url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://kmandla.wordpress.com/2010/06/03/compiling-effortlessly-sort-of/
|
code
|
It took me a while, but I finally ironed out my upgrade from kernel 188.8.131.52 to 2.6.34 this morning, on my Pentium machine. Ordinarily I don’t wait so long to make a jump, but things were going very well with 184.108.40.206, and since there is rarely any good reason to shift up, I let it stagnate for a while.
But fear of obsolescence is a powerful thing, and realizing I had a kernel that dated back the better part of a year made me a little queasy. I know in the back of my mind that a 14-year-old machine has little to benefit between a kernel written in September 2009 and one written a few weeks ago, but it seemed worth the effort.
Not that it was a huge effort though. Usually I roll configuration between kernels with
make oldconfig, but this time I started from a clean page, and pruned out all the unnecessary parts. It took me a little while to fine-tune the framebuffer and a network parts, and the sound was the last thing I needed to fix. And now it’s done.
The odd part of the entire experience, and the reason why I mention it here, is that while the machine is slowly and faithfully correcting the modules I set, there’s no slowdown or lag or performance hit. That’s strange to me because on other hardware, for example my long-running Inspiron, compiling or building a kernel more or less precluded using the machine outside of very trivial tasks.
But this Pentium barely notices. Memory use peaks around 22-29Mb (alongside all the other software I normally run) and the CPU is pegged at 100 percent of course, but I can still type at normal speed, switch windows in screen or ttys at the console, manage remote systems with ssh, etc., etc., and not notice any stutter or lapse.
I wonder why that is?
Of course, this is all moot point because it still takes 20 minutes to compile a single sound module, and most of a day and night to build an entire kernel. Praising it for not lagging while it meanders through the chore of building new software is like praising a snail for traveling in a straight line for a day. You’re still frighteningly slow, and hardly covered any distance.
But it does mean that troubleshooting is a little easier, even if it takes longer. I can wait 20 minutes for a module to build, see if it works, and then go back to what I was doing without waiting or needing to switch machines.
And all that being said, if there are a large number of packages to update or if there is a particularly large program to build (such as gcc), I yank the drive and connect it over USB to the fast computer. That’s why I bought the fast one, and I’m not such a glutton for punishment that I have to build software for days and days at 120Mhz. There are limits to my fanaticism. 😈
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864148.93/warc/CC-MAIN-20180621114153-20180621134153-00233.warc.gz
|
CC-MAIN-2018-26
| 2,729
| 10
|
http://stackoverflow.com/questions/8474922/extracting-id-string-from-gdataentry
|
code
|
I am playing around with Google's gdata API in python. More specificalyl, I am using the YouTube API, but I do not believe it will be relevant to this question.
I now have an object which is a subclass of GDataEntry and I am trying to get its id.
this fails as it cannot convert and Id object to a string. So I try:
which serializes it to an XML string. What I really want is the textual content of the ID. I have been looking through the docs, and I was unable to find it so far. I am convinced this is really easy to do, but I cannot find the right method to get the text content of the Id object.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398458511.65/warc/CC-MAIN-20151124205418-00067-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 599
| 4
|
https://msdn.microsoft.com/en-us/library/vstudio/system.windows.markup.icomponentconnector(v=vs.90)
|
code
|
Provides support for named XAML elements and for attaching event handlers to them.
public interface IComponentConnector
Interfaces cannot be used directly in XAML; see types that implement this interface.
The IComponentConnector interface is not intended for use by anything other than the markup compiler.
This interface is implemented by the code generated by the XAML markup compiler.
Windows 7, Windows Vista, Windows XP SP2, Windows Server 2008 R2, Windows Server 2008, Windows Server 2003
The .NET Framework and .NET Compact Framework do not support all versions of every platform. For a list of the supported versions, see .NET Framework System Requirements.
Supported in: 3.5, 3.0
(1500 characters remaining)
Thank you for your feedback
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929003.41/warc/CC-MAIN-20150521113209-00035-ip-10-180-206-219.ec2.internal.warc.gz
|
CC-MAIN-2015-22
| 744
| 10
|
https://lists.freedesktop.org/pipermail/platform/2004-December/000119.html
|
code
|
My monthly 'oh yeah, the platform' mail
mike at navi.cx
Wed Dec 22 19:05:52 EET 2004
> This LSB process *should* be more conservative even than
> freedesktop.org. Though they have been moving somewhat too slow on the
> desktop front, that's largely due to lack of volunteers and assistance
> from what I've seen. Because the LSB goes further than just releasing
> the software, and creates validation tests for ABIs (to be sure they
> didn't change) and for ISV apps (to be sure they don't have extraneous
> dependencies) it simply takes some work. But this stuff is useful.
I have to admit, I'm not convinced about the value of LSB-level
validation tests especially given the momentum problems they seem to
bring. Any upstream project which is committed to stability:
a) Should be reviewing patches to make sure they don't break apps,
which obviously includes "don't rename or remove symbols"
b) Ideally has these interface tests already written
I hesitate to call them ABI tests because really what you want is a
stable programmatic, binary and semantic interface. Focussing purely
on the ABI is missing a ton of things that can break programs (eg,
most of the old Loki games are now broken due to various changes, not
all ABI related).
> Another way to look at LSB: they are not releasing software. They're
> releasing a contract-enforcement layer between the ISV and the software.
> This is a fundamentally different thing from a
> freedesktop/X.org/GNOME/KDE release.
To be honest I don't think the LSB can do much if a particular piece
of software does not have upstream maintainers committed to
stability. So I'd rather have an LSB that specified less but contained
more, ie delegated more to upstream maintainers who "got" the
As it is even the X libs which are in the LSB 2 graphics spec are too
limited. For instance the Java JVM broke because libXp was moved into
x11-deprecated-libs, and libXp isn't a part of the LSB.
> A danger for the open source desktop is that ISVs look at the huge
> collection of libraries available in your average distribution, use a
> few of the ones that "everyone" knows are crap, and are turned off when
> they get shafted by the decision. There's really no good guidance on
> which of the zillion things in /usr/lib are considered OK. And for all
> of them you can find some nitwit on the Internet who will say it's the
> best thing ever.
> This is why having a line where we say "these are the libs to use" is
> useful. But that line has to be oriented toward *keeping ISVs from
> getting shafted* not toward *getting ISVs to use half-baked gee-whiz
Absolutely, agree 100% with this. Problem is right now the only
document that comes close is the LSB which doesn't cover anywhere near
the amount of functionality modern apps require. So ISVs (like Sun)
still depend on libs which look safe like libXp that then disappear,
because they have no choice.
By implication that means any such list of stable libraries has to be
Let's say that we ran with Havocs suggestion and put fontconfig in any
such freedesktop.org platform. What does this really mean? Obviously
it means that you can depend on it being present if you depend on FDOP
1.0, as toolkits/desktops and maybe apps will, but does it mean:
- fontconfig will maintain a stable library interface
- fontconfig command line utilities will remain stable (ie, not remove
or change options)
- fontconfig XML config file will remain stable
etc. What are Keiths plans for this code long term? What sort of
guarantees does being in the platform imply? Same questions apply to
any specs put into the platform as well of course.
I've seen quite a lot of discussion about how to decide what goes in
and what stays out. Maybe I missed it, but where is the list of what
being in means for a particular project?
More information about the platform
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948563083.64/warc/CC-MAIN-20171215021156-20171215041156-00123.warc.gz
|
CC-MAIN-2017-51
| 3,832
| 63
|
https://www.alfredtong.com/apple-2/macos-no-matching-key-exchange-method-found-offer-diffie-hellman-group1-sha1/
|
code
|
Are you getting this error message when connecting to a SSH Server from your MACOS?
Unable to negotiate with x.x.x.x port 22: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1
Since the upgrade of El Capitan (10.11) to Sierra (10.12), MAC OS has upgraded their OpenSSH version from 6.9 to 7.2. This change deprecated a number of algorithms by default. This included diffie-hellman-group1-sha1 which is used on most Cisco routers, firewalls and switches.
In order to enable legacy support, perform the following.
- Edit or create a new file
- Put this entry in the file
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00226.warc.gz
|
CC-MAIN-2023-50
| 597
| 6
|
https://linuxx.info/installing-linux-on-a-laptop-with-windows/
|
code
|
Linux without problems is put and external devices, be it USB flash drive or external hard drive that I wanted to do the opposite. Today I would like to describe in your setup script dual boot the OS with full UEFI support, and to consider separately the installation of Linux.
Overview designed for experienced users, I will not describe in detail the installation of windows in the network and so lacking in detail will consider only the options of Linux installation. Also to warn you that this is not a standard configuration and the following actions can result in damage to the BIOS.
Installing Linux on a laptop with Windows
After the spring update Windows and Fedora I have once again felt the desire to post them on different disks, although in General Windows update problem with the loader is not called.
So we have:
Next I’m going to install Windows 10 on an external hard drive and Linux on the laptop (preferably independently from each other). Linux is the default, and on an external hard drive(NTFS) are personal files and this version for me the best.
With a little searching online, I with surprise for myself found out that quite a Windows now installs on external hard drive how to install linux on the laptop I will describe next.
1. Installing Windows 10 on a laptop
The first home we put Windows 10 single language( in my case Win10_1903_V1_Russian_x64.iso used official image) on a laptop, if not already set. Describe in detail the process I will not, I will simply note that the marked disk in the GPT format. Settings BIOS: Boot Mode – UEFI, Secure Boot Disabled. Installation was carried out in UEFI mode.
2. Installing Windows on external drive
Next we need to install Windows on an external drive. Here too I didn’t make anything up, the network has a lot of instructions and using the terminal and the program WinNTSetup set up the same home Windows 10 single language(Win10_1903_V1_Russian_x64.iso) to an external drive, here again the same disk marked (or converted if necessary) to GPT. The BIOS settings are the same Boot Mode UEFI, Secure Boot Disabled. Installation was carried out in UEFI mode, the external drive connects via USB 3.0 port.
In the end, if all goes well we have a Windows application installed on the external drive (disk 1) volume 4 (C:) that runs from the BIOS and starts directly with his boot.
3. Removing Windows from the laptop
The Windows are finished and we have two systems. Now install Linux on the laptop. I used Fedora(F30-WORK-x86_64-LIVE-20190628.iso) and bootable USB flash drive made with Fedora Media Writer, it makes a versatile USB flash drive that is loaded in the MBR and GPT. If you write another system and(or) to record on another(for example Rufus) note that the bootable flash drive needs to be a Live USB (to disk) and recorded in UEFI mode.
Disconnect the external drive and boot with a Live USB Linux. Trust the installer, I did not and decided to do everything manually. Install and run Gparted or Parted in the terminal(whatever you prefer).
As you can see in the beginning of the disk has hidden partitions and the windows boot loader /dev/sda1, /dev/sda2, /dev/sda3 (Volume1,Tom2 when viewed from windows), you can not touch them (windows from the external drive without them will not boot). Remove everything else, the Windows system partition C and if there are other NTFS partitions(D,E), it will be /dev/sda4 /dev/sda5 I have no pictures from an already installed Fedora, but the point I think is clear. Reboot and start the installation.
I used two different ways to install and I have both. In detail will review them, maybe not in all distributions both will work or the first way someone will like more.
Method 1. A normal Linux installation
Installing Linux on a laptop with Windows held in a UEFI with disabled Secure Boot (though it is supported by Fedora). The default in /boot/efi partition(/dev/sda2) exhibited flags boot, esp – here is the Windows boot loader here we prescribe and loader when installing Fedora.
Make the markup as in a normal Dual boot (Fedora). Create a /boot partition, specify the mount point for the ESP partition to /boot/efi(/dev/sda2) (not formatted otherwise, all is lost), creates a root if necessary, swap, /home, install, perezgrueso.
Loaders Windows and Fedora will be written to the same partition /boot/efi. When enabled, the reboot selection menu Grub will display the Fedora boot loader Windows Boot Manager (although Windows on the drive there). In the end, Fedora boots and runs, while Windows connects to the USB port is enabled through BIOS and starts directly.
This method works and systems spread across different disks. But to me this method is not very much, it is still “hanging” dual boot menu while booting, also if the damage, accidental formatting, updated /boot/efi partition, windows can not be loaded ( repair on two flash drives Windows boot loader installed on the external drive I’m not sure what will happen) and I went on.
Recently I played with Fedora Silverblue, and there developers are advised when failed to multiboot to create additional ESP partition and install the bootloader on it, something like I decided to apply in this case.
Method 2. Install Linux with a separate boot partition
As in the first case, boot with a Live USB, run Gparted, we need the first three partitions /dev/sda1, /dev/sda2, /dev/sda3, the rest being removed. The flags section of /boot/efi(/dev/sda2) is replaceable with a boot, esp on a hidden, diag (hide it).
Reboot, start the installation.
Make the markup as in a normal single Fedora installation. Create a /boot, create a new /boot/efi partition(200МиБ not to confuse), create the root, swap, /home, install, reboot.
Fedora this installation starts immediately in Plymouth, without a timeout and the grub screen as the only system on the device, with the new ESP partition /dev/sda4. created by the Fedora installer, “old” ESP partition /dev/sda2 is not mounted as you can see.
Windows also connects to the usb port and is enabled via the BIOS. Both systems spread across different disks and have their own independent sections download. On the laptop now installed Linux (maybe any? or more? I haven’t tried), but Windows you can safely upgrade without fear of overwriting the Linux boot loader and enable as needed.
This way I liked more and I use it now. So now looks like Fedora:
That’s the simple way to look at the new dual boot. If you want you can make a backup of the EFI directory on /dev/sda2. It is worth noting also that the windows on the external USB drive is loaded longer and is slower than internal HDD, but it works quite a well. If you have any questions ask in the comments!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540484815.34/warc/CC-MAIN-20191206050236-20191206074236-00178.warc.gz
|
CC-MAIN-2019-51
| 6,719
| 31
|
http://stackoverflow.com/questions/17365539/can-we-connect-finger-print-reader-to-android-using-android-odk-sensor-framewor
|
code
|
I learning ODK with android Application and I know, to store the users information from android mobile to Google App server. you can view details of the users information using the Google fusion table.
Open Data Kit (ODK) is a free and open-source set of tools which help organizations author, field, and manage mobile data collection solutions on online server. eg: Google App engine. you can also view the received data in Google fusion table.
You can refer the link : http://opendatakit.org/ for more detail
My doubt is :
ODK also has sensor framework to support out app with various sensor devices .
I want to Know
Is it possible to connect fingerprint device using ODK sensor framework with our android application
is it possible to get the an finger print image of a user using android mobile device.
please send me a link to get the finger print image of a user while he registering his detail.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298080.28/warc/CC-MAIN-20150323172138-00170-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 901
| 9
|
http://community.us.playstation.com/t5/PlayStation-General/psn/td-p/39592195
|
code
|
Would you be willing to answer a few brief questions about PlayStation Forums?
I got it too, it's real. $10.00 added to wallet
halfdemon43 wrote:I did but is it a scam?
Grand_Moff wrote:Does the sender have a blue PSN emblem next to their name? If no, it's some lame spam chain.
wheres my free money?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608648.25/warc/CC-MAIN-20170526071051-20170526091051-00497.warc.gz
|
CC-MAIN-2017-22
| 300
| 5
|
https://packagist.org/packages/melisplatform/melis-site-translation
|
code
|
Melis Platform Site Translation module
MelisSiteTranslation allows to manage the text translation of every module.
These instructions will get you a copy of the project up and running on your machine.
You will need to install melisplatform/melis-core, melisplatform/melis-cms and melisplatform/melis-engine in order to have this module running.
This will automatically be done when using composer.
Run the composer command:
composer require melisplatform/melis-site-translation
Database model is accessible on the MySQL Workbench file:
Database will be installed through composer and its hooks.
In case of problems, SQL files are located here:
- Site Translation tool
Provides services to translate text and list all translations
//Get the service $melisSiteTranslationService = $this->getServiceLocator()->get('MelisSiteTranslationService'); //translate a certain text using translation key(eg. tr_translation_name) //$langId - (optional) language id $translatedText = $melisSiteTranslationService->getText($key, $langId);
- Melis Technology - www.melistechnology.com
See also the list of contributors who participated in this project.
This project is licensed under the OSL-3.0 License - see the LICENSE file for details
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145941.55/warc/CC-MAIN-20200224102135-20200224132135-00508.warc.gz
|
CC-MAIN-2020-10
| 1,222
| 16
|
https://www.athospress.com/our-blog/archives/11-2017
|
code
|
Sinai became widely known, particularly in Europe, with the spreading of the fame and cult of St. Catherine. Symeon Metaphrastes contributed greatly in making the life of the Saint known to the laity when, in the 10th century, he wrote on “the martyrdom of the great Martyr and in the name of Christ victorious Saint Catherine”.
- Highly Recommended
- Our Writers
- ΚΥΝΗΓΩΝΤΑΣ ΤΗΝ ΕΛΕΥΘΕΡΙΑ
- ΦΥΓΕ ΟΠΩΣ ΕΙΣΑΙ #ΜΑΤΙ
- ΤΑ ΓΡΑΜΜΑΤΑ ΤΟΥ ΠΕΙΡΑΣΜΟΥ
- RAINEY DAYS
- A Visit to Mount Athos, November 1944
- ΜΕ ΤΟΛΜΗ ΓΙΑ ΤΗΝ ΕΛΕΥΘΕΡΙΑ
- Fathers & Daughters
- ΤΟ ΕΛΛΗΝΙΚΟ ΣΧΟΛΕΙΟ ΣΤΟ ΜΑΡΤΑΝΟ ΑΠΟΥΛΙΑΣ
- ΠΟΛΙΤΙΚΗ & ΗΘΙΚΗ ΚΩΝ/ΝΟΥ ΤΣΑΤΣΟΥ
- Coming Soon on your screen or a bookstore near you!
- Foreign Rights
- Our Blog!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058450.44/warc/CC-MAIN-20210927120736-20210927150736-00036.warc.gz
|
CC-MAIN-2021-39
| 856
| 15
|
https://www.wiresoft.com.au/client-access-license-cal/microsoft-cal-for-sql-server/cal-sql-server-2016/
|
code
|
New features and functions of SQL Server version 2016
Windows SQL Server 2016 provides organizations with a basic data management and business intelligence database that allows all employees with the appropriate CAL to run all business applications. SQL Server 2016 also supports multiple development tools - both local and cloud - and administrators benefit from efficient database management that requires minimal IT resources.
Higher performance of SQL Server 2016
The 2016 version of Microsoft SQL Server scores points not only for its flexible application possibilities but also for its optimized performance, from which users with a CAL benefit. The integrated in-memory capabilities available across all workloads deliver performance gains at speeds comparable to in-memory OLTP. Features such as Temporal Tables for historizing data and In-Memory Column Store and Query Store also improve the performance of SQL Server 2016.
Microsoft SQL Server R Services
The new SQL Server R Services from Microsoft now make the statistics language R usable for the SQL Server 2016. While previously data had to be exported from the SQL database and imported into R for analysis, users with a client access license can now execute all R scripts directly on the SQL Server. This not only shortens the time, but also increases security, as the transfer of sensitive data is no longer necessary.
Master Data Services for the administration of master data
Master Data Services in SQL Server allows users to efficiently manage a master set of their organization's data. MDS can be used to organize this data into models, create rules for updating them, and also determine who can update this data. The master data set can be shared with others using Excel.
Reporting Services (SSRS) for reporters
With a client access license, SQL Server Reporting Services provides a set of tools and services for creating, managing, and delivering mobile and paginated reports that employees can read via a browser on the Web portal or via email on a mobile device.
Analysis Services is a tool for delivering analytical data - for business and reporting services reports, or for third-party client applications or business intelligence tools. The Reporting Services in SQL Server 2016, on the other hand, provide a user with various functions for generating reports from different data sources and publishing them in various formats.
Microsoft SQL Server 2016 also has some significant improvements in terms of security: With Row-Level Security (RLS), owners of a CAL can implement certain restrictions in data row access. This can be used, for example, to ensure that certain employees can only access exactly those data rows that are relevant for them. This includes, for example, restricting corporate customers' access to data that is relevant to them.
Always Encrypted protects sensitive data, such as credit card or ID card numbers, stored in an Azure SQL or SQL Server database. Always Encrypted distinguishes between those licensed users who are authorized to view data and those who should be able to manage this data but not have access to it.
Dynamic Data Masking simplifies security coding in applications: DDM works by preventing access to confidential data by masking it for unauthorized users.
An overview of all important new features of SQL Server 2016:
- Enhanced cloud support by integrating stretch databases to connect between on-premises environments and the cloud
- Support for conventional OLAP (Online Analytical Processing) solutions
- Integration of the R programming language for statistical analyses with Advanced Analytics
- Row-Level Security (RLS), Always Encrypted Feature and Dynamic Data Masking increase security
- T-SQL (Transact-SQL) maximizes SQL server performance
- End-to-end mobile business intelligence is available for all mobile devices, whether Windows, Android or iOS smartphones, to publish reports with Excel 2016 or BI power
- PolyBase for processing Transact-SQL-queries from external data sources and extension of Business Intelligence with SQL Server Reporting Services (SSRS)
Hardware requirements for the installation of Microsoft SQL Server 2016
To ensure the smooth installation and operation of Microsoft SQL Server version 2016, the following minimum requirements should be met:
- Hard disk: at least 32 GB, SQL Server 2016 requires at least 6 GB hard disk space
- Memory: 512 MB minimum, 2 GB minimum for the installation option with desktop
- Processor: 64-bit with 1.4 GHz (or dual-core processor with at least 1.3 GHz or quad-core processor)
- Graphics card: Super VGA with a minimum resolution of 800x600
- Optical drive for installation from DVD
Additional hardware requirements depend on the system configuration and the pre-installed applications.
Licensing model with Client Access Licenses (CALs) for Microsoft SQL Server 2016
With the SQL Server version 2016, Microsoft has also introduced new licensing conditions. For certain editions of SQL Server 2016, you can choose between per-core licensing and licensing withClient Access Licenses (CALs) - either for users or devices. This differentiation makes server licensing more flexible and more economical. This eliminates the need for paid add-ons, because a CAL integrates all server functions available for an edition.
Licensing with CALs is generally the more cost-effective option, especially for small and medium-sized companies or organizations whose server offers a lower performance level in line with their needs, without having to sacrifice the functions and performance of SQL Server 2016. This licensing model is therefore best when the number of clients connecting to the SQL Server system is known. Even with a Device or User CAL, the individual requirements of each company for an IT system can be met.
Licensing of SQL Server 2016 through CALs
Licensing with CALs separates user use of SQL Server 2016 services from server software implementation. The server license only allows administrators to access the database management system. Employees require their own client access license - either in the form of a User CAL or Device CAL. Without either license, the server features and data cannot be accessed.
User CAL or Device CAL for SQL Server 2016?
The differentiation between User CAL and Device CAL for Windows SQL Server allows for flexible licensing - one user and one device license. Microsoft thus covers the two typical uses of Windows SQL Server 2016. A device license considers different ways of accessing the Windows than a user license:
With a Device CAL for Microsoft SQL Server 2016, you purchase a license for a single specific end device, which can be a desktop computer, notebook or mobile phone or tablet. Any user who has permission to use this device can use it to access SQL Server 2016. This licensing concept is therefore ideal for workstations that are used by changing employees.
With a User CAL, however, the SQL Server is licensed for a very specific user. This user can thus access its data and services from anywhere and with any Windows device - whether desktop PC, notebook or mobile device. User CAL is therefore the ideal solution for employees who work at different workstations - e.g. in the field or at different company locations - or who regularly use the home office or work on the road.
For both forms of client access, the licensing cannot be transferred to another terminal device or another user. Likewise, a User CAL cannot be used as a Device CAL or vice versa.
On the other hand, it is possible to use both User CALs and Device CALs for SQL Server 2016 in a company, i.e. to freely combine both types. This is particularly useful if both types of use are equally common there.
Device and User CALs for SQL Server 2016 inexpensive at Wiresoft
If you have questions about your customized licensing of Windows SQL Server 2016 with client access licenses - we will advise you individually on the most advantageous license combination for you. With the server access licenses available at Wiresoft you can easily cover or even extend your individual needs.
Wiresoft offers Device CALs as well as User CALs for the Microsoft SQL Server Version 2016 at a very reasonable price. These are original Microsoft licenses from companies in Europe, which have been checked by us for authenticity and absolutely perfect usability. As a customer, you benefit from the price advantage of unused software licenses, which we have purchased completely legally from trustworthy companies. Many of our customers already use this advantage. Please feel free to contact us at any time if you have any questions regarding your licensing with CALs for Microsoft SQL-Server 2016:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816535.76/warc/CC-MAIN-20240413021024-20240413051024-00829.warc.gz
|
CC-MAIN-2024-18
| 8,713
| 44
|
http://trilema.com/2019/thelastpsychiatristcom-a-quick-word-on-google-adnotated/
|
code
|
Dropping over 150 points in a few days is worth a comment.i
However, it is a high priced momentum stock, and as such is the first to elicit the "no way am I the last one holding this" feeling. You sell it, and suddenly [you're] $600 "richer."
I'm not a technician, but unfortunately everyone else on the planet it: when you see falls like that, you have to ask where does it stop? And the 200 dma is a good guess. So if you selling yesterday was illogical: 570 is a floor, because everyone believes it to be.
So I wait, earnings next week.
A word on the Fed: there is a not implausible case to be made that he is not reacting to the markets, as some say, or even "behind the curve" but is specifically targeting traders out of resentment. Example: the cut came Monday morning -- after options expiration, when all the money had already been lost. You say: well, that was a reaction to Europe; but he did the same exact thing in August, waiting until precisely after expiration to announce a discount rate cut. And the overall odd way of parcingii out information -- it appears designed for maximal pain. Just a thought.iii
Anyway, Google is still on track, soon to be the global supplier of personal information to totalitarian regimes everywhere.iv
(long GOOG, MO; short the Fed, humanity, truth, the Red Pill)———
- There have been a number of successive layers of "actual market being replaced by USG fantasy" to date, this 2008 sell-off being one among the many. [↩]
- Parcelling ? [↩]
- Everything always appears specifically designed for max pain, because max pain is a trading necessity. To the four year old everything similarily appears specifically designed for falling down -- we just call it gravity. [↩]
- Alphabet is actually fucked, but paper markets don't track reality. [↩]
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00298.warc.gz
|
CC-MAIN-2023-40
| 1,803
| 11
|
https://github.com/liamks
|
code
|
- Delivery.js 281 Asynchronous Bidirectional File Transfers For Node.js via Socket.IO
- Chatty 150 Adding Real-Time to Rails with Socket.IO, Node.js and Backbone.js
- rails-realtime 105 Adding Real-Time To Your RESTful Rails App
- pyitunes 93 Python Itunes Library parser
- Testing-Socket.IO 41 Testing Socket.IO with Mocha, Should.js and Socket.io-client.
Repositories contributed to
- DCSIL-summer-course/learn-git 0 A simple website, to help students learn git.
- DCSIL-summer-course/mean-blog 0 A Blog created with the MEAN stack
- DCSIL-summer-course/real-time-chat 0 A real-time chat app built with Socket.IO, AngularJS, ExpressJS and Redis.
- DCSIL-summer-course/rails-app 0 A clone of a popular microblogging platform.
Contributions in the last year 141 total May 1, 2015 – May 1, 2016
Longest streak 8 days July 13 – July 20
Current streak 0 days Last contributed
Apr 7, 2016
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860115672.72/warc/CC-MAIN-20160428161515-00058-ip-10-239-7-51.ec2.internal.warc.gz
|
CC-MAIN-2016-18
| 888
| 14
|
http://realmskipper.blogspot.com/2010/06/badge-of-honour.html
|
code
|
As most Plurkers know already, earning badges is one of the greatest appeals of Plurk, besides the people! So what I wonder is, is there a badge for everyone? The short answer is no.
But first lets consider all the types of badge there are, the creator of a Plurk community site badge, Nirvana badge, ones for profile views and number of invites, for Plurks and responses, and my own personal favourite, the translator badge; the only one I can’t attain!
One fault of Plurk; the little people need more help in contacting the Plurk Gods!
Not that I’m complaining, I’ll save that for my emails, for now I’m still fixated with attaining the one badge I can not get, the server seems to have looked me up and down and shouted, “Next Please” and turned away. Anyway if anyone can get that sorted or maybe recommend me for the badge I think I’m deserving of it.
Are some badges more worthy of working for than others? Depends on your favourite colour, taste in pictures and furthermore, your talents. Plurk has done a wonderful job at giving everyone the chance to earn at least two badges within a day, some encouragement for those lazy men and women everywhere!
In my opinion Plurk could still be improved badge wise by having ranked badges maybe, like military style, for me that would make it more interesting.
Also a badge for having Plurks with a certain number of responses would be shockingly fun, for other plurkers to compare, who knows someone just might make a million.
A final point on badge, which I’m sure everyone who has achieved 100 asks themselves, what next? The 100 Karma badge and smilies are a great bonus, but we want more! Or at least a way of keeping it at that Holy Grail of numbers, time to improve.
Finally a call to those proud bearers of the hacker badge, congrats on the badge, but it’s time to earn your title, get inventing, creating and improving, badges give us our title but we make Plurk our home.
Thank you all!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592861.86/warc/CC-MAIN-20180721223206-20180722003206-00553.warc.gz
|
CC-MAIN-2018-30
| 1,963
| 10
|
https://sourceforge.net/p/mesa3d/mailman/mesa3d-users/thread/399BE6EC.23C9AF49@technologist.com/
|
code
|
I run MDK7.1
Mesa-3.3 (from source)
Voodoo3 1000 AGP
q3demo runs fine
none of the demos work properly....if at all
I run gears and get a window with a ghostly image of rotating gears
I run the other demos and the ones that dont close imediately show a
similar ghostly version of themselves
I should point out, what I see seems to be at a good speed
but in shades of white and grey.
I will forward a screenshot to who wants it.
thanks for any help
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822625.57/warc/CC-MAIN-20171017234801-20171018014801-00007.warc.gz
|
CC-MAIN-2017-43
| 446
| 12
|
http://www.andreaswellnessnotes.com/2010/03/are-you-too-connected.html
|
code
|
In today’s post on Career Action Now, I talk about the importance of taking frequent tech breaks. I also give some suggestions on how to make sure you’ll take the breaks you need to be well on a daily, weekly, and yearly basis. Finally, I remind the reader not to forget about in-person connections when exploring jobs or looking for a new job. Head over there if you are interested.
Yesterday, the toddler and I disconnected for a good part of the day and explored a beautiful outdoor mall. We had so much fun playing in the warm sunshine, and it was a joy seeing him almost all well again.
Questions: Do you unplug often enough? How many tech breaks do you take throughout the day, and what do you do? Are you ever truly disconnected?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122621.35/warc/CC-MAIN-20170423031202-00171-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 740
| 3
|
https://creditmusic.net/falling-song-tik-tok-compilation.html
|
code
|
Watch & download falling song tik tok compilation MP4 and MP3 now. You can download free mp3 or MP4 as a separate song, or as video and download a music collection from any artist, which of course will save you a lot of time.
Like and subscribe for more. Also make sure follow me o insta. ▶ https//tbm191lnkto/filya this track is going viral on tiktok so we decided to share the best ones.
To support me in paypal click on thr link. #trevordaniel #falling #dance #tiktok #nofacenocase #dababy #toes #lilbaby #moneybagg #meettherodz #ritmo #younglegendzcrew. Tried to make it best as possible you guys.
Hey wassup guys, i know this is like a day late, video comp meant for friday. Please like and subscribe for more compilations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704833804.93/warc/CC-MAIN-20210127214413-20210128004413-00792.warc.gz
|
CC-MAIN-2021-04
| 730
| 4
|
https://www.nico.fi/en/find-a-job-in-it
|
code
|
THE MOST INTERESTING IT JOBS
We are the best place to work for an entrepreneurial-minded IT specialist. Here you can get the most out of your expertise, work independently and enjoy the freedom afforded by responsible work. We also provide competitive pay based on client billing. You can be employed either through us or directly by the client.
We are constantly looking for IT professionals and our open jobs can be found below. If there are no suitable jobs available right now, please send in your open application! We will contact you as soon as a suitable client project has been found.
Please feel free to use our CV template. You can download the template from here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00129.warc.gz
|
CC-MAIN-2024-10
| 674
| 4
|
https://phabricator.wikimedia.org/p/Prtksxna/
|
code
|
I just want to stand on land.
- User Since
- Oct 9 2014, 1:53 AM (258 w, 5 d)
- IRC Nick
- LDAP User
- MediaWiki User
Thanks for all the clarifications, @MusikAnimal!
I am thinking we should clearly mark the parts of the page on which WhoWroteThat won't work (Templates, Images, Tables?). A way to do that would be to reduce their opacity which would make them look disabled. We can choose to have no mouse events on them so that people don't accidentally click on them and navigate away when they actually expected to see the popup.
Tue, Sep 17
So if I understand correctly, the users who haven't confirmed their email addresses see the following message (as does everyone else):
Mon, Sep 16
I am not familiar with some of the standards around the current NPP design, so, I had two queries:
- What is the difference between the red text that shows up after the title like "No Citations", "Orphan" etc. and Potential issues like 'Copyvio'? I don't understand the conceptual difference between the two.
- I see a few different icons before the title: , , . Should this change if the username is in the article?
Ah, that makes sense. I think lets keep it as is for now and figure out what needs to be done once we have results back from the usability tests.
The text wrapping looks good, I think we can go ahead with it. Thanks for posting the screenshot 👍🏽
Wed, Sep 11
Tue, Sep 10
Mon, Sep 9
@cscott would you be able cut a new release? Happy to do it myself if you can add me on NPM.
- Form states
The way to enable/disable this preference would be a checkbox in Special:Preferences. It'll only show up if the user has confirmed their email. I can think of two places where this setting could be:
Given that the edit summary could in some cases could load very fast (less than 100ms) we don't want a case where we flash the animation for a very small amount of time. I am taking some inspiration from the font-display browser behavior here.
@Samwilson, I think it would also be alright to increase the width of the pop-up enough to fit IPv6 addresses. There are currently two popups sizes in the Zeplin—250px and 320px. Which one is being used screenshot above?
The WhoColor tool currently uses the tabs on top-right, and is represented as a text item (in the same hierarchy as Read and Edit). As you mentioned, we have a few options on where to put this tool:
- Top-left tabs (Article | Talk | Who Wrote That)
- Top-right text tabs (Read | Edit | View History | Who Wrote That)
- Top-right icon tabs (Star icon | WWT icon)
- Tools sidebar
- User menu on the top right (I don't really think this is an option, but still noting it here)
Here is the example I had in mind — https://en.wikipedia.org/wiki/User:Prtksxna/citation-test.:
Thu, Sep 5
Should we regenerate the OOjs documentation to test before closing this task?
@ifried, I agree. Always having a full stop . would also be better when there is no edit summary to show.
Wed, Sep 4
Thu, Aug 29
Tue, Aug 27
If the edit summary is the only thing that we'll be waiting to load we could use a content placeholder with an animation, and then switch it out with the summary once we have it - https://codepen.io/prtksxna/pen/OJLmVXZ (data will load after 3 seconds)
Mon, Aug 26
Yeah, so the current loading state doesn't have the close icon. If we suspect that the tool can be in this mode longer than a few seconds we should definitely add a close button here as well.
So, will we need both partial and full loading states? What all would have already loaded in the partial state?
Ooh, thanks for this @MaxSem 🤩So the proportion of no(~¼), unconfirmed(~½), and confirmed(~¼) emails looks something like this:
Will the average (or median) be calculated since the page was created? Or will it be the average of that week or something?
Aug 21 2019
Aug 20 2019
Aug 19 2019
I can see how in its current form the target can be confusing. I see two main reasons for this:
- The hover state only changes the background color and the change isn't drastic so is easily missable.
- Since the button for the diff (the area we clicked to open the diff) and the revision target are touching each other its not clear if they're connected or separated. I clicked on it a bunch of times accidentally thinking that it'd close the diff.
Aug 16 2019
@ifried, does this still need any design work?
Aug 14 2019
@MusikAnimal, I didn't know about preload parameters, yeah that is exactly the kind of thing I was hoping for.
Aug 13 2019
|Issue||Time it'll take to resolve||Message|
|Page is too long, time out||Seconds||Something went wrong, Try refreshing the page|
|Page not yet in WikiWho database||Hours||We are gathering the data for this page now. Check back in a few hours.|
|Too many requests||Minutes||We weren't able to make this request. Try again in a few minutes|
Aug 12 2019
Thanks for all this information, @MusikAnimal 🤩
Aug 8 2019
Aug 2 2019
I don't really need this any more, so no need to help me debug 😊
Happy to provide more info if you'd like though.
Yup, the .env file is correct, and I am not trying to log in. When I try to navigate to - http://localhost:8042/File:Speech_bubbles.svg I get an error. Here is the stack trace:
Jul 27 2019
This should get deployed automatically in a while. Thanks for spotting and closing the issue, @Ammarpad 😊
Jul 24 2019
Disable clicking anywhere on the page while content loads from the WhoColor API
Jul 23 2019
Jul 22 2019
I agree the link icon would be misleading, and so would linkExternal. @Esanders, is it going to link to the template’s documentation? If so, then yeah, the helpNotice makes sense here.
Good idea @Mooeypoo! I've updated the screenshots above.
Thanks @Samwilson, that worked. Also, is there a workaround for the WIKI_URL if I don't have a local wiki?
This seems almost fixed now. The starting of the leaflet box and the input are off just by a pixel.
I see now, thanks @TheDJ! The ratio of the screenshot threw me off and I assumed it was a mobile.
Jul 18 2019
I took @Samwilson's help to understand this navigation a bit better. I now understand that the icon currently represents two states:
Blue bar to show up under the top tabs and should be sticky.
The maximum character limit for edit summaries is 500 characters, I think we'd be able to fit that. I am also considering making the popup wider if we do that.
We can choose whether or not to show the extra user information. With the visual representation of highlighting everything that the user has written I don't think its necessary.
Jul 16 2019
Jul 9 2019
Something like this?
Jul 8 2019
Jul 4 2019
Jul 3 2019
I am hoping that we can use the same blue bar to show different states of the tool. Ottawahitech had suggested that we don't cover the View History and Edit tabs, and I think that makes sense. We should however make it sticky so that its visible even when the user has scrolled down.
Thanks @Mooeypoo! Quick question, is it possible to have markup inside OOUI popups like headings and stuff, as is the case with GuidedTours?
@Mooeypoo I wanted to confirm that this wont be the actual GuidedTour since the code is outside of MediaWiki. Will we be able to style it however we like?
Jul 1 2019
No, it is resolved now. Sorry, I forgot to close it.
Jun 27 2019
Jun 19 2019
May 31 2019
@Niharika Do we want to support mobile screen sizes for the translation page too?
Lets add a label on top of the dropdowns ( "from:" and "to:")
How about we scroll the page down (enough to hide the header) as soon as an input gets focus?
May 30 2019
Could we please get tracking snippet that we can include in the page, thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572896.15/warc/CC-MAIN-20190924083200-20190924105200-00101.warc.gz
|
CC-MAIN-2019-39
| 7,611
| 100
|
https://digitalcommons.montclair.edu/linguistics-facpubs/5/
|
code
|
Interfaces in Linguistics: New Research Perspectives
Partee (1991) challenged the significance of the observation that certain adverbs (e.g., only) reliably associate with phonologically prominent words to truth‐conditional effect, noting second occurrence (i.e., repeated or given) focus (SOF) appears to lack a phonological realization. Rooth (1996), Bartels (2004), Beaver et al. (2004), Jaeger (2004), and Fry and Ishihara (2005) argued that, while not intonationally prominent, an SOF word can be marked by increased duration and/or increased rms intensity. An acoustic study of verb‐noun homophone pairs is reported. Three sophisticated speakers uttered five repetitions of the targets, embedded in discourses, in first occurrence (FOF), SOF, and unfocused (NF) contexts, both pre‐ and postnuclearly. Syntagmatic comparison shows a durational effect for focus and ordering in the FOF/NF case, yet only an effect of ordering in SOF/NF; similarly, an effect of spectral balance (H1‐H3) was found for FOF/NF but none for SOF/NF. Results suggest, contrary to previous assumptions, that simple durational difference is not a straightforward cue of prominence. Sluijter and van Heuven (1996) and Campbell and Beckman (1997) have shown spectral balance calculated by various means is a cue to focus; its absence in these data raises doubts that prominence is reliably produced (let alone perceived) on SOF words.
MSU Digital Commons Citation
Howell, Jonathan, "Second Occurrence Focus and the Acoustics of Prominence" (2009). Department of Linguistics Faculty Scholarship and Creative Works. 5.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201922.85/warc/CC-MAIN-20190319073140-20190319095140-00374.warc.gz
|
CC-MAIN-2019-13
| 1,601
| 4
|
http://www.sqaforums.com/forums/general-discussion/41723-pay-scales-indian-software-test-engineers.html
|
code
|
Pay Scales for Indian Software Test Engineers
Can the eliet people working in Software industry give details on the pay package for
Software Test Engineers in India? Is there any url which gives these details?
What would be the pay package for a person who has nearly 4 years of experience in software testing field?
Re: Pay Scales for Indian Software Test Engineers
In almost every organization I've been in, experience serves only as an expectation "setter" for knowledge. Salaries depend on whether one is an amateur, a learner, a producer or an expert.
In effect, in the same organization we could have 2 people with the same level of experience taking home two very different pay packets.
Typically automation experts who specialize in a certain tool/domain are worth the most.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00087-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 782
| 8
|
https://huddleiq.com/help-en/create-a-project/
|
code
|
How can we help you?
Create a Project
Projects allow you to group boards in any manner that suits you. Some common examples of grouping are:
- A project
- A major task
- A team
- A department
To get started, click the “+ New Project” button in the dashboard.
To create a private project, simply enter a name and click create; else, select “Shared” for options on configuring access.
Shared projects allow you to assign members that have access to the project and the boards it contains. Search or click members to add or remove.
Note: Members and their board roles may be changed at any time by Project Managers, and at least one member must be assigned a Project Manager.
Each added member may be assigned one of 4 project roles summarized below. For more information, review our article on project permissions:
- Project Manager: Has complete control of the project and may change any aspect of it and the boards it contains.
- Project Editor: May create and control any aspect of boards they create and edit other boards’ contents in the project.
- Project Commentator: May not create new boards, but may open boards in the project, contribute to chat, and make comments but otherwise may not edit the board.
- Project Viewer: May not create new boards, but may open boards, contribute to chat, but may not edit or comment on the board.
- Project Listing: Allows members not assigned to the project to see the project in the dashboard. If enabled and a non-project member clicks the project, then project manager details will be displayed, allowing the user to request access to the project.
- Project Members: Allows members not assigned to the project to see the members assigned to the project.
- Project Boards:Allows members not assigned to the project to see the boards in the project but does not allow them to open or change them in any manner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100399.81/warc/CC-MAIN-20231202105028-20231202135028-00379.warc.gz
|
CC-MAIN-2023-50
| 1,865
| 19
|
https://wehustle.cn/shanghai-city/search/events/workshop/intro-to-react-13928.html
|
code
|
- Date: 20 November 2019
- Time: 7pm - 9pm
Intro to React
About this Event
In this workshop, we will be covering the basics of React and how you can use it. You will build a "Reactive" todo application to and complete your tasks! You can tailor your application with features of your choice to best suit your purpose.
→ Understand React and why we use it→ Understand React's Component-based philosophy and Component lifecycle→ Build a "Reactive" application to manage your todos→ Add features which suit you best! This is a Workshop for Complete Beginners to jump start your relationship with React and it's possibilities (and yours).
This workshop will enable you to:
→ Get a solid beginners foundation of React
→ Understand the process of building React Components
→ Create interactive interfaces which "react" instantly to cues like user input
→ Basic HTML knowledge→ Basic JS knowledge
What to bring & preparation (Make sure this to-do list is completed)
[✔] Your laptop in your bag and charged
[✔] Google Chrome Downloaded (https://www.google.com/chrome/), installed and running on your computer
Look forward to meeting you soon!
Maria enjoys transforming creative ideas into responsive web applications. Since 2010, she has worked with both large and small agile teams to create digital products and develop MVPs. Currently, she's based in Shanghai, China, and she has since been a Lead Rails Mentor for the Le Wagon coding bootcamp in Shanghai, Chengdu, and Tokyo. When she's not coding, she is an artisanal hot sauce purveyor, ginger beer brewer, blogger, and yogi.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147054.34/warc/CC-MAIN-20200228043124-20200228073124-00031.warc.gz
|
CC-MAIN-2020-10
| 1,595
| 16
|
https://developer.jboss.org/thread/52268
|
code
|
I'm hoping someone can shed some light on my issue. I'm pretty certain its a classloader issue, but I have no idea how to go about figuring it out.
I have a war file. This war file deploys correctly, does what its supposed to. Now I have set up jmx so that I can connect with jconsole. I can see the beans and methods which I have exposed. All good so far.
Now, I want to start and stop this war using jmx. Stopping the war is fine. All shuts down as its supposed to. The problems arise when I try to restart it.
Its gets about 3/4 of the way through startup. It then gets to a piece where I'm trying to create a jms connection. It fails here with ClassNotFoundException. Now there is no debate that the required jar is present in the war, as if it wasn't, it would NEVER have deployed correctly in the first place. (And even if it had deployed, there is NO way it would have allowed me to run my tests against it).
Originally I had my war set up to run in isolation (as I was using some newer versions of things). I have removed isolation (and the newer versions), as I wondered if that was why the jmx classloader couldn't see the jar. But that has made no difference. (Everything runs correctly, until I try to restart).
So I'm completely at a lose as to where to go from here. So any pointers would be great.
Solved. The issue isn't with jboss. Its with spring. I'm using spring to expose my beans. And for some reason the classloader isn't exposed to the jmx. The solutions was to add:
<property name="exposeManagedResourceClassLoader" value=true"> to the MBeanExporter. The full explaination is here:
Hope this helps someone else
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823785.24/warc/CC-MAIN-20181212065445-20181212090945-00360.warc.gz
|
CC-MAIN-2018-51
| 1,635
| 9
|
https://blog.wirelessmoves.com/2012/08/going-virtual-for-network-testing.html
|
code
|
One of the small disadvantages of using Ubuntu on the notebook that I carry when traveling is that some software, e.g. for network testing so far required a reboot to Windows. On my new notebook, I don't even have Windows installed natively even more so even that option, which I rarely used due to the hassle involved, is no longer available. But now there's a remedy!
When I tried to run Windows in a virtual machine (Virtualbox) on an Ubuntu host a few years ago it would work quite well but I had difficulties mapping USB hardware such as for example 3G dongles directly into the virtual machine to make them accessible to the software there. But it seems USB pass through has been significantly advanced since then. When trying again a couple of days ago I noticed that USB pass through for a number of USB 3G dongles and other USB devices from the Ubuntu host to Windows in the virtual machine now works like a charm.
USB 3G dongles recognized by Ubuntu and included in the network manager as a WAN network adapter are automatically detached when a Virtual Machine is started in which it's USB ID is configured for pass-through and the native Windows drivers immediately pick up the hardware. When the virtual Ethernet network interface in the Windows guest is deactivated its even possible to establish an Internet connection over the 3G stick and the guest machine becomes completely independent of the host's Internet connectivity. That in itself offers some interesting options for network testing.
Another cool feature of using a virtual machine for testing is the ability to take a snapshot of the OS in the machine before installing new software. Once done with the testing one click removes all changes. This prevents bloating and unwanted side effects drivers and software of different products can have on each other.
And for final comfort, the 'full screen mode' lets you forget quickly that you are working in a virtual machine while the 'seamless mode' runs program windows of the host and guest OS together on the host's desktop.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473370.18/warc/CC-MAIN-20240221034447-20240221064447-00404.warc.gz
|
CC-MAIN-2024-10
| 2,049
| 5
|
https://brandnewtube.com/watch/roberta-flack-first-time-ever-i-saw-your-face-1972_IQ435FOElfwyyGF.html
|
code
|
Roberta Flack - First Time Ever I Saw Your Face 1972.
Roberta Flack - First Ever I Saw your Face 1972. A masterpiece.Absoluty timeless.
No attempt to violate copyright. Copyrights belong to their original owners. Video nonprofit. Musical videos posted on this channel are for entertainment purposes only. Channel nonprofit. Video nonprofit.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057036.89/warc/CC-MAIN-20210920101029-20210920131029-00470.warc.gz
|
CC-MAIN-2021-39
| 340
| 3
|
https://en.forums.wordpress.com/topic/length-of-a-post-and-pictures
|
code
|
I am unsure about generally what should be the length of a post in general topics? If I need to insert related images, headings. Generally I do not have images related with the writeup.
I also run a blog http://phoxis.org having tech and computer science stuff where i never barred the length of the post and many of them ran as long as 5000 words or more, which was not a problem in those topics.
I am not into writing non-tech stuff much, therefore I am unsure about the length.
The blog I need help with is ringlevel0.wordpress.com.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123549.87/warc/CC-MAIN-20170423031203-00511-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 535
| 4
|
https://nugetmusthaves.com/Tag/system
|
code
|
Top 20 NuGet system Packages
Provides Managed Service Identity Management (Fluent) capabilities for Microsoft Azure.
This is a .NETStandard / .NET Core port of the the Microsoft assembly for the .Net 4.0 Dynamic language functionality.
An API documentation can be found at https://help.cryptolens.io/api/dotnet/. This is a client API that serves as an interface to Cryptolens Web API (app.cryptolens.io/docs/api/). NB: There is also one for C++ (https://github.com/Cryptolens/cryptolens-cpp)
Bumblebee is a .NET layer on top of the Selenium browser automation framework allowing for standardized creation of page objects, even for dynamic web pages.
Dynamic Linq extensions for Microsoft.EntityFrameworkCore which adds Async support
Easily have file system access from shared code using a common interface. Used by other plug-ins like JsonCache.
Castle Windsor system web facility lets you easily add windsor to legacy aspnet web apps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655906934.51/warc/CC-MAIN-20200710082212-20200710112212-00373.warc.gz
|
CC-MAIN-2020-29
| 935
| 8
|
https://forum.sublimetext.com/t/view-differences-from-master-in-file/47574
|
code
|
The incremental diff functionality that was added in Sublime build 3200 can tell you what lines are different from the
index in the git repository (depending on the value of the
git_diff_target setting) and that works without having to install anything extra (
Sublime Merge, etc) though it does require that you use a 64-bit version of Sublime.
It only diffs against those two items, though. Based on your question it’s unclear if that would do what you want or if you literally want it to always show you the differences between the current file and the
master branch (i.e. regardless of what the current branch is, state of the repository in general, etc).
If you need that, then you could install GitGutter; in that package the
compare_against setting can be any tag, branch or commit hash.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669755.17/warc/CC-MAIN-20191118104047-20191118132047-00319.warc.gz
|
CC-MAIN-2019-47
| 796
| 8
|
https://www.oceanacidification.ca/post/5th-international-symposium-of-the-oceans-in-a-high-co2-world
|
code
|
International Resource Highlights
Between the 10th-16th of September 2022, the OA CoP attended the 5th International Symposium of the Oceans in a High CO2 World. Over the course of the Symposium and side works shops, we learned about some amazing and often underutilized resources created by the global OA community which we would like to share with you.
GOA-ON Data Explorer:
The GOA-ON data portal "provides access and visualization to ocean acidification data and data synthesis products being collected around the world from a wide range of sources, including moorings, research cruises, and fixed time series stations" and represents them as an easy-to-use map. The map contains worldwide (and in some cases also real-time!) data and observation assets which are represented as interactive icons.
The data explorer map can be found by clicking here!
Is the data portal missing something? Add to the database and ensure your work is properly featured in this amazing research by filling out a quick survey by clicking here.
We strongly encourage our members to spend some time exploring this map as it could lead to many future opportunities!
OA-ICC Zotero Database:
The OA-ICC has created a bibliographic database of ocean acidification publications which is updated frequently. This database is shared through Zotero (a free open-source reference management software), and is easily searchable as explained in the user instructions (here) or after watching the short instructional YouTube video (here). The end result is a relevant comprehensive bibliography on a topic related to ocean acidification.
To get started creating your bibliographies and literature searches with this database click here to access the main website!
OA-ICC Biological Response Portal:
This easy-to-use data repository and publication catalog focuses on biological response to ocean acidification. The goal of this data compilation is "to ensure the archival and streamlining of data on the biological response to ocean acidification (and other environmental drivers), as well as to provide easy access to the data for all users". This resource allows you to easily search existing datasets through easy-to-use filters under the categories of Spatial information, Experimental information, Biological information, and Bibliographic information (as can be seen in the image below).
This is an incredible resource to use to understand the biological response data that is available worldwide. To visit the portal and begin exploring click here and explore the various tabs along the top of the webpage to get started. Don't forget to contribute on the home page if your dataset is missing!
GOA-ON's Pier2Peer Partnerships:
The Pier2Peer program creates professional partnerships and relationships that are designed to help both early career scientists and senior scientists learn new skills and grow their field of study. Pier2Peer partnerships contain 1 mentor and 1 mentee who are matched based on knowledge and interest, who work together to create international collaborations and projects.
To learn more about the Pier2Peer network or to sign up as a mentor or a mentee click here!
Did you learn about any helpful resources that everyone should know about? Comment them below!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00592.warc.gz
|
CC-MAIN-2023-14
| 3,262
| 17
|
https://forums.creality3dofficial.com/help-guide-for-creality-printers/
|
code
|
Author: Luke HatField (L3D_help_guide)
Introduction: This guide is written by Luke Hatfield for 3D printer beginners to show how to assemble, tune and trouble-shoot the Creality 3D printers. He shares his experiences on bed leveling, filament loading, trouble shooting, software/firmware using, and provides a clue about what need to be taken care of when assembling/using Creality 3D printers. It’s recommended to use this guide as a check list, a complementary material to Creality 3D printer user manual/instruction.
Table of Content
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649518.12/warc/CC-MAIN-20230604061300-20230604091300-00656.warc.gz
|
CC-MAIN-2023-23
| 538
| 3
|
https://docs.chatfuel.com/en/articles/908868-sequences
|
code
|
Normally, your bot sends messages immediately in response to user’s actions. In some cases you might need to check up on users later or remind them about something. Sequences give you the option to proactively reach out to users after a certain period of time even if they didn’t interact with the bot.
Sequences can be created in the Automate tab. First, you create a sequence and at least one block in it. Then fill the blocks with content of your choice, and set the amount of time in which sequence blocks will be sent to the subscribed user in the dropdown menu. To start sending sequence messages to users you need to subscribe them to a sequence (see the section below).
*Note that while you’re setting the sequence up and your bot is online, you should keep the timing at OFF for all blocks in it.
To keep your dashboard clean and organized, you can rename the blocks in the sequence and hide the sequence overall by clicking the drawer button.
You can also see the statistics for each broadcasted sequence and each block it contains: the amount of delivered broadcasts, the amount of users who actually saw the broadcast and the click-though rate. The statistics are available for the entire sequence as well as for each individual broadcast in it.
Subscribing users to Sequences
To start sending a sequence to the users you need to subscribe them to it. When you subscribe a user to a sequence the countdown starts for the first message. Users will receive the message in the specified time interval after they were subscribed. Delivery time for subsequent messages will be calculated based on previously received messages in the chain.
There are two ways to subscribe users to a sequence:
Subscribe to Sequence plugin
There’s a handy plugin called Subscribe to Sequence which let’s you do just that – place it in the required block and simply type in the name of the sequence you want to subscribe the user to. This way you can specify at what point in a conversation with your bot users should start getting delayed messages from the sequence.
It is also possible to assign different sequences to different groups of people by using the user attribute filter.
Subscribe manually in the People tab
Filter the users you’d want to subscribe, click on the dropdown and select Subscribe to Sequence, then choose a sequence from the list.
You might want your subscribers to do key actions, like uploading necessary documents, providing contact information or booking a time slot for a meeting. There’s a chance they won’t do that. In this case you can set up a simple sequence with one or two messages that remind them to do that in a day or two.
This sequence is triggered one day after the user is subscribed to it, so you need to subscribe people at the same time you ask them to book a meeting. It checks whether the email is not empty. If the email is set, the user is immediately unsubscribed from the sequence, and the reminder is not sent — everything is ok. Otherwise, a reminder message suggesting to leave an email is send.
For instance, if you run a competition that consists of several steps, you can create a sequence that sends challenges every day and asks to submit participants’ works.
Unsubscribing from a sequence
Unsubscribing is only necessary if you want to stop a user from receiving any updates mid-sequence. It is not necessary to unsubscribe a user at the end of a sequence.
Unsubscribing works the same way – there is a plugin for that as well:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057496.18/warc/CC-MAIN-20210924020020-20210924050020-00261.warc.gz
|
CC-MAIN-2021-39
| 3,502
| 19
|
http://forum.installsite.net/index6f42.html?showtopic=16418
|
code
|
I've a FileGroup in my installer, that has a property "AlwaysOverWrite". The component that it is associated to is already installed on the system. I'm modifying my existing installation but its not overwriting previously installed files of that filegroup. But if I choose the repair option, then all the filegroup files are copied, even those which dont have "AlwaysOverwrite" property. Any idea how can I make a specific file group be always overwritten when I modify the installation.
Second question: On selecting a repair option (ComponentReinstall) , Is it possible that I could choose, which components to overwrite and which not to. e.g. If I've modified files of one component and I need only that component to be copied to the machine what should I do. Currently all the components are reinstall, even those that have not been modified.
Edited by usman, 28 March 2007 - 17:40.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258620.81/warc/CC-MAIN-20190526004917-20190526030917-00177.warc.gz
|
CC-MAIN-2019-22
| 886
| 3
|
http://docs.textadventures.co.uk/ifanswers/archive.html
|
code
|
IF Answers was a Q&A site for Interactive Fiction, and was live from March 2015 to October 2015.
The site is now closed, but a read-only archive can be browsed at http://docs.textadventures.co.uk/ifanswers.
The content is available in a GitHub repository at https://github.com/textadventures/ifanswers/tree/gh-pages.
A downloadable version is available from the IF Archive at http://ifarchive.org/if-archive/info/ifanswers.zip.
For more information, see this thread on the intfiction forum.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363376.49/warc/CC-MAIN-20211207105847-20211207135847-00257.warc.gz
|
CC-MAIN-2021-49
| 490
| 5
|
https://www.continualintegration.com/miscellaneous-articles/how-should-you-modify-the-sudoers-file/
|
code
|
You want to modify the /etc/sudoers file. What should you do?
You may want to back it up. Never modify it with vi, vim or gedit. Use "sudo visudo". Page 433 of A Practical Guide to Fedora and RedHat Enterprise Linux recommends you always use sudo visudo. If you accidentally corrupt the file when modifying /etc/sudoers manually, you can be prevented from using sudo again. Your Linux system may not be recoverable if you cannot use sudo again. There are ways to fix it, but be warned you should always use "sudo visudo" to modify /etc/sudoers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662594414.79/warc/CC-MAIN-20220525213545-20220526003545-00690.warc.gz
|
CC-MAIN-2022-21
| 544
| 2
|
https://blog.netronic.com/
|
code
|
As you already know, the release of version 1.4 of the Visual Jobs Scheduler, our add-in for visual project scheduling with NAV, came with lots of new features that, due to the wealth of information, I'm introducing to you step by step. Last week you learned about milestones for better managed project execution and today I continue by describing a function of the Visual Jobs Scheduler that will effectively help you keeping track of the time units consumed for your project - either during the project or after having finished it - and thus letting you promptly intervene if something is not as it should be or analyze where something went wrong.
I hope you enjoyed the Christmas season, started well into the new year and could recharge your batteries so that now you are eager to learn more about the mighty new features of version 1.4 of the Visual Jobs Scheduler, our add-in for visual project planning in Dynamics NAV.
Today I'll be writing about the usage of milestones, this also being a feature many of you have asked us about. So, as your wishes are our commands we added them to the VJS.
Most likely you will all be quite busy with the work that the beginning of a new year always brings about and so I kept this blog short - but nevertheless substantial.
As you already know, the new version 1.4 of the Visual Jobs Scheduler, our add-in for visual project planning in Dynamics NAV, that has been released in November, has a lot of new mighty features to show. In my last post, you learned how to best use the new time filter options. Today I'd like to show you how you can avoid multiple resource allocations.
Two weeks ago I informed you about the release of version 1.4 of the Visual Jobs Scheduler, our add-in for visual project planning in Dynamics NAV. Since the features are so powerful I could only briefly outline them. In the meantime you may have tested some of the new features and perhaps have seen for yourselves how mighty and comprehensive they are. As I promised, I’m writing today to dig deeper into one particular feature. As it happens, a customer asked for this feature explicitly and so I’m sure it will be of great interest to most of you.
We recently relaunched our website. This had been a 9-months project. We did this completely on our own and did not involve any agency. In this process, I made (among others) two fundamental decisions:
- Going forward, I want to run an "exec corner" blog. In this blog, I wanna share insights from owning and running a software company.
- With the relaunch, we say good-bye to (almost) all Marketing forms. I mean, all forms that we usually put between our visitors and the content we create.
This is my first "exec corner" blog and it sheds some light on the second decision. Actually, it needed only one reason to decide that we ungate all our content.
The new version 1.4 of the Visual Jobs Scheduler, our add-in for visual project planning in Dynamics NAV, has been released. The interactive planning board for visualizing jobs, job planning lines, job tasks, resources and resource allocations was enhanced by some really powerful features which at first glance might not look really that important, but believe me, there is a whole lot more to them. Describing all new features in their full depths would go way beyond one blog post so that today I will briefly introduce the new features and give you comprehensive descriptions of some selected features in posts to come (and a webinar that we'll host on Dec 4, 2017).
Learn today how and when to use the View Filter, and also why sometimes operations seem to vanish after the filter was applied.
As user of and/or partner reselling our Visual Service Scheduler Gantt add-in for service planning with Dynamics NAV you probably are already familiar with its visual alerts indicating situations that might jeopardize the execution of your order according to schedule.
For some NAV users these visual alerts were not enough, however, so that several of our partners asked us for a way to implement visual signals for highlighting a resource's unavailability such as specific "downtimes", absences, and external blockades. Their wish was our command so that today I can show you how to highlight absences by individual colors and tooltips and, as a side-effect, gain better resource utilization with NAV.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647838.64/warc/CC-MAIN-20180322092712-20180322112712-00370.warc.gz
|
CC-MAIN-2018-13
| 4,337
| 14
|
http://lmonasterio-en.blogspot.jp/2008/01/best-economics-paper-of-1958.html
|
code
|
Which paper/book should we celebrate its 50th year? Obviously, my vote goes to the paper that started the cliometric revolution:
The Economics of Slavery in the Ante Bellum South
Alfred H. Conrad, John R. Meyer
The Journal of Political Economy, Vol. 66, No. 2 (Apr., 1958), pp. 95-130
Is there any other contestant?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119782.43/warc/CC-MAIN-20170423031159-00062-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 315
| 5
|
http://xtrabytes-xby.myrecipecollection.info/
|
code
|
XTRABYTES is not an ICO, it s a community driven project. Maecenas sed elit eleifend, mollis risus eu, sollicitudin justo. STATIC nodes, the foundational layer of XTRABYTES, rely on multiple layers of encrypted and signed sources to guarantee the integrity of the network. XTRABYTES (XBY) is a modular blockchain platform designed to provide significant increases in security, scalability and decentralization opportunities over current blockchain technologies. Bitcoin (BTC) 303,095,254,787 DCN $1,740,676,048 44 XTRABYTES What is XTRABYTES. This will put the XTRABYTES platform in an optimal position for mass-market adoption xtrabytes xby. Modules are extensions built onto the XBY core. To provide proof-of-concept the first tradable pairing within X-CHANGE will be XBY/XFUEL. As the mobile market is ever increasing the XTRABYTES developers recognize the need and utility for complete integration of DApps within the Android and iOS ecosystem. X-CHANGE - Decentralized Cryptocurrency Exchange X-CHANGE will be the XTRABYTES decentralized cryptocurrency exchange. The storage network is the foundation layer for the entire platform of Decentralized Applications. Zolt ensures a block signature rate of 100% system-wide, which confers an unparalleled level of security. More Flexible Designed with the future in mind, the XTRABYTES platform is code agnostic and compatible across consumer platforms.
The data is encrypted and divided into shards across the network of STATIC nodes, just as the blockchain ledger is shared between all wallets xtrabytes xby. They provide the use case for XTRABYTES in the form of DApps, whether they be decentralized storage, smart contracts, instant messaging and all conceivable applications in between. The XTRABYTES DApps will cover all areas from utilities, productivity, entertainment and more, with only your imagination as the limit. Build More Secure Decentralized Applications Faster, Flexible, Scalable, More Secure and Easy to Code The XTRABYTES platform will be optimized for DApps to be built right into the blockchain. RoadmapBitcoin (BTC) 303,095,254,787 DCN $1,740,676,048 44 XTRABYTES What is XTRABYTES. --> More Scalable The XTRABYTES platform lends itself perfectly to a scalable world. The DICOM interface connects external modules to the core and provides a set of functions and procedures that allow the creation of applications which access the features and data of the XTRABYTES core and infrastructure. With the XTRABYTES DICOM, a module can be coded using many different popular programming languages like Visual Basic, Java, C++ and many more. These will be the first of many more to come. STATIC Nodes STATIC (Services Transactions and Trusted-in-Control) nodes form the backbone of the XTRABYTES network and play a crucial role in the consensus, security, and governance of the platform. With high transaction speeds, future-proof security protocols and a code-agnostic DApps platform; XTRABYTES will be able to meet the expanding needs of the broad consumer market. STATIC node owners receive transaction fees and service fees for the DApp modules they opt-in to host. More Secure Security is one of the founding philosophies of the XTRABYTES platform.
X-VAULT - Decentralized Secure Data Storage Utilizing shared storage technology, the XTRABYTES storage module will allow users to store data securely on the STATIC node network. This makes the XTRABYTES modules code-agnostic and opens up the creation of DApps to third-party developers. Etiam fringilla finibus quam, eget finibus ante fermentum et.Substratum.. Currently, the SHA-512 security protocol is implemented on the XTRABYTES network and is considered the standard for quantum resistance, but as technology changes, even this may become outdated. Built directly into the wallet, X-CHANGE will allow users to have a trusted, decentralized, and totally secure p2p exchange at their fingertips. Further future development with the idea of enterprise in mind, the XTRABYTES ecosystem will include seeking corporate collaborations partnerships to meet the demands of an ever expanding market place. Security and PoSign consensus are insured using state-of-the-art encryption hash technology, requiring that every block is signed by the nodes. Our developers are working to create both immediately as a proof-of-concept and to help serve as the backbone for future developers to build upon. Our developers have worked diligently to code an environment easily adaptable to fit the ever-evolving security needs of the future. Additional benefits include substantially decreased energy consumption as Zolt does not require a network of miners. Therefore, XTRABYTES is specifically designed to allow easy changes to its security protocols to ensure its technology is always up-to-date. The XTRABYTES core and DICOM API will provide programmers with an easy-to-grasp platform for development. .
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743732.41/warc/CC-MAIN-20181117185331-20181117211331-00168.warc.gz
|
CC-MAIN-2018-47
| 4,910
| 3
|
https://www.alibabacloud.com/help/doc-detail/166115.htm
|
code
|
This topic describes how to add a cloud data source ApsaraDB RDS for MySQL.
- An ApsaraDB RDS for MySQL database is created.
- The username and password that you use to access the ApsaraDB RDS for MySQL database are obtained.
- Before you use an ApsaraDB for RDS database as a data source, you must configure an IP address whitelist for the database instance in the ApsaraDB for RDS console. For more information, see Configure a whitelist.
- Log on to the Quick BI console.
- Click the Workspace tab. In the left-side navigation pane, click Data Sources.
- On the Data Sources page, click Create Data Source in the upper-right corner.
- In the Add Data Source dialog box, click the Cloud Data Sources tab and then the MySQL card.
- In the Add MySQL Database dialog box, configure the required parameters.
Parameter Description Name The name of the data source. In this example, set the value to cloud data source MySQL. Database Address The hostname or IP address of the database that is used as the data source. Port Number The port that you use to access the database. Default value: 3306. Database The name of the database that you want to access. In this example, set the value to quickbi_test. Username The username that you use to access the database. In this example, set the value to quickbi_test. Password The password that you use to access the database. VPC Data Source If the data source is connected over a VPC, select VPC Data Source and specify the relevant parameters. Region The region where the database instance resides. In this example, set this value to ap-northeast-1.Note This parameter appears only when you select the VPC Data Source option.
- Click Test Connection to test connectivity with the database.
- After the database passes the connectivity test, click Add.
If a data source with the same configurations exists, a message that indicates a configuration conflict is displayed. You do not need to add the same data source repeatedly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107898577.79/warc/CC-MAIN-20201028132718-20201028162718-00462.warc.gz
|
CC-MAIN-2020-45
| 1,967
| 13
|
https://www.libhunt.com/compare-jquery-sortable-lists-vs-ngx-bootstrap?ref=compare
|
code
|
|9 months ago||6 days ago|
|MIT License||MIT License|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
We haven't tracked posts mentioning jquery-sortable-lists yet.
Tracking mentions began in Dec 2020.
What is the difference between "ng-bootstrap" and "ngx-bootstrap"?
1 project | reddit.com/r/codehunter | 10 Jul 2022
with ngx-bootstrap I mean valor-software-ngx-bootstrap.
Performance Testing via Artillery.io - user guide
1 project | dev.to | 9 Mar 2022
artillery quick --count 15 -n 30 https://valor-software.com/ngx-bootstrap/ With this command, the test will run 15 virtual users with each of them making 30 HTTP GET requests to the URL address that you specified.
10 Popular Angular Component Libraries For Web Developers in 2022
1 project | dev.to | 17 Jan 2022
Github Stars: 5100+
The Most Popular Angular UI Libraries to Try in 2021
6 projects | dev.to | 13 Apr 2021
The NGX Bootstrap library has about 5.3K stars on GitHub. Here you can find basic components that implement the capabilities of the Bootstrap template written specially for Angular. It is suitable for developing desktop and mobile applications and is designed with extensibility and adaptability in mind. One of the features of this library is a variety of element forms. Among the element forms that could be added to your application, accordion with custom HTML, various forms of carousels, pager pagination, and different ratings deserve special mention. Custom HTML component of NGX Bootstrap library (source: https://valor-software.com/ngx-bootstrap/) Basic carousel component of NGX Bootstrap library (source: https://valor-software.com/ngx-bootstrap/)
7 Best Angular Component Libraries to use in 2020
7 projects | dev.to | 29 Sep 2020
Github Stars: 5100+ Weekly npm downloads: 11,000+ Latest update: 2.0.1
What are some alternatives?
ng-bootstrap - Angular powered Bootstrap
primeng - The Most Complete Angular UI Component Library
material - Material design for AngularJS
sortablejs - Reorderable drag-and-drop lists for modern browsers and touch devices. No jQuery or framework required.
Vaadin - Vaadin 6, 7, 8 is a Java framework for modern Java web applications.
dropzone - Dropzone is an easy to use drag'n'drop library. It supports image previews and shows nice progress bars.
ng-zorro-antd - Angular UI Component Library based on Ant Design
jQuery Sortable - A flexible, opinionated sorting plugin for jQuery
HTML5Sortable - VanillaJS sortable lists and grids using native HTML5 drag and drop API.
autocomplete - 🔮 Fast and full-featured autocomplete library
Ractive.js sortable decorator plugin - Drag and drop items to sort them
react-smooth-dnd - react wrapper components for smooth-dnd
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00765.warc.gz
|
CC-MAIN-2022-33
| 3,015
| 35
|
https://economicskey.com/the-various-measures-of-cost-5957
|
code
|
THE VARIOUS MEASURES OF COST
Our analysis of Hungry Helen’s Cookie Factory demonstrated how a firm’s total cost reflects its production function. From data on a firm’s total cost, we can derive several related measures of cost, which will turn out to be useful when we analyze production and pricing decisions in future chapters. To see how these related measures are derived, we consider the example in Table 2. This table presents cost data on Helen’s neighbor-Thirsty Thelma’s Lemonade Stand.
TABLE 2 The Various Measures of Cost: Thirsty Thelma’s Lemonade Stand
Figure 3 plots Thelma’s total-cost curve. The quantity of lemonade (from the first column) IS on the horizontal axis, and total cost (from the second column) is on the vertical axis. Thirsty Thelma’s total cost curve has a shape similar to Hungry Helen’s. In particular, it becomes steeper as the quantity produced rises, which (as we have discussed) reflects diminishing marginal product.
[av_button label='Get Any Economics Assignment Solved for US$ 55' link='manually,http://economicskey.com/buy-now' link_target='' color='red' custom_bg='#444444' custom_font='#ffffff' size='large' position='center' icon_select='yes' icon='ue859' font='entypo-fontello']
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585246.50/warc/CC-MAIN-20211019074128-20211019104128-00111.warc.gz
|
CC-MAIN-2021-43
| 1,242
| 5
|
https://www.usablesecurity.net/projects/MUD/index.php
|
code
|
Manufacturer Usage Description (MUD)
Defending the IoT devices in home environment
IoT devices are highly susceptible to cyber attacks and compare to software, they are usually an easier target for vulnerability hunting and eventually pwning. A proper defense against this, is to setup a fine grained firewall where it only allows each IoT device, to communicate with some predefined destinations. For instance, a smart bulb would not need to communicate with a smart toaster, or a smart crock-pot should not communicate with a www.i-am-safe.com.
Creating the rules for such firewall, is beyond the knowledge of a end user or even a super user. Even an experienced sysadmin will get frustrated for maintaining such firewall since the communication destination of each of the IoT devices might change throughout its lifetime. Introducing MUD: a self-install and self-maintain fine grained firewall, providing "a means for end devices to signal to the network what sort of access and network functionality they require to properly function" .
MUD works based on a usage description that is defined by the manufacturer, hence the name Manufacturer Usage Description. The manufacturer of a device, knows better than anyone where their device is supposed to initiate a communication to, or to which domain or service it should respond. Using this description, a smart bulb manufacturer that is aware its products will not communicate with any domain other than the company's domain, can enforce this rule to the future network where the IoT device is going to be deployed.
|Conference publications (1)|
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988828.76/warc/CC-MAIN-20210507211141-20210508001141-00277.warc.gz
|
CC-MAIN-2021-21
| 1,597
| 6
|
https://www.freelancer.cn/work/file-contents-update-php/
|
code
|
Description - We will upload the project in gitlab account - In desktop application, we will get the alert and download the uploaded project from gitlab - In desktop...account - In desktop application, we will get the alert and download the uploaded project from gitlab - In desktop, user can enter the branch name then it will download the latest file.
We are looking for someone to do general PC data entry and file download and sorting You will need to be able to use Microsoft One Note or Microsoft 365 Have a high speed internet for file download Possible customer support via chat at a later stage
...model, discuss some design parameters, for example cost, scheduling, maintenance, sustainability, crime, energy, accessibility etc; • Link your discussions to the theoretical contents of the module, referencing citations appropriately; • Discuss how your findings would affect the project development from a multi disciplinary perspective. Your findings have
We need a person who can help us to develop Cyber Security & Digital Marketing syllabus with contents.
...rights and we can register our website. Most importantly do not use any copyright content or anything which is copyright. You must authorised to use / sell those pictures, contents, etc. Whole site need to be tested: registration, login, contacts, ordering, RMA, Repair Service ticketing system, Calendar/Scheduling, MailChimp and QuickBooks integration
I would like you to re-design a previously existing product. In the example pictures below, you will see the current product which is m...provide stability Length - 7" Height - 7" Once again, the design must allow the foot steps to be stackable for storage. In addition to the 3D rendering, I will require a STL file in order to 3D print a prototype.
basic multithreaded software with GUI, for user to do the file/folder search in the OS file system. file/folder name or name pattern/search root folder. to list of folders and the duration of the search. with progress bar and displaying state of search. search results are displayed in real-time. one thread is dedicated for searching the files, and one
rearrange and write a table of contents business plan for a factory with best way and most important factors
Deliverables: I need contents on different niches like products, health, decoration, sports, fashion, technology, social, media, education, household, online shopping, promotional articles etc. It’s a moderate budget project. Payment: Payment will be via freelancer and no milestone. I will only pay after successful submission and acceptance of every
My website is a free article submission website. My website provides backlinks to the authors. I don't think my website is 100% Google friendly. I place a great emphasis on the quality website. So I want to solve this problem. First, check everything on my website, see if it's bad for Google, and fix the problem.
I have a video server software that record files in .dat . I need to extract all metadata from .dat files . If i play the file with ffmpeg it work but i need also to get mediadata and i have to build my own player in c#
i need 10 blog posts about baby to toddler age (0-6) tools, toy, up coming/ newly invented gadgets to make parents life easier This is for my dropshipping store. I need it not too focus on certain brand.
I need 50 web contents 400 words each for website. i will pay $1 per content. all contents should be 100% unique free of copyscape. Happy bidding
..."wrap" then to protect them again software piracy. Once wrapped the exe file checks the license again a SQL database. The issue is the "wrapped" exe file when run will set off a false alert for anti virus and malware detection programs. I need you to update the code so any exe file I wrap will not set off an anti virus or malware alert. See at...
Technologies involve here are Java, Hibernate, Oracle db. I have a file which has data in it. Application should able to read that file and dump data in to different tables based on positions in the file. It requires FFPOJO parser knowledge.
We need: *You have fashion contents article & blog writing experience. *You have your own fashion blog website end with .com *Domain rating 20 above. *Article 500 words at least. *Accept specify keywords. *Build external links for us. The payment will be made after the acceptance of the article, we only accept PAYPAL payments. *You will write for
I have a template with both html and whmcs files. WHMCS has less contents and HTML has a lot. Thats why I want to use HTML rather than WHMCS. Is it possible to link each and every aspect of the html files to WHMCS?
I need a new Drupal website. Copy design, layout, modules, plugings from existing websites. Contents will be provided by me. need to make some changes in designing, so that it doesn't look like it's copied.
I host my website with Go daddy, but ugly news I lost all my contents/data lost everything I been working on for months and brought back me the old side. I need someone to restore all my contents/data to what the website was by this week instead to what it was 2 years ago.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247503249.58/warc/CC-MAIN-20190221071502-20190221093502-00251.warc.gz
|
CC-MAIN-2019-09
| 5,121
| 19
|
https://www.webmasterworld.com/apache/4584687.htm
|
code
|
Http disappeared and some extra characters appeared before and after the curly brackets
Uh, yeah, that's why the WebmasterWorld forums insist on "example.com" everywhere. Obviously a bit awkward when the material after http:// is something other than a plain-text domain name, but there you are.
General principle: if you're testing for a literal string, put the same literal string in your target. F'rinstance
No need to capture the request if you're not going to reuse it.
Some people prefer to redirect to 127.0.0.1 and let your offending visitors contemplate their navels. In practice it rarely makes much difference-- unless you're dealing with real humans attached to real browsers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986700435.69/warc/CC-MAIN-20191019214624-20191020002124-00483.warc.gz
|
CC-MAIN-2019-43
| 688
| 5
|
https://www.audiokinetic.com/en/learn/videos/ah_ul9cvlge/
|
code
|
Wwise to Unreal Integration: Wwise Reflect
In this video I talk about the Wwise plugin, Wwise Reflect. I will show you how to set up Aux busses to use reflect, and how to set it up in the Unreal engine using Surface Reflectors and Spot Reflectors. It is really cool!
My website: http://www.timothyadan.com/
My ko-fi account: http://ko-fi.com/timothyadan
Various information sources:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816942.33/warc/CC-MAIN-20240415045222-20240415075222-00530.warc.gz
|
CC-MAIN-2024-18
| 382
| 5
|
https://blog.fmsinc.com/category/total-access-emailer/page/2/
|
code
|
Microsoft released service pack 1 (SP1) of Office 2010 late June 2011. Information on the update and download instructions are in their Knowledgebase article 2460049. The KB article was last updated yesterday.
Unfortunately, we and some of our customers have encountered problems after installing the update. While we haven’t had exhaustive testing with SP1 and tentatively believe everything is okay with the 32 bit version, there are definitely compatibility problems with the 64 bit version of Access 2010. In particular, ACCDE files created in the original release of Access 2010 64 bit no longer run under SP1. This error message appears:
The database cannot be opened because the VBA project contained in it cannot be read. The database can be opened only if the VBA project is first deleted. Deleting the VBA project removes all code from modules, forms and reports. You should back up your database before attempting to open the database and delete the VBA project.
Obviously, with an ACCDE file, unlike an ACCDB file, you can’t modify the VBA project. It requires rebuilding the ACCDE from SP1.
So far, we have not experienced problems with our 32-bit ACCDE files between the original and SP1 Access 2010 versions. Some of these issues have been noted in these articles:
Microsoft Access Development Team Blog: Using 64-bit Access 2010? You may want to wait on SP1
TechNet report: Access 2010 – Wizards not working after installing SP1
This is a Microsoft KB article discussing the problem which impacts ACCDE, MDE, and ADE files created with Access 2010, 64-bit. For us, when we create MDE and ADE files for use across multiple versions of Access, we’ve used Access 2003 so that still works fine. The only time we use Access 2010 64-bit version is when we’re creating an ACCDE specifically for Access 2010 64-bit users.
This issue impacts two of our products’ Access 2010 64 bit versions:
Total Access Emailer 2010
We have created new builds of these products and are undergoing internal testing and QA to verify they work with SP1. When ready, we’ll release free updates of these products to existing customers. If you need it earlier, please contact our support team. Note that this does not impact the Access 2010 32 bit version.
Regardless of whether you are using our products or not, please be aware of the compatibility issues if you’re using the 64-bit version of Access and deploying ACCDE files. You will need to make sure your Access version is in sync with your users’ version. Unfortunately, this bug occurs before any of your code can run to provide instructions to your users or offer a graceful exit.
Not sure what version you have installed? Run Access, select the File menu, and click on Help. The version informing is shown on the right side and will show (SP1).
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474641.34/warc/CC-MAIN-20240225171204-20240225201204-00590.warc.gz
|
CC-MAIN-2024-10
| 2,809
| 13
|
https://community.openai.com/t/releasing-gpt-the-ai-lab-for-book-lovers/486290
|
code
|
Now I have many questions about how this will work in the Store!
Will I be able to partition some functionality into a paid zone, or will I need separate apps, one free, one paid?
Will there be an API that can call each of my GPTs?
Will I be able to see privacy-protected transcripts of conversations? If not, how I am to know if the agent is staying on track? Will I be able to see the thumbs up/down results?
Architecturally: this one focuses on metadata. What if I want to emphasize copy editing? Should I add a bunch of behaviors/uploaded file to support tha, or is it better to have a fleet of related GPTs, say one for metadata, one for marketing, one for editing, another for creative writing.
API: I can already see that creating multiple GPTs is going to involve a lot of retyping. Will there be a way to package a GPT definition as a “POST” request?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473472.21/warc/CC-MAIN-20240221102433-20240221132433-00501.warc.gz
|
CC-MAIN-2024-10
| 863
| 6
|
https://smockingbirdsgifts.com/products/whip-stitch-crissbody
|
code
|
Whip stitch Circle Tote
The style of this Whipstitch Circle Tote is fresh and fun. Whipstitched through brass colored grommets around the outside, the bag features a brass circle handle
Distressed Material with Contrast Trim and Whip Stitch Grommet Detail, Antiqued Gold and Silver Hardware, (Exterior) Metal Handles, Adjustable/Removable Crossbody Strap, Top Zipper Closure, Back Convenience Pocket, (Interior) Convenience Pockets, Zipper Pocket, Key Clip. 13.5” Diameter x 2.75”W. Handle Drop: 5”.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057733.53/warc/CC-MAIN-20210925172649-20210925202649-00168.warc.gz
|
CC-MAIN-2021-39
| 505
| 3
|
https://forums.t-nation.com/t/true-arnold-used-this-cycle-when-competing/171471
|
code
|
This has been on the internet for some time now.
You are right about their genes. Imagine taking such an amount of dbol (up to 100mg ED) for such a long time! He had no gyno, no known liver issues, no bloat, ... wtf?
In his time there were no AI (like adex, letro), so it all came down to luck. I remember one of his friends ending up with gyno (the guy also played in Pumping Iron).
PCT was done via taper, because Nolva/clomid did not exist back then.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806620.63/warc/CC-MAIN-20171122175744-20171122195744-00748.warc.gz
|
CC-MAIN-2017-47
| 453
| 4
|
https://marbsisamo.firebaseapp.com/256.html
|
code
|
Dell system inspiron 15 7000 series 7537 drivers download for. The inspiron 15 is a good example of notebook that provides the best. Download dell inspiron 153567 laptop drivers for windows. I just purchased the dell inspiron 15 3521 and after a period of time the windows update ran and it failed to update only one item the intel storage controller 7 series controller. Change the os, for example, dell inspiron 3520 drivers for windows 8 64 bit. Myservice360 learn about your products install code and get the latest available updates. Dell inspiron 15 3567 drivers download for windows 10, 8, 7, xp. Get drivers and downloads for your dell inspiron 15 3555. The driver update utility for dell devices is intelligent software which automatically recognizes your computers operating system and laptop. Where to download inspiron 15 3000 series driver dell. Make sure the battery is fully charged or you can keep the adaptor plugged in to the computer during the installation. To keep your data safe, this tool requires twofactor authentication. Support for microsoft windows 7 ended january 14, 2020. Download dell inspiron 15 3521 drivers for the windows 8 and 7 x64 and 32 bit and also for windows 8.
Download dell inspiron 15 5000 laptop drivers for windows. Download dell inspiron 15 3000 series wifi driver for windows 10, windows 8. This page contains the list of device drivers for dell inspiron 3521. Dell laptop drivers download for windows 10, 8, 7, xp, vista. Cp bus cao cnt com cur dev dsp int nav our psa psd sam sta tai uni xuacompatible. Browse to the location where you downloaded the file and doubleclick the new file. Dell wireless 350 bluetooth internal module driver version a00, network. Dell inspiron 15 3521 drivers for windows 7 free downloads. Dell inspiron 3521 drivers download for windows 10, 8. Find wireless, wifi, bluetooth driver and optimize your system with drivers and updates. Get drivers and downloads for your dell inspiron 3521. Posting at this time will help you to find a driver for dell inspiron 15 5555 windows 7 32bit.
Please enter your product details to view the latest driver information for your system. Drivers dell inspiron 15 3520 download for windows 7 32bit audio cirruslogic highdefinition sound driver chipset i. When the file download window is displayed, click save to save the file to your hard drive. Hi kashif, download the drivers for bios and network card from the link mentioned below.
Download dell inspiron 15 3521 drivers for the windows 8 and 8. Dell camera drivers download for windows 10, 8, 7, xp, vista. Posting at this time will help you to find a driver for dell inspiron 15 3531 windows 8. Download the latest drivers for your dell system inspiron 15 7000 series 7537 to keep.
Dell wireless 1801 wifi and bluetooth driver driver. Dell inspiron 3521 wifi driver for windows 10 64 bit first choose your operating system, then find your device name and click the download button. Driver dell inspiron 15 3000 series win 10 64bit free download and view all available updates for windows 10 64bit. Revamp performance of inspiron 15 5000 laptop by downloading latest drivers download. Here we provide dell inspiron 15 motherboard drivers 3521 which includes audio driver. Dell inspiron 15 3521 win8 64 bit drivers required. This package provides the driver for dell wireless 1801 wifi and bluetooth are supported on the inspiron, vostro and xps series that are running the following windows operating systems. Download drivers for windows 7 windows 8 windows 8. Offering an average build quality the dell inspiron 15 is back to its basic mainstream of 15 inches screen. After you upgrade your computer to windows 10, if your dell camera drivers are not working, you can fix the problem by updating the drivers. To download the proper driver, first choose your operating system, then find your device name. Request support or replacement parts on your dell emc products, integrate apis into your help desk, and train your staff. Drivers dell inspiron 15 5555 windows 7 32bit drivers lost because new laptop has been dropped. Download and install the latest drivers, firmware and software.
Downnload dell inspiron 5100 laptop drivers or install driverpack solution software for driver update. Download dell inspiron 3543 wifi driver for windows 10, windows 8. Store all of your work and personal files on the large 500gb. Dell inspiron 15 3565 drivers download for windows 10, 8, 7, xp. Dell inspiron 15 5555 windows 7 32bit drivers download. Dell inspiron 5100 laptop drivers download free driver. Dell inspiron drivers dell inspiron 15 free download. Manufacturer website official download device type. Type your product id and get a driver download list. Driver dell inspiron 15 3000 series win 10 64bit free download. Drivers dell inspiron 153520 windows 8 32bit posted on 8. Download dell inspiron 15 3521 drivers for windows 8. Driver download place, in the article you read today that i give the title dell inspiron 5555 drivers for windows 8.
Make sure the battery is fully charged or you can keep the adaptor plugged in to the computer during the installation of drivers. Dell inspiron 15 3000 drivers download for windows 10, 7. Dell inspiron 153555 drivers download for windows 7, xp, 10, 8. Downnload dell inspiron 153555 laptop drivers or install driverpack solution software for driver update. Ethernet 10100 pci adapter driver, intel network adapter driver for windows 7, network.552 485 1149 514 151 1386 481 531 978 687 1544 363 1067 527 1103 17 358 1192 701 217 273 116 289 737 660 629 1307 690 454 1094 39 386 488 373 1332 1416 531 1082 684 1320 1026 1373 656 991
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00476.warc.gz
|
CC-MAIN-2022-40
| 5,650
| 7
|
https://classroom20.com/profile/VickiTreadway
|
code
|
I am a technology specialist (work with hardware and integration) at Unionville High School in PA. I have an elementary ed and technology background. I am currently working on creating a Ning for professional development. I am also working with mobile technology, specifically iPod Touches, for the classroom.
Comment Wall (1 comment)
You need to be a member of Classroom 2.0 to add comments!
I've been developing online professional development on LearningFront.com. Our approach is to combine social media with professional development tools to improve teaching and learning. Please let me know if you wish to share ideas along these lines. Good luck in your efforts with Ning. Nick Hobar
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711552.8/warc/CC-MAIN-20221209213503-20221210003503-00850.warc.gz
|
CC-MAIN-2022-49
| 690
| 4
|
http://rellims.com/puzzle.php
|
code
|
There are five houses in a row in different colors. In each house lives a person with a different nationality. The five owners drink a different drink, work for a different company and keep a different pet.
Answer the five questions below by using the 15 hints alone.
- The tan house's owner drinks wine.
- The Google empoloyee lives in the center house.
- The Czech has a pet cat.
- The Swede lives next to a pet lizard.
- The dog's owner lives next to an IBM employee.
- The white house's owner has a lizard.
- The juice drinker has a bird.
- The beer drinker lives next to the yellow house.
- The blue house's owner works for EMC.
- The snake's owner works for HP.
- The beer drinker lives in the first house.
- The coffee drinker works for GE.
- The Russian enjoys soda as a beverage.
- The Dane lives next to a pet dog.
- The blue house is to the left of the green house.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154466.61/warc/CC-MAIN-20210803155731-20210803185731-00073.warc.gz
|
CC-MAIN-2021-31
| 876
| 17
|
https://www.tr.freelancer.com/projects/server/maintain-ceph-storage-server
|
code
|
need someone to maintain the ceph storage server.
Bu iş için 4 freelancer ortalamada $195 teklif veriyor
Greetings! I have some experience with CEPH cluster in the past. I think that might be useful. Lwt me know if you are interested. Thank you
Hello, I can help you to maintain your Ceph storage server and fix it as you want. Please initiate a chat session so we can discuss more about it. Thank You.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00045.warc.gz
|
CC-MAIN-2022-33
| 404
| 4
|
https://vi.stackexchange.com/questions/21762/is-it-possible-to-have-the-cursor-follow-a-newly-created-window
|
code
|
When I split my window (
C-w v), is it possible to have the cursor automatically go to the new split right away?
(I looked up
switchbuf but I think that's something else; having to do with buffers rather than windows?)
Vi and Vim Stack Exchange is a question and answer site for people using the vi and Vim families of text editors. It only takes a minute to sign up.Sign up to join this community
When I split my window (C-w v), is it possible to have the cursor automatically go to the new split right away?
In fact, you do move to the newly created window. The point is that it's opened on the left side by default.
So you need to
set splitright. Be aware though, this option affects all vertical split commands, not only
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304876.16/warc/CC-MAIN-20220125220353-20220126010353-00153.warc.gz
|
CC-MAIN-2022-05
| 724
| 9
|
http://www.michelaismyname.com/2017/03/empties-february-2017-michela-ismyname.html
|
code
|
Please SUBSCRIBE to my channel to be notified of my new videos!
Hi everyone and welcome back to my channel.
Today I'm back with my EMPTIES.
All the empties from the month of February..
Beauty, skincare, hair care and makeup.. a lot of dislike products this month..
and few things that I really LOVED...
Check out my unboxing Haul for Five Senses Skincare down below
I hope you like this video.. let me know what you think!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202131.54/warc/CC-MAIN-20190319203912-20190319225912-00137.warc.gz
|
CC-MAIN-2019-13
| 422
| 8
|
https://blogs.office.com/news/?filter-audience=partner&filter-product=lync
|
code
|
When I started reviewing and gathering open educational resources (OER), I quickly realized it seems endless. I needed some help, so I contacted a fellow math teacher in my district, and we decided to work on the project together. OneNote made it easy. I simply started a Notebook and shared it with my colleague by sending her an email. Right away we started dragging and dropping the lessons we had…
Every hour of every day in every country where business is conducted, the same scene plays out: dozens of well-paid people sit in a conference room being bored senseless. Death by a thousand slides. This mind-numbing, soul-crushing, grotesquely expensive experience ends here. James Whittaker reveals the secrets to conceiving, building and delivering a great presentation.
Office 2016 is here! September also brought a new screen capture tool, the Office 365 Admin Center Preview, a preview of the new OneDrive for Business, two new mobile apps for business and new Office 365 services and experiences, including the Office 365 Import Service, Office 365 Planner and the Office 365 Service Trust Portal. —Read more to see what else is new in Office 365.
The worldwide release of Office 2016 for Windows on September 22 was another milestone in pursuit of Microsoft’s company ambition to reinvent productivity and business processes. Read on to find out even more reasons to make Office 2016 and Office 365 an integral part of your life and your business.
Visio is the industry-leading diagramming solution used by over 12 million users and we’re thrilled to share our latest innovations. The new Visio makes it easier to define business processes, document best practices, visualize the future state of transformative initiatives, and stay on top of operational insights. Using Office 365, you can share Visio diagrams with everyone and communicate one version of the truth to drive organization-wide alignment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736679145.29/warc/CC-MAIN-20151001215759-00011-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 1,922
| 5
|
https://forums.rpgmakerweb.com/index.php?threads/easy-steal-skill-plugin.56079/
|
code
|
- Nov 25, 2015
- Reaction score
- Primarily Uses
RCWizard Steal Skill
A simple and easy to use steal skill plugin. No parameters required. All implementation is done through note tags in skills and enemies. Download, enable and start stealing!
Implements two new skill effects, 'steal one' and 'steal all' that can be added to skills by filling out the note section.
Stealable items are defined in the enemy note section with a number that can be stolen per battle and a base steal chance.
Download the script to your game's plugin directory and enable in the plugin menu for your game.
Don't use ',' in item names
Feel free to use this in any non-commercial or commercial game.
Feel free to adapt/modify/redistribute as long as you provide proper credits and point to this original thread.
This is my first plugin and I sort of liked how it turned out. It is featured enough to be useful in a lot of different games but is not super configurable without diving into the code. As this is my first plugin, if anyone has any constructive comments please feel free to leave them here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039476006.77/warc/CC-MAIN-20210420152755-20210420182755-00044.warc.gz
|
CC-MAIN-2021-17
| 1,081
| 12
|
https://lists.jboss.org/archives/list/hibernate-dev@lists.jboss.org/2020/3/?page=2
|
code
|
There has been some discussion that it may be useful for hibernate-rx to be
able to define RX-specific event types and listeners.
I've created a POC that adds this support. I still need to do some
testing, but I would like some feedback before I spend too much time on
Please let me know if this is a reasonable improvement. If it is, I will
create an HHH jira and create a pull request.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057861.0/warc/CC-MAIN-20210926114012-20210926144012-00147.warc.gz
|
CC-MAIN-2021-39
| 388
| 6
|
https://10times.com/nfm-symposium
|
code
|
Claim event to edit details
Timings09:00 AM - 06:00 PM
Based on previous editions
Next edition likely in May 2022
UPDATE (December 17, 2020): Due to the COVID-19, we have decided to hold NFM 2021 virtually only, rather than in person. The widespread use and ..
increasing complexity of mission-critical and safety-critical systems at NASA and in the aerospace industry require advanced techniques that address these systems' specification, design, verification, validation, and certification requirements. The NASA Formal Methods Symposium (NFM) is a forum to foster collaboration between theoreticians and practitioners from NASA, academia, and industry. NFM's goals are to identify challenges and to provide solutions for achieving assurance for such critical systems. New developments and emerging applications like autonomous software for Unmanned Aerial Systems (UAS), UAS Traffic Management (UTM), advanced separation assurance algorithms for aircraft, and the need for system-wide fault detection, diagnosis, and prognostics provide new challenges for system specification, development, and verification approaches. Similar challenges need to be addressed during development and deployment of on-board software for both spacecraft and ground systems. The focus of the symposium will be on formal techniques and other approaches for software assurance, including their theory, current capabilities and limitations, as well as their potential application to aerospace, robotics, and other NASA-relevant safety-critical systems during all stages of the software life-cycle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585242.44/warc/CC-MAIN-20211019043325-20211019073325-00647.warc.gz
|
CC-MAIN-2021-43
| 1,577
| 6
|
https://ist.sunyjcc.edu/colored-triangles-in-microsoft-excel/
|
code
|
Did you know that those triangles in my cells in Microsoft Excel are useful indicators?
In Microsoft Office Excel, there are seven options buttons and three colored triangles that can appear in or next to a cell. These buttons and triangles provide useful commands and information about the contents of the cell, and they appear at the moment you need them. This TEI tip describes what each of these triangles mean and how you can work with them.
Colored triangles that you might see in your worksheet
The three colored triangles that can appear in a cell are green (error), red (comment), and purple (smart tag (smart tags: Data recognized and labeled as a particular type. For example, a person’s name or the name of a recent Microsoft Outlook e-mail message recipient is a type of data that can be recognized and labeled with a smart tag.)).
A green triangle in the upper-left corner of a cell indicates an error in the formula in the cell. If you select the cell, the Trace Error button appears. Click the arrow next to the button for a list of options. TIP The color of the error checking triangle indicator can be changed. Use the following procedure to change the color:
1. Click the Microsoft Office Button , click Excel Options, and then click the Formulas category.
2. Under Error Checking, select the Enable background error checking check box.
3. Click the Indicate errors using this color button, and then select a new color
A purple triangle in the lower-right corner of a cell indicates that a smart tag is in the cell. If you rest the mouse pointer over the triangle, the Smart Tag Actions button appears. Click the arrow next to the button for a list of smart tag options.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506646.94/warc/CC-MAIN-20230924123403-20230924153403-00164.warc.gz
|
CC-MAIN-2023-40
| 1,691
| 9
|
http://forums.logitech.com/t5/Microphones-READ-ONLY-ARCHIVE/MSN-Troubles/td-p/417596?nobounce
|
code
|
01-07-2010 08:59 AM
Hi there, I recently got my microphone working (finally!) and now that I go on msn and try use it, no sound comes up. When I go back to my sound options I find that my microphone has been muted, I've ran all setups even the msn audio setup, and still to no avail. I've got three microphones there for some reason, Microphone - High definition audio device, another Microphone - High definition audio divice and Line in - High definition audio device. All three of them reset when I hit the record button on msn. I've got the "Allow programs to take control" box unticked, had it ticked before, but again, to no avail. I had it working earlier on but now its died on me. Help me please, Logitech.
01-08-2010 03:54 PM
Hard to trouble shoot when we don't know the product...
Is this a USB device?
The items you mention are all Sound card options: different ways to configure the sound card mic port.
There should onlly be 1 Hi Def Mic port, unless your sound card has 2?
It looks like you need to re-install the drivers for your sound card. If the sound card came with the computer, then go to Device Manager/Multi Media.../find the sound card and delete it. Then reboot your computer. New Hardware should be found and the drivers installed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711515185/warc/CC-MAIN-20130516133835-00007-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,258
| 8
|
https://www.sysnative.com/forums/threads/surface-pro-with-win-store-error-0x80072f8f.8012/
|
code
|
Hi songwk! :smile9:
I don't know much about surface pro
, like if you can use the command prompt; so, sorry if I'm writing something stupid
Are you using Windows firewall?
Have you tried to launch wsreset
, from the charm bar or the run window?
Have you tried to run sfc /scannow
from an elevated command prompt?
And, if it found anything corrupt, dism /online /cleanup-image /restore-health
Have you read this Troubleshoot problems with an app - Microsoft Windows Help
And tried this, from an elevated command prompt?
powershell -ExecutionPolicy Unrestricted Add-AppxPackage -DisableDevelopmentMode -Register $Env:SystemRoot\WinStore\AppxManifest.xml
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948932.75/warc/CC-MAIN-20230329023546-20230329053546-00630.warc.gz
|
CC-MAIN-2023-14
| 651
| 12
|
https://www.themuse.com/jobs/ibm/managing-data-scientist-022579
|
code
|
Managing Data Scientist
Are you interested in state-of-the-art machine learning algorithms? Do you like solving complex real-world business problems? Would you like to be part of the global artificial intelligence and cognitive computing breakthrough? If your answer to all is yes - IBM is the place to build your career!
We are now looking for Managing Data Scientist to join our team in Helsinki. In this role, you will be part of a consulting team that is helping its clients across industries design and deliver innovative cognitive computing solutions based on IBM Watson technologies and other advanced analytics methods and tools. You will also have a chance to make a difference through your work, be it in building models for predictive maintenance, optimization of large-scale industrial processes, predicting diseases in healthcare industry - or in any other new application area you can think of.
Who you are
- Highly motivated, analytics consultant with several years of experience in developing real world data science solutions
- Willing to learn and have good technical and business aptitude
- Thriving on collaboration, working side by side with people of all backgrounds and disciplines (customers and colleagues), while having good verbal and written communication skills (English and Finnish)
- You have a university degree in e.g. Computer Science, Computer Engineering, Mathematics, IT Management, Economics or similar
Ideally you have hands-on experience on multiple of following topics:
- Machine learning and artificial intelligence methods and algorithms with e.g. R, Python, SAS, SPSS Modeler or Watson Technologies
- Leading an analytics project through its lifecycle
- Leading a multidisciplinary project team
- Coaching and advising junior data scientists on their work
- Industry knowledge to understand clients' business problems and how to solve them
IBM is the largest technology and consulting employer in the world. In this role you will be working independently as a senior data scientist as well as guiding our junior consultants to provide advisory to our clients while leading our analytics projects through their life cycle. We offer unique possibilities for experienced professionals to satisfy their desire to learn more and make a difference through their work. Can you think of a better way to advance your career?
Required Technical and Professional Expertise
- Experience in Machine learning and artificial intelligence methods and algorithms with e.g. R, Python, SAS, SPSS Modeler or Watson Technologies
- Experience in working in a team to conduct an analytics project through its lifecycle
- Knowledge on real world application areas of your interest be it natural language processing, image processing, data analytics or anything else
- University degree in e.g. Computer Science, Computer Engineering, Mathematics, IT Management, Economics or similar
- Finnish language skills
Preferred Tech and Prof Experience
PhD in machine learning or similar relevant area
IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
Back to top
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823516.50/warc/CC-MAIN-20181210233803-20181211015303-00496.warc.gz
|
CC-MAIN-2018-51
| 3,472
| 25
|
http://photo-shah.blogspot.com/2009/10/visitor.html
|
code
|
blog about photos, daily life, scenery.. beautifull thing, myself, people, travel
Friday, October 9, 2009
anybody know what type of snake this is?
I think in Malay we call this type of snake 'Ular Lidi'. last year it visited me and it slithered in to my motorcycle when it got scared. Last year it is smaller this year it's grown up a bit.. but it always slithered into my motorcycle 'again'
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591296.46/warc/CC-MAIN-20180719203515-20180719223515-00357.warc.gz
|
CC-MAIN-2018-30
| 391
| 4
|
https://www.techshadows.com/how-to-set-or-mark-a-partition-as-active-in-windows/
|
code
|
Do you have multiple partitions on your computer with different operating systems installed? If so, you can change the active partition in Windows so that when the computer starts up, it will load the appropriate operating system. This is called a dual-boot or multi-boot system.
Changing the active partition is a fairly advanced task, so if you are planning on doing this, you probably didn’t need the explanation above! Only change the active partition if there is an operating system residing on that partition, otherwise you will have a non-working computer.
Also, there are a few things to note about marking a partition as active:
- A logical drive or extended partition cannot be marked as active, only primary partitions can be changed to active.
- You can only have one active partition per physical hard disk. Trying to do otherwise will cause all kinds of problems.
- If you have several physical hard disks on your computer, you can mark a partition as active on each disk, but only the active partition on the first hard disk detected by your BIOS will start up the computer. You can go into the BIOS and change the order to detect hard disks.
In addition to the above notes, there are additional things that have to be in place in order for the system to boot. Just setting a partition to active does not ensure that the system will boot properly.
- The active partition must have a boot sector that was created by the operating system
- The active partition should contain the boot loader and boot files for the OS and must know the location of the OS on the physical hard drive
- The actual operating system has to be located in the correct spot on the hard drive
When the computer boots up, it will look for an active partition on the primary partitions first. The boot sector, located at the beginning of the active partition, will run the boot loader, which knows the location of the operating system boot files. At this point, the operating system will boot up and run.
Set Active Partition via Disk Management
Open Computer Management by going to the Control Panel, clicking on System and Maintenance, and then clicking Administrative Tools.
You can also click Classic View and then choose Administrative Tools. Now click on Disk Management under Storage.
Another option is to go to your desktop, right-click on Computer or This PC and choose Manage. You’ll see Disk Management in the left hand menu like shown above. Right-click on the primary partition that you want to mark as active and choose Mark Partition as Active.
Set Active Partition via Command Line
If you screwed something up in Windows and marked the wrong partition as active, you will no longer be able to boot your computer. In the case where you cannot mark a partition as active using Windows, you’ll have to us the command line.
Depending on your version of Windows, getting to the command line can be a bit tricky. Read my post on restarting Windows in safe mode to get to the system repair options for Windows XP, Vista, 7, 8 and 10. If you’re running Windows 8, read my post on booting to system recovery options. Once there, you have to go to Troubleshoot, then Advanced Options, and then click on Command Prompt.
First get into the command prompt using a boot up disk and type diskpart at the prompt.
At the DiskPart prompt, type in list disk. You will see the list of disk currently attached to your computer. Now type in select disk n, where n is the disk number. In my example, I would type select disk 0.
Now that we have selected the correct disk, type in list partition to get a list of all the partitions on that disk. To select the partition we want to set as active, type in select partition n, where n is the partition number.
Now that we have selected the disk and partition, we can mark it as active by just typing the word active and pressing Enter. That’s it! Now the partition is set.
Most people are familiar with using FDISK to mark a partition as active, but that is now an older and outdated command. You should use DISKPART to manage disk and partitions on a modern Windows computer.
Set Active Partition via MSCONFIG
In addition to the above two methods, you can use MSCONFIG to set the active partition. Note that this method only works for primary partitions on the same hard drive as MSCONFIG won’t detect partitions on other hard drives. Also, the other partition can only have Windows installed in order to set it as active.
If you’re not familiar with the MSCONFIG tool, read my previous guide on using MSCONFIG. Open MSCONFIG and click on the Boot tab.
You’ll see the operating systems listed and the active one will have Current OS; Default OS after the name of the operating system. Click on the other operating system and then click on Set as default.
There are other methods to set an active partition like using a Linux live CD, but these are much more complicated and normally not necessary. Even if the built-in system recovery options don’t allow you to get to the command prompt, you can always use a secondary computer to create a bootable USB system recovery drive. If you have any trouble, feel free to post a comment. Enjoy!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00041.warc.gz
|
CC-MAIN-2023-14
| 5,181
| 28
|
https://greigmitchell.co.uk/2014/03/finding-a-hyper-v-virtual-machine-guid/
|
code
|
When you create a Virtual Machine in Hyper-V there is an XML configuration file that is created and stored as part of that process, these files are created per Virtual Machine and are named in the form of a GUID String.
The XML files contain various properties of the registered Virtual Machine such as Virtual Switch configuration, VHD paths, Generation type and other unique information specific to that machine.
By default these files are stored in C:ProgramDataMicrosoftWindowsHyper-V under Virtual Machines, and this can be changed in the Hyper-V settings.
From Hyper-V Manager we get a list of our created Virtual Machines but no information regarding the machines unique GUIDs is displayed.
If we look into the location where the XML GUIDs are stored you should see something that looks similar to below:
Opening one of these files in Notepad you will be presented with some of the configuration information that I mentioned above.
If you scroll nearer the bottom of the XML code you will then see the name of Virtual Machine that matches the GUID.
As you can see from above, the GUID string 1B45D37E-2BBB-4B66-BD1C-1BBAE9EEFDD8 matches the Virtual Machine named LAB-DC01
Of course, this is more of a manual way of finding out this information, if you are into PowerShell which supports Hyper-V then this can be done using the PowerShell management Library for Hyper-V available HERE
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530553.34/warc/CC-MAIN-20220519235259-20220520025259-00707.warc.gz
|
CC-MAIN-2022-21
| 1,390
| 9
|
https://community.qlik.com/t5/QlikView-Deployment/32bit-system-running-out-of-steam/td-p/166139
|
code
|
The issue is not " are same files on same computer work slower in 64 bits?" , is "how many days until load is too high for 32 bits?" . That is the moment when random programs die with "out of memory" = server is unreliable.
I am also trying to get a feel for what would be a reasonable specification/cost. For example, if a 64Bit system with 12Gb RAM and similar CPUs as my 32bit environment gave me the same level of performance as I currently have, then I could reasonably ask for 24Gb RAM/better processors to improve performance by a factor of 2.
So, I guess my question is 'what are the relative requirements of 64bit compared to 32bit - 2x RAM? 10x RAM? More processors?'
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823382.1/warc/CC-MAIN-20181210170024-20181210191524-00630.warc.gz
|
CC-MAIN-2018-51
| 677
| 3
|
https://www.justanswer.com/tv-repair/82z31-sony-kdl-40ex401-screen-went-black-green-light-slowly.html
|
code
|
Facing TV Problems? Ask a TV Technician.
Hello and thank you for the question.
How long have you owned the set for please?
Also, are there no signs of life on the TV at all at this point (power light lit, click sound when power is pressed, etc.)?
Additionally, what specific voltages did you check for with the TV plugged in?
I've owned it since mid-2010. No life (I clipped the power supply fuse since it was soldered in hoping that was the problem. Stupid, I know.) But prior to that, occasionally the green light would light up, but no click sound and still black screen. Other times, the green light wouldn't even light up. The voltages I was checking for are the ones listed on the power supply next to each of the connections e.g. 12V..., 24V...
No, the voltage readings were negligible on the power supply, so I didn't even check the main board.
When I was checking for 12V or 24V hardly anything registered. I didn't check for 5V or 3.3V, only 12V and 24V.
Correct, when plugged in, hardly any voltage registers on the power supply and there is no green light or red standby light and pressing the power button does nothing. No clicks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696677.93/warc/CC-MAIN-20170926175208-20170926195208-00462.warc.gz
|
CC-MAIN-2017-39
| 1,143
| 9
|
http://stackoverflow.com/questions/18750265/prettier-date-formats-in-rails
|
code
|
I know I can manually make the date formats however I want with
strftime, but are there any easy ways to quickly make dates look nicer than the
:long_ordinal formats? The
:long_ordinal looks nice but then doesn't have AM/PM, uses military time:
September 11th, 2013 14:00 instead of
September 11th, 2013 2:00 PM.
Ideally there's a kind of
:long_ordinal_prettier format that has the
2:00 PM mechanism here in America and pretty local dates elsewhere in the world.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447559962.154/warc/CC-MAIN-20141224185919-00003-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 462
| 9
|
https://support.google.com/sites/answer/154427?hl=en
|
code
|
Errors while mapping your site to a Google Apps domain
Say that your site URL is http://sites.google.com/site/mysite/, and then you purchase the domain example.com using Google Apps. When you try to map your existing site to the new domain, you'll see this error message: 'This location is already in use by another service, please pick a different one.'
The reason you get this message is that when you sign up for Google Apps, we automatically create a site at http://www.example.com mapped to http://sites.google.com/a/example.com/www. When you try to map http://sites.google.com/site/mysite/ to http://www.example.com, this doesn't work, because we've already mapped it for you.
Here's how you can solve this problem:
- Sign in to the control panel at www.google.com/a/example.com.
- Click the Settings tab and then select Sites in the left column.
- Click the Web Address Mapping tab, where you'll see the www mapping. Select the checkbox and click the Delete mapping button.
- Click Domain Settings tab.
- Click the Domain names tab.
- Under the Primary Domain section, click the Advanced DNS Settings link, and read instructions on how to sign in to the DNS registrar's website (either GoDaddy or eNom).
- Sign in to the DNS registrar, and map the CNAME of www to ghs.google.com.
- Try to set the web address mapping of http://sites.google.com/site/mysite/ to http://www.example.com.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645220976.55/warc/CC-MAIN-20150827031340-00016-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 1,390
| 12
|
http://tucows.com/preview/754887/Data-Marketplace
|
code
|
Data Marketplace makes it easy for people to find, buy and sell data online.
Most data must be aggregated, cleaned, and analyzed to extract useful information. It doesn't make sense that the same person should do all of these things. Data Marketplace connects people who need data with people who are good at collecting, cleaning, and analyzing it.
People request data that they need. Providers upload data to Data Marketplace, provide descriptive metadata, and set a price. Stored metadata is used to help consumers find relevant data through traditional search engines and when browsing the marketplace.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164036943/warc/CC-MAIN-20131204133356-00033-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 605
| 3
|
https://www.fi.freelancer.com/projects/java/java-app-using-pyhton-script/?ngsw-bypass=&w=f
|
code
|
We have an update app that was updating our databases but then when we wanted to update again to use it with our customers, it didn't work. Then also we used a lot of tools like "sqlyog" and son on. So we want someone to review our code and find the error then fix it. Why it doesn't work? Why does it give an error? Otherwise you can make a new update app for us.
11 freelanceria on tarjonnut keskimäärin $121 tähän työhön
Hello, I just read your posting and it sounds like you need a Java, Python and Database Expert. I have rich experience in these fields. If you give me a chance, I will provide you the perfect results. Regards, Pavel
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385378.96/warc/CC-MAIN-20210308143535-20210308173535-00512.warc.gz
|
CC-MAIN-2021-10
| 645
| 3
|
https://discuss.huel.com/t/adding-an-address/15915
|
code
|
Setting aside that you can’t add an address before ordering anything, cause there’s no button anymore, when I do want to add my address, when pressing save, it says “please fix the errors”, but it doesn’t highlight anything in the form. I’ve modifies anything i could in the form, same error everytime.
Seeing that, i contacted support who said they’ll add it for me. A few days later when wanting to finally order, as I proceeded to check out, it asked me for an address. So back to square one, cause it still tells me to fix the invisible errors.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00325.warc.gz
|
CC-MAIN-2023-14
| 562
| 2
|
http://touhou.answers.wikia.com/wiki/How_does_ZUN_create_the_touhou_musics_Does_he_use_musical_instruments_to_record_it_or_does_he_use_a_program_that_generates_music,_along_with_FM_synthesis_If_it%27s_the_latter,_what_program_does_he_use
|
code
|
Its likely a synthesizer program. Why not check the Wikia? If you are looking for a program that makes music than use google to find your own, There are ALOT.
He uses synthesizers. As players usually have the option to play the music as either MIDI or WAV, I'm pretty sure he makes the MIDI file (many programs do this) and then takes that midi and uses a DXi synth or something on it.
ZUN said in an interview that he uses the program Cubase SX for the Touhou music.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424721.74/warc/CC-MAIN-20170724042246-20170724062246-00535.warc.gz
|
CC-MAIN-2017-30
| 467
| 3
|
https://www.visajobshq.com/post/embedded-software-engineer-in-stockholm-relocate-to-sweden-with-work-visa-sponsorship
|
code
|
We are currently looking to expand our team by bringing on an embedded software engineer to help us create goods from concept to mass production. We encourage applications from all over the world. To enable transitioning from another country, we offer relocation support. This support is tailored for each role but always includes visa application, local authority registration, and home-finding service.
EMBEDDED SOFTWARE ENGINEER IN STOCKHOLM | RELOCATE TO SWEDEN WITH WORK VISA SPONSORSHIP
Want to read more?
Subscribe to www.visajobshq.com to keep reading this exclusive post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646937.1/warc/CC-MAIN-20230531150014-20230531180014-00768.warc.gz
|
CC-MAIN-2023-23
| 580
| 4
|
https://www.red94.net/forums/index.php/topic/1408-attention-today-was-lost/
|
code
|
As you may know, the recent increase in traffic necessitated another server upgrade. Pursuant to that, I had to migrate Red94 today. In the course of that migration, much of today's activity in the forum was lost. I deeply apologize for that as it slipped my mind that this would occur. In retrospect, I should have shut down the board prior to beginning the migration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817442.65/warc/CC-MAIN-20240419172411-20240419202411-00011.warc.gz
|
CC-MAIN-2024-18
| 369
| 1
|
http://www.google.ca/patents/US7428727
|
code
|
US 7428727 B2
A system for debugging targets using various techniques, some of which are particularly useful in a multithread environment. These techniques include implementing breakpoints using out-of-line instruction emulation so that an instruction replaced with a breakpoint instruction does not need to be returned to its original location for single-step execution, executing a debugger nub for each target as part of the target task but using a nub task thread for the nub execution that is separate from the target task threads, providing immunity from breakpoints for specified threads such as the nub thread via specialized breakpoint handlers used by those threads, and virtualizing the debugger nub such that a shared root nub provides a uniform interface between the debugger and the target while specialized nubs provide differing functionality based on the type of target being debugged.
1. A computer-implemented method for executing a breakpoint instruction without removing the breakpoint instruction from an executing target program, the target program having a multiple software threads each able to execute without halting execution of the other threads, the method comprising:
executing the target program using a target program thread;
placing a breakpoint at a first location of a first instruction in the target program;
installing an OOL instruction emulation group for the first instruction replaced by the breakpoint in an area of memory different from the first location;
responsive to receiving an indication to assume execution of the target program, executing the OOL instruction emulation group at its installed location; and
subsequent to executing the OOL instruction emulation group, resuming execution of the target program by executing a second instruction at a second location immediately after the first location in the target program.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
10. The method of
11. A computer-implemented method for executing a breakpoint instruction without removing the breakpoint instruction from an executing target program, the target program having a multiple software threads each able to execute without halting execution of the other threads, the method comprising:
in an executing target program, receiving a request to add a breakpoint for a first instruction at a first location in the target program;
generating an OOL instruction emulation group for the first instruction;
installing the OOL instruction emulation group in a free area of memory separate from the first location;
saving an indication of the location of the OOL instruction emulation group; and
replacing the first instruction with a break instruction.
12. The method of
in the executing target program, executing the break instruction causes the target program thread to:
halt execution of the target program; and
transfer control to a breakpoint handler for the target program thread.
13. The method of
retrieving information about the state of the target program thread just prior to the breakpoint;
restoring the target program thread execution environment; and
executing the first instruction from its location within the OOL instruction emulation group.
14. A computer-readable medium having stored thereon computer instructions that, when executed by a computer, cause the computer to:
generate an OOL instruction emulation group for an instruction in an area of memory in an executing target program in a target program thread;
install the OOL instruction emulation group in an area of memory different from the area of memory in the executing target program;
save an indication of the area of memory in which the OOL instruction emulation group is installed; and
replace the instruction in the area of memory in the executing target program with a break instruction.
15. The computer-readable medium of
halt execution of the target program thread upon encountering the break instruction; and
transfer control to a breakpoint handler for the target program thread, such that the breakpoint handler transfers flow of execution to the OOL instruction emulation group in response to an instruction to resume execution of the target program.
16. The computer-readable medium of
17. The computer-readable medium of
18. The computer-readable medium of
19. The computer-readable medium of
20. A computer-readable storage medium containing instructions for executing a breakpoint instruction by a method, the method comprising:
executing a target program in a target program thread, the target program having a break instruction at a first location, the break instruction replacing a first instruction formerly located at the first location;
providing an OOL instruction emulation group comprising a plurality of instructions including the first instruction, the OOL instruction emulation group operable to execute in a free area of memory separate from the first location; and
executing a breakpoint handler operable to interact with a debugger program, the breakpoint handler operable to transfer flow of execution to the OOL instruction group subsequent to interacting with the debugger program.
21. The computer-readable storage medium of
22. The computer-readable storage medium of
23. The computer-readable storage medium of
24. The computer-readable storage medium of
25. The computer-readable storage medium of
26. The computer-readable storage medium of
27. A computer-implemented method for debugging an executing target program having multiple software threads each able to execute without halting execution of the other threads and having at least one breakpoint set in such a manner that encountering the breakpoint causes a break to occur, the method comprising:
executing a first program using a thread of the target program;
executing the target program using the other target program threads;
when one of the other target program threads encounters one of the set breakpoints during execution of the target program and causes a break to occur, halting execution of the one of the other target program thread until an indication is received from the first program to resume execution; and
when the executing first program thread encounters one of the set breakpoints and causes a break to occur, continuing execution of the first program thread without receiving an external indication to continue the execution.
28. The method of
29. The method of
30. The method of
31. The method of
32. The method of
33. The method of
34. The method of
35. The method of
when one of the executing other target program threads performs an operation that triggers an exception, immediately transferring control of execution for that thread to an exception handler for that thread so that the exception handler can process the exception; and
when the executing first program thread performs an operation that triggers an exception, deferring transferring control of execution for the first program thread to an exception handler for the thread until the first program has completed a specified assignment.
36. The method of
37. The method of
38. The method of
39. The method of
when one of the executing other target program threads performs an operation that triggers a fatal trap, immediately transferring control of execution for that thread to a trap handler for that thread to halt execution of the thread; and
when the executing first program thread performs an operation that triggers a fatal trap, blocking transferring control of execution for the first program thread to a trap handler that will halt execution of the thread.
40. The method of
41. The method of
42. The method of
43. The method of
44. The method of
under control of that executing other target program thread,
evaluating the condition to determine if the condition is satisfied; and
when it is determined that the condition is not satisfied, resuming the execution of that executing other target program thread without halting the execution, such that the halting of the execution of that executing other target program thread occurs only when the condition is determined to be satisfied.
45. The method of
46. The method of
47. The method of
This application is a continuation of U.S. patent application Ser. No. 10/247,276, filed Sep. 18, 2002 now U.S. Pat. No. 6,848,097, which is a continuation of U.S. patent application Ser. No. 09/191,985, filed Nov. 13, 1998, now U.S. Pat. No. 6,480,818, issued Nov. 12, 2002, which are hereby incorporated by reference.
This invention relates generally to debugger techniques for computer systems.
Parallel computer architectures generally provide multiple processors that can each be executing different tasks simultaneously. One such parallel computer architecture is referred to as a multithreaded architecture (MTA). The MTA supports not only multiple processors but also multiple streams executing simultaneously in each processor. The processors of an MTA computer are interconnected via an interconnection network. Each processor can communicate with every other processor through the interconnection network.
Each MTA processor can execute multiple threads of execution simultaneously. Each thread of execution executes on one of the 128 streams supported by an MTA processor. Every clock time period, the processor selects a stream that is ready to execute and allows it to issue its next instruction. Instruction interpretation is pipelined by the processor, the network, and the memory. Thus, a new instruction from a different stream may be issued in each time period without interfering with other instructions that are in the pipeline. When an instruction finishes, the stream to which it belongs becomes ready to execute the next instruction. Each instruction may contain up to three operations (i.e., a memory reference operation, an arithmetic operation, and a control operation) that are executed simultaneously.
The state of a stream includes one 64-bit Stream Status Word (“SSW”), 32 64-bit General Registers (“R0-R31”), and eight 32-bit Target Registers (“T0-T7”). Each MTA processor has 128 sets of SSWs, of general registers, and of target registers. Thus, the state of each stream is immediately accessible by the processor without the need to reload registers when an instruction of a stream is to be executed.
The MTA uses program addresses that are 32 bits long. The lower half of an SSW contains the program counter (“PC”) for the stream. The upper half of the SSW contains various mode flags (e.g., floating point rounding, lookahead disable), a trap disable mask (e.g., data alignment and floating point overflow), and the four most recently generated condition codes. The 32 general registers are available for general-purpose computations. Register R0 is special, however, in that it always contains a 0. The loading of register R0 has no effect on its contents. The instruction set of the MTA processor uses the eight target is registers as branch targets. However, most control transfer operations only use the low 32 bits to determine a new program counter. One target register (T0) points to the trap handler, which may be an unprivileged routine. When the trap handler is invoked, the trapping stream starts executing instructions at the program location indicated by register T0. Trap handling is thus lightweight and independent of the operating system (“OS”) and other streams, allowing the processing of traps to occur without OS interaction.
Each MTA processor supports as many as 16 active protection domains that define the program memory, data memory, and number of streams allocated to the computations using that processor. The operating system typically executes in one of the domains, and one or more user programs can execute in the other domains. Each executing stream is assigned to a protection domain, but which domain (or which processor, for that matter) need not be known by the user program. Each task (i.e., an executing user program) may have one or more threads simultaneously executing on streams assigned to a protection domain in which the task is executing.
The MTA divides memory into program memory, which contains the instructions that form the program, and data memory, which contains the data of the program. The MTA uses a program mapping system and a data mapping system to map addresses used by the program to physical addresses in memory. The mapping systems use a program page map and a data segment map. The entries of the data segment map and program page map specify the location of the segment in physical memory along with the level of privilege needed to access the segment.
The number of streams available to a program is regulated by three quantities slim, scur, and sres associated with each protection domain. The current numbers of streams executing in the protection domain is indicated by scur; it is incremented when a stream is created and decremented when a stream quits. A create can only succeed when the incremented scur does not exceed sres, the number of streams reserved in the protection domain. The operations for creating, quitting, and reserving streams are unprivileged. Several streams can be reserved simultaneously. The stream limit slim is an operating system limit on the number of streams the protection domain can reserve.
When a stream executes a CREATE operation to create a new stream, the operation increments scur, initializes the SSW for the new stream based on the SSW of the creating stream and an offset in the CREATE operation, loads register (T0), and loads three registers of the new stream from general purpose registers of the creating stream. The MTA processor can then start executing the newly created stream. A QUIT operation terminates the stream that executes it and decrements both sres and scur. A QUIT_PRESERVE operation only decrements scur, which gives up a stream without surrendering its reservation.
The MTA supports four levels of privilege: user, supervisor, kernel, and IPL. The IPL level is the highest privilege level. All levels use the program page and data segment maps for address translation, and represent increasing levels of privilege. The data segment map entries define the minimum levels needed to read and write each segment, and the program page map entries define the exact level needed to execute from each page. Each stream in a protection domain may be executing at a different privileged level.
Two operations are provided to allow an executing stream to change its privilege level. A “LEVEL_ENTER lev” operation sets the current privilege level to the program page map level if the current level is equal to lev. The LEVEL_ENTER operation is located at every entry point that can accept a call from a different privilege level. A trap occurs if the current level is not equal to lev. The “LEVEL_RETURN lev” operation is used to return to the original privilege level. A trap occurs if lev is greater than the current privilege level.
An exception is an unexpected condition raised by an event that occurs in a user program, the operating system, or the hardware. These unexpected conditions include various floating point conditions (e.g., divide by zero), the execution of a privileged operation by a non-privileged stream, and the failure of a stream create operation. Each stream has an exception register. When an exception is detected, then a bit in the exception register corresponding to that exception is set. If a trap for that exception is enabled, then control is transferred to the trap handler whose address is stored in register T0. If the trap is currently disabled, then control is transferred to the trap handler when the trap is eventually enabled, assuming that the bit is still set in the exception register. The operating system can execute an operation to raise a domain signal exception in all streams of a protection domain. If the trap for the domain signal is enabled, then each stream will transfer control to its trap handler.
Each memory location in an MTA computer has four access state bits in addition to a 64-bit value. These access state bits allow the hardware to implement several useful modifications to the usual semantics of memory reference. These access state bits are two data trap bits, one full/empty bit, and one forward bit. The two data trap bits allow for application-specific lightweight traps, the forward bit implements invisible indirect addressing, and the full/empty bit is used for lightweight synchronization. The behavior of these access state bits can be overidden by a corresponding set of bits in the pointer value used to access the memory. The two data trap bits in the access state are independent of each other and are available for use, for example, by a language implementer. If a trap bit is set in a memory location, then an exception will be raised whenever that location is accessed if the trap bit is not disabled in the pointer. If the corresponding trap bit in the pointer is not disabled, then a trap will occur.
The forward bit implements a kind of “invisible indirection.” Unlike normal indirection, forwarding is controlled by both the pointer and the location pointed to. If the forward bit is set in the memory location and forwarding is not disabled in the pointer, the value found in the location is interpreted as a pointer to the target of the memory reference rather than the target itself. Dereferencing continues until either the pointer found in the memory location disables forwarding or the addressed location has its forward bit cleared.
The full/empty bit supports synchronization behavior of memory References. The synchronization behavior can be controlled by the full/empty control bits of a pointer or of a load or store operation. The four values for the full/empty control bits are shown below.
The full/empty bit may be used to implement arbitrary indivisible memory operations. The MTA also provides a single operation that supports extremely brief mutual exclusion during “integer add to memory.” The FETCH_ADD operation loads the value from a memory location, returns the loaded value as the result of the operation, and stores the sum of that value and another value back into the memory location.
Each protection domain has a retry limit that specifies how many times a memory access can fail in testing full/empty bit before a data blocked exception is raised. If the trap for the data blocked exception is enabled, then a trap occurs. The trap handler can determine whether to continue to retry the memory access or to perform some other action. If the trap is not enabled, then the next instruction after the instruction that caused the data blocked exception is executed.
A speculative load occurs typically when a compiler generates code to issue a load operation for a data value before it is known whether the data value will actually be accessed by the program. The use of speculative loads helps reduce the memory latency that would result if the load operation was only issued when it was known for sure whether the program actually was going to access the data value. Because a load is speculative in the sense that the data value may not actually be needed by the program, it is possible that a speculative load will load a data value that the program does not actually use. The following statements indicate program statement for which a compiler may generate a speculative load:
When a memory operation fails (e.g., synchronized access failure), an MTA processor saves the state of the operation. A trap handler can access that state. That memory operation can be redone by executing a redo operation (i.e., DATA_OP_REDO) passing the saved state as parameters of the operation. After the memory operation is redone (assuming it does not fail again), the trapping stream can continue its execution at the instruction after the trapping instruction.
The appendix contains the “Principles of Operation” of the MTA, which provides a more detailed description of the MTA.
While the use of a multithreaded architecture provides various benefits for the execution of computer programs, multithreaded architectures also add various complexities to the development and testing of application programs. Debugger programs, used to control execution of other executable code in order to identify errors and obtain information about the execution, are one type of application program which may face additional complexities in a multithreaded environment but may also benefit from capabilities of the environment.
For example, a common feature in debugger programs is the ability to set one or more breakpoints in the target code (i.e., the code to be debugged). When the executing target code encounters such a breakpoint, execution is halted and control of the target code execution is transferred to the debugger. On sequential machines (i.e., those with only one thread can execute at a time), breakpoints are often implemented by replacing an instruction in the target code with a breakpoint instruction to halt execution of the target code (e.g., a trap instruction or a jump to the debugger). At some point after execution of the target code has been halted by a breakpoint, a user of the debugger will indicate that execution of the target code should resume.
Upon receiving the indication to resume, the debugger first executes the replaced instruction in-line with the rest of the target code (i.e., at the memory location in which the code was originally loaded) before continuing execution. This in-line execution is accomplished by temporarily returning the replaced instruction to its original position in the target code, executing the next instruction of the target code (i.e., single stepping the target code) so that the replaced instruction is executed, re-replacing the replaced instruction with the breakpoint instruction so that future executions of this code will encounter the breakpoint, and then resuming execution of the target code at the instruction to be executed following the replaced instruction in the execution sequence. In-line execution allows the replaced instruction to be executed in the location in which it was originally loaded and in its original execution environment (e.g., using the current state of current register and stack values).
While the described breakpoint technique is appropriate for sequential machines, problems arise when this technique is used in a multithreaded environment. For example, when the replaced instruction is temporarily returned to the target code for the single-step in-line execution, other threads may execute the replaced instruction instead of the breakpoint. Thus, some threads may not break even though a valid breakpoint has been installed.
Debugger programs face other difficulties in providing desired capabilities regardless of whether execution occurs in sequential or multithreaded architectures. For example, in addition to setting breakpoints, debuggers often provide the capabilities to set watch points for monitoring when a value in a memory location changes, to evaluate user-supplied expressions in the current context of the target code, to single-step the evaluation of the target code, etc. To implement such capabilities, debuggers typically rely on OS support to obtain information about the state of the target code (e.g., values currently stored in memory locations) and to perform operations such as replacing a target code instruction with a breakpoint instruction. However, the level of support available can vary with different OSes, and the types of support may also vary with the type of target code. For example, debugging of an operating system typically requires a separate debugger (e.g., a kernel debugger) than for a user application program, and different debuggers may be needed for application programs written in different computer languages (e.g., Java, C++, or Fortran).
Another debugger difficulty arises if a breakpoint has been set on an instruction that is used by the debugger as well as by the target code (e.g., on a function in a shared library or on a commonly used function such as ‘print’). If the debugger executes the breakpoint, execution of the debugger may halt with no means to resume the execution. Thus, various steps must be taken to ensure that the debugger will not perform breakpoints. One memory-intensive approach that addresses this problem involves creating separate copies of any shared function so that the breakpoint set in the target code copy of the function will not be present in the debugger copy of the function.
Finally, when a debugger is not available to locate an error in target code or when only static dump state information (i.e., various information about the state of a computer system near the moment of system crash, such as a memory core dump or hardware scan file) for the target code is available, analysis of the static dump state information may be the only debugging recourse. Such analysis is typically performed manually by reviewing bit values, a time-consuming process which may reveal only limited information.
Embodiments of the present invention provide various techniques for debugging targets. These techniques include implementing breakpoints using out-of-line instruction emulation so that an instruction replaced with a breakpoint instruction does not need to be returned to its original location for execution, executing a debugger nub for each target as part of the target task but using a nub task thread for the nub execution that is separate from the target task threads, providing immunity from breakpoints for specified threads such as the nub thread via specialized breakpoint handlers used by those threads, and virtualizing the debugger nub such that a shared root nub provides a uniform interface between the debugger and the target while specialized nubs provide differing functionality based on the type of target being debugged.
In one embodiment, a method for debugging a task executing on a computer system having a processor with multiple streams for executing threads of the task is used. In this embodiment, the method involves executing a debugger nub of a specialized type using one thread of the task, with the specialized type of the debugger nub chosen based on a type of the task and with the debugger nub thread having a breakpoint handler distinct from breakpoint handlers of the other task threads. When the debugger nub thread receives a request from a debugger to set a breakpoint at a specified location in the task, the request is performed in a specialized manner, determined by the specialized type, by identifying an executable instruction at the specified location, generating a group of instructions for emulating the identified instruction out-of-line at a location other than the specified location, loading the generated group of instructions into the other location, and replacing the identified instruction at the specified location with an inserted instruction that when executed will create a break. When a thread other than the debugger nub thread encounters the inserted instruction, the identified instruction is executed by transferring control of execution for the thread to the breakpoint handler for the thread, notifying the debugger nub of the encounter with the inserted instruction so that the debugger nub can notify the debugger of the encounter, and after receiving an indication from the debugger via the debugger nub to resume execution, executing the group of instructions loaded at the other location. When the debugger nub thread encounters the inserted instruction, the identified instruction is executed by transferring control of execution for the nub thread to the breakpoint handler for the nub thread, and by executing the group of instructions loaded at the other location without notifying the debugger of the encounter and without receiving an indication from the debugger to resume execution. When the debugger nub thread receives a request from another thread to perform an action for the another thread, any exceptions that occur during performing of the action are masked so that execution of the debugger nub is not halted and so that the debugger nub can notify the debugger of the exceptions.
Embodiments of the present invention provide various techniques for debugging targets. In particular, the techniques include implementing breakpoints using Out-Of-Line (OOL) instruction emulation so that an instruction replaced with a breakpoint instruction does not need to be returned to its original location for execution, executing a debugger nub for each target as part of the target task but using a nub task thread for the nub execution that is separate from the target task threads (i.e., the threads executing target code), providing immunity from breakpoints for specified threads (e.g., the nub thread) via specialized breakpoint handlers used by those threads, and virtualizing the debugger nub such that a shared root nub provides a uniform interface between the debugger and the target while specialized nubs provide differing functionality based on the type of target being debugged.
In the illustrated embodiment, the debugger program 310 interacts with the nubs 325, 335, and 345 in a uniform manner to obtain state information about executing target user application program 320, executing target OS program 330, and static target dump state information file 340 respectively as well as to control execution of programs 320 and 330. The debugger program can interact with one or more nubs either concurrently or sequentially, and the interaction can be performed in a variety of ways (e.g., socket-based message passing). In addition, the debugger can execute on the MTA computer as shown, or can execute on a separate host computer (not shown) in communication with the MTA computer. Similarly, a nub such as the static target nub can also execute on a separate computer, and can retrieve information from the static target information file as stored on the MTA computer or as loaded onto the separate computer.
As is shown, the debugger program uses a single nub interface 315 to uniformly communicate with the root nub portions 355 of each of the nubs 325, 335, and 345. The nubs 325, 335, and 345 also contain specialized nub portions 327, 337 and 347 respectively that receive debugger messages from their root nubs 355, and that use target-specific functionality to respond to the messages (e.g., to set breakpoints and to evaluate expressions in the target context) for their targets. Those skilled in the art will appreciate that the illustrated components are merely illustrative and are not intended to limit the scope of the present invention. For example, only a single processor may be available or a very large number of processors could be available. In addition, some or all of the processors could be executing other tasks at the same time as executing the illustrated tasks. Moreover, those skilled in the art will appreciate that the debugger programs and the various targets can be executing on a single processor or each on a different processor. Accordingly, the present invention may be practiced with other computer system configurations.
When the debugger interacts with executing targets such as programs 320 and 330, the corresponding nubs execute as part of the executing targets. Since those nubs are part of the executing targets, the nubs can gather information about the executing targets (e.g., by directly reading target memory) without requiring support from any other programs. For example, the debugger can interact with nub 325 to implement debugger capabilities for user program 320 without requiring any OS support. In some embodiments, the nubs execute using a nub thread that is part of the executing target task but that is separate from other target threads. In those embodiments, the nub thread executes at the same privilege level as the other target threads and can gather information about those other threads. Those skilled in the art will appreciate that when a target is executed in parallel on multiple processors, various additional steps may need to be taken by the debugger or by the debugger nubs. For example, a nub may need to be executed for each processor, or instead a single nub may coordinate all target threads across the multiple processors. In addition, if a separate copy of the target is created for each of the processors, then when setting breakpoints the breakpoint will need to be added to each copy of the target.
When the debugger instead interacts with a static target such as file 340, the nub can execute in a variety of ways, such as a stand-alone task, as part of the debugger, or as part of some other task. Those skilled in the art will appreciate that nub code can be added to targets in a variety of ways, such as by adding the nub code to the target during compilation, by inserting nub code into the compiled target before execution, or by passing an executable object or message to an executing target.
Implementing a debugger nub using a separate thread within an executing target provides various benefits. As previously described, each thread of a task can execute a trap independently of other task threads and without OS support. When an exception causes a trap to occur, a trap handler is invoked that saves the state of the executing thread in a save area for the thread. This general trap handler then determines the type of exception that caused the trap, and invokes an exception trap handler that is appropriate for the exception. Those skilled in the art will appreciate that the various trap handlers can be dynamically modifiable, such as by using registers or a memory jump table to contain the addresses for the currently defined trap handlers.
In some embodiments, breakpoints are implemented by inserting a breakpoint instruction in target code that will cause an exception when executed by the target thread. The breakpoint exception handler, executing on the target thread's stream, can then interact with the nub thread to allow interactive debugger control over the trapping thread and over the target in general. As previously indicated, the nub thread can gather information about the target thread that caused the exception (e.g., from the save area for the thread) as well as about other target threads.
Since each thread performs trap handling separate from other threads, different general trap handlers and/or different specialized exception trap handlers can be specified for different threads executing as part of a single task. This allows different threads to implement specific trap capabilities without loss of efficiency. Moreover, since installation and modification of trap and exception handlers are not privileged instructions, the target program itself can modify the trap handlers for task threads. Specialized trap and exception handlers allow the nub thread to process exceptions differently than target threads.
One reason for the nub to handle exceptions differently than target threads arises when the nub thread encounters a breakpoint when executing its own code. Since part of implementing a breakpoint involves the nub interacting with the debugger, halting the debugger due to the breakpoint is undesirable. A specialized breakpoint handler for the nub thread provides immunity to breakpoints, allowing the nub to pass breakpoints without halting.
It is also often desirable for the nub to rebind (e.g., temporarily modify) any fatal trap handlers while doing certain types of debugger nub work so that execution of the nub is not prematurely halted due to an error. An example of this situation arises when the nub is evaluating the condition on a conditional breakpoint on behalf of a target thread. If the condition specified by the user of the debugger is bad and would normally cause a fatal exception, it is desirable to inform the user of that fact and of the details of the exception rather than allowing the target to crash. Avoiding such a crash can be accomplished by rebinding the fatal handlers for the nub to versions that, upon encountering an error, unwind that evaluation and return the appropriate error information to the user.
In other situations, it is desirable for threads to temporarily or permanently mask some exceptions. For example, it can be necessary to asynchronously signal all running threads in a task for a variety of reasons, such as to halt execution of the task so that the current state of the task can be examined. Similarly, in some embodiments it may be desirable to halt all threads when any thread encounters a breakpoint. In such embodiments, it is particularly useful to use out-of-line instruction emulation so that when the condition of a encountered conditional breakpoint is false, the thread that encountered the breakpoint can merely execute the out-of-line instruction emulation and continue execution without needing to unnecessarily halt the other threads.
An asynchronous signal sent to all running threads of a task is referred to as a domain signal. If a domain signal is used in a debugging context to manipulate target threads, it is desirable for the nub to ignore the domain signal. Thus, in some embodiments the nub will permanently mask the domain signal. It may also be necessary for some target threads to temporarily mask the domain signal. For example, if the nub needs to access various data structures of the target threads, the data structures must be in a consistent and unlocked state. This requires that the domain signal be masked while these data structures are accessed or these locks are held. Thus, in some embodiments these data structures and locks are designed to automatically mask domain signals while they are being accessed or held. After the debugger nub raises the domain signal (or asks the OS to do so), it waits for all threads to respond to the domain signal before accessing the data structures, thus ensuring that the data structures are in the proper state.
As previously mentioned, the debugger nub is virtualized so that a root nub provides a uniform interface to the debugger while nubs specialized for different types of targets implement some debugger functionality in target-specific manners. In some embodiments, object-oriented techniques are used (e.g., using C++) such that the root nub is implemented as a class and the specialized nubs as derived classes of the root nub class. For example, user nub, OS nub, and static dump state information nub classes can be specialized derived classes of the root nub class that correspond respectively to application programs invoked by a user, the operating system, and various types of static dump state information. Those skilled in the art will appreciate that multiple levels of specialization can be used, such as having derived classes of the static dump state information nub class that correspond to nubs for a scanned hardware state, for an operating system core dump, and for an application program core dump.
Regardless of which specialized nub is in use, functionality provided by the root nub is used to provide a uniform interface to the debugger. In some embodiments, this uniform interface implements low-level communication protocols (e.g., get-packet), while higher-level debugger functionality (e.g., set-breakpoint and evaluate-expression) is implemented in a target-specific manner by some or all specialized nubs. When object-oriented techniques are used, the root nub can define the interfaces for all of the functions that can be invoked by the debugger. For those functions which are implemented uniformly for all nubs, the root nub can provide a public implementation of the function that is not specialized by the derived class nubs. For those functions which may be implemented in a target-specific manner by some or all specialized nubs, the root nub can provide virtual functions (e.g., pure virtual functions) which can be specialized by some or all of the nub derived classes.
Target-specific debugger functions may be needed in a variety of situations. For example, setting a breakpoint involves modifying the program memory of the target. This may be a privileged operation that can be performed by the operating system (and thus the OS nub), but cannot be directly performed by an application program (and thus the user nub). In this case, the user nub would need to implement the set-breakpoint functionality differently than the OS nub. Also, as previously mentioned some types of targets may not support all of the available debugger capabilities. Thus, the static dump state information nub may need to implement the resume-stream-execution functionality by notifying the debugger that this functionality is not currently available. Alternately, the default inherited resume-stream-execution functionality from the root nub might provide this functionality, and the OS and user nubs may specialize the function with implementations appropriate for their target environments. Other distinctions between targets which may require specialization of functionality include how data structures for target threads are stored (e.g., needed to perform expression evaluation) and how other target threads are identified or contacted (e.g., needed to gather information about all threads or a specified thread). Those skilled in the art will appreciate that any such differences in targets will require specialization of any debugger functionality that accesses the differences.
In the illustrated embodiment, the root nub class is a C++ class that implements a variety of low-level functions so that the derived nub classes can use the common functionality. These common functions, defined as private member functions, include functions to perform low-level communication functions such as decoding received packets from the debugger and encoding packets to send message to the debugger. Higher-level functions which may be specialized by nubs, defined by the root nub as virtual functions, include destroy, set_ttymodes, nub_remote_open, nub_remote_close, free, malloc, realloc, user_disable_debug_trap_message, setup_suicide, enable_suicide, resume, exit, detach, kill_program, sleep, evaluate_expression, read, write, find_threads, find_teams, start_program, restart_program, set_breakpoint, delete_breakpoint, set_watchpoint, delete_watchpoint, get_thread_handle, read_from_text_memory, fetch_inferior_registers, and check_version. If derived nubs must specialize the functionality, the functions can be defined as pure virtual functions. High-level requests which the debugger can make to the nubs include evaluate expression, set breakpoint, delete breakpoint, set watchpoint, delete watchpoint, get thread handle, read registers, read program memory, continue with a single-step, continue without single-stepping, detach, kill, get last signal, get protocol, get thread set, get team set, start program, restart program, and interrupt program.
Thus, when a user of a debugger program requests the nub for this target to add a breakpoint for instruction Y=X*Z, another technique is used. An OOL Instruction Emulation Group is first generated so that the instructions in the group can be executed in another area of memory (i.e., out-of-line), but with the same effect as if instruction Y=X*Z were executed at its original location. After the group is generated, it is installed in a free area of memory separate from the original location of the replaced instruction as shown in
When the instructions shown in
When execution continues at the instructions in the OOL Instruction Emulation Group, the instructions first retrieve information about the state of the target thread just before the breakpoint, and then restore the necessary information into the current state of the stream to allow the replaced instruction to execute. For example, if the replaced instruction needs to load information from a particular general register (e.g., a register that stores the current value of X), the previous value of that register must be made available to the instruction so that it can execute. Similarly, target registers, the values in the exception register, and the values in the upper half of the SSW may affect execution of the replaced instruction, and thus may need to be restored to provide the appropriate environment for the execution of the replaced instruction. Restoring the appropriate execution environment is described in greater detail below.
After the appropriate target thread execution environment has been restored, the replaced instruction can then be executed at its new memory location in the group. Any changes to the state of the thread must then be saved in the save area for the target thread. Thus, when the breakpoint handler finishes executing, the saved state of the target thread will reflect the thread state just after execution of the replaced instruction. For example, if the variable Y is stored in a general register and the value of that register was updated as a result of executing the replaced instruction, the stored value in the save area for that register must be updated. Similarly, the target registers, the exception register, the upper half of the SSW register, and other register counts may need to be updated. The saving of the results of the execution is described in greater detail below.
After the saved state of the target thread has been updated, the instructions in the OOL Instruction Emulation Group must ensure that the target is thread will resume execution with the instruction to be executed after the replaced instruction. In the illustrated embodiment, the OOL Instruction Emulation Group is created as a subroutine. In this embodiment, instructions in the group adjust the PC to point to the correct target instruction to be executed after the emulated instruction, and this PC is saved in the lower half of the SSW register in the save area. When the OOL Instruction Emulation Group completes execution with a RETURN instruction, flow of execution returns to the breakpoint handler. When the breakpoint handler terminates and the target thread state is restored, the adjusted PC will point to address 002001, and execution will thus resume there. Rather than ending the OOL Instruction Emulation Group with a RETURN, the last instruction could explicitly execute a jump to the correct address. In either case, the processing of the breakpoint has been performed without removing the BREAK instruction from the target code instructions. Thus, if another target thread had executed the same instructions while the breakpoint for the first target thread was being processed, the second target thread would also encounter the breakpoint instead of inadvertently missing a temporarily absent BREAK instruction.
Those skilled in the art will appreciate that a variety of other breakpoint situations are possible. For example, it is possible to set conditional breakpoints such that control of execution will transfer to the debugger only if the specified condition is true at the time that the breakpoint is hit. In some embodiments, conditional breakpoints are implemented by having the nub save the information about the condition but still using an unconditional breakpoint instruction such as BREAK. In these embodiments, the breakpoint handler will always be invoked, but the first action of the breakpoint handler can be to determine whether the breakpoint was conditional and if so whether the condition is true. In alternate embodiments, conditional breakpoints can be implemented in other ways, such as with a conditional break instruction. The breakpoint handler can request that the nub evaluate the condition and return an indication of the condition, or can instead retrieve the condition information from the nub and evaluate the condition directly. When the condition is false, the technique of the present invention allows the breakpoint handler to execute the OOL Instruction Emulation Group without ever halting to interact with the debugger program, and then continue on with the target thread execution. In this manner, the BREAK instruction present in the target code can be bypassed without OS interaction for conditional breakpoints whose conditions are false.
For example, in the illustrated embodiment the breakpoint could have been installed as a conditional breakpoint indicated to take effect only if the value of variable Z is greater than 15. Thus, if a single thread is executing each iteration of the loop, the thread will not break until later iterations when Z is greater than 15. Alternately, multiple threads may execute the loop with each thread responsible for a single possible value of Z. Thus, some threads will never break at the conditional breakpoint (e.g., the thread for which the value of Z is 10), while other threads will break (e.g., the thread for which the value of Z is 20).
Other variations on breakpoints which may require special processing by the OOL Instruction Emulation Group include replaced instructions that are transfer instructions (e.g., a JUMP or SKIP instruction) that may transfer flow of execution to an instruction other than that immediately following the transfer instruction, as well as instructions using named registers which are in use by the breakpoint handler. For transfer instructions, it is necessary to ensure that the target thread will resume execution at the appropriate instruction. When values cannot be restored to named registers prior to execution of the replaced instruction (e.g., because the breakpoint handler is using the registers), the replaced instruction added to the OOL Instruction Emulation Group can be rewritten so that other registers are used. In this situation, the restore and save environment instructions will be modified to use the replacement registers accordingly. These and other out-of-line emulation situations will be described in greater detail below.
The routine begins at step 505 where a request is received from a target thread or from the debugger. The routine continues at step 510 to determine whether the request is a request from the debugger to create a breakpoint at a specified instruction within the executable code of the target. If so, the routine continues to step 515 to allocate memory for the instruction group to be generated, and then invokes the Generate OOL Instruction Emulation Group subroutine 515 for the instruction to be replaced. The routine continues at step 520 where the generated instruction group is installed in the allocated memory, and information about the created group is stored in an accessible location. The stored information will include a mapping from the original address of the replaced instruction to the address of the first installed instruction of the instruction group, and may include information about the breakpoint such as the condition for a conditional breakpoint or any other information to be supplied to the breakpoint handler when this breakpoint is encountered. The routine then continues at step 525 to replace the specified instruction in the target code with a BREAK instruction.
In the illustrated embodiment, the BREAK instruction is designed to trigger an exception caused when the executing thread does not have the necessary privilege level to execute a privileged instruction. Thus, when the BREAK instruction is encountered, execution will be transferred to the trap handler for the executing thread and the trap handler will in turn invoke the privileged exception trap handler for the thread. The privileged exception trap handler will either act as the breakpoint handler and process the breakpoint directly, or will invoke a separate breakpoint handler for the thread to process the breakpoint.
In addition, as was previously discussed the nub in the illustrated embodiment executes as a task thread for the target program task. Thus, it is possible that the nub will itself execute one or more instructions for which a breakpoint has been set (e.g., the print function). It is desirable that the nub merely execute the instruction and skip the breakpoint processing performed for target threads. Thus, in the illustrated embodiment the breakpoint handler routine for the nub thread is designed to abstain from breakpoint processing. Instead, if the nub thread encounters a breakpoint, the nub thread breakpoint handler will merely execute the corresponding OOL Instruction Emulation Group for the breakpoint, and then continue normal execution.
If it was decided in step 510 that the received request was not to create a breakpoint, the routine continues at step 540 to determine if the received request is a directive from the debugger indicating to begin execution of one or more target threads or to resume execution of one or more halted target threads. If so, the routine continues at step 545 to notify the target threads to begin or continue execution as directed. When execution is resumed after a halt due to a breakpoint, execution of the OOL Instruction Emulation Group for that thread will be performed by the breakpoint handler for the thread. After step 545, the routine continues to step 547 to wait for a notification from a target thread indicating that execution of the target thread has halted. In addition to execution halts resulting from breakpoints, target threads may halt for a variety of other reasons such as executing an invalid instruction, encountering a watchpoint, having executed a specified number of instructions (e.g., single-stepping), or by receiving a user-initiated manual break directive.
If it is determined in step 540 that the received request is not a debugger directive to begin or resume target thread execution, the routine continues at step 550 to determine if the received request is a request from the debugger or from a target thread to evaluate an expression or a condition in the context of a particular target thread. If so, the routine continues at step 555 to evaluate the expression, and in step 560 notifies the requester of the result. If it was determined in step 550 that the received request was not to evaluate an expression, the routine continues at step 565 to perform some other received request from the debugger, such as to remove a breakpoint (by permanently replacing the BREAK instruction with the previously replaced instruction), to retrieve various status information about the target threads, or to send a domain signal to the target threads to halt execution of the target. Those skilled in the art will appreciate that the debugger nub can perform a variety of other functions. After steps 525, 547, 560, or 565, the routine continues at step 590 to determine if there are more requests to receive. If so, the routine returns at step 505, and if not the routine ends at step 595.
The subroutine begins at step 603 where an indication of the instruction to be replaced, the address of the instruction and the address of the OOL Instruction Emulation Group installation location are received. The subroutine continues to step 605 to determine if the instruction is allowed to be emulated. For example, in some embodiments some instructions are too complex to be emulated. In the illustrated embodiment, the instructions STREAM_CREATE_IMM, TRAP*, LEVEL*, DATA_OP*, DOMAIN*, STREAM_CATCH, and RESULTCODE_SAVE are not allowed to be emulated. Those skilled in the art will appreciate that various factors can be considered when determining which codes are either impossible to emulate or for whom the effort required for emulation is not worth the benefit.
The subroutine continues to step 610, and if it is indicated that the instruction is not allowed to be emulated then the subroutine continues to step 615 to notify the debugger that a breakpoint is not allowed to be set for the indicated instruction. Those skilled in the art will appreciate that in other embodiments a breakpoint could be added and processed in-line, either requiring all of the threads to halt during any temporary return of the replaced instruction to be executed in-line after the breakpoint has been processed or accepting that some threads may miss the breakpoint during the temporary return. If it is instead indicated in step 610 that the instruction is allowed to be emulated, the subroutine continues to step 620 to execute subroutine 620, which performs the necessary modifications to the instruction to allow it to be emulated in its new memory location. The subroutine then continues to step 625 to execute subroutine 625, which emits code for the OOL Instruction Emulation Group that when executed will restore the execution environment of the target thread just before the breakpoint was encountered.
The subroutine next performs special processing if the instruction to be emulated is a transfer instruction (or if a multi-operation emulated instruction contains a transfer operation). In the illustrated embodiment, transfer instructions are either conditional SKIP or conditional JUMP instructions. The subroutine first continues to step 630 to determine if the instruction is a transfer instruction. If the instruction is a JUMP instruction, the subroutine continues to step 635 to change the instruction to be emulated to be a SKIP instruction with a specified offset that will invoke appropriate code in the OOL Instruction Emulation Group that will be emitted. Alternately, if it was determined in step 630 that the instruction is a SKIP instruction, the subroutine continues to step 637 to modify the SKIP offset to be the specified offset so that the modified SKIP will invoke the appropriate code in the OOL Instruction Emulation Group. As will be described in greater detail with respect to subroutine 645 described in
Thus, after step 640 the subroutine next executes subroutine 645, which emits instructions to update the saved state of the target thread to reflect any changes occurring from execution of the emulated instruction. The emitted instructions then restore the breakpoint handler execution environment to enable a smooth transition from the breakpoint handler back to the target thread processing. If the emulated instruction is a transfer instruction, whether conditional or not, instructions will be emitted to handle the situation. After step 645 or step 615, the subroutine returns at step 695. Those skilled in the art will appreciate that the particular instructions necessary for out-of-line emulation will vary with the particular computer system architecture on which the emulation is to take place.
The subroutine begins at step 705 where any source and destination general and target registers for the instruction are identified. The subroutine then continues to step 710 to determine if register renaming is necessary for any of the registers, and if so to identify available registers. The subroutine then continues to step 715 to update the registers in the instruction, if necessary, to reflect any renamed registers, and also sets the instruction's lookahead value to be zero. The subroutine then continues to step 720 to compute a PC correction such that addition of the PC correction to the PC resulting from execution of the emulated instruction will generate a pointer to the instruction to be executed after the emulated instruction. The subroutine then continues to step 795 and returns.
The subroutine begins at step 805 where the code to restore the appropriate source registers is emitted. The subroutine continues to step 810 to emit the code to save the current exception register and the upper half of the SSW (the non-PC portion). The subroutine then continues to step 815 to restore the values of the exception register, upper half of the SSW, and instruction count that existed just prior to encountering the breakpoint. The instruction count is a variable supported in hardware that allows the debugger to maintain a count of how many instructions have been executed by the thread, thus allowing the debugger to know when a specified number of instructions have been executed. Since a series of instructions will be executed in an OOL Instruction Emulation Group in place of a single emulated instruction, the value of the instruction count must be specifically handled so that it reflects only the execution of the emulated instruction. Moreover, if in-line execution of the emulated instruction would have caused the instruction count variable to reach a value predetermined to execute a trap, the OOL Instruction Emulation Group delays processing of that trap until the appropriate breakpoint handler state has been restored. After step 815, the subroutine continues to step 895 and returns.
The subroutine begins in steps 905 through 910 by emitting code that is appropriate if the emulated instruction in the OOL Instruction Emulation Group is not a transfer instruction or in which a conditional branch of a transfer instruction is not taken. In that situation, the code to be emitted in steps 905 through 910 will be executed just after the execution of the emulated instruction. In step 905, the subroutine emits code to save the upper half of the current SSW, and to restore the previously saved SSW for the breakpoint handler. The subroutine continues to step 910 to emit code that will add the previously calculated PC correction to the lower half of the just-saved SSW so that the PC will point to the appropriate instruction.
The subroutine next continues to step 915 to determine if the emulated instruction is a transfer instruction. If so, special processing of the transfer instruction is required, and in steps 920 through 930 the subroutine will emit code to handle the situation in which the emulated instruction was a transfer instruction. If the emulated instruction is a transfer instruction, the instruction will have been modified earlier, as described with respect to
After step 930, or if it was determined in step 915 that the emulated instruction is not a transfer instruction, the subroutine continues to step 935 to emit code to transfer the exception register, the saved version of the SSW, and the instruction count to the save area for the target thread. The subroutine then continues to step 940 to emit code that saves the values modified in any destination general or target registers by the emulated instruction to the appropriate registers in the save area, using the register renaming mapping if necessary to modify the appropriate registers. The subroutine continues to step 945 to determine if the emulated instruction is one that modifies an address stored in a register by a specified offset amount, and if so emits code to correct the address in that register for the saved area. For example, in the illustrated embodiment instructions such as SSW_DISP and TARGET_*DISP will need to be corrected. The subroutine then continues to step 950 to emit code to the OOL Instruction Emulation Group to cause a return, and the subroutine then continues to step 995 and itself returns. In the illustrated embodiment, the OOL Instruction Emulation Group is implemented as a subroutine, thus allowing any processing to be performed to be stored temporarily on the stack and to then be removed after the OOL Instruction Emulation Group returns. Those skilled in the art will appreciate that other implementations of the OOL Instruction Emulation Group are possible (e.g., having an explicit JUMP to the instruction to be executed after the emulated instruction).
This subroutine begins at step 1005 after a breakpoint has been encountered and the privileged instruction exception handler has transferred flow control to the breakpoint handler. In step 1005, the subroutine retrieves saved information about the breakpoint from when the breakpoint was created, including the beginning address for the OOL Instruction Emulation Group corresponding to the breakpoint. The subroutine then continues to step 1010 where it executes the instructions in the OOL Instruction Emulation Group, thus performing the codes emitted into the OOL Instruction Emulation Group when the instruction group was generated. The subroutine ignores various other information about the breakpoint, such as whether or not the breakpoint is conditional, since the subroutine is designed to continue execution of the nub thread as if a breakpoint had not been encountered. Those skilled in the art will appreciate that other instructions (e.g., providing status notification to a log file or to the debugger) could be performed in addition to the OOL Instruction Emulation Group. After step 1010, the subroutine continues to step 1095 and returns, thus returning execution to the nub thread at the instruction following execution of the emulated instruction.
The routine begins at step 1105 where the next target instruction to be executed is selected, beginning with the first instruction upon initial execution of the stream. The routine then continues to step 1110, with flow of execution varying depending on whether the current instruction is a breakpoint. If the current instruction is not a breakpoint, the routine continues to step 1115 where the instruction is executed in-line in a normal fashion. If the current instruction is instead a breakpoint, the routine continues to step 1120, where attempted execution of a BREAK instruction will cause a privileged instruction exception to be raised, thus transferring flow of control to the privileged instruction exception handler for this thread which in turn invokes the breakpoint handler for the thread. Thus, the routine continues to step 1125 where execution of the target instructions are halted while the target thread breakpoint handler executes. After the target thread breakpoint handler finishes executing in step 1125, or after step 1115, the routine continues to step 1130 to determine if there are more instructions. The target instruction sequence can indicate the end of the sequence in a variety of ways, such as with an explicit termination instruction like QUIT or a RETURN. Alternately, it may be possible in some embodiments to execute a target instruction sequence for any arbitrary set or length of instructions. If it is determined in step 1130 that there are more instructions, the routine returns to step 1105 to select the next instruction, and if not the routine ends at step 1195.
This subroutine begins at step 1205 where various information regarding the breakpoint is retrieved from the nub, including the address for the OOL Instruction Emulation Group corresponding to the breakpoint as well as information on whether or not the breakpoint is conditional. The subroutine continues to step 1210 to determine if the breakpoint is conditional, and if so continues to step 1215 to evaluate the condition. In the illustrated embodiment, a message is sent to the nub to request evaluation of the condition, and in step 1220 a response is received from the nub. Those skilled in the art will appreciate that in an object-oriented environment, a member function of the nub can be invoked to communicate with the nub and to evaluate the condition. In an alternate embodiment, the subroutine can directly evaluate the condition rather than requesting the nub to perform the evaluation. One advantage to having the subroutine directly evaluate the condition is that each target thread can independently and simultaneously evaluate conditions, rather than having the nub be a bottleneck.
After step 1220, the subroutine continues to step 1225 to determine if the condition for the conditional breakpoint is currently valid. If not, then the breakpoint is not enforced for this thread at the current time, and the subroutine continues to step 1230 to evaluate the OOL Instruction Emulation Group corresponding to the breakpoint. After 1230, the subroutine continues to step 1295 and returns, thus returning resuming execution of the target thread.
Those skilled in the art will appreciate that the OOL Instruction Emulation Group could be used in other manners than to implement breakpoints. For example, the ability to emulate an instruction out-of-line could allow a wide variety of types of instructions to be added at a specified location in target code. A user could specify instructions that are to be executed before or after a target instruction, and these instruction could be added to an OOL Instruction Emulation Group created for the target instruction. If a conditional breakpoint whose condition will never be true is added for the target instruction, the effect will be that the newly added instructions will be executed when the breakpoint is encountered, with the falsity of the condition preventing the breakpoint handler from halting execution of the target thread. This ability to add functionality to compiled target code can be used in a variety of ways.
If it was instead determined in step 1210 that the breakpoint was not conditional or in step 1225 that the condition on the conditional breakpoint was true, the subroutine continues to step 1240 to notify the debugger nub that a breakpoint has occurred. The subroutine then continues to step 1245 to wait for any messages from the nub, processing and responding to any requests. When an indication is received from the nub to resume execution of the target thread, the subroutine continues to step 1230 to evaluate the OOL Instruction Emulation Group. Those skilled in the art will appreciate that interactions between a target thread and the nub can be implemented in a variety of ways (e.g., socket-based message passing or direct access of shared task memory), and that either the nub or the target thread can perform actions such as the evaluating of expressions or conditions. In addition, even when the nub is responsible for functionality such as the evaluation of expressions, the nub may retrieve various information from the threads (e.g., the values of variables), either through direct memory access or through requests sent to the breakpoint handler for the thread.
From the foregoing it will be appreciated that, although specific embodiments of the invention have been described herein for purposes of is illustration, various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the appended claims.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987552.57/warc/CC-MAIN-20150728002307-00162-ip-10-236-191-2.ec2.internal.warc.gz
|
CC-MAIN-2015-32
| 70,593
| 160
|
https://planet.mysql.com/?tag_search=13982
|
code
|
For this post I’m going to shamelessly exploit the litany of technical problems SimCity players encountered earlier this month and a few examples of how Thread Pool for MySQL and Percona Server for MySQL can help to prevent such incidents.
Users of SimCity, a city-building and urban planning simulation
video game, encountered network outages, issues with saving
progress and problems connecting to the game’s servers following
a new release a couple of weeks ago featuring a new engine
allowing for more detailed simulation than previous games. During
this same time, we happened to be testing the Thread Pool feature
in Percona Server for MySQL, and I saw a connection
of how Thread Pool is supposed to help in such cases.
Basically SimCity users faced the same situation …
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879537.28/warc/CC-MAIN-20201022111909-20201022141909-00512.warc.gz
|
CC-MAIN-2020-45
| 782
| 10
|
https://github.com/chummer5a/chummer5a/releases
|
code
|
Be notified of new releases
Create your free GitHub account today to subscribe to this repository for new releases and build software alongside 28 million developers.Sign up
Translator Rebuild/Update Enhancement Application Changes: - The Translator tool now warns users that the "Rebuild" option will delete translations for any data entries that are not present in the core Chummer5a data files, and now has a separate "Update" option that does not delete such translations. Fixes #2932.
Resources/Icons Meta-Update Added icons for different flags into the project. Changed the Chummer5a troll picture in the About page to use a Resource reference instead of a Base64 string. Moved the Chummer5a troll picture from the icons folder to the more appropriate Resources folder.
Loading Bar (Part of #2755) Application Changes: - Added a loading bar/screen that is displayed when the program is performing its initial loading and whenever the program loads in a character. New Strings: - String_Loading - String_Loading_Pattern - String_Initializing - String_Settings - String_MentorSpirit - String_Locations - String_Metamagics - String_Arts - String_Enhancements - String_Expenses - String_LegacyFixes - String_GeneratedImprovements - String_UI
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267162563.97/warc/CC-MAIN-20180925222545-20180926002945-00017.warc.gz
|
CC-MAIN-2018-39
| 1,243
| 5
|
https://predicty.ai/predictive-algorithms-data/
|
code
|
How to prepare data for predictions ?
In order to start predictions first of all customer should upload data to server and train models. Data for predictive algorithms is the most critical part of the analytics. This is what you always train on algorithms it and evaluate it (evaluation is the process of detection best model and precision for model).
During training phase we do partitioning of the data (80%) for training and the small remaining amount (20%) for evaluation.
At the moment Predicty.AI supports Comma-separated values (CSV) format for training. It’s a delimited data format that has fields/columns separated by the comma character and records/rows terminated by newlines.
CSV can be easily created during export from Microsoft Excel, Databases or other systems (like CRM or analysis tools).
Requirements and Privacy
Platform supports CSV data formats for training it will be processed on computation cluster so there’s no actual limit by size, it’s only based to your plan. So here is the list of requirements:
- One CSV data-file for training;
- CSV should contain header with column names;
- Field should contain fact is it active or churned client or CLV amount;
- System expects mostly numerical and categorical data columns;
- More columns means more precise results;
- For good prediction quality data should be presented in at least thousand of records;
During training on data platform not requires any personal data like names, SNN, phone numbers or email addresses and even more – training data in CSV can be fully anonymised. For example product names can be overwritten to your internal codes or numbers, so customer can protect privacy of data.
Data for customer lifetime value predictions
For Customer Lifetime Value we can build training dataset with a large number of data attributes that represent customer activity, interactions and transactions with a brand or product. This dataset also contains a known “customer lifetime value” LTV against each data record.
Required columns: unique identifier of the customer/user, and customer lifetime value – real amount of money that client spent for the period of time.
Other column fields would be: age, purchase amount, first purchase price, gender, age, count and many other metrics the more metrics we include with training set the more quality of the predictions we would get.
Lifetime Value Predictions data sample (eCommerce transactions)
In the example above ‘total_52_weeks’ field is the fact about historical lifetime values for the past year (52 weeks) or how much money customer spent last year. Customer ID identifies unique. After training models we can build predictions about CLV the new/existing clients.
In other words we would know how much money client will spend during the next year with our new ‘total_52_weeks_predicted’ value.
Data for customer churn (attrition) predictions
For Customer Churn prediction we build training dataset with a large number of telecom customer data.
Data sample for customer churn prediction (telecom)
Data sample above have above ‘churn’ field is the fact about the customer. If customer active ‘churn’ = 0 if it’s stopped to buy services ‘churn’ = 1 that parameter we’re actually is going to predict in future clients (or existing).
This data represents mobile operator client details with billing facts.
Our prediction column is ‘churn’ and training data should contain both churned and active clients.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410284.51/warc/CC-MAIN-20200530165307-20200530195307-00169.warc.gz
|
CC-MAIN-2020-24
| 3,477
| 27
|
https://32feet.codeplex.com/discussions/391264
|
code
|
Thanks for the response Peter.
Ok, so since i have established a connection.
This is a Python example of a PC to Device Keyboard. And from the code, all i can see is that it creates a steam and then writes ASCII code to this stream.
What am i missing? There is also another small Java app for communicating with Android devices.
I am currenlty learning about the Brecham.Obex interface that seems to maintain sessions between PC and device in C#. Once this is establish, would it not be possible to then write to the open stream?
My assumption is, if it can be done in Python, C# should have no problem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189092.35/warc/CC-MAIN-20170322212949-00310-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 603
| 6
|
https://www.cs.unc.edu/Courses/comp101-s15/
|
code
|
The objective of this course is to introduce students to computers and technology. Rather than rote learning of how to do things, the student will learn to understand how things work and will therefore be able to continue growing skills beyond the course. As a Quantitative Reasoning (QR) course, a key objective of this course is to teach the student how to analyze problems and attack them in a logical sequence of steps. This is a skill that will be worked on throughout the semester.
The primary technologies that will be taught are web page development and spreadsheets.
Lectures are accompanied by a significant number of resources, including presentation slides, code examples, reference materials and videos. These materials will be posted before the beginning of class. In addition, there is a single directory of the snippets and samples.
Following each lecture (or sometimes intermixed within the lecture) are lab exercises that must be completed within class. Cooperation among students to understand the content is encouraged, but each student will turn in each lab. In order to encourage students to work with different students who may become their partners, seats will be assigned for the first several weeks of classes.
The software used in this class is either open source software or software available to all students. The open source software has the advantage that you will be able to continue using it after you finish school. The other software used is Microsoft Office. This software is available to all students based on your payment of student fees. Any student, whether they purchased their computer at UNC or not, can go to an ITS Response Center location and have any Microsoft product they have available installed on their computer at no cost. This includes Microsoft Excel, the application that we will be using. You can get Microsoft Office 2013 for Windows and Microsoft Office 2011 for Mac OS X. You are REQUIRED to use the identified software.
- Section 1: Tuesday and Thursday 2:00-3:15
- Section 2: Tuesday and Thursday 12:30-1:45
- Sitterson FB 007
- Monday Andrew 3-5 (Sitterson lobby)
- Wednesday Rahul 1:30-3:30 (Sitterson lobby)
- Thursday Marquis 3:30-5:30 (Sitterson lobby)
- Friday Diane 10:45-12:15 (FB 146)
- Friday Brian 12-2 (Sitterson lobby)
- Saturday Diane 10-12 (FB 146) when there is an assignment of projet due that day
Other Tutoring Opportunities
- University Peer Tutoring, Tuesday and Wednesday 6-9pm, Dey Hall
- Computer Science Club, Thursday 5-7, FB007, Sitterson Hall
- Diane Pozefsky
- Sitterson FB146
- Open Door Policy
- 919 590-6117
- Andrew Messier (firstname.lastname@example.org) -- Section 1
- Rahul Ramkumar (email@example.com)-- Section 1
- Marquis Hackett (firstname.lastname@example.org)-- Section 2
- Brian Markham (email@example.com)-- Section 2
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988775.25/warc/CC-MAIN-20210507060253-20210507090253-00045.warc.gz
|
CC-MAIN-2021-21
| 2,824
| 25
|
https://craftcms.stackexchange.com/questions/35953/show-parents-of-entry-in-custom-entries-field-extending-baserelationfield
|
code
|
The default BaseRelationField shows only the name of the selected entry in the field (e.g. "SubEntryX"). I created a custom entries field by extending the BaseRelationField in a module. Now what would be an elegant way to also show the parent of an entry in the field (e.g. "ParentEntryX > SubEntryX".
I think this would be possible by using a custom template for the field using
protected $inputTemplate = 'customtemplate'; but it seems like an overkill.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487617599.15/warc/CC-MAIN-20210615053457-20210615083457-00421.warc.gz
|
CC-MAIN-2021-25
| 455
| 3
|
https://dontgiveupworld.com/quote-on-dont-give-up/
|
code
|
Don’t Give Up Motivational wallpaper : Quote on Don’t Give Up
You may have fallen down and don’t want to get up but don’t look at it as a choice Get up
other’s are depending on you and most importantly you are depending on yourself
So get up show what you are made of show what you can do and remember when
you get up you are that much stronger than when you fell life is about getting back up Don’t ever Give up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510130.53/warc/CC-MAIN-20230926011608-20230926041608-00814.warc.gz
|
CC-MAIN-2023-40
| 425
| 5
|
https://www.conceptworld.com/qa/217/restoring-sticky-notes-backup-after-notezilla-fails-launch
|
code
|
You can try restoring notes from the local backup using Notezilla Troubleshooter app.
If you cannot find Notezilla Troubleshooter app then mostly probably you are using an older version of Notezilla . In such cases, you can follow the below steps.
- Go to Task Manager, select Processes and end the process Notezilla .exe
- Now open the folder %appdata%\Conceptworld\Notezilla in Windows Explorer. To do this, copy this path %appdata%\Conceptworld\Notezilla and run from start menu or open in Windows Explorer. This is the default data folder. I assume you haven't change this location in the past.
- Inside the folder, you will find NotesX (X is the version number) file. Just rename the file to something else
- Run Notezilla and see if it shows up successfully.
If it shows up successfully, then you may have to restore notes from backup.
Watch this video for more clarity:
The video in above link assumes that you have access to Notezilla . However, if you don't then you can open the Notezilla data folder by opening the folder %appdata%\Conceptworld\Notezilla and follow the instructions given in the video. Copy this folder location and open it in Windows Explorer.
In short, you would open Notezilla data folder %appdata%\Conceptworld\Notezilla and also open the backup folder %appdata%\Conceptworld\Notezilla\Backup and copy NotesX.db (X is the version number) file from backup folder to the data folder. Do all this when Notezilla is not running. Notezilla keeps 5 backups. If you cannot restore the previous days backup, then try a little older one.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00653.warc.gz
|
CC-MAIN-2023-40
| 1,560
| 10
|
https://blog.mindcore.dk/2019/12/windows-virtual-desktop-part-4/
|
code
|
This is part 4 of our posts regarding Windows Virtual Desktop, until now we have covered:
- Part 1 – Created a Windows Virtual Desktop tenant – Part 1
- Part 2 – Created a service principal and some customization of our on-premises AD – Part 2
- Part 3 – Provisioning a host pool – Part 3
In this post we will take a closer look at incorporating FSLogix to the solution.
In this test we will use a file server joined to our on-premises domain running in Azure.
On this file server we first create a share (here called FSLogix)
With the following share permissions.
Then setting NTFS permissions as shown:
Now let’s download the FSLogix agent here https://aka.ms/fslogix_download
Inside the downloaded file we can find the admx and adml files needed for our central store.
Lets copy the ADMX file (fslogix.admx) to [DC]sysvol[domain]policiesPolicyDefinitions
and the ADML file (fslogix.adml) to [DC]sysvol[domain]policiesPolicyDefinitionsen-US
In next step we create a group policy for the WVD OU in Active Directory, this is the OU where our Windows virtual desktops will end up.
Name the policy.
Edit the policy.
Go to Computer Configuration – Policies – Administrative Templates – FSLogix – Profile Containers – Enabled
Enable it as shown.
Go to Computer Configuration – Policies – Administrative Templates – FSLogix – Profile Containers – VHD location
Enable it and set the location to the share we created earlier.
Both settings enabled.
On our Windows Virtual desktop host, we need to install the downloaded FSLogix agent.
Execute FSLogixAppsSetup.exe and agree to license terms and click Install.
If you wish to change the installation folder you do that by clicking Options
Click Close .
If you check registry HKLMSoftwareFSLogixProfiles you will find the defined in our GPO
In the next post we will test our new Windows Virtual Desktop setup.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474775.80/warc/CC-MAIN-20240229003536-20240229033536-00724.warc.gz
|
CC-MAIN-2024-10
| 1,884
| 27
|
https://www.elance.com/d/wd/sql/541
|
code
|
Java developer for more than 5 years. Last 2 years I'm working on Android (client & server apps) projects for a top mobile app company in Czech republic. My previous experience consists of working on J2EE projects (frontend & backend) in larger teams and also creating smaller application servers with different types of web services.
We are a team of Open Source Experts helping clients worldwide in developing websites, app;ications for Desktops. We expertise with Core PHP, Joomla, Magento, WordPress, HTML5, Open Cart, OSCommerce etc technologies. We do make Responsive Web Designs (RWD) using HTML5 - both custom & for WordPress, Joomla & Magento. We do have in-house capabilities in developing mobile & tablets native applications for iOS and Android. We can now design mCommerce, QRcode, CMS, Workflow based business apps.
I am having experience of 6 plus years in system/network administration.Started my career as a support engineer at Hands technologies and worked at Valuepoint systems pvt ltd as System Engineer and currently working as a network administrator for a Software company at Technopark, Trivandrum, Kerala, India.
"Best People for Best Solution" We offer affordable Web design and Development Services for Individuals and Business by ascertaining your target market and evaluating your business needs. We specialize in delivering a host of services and cutting edge solutions that facilitate organizations to focus on their core business domains, strengths and strategy implementation.
I have done Engineering in Information Technology. I love programming. My expertise are in Java Web Development. I am looking to pursue my career as a Java Developer. To start up my own work I am here at Elance Inc [US].
Hi I am new to Elance so I don't have much reviews. I am a New York City based web developer specializing in PHP and Node.js development. I can also do front end work but I do not enjoy it as much as backend development. Backend development is where I excel at. I also have strong titanium/appcelerator skills when it comes to creating applications using the titanium platform.
I am a well-rounded programmer specializing in web development - Python, Node.js, Go, PHP, Angular, Backbone, Google App Engine, DevOps
A young and great full stack web developer greets to all and proudly tell that i have completed some simple to complex projects with full client satisfaction. My ability to fully understand client's need and development skills make me a proficient choice for your projects. One thing i have a love for speed. This also can be seen in my developments both in term of time and website speed. :) Just give me a shot ;)
Just Hire & Get 100% Results ! All type of Admin Support you need I'm a full time and dedicated freelancer experienced in Data entry, Copy-Paste work, Data capture , Data mining, Database,Data Conversion from PDF to MS excel and MS Word, HTML tagging & Email Handling. My work style is disciplined , reliable, well organized, dedicated, detail-oriented. I have team of 10+ accurate and fast workers and having positive attitude. I can offer affordable, fair rate and high quality of work. My highest priority is to complete any task on time and to develop a long term relationship with my clients. My expertise includes: 1. Virtual Assistant 2. Data Entry + Copy-Paste work 3. Customer Service 4. Technical Support 5. Office Management 6. Microsoft office Previous work: * Back Office Process executive in Multinational BPO company.
I have 2+ years Software industry experience.Have been working as software developer using different technologies like Java,PHP,Android SDK
We are an ISO 9001:2008 certified company with talent pool of over 100 associates across four locations both onsite and off-site, we provide comprehensive healthcare IT product development, consulting, and Professional services. We have active business engagements with over 10 global clients and growing further. Our services suite has worked wonders for our customers around the globe who have gained through: - Effective Communication. - Commitment to Quality. - 24/7 Customer Support. - Cost Efficiency (Maximum ROI) - Protection of Intellectual Property. We have expertise in developing all sorts of web based applications.
An engineering student with know-how in object oriented programming and web designing and management. I have had the opportunity to work for several companies. I code for a better future
Grameen Solutions Limited (GSL) is the flagship technology company of Grameen family of organizations founded in 1999 by Dr. Muhammad Yunus, founder of Grameen Bank and recipient of 2006 Nobel Peace Prize. ÂGrameen Solutions literally means solutions for the villages. GSL offers Software Solutions, System Solutions,Business Process Outsourcing, Mobile Application, Social Business Solutions, Graphics and Animation, Search Engine Optimization, Offshore Staff Augmentation, and Emerging Market Technology at competitive offshore price points. GSL is established as the technology arm of Grameen family of companies to strengthen national technology base and capabilities of Bangladesh. Since its inception, GSL has taken several pragmatic steps to attract global technology companies, create technology based solutions and opportunities, and increase overall digital inclusion in the country.
I have enclosed my CV to support my application. It shows that I would bring important skills to the position, including: Communication, presentation and leadership skills Working in team and under pressure Effective team member Self-learning and reliance Time management Quick adaptation with any environment Thank you for considering my application. I look forward to hearing from you. Regards, Mohamed Mohsen Nouh Web developer & Software Engineer Email : email@example.com Mobile: 01140039315
I have a team of graphic designers.We also design modern websites and help create or renovate online presence of a company or individual. Last but not the least we code. We make softwares and apps as per client requirement and can also assist in debugging of an existing one. I love to learn new things, and I try to find explanations for everything that seems simple to plain eyes. I get along well with others. I have done MS in Physics, and I like coding. I am associated with many companies as a Subject Matter Expert and Technical Writer. Classical Physics, Quantum Physics, Statistics, Data Analysis and Psychology are some of my strong suits. I can code in more than 20 languages including web-scripts. C++, Matlab, Python, Perl, Scheme, Prolog and PHP are some of them. I am hands-on with complete Adobe CS6, since its a basic requirement while designing a complete website. I also enjoy writing on general topics like health, effects of laws, finance, etc.
We have a team of Developers working in PHP, Drupal and Magento. We are specialized in MVP based in open source solutions.
I had 2 years more experience about drupal , joomla and wordpress content management systems.I will developed the website in a different way and provide eye catching user interface with it.If you want to develop your web site with best quality and low price Then you have opportunity to join with me.
I am a fun hard working individual that loves to make the coolest thing using the latest technologies. Work for you soon.
Asp.Net, C#, WCF, jQuery, Ajax, Web and Software development
More than 6 years of hands on experience in analysis, design, development, testing and implementation of client / server application as well as web applications. Successfully developed and executed various operating strategies in different fields of business. Developed processes to promote organizational growth and incorporated emerging technologies for optimal utilization of available resources. Developed integrated solutions for the financial service industry and money service businesses. Research oriented quality assurance functions have been incorporated resulting in vigilant standards in the delivery of reliable day to day service, and the ease of use, and scalability of the systems. Successfully integrated Bio-metric, OCR and ADC technology for the financial service industry
Name: Hafiz Muhammad Asif Country: Pakistan cell#: +923426184849 Qualification: BS(IT) Honors
I'm a second year undergraduate college student from Croatia, looking to earn some money that will help me with finishing the college.
Maintain the website and java problem
Experienced Software Engineer with more than 20 years in the IT industry. Working experience from SME (small to medium enterprise) to Fortune 100 Companies, both in India and in the USA. Extensive knowledge of Software Development life-cycle. Interest and ability to learn new technology and programming skills
More than five year software developer experience in pioneer Software Development Companies, working at emerging technologies in programming field as designer, developer and Quality Assurance analyst.
Having hands on experience in financial and banking domains on ETL solution development and deployment.
AIRTech Developers Union is a website design, development and marketing company based in Lahore / Pakistan. AIRTech Union is a passionate group of thinkers, innovators, creatives and strategists dedicated to creating the most impactful digital solutions for meaningful brands. We offer a core set of design, development & marketing deliverables to help improve the online visibility and impact of your business.
Senior Programmer, Bata Shoe Company (BD) Ltd.
Engaged and versatile software engineer with experience in Java EE applications development and professional educational background.
Currently working as a dashboard designer for Apple via an Indian MNC. Good in database too.
hi....I am a management post graduate with major in (marketing management & human resource management) and hold a bachelor's degree in engineering with specialisation in computer science I have worked for various companies and individuals on project basis, after successfully implementing my professional and work knowledge in 45+ projects, now I aspire to work on a global level so have joined in elance . I am seeking a challenging and fulfilling work environment so that I could put to use my expertise and skills to fulfil our mutual goals All I can say is that 'my work speaks for itself !
I am a PHP developer, I have also developed apps for Android. I have built my own dynamic website from scratch www.awaymeals.com It is still a work in progress. I am a creative programmer who can and will take your online project to a whole new level.
VoxVantage is a premier technology consulting firm, that helps take product ideas from inception to deployment. Whether be it conceptualizing from design (UX, twitter bootstrap, angularjs) to deployment ( cloud, aws ) or helping with crawlers (scrapy , nutch ) or designing big data search and analysis systems ( based on hbase, cassandra , mongodb, solr, lucene, elasticsearch) - we help you achieve your goals. Home: www.voxvantage.com Blog: blog.voxvantage.com .
I am looking for challenging works as IT developer. Always ready to work with full efficiency.
Looking for challenging project.
12 years server side developer experience. HTML5 skills. Project management attitude.
I'm a full time web developer/database programmer looking for additional challenges online. IÂm a hard working programmer, who wants to start his career as a freelancer.
Standard coding is my habit. Writing the scalable code is my passion. I treat my self as a team. Proper commenting is my coding protocol. I like knowledge gain and sharing. I feel that task which are bit strange and difficulties are like part of entertainment as programmer.
Rahul Patel PHP, Phpmysql, HTML, CSS, Designing, js. I have good experience in php web developing. Creative new functionality and accuricy in work. I have freelance skills, I have also experience in wordpress, joomla and asp.net also from last 3.6 years. I am highly adaptable, professional and able to produce top quality pieces, often to tight deadlines. Intelligent, flexible and organised - I'm ready to start work on your project. Work Experience Summary : I have worked as a asp.net developer for 1 year. I have also worked as DBA for 1.6 years and now I am in php field from last 1 year.
We provide Quality work at Reasonable price........
Actively looking forward for an interesting and challenging career in an organization. Utilizing whole of my potential for the companyÂs profit maximization and keen on developing my skill and knowledge.
Ruby on Rails developer with good HTML, jQuery & CSS knowledge. Working for a company with thousands of daily users through different device platforms Latest work: www.pealim.com
Basically i am from computer science engineering department. And also i am having more than two years experience in website development. I had to deals with lot of static and dynamic sites using (CMS) contend management systems.
Hi, and thanks for viewing my profile! Working in a virtual environment, I feel that a key component to a successful project is proper and accurate communication. That's why i'm available via phone, MSN Messenger, Skype, etc. throughout the life cycle of your project. I've been programming custom web applications, Facebook applications, Scarping and Crawling and API's for nearly 7 years. More details on my actual programming experience below. Expertise in custom web application development; client/project management; research and analysis. Proven technology problem-solver with excellent web application development, systems development, workflow, and trouble-shooting capabilities. Ambitious and confident self-starter with strong communication, trouble-shooting, presentation and planning and execution skills for web application development projects. Thrives in a fast- paced, goal-driven environment.
Variation Media is a full service, multi-media company specializing in all facets of design, programming and marketing for web based and brick and mortar business. Our goal is to bring your vision to life, digitally. In a saturated market, with new technologies emerging every day, Variation Media provides our clients with customized solutions that work for their business. We treat every new client independently, and do not force potential customers to choose from cookie cutter packages. We recognize that every business is different, its goals, aspirations and motto should be reflected seamlessly with a digital face that is a mirror image to its tangible. At Variation Media we specialize in ensuring that no matter the angle, every face is the same and aligns with your overall message.
Former Software Development Manager at a large video game company, running teams of 35 + engineers. Our games had up to 10 Million users each per day, and i was in charge with studio CTO's in solving issues of scale, delivering quality features under short deadline among many other duties. Wide range skill set and very responsive to needs of clients. i am available for freelance and consulting.
I am a completely fluent in the skills of VB.NET and Data Entry. I have good experience with VB.NET and I have been working as a VB.NET Developer for many years. I have good experience in the areas of Visual Basic and Wordpress. I am a hard worker and enjoy working at all critical conditions. If hired by you I will be responsible to complete the task within the stipulated time frame and with utmost confidence. Outsource me for your project and I promise to bring in the best output.
3.0+ years of Experience in WordPress, Web Development, web apps, Web Designing, Magento, E-Commerce Site, PayPal/ Payment Gateway Integration and Web Security. My Belief: "Whatsoever Your Mind Can Imagine - I Can Deliver". I am working on web since 2011. I deliver ground-breaking solutions for businesses of my clients and do this skillfully, fast and cost-effectively. I provide my services around the world; have worked with $10 million corporations around the globe as well as young startups. ÂI WORK ACCORDING TO MY CLIENT'S TIMEZONE; SO DONÂT PANIC, WE ARE GOOD TO GOÂ :) I assure you that you will get 100% quality product within project deadline. THANKS For Visiting My Profile please feel relax to contact me, I DONÂT BITE :). I am here for your RELIEF. MOHAMMAD SOHAIL KHAN
We are small team and we work on open source based technologies. Mainly we work on PHP and PHP based frameworks. We provide complete end to end solutions related to website design and web development. Please visit our rest of the links for our web designing work. Click here to ask about your project. We are ready!!.
3+ years of working experience in Linux/Asterisk administration 1 year experience in Python development
I have many year experience in linux administration, apache web server, web programming and website building.
Hi, I am a data analyst with a strong mathematical background (masters degree). My field of expertise is data analysis/mining and scientific computation using a variety of tools and algorithms (statistics, machine learning...). Among others, I am proficient with R, Matlab, Weka, Python, VBA, C/C++. I am familiar with a variety of fields: - finance - science - marketing data - social networks data I work fast and I am dedicated to meet your requirements within the deadlines. Regards, Alban
We specialize in PHP, VB.NET & C#.NET, C++, Visual Basic, HTML 5, CSS3, WordPress, Joomla, Drupal templates, plugins, modules and more.
I have a rich experience in Mobile(IOS and Android)Application Development and PHP Web development. Now i am working as Professional TeamLead at Development House of Pkaistan. Thanks and Regards, Jawad Saleem Software Engineer Skype: jawad.saleem202 Email:-- Cell Ph: --47
3 years experience as iOS & Android developer. Clean and modular code.
Like to do programming and some electronic stuff. Good basic knowledge about both fiels and quite inovative.
This is Emon from Bangladesh.Basically I am a web developer But also I would like to work on android platform.
An ASP.Net Application Developer having 8+ years experienced on C#, VB.net, ASP.net, HTML
Respected Sir/Madam, I am having 4+ yrs experience in development of web application(.net,MVC) and desktop applications in different domains like telecommunication,finance,e-governance and media,and also having experience in testing ,unit testing impact analysis and business analysis so please consider it hoping for favorable reply Thanks, Vaibhav
Have an expirience in the QA at 1.5 years.
Area of development etc electrical softwares like proteus, keil
Passionate software developer with over 4 years of professional experience developing software across platforms and domains.
Being a Computer science professional I have derived diversified turfs in info tech comprising of PHP, WordPress, Joomla, E commerce and Oscommerce. i have opt out Mobile Applications, SEO. I have being walking through and facilitating the clients for more then three Years. My expertise also caters front end development using responsive layout. I am successfully able to meet the time line as per project charter ensuring Quality Standers to customers.
Website designer and programmer
I have much experience develop e-commerce system, build web site, email marketing and layout responsive template for PSD file.
Good with mentioned technologies and have 2.4 yr of Exepirence of the same
Hello, Hy This is Team3cs.We are young and enthusiastic expertise team in web based technologies . having more than 4 year of professional experience. Best Regards, Team3cs
Amartec has become a leading digital agency in South Texas, providing jaw-dropping graphic designs, astonishing websites, high-quality prints and online/offline marketing strategies for every type of business. Our team is well-versed in their particular subjects, and shares a deep passion for business and marketing with each other. We love our job, which in turn makes us provide awesome services and support.
I am a webdeveloper from Sweden. I'm running My own business www.weblove.se
13 Years in the US Army to include Red Team, legally hacking into government networks to report flaws. I offer the same services to private industry and individuals.
i am expert in php,cms (joomla and wordpress),html,css, expert also in c++ and Qt framework i can start job from now.
I do Tsamamm the implementation of programs and business accounting and business all Aftaa Bsra soon as possible and less expensive than non-
I will be finish your work within your deadline.
- Total 9+ Years of Experience in Software Development, Project Management and Delivery. - Prince2 Practitioner Certified - Excellent knowledge in Microsoft Technologies. - Vast knowledge of Sitecore Development. - Sitecore CMS 6.2 Advanced .NET Developer. - Experienced Umbraco Developer - Worked as an individual and as a team member for different projects. - Proven ability to lead, coordinate and participate in teams for the successful design and implementation of within extremely tight production deadlines. - Project Management, Team Lead and Analytical skills. - Has the ability to adopt things quickly. - Extremely well organized and detail oriented. - Always take pride in doing a job, willing to learn new skills, team player, confident and responsible.
We are a team of programmers and designers located in Dhaka Bangladesh. Over the last 7 years we have worked with over hundreds of clients from all over the world ranging from small stores to large Multinational Companies. Though currently we focus on responsive web applications using php5 on lamp, but we have successfully delivered solutions on almost all languages and platforms including perl, c#, java, etc.
I am php developer with 5+ years experience.
We're a new company in Elance but we are a consolidated team which offer all of our Ecommerce and web design knowledge at the customer service. We are experts at ecommerce monetization, usability and conversion rate optimization. We like to take a deep study on project requierements so web can make real bids on real projects without surprises.
I'm a self taught programmer from the United Kingdom. I am proficient in many programming languages and have a knack for writing clean, secure code.
IÂm a self-taught PHP developer with two years of experience. That means two things: first, IÂm curious by nature. Second, IÂve worked hard to get where I am.IÂm proficient in object-oriented programming, IÂve toyed with things like PHP, CakePHP, OpenCart, Drupal, WordPress and others. As a freelancer IÂve gained valuable time management and team management skills  I managed a small team of two developers.Out of two, one is a android developer. But beyond my resume there are some soft skills you should consider: IÂm motivated to learn more. I taught myself PHP which means IÂm capable of teaching myself other languages.IÂm well connected to those who are developing the tools we use, and IÂm focused on making the open source world a better place to be. If youÂre looking for a PHP developer, IÂm looking for a PHP position.LetÂs chat.
I just believe to do work on time with quality.
i can work on HTML and Adobe photoshop. Keen to learn new things. And a hardworker
Working for a Fortune 500 company with flavour of different technologies and enriched of technical expertise and architectural and Design Knowledge.
I am Web/Desktop/Mobile Application developer by profession. I am dedicated and honest to my work. It is not just a way of earning life but it is a passion to me. My goals include 100% work completion with no compromise on quality of work. My expertise are in PHP, DATABASE, JAVA, WordPress, JOOMLA, HTML and Android Application development.
With 5+ years of producing innovative projects of most well known companies in the world. We are here to make your idea and vision real in life. We have developed 55+ web sites, ERP (Enterprise Resource Planning) system and software. We can and will give you assurance of quality and time-frame on your requirements because we are confident on our skills and experiences. We provide Offshore and onsite Development at economic rates with assurance of full quality and commitment. We are bonded as company to outcome a better result and provide easier interfaces and environment.
I am software developer with master degree. I like complex task for solving and improving own skills.
I have extensive experience making websites and have an eye for great design. I specialize in Rails apps. As a prior tech entrepreneur I can understand your business needs and ensure you get the results you want. Client satisfaction is my aim.
I am Microsoft Certified Professional Developer with nine years of development and managerial experience.
I am a PHP developer, I have build so many applications using Cakephp, Laravel, Symphony, Joomla. I can deliver you a responsive website with HTML 5 and CSS 3.
Open source technologist, business auto matter, technology writer, technical sales guru, a team motivator, software development enthusiast who likes to follow the best ways of programing with efficiency. Not just programing but smart device programing like Android and other mobile platforms is one of the area of interest these days.
We and our collaborators have awesome cross functional teams of developers, business analysts, testers, UX designers and technical architects. We follow Scrum methodology to deliver our projects with 2 week Sprints, so you will get a chance to see product increment every 2 weeks. Pay only if you are fully satisfied. Lastly our Lean Startup Coach will help you with your business idea and product slicing and launching it fast enough to get customer validation on your idea. You want more, ok, we will also work with you on Equity model to keep your initial costs low
Hi,I am an Enthuastic Web Designer and creative Web developer with best in web services.
+10 years of experience on software development/architecture which I have worked on several different projects from SAP integration to e-Commerce platforms as well social network like website.
 6+ years of experience in System and Networking area.  Extensive experience in installation, configuration, and maintenance of Red Hat Linux and Networking environment.  Exposure in all kind of computer (Server & Desktop) Networking integration, Administration & troubleshooting.  Expert in windows server administration (2000,2003,2008)
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299339.12/warc/CC-MAIN-20150323172139-00145-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 26,536
| 93
|
http://maisonbisson.com/post/15/story-review-derryl-murphys-ilast-calli/
|
code
|
One: I discovered Fictionwise.com, a source all types of fiction in eBook formats.
Two: Here’s the assignment that lead me to look for Fictionwise in the first place. Click for PDF.
[UPDATE] It’s funny how things circulate on the web. I’ve Googled myself enough to know how I show up in odd places, so I can understand how Derryl Murphy might have wondered how a review of one of his many stories appeared here. Any way, I got an email from him and he seems like an okay guy. At least we appear to have similar opinions/fears about copyright law (though I feel a little cheesy about using that story for trackback). Nonetheless, I guess I should should say that the review above was written for a class assignment for this guy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156252.62/warc/CC-MAIN-20180919161420-20180919181420-00419.warc.gz
|
CC-MAIN-2018-39
| 733
| 3
|
http://oracleapps88.blogspot.com/2013/12/oracle-forms-personalization-interview.html
|
code
|
--> 1) What is Forms Personalization? Where it is used? What For?
Forms Personalization is a standard feature provided by oracle and supported by oracle to customize the forms. With Forms personalization you can hide fiedls, make fields mandatory, create zoom functionality, change lov dynamically e.t.c
--> 2) What are different triggers that can be used in personalization?
WHEN-NEW-FORM-INSTANCE WHEN-NEW-BLOCK-INSTANCE WHEN-NEW-RECORD-INSTANCE WHEN-NEW-ITEM-INSTANCE WHEN-VALIDATE-RECORD MENUS SPECIAL EVENTS
--> 3) What is the difference between having personalization at function level rather than form level?
A Form can have multiple functions. Having the personalization at function level limits the scope of the personalization. For example in Inventory for both 'Master Item form' and 'Organization Item form' uses same form named INVIDITM where as both have different fucntions linked to them.
--> 4) Can you use global variables in forms personalization? If so How?
--> 5) Can you hide a text field using personalization? How?
Yes. In the actions set DISPLAYED property to false.
--> 7) Can you transfer the data from one form to another form using personalization?
Yes. Using global Variables.
--> 8) How do you move personalization from one instance/database to other?
Form Personalizations can be moved easily through FNDLOAD from one instance to other. Refer to the Article FNDLOAD for more details: http://www.erpschools.com/Apps/oracle-applications/articles/General/FNDLOAD-to-transfer-the-menus-concurrent-programs-personalization-from-one-instance-to-other/index.aspx
--> 9) What is personalization and what features can be achieved through personalization?
Personalization gives us the ability to customize Forms in a very easy manner. The below customizations are possible through Personalization: Zoom from one form to another Pass data from one form to another through global variables Change LOV values dynamically Enable/Disable/Hide fields dynamically Display user friendly messages when required Launch URL directly from oracle form Execute PL/SQL programs through FORM_DDL package Call custom libraries dynamically
--> 12) At what level you can restrict personalization code?
FORM level and FUNCTION level
--> 13) What can be implemented through Forms Personalization?
The below can be done using PErsonalization: Zoom from one form to another Pass data from one form to another through global variables Change LOV values dynamically Enable/Disable/Hide fields dynamically Display user friendly messages when required Launch URL directly from oracle form Execute PL/SQL programs through FORM_DDL package Call custom libraries dynamically
--> 14) How to do implement ZOOM Functionality using personalization?
Refer to the Forms Personalization Tutorial article: http://erpschools.com/articles/forms-personalization-tutorial
--> 15) What are the advantages/disadvantages of Forms Personalization when compared to CUSTOM.pll?
Advantages: Personalizations are stored in tables rather than files Will not have a bigger impact when you upgrade or apply patches to the environment Can be moved easily through FNDLOAD from one instance to other Can be restricted at site/responsibility/user level Easy to disable/enable with click of a button. Personalization will store who columns with which we have the ability to track who created/modified it where as in CUSTOM.PLL we don¿t have that ability. Disadvantages: Not all can be customized using Personalization.
--> 16) When you display a error message at WHEN-VALIDATE Trigger will the data will be saved into database?
No. If it is normal message or warning data will be saved but not for error message.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607704.68/warc/CC-MAIN-20170523221821-20170524001821-00573.warc.gz
|
CC-MAIN-2017-22
| 3,677
| 25
|
https://www.icmpe.cnrs.fr/en/research/metallurgy-and-inorganic-materials-department/mc/
|
code
|
Modeling and Calculation
- Machine learning
- Phonon calculation
- Cluster expansion
- Monte Carlo simulation
- Crystallographic structure
- Electronic structure
Non permanent researchers
The group’s activities focus on the development and use of numerical methods for the modelling of properties and mechanisms in materials science, not only for their fundamental understanding but also to guide the development of new materials according to desired properties.
Multi-scale studies are carried out by coupling different methodologies such as thermodynamic modelling or Monte Carlo simulation, electronic structure calculations by first principles or by more empirical approaches. Aiming at both inorganic and organic chemistry studies, different methods are used in a non-exhaustive way:
- Development of quantum chemistry codes for the adsorption of molecules
- Alloy design by combinatorial screening
- Modelling of X-ray absorption spectra
- Modelling of the magnetic properties of nanostructured materials
- Thermodynamic modelling of phase diagrams
- Calculation of electronic structure and vibration of molecules and solids
- Numerical simulation by finite elements
- Analysis of diffusion paths in solids
- Supervised machine learning
New model to describe Gibbs energy at high pressure
A new model was developed in order to carry out phase diagram calculations at very high pressures. It was applied to the Os–Pt system.
Optimization of Criteria for an Efficient Screening of New Thermoelectric Compounds: The TiNiSi Structure-Type as a Case-Study
High-throughput calculations are applied in the paper in order to discover new thermoelectric compounds among ternary intermetallics.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506423.70/warc/CC-MAIN-20230922202444-20230922232444-00623.warc.gz
|
CC-MAIN-2023-40
| 1,694
| 23
|
https://nic.phys.ethz.ch/news/1203327881/index_html
|
code
|
from the big-upgrade dept.
An security update on the server gateway schilt will be done on:
Over the entire period access to the following services may be interrupted:
Additionally we would like to reboot our managed Linux workstations so that we can provide some common features or applications again which are not available with the currently running kernels, e.g. AFS, traditional scheduling or VirtualBox.
If you do not want your workstation being rebooted on Thursday evening after the server upgrades, and don't need any of those currently not available features, please contact us.
< | >
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690376.61/warc/CC-MAIN-20170925074036-20170925094036-00433.warc.gz
|
CC-MAIN-2017-39
| 594
| 6
|
https://wastecentral.ning.com/members/status/show?id=28486504%3AStatus%3A862930
|
code
|
Why not post something and see what happens? There aren't any interesting Radiohead forums left, that I know of. I didn't post much on AtEase--used the names messture and blueandpink. Had a blue and pink graffiti avatar. I got blown out of Kansas in 2009, by myself, and have been here alone ever since.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817249.26/warc/CC-MAIN-20240418222029-20240419012029-00639.warc.gz
|
CC-MAIN-2024-18
| 303
| 1
|
https://success.salesforce.com/answers?id=90630000000guaiAAA
|
code
|
can anyone tell me how to customize the meeting request email
I believe you can edit that by going to Administrator setup -- Communication templates -- Email templatees- there is a follow up meeting template ....
I havent done editing ever but I beleive it works for you,
Can you please elaborate your answer..? So that it will be helpfull for me to over come the issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868316.29/warc/CC-MAIN-20180527131037-20180527151037-00389.warc.gz
|
CC-MAIN-2018-22
| 370
| 4
|
https://pepijndevos.nl/2011/07/29/the-nosql-burden.html
|
code
|
Some people claim that NoSQL is premature optimization and places an extra burden on the developer. The main points seem to be that NoSQL has no schemas and drops consistency in favour of the other parts of CAP(availability, partitioning).
I largely agree, however, I think we should differentiate between two kinds of NoSQL databases.
ScaleDB: Hard-core MapReduce, thousands of nodes, sacrifices everything for speed and scalability. If you use this below Google-size, you have no idea what you’re doing.
EasyDB: Relax, life is to short to update your schema and master SQL, give me an easy API to persist and query my data and I’ll be happy. I really think some NoSQL databases should realize this and drop scalability as a prepackaged buzzword feature and focus on the real needs of the majority of their user base.
Relax, does that word ring a bell? It’s the tag line of CouchDB. With its nice REST API and with replication as the only way to scale horizontally, I think CouchDB classifies as an EasyDB.
However, CouchDB uses MVCC, this avoids locking and provides a form of consistency, but it does place the burden of handling update conflicts on the client. Or… does it?
I would like to draw a parallel with how Clojure handles controlled shared mutable state. The simplest form present in Clojure is the Atom.
An atom is a MVCC construct that provides a low-level
compare-and-set! function that executes an atomic update if the expected old value matches the actual value. Much like CouchDB compares the
_rev of a document before updating.
Interestingly, though, atoms also provide the very convenient
swap!, which takes a pure function that takes the old value and returns the new one.
compare-and-set! in a loop, recomputing the new value on every iteration until the update succeeds.
So what about CouchDB? Can we have easy fire-and-forget updates there as well? Yes we can! I previously hacked together an atom implementation on top of CouchDB, but it turns out CouchDB already offers a little known feature called Document Update Handlers, which does exactly this.
Sadly, the Clojure view server included with Clutch does not yet include support for document update handlers, but this can be easily remedied!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817081.52/warc/CC-MAIN-20240416093441-20240416123441-00664.warc.gz
|
CC-MAIN-2024-18
| 2,229
| 15
|
http://internetpeeps.com/odbc-driver/db2-odbc-driver-dsn.html
|
code
|
For the default, APPC Connection, the values for APPC local LU alias, APPC remote LU alias, and APPC Mode Name are required. Reply ↓ Sandeep on November 17, 2016 at 2:35 pm said: Hello Dear, Very clear explanation which helped me a lot. The fields are case-sensitive. I dont wana use GUI. http://internetpeeps.com/odbc-driver/db2-as-400-odbc-driver.html
IP addressWhen TCP/IP Connection is selected as the network transport, this field indicates the IP address of the host DB2 server. The SAS/ACCESS Interface to DB2 cannot be loaded. Example: To complete the process, select a driver and then follow the prompts to create the DSN. Select the System DSN tab and click Add. https://msdn.microsoft.com/en-us/library/ee275393(v=bts.10).aspx
My DB2 instance is running as an AD Domain user (i.e. but unfortunately I got messed up with somethings. Reply ↓ Vishal on August 25, 2014 at 8:59 am said: Thank you so much.. 🙂 Reply ↓ RR on October 1, 2014 at 9:09 pm said: Thanks for this information The Security tab allows the user to configure optional attributes used to restrict connections to a data source.
Then you most likely didn't install the correct version 32/64-bit for your operating system. In the Description field, enter an optional description for the data source. I you don’t know what version of DB2 that you’re running, you can contact your DBA. Microsoft Odbc Driver For Db2 Windows 7 Download I hope this helps you out.
The password is stored in mixed case and users must enter the password in the correct case. NB! This attribute allows the user to access database objects without fully-qualifying the objects using a collection (schema) qualifier. Turn on more accessible mode Turn off more accessible mode Skip Ribbon Commands Skip to main content This page location is: KBHowTo6Pages18370019 Sign In Log In | Sign Up | Log
A new window is opened which has tabs 4. Ibm Db2 Odbc Driver Connection String In the Data Source tab, the Data source name and Description fields are prefilled with the information you supplied in the ODBC IBM DB2 Driver configuration dialog. Reply ↓ Amarok on February 11, 2014 at 10:19 am said: Hello, Same here. The user ID should contain only the user name, not a combination of the Windows domain name and username.
on first tab give user name and password 5. http://www-01.ibm.com/support/docview.wss?uid=swg21384435 You need to create an IBM-account to download the file. Ibm Db2 Odbc Driver - Db2copy1 In Control Panel, click Administrative Tools. 3. Ibm Db2 Odbc Driver Configuration The ODBC Data Source Administrator window opens.
Note that you need to have IBM ID to login and download the package, if you do not have, register for it. http://internetpeeps.com/odbc-driver/db2-odbc-driver.html Network portWhen TCP/IP Connection is selected as the network port, this field indicates the TCP/IP port used for communication with the target DB2 DRDA service. There's different options as you can se in the picture below. At the time of writing the client installer was: v9.7fp1_nt32_client.exe file but there is also a 64 bit version available. Configure Db2 Odbc Connection
This can be the same as the default schema. The default value for this property is Latin 1 (1252). How is your DB2 server on Windows running, as a local user on the server, or as a Domain account? his comment is here Unless the Process Binary as Character value is set, character data is converted based on the default ANSI code page configured in Windows.
Go to the folder c:\program files\IBM\bin and type db2oreg1 –i (if you later want to uninstall it type db2org1 –u). Microsoft Odbc Driver For Db2 Configuration UI Help Data Integration Help Configuring a Data Source Configuring a Data Source Configuring a Data Source for the ODBC Driver for DB2 Configuring a Data Source for the ODBC Driver I installed the DB2 driver from IBM and i tried creating a system DSN.
If your need a 64-bit version of the ODBC-driver for Windows and DB2 version 9.7. Give the DSN a name that you can use in your programs. Reply ↓ Root on July 17, 2013 at 3:56 pm said: Thanks, I have now added the "db2oreg1 -setup" command to the instructions. Ibm Informix Odbc Driver Reply ↓ wlad on April 19, 2016 at 12:56 pm said: Thank you, very useful!
For the ODBC Driver for DB2, the Target Database tab has the following fields: ParameterComments Initial catalogThis parameter is used as the first part of a three-part fully qualified DB2 table This option treats binary data type fields (with a CCSID of 65535) as character data type fields on a per-data source basis. An ODBC application can override these defaults by connecting to the data source using a connection string with alternate values. weblink The package is created for use by SQL statements issued under the same isolation level based on the Isolation Level value configured in the data source.
By default on a Windows 64-bit server, when the 'MicroSoft ODBC Data Source administrator' is run, it will launch the 64-bit version of odbcad32.exe, which can be used to create DSNs Run the command db2oreg1.exe -setup. The content you requested has been removed. Valid options are Use this username or Use single sign-on.
If yes than what is the work around to connect to DB2 ( z/OS) using vbscript or .net using code directly. See your DBA if the problem persists. These default values can be changed at any time using this procedure to reconfigure the data source. If you click OK, the values specified become the defaults when an application connects to this data source.
You are notified that the connection was created successfully. You should look for something like this. The Connection tab also includes a Test connection button that may be used to test the connection parameters. This will eventually stop… Should CS students be doing their tests on paper?
Please enable scripts and reload this page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257649683.30/warc/CC-MAIN-20180324034649-20180324054649-00684.warc.gz
|
CC-MAIN-2018-13
| 5,900
| 16
|
https://thegamepadgamer.com/2022/03/emulation-on-the-steam-deck-just-got-a-lot-easier-emu-deck-set-up-guide/
|
code
|
EMU Deck allows you to easily turn Your Steam deck into an amazing emulation handheld!
It takes care of everything, RetroArch Configuration, Bezels, Gamepad Configuration for Gamecube, Wii, PS2, PS3, Dreamcast, PSP, and many many more! Pair EMU Deck with Steam Rom manager and get all of your favorite retro games on the steam decks main screen with Artwork! In this video, I show you how to set up EMU DECK on the all-new Valve Steam deck!
02:03-EMU DECK Set-Up Guide
Equipment I Use:
Screen Capture Device: https://amzn.to/2STpX4C
Tool Kit: https://amzn.to/2M6l9WS
Soldering Station: https://amzn.to/2FtdVeu
Raspberry Pi 4: https://amzn.to/3cCrvKb
Flirc Case: https://amzn.to/2OBQTXz
DISCLAIMER: This video and description contains affiliate links, which means that if you click on one of the product links, I’ll receive a small commission at no extra cost to you!
Under section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research.
No Games Are Included Or Added
This video and Channel and Video are for viewers 14 years older and up. This video is not made for viewers under the age of 14.
Want to send me something?
12520 Capital Blvd Ste 401 Number 108
Wake Forest, NC 27587 US
THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY!
#SteamDeck #EmuDeck #etaprime
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00773.warc.gz
|
CC-MAIN-2022-40
| 1,379
| 18
|
https://cikit.tools/documentation/
|
code
|
CIKit is a package that supported on Linux, macOS, Windows 10 and should be installed once for further use as a command line utility.
The installation process on Windows 10 is a bit complicated and must be done by following the special instructions that will install Vagrant and Ansible automatically. Please, do not try to proceed, relying on your knowledge, even if you’re 100% sure how to deal with it. The WSL is in active development and things changes quite often. There were many hours spent on investigations for providing a working step-by-step tutorial.
Run the script to install the package and consider the
--no-requirements-check option that allows you to ignore missing dependencies (CIKit will operate in a limited mode or won’t operate at all).
curl -LSs https://raw.githubusercontent.com/BR0kEN-/cikit/master/install.sh | bash
Package will be located at
--forceto clear the changes that have been locally made and get the latest codebase without conflicts.
--versionto specify the branch or tag within the repository to get the codebase from.
--repositoryto specify the repository of the package that could be, for instance, your fork of the main project.
--skip-fetchto not pull the latest codebase and just ensure that all migrations to a new version were correctly applied.
cikit self-update \ --force \ --version=issues/52 \ --repository=https://github.com/gajdamaka/cikit.git
Create a project
Use what is needed instead of the
PROJECT and remember that the directory with a name in the option will be created in the location of command execution.
cikit init --project=PROJECT cd PROJECT
--cmffor downloading the
--versionfor specifying an exact version (e.g.
4.9.1etc.) of CMF to download.
--without-sourcesaffects CMF downloading. Use it for creating a project with an empty
docroot, where you can place whatever you want.
Build a virtual machine for local development
vagrant up --provision
Install a website inside of VM that will be accessible at
vagrant ssh cikit reinstall exit
Build a remote continuous integration server
You can skip this step if you are interested just in a local environment without provisioning a CI server for the project.
cikit provision --limit=HOSTNAME
Read more about the
HOSTNAME in a section about the hosts manager.
Commands quick reference
The information below is a good reminder of commands to run (order preserved).
cikit init --project=PROJECT cd PROJECT # Define the credentials for the matrix of droplets. cikit host/add --alias=matrix1 --domain=example.com [--ssh-key=~/.ssh/id_rsa] [--ssh-user=root] [--ssh-port=22] # Create the matrix itself. cikit matrix/provision --limit=matrix1 # Create first droplet - "cikit01". cikit matrix/droplet --limit=matrix1 --droplet-add # Provision remote CI server. #cikit provision --limit=matrix1.cikit01 # Add project to existing, already provisioned, server. #cikit jenkins-job --limit=matrix1.cikit01 # Provision local virtual machine. vagrant up --provision
SSH keys protection
In a case of creating a CI server or when putting a project to an existing one, always remember that you’re copying SSH key-pair to the project tree! They are needed to provision a droplet but you’re bringing a serious risk to lose the data on that droplet if the private key leaked. Share secret data only via private channels (private Git repository, for instance).
Provision using tags
Provision is an operation that configures CI server or VM and installs necessary software there to convert it to a unit for development.
At the very first time you are required to run full provisioning to build an environment correctly. After that you may decide to reinstall or reset configuration of some part of it. This is feasible thanks to the separation of a provisioning.
Get the list of available components:
CIKIT_LIST_TAGS=true cikit provision
Run provisioning of a specific component (CI server):
CIKIT_TAGS="COMPONENT1,COMPONENT2" cikit provision
Run provisioning of a specific component (VM):
CIKIT_TAGS="COMPONENT1,COMPONENT2" vagrant provision
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00631.warc.gz
|
CC-MAIN-2022-33
| 4,041
| 43
|
https://www.convertunits.com/from/oxgang/to/perche
|
code
|
How many oxgang in 1 perche?
The answer is 0.00056983333333333.
We assume you are converting between oxgang and perche [Canada].
You can view more details on each measurement unit:
oxgang or perche
The SI derived unit for area is the square meter.
1 square meter is equal to 1.6666666666667E-5 oxgang, or 0.029248318221702 perche.
Note that rounding errors may occur, so always check the results.
Use this page to learn how to convert between oxgang and perche [Canada].
Type in your own numbers in the form to convert the units!
1 oxgang to perche = 1754.89909 perche
2 oxgang to perche = 3509.79819 perche
3 oxgang to perche = 5264.69728 perche
4 oxgang to perche = 7019.59637 perche
5 oxgang to perche = 8774.49547 perche
6 oxgang to perche = 10529.39456 perche
7 oxgang to perche = 12284.29365 perche
8 oxgang to perche = 14039.19275 perche
9 oxgang to perche = 15794.09184 perche
10 oxgang to perche = 17548.99093 perche
You can do the reverse unit conversion from perche to oxgang, or enter any two units below:
oxgang to square myriameter
oxgang to labor
oxgang to square bicron
oxgang to pyeong
oxgang to square attometer
oxgang to square centimeter
oxgang to square astronomical unit
oxgang to square exameter
oxgang to square megameter
oxgang to decare
ConvertUnits.com provides an online conversion calculator for all types of measurement units. You can find metric conversion tables for SI units, as well as English units, currency, and other data. Type in unit symbols, abbreviations, or full names for units of length, area, mass, pressure, and other types. Examples include mm, inch, 100 kg, US fluid ounce, 6'3", 10 stone 4, cubic cm, metres squared, grams, moles, feet per second, and many more!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531779.10/warc/CC-MAIN-20220520093441-20220520123441-00016.warc.gz
|
CC-MAIN-2022-21
| 1,712
| 32
|
https://www.ycombinator.com/companies/uberduck
|
code
|
Uberduck makes AI vocal generation tools for music professionals, hobbyists, and marketers. Vocal samples and full songs produced by our text-to-speech, text-to-singing, text-to-rapping, and voice conversion technologies power: - AI remixes and original songs for musicians ranging from hobbyists to the largest DJs in the world. - Personalized musical content in marketing campaigns. - A variety of music-related consumer experiences built on top of our APIs.
Software engineer and writer. I studied at MIT, wrote for The Atlantic, and wrote software at Mixpanel and Propel before founding Uberduck. Former WMBR late-night DJ and founder of the Garfield High School Freestyle Rap Club.
Cofounder of Uberduck.
I have a PhD in statistics from the University of Washington and a math degree from Columbia. I've had the pleasure of working at interesting places like the Allen Institute, Amazon, Fred Hutch, and the National Institutes of Health. I am probably interested in what you are doing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00693.warc.gz
|
CC-MAIN-2023-23
| 991
| 4
|
https://www.vg247.com/2014/05/21/dayz-standalone-developer-is-working-on-better-zombies/
|
code
|
Following the announcement of expanding the team working on DayZ Standalone, Bohemia Interactive has now outlined some of the features coming to the sandbox survival game.
In an update on its Tumblr blog, the developer outlined upcoming priorities for the game, things such as animal AI, refactoring the inventory system and better zombie pathfinding are among them.
“Our major focus has been on establishing the architecture, both in the team and in the game, in order to deliver best in the future,” the update reads. “This involved us drastically increasing the size of the team working on the game. This had a severe short-term impact on our progress as our existing team had to devote time and resources to training and planning. The new zombie pathfinding is a good example of this approach beginning to produce results.”
“Because the system is now unified it means that more efficient (and more natural) pathfinding solutions are available to the AI, at a fraction of the performance cost as before,” it adds.
Among the major features the developer is working on, is better performance for the game. “Performance optimizations can be very significant. Currently the team are working on parallelizing the AI pathfinding function so it can operate on a separate core. With all new functionality we are developing in this way, unfortunately that means that it can take longer for us to develop but the results for performance can be massive,” it explains.
If you’re looking to get into the survival phenomenon, look no further than our complete guide, which goes over everything from controls to inventory.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038098638.52/warc/CC-MAIN-20210417011815-20210417041815-00095.warc.gz
|
CC-MAIN-2021-17
| 1,628
| 6
|