alias a type is how?
type String = [Char]
to post comments
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770829.36/warc/CC-MAIN-20141217075250-00082-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 2,215
| 44
|
https://3dologic.blogspot.com/2022/06/
|
code
|
How many micro sprites could the 3DO handle?
Long time ago, I had watched the Atari Jaguar demo Facts ( https://www.pouet.net/prod.php?which=50467 ). It was boasting the power of the Jaguar using the object processor to push as many sprites as possible. I was quite impressed back then and wondered whether it will be possible to do the same thing in 3DO. I started a project loading an image similar in size and bit depth as the one in Jaguar, but this time it was a different animal. Assuming the mascot of the 3DO is a gecko lizard. The total image size is 192*160, it's in 16bpp and broken into pieces of 4*4 pixels, totalling 1920 sprites. For now I tried to implement the second part of the Jaguar demo btw, I could try the spirals part in the future. The result of my attempts is here, now reaching 80fps when vsync is off! But it wasn't the case initially. The earliest performance was 40fps. The animation code running on CPU would go over it alone at 109fps (when disabling the rendering of the CELs but still repositioning th
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00210.warc.gz
|
CC-MAIN-2023-14
| 1,036
| 2
|
https://apple.stackexchange.com/questions/72913/cannot-delete-shared-files
|
code
|
I have Vmware Fusion 4 on my Mac. I used it for work for awhile and had windows 7 installed and was joined to a AD Domain. When I left the company I had to un-join it from the Domain. Now, I cannot delete files that were shared between the mac (iOS 6) and Windows. How can I change the permissions so I can clean up my mac?
You should be able to turn off folder sharing between the VM and the Mac using Fusion's "sharing" settings and then shut down the VM. After that, you should be able (from the Mac Finder) to move the shared folder to the Trash. You may need to type an administrator password in the process, but that would be an administrator for the Mac host, which is presumably you.
If that doesn't work, please provide more details, such as where the files are as seen by the VM, where the files are as seen by the Mac, and what happens when you try to delete the files from the Mac.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107892710.59/warc/CC-MAIN-20201026234045-20201027024045-00397.warc.gz
|
CC-MAIN-2020-45
| 893
| 3
|
https://blog.softwareoperability.com/tag/operational-features/
|
code
|
I gave a talk at DevOps Summit Amsterdam on 14 November 2013 on Software Operability and Run Book Collaboration; here are the slides.
Thanks to Unicom Seminars for organising the event, and to all the attendees for some great questions and conversations over coffee.
The run book (or system operation manual) is traditionally written by the IT operations (Ops) team after software development is considered complete. However, this typically leads to operability problems being discovered with the software, operational concerns having been ignored, forgotten, or not fully addressed by the development (Dev) team. If the software development team writes a draft run book or draft operation manual, many of the operational problems typically found during pre-live system readiness testing can be caught and corrected much earlier. Because the development team needs to collaborate with the operations team in order to define and complete the various draft run book details, the operations team also gains early insight into the new software. Channels of communication, trust, and collaboration are established between the traditionally siloed Dev and Ops teams, which can help to establish and strengthen a DevOps approach to building and running software systems.
Do not carve the run book in stone; focus instead on the collaboration needed to write the draft.
I will be talking about run book collaboration at DevOps Summit in Amsterdam on 15 November 2013.
The book Patterns for Performance and Operability by Ford et al is one of the few publications which addresses directly the operability of business software (which is partly why I am writing Software Operability: A Guide for Software Teams). Patterns for Performance and Operability (‘PPO’) is an excellent volume, containing many valuable insights into the ways we can improve the operability of software systems; this blog post explores a few of the key themes and ideas found in the book.
Using the term ‘non-functional requirements’ to describe aspects of software systems which are invisible to the end-user but essential for effective service operation is counter-productive; we should instead use ‘operational requirements’ or ‘operational features’, and schedule these for delivery alongside end-user features.
Update: the Experience DevOps workshop series now has sessions on Software Operability – find out more at http://experiencedevops.org/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499967.46/warc/CC-MAIN-20230202070522-20230202100522-00399.warc.gz
|
CC-MAIN-2023-06
| 2,431
| 8
|
https://www.mangolassi.it/tags/mangolassi
|
code
|
When if first joined ML there were no spammers (at least to my knowledge) where did they all come from?
Why do companies push their employees to spam and such on Thread websites?
Sounds like a great way to push people away from you product.
Because it costs them next to nothing to spam hundreds of websites.
And it only takes one sucker to click through and make that phone call to earn a profit.
Yeah, some quick math...
A full time spammer can be hired overseas for $300/mo. That's a MONTH. And that's high, $200 is definitely plausible. All they have to do is join websites, post pre-written spam copy. Simplest job ever. They can spam maybe 100 communities a day. That's 2,800 a month. Out of 2,800 posts, it would take maybe an average of five "customers" to cover the cost of that for really cheap software.
That's a very important feature in case ML is getting bigger. It should default to no alerting at all but let you subscribe to some threads. Exactly like SW. Everything else is a notification overkill.
I think that it does that. Both let you turn on subscribe by default or subscribe manually only.
Did you change the new user default notification to be off? At one point the default for new users was on.
Default is currently email responses to subscribed threads, same as Spiceworks. Uses can manually change it to whatever they want. And they can change how subscribes work. Right now, if you respond to a thread, you get subscribed.
My feeling on that is that it is important for casual or new users to have it like that or they post and forget and they don't realize that we have responded or can't find their thread again. Those that are around a lot can easily make the change and customize.
I'm certainly open to other ideas, but I've thought about this around expectation and practicality and it seems like getting responses by default for new users is important.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00025.warc.gz
|
CC-MAIN-2022-33
| 1,887
| 13
|
https://www.brainkart.com/article/Thermodynamic-processes-and-its-Types_34778/
|
code
|
The method of operation which can bring about a change in the system is called thermodynamic process. Heating, cooling, expansion, compression, fusion, vaporization etc., are some examples of a thermodynamic process.
A thermodynamic process can be carried out in different ways and under different conditions. The processes can be classified as follows:
The process in which the system and surrounding can be restored to the initial state from the final state without producing any changes in the thermodynamic properties of the universe is called a reversible process. There are two important conditions for the reversible process to occur. Firstly, the process should occur infinitesimally slowly and secondly throughout the process, the system and surroundings must be in equilibrium with each other.
The process in which the system and surrounding cannot be restored to the initial state from the final state is called an irreversible process. All the processes occurring in nature are irreversible processes. During the irreversible process the system and surroundings are not in equilibrium with each other.
An adiabatic process is defined as one in which there is no exchange of heat between the system and surrounding during the process. Those processes in which no heat can flow into or out of the system are called adiabatic processes.
This condition is attained by thermally insulating the system. In an adiabatic process if work is done by the system its temperature decreases, if work is done on the system its temperature increases, because, the system cannot exchange heat with its surroundings.
For an adiabatic process q = 0
An isothermal process is defined as one in which the temperature of the system remains constant, during the change from its initial to final state. The system exchanges heat with its surrounding and the temperature of the system remains constant. For this purpose the experiment is often performed in a thermostat.
For an isothermal process dT = 0
An isobaric process is defined as one in which the pressure of the system remains constant during its change from the initial to final state.
For an isobaric process dP= 0 .
An isochoric process is defined as the one in which the volume of system remains constant during its change from initial to final state. Combustion of a fuel in a bomb calorimeter is an example of an isochoric process.
For an isochoric process, dV= 0.
When a system returns to its original state after completing a series of changes, then it is said that a cycle is completed. This process is known as a cyclic process.
For a cyclic process dU = 0, dH = 0, dP=0, dV=0, dT=0
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00600.warc.gz
|
CC-MAIN-2023-40
| 2,637
| 15
|
https://github.com/sniklaus/bookmark-tab/issues
|
code
|
The extension will not work from firefox 57 onwards
Jun 21, 2017 by
Using about:bookrect as my home page loads with an error on Firefox startup.
Mar 17, 2017 by
Options buttons don't do anything on Firefox 49.0.1
Oct 11, 2016 by
ProTip! Updated in the last three days: updated:>2019-06-23.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000613.45/warc/CC-MAIN-20190627035307-20190627061307-00245.warc.gz
|
CC-MAIN-2019-26
| 289
| 7
|
https://knowledge.broadcom.com/external/article/4752/some-probes-cannot-start-if-connection-b.html
|
code
|
Connection between hub and robot will be only via TLS if [Cipher Type] (on v7.8 Hub AC UI Reference > Advanced > SSL or v7.8 Hub IM GUI Reference > General Tab > Hub Advanced Settings > SSL Advanced Settings) is "AES128-SHA256".
However, some probes (example: cdm, processes, nas) cannot start with this setting.
Currently these probes do not support TLS.
cdm, processes, ntevl, logmon, rsp, nas, and so on.
User needs to set the [Cipher Type] to be "AES128-SHA256:RC4-SHA" for enabling SSL if those probes are necessary.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735882.86/warc/CC-MAIN-20200804191142-20200804221142-00003.warc.gz
|
CC-MAIN-2020-34
| 521
| 5
|
http://truthfullyhavenoidea.tumblr.com/
|
code
|
Original storyboard sketch by Chris Palmer. Finished design by Christie Tseng. Character tones by Sylvia Filcak-Blackwolf. Background paint by Emily Tetri.
Remember when floppy disks could save/destroy the world?
1MB was a dangerous thing
An England fan throws a paper airplane from the top tier of Wembley and it hits one of the Peru players | view from the crowd
This was a historical and monumental feat in the world of aerodynamics, one of the greatest things I’ve ever seen
I've learned everything! And I had to learn it on my own.
The moment you realize that Ozai banishing his eldest son was the best thing he could have done for him.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997892084.13/warc/CC-MAIN-20140722025812-00142-ip-10-33-131-23.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 643
| 7
|
https://connectwww.com/infiniteshooter-vertical-shooter-game/64246/
|
code
|
InfiniteShooter is a free and open source vertical shooter game for Linux, Windows and MacOS. It is written in GDScript and released under GNU General Public License v3.0. It is made in the Godot game engine. In the vertical shooters, the action is viewed from above and scrolls up the screen. In this game you need to shoot down all your enemies.
InfiniteShooter is available as a flatpak package from flathub. If you don’t have flatpak and flathub, then first install them. After that restart your system. Follow below link for flatpak and flathub installation tips.
Now in your terminal application (ctrl+alt+t) run below InfiniteShooter flatpak install command. It will install the latest version of InfiniteShooter.
flatpak install flathub io.github.pastthepixels.InfiniteShooter
After the successful installation of this game you can open it via below command.
flatpak run io.github.pastthepixels.InfiniteShooter
You can also uninstall InfiniteShooter
sudo flatpak uninstall io.github.pastthepixels.InfiniteShooter
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102697.89/warc/CC-MAIN-20231210221943-20231211011943-00106.warc.gz
|
CC-MAIN-2023-50
| 1,022
| 8
|