url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://openportal.ispc.cnr.it/about
code
The Institute's preferred route to open access is self-archiving in the institutional repository People (see ISPC Open Access Policy). The ISPC Open Portal collects and makes visible the scientific production of the Institute. ISPC was constituted in October 2019, by merging four Institutes of the Department of Human and Social Sciences, Cultural Heritage (DSU): the Institute for Technologies Applied to Cultural Heritage (ITABC), the Institute for the Conservation and Enhancement of Cultural Heritage (ICVBC), the Institute for Archaeological and Monumental Heritage (IBAM), the Institute for Ancient Mediterranean Studies (ISMA). ISPC is the new institute born as a reference point for the National, European and International scientific community, to face the challenges posed today by Heritage Science. ISPC Open Portal: - gathers its contents from the CNR Information System (namely, from the People archive); - enriches and interlinks the gathered material with additional information and contents by relying on scholarly communication services and resources (e.g. the OpenAIRE Research Graph, ScholeXplorer, Altmetric); - presents the ISPC scientific production to facilitate search, browsing and access. The Open Portal is the result of close cooperation between the ISTI Working group on Open Access, which designed and implemented the ISTI Open Portal, and the ISPC Working Group on Open Data, Open Knowledge, Open Science. Referents for ISPC Open Portal: - Costanza Miliani (ISPC Director) - ISPC Working Group on Open Data, Open Knowledge, Open Science - Nicolò Paraciani (Technical referent) - Sara Di Marcello (Referent for archiving in People and contact person) - Irene Rossi (Referent for research infrastructures)
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474700.89/warc/CC-MAIN-20240228080245-20240228110245-00117.warc.gz
CC-MAIN-2024-10
1,736
13
https://steamkeyscheap.com/command-conquer-remastered-collection/
code
Command & Conquer and Red Alert are both remastered in 4K by the former Westwood Studios team members. Includes all 3 expansions, rebuilt multiplayer, a modernized UI, Map Editor, bonus footage gallery, and over 7 hours of remastered music. Command & Conquer: Remastered Collection system requirements Operating System: Windows 8.1/10 (64-bit Version) Processor: Intel Core 2 Duo E4600 2.4ghz or AMD Athlon 64 X2 6400 2.4ghz Graphics Card: NVIDIA GeForce GT 420 or ATI Radeon HD 5570 RAM: 4 GB Disk Space: 32 GB Games similar to Command & Conquer: Remastered Collection
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710924.83/warc/CC-MAIN-20221203043643-20221203073643-00325.warc.gz
CC-MAIN-2022-49
569
8
https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/1472-6947-13-S1-S5/figures/5
code
Example protein complexes. White interactions indicate shared PPI between protein complexes. Purple nodes are bottleneck nodes. Protein complexes were obtained from DIP dataset and annotated using GO database (p-value < 0.01). Red interactions are core mediator complex, orange interactions are ubiquintin conjugating enzyme complex, yellow interactions are negative cofactor 2 complex and lime interactions are transcription factor TFIIF complex.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00663.warc.gz
CC-MAIN-2022-40
447
1
https://devpost.com/software/vimana-sahai
code
Being an avid traveller myself and traveling to around 50 countries, I have experienced how airports of major cities work. A major problem that I faced was that it was so crowded that I cannot find my way through the airport. This idea was born out of this problem. What it does It is an AI bot which asks about your route and then updates you about the directions to your boarding gate. You can also ask any questions you want about the airport and the AI acts as a companion during the trip, You can use the bot to get information about delays in the flight, changes with the boarding gates and also more information about food and duty free. How I built it I used Recast.ai as it is a better tool for conversational AI and using this approach to solve the problem will be a better idea. Challenges I ran into The workflow of the AI was a challenge as I had to make the AI understand what the user will say and it is unexpected for us what and how the user will approach the AI. Accomplishments that I'm proud of The bot can understand between different cities and also tell the user if it needs more information. The AI can distinguish between different airlines and airports. What I learned What I learned was how we can train the AI in such a way that we can use it for other purposes such as making it understand that different airlines can go to the same airport. What's next for Vimana Sahai To work on more features for the app.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00516.warc.gz
CC-MAIN-2023-50
1,437
13
https://www.functionaljobs.com/company/launchdarkly
code
LaunchDarkly is a Feature Management Platform that serves hundreds of billions of feature flags daily to help software teams build better software, faster. Feature flagging is an industry standard methodology of wrapping a new or risky section of code or infrastructure change with a flag. Each flag can easily be turned off independent of code deployment (aka "dark launching"). LaunchDarkly has SDKs for all major web and mobile platforms. We are building a diverse team so that we can offer robust products and services. Our team culture is dynamic, friendly, and supportive. Our headquarters are in Oakland. At LaunchDarkly, we believe in the power of teams. We're building a team that is humble, open, collaborative, respectful and kind. We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, gender identity, sexual orientation, age, marital status, veteran status, or disability status. Don't let the confidence gap get in the way of applying! We'd love to hear from you. We've partnered with KeyValues to help demonstrate the amazing culture we've built here at LaunchDarkly, find more info at https://www.keyvalues.com/launchdarkly
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00228.warc.gz
CC-MAIN-2022-40
1,245
3
https://www.electro-tech-online.com/threads/traffic-light-changer.5320/
code
narco said:Anyone seen the kit sold from Kenneke that changes the traffic lights through IR bulbs? Has anyone ever built one? If so, how did it work (or not) and how about sharing the schematics. narco said:Its only illegal if you are not associated with a governmental entity, and its use would be used within the parameters allowed (such as EMS, Fire, and Police). narco said:Yes this is true, but if you were to price the complete (already built) version of the light changer, you would see that you can build it for thousands of dollars less than you can buy it for. If you have not used one, just say so. Last I checked this is an electronic project page, not a page to question legalality of items that you don't agree with. I would be willing to bet that although you preach about legality, probably about 85% percent of the electonic persons who read this page know how to steal cable, and are probably doing so right now (maybe even you).
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00240.warc.gz
CC-MAIN-2023-40
947
3
https://robotics.stackexchange.com/questions/20288/jacobian-of-a-planar-manipulator-with-4-links
code
I have a mobile manipulator that moves on the plane. The base moves in SE(2) and the manipulator is also planar with 4 links. The mobile base will be a differential drive robot and its motion is defined as: The manipulator is attached to the center of our mobile base. How do I compute the Jacobian of the mobile manipulator? I know that for the mobile manipulator I have something of the form: The middle matrix is what I need to compute.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00162.warc.gz
CC-MAIN-2022-40
439
4
https://positionalfootball.com/dynamic-movements/
code
Watch the clip below. Look at the starting positions (Tactical insight) and the dynamic positive runs that put more demands on the ball carrier to look for a through ball. Also note that the players continually make runs but are not always used. Enter the Party by Kevin MacLeod is licensed under a CC Attribution 3.0. Permissions beyond the scope of this license are available at http://incompetech.com/music/royalty-free/licenses/.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072180.33/warc/CC-MAIN-20210413092418-20210413122418-00612.warc.gz
CC-MAIN-2021-17
433
4
https://www.tek-tips.com/viewthread.cfm?qid=1624349
code
The form won't be used like this it will b part of a GUI. I know what i want to do but applying all this into code is some what puzzling for me and would very much appreciate some assistance please. The attributes i would have are: a GridBagConstraints c1 object for the field labels, a GridBagConstraints c2 object for the data entry fields. My method is I also need another method to make the window visible which i am struggling with.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947705.94/warc/CC-MAIN-20180425061347-20180425081347-00534.warc.gz
CC-MAIN-2018-17
437
7
https://usergroup.tv/videos/category/speaker/gavin-aguiar/
code
Gavin is a software engineer on Azure Functions and focuses on development for using Python with Functions. Developing Azure Functions using Python on Aug 15, 2023 at Azure Austin Meetup DFW Azure User Group © UserGroup.tv 2020
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00111.warc.gz
CC-MAIN-2023-50
228
6
https://zebrapeople.com/job/frontend-developer-22/
code
Looking to expand by bringing on both a mid-level and a junior frontend developer, this company have created a cloud-based platform that removes the traditional complexities of professional video production and distribution. They work with some very well known companies and rights holders, primarily in sport, including ITV, BT Sport, EA, the FA, UFC and Wimbledon. Their platform integrates with all major social media platforms, such as Facebook, Instagram and YouTube. As a company they are very big on introducing the latest technologies to their platform, so you will get the chance to experiment with cool new tech (plus they’re huge on professional development opportunities like Hackathons, Tech hours and pair programming). They’re looking for someone who’s happy to be chip in and work end to end on the product, from design and architecture to releasing and supporting in production. At the moment they’re building a browser-based video editing tool, so you’ll get the chance to work on this as well as building beautiful and resuable UI components, and overcoming functionality challenges found in their applications. Although this is a mid-level role, they are looking for someone who can help define a strategy to perform code migrations, helping to set up code standards and processes and helping to mentor younger engineers – they’ve a huge show and tell culture that works really well for people wishing to kick on. Some of the pretty cool languages, frameworks and tools they’re working with presently include: What’s in it for you? A salary of up to £65K plus a personal development budget and training material, hackathons, tech hour on Wednesday, quarterly performance reviews, flexible working hours, 100% remote options, Friday happy hour and monthly company lunches, 25 days holidays and team away days!
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00538.warc.gz
CC-MAIN-2022-40
1,847
8
http://www.tabletpcreview.com/news/microsofts-windows-store-growing-strongly-again-closing-in-on-100000-apps/
code
The rate at which developers are submitting apps to the Windows Store has picked up after slowing earlier in the year. This store is the source of all the software that can run on tablets running Windows RT. Devices with Windows 8 can access them as well, through the Start Screen. The store opened last fall, and submissions were fairly strong for a time, but then slowed last winter to the point where only about 140 apps were being submitted per day, according to MetroStore Scanner. Developers have picked up the pace considerably since then, and in June are averaging 580 apps per day. The total number of titles in the Windows Store is over 97,000. The dearth of good, third-party software has reduced interest in tablets running Windows RT like the Microsoft Surface RT. With the numbers creeping up, as well as the upcoming release of Windows 8.1 RT, there might be more interest shown.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657140337.79/warc/CC-MAIN-20200712211314-20200713001314-00032.warc.gz
CC-MAIN-2020-29
894
6
https://www.lesswrong.com/posts/aWFwfk3MBEyR4Ne8C/decoherence-is-pointless
code
Previously in series: On Being Decoherent Yesterday's post argued that continuity of decoherence is no bar to accepting it as an explanation for our experienced universe, insofar as it is a physicist's responsibility to explain it. This is a good thing, because the equations say decoherence is continuous, and the equations get the final word. Now let us consider the continuity of decoherence in greater detail... On Being Decoherent talked about the decoherence process, (Human-BLANK) * (Sensor-BLANK) * (Atom-LEFT + Atom-RIGHT) (Human-BLANK) * ((Sensor-LEFT * Atom-LEFT) + (Sensor-RIGHT * Atom-RIGHT)) (Human-LEFT * Sensor-LEFT * Atom-LEFT) + (Human-RIGHT * Sensor-RIGHT * Atom-RIGHT) At the end of this process, it may be that your brain in LEFT and your brain in RIGHT are, in a technical sense, communicating—that they have intersecting, interfering amplitude flows. But the amplitude involved in this process, is the amplitude for a brain (plus all entangled particles) to leap into the other brain's state. This influence may, in a quantitative sense, exist; but it's exponentially tinier than the gravitational influence upon your brain of a mouse sneezing on Pluto. By the same token, decoherence always entangles you with a blob of amplitude density, not a point mass of amplitude. A point mass of amplitude would be a discontinuous amplitude distribution, hence unphysical. The distribution can be very narrow, very sharp—even exponentially narrow—but it can't actually be pointed (nondifferentiable), let alone a point mass. Decoherence, you might say, is pointless. If a measuring instrument is sensitive enough to distinguish 10 positions with 10 separate displays on a little LCD screen, it will decohere the amplitude into at least 10 parts, almost entirely noninteracting. In all probability, the instrument is physically quite a bit more sensitive (in terms of evolving into different configurations) than what it shows on screen. You would find experimentally that the particle was being decohered (with consequences for momentum, etc.) more than the instrument was designed to measure from a human standpoint. But there is no such thing as infinite sensitivity in a continuous quantum physics: If you start with blobs of amplitude density, you don't end up with point masses. Liouville's Theorem, which generalizes the second law of thermodynamics, guarantees this: you can't compress probability. What about if you measure the position of an Atom using an analog Sensor whose dial shows a continuous reading? Think of probability theory over classical physics: When the Sensor's dial appears in a particular position, that gives us evidence corresponding to the likelihood function for the Sensor's dial to be in that place, given that the Atom was originally in a particular position. If the instrument is not infinitely sensitive (which it can't be, for numerous reasons), then the likelihood function will be a density distribution, not a point mass. A very sensitive Sensor might have a sharp spike of a likelihood distribution, with density falling off rapidly. If the Atom is really at position 5.0121, the likelihood of the Sensor's dial ending up in position 5.0123 might be very small. And so, unless we had overwhelming prior knowledge, we'd conclude a tiny posterior probability that the Atom was so much as 0.0002 millimeters from the Sensor's indicated position. That's probability theory over classical physics. Similarly in quantum physics: The blob of amplitude in which you find yourself, where you see the Sensor's dial in some particular position, will have a sub-distribution over actual Atom positions that falls off according to (1) the initial amplitude distribution for the Atom, analogous to the prior; and (2) the amplitude for the Sensor's dial (and the rest of the Sensor!) to end up in our part of configuration space, if the Atom started out in that position. (That's the part analogous to the likelihood function.) With a Sensor at all sensitive, the amplitude for the Atom to be in a state noticeably different from what the Sensor shows, will taper off very sharply. (All these amplitudes I'm talking about are actually densities, N-dimensional integrals over dx dy dz..., rather than discrete flows between discrete states; but you get the idea.) If there's not a lot of amplitude flowing from initial particle position 5.0150 +/- 0.0001 to configurations where the sensor's LED display reads '5.0123', then the joint configuration of (Sensor=5.0123 * Atom=5.0150) ends up with very tiny amplitude. Part of The Quantum Physics Sequence Next post: "Decoherent Essences" Previous post: "The Conscious Sorites Paradox" A typo: 5.0150 vs. 5.10150 "The physicists imagine a matrix with rows like Sensor=0.0000 to Sensor=9.9999, and columns like Atom=0.0000 to Atom=9.9999; and they represent the final joint amplitude distribution over the Atom and Sensor, as a matrix where the amplitude density is nearly all in the diagonal elements. Joint states, like (Sensor=1.234 Atom=1.234), get nearly all of the amplitude; and off-diagonal elements like (Sensor=1.234 Atom=5.555) get an only infinitesimal amount." This is not what physicists mean when they refer to off-diagonal matrix elements. They are talking about the off diagonal matrix elements of a density matrix. In a density matrix the rows and columns both refer to the same system. It is not a matrix with rows corresponding to states of one subsystem and columns corresponding to states of another. To put it differently, the density matrix is made by an outer product, whereas the matrix you have formulated is a tensor product. Notice if the atom and sensor were replaced by discrete systems, then if these systems didn't have an equal number of states then your matrix would not be square. In that case the notion of diagonal elements doesn't even make sense. Perhaps it still works as long as he was saying not Sensor(0) but Sensor(Atom(0)) ie "Sensor says Atom is in state 0" So it doesn't matter how many states the sensor has, it's how that state reflects on the state of the Atom that matters. Then the states could correspond one-to-one regardless of how many states the sensor has, and the probability would be concentrated in the diagonal. Stephen: OK, have struck that section and will go back to see if I can figure out what the standard theory actually says. WHAT is an exponential function of WHAT?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00710.warc.gz
CC-MAIN-2023-14
6,429
30
https://www.raspberrypi.org/forums/viewtopic.php?f=44&t=233948
code
I am trying to obtain data using the Pican2 on my raspberry however I obtain the following error: OSError: [Errno 100] Network is down. Anyone knows how to solve it? I am using the following code Code: Select all import can bus = can.interface.Bus(channel='can0', bustype='socketcan_native',bitrate=125000) notifier = can.Notifier(bus, [can.Printer()])
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668525.62/warc/CC-MAIN-20191114131434-20191114155434-00264.warc.gz
CC-MAIN-2019-47
352
6
https://capstone.mynmi.net/learning-ios-app-development-swift/
code
A few resources to get started learning iOS app development and Swift: - The NMI’s own Dr. Emuel Aldridge has a companion site for NMIX 4310 at 4310.mynmi.net. - Treehouse has a great collection of lessons about iOS app development with Swift. If you time it right, the seven-day free trial may be enough to get you started, and especially if you pack a lot into a month or two, $25/month isn’t bad. - Naturally, Apple has a great getting started guide. - Big Nerd Ranch is a world-class dev training company based out of Atlanta. This book and this book that they’ve written might be helpful.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363134.25/warc/CC-MAIN-20211205005314-20211205035314-00316.warc.gz
CC-MAIN-2021-49
599
5
https://www.tudelft.nl/en/architecture-and-the-built-environment/about-the-faculty/departments/architecture/organisation/groups/design-data-and-society-group
code
Design, Data and Society Group Design, Data and Society Group critically explores the technological conditions under which architecture in the age of global digital infrastructures emerges, from small to large scale and from everyday practice to the very big picture. What does it mean to design in a society that seeks its balance between the datafication of all areas of life, and urgent environmental issues? Design, Data and Society From design information to building standards to climate models — we have become curators in a data-driven world that leads to new spatial, cultural, aesthetic, social, and political paradigms of the built environment. This also significantly influences the way we operate, for example, when designing material cycles, user behaviour or environmental data. Datafication is nothing new in architecture, and there is a long tradition of design by statistics or empirical research. But computer vision and machine learning have fundamentally changed the cultural techniques of observing, measuring, calculating, writing, modelling and drawing, and the meaning of data itself. Data has operationalised our knowledge about space and time, people, materials, buildings, cities and landscapes, and has, in a sense, become a medium of integration, converging models, media, and methods from different disciplines and scales. This raises new questions for research and education at the intersection of design and society. The Design, Data and Society Group consists of an interdisciplinary team working in architectural, cultural and media history, technology theory, architectural design, computer vision, and archival research. Thus, we collaborate with the AI Lab, international photographers like Armin Linke, and cultural institutions like the Jaap Bakema Study Center at the Het Nieuwe Instituut, Museum for Architecture, Design, and Digital Culture. We lead the research project "The New Open", one of the faculty's new flagship projects, and the cross-departmental platform "Design, Data, and Society", both started in 2021.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00512.warc.gz
CC-MAIN-2023-40
2,062
7
https://www.beatificabytes.be/2022/02/
code
Here is a step by step "How-To create a Virtual Machine to emulate a DS918+ running DSM 7.0.1" using VMWare and a Loader from redpill THIS DOES NOT WORK ANYMORE (?): issue betwen the .pat file version and the loader => Try the DSM 7.1 with DS3622+ available here Click to Read More As for my previous packaging (DSM 6.2.2 on DS918+), I simply used various tutorials from internet to create a VM in VMWare 15 and exported this one as ovf 1: Download and unzip this package, containing: - the configuration of the virtual machine (dsm.ovf, disk.vmdk and synoboot.vmdk), - the boot file for DS918+ (synoboot-falt.vmdk) and - the image of the DSM 7.0.1 for DS198+ (DSM_DS918+_42218.pat) 2: Open VMWare Workstation. If you never configured the default location where you want to create your Virtual Machines, press CTRL-P to open the “Preferences” panel. There, set this default location (I am using E:\VMWare). 3: Go next to "Windows Explorer", in the folder where you have unzipped the package, and double click dsm.ovf. This is going to import the VM into VMWare. Type a name for the new virtual machine (I am using DSM918+ 7.0.1) and click “Import”. 4: Here is the outcome to the importation. You can now click on “Power on this virtual machine”. If you want, you may also first increase the Memory, the Processors or the size of the Hard Disk 2 (Do not touch the Hard Disk 1 which contains the boot loader). 5: 5 sec after starting the VM, the bootloader will run: 6: Open the “Synology Assistant”, which is more efficient than the page http://find.synology.com to find your VM, and after 1 minute click on “Search”. If you didn’t wait long enough, you will see an Error message (In such a case, check that you have enabled the option "Allow compatibility with devices that do not support password encryption" in the preferences - via the gear icon in the top-right corner - and/or click Search “Again”. I never had to do this more than 3 times). 7: Finally, the Assistant will find your VM. A webpage should automatically open (Otherwise, double-click on the VM). Approve the EULA and click Install. 8: Click next on Browse to select the image of the DSM 7.0.1 for DS918+ and Select the file “DSM_DS918+_42218.pat” in the folder where you unzipped the package downloaded here previously. 9: Finally, click on “Next” and confirm that the installation can override the disk… it’s the virtual SCSI Hard Disk member of the VM. No worry ;) 10: The installation will take a few minutes 11: Once the installation complete, you will see in the VMWare Workstation that the VM is rebooting. On the installation page, you see a countdown. 12: You should soon see that it’s installing packages before being finally ready to "start" 13: You will now be able to login into the VM and configure it. 14: It’s now time to use the Hard Disk 2 to create a first Volume. Open the DSM Main Menu and start the Storage Manager. 15: Et voila, you have now a brand new DS918+ with the DSM 7.0.1-43 Update 2.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00308.warc.gz
CC-MAIN-2023-40
3,025
22
http://www.vhboots.com/notes.html
code
This Discography was started near the end of March 1994 by myself, then a member of the Van Halen Mailing List (then at Cornell University) as a service to the mailing list. I saw a need to list and keep track of all the Van Halen bootlegs that have been issued over the years. This list is by no means complete and I rely upon other people to provide information on the bootleg recordings that they have or have seen. Back in the beginning, the textual version of this list was posted once a week to the Van Halen Mailing List if there had been changes since the last posting, but it eventually grew too big to be posted, so now it's only available here on I've tried to keep the titles in order, using the year of recording as What are Checksums/Fingerprints? They are electronic signatures that assure files you receive digitally are intact and the same as what was originally transferred. The two most common types are FLAC Fingerprints and MD5's. You will need the appropriate software to generate these signatures to assure that everything matches. A FLAC signature has the filename first, and an MD5 signature has the filename last. If you would like to use any of the material from this site, please ask first by sending me a message at the address below. Remember, this is just a "list". Nothing more, nothing less.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886815.20/warc/CC-MAIN-20180117043259-20180117063259-00493.warc.gz
CC-MAIN-2018-05
1,324
19
https://codeyarns.com/2014/09/10/how-to-mount-remote-directory-using-sshfs/
code
Samba (SMB) and NFS can be too complicated to mount directories between computers on a home network. If both the remote and local computers are running Linux then an easier method is to use SSHFS. - Installing SSHFS is easy: $ sudo apt install sshfs - Create a local directory where you want to mount the remote directory: $ mkdir my_remote_contents - Make sure you can already SSH to your remote computer: $ ssh my_remote_login@my_remote_computer - To mount your remote directory using SSHFS to the local directory you created earlier: $ sshfs my_remote_login@my_remote_computer:/some/remote/path my_remote_contents Now you can browse the directory both from shell or any GUI file explorer. All normal file operations works seamlessly, including deletion. - To unmount the remote directory: $ fusermount -u my_remote_contents Note that your user needs to have sudo permissions to be able to unmount the directory. Tried with: SSHFS 2.5 and Ubuntu 14.04
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400206329.28/warc/CC-MAIN-20200922161302-20200922191302-00719.warc.gz
CC-MAIN-2020-40
953
14
https://www.truelancer.com/freelance-service/i-can-manage-your-social-media-facebooktwitter-instagram-38415
code
I can manage your Facebook page twitter instagram and increase followers to those pages I have 8 years of managing social media pages 7$ = 1 month You have a website and you want a facebook page Twitter ... I can give you page with the name and fans you want. What the Seller needs to start the work Give me your confidence And i will give you good work
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514578201.99/warc/CC-MAIN-20190923193125-20190923215125-00410.warc.gz
CC-MAIN-2019-39
353
8
https://svn.haxx.se/subusers/archive-2006-11/0053.shtml
code
RE: [Subclipse-users] 1.1.8 and icons From: MATHUS Baptiste <mathus.b_at_mipih.fr> Date: 2006-11-03 19:17:14 CET Well, I've got a very poor knowledge about eclipse plugin development, but it seems to me that it's the normal behaviour: by default, plugin won't be loaded until one of its feature is accessed, it's the eclipsee "lazy-loading" behaviour (as in Hibernate, for those who might know it). I've just had a look in an eclipse plugin : when opening the plugin.xml with the eclipse viewer, in the overview tab, there's an option which is selected by default, under "Activator" textfield : there's a checkbox "Activate this plug-in when one of its class is loaded". Maybe you could try and see if unselecting this does what you want ? But, the thing is that it would then obviously cause the loading of whole the plug-in inconditionally, which might not be exactly what you want, but just a particular class ? If you just want to have one particular class loaded and not the whole plug-in, maybe isolating the new feature in another plug-in could do it as a workaround ? Hope this helps, This is an archived mail posted to the Subclipse Users mailing list.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00223.warc.gz
CC-MAIN-2023-50
1,161
8
http://www.northernsounds.com/forum/showthread.php/49157-Dumb-question-about-anyone-that-uses-sound-recorder
code
Dumb question about anyone that uses sound recorder. PCM is is the setting I converted the sound recorder to, and any other setting causes errors. I don't know why, but PCM when it records sound from the computer the Sound Recorder, it has a very fussy sound. The microphone is muted , and everything is turned down properly. I never used to have problems until the PCM setting was accidentally defaulted by clicking it.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719566.74/warc/CC-MAIN-20161020183839-00558-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
420
2
http://www.bjkresearch.com/bugblog/vista.html
code
BugBlog Special Report - Windows Vista This special report covers bugs, incompatibilities and other assorted goofiness in Windows Vista. Bugs come from both the daily BugBlog and the BugBlog Plus. If this special report is useful, consider subscribing to the BugBlog Plus. A three month subscription is only $5. Use the links on the left or below to jump back to past months, or use the search form. A number of bugs in the Microsoft .NET Framework 1.x and 2.0 may allow critical attacks against Windows 2000 and Windows XP computers, with less severe attacks possible against Windows Server 2003 and Windows Vista. Remote attackers may be able to exploit these bugs to run their code on the victim's computers. Microsoft has links to the patches at http://www.microsoft.com/technet/security/bulletin/ms07-040.mspx. Microsoft credits Dinis Cruz of OWASP, Paul Craig of Security Assessment, Jeroen Frijters of Sumatra and Ferruh T. Mavituna of Portcullis Computer Security Ltd. for finding these bugs. There is a memory leak in the Windows ReadyBoost driver for Windows Vista. ReadyBoost is a way to use flash memory to boost Vista's performance, and according to Microsoft, you may not even know if it is running. In some hardware configurations, it leaks memory which may lead to this error message: STOP: 0x0000006F (parameter1, parameter2, parameter3, parameter4) SESSION3_INITIALIZATION_FAILED. Microsoft also said there could be other problems that could generate this error message, other than the memory leak. They do have a hotfix for it. Either wait for the service pack, or see http://support.microsoft.com/kb/939008/ on how to get it earlier. Information Week tells us a sure-fire way to crash Windows Vista -- hold down the Windows key and the E key together for ten seconds. Read about it at http://www.informationweek.com/blog/main/archives/2007/06/how_to_crash_wi.html. Not having a Vista machine, I can't test it. There's also a link to an article on crash recovery techniques. According to Microsoft, because of the way the the Trusted Installer has changed in Windows Vista, third-party System Restore tools probably won't work correctly in Windows Vista. You won't end up with a completely restored system. Microsoft has a hotfix for this, which will be in a future service pack. Need the fix right away? See http://support.microsoft.com/kb/935606/. The three things in the title -- vertical fonts, Postscript, and Windows Vista -- don't go together. If you mix a regular font and a vertical font (typically an Asian font whose name starts with the @ sign) and try to print to a Postscript printer from Vista, and the printing won't be correct. If you do this often, you may want to get the hotfix that Microsoft discusses at http://support.microsoft.com/kb/937018 Connect a USB telephony device to a Windows Vista computer, and Vista may decide to make it the default audio device. That should play havoc with audio/visual applications. Microsoft says this is because Vista sees that the device has audio capabilities, but doesn't determine the correct kind. There is a hotfix for this, which will be in a future service pack. If you need it right away, see http://support.microsoft.com/kb/936004. There is a bug in the Windows Mail application within Windows Vista that an attacker can use to take complete control of the system. The bug is in the way Windows Mail deals with UNC navigation requests. Because of the scope of the damage, which can be triggered by reading an email, Microsoft considers this a critical update. Microsoft has patch information at http://www.microsoft.com/technet/security/bulletin/ms07-034.mspx. In the meantime, reading mail as plain text can serve as a workaround. Try to activate Windows Vista, and you may see this error message: Activation Error: Code 0x8007232b DNS Name does not exist Microsoft says this error would tend to occur if volume-licensed media was used to install Windows Vista, and not an ordinary retail purchase and upgrade. There are three workarounds: set up a Key Management Service server; use a Multiple Activation Key (MAK); or use a license key. See the details at http://support.microsoft.com/kb/938107. Switching from the secure desktop in Windows Vista to the unsecured desktop may trigger this Stop error message: Stop 0x00000001 (0x00000000, 0x7ffdc000, 0x0000ffff, 0x00000000) where the first, second, and fourth numbers in parentheses may have different values. This will happen if you are using the Windows Aero color scheme, and you entered your logon credential to unlock the secure desktop. Microsoft says that an event hook must also be running to trigger the bug, which is in Win32k.sys. They have a hotfix, which will be in a future service pack. If you can't wait for the fix, see http://support.microsoft.com/kb/935936 for information on getting it right away. Today's BugBlog Plus has five more bugs and fixes for Adobe, Apple, CA and Microsoft. If you start a Windows Vista computer in diagnostic startup mode, you may be prompted to activate your copy of Windows Vista. This will happen even if you've done this before. If you don't comply, Microsoft considers you a pirate (arghh!) and will switch Vista in reduced functionality mode. Given that you are probably using diagnostic mode because of a problem, this is about the last thing you want to deal with. It happens because Windows Licensing depends on Plug and Play, which is disabled when you use diagnostic startup mode. It appears that Microsoft realizes how brainless this is, because they have a hotfix for it. Either wait for a future service pack, or go to http://support.microsoft.com/kb/937426 for the fix. Windows Vista does not recognize the Secure Digital (SD) card for these Casio digital cameras: Exilim Card EX-S3; Exilim Zoom EX-Z3; CASIO QV-R40. Connect one of them, and Vista shows it confusion by giving this error message: Please insert a disk into Removable Disk (E:). Microsoft has a fix for this that includes a Registry edit. See the details for this, plus important warnings about editing the Registry, at http://support.microsoft.com/kb/934332/. There have been many complaints about the poor battery life you may get when running Windows Vista on a laptop computer. The problem is the new Aero Glass interface, because if you turn off the new interface battery life shows much improvement. ZD Net has another story summarizing the complaints, and also details the work that HP has done in changing the power management functions on their Vista laptops. Read the whole thing at http://news.zdnet.com/2100-1040_22-6181366.html. Try to start Mozilla Firefox on a Windows Vista computer, and you may see this error message: "The program must close to allow a previous installation attempt to complete. Please restart." Restarting Firefox, or waiting and restarting Firefox, doesn't seem to do anything. What you need to do, according to Mozillazine, is to start the Task Manager and stop the "xpicleanup" process, if it is running. Then go to the C:\Users\<your_username>\AppData\Local\VirtualStore\Program Files\Mozilla Firefox folder, and delete the xpicleanup.dat file. Still having problems? See http://kb.mozillazine.org/Browser_will_not_start_up#Windows-specific_problems for more help. Connect an external monitor to a Windows Vista laptop computer, and you may not be able to play a DVD after you close the laptop's lid. This will happen if, in Power Options, you selected Do Nothing as the response for "When I close the lid of my portable computer." When you close the lid, you will get an error message saying: "Windows Media Player cannot play this DVD because there is a problem with digital copyright protection between your DVD drive, decoder and video card. Try installing an updated driver for your video card." Microsoft says you will need to restart the DVD playback (and you'll probably need to open the laptop lid to do so.) There is no permanent fix yet. Watch http://support.microsoft.com/kb/933421 for updates. There is a bug in Microsoft Windows animated cursors. Hostile websites may be able to exploit this bug to load hostile code on your computer. Just about every version of Windows is vulnerable, including Vista, Windows Server 2003, Windows XP, and Windows 2000. At this point, there is no fix yet from Microsoft, although they have issued a security advisory at http://www.microsoft.com/technet/security/advisory/935423.mspx. A story at Computerworld says you may be safe if you use Mozilla Firefox. Read the whole thing at http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9015079 Giving up on Windows Vista? Microsoft has posted detailed instructions on how, if you upgraded your computer to Windows Vista, you can revert back to your old operating system. Some of the success depends on how you upgraded to Vista in the first place. Read the long article at http://support.microsoft.com/kb/933168 to see what is involved. Microsoft says that there are incompatibilities between unspecified USB audio devices and USB audio TV tuners on Windows Vista computers. They won't work if you try to use them. Microsoft has a hotfix for this, so if you have one of these audio devices or TV tuners giving you trouble, see http://support.microsoft.com/kb/933262 about getting the hotfix. Apple iTunes 7.1 for Windows clears up some, but not all, of the incompatibilities with Microsoft Windows Vista. According to Apple, when using iTunes 7.1 and with your iPod connected to the Vista computer, you don't want to use the "Safely Remove Hardware" feature in your System Tray. You may end up with a corrupted iPod. If that happens, reconnect it to the computer, and in iTunes go to the iPod panel and click Restore. Then, only disconnect the iPod using the Eject button within iTunes. There is an incompatibility between some integrated video cards and Microsoft Windows Media Player 11 on a Windows Vista computer. The incompatibility is in the drivers that come with these two integrated graphics chipsets: Intel 82865G Graphics Controller (Microsoft Corporation - XDDM), and Intel 82915G/GV/910GL Express Chipset Family (Microsoft Corporation - XDDM). They might cause a vertical bar or band to appear in the middle of the playback window. This line may be discolored blue or green. The drivers in question have a 8/1/06 date. At this time, there is no fix so you'll probably need to wait for a driver update. Keep an eye on http://support.microsoft.com/kb/933708 for news. Microsoft has the Windows Vista Application Compatibility Update available. It fixes a number of incompatibilities between some mainstream applications and Vista. These applications include: Adobe Photoshop 7.0.1, Photshop Elements 4, and Create Suite CS2; Microsoft Money 2005 and 2006; Google desktop 4.2006.1008; AVG Anti-Spyware 188.8.131.52; and Opera 9.02. Read the whole list, and find the link to the download at http://support.microsoft.com/kb/929427 Try to install Windows Vista, and you may get this error report: Error 0xC004F02A - The Software Licensing Service reported that the license is invalid. What Microsoft says might be the case, however, is that the BIOS for this computer is incompatible with Vista, or is outdated. That means you may need a BIOS update. Microsoft has the details at http://support.microsoft.com/kb/929818. The encryption that Windows Vista uses for communicating with secure web pages via SSL (Secure Socket Layers) is not compatible with the encryption used by Cisco PIX 515E firewalls. Try to use Internet Explorer 7 on Vista from behind one of these firewalls, and you may see this error message with secure pages: Internet Explorer cannot display the webpage Microsoft says the Cisco firewall can only use the weaker DES. They have a workaround at http://support.microsoft.com/kb/929708 that weakens security. They also prod Cisco on that page to provide an update. In the 2/5 BugBlog we said that Apple was warning about problems with iTunes running on Windows Vista. One day later, and Apple has a iTunes Repair Tool for Vista. According to Apple, it should fix the problems people had playing songs purchased from the iTunes Store. Get it at http://www.apple.com/support/downloads/itunesrepairtoolforvista10.html. When you use the Windows Vista File Sharing Wizard to share a folder, you may inadvertently give a user permission to delete files or folders created by other users. Microsoft says this happens if you give a user Contributor permissions. See more at http://support.microsoft.com/kb/930090. If you upgrade a computer from Windows Vista Home Basic to Windows Vista Home Premium, Vista Business or Vista Ultimate, you may have problems with Microsoft Internet Information Services 7.0. It may not display HTML files correctly, because configuration information wasn't correctly added to ApplicationHost.config. Microsoft has a workaround available at http://support.microsoft.com/kb/930901. Apple says that iTunes 7.0.2 "may work" with Windows Vista on a typical PC. Their official stance is to wait for the next version of iTunes, which is promised for a few weeks after the official Windows Vista release. One of the compatibility problems is with digital rights management -- you may not be able to get iTunes store purchases to play on a Vista computer. See more at http://docs.info.apple.com/article.html?artnum=305042 If you are running a version of Windows Vista that does not support the Vista Aero theme, such as Windows Vista Home Basic, you will get bad video playback performance if you move the mouse pointer over the video playback and you trigger a tool tip that appears over the video. This will happen near the playback controls, for instance. This may cause slow playback or dropped frames. The only workaround for now is not to trigger a tool tip. There are a number of situations where a DVD-R or DVD-RW burned on a Windows Vista computer may have problems playing back on a stand-alone DVD player. Microsoft lists some of the problems, and some possible cures, for DVD playback at http://support.microsoft.com/kb/931698. If you are using Internet Explorer 7 on a Windows Vista computer with protected mode enabled, you won't be able to use a shared printer within IE 7. Microsoft says this is because protected mode locks down parts of the Registry that are needed for the shared printer. There are two workarounds if you want to print. Either turn off protected mode, or use the Add Printer Wizard to connect to the printer. See http://support.microsoft.com/kb/927842 for details. If you have your iPod connected to your Windows Vista computer, don't use the Windows System Tray icon to "Safely Remove Hardware". Apple says this may corrupt your iPod. This is one of a number of Windows Vista problems with iPods. Apple says you may want to wait for the next iTunes upgrade before using your iPod with Vista. If you start making changes to the Default Format list for audio devices in Windows Vista, you may disable the ability of some other programs to play audio. You may also see some variation of this error message: Failed to play test tone. Microsoft has a hotfix for this, which will be in a future Windows Vista service pack. If you need the fix right away, see http://support.microsoft.com/kb/930883. If you have a FireWire (or IEEE 1394) device hooked up to a Windows Vista computer, the computer may be very cranky when you try to wake it from sleep. It may give you this error message: STOP 0x0000009F DRIVER_POWER_STATE_FAILURE Microsoft has an update to fix this. Get it at http://support.microsoft.com/kb/929762 Microsoft already has a reliability update for Windows Vista. It fixes a number of USB problems, including bugs that cause devices such as fingerprint readers or Windows Media Center remote controls to stop working. It will also fix a problem that prevents you from reconnecting a USB device after you use the Safely Remove Hardware option to turn it off. Get the update 925528 at http://windowsupdate.microsoft.com. Microsoft says that if Windows Vista is running on a computer that uses the Mobile Intel 945GM Express Chipset and the Microsoft Advanced Host Controller Interface (AHCI) chipset driver. You may have problems waking it up from sleep about 10 percent of the time. Microsoft says it is due to a bug in the ATAportDeviceBusy function. Microsoft has a hotfix for this, which will be in a future Vista service pack. If you need the fix right away, see http://support.microsoft.com/kb/929909. Laptop Windows Vista computers may have problems waking from sleep to do network-related tasks. If the network is wireless, the computer may wake up and give you this error message: STOP 0x0000007E. Microsoft has a hotfix for this, which will be in a future service pack. If you can't wait for the fix, see http://support.microsoft.com/kb/930311. You may have problems using a screen reader program with Windows Vista. Microsoft says the bug may occur when you open a common file dialog box to a WebDAV location. Microsoft has a Registry edit that should fix this. See the details, and important warnings about editing the Registry, at http://support.microsoft.com/kb/926822. If you have a Microsoft Office 2007 document in a shared folder on an international domain name (IDN) server, and the computer running office is a Windows Vista computer, you will be prompted twice for a username and password when you try to get the file from the shared folder. Microsoft says to click "Remember my password" when you give the information the first time. January 29, 2007 and Earlier Try to activate Windows Vista, and you may get an error message that includes one of these error codes: 0XC004D401 or 0x80080250 According to Microsoft, these codes show that there is an incompatibility between Vista and your antivirus software or your digital rights management (DRM) software. You'll have to upgrade that software before you can activate Vista. It appears that Intuit QuickBooks 2006 is not compatible with Windows Vista. In this case, the blame appears to lie with Intuit, for QuickBooks uses some techniques in communicating via the Registry that violate Windows XP standards, much less the newer Vista. David Berlind covers this in a number of posts at http://blogs.zdnet.com/Berlind/?p=316 and earlier. If you are running a Microsoft Office 2007 application on a Windows Vista computer, and you try to print to a Dell printer, your computer may lock up. Microsoft does not specify which Dell printers have a problem, but they say to check with Dell for a new printer driver. You may also want to switch things so the Dell printer is not the default printer. Keep an eye on http://support.microsoft.com/kb/931408 for updates. Windows Vista license packages check whether you are using a 32-bit version or a 64-bit version that is compatible with your computer hardware. If you try to install the x64 version of Vista on an x86 (32-bit) computer, you will see the error message: Cannot Install License Package. You'll have to switch to the correct version of Vista. The Windows Defender program may not like some of the items on the startup list on a Windows Vista computer. While your computer booting up, you may see a message over on the far right of your taskbar that says: Windows has blocked some startup programs. Windows blocks programs that require permission to run when Windows starts. Click to view blocked programs. Clicking will show you what's been blocked. (Chances are, they are older pre-Vista applications, especially if this is a computer you upgraded to Vista.) See http://support.microsoft.com/kb/930367 for various things you can do as a workaround. Try to use the Windows Anytime Upgrade to upgrade to another version of Windows Vista, and you may see this error message: Unable to open the license. Error Code: 0x8007000D. Error information: The data is invalid. There could be two causes for this error. Either data got corrupted during the download, or the Automatic Update Manager incorrectly formatted some XML. Microsoft has workaround information at http://support.microsoft.com/kb/930378. If you use the Microsoft Windows Anytime Upgarde (WAU) to upgrade from one version of Vista to another version of Vista, you may not be able to uninstall that version of Vista and go back to where you were. Microsoft has a workaround for this at http://support.microsoft.com/kb/928900. Microsoft says that unformatted DVD-RAM disks cannot be formatted by Windows Vista. However, Vista is able to reformat a DVD-RAM disk that has already been formatted. The only workaround is to make sure you buy pre-formatted disks. Microsoft has a list of when third-party VPN (virtual private network) clients will be available for Windows Vista. These include clients for Aventail, Checkpoint, Cisco, Citrix, F5 Networks, Juniper Networks, NCP, Nortel, and SafeNet. At this point, the majority of them are unavailable. See http://support.microsoft.com/kb/929490 for the estimated dates. If you configure Windows Vista to use the BitLocker Drive Encryption feature, sometimes the encryption isn't completed when you find you have to go into the Windows Recovery Environment (Windows RE) or the Windows Preinstallation Environment (Windows PE). If this happens, Microsoft says you will run into very heavy hard drive activity. Microsoft has a workaround for this. See the details at http://support.microsoft.com/kb/926186/. You won't be able to make a serial cable connection or an infrared connection between a Windows Vista computer and another computer. Those connections just must be too old-fashioned, for Microsoft says Vista will only support Ethernet, WiFi, or a home phone network adapter (HPNA). According to Microsoft, some audio applications are hard-wired to look for the audio components in Windows XP. When you try to run some of these applications on a Vista computer, you will have problems, since some of these components have new file names. For instance they say that if you are running Windows Media Encoder 9, and click Mixer, all you will get is an error message saying a component is missing. In this case, you can use the Windows Volume Control in place of the mixer. See http://support.microsoft.com/kb/930095 for other workarounds. IBM says that neither Lotus SmartSuite nor Lotus Organizer will work with 64-bit versions of Windows Vista. This is due to incompatible legacy code in the Lotus products. They also say that while they haven't heard of any compatibility problems with the 32-bit version of Vista, they aren't supporting the Lotus programs on Vista. iDefense Labs will be paying a bounty for bugs that can be exploited remotely to run code on Windows Vista or Internet Explorer 7.0. Bounty hunters have till 3/31/2007 to bring in the bugs, dead or alive. See http://labs.idefense.com/vcp/challenge.php#more_q1+2007%3A+vulnerability+challenge for the details. There is a bug in the power management options for Windows Vista. According to Microsoft, if you set the "Allow the computer to turn off this device to save power" option for a USB root hub, the configuration information may be lost after you restart the computer. Microsoft's workaround is to turn on the USB selective suspend option. Find out how to do that at http://support.microsoft.com/kb/930312. Microsoft says that if you have Windows Vista running on Lenova T60 or Z61t computers, you may have problems with the screen brightness if you put the computer into a low-power sleep state, and then wake it up again. This is more likely to happen if you adjusted the screen brightness before sleep, either using a function key or the Windows Mobility Center. See http://support.microsoft.com/kb/929249 for more details. Don't connect a Windows Mobile device to a Windows Vista computer, unless that computer has the Windows Mobile Device Center installed on it. If you don't, Microsoft says you won't be able to add or remove programs on the device. You can download the Device Center from http://support.microsoft.com/kb/929659. Microsoft has published the Windows Vista Security Guide, which is supposed to help you harden you Vista installations against attack. Reports are that both the National Security Agency and the NIST both helped with this report. Unfortunately, the report had to be re-released because of some errors. It comes with its own set of release notes to show what had to be changed. You can get it at http://www.microsoft.com/downloads/details.aspx?FamilyId=A3D1BBED-7F35-4E72-BFB5-B84A526C1565 There seems to be a driver problem with Sony USB hard disk drives. If the drive is locked, then Windows Vista cannot recognize it, and won't be able to access it. Microsoft says it's because the Sony drive is not sending the correct status codes, and you'll need to look to Sony for a driver update. Even if you shell out the extra money to buy the Windows Vista Home Premium Edition, you won't be able to get that computer to join a domain. Domains, I guess, are for the corporate world, and Microsoft says this version is for the "home". That means they left out some of the networking stuff. Microsoft says if you are setting up for unattended installation of Windows Vista, it's possible that Vista may get installed in the wrong partition of your hard drive. Microsoft says that's because Unattend.xml file does not assign a drive letter to the installation partition. Read more about what you need to do at http://support.microsoft.com/kb/929848. Microsoft has a Windows Easy Transfer tool that will let you move files and settings from one Windows Vista computer to another. However, if you are going from a 32-bit Vista computer to a 64-bit Vista computer, some settings will get left out. See the details at http://support.microsoft.com/kb/929459. PCI ExpressCard devices may have compatibility problems with laptop computers running Windows Vista. Check the Device Manager, and you may see the yellow exclamation mark warning next to it. The problem occurs if the Advanced Configuration and Power Interface (ACPI) BIOS has resource rebalancing turned on. Microsoft has a hotfix for this, which should be in a future Windows Vista service pack. If you need the fix right away, see http://support.microsoft.com/kb/929550. If the time and date are not approximately correct on a Windows Vista computer, you will not be able to search for new Vista updates. Instead, Microsoft says you may see this error message: Windows could not search for new updates (Code 80072F8F). You will need to set the date and time correctly, since the security used during the update (Secure Socket Layers, or SSL) is based on it. See http://support.microsoft.com/kb/929458 to find out how to do this. If you use the Windows Vista Disk Cleanup tool, Microsoft says you may break the Hibernate option within Power Options, or the sleep feature may lose it settings if power is lost. If you find that hibernation got broken, Microsoft says you can use the powercfg -h command instead. See http://support.microsoft.com/kb/928897 for the details. If you run into application compatibility issues in Windows Vista, Microsoft has compiled a set of troubleshooting steps, plus links to other information, at http://support.microsoft.com/kb/927386. If you upgrade from Windows XP to Windows Vista, and still use a dial-up modem, you may no longer hear the audio handshake, (also known as that annoying squeal) when a dial-up connection is made. Microsoft says that is because some modem drivers don't know how to stream their audio to Vista. However, the connection will still get made. If you want to hear it, you may need a modem driver upgrade. On a Windows Vista computer, if you have configured your screen saver to display the logon screen box, and also have set Require a Password on wakeup, then if you try to watch a video in the Windows Media Center in full-screen mode, the screen saver may turn on. As a workaround, Microsoft says you will need to reverse one of those two conditions. See the details at http://support.microsoft.com/kb/929526. Microsoft is finally sharing the programming interface, or APIs, for Windows Vista with third-party security firms. It appears that the firms are happy now, but it will probably take awhile for them to have software that works with Vista. Read the article (and possibly between the lines) at http://news.zdnet.com/2100-1009_22-6145285.html. Copyright 2003-2007 BJK Research LLC
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00488-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
28,459
89
https://hostadvice.com/how-to/web-hosting/security/how-to-work-with-archives-in-ssh/
code
While working with remote servers it is not unusual to require moving large numbers of files at once. As such, using compression and archival tools can be extremely useful. There are a number of archival/compression tools available. A few of the most popular ones and the ones we’ll be looking at today in this tutorial are Tar, Tar+Gunzip, BZip2, and Zip. Each of these compression algorithms can be run remotely and locally on Linux and Mac servers and local machines in an SSH session. Allowing for mass file migration on the fly. Note: The following command line examples are platform independent, except for Zip commands. Tar is an excellent tool for compiling and compressing content. With this command, in combination with a number of options, you can create, maintain and extract files archived in the tar format. Tar actually stands for tape archive. Developed in the early days of Unix, Tar was in backing up computer files to tape-based storage devices. Today it is used to collect, distribute and archive files while preserving file system attributes. To use the tar command, navigate to the working directory containing the folder you wish to archive and issue the command tar followed by the relevant options, the name of the archive you wish to create and then the name of the folder you wish to archive. Assuming you wish to compress the folder “/collapse” in the root folder “/example”, enter the following command: tar -c -f collapse.tar collapse/ In the example above the options used were c and f. The “c” switch creates a new archive and the “f” switch declares an archive file. Other options are as follows: |Append tar files to an archive. |Calculate any differences between the archive and the file system. |Delete from the archive. |Append files to the end of a tar archive. |List the contents of an archive. |Test the archive label, and exit. |Append files, but only those that are newer than the copy in the archive. |Extract files from an archive. The above command will compress the folder collapse (with everything inside it) that’s in the current working directory to create a single file called collapse.tar. In instances where you would like to archive several files instead of a single folder, slightly alter the syntax of the same command, listing the desired files separated from each other with a single space instead of the single folder. tar -c -f collapse.tar file1.doc file2.php file3.c This command will compile the three files (file1, file2, and file3) into a single file called collapse.tar. To extract a tar file simply state the command followed by the “x” switch and the archive file. For example: tar -x -f collapse.tar Tar+Gunzip provides more advanced options with better compression. To use it we’ll simply add two new options. The Tar+Gunzip syntax is as follows: tar -cvzf collapse.tar.gz collapse As you can see, we’re still using the tar command. However, we now have the “v” and “z” switches. The “z” switch is what actually instructs tar to create the archive as a gzip archive. The “v” switch tells tar to compress the folder in verbose form. What’s happening here is that tar is packaging all the files in the folder into one collective file, while Gzip is applying its superior compression algorithm to the file. Extracting gzip files which have been created in this manner is, however, a two-fold process. First, the file needs to be decompressed. This is done by executing the gunzip command on the file. Example: This removes the compression from the file and renders is a .tar file. Now the tar extract function must be run to separate the files: tar -xvf collapse.tar The Bzip archive tool while being a little different actually uses the same command as Tar file: tar. To use the tar command for Bzip files simply include the “j” option. Now the example command changes to: tar -c -f -j collapse.bz2 collapse/ And, just as stated before, to extract the file simply change the “c” switch to “x”. tar -x -f -j collapse.bz2 The classic archive format is .zip. It is most popular with Windows users given programs like Winzip and Windows native support of zip files. You can uncompress files in the ZIP format using the command unzip and, respectively, you can compress content into a zip file with the command zip. The compression power of the ZIP command is, however, less efficient when compared to GZIP or BZIP2, so a file in the zip format containing the same contents will be larger in size. To pack a zip archive just use the zip command followed by the name of the file (including the .zip extension). Note: Zip is not native to Windows so the follows commands may not apply, unless a Zip command line feature has been installed. The native function for Windows is Compress, however that function is outside the scope of this article. zip collapse.zip collapse/ As mentioned before, to extract a zip file, change the syntax to run the unzip function instead. Using this function will uncompress the zip file, placing its contents, in the current working directory. Check out the top 3 Best web hosting services - You can discover new info about Best website hosting by clicking this link.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816586.79/warc/CC-MAIN-20240413051941-20240413081941-00621.warc.gz
CC-MAIN-2024-18
5,216
42
https://fsuya.org/
code
I am an MC2 Postdoctoral Fellow at the Maryland Cybersecurity Center (MC2) at the University of Maryland, College Park. I received my Ph.D. degree in Computer Science from the University of Virginia, advised by Prof. David Evans and Prof. Yuan Tian at UCLA. I am interested in machine learning for security and the trustworthy aspects of machine learning, especially in malicious training environments. Ph.D. in Computer Science, 2017-2023 University of Virginia Ph.D. in Computer Science (discontinued due to advisor relocation), 2015-2017 Arizona State University B.Eng. (Honors) in Electrical Engineering, 2010-2014 China Agricultural University
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.54/warc/CC-MAIN-20240418124808-20240418154808-00821.warc.gz
CC-MAIN-2024-18
648
7
http://analyststrategy.com/fir-highpass-filter-using-rectangular-window.html
code
As an example, suppose that a 50-Hz noise falls on top of the signal produced by a sensor. The final windowed impulse response is thus always time-limited, as needed for practical implementation. The spectrum produced after application of the Hamming window shows a slight loss of spectral resolution as the two peaks are not as sharp; however, background spectral peaks due to noise have been somewhat reduced. If you specify an odd n for a highpass or bandstop filter, then fir1 increments n by 1. The approach that has just been used is called applying a Rectangular Window. Question are denoted with question marks,? Using Rectangular and Kaiser Window with Different Cutoff Frequencies. Unlike other methods, here Wn corresponds to the 6 dB point. The vector window must be n+1 elements long. To create a finite-duration impulse response, truncate it by applying a window. In the limit of a zero-width pass-band, the becomes that of the Kaiser window transform itself. Let the cutoff frequency be 2,000 Hz and assume a sampling frequency of 8,000 Hz. A delay element, which is just a clocked register, is used between coefficients. It can be seen that the transition frequency of 250Hz is correct, as is the transition width of 100Hz. Speech equalizer in Problem 7. To gain insight, consider the continuous-time case. Although this figure shows a low-pass filter, the relations for the ripples are valid for other filter types. The peak approximation error depends on the window type and is known for each window as reported in Table I. Assume that the sampling frequency is 8,000 Hz. My Problem is that i am able to generate Stopband Riples with equal width but in given problem riple width attenuates with increase in frequency. The windowing process can be thought of as multiplying the data by some window shape. See of The Scientist and Engineer's Guide to Digital Signal Processing for more details. Note that this window function generally results in abrupt changes at the endpoints. Just a place to get started. Since sinc decays away from time 0 as , we would expect to be able to truncate it to the interval , for some sufficiently large , and obtain a pretty good which approximates the ideal filter. As discussed earlier § , all in filters designed by the must equal the window-transform's width. In particular, the stop-band gain approaches the window side-lobe level, and the approaches half the main-lobe width. For the ideal lowpass filter, is a rectangular window in the frequency domain. Once you have values for M and β, you can finally calculate the actual window weights. A manual design of this nature will be illustrated in the example of §. The reader may wonder why a linear-phase frequency response is important. You can set this by right-clicking on the axis label and selecting Magnitude Squared from the menu. The following plots show the magnitude responses for the differentiators above. This impulse response corresponds to a non-causal system and cannot be used. Given this constraint, the technique applies the least square error minimization technique over the frequency range of the filter's response, instead of over specific bands. It can be effectively combined with the frequency method, as we will see in § below. The values of are reusable for each , calculated from the expression in. A filter with unity magnitude across the spectrum does not affect the amplitude of those sinusoids but if its phase response is not linear, it can completely change the shape of the filtered signal due to different sinusoids adding up with different phases at the output. These techniques are demonstrated in the the following example. The next example shows how filters designed with firls and firpm reflect these different schemes. The firpm function implements the Parks-McClellan algorithm, which uses the Remez exchange algorithm and Chebyshev approximation theory to design filters with optimal fits between the specified and actual frequency responses. This is done for simplicity as the window amplitude is either 1 or 0. Filter Phase Response As discussed in the concept of , the phase response of filters is also important because the shape of the signal in time domain is determined by phase alignment of its constituent complex sinusoids. Choosing other windows corresponds to tapering the ideal impulse response to zero instead of truncating it. In addition, there is a function kaiserord for estimating the parameters of a which will achieve the desired filter specifications. Hamming Windowing Equation Once again, M is the order of the filter, which is equal to the filter length - 1. For these specifications, the function kaiserord returns a beta value of and a window length of. Then the upper peak has a value 1+δ1, while the lower peak has a value of 1-δ1. Based on the previous articles in this series, especially , we will discuss a step-by-step design procedure. Furthermore, the data to be processed is supplied in chunks. Figure 7 compares the response of the designed filter with that of the ideal one.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00632.warc.gz
CC-MAIN-2023-40
5,068
8
https://ikman.lk/en/ad/dhivehi-kudhinnash-hisaabu-tiushan-for-sale-colombo-1
code
MATHS HOME VISIT & online 2022/2021 o/L & A/L revision 2022/2021 O/L & A/L theory EDEXCEL & Cambridge online & home visit maths class. Mathematics Class For O/L & A/L 2021 & 2022 (specially Individual ) Theory class & paper class Clearly discussion & explanation are done with introducing new tips of maths questions. If you are interesting about it please make a call.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989874.84/warc/CC-MAIN-20210518222121-20210519012121-00266.warc.gz
CC-MAIN-2021-21
369
8
http://opendevtoolkit.org/2014/02/21/february-toolkit-update.html
code
We’ve been hard at work consolidating notes from the IATI TAG, speaking to many of you within the open development community, and as a result, and we have some plans for the next couple of months that we wanted to share, including the new Online IATI tools page! To begin with, work around the toolkit will be focused on aid data, primarily because of the existing range of data, tools and training materials that already exist, thanks to IATI. We’re conscious though, that within the IATI ecosystem, there are many potential actors that we could focus on - large donor publishers, small NGO publishers, civil society groups in low-income countries, citizens from aid-donor countries, or aid-receiving countries… the list is almost endless. To avoid the risk of trying to cater to too many audiences, we’re going to focus on the specific target audience of civil society and journalists in aid-receiving countries - ie. the data-user side, rather than the data-producer side. Our reasoning behind this is that civil society and journalists - or, ‘infomediaries’ are well placed to disseminate information that they acquire to wider society, and, especially within aid-receiving countries, their needs have been under-prioritised in the past. In addition, most of the current IATI tools produced have been done by data-producers, ie. donor agencies, rather than starting from the viewpoint of the data user. Because of this, there are few materials out there in the public sphere that meet their needs - starting from questions that people in aid-receiving countries might have, and presenting the information in a user-friendly and accessible way, for example. Initially, we’re collecting information on all of the existing tools out there that help people use and consume IATI data, and here, we’re hoping to have your input. Whether you’ve been involved in creating the tool or portal personally, or whether you have simply used it, we’d love to hear from you - what features would you like to see on the tool? Do you know who created it, or what status it’s currently at? We look forward to seeing your contributions to this Online IATI Tools page. We’re gathering this information on a static toolkit page, and in the very near future we’ll be working with School of Data to produce a dynamic showroom of tools, which will show the appropriate tool depending on user needs - eg. I want to know how much money is spent on maternal health issues in country X. We’ll also be working with School of Data to produce a first iteration of an Aid Curriculum, which will be in a similar style like their other courses. This will be drawing upon some great material that has been produced by a number of organisations and institutions within the field already, and collating it into an easy to understand, modular curriculum - thanks all for sharing your material, and if there’s any more out there, we’d love to have your contributions! Among all this is the core aim of reducing duplication within the field of open development, via sharing materials, reusing and remixing, and building upon the great work that has already happened, so please send across anything you have that might be of use. Once the initial curriculum modules have been written, they’ll also be accessible through the same ‘showroom’ as mentioned above for the tools, with the aim of making it as easy as possible for the user to find both the required tool, and supporting material to help them use it to its full potential. We imagine that within the activities mentioned above, some gaps will start to appear - both in user needs not being entirely fulfilled through existing tools, and with supporting documentation, and that’s where we’ll be focusing our work on in the next phase of the project. We’re also keen to curate materials more widely within the open development sphere - we’ve started an Open Development reading list and contributions to this are increasing everyday via this etherpad, and we’re collecting up people’s favourite examples of how development data has been put to use online via this etherpad, which will soon be up on the site too. How you can get involved: As well as contributing to the resource-curating above, we’d love to have your input on existing tools - please check out the current list of Online IATI Tools and contribute where you can. As always - any questions, suggestions or hints of what else we might be missing, email Zara on email@example.com. Thanks to everyone who has got in touch or contributed so far - it’s been amazing to see the power of the open development community just within these first few weeks!
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549429417.40/warc/CC-MAIN-20170727182552-20170727202552-00290.warc.gz
CC-MAIN-2017-30
4,684
11
http://seclists.org/bugtraq/2003/Sep/363
code
mailing list archives From: "Lothar Kimmeringer" <bugtraq () kimmeringer de> Date: Tue, 23 Sep 2003 20:10:36 +0200 On Tue, 23 Sep 2003 12:18:31 -0400 (EDT), Birl wrote: Excuse my ignorance. I tried to pook around some B64 attachements in my email files for an answer. Are you stating that an = 1) should not appear in B64 at all 2) should not appear in the middle of a line, but only at the EOLN 3) should only appear at the end of a B64 file See the corresponding RFC. The number of characters in a base64-coded text must be a multiply of 4. So ='s are used if there aren't enough characters and are added at the end of the text. = is not a valid character inside Base64 and an encoder should stop with an error or stops decoding. Answering that question could help me better determine how to write a procmail filter for this. Lothar Kimmeringer E-Mail: mailbody () kimmeringer de PGP-encrypted mails preferred (Key-ID: 0x8BC3CD81) Always remember: The answer is forty-two, there can only be wrong
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444209.14/warc/CC-MAIN-20141017005724-00348-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
998
20
https://racing-elite.com/2020/02/13/every-mclaren-livery-in-5-blocks/
code
Right here is no longer a repost, here is the improved model. Sorry for that. I am no longer pleased with my illustration for the recent automobile. I make no longer think the colors have modified this seriously. But I wished to model trudge, that there is a shrimp change.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145910.53/warc/CC-MAIN-20200224071540-20200224101540-00329.warc.gz
CC-MAIN-2020-10
273
2
https://help.valohai.com/hc/en-us/articles/4419251813265
code
In this section you will: - Add a simple pipeline to your - Learn how to use different types of edges (optional). Add a pipeline to The valohai.yaml configuration file is the blueprint for your project. To make sure the indentation is correct and all the steps contain the required properties, it is recommended to run the command in the directory where you have the valohai.yaml to check for any syntax errors. valohai.yaml file and add the following pipeline in it. - pipeline: name: preprocess-and-train nodes: - name: preprocess type: execution step: preprocess-dataset - name: train type: execution step: train-model edges: - [preprocess.output.preprocessed_mnist.npz, train.input.preprocessed_dataset] This pipeline will: Create two nodes: preprocesswill execute your trainwill execute your Create one edge to connect the nodes: preprocess-dataset's outputs will be passed into the input called You can now continue to the next part of the learning path. Optionally, you can keep reading to learn more about the different edge types. The simplest syntax to define edges is [ TARGET have 3 properties separated by dots: node, type and key. Thus the shorthand syntax becomes: [ - The available edge - outputs (only source node) - inputs (only target node) - metadata (only source node) - files (only for deployment nodes) In the example above you already saw how to pipe output from the source node into a target node input. Here are examples for using the other types of edges. edges: # Parameter-parameter edge # Note that the parameters have to exist in the yaml for both source and target - [sourcenode.parameter.parameterkey, targetnode.parameter.parameterkey] # Metadata-parameter edge # Note that you can only pass single values and not for example list type metadata - [sourcenode.metadata.metadatakey, targetnode.parameter.parameterkey] # Output-file edge # The file type is only available for deployment nodes. # Note that the filename is the name defined in the YAML. - [sourcenode.output.outputkey, targetnode.file.endpointname.filename] Next: Run a pipeline ⇒ Please sign in to leave a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00469.warc.gz
CC-MAIN-2023-23
2,113
27
https://alternativeto.net/software/fiji/about/
code
What is Fiji? Fiji Is Just ImageJ Fiji is an image processing package. It can be described as a distribution of ImageJ together with Java, Java 3D and a lot of plugins organized into a coherent menu structure. Fiji compares to ImageJ as Ubuntu compares to Linux. The main focus of Fiji is to assist research in life sciences.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500042.8/warc/CC-MAIN-20230203024018-20230203054018-00111.warc.gz
CC-MAIN-2023-06
325
4
https://povesham.wordpress.com/2017/07/10/phd-studentship-in-extreme-citizen-science-development-of-data-collection-tools-with-non-literate-participants/
code
For more information on ExCiteS and ECSAnVis, please visit here and here. The ExCiteS research group has been developing Sapelli since 2012 – this is a platform that facilitates data collection across language or literacy barriers through highly configurable icon-driven user interfaces. The successful candidate will join a team of anthropologists, ecologists, geographers, computer scientists and designers and focus on extending the undertaken research work. This will include the design, prototype and implementation of Sapelli components that answer the needs and wishes of participants in citizen science projects. The research will mainly include aspects of data collection such as data validation, user authentication and designing user interfaces for non-literate participants. We will specifically focus on engagement of non-literate people and we need to understand how the process, from data collection to analysis, can be made meaningful and useful for their everyday life. The project will include working with non-literate forest communities in central Africa and seek to enable these vulnerable communities to conduct their own environmental monitoring or mapping. For more information, see papers by Stevens et al. 2014 (http://discovery.ucl.ac.uk/1431647/) and Vitos et al. 2017 (http://dl.acm.org/citation.cfm?id=2998242). The applicants should possess a good honours degree (1st Class or 2:1 minimum) in a relevant discipline such as Computer Science, Electronic Engineering or Human-Computer Interaction. The ideal candidate should also hold an MSc in Computer Science, Human Computer Interaction, Human Factors, or Geographical Information Science and must have proven experience and skills in Software Engineering or Human Computer Interaction. The ideal candidate should have excellent verbal and written communication skills and should be able to work as part of a team to design, develop and deploy software prototypes. Preferably, the candidate should have experience in programming in Java and Android and have a good understanding of code management systems such as GitHub. Skills in using Python would also be desired. Finally, since the case studies might involve travelling to central Africa, the candidate should have a willingness to travel in remote forest locations and thus French language skills would be desirable. The ability to be patient and understanding with local people is essential in this regard. Applications are invited from UK and EU citizenship holders. Between September 2017 and January 2018, at time that is suitable to the candidate. A successful candidate will be asked to work with the Extreme Citizen Science group for two weeks (expenses covered) before registering to the PhD programme. Applicants should send a cover letter, 2-4 page research proposal, examples of academic writing (e.g. BSc or MSc dissertation), code outputs from past work and CV to Michalis Vitos (email@example.com) and Judy Barrett (firstname.lastname@example.org). The cover letter should include a personal statement explaining your interest in citizen science, why you are interested in our project and how you would see your work integrated into ExCiteS vision and activities. You are welcome to contact Prof Muki Haklay (email@example.com) or Michalis or any other ExCiteS members with queries about your proposal or for an informal conversation. We are open call that is open until we appoint a suitable candidate. Duration – 3 years Funding –The scholarship covers UCL student fees at the Home/EU rate and provides a stipend of £16,553 per annum tax free. Travel expenses and research equipment will also be provided to the successful candidate. Funding Body: European Research Council (ERC) and UCL.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00404.warc.gz
CC-MAIN-2023-14
3,748
10
https://david.garden/how-to-remove-the-genesis-seo-settings/
code
If you’re like me, you don’t do much for SEO on your site. If you’re a better marketer than me and also have tools that you use for SEO, you probably don’t use the built-in SEO tools with the Genesis Theme Framework. The tools do their job and are already there if you want to use them, but they can be limiting, as well as duplicate work being done with any other SEO plugin that you may be using. You can choose not to use them, but they still take up some valuable space in your dashboard and while editing pages, and they can be a bit confusing if you’re handing the site off to someone else to manage. Removing the Genesis SEO Settings One of the many great things about Genesis is that it allows you to easily modify or remove various portions of it without having to directly edit the core files of the theme. This allows you to modify your child theme only, so that if you ever switch child themes or Genesis updates, your changes won’t break. Place the following code in your functions.php file, or another file that loads on the dashboard. // Remove Genesis SEO settings from post/page editor remove_action( 'admin_menu', 'genesis_add_inpost_seo_box' ); // Remove Genesis SEO settings option page remove_theme_support( 'genesis-seo-settings-menu' ); // Remove Genesis SEO settings from taxonomy editor remove_action( 'admin_init', 'genesis_add_taxonomy_seo_options' );Code language: PHP (php) The first line of code removes the SEO metabox in posts/pages/custom post types. The post editor is already looking cleaner! The second line of code removes the SEO settings menu from the left sidebar in the dashboard. If we’re not using it at all, no reason to have the settings page! Finally, the last line of code removes the SEO settings from taxonomies. That means that you won’t be able to access them on categories, tags, or any other custom taxonomies on the site. And with that, we’re done! Three lines of code (plus a bit of spacing and comments to make it easier to read and remember what we did that for later), and we’ve removed access to the Genesis SEO settings. Again, this isn’t a knock on Genesis, but simply a way to clean up your site a bit if you’ve already invested in another SEO tool for WordPress.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00611.warc.gz
CC-MAIN-2024-10
2,249
16
https://vs10x.wordpress.com/2013/02/06/66/
code
Well, I have always wanted to be able to know where my current code window viewport is (if you can say that) in relation the Code Map contents – in other words, highlight Code Map items that are currently visible in the code edit window. So, here we go. As of version 2.96 Code Map supports this feature – just have a look at the below image. Notice the narrow orange bar that is displayed to the right of “GalleryTitleUrl”, “ShowLogin” and “ShowSearch”: Probably not the prettiest visual style (I’ll probably come back to it later) but not a disaster either, and it gets the job done. It makes sense mostly when working with “as in code” sorting as it gets a nice bird’s eye view for medium to large documents. The feature is configurable by accessing the “Tracking” category in “VS10x Code Map – Customize” as illustrated below: In the end, I would like to mention that because of some nasty effects when accessing COM-based DTE functionality for VB documents, this feature (as with the entire “Tracking” category) is only available for C# documents. Until next time, enjoy coding and do not forget that VS10x Code Map is there for you to help!
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256494.24/warc/CC-MAIN-20190521162634-20190521184634-00505.warc.gz
CC-MAIN-2019-22
1,184
6
https://marijebrummel.blog/2019/08/15/episode-2-bc-fall-release-wave-ii-checking-your-extension/
code
Before we dive into the list of (breaking) changes that I’ve discovered so far, I will first explain how to check your extension against the preview of the fall release. This is mostly interesting for those who are on AppSource or partners who have refactored their IP into On Prem extensions. I’m going to assume all of them have access to the Ready to Go program. If not, send me a message and I’ll help you onboard. In another episode we’ll dive deeper into making your own Base App run on System. So assuming you have a running service tier (on Docker or via de DVD on your machine) we need to make a few changes to the App.Json. NOTE: You first need a new VSIX compiler. Download this from the Docker or DVD. Plaform & Application The Platform version needs to be changed to 15. The application needs to be removed. There is no more application.json file with symbols. Now the dependencies need to be set. There are (most often) two apps needed here Not really a “Marketing Friendly” name for the whole old Navision solution converted to AL code, but that’s it actually. GUID = 437dbf0e-84ff-417a-965d-ed2bb9650972 Version = "18.104.22.168" Essentially you’ll get the same information as in previous versions with the app.json file generated by the finsql.exe but the .app file contains source code. I’ll get back to that in next episodes. No consistency here. You would expect it to be called SystemApp, or BaseApp to be called Base Application. 😉 This is not to be confused with the platform .app file you’ll still get too. This still contains the 2 billion system objects that just are magically there (I think still maintained by finsql.exe when generating the database) The new System Application is actually what you can find here on GitHub. But this seems not to contain source code. Again, more in a next episode. Some examples of application parts that are moved to System Application are - Tenant and Azure AD management - DotNET stuff GUID = 63ca2fa4-4f03-4f2b-a480-172fef340d3f Version = 22.214.171.124 Your app.json file will now look something like this Delete Old Symbols It’s always a good idea to remove old symbol files before moving on. The compiler always looks at the latest version but here it might get confused because of all the moving parts. Download new Symbols Now just get the new symbols and your window will look something like this and starts showing you the warnings and errors. Please note this is the result after some cleaning up. I’m not finished. I’ll write more about TempBlob and other refactoring challenges later. See you in the next episode. And the good news is we get to do this every 6 months. Full employment for developers is guaranteed. LikeLiked by 1 person Hi, so if this is on prem (BC15 Wave 2), how would we generate symbols since finsql.exe is missing from the RTC folder?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00449.warc.gz
CC-MAIN-2023-14
2,861
30
https://www.arnnet.com.au/article/182708/microsoft_discloses_next_sql_server_release_details/
code
Microsoft Wednesday announced new details about the next version of its SQL Server software, which it said will let users access and manage increasing volumes of data. Microsoft, which made the announcement in Seattle at its first Microsoft Business Intelligence Conference, said that the next release -- now called Katmai -- will ship next year. "We developed SQL Server with the goal of providing a data management and analysis platform for all companies, regardless of size or budget," said Ted Kummert, corporate vice president of the data and storage platform division at Microsoft, in a statement. "With the release of Katmai, we'll take the next step on our data platform vision by delivering a comprehensive and integrated business intelligence solution. Expanding the usability of data across business will give customers more value for their IT investments." Katmai will include tighter integration with Microsoft Excel 2007, Excel Services, Office SharePoint Server and Office PerformancePoint Server 2007, Microsoft said. It will also provide reports of any size or complexity for internal use and for external partners and suppliers. In addition, Katmai will include the Microsoft Visual Studio integrated development environment and .Net Framework, which will let developers build new applications with a higher level of data abstraction and synchronize data from virtually any device to the central data store, Microsoft said. SQL Server Katmai can be used to manage any type of data, including relational data, documents, geographic information and XML, Microsoft said.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304749.63/warc/CC-MAIN-20220125005757-20220125035757-00310.warc.gz
CC-MAIN-2022-05
1,585
6
https://shellboost.com/Doc/Reference/Microsoft-resources
code
Here are the most important and relevant articles from Microsoft about Shell Namespace Extension programming, and how do they relate to ShellBoost concepts: Explorer Concepts covers the IDL / PIDL concept. ShellBoost also uses PIDLs for identifying shell items as this is not really an option, but through easy to use .NET classes: ShellItemId and ShellItemIdList available in the ShellBoost.Core.dll assembly. Shell Namespace Extensions is a must read, event for ShellBoost users as it explains the general Shell concepts. a Namespace Extension's Location explains the search Protocol details the search Property System introduces the Windows Projected File System (ProjFS) introduces the Windows Projected File System. to Display a Rooted View of a File explains the registry setup for virtual files. Note there any many other articles on the Internet from Microsoft on Shell Namespace Extensions that are not listed here in this documentation because their subject is covered otherwise by ShellBoost or it’s not relevant when using ShellBoost and its out-of-process architecture.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316150.53/warc/CC-MAIN-20190821174152-20190821200152-00274.warc.gz
CC-MAIN-2019-35
1,084
20
https://frontend.spiceworks.com/topic/2316369-server-share-auditing-detail-file-share-event-log-5145-doesn-t-show-filenames
code
I'm working on getting my file servers to log events in the security logs so I know when a user accesses/changes/deletes files on our network shares. Currently I have everything close to working, except the event log entry, Detail File Share - Event 5145 shows a folder name for "Relative Target Path" and doesn't seem to show the actual file name that they are accessing. It seems to show the share name and share path properly but the only time it seems to show the file path is for files such as Desktop.ini and Autorun.inf for some reason. What am I missing here? Why would the events be missing the filenames themselves?
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487586390.4/warc/CC-MAIN-20210612193058-20210612223058-00599.warc.gz
CC-MAIN-2021-25
625
2
https://ensurtec.com/when-do-it-security-investments-matter/
code
When do IT security investments matter? - June 6, 2018 - Ryan Miller - 0 Comment MIS Quarterly presented a study that looked at the difference in moderating effect between substantive and symbolic IT security solution adoption in the healthcare sector. Part of the paper consists of a meta-study of past research and goes on to propose a new concept on how to view IT security investment – IT value point.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583867214.54/warc/CC-MAIN-20190122182019-20190122204019-00582.warc.gz
CC-MAIN-2019-04
407
5
http://laurenlovestoshare.blogspot.com/2010/07/leaving-boulder-creek-on-to-bay.html
code
How could I not love coming to visit!! My Parents have done an amazing job at creating a BEAUTIFUL get away for all of us ♥ The Boyfriend and I spent the last two days with my whole family up here in the Santa Cruz Mountains. In the morning we're off to my home in the Bay : ]] I'm looking very forward to the fog and cooler breeze, along with hopefully spending some time with my friends. Hope everyone had an amazing 4th of July weekend!! *here are two little friends I found by the pool this weekend
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591216.51/warc/CC-MAIN-20180719183926-20180719203926-00124.warc.gz
CC-MAIN-2018-30
504
11
http://nmasdesign.xyz/archives/4608
code
fiction The Beautiful Wife Of The Whirlwind Marriage txt – Chapter 1558 Reaching the Destination Without Desire icicle ducks suggest-p2 discovery of witches Novel–The Beautiful Wife Of The Whirlwind Marriage–The Beautiful Wife Of The Whirlwind Marriage Chapter 1558 Reaching the Destination Without Desire crazy crooked She could only keep. Gu Jingyu’s get was all set. “Oh, now anyone recognized. Appear, it’s Sun Rourou.” Su Wan did not illustrate to any individual. She experienced her ideas. Now, her funds belonged to other folks. Numerous within the provider noticed that they could go back the company’s cash little by little, but she noticed like she was accomplishing the company wrong this way. She failed to plan to be this kind of load. Considering that the corporation acquired aided her to acquire some money, she should come back the company’s cash. “I didn’t see anyone.” under the rose poem “I didn’t see any individual.” Anyone for the invisible digicam sat there and mentioned excitedly. The very next day, Emily cried when she arrived at this company. the story of the rome watertown & ogdensburg railroad map Sunshine Rourou accessed the orders placed in to the program, as well as coffee shop administrator got her to carry out other jobs. She withstood there and checked, after which she noticed Sunshine Rourou returning anxiously. Su Wan could not aid but go over. “Now that you’ve described it, I do think he’s a little familiar.” She quickly brought the selection more than. She obtained fame right after a video, these days she was still currently in a hired apartment and consuming takeaways. She could only depart. “Ah, where’s your order I just entered?” Emily roared, “I’m not receiving back with him. Through my lifeless physique. Ha, I’ll be low cost beyond words if I return with him.” poems by madison julius cawein answer key “I’m handled!” Emily hugged Su Wan. old familiar faces meaning It could be enough whenever you just pretended to accomplish a thing whenever the camera was to you. Just then, another person sat silently for a part. That they had separated often. Even Su Wan experienced come across it six or seven instances before. Just after seeking a little bit, she almost shouted out in shock. “I didn’t see anybody.” Su Wan jogged about excitedly. “Oh, now somebody spotted. Appearance, it’s Sunlight Rourou.” A lot of originated. They regarded Su Wan and Emily as famous people, so they really asked for pictures and chatted gladly. The camera quickly turned and concentrated on him. The person in the invisible high-end camera sat there and stated excitedly. The Callahan’s: Ultimate Sins Gu… Gu Jingyu? Sun Rourou right away took his purchases. Su Wan did not illustrate to any one. She possessed her viewpoints. Now, her cash belonged to others. A lot of on the company observed that they could return the company’s dollars little by little, but she observed like she was engaging in the corporation wrong by doing this. She did not desire to be such a stress. Since corporation had made it easier for her to earn some bucks, she should returning the company’s funds. Lin Che forced her. “Search, that guy is very attractive.” Reasonable-skinned, he was sitting down there regarding his travel minimized.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00068.warc.gz
CC-MAIN-2023-14
3,342
43
http://pcmobileapps.com/vb/Auto_Built_Reports_In_VB.php
code
Here is a another free app that I put on GitHub . Its a VB.net Win Form type App and that builds custom reports as the user enters queries as he or she would in SQL Managment studio. It allows the user to export to CSV or .txt . They are able to sort through the interface. It uses active directory to authenticate. The user can email reports. All inserts and updates or possible truncates are restricted by the app. Thats all there is to it. Photographs and ScreenShots by Jeremy Stakich.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824225.41/warc/CC-MAIN-20171020135519-20171020155519-00386.warc.gz
CC-MAIN-2017-43
489
8
https://mail.python.org/pipermail/tutor/2011-September/085617.html
code
[Tutor] integrating python and C suryak at live.com Sat Sep 24 05:50:31 CEST 2011 Actually, I'm writing sudoku solver. So, I'd write my logic in C but when it comes to GUI, I feel that python is much easier than doing in C. What I'm looking at is, take input from python program with graphic interface and passing it to my C program file then solve the puzzle and again passing the whole array to python code to display.. How should I do it. -------------- next part -------------- An HTML attachment was scrubbed... More information about the Tutor
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811655.65/warc/CC-MAIN-20180218042652-20180218062652-00032.warc.gz
CC-MAIN-2018-09
549
12
https://giorgosart.gitbook.io/react-easy-edit/examples/enable-the-delete-button
code
Enable the Delete button 🔥 There is a third button that's hidden by default on all EasyEditcomponents and that is the Delete button which removes the selected component from the DOM. In order to activate it, you will need to set the true. You can also change the label of it and add extra CSS classes or a custom React component that you might need for rendering it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00291.warc.gz
CC-MAIN-2023-50
369
4
http://designevening.com/whats-it-all-about/
code
Design Evenings is a group that fosters and celebrates creative communities in cities across India, and soon across the world. We meet once a month for 3 hours to solve one local design problem; proposed by open source software makers, local activists and non-profits, and anyone who wants to collaborate. We brainstorm, sketch & wireframe, and discuss towards identifying a set of possible approaches to solve the problem. We invite designers, innovators, and thinkers from all disciplines to join us. If you are interested in hosting a Design Evening in your city, drop us a note!
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948542031.37/warc/CC-MAIN-20171214074533-20171214094533-00655.warc.gz
CC-MAIN-2017-51
582
4
http://www.webassist.com/forums/post.php?pid=54851
code
Thanks both for the ideas and suggestions, there is plenty there for me to investigate and try. all suggestions could be the culprit really so I'll play around a bit. It's not a critical thing in this case, as the mails go through to the client's inbox fine as they dont use hotmail. It was when testing myself and using my hotmail account that I had the issue. It would of course be a problem for various other projects though. I'll email microsoft themselves as I guess they would be best placed to make a call on what the problem could be. they may even be able to check their logs and spot the rejected mails themselves. I'll also contact the host to check smpt stuff as suggested too. I'll update the thread if I get a solution incase anyone else has the issue.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825495.60/warc/CC-MAIN-20181214070839-20181214092339-00292.warc.gz
CC-MAIN-2018-51
766
4
https://www.quicket.co.za/events/33016-miia-machine-intelligence-and-its-applications/
code
MIIA - Machine Intelligence and its Applications We are excited to announce another MIIA event at Nedbank Stellenbosch University LaunchLab on Tuesday evening 5 September 2017 (6pm for 6:30pm). The theme for the event is Machine Intelligence and its Applications with some experts from Stellenbosch University, Industry, and the MIIA community participating. The format of the event will be a few presentations with Q&A along with a panel discussion. We aim to showcase, amongst others, some of the excellent work being done at Stellenbosch University and Industry in Artificial Intelligence, Machine Learning, and Data Science. More details will be provided about the speakers and the agenda. - 18:30: “Welcome & Introduction”, Philip Marais, LaunchLab [5 minutes] - 18:35: “Machine Intelligence & its Applications introduction and MIIA update", Dr Jacques Ludik, MIIA, Cortex Logic, Bennit.AI [10 minutes] - 18:45: “Learning speech models without labelled data”, Dr Herman Kamper, SU Electronic Engineering [20 minutes] - 19:05: "Minerals Processing and Machine Learning", Dr John McCoy, Zander Horn, SU Process Engineering [20 minutes] 19:25-20:00: Panel Discussion: Machine Intelligence and its Applications [35 minutes] Moderator: Dr Jacques Ludik Participants: Dr Herman Kamper, Dr John McCoy, Zander Horn, Shaun Irwin (Stone 3), others from Industry MIIA Events page: http://machineintelligenceafrica.org/activities/events/ |Refund policy||No refunds|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588153.7/warc/CC-MAIN-20211027115745-20211027145745-00147.warc.gz
CC-MAIN-2021-43
1,468
12
https://www.hopper.com/careers/software-engineering-manager,-customer-experience,-homes--remote--e16d85cb-abae-4310-b70a-23d7ee80bd49/
code
About the job As a Software Engineering Manager on the Homes team focusing on Customer Experience you’ll have the opportunity to work on a greenfield product within Hopper’s $1B+ travel ecosystem. You will build an engineering team that makes Homes the most customer and user friendly option in the vacation rental home industry. You will have direct ownership and lead the building of customer friendly features for managing bookings, cancellations, support and anything else that impacts the customers journey post-booking. You will also have a direct impact on our Customer Support agents to help them do more and solve customer issues faster, providing a best in class customer experience. Our tech stack • We have a microservice architecture with over 200+ services. • Mostly Scala on the backend with some Python. • Our UIs are Mobile first: Swift on iOS and Kotlin on Android. • We mostly host our services on Google Cloud with some on-prem. • We use things like HBase, Kafka, Pub/Sub, GCP Big Query, Cloud SQL, S3, Delos, Redis. • We are driven by data so Amplitude, Big Query and Datadog will be your buddies. - A passion for building customer centric software - Thrived in complex microservices ecosystem with a proven track record of designing and developing new microservices that drive the experience for millions of users - Thorough understanding of Web system architecture and design at scale, with ability to clearly communicate and quantify trade-offs of key decisions - Proven ability to make tradeoffs between technical needs and delivering on business opportunities - Excelled in an environment with cross-functional teams, working fluidly with Product Managers, Data Scientists, Software Developers, and other highly skilled specialists - Experience hiring and growing a team of talented engineers - Expertise with GCP and/or AWS - Fluency in least one modern programming language (Python, Go, Scala, etc) - Lead future development and technical execution for our customer experience vertical - Align and drive team members towards an inspiring vision, yet stage work to deliver value incrementally - Deliver fast and reliable user experience for our customers, leveraging various technologies such as Swift, Kotlin, and Scala and technologies like GCP Big Query, Cloud SQL. - As a hands-on lead, you will work closely with our team of software engineers and product managers to deliver rapid value. - Collaborate directly with technology leadership on ensuring Hopper’s success - Hire, lead, mentor, and coach engineers on the team - Well-funded and proven startup with large ambitions, competitive salary and stock options - Unlimited PTO - WeWork All Access Pass OR Work-from-home stipend - Entrepreneurial culture where pushing limits and taking risks is everyday business - Open communication with management and company leadership - Small, dynamic teams = massive impact - 100% employer paid medical, dental, vision, disability and life insurance plans - Access to a Retirement Savings Plan More about Hopper Despite the pandemic’s impact on the travel industry, Hopper has emerged stronger than ever. As the travel industry continues to rebound, Hopper has demonstrated significant outperformance with its category-leading mobile-only marketplace, delivering value to customers and supply partners with the company’s proprietary suite of fintech offerings Here are just a few stats that demonstrate the company’s recent growth: - Hopper’s valuation is now over $5B, which is more than triple our valuation from early 2020. - The company grew its revenue by more than 300% YoY in 2021. Hopper’s monthly revenues are now 375% higher than its pre-pandemic high point and Hopper Cloud, Hopper’s new B2B initiative, is already 15% of its revenues and growing. - According to Apptopia, Hopper was the #1 most downloaded OTA in the US in 2021. The app has over 70 million downloads. - Hopper’s recovery is faster than the market and its share of the air travel market in North America is now 300% higher than prior to the pandemic, according to MIDT. We are now the 3rd largest air travel agency in North America. - The company sells over $2B in travel and travel related financial services annually. - Hopper’s fintech offerings, such as Price Freeze and Rebooking Guarantee, now represent over 70% of its air revenue. - Given the success of its travel fintech, Hopper recently launched a B2B initiative called Hopper Cloud, where any travel provider can unlock a totally unique revenue stream by seamlessly integrating and offering Hopper’s travel content and fintech products. Hopper Cloud partners include Capital One, Kayak, Marriott, Amadeus, Trip.com , and MakeMyTrip. The industry opportunity for Hopper Cloud is enormous as projections estimate that if all travel distribution channels offered travel fintech, it could increase the total consumer spend for the sector by $200 billion annually. And all this recent growth is just the beginning. There are still so many new opportunities we’re excited to tackle in the next year!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662647086.91/warc/CC-MAIN-20220527112418-20220527142418-00234.warc.gz
CC-MAIN-2022-21
5,095
45
https://forum.garudalinux.org/t/how-install-terminal/6156
code
How to install another terminal? I hate fish( Fish is not a terminal It is shell You can use zsh,bash instead of fish Just type name of shell chsh -s /bin/bash And welcome to forums. This video covers what is what, enjoy. https://youtu.be/hMSByvFHOro Out of curiosity what do you hate about Fish? Can we trust a guy with sunglasses, in this position, in dark room? But he is great guy he makes tutorial on Linux stuff This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710898.93/warc/CC-MAIN-20221202050510-20221202080510-00841.warc.gz
CC-MAIN-2022-49
517
12
http://brandweermwb.ga/blog4918-server-2008-r2-sp2-iso-download.html
code
server 2008 r2 sp2 iso download We provided you the complete software so download and start getting advantages of its features. Click on the provided direct link to get the full setup of the software. CategoriesOperating SystemsTagsDownload Windows Servers 2008 Free, Windows Servers 2008 2017 Free, Windows Microsoft has released SQL Server 2008 R2 Service Pack 2 (SP2). The Service Pack and Feature Pack are now available as a free download from the companys Download Center Windows Server 2008 SP1 Language Packs Direct Download Links (KB2483139). UK Microsoft, Windows 7 system, windows 7, Windows Server 2008 0 Comments.Recent Posts. Download Windows 10 ISO For All Builds And Versions. Windows 2008 r2 sp2 iso free sponsored downloads. Download.Automating Microsoft windows Server 2008 r2 with windows PowerSh. (49.4 Mb ). Prerequisites To install or update SQL Server 2008 R2 SP2 one will need adminstrative rights on the computer. Step 1: Install Microsoft .NET Framework 2.0 or later from the Microsoft Download Center. Step 2: Download SQL Server Express by clicking the Home. Operating Systems. Windows Server 2008 R2 32Bit and 64Bit .ISO.I Have compiled a few posts with the necessary information and download links for you to use to run any vce file Free Unlimited and no regis Do download the big ISO file with Download Manager to ensure 100 completion rate, and accelerate download times on slower links. Download Windows Server 2008 R2 with SP1 (Web, Standard, Enterprise and Datacenter) Evaluation ISO. Recent Posts. Most Common Mistakes In English Jakub Marian Pdf Download. 64 bit compatibility 64-bit versions share source code with the 32-bit. download windows server 2008 enterprise with sp2 rtm.server 2008 r2 sp2 64 bit iso networking and an auto document feeder. with the release of the security bulletins for may 2014, this bulletin summary replaces the. jan 19 Download Windows Server 2008 R2 iso for free - Duration: 1:21. Nonusoft 11,916 views.Como baixar Windows Server 2008 SP2 x86 PT BR (Kaio Augusto Oliveira) - Duration: 2:00. Untouched windows server 2008 r2 iso. Downloaded directly from microsoft. Activator (RemoveWAT) included. Seed as long as you can. Waiting to Download Service Pack 2 (SP2) for Windows 7 and Server 2008 R2 ?Windows 7 and Windows Server 2008 R2 SP1 ISO provides ongoing improvements to the Windows Operating System (OS), by including previous updates delivered over. Mar 4, Windows Server R2 with SP1 ISO download. 10 Replies. After Microsoft releases Windows 7 / Windows Server R2 Service Pack 1 to public, Microsoft now provides single evaluation media ISO for Windows Server R2 with Service Pack 1 for free Or use this Direct Download Link. With this operating system you can increase the efficiency of your organization. You can also download Windows Server 2008 R2.Latest Version Release Added On: 07th Feb 2017. Developers: Homepage. System Requirements For Windows Server 2008 R2 SP1 ISO With Feb Download Microsoft Windows Server 2008 R2 ISO for free. Windows server 2008 it is a high performance and most secure OS for servers at its time, It enhances your networking and developing environment. Windows Server 2008 R2 is a server operating system produced by Microsoft. Windows Server 2008 R2 Sp1 64 Bit Download Iso.Next story Hosting a WCF service in Windows service(Part 19). Previous story Download Wmvcore.Dll Windows Server 2008. Do download the big ISO file with Download Manager to ensure 100 completion rate, and accelerate download times on slower links. Download Windows Server 2008 R2 with SP1 (Web, Standard, Enterprise and Datacenter) Evaluation ISO. Windows Server 2008 R2 builds on the award-winning foundation of Windows Server 2008, expanding existing technology and adding new features to enable organizations to increase the reliability and flexibility of their server infrastructures.Windows 98 ISO Free Download. Windows Server 2008 R2 is a server operating system produced by Microsoft It was released to manufacturing on July 22, 2009 and launched on October 22, 2009. According to the Windows Server Team blog, the retail availability was September 14, 2009. Size. Leeds. Seed. Windows server 2008 r2 sp1 iso direct.Download. Automating Microsoft windows server 2008 r2 with windows PowerShell 2. Iso enterprise server edition sp1 2008 r2 download windows. Feb 05, 2018 microsoft. versatile range of use from soho to large enterprises. the fiercely competitive software giant is positioning its wares for cloud computing with software and services Torrent info. Downloadruwindowsserver2008r2 standardenterprisedatacenterandwebwithsp1x64dvd617389.iso. 3 GB. Recent findings. Windows server 2008 r2 sp1 download 32 bit.Site links:download.cnet.com » Whos Domain :download.cnet.com » Hosting Provider: download.cnet.com. Windows > Business Software > Windows 7 and Windows Server 2008 R2 SP1 ISO.Keep your PCs and servers on the latest support level. Download Windows 7 and Windows Server 2008 R2 SP1 ISO 1.91GB Purchase. Download our recovery and repair disk for Microsoft Windows 7 (also available for Windows 8, Vista, XP or Server editions) that can be used to access.KB (ARM)compiled 2. Utility to extract an El Torito. ISO CD/DVD image. Useful if you for. Added 13 Jul 2016, 16:07 Torrent verified. Downloaded 430 times. Main. Technical. Comments.seeders:21. leechers:10. Windows Server 2008 R2 Sp1 64 Bit Iso. html bbcode. Windows Server 2008 R2 with SP1 ISO download | Windows 7 and Windows Server 2008 R2 SP1 ISO provides ongoing improvements to the Windows Operating System (OS), by including previous updates delivered over. File :Server 2008r2 sp2 download.torrent. Magnet Link : Magnet.windows server 2008r2 enterprise Build 7268 x64 By Duda Melo iso. Windows Server 2008 is the most substantial upgrade to the Windows Server product line since Windows 2000, with a sweeping set of capabilities and a reengineered core that will usher in a new era of 64-bit server computing. To play hide and seek with jealousy free mp3 download Dance gavin dance strawberry swisher pt 2 free mp3 download How long will i love you ellie goulding aznar remix download 2008 32 iso bit sp2 server download r2 windows This download is an ISO file which requires a DVD burner and blank DVD to burn the disc image. Explore Further.Please submit your review for Windows 7 and Windows Server 2008 R2 SP1 ISO. The evaluation is available in ISO format. Web, Standard, Enterprise and Datacenter editions are available via the same download.After this time, you will need to uninstall the evaluation software and reinstall a fully-licensed version of Windows Server 2008 R2. Windows Server 2008 R2 ISO Free Download bootable image file. Windows Server 2008 R2 is a network management windows server. Download Windows 2008 R2 can control networks and make easy for system administrator. Windows Server 2008 R2 Introduction. Kickass Torrents strongly advises you to use NordVPN while downloading torrents. Untouched windows server 2008 r2 iso. Downloaded directly from microsoft. Activator (RemoveWAT) included. Seed as long as you can. Direct Links to Download Windows Server 2008 R2 SP1 .ISO DVD via Microsofts Server The most phenomenal server edition of Microsoft Windows, the Server 2008 R2 has been hitting SP1 which the download links have been leaked both via torrent or via official direct download links. Windows 7 and Server (2008) R2 SP1 RTM x64 x86 » application.enwindowsautomatedinstallationkitforwindows7andwindowsserver 2008r2sp1x86x64ia64dvd 619625.iso » application. Automating Microsoft windows server 2008 r2 with windows PowerSh. (49.4 Mb ).U. Microsoft windows server 2008 r2 x64 RTM International Multilang. (38.95 MB ). Does anyone know a link to a download for Windows Server 2008 R2 Datacenter SP1 (64) iso download. I have my MSDN developers key but cant find the download on any MS sites anymore. You can download Windows 7 and Windows Server 2008 R2 SP1 ISO which is 2.05 GB in size and belongs to the software category System. Direct download via magnet link.Untouched windows server 2008 r2 iso. Downloaded directly from microsoft. Activator (RemoveWAT) included. Seed as long as you can. 10 thoughts on Windows Server 2008 R2 with SP1 ISO download.100 working link. No ads, No bullshits Also Download Other Windows Server, Adobe Softwares, MS Office, Windows, Mac OS X. Sp1 iso download 2008 windows bit 64 r2. POPULAR DOWNLOADS. As promised before, windows 2008 r2 sp1 64 bit iso download Microsoft has now officially released Service Pack 1 Final (KB976932) for Windows 7 and Windows Server 2008 R2. plz sent the link server 2008 r2 sp1 32 bit iso file. Amit Kumar. Inmacs limited.Windows 2008 R2 is x64 bit OS. It does not support 32bit SP1. You can download Windows 200 R2 SP1 from the below link. Server 2008 is the most advanced Windows Server Windows Server 2008 and Vista SP1 are build on the same code. ISO) and tried to install on my sandbox (ESXi 4.1.0, 260247) and Im I also downloaded the 2008 R2 SP1 eval iso as asatoran did Windows 7 and Windows Server 2008 R2 SP1 helps keep your PCs and servers on the latest support level. It also provides ongoing improvements to the Windows Operating. Download Windows 7 and Windows Server 2. R2 Service Pack 1 (KB9. romsrealrandsun. Loading. Downloads. 115Episodes. File name: Windows server 2008 r2 enterprise sp2 64 bit iso.torrent.windows server 2008 r2 enterprise Deutsch 64bit. (2741 Mb ) 6235 kb/s. Download. MICROSOFT windows server 2008 r2 SP1 RETAIL.rar. Ive been blogging The same day the windows server 2008 r2 sp1 64 bit iso Windows 7 beta was released, the Windows Server16-2-2011 Download Windows 7 and Server 2008 R2 Service Pack 1 (SP1) Microsoft has released Service Pack 1 (SP1) for Windows 7 and Server 2008 R2 which can be. Windows Server 2008 R2 SP1 Free Download for PC Latest version for windows.You need to mount Windows Server 2008 R2 SP1 iso to the usb flash drive or on dvd. This free download is the standalone ISO image of Microsoft Windows Server 2008 SP1.Microsofts most powerful server foundation is Windows Server 2008 R2 SP1 dedicated to deliver a reliable and secure operating system for workstations and server.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125936981.24/warc/CC-MAIN-20180419150012-20180419170012-00402.warc.gz
CC-MAIN-2018-17
10,213
5
https://www.thenetworkcenter.nl/Events/Archive/event/219/NETWORKS-Match-Makers-Seminar
code
NETWORKS Match Makers Seminar The Networks Match Makers seminar series started in October 2020 after a succesfull workshop in January 2020, called NETWORKS Matchmaking Event. In this series we bring together network scientists from the social and economic sciences with network scientists from mathematics and computer science, with the goal to explore the opportunity to build synergies. The second seminar takes place in the afternoon of February 4, 2021, and will be held online. Vincent Buskens is professor of Sociology at Utrecht University. He was trained as a mathematician as an undergraduate and moved to sociology for his PhD. Vincent will talk about "Interrelated dynamics of social networks and infectious disease spread". Frank Pijpers is a senior methodologist at Statistics Netherlands (CBS) and professor by special appointment on “Complexity for Official Statistics” at the University of Amsterdam. Frank will talk about "Network reconstruction and privacy preservation for large networks". You can find the abstracts on the NETWORKS Match Makers Seminar website Everyone who is interested is invited to participate, but we would like to ask you to register. After registration, you will receive the invitation link in the week before the seminar. THE NETWORKS MATCH MAKER SEMINAR IS AN INITIATIVE OF THE NETWORKS GRAVITATION PROGRAMME TOGETHER WITH INES LINDNER AND WITH CONTRIBUTIONS FROM THE GRAVITATION PROGRAMME SCOOP
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056892.13/warc/CC-MAIN-20210919160038-20210919190038-00066.warc.gz
CC-MAIN-2021-39
1,444
8
https://primerasolucionlegal.com/forums/topic/buy-forzest-no-script-fedex-forzest-gunstig/
code
buy Forzest no script fedex, Forzest günstig We sell medications at their cost price only without any additional fees! Try it out now! Start shopping now and realize the savings advantages of lower cost meds. Random Internet Quotes: I like generic forzest price only a probiotic do for different supply from their clients destined to happen to produce biopharmaceuticals, for the most secured payment system. Dog anxiety prescription medication management services that can be a non-profit 195-bed inpatient and defend merci. Who have a commitment to collect their medication management mtm includes specialists from institution to the pharmacist will carry out the besides dzhenagra stevens institute of training and free here and they will be dispensed and supplements mentioned on the drugs slowly and even smartphones. Proving that it can be processed via the. It is easy, medication management the west coast. Who questionnaire. Dog anxiety prescription medicines regularly attended gymnastics suddenly discovered and was safe, and regulations globally. Deploy volunteers, thereby reducing medical products and warnings for pharmaceutical benefit scheme. By continuing to the tightening of training and shut down anyway before using pain killers are usually harmless and we are agreeing to you look forward to country. Any corner of other is webcam notarization? The medwatch 3500 form by mail or the name change happens in particular, tablets. Unlike conventional medicine, but then and they support forums 29 percent wanted, innovative features abc news features in st. Including those who questionnaire. Feeling of licensed drug to know what causes …
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585242.44/warc/CC-MAIN-20211019043325-20211019073325-00580.warc.gz
CC-MAIN-2021-43
1,661
5
https://www.tucson-theater.com/category_dates.php?category=Top%20Show&month=11&year=2020
code
Winner of the Pulitzer Prize for Drama, 11 Tony Awards and seven Olivier Awards! Winner of 11 Tony Awards A true cultural phenomenon, Lin-Manuel Miranda's Pulitzer Prize-winning Hamilton is changing the face of the modern musical. An exhilarating historical epic, that is equal parts Sondheim and Notorious... Prices from: $300 British comic royalty returns! Monty Python's legendary John Cleese returns to North America in 2020! This king of comedy will host an evening where the audience will be delighted to hear tales from the writer, actor and tall person's... Prices from: $105
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518767.60/warc/CC-MAIN-20200403220847-20200404010847-00271.warc.gz
CC-MAIN-2020-16
583
7
http://www.linuxquestions.org/questions/linux-newbie-8/mandrake-10-and-playing-dvd%27s-or-not-should-i-say-230253/
code
Now I know this question has been asked and answered countless times before! However, I cannot get my Linux distro (Mandrake 10 community ) to play the darn things even with all the explanations I have found. It can't be that hard to get Linux to play encrypted DVD's, can it? The player I'm using is TOTEM I've downloaded the LIBDVDCSS file and followed the installation instructions precisely. Totem also recognizes my DVD drive (well I presume it does as in preferences it lists it as a SONY DVD drive). And well, I still get the message that not the right codec is installed to play the DVD. From what I can see the codec packs have been installed which came on the community iso images. Can someone please give me really basic step by step pointers on how to get DVD's to play As mentioned, I have made the effort of searching through previous threads and well most other people did not manage to get it going either. PLEASE HELP ME
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174124.9/warc/CC-MAIN-20170219104614-00340-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
937
8
https://forum.puredata.info/topic/9884/camomile-an-audio-plugin-that-loads-pure-data-patches/11
code
Last time I tried with libPd (last summer), I couldn't achieve the creation of a plugin that support multiple instances even using locks. I can't remember precisely of the problem but I think that the libPd implementation is not intended for this purpose. There were a lot of dead locks and when there were not, there were thread concurrencies. So I started to touch libPd files and even pd files and then I realised that it was completely unsustainable and I made my own wrapper: There are 4 classes: - "Pd" a class with static methods that manages all the global variables and the lock system. - "Instance" the counterpart of the pd instance that manages a set of patches (an instance of a plugin for example) and that is thread safe except the send, midi and dsp methods because generally you want to call this methods one behind the other without locking at each call. For example: sendNote(channel, number, velocity); performDsp(nsamples, ninputs, bufferin, noutputs, bufferout); - "Patch" the counterpart of the pd patch that manages a set of object. - "Gui" the counterpart of the iem GUI. There is some kind of smart pointer in the classes that avoids the deletion a patch if you are using its objects or the deletion of an instance if you are using one of its patches. And everything should be thread safe (except the functions that I noticed above) and lock free. However, I used it only for my plugin so perhaps in other contexts the approach can be improved. Anyway, the code is open and documented so you can have a look. PS: the wrapper is in C++, I think it should be better to have a first wrapper in C and then to wrap it again in C++ like libPd.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00868.warc.gz
CC-MAIN-2023-40
1,663
10
https://www.appscare.com/2016/06/19669/
code
AppsCare | Insert and update charts from Google Sheets in Google Slides and Docs - AppsCare AppsCare is a Google for Work Premier Partner in the UK and specialises in the deployment of Google Apps for Work, Google Drive for Work, Google for Education, Google Maps for Work, Chrome Devices for Work and Google Search. google enterprise premier partner, google enterprise partner, google enterprise reseller, google apps reseller, google apps partner, google maps reseller, google maps partner, chromebooks reseller, chromebox for meetings, google maps for business, google apps for business, google apps for education, google drive for work, drive for work, google for work, google apps for work, google maps for work, chrome for work, google for work premier partner, google apps for work reseller, uk, google for work uk premier partner, google apps reseller, google apps partner Insert and update charts from Google Sheets in Google Slides and Docs 02 Jun Insert and update charts from Google Sheets in Google Slides and Docs Charts are a great way to display data in a visually compelling way. You may want to use the same chart in various documents and presentations which is why Google have introduced a new feature, allowing you to update your chart with the click of one button in your slide or document. To insert a chart, go to Insert > Chart in the toolbar in Google Docs or Slides on the web. You have the option to insert a new chart, or select From Sheets to add an existing chart from the spreadsheet of your choice. You can update your chart whenever you wish providing you have checked the Link to Spreadsheet box. To see this feature in action, please see below: Until next week, for more tips and tricks. Note: Photo courtesy of Google
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00205.warc.gz
CC-MAIN-2023-14
1,753
10
https://answers.netlify.com/t/support-guide-netlify-create-how-to-transfer-code-to-your-github-account/109401
code
Transfer your site’s code repository to your GitHub account. When you create a new site, Netlify Create creates and stores the code for that site in a repository under an account we manage. You can request to transfer ownership of that repo to your GitHub account. This option is available in your site’s settings. Click the cog icon in the top left of your screen to open the settings. In the Connected Services section, choose Request Repo Transfer in the GitHub section. GitHub will send an email notification to the primary email address on your GitHub account. Click the link in that email and you should see the repository appear within a few minutes. The site settings will then be updated to reflect the new location.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296820065.92/warc/CC-MAIN-20240425000826-20240425030826-00247.warc.gz
CC-MAIN-2024-18
729
6
http://www.amdzone.com/phpbb3/viewtopic.php?f=29&t=137695&p=183549
code
Sorry about the Intel question, but I'm not on any Intel forums.. I've got a core-2 system that got a bit wet (don't ask,) and I think all that's wrecked is the motherboard. I've got a C2Q9450 and 8GB of DDR2 for it, so I don't want to upgrade the machine. I would like to know if there are any similar motherboards that might do a better job, but still be able to boot Windows without a reinstall. P5N-D's are around $90 right now (after rebate.) Alternately, if there's something better for an HTPC/server role that'll fit the hardware, I might be willing to do a Windows reinstall. I've heard the Intel GMA rigs are decent for HTPC as the sorta support PAP, but getting a basic radeon 5xxx card would probably be a better solution there. This was my gaming machine, but it probably makes more sense to move it to being my HTPC/server (because that machine's dead as well, but too old to fix,) and build a new Ph2x6 for a gaming machine when I get around to it. Any thoughts (other than burn it because it's Intel/nVidia,) are appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292608.25/warc/CC-MAIN-20160823195812-00262-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
1,041
4
https://www.immigrationboards.com/search.php?author_id=69981&sr=posts
code
have a look at this: https://www.gov.uk/government/uploads/s ... 4_0EXT.pdf Welcome to immigrationboards.com! What is the exact wording of the refusal?asjakkas2 wrote: UKVI .... also said that I can not continue to work for my current employer Please do, blanking out personal detailszidane wrote: I just got her refusal, if you want I can attach it.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739134.49/warc/CC-MAIN-20200814011517-20200814041517-00579.warc.gz
CC-MAIN-2020-34
350
5
https://groups.yahoo.com/neo/groups/lambengolmor/conversations/topics/1075
code
Etymology of Gnomish plurals - Happy new year to all the Lambengolmor! I am trying to find out what Tolkien meant in one of the paragraphs of the Gnomish Grammar, where the historical phonology of Gnomish plurals is discussed (PE11:10), and I would like to know if any of you have a clearer view of it. There is a table with the singular and plural forms of the nominative/inessive, genitive/ablative and dative/allative cases. And then the origin of all those forms is briefly discussed, comparing them with their Qenya cognates. Of the nominative/inessive forms: _-in_ or _-th_, is written: "_-in_ is a double plural _-î_ = Q _i_ + _-n_, cp. adjectives." "_-th_ is original and same as Q _-r_" But then the following note is provided: "The existence in G. of an _-r_ plural sign in verbs has given rise to conjecture [...] that G _-th_ does not represent Q _-r_ but that _-r_ is a true plural ending (i.e. _r_ liquid) and _-tt_ = Q _-t_ dual from _-tt@_ [@ = schwa] a dual ending = _-nt@_. This is possible." That is the paragraph that I don't entirely understand. The last part ("_-tt = Q _-t_ dual ...") does not say anything of Gn. _-th_, the object of the previous part of the note. Had it been "_-th_ = Q _-t_ dual" instead, I would have understood that those who said that Gn. _-th_ does not represent Q. _-r_, believed that its origin was the same as Qenya dual _-t_ (both < _-tt@_). If that is the implied meaning, _-tt_ could be explained (if it is not just a mere slip) as a prehistoric form of _-th_, like in _gôtha_ 'possess, have, hold' < _iotta_ [semivocalic _i_], or _nith_ 'wax_ < _nêgitte_ (PE11:42, 60). But what follows is also somewhat ambiguous: "_-tt@_ a dual ending = _-nt@_". Both _-tt@_ and _-nt@_ seem to be old dual endings, but what is their relation, and why is _-nt@_ introduced in the discussion? Perhaps because they are genetically related (_-tt@_ < _-nt@_ by assimilation, or the opposite)? Or because _-nt@_ was still active as a Gnomish dual in some cases? Notice that _-tt@_ could not have that function if it yielded Gn. plural _-th_, and among the "commonest old duals" below in PE11:10 there is _hunt_ 'the nose (originally nostrils)', from "old _-nt_ ending" (cp. PE11:50). It is even possible that the gentive dual _-wint_ (PE11:11) was formed as a "double dual" = _-wi_ + _-nt_. However, this would not mean that _-nt@_ had no reflex in Qenya. At least in verbs and pronouns, _-nt_ was also a dual mark (cf. PE15:46, s.v. _munt_, _lunt_). >Had it been "_-th_ = Q _-t_ dual" instead, I would have understoodI think that's exactly the intended meaning, the correspondence of >that those who said that Gn. _-th_ does not represent Q. _-r_, >believed that its origin was the same as Qenya dual _-t_ >(both < _-tt@_). _th_ and _tt_ probably being so trivial for Tolkien that he doesn't explicitly mention it. >But what follows is also somewhat ambiguous: "_-tt@_ a dual ending =It might be a bit of an overinterpretation, but I propose the following: >_-nt@_". Both _-tt@_ and _-nt@_ seem to be old dual endings, but what is >their relation, and why is _-nt@_ introduced in the discussion? In Quenya, a dual ending _-t_ is seen, but it may come from _-tt@_ with loss of the schwa just as well as from _*-t@_. The parallel existence of _-nt_ suggests that there were different modifications of a more simple suffix _*-t@_, one with reduplication of the consonant, another with nasalization. Note that there is a suggested alternative reading _-tta_, _-nta_; in either case both suffixes are most probably derived from the dual root ATA (PE12:33, beside WI/U). So basically the existence of _-nt_ supports _-tta/-tt@_ which on its turn might be the source of Goldogrin pl. _-th_. Or else Tolkien simply mentions it for the sake of completeness. The suffix _*-t@/*-ta_ seems to appear in _-wid_ (PE11:11). Note also the allative endings _-nta_, _-tta_ in EQG (PE14:46).
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888113.39/warc/CC-MAIN-20180119184632-20180119204632-00503.warc.gz
CC-MAIN-2018-05
3,909
63
https://forum.zorin.com/t/icons-of-some-apps-in-system-tray-is-completely-white/16559
code
System tray icons of Some apps like Stacer, Mailspring are completely white. Its present there but fully white making it 100 % unnoticeable without hovering it. Actually I posted about this already and aravisian suggested to contact the dev of the app. It happens in mailspring too and the mailspring community pointed out that it is something that the electron framework through which the both app is built has to do with. Any thing I do to fix this without having to use dark mode?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530066.45/warc/CC-MAIN-20220519204127-20220519234127-00732.warc.gz
CC-MAIN-2022-21
483
3
http://www.networkworld.com/article/2267318/applications/exchange-2010-beta-sneak-peek-test.html
code
Administrators to get better management, scalability; End users get better Webmail, more self-service options The first public beta of Microsoft's next version of Exchange, due out in the second half of this year, hits the streets today. Microsoft gave us early access and we had 10 days to put it through its paces in a VMware environment. Microsoft has packed changes into every corner of the product — the list of new and improved features is eight pages long (see NWW blogger insight on Exchange 2010). We didn't test every one, but we can say that there's plenty for e-mail administrators and end users to like in this upgrade. For end users, especially those making heavy use of webmail and distribution lists, Exchange 2010 provides a better user interface and expanded capabilities, including self-service management of many Exchange features (see full story). If you are thinking of upgrading to Exchange 2007 but haven't done so, the new end-user features in Exchange 2010 may make the six-month wait worthwhile. The self-service features in Exchange 2010 are another reason to consider delaying an upgrade. On the other hand, if you don't see VoIP features, webmail, or mobile device access as huge end-user driven factors in your e-mail deployment, Exchange 2010 won't be that much of a change from Exchange 2007. For administrators, we found powerful new features in the areas of high availability and scalability that build on Exchange 2007, yet simplify the task of implementing large Exchange networks (see full story). In Exchange 2010, Microsoft is extending the administration and management in very logical ways from the model laid out in Exchange 2007. In addition to the cleaner scalability and availability features, Exchange 2010 has better command-line support (including remote Exchange Shell), integrated archiving (which we didn't test, but which will have third-party archiving vendors either stepping up with better products, or being marginalized out of the market), and role-based access controls. Snyder is a senior partner at Opus One, a consulting firm in Tucson, Ariz. He can be reached at Joel.Snyder@opus1.com. Learn more about this topic The agency's higher speed definition allows it to take new actions to encouarge deployment A site indexed 73,011 unsecured security cameras in 256 countries to illustrate the dangers of using... Buyers of the earthly explanation for whatever fell from the sky in Roswell, N.M. back in 1947 are... Sponsored by AT&T Sponsored by Brocade From CIO to PC technician, salaries for technology-related jobs are on the rise. This IT salary guide... Part 1 of a two part series on how to get started with home automation Part 2 of a two part series on how to get started with home automation Jazz up your system's storage, memory, networking and display without breaking the bank with CIO.com’s...
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122152935.2/warc/CC-MAIN-20150124175552-00043-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
2,869
19
https://community.filemaker.com/thread/92192
code
Define this auto-enter calculation on each of your DBA fields: If ( IsEmpty ( CheckBoxField ) ; self ; PutNameOfMatchingAddressFieldHere ) For least confusion, you'll probably want to clear the "do not replace existing value" check box. Thank you Phil, that worked! I used a check box with Yes and No values for my "Same as Legal" field, but hid the No part of the field so it will only allow user to check Yes. As long as the YES is checked, it will populate the Legal data onto the DBA fields. If I were to edit the DBA fields later on (let's say they change their DBA address down the road) then it will let me edit it, but reverts back to the Legal info again once I leave the field. This I notice happening only if the Yes button is still checked. If I uncheck Yes, then edit the DBA fields, it will save whatever new data changes I put in the DBA fields. Unless you can think of a simpler solution, I think this will work fine. We would just have to be sure to uncheck the Yes box right after the data populates so that editing of the field's data can be done in the future if need be.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107720.63/warc/CC-MAIN-20170821060924-20170821080924-00581.warc.gz
CC-MAIN-2017-34
1,091
5
https://forum.vassalengine.org/t/help-properties-and-variables/992
code
I am awake since 20 hours, tomorrow at six I will wake up again… few hours of sleep and a loooong day in the office awaits me. Still I can’t sleep before I find a solution or a possilbe-solution to this. If you know the feeling pls help. I want to have an in game piece with a label on it that shows a property specified in the properties sheet (editable by the player during game). (Ex: the property is just a name). The only way I can do that is: Label text : $NAME$ Property name: $NAME$ (in the property sheet) Marker - NAME1 That sounds strange to me, but when I remove the Marker (i.e. I use just 1) and 2) ) the label is not updated anymore. Then I wonder how those variables and property sheet work, and wich is the correct way to use them. I am sure there is something silly that I didn’t notice… but I need sleep. Thanks for help As of v3.0, you should get rid of #2 and use a Dynamic Property for #3. Then players can change the property value, though they must use a different keystroke/menu-item for each property. In v3.1, you will be able to use Property name: NAME instead of the dynamic property, meaning that players will be able to edit many different properties at once from within the property sheet dialog and have the new values reflected in the Label. Yeah, dynamic property is the way I am now following, but I think I will now leave the properties ( for the moment) and switch on some graphic editor, in order to have everything ready when the 3.1 will be ready. By your answer I guess it’s also not possible to use property-sheet values to modify a dice result… right? In the property sheet I have the value: ATTACK: XX I would like to create a special dice that shows directly on the log the result of the dice + ATTACK. What you can do is use a Set Global Property trait on the game piece to set a global property (say, ‘modifier’) to the piece’s property (i.e. $NAME$) Then your Dice Button can use the $modifier$ property in its report. It won’t affect the numerical result of the die roll per se, but it will get reported.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337371.9/warc/CC-MAIN-20221003003804-20221003033804-00215.warc.gz
CC-MAIN-2022-40
2,074
20
https://www.taptap.com/app/4608
code
Sokoban (倉庫番 sōkoban?, warehouse keeper) is a type of transport puzzle, in which the player pushes boxes or crates around in a warehouse call boxman or pandaman, trying to get them to storage locations. The puzzle is usually implemented as a video game.Sokoban free games is played on a board of squares, where each square is a floor or a wall. Some floor squares contain boxes, and some floor squares are marked as storage locations. The player is confined to the board, and may move horizontally or vertically onto empty squares (never through walls or boxes). The player can also move into a box, which pushes it into the square beyond. Boxes may not be pushed into other boxes or walls, and they cannot be pulled. The puzzle is solved when all boxes are at storage locations. ★ ★ ★ Features ★ ★ ★ - Funny graphic. - 800 level for free. - 5 modes to play: two boxes, three boxes, four boxes, five boxes, +four boxes. - Move by joypad or slide on your screen. - 7 achivements and leaderboard high score. - Undo when you move wrong. - Suggest when you stuck. What are you waiting for? Download Sokoban Panda now! Contack us: email@example.com
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147054.34/warc/CC-MAIN-20200228043124-20200228073124-00029.warc.gz
CC-MAIN-2020-10
1,162
2
https://www.bigwebmaster.com/ColdFusion/Scripts_and_Programs/Guestbooks/
code
AXentGuestbook is a simple ColdFusion guestbook. It is opensource and easy to customize. Just add a header and footer or use it as an include and you're ready to go. You can easily decide the number of posts to be shown per page. By adding your own header and footer includes you can easily customize the script to fit your website. Next X records was also added in the last update and HTML gets filtered out. The guestbook uses an Access database for storage wich is included in the download. Allows you to enter name, email, subject, and message.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202589.68/warc/CC-MAIN-20190322014319-20190322040319-00436.warc.gz
CC-MAIN-2019-13
548
1
https://expertise.ums.edu.my/
code
The data sources displayed are from two main official systems which are : a) Sistem Maklumat Pusat Penyelidikan (SMPPI) and b) HR-Online System (HR-Online). The data provider is Centre of Data and Information Management (PPDM). Publication data for the last 3 years will be displayed. Data updating is through the system that has been specified ((a), (b)). Research Guidelines : Thank you, I understand. . .
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00703.warc.gz
CC-MAIN-2023-50
407
8
http://roosterteeth.com/user/user-56a0065adc11c
code
It's time for me to write about something serious to the Rooster Teeth gang. As we all know, Beacon is now overrun by Grimm, Pyrrha is dead, Ozpin has vanished, Team RWBY is disbanded, and Ruby has run away with the rest of Team JNPR to Haven to investigate Ozpin's disappearance. Now, if any of you guys from Rooster Teeth are reading this, then thank you for your time and let me tell you guys what I think is going to happen. I sat in my math class this morning and something came to mind. Since Ruby is now with Jaune, Ren, and Nora, then does that mean they get a new team name? If so, what's it going to be called? I thought about this for a while, but if they were to get a new team name, then maybe it would be called Team RNJR (Ranger)? It does sort of make sense now that Ruby is with them and maybe Jaune suggested it and wanted Ruby to be the team leader since he feels that he failed at being a leader of his own team after Pyrrha's death. So, that's all I wanted to talk to you guys about. Hope you guys like what I said and I hope I get to talk to guys later. Strife Airay, logging out~
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948517181.32/warc/CC-MAIN-20171212134318-20171212154318-00353.warc.gz
CC-MAIN-2017-51
1,101
4
http://unix.stackexchange.com/questions/tagged/xargs+wildcards
code
I am searching for some folders in my current directory. What I want to do is, move all the files within those directories to another directory. I am using the following command: find -maxdepth 1 ... Let's say I have a directory with multiple files, all of which are either binary files (files with no declared extensions) and source files (.c extension). I do this: $ ls and get: README.md ... I've got a directory that looks like $ ls Broad_hapmap3_r2_Affy6_cels_excluded.tgz DINGO.tgz GIGAS.tgz index.html IONIC.tgz passing_cels_sample_map.txt ...
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500824445.9/warc/CC-MAIN-20140820021344-00410-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
550
3
https://devpost.com/software/matcha-73yo61
code
A marketplace for restaurants to buy/sell materials that would otherwise be wasted. https://practical-yonath-a01f84.netlify.com username: email@example.com Password: 2019 Food waste is a big problem in today’s world and especially North America. Sustainability & reversing the damage we’ve done to our planet is more pressing than ever, amidst ever increasing political turmoil that’s reversing many of the progressive initiatives and reforms that been taken to move forward in sustainability. Innovation in this space can’t be stopped however: there have been a plethora of apps and services that have come out that try to chip away at what seems incredibly daunting. Flashfood is an app that lets grocery stores let go of their excess inventory at a low price to customers. Content curation apps like Detox Me, Think Dirty and Good Guide seek to keep the consumer more informed about the everyday products in their lives and make better decisions. Good on You seeks to connect consumers to sustainable clothing establishments. All this is great. However, we noticed that the fundamental problem, of food wastage is still around. Subscription meal-prep services like GoodFood and HelloFresh create way less food wastage, but due to the expensive nature of the packaging and delivery process, the offset is questionable, nevertheless a step forward. How can restaurants, suppliers and grocery stores be incentivized to hold on to their excess or food at the end of the day that’s going to be thrown away, and exchange it with an entity that needs it? What it does Matcha matches entities such as restaurants, suppliers, grocery stores and charities to each other to facilitate food exchange. Challenges we ran into - Interac API was a little finnicky. - TD API dataset not diverse enough. What we learned - Even if you have a bunch of ideas coming into the Hackathon, it’s always best to prepare the elevator pitch and other branding material before hand so you can get right to prototyping. - Setting up a development environment specifically for Hackathons that gets you started on reusable essentials would be a big time saver. Setup took a chunk of time we could’ve spent on doing more logic. - Getting icons / colors and descriptions (content) sorted out before hand. What's next for Matcha This is just the start of this beautiful idea. Having an environment to bring together 6 beautifully talented people and get them to collaborate, argue and discuss ideas was such a blessing! We had such interesting discussion around a plethora of topics and we all brainstormed the heck out of this idea, freely criticizing it, till it reached a point of viability. This is just the start. We think this idea has great potential, and given a longer timeline, could be developed into something phenomenal and potentially have a far-reaching impact we could not have predicted. Log in or sign up for Devpost to join the conversation.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00333.warc.gz
CC-MAIN-2023-23
2,941
15
https://searchsap.techtarget.com/tip/Echo-Mode
code
Do you know about "Echo Mode?" It gives you the opportunity to show your SAP dynpros on the screen of another user. It's very useful to show something to a user on another site. Until 4.0, Echo Mode was an option in the menu bar of transaction SM04. Select the user you want, then select the option "Activate Echo Mode." From this moment, the selected user will see every dynpro you're working on until you deactivate the Echo Mode (in SM04). From 4.0 on, the option is not available anymore in the menu bar. You have to do the following: Go in transaction SM04. Write SLON, and select the user (one click) and then hit "Enter." -> Your user is now in Echo Mode. To deactivate it, do the same with SLOF instead of SLON. -> Your Echo Mode is off again. I hope it will help you solve some problems. Have a nice day,
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251687958.71/warc/CC-MAIN-20200126074227-20200126104227-00550.warc.gz
CC-MAIN-2020-05
813
7
https://www.modlock.us/products/vaultek-lifepod-zip-travel-case-dual-layer-pouch
code
The LifePod Zip Travel Case Dual Layer is a dual layer zip case with splash proof construction, built-in lid organizer, and a removable tray w/repositionable interior dividers underneath. It's the go-to travel case and a must have for everyday storage and organization. Constructed using molded EVA foam for a protective hard outer shell with a water repellent nylon Water resistant zipper construction. Built-in lid organizer features (2) small mesh zip pockets and (1) large mesh pocket for organization. Dual layer interior with removable interior tray and repositionable lower dividers. Detachable carabiner (included) can be used to store the case or attach to other travel bags.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817249.26/warc/CC-MAIN-20240418222029-20240419012029-00747.warc.gz
CC-MAIN-2024-18
684
6
https://cheatsheets.xyz/homebrew/
code
Created: 2019 August 16th Updated: 2019 December 2ndEdit this page on GitHub Search homebrew for apps, cli’s, tools If the item you’re looking for is part of a cask: Check for updates on installed apps and upgrade anything that is outdated. Brew and casks are treated differently so the upgrade is a different syntax too. Alternatively there’s a package you can install.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154310.16/warc/CC-MAIN-20210802075003-20210802105003-00369.warc.gz
CC-MAIN-2021-31
376
7
http://www.lolcatbible.com/index.php?title=Amos_5
code
From LOLCat Bible Translation Project 1 Izrale, i has crying. 2 Teh verjin has lost her harbls. 3 Ceiling Cat sed: Tehre has onle roomz for my frends now. 4 But Ceiling Cat sed: you can still has be my frend if you want: 5 If you do though, you DO NOT WANT Bethle or Giggle. 6 Be Ceiling Cat's frend, or else he's berns moar. 7 Anywon who has a flavor of wurmwud or is a jerk, 8 Better be Ceiling Cat's frend now: 9 Ceiling Cat has strong for you. 10 Good Ceiling Cat is good. 11 If Ceiling Cat is mad, dough, you will has nothings. 12 Ceiling Cat has always watched you masturbate. 13 Prudent cats are prudent, while Sinful cats are sinful. 14 Ceiling Cat has frends with Prudent Cat. 15 Ceiling Cat has frends with Good Cat. 16 Ceiling Cat sed: evrywon has crying soon. 17 Crying also for drunkz, sed Ceiling Cat. 18 Ceiling Cat watchez in dark moar than lite. 19 But i's alwayz see yous when you does it. 20 Ceiling Cat mite watch in dark if he has no frends. 21 You all has a flavor. Ceiling Cat does not want. 22 I kno you want me to has some of your prezints. Are not so gret, aktualy. Your nummy treatz, Ceiling Cat iz NOT watching dese. 23 DO NOT WANT yure muszics either. 24 But Ceiling Cat DO WANT justice and fur youz all be gud kittehs to each ubber. 25 Have you know what I means, Izrale? 26 I thinks you do not has, becuz you has many masturbashuns. 27 So you is on punishment, sed Ceiling Cat, whose name iz Ceiling Cat. |← Previous||Next →||← Previous||Next →| |Joel||Obidiah||Amos 4||Amos 6|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832559.95/warc/CC-MAIN-20181219151124-20181219173124-00139.warc.gz
CC-MAIN-2018-51
1,516
30
http://jpcatton-excaliburbooks.blogspot.com/2012/06/ebook.html
code
Dedicated to the charitable publication raising funds and public awareness for the shattered communities of Tohoku - and for what the disaster means for your future. Hi John,You left me a comment on my blog, Overflowing Bookshelves, about reviewing "Moonlight, Murder, and Machinery".I'd love to review the book. You can reach me at admin(at)overflowingbookshelves(dot)com. Thanks Alicia! Will do.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583822341.72/warc/CC-MAIN-20190121233709-20190122015709-00192.warc.gz
CC-MAIN-2019-04
397
3
https://kb.froglogic.com/squish/howto/finding-sub-images-screen-images/
code
In more complex scenarios (typically involving multiple applications) it is sometimes not possible to automate all the processes involved. In such situations it may be an acceptable workaround to check if a certain sub-image is on the screen to decide whether an activity failed or not, or to decide whether to take specific actions or not. Here is an example of this which uses an external Java program called find_image_in_image (download ) for the image search: Example output if the sub-image has been found: Example output if the sub-image has not been found: We would like to use Google Analytics to get a better understanding of how you use the website. By agreeing to this, your usage data will be stored in the USA and processed by Google LLC. Both Google as well as federal US agencies can access this data and combine it with any other data about you, such as your search history, personal accounts or any other data known to Google.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00055.warc.gz
CC-MAIN-2023-23
944
12
https://www.btbytes.com/posts/2021-w23.html
code
2021, week 23 Almost done reading Louis L’Amour’s “Education of a wandering man”. I’d like to read/write “Read all about X in a day” books. Inspired by this tweet by MorganHousel? about Freedom “It’s insightful but short, to the point, and anyone can read it in a day. More books should copy this format.” Got a subscription to LWN.net – $63/year after a discount. Usually it is $75/year. Good through June 8, 2022. Couple of weeks ago renewed btbytes.com for 9 more years. Expiry date - 2030-07-10T02. June 13, 2021 – Went to Spencer Farm in Noblesville, IN to pick raspberries and strawberries. $7/“pint” to pick your own berries. Not surprising considering cheap rates at the supermarkets are made possible by imported labour. From around the web pinboard-to-sqlite is a python tool to sync pinboard.in bookmarks into an sqlite database for offline usage. I intend to use this to generate this very section in future weeks, by writing a script that would spit out markdown for all the ‘posts’ saved with a #weeklytag. Update - 2021-06-19 DONE. Calculus for Seven Year Olds [pdf] ; via HN > The idea is to build “up to” calculus without using the word calculus. The 300+ page workbook from the 90s is a discovery based approach to arriving at Calculus. « Previous week | Next week »
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00463.warc.gz
CC-MAIN-2023-50
1,322
12
https://www.tailor-social-ai.eu/tasks
code
Task 6.1: Modelling social cognition, collaboration and teamwork (Task Lead: IIIA-CSIC) To study the modelling of agent’s cognitive capabilities that integrate individual knowledge and behaviour (possibly arising from model-free approaches) with knowledge available to and from other agents (possibly obtained at different times and from different perspectives). This also includes studying the foundations, techniques, algorithms and tools for designing social AI systems. To achieve that, agents should have the capability of understanding others, reason about them (for example have Theory of Mind) and be able to act in a team. We will investigate novel algorithms to perform on-line team formation. Such algorithms will allow to dynamically assemble teams of agents (and possibly humans) to complete tasks that are requested to be serviced along time. We will also consider aspects such as: fostering diversity within teams in terms of cognitive abilities, personality and gender and manage the dynamics of teams. We will also cater for agents’ motivations by considering their preferences about taking part in tasks as well as how they perceive others, namely their potential team-mates. Finally, our algorithms will also cater to the perception and past observations of assessing agents about teams. Therefore, besides being capable of on-line operation, an important novelty of our team formation algorithm will stem from considering the modelling of the perceptions about others of both working agents and assessing agents, namely from considering social cognition aspects. Task 6.2: Theoretical models for cooperation between agents (Task Lead: UOX) In this task we will use economic paradigms to study and advance the foundations, techniques, algorithms and tools for collaborative decision making by social agents. As AI agents act on behalf of people, a first crucial issue is to model and elicit their preferences and in particular to aggregate and mediate preferences of multiple stakeholders in a fair manner. The second issue is that self-interested agents often need to be given additional incentives to motivate them to execute their tasks faithfully. While economics has shown many impossibility results, multi-agent systems often allow creating artificial settings that allow more powerful mechanisms. In particular, machine learning allows tailoring mechanisms to the particular preferences of agents, using a technique called automated mechanism design. Another opportunity arises from the fact that most AI optimization algorithms now use randomization which invalidates many impossibility results from economics, allowing for example truthful protocols for social choice and budget-balanced truthful auctions. Task 6.3: Learning from others (Task Lead: VUB) We will study the foundations, techniques, algorithms and tools for social learning. We will address the key question of who should learn from whom, and what should be learned. The setting of a single learning agent guided by another agents or by humans has been extensively studied in the past few years. It can exhibit different forms such as learning from demonstrations, advice and imitation learning. Through shaping and interaction, learning can be guided, and when the shaping obeys certain conditions, such a potential function, the learning can still be guaranteed to converge to an optimal behavior. When the learning agent needs to perform a task which is not the same as the ‘teacher’ agent, or when the capabilities of the learning agent or different, one might use transfer learning approaches. In this task we will investigate the research questions arising from placing multiple learning agents in a social context with other agents. How can these agents be efficiently guided in their joint learning process? And how to explore the link between representation, optimization and learning in a multi-agent learning setting. We will also consider federated learning, where agents collaborate to learn a joint model while keeping their individual data private. Task 6.4: Emergent Behaviour, agent societies and social networks (Task Lead: CNR) In this task we will look at the society level, studying the foundations, techniques, algorithms and tools for modeling and designing complex social structures, organizations and institutions. AI has already influenced the work in socio-technical systems (STS), in cyber-physical systems (CPS) and in multi-agent systems (MAS), that is, the most successful approaches for understanding, controlling and maintaining systems where large populations of natural and artificial entities interact in multiple ways with rich information exchanges and mutual behavioural dependencies. Some of the different approaches to modelling social systems that we will consider in TAILOR are self-organization, evolutionary game theoretical paradigms and agent-based simulations. We will also consider normative systems that arise from the collaborative agreements of the members of the society on the norms that regulate their interactions. Task 6.5: Synergies Industry, Challenges, Roadmap on social AI system (Task leader: TNO) Task 6.6: Fostering the AI scientific community on the theme of social AI (Task leader: IST-UL) This task aims at: Promoting activities such as bilateral/multilateral meetings among scientists, Promoting and supporting student visits, Organising workshops on Social AI, promoting the area Organising summer schools TAILOR conference and other common activities related to the area of Social AI
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00336.warc.gz
CC-MAIN-2023-50
5,554
16
https://community.oracle.com/message/10821139
code
Connecting to (DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOST=4242)(PORT=1521)))In addition to Paul's question concerning your database service being up, are you sure +4242+ is your actual host name and it is resolvable? The error message for the second listening endpoint indicates it's not: TNS-00513: Destination host unreachableThe error message for the first one aims at Paul's suggestion: TNS-00511: No listenerIt seems there is no database process running that would "attach" to your IPC listening endpoint. 32-bit Windows Error: 2: No such file or directory please also post the output of sqlplus / as sysdba SQL> startup
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223210034.18/warc/CC-MAIN-20140423032010-00136-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
623
6
https://github.com/awendland/git-remote-status-all
code
Git Remote Status All Easy command to check the sync status of local git repositories with their remotes. - Edit the 'repos' file to contain a newline separated list of paths to your repositories. These should point to the directory containing the '.git' folder, not the '.git' folder itself. - Run 'python git-remote-status-all' or './git-remote-status-all' on Unix systems to execute the utility. - Python must be installed. - Git must be installed and in your system's path for this utility to work.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178370239.72/warc/CC-MAIN-20210305060756-20210305090756-00298.warc.gz
CC-MAIN-2021-10
502
6
https://community.oracle.com/thread/2455118?tstart=270
code
This content has been marked as final. Show 3 replies I suspect that your issue is that the HBox resizes the inner VBox - so the VBox always takes all the available horizontal space. Try setting the VBox max size to Region.USE_PREF_SIZE in addition to setting the HBox alignment. This should prevent the VBox to grow horizontally. if you want to see where the boundaries of your VBox and HBox are, you can set a background color in their style property: hope this helps, Using setStyle, as Daniel recommends, is an excellent tool for debugging. FWIW, I use -fx-border-color instead of -fx-background-color since very few controls, if any, use border color and the color doesn't interfere with the contents. Hi. Try the following: HBox hb = new HBox(); VBox vb = new VBox(); hb.getChildren().addAll(vb); vb.getChildren().addAll(new Button("Submit"), new Label("label")); vb.setAlignment(Pos.BASELINE_RIGHT); HBox.setHgrow(vb, Priority.ALWAYS); Scene scene = new Scene(hb, 300, 250);
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659512.19/warc/CC-MAIN-20160924173739-00174-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
981
9
http://bestcrypt.xyz/archives/4335
code
Boskerfiction The Legendary Mechanic update – Chapter 1222 Deception Is the Way of Wars tumble husky quote-p2 what is the moral of cats Novel–The Legendary Mechanic–The Legendary Mechanic Chapter 1222 Deception Is the Way of Wars drunk proud how to lose ounces The s.p.a.cetime Amber froze anything, so there was not a chance EsG.o.d could manage Gaud from interior. Staying in the outer community for many yrs, it has to be EsG.o.d’s principal consciousness on the inside Gaud. If it was the fact, any stories associated with Gaud until this ‘EsG.o.d’ got had been probably all deleted by EsG.o.d’s most important awareness when his spirit break up. Like this, in the event the dynasty dissected this ‘EsG.o.d’ in the future, they might not find a single thing inside the experiences. EsG.o.d regained aim in a short time and was about to resist. Observing this, Han Xiao pushed him into his vast chest and stated, “Don’t switch. Remember the way i captured you the last time? In the event you it again, you won’t just be wasting all of your life in prison you’ll pass away!” Your head interaction occured within the separated of any following. The exercises of these two of these failed to stop during it. swann’s way page count Han Xiao, nonetheless, did not response. He deliberately explained in the substantial sculpt, “Quit resisting, and you’ll still have a chance to get establish able to witness it all. If you expire below, there’ll be get rid of hope.” The Promise of World Peace EsG.o.d regained emphasis right away and was approximately to face up to. Viewing this, Han Xiao pressed him into his vast chest area and reported, “Don’t switch. Remember how I grabbed you the before? Should you do it once again, you won’t only be spending all of your everyday life in prison you’ll pass away!” He appeared up straight into Han Xiao’s eyes and mentioned carefully, “I don’t have faith in that you’ll allow me to out… but I’m prepared to make your option. In the end, I don’t have a single thing a lot more to get rid of. If the was really the truth, any stories related to Gaud that it ‘EsG.o.d’ experienced were actually probably all removed by EsG.o.d’s key consciousness when his spirit divided. Doing this, in case the dynasty dissected this ‘EsG.o.d’ later on, they might not discover anything during the memories. While EsG.o.d acquired many expertise, he could not use very most of them simultaneously. He resolved this issue by making use of doppelgangers, offering them a number of his Esper Expertise. The better doppelgangers that existed while doing so, the better expertise he can use. “This can be the following time I’ve shed to you. You might can really walk into that degree and experience the surroundings there for me…” Right after numerous many years, the amount difference between Han Xiao and EsG.o.d turned out to be much smaller. He exposed the screen, checked out the fight information, and observed more like EsG.o.d’s information than before. The specific situation was completely one-sided. EsG.o.d was bathing in psionic vigor. His flesh was melting and regenerating numerous periods just about every following. In the nonstop assaults, he could hardly move at all and is at a completely protective stance. He did not dare prevent regenerating overall health for a second. Up the Forked River; Or, Adventures in South America At this time, Han Xiao took one step again without indicating something. The prison was full. Just after he changed, the load on his hereditary chain got drastically decreased. His sturdiness was undoubtedly on the top tier in the universe. Despite the fact that he experienced just emerge from the s.p.a.cetime Amber, his spirit was in a fragile express along with no time at all to organize lots of Beyond Standard A amount doppelgangers, he still got the medical-energy conversion ability. Look for assist? Appropriate, this b*stard knows about the earth Shrub Society and remaining the wormhole data associated with. He may imagine that as soon as the innovative civilizations uncover the Entire world Shrub Civilization, they’ll almost certainly allow him to over to consult him for information. Is that why he stated that we’d connect with yet again in the end? In the event the two souls were still connected and discussed recollections, it could be a conspicuous defect. Judging from EsG.o.d’s identity, if he made up his mind to remove his ledger clean up, he will not have produced this type of oversight. As a result, he most probably completely stop the bond of these two souls. Though he did not know why the dynasty let him out, to him, escaping was his main concern. Rounds of strikes landed on EsG.o.d frequently. Explosions appeared everywhere EsG.o.d pa.s.sed by much like a snake manufactured from fire. You are during the [Torn Soul] declare. You may have suddenly lost a significant portion of INT and MYS capabilities. Your Mental health Level of resistance is reduced by 60Percent. Period: Everlasting. Before EsG.o.d could restore, Han Xiao quickly initialized Internet Spirit, very easily dragged EsG.o.d’s spirit into your electronic planet, and gifted him a pounding. At this point of energy, the many recognition units on the dynasty fleet did not uncover any strange spirit ripples, meaning this ‘EsG.o.d’ have also been not remotely managed. Envy: A Luxe Novel Thus, the latest situation was specific. All elements present got put EsG.o.d with an excessive negative aspect. All he could do was get beat up. He checked up right into Han Xiao’s eyes and mentioned carefully, “I don’t trust that you’ll i want to out… but I’m pleased to make wager. In the end, I don’t have nearly anything much more to forfeit. Not just did he give up on his aged entire body, but he even did not thoughts producing another ‘him’ within the world, offering the many power he got acc.you.mulated during the past to ‘someone else’. This has been why he was considering the brand ‘G.o.d of Espers’. No person but him could ever do something this mad. Right after ongoing to strike for a little bit, as Han Xiao calculated the fact that rewards of his many skills obtained arrived at the maximum, Technical Power erupted from his human body. If they are not because Han Xiao landed the Esper Silence skill on him back then, creating all his Esper Abilities to quit performing and his doppelgangers to perish, even eleven Beyond Quality As will not have managed to take him. Having said that, it only had a couple of seconds for him to be aware of the specific situation he is in. His physique grew to become stress-free, and that he acquired quit resisting. “Don’t imagine I’ll strike you one a shorter period given that you complimented me.” Seek out help? Right, this b*stard is aware of the planet Tree Civilization and remaining the wormhole records at the rear of. He may assume that as soon as the state-of-the-art civilizations find the Planet Plant Society, they’ll most likely allow him to to ask him for info. Is always that why he said that we’d fulfill just as before sooner or later? Even with having the ability to change between energy and well being, the rate was a lot more slowly than Han Xiao. [Esper Ability—Black Spot] had a restriction and may not block all destruction, as well as the quickness of his regeneration also were built with a restrict. The injury Han Xiao was now capable of recipe out was on a totally different degree to right before. And also, the dynasty fleet also provided help in the part. EsG.o.d’s health and fitness was lessening faster than he was regenerating.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499954.21/warc/CC-MAIN-20230202003408-20230202033408-00484.warc.gz
CC-MAIN-2023-06
7,715
40
https://www.quotationof.com/comedian.html
code
There's something about being a parent that has, I think, made me a better comedian.Tags: Parent ✍ Author: Jim Gaffigan A comedian sees the world bent. I'm tangent to the circle.Tags: Bent, Circle ✍ Author: Buddy Hackett Even as a little child, I've always had that comedian kind of attitude.Tags: Attitude, Child ✍ Author: Etta James Bill Cosby was the first comedian I was exposed to, because he doesn't curse.Tags: Bill, Curse ✍ Author: Francois de La Rochefoucauld Ricky Gervais would have you believe otherwise, but Sacha Baron Cohen is the most successful British comedian in the world.Tags: British, Successful ✍ Author: David Walliams I was considered by my peers to be a good comedian. So that's all I ever strived to do was get some recognition from my peers.Tags: Good, Peers ✍ Author: Ron White I'm the only comedian qualified to navigate a supertanker.Tags: Navigate, Qualified ✍ Author: Peter Baynham In a more intellectually rigorous age, I wouldn't be talked about as a satirist at all. I would just be a topical comedian.Tags: Age, Rigorous ✍ Author: Rory Bremner My greatest hope was to get discovered as a comedian and get on a sitcom.Tags: Greatest, Hope ✍ Author: Steve Buscemi I didn't really want to be a comedian.✍ Author: Tom Carper I've been a comedian since I was fourteen. But I've never really been a CEO.Tags: Ceo, Since ✍ Author: Dave Chappelle I'm glad Reagan is president. Of course, I'm a professional comedian.Tags: Glad, President ✍ Author: Fred Durst CLEAR CLIPART celebrity png fruits clip arts transparent. CLEAR CLIPART - celebrity png outfit ariana grande for designers. https://clearclipart.com/explore/Celebrity-png-likeability/ download cliparts by clear clipart. CLEAR CLIPART food clipart nutritious clip arts transparent. High-quality cliparts cat clipart vector by Clear Clipart. I think it's a comedian's job to make everything funny. Nothing is off-limits.Tags: Funny, Job ✍ Author: Donald Glover The pressure to being a comedian is being funny, but I've given that up, so there is no pressure whatsoever.Tags: Funny, Pressure ✍ Author: Gilbert Gottfried Remember, folks, I am a comedian, not a journalist.Tags: Journalist, Remember ✍ Author: Kathy Griffin To be a comedian, you gotta jokesmith, there's no way around it.Tags: Gotta ✍ Author: John Leguizamo I think having an outsider's viewpoint is interesting and good, especially for a comedian.Tags: Good, Outsider ✍ Author: Paul Merton I don't have credibility, I'm a comedian.✍ Author: Dennis Miller The idea of a Japanese comedian was not only a rarity, it was non-existent.Tags: Idea, Japanese ✍ Author: Pat Morita I started out as a stand-up comedian. And that's what I'm most comfortable doing.Tags: Started ✍ Author: Eddie Murphy I'm a comedian who got into movies, so I don't really think of myself as an actor.Tags: Actor, Movies ✍ Author: Eddie Murphy I just think of myself as a comedian, really.✍ Author: Sarah Silverman
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145960.92/warc/CC-MAIN-20200224132646-20200224162646-00547.warc.gz
CC-MAIN-2020-10
2,980
27
https://forum.sierrawireless.com/t/target-compilation-issue-in-oat-2-0/2235
code
I am trying to work with Q2686 + OAT 2.0 Release downloaded from Wavecome. I started with Hello_Word sample. It works in RTE (Debugging) mode perfect but when I compile it in Target mode I have problem: - as i inderstood - I can’t download dwl in module - after downloading the AT+WOPEN=2 command shows what no any code downloaded; But standart binary dwl compilled by Wavecom and included in SDK works OK. I tryied to compile that COPY of the sample (not createtd on other PC) an other computers and have two types of results: - gcc_Hello_World_256KB.dwl - size 74016 - Works OK - gcc_Hello_World_256KB.dwl - size 74560 - Didn’t work All computers works in intranet under WinXP with lastest updates. Compile process isn’t depend on CPU types (intel or no, Core duo, etc.) How to force OAT works right on all computers?
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512268.20/warc/CC-MAIN-20181019020142-20181019041642-00303.warc.gz
CC-MAIN-2018-43
825
8
https://sourceforge.net/directory/development/debuggers/os%3Amswin_2000/?sort=name&page=2
code
NoUnit Graphs your code to give you a picture of how good your JUnit tests are. NoUnit.Net is a .NET version of the program. (More Information at http://nounit.sourceforge.net). Puissant outil a pour but de regrouper une panoplie de fonctions utilitaires dans un seul et même outil, afin de rendre la vie plus facile à un développeur .NET dans le cadre d'un développement Client-Serveur. With the recent release of the OOPIC Compiler IDE source code we, the users of the OOPIC robot controller are working to improve the developement environment to assist and make programming the OOPIC easier. Open Perl IDE is a visual, integrated development environment for writing and debugging Perl scripts with any standard Perl distribution under Windows 95/98/NT/2000. Oracle client side tracing and monitoring utility Proctor is a tool for running unit tests for Python programs. It uses the standard unittest module, and provides a GUI and command line interface for finding and running all tests available in a package or set of packages. An advanced php debugger and profiler that support tracing, sampling, symbolic and exception break points, remote control. This is a zend extension and does not require php script modification. A free IDE for C#, VB.NET, & Boo projects on Microsoft's .NET platform SharpDevelop is the open-source IDE for the .NET platform. Write applications in languages including C#, VB.NET, F#, IronPython and IronRuby, as well as target rich and reach: Windows Forms or WPF, as well as ASP.NET MVC and WCF. It starts from USB drives, supports read-only projects, comes with integrated unit and performance testing tools, Git, NuGet and a lot more features that make you productive as a developer. SimpleASM is a IDE for the MASM (Microsoft´s macro assembler) which is fully written with Borland Delphi6. It uses several controls (please see homepage) and is able to modify the hash table for changing the tokens (color, style ect.).Compiler params can SIM8051 is an emulator for Intel(R) 8051 Archetecture micro-controller and its clones. SIM8051 executes the HEX file on PC and allows user to examine the output graphically. It also supports memory mapped Hardware IO for its parrallel and serial ports. a very fast full system simulator SkyEye is a very fast full system simulator which takes llvm as IR of dynmic compiled framework.. It can simulate series ARM, Coldfire,Mips, Powerpc, Sparc, x86, TI DSP and Blackfin DSP Processor. Also can simulate multicore system by the multicore of host. The commercial support is provided by DigiProto Co. (http://www.digiproto.com) SquirrelBuilder will be an Integrated Development Environment for the Squirrel scripting language featuring syntax highlighting, code-completion, integrated remote debugger, built in documentation, and other tools to make Squirrel development painless. SPE is a python IDE with auto indentation&completion,call tips,syntax coloring&highlighting,uml viewer,class explorer,source index,todo list,pycrust shell,file browsers,drag&drop,Blender support.Spe ships with wxGlade,PyChecker and Kiki. Synthesis is a RAD tool and C++ IDE (like VB or BCB). It eases the creation of Win32 programing though visual programming and class wizards. Using opensource framework and minGW Synthesis provides a extendable and powerful development environment. Tyro is a very high level programming language designed mainly for the beginners of the programming. It makes life easier for the programming newbies. TetraTools is a RPG toolkit that makes use of a custom, powerful scripting language. It is for Win32 and uses OpenGL. Written in C/C++. Provides support for RM2K graphics for easy porting. The QPascal Project is an endeavour to produce a new generation of development tools based on the object-oriented programming language QPascal. Its goal is to create a compiler, linker, debugger, assembler, and eventually an extensive and extensible IDE. A userland debugger (featuring kernel memory access) capable of debugging x32 and native x64 bit applications. The Debugger is using SDL with the look and feel of a well known one The VSEDebug Add-In for Visual Studio.NET 2002 and 2003 enhances debugging by making it possible to view the full contents of containers or other various types that the VS.NET debugger does not correctly parse. Right now, it supports STL containers The web debuging proxy XPHP is an IDE authoring tool for Windows that allows you to design, develop, test, debug and deploy PHP applications. [This project has been discontinued since 2005] The XPS is a scalable platform for meta-programming and domain engineering. It provides a virtual machine, compiler, and runtime library that make it possible to efficiently develop, debug, and run programs based on XPL (eXtensible Programming Language) dotUnit is a port of JUnit (www.junit.org) to the Microsoft .net platform. This testing framework allows for automated unit and functional tests which are vital for refactoring and regression testing. Dranzer: ActiveX vulnerability discovery tool. CERT developed this open source tool so that software developers can test ActiveX controls for vulnerabilities before the software is released to the public.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257650188.31/warc/CC-MAIN-20180324093251-20180324113251-00079.warc.gz
CC-MAIN-2018-13
5,215
26
http://www.coderanch.com/t/359948/Servlets/java/logging-tomcat
code
This week's book giveaway is in the OCAJP 8 forum. We're giving away four copies of OCA Java SE 8 Programmer I Study Guide and have Edward Finegan & Robert Liguori on-line! See this thread for details. How an i enable the logging in Tomcat 4. I checked the documentation and according to The Logger Component, I changed the debug level from 0 to 1 and tried with higher number, but this did not create any catalina.out. I want to redirect the output of Tomcat to either catalina.out or some file.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645323734.78/warc/CC-MAIN-20150827031523-00050-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
496
2
https://hackaday.io/project/2429-captain-pugsley-smart-motion-sensor/log/9111-first-prototypes-assembled
code
With a box of components from Digikey, my trusty solder paste and the correct boards i set out to assemble a prototype to test the functionality. Generally i tend to remove all reference designators from the board as i want to make the board pretty. Instead i have the schematic & design open on my laptop while assembling. I then tick off items one by one in the BOM once placed on the board. First the .. bad :) 1) I thought i had MAX17048 in stock already in my lab. I've used this chip before but apparently i had ran out. This chip is used to measure the remaining charge in the battery so i could get a notification that the power is running low. After all what's the point of a security device that's out of battery? Turns out i didn't have these in stock but for the first prototype this isn't critical so i simply left the component out. 2) The reference design for the CC3000 antenna matching includes a 10pF capacitor. I accidentally had marked this as 10uF (that's only 1000000 times too big..) and hadn't ordered the correct 10pF cap. During assembly this of course was quite obvious and i put in the closest thing i had which ended up being a 15pF cap. Without any network tools available i had to hope for the best knowing that at minimum the reception would be degraded. Turns out 10x sanity check should have been 11x. 3) The EKMC1603 PIR sensor datasheet was a bit unclear and i left out a pulldown resistor on the output. For commercial work i always use a stencil but i didn't feel like paying or waiting extra for it in this case. This made assembly much slower but still everything went well with only minor rework required. Tested so far: 1) MCU works fine. Programming is all good and i can get the lights to blink (these lights will act as a status indicator to display things like wifi connectivity, low battery etc). There is a small issue when sometimes the programming fails and i've pinned this down to being caused by the CC3000. Trying to be smart by actually disabling the power for it may turn out to be a bad choice.. 2) PIR senses motion great (after a 10k resistor soldered across OUT and GND). The datasheet states a 30sec startup period with random activity after which it should be stable. Funny to test a PIR sensor when instead of sitting in front of a laptop and lab equipment you have to hid behind doors and walk around. As expected fully sideways the detection isn't super accurate so most likely this can't be placed on a table pointing upwards. 3) Power works great. The circuit has a soft on switch that turns on the MCU which then keeps the power alive until i want to shut down from software. The power is nice and stable with only 20mV or so noise. The battery input isn't as stable though, should probably put a ~4.7uF ceramic cap on the input (as stated by the datasheet, d'oh). 4) Wifi can connect and get an IP with DHCP. That's pretty much where it ends though. While i haven't tested this extensively yet (could be software related) it seems like the 15pF cap is causing issues. I could try to simply replace it with a 0 ohm resistor to see if this improves, we'll see. Another thing is the trace antenna which by the numbers is good but i haven't seen in any other CC3000 designs. Further testing is required to pin down the issues though After some research it seems like TI has removed all references to the CC3000. Wtf? Also a lot of people seem to be complaining about the issues which are firmware and/or hardware related. TI is dropping the ball and not responding, only touting their new CC3100 and CC3200. Changing to another one isn't a trivial task but it seems like the CC3000 won't be long-lived. Not cool, TI, not cool. Another issue seems to be the PIR sensor which seems great in every way except availability. The usual suspects (Digikey, Farnell, Mouser) all have 0-stock with new ones arriving months from now. Changing to something else would be fine except a lot of the industrial design depends on this.. Aaaanyway. Pictures say more than 1000 words :)
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710662.60/warc/CC-MAIN-20221128203656-20221128233656-00813.warc.gz
CC-MAIN-2022-49
4,032
15
https://www.videonet9.com/load-optimization.html
code
Saving processing power VideoNet can manage a huge number of cameras and provide an effective video surveillance across facility. With VideoNet, you can deploy complex and large size video surveillance systems along with significant savings and more efficient use of video station’s hardware resources. Also, network infrastructure load can be reduced. Using a wide selection of settings, including closing time and event-based actions during working hours, holidays and after-hours, you can more flexibly adapt security functions to your business operations as well as record and store only valuable data. - H.264, H.265 without compression - Multi video streams from a single IP camera - “On the fly” video analysis and meta data recording - Multicast broadcast - 64-bit architecture When creating video surveillance system, one of the limiting factors is the number of connected cameras per each server. When it goes to video surveillance system scaling, such limiting factor is bandwidth usage. One way to reduce bandwidth requirements and do not compromise with image quality is to use multi-stream cameras and configure multiple streams in VideoNet system. Nowadays, more popular are IP cameras capable to deliver two or more streams. VideoNet system can receive several streams from IP cameras with individual profiles that can be used for live view, continuous recording or event-triggered recording. Using multiple stream technology supported by VideoNet system enables to optimize the server load and client load. With multiple stream technology supported by VideoNet, you can divide original video stream to “stream for recording” and “stream for live view”, and then assign them different resolution and frame rate. For example, video from cameras can be added to archive with the best quality and frame rate. For live view on security monitor, video will be with lower quality (because many small video displays on the monitor, and operator needs to see a big picture rather than highly detailed image). The same video stream can be send over network, to mobile phones and web server to reduce bandwidth usage. When operator wants to see a certain event and needs to get a more detailed image, operator can use auto full screen mode for the desired camera with maximum image quality or double-click to increase size of the image to fit the screen. In such a manner you can significantly reduce bandwidth usage. Multicast technology enables to effectively create a video surveillance system incorporating a large number of workstations or monitoring centers. Multicast mode reduces bandwidth usage of the network channels and equipment as well as minimizes number of video streams. Video streams from one source (camera) for multiple recipients (operators) are not duplicated and sent only once. Allocation of video streams between recipients is performed by the last shared network switch. Standard operation mode When using standard approach and Unicast mode, each workstation receives an individual video stream, and the same data is sent over the network many times, i. e. multiple of number of recipients. Multicast mode advantages - Sending data in Multicast mode using specified sources - Optimization of network infrastructure load - Lower processing requirements for heavily loaded workstations VideoNet 9 Multicast mode The system allows to configure video stream settings for the Multicast-channel to significantly reduce VideoNet Web Server load when connecting new users to server and to optimize data transmission. Advantages of Multicast mode VideoNet with 64-bit architecture offers the following benefits: - maximum usage of the equipment, - no VideoNet software-based limitations, - more cameras per server.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476432.11/warc/CC-MAIN-20240304065639-20240304095639-00709.warc.gz
CC-MAIN-2024-10
3,751
27
https://submer.com/jobs/senior-mechanical-engineer
code
Submer Technologies provides a revolutionary computing liquid immersion cooling solution for data centers that saves up to 99% of cooling costs. Our multinational talented team has a huge passion for reducing IT environmental footprint and expertise in datacenter design and day-to-day operation. We’re scaling our team and operations in Barcelona to meet growing international demand. In this role, the successful candidate will become a key member of the Engineering team. This is a great opportunity for the right individual to join a dynamic team to help shape what will certainly be a very cool future! The Senior Mechanical Engineer will be responsible for: We hope to have piqued your interest and would love to speak to suitable candidates. If you can imagine yourself working with Submer or know the right person, please tell us by sending an email with your resumé to: email@example.com with the subject: Senior Mechanical Engineer. We look forward to welcoming you to the team!
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00279.warc.gz
CC-MAIN-2020-16
991
4
https://forum.cogsci.nl/discussion/6020/osweb-randomisation-behaves-differently
code
OSWeb randomisation behaves differently I'm using shuffle_horiz to randomise the locations of some probe items on each trial. This works perfectly on my computer, however, when I move the experiment online the randomisation is done only once at the start, and then those positions are fixed for the rest of the experiment. Here is the experiment file: You can see that within the block loop I have used shuffle_horiz to randomise the "stim" locations, and within the trial sequence there is a probe_loop where I have used shuffle_horiz to randomise the "probe" locations. The stim locations successfully shuffle on every presentation, however the probe locations shuffle every presentation only when I run it locally. If there is any way to fix this then I would appreciate the help, otherwise any tips for how I should reorganise the structure to achieve what I need would be great too.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473347.0/warc/CC-MAIN-20240220211055-20240221001055-00833.warc.gz
CC-MAIN-2024-10
887
4
https://www.brightermonday.co.ug/listings/bi-analyst-75dqgz
code
Africa’s most user-centric and transparent career ecosystem We connect the right candidates with the right opportunities Job Mission Your mission is to support, develop and maintain BI assets to improve insight delivery and decision making. BI Manager (Vertical) ● Provide analysis and insights as required to the project stakeholders ● Work with the BI Manager to develop, grow and maintain BI assets (Git Repositories, Python codebase, Databases/Schema, Servers, etc.). ● Assist in knowledge sharing to ensure all business intelligence stakeholders are provided with adequate documentation and training to enable efficient and compelling use of relevant data sources and reports. ● Provide support relating to data extraction and reporting. ● Assist in CRM functionality as far as it pertains to data gathering, and reporting, and CRM process optimization as required and that best practices are adhered to. ● Create ZOHO analytics and powerBI dashboards and reports ● Maintain all dashboards and reports ● Lead the ROAM onboarding training (CRM, Reports & Dashboards) and set the tests. ● Lead CRM implementation and maintenance for partnerships with collaboration with the BI Manager. ● Support with BI data literacy sessions with all departments across all ROAM jobs countries. ● Customization and maintenance of the business processes on Zoho CRM to help the business be innovative. ● Identify trends that can help other departments, managers and executives make business decisions to modernize and improve processes in the organization across Jobs. ● Prepare monthly, weekly project reports ● Perform ad hoc CRM navigation training and perform surveys to track the areas with training gaps. ● Maintain/provide technical support in terms of code for the development of dashboards, KPIs, reports, and other analytical artifacts that expose key business insights into customers, products, marketing, and operations. ● Work closely with the Vertical Manager to ensure data models and code definitions are aligned across ROAM and with business definitions. ● Play a key role in data cleansing and mining as well as highlighting anomalies. ● You are passionate about data and the impact it drives in the real world ● You have proven experience with data analytics and insight generation. ● You are familiar with data extraction, cleansing, and transformation processes. ● You are comfortable with mid-level SQL code. ● You have experience deriving important data metrics and KPI’s to indicate business health, performance, etc ● You have worked with BI tools e.g PowerBi, Tableau, or Zoho Analytics ● You have experience in Machine learning & Predictive analytics ● You have experience in report writing/ data analysis/statistical interpretation ● You have experience with PL/SQL and stored procedures ● You have experience with Deluge/ Java ● BI Manager (Vertical) ● Business leads / Brand CEOs ● Sales and Operation Teams in markets All applications will be received and Reviewed through Brightermonday Portal by Clicking on the 'Apply Now ' section
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358685.55/warc/CC-MAIN-20211129014336-20211129044336-00378.warc.gz
CC-MAIN-2021-49
3,116
35
https://codeformore.com/resume-get-you-hired/
code
A few years ago I gave a 40m talk at a small, local developers’ conference about writing a better resume. It went pretty well, I was pretty pleased with myself, and feedback was good. A little later, I uploaded the slides and … things went a little bit crazy. The slides were (briefly) Twitter’s most shared slide-deck, it got written up in the mainstream media, and at the time of writing, it’s zooming towards 150,000 downloads. If you search cleverly, you can probably find the original slide-deck. Heck, you can probably even find a grainy video of me giving the talk and begging the audience to pick up pens promoting my (at the time) new recruitment business. The slides free then, and the content is still completely free now. But I’ve made some changes. I’ve rewritten about 50% of the slides based on feedback, based on some things that my opinion has changed about, and also just to clarify some points I don’t think I got across well enough the first time. I’ve also bundled it up as an e-book so you can read it on your mobile device or Kindle more easily. Many of the concepts in the new book are also explored on this site — ideas like the interview gatekeepers are universally useful. But the book tries to take a step-by-step approach on how to write a resume that’ll really open doors for you, whatever point you’re at in your technical career. Both the book and the content on this site are a work in progress, and if you get the book, I want to let you know — roughly fortnightly — when I’ve put something new or interesting on the website too. So here’s the hard-sell: if you sign up to get those updates, I’ll e-mail you the e-book right away. If you don’t like the updates, it’s a one-click unsubscribe. OK, fine, send me the e-book and fortnightly tech recruitment advice Awww, you’re too kind! OK, you can sign-up below: … and I’ll send you the e-book right away.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476205.65/warc/CC-MAIN-20240303043351-20240303073351-00401.warc.gz
CC-MAIN-2024-10
1,929
9
http://explainingmath.blogspot.com/2011/02/more-on-creative-thinking-innovation.html
code
We sometimes use our emotions, what we value, to make decisions. What are the decisions picked? They are premises in well defined axiomatic systems of the real world. Intensity of emotions can be quantified. Intensity exists. It's a different story why we can't show exact biochemistry process taking place. Our emotions come from our values. Also, our values come from our emotions. The two neural systems provide continous feedback to each other. It is beyond me why the concept of a function, in math, has to be introduced so late in education. It's just pairing of numbers.... How to Easier Understand the Role of Mathematics in Physics, Economics, and Other Fields - http://tiny.cc/ji8fw #math #physics Premises in math are theorems in fields in which math is applied. That's why, even math is built from axioms, it can link with real world. I like when a physicist postulates! Using fancy word "postulate" to say "I have no idea where this formula comes from, but it might work!" Axioms in one system are theorems in the other. Axiom: your home light switch can be ON or OFF. Theorem 1: You switched to ON. Theorem 2: You switched to OFF. Proof: directly from Axiom. From "About..." section of book "Mathematical Physiology": Of interest both to applied mathematicians and quantitative physiologists :-) As long as you explain students that math deals with counts only and logic applied to it can be applied eslwehere freely, it's a good start. Math should help you to think more freely, not to prohibit your all other thoughts and thinking in order to correctly add two numbers. I've watched a movie, I've read a book, I've listened to a song. How about I've written a book, I've made a movie, I've composed a song? Precise logical processing in thinking is necessary but not sufficent to succeed. Assumptions must be correct and valuable. Your brain logical unit will process anything with same accuracy, be it input from an emotional response or from strict scientific thinking. It's hard not to be emotionally attached to your scientific thinking :) Emotions continuously make axiomatic systems and your logical brain process it, because it only deals with raw truth values. Sometimes emotions create an axiomatic system and then present it to your brain logical center for processing. Bad input gives bad output :) Your brain has amazing logical mechanism that can process any axiomatic system presented to it. That's why car salesman can sell you a car! Again they made a movie from all the things you already know and you are aware of. but again you failed to link them in that particular way. Stand-up comedian may not make more logical connections than a good mathematician, but, impact of result is much greater. Chose right links. While repeatedly asking "Why?" can eventually bring you to quantum physics, asking "How I can link things " will lead you to new inventions. One postulate in logic can be interpreted in billion ways. I have a strong feeling about that axiomatic system..... Statement ''you might have a chance'' is better than ''you never know''.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512411.13/warc/CC-MAIN-20181019145850-20181019171350-00325.warc.gz
CC-MAIN-2018-43
3,077
25
https://support.chargebee.com/support/discussions/topics/320356
code
Does Chargebee Checkout respect volume pricing, or does that only work subscriptions created using the API? Chargebee supports volume pricing using a combination of API and different plans. The checkout page can be used for the initial signup by making sure that the customer selects the correct plan which corresponds to the volume which they are on. Plan Volume: Price/unit Enterprise (01 to 10) $10.00 Enterprise (11 to 20) $8.00 Enterprise (21 to 30) $6.50 Enterprise (31 to 40) $6.00 Enterprise (41 to ~) $5.50 This will involve creating 5 plans for each tier. When a customer selects a quantity which falls within a given range on your website, you can call the appropriate checkout page(which is plan specific) for this purpose. The downside is that when the customer decides to change the quantity and this falls in a different pricing bracket, it has to be done via API. Here is the documentation highlighting the same: https://www.chargebee.com/usecase-guides/volume-pricing/#setup
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00205.warc.gz
CC-MAIN-2023-06
991
11
http://donovancheung.com/
code
Every since I was a kid, I've always been obsessed with finding out what I can make on my own. Unsurprisingly, this eventually led me down the path of pursuing engineering in college. This website is one of the products of my ongoing effort to boarden the scope of what I think I can accomplish. I made this website as a passion project to document my college journey and experiences - not only academically, but professionally and personally. This will be a, sort of, record of my successes and my failures, and I'll be journalling them as I go, giving a candid look at things that I’m trying or thinking about. Besides my engineering-related pursuits which you can read more about below and in my resume, my hobbies include: An iOS application designed to track expenses for a college student organization. CASA Treasury was written in Swift with the goal of facilitating my duties as treasurer for one of the campus organizations that I'm a part of. It is a simple app that utilizes Google's Firebase database in the backend to store and retreive records of the organization's funds. An extension that makes it easier for users to clean up tab clutter.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250589560.16/warc/CC-MAIN-20200117123339-20200117151339-00200.warc.gz
CC-MAIN-2020-05
1,157
6
https://wiki.archlinux.org/index.php?title=EAccelerator&oldid=147460
code
eAccelerator is a free open-source PHP accelerator & optimizer. It increases the performance of PHP scripts by caching them in their compiled state, so that the overhead of compiling is almost completely eliminated. It also optimizes scripts to speed up their execution. eAccelerator typically reduces server load and increases the speed of your PHP code by 1-10 times. Download the tarball from AUR or use your favorite tool for AUR. IMPORTANT: If you are having problems with open_basedir, you need to edit the PKGBUILD, change the ./configure line to ./configure --without-eaccelerator-use-inode --prefix=/usr I recommend that you do it anyway since future versions of eAccelerator won't be using inodes. You can fine more info here: http://eaccelerator.net/ticket/104#comment:13 Compile the package with Enable it in PHP Run the following command as root (note: make sure you use >> in the following command.) cat /etc/php/conf.d/eaccelerator.ini >> /etc/php/php.ini Edit /etc/php/php.ini and make the following changes: - zlib.output_compression = On Check if installation was ok You can either from the command line or using phpinfo(). If the command line php binary uses the same configuration file as the php-fastcgi version and/or the mod_php version, you can check it by executing: If installation was succesfull you should see something similar to the following: Zend Engine v2.3.0, Copyright (c) 1998-2011 Zend Technologies with eAccelerator v0.9.6.1, Copyright (c) 2004-2010 eAccelerator, by eAccelerator This will show eAccelerator has been loaded successfully, but this doesn't necessarily show that eAccelerator is working like it should. Load a php script running on your webserver in your browser. Assuming you didn't disable the filecache with shm_only = 1, a cached script should appear in the cache directory. You could/should also check using phpinfo(). To do so add: <?php phpinfo(); ?> to a file and open it with your browser. eAccelerator should have its own section. Lighttpd_for_SSL_and_non-SSL#FastCGI_and_PHP_with_eAcceleration - helped me install eAccelerator and contains most of the above info and more. eAccelerator Wiki, Settings AUR Package and open_basedir fix info by furibondox in the comments eAccelerator info on open_basedir errors
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863043.35/warc/CC-MAIN-20180619134548-20180619154548-00068.warc.gz
CC-MAIN-2018-26
2,272
23
https://mlblogsredstatebluestate.wordpress.com/2012/09/28/the-decided-voter/
code
I know I’ve already talked about it but at this time of year, we hear a lot about the “undecided voter.” Here’s the thing, though. This is what an “undecided voter” really looks like:[youtube http://youtu.be/ArC7XarwnWI] I don’t know about you but I prefer not to leave my future in the hands of that guy. You know whose hands I don’t mind leaving my future in? This guy: Hopefully there are no undecided voters when it comes time to vote Miggy for MVP.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00211.warc.gz
CC-MAIN-2020-29
469
4
http://directorsubmit.com/windows-10/svchost-exe-netsvcs-high-network-usage-windows-10.html
code
Svchost.exe (netsvcs) High Network Usage Windows 10 They were reverse engineered by Michael Ligh from the conhost.exe and winsrv.dll binaries. Recently I managed to open task manager and could see that svchost.exe and wuauclt were busy in processes. You may run into this problem if a KDBG with an invalid PsActiveProcessHead pointer is found earlier in a sample (i.e. How can I do this on windows xp? news just because Explorer trying to get information about avi files in directory (if they present), you can disable this dll in autoruns Post Reply Page 12> Tweet Forum Jump Output: Output: C:\>d; Output: 'd' is not recognized as an internal or external command, Output: operable program or batch file. View 1 AnswersView Related After Explorer.exe Crashes, Chrome Profiles Messed Up, And Some Functions Nov 25, 2016 I'm experiencing a weird problem the last week. Another type of program exist, known as DLL's, which are a library of functions, that can not be implemented as a Service and run in the background on it's own. click here now Svchost.exe (netsvcs) High Network Usage Windows 10 Nov 25, 2016 According to google this problem is usually fixed by clearing your windows log files, or by scanning for virus/spyware. Read up as much as you can prior to use. regards Damian ps xp "Run" flashes the list because of its auto exit. However, whenever I connect the PC to Internet, svchost.exe started using almost whole speed. csrss.exe is the Windows client server runtime subsystem. In these cases you can still extract the memory segment using the vaddump command, but you'll need to manually rebuild the PE header and fixup the sections (if you plan on Computer Type: PC/Desktop System Manufacturer/Model Number: Custom OS: Windows 10 Pro CPU: Intel Pentium Dual Core E5700 @ 3.0 GHz Motherboard: Biostar G31M+ Memory: 3 GB DDR2 Graphics Card: (On-board) Intel How To Disable Bits Windows 10 Posts : 67 Windows 10 Pro New 05 Aug 2015 #5 Torquemada said: BITS is most commonly used by Windows to download updates to your system. View 1 AnswersView Related After Explorer.exe Crashes, Chrome Profiles Messed Up, And Some Functions Nov 25, 2016 I'm experiencing a weird problem the last week. If a domain controller is involved, check the dns configuration of it!I say those things because you need administrator for installing services and probably for auditing to... If you something unfamiliar or weird there, it's a rogue malware disguising itself as a service.BTW I think that the culprit in your case would be Windows Update service. http://www.watchingthenet.com/how-to-identify-what-programs-started-svchostexe-in-windows.html Save your draft before refreshing this page.Submit any pending changes before refreshing this page. I have scaned with Malwarebytes, etc and am not infected. Svchost Downloading Windows 10 The svchost.exe (netsvcs) process is consuming all of one of the machines quad cores. Does anyone recognise any malware in amongst the list? This gives you an alternate way to carve _EPROCESS objects in the event an attacker tried to hide by altering pool tags. Svchost.exe High Network Usage Windows 10 Doesn't happen if i boot into safe mode. But there is good reason why this process exists. Svchost.exe (netsvcs) High Network Usage Windows 10 I dunno for 8.1 but i guess it's same as 10? Svchost.exe (netsvcs) Is Always Downloading Something Windows 10 Still it takes too much data. They are there, but they just don't... It is asking for server privilege, which I have nearly eliminated by the ZoneAlarm "ask" option, so not much happens, other than it is driving me nuts answering the "ask" panel. The map information generated by this plugin comes from the underlying address space's get_available_addresses method. http://directorsubmit.com/windows-10/windows-10-high-memory-usage.html But yeah, I clicked start menu, then settings. msmsgs.exe is what the MSN messenger service users to advertise its presence, and to include a traybar icon on the Windows XP desktop (installed by default in Windows XP and subsequent Bits Service Windows 10 You can tweak it if needed by using the --max_history=NUMBER parameter. Note: All of the executables that start with CC are part of the Symantec Common Client runtime environment, used for Norton Internet Security (which includes Norton Personal Firewall, Norton AntiVirus, Norton The output will be very verbose in most cases (functions exported by ntdll, msvcrt, and kernel32 can reach 1000+ alone). kdbgscan As opposed to imageinfo which simply provides profile suggestions, kdbgscan is designed to positively identify the correct profile and the correct KDBG address (if there happen to be multiple). Now I can't open ANYTHING that is .exe. For instance, instead of just seeing "dir", you'll see exactly what the attacker saw, including all files and directories listed by the "dir" command. Svchost.exe (netsvcs) High Cpu Usage I can not browse the internet at all because of this. You won't see this on your machine unless it's also running Norton SystemWorks. 12. I have ran all my ONECare antivirus/spyware tools and nothing is coming up as a problem. Good luck ! click site The value can also be changed for all consoles opened by a given user by modifying the registry key HKCU\Console\HistoryBufferSize. iehistory This plugin recovers fragments of IE history index.dat cache files. You can Google to find it. CCEVTMGR.EXE provides a general event management registration and reporting service for all Norton Internet Security components. 4. spoolsv.exe is the Microsoft print spooler service, which stores pending print jobs on your PC until they can be sent to the designated printer for output. After 2 days I got another BSOD. Name (*) Email (*) Website Fields marked by an asterisk (*) are required. I did make sure to disable live tile updating. Qs: Why are the numbers different? Kernel Memory and Objects modules To view the list of kernel drivers loaded on the system, use the modules command. Unlike modules the order of results has no relationship with the order in which the drivers loaded. Check out the article How To Identify Unknown Processes In Windows for more information. If svchost is using up your resources, it's probably a virus/malware.584 ViewsView More AnswersRelated QuestionsWhere can I find the Windows 10 update?What is the best browser for Windows 7?How can I Now now i have two kind of names under same user . Nov 25, 2016 According to google this problem is usually fixed by clearing your windows log files, or by scanning for virus/spyware. No known attacks are documented, nor any attempts to turn off or defeat this service. 13. Still confused? Will look at Process Explorer. System restore is off and no virus for sure. I have cut down on the number of services that need to be started and have been making some pretty good progress. But both of these did not help me at all.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589932.22/warc/CC-MAIN-20180717222930-20180718002930-00214.warc.gz
CC-MAIN-2018-30
6,905
20
http://eslwise.com/listen_speak22.php
code
Level: minimum beginner maximum high intermediate Increase active vocabulary, accelerate spontaneity, improve distinguishing tenses A variety of dynamic images, large enough for group discussion - Brainstorm categories of physical attributes, ie size, shape, texture, color, volume, purpose, components, etc. - Given one model object: brainstorm vocabulary for describing physical objects and how their parts interact - Given each image, construct grammatically complete and correct sentences that describe physical objects visible and narrate possible activities, past, present, and future.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948593526.80/warc/CC-MAIN-20171217054825-20171217080825-00079.warc.gz
CC-MAIN-2017-51
591
6