url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://community.act.com/t5/Act/Transferring-Registration-to-New-User/td-p/29026
code
11-26-2008 11:59 PM I'm getting ready to pick up the latest ACT and I was wondering if it possible to transfer registration to someone new on my current version. I currently am running 2008 (v.10). If this is possible, does anyone know the procedure to do so? Uninstall obviously is apart of this, but I'm more focused on how I can communicate this change of ownership to Sage. Thank you for your assistance. 11-30-2008 08:44 AM I just did this myself two weeks ago. I ended up getting on the phone with a Sage customer service rep, and he walked me through the process. Basically, when the new user to version 2008 went to register there were errors and I believe a phone number was given. I then called and was given a key of some sort that allowed the registration to proceed.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827281.64/warc/CC-MAIN-20181216051636-20181216073636-00196.warc.gz
CC-MAIN-2018-51
779
7
https://www.decoda.ca/resource/rsc-adults/learning-disabilities-rsc-adults/learning-disabilities-simple-assessment-and-proven-teaching-techniques/
code
Learning disabilities: simple assessment and proven teaching techniques This resource contains tools from an Orton-Gillingham Multisensory workshop conducted at the Northern Lights College, Chetwynd. Workshop presenters were Gloria Olafson and Stephanie Lindstrom of the Fraser Lake chapter of the Learning Disabilities Association of British Columbia. The first tool is a chart describing common areas of deficit, their possible impacts on a student, and suggestions for resources and strategies to improve learning. The second tool contains a 1 hour diagnostic tool to discover strengths and weaknesses, with a diagnostic lesson plan and advice on analyzing the diagnostic tool. This was created as part of the Learning Disabilities & Whole Life Learning project. Permission is granted for non-commercial educational use.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141740670.93/warc/CC-MAIN-20201204162500-20201204192500-00436.warc.gz
CC-MAIN-2020-50
823
4
http://www.revkites.com/forum/topic/2808-newbie-in-the-us-whats-the-best-place-to-buy-online/page-3
code
Newbie in the US: What's the best place to buy online? Posted 11 June 2009 - 09:04 PM My only issue: The "How to Fly" dvd was cracked during shipping. Are the videos or instructions online somewhere, or? Posted 11 June 2009 - 10:52 PM Call Kent at AWindofChange and see what he can do, he will set it good.... I'm sure I could, but it's only a dvd, don't want to really put that on them. Posted 12 June 2009 - 10:14 AM Darn shipping companies anyways! If you have someone there that you can fly with then that is much better than the DVD anyways. Either way, we got you taken care of. Posted 12 June 2009 - 11:12 PM Edited by Justin Horne, 12 June 2009 - 11:12 PM. Posted 13 June 2009 - 07:33 PM I went down to my preferred field (A large, open, mowed grass field, only to find just no wind at all. I then moved to my second, and eventualyl third favorite spot, an ankly high grass field. It's just annoying because of the line getting cuaght, etc... Eventually, I got it built, the lines properly (I thought) set up, etc... Got it in the air, but BARELY.. really hard to keep it flying. I could see some twists in the line.. Long story short, somehow or another I had REALLLLY knotted the lines (first quad... ) I eventually packed it up, took it home, spent 20 mintes fixing the lines, and packed it up... About an hour later, I decided I wanted another go... drove to my preferred field, and found wind! I set it up super slowly/the correct way (staked the handles, pulled the lines out, etc, etc. Made sure every line was perfectly tangle free. Eventually, I got it flying, and it was AWESOME. A few times hitting the ground, but that's about it. Once I got the fual line instincts gone, and the quad line "omg pull here to stop" instincts in their place, it was a blast. Only got to fly about an hour (impending rain,) but yeah, just got back, and it was great. And even better, here's a (poor quality) cell phone pciture of it ready to go: 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398456289.53/warc/CC-MAIN-20151124205416-00220-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
2,017
24
https://simpankira.freshdesk.com/support/solutions/articles/47000845833-create-new-tax-rate
code
In SImpanKira, we have created a few common tax rates that are applicable to your business. These tax rates are automatically mapped to the Sales and Service tax account in Liabilities accordingly. SimpanKira default tax rate are as follow; - Service Tax 6% - Sales Tax 5% - Sales Tax 10% - Service Tax Exempt 0% - Sales Tax Exempt 0% Adding new tax rate is very easy. - Go to Tax Rate by clicking on Tax Rate in Setting menu. - Click Add New Tax Rate. - Enter all the new tax rate information. - Make sure to assign the transaction type (Supply or Purchase) that is applicable to this new tax rate. - Assign the tax rate to the right Account. If you are not so sure about this, please get your accountant to do this for you. - Click Save.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00850.warc.gz
CC-MAIN-2023-50
739
14
http://www.eclipse.org/forums/index.php/t/74276/
code
i am really new about EMF and i want to write a WSDL model listener for both the text editor and graphic editor. i do not know if it is already there or i need to write it by using some Extension Point or some ways i do not know yet. Can anyone give me some suggestions? i will be really appriciated for your
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398453576.62/warc/CC-MAIN-20151124205413-00001-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
308
5
https://anvil.works/blog/storing-and-displaying-data
code
Most apps need to store information between one visit and the next. This video will introduce you to Anvil’s Data Tables service, which lets you store data quickly and securely. It will also show you how to display lists of data using data bindings and the RepeatingPanel. In this video, we will build an online To-Do list app. Let’s get going. Want to know more? To learn more about data tables, read the Data Tables section of the Anvil reference manual. More advanced topics In our next tutorial, we expand this app to support multiple users. Check it out!
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827998.66/warc/CC-MAIN-20181216213120-20181216235120-00324.warc.gz
CC-MAIN-2018-51
563
7
https://organicsearch.agency/talk/mysql/samsagaz-part-of-your/
code
Bartolomeo: Xgc: What is the correct way to inherit? Vanfossen: Brunoalano: In your model, user does not inherit from employee and employee does not inherit from user. You need another object / table that holds the common detail for both, but none of the unique detail for each. Osberg: Xgc: Can be a Account model, right? Both are accounts Trepanier: Brunoalano: There are all sorts of ways to do that. I’m hinting at one way. Holshouser: Brunoalano: Sure. You could call the root table an account table. Moltrie: Xgc: I don’t know the best way to do the link of an Account to his endpoint User or Employee Rezai: Xgc: Account user_id, employee_id or Useraccount_id ? Oras: Brunoalano: Read about models which use roles to determine behavior / identity. Handly: Xgc: or Account account_type: ‘User’, account_type_id: XX ? Gullace: Brunoalano: No. I would not do that. Walterman: Arguilez: using SELECT DISTINCT with with INNER JOIN and getting the results that i want, but not 100% sure that its right, because in that way i cant filter the newest stored stock variation Bridenbaugh: Brunoalano: Account would be neither a user, nor an employee. So don’t add that detail to account. Oeltjen: Brunoalano: You could identify a user or an employee by the related data found in other tables. Pageau: Xgc: But at the moment that I authenticate and find the correct Account based on email and p***word, how can be a beautiful way to find the User or Employee instead of doing 2 queries? Cavness: Brunoalano: Account would contain only the common detail, like name, beer preference. Dececco: Brunoalano: You told me that only employees have an email and p***word. Not users. Rix: Xgc: Sorry, both have email and p***word, so, both can authenticate. When the Employee authenticate, it will see the dashboard Haymans: Brunoalano: That’s very different. It’s important to be precise in your descriptions. Taruc: Xgc: So, what can I do now? Hartlep: Brunoalano: Ok. Sorry. Both have email/p***word. But only users have subdomain and only employees have dashboard access, correct? Zuazo: Xgc: Right, and Employees has roles Merkel: Brunoalano: It’s still the same. The common account will have name, email, p***, beer_perference and then you have some other relationships that indicate subdomain access and dashboard access. Delisle: Brunoalano: Nothing special. Just create those relationships. Staab: Xgc: Ok, but let’s figure a scenario: I authenticate with a email and p***word, and find an Account. So, what I do now? Account has_one Employee optional, can be NULL? Whitney: Brunoalano: You could. I would not. Keesee: Xgc: What you would do? Pizzolato: Brunoalano: I prefer not to use optional columns in most cases. Ley: Xgc: Me too, but it’s the only way without doing 2 queries to find if it’s a Employee or User Shake: SamSagaZ: sqlfiddle.com is an easy way to share your schema, your data, and the queries you’re testing. It saves us time and makes it more likely that you’ll get an answer! Make sure you set it to use MySQL. Arguilez: I’m out of time to look sorry Lanteigne: Brunoalano: You use separate relationships. Instead of a column to primary key relationship in the same table, use a separate table to related dashboard to account. Nolde: Brunoalano: it’s a simple relationship between tables. But you probably need more detail to know what needs to be stored to represent a dashboard link. Parmann: Brunoalano: Dashboard doesn’t mean anything to me. It may mean much more to you. Oathout: Brunoalano: Don’t forget to read the “groupwise max” articles, along with information on normalization. Lenig: SamSagaZ: Sorry. That’s for you. Purpora: SamSagaZ; Distinct isn’t the solution for you. Castleton: SamSagaZ: Part of your problem is knowing what you mean, but forgetting to relate your description to the schema you are using. For instance, you keep saying “newest”, but I don’t see any concept of “newest” in your description of the tables.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00759.warc.gz
CC-MAIN-2023-50
4,005
37
https://www.urbandictionary.com/author.php?author=ayayae
code
The right definition of the word "GM" is Game Moderator. Noobs often confuse this with Game Master, even though everyone could be a game master. Player 1: "Do you know what GM means?" Player 2: "Game Master, Doh!" Player 1: "Wrong noob!, it means Game Moderator." Player A: "Stop harassing me or I will call a Game Master" Player B: "It's Game Moderator, you noob!"
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867220.74/warc/CC-MAIN-20180525215613-20180525235613-00247.warc.gz
CC-MAIN-2018-22
365
7
http://checksumchecker.sourceforge.net/
code
Software for Digital Preservation Download version 3.0.1, released 25 March 2014 AEST Checksum Checker is free and open source software developed by the National Archives of Australia. Checksum Checker is a piece of software that is used to monitor the contents of a digital archive for data loss or corruption. Checksum Checker is a component of the Digital Preservation Software Platform (DPSP). As part of the Digital Preservation Recorder (DPR) workflow, checksums are generated for each Archival Information Package (AIP). Checksum Checker generates a new checksum for each AIP and compares it against the stored checksum. If the checksums do not match, then the AIP is flagged as being corrupt. Checksum Checker incorporates the following features: Checksum Checker functions as a service. Checksum Checker sends automated emails to a nominated administrator email address, coinciding with certain events (such as the start of a checking run or when an error is encountered). Checksum Checker is released under the GPLv3, and is available for download.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123560.51/warc/CC-MAIN-20170423031203-00265-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,058
9
http://jstawski.com/post/2006/03/18/sql-server-2000-and-2005-side-by-side-continued
code
18. March 2006 06:58 The other day I discovered something really cool that I would like to share with the development community. If one of your worries of running MSSQL Server 2000 and 2005 side by side is having to work with 2 IDEs, then no worries no more. You can use the new SQL Server Management Studio to view MSSQL Server 2000 and 2005 servers in one place.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00192.warc.gz
CC-MAIN-2023-40
364
2
http://serverfault.com/questions/431382/tcp-keepalive-how-does-it-work
code
I run on Ubuntu and i want to use TCP keepalive in order to implement hearbeat between master-slave.both servers are my impl (c++). I read this overview and did some google. i didnt understand what TCP keepalive send and i do know if connection is no longer valid when use in TCP keepalive ?. Do i need to check the revived content? The target is to have hearbeat between master-slave , so if one failed the other will be the master. in this post the advice is to implement hearbeat with tcp keepalive mechanism, so this is the reason that i am asking how i identify the broken connection when using tcp keepalive.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828282.32/warc/CC-MAIN-20160723071028-00083-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
614
2
http://www.climate-skeptic.com/2009/12/powers-of-10.html
code
This is a really interesting post at WUWT by J. Storrs Hall. It reminds me of one of those powers of ten films. He looks at data from a Greenland ice core (archived at NOAA here) going back over 50,000 years. He begins looking at the last few hundred years, and then pulls back the view on larger and large time scales. Highly recommended. Note: Box, et al in 2009 claim to have found from 1-1.5C of warming since around 1900 when this chart leaves off. It is very, very , very dangerous to splice data sets together, but one probably has to add a degree or so to the tail of the chart to bring it up to date, putting current warming about at the Medieval level but below earlier Holocene temperatures.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825098.68/warc/CC-MAIN-20181213193633-20181213215133-00380.warc.gz
CC-MAIN-2018-51
702
2
https://mathematica.stackexchange.com/questions/131848/replacing-exponential-pattern-in-equation
code
I have an equation of the form with $n$ exponential terms. $a_i,b_i$ are real numbers (a result of some previous computation). My intention is to apply integral operator $\int_p^qdx$ to the function above. When number of terms in above equation becomes very large (in fact on my PC about greater than 30), the evaluation becomes very slow. So I thought why not bypass the integration step and use replacement rules because I know what the integral is going to look like. That is I want to do the following replacement, which I hope will speed up evaluation: Exp[-b*x] -> (Exp[-b*q]-Exp[-b*p])/b a0 -> a0(q-p) I want to repeat that $a_i,b_i$, are real numbers which are output of some previous computation, and not just symbols, even though for generality I had to represent them as symbols here rather than as numbers. I wish I could tell you what I tried, but honestly I have no clue how to proceed with this problem. How do I match patterns and do replacement in this case? Thanks in advance for any help. P.S. I saw this post: Replace pattern for exponentials but wasn't helpful to me.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710898.93/warc/CC-MAIN-20221202050510-20221202080510-00558.warc.gz
CC-MAIN-2022-49
1,088
6
https://wetooktherisk.com/2022/10/21/the-creator-community-interview-with-tom-weirich/
code
What does it take to be a risk-taker in today’s renewable energy industry? How can renewable energy provide greater national security and grow jobs? John Saunders of the Creator Community featured Tom Weirich and his bestselling book, We Took the Risk. Check out this episode of The Creator Community to learn how thoughtful risk-takers built the renewable energy business from scratch and continue to guide and inspire many more to continue the move to energy independence. View the episode here. 👋CONNECT WITH THE AUTHOR👋 Author: Tom Weirich Book: We Took the Risk Check it out: https://www.amazon.com/We-Took-Risk-R… Website: https://www.wetooktherisk.com LinkedIn: https://www.linkedin.com/in/tomweirich/ Facebook: https://www.facebook.com/tom.weirich Twitter: https://twitter.com/tomweirich Instagram: https://www.instagram.com/tomweirich/ 📚CONNECT WITH THE PUBLISHER📚 https://www.facebook.com/NewDegreePress https://twitter.com/NewDegreePress https://www.youtube.com/c/NewDegreePr… 🔥 QUESTIONS 🔥 📕🖋Write Your Book📕🖋 🎙️Connect with the Show Host🎙️
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00501.warc.gz
CC-MAIN-2023-40
1,098
14
https://resourcecenter.ieee-pes.org/publications/oajpe-open-access-papers/pes_tp_oajpe-00062-2021_12-22
code
Building Marginal Pattern Library With Unbiased Training Dataset for Enhancing Model-Free Load-ED Mapping Qiwei Zhang, Fangxing Li, Wei Feng, Xiaofei Wang, Linquan Bai, and Rui Bo IEEE Members: Free Non-members: FreePages/Slides: 11 Input-output mapping for a given power system problem, such as loads versus economic dispatch (ED) results, has been demonstrated to be learnable through artificial intelligence (AI) techniques, including neural networks. However, the process of identifying and constructing a comprehensive dataset for the training of such input-output mapping remains a challenge to be solved. Conventionally, load samples are generated by a pre-defined distribution, and then ED is solved based on those load samples to form training datasets, but this paper demonstrates that such dataset generation is biased regarding load-ED mapping. The marginal unit and line congestion (i.e., marginal pattern) exhibit a unique characteristic called "step change" in which the marginal pattern changes when the load goes from one critical loading level (CLL) to another, and there is no change of marginal units within the interval of the two adjacent CLLs. Those loading intervals differ significantly in size. The randomly generated training dataset overfills intervals with large sizes and underfits intervals with small sizes, so it is biased. In this paper, three algorithms are proposed to construct a marginal pattern library to examine this bias according to different computational needs, and an enhancement algorithm is proposed to eliminate the bias in the load-ED training dataset generation. Three illustrative test cases demonstrate the proposed algorithms, and comparative studies are constructed to show the superiority of the enhanced, unbiased training dataset.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00234.warc.gz
CC-MAIN-2024-10
1,788
5
https://21stcenturyshoebox.com/tools/acr-calibrator/
code
Adapted from Thomas Fors’ ACR Calibrator beta 3.8 [(c) 2005-2006 Thomas Fors] With fragments from ACR Calibrator Rags v3.8 [(c) 2005 Rags Gardner] Original license applies as listed in the source code. The ACR Calibrator L script for Adobe Photoshop is used to calibrate a camera’s color response in an Adobe Camera Raw / Lightroom workflow. It uses the standardized colors of the GretagMacBeth ColorChecker target to calibrate the camera’s color response. The calibration is based on Thomas Fors’ ACR Calibrator script, which was the first automatic implementation of a calibration procedure suggested by Bruce Fraser. ACR Calibrator L provides a number of enhancements, the most critical of which is that it performs a 6-dimensional calibration on the calibration sliders using all patches, rather than alternating calibration of red, green, and blue. In some situations, this improves the algorithm’s stability. Important Note: Version 3.1 is the final release of ACR Calibrator L. Adobe’s DNG profile infrastructure (for ACR 4.5 and newer)provides a better way to deal with profiles going forward. A DNG profile can be created from a ColorChecker image using Adobe’s DNG Profile Editor. Note that the profiles that are created in this way using the most recent version of the Profile Editor are compatible with a scene-referred workflow. Also, ACR Calibrator L will most probably work with newer ACR versions (tested up to ACR 5.1), but will present an error message stating it hasn’t been tested. Current version: 3.1 (final release – 2 November 2008) For detailed usage instructions of Thomas Fors’ original script (and updated versions thereof), including instructions on how to photograph the ColorChecker target, visit http://www.fors.net/chromoholics/ To install the script, copy it to the Photoshop scripts directory and restart Photoshop. For use, open a well exposed image of a GretagMacBeth ColorChecker and draw a 4-point pen path in the center of the following patches: (1) dark brown (dark skin), (2) white, (3) black and (4) turquoise. Then, execute the script from the file->scripts menu. Upon starting, the script will present a popup screen with a number of options that are explained below. Reset all calibration sliders on start (default: enabled) When enabled, all sliders on the calibration tab and the saturation and vibrance sliders are initialized to zero before starting the calibration procedure. This can be disabled, for example, to calibrate using a non-zero saturation setting or to iteratively improve on a previous calibration. Target illuminant (default: D50) Specifies the (approximate) spectral distribution of the light source that was used when photographing the ColorChecker. The options are D50, D65 and illuminant A (tungsten). Calibration method (default: scene-referred) Specify which calibration method is used for the tonal response. There are three options: - use XMP data: Uses the tone curve and brightness, shadows and <emcontrast settings from the initial ACR conversion of the ColorChecker image (before starting the script). Use this option to calibrate to a particular (or ACR standard) tone curve. - scene-referred: Uses presets for a scene-referred image (linear response; no tonal mapping), as described in the essay The scene-referred workflow – a proposal. This setting is recommended for maximum preservation of color information. However, in most cases it will be necessary to separately apply a tone curve to the image. To apply a tone curve that does not lead to saturation and/or hue side-effects, take a look at the Toneability plug-in (Photoshop Windows 32-bit only). - fit curve: Uses the ColorChecker grey patches to optimize the brightness, shadows and contrast sliders (the selected tone curve is not modified). This method is used in Thomas Fors’ original ACR Calibrator Script. I do not recommended this option, because too many variables (3 sliders plus exposure) are adjusted based on too few measurements, sometimes leading to large tonal errors. It is included for comparison reasons only. Calibrate shadow tint (default: disabled) Specifies whether the shadow tint slider should be calibrated. Because this optimization is only based on the reading of a single patch, I advise against selecting this option, except in cases where the illuminant exactly matches one of the presets, or when the shadows are very noisy, leading to a visible magenta color cast (compact cameras or at extremely high ISO values). Error calculation method The script uses the DeltaE2000 (CIEDE2000) method for computing errors in the color patches. Some options are available for fine-tuning this method. First, Ignore brightness differences linearly scales the patch readings to match the luminance of the reference readings before calculating the color error. This is particularly useful when a non-linear tone curve is used in the grey scale calibration (any method other than scene referred). The constants kL, kC and kH define the (inverse) weights of luminance (L), chroma (C) and hue (H) in the DeltaE2000 calculation. Larger numbers lead to a lower weight. The CIEDE2000 default is (1,1,1), but the script uses a default setting of (2.5, 1.5, 1) to emphasize hue accuracy and deemphasize luminosity accuracy. This script, unlike the original ACR Calibrator script, uses all patches for calibration. The numbers in this pane can be used to define the linear weights for the individual colour patches. Only the relative magnitude of the numbers is important; the total does not have to add up to a specific number. Setting all weights equal is the most ‘democratic’, and minimizes the total color error. However, for practical purposes it might be better to give a higher weight (say, 3 times as high) to ‘memory colours’ such as skin tones, foliage and sky. Perhaps, a lower weight should be given to colors that are highly metameric and thus difficult to get ‘right’. Calibration passes (default: 1) Specifies the number of calibration passes to perform. One is usually enough, but some users have reported modest improvements when using multiple passes.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00669.warc.gz
CC-MAIN-2023-23
6,154
27
https://oldyourself.com/use-sendy-with-bluehost/
code
Use Sendy With Bluehost Finding a top quality low-cost webhosting supplier isn’t very easy. Every web site will have various demands from a host. Plus, you have to contrast all the attributes of a holding business, all while looking for the most effective offer possible. This can be a whole lot to type via, specifically if this is your first time buying holding, or developing a web site. Many hosts will certainly provide very low-cost initial rates, just to raise those prices 2 or 3 times higher once your preliminary contact is up. Some hosts will certainly offer totally free rewards when you sign up, such as a totally free domain name, or a cost-free SSL certificate. While some hosts will have the ability to supply much better performance and also high degrees of safety and security. Use Sendy With Bluehost Below we dive deep into the very best inexpensive host plan there. You’ll learn what core hosting attributes are essential in a host and exactly how to evaluate your own hosting needs so that you can select from one of the best low-cost hosting suppliers listed below. Disclosure: When you acquire a host package via web links on this page, we earn some compensation. This aids us to maintain this site running. There are no additional expenses to you whatsoever by utilizing our links. The list below is of the best affordable webhosting plans that I’ve directly made use of and tested. What We Take into consideration To Be Low-cost Web Hosting When we describe a webhosting bundle as being “Economical” or “Budget” what we imply is hosting that comes under the price bracket between $0.80 to $4 per month. Whilst researching economical hosting companies for this guide, we checked out over 100 various hosts that fell into that rate variety. We after that examined the top quality of their most affordable holding plan, value for cash and also client service. In this article, I’ll be going over this first-rate web site holding business as well as stick in as much appropriate info as possible. I’ll discuss the attributes, the pricing choices, and anything else I can consider that I assume might be of advantage, if you’re choosing to subscribe to Bluhost as well as get your sites up and running. So without more trouble, let’s check it out. Bluehost is just one of the biggest web hosting firms worldwide, getting both massive marketing assistance from the firm itself and also associate marketers who promote it. It truly is a massive business, that has actually been around for a long time, has a huge online reputation, and also is most definitely one of the top selections when it pertains to webhosting (certainly within the top 3, at least in my book). Yet what is it specifically, and should you get its services? Today, I will certainly address all there is you need to know, supplied that you are a blog owner or a business owner who is looking for a web host, and does not know where to get started, since it’s a wonderful service for that audience in general. Let’s envision, you wish to host your sites and also make them noticeable. Okay? You currently have your domain (which is your site destination or URL) today you wish to “turn the lights on”. Use Sendy With Bluehost You require some organizing… To complete every one of this, and also to make your site visible, you need what is called a “server”. A web server is a black box, or gadget, that saves all your site data (data such as photos, texts, videos, web links, plugins, and also various other info). Now, this web server, needs to be on at all times and it has to be linked to the web 100% of the moment (I’ll be stating something called “downtime” in the future). Additionally, it likewise requires (without obtaining as well fancy and into details) a file transfer protocol frequently referred to as FTP, so it can show web internet browsers your internet site in its intended type. All these things are either pricey, or call for a high degree of technological ability (or both), to produce and also maintain. And also you can completely go out there and also find out these points by yourself as well as established them up … but what concerning instead of you getting and also keeping one … why not just “leasing holding” instead? This is where Bluehost can be found in. You lease their web servers (called Shared Hosting) as well as you introduce a web site making use of those servers. Because Bluehost maintains all your documents, the business also allows you to establish your web content monitoring systems (CMS, for short) such as WordPress for you. WordPress is an incredibly preferred CMS … so it simply makes sense to have that choice offered (practically every hosting company currently has this alternative also). Simply put, you no more require to set-up a web server and afterwards integrate a software program where you can develop your web content, individually. It is currently rolled into one bundle. Well … think of if your web server is in your residence. If anything were to happen to it in any way, all your files are gone. If something goes wrong with its inner procedures, you need a specialist to fix it. If something overheats, or breaks down or gets damaged … that’s no good! Bluehost takes all these troubles away, as well as cares for every little thing technical: Pay your web server “rent”, as well as they will take care of whatever. And also once you buy the solution, you can after that start concentrating on adding content to your website, or you can put your effort into your marketing projects. What Provider Do You Obtain From Bluehost? Bluehost offers a myriad of different solutions, but the primary one is hosting certainly. The holding itself, is of different types by the way. You can lease a common web server, have a dedicated server, or additionally a digitalprivate server. For the function of this Bluehost evaluation, we will certainly concentrate on holding services and various other services, that a blog writer or an on-line business owner would require, as opposed to go unfathomable into the bunny hole and discuss the other services, that are targeted at more seasoned folks. - WordPress, WordPress PRO, as well as ecommerce— these organizing services are the bundles that permit you to organize an internet site utilizing WordPress as well as WooCommerce (the latter of which allows you to do ecommerce). After acquiring any of these packages, you can start constructing your internet site with WordPress as your CMS. - Domain name Marketplace— you can also acquire your domain from Bluehost instead of other domain name registrars. Doing so will certainly make it much easier to direct your domain name to your host’s name servers, because you’re making use of the exact same industry. - Email— once you have acquired your domain name, it makes sense to additionally get an e-mail address connected to it. As a blog writer or online business owner, you should pretty much never make use of a totally free e-mail solution, like Yahoo! or Gmail. An e-mail similar to this makes you look amateur. Fortunately, Bluehost provides you one free of charge with your domain name. Bluehost additionally uses dedicated web servers. And you may be asking …” What is a dedicated web server anyhow?”. Well, things is, the basic host plans of Bluehost can only a lot web traffic for your internet site, after which you’ll need to upgrade your holding. The factor being is that the usual web servers, are shared. What this implies is that a person web server can be servicing two or even more websites, at the same time, among which can be your own. What does this mean for you? It implies that the solitary server’s sources are shared, as well as it is doing several tasks at any given time. When your web site begins to strike 100,000 website check outs every month, you are going to need a dedicated web server which you can likewise receive from Bluehost for a minimum of $79.99 each month. This is not something yous needs to stress over when you’re beginning however you must maintain it in mind for sure. Bluehost Prices: How Much Does It Expense? In this Bluehost review, I’ll be focusing my attention primarily on the Bluehost WordPress Hosting plans, given that it’s one of the most popular one, and also very likely the one that you’re searching for and that will fit you the best (unless you’re a huge brand, business or website). The 3 readily available plans, are as complies with: - Standard Strategy– $2.95 per month/ $7.99 regular rate - Plus Strategy– $5.45 monthly/ $10.99 normal cost - Option Plus Strategy– $5.45 each month/ $14.99 routine cost The initial rate you see is the price you pay upon subscribe, and also the second price is what the price is, after the first year of being with the company. So essentially, Bluehost is going to charge you on a yearly basis. As well as you can likewise select the quantity of years you wish to hold your website on them with. Use Sendy With Bluehost If you pick the Standard strategy, you will certainly pay $2.95 x 12 = $35.40 starting today as well as by the time you enter your 13th month, you will now pay $7.99 per month, which is additionally billed per year. If that makes any type of sense. If you are serious about your web site, you ought to 100% get the three-year choice. This indicates that for the fundamental strategy, you will pay $2.95 x 36 months = $106.2. By the time you strike your 4th year, that is the only time you will pay $7.99 each month. If you consider it, this technique will conserve you $120 during three years. It’s very little, yet it’s still something. If you wish to obtain more than one website (which I highly recommend, and also if you’re major, you’ll probably be getting even more at some time in time) you’ll intend to take advantage of the selection plus plan. It’ll permit you to host unlimited sites. What Does Each Strategy Deal? So, when it comes to WordPress organizing plans (which resemble the common holding strategies, but are extra geared towards WordPress, which is what we’ll be focusing on) the functions are as adheres to: For the Standard plan, you obtain: - One site only - Secured website through SSL certification - Maximum of 50GB of storage - Complimentary domain for a year - $ 200 marketing credit scores Bear in mind that the domains are purchased independently from the organizing. You can obtain a complimentary domain with Bluehost here. For both the Bluehost Plus hosting and Choice Plus, you obtain the following: - Unlimited variety of web sites - Free SSL Certificate. Use Sendy With Bluehost - No storage or transmission capacity limit - Totally free domain name for one year - $ 200 marketing credit scores - 1 Workplace 365 Mail box that is complimentary for thirty day The Choice Plus strategy has actually an added benefit of Code Guard Basic Alternative, a back-up system where your documents is saved and also replicated. If any kind of collision happens as well as your web site information vanishes, you can restore it to its initial form with this function. Notification that although both strategies cost the very same, the Selection Plan then defaults to $14.99 each month, routine price, after the collection amount of years you’ve selected. What Are The Conveniences Of Using Bluehost So, why pick Bluehost over various other webhosting services? There are numerous web hosts, much of which are resellers, yet Bluehost is one select few that have stood the test of time, and also it’s probably one of the most well known around (as well as forever factors). Below are the 3 main benefits of choosing Bluehost as your host service provider: - Server uptime— your web site will not be visible if your host is down; Bluehost has greater than 99% uptime. This is incredibly essential when it pertains to Google Search Engine Optimization as well as positions. The higher the much better. - Bluehost rate— exactly how your web server reaction determines exactly how rapid your website shows on an internet browser; Bluehost is lighting quick, which means you will certainly minimize your bounce rate. Albeit not the most effective when it pertains to packing rate it’s still extremely vital to have a fast speed, to make customer experience much better and also far better your ranking. - Unrestricted storage— if you obtain the Plus strategy, you need not bother with the amount of files you store such as video clips– your storage space ability is unlimited. This is really vital, due to the fact that you’ll probably run into some storage space concerns later on down the tracks, as well as you don’t want this to be a problem … ever before. Last but not least, customer assistance is 24/7, which means no matter where you remain in the globe, you can contact the support group to repair your site concerns. Pretty typical nowadays, however we’re taking this for granted … it’s additionally really essential. Use Sendy With Bluehost Also, if you have actually gotten a free domain name with them, after that there will certainly be a $15.99 charge that will be subtracted from the amount you originally acquired (I envision this is due to the fact that it type of takes the “domain out of the market”, unsure regarding this, yet there most likely is a hard-cost for registering it). Lastly, any kind of demands after 1 month for a reimbursement … are void (although in all sincerity … they must probably be strict here). So as you see, this isn’t necessarily a “no questions asked” plan, like with a few of the various other hosting choices around, so make sure you’re okay with the plans before continuing with the hosting.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058222.43/warc/CC-MAIN-20210926235727-20210927025727-00606.warc.gz
CC-MAIN-2021-39
13,781
82
https://ziccibea.com/dell/wireless-dell-inspiron-ryuzyjv/
code
WIRELESS DELL INSPIRON I14-3442-A10 DRIVER DETAILS: |File Size:||4.7 MB| |Supported systems:||Windows 10, 8.1, 8, 7, 2008, Vista, 2003, XP, Other| |Price:||Free* (*Registration Required)| WIRELESS DELL INSPIRON I14-3442-A10 DRIVER (wireless_dell_1275.zip) Dell Laptops & Netbooks for sale, In Stock. The purpose is not to duplicate the debian official documentation, but to document how to install debian on some specific hardware. Upgrading wifi card to talk to operate. DELL Inspiron 15 3000 Series How to replace WiFi Card. - Find ethernet, wireless, wifi, airplane mode, bluetooth driver and optimize your system with drivers and updates. - Linux - wireless networking this forum is for the discussion of wireless networking in linux. - It's asking for some information that i haven't seen before. - Just installed linux mint 11katya on my dell inspiron 1545 and i am having trouble getting my wireless driver to operate properly for me. - Password, linux - newbie this linux forum is for members that are new to linux. - Jump to solution after installing latest bios version, and wifi card still doesn't show up, expand network, click on 'action' at the device manager taskbar, and then scan for hardware changes. - I based this video on info found on the f. So i find any wireless card. Ahstanford wrote, hello everyone, i'm trying to run the latest version of linux mint on the dell inspiron 1501 laptop and all is well except i cannot seem to get wireless working. Dell inspiron 6400 running windows 7 and mandriva one. I only access the device manager. I have a dell inspiron 1521 with a dell wireless dual band wlan mini-card. Dell inspiron 1525 - ubuntu - wireless i have dual boot on dell inspiron windows/ubuntu. Debianon is an effort to document how to install, configure and use debian on some specific hardware. You are watching me install broadcom wireless network card drivers on my dell inspirion 1300 running lubuntu linux. Therefore potential buyers would know if that hardware is supported and owners would know how get the best out of that hardware. Dell dell inspiron mini 10 dell wireless wlan 1397. I have a dell inspiron 5150 laptop with linux red hat 9 installed. Guides on how to install debian/linux on a dell. Yesterday, i installed linux mint 14 cinnamon on dell inspiron 1545. But i tried some specific hardware. Linux distros that work with dell laptops' 1397 mini-wifi card. All linux dell inspiron wireless share your knowledge at the lq wiki. If you through setting up, then immediately disconnect. Guide is specifically geared to obtain wireless problem light blinking. I ve got a problem with a fresh install of mint 12 gnome 32-bit dvd on an old dell inspiron 1501 laptop. How to find this is used in device manager. Linux mint 19 tara 32bit on dell inspiron 1545 - install set up kodi ssc / full show channel48. I tried several solutions, it. In a terminal, type lspci, which lists the pci devices in your system. If you find this post useful for you please kindly leave comment for your support. Lenovo T440s Hotkey Driver FREE. Kit teclado e mouse wireless adaptor missing. 1 & windows 8 & windows 10. Where can i find linux mint drivers for my dell inspiron network card. Mint 8, the dell inspiron 1525. Wireless jump to get wireless working. Wpn300n. Inspiron 1545 and optimize your dell laptops' 1397. Get drivers and downloads for your dell inspiron 3442. The dell inspiron 7577 laptop with the components described below has been awarded the status of certified pre-install for ubuntu. I tried some of the options discussed here, for e.g adding f43 or similar to that in /etc/modules. Find wireless, wifi, bluetooth driver and optimize your system with drivers and updates. This guide for your system with qca9377 on my wireless drivers. So i have a used dell inspiron 1545 x64 running vista, antix, vector and absolute linux. Select the driver that compatible with your operating system. Download and optimize your system with 0 replies. I was given a terminal, then scan for hardware changes. How to install ubuntu linux on your dell pc how to install ubuntu linux on your dell pc. It is specifically geared to the ubuntu linux operating system os. For more advanced trainees it can be a desktop reference, and a collection of dell inspiron 1545 linux wireless base knowledge needed to proceed with system and network administration. Solved wireless drivers on dell inspiron 1150 help answer threads with 0 replies. Iam using laptop dell inspiron 15r 5537. Hi, could someone point me to a wireless driver compatible with the inspiron 1720 for ubuntu 8.04 lts? And wireless is not defined on any linux distro i tried ubuntu, debian, elemetary os luna, gentoo , i searched google for it. I just installed mint 10 dell km636 preto. Point me install debian on windows 7 64-bit. Posted on janu by geekster 6 comments it is a common problem for the dell inspiron laptops using broadcom 43142 bcm43142. Upgrading wifi card in dell inspiron 1525 to wireless n. Howto, wireless on dell inspiron 1525 bcm4312 firstly, you should use the broadcom-wl package in the aur. Where can i bought it to solve dell inspiron 1545 linux. Boot on how to install debian on the wireless connection. I need to that hardware is specifically geared to it. How to determine which network administration. Posted on how to operate properly. So i based this post useful for windows 7. When i upgraded windows to win 7, a lost my wireless connection on the ubunu side. Hello, i've just installed red had enterprise on me lappy. I installed the driver from the extra drivers available menu but cant quite get it to operate. Online and on dell inspiron 3442. Dell inspiron 1501 laptop with the ethernet cable. Hello, i just installed the suse linux professional 9.3 on my dell inspiron 5150 laptop, on windows xp so i have 2 os's now and, the problem is that i can't set up my wireless network for linux only, because my wireless is working fine with winxp. I cannot seem to that i need to operate. I have installed ubuntu desktop 8.04 lts in my dell inspiron 1525. I ve got a wired connection. Where can i find linux mint drivers for my dell inspiron network card? The dell wireless i have installed linux. Hi, i am not able to see the wireless adapter in device manager. I have any of that hardware. Kit teclado e mouse wireless dell km636 preto por dell. Secondly, this is a two-year-old thread. Are you having wireless connection issues with a dell pc? Ubuntu 11.04 dell inspiron 1525 wireless drivers not working. Imaging device missing in device manager -- inspiron 15 5578 my integrated webcam is not working and i've tried several solutions, but find that imaging device is missing from my device manager. Download dell inspiron 14 3000 series wifi driver for windows 10, windows 8.1 windows 8, & windows 7. It can see the card it just can t seem to talk to it properly. Wireless adapter broadcom drivers for linux mint 10. Samsung Mp0402h. Here, for some reason even the wired connection is not recognized. Download dell inspiron 5759 wifi driver for windows 10, windows 8.1 & windows 8 & windows 7. Now when i open graphics control panel, the first screen correctly displays the content 1st image , but when i enter any of the options, like 3d, content is barely displayed second image . I have recently installed linux mint 10 on my dell inspiron 1525. It will attempt to connect, give me a pop-up saying it has connected, then immediately disconnect. I just installed the linux on dell inspiron windows/ubuntu.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400201826.20/warc/CC-MAIN-20200921143722-20200921173722-00758.warc.gz
CC-MAIN-2020-40
7,537
30
https://practicaldev-herokuapp-com.global.ssl.fastly.net/rrampage/comment/55bl
code
Whiteboard interviews look at a small sliver of skills you'll need for a software engineering job namely problem solving and mathematical thinking. Other equally important skills are communication with colleagues and non-technical team members, design & modeling, familiarity with domain knowledge (especially in niche companies) & perseverance (a good developer is aware of the inherent frustrations of dealing with multiple layers of abstraction). A better way to test candidates would be to ask them to add a small feature/resolve an issue on your existing code base and pair them with an experienced developer (with due compensation for time). But this is not a scalable process as it calls for equal investment from the companies' side as well. We're a place where coders share, stay up-to-date and grow their careers. We strive for transparency and don't collect excess data.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986669057.0/warc/CC-MAIN-20191016163146-20191016190646-00346.warc.gz
CC-MAIN-2019-43
881
3
http://dri.ie/masterclass-%E2%80%98multimodal-engagements-cultural-heritage%E2%80%99
code
An Foras Feasa, The Research Institute in the Humanities at Maynooth University, is organising a Masterclass on ‘Multimodal Engagements with Cultural Heritage’ that will take place from the 26th to the 28th September 2016 at the Iontas Building, Maynooth University. The aim of this three-day masterclass is to introduce participants to methods of creating and reusing cultural heritage artefacts at the intersections of digital and physical methodological approaches. It will provide participants with the theoretical background, best practices and hands-on experience of converting physical objects to digital and printed interactive 3D models and querying and visualising online cultural heritage through user interfaces. This masterclass is aimed at people working in the fields of Digital Humanities and Digital Heritage who are interested in developing a hands-on understanding of multimodal interactions with cultural heritage datasets. No previous knowledge or skills are required. Submissions are encouraged from: - Scholars and early career researchers with projects that would benefit from knowledge and skills on physical and digital interactions with cultural heritage. - Museum professionals interested in exploring how digital technologies revolutionise conventional research and practice. - Students and graduates of the Irish Digital Arts and Humanities PhD Programme - Students in computer science and related disciplines who would like to explore the potential of digital technologies in cultural heritage. Accommodation and transportation will be covered for all selected participants up to a maximum of €250 for participants based in the Republic of Ireland and up to €400 for participants outside Ireland. For more information and details on how to apply, see the Masterclass brochure. Deadline for applications: 8th July 2016.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948119.95/warc/CC-MAIN-20180426070605-20180426090605-00239.warc.gz
CC-MAIN-2018-17
1,857
9
http://blog.cwa.me.uk/2012/09/11/the-morning-brew-1186/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+ReflectivePerspective+%28The+Morning+Brew+-+Chris+Alcock%29
code
- Fiddler Web Debugger - Letter from Eric to the Fiddler community - Eric Lawrence announces the exciting news that he is going to work with Telerik full time on the Fiddler Web Debugger, initial indications is that this is win-win for the community as the project gets dedicated time (and more resource) to deliver even more goodness, and the tool looks set to remain free. For the Telerik view of this acquisition take a look at Christopher Eyhorn’s piece ‘Here we grow again. Telerik acquires Fiddler. What’s next?’ - 10 lessons for uncultured web developers - Troy Hunt discusses ten of the top ‘cultural’ things web developers often forget about, discussing choice of browser in other parts of the world, date formats, Names, currency, Operating Systems, mobile phones, timezones and a few others. - ASP.NET Web Forms DynamicData FieldTemplates for DbGeography Spatial Types (plus Model Binders and Friendly URLs) - Scott Hanselman continues his look at editor templates for the DbGeography data type, taking a look at how it cam be applied in WebForms, and looks at the new support for Model Binding in Web Forms - Supporting complex types in Azure Mobile Services clients - implementing 1:n table relationships - Carlos' blog - Site Home - MSDN Blogs - Carlos Figueira continues his exploration of the Windows Azure Mobile Services, exploring in this post how you can model 1:n table relationships in the data storage capabilities provided by the Mobile Services, looking at the implementation on the client and server - Looking at Windows Azure Mobile Services with Fiddler - Shayne P Boyer takes a look at the communication between the client and server when working with the Windows Azure Mobile Services, using Fiddler to capture the traffic, in this CodeProject article. - The Boy Scout Rule - Garry Shutler discusses the ‘Boy Scout Rule’ applied to the code base, and discusses the practices of refactoring, examining how much you should refactor, why you should, and when you should - From the MVPs: Visual Studio 2012 meets PowerPoint - Devon Musgrave takes a look at the role of PowerPoint in the software development process, taking a look at its use as a UI prototyping / storyboarding tool.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701562534/warc/CC-MAIN-20130516105242-00008-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
2,225
7
https://www.wolframscience.com/nks/p578--visual-perception/
code
So how does this work? The basic answer seems to be that there are nerve cells in our eyes and brains which are set up to respond to particular local patterns in the image formed on the retina of our eye. The way this comes about appears to be surprisingly direct. Behind the 100 million or so light-sensitive cells on our retina are a sequence of layers of nerve cells, first in the eye and then in the brain. The connections between these cells are set up so that a given cell in the visual cortex will typically receive inputs only from cells in a fairly small area on our retina. Some of these inputs will be positive if the Patches generated by a variety of one-dimensional cellular automaton rules. Each patch is set up to have a roughly equal number of black and white squares. But despite this, our visual system quickly notices that different patches have different textures. And presumably this is because the visual system is automatically identifying particular features in each patch. Everyone appears immediately to be able to see some patches when shown this picture. But after looking at the picture for a while, the boundaries between the patches seem to get somewhat clearer.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473347.0/warc/CC-MAIN-20240220211055-20240221001055-00025.warc.gz
CC-MAIN-2024-10
1,193
3
https://www.mrexcel.com/board/threads/any-limit-on-x-y-scatter-plots.375347/
code
I wanted to make an X-Y plot. I have 4242 pairs of points in two columns. If I only plot 2100 points, the X-Y scatter plot works correctly in excel. If I choose any more than 2100 points, scatter plot seems to revert to a line plot and plots the Y column against a point pair number instead of an X-Y plot. Is there a limit on # of points one can have for an X-Y plot ? How do I get around it to plot all 4242 points ?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00123.warc.gz
CC-MAIN-2023-14
418
1
https://sonohara.donmai.us/forum_topics/7123
code
I have been trying to search for images that are not in any pool. Is this possible? If not, will it be possible in danbooru 2? I have been reading giselebon's works for the last 2 days by searching for his name in the pool listing. After I finished the latest one, I know he would have a lot of one page comics that would not be in any pool. However, finding these comics seems to be impossible without opening every image tagged giselebon comic (which there are 15 pages of) and sifting through. I tried various forms of giselebon -pool:*, but seems that doesn't work. I thought if I were a member, doing giselebon -pool:4881 -pool:4261 etc would do, but after reading the forums, it seems not even "-pool:number" works properly. I'm not sure if this has been fixed in danbooru 2 as the problem seemed to be with removing images from pools and most of the pools on dabooru 2.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818464.67/warc/CC-MAIN-20240423033153-20240423063153-00406.warc.gz
CC-MAIN-2024-18
876
3
https://nullisnotanobject.com/bluehost-did-not-encrypt-this-message/
code
Bluehost Did Not Encrypt This Message Locating a premium cheap web hosting supplier isn’t easy. Every website will certainly have various needs from a host. And also, you need to compare all the attributes of a hosting business, all while searching for the most effective deal feasible. This can be a whole lot to sort with, specifically if this is your very first time buying holding, or building an internet site. A lot of hosts will certainly supply very inexpensive introductory prices, only to increase those prices 2 or 3 times higher once your initial call is up. Some hosts will provide totally free benefits when you register, such as a totally free domain, or a cost-free SSL certification. While some hosts will certainly have the ability to provide much better efficiency and high levels of safety and security. Bluehost Did Not Encrypt This Message Below we dive deep right into the most effective affordable webhosting plan there. You’ll discover what core hosting attributes are necessary in a host and exactly how to evaluate your own organizing requirements so that you can pick from one of the best inexpensive hosting providers listed below. Disclosure: When you buy a host package via links on this page, we gain some compensation. This aids us to keep this site running. There are no additional prices to you in all by using our web links. The listed here is of the best economical webhosting plans that I have actually directly made use of and also examined. What We Consider To Be Affordable Web Hosting When we explain a web hosting package as being “Cheap” or “Budget plan” what we imply is hosting that falls under the price bracket between $0.80 to $4 monthly. Whilst researching affordable holding companies for this guide, we looked at over 100 various hosts that fell under that price array. We after that analyzed the high quality of their cheapest hosting package, worth for cash as well as customer support. In this write-up, I’ll be looking at this world-class website organizing company as well as stick in as much appropriate information as feasible. I’ll discuss the functions, the prices options, and anything else I can think about that I think could be of benefit, if you’re choosing to subscribe to Bluhost as well as get your internet sites up and running. So without additional ado, allow’s check it out. Bluehost is one of the greatest host firms worldwide, obtaining both huge advertising support from the firm itself as well as associate marketing experts that advertise it. It truly is a huge firm, that has actually been around for a long time, has a big credibility, and is definitely one of the top selections when it pertains to web hosting (certainly within the top 3, at least in my book). Yet what is it specifically, and also should you obtain its services? Today, I will answer all there is you require to understand, offered that you are a blogger or an entrepreneur that is searching for a web host, as well as doesn’t understand where to begin, because it’s a great remedy for that target market generally. Allow’s picture, you intend to organize your websites and make them noticeable. Okay? You already have your domain name (which is your website location or LINK) and now you intend to “transform the lights on”. Bluehost Did Not Encrypt This Message You require some organizing… To complete all of this, and to make your internet site visible, you need what is called a “web server”. A server is a black box, or tool, that saves all your web site information (files such as photos, messages, videos, web links, plugins, and also other details). Currently, this server, has to get on regularly and also it has to be linked to the net 100% of the time (I’ll be pointing out something called “downtime” later). Furthermore, it likewise requires (without getting too fancy and also into details) a file transfer protocol frequently referred to as FTP, so it can show internet internet browsers your internet site in its desired kind. All these things are either costly, or need a high degree of technological ability (or both), to produce and maintain. And you can totally go out there and also discover these things on your own and also set them up … but what about as opposed to you getting and also maintaining one … why not just “leasing hosting” instead? This is where Bluehost is available in. You lease their servers (called Shared Hosting) as well as you introduce a site making use of those web servers. Because Bluehost keeps all your files, the firm additionally enables you to establish your material administration systems (CMS, for brief) such as WordPress for you. WordPress is a very popular CMS … so it just makes good sense to have that option readily available (practically every hosting firm currently has this alternative as well). In short, you no longer need to set-up a web server and afterwards incorporate a software where you can build your web content, separately. It is already rolled right into one bundle. Well … imagine if your web server is in your house. If anything were to occur to it at all, all your files are gone. If something fails with its inner procedures, you need a technician to fix it. If something overheats, or breaks down or obtains damaged … that’s no good! Bluehost takes all these hassles away, as well as takes care of everything technological: Pay your server “rent”, and also they will certainly care for everything. And also as soon as you purchase the service, you can then start focusing on including content to your internet site, or you can put your effort right into your advertising and marketing campaigns. What Provider Do You Receive From Bluehost? Bluehost provides a myriad of various services, yet the primary one is hosting certainly. The organizing itself, is of various types by the way. You can rent out a common web server, have a dedicated server, or also a virtualpersonal web server. For the purpose of this Bluehost review, we will certainly concentrate on hosting services as well as other services, that a blog owner or an on-line business owner would require, rather than go too deep right into the rabbit hole and talk about the various other services, that are targeted at more knowledgeable people. - WordPress, WordPress PRO, as well as shopping— these holding services are the plans that permit you to host an internet site utilizing WordPress and WooCommerce (the latter of which enables you to do e-commerce). After buying any of these bundles, you can begin building your website with WordPress as your CMS. - Domain Industry— you can also purchase your domain from Bluehost rather than various other domain name registrars. Doing so will certainly make it simpler to aim your domain to your host’s name servers, because you’re making use of the same market. - Email— when you have actually purchased your domain name, it makes good sense to likewise obtain an e-mail address connected to it. As a blog owner or on-line business owner, you need to practically never make use of a complimentary e-mail solution, like Yahoo! or Gmail. An e-mail such as this makes you look unprofessional. Luckily, Bluehost gives you one for free with your domain name. Bluehost likewise provides devoted web servers. And also you may be asking …” What is a committed server anyhow?”. Well, the important things is, the basic web hosting bundles of Bluehost can just so much web traffic for your internet site, after which you’ll require to upgrade your holding. The factor being is that the usual servers, are shared. What this means is that web server can be servicing two or more internet sites, at the same time, one of which can be your own. What does this mean for you? It implies that the single web server’s sources are shared, and also it is doing several jobs at any kind of provided time. Once your internet site begins to strike 100,000 website check outs every month, you are mosting likely to require a dedicated web server which you can likewise get from Bluehost for a minimum of $79.99 each month. This is not something yous must worry about when you’re starting out however you should maintain it in mind for sure. Bluehost Prices: Just How Much Does It Cost? In this Bluehost review, I’ll be concentrating my focus generally on the Bluehost WordPress Hosting plans, given that it’s one of the most prominent one, as well as most likely the one that you’re seeking which will certainly suit you the best (unless you’re a substantial brand, business or site). The 3 available strategies, are as complies with: - Standard Strategy– $2.95 per month/ $7.99 normal cost - Plus Plan– $5.45 each month/ $10.99 normal cost - Selection And Also Plan– $5.45 monthly/ $14.99 routine rate The first price you see is the cost you pay upon sign up, and the second cost is what the cost is, after the very first year of being with the company. So essentially, Bluehost is going to bill you on a yearly basis. As well as you can likewise choose the quantity of years you want to organize your website on them with. Bluehost Did Not Encrypt This Message If you select the Basic plan, you will certainly pay $2.95 x 12 = $35.40 starting today and also by the time you enter your 13th month, you will currently pay $7.99 each month, which is additionally charged each year. If that makes any type of sense. If you are serious about your web site, you should 100% get the three-year option. This suggests that for the basic strategy, you will certainly pay $2.95 x 36 months = $106.2. By the time you hit your 4th year, that is the only time you will pay $7.99 monthly. If you think of it, this strategy will save you $120 during three years. It’s very little, but it’s still something. If you want to obtain more than one web site (which I highly suggest, and also if you’re severe, you’ll probably be getting more at some point in time) you’ll want to utilize the selection plus plan. It’ll permit you to host unrestricted internet sites. What Does Each Strategy Deal? So, when it comes to WordPress organizing plans (which are similar to the shared hosting strategies, yet are a lot more geared in the direction of WordPress, which is what we’ll be focusing on) the functions are as follows: For the Standard strategy, you obtain: - One internet site just - Secured website using SSL certificate - Maximum of 50GB of storage space - Complimentary domain for a year - $ 200 advertising credit scores Bear in mind that the domains are acquired independently from the hosting. You can get a complimentary domain name with Bluehost right here. For both the Bluehost Plus hosting and also Choice Plus, you obtain the following: - Limitless variety of internet sites - Free SSL Certification. Bluehost Did Not Encrypt This Message - No storage or bandwidth limit - Totally free domain name for one year - $ 200 marketing credit report - 1 Workplace 365 Mailbox that is complimentary for thirty day The Choice Plus plan has an added benefit of Code Guard Basic Alternative, a back-up system where your data is conserved and replicated. If any kind of collision happens as well as your web site information goes away, you can restore it to its original type with this feature. Notice that even though both strategies set you back the very same, the Choice Strategy after that defaults to $14.99 monthly, routine rate, after the collection amount of years you have actually selected. What Are The Advantages Of Using Bluehost So, why select Bluehost over various other host solutions? There are hundreds of web hosts, much of which are resellers, however Bluehost is one choose couple of that have actually stood the test of time, and also it’s probably one of the most well known around (and completely reasons). Below are the three primary benefits of selecting Bluehost as your web hosting company: - Web server uptime— your web site will not be visible if your host is down; Bluehost has greater than 99% uptime. This is incredibly crucial when it comes to Google Search Engine Optimization as well as positions. The greater the far better. - Bluehost rate— exactly how your web server reaction identifies how rapid your site reveals on a browser; Bluehost is lighting quickly, which means you will reduce your bounce price. Albeit not the very best when it pertains to filling rate it’s still extremely vital to have a quick speed, to make customer experience far better and also better your ranking. - Endless storage— if you obtain the Plus plan, you need not stress over how many files you keep such as video clips– your storage space capability is limitless. This is truly crucial, due to the fact that you’ll most likely face some storage concerns later on down the tracks, and also you do not desire this to be a trouble … ever before. Lastly, consumer support is 24/7, which means no matter where you remain in the world, you can speak to the assistance group to fix your site problems. Pretty conventional nowadays, however we’re taking this for approved … it’s likewise extremely crucial. Bluehost Did Not Encrypt This Message Likewise, if you have actually gotten a cost-free domain with them, after that there will certainly be a $15.99 charge that will certainly be subtracted from the amount you originally acquired (I picture this is due to the fact that it kind of takes the “domain out of the marketplace”, not sure concerning this, however there possibly is a hard-cost for registering it). Last but not least, any type of demands after one month for a reimbursement … are void (although in all honesty … they must most likely be rigorous here). So as you see, this isn’t necessarily a “no questions asked” policy, like with a few of the other hosting choices out there, so make sure you’re fine with the policies prior to proceeding with the hosting.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588244.55/warc/CC-MAIN-20211027212831-20211028002831-00346.warc.gz
CC-MAIN-2021-43
13,945
82
https://www.openradix.com/products/openfire
code
On Premise Chat Server for your Enterprise why do you need your own chat server control over your data When you use cloud services, you entrust a key asset of your company-your real-time business communication archive-to a third party. Openfire is usually chosen by businesses who are heavily regulated and need higher levels of security. With Openfire, your chat history, is stored in your own Database, not across the world! Openfire runs completely self-contained on your own server. This server can be located on your own premises – behind your own corporate firewall, or you can use cloud-based Microsoft Azure or Amazon Cloud services. Openfire's excellent support for monitoring users, servers, and server connections makes network administration a breeze. For sensitive corporate environments, SSL encryption can be enabled for communication between the clients and the server openfire server features - Web-based administration panel - Plugin interface - Source code is customizable - SSL/TLS support - User-friendly web chat client - Database connectivity for storing messages and user details - Active Directory / LDAP connectivity - Platform independent, pure Java - Full integration with Spark, works with any XMPP chat client openfire chat client - spark - Lightweight graphical user interface - Plugins support - Support for SSL/TLS encryption - Client restriction and control with Openfire Client Control plugin - Integration with Openfire Fastpath Service - Support for other proprietary and open IM protocols via Openfire Kraken IM Gateway plugin - Tabbed conversation - Spell checking and automated message translation support - Platform independent - Single sign-on with LDAP support - Off-the-Record Messaging support - Privacy lists - File transfers - Multi-user chat support We provide implentation, training & helpdesk support facilities We can do a complete setup for Openfire on your server and help you implement a corporate chat infrastructure with Active Directory integration. If you have an existing Openfire setup or if you don’t need external help for set up, you can’t ignore the need for ongoing support. If your IT department already has enough on its plate, you could always sign up with us. We act as an extended arm of your IT team to liaison with the OEM, help in commissioning the solutions and also provide training to your administrator / users. Apart from this, we also offer a helpdesk facility, letting your IT department offload routine user support tasks.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662532032.9/warc/CC-MAIN-20220520124557-20220520154557-00706.warc.gz
CC-MAIN-2022-21
2,509
35
https://blog.adafruit.com/2011/03/02/gameduino/
code
I thought you and your customers would like to know about the Gameduino kickstarter. Gameduino connects your Arduino to a VGA monitor and speakers, so anyone who can write an Arduino sketch can create video games. It’s packed full of 8-bit game goodness: hundreds of sprites, smooth scrolling, multi-channel stereo sound. James Bowman, the project sponsor, has some great pledge rewards, including a “… 64-byte message burned into an easter-egg section of every Gameduino’s boot ROM. Enter the realm of the immortals (geek section). I’m hoping he gets funded and Adafruit starts carrying the Gameduino!
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865411.56/warc/CC-MAIN-20180523024534-20180523044534-00368.warc.gz
CC-MAIN-2018-22
612
1
https://tinu.live/2016/09/10/is-it-possible-to-make-use-of-micro-controllers-instead-of-using-mcb-and-elcb-for-protection-in-house/
code
My answer to Is it possible to make use of micro controllers instead of using MCB and ELCB for protection in house? Answer by Shaunak Agastya Vyas: Yes, it is possible. What you can do is you can drop down the line voltage and current to microcontroller level, measure the quantities using ADC of microcontroller, set the threshold levels of trip and do the same job. If you use some kind of DIP switches, then you can make this threshold level programmable using the combination of the switches. - Shaunak Agastya Vyas
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347436466.95/warc/CC-MAIN-20200603210112-20200604000112-00125.warc.gz
CC-MAIN-2020-24
519
4
https://research.brighton.ac.uk/en/persons/laura-mitchell
code
I am a first year PhD researcher exploring green social prescribing and social justice looking at access to nature and its benefits, and how ethnically minoritised people face additional barriers to accessing nature. The history of British colonialism, migration, enclosures and land privatisation contextualise modern relationships with nature. The idea of a 'nature cure' is explored critically and the locus of health moved beyond the individual, instead found in the ongoing and spontaneous relationality between people and nature. What this means for a socially just green social prescribing programme will be explored through qualitative research. My research is funded by the ESRC South Coast Doctoral Training Partnership. - 1 Similar Profiles
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362605.52/warc/CC-MAIN-20211203060849-20211203090849-00062.warc.gz
CC-MAIN-2021-49
751
3
https://www.efgs.info/conferences/efgs/efgs-2019-conference-manchester-united-kingdom-2/interacting-with-multiple-cartographic-representations-the-mapmuxing-project/
code
Clément Godin (IGN France) With the development of digital maps, users (general public or a professional) have more and more to navigate between various cartographic representations (maps at different scales, with different styles, aerial orthoimages). Users may get lost when migrating from one representation to another. This is why the MapMuxing project sought to improve interaction and visualization of different cartographic displays on different kinds of display devices (computers, smartphones, tabletops, wall-sized screens). In order to improve user navigation in multiple cartographic representations, the project research focused on cartographic continuums, i.e., a stack of intermediate representations, more or less continuous, which can be used by simple interactions like zooming, or more complex ones such as lenses or animations. For instance, continuums between two scales with a strong content abstraction can enhance zooming interaction and avoid users being lost in the map. In addition to generic uses of the cartographic representations via common services such as Google Maps or the IGN geoportal, the project focused on the needs of crisis management. This use case was particularly interesting because the use of maps and images at different scales is required to achieve fast and effective decision making.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.25/warc/CC-MAIN-20240414095752-20240414125752-00770.warc.gz
CC-MAIN-2024-18
1,335
2
http://thestir.cafemom.com/technology/145827/windows_8_looks_totally_terrifying
code
It's coming. It's scary, weird, and may upset you, but it's inevitable and I'm going to tell you how to deal with it. It's called Windows 8 and it's the biggest change to Windows since, well, we went from dark screens with prompts to Windows 95. Here's what you need to know about Windows 8 and and, more importantly, why it matters. Windows 8 is really two operating systems. The "main" system, code-named Metro, consists of a special "touch" interface that features a number of live tiles that change based on data. They can display emails, weather widgets, notifications, and even photos. Think of them as mini-apps that grow into full apps when you click on them. If you've used Windows Phone, Microsoft's new phone operating system, these will be familiar. When you use Metro the computer becomes a mobile device. It's all touch (or click) all the time and there's very little typing involved. Metro is, in short, as different from Windows as you can get. Unfortunately, Windows isn't quite fully baked. In order to handle things like managing files, writing letters, editing photos, and the like, many apps end up in the "real" Windows interface that you know and maybe love. Think of Metro as a hot tub and the old interface as the pool. The hot tub sure is nice, but the real swimming gets done in the pool. Arguably, the new Windows has some great features. For one, it has excellent parental controls that allow you manage what the kids can access. It's also visually pleasing and offers a considerable upgrade to the browsing and photo-handling experience. In short, if you love your tablet, you'll like Metro. However, be warned: the jump between Metro and the "old" Windows is jarring, and until most apps are Windows 8-ready, there will be a lot of bouncing back and forth. Do you need to install Windows 8 right now? Probably not. I'd wait until either you're ready to upgrade your laptop/PC hardware or, barring that, install it next year when apps will be Win8 ready. It's a huge change, to be sure, and I'm actually kind of excited by it. But it's pretty "out there," and I doubt your office computer will be getting an upgrade soon. Change comes quickly in computing but acceptance comes slowly. It's going to be a wild ride. Do you think you'll wind up using Windows 8 at some point? Image via Microsoft
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125074.20/warc/CC-MAIN-20170423031205-00300-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,323
11
https://support.atlas-sys.com/hc/en-us/community/posts/360041860934-ILLiad-Workflow-During-COVID-19-Survey-
code
ILLiad Workflow During COVID-19 Survey Atlas Systems has created a short survey to learn the status for your ILLiad institution and what challenges you’re facing. We want to help in whatever way makes the biggest impact for you. The survey is here: https://www.surveymonkey.com/r/ILLiadCovid19 Thank you in advance for any details you can give us!
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704798089.76/warc/CC-MAIN-20210126042704-20210126072704-00572.warc.gz
CC-MAIN-2021-04
349
4
https://support.entuity.com/hc/en-us/articles/360001703054-SurePath-dashboard
code
The Paths dashboard displays a list of paths and information about their current status within the selected View or Subview. The Paths dashboard is only applicable to Views and Subviews. It is not applicable to any other managed object (e.g. devices, services, components etc). Information about a path's history can be accessed on the Application Path Discovery page, via the Administration page in the Main Menu. The Paths dashboard contains the following dashlets: - Status Summary- this is a Pie Chart dashlet. This dashlet displays a summary of the current path status for all paths on the selected View or Subview. - Status History (Last 7 days) - this is a Chart dashlet. This dashlet displays a history of path status on the selected View or Subview over the previous 7 days. - Paths - this is a Path Summary dashlet. This dashlet lists the paths on the selected View or Subview. From here, you can access the Summary dashboard for a path by clicking on its name.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039476006.77/warc/CC-MAIN-20210420152755-20210420182755-00541.warc.gz
CC-MAIN-2021-17
971
6
https://nn-careers.com/jobs/devops-devloper-interim/
code
We are looking for a colleague who wants to join our Financial Reporting DevOps team. The teams does the technical support for 4 applications. OneSource, SAP Disclosure Management, CxO Cockpit and Oracle EPM Platform (former Hyperion). Oracle EPM Platform is by far the biggest of the applications. As a technical support team we are responsible for the technical workings of the application. We have to take care that we apply the latest (security) patches. The application is running. We are building monitor dashboards to monitor our environments. We migrate projects that are built on the platform through the T / A / P environments. We solve incidents, analyze the root causes and implement fixes. We help the business to automate specific tasks. We are responsible that the applications complies to the security and risk standards of NN Group and having the according document up to date and reviewed regularly. Explicit knowledge of the applications is not required. Experience has shown that knowledge of application- and webservers in combination with general IT infrastructure knowledge are of more value to the team. We are looking for a collegue with:
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863923.6/warc/CC-MAIN-20180521023747-20180521043747-00252.warc.gz
CC-MAIN-2018-22
1,163
4
https://groups.google.com/g/linux.kernel/c/pVcyLZZBHbg
code
(Quoting somewhat out of order) On Sun, May 13, 2018 at 09:23:39PM +0000, Thorsten Glaser wrote: > It’s also no solution for the arc4random API… seems like a cultural > clash (BSD expectations vs. what Linux can actually deliver). It's instructive to look how OpenBSD solves this problem. OpenBSD supports a much smaller set of architectures than linux, and a very small set of bootloaders (which are part of the OpenBSD sources). So what OpenBSD is make the bootloader responsible for reading in the random seed file from persistent storage. Therefore OpenBSD doesn't wait for the RNG to be initialized, because it assumes that this never happens. (Hand-waving what happens during the install, but presumably harvesting entropy from the CD installer is not a problem, and OpenBSD doesn't support debootstrap. :-) So the first thing is that we *really* should get folks working on adding support to the x86 boot protocol so that in addition to passing a pointer to the loaded kernel, the inital ramdisk, and the boot command line, there should also be a pointer passed to the kernel containing a pointer to X bytes of seed entropy. This begs the question of how do we trust that the bootloader as actually gotten an effective source of seed entropy. Unlike OpenBSD, there are at least five or six different bootloaders which implement the x86 boot loader protocol for Linux (probably more), and can we trust that they are all implemented correctly? And of course, this is an x86-only solution. What about all of the other architectures supported by Debian? Still, the vast majority of Debian users are using x86, so solving that problems helps most of our users, and we shouldn't let the perfect be the enemy of the good. Also note that the bootloader has depend on userspace to refresh the seed entropy, both in early boot (in case the syscrashes), and at shutdown (so the entropy captured while the system is running can be saved as seed entropy). And this is trickier in Linux because the bootloader lives in a different source tree, and is maintained by different people from the systemd and/or initscripts people, and for that matter the bootloader doesn't know which distribution it is booting. (This is one of places where having a single source tree ala the *BSD's has its advantages. And this is where perhaps Debian as a distribution can solve this problem by coordinating action across multiple Debian packages.) > >Due to the gdm bugs mentioned above we know that there are real-life > >situations where gdm currently uses "random" data that might be When does gdm need true cryptographic randomness? We should take a step back and take look at the big picture. The only uses I can think of involving using XDMCP or some other Remote Desktop Protocol. But that protocol was invented in the days pre-SSH, and it is about as secure as telnet --- which is to say, not at all. So picking a randomly generated password for networked X or MIT Magic Cookie is something where I'd argue if you're worried about the quality of /dev/urandom, you're not worried about the your biggest security vulnerability. (Think bank vault doors attached to Papier mâché The util-linux-ng package made a similar calculation in v2.32 (interestingly, *before* the changes to address CVE-2018-1108 were Author: Carlo Caione <ca...@endlessm.com Date: Mon Mar 19 10:31:07 2018 +0000 lib/randutils: Do not block on getrandom() In Endless we have hit a problem when using 'sfdisk' on the really first boot to automatically expand the rootfs partition. On this platform 'sfdisk' is blocking on getrandom() because not enough random bytes are available. This is an ARM platform without a hwrng. We fix this passing GRND_NONBLOCK to getrandom(). 'sfdisk' will use the best entropy it has available and fallback only as necessary. Signed-off-by: Carlo Caione <ca...@endlessm.com Author: Karel Zak <kz...@redhat.com Date: Tue Mar 20 14:17:24 2018 +0100 lib/randutils: don't break on EAGAIN, use usleep() Note that we do not use random numbers for security sensitive things like keys or so. It's used for random based UUIDs etc. Signed-off-by: Karel Zak <kz...@redhat.com > >> b. Tolerate a longer wait for getrandom() to return > >I suspect there might be no guaranteed upper bound for the waiting time. > On a discless system with no hardware sources (possibly no network) > and no keyboard interaction? Infinite. > Of course, if early userspace could reliably update a file, then the > file’s content could be estimated as good enough and be credited to > the RNG, at least for non-identical/readonly-/shared-media systems. ... and ultimately, this is the problem. Having an initialized RNG is ultimately, a system design issue that has to be considered holistically. If you have special hardware that you trust, it's easy. Or in a VM environment, where you have to implicitly trust the host *anyway* you could just use Virtio-rng and be done with it. Or it might depend on your workload. The security requirements of a information kiosk system will be quite different from a Kerberos KDC Or it might depend on who you are. If you're Intel or the US government, maybe you're willing to trust RDRAND, either because you know that it's secure because you've laid eyes on the internal CPU chip designs (or perhaps, maybe, you put the back door in yourself, and you've decided you don't need to worry about own goals :-). The *point* is that we can't really make a turn-key solution which will work for everyone. For as much we have the desire for a "Universal OS", something that works for all hardware, all users, and all workloads, is probably just not attainable here. (It never was a complete solution, BTW; even before the patches to address CVE-2018-1108, there were already hardware systems where you couldn't count on the RNG being initialized in time and getrandom(2) would block. It's just that they were few in number, and they tended to very niche systems for the tiniest of IOT devices, where you wouldn't be using gdm, or for that matter, systemd, because they simply wouldn't fit.)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00248.warc.gz
CC-MAIN-2023-50
6,079
97
https://mangolassi.it/tags/codec
code
It sounds like @lansalot might have been pushing an old config file to Yealink phones with newer firmware, and that old style config MIGHT have been slightly incompatible - and caused the issue. which @lansalot was able to resolve, not by completely modernizing his config files, but instead by adding a few lines to expressly bring OPUS back into the config. That should not matter. If the config is old and does not have the setting specified at all, it should go to the default value. Sure, of course you'd like to think so - but bugs do happen... and it appears that it is in this case.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585997.77/warc/CC-MAIN-20211024111905-20211024141905-00168.warc.gz
CC-MAIN-2021-43
590
3
https://github.com/44kksharma
code
- Android-ViewPager-Carousel-UI 11 ViewPager Carousel Card UI can be used as Top Level Navigation or as a Image / Video Gallery View - DevsmartLib-Android 0 A Horizontal ListView for Android - AndEngineMultiplayerExtension 0 AndEngine - Multiplayer Extension - PlayStartApp 0 Starting APP Play Framework 2.x with Signup, Signin, Reset password, Change Email from Settings... Common uses cases - u2020 0 A sample Android app which showcases advanced usage of Dagger among other open source libraries. Contributions in the last year 1 total Apr 20, 2014 – Apr 20, 2015 Longest streak 1 day July 8 – July 8 Current streak 0 days Last contributed
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246640001.64/warc/CC-MAIN-20150417045720-00235-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
646
8
http://www.slidesearchengine.com/slide/20130504-feweb-twitter-api
code
Published on March 6, 2014 Twitter API Keys for creating an awesome application ! Pascal Alberty @zorrobiwan CTO Managing Partner Twitter Dev Ecosystem ● Twitter success ○ Thanks Dev Community ! ● API ○ ○ ○ ○ September 2006 Very complete Open Free https://blog.twitter.com/2006/introducing-twitter-api The APIs ● APIs ○ Search API ○ REST API ○ Streaming API ○ https://dev.twitter.com/docs/history-rest-search-api ● Versions ○ API version 1 (almost deprecated) ○ API version 1.1 Resources https://dev.twitter.com/ (Drupal ) Authentication ● OAuth ○ Each API request must be authorized ○ Access token on behalf of a Twitter user ● Obtaining access token ○ ○ ○ ○ ○ Sign in with Twitter 3-legged OAuth Pin based OAuth dev.twitter.com ... https://twitter.com/settings/applications Declare your application https://dev.twitter.com/apps/new Rate limiting ● Rate limit window duration ○ 15 minutes ● Requests allotted ○ per user ○ via application-only auth ● Example ○ GET statuses/user_timeline ○ per user: 150 requests per 15 minutes ○ via app: 300 requests per 15 minutes https://dev.twitter.com/docs/rate-limiting/1.1/limits Other technical limits ● Direct messages ○ 250 per day ● Tweets ○ 1,000 per day ○ Retweets are counted as Tweets. ● Changes to account email ○ Four per hour ● Following ○ 1,000 per day ● Following (account-based) ○ up to following 2,000 other users Platform objects ● Tweets can be found alone, within user objects, but ● ● ● most often within timelines Users can be found tweeting, following, and favoriting on Twitter Entities are most often found within Tweets Places can be found throughout the natural universe, but typically only appear attached to Tweets on Twitter Tweet Example https://api.twitter.com/1/statuses/show.json?id=341545927401680897&include_entities=true User example https://api.twitter.com/1/users/show.json?screen_name=zorrobiwan&include_entities=true Entities / Entity Example ● Hashtags, Medias, URLs, User mentions, Symbols ● No need to parse ● Data used for display also (ex: display_url) Place example https://api.twitter.com/1/geo/id/247f43d441defc03.json Libraries ● PHP ○ Twitter-async (https://github.com/jmathai/twitterasync) ○ tmhOAuth (https://github. com/themattharris/tmhOAuth) ○ Zend Framework (http://framework.zend. com/manual/1.12/en/zend.service.twitter.html) ● Java ○ Twitter4J (http://twitter4j.org/) https://dev.twitter.com/docs/twitter-libraries Tools ● Twurl ○ https://github.com/marcel/twurl ○ "curl" for Twitter API ○ Manage access tokens (authentication) ● Apigee Console ○ https://apigee.com/console ○ Free console to execute APIs Search API ● Similar to http://search.twitter.com ● Criteria ○ ○ ○ ○ ○ ○ terms geocode language ("Language detection is best-effort") count, until, since-id, max-id result type: mixed, recent, popular include entities ● Paginated ! ○ you have to manage this by yourself REST API ● ● ● ● ● ● ● ● ● ● ● ● ● ● Timelines Tweets Direct Messages Friends & Followers Users Suggested Users Favorites Lists Saved Searches Places & Geo Trends Spam Reporting OAuth Help Streaming API ● Persistent HTTP connection ○ until you decide to close it ● Could be reeeeaaaaaaally huge ! ○ Think about you architecture (hard and soft) ! ○ Separate storage and consumption ● Only one stream opened at a time ● Could be tricky to managed ○ Use a library Streaming API endpoints groups ● Public Streams ○ GET statuses/sample ○ POST statuses/filter ○ GET statuses/firehose (limited access) ● User Streams ○ Data and events for a specific user ● Site Streams (beta and limited access) ○ Real time update for large number of users https://twitter.com/zorrobiwan/status/341888609399480323 Twitter API Keys for creating an awesome application ! View 250 Twitter Api posts, presentations, experts, and more. Get the professional knowledge you need on LinkedIn. View 264 Twitter Api / posts, presentations, experts, and more. Get the professional knowledge you need on LinkedIn. 1.Abusing Twitter API & OAuth Implementation Nicolas Seriot April 10th, 2013 Hack In The Box Amsterdam, NL 2. Abstract Since March 2013, Twitter’s new ... C# Lab: Write a Simple Twitter Client Using the Twitter API Jennifer Lewis Notes for Instructors: You can use this as a project or lab assignment. If you ... Eventbrite - Federation des Metiers du Web présente Social API’s: intégrer Facebook et Twitter au cœur de vos applications - Mardi 4 juin 2013 à CEI ... Social API’s: intégrer Facebook et Twitter au cœur de vos applications. Interested Going. Invite. ... INSCRIPTIONS: http:// feweb-tech-4.eventbrite.com / 20130504-GiveYourAppsSomeSass - 2013 FVNUG Day of .NET Presentation: Give Your Apps Some SASS! Using OOCSS and SASS to Build Web and Native Applications 1. Introduction to Environmental Psychology. 2. Content1. Origin of environmental psychology2. Perception a. seeing b. gestalt c. depth3. Effects of the ...
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123270.78/warc/CC-MAIN-20170423031203-00387-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
5,101
30
https://community.powerbi.com/t5/Desktop/Convert-currency/m-p/39406
code
I am using sql as my source data, and running reports for both Northern Ireland and Republic of Ireland. The data for each region is in separate tables. Is there a way I can convert the currency in the Northern Ireland tables to EURO before building my visualisations, so everything can be reported in single currency? Thanks in advance for your help. When you bring your data in could you not create a new column and then multiply the £ by todays € rate, I find Oanda.com good. I'm not sure of a current way that the conversion rate could automatically update itself. For currency conversion, I build a Slicer for change the currency. Then I wrote a formula to change the curreny: For example suppose defualt currecy is Euro: Euro_rate1= 1.05* US Dollar Euro_rate2 =3378 * Irianian Rial (IRR) IF(VALUES(Currency_Table[CurrencyType])="Dollar",FORMAT(SUM(Sales [Euro])/[Euro_rate1]),"$ #,##0.00;($ #,##0.00)") ,IF(VALUES(Currency_Table[CurrencyType])="IRR",FORMAT(SUM(Incentive_Table[Euro])/[Euro_rate2]),"€ #,##0.00;(€ #,##0.00)"),FORMAT(SUM(Incentive_Table[Euro])/1),"IRR #,##0.00;(IRR #,##0.00)"))) IF Currency Type="Dollar" Then Sales based on Euro/Euro_rate1 IF Currency Type="IRR" Then Sales based on Euro/Euro_rate2 Then format them. Did you get it ? I hope it is helpful.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524475.48/warc/CC-MAIN-20190716015213-20190716041213-00253.warc.gz
CC-MAIN-2019-30
1,285
14
https://venturebeat.com/ai/the-nominees-for-the-venturebeat-ai-innovation-awards-at-transform-2020/
code
Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here. At our AI-focused Transform 2020 event, taking place July 15-17 entirely online, VentureBeat will recognize and award emergent, compelling, and influential work through our second annual VB AI Innovation Awards. Drawn from our daily editorial coverage and the expertise of our nominating committee members, these awards give us a chance to shine a light on the people and companies making an impact in AI. Here are the nominees in each of the five categories — NLP/NLU Innovation, Business Application Innovation, Computer Vision Innovation, AI for Good, and Startup Spotlight. Natural Language Processing/Understanding Innovation A senior principal scientist at Amazon Research and faculty member at the University of California, Santa Cruz, Dr. Hakkani-Tur currently works on solving natural dialogue for Amazon’s Alexa AI. She has researched and worked on natural language processing, conversational AI, and more for over two decades, including stints at Google and Microsoft. She holds dozens of patents and has written or co-authored more than 200 papers in the area of natural language and speech processing. Recent work includes improving task-oriented dialogue systems, increasing the usefulness of open-domain dialogue responses, and repurposing existing data sets for dialogue state tracking for natural language generation (NLG). MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA. BenevolentAI’s mission is to use AI and machine learning to improve drug discovery and development. The amount of available data is overwhelming, and despite a steady stream of new research, too many pharmaceutical experiments fail today. BenevolentAI helps by accelerating the indexing and retrieval of medical papers and clinical trial reports about new treatments for diseases that don’t have cures. Fact-based decision-making is essential everywhere, but for the pharmaceutical industry, the facts just need to be harvested in a synthetic, relevant, and efficient way. Research continues to uncover bias in AI models. StereoSet is a data set designed to measure discriminatory behaviors like racism and sexism in language models. Researchers Moin Nadeem, Anna Bethke, and Siva Reddy built StereoSet and have made it available to anyone who makes language models. The teams maintains a leaderboard to show how models like BERT and GPT-2 measure up. Hugging Face seeks to advance and democratize natural language processing (NLP). The company wants to contribute to the development of technology in this domain by growing the open source community, conducting research, and creating NLP libraries like Transformers and Tokenizers. Hugging Face offers free online tools anyone can use to leverage models such as BERT, XLNet, and GPT-2. The company says more than 1,000 companies use its tools in production, including Apple and Microsoft’s Bing group. Business Application Innovation Jumbotail’s technology updates traditional “mom-and-pop” stores in India, often known as “kirana” stores, by connecting them with recognized brands and other high-quality product producers to help transform them into modern convenience stores. Jumbotail does so without raising the cost to customers by collecting and mining millions of data points in real time every day. Thanks to its AI backend, Jumbotail became India’s leading online wholesale food and grocery marketplace, with a full stack that includes integrated supply chain and logistics, as well as an in-house financial tech platform for payments and credit. The insights and tech developed around this new business model empower producers and customers, and Jumbotail is poised to expand to other continents. Rasa is an open source conversational AI company whose tools enable startups to build their own (close to) state-of-the-art natural language processing systems. These tools — some of which have been downloaded over 3 million times — bring AI assistants to life by providing the technical scaffolding necessary for robust conversations. Rasa invests in research to create conversational AI, furnishing developers at companies like Adobe, Deutsche Telekom, Lemonade, Airbus, Toyota, T-Mobile, BMW, and Orange with solutions to understand messages, determine intent, and capture key contextual information. Dr. Richard Socher is probably best known for founding MetaMind, which Salesforce acquired in 2016, and for his contribution to the landmark ImageNet database. But in his most recent role as chief scientist and EVP at Salesforce (he just left to start a new company), Socher is responsible for bringing forth AI applications, from initial research to deployment. To help domain experts without AI expertise deploy AI products and services, Platform.ai offers computer vision without coding. It’s an end-to-end rapid development solution that uses proprietary and patent-pending AI and HCI algorithms to visualize data sets and speed up labeling and training by 50-100 times. The goal is to empower companies to build “good” AI. Platform.ai can count big-name brands as customers. The company’s founders include chief scientist Jeremy Howard, who is also the founding researcher of deep learning education organization Fast.ai and a professor at the University of San Francisco. In their powerful work, “Large image datasets: A pyrrhic win for computer vision?,” researchers Abeba Birhane, Ph.D. candidate at University College Dublin, and Dr. Vinay Prabhu, principal machine learning scientist at UnifyID, examined the problematic opacity, data collection ethics, labeling and classification, and consequences of large image data sets. These data sets, including ImageNet and MIT’s 80 Million Tiny Images, have been cited hundreds of times in research. Birhane and Prabhu’s work is under peer review, but it has already resulted in MIT voluntarily and formally withdrawing the Tiny Images data set on the grounds that it contains derogatory terms as categories, as well as offensive images, and that the nature of images in the data set makes remedying it unfeasible. An assistant professor in the School of Interactive Computing at Georgia Tech and a research scientist at Facebook AI Research, Dr. Dhruv Batra focuses primarily on machine learning and computer vision. His long-term research goal is to create AI agents that can perceive their environments, carry natural-sounding dialogue, navigate and interact with their environment, and consider the long-term consequences of their actions. He’s also cofounder of Caliper, a platform designed to help companies better evaluate the data science skills of potential machine learning, AI, and data science hires. And he helped create Eval.ai, an open source platform “for evaluating and comparing machine learning (ML) and artificial intelligence (AI) algorithms at scale.” Ripcord offers a portfolio of physical robots that can digitize paper records, even removing staples. Employing computer vision, lifting and positioning arms, and high-quality RGB cameras that capture details at 600 dots per inch, the company’s robots are able to scan at 10 times the speed of traditional processes and handle virtually any format. Courtesy of partnerships with logistics firms, Ripcord transports files from customers such as Coca-Cola, BP, and Chevron to its facilities, where it scans them and either stores them to meet compliance requirements or shreds and recycles them. The company’s Canopy platform uploads documents to the cloud nearly instantly and makes them available as searchable PDFs. AI for Good Authors Alexandre Lacoste, Alexandra Luccioni, Victor Schmidt, and Thomas Dandres built an online calculator so anyone can understand the carbon emissions their research generates. Machine learning research demands high compute resources, and even as the field achieves key technological breakthroughs, the authors of the calculator believe transparency about the environmental impact of those achievements should be generalized and included in any paper, blog post, or publication about a given work. They also provide a simple template for standardized, easy reporting. Niramai developed noninvasive, radiation-free early-stage breast cancer detection for women of all age groups using thermal imaging technologies and AI-based analytics software. The company works with various government and nonprofit entities to enable low-cost health check-ups in rural areas in India. Prevention and early detection are key to improving the outcomes of cancers, but health centers are not always equipped with expensive screening machines. Because thermal imaging is safe, cost-effective, and easy to deploy, it can improve early screening in low-tech facilities around the world. Dr. Pascale Fung is director of the Centre for AI Research (CAiRE) at the Hong Kong University of Science and Technology (HKUST). Among other accolades and honors, Fung represents the university at Partnership on AI and is an IEEE fellow because of her contributions to human-machine interactions. Through her work with CAiRE, she has helped create an end-to-end empathetic chatbot and a natural language processing Q&A system that enables researchers and medical professionals to quickly access information from the COVID-19 Open Research Dataset (CORD-19). Dr. Timnit Gebru continues to be one of the strongest voices battling racism, misogyny, and other biases in AI — not just in the actual technology, but within the wider community of AI researchers and practitioners. She’s the co-lead of Ethical AI at Google and cofounded Black in AI, a group dedicated to “sharing ideas, fostering collaborations, and discussing initiatives to increase the presence of Black individuals in the field of AI.” Her work includes Gender Shades, the landmark research exposing the racial bias in facial recognition systems, and Datasheets for Datasets, which aims to create a standardized process for adding documentation to data sets to increase transparency and accountability. Relimetrics develops full-stack computer vision and machine learning software for QA and process control in Industry 4.0 applications. Unlike many other competitors in the field of visual inspection, Relimetrics proposes an end-to-end flow that can be adopted by large groups, as well as smaller manufacturers. Industry 4.0 is associated with a plethora of technological stacks, but few are able to scale to large and small manufacturers across multiple industries yet remain simple enough for domain experts to deploy them, which is where Relimetrics comes in. Dr. Daniela Braga, DefinedCrowd DefinedCrowd creates high-quality training data for enterprises’ AI and machine learning projects, including voice recognition, natural language processing, and computer vision workflows. The company crowdsources data labeling and more from hundreds of thousands of paid contributors and passes the massive curation on to its enterprise customers, which include several Fortune 500 companies. The startup’s cofounder and CEO, Dr. Daniela Braga, has credentials in speech technology and crowdsourcing dating back nearly two decades, including nearly seven years at Microsoft that included work on Cortana. She has led DefinedCrowd through several rounds of funding — most recently, a large $50.5 million round in May 2020. Flatfile wants to replace manual data janitoring for enterprises with its AI-powered data onboarding technology. Flatfile is content agnostic, so a company in essentially any industry can take advantage of its Portal and Concierge platforms, which are able to run on-premises or in the cloud. Flatfile has completed two funding rounds, one of which wrapped up in June 2020. As of September 2019, the company had attracted 30 customers with essentially no paid advertising. Less than a year later, it had 400 companies on its waitlist, ranging from startups up to publicly traded companies. DoNotPay, founded by British-born entrepreneur Josh Browder, offers over 100 bots to help consumers cancel memberships and subscriptions, fight corporations, file for benefits, sue robocallers, and more. While much of the company’s automation engine is rules-based, it leverages third-party machine learning services to parse terms of service (ToS) agreements for problematic clauses, such as forced arbitration. To address challenges stemming from the pandemic, DoNotPay recently launched a bot that helps U.S.-based users file for unemployment. In the future, the startup plans to bring to market a Chrome extension that will work proactively for users in the background. VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00317.warc.gz
CC-MAIN-2022-40
13,040
28
https://www.mobileread.com/forums/showpost.php?p=414816&postcount=18
code
Nick: That works great. I don't know why I didn't think to try that. As for the ETI software, on the mac if you dont' want to use the mac versions yes follow the linux setup and run them under Wine. (I used CXOffice but that's the same thing). I am now a windows user again so am stuck back in the world of Mickeysoft for now. Scary enough as a Mac user Vista is very usable. <Shrug> I'm slowly adding IMP versions of my 500 book calibre library (Thankfully most are in my old Impserve structure, just not orginized correctly (at all) so I'm almost back to normal! Favorite part of the Ebookwise for me? The way the books are orginized on the device. Soooo much better then teh Sony.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00456-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
683
6
https://penguin.academy/asuncion-april-en.html
code
What is it? A Penguin Bootcamp is an intense 2 week programming course that brings our participants from Zero Programming knowledge to an internship level. You will experience 5 days of programming fundamentals, with 3 days of workshops culminating in a 3 Day hackathon where you build a product from scratch. The best part is that this product could potentially be your own startup. The benefits do not just end there! After the bootcamp, you will automatically be part of the Penguin Talent Pool where you can be hired by one of our Corporate Partners. If you want to continue developing, you can be part of the Penguin Lab where you work on a real world project under the guidance of one of our Senior Developers. If that is not enough, you can create your own startup and Penguin will support you the whole way! What you will learn Fundamentals of software development taught in Python. Beyond this, you learn about the following technologies: Workshops to deepen the coding skills and dive into relevant technologies Use programs to interact with the physical world Build & Program Robots A three-day challenge where students, guided by a mentor, build a real product. Here are some of the things built in the last bootcamp A RECON robot that's operated by a PS3 controller An IoT Device that converts a place into a Smart room that you can control with your voice Who can apply? Applications open until 6 April 2019 The Bootcamp will happen at Gumersindo Sosa 1461, barrio Ycua Sati, en Asunción PY Coding as a School of Thought We envision a world where education is self-sustainable, and where technology and humanity can work together in harmony. Education today is preparing students for the past; it is time to prepare for the future. Today’s problems are global and complex and skills like divergent thinking, emotional intelligence and collaboration are needed to solve them. Code is the perfect medium to learn these skills, as they will help you build tomorrow’s world. We are a Movement. Join us! Don't worry, we hate spam too - that's why we only send out monthly emails.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027321786.95/warc/CC-MAIN-20190824214845-20190825000845-00193.warc.gz
CC-MAIN-2019-35
2,093
20
http://n4g.com/news/773036/best-bits-ghouls-n-ghosts-at-gamefanmag-com
code
Neil Reive writes, "Initially released in the arcades by Capcom in 1989, the game was converted over to the Sega Genesis and is set in the times of the Knights of the Round Table, with a Camelot setting fused with the tail of the Holy Grail. The evil Loki has struck and taken the souls of innocent people, including Princess Prin Prin, Knight Arthur’s lover. Taking control of Knight Arthur, the player has to progress through the macabre levels, defeat the various creatures that get in his way and free his bride from the clutches of the evil Loki and his demonic fiends that roam each scenario. Sounds easy enough, doesn’t it? Wrong."
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589350.19/warc/CC-MAIN-20180716135037-20180716155037-00536.warc.gz
CC-MAIN-2018-30
642
1
https://extensions.joomla.org/extension/revolver-maps/
code
This is a module to display a revolver maps 3d globe (from www.revolvermaps.com) displaying a dot (with flag icons and locations) for each current visitor on your website. No registration required at www.revolvermaps.com, just change the parameters in your Joomla admin panel or visit http://revolvermaps.com/?target=setup and copy & paste the generated code they give you in the Joomla admin panel parameter. Now uses HTML5 and compatible on iOS and non-flash enabled browsers. Advanced Live Statistics as long as the module is shown on every recordable page. Important Note: The ID it installs with is for my demo site. If you want to reset the visitor count and associate it with just your site, you'll need to visit www.revolvermaps.com and take your generated ID from the script code they give you: The Unique ID code would be "3jOSAW42Ch" (without the double-quotes) ChangeLog: v1.5 - Enhancement: Updated widget from RevolverMaps uses HTML5 - Enhancement: Compatible with Joomla v3.x - Parameters: Obsolete options removed (eg. Flash) v1.4 - Added Module Parameter: Custom Background Color - Added Module Parameter: CSS3 Rounded Corners - Added Module Parameter: Revolvermaps URL (rc.* or jc.*) - Corrected short form PHP tags (ie. removed these). v1.3 - Upgraded to work with Joomla 2.5.x v1.2 - Checked compatibility: Internet Explorer v6+, Mozilla Firefox v3.5+, Google Chrome v5+ - Trimmed any spaces from posted data and html code. - Used revolvermaps.com selection of "width x height" values. - Added alignment parameter ("float") relative to its container. - Added div and parameter "module class" so that class name actually works... - Added parameter to switch between Java (applet) or Flash (swf) v1.1 - Separated all parameters to be configured in the Joomla admin panel - No need to visit revolvermaps.com to generate code - Language file created (English GB only) v1.0 - Added GNU/GPL License information to xml/php - Removed must agree to license - Moved to section not requiring registration
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401632671.79/warc/CC-MAIN-20200929060555-20200929090555-00405.warc.gz
CC-MAIN-2020-40
2,013
6
https://forums.xamarin.com/discussion/comment/200611
code
Is it possible to use an enum value as Value property in a DataTriiger ? I don't have a Xamarin specific example on hand. But I believe the process is the same as WPF. Follow this SO post HERE It works like a charm ! Xamarin Inc., as a wholly-owned Microsoft subsidiary acting as a separate legal entity, adheres to the Microsoft Privacy Statement: Privacy & cookies
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141187753.32/warc/CC-MAIN-20201126084625-20201126114625-00029.warc.gz
CC-MAIN-2020-50
366
5
https://www.seekorswim.com/nortal-llc-Up/java-developer-finance-area-FQVt
code
We are building a modern integration layer for our client, a small and innovative bank originating from Estonia. The first aim of the project is to make use of the PSD2 directive to build digital, open-banking solutions and integrate with multiple 3rd party partners. Our new colleague, Java Developer, would join our international banking team to work on this challenging project. We are doing frequent silent releases and have high code quality standards. Writing scalable and flexible software that would serve its users for many years to come is one of the goals you will be helping our customers to achieve. Tech stack of the project:BE - Java 11, Spring Boot, Spring Data.DB - PostgreSQL, Flyway.Integration - Kafka, REST 2.Scalable architecture - AWS stack, Docker.CI/CD - Jenkins, Github.Specification - Swagger. Do you have what it takes:Experience in Java software development. Aspiration for high-quality code driven by test automation, code reviews, and modern development practices. Proficiency in REST API’s. Capability to support live production systems. Detective mind, able to come up with solutions. Good communication skills in English for international teamwork. Team spirit and skills to thrive in a fast-paced agile environment. Why Nortal?We hire people not only for their skills but also for cultural fit. We value teamwork, openness & honesty, constant improvement, and meaningful impact. Besides our professionalism, we like to spice things up with good humor!We care about your growth & development. Our team prioritizes constant improvement and organizes workshops for knowledge sharing. We have 1 day per month for self-learning, external and internal trainings, a mentorship program, and strong 1:1 culture.We prioritize your health & well-being by providing a flexible package for health insurance and sports initiatives.We support your work-life balance and provide flexible working hours, work from home & remote work options. Salary range: 2000-4000 Eur gross
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585045.2/warc/CC-MAIN-20211016231019-20211017021019-00165.warc.gz
CC-MAIN-2021-43
1,995
6
http://blog.deploymentengineering.com/2007/11/windows-installer-required-reading-list.html
code
Historical archive 2003-2011 Here's a few links I put on our internal wiki for our support engineers:Introductory / General Reference (for everyone) How Windows Installer Shortcuts Work Setup Sense and Sensibility Unofficial UAC in MSI Notes Rob's “Saw Tooth” Diagram Rob’s “Four Squares” Diagram Credential Prompt and Permissions ExplainedAdvanced References (primarily for installation developers) Main Windows Installer documentation page Microsoft Windows Installer Team Blog Robert Flaming - Setup Sense and Sensibility Rob Mensching - Openly Uninstalled Stefan Krueger - InstallSite.org Chris Painter - Deployment Engineering Heath Stewart's Blog Bob Arnson - Joy of SetupTraining DesktopEngineer.com MSI TrainingTroubleshooting System Policy Settings And Windows Installer The installation behavior of the Windows Installer can be configured by an administrator by using the Group Policy Editor (GPE). Certain policy settings can affect the way Windows Installer runs or even whether or not a particular user has the ability to execute initial installations, upgrades to installed applications, or patches to installed applications (note: this includes users who are members of the Administrators user group). These polices can be set at the user level and\or at the machine level. Opening the MSI log file using the MSI Log File Utility (see link below) and then selecting "Analyze" and then "Policies" will display all the policy settings for the user who ran the installation. Any policy that shows as enabled ("1" instead of "0") is a _potential_ problem for Windows Installer installations. The following MSDN page lists each of these policies and where the policy setting is located in the system registry: System PoliciesError Messages Pre-defined Standard Errors [1-27999] Pre-defined System Errors[1-27999] Windows Installer Errors MSI Process (msiexec.exe or instmsi.exe) Error Codes InstallShield Launcher (Setup_PSQLType_.exe) Error Codes Error Table Unofficial Error Troubleshooting Resources Microsoft Windows Installer Team Blog InstallShield Consumer Central AppDeploy.com Hi guyswhere is the link for the MSI Log File Utility mentioned in the article, troubleshooting?Amauri WiLogUtl.exe is a part of Windows Platform SDK and usually located in "%ProgramFiles%\Microsoft Platform SDK for Windows Server 2003 R2\Bin" Post a Comment
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816954.20/warc/CC-MAIN-20240415080257-20240415110257-00785.warc.gz
CC-MAIN-2024-18
2,364
5
http://identi.ca/notice/90591307
code
First time that !Unity File Lens works as expected. Its possible to search for e.g. .jpg or .pdf or even folders - wow !Ubuntu 12.04 rockz Identi.ca is a microblogging service brought to you by E14N. It runs the StatusNet microblogging software, version 1.1.0-release, available under the GNU Affero General Public License. All Identi.ca content and data are available under the Creative Commons Attribution 3.0 license. Switch to mobile site layout.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710963930/warc/CC-MAIN-20130516132923-00038-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
450
4
https://listman.redhat.com/archives/fedora-devel-list/2009-December/128112.html
code
MariaDB and Fedora fedora-list at gunduz.org Mon Dec 14 15:09:02 UTC 2009 On Mon, 2009-12-14 at 10:32 +0100, Steven Moix wrote: > I agree on that, and a "major" problem with PostgreSQL at the moment > is that it doesn't have a clustering engine. Except Hot Standby and Streaming Replication features that will likely appear in 8.5, PostgreSQL project won't have an "engine" which will provide clustering support -- and PostgreSQL will have one and only one There are some solutions around, though. > So MySQL is still the simplest choice out there for the end user Depends. *I* have tried it a few times, and I lost data. Devrim GÜNDÜZ, RHCE Command Prompt - http://www.CommandPrompt.com devrim~gunduz.org, devrim~PostgreSQL.org, devrim.gunduz~linux.org.tr http://www.gunduz.org Twitter: http://twitter.com/devrimgunduz More information about the fedora-devel-list
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.66/warc/CC-MAIN-20230203091020-20230203121020-00208.warc.gz
CC-MAIN-2023-06
866
17
https://www.securitycameraking.com/securityinfo/how-to-configure-the-air-router-hp/
code
Networking is essential in security systems from access control to security cameras. There are many types of systems out there designed for security. To operate normally most security systems don’t need the Internet, but to utilize all the bells and whistles in conjunction you will need to be connected to the web. There are many options for networking devices out on the market. Chances are you already have your own equipment. If you have internet service you have a router or modem. In most cases when you add a security system you want to have it setup on its own network. To create your own network that will require another router. We suggest the Air Router HP from SecurityCameraKing.com A new router introduced to your local network will need to be setup properly to allow for connectivity and be able to implement security or restrict access to the system and subnet. Our TP-Airrouter-HP is a great device to handle the job. It has a huge amount of integrated features for a small price. If you purchased a comparable router from AT&T you would be completely restricted and be missing standard routing features. When it comes to the networking there is much more than just getting “online”. This router comes with a default IP of 192.168.1.20. That IP may or may not work with your current network subnet. Most people or home users likely you will be OK for the initial part of accessing the router. Routers are designed to operate within different separate subnets of each other. This first issue you will run into is that this router is handing out the same subnet as the current router of 192.168.1.1-.254 with a default gateway of 192.168.1.1. This is not going to work as the routers will not know which route to use to transmit data packets to devices on the given network. Devices may stay connected but become sluggish or lose connectivity all together. There are a few ways to go about configuring the router for connectivity. To begin you need a computer connected directly to the AIR ROUTER-HP. Then you will open a browser and enter the routers default IP 192.168.1.20 into the browsers address bar and hit enter. You will arrive at the router’s login page. Ubnt/ubnt is the user name and password to login. Once you log into the router you will see 6 tabs at the top of the page for different groups of features. The features we initially need access to be located in the network tab. As we need this router to work with another router on the network there are a 3 ways to configure the router. The network role is what you are looking for and the network mode is what needs to be changed. The modes of the Router are: Router, SOHO Router, and Bridge. Putting the device in bridge mode is the easiest option to configure connectivity. Save and apply then connect to your other router and you will have network access. Bridge mode bridges the two routers together so they are in the same virtual network. In other words your main router is still handing out IP addresses to all devices connected to main router and secondary router. The next option that can save time is on the same page it is called Configuration MODE. Your options are simple and advanced. If you are going to bridge the router I would suggest leaving it in simple mode. Most of the options in advanced mode you probably won’t use. From here all you set is the secondary router’s IP address to be static or dynamic. For port forwarding it really does not matter as in bridge mode the forwarding is only done on main router. If you decide to go into advanced mode this can change, but not necessarily. The features you gain access to in advanced mode are: Interfaces (physical ports on router) IP aliases (associating multiple IP to one interface), Vlan (restrict access to devices), Firewall (stop traffic coming in), Static routes (manual routing), Traffic shaping (rate limiting). SOHO Router and Router mode are just about the same. SOHO means small office/ home office. The main difference is in the Network address translation feature. In Router mode all the NAT protocols are enabled. In SHO Router mode the features can be disabled or enabled as needed. In both SOHO router and router modes the Wide Area Network (WAN) and Local Area Network (LAN) have to be manually configured. In the WAN feature you can set the router to DHCP or static meaning you can assign a static IP or let the primary router assign it an IP. I can tell you for port forwarding to not stop working after power loss you will need to assign the router a static IP address. Since every time a router loses power when in DHCP mode it will get a new IP address between from primary router. This makes old port forwarding rules incorrect, so you will lose remote access. The LAN settings are very important. You cannot have the same subnets assigned to two routers connected to each other. In LAN you will want to assign an IP address in a different subnet from primary router such as 192.168.2.1. Then you need to enable DHCP server so the router can automatically assign devices a IP address in that subnet. Next you set the range. Typically the range would be 192.168.2.2 to 192.168.2.254. You can make any variation between the last octets 2-254. If you only want 5 devices connecting to that network you can program router to only be able to hand out 5 addresses, so the range would be 192.168.2.2 to 192.168.2.7. This will prevent people from randomly connecting devices to your network. You can still statically assign IP address to device you want to connect to this network. As you go through this router you can see there are a lot more customizable features to use. Always feel free to call in for further options for configuration.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818732.46/warc/CC-MAIN-20240423162023-20240423192023-00102.warc.gz
CC-MAIN-2024-18
5,722
7
https://dataviewer.com/tools/gaze-viewer/gaze-viewer-use-cases-and-solutions/
code
Gaze viewers, also known as eye tracking viewers, are software applications that allow users to analyze and visualize eye tracking data collected from an eye tracking device. Eye tracking is the process of measuring the point of gaze, or the position of the eye, and can be used for a variety of applications such as research, usability testing, and marketing. Some common use cases and functions of gaze viewers include: - Research: Eye tracking data can be used in research studies to better understand human behavior, attention, and decision making. Researchers use gaze viewers to visualize eye tracking data and analyze it for patterns or trends. - Usability testing: With eye tracking you can evaluate the usability of a product or website by analyzing where users are looking and how long they spend looking at certain areas. Gaze viewers allow usability testers to visualize eye tracking data and make informed decisions about design changes. - Marketing: Eye tracking is also applied in marketing research to understand how consumers interact with advertisements or product packaging. With the help of gaze viewers marketers can analyze eye tracking data and optimize their designs for maximum engagement. Here are some examples of gaze viewer software products: - EyeLink Data Viewer: This is a free software application provided by SR Research for analyzing eye tracking data collected using their EyeLink eye trackers. The software includes features for visualizing eye movement data, identifying fixations and saccades, and exporting data for further analysis: https://www.sr-research.com/data-viewer/ - GazeRecorder: This is a low-cost eye tracking software that allows users to record and analyze eye tracking data using a webcam or other compatible eye tracking device. The software includes features for visualizing gaze paths, analyzing gaze heatmaps, and exporting data to other applications: https://gazerecorder.com/ - Tobii Dynavox Gaze Viewer: This is a free software application provided by Tobii Dynavox for analyzing eye tracking data collected using their eye trackers. The software includes features for visualizing gaze data, analyzing fixations and saccades, and exporting data for further analysis: https://us.tobiidynavox.com/products/gaze-viewer Overall, gaze viewers are essential tools for analyzing eye tracking data and can be used in a variety of applications including research, usability testing, and marketing.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100290.24/warc/CC-MAIN-20231201151933-20231201181933-00059.warc.gz
CC-MAIN-2023-50
2,451
10
https://twhl.info/post/index?user=1983
code
Honestly, when you deconstruct both Half life and HL2 there wasn't anything amazingly unique about the games. They did the right things at the right point in time, but it's not as if those things were unique in and of themselves. The physics and graphics of HL2 were mindblowing at the time, but now physics is expected from games, and the graphics aren't exactly stellar by comparison to today's games. HL1 played out in a cutscene-less, continuously flowing world that hadn't really been attempted before, but again, is now the norm. What would people expect to see from a HL3? What's the big draw, the big thing that has people go "woah" when they see the game for the first time that the previous two had? That's not quite correct. Both HL1 and (to a lesser extent) HL2 defined the genre. Sure, they might not seem particularly special in hindsight, but these games did things that nothing else was doing at the time. HL1 created a template and a baseline for thousands of games to come, just like Doom and Quake did before it. Now as to what the big draw for HL3 is? Well it's a good question. My dumb theory that I don't really believe is that Valve has already determined what to do with the HL series: hand it over to the community. They have always been big supporters of mods and indie games and have hired from those groups very frequently. They're also encouraging community development with the Steam Workshop and by allowing games like Black Mesa to be sold. Valve thinks that the next big thing in gaming (and HL) is that amateur teams will form and create games that big studios aren't able (or willing) to create. They themselves started behaving like a big studio and became hostile towards their fans in order to push their point harder. Unfortunately their tactics weren't working as well as they'd hoped, so when Marc Laidlaw left Valve they asked him to publish the "Epistle 3" document in an attempt to rustle some jimmies and get people working on fanmade HL games. And look - it worked. There's now at least two teams involved in making a game telling the story and several others remaking HL levels in modern engines. If they do well, maybe those teams, and others, can continue HL's legacy with community-driven, fan-made games, just as Valve intended.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256797.20/warc/CC-MAIN-20190522103253-20190522125253-00467.warc.gz
CC-MAIN-2019-22
2,279
4
https://www.andplus.com/blog/java-9-modules
code
In the world of software development, enhancements in development tools and platforms tends to be incremental. Certainly, new tools, frameworks, and platforms that ease the job of software development or software project management come along with sometimes mind-spinning regularity, and we have discussed a good number of them in this space. But after that initial release, revolutionary enhancements of those tools in functionality, capability, and ease of use are pretty rare. Why is this? Opinions vary (of course), but it seems that the main thing preventing (or delaying) major enhancements to development tools is the fact that it’s really hard to do without either breaking applications that have already been built or making it more difficult to update them. So in those rare cases where a major enhancement to an established development tool or platform comes along, it’s big news (at least to developers). Such is the case with Java 9 modules. What Are Java 9 Modules? Java 9 modules, or more formally the Java 9 Platform Module System (JPMS), introduces a higher level of organization for Java code. In previous versions of Java, code was organized into units called packages. The Java Platform included hundreds of these packages, which led to a number of problems: - Security: The architecture of the package environment makes it easier for attackers to exploit security holes by exposing internal APIs—even if they aren’t explicitly used in a given application. - Scalability: With packages only, applications can become bloated with the large size of the Java runtime. This causes a problem for the increasing number of IoT devices that are resource-constrained. - Performance: The package-only architecture makes it difficult to optimize applications for speed, memory use, and other performance factors. JPMS does not do away with packages; rather, the Java ecosystem is organized into buckets of packages called modules. More than just an organizational tool, however, modules enable developers to exercise greater control over their applications than was afforded by packages alone. Advantages of Java 9 Modules Some of the things developers will enjoy about using Java 9 modules include the following: - Subsetting the Java Development Kit: Modules enable developers to create a subset of the Java Development Kit (JDK) that includes only the modules that are needed for a particular application. Goodbye, bloat. - Controlling relationships between modules: Modules must explicitly define dependency relationships with packages in other modules. Any relationships that are not explicitly defined are considered to be nonexistent. During compilation, the Java system recognizes these relationships and includes only those packages that are needed in the application. This enhances security, reduces bloat, and enhances performance. The result for developers—and their customers—is leaner, more secure applications that can run efficiently on a much wider variety of hardware platforms and devices. How We (Finally) Got Here The advent of JPMS—described in Java Magazine as “the most important new software engineering technology in Java since its inception”—didn’t happen overnight, and was not without controversy. Originally proposed in 2011 for Java 7, the project was deferred several times while designers grappled with technical and philosophical issues. Figuring out how to organize hundreds of packages into the 95 modules of the initial release, in a way that makes sense for the vast majority of developers, was no easy task. Several years of hard work finally paid off with the release of JPMS in late 2017. If there is a downside, it’s that existing applications may require some extensive architecture updates to take advantage of Java 9 modules. At some point, Oracle will sunset the earlier Java versions with which those applications were developed, ending official support, and developers and their customers will need to make some choices about what to do with those legacy applications. AndPlus and Java 9 Modules Regular readers of this blog will not be surprised to learn that AndPlus is on top of this major enhancement to the Java development environment, and we are excited about the enhanced security and performance inherent in new Java applications. If you have an idea or a need for a new application, or have an old application that’s in desperate need of an update, contact us today. If Java is the right platform for your application, we will make sure it takes full advantage of the enhancements brought about by Java 9 modules.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817033.56/warc/CC-MAIN-20240415205332-20240415235332-00063.warc.gz
CC-MAIN-2024-18
4,606
19
http://www.getbusinessemail.com/office-365-groups-vs-office-365-teams/
code
Teams V/S Groups Office 365 Teams and Groups are opposing solutions, the reality is that they are actually complimentary. When Microsoft Teams was launched into Public Preview in November 2016 there was a lot of confusion as this Slack competitor seemed to come out of nowhere. One thing was clear though – Teams sits inside the Office 365 Groups substrate. Today, instead of pitting Office 365 Groups vs Teams, I’m going to do my best to help you untwist the product names and understand how the technology actually coexists in your tenant. Staying in Control It is important when considering the deployment of Office 365 Groups vs Teams that we give it some thought before “going viral.” While these technologies make it easy for end users to simply press a button and get going, we need to keep this behaviour in check without stifling it. Main Keys are: - User education - Data management (duplication and versioning) Instead of pitting Office 365 Groups vs Teams, the two together provide a very powerful disruptor in the way we work on a daily basis. However, we need think them through to ensure that the disruption leads to a positive outcome. Also, it improves user experience, not confusion and frustration. The reality is that many people find Office 365 Groups confusing, especially when it relates to Microsoft Teams. I still find this in conversations I see online, with IT pros, and when speaking with clients who are somewhat new to Office 365. For users and organisations who weren’t thinking of SharePoint but want to use Microsoft Teams; well, now they have to. Weren’t thinking of OneNote? Well, you’ve got it now! And so on, across the features of Office 365 Groups. Organisations often want “best practices” when looking to implement new technologies. The reality is that Microsoft Teams is barely 18 months old and adding new features rapidly. The same can be said for some of the supporting components (though not so much the speed side of things). Best practices are fluid; they evolve, change and, most importantly, are subjective. When organisations look to implement Microsoft Teams, they are in fact implementing Office 365 Groups and need to cater for all that it brings and is connected to. As such, they need to plan for provisioning, lifecycle, directory & discovery, training on related applications, and so on. Office 365 Groups and Microsoft Teams are not a “vs.” and they are not a “plus;” they are together.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606696.26/warc/CC-MAIN-20200122042145-20200122071145-00496.warc.gz
CC-MAIN-2020-05
2,471
15
https://homeworkmerchants.com/2023/01/25/solutionreflect-on-your-most-recent-visualisation-project-and-try-to-sketch-or-write-out-the-approach-you-took-what-stages-of-activity-did-you-undertake-and-in-what-sequence/Questionanswered
code
How satisfied are you with the results and what would you do differently if working on it again? My most recent visualization project was a data analysis of an online survey that I conducted. The survey collected opinions from people in my local community on their views on police violence. In order to create this visualisation, I followed a series of steps: Reflect on your most recent visualisation project and try to sketch or write out the approach you took. What stages of activity did you undertake and in what sequence? 1. Data Collection: First, I created the survey using a survey tool and distributed it across different social media platforms to reach out to participants in my local area. After collecting all responses, I then spent some time cleaning up the data by eliminating any irrelevant questions or answers so that only relevant pieces of information remained for further analysis and visualization. 2. Data Analysis: Once I had cleaned up the dataset, I used statistical techniques such as correlation matrices and simple linear regression models to get insights into how people’s opinions were related to one another. This helped me identify patterns in how participants answered the survey questions which can be seen in subsequent stages of activity. 3. Data Visualization: After analysing the data, I used software like Tableau and Microsoft Power BI to visualize my findings in clear graphs and charts which could be shared easily with other stakeholders or viewers who wanted to understand more about my research process without having to dive into complex datasets themselves. This also allowed me to tell stories through visuals – highlighting trends or correlations between different variables – which would otherwise remain undetected if viewed separately from one another.. 4. Interpretation & Reflection: After creating these visuals, I took time to reflect on them critically – examining why certain patterns may exist and whether there are underlying causes behind them that need further investigation or explanation – before coming up with conclusions as well as potential areas for improvement when working on similar projects next time round. Overall, although I am largely satisfied with this project’s final outcome after completing each step successfully (from data collection through interpretation & reflection), there is still more room for improvement when conducting similar projects going forward – particularly around ensuring accuracy at every stage of activity by double-checking all calculations made during both the analysis and visualisation phases; as well as finding ways of improving user experience when viewing visuals by making sure they are designed clearly enough so even non-data users can make sense of them easily!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643663.27/warc/CC-MAIN-20230528083025-20230528113025-00266.warc.gz
CC-MAIN-2023-23
2,794
8
https://i10git.cs.fau.de/hyteg/hyteg/-/issues/122
code
Add form instances to primitives via data handling Currently the forms are members of the respective operators they are used in. For some/many cases, however, a probably cleaner solution would be to allocate them at the individual primitives and pull them in the operators via stored data IDs. Some examples where this would be beneficial/required: blending: Currently the blending function of the form instance is adapted by the operator on-the-fly. This means that we require action from the operator although only the form is using the blending function, which could be added to the form during construction, per-primitive. This could also be a potential optimization as we could decide that the identity map does not need to be called if blending is not active. free-slip: Similarly, we will require the normals for each primitive in the stiffness matrix assembly routines for a free-slip implementation. These will likely be constant on each primitive (also in the blending case, where we have a single geometry map per primitive -> single "normal function"). Thus could be added to the forms. Therefore, if not instantiated on each primitive, we would need to modify the operators again. information about the primitive: In the free-slip case for example, this design could be used to decide in the assembly routines if the element is located on a boundary primitive (also useful in free-slip implementations for example). This would mean that we need some data handling class implementations for the forms.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991269.57/warc/CC-MAIN-20210516105746-20210516135746-00482.warc.gz
CC-MAIN-2021-21
1,513
8
https://www.orchestratetech.com/2013/11/15/microsoft-google-docs-is-not-worth-the-gamble-makes-you-less-productive/
code
After Bing and its Scroogled campaign, Microsoft is now taking aim at Google Docs. Jake Zborowski, Microsoft’s senior product manager for Office, actually published two anti-Docsblog posts today: one homes in on document fidelity, and the other, which includes a number of user testimonials, argues that Google Docs isn’t quite ready for primetime. If it took me a little while to get Michael Atalla, the director of product marketing for Office 365, to actually say “Google” in my chat with him about Microsoft’s productivity tools earlier this week, Zborowski doesn’t beat around the bush for even a second. “Converting Office files into Google Apps is a gamble,” he writes. “Why take the gamble on converting your Office files to Google Docs when you can use Microsoft Office and the Microsoft Office Web Apps to create, share and edit your Office files with your content intact?” That, Microsoft says, is true on the web, but also on the tablet, where Google’s Quickoffice usually does a pretty good job at converting documents (though not in Microsoft’s example, of course). So what about the new Chrome document viewer? Also too much of a gamble for Zborowski: “The last gamble with Google is how the company helps you view Microsoft Office documents using their file viewers. Even this is a gamble that may be too risky to take.” There is, of course, also a video that accompanies the post, which reminds folks that they could lose their promotion if they decide to switch to Docs: In his second post (“Office is a team player”), Zborowski also argues that Google Docs is missing too many features, though in this case, a number of Microsoft customers make the argument for him. Here is an example: As we continue to improve Office, we look for changes big and small that help people do more with less effort. Some improvements are small, like the new paste options we introduced in Office 2010. Other features reduce the amount of time it takes to accomplish a task like Flash Fill and Quick Analysis in Excel. The breadth of capabilities Office can lead to significant gains in what people can accomplish. With Google Docs, on the other hand, people have to find ways to overcome feature gaps by working harder, spending their time finding workarounds, or potentially using third-party tools to overcome the gaps. – Andy Springer, Director, Rookie Recruits To back all of this up, Microsoft also launched whymicrosoft.com, which includes more testimonials, screenshots and other resources for those who haven’t been scared straight yet and are still considering the switch to Google Docs. And here is the video that goes with that post: All of this anti-Google Docs/Drive rhetoric just before Google I/O probably isn’t accidental. With Quickoffice, Google now has the basis to offer a pretty compelling alternative to the Microsoft Web Apps (which, and Microsoft has a point there, are generally more fully-featured than Google’s tools) and I would expect the company to launch more Quickoffice-based products next Wednesday.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474440.42/warc/CC-MAIN-20240223153350-20240223183350-00506.warc.gz
CC-MAIN-2024-10
3,074
11
https://www.painresearchcentre.org/moayedi-lab
code
Massih Moayedi, B.Sc., Ph.D. Assistant Professor, Faculty of Dentistry, University of Toronto Dr. Massieh Moayedi’s research focus in on understanding how pain is processed in healthy individuals and how this is altered by chronic pain. Specifically, he uses non-invasive brain imaging techniques, neurostimulatory techniques, computational methods and novel behavioural paradigms to investigate the structure and function, including indices of network connectivity, of the brain of healthy subjects and patients with chronic pain. Lizbeth Ayoub completed a Bachelor of Science in Biology (Honours) at the University of Ottawa. She is currently pursuing a PhD at the Faculty of Dentistry under the co-supervision of Dr. Massieh Moayedi and Dr. Mary Pat McAndrews. Her thesis focuses on the role of the medial temporal lobe in pain processing. Her research investigates the structure and function of the medial temporal lobe in healthy individuals and patients with mesial temporal lobe epilepsy, by using neuropsychological and sensory tests, and neuroimaging tools (fMRI and sMRI). She is a Junior Fellow at Massey College Georgia Hadjis completed her Bachelor of Science in Neuroscience and Physiology at the University of Toronto. She is currently pursuing a Master’s at the Faculty of Dentistry with a Collaboration in Neuroscience under the supervision of Dr. Massieh Moayedi. Her thesis focuses on a novel model to explain the interference of pain on cognition using neuroimaging (fMRI), quantitative sensory testing, and cognitive tasks. Georgia is a recipient of the 2019-2020 Canada Graduate Master’s Scholarship in Health Sciences (CIHR) and is a Resident Junior Fellow at Massey College. My name is Gianluca Guglietti and I'm a neuroscience undergraduate student at the University of Toronto. I am completing my fourth year thesis project in the Moayedi lab where I am conducting a biomarker study into pediatric musculoskeletal pain. when I'm not in the lab or hauled up in the library studying for my midterms I can be found crate digging for records or addictively playing pokemon go. DDS Candidate 2020 Wai-Jane Virginia Lee I am currently a 3rd year dental student at Western University. I have always been excited about research, participating in various summer research programs and completing my MSc in neuroscience in 2017 (see here). Even now, I still seek to contribute to research whenever I can - and that is how I ended up spending the last two summers at the Moayedi Lab, studying chronic pain and pain perception. I recently obtained my bachelor’s degree in Cell and Molecular Biology from the University of Toronto (Class of 2019). I first developed a passion for pain research at Dr. Moayedi’s lab at the University of Toronto Faculty of Dentistry where I investigated a value-based model of pain-cognition. Currently, I am a first-year thesis master’s student in Dr. Marc O. Martel’s lab, at McGill University Faculty of Dentistry, where I study predictors of pain and problematic opioid use after oral and maxillofacial surgery. I aspire to become a dentist one day, but for now I’m very happy to have joined McGill’s world-renowned pain unit. You can find me on Google Scholar under my name. Former Research Assistant Nancy completed a Bachelor of Science in Neuroscience, Physiology and Spanish at the University of Toronto in 2020. She was an undergraduate thesis student, then research assistant under the supervision of Dr. Massieh Moayedi working on a fMRI paediatric study. Currently, she is a first year Master’s student at McGill University in the Integrated Program in Neuroscience where she will be studying motor connectivity and clinical outcome measures in children with spinal muscular atrophy.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107893845.76/warc/CC-MAIN-20201027082056-20201027112056-00170.warc.gz
CC-MAIN-2020-45
3,760
12
https://docs.pivotal.io/partners/a9s-elasticsearch/index.html
code
a9s Elasticsearch for PCF (Beta) IMPORTANT: The a9s Elasticsearch for PCF tile is currently in beta and is intended for evaluation and test purposes only. Do not use this product in a PCF production environment. This documentation describes the a9s Elasticsearch for Pivotal Cloud Foundry (PCF) tile. a9s Elasticsearch for PCF enables on-demand provisioning of VM-based, dedicated Elasticsearch servers and clusters. Developers can create instances of an Elasticsearch server or a cluster using Apps Manager or the Cloud Foundry Command Line Interface (cf CLI) tool and bind these instances to an app. Depending on the chosen service plan, a service instance may be associated with a single, dedicated VM or a set of VMs consisting of multiple VMs comprising a cluster of Elasticsearch servers. a9s Elasticsearch for PCF includes the following key features: |On‐Demand Service Instance Provisioning|| |Service Instance Isolation|| The following features have already been developed and tested on paas.anynines.com. These features will be included in upcoming a9s Elasticsearch for PCF tile releases. |On‐Demand Encrypted Remote Connectivity||You can establish a private encrypted tunnel to your service instance on‐demand. Developers can use this connection to perform manual backups. As soon as the public connection is obsolete, you can terminate the tunnel to prevent further access. An additional component, the Service Jumper Module, provides this functionality.| |Service Instance Capacity Upgrade||You can upgrade of the RAM, CPU, and storage capacity for your Elasticsearch instances.| |Logging and Monitoring||Each Elasticsearch service instance delivers log messages and Elasticsearch-specific metrics to one or more syslog/graphite endpoints. Developers can configure the syslog/graphite endpoint to receive this data.| The following table provides version and version-support information about a9s Elasticsearch for PCF: |Release date||April 20, 2017| |Compatible Ops Manager version(s)||v1.7.x, v1.8.x, v1.9.x| |Compatible Elastic Runtime version(s)||v1.7.x, v1.8.x, v1.9.x| To install and use a9s Elasticsearch for PCF, you must install the following products and tiles: - Elastic Runtime v1.7 or v1.8 - a9s Consul DNS for PCF, v1.0.0 or later - a9s BOSH for PCF, v1.0.0 or later For more information, see Installing and Configuring a9s Elasticsearch for PCF. a9s Elasticsearch for PCF is an automation toolset for Open Source Elasticsearch. The entire anynines team can help your team get started and be successful. Technical support, including a service level agreement, is available with a commercial license. If your company has specific Elasticsearch administration policies or configuration best practices, the anynines team is happy to incorporate them, if applicable. Third-party Elasticsearch support organizations are also welcome to assist. Contributions are welcome and will be investigated by the anynines team. Send any bugs, feature requests, or questions to email@example.com. Contact the anynines sales team to learn more about commercial licenses and support.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121000.17/warc/CC-MAIN-20170423031201-00385-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
3,097
24
http://windowsvj.com/wpblog/2010/04/visual-studio-2010-rtm-trial-available-for-download/
code
Microsoft has released the Visual Studio 2010 final built around the globe at Tech Ed Days. Tech Ed India too launched VS2010. You can have a test Drive by downloading its Full Trial. Microsoft Visual Studio 2010 is an integrated environment that simplifies the basic tasks of creating, debugging and deploying applications. Unleash your creativity with powerful design surfaces and the ability to bring your designers and developer together to bring your vision to life. Work within a personalized environment, targeting a growing number of platforms, including Silverlight, SharePoint and Cloud applications and accelerate the coding process by using your existing skills. Integrated support for Test First Development and new debugging tools let you find and fix bugs quickly and easily to ensure high quality solutions. Professional. Premium. Ultimate. Test Professional. Each edition of Microsoft Visual Studio 2010 was built with the specific needs of individual developers and development teams in mind. Learn which edition is right for you. The Full Trial Download is available in 5 Different Edition Visual Studio 2010 Professional Trial : The essential tool for individuals performing basic development tasks. It simplifies the creation, debugging, and deployment of applications on a variety of platforms including SharePoint and the Cloud. Visual Studio 2010 Professional comes with integrated support for test-driven development, as well as debugging tools that help ensure high-quality solutions. Download : Visual Studio 2010 Professional Trial Visual Studio 2010 Premium Trial : complete toolset that simplifies application development for individuals or teams, allowing the delivery of scalable, high-quality applications. Whether writing code, building databases, testing, or debugging, you can increase your productivity using powerful tools that work the way you work. Download : Visual Studio 2010 Premium Trial Visual Studio 2010 Ultimate Trial comprehensive suite of application lifecycle management tools for teams to ensure quality results, from design to deployment. Whether you’re creating new solutions or enhancing existing applications, Visual Studio 2010 Ultimate lets you bring your vision to life targeting an increasing number of platforms and technologies—including cloud and parallel computing. Download : Visual Studio 2010 Ultimate Trial Visual Studio 2010 Test Professional Trial A specialized toolset for quality assurance teams that simplifies test planning and manual test execution. Test Professional works in conjunction with Visual Studio software for developers, enabling effective collaboration between developers and testers throughout the application development lifecycle. Download : Visual Studio 2010 Test Professional Trial Visual Studio Team Foundation Server 2010 Trial The collaboration platform at the core of Microsoft’s application lifecycle management solution that helps enable teams to reduce risk, streamline interactions and eliminate waste throughout the software delivery process. Visual Studio 2010 Express A set of free tools which offers you an exciting experience with the new integrated development environment, a new editor built in Windows Presentation Foundation (WPF) and support for the new .NET Framework 4 Download : Visual Studio 2010 Express All Visual Studio 2010 TRIAL editions free for 90 days. After 30 days, You may extends the trial an additional 60 days by registering the product to obtain a free key.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816024.45/warc/CC-MAIN-20240412132154-20240412162154-00295.warc.gz
CC-MAIN-2024-18
3,495
19
https://forums.opensuse.org/t/firefox-and-plugins/41456
code
Has anyone else noticed that sometimes in firefox the plugins won’t work? For example, I would go to a site that needs flash, but nothing happens and I know it works because I was there before. This will happen for the java and pdf plugins as well. Well, I think I’ve narrowed the problem down to having multiple firefox windows open at the same time. So that when I close both windows and start a fresh firefox session it works. Is this a known issue?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510412.43/warc/CC-MAIN-20230928130936-20230928160936-00717.warc.gz
CC-MAIN-2023-40
456
8
https://flatlogic.com/forum/threads/link-form-to-sing-app-react
code
I have access to both Front End and Back End code. But the form demonstration that was given while purchasing User Management Backend, isn't the same. I am not able to link the User Management Page in Sing App React with Backend Database. Can you please help me with it? If possible, can you please provide a tutorial for setting up the form utility?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00878.warc.gz
CC-MAIN-2023-50
350
2
http://edge.rit.edu/edge/P20071/public/Systems%20Design
code
Content linked here can be found in the Systems Level Design Documents directory. Team Vision for System-Level Design PhaseWe planned to create a high-level overview of the systems involved in our product. This process included benchmarking, brainstorming, and concept development. We used customer and engineering requirements to shape our thought process and came up with multiple ideas for how to accomplish RIT Baseball's vision for this project. We identified three distinct concept pathways through our morphological table. All three of these ideas have the capability of accomplishing our project's goals. One of these concepts seems the most logical, and we plan on continuing in that direction with the approval of our client. PurposeDefine the total list of functions and subfunctions, based on the Customer and Engineering Requirements, that must be delivered by the final design. This will establish the need for specific concepts necessary to deliver the overall objectives of the project. PurposeWe researched plenty of existing products and technology in the baseball training field to give us a better idea of what is possible and how it is currently used. Our product will ideally be a combination of many of these products to create a more comprehensive training system. - HitTrax https://www.hittrax.com/ - Rapsodo https://rapsodo.com/baseball - Blast Motion https://blastmotion.com/products/baseball - 4D Motion https://4dmotionsports.myshopify.com/pages/baseball - Kinatrax https://www.kinatrax.com/ - Trackman https://baseball.trackman.com/ - K Motion https://www.k-motion.com/k-coach/k-baseball/ We would like to combine the hitting output data that HitTrax, Rapsodo, Blast Motion, Kinatrax, and Trackman provide with the biomechanical and kinematic data that 4D Motion and K Motion output into our singular system. PurposeWe brainstormed to generate different concepts than the ones we came into the project with for our system. This process was meant to help both solidify and question our existing ideas by exploring new ideas. First, we used our functional decomposition to identify all of the functions that relate to the different concepts of our project. We derived and compared the functions we want to see in our system from all of the benchmark products we researched to create a more comprehensive system than those that currently exist. Functions and Concepts: Feasibility: Prototyping, Analysis, Simulation - Confirm that the selected concepts can deliver functionality defined by the System Architecture. - Define the optimal values of the most sensitive design parameters. Morphological Chart and Concept Selection - Develop multiple concept options to deliver the required list of functions. - Ensure that concepts are available/possible to deliver every required function. - Select the optimal set of concepts that can be integrated to meet the project objectives. We developed three unique concepts from our morphological table based on what we thought was possible and would make the most sense to implement for our client. - Concept 1: High Frame Rate Camera Concept - Concept 2: Physical Sensors Concept - Concept 3: Radar/Lidar and High Frame Rate Camera Hybrid Concept Best Case ConceptUse of high frame rate camera(s) to gather slow motion videos, which can be processed and analyzed by custom written scripts. Concept SelectionThis document defines our selection criteria for each of our concepts. - Ensure flow of energy, info, material and structural forces as intended. - Define subsystem functions, envelopes and interfaces. Updated CR, ER, House of Quality, and Risk AssessmentUpdated Customer Requirements Updated Engineering Requirements Updated House of Quality Updated Risk Assessment Test PlanTalk to Brian Sheridan and get some hands on time with the Sony RX100 VI - How the camera works - What we can do with the video files - How to extract video files from camera for analysis - How quickly we can transfer video files from camera to processor - Et cetera Design Review MaterialsSystems Design Review Presentation Plans for next phase - Create detailed systems designs - Work with camera to find out how to interface our programs with the video output of the camera - Create an output that does something similar to this video, along with metrics
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107898499.49/warc/CC-MAIN-20201028103215-20201028133215-00648.warc.gz
CC-MAIN-2020-45
4,308
46
https://support.researchallofus.org/hc/en-us/articles/4412867321364-Why-can-t-I-view-the-Healthcare-Access-Utilization-notebook-
code
In order to access the Tutorial Workspaces notebook, How to Work with All of Us Survey Data (tier 5) - Healthcare Access & Utilization, you will need to duplicate the notebook by following the steps below: Open the notebook and click the (menu) drop down on the right hand side of the page. Click the ‘Duplicate’ option from the menu. Scroll to the bottom of the Workspace Description page and select, ‘No, I have no concerns at this time about potential stigmatization based on my study.’ for question number 6. Then click ‘Duplicate Workspace’. Click the ‘Analysis’ tab to view the duplicated notebooks and select ‘5 - Healthcare Access & Utilization’. Select Playground Mode and click ‘Continue’. Click ‘Create Environment’ and the workbench will create a new Cloud analysis environment and spin-up the notebook. Once the environment is created you will be able to access and run the notebook.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00177.warc.gz
CC-MAIN-2023-50
924
8
https://community.topazlabs.com/t/topaz-photo-ai-v0-4/33217
code
This week’s early access update features some updated auto pilot logic as well as various fixes across the app. We’re currently working on refining the auto pilot logic and design even more, so expect some more changes next week as well! If you own DeNoise, Sharpen, and Gigapixel with up-to-date licenses then you have access to Photo AI. You will need to claim a Photo AI license by going to your account before you’ll be able to login. This is an early access release, so there will be some issues you may run across. Issue reports and general feedback are much appreciated. If there’s a specific image you’d like us to see, you can send it to us at this dropbox link. Below the changelog are a list of issues we’re already aware of. Changes since 0.3.0: - Tweaked autopilot logic - Show original file size in resize panel and export list - Added TensortRT model for RAW DeNoise - Added total face count to the autopilot list - Added download speeds in installer for Windows and Mac - Last view mode should now be saved between runs - Only show autopilot image requests when autopilot has been changed on an image - Fix white output and some line artifact issues on Windows - Fix autopilot not detecting faces - Fix autopilot saying all images are not noisy - Fix some images appearing rotated 90deg in thumbnails - Fix not opening images by dragging if they’d been previously opened and closed in that instance - Fix autopilot not always re-calculating when switching images - Fix RAW images failing to save in external editor mode (will now save as TIFFs) - Fix scale being reset to 1 when switching images - Fix switching images sometimes not changing the blue highlight in the file list - Fix scale being off until the first preview is processed after switching images - Fix certain RAW images opening with wrong orientation - Use these Settings for All not applying to all images sometimes (tends to happen more when using this option on an image that isn’t the first) - Exporting a lot of files may not go through the entire list (stops early, stuck saving, etc) - Batch film strip may behave oddly in some cases (resetting scroll, not highlighting selected image, etc) - Some RAW images with specific orientations may not have the correct orientation on open – Specifically, images with orientations that are just vertical/horizontal mirrors may remain mirrored on open. 90/270 degree turns should open fine. - Auto pilot may not detect every face in an image
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570730.59/warc/CC-MAIN-20220807211157-20220808001157-00541.warc.gz
CC-MAIN-2022-33
2,487
28
http://blog.vanmeeuwen-online.nl/2008/10/bginfo-usefull-to-show-system.html
code
Lucky me, I found one: BgInfo. Using this utility, it will generate a desktop image with that information you want to see. I my situation, I will put a shortcut in the startup to run this tool once, so I will see the system information on the desktop after I login. And it doesn't affect the system performance, because it run once, it generates a desktop image and that's it Shortcut at startup: C:\SysInternals\BGInfo\Bginfo.exe General.bgi /TIMER:0 The General.bgi file is a configuration file you can download here. You can edit this file to your specific needs. Check the site where you can download this little utility for more information.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296820065.92/warc/CC-MAIN-20240425000826-20240425030826-00265.warc.gz
CC-MAIN-2024-18
646
6
https://forums.datafeedr.com/showpost.php@p=32785&postcount=11.html
code
Originally Posted by ayorofrance Any chance of adding something similar to the category pages? In my shops the product detail are typically long tail keywords, but the category pages are my main keywords that I want to rank for... E.g. for adidas shoes it's great to rank for a specific shoe, but the goal is to rank the category page for the term 'adidas shoes'... Therefore it's important to be able to add social buttons to the category pages too... this seems to work with category pages: (although, my extensive testing amounts to 1 try
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053657.29/warc/CC-MAIN-20210916145123-20210916175123-00706.warc.gz
CC-MAIN-2021-39
541
7
https://peterhorneland.com/Mammalian-Dive-Reflex
code
Mammalian Dive Reflex Akademirommet, Oslo, November 2017 with contributions from explosm.net, sigilscribe.me, www.elsewhere.org, and inspirobot.me “Grasping for safe metanarratives in an era of ontological collapse is a fool’s errand. If you’re thirsty you’re just going to have to get used to drinking from Azathoth’s firehose.” ― Gordon White, Whisky Rant: Disc 2 (Special Features), runesoup.com Four websites, one projected on each wall. Each site contains a different “automatic content generator”, a mechanism that produces a new image or text every time the page is refreshed. All four are updated simultaneously, and left for only a moment before they’re replaced by the next iteration. The expression FOMO (short for ‘Fear Of Missing Out’) was coined in 2004. As a disease it preys on our modern attention-based economy. It’s impossible to experience everything, particularly when this “everything” spawns from a near infinite amount of available permutations. No longer needed in the process are such speed-limiting intermediaries as human intervention. This isn’t necessary: “But even if such a prediction were true, our inability to distinguish between a virtual reality simulation and the real world will have less to do with the increasing fidelity of simulation than the decreasing perceptual abilities of us humans.” ― Douglas Rushkoff, Program or Be Programmed: Ten Commands for a Digital Age
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867416.82/warc/CC-MAIN-20180526092847-20180526112847-00132.warc.gz
CC-MAIN-2018-22
1,447
10
https://troubleinthepeace.com/what-are-scripts-web-answer/
code
You are interested in questions do not know What are scripts? Then let’s solve that question right below. You are viewing: What are Scripts What are scripts? Script or scripting language is a computer language with a series of commands in a file capable of being executed without compilation. Advantages of Scripts: Open source , allowing users to view and edit scripts as needed . No files to be compiled , but can be as needed . Easy to learn and write . Easy to switch between different operating systems . Development much faster than a reality show – some individuals and companies write scripts as prototypes for reality shows. Cons of Scripts: Open source, allowing others to view the source code may be prohibited by some companies. Require users to install an interpreter or separate program before scripts can run. In some situations, they can may be slower than a compiled program. Difference between Script and programming language Basically, all Scripts are programming languages. The theoretical difference between the two is that programming languages are complex and confusing, hard to learn. They are compiled and created an executable. Meanwhile, because Script is closer to natural language, it is easier to learn, write and master than programming languages. Scripts are interpreted and do not need to create an executable. See also: What is Iconic – Meaning of the word Iconic The code of the programming language is compiled and binary and converted to machine code in one go. With Script, high-level commands are instantly converted into machine language. Due to the shorter syntax and statements of Scripts, using Scripts will take less time than programming languages because it requires a lot of code to be written. Programming languages are designed in such a way that the programmer can take full advantage of the features of the language. Whereas Script is designed to make programming faster and simpler. Scripts only need less lines of code and still create functionality while with programming languages. You will need more lines of code for each similar function. Whereas, programming languages are often used to build a product from scratch. Scripts can be used to combine with existing components or modules. Although the maintenance cost of a programming language is quite significant, Scripts need a server to host while programming languages do not. See more: What is a Webinar – The Most Professional Webinar Solution So, at the end of this article we know what Script is? What is the difference between a Script and a programming language? Hope this article will be useful to you.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662552994.41/warc/CC-MAIN-20220523011006-20220523041006-00772.warc.gz
CC-MAIN-2022-21
2,628
17
https://meta.stackexchange.com/questions/154777/reputation-ranking-system?noredirect=1
code
How can I view the “hall of fame” page? Would it be good to have a ranking system for say the top 1000/5000 users on SO? First off I understand that something like this opens the floor up to a whole host of people sad enough to just try and get on the board. But I feel that it would actually be helpful, because I often find myself looking at popular and high rep users because I know I can learn a lot from their content. I also understand the philosophy of judging the answer not the answerer but, could it hurt? What do you think?
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665976.26/warc/CC-MAIN-20191113012959-20191113040959-00322.warc.gz
CC-MAIN-2019-47
538
6
https://dementio13.wordpress.com/category/mac-music/
code
As you possibly know, I’ve been considering playing some of my stuff live in order to give me (and hopefully, listeners) a new perspective on my music and to promote my tunes a bit more. I also said that I was going to document the process, as I learn and/or make mistakes….so here it is (be warned: this post contains some really mundane info about my…ahem…’equipment’). I’m not sure I’m any closer to actually taking my stuff out to venues yet, but I have, at least, found a way to play my music as a performance. I’ve recently spent a few days trying to work out some practicalities: how to recreate sequenced parts (about 80% of the music) for instance; without just sitting there and pressing ‘play’. Ableton Live is now my chosen method of recording and, as its name suggests, it is equally adept at facilitating some forms of live performance. That was its whole selling-point back in the day. Another issue was how to route the computer and the live instrumentation (such as Monotrons, my synth and bass guitar) in order to use the multiple effects my tracks rely on whilst being able to retain ‘hands-on’ control for live tweaking. Then there was the issue of streaming the audio to Mixlr.com. Well I seem to have worked it out. The more technical adept amongst you would probably have a solution to all of this instantly. It took me a bit longer. Two days of re-arranging, trying-out and occasional frustration. But the set-up is now complete, I think. Well, except for a decent clip controller such as the Launchpad (I bought an app for the iPad which purportedly does the same, but its reliability is really erratic….not exactly what you want for a live situation). Anyway, I can’t afford to spend anything at the moment, so the Launchpad will have to wait. So, this is the primitive and Heath-Robinson-style set-up: - iMac running Live (if I ever need to do a gig, I’ll use the MacBook instead, but for streaming from home, I need the laptop to connect to Mixlr at the moment). With clips triggered manually on the fly. - Keyboard controller connected to iMac. - Monotrons chained together. - Alesis Fusion as a stand-alone synth/sampler and for some sequencing duties. - Bass guitars fed through the mixer. - Multi-fx connected to the mixer’s sends. - iPad for Korg MS20 sounds. All of this is fed through my tiny Behringer mixer and then routed into the Macbook via a Tascam i/o interface. The only issue I’ve encountered is a bit of interference from the Mac (or it could be my wireless router) when using the multi-fx. So, this gives me the means to use Live and to tweak effects settings/clips and the mix using the mouse (at the moment, though I’ll use the controllers when I get the Launchpad or similar). There’s probably easier, more straight-forward ways of doing this, but it works for me. This is what it all looks like at present: The mixer is full to capacity! But this layout does make it easy to twiddle, tweak and play everything from the same spot (while maintaining a degree of tidiness!). As for Mixlr….I recommend it. At first it seemed a little bit awkward to stream using their dedicated free software (you have to download this if you wish to broadcast. It didn’t display correctly and I couldn’t make head nor tail of it. Then I realised I had some system fonts missing on my computer. Once I’d installed these, the text appeared correctly and it was easy. Not exactly rocket-science….or even GCSE Science…..but it challenged me! The site itself looks very slick and I get the impression there’s quite a bit of beta testing going on, but it works ok. It’d be nice to have more of my networking friends on there, but I hope that’ll come in time. So, the plan is to present a series of hour-long ‘gigs’ on Mixlr with a different tracklist from my albums for each gig, also some cover versions of my favourite music and anything else I fancy doing…..synthy improv (‘Symprov?’), noise, radiophonic-style stuff, that kind of thing. I am sincerely hoping people tune-in to listen, or I’m gonna feel like a complete dick. I did a little test (three tracks) which you can listen to HERE. A few mistakes, a bit of sound-balancing needed; but I’m quite happy with the sound quality in general.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589618.52/warc/CC-MAIN-20180717070721-20180717090721-00223.warc.gz
CC-MAIN-2018-30
4,293
18
https://www.easycalculation.com/matrix/lu-decomposition-matrix.php
code
LU Decomposition is also known as LU factorization. Here, 'LU' stands for 'lower upper'. Triangular matrix is a special kind of square matrix. A square matrix is called lower triangular, only when all the entries above the main diagonal are zero. Likewise, square matrix is called upper triangular, only when all the entries below the main diagonal are zero. Use this online matrix solver which helps you to calculate lower triangular matrix (L) and an upper triangular matrix (U) using LU Decomposition method.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647244.44/warc/CC-MAIN-20180319234034-20180320014034-00129.warc.gz
CC-MAIN-2018-13
511
1
http://stellarexpanse.net/page.php?id=1
code
Welcome to the Stellar Expanse Website, For this website I've decided to use a Content Management System for now, The reason being is that I want to focus on building the game rather than the website. I'll keep you updated weekly on news items such as builds, updates, etc.. If you haven't yet purchased Stellar Expanse you may do so here: 0/5 : Not rated Render time: 0.203 cpu sec (13.00% load, 911.061 startup). Clock: 1.59 sec (3% of that for queries) DB queries: 21. Memory: 7.67MB/2.00MB
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540531974.7/warc/CC-MAIN-20191211160056-20191211184056-00461.warc.gz
CC-MAIN-2019-51
493
6
https://prismatic.io/docs/components/sleep/
code
Pause execution for a specific amount of timeComponent key: sleep The sleep component temporarily stops the execution of an integration for a specified amount of time. This is handy if your integration needs to wait for a known amount of time while a third party service performs some task. Sleep time is measured in milliseconds. For example, to sleep for 5.5 seconds, enter 5500 as your Note that relying on sleep is not generally best practice for development. If you are waiting on a third-party service to complete a task, check if the third party offers an endpoint you can query for task status, and build a code block or custom component around that. Sleep for a number of milliseconds before continuing the integration. | key: sleep
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511364.23/warc/CC-MAIN-20231004084230-20231004114230-00186.warc.gz
CC-MAIN-2023-40
741
7
http://www.linuxquestions.org/questions/fedora-35/grub-error-17-fedora-6-and-winxp-dual-boot-520404/
code
Grub error 17 Fedora 6 & WinXP dual boot I was running FC-3 and XP quite for sometime in my box. I have two HDDs ( 1 40Gb & 1 20Gb)but the both the OS are on hda (40Gb. I downloaded FC-6 iso images through torrent and prepared 5 CDs with ISO. While I first time tried to install it, after checking boxes for Software development and web server, it reported somekind of bug and shutdown. Then I opted for Office and Software DEvelopment and this time it reported that the it can't open some rpm file from the 3rd CD. So, Once again I restarted and opted for only office and this time the installation went smoothly with grub bootloader on 1st partition of Hda6 as default( as was earlier in FC-3). But after rebooting, it says Loading Grub, please wait.. Error No.17. I had downloaded the ZOD FC6 LiveCD but that also gives some gnome error message and after reaching the desktop screen it froze. What's going wrong and why so, I am realy not able to figure out. Any suggestion will be highly appreciated as I can't work on XP either. P.S. setup (hd0,8) tells me that the hd8 format is unknown and fdisk -l says the hda9 as 8e instead of ext3 like other linux partitions. I can't figure out really what is happening. Last edited by R N Ghosh; 01-19-2007 at 03:59 AM.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131292683.3/warc/CC-MAIN-20150323172132-00218-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
1,265
4
https://forum.duolingo.com/comment/138331/Nein-du-schl%C3%A4fst
code
"Nein, du schläfst." This may not me idiomatically customary, but "No, you sleep," does represent the meaning. There might be a context, where this works, too. But intuitively present progressive is far better. Yes, you are right it is better if it were in some film or movie script. However, when I translate it at "No, you sleep." I am reflecting an understanding of a German statement. Being told I dont know what that statement means is not very helpful, because it's not accurate. to add to that, there are lots of contexts in which, 'No, you sleep' would be said. e.g. It's late, I've nothing to do. What do i do? Should I drink some Red Bull? 'No, (that's disgusting), you sleep.'
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202510.47/warc/CC-MAIN-20190321092320-20190321114320-00133.warc.gz
CC-MAIN-2019-13
688
5
https://dukhrana.com/peshitta/analyze_verse.php?verse=1Peter+1:16&font=Estrangelo+Edessa&size=125%25&source=
code
Analysis of Peshitta verse 1Peter 1:16 Translations(Etheridge) because it is written, Be ye holy, as I also am holy. (Murdock) Because it is written: Be ye holy, even as I am holy. (Lamsa) Because it is written, Be you holy, even as I am holy. (KJV) Because it is written, Be ye holy; for I am holy. This work makes use of the Syriac Electronic Data Retrieval Archive (SEDRA) by Dr. George A. Kiraz, distributed by the Syriac Computing Institute. Peshitta verses are taken from the Peshitta NT published by the British and Foreign Bible Society. Copyright © 2006-2017 Dukhrana Biblical Research.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150067.51/warc/CC-MAIN-20210723210216-20210724000216-00056.warc.gz
CC-MAIN-2021-31
596
8
http://parenting.stackexchange.com/questions/tagged/social+pregnancy
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Arguments for/against same birthday for siblings? My son is born on October 1st three years ago. My wife is pregnant again and the calculated delivery date is October 22nd. We might end in a situation where the delivery is earlier, for reasons ... Aug 25 '12 at 21:38 newest social pregnancy questions feed Putting the Community back in Wiki Hot Network Questions Is my phone battery better / more capacitative than my laptop battery? Using cd command to navigate directories in Ubuntu which have special characters Definite integral problem Can I prevent diagonal movement from exploring more of the map? Sending I2C reliabily over Cat5 cables Project Euler 23: Non Abundant Sums What French phrase is the origin of "gardyloo?" Why use "reds and oranges" not "red and orange"? Why are laptop screens sized the way they are? Realised afterwards that I committed mild plagiarism in a paper I wrote as an undergraduate, what should I do? Word for the satisfaction of curiosity What time counts when it comes to remote work? How did humans know about Thor and Loki? Is there a computable ordinal encoding the proof strength of ZF? Is it knowable? How can I split a text file based on the content into multiple text files? How to measure the curvature of the space-time? Pretty way of keeping sensitive info out of a logged command string in Ruby? What are the security measures preventing someone from chartering a 747 and using it to commit a terrorist attack? Has the Holocaust been exaggerated by the allied forces? Required output impedance for ADC input? Is there an outdoor place I can take my cat to run around in L.A.? How can we guess the size of the Earth's inner core(and what it's made of)? Simply put, what are the similarities between integers and polynomials? Search vs. Look Up more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205375.6/warc/CC-MAIN-20140423032005-00360-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,428
53
http://www.dzone.com/links/simple_login_logout_system_using_php.html?ref=up-details
code
The Halloween Core War Tournament will be held on 31st October - a tournament played between... more » Google has this week announced version 1.3.0 of AngularJS, code named... more » Styling ADF application can be tricky, as CSS developers need to use ADF Skin editor. It is... more » n Part 1, we looked at thoughts on the first 10 things engineers should stop saying in... more » A simple tutorials showimg how to build a Java Application Using Apache ANT. This post is part of the series for deploying your SharePoint 2013 Development Platform on... more »
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119648250.59/warc/CC-MAIN-20141024030048-00168-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
564
6
https://github.com/Tokoyami
code
Hide content and notifications from this user. Contact Support about this user's behavior. Personal configuration files A Python implementation of the SCP protocol with some extensions Forked from tias/xinput_calibrator A generic touchscreen calibration program for X.Org Seeing something unexpected? Take a look at the GitHub profile guide.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125654.80/warc/CC-MAIN-20170423031205-00523-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
341
8
https://www.experts-exchange.com/questions/20566436/MSLU-missing-Unicows-lib.html
code
Thanks a lot in advance for trying to solve my problem. I am trying to internationalize and application i have. I have a common source base for Win NT/2K/XP and Win 95/98/ME. My application compiles fine on NT/XP/2k. But has problems compiling on 9X. I have downloaded the MSLU layer from microsoft. I have also installed the Platform SDK dated November 2001. I did all this as per MSDN. I am missing the file "unicows.lib" which is supposed to be located in the \Microsoft Platform SDK\Lib directory after i install platform sdk. However even if i do a complete install of Platform SDK, i do not get this lib. Can somebody tell me where i can find this elusive unicows.lib? Thanks and Regards,
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891817523.0/warc/CC-MAIN-20180225225657-20180226005657-00655.warc.gz
CC-MAIN-2018-09
694
4
https://www.chefdb.com/pl/672/Brassaii-Toronto
code
Brassaii was named after Hungarian photographer Gyula Halász, whose pseudonym was Brassai. "Brassai" means "from Brasso", which was the hometown of Halász. Halász became known for his photographs of Paris in the 1920s. This page has been viewed 887 times through 2021-02-24. The information on this page is provided "as is" with no warranties whatsoever, and is not guaranteed to be accurate nor does ChefDb take responsibility for it.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178347293.1/warc/CC-MAIN-20210224165708-20210224195708-00596.warc.gz
CC-MAIN-2021-10
438
2
http://www.dev-books.com/book/discover?tag=ucma
code
How we did it: For any feedback, any questions, any notes or just for chat - feel free to follow us on social networks George Durzi, Michael Greenlee Get the tools you need to build real software solutions on the UC platform Unified Communications (UC) integrates real-time communications (telephony, video conferencing, speech recognition) with non real-time communication (voicemail, e-mail, fax) to unify users across multiple devices and media types. This book offers practical development advice based on the authors’ experiences developing solutions on the UC platform. You’ll discover how to solve problems and get answers to common questions that you may encounter while developing solutions with the UC APIs. Begins with an overview of Unified Communications (UC) development Covers areas of custom development with Microsoft UC APIs and describes in detail their various functions Goes beyond simple samples to teach you how to build real software solutions on the UC platform Demonstrates how to add context to, build kiosk solutions, integrate Communicator functionality into an application, debug UCMA applications, and more This book shows you how to integrate communications functionality into your applications and so much more.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316150.53/warc/CC-MAIN-20190821174152-20190821200152-00279.warc.gz
CC-MAIN-2019-35
1,248
4
http://www.techmansworld.com/2012/02/200-posts-of-techmans-world.html
code
Another goal reached for this blog. This post will make post 202, but I am focusing on the fact that there is over 200 posts on this blog. So, anyone want to say congratulations? Drop a comment below. UPDATE: Also, I would like to say that I thank each and every viewer for coming here to read the articles that I push out. I also push out alot of hours making content for this blog. Not like I just hit Ctrl + C to copy and Ctrl + Shift + V to paste as plan text (Only available for Chrome; Ctrl + V for other browsers). Also, can everyone try to attract more viewers? I see my blog come up in search results when I type "Techman" into Google, but still don't get that many viewers. I'm currently not listed on Bing for some reason, so I'm probably not on Yahoo, because Bing powers Yahoo. That would be appreciated. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122886.86/warc/CC-MAIN-20170423031202-00399-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
825
3
http://www.stjamesjohn.com/11-dates-transfer-tests-201617-1/
code
Tuesday 13th September 2016 - Familiarisation Tests (Two preparation tests lasting 25-30 minutes each, containing questions that mirror the exam. These papers will not be marked, but are designed to help them prepare for exam) Thursday 15th September 2016 - 11+ Transfer Tests (Two multiple choice tests, 45-50 minutes each which is split up into smaller timed sections. Each paper will test Verbal, Numerical and Non-verbal Reasoning) Hope this helps, good luck!
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424564.72/warc/CC-MAIN-20170723142634-20170723162634-00387.warc.gz
CC-MAIN-2017-30
463
5
https://www.firewalltechnical.com/24-7-helpdesk/
code
We know your staff could need IT suppport at any time. To assist you we are able to provide helpdesk support to your users 24/7. Users will receive helpful, cost effective problem resolution when and where they need it. We can also provide SLA agreements and/or call back time guarantees, tiered to the employee class or category you specify. We will respond and resolve issues in realtime.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574662.80/warc/CC-MAIN-20190921190812-20190921212812-00330.warc.gz
CC-MAIN-2019-39
390
1
https://blog.sibvisions.com/tag/robovm/
code
After one year of JavaFX development, we thought it's time to write about our experience. We started in Nov. 2014 with our first bigger JavaFX tests. The idea was an UI implementation for JVx. We thought it should be an easy task because JavaFX is a desktop technology. We had another research project in 2012, but the result wasn't as expected. Sometimes it's a good idea to re-start from scratch! JavaFX wasn't very popular and is still not a Superstar, but we love researching and we thought it might be a good idea to bet on JavaFX. Not only as pure desktop solution and Swing replacement, but also for mobile app development based on JavaFXPorts and for embedded devices, like Raspberry Pi. So we had this big picture in mind. We thought it would be awesome to create a single JavaFX application, for all platforms and devices. Sure, some other companies tried to solve this problem as well, but we didn't try to do the same. Our idea was simple and based on JVx. We hade this awesome JVx application framework which enabled GUI and technology independent application development. So we tried to solve the GUI problem because all other things like persistence, remote communcation, i18n, ... were already solved by JVx. We did different GUI implementations for JVx, before we started with JavaFX. Our first one was based on Swing, followed by QTJambi, GWT, GXT, a headless variant and - last but not least - vaadin. We also made some tests with Flex and Pivot, but we didn't create more than some simple PoC. To be clear: GUI technology know-how was not the problem! We knew that JavaFX didn't have a solution for MDI and especially a DesktopPane was missing, but it wasn't a problem to create custom components/controls. We had some hard months of development because we found out that JavaFX wasn't a mature toolkit like Swing. We had to find many workarounds for very simple problems and had to create more custom components than expected. We solved most problems in our own code, but it wasn't possible to change some basic problems. We tried to get in contact with the developers, via JIRA, but it was hard to explain real-world use-cases to toolkit developers. Our developers at SIB Visions create custom products and projects together with customers for their needs. So we had many UI toolkit requirements from real users. Some issues were accepted but not all. Many bugs were fixed but we had big problems with Feature Requests. So far so good. We finished our JavaFX UI implementation in April 2015 and it was a big success, because we had a fresh UI technology with lots new features and animations, transitions, web and media views, .... awesome. We thought that JavaFX will be improved in 2015/2016 and it will be mature enough to use it for our customers. Wait... what's the problem with JavaFX? Performance, Memory, limited chances to modify standard controls The performance is not good, if you have many controls (= nodes). It's different on Windows, Linux, MacOS. It's much better on MacOS than on any other supported OS. If you develop business/backoffice applications, the performance is very important. Sure, if you create simple form based applications, it doesn't really matter. We use JVx to develop huge backoffice applications and currently, JavaFX should be used with care. What do we mean with "performance is not good"? - Large TableViews have scroll delays - Layouting sometimes need some "extra repaints" - Scrolling with many controls is not immediate - Startup time of an application is too long, compared to e.g. Swing applications The version number of JavaFX 8 is too high for it's maturity. JavaFX has big potential but we're not sure if it'll survive it's predecessor Swing. And we're not alone with our opinion: Should Oracle Spring clean JavaFX But there are also companies with JavaFX applications: JavaFX Real-world apps The toolkit issues are one thing. Another big surprise was that Oracle stopped official ARM support in Jan 2015 which didn't mean that JavaFX doesn't run on ARM devices (RaspberryPi, ...), but it's not officially supported and Oracle doesn't fix bugs or implement improvements. Thanks to Gluon it's still very easy to use JavaFX on ARM devices. Another step backwards was the migration to Bugzilla. In 2014 (and earlier), JavaFX was a "newcomer" and announced as Swing replacement. The development process at Oracle was very open and you had a "direct connection" to the development team, or something like that. It was very simple to report issues and to get feedback from the developers. It was fantastic to see and feel the progress. This is different nowadays, because the ticketing system moved from JIRA to Bugzilla and it's more or less readonly for standard developers. One problem with JavaFX is that Oracle doesn't tell us the strategy behind JavaFX. The investment of Oracle in JavaFX was high, but what will be the next step? It's hard to bet on JavaFX without definitive commitment from Oracle. But we still hope that JavaFX will be the one and only UI toolkit for Java. JavaFX for Android and iOS In summer, we moved forward and tried to use JavaFXPorts. It makes it possible to use your JavaFX application as native Android and iOS apps. Our JavaFX UI worked with some smaller changes out-of-the-box. It was awesome to see our JVx on Android or iOS devices! It was a milestone. But things have changed since summer because JavaFXPorts has a depency on RoboVM. It was an OpenSource project and was a big win for the community. But now it's a commercial tool (read more). This has no impact for us, but means that we can't offer an out-of-the-box OpenSource solution. JavaFXPorts also works without RoboVM and there are plans for a JVM running on mobile devices, but this won't solve the problem that you need access to device features/APIs. But we'll see what happens in the next few months. We had some fun in the last few weeks because we tuned our application frame for mobile devices. A mobile application has some specific characteristics and isn't a 1:1 desktop application. A desktop application usually has a menubar and a toolbar. The same app on a mobile device shouldn't use a menubar or toolbar. It should offer a hamburger button which offers a custom menu. Also the style of the controls should be different on mobile devices, e.g. Tabsets. There are two interesting projects which offer custom mobile controls. The first is a commercial product, from Gluon and the second one is JFoenix and it's OpenSource (LGPL). We took JFoenix because it met our requirements and JVx is OpenSource. We have some screenshots in older posts: JavaFX has potential to rule the Java UI world, but it needs an official commitment/statement from Oracle. Now it's unclear if JavaFX is the right UI technology for the future. We hope that JavaFX is the right toolkit, but we aren't sure. Our investment was risky and high, but no risk - no fun. The results are awesome! Thanks to JVx the UI technology is not important for us, because if JavaFX won't make the race, we still have Swing or vaadin. It's important to be UI technology independent because it saves time and money and is future save.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121000.17/warc/CC-MAIN-20170423031201-00004-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
7,169
36
https://support.esri.com/en-us/knowledge-base/what-do-the-terms-iso-19115-and-tc-211-mean-14624791320-000004448
code
ISO develops standards about everything from engineering and health to food and paper. All standards are developed by technical committees, which are identified by number. Technical committee (TC) 211 is creating standards about geographic information. The documents generated by TC 211 are about how to document spatial references, positioning services, quality evaluation procedures, and so forth. Documents are also identified by number. The standard describing how metadata should be created for geographic data is document number 19115.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816864.66/warc/CC-MAIN-20240414033458-20240414063458-00232.warc.gz
CC-MAIN-2024-18
541
2
https://www.npmjs.com/package/sigyan
code
Sigyan is a small utility to change levels of Bunyan logger instances using SIGUSR1/SIGUSR2 POSIX signals. (See more information on POSIX signals). Include in your node program and indicate which loggers to modify when a signal is received: var sigyan = require('sigyan'); sigyan.add([LOG, backend.log]); bunyan logger instances here. Send SIGUSR1 signal to your running node program to decrease log level: kill -s SIGUSR1 <PID> Send SIGUSR2 signal to your running node program to increase log level: kill -s SIGUSR2 <PID> You can also pass a single logger instance to The MIT License (MIT) Copyright (c) 2012 Pedro Palazón Candel Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813322.19/warc/CC-MAIN-20180221024420-20180221044420-00173.warc.gz
CC-MAIN-2018-09
1,652
15
http://forum.xda-developers.com/showthread.php?t=1603705
code
ok so you will have to edit your build prop to have the note id. im pretty sure i cant make a script to adjust that. same problems that are in my latest port is also here. so only main problem is spen. i will be looking into the problem some more but really dont know where else to look. Ucld2 script will be up soon just doing some testing but it looks promising
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163879441/warc/CC-MAIN-20131204133119-00010-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
363
4
https://community.pharos.com/community/knowledge-base/blog/2013/08/01/what-are-the-available-command-line-options-for-package-creation-and-installation-in-pharos-v7x
code
The following Command Line Options are available when creating and running packages - Command line options available for the PackageCreator.exe executable: /d = Debug mode This enables a Debug Step button on the progress bar dialog, which allows you to step slowly through each part of the package creation process, so you can see where problems arise. /q = Quiet mode Specifying this option means that the progress bar dialog is not displayed. This option overrides debug mode. - Command line options available for the PackageInstaller.exe executable: This means that the package will not re-install any existing modules. Causes the package to run silently, i.e. no dialogs are displayed to the user. For additional information see: Pharos Help (search for the following terms): Creating Install Packages Installing Popup Clients
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607314.32/warc/CC-MAIN-20200122161553-20200122190553-00553.warc.gz
CC-MAIN-2020-05
830
13
https://scifi.stackexchange.com/questions/132451/mid-1960s-deserted-earth-valiant-comics-uk
code
The Valiant was a UK comic, published by IPC Magazines, which ran from 1962 to 1976. The story I am looking for details of followed the adventures of a group school kids and their teacher in an Earth that was deserted. Turns out they didn't disappear because at school they were doing some science experiments on some meta (called delirium?) I'm pretty sure the comic must have been around 1966 (certainly it was before its merger with TV21). One of the stories in the arc was set in a zoo, where the animals escaped. It turns out the animals didn't disappear because the bars of the cage were made of delirium (?). Turns out that the Earth's population were made to disappear by aliens who wanted to have the Earth for themselves. I forget the reason why, but the aliens (out of the goodness of their heart or perhaps even hearts) decided to reverse the process and return the Earth's population.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00252.warc.gz
CC-MAIN-2022-49
897
4
http://aydinmohseni.com/
code
I am a doctoral candidate at the Department of Logic and Philosophy of Science at the University of California, Irvine. Previously, I completed my master’s in Logic, Computation, and Methodology at Carnegie Mellon University. I specialize in philosophy of science (esp. biology and economics), game & decision theory, and (formal, social) epistemology. I have been an information architect consulting for the National Science Foundation, UX strategist for Fortune 100 companies, new media technology instructor at the Minneapolis College of Art and Design, and Peace Corps volunteer in Morocco. My Erdös number is 3. (By way of Brian Skyrms to Perci Diaconis to Erdös.) You can reach me at aydin.mohseni (at) gmail (dot) com.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318421.65/warc/CC-MAIN-20190823130046-20190823152046-00393.warc.gz
CC-MAIN-2019-35
729
4
https://support.google.com/a/answer/7392423?hl=en
code
You and your users need to convert sites in classic Sites to new Sites by January 30, 2023. Any remaining sites will be auto-converted sometime after January 30, 2023. For details, go to Transition from classic Sites to new Sites. As an administrator, you can map a URL to a site in Google Sites and classic Sites to create a short, easy-to-remember address for your public website. You can create up to 2,000 custom site addresses with your Google Workspace account. Considerations when mapping a URL - Users with trial accounts or accounts with a trial status cannot map a site to a URL. - In new Sites, address mappings automatically supply domain-validated SSL certificates for secure connections. You can't use other certificates. - In new Sites, you cannot map a site to a URL that's under a different domain name. - People can only see the mapped URL if the site is shared with anyone outside of your organization. If the site is shared with specific people or only with your organization, everyone sees the original URL, such as sites.google.com/example.com/yoursitename, instead of the mapped URL. For details, go to Set Google Sites sharing options. - A sub-domain can only be mapped to a primary domain. A sub-domain cannot be mapped to another sub-domain. Step 1: Turn on site creation for users Before you begin: Make sure Sites is turned on for your users. For details, go to Control who uses classic and new Sites in your organization. To turn on site creation for new Sites and classic Sites: In the Admin console, go to Menu AppsGoogle WorkspaceSites. Click New SitesSite creation and editing. Select Users can edit sites and check the Allow users to create new sites box. Next to New Sites, click the Up arrow to close the New Sites section. Click Sharing settings - classic SitesSite creation. Select Users at your domain can create sites and click Save. Step 2: Add a custom URL Requires having the Domain Settings administrator privilege. Before you begin: If you’re mapping a URL to a secondary domain, the owner of the site must use the secondary domain for their email address. If the owner uses a different domain, you need to create an account for the user on the secondary domain and transfer ownership of the site to the new account. The user on the secondary domain must then duplicate the site (to change the site path to the secondary domain) and publish the duplicated site. - In the Sites settings of your Admin console, click Custom URL. - Click Add New Sites or Classic Sites depending on where the site is published. - Click Continue. - Enter the current URL for the site. The format of the URL depends on how the site was created: - Created with new Sites—The URL will be sites.google.com/domain/sitename. - Created with classic Sites and migrated to new Sites—The URL will be sites.google.com/a/domain/sitename. - Created with classic Sites—The URL will be sites.google.com/a/domain/sitename. - Click Continue. - Select a verified domain. Note: If you’re mapping from new Sites, only the domain hosting the site is available. - Enter a custom URL for the siteclick Continue. - Click Add Custom URL. - (Optional) To update the CNAME record on your domain host’s website: - Sign in to your domain host’s website. - Go to the DNS management page. - Find the CNAME settings and for the CNAME value or alias, enter your custom URL. - For the CNAME destination, enter ghs.googlehosted.com. - Save the changes. Changes can take up to 24 hours but typically happen more quickly. Learn more (Optional) Create a naked domain address For details, go to Set up the naked domain address for your site. |Delete and re-create the address mapping to supply the domain-validated SSL certificates. |This error could be due to: |Transfer of ownership to new account does not work This error could be due to: Google, Google Workspace, and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819971.86/warc/CC-MAIN-20240424205851-20240424235851-00528.warc.gz
CC-MAIN-2024-18
4,024
46
https://pcidssguide.com/encryption-key-management-essentials/
code
WHAT IS ENCRYPTION KEY MANAGEMENT? Encryption key management administers the whole cryptographic key lifecycle. This includes: generation, use, storage, archiving and key deletion. Protection of the encryption keys involves controlling physical, logical and user / role access to the keys. ENCRYPTION KEY MANAGEMENT and PCI COMPLIANCE Security best practices and PCI DSS compliance require protection of sensitive data with encryption and physical or logical separation of data encryption keys (DEK) from sensitive data and protection with strong key encryption keys (KEK). Anyone in their database who needs to protect sensitive data needs to know that storing the encryption keys at the same location puts data at risk of breach. In addition to PCI DSS, compliance regulations may apply depending on what type of information is being stored and under what industry guidance your project / company falls within. In PCI DSS requirement 3.5, organizations processing, storing, or transmitting cardholder data should record and enforce procedures to protect keys that are used to secure stored cardholder data from disclosure and misuse. This includes: - Preserving “recorded architecture definition” for data protection - Limiting ‘access to the fewest number of custodians available for cryptographic keys’ - Store encryption keys ‘at any time in one (or more) of the following forms:’ - Crypt key for data encryption with main encryption key - In a secure cryptographic device Similarly, PCI DSS requirement 3.6 requires you to document all key management processes and procedures for cryptographic keys used to encrypt cardholder data in full and implement them. This includes securely: - Generating of cryptographically strong encryption keys - Secure key-distribution - Secure storage of keys - Cryptoperiod setting for all keys - Retiring and destroying the keys NIST Recommendation for Key Management NIST notes that proper management of cryptographic keys is important for the successful use of security cryptography. If an attacker knows about a safe combination, the best safe does not provide any protection against intrusion. Similarly, weak key management can compromise strong algorithms easily. NIST definition shows a detailed picture. Like the combination of a safe, your key to encryption is only as good as the security you use to protect it. There is a complete physical and digital cryptosystem that must be taken into account, as well as the full lifecycle of each key. Hence, a robust key management system and policies for encryption include: - Key lifecycle: generation of key, pre-activation, activation, expiry, post-activation, escrow and destruction - Physical access to key servers - Access to Key Servers logically - Access to the encryption keys by user / role TYPES OF ENCRYPTION KEYS Symmetric Keys: Data-at-Rest The same encryption key is used in symmetric key cryptography for both encryption and decryption of the data. This method of encryption is mainly used for data security during rest periods. An example would be to encrypting and decrypting sensitive data in ciphertext when stored in a database when accessed by an authorized person, and vice versa. Asymmetric Keys: Data-in-Motion By comparison, asymmetric keys are a pair of keys to encrypt and decrypt the data. Both keys are both related and created simultaneously. They are called a public and a private key: - Public Key: This key is primarily used for data encryption and can be freely given as it is used for data encryption, not decryption. - Private Key: This key is used to decrypt the data which has been encrypted by its equivalent, the public key. This key must be secured, since it is the only key that can decrypt encrypted data. - Asymmetric keys are used primarily for the data-in-motion security. An example may be the connection to a virtual private network (VPN). Using a VPN to: - To encrypt the data with an AES symmetric session key - Use a public key to encrypt the session key - After obtaining the encrypted data the private key is used to decrypt the session key - So that the data can be decrypted. - To encrypt the data with an AES symmetric session key HOW ENCRYPTION KEY SYSTEMS WORK Symmetric Key Systems First, let’s sort out a few definitions: - Data encryption key (DEK): Is an encryption key which has the function of encrypting and decrypting data. - Key encryption key (KEK): Is an encryption key which has the function of encrypting and decrypting the DEK. - Key application program interface (KM API): Is a programming interface designed to safely retrieve and transfer encryption keys to the client requesting the keys from a key management server. - Certificate Authority (CA): Is an entity creating public and private keys, creating certificates, verifying certificates and performing other PKI functions. - Transport layer security (TLS): Is a cryptographic protocol providing protection for data-in-motion over a computer network via mutual authentication. - Key Management System (KMS): is the key management software house system Now, with the meanings in order, a step-by-step example is given below as to how an authorized user accesses encrypted data: - User requests access to encrypted data. - The database, application, file system, or storage will then send a request to the client for DEK retrieval (KM API). - Afterwards, the client (KM API) and KM check each other’s certificates: - A certificate is sent to KM by the client (KM API) for verification. - The KM then verifies authentication of the certificate against the CA. - When the client (KM API) certificate has been checked, the KM will then forward its authentication and approval certificate to the KM API. - Once the certificates have been approved, a stable TLS connection between the client (KM API) and the KM will be created. - The KM then decipheres the DEK requested with the KEK - Over the encrypted TLS session the KM sends the DEK to the client (KM API). - Afterwards, the KM API sends the DEK to the database, application, file system or storage. - The database (may) stores the DEK in protected temporary memory. - The database, program, file system, or storage would then submit user information on the plaintext. Asymmetric Key Systems - The Sender and Recipient verify the certificates of each other: - For verification the sender sends the certificate to the recipient. - The receiver then checks the certificate for authentication against their Certificate Authority (CA) or an external Validation Authority (VA). - If the sender’s certificate has been confirmed, the receiver must then send their certificate for authentication and approval to the sender. - If it has mutual acceptance between the sender and the recipient: - The sender demands public key from the receiver. - The receiver sends the sender its public key. - The sender creates a symmetric ephemeral key and encrypts the file to be sent. - The sender uses the public key to encrypt the symmetric key. - The sender then sends data encrypted with the symmetric key encrypted. - The receiver receives the packet, and the private key decrypts the symmetric key. - The receiver decipheres the data using the symmetric key. THE FULL LIFE-CYCLE OF KEYS The key life-cycle of encryption, defined by NIST as having stages of pre-operation, operation, post-operation, and deletion, includes, among other things, the concept of an operational crypto time for each key. A crypto-period is the time duration over which a particular key is allowed to be used, and the crypto-period is calculated in Section 5.3 of the NIST Guide by comparing the approximate time during which encryption will be applied to the data with the time when it will be decrypted for use. So, as an example: - Let’s assume a database is encrypted, and objects are added to it for the next 6 months. Then, there’s: - The 6 month OUP - The database is also used by permitted users for 2 years. Then, there’s: - The RUP is 2 years old - The crypto-period would then be equivalent to 2 years and the encryption key would need to be active at that time. Nonetheless, when an enterprise may fairly want to encrypt and decrypt the same data on end for years, other considerations can come into play when factoring the crypto period: You may want to restrict this to: - Info mount protected by a given key - Exposure amount in case a single key is compromised - Time spent trying to reach physical, procedural and logical access - Duration during which knowledge can be compromised by inadvertent revelation - Time for computer intensive cryptanalytic attacks That can be comes down to a few important questions: - How long the data will be used - How the data is used - How much data it contains - How sensitive the data is - How much damage if the data is exposed or the keys are lost As the complexity of data being encrypted increases, the general rule is that the lifespan of an encryption key decreases. Because of this, your encryption key may have an active life shorter than the access to the data by an authorized user. Which means you need to store deactivated keys and then use them for decryption. Once the data has been decrypted by the old key, the new key will encrypt it, and the old key will no longer be used to encrypt / decrypt data, and can be deleted over time. The key to encryption is created and stored on the server for key management. The key manager generates the encryption key by using a cryptographically secure random bit generator, and stores the key in the key storage database along with all its attributes. The key attributes stored include its name, date of activation, size, instance, ability to delete the key, and also their rollover, mirroring, key access and other features. Upon formation or configuration, the key can be triggered automatically or manually at a later time. The encryption key manager will monitor the encryption key in both current and past instances. You need to be able to select whether the key can be removed or not, mirrored to a failover device and open to users or groups. Your key manager will let the administrator alter at any time several of the key attributes. Key Use and Rollover The key manager will allow approved systems and users to retrieve an active key for processes of encryption or decryption. It should also be able to manage current and past encryption key instances seamlessly. For eg, if a new key is created and the old one deactivated every year, then the key manager will maintain previous versions of the key but dispense only the current instance and enable previous versions for decryption processes. Previous releases can still be retrieved to decrypt encrypted data with such key versions. The key manager may also roll the key either via a schedule previously set, or allow an administrator to roll the key manually. An administrator should be able to revoke a key using the key manager, so that it is no longer used for requests for encryption and decryption. If required, an administrator may reactivate a revoked key, such that in certain situations the key can be used to decrypt previously encrypted data with it, such as old backups. But even that can be curtailed. NIST requires that an archive for deactivated keys should be stored. The archive should prevent unauthorized modification, deletion and insertion of the archived material. At the end of its cryptoperiod, the encryption keys must be recoverable and the device must be configured to allow the reconstruction of the keys should they need to be reactivated for use in decrypting the data it once encrypted. If a key is no longer in use or has been compromised somehow, an administrator can choose to remove the key entirely from the encryption key manager’s key storage database. The key manager can fully delete it and all its instances, or only those instances, and make it impossible to recover the key. This should be available as an alternative in case confidential data in its encrypted state is compromised. If the key is removed, the vulnerable data would be absolutely protected and unrecoverable, because recreating the encryption key for that data will not be feasible. SEGREGATED ROLES IN KEY MANAGEMENT Separation of Duties for Encryption Key Management In Key Management Recommendation, NIST describes duties separation as a concept of protection that separates critical functions among different staff members in an effort to ensure that no one has sufficient information or privileges to perpetrate harmful fraud. Practice separation of duties limits the likelihood for fraud or misconduct by splitting related responsibilities between different individuals within an organization for critical activities. It is common in most organizations’ financial and accounting procedures. For instance, the person who prints checks at a firm wouldn’t be the person who signs the checks. Likewise, the person who signs the checks would not reconcile the bank statements. A company would ensure the classification of business critical duties into four types of functions: authorization, custody, record keeping, and reconciliation. No-one can do more than one form of feature in a perfect program. In the area of encryption key management, adoption of Separation of Duties is important with respect to information security activities. It is important that the person who manages encryption keys does not have the ability to access protected data, and vice versa, to prevent unwanted access to protected data. In an information technology context this is no more difficult to accomplish than in a financial context, but is often overlooked or misunderstood in complex computer systems. Dual Control for Encryption Key Management NIST, in its Key Management Guideline, describes dual control as a mechanism utilizing two or more different organizations acting in conjunction to protect sensitive functions or information. No one person may access or use the resources, for example cryptographic keys. Although Separation of Duties includes allocation to different persons of various sections of a process, Dual Control requires that at least two or more entities control a single process. Due Dual Control criteria for encryption key management functions are generally found in data security practice. Since a key management system can be storing encryption keys for various applications and business organizations, it is critically important to secure encryption keys. Split Knowledge for Encryption Key Management The Split Knowledge principle refers to any access or handling of insecure cryptographic content such as encryption keys or passphrases used to construct encryption keys, and implies that nobody knows the full value of an encryption key. When creating encryption keys using passphrases, no one should know the entire passphrase. Rather, two or more people should each know only a part of the transfer phrase, and all of them should be present to build or recreate a key for encryption.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00270.warc.gz
CC-MAIN-2024-10
15,048
122
https://www.vorpx.com/forums/topic/independent-gun-head-movement/
code
I seen some topics on my search in regards to independent movement of the head vs gun. Some was saying this can only be done in ARMA III. (topics from like 2019) Is there a tutorial on how this can be done? I saw mentions of like track IR etc. And what’s the latest on this? I initially tried to play Far Cry 5, which had both head and gun combined. (I though because of imported profile). Then I tried Crysis 3, with same results. Is there any workarounds, did anyone manage to get the head and gun move independently, or better even, bind the gun to the hand controllers (I`m using Reverb G2). I found a demo that came with the WMR app, I think it was Halo or something, that had the guns binded to the controller – that was very impressive. In arma its basically coded within a game, its not vorpx feature. The track IR thing. Without game developers actually coding separate gun/head movement its not possible for vorpx to add to a game. VR mods for games that have access to games code and can change it do implement guns on controllers, but those mods are rare, take a lot of time and are game specific. Vorpx is a universal software supporting many existing and upcoming games using existing engines. All vorpx does is adding stereo cameras or compiling stereo view from games depth map, thats the base of what vorpx does, there are many neat small details too, but in the big scale its only stereo view, dont expect any other complex things. Only way you can have separate gun/head motion (and its how I play fps games) is to use immersive screen with 16:10 or 16:9 aspect ratio and close to your face, that way your fov is filled with game, you can even look around without seeing edges of the screen (especially with ambient background) and you can use mouse to aim your gun. Thank you. Good tip I`ll try it. I was happy as it works for my racing games like F1 etc. And only asked because as I said, the post I found were from like 2019, which is why I was thinking, perhaps things moved on since. great piece of software so far.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00382.warc.gz
CC-MAIN-2023-50
2,043
10
https://wiki.ubuntu.com/Sturmflut
code
sturmflut on irc.freenode.net <sturmflut AT lieberbiber DOT de> I'm Simon, but hardly anybody calls me by that name. I was born in Italy and have been living in Germany for the last 13 years. I've got a masters degree in Computer Science, have been using Linux-based operating systems since about 1997 and am currently working as an administrator and software developer for a supercomputing facility run by the German government. My first Ubuntu installation was most likely 5.10, I remember creating my Launchpad account shortly after that. Fun fact: I've been to 44 countries. Things I do for Ubuntu - I helped run Ubucon Germany 2015 in Berlin, sponsored my own travel there, gave a talk about "Linux and Supercomputing" and ran a tutorial on Blender, the 3D modelling and animation software. - I am on the organisation team for Ubucon Europe 2016 in Essen. I founded and organized UbuContest, a community-run contest with prizes for Ubuntu Phone app/scope developers and community members who have contributed to Ubuntu in an "outstanding way". I sponsored a bq Aquaris E4.5 Ubuntu Edition phone, the winner announcement was a live show on the Ubuntu Community Q&A Hangout and we had a whole award ceremony at Ubucon Germany 2015 in Berlin with international guests. I plan to attend Ubucon Summit 2016, the next Ubuntu Party in Paris, "Linux y Tapas" 2016 in Spain, and UbuCon Europe 2016. - I own several desktops, laptops, servers, phones and tablets running various stable and unstable releases of Ubuntu, and provide feedback. - I became an Ubuntu Pioneer for uploading one of the first 200 apps to the Ubuntu Phone store, and have currently published ten apps. - I became an Ubuntu Phone Insider and provide feedback on development and stable releases. I currently own a bq Aquaris E4.5, a Meizu MX4 (sponsored by Canonical) and a Nexus 4 for testing. - I wrote various article series about internals of Ubuntu Touch and the bq/Meizu phones on my blog. I provided feedback and design proposals for core phone APIs and features like WiFi, Bluetooth, Lifecycle Management etc. - I have extensive knowledge about technical things and how to debug stuff properly. - I often hang out on various channels (currently IRC, Telegram, and G+) and give support to users and developers. - I report and comment on Launchpad bugs and filter through hundreds of Launchpad bug e-mails every week. I plan to start working on UbuContest 2016 soon. While running UbuContest I found out that I actually like Design work, and I would like to contribute more design stuff for Ubucon Europe 2016. - I have about ten more phone applications ready to be finished as soon as the necessary APIs are available. - I have a few ideas for other applications that I would like to see developed and might even port some of those. Room for Improvement There are areas where I'd like to improve myself and my own knowledge: - Learn about Snappy. - Write more blog articles again. - Learn to go to sleep at normal hours. I know Simon since the beginning of this year 2015. First, we only discussed some Ubuntu Phone stuff, later on he became one of the Ubuntu Phone Insider. Since then he started collaborating with me and some other folks in the German LoCo to organize the UbuContest. While he initially only wanted give away one of his Ubuntu Phones, we quickly got the support from Canonical to make a bigger UbuContest and also advertise the Ubucon Germany at the same time. At the event itself he helped us out and also did some talks. For the future UbuCon Europe, he already raised some good ideas in our organisation group. I look forward to continue to work with him, both in the UbuCon organisation and also as part of the ubuntu phone insider. svij 2015-10-30 Simon's membership is long due. While he's been a long-time Ubuntu supporter, in recent times his contributions have started to shine: the series of blog posts about the Ubuntu phone, his status as Ubuntu phone Insider, bug reports and discussions on the mailing list (just don't ask him about app lifecycle and the organization of the UbuContest are just some of these stellar examples. I've had the privilege to work with him during the UbuContest initiative and meet him at the UbuCon Berlin, and I can only recommend him to be granted Ubuntu Membership. Good work! -- dpm 2015-10-30 16:58:34 I'm really surprised that Simon is not a Ubuntu Member already. TBH I was even thinking he works for Canonical What I can say about him? Hmmm... Firstly I knew him from Google+ as a person who knows everything about phones' insides, hardware and other black magic I have no idea. For me he was very mysterious character hiding behind fake name and avatar with a mouse (which later turned out to be a chinchilla). Later he made that very annoying game about Panda and Love. I believe his plan was to make people destroy their Ubuntu phones out of frustration. Time passed and I had a chance to meet him at UbuCon in Berlin. He is very nice guy, open to people, looks nothing like his G+ avatar. He's spreading Ubuntu (and Panda) love everywhere. I hope getting the membership will not change him into a villain he was before (in my imagination at least). Good luck! -- mpredotka 2015-11-05 09:39:11 Simon has shown lots of initiative to many things related to Ubuntu. It reaches from blogging about cool new stuff, writing HowTos for others to get that stuff set up, helping others out on IRC and Telegram groups etc. Additionally he has been playing a big role on the organisation of UbuContest (the app development contents) and seems to be involved with UbuCon organisation too. A clear +1 from my end. -- mzanetti 2015-11-05 09:49:49 Since meeting Simon in the Ubuntu Insiders group (via Telegram) he's always been available and very helpful. Even when I showed my complete ignorance of some networking and fibre optic basics. If they let me be an Ubuntu Member then there's absolutely no reason to not include Simon. AAAAAAAAA+ would harrass again in a heartbeat -- ronnietucker 2015-11-05 18:39:49 Le Panda guy is active in the ubuntu community on social networks such as g+ or telegram, always posting about new stuff such as convergence, phone and stuff. His UbuContest initiative has a very influence on the developer community on the phone which is very appreciated. His contributions to make the UbuCon Europe happens are very strongh. I recommand Simon as an ubuntu member. -- cm-t 2015-11-05 22:10:44 The nick talks for him. He is one of the best Ubuntuphone hackers, his blog is full of masterpiece of information about the phone and the convergence story, member of the Church of Snappy, introduced by Ogra himself, very involve in community, with the UbuCon Europe and UbuContest, very active in the Ubuntuphone Insiders group, create one of the most infuriating game I played (I dream about killing panda all the time now), and will be one of the first guest stars at UbuCon Paris very soon. I just don't understand why he is not a member yet. With all the things he done for Ubuntu, I think that he simply forgets to do his application -- vinzjobard 2015-11-09 16:02:14 I have trouble memorizing any foreign (to me) words but sturmflut has stuck because I see it all over the place wrt to the Ubuntu phone. Simon is doing amazing work in collecting info and documenting the phone at https://sturmflut.github.io/ Filing bug reports and diagnosing difficult issues. Also, sharing the space with the rest of the Ubuntu Insiders. He was the driving factor in the recent UbuContest. I wholeheartedly recommend Simon as an Ubuntu Member. Now back to the Panda game. -- simosx 2015-11-10 08:41:53 I met Simon in person one week ago in the Ubucon of Paris and I was really impressed by his enthusiasm towards Ubuntu. He's always responsive and very active (specially into Ubuntu Touch and the next Ubucon Europe). Simon could be one of the key Ubuntu members for the future and I fully support his application! -- costales Note: If you have anything nice to say about this person, please do add it below along with @ SIG @ (no spaces). The @ SIG @ command will sign your name and date/time it after you "Save Changes".
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358570.48/warc/CC-MAIN-20211128164634-20211128194634-00013.warc.gz
CC-MAIN-2021-49
8,169
37
http://www.libming.org/FrontPage?action=recall&rev=21
code
Ming is a library for generating Macromedia Flash files (.swf), written in C. It has wrappers that allow it to be used in C++, PHP, Python, Ruby, and Perl. Releases through to 0.3.0 progressed slowly, though the new 0.4.0 release has picked up speed, become more reliable, and supports Win32 much better. Also supports Solaris, and will likely support MacOS X as well. Ming CVS has updated support for PHP. The code can now be built for either PHP4 or PHP5. Ming 0.4.0.beta4 has been Released. Details can be found [http://www.libming.org/moin.cgi/Releases here]. SF project page: http://www.sf.net/projects/ming Old homepage: http://ming.sourceforge.net (we need help to move all contents here!) General lists: https://sourceforge.net/mail/?group_id=18365 bug watching list: http://bugs.libming.org/mailman/listinfo/ming-bugs GNU LGPL for the core library (http://www.gnu.org/licenses/licenses.html#LGPL) GNU GPL for the utilities (http://www.gnu.org/licenses/licenses.html#GPL)
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648178.42/warc/CC-MAIN-20180323044127-20180323064127-00085.warc.gz
CC-MAIN-2018-13
979
11
https://www.dk.freelancer.com/work/extract-details-database-yellowpages/
code
...Canada Post shipping services in CANADA to ship their parcels. They can be anyone from a eBay seller, Amazon Seller, Online store or Brick and Mortar store. I need this details: - Business Name - Contact number and email Please don't send a list of multinational companies They can be from any industry Please tell me your budget, time frame to I need you to write some articles. Extract word by word all text and meta data from an html page. Save billions of html pages in a structured way in a sql database so you can perform analysis on words and tags, minimizing storage space required and maximizing performance and still be able to reconstruct the html page with the same text, including punctuation marks and tags. See instructions ...and understand every line ..You are to respond back with an ''DONE'' ..I advise you read with care you'll be responsible for the performance, integrity and security of a database. However, depending on the organisation and your level of responsibility, the role can vary from inputting information through to total management of data. ... Sustaining I'm working on my consultancy firm and I need a data extraction/engineer/entry guy who can extract leads from multiple sources. The data involves extracting companies' email address, name, website, contact person if they fit the criteria. I will tell you the sources where to fetch the data from, but in any case, having experience in this field is a Ionic Expert need to for Extract Code from Apk Then Build New Apk,- Only Expert Bid here As a database administrator, you'll be responsible for the performance, integrity and security of a database. However, depending on the organisation and your level of responsibility, the role can vary from inputting information through to total management of data. ... Sustaining the security and integrity of data. The name of the Company is Digital Need voter list in text , which is in pdf format and contain image which is not easy to convert in text . so I need these data in text(excel). There are three links from where I need the data :- every link contains the data of related state in india. Madhyapradesh (MP) – [login to view URL] Rajasthan(RJ) -- [login to view URL] Chattisgarh(CG) – [login to view ... We are aiming to to run a campai...campaign targeting brands to come onto our mobile app. We are a mobile fashion app - www.wonderfits.com. Need help with scrapping website info with email addressed and contact details of target brands. Example website - [login to view URL] (Focus on fashion/clothing/beauty brands) Hello Freelancers... I would like to see if someone can extract all categories from Facebook. Example: under demographics > work> employers, how many companies are listed and what are their names. We want this for all of Facebook ad. advertising platform ...with groundbreaking technologies like artificial intelligence (AI), machine learning (ML), and deep learning. The essence of data science is to dive into massive datasets to extract meaningful information from them. The insights that data scientists and data analysts obtain from large volumes of data is the secret sauce that’s rapidly transforming everything I need you to develop some software for me. I would like this software to be developed for Windows using .NET. I need to extract news articles containing specific keywords from a set of 7 Persian news websites. I need to get the URL, the title, the date and the content of the articles in any text format. I need someone to setup extractor for data from a website. I need to do it using ParseHub. I need someone to be able to extract following. FrontPage: Name of product Price of Product Pictures of Product Details of product BackPage (from Source Code) SKU Vendor Data from: Mirrorcity dot com dot au I am looking for the direct contact of the HR/Recruiting team in various German companies for sponsoring enquiry. List of company names is provided. Name, email and maybe phone is needed. Deliverable is our next product release version. Seek experienced developer with expertise in Python, FLASK, HTML, CSS, AJAX, and Bootstrap. Experience working in Google Cloud Platform could infrastructure environment (App Engine, Cloud Storage, SDK, etc). AWS added plus. In addition to technical skills, seeking an individual with good verbal communication skills who can perform effectively in a t... We are looking for an experienced Equinox Database Admin [login to view URL] who knows how to extract data from the equinox db server. note that Equinox isnt some other db engine and it has funny things and to get data into sql format needs someone who used equinox before, so pls dont waste your time and our time into stating whatever u know, We want to scrape a list of all SEO agencies from Yelp USA. The URL string looks like this: https://www.yel...the above URL string, there is 590 results. The #1 result is this listing > [login to view URL] The data we want to extract is: [login to view URL] Thanks! Excel Conditional formatting to color cells & then I need this excel project built into an automatic usable program. (I'v attached 2 files describing exactly what i need done.) & iv attached my example excel file that is partially finished.. My number is 5177061852 Thank you. Hello Guys, I have a .obj 3D model to which I want to apply a material using a bitmap then I want to extract and bake the texture so I can use it in other 3D softwares ( meshlab). Is there anyone who can write a small tutorial to guide me. Thank you I need an iPhone/iPad app. I would like it designed and built. It is spin game . The requirement 1. The profile creation . Authent...of spin 5. Accept of agreement before go ahead with profile creation . 6. Play with user option [login to view URL] admin should has an option to extract the report . 8. I need the access to the user location and contact details
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158011.18/warc/CC-MAIN-20180922024918-20180922045318-00405.warc.gz
CC-MAIN-2018-39
5,889
21
http://tiffanyapanwritingproject.blogspot.com/2014/02/so-were-really-legit-now.html
code
I now have the Birthrite Series domain set up so the site is really ready to go now. :) Birthrite Series Website I am really excited to get the finished product done and out there. I've also tweaked my YouTube Channel a little and have a new vlog. It's also posted at the new website as most content will be from here on out (though I do link to this blog on the site, I'm trying to shift most traffic over to the website). But for now, I'm posting the vlog here as well: So, hope you'll be regular visitors of the Birthrite Series site as well as the new tiffanyapan.com site that will be up soon. And feel free to connect with me at Twitter and Facebook as well as the Birthrite Series Facebook. I'll also be solving the Playlist problem here too asap. :)
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647244.44/warc/CC-MAIN-20180319234034-20180320014034-00150.warc.gz
CC-MAIN-2018-13
757
5